2013-11-12 13:24:10 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2013-11-12 14:17:34 +04:00
|
|
|
* Copyright (c) 2013 Bjoern Schiessle <schiessle@owncloud.com>
|
2013-11-12 13:24:10 +04:00
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*/
|
|
|
|
|
|
|
|
use OCA\Encryption;
|
|
|
|
|
|
|
|
/**
|
2013-11-12 14:17:34 +04:00
|
|
|
* Class Test_Encryption_Helper
|
2013-11-12 13:24:10 +04:00
|
|
|
*/
|
2014-11-06 18:53:35 +03:00
|
|
|
class Test_Encryption_Helper extends \OCA\Files_Encryption\Tests\TestCase {
|
2013-11-12 13:24:10 +04:00
|
|
|
|
2013-12-19 14:15:59 +04:00
|
|
|
const TEST_ENCRYPTION_HELPER_USER1 = "test-helper-user1";
|
2014-05-22 17:43:42 +04:00
|
|
|
const TEST_ENCRYPTION_HELPER_USER2 = "test-helper-user2";
|
2013-12-19 14:15:59 +04:00
|
|
|
|
2014-11-06 18:53:35 +03:00
|
|
|
protected function setUpUsers() {
|
2013-12-19 14:15:59 +04:00
|
|
|
// create test user
|
2014-11-06 18:53:35 +03:00
|
|
|
self::loginHelper(\Test_Encryption_Helper::TEST_ENCRYPTION_HELPER_USER2, true);
|
|
|
|
self::loginHelper(\Test_Encryption_Helper::TEST_ENCRYPTION_HELPER_USER1, true);
|
2013-12-19 14:15:59 +04:00
|
|
|
}
|
|
|
|
|
2014-11-06 18:53:35 +03:00
|
|
|
protected function cleanUpUsers() {
|
2013-12-19 14:15:59 +04:00
|
|
|
// cleanup test user
|
|
|
|
\OC_User::deleteUser(\Test_Encryption_Helper::TEST_ENCRYPTION_HELPER_USER1);
|
2014-05-22 17:43:42 +04:00
|
|
|
\OC_User::deleteUser(\Test_Encryption_Helper::TEST_ENCRYPTION_HELPER_USER2);
|
2014-10-10 17:34:19 +04:00
|
|
|
}
|
|
|
|
|
2014-11-06 18:53:35 +03:00
|
|
|
public static function setupHooks() {
|
|
|
|
// Filesystem related hooks
|
|
|
|
\OCA\Encryption\Helper::registerFilesystemHooks();
|
|
|
|
|
|
|
|
// clear and register hooks
|
|
|
|
\OC_FileProxy::clearProxies();
|
|
|
|
\OC_FileProxy::register(new OCA\Encryption\Proxy());
|
|
|
|
}
|
2014-10-10 17:34:19 +04:00
|
|
|
|
2014-11-06 18:53:35 +03:00
|
|
|
public static function tearDownAfterClass() {
|
2014-05-22 17:43:42 +04:00
|
|
|
\OC_Hook::clear();
|
|
|
|
\OC_FileProxy::clearProxies();
|
2014-10-10 17:34:19 +04:00
|
|
|
|
|
|
|
// Delete keys in /data/
|
|
|
|
$view = new \OC\Files\View('/');
|
|
|
|
$view->rmdir('public-keys');
|
|
|
|
$view->rmdir('owncloud_private_key');
|
2014-11-06 18:53:35 +03:00
|
|
|
|
|
|
|
parent::tearDownAfterClass();
|
2013-12-19 14:15:59 +04:00
|
|
|
}
|
|
|
|
|
2013-11-12 13:24:10 +04:00
|
|
|
/**
|
|
|
|
* @medium
|
|
|
|
*/
|
2013-11-12 19:48:24 +04:00
|
|
|
function testStripPartialFileExtension() {
|
2013-11-12 13:24:10 +04:00
|
|
|
|
|
|
|
$partFilename = 'testfile.txt.part';
|
|
|
|
$filename = 'testfile.txt';
|
|
|
|
|
2013-11-12 14:17:34 +04:00
|
|
|
$this->assertTrue(Encryption\Helper::isPartialFilePath($partFilename));
|
2013-11-12 13:24:10 +04:00
|
|
|
|
2013-11-12 19:48:24 +04:00
|
|
|
$this->assertEquals('testfile.txt', Encryption\Helper::stripPartialFileExtension($partFilename));
|
2013-11-12 13:24:10 +04:00
|
|
|
|
2013-11-12 14:17:34 +04:00
|
|
|
$this->assertFalse(Encryption\Helper::isPartialFilePath($filename));
|
2013-11-12 13:24:10 +04:00
|
|
|
|
2013-11-12 19:48:24 +04:00
|
|
|
$this->assertEquals('testfile.txt', Encryption\Helper::stripPartialFileExtension($filename));
|
2013-11-12 13:24:10 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @medium
|
|
|
|
*/
|
2013-11-12 19:48:24 +04:00
|
|
|
function testStripPartialFileExtensionWithTransferIdPath() {
|
2013-11-12 13:24:10 +04:00
|
|
|
|
|
|
|
$partFilename = 'testfile.txt.ocTransferId643653835.part';
|
|
|
|
$filename = 'testfile.txt';
|
|
|
|
|
|
|
|
$this->assertTrue(Encryption\Helper::isPartialFilePath($partFilename));
|
|
|
|
|
2013-11-12 19:48:24 +04:00
|
|
|
$this->assertEquals('testfile.txt', Encryption\Helper::stripPartialFileExtension($partFilename));
|
2013-11-12 13:24:10 +04:00
|
|
|
|
|
|
|
$this->assertFalse(Encryption\Helper::isPartialFilePath($filename));
|
|
|
|
|
2013-11-12 19:48:24 +04:00
|
|
|
$this->assertEquals('testfile.txt', Encryption\Helper::stripPartialFileExtension($filename));
|
2013-11-12 13:24:10 +04:00
|
|
|
}
|
|
|
|
|
2013-11-15 19:49:50 +04:00
|
|
|
function testGetPathToRealFile() {
|
|
|
|
|
|
|
|
// the relative path to /user/files/ that's what we want to get from getPathToRealFile()
|
|
|
|
$relativePath = "foo/bar/test.txt";
|
|
|
|
|
|
|
|
// test paths
|
|
|
|
$versionPath = "/user/files_versions/foo/bar/test.txt.v456756835";
|
|
|
|
$cachePath = "/user/cache/transferid636483/foo/bar/test.txt";
|
|
|
|
|
|
|
|
$this->assertEquals($relativePath, Encryption\Helper::getPathToRealFile($versionPath));
|
|
|
|
$this->assertEquals($relativePath, Encryption\Helper::getPathToRealFile($cachePath));
|
|
|
|
}
|
|
|
|
|
2013-12-19 14:15:59 +04:00
|
|
|
function testGetUser() {
|
2014-11-06 18:53:35 +03:00
|
|
|
self::setUpUsers();
|
2013-12-19 14:15:59 +04:00
|
|
|
|
|
|
|
$path1 = "/" . self::TEST_ENCRYPTION_HELPER_USER1 . "/files/foo/bar.txt";
|
|
|
|
$path2 = "/" . self::TEST_ENCRYPTION_HELPER_USER1 . "/cache/foo/bar.txt";
|
2014-05-22 17:43:42 +04:00
|
|
|
$path3 = "/" . self::TEST_ENCRYPTION_HELPER_USER2 . "/thumbnails/foo";
|
2013-12-19 14:15:59 +04:00
|
|
|
$path4 ="/" . "/" . self::TEST_ENCRYPTION_HELPER_USER1;
|
|
|
|
|
2014-11-06 18:53:35 +03:00
|
|
|
self::loginHelper(self::TEST_ENCRYPTION_HELPER_USER1);
|
2014-05-22 17:43:42 +04:00
|
|
|
|
2013-12-19 14:15:59 +04:00
|
|
|
// if we are logged-in every path should return the currently logged-in user
|
|
|
|
$this->assertEquals(self::TEST_ENCRYPTION_HELPER_USER1, Encryption\Helper::getUser($path3));
|
|
|
|
|
|
|
|
// now log out
|
2014-11-06 18:53:35 +03:00
|
|
|
self::logoutHelper();
|
2013-12-19 14:15:59 +04:00
|
|
|
|
|
|
|
// now we should only get the user from /user/files and user/cache paths
|
|
|
|
$this->assertEquals(self::TEST_ENCRYPTION_HELPER_USER1, Encryption\Helper::getUser($path1));
|
|
|
|
$this->assertEquals(self::TEST_ENCRYPTION_HELPER_USER1, Encryption\Helper::getUser($path2));
|
|
|
|
|
|
|
|
$this->assertFalse(Encryption\Helper::getUser($path3));
|
|
|
|
$this->assertFalse(Encryption\Helper::getUser($path4));
|
|
|
|
|
|
|
|
// Log-in again
|
2014-11-06 18:53:35 +03:00
|
|
|
self::loginHelper(\Test_Encryption_Helper::TEST_ENCRYPTION_HELPER_USER1);
|
|
|
|
self::cleanUpUsers();
|
2013-12-19 14:15:59 +04:00
|
|
|
}
|
|
|
|
|
2014-09-17 20:50:29 +04:00
|
|
|
function userNamesProvider() {
|
|
|
|
return array(
|
2014-11-06 18:53:35 +03:00
|
|
|
array('testuser' . $this->getUniqueID()),
|
2014-09-17 20:50:29 +04:00
|
|
|
array('user.name.with.dots'),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Tests whether share keys can be found
|
|
|
|
*
|
|
|
|
* @dataProvider userNamesProvider
|
|
|
|
*/
|
|
|
|
function testFindShareKeys($userName) {
|
2014-11-06 18:53:35 +03:00
|
|
|
self::setUpUsers();
|
2014-09-17 20:50:29 +04:00
|
|
|
// note: not using dataProvider as we want to make
|
|
|
|
// sure that the correct keys are match and not any
|
|
|
|
// other ones that might happen to have similar names
|
2014-11-06 18:53:35 +03:00
|
|
|
self::setupHooks();
|
|
|
|
self::loginHelper($userName, true);
|
|
|
|
$testDir = 'testFindShareKeys' . $this->getUniqueID() . '/';
|
2014-09-17 20:50:29 +04:00
|
|
|
$baseDir = $userName . '/files/' . $testDir;
|
|
|
|
$fileList = array(
|
|
|
|
't est.txt',
|
|
|
|
't est_.txt',
|
|
|
|
't est.doc.txt',
|
|
|
|
't est(.*).txt', // make sure the regexp is escaped
|
|
|
|
'multiple.dots.can.happen.too.txt',
|
|
|
|
't est.' . $userName . '.txt',
|
|
|
|
't est_.' . $userName . '.shareKey.txt',
|
|
|
|
'who would upload their.shareKey',
|
|
|
|
'user ones file.txt',
|
|
|
|
'user ones file.txt.backup',
|
|
|
|
'.t est.txt'
|
|
|
|
);
|
|
|
|
|
|
|
|
$rootView = new \OC\Files\View('/');
|
|
|
|
$rootView->mkdir($baseDir);
|
|
|
|
foreach ($fileList as $fileName) {
|
|
|
|
$rootView->file_put_contents($baseDir . $fileName, 'dummy');
|
|
|
|
}
|
|
|
|
|
|
|
|
$shareKeysDir = $userName . '/files_encryption/share-keys/' . $testDir;
|
|
|
|
foreach ($fileList as $fileName) {
|
|
|
|
// make sure that every file only gets its correct respective keys
|
|
|
|
$result = Encryption\Helper::findShareKeys($baseDir . $fileName, $shareKeysDir . $fileName, $rootView);
|
|
|
|
$this->assertEquals(
|
|
|
|
array($shareKeysDir . $fileName . '.' . $userName . '.shareKey'),
|
|
|
|
$result
|
|
|
|
);
|
|
|
|
}
|
2014-11-06 18:53:35 +03:00
|
|
|
self::cleanUpUsers();
|
2014-09-17 20:50:29 +04:00
|
|
|
}
|
2013-11-15 19:49:50 +04:00
|
|
|
}
|