* @author Björn Schießle * @author Joas Schilling * @author Lukas Reschke * @author Morris Jobke * @author Robin Appelman * @author Roeland Jago Douma * * @license AGPL-3.0 * * This code is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License, version 3, * along with this program. If not, see * */ namespace OCA\FederatedFileSharing\Tests; use OC\Federation\CloudIdManager; use OCA\FederatedFileSharing\AddressHandler; use OCA\FederatedFileSharing\FederatedShareProvider; use OCA\FederatedFileSharing\Notifications; use OCA\FederatedFileSharing\TokenHandler; use OCP\Federation\ICloudFederationProviderManager; use OCP\Federation\ICloudIdManager; use OCP\Files\File; use OCP\Files\IRootFolder; use OCP\IConfig; use OCP\IDBConnection; use OCP\IL10N; use OCP\ILogger; use OCP\IUserManager; use OCP\Share\IManager; /** * Class FederatedShareProviderTest * * @package OCA\FederatedFileSharing\Tests * @group DB */ class FederatedShareProviderTest extends \Test\TestCase { /** @var IDBConnection */ protected $connection; /** @var AddressHandler | \PHPUnit_Framework_MockObject_MockObject */ protected $addressHandler; /** @var Notifications | \PHPUnit_Framework_MockObject_MockObject */ protected $notifications; /** @var TokenHandler|\PHPUnit_Framework_MockObject_MockObject */ protected $tokenHandler; /** @var IL10N */ protected $l; /** @var ILogger */ protected $logger; /** @var IRootFolder | \PHPUnit_Framework_MockObject_MockObject */ protected $rootFolder; /** @var IConfig | \PHPUnit_Framework_MockObject_MockObject */ protected $config; /** @var IUserManager | \PHPUnit_Framework_MockObject_MockObject */ protected $userManager; /** @var \OCP\GlobalScale\IConfig|\PHPUnit_Framework_MockObject_MockObject */ protected $gsConfig; /** @var IManager */ protected $shareManager; /** @var FederatedShareProvider */ protected $provider; /** @var ICloudIdManager */ private $cloudIdManager; /** @var \PHPUnit_Framework_MockObject_MockObject|ICloudFederationProviderManager */ private $cloudFederationProviderManager; protected function setUp(): void { parent::setUp(); $this->connection = \OC::$server->getDatabaseConnection(); $this->notifications = $this->getMockBuilder('OCA\FederatedFileSharing\Notifications') ->disableOriginalConstructor() ->getMock(); $this->tokenHandler = $this->getMockBuilder('OCA\FederatedFileSharing\TokenHandler') ->disableOriginalConstructor() ->getMock(); $this->l = $this->getMockBuilder(IL10N::class)->getMock(); $this->l->method('t') ->willReturnCallback(function($text, $parameters = []) { return vsprintf($text, $parameters); }); $this->logger = $this->getMockBuilder(ILogger::class)->getMock(); $this->rootFolder = $this->getMockBuilder('OCP\Files\IRootFolder')->getMock(); $this->config = $this->getMockBuilder(IConfig::class)->getMock(); $this->userManager = $this->getMockBuilder(IUserManager::class)->getMock(); //$this->addressHandler = new AddressHandler(\OC::$server->getURLGenerator(), $this->l); $this->addressHandler = $this->getMockBuilder('OCA\FederatedFileSharing\AddressHandler')->disableOriginalConstructor()->getMock(); $this->cloudIdManager = new CloudIdManager(); $this->gsConfig = $this->createMock(\OCP\GlobalScale\IConfig::class); $this->userManager->expects($this->any())->method('userExists')->willReturn(true); $this->cloudFederationProviderManager = $this->createMock(ICloudFederationProviderManager::class); $this->provider = new FederatedShareProvider( $this->connection, $this->addressHandler, $this->notifications, $this->tokenHandler, $this->l, $this->logger, $this->rootFolder, $this->config, $this->userManager, $this->cloudIdManager, $this->gsConfig, $this->cloudFederationProviderManager ); $this->shareManager = \OC::$server->getShareManager(); } protected function tearDown(): void { $this->connection->getQueryBuilder()->delete('share')->execute(); parent::tearDown(); } public function testCreate() { $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->addressHandler->expects($this->any())->method('generateRemoteURL') ->willReturn('http://localhost/'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturn(['user', 'server.com']); $this->notifications->expects($this->once()) ->method('sendRemoteShare') ->with( $this->equalTo('token'), $this->equalTo('user@server.com'), $this->equalTo('myFile'), $this->anything(), 'shareOwner', 'shareOwner@http://localhost/', 'sharedBy', 'sharedBy@http://localhost/' )->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $share = $this->provider->create($share); $qb = $this->connection->getQueryBuilder(); $stmt = $qb->select('*') ->from('share') ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId()))) ->execute(); $data = $stmt->fetch(); $stmt->closeCursor(); $expected = [ 'share_type' => \OCP\Share::SHARE_TYPE_REMOTE, 'share_with' => 'user@server.com', 'uid_owner' => 'shareOwner', 'uid_initiator' => 'sharedBy', 'item_type' => 'file', 'item_source' => 42, 'file_source' => 42, 'permissions' => 19, 'accepted' => 0, 'token' => 'token', ]; $this->assertArraySubset($expected, $data); $this->assertEquals($data['id'], $share->getId()); $this->assertEquals(\OCP\Share::SHARE_TYPE_REMOTE, $share->getShareType()); $this->assertEquals('user@server.com', $share->getSharedWith()); $this->assertEquals('sharedBy', $share->getSharedBy()); $this->assertEquals('shareOwner', $share->getShareOwner()); $this->assertEquals('file', $share->getNodeType()); $this->assertEquals(42, $share->getNodeId()); $this->assertEquals(19, $share->getPermissions()); $this->assertEquals('token', $share->getToken()); } public function testCreateCouldNotFindServer() { $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->addressHandler->expects($this->any())->method('generateRemoteURL') ->willReturn('http://localhost/'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturn(['user', 'server.com']); $this->notifications->expects($this->once()) ->method('sendRemoteShare') ->with( $this->equalTo('token'), $this->equalTo('user@server.com'), $this->equalTo('myFile'), $this->anything(), 'shareOwner', 'shareOwner@http://localhost/', 'sharedBy', 'sharedBy@http://localhost/' )->willReturn(false); $this->rootFolder->method('getById') ->with('42') ->willReturn([$node]); try { $share = $this->provider->create($share); $this->fail(); } catch (\Exception $e) { $this->assertEquals('Sharing myFile failed, could not find user@server.com, maybe the server is currently unreachable or uses a self-signed certificate.', $e->getMessage()); } $qb = $this->connection->getQueryBuilder(); $stmt = $qb->select('*') ->from('share') ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId()))) ->execute(); $data = $stmt->fetch(); $stmt->closeCursor(); $this->assertFalse($data); } public function testCreateException() { $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->addressHandler->expects($this->any())->method('generateRemoteURL') ->willReturn('http://localhost/'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturn(['user', 'server.com']); $this->notifications->expects($this->once()) ->method('sendRemoteShare') ->with( $this->equalTo('token'), $this->equalTo('user@server.com'), $this->equalTo('myFile'), $this->anything(), 'shareOwner', 'shareOwner@http://localhost/', 'sharedBy', 'sharedBy@http://localhost/' )->willThrowException(new \Exception('dummy')); $this->rootFolder->method('getById') ->with('42') ->willReturn([$node]); try { $share = $this->provider->create($share); $this->fail(); } catch (\Exception $e) { $this->assertEquals('Sharing myFile failed, could not find user@server.com, maybe the server is currently unreachable or uses a self-signed certificate.', $e->getMessage()); } $qb = $this->connection->getQueryBuilder(); $stmt = $qb->select('*') ->from('share') ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId()))) ->execute(); $data = $stmt->fetch(); $stmt->closeCursor(); $this->assertFalse($data); } public function testCreateShareWithSelf() { $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->addressHandler->expects($this->any())->method('compareAddresses') ->willReturn(true); $shareWith = 'sharedBy@localhost'; $share->setSharedWith($shareWith) ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setNode($node); $this->rootFolder->expects($this->never())->method($this->anything()); try { $share = $this->provider->create($share); $this->fail(); } catch (\Exception $e) { $this->assertEquals('Not allowed to create a federated share with the same user', $e->getMessage()); } $qb = $this->connection->getQueryBuilder(); $stmt = $qb->select('*') ->from('share') ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId()))) ->execute(); $data = $stmt->fetch(); $stmt->closeCursor(); $this->assertFalse($data); } public function testCreateAlreadyShared() { $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturn(['user', 'server.com']); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->addressHandler->expects($this->any())->method('generateRemoteURL') ->willReturn('http://localhost/'); $this->notifications->expects($this->once()) ->method('sendRemoteShare') ->with( $this->equalTo('token'), $this->equalTo('user@server.com'), $this->equalTo('myFile'), $this->anything(), 'shareOwner', 'shareOwner@http://localhost/', 'sharedBy', 'sharedBy@http://localhost/' )->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $this->provider->create($share); try { $this->provider->create($share); } catch (\Exception $e) { $this->assertEquals('Sharing myFile failed, because this item is already shared with user@server.com', $e->getMessage()); } } /** * @dataProvider datatTestUpdate * */ public function testUpdate($owner, $sharedBy) { $this->provider = $this->getMockBuilder('OCA\FederatedFileSharing\FederatedShareProvider') ->setConstructorArgs( [ $this->connection, $this->addressHandler, $this->notifications, $this->tokenHandler, $this->l, $this->logger, $this->rootFolder, $this->config, $this->userManager, $this->cloudIdManager, $this->gsConfig, $this->cloudFederationProviderManager ] )->setMethods(['sendPermissionUpdate'])->getMock(); $share = $this->shareManager->newShare(); $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturn(['user', 'server.com']); $share->setSharedWith('user@server.com') ->setSharedBy($sharedBy) ->setShareOwner($owner) ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->addressHandler->expects($this->any())->method('generateRemoteURL') ->willReturn('http://localhost/'); $this->notifications->expects($this->once()) ->method('sendRemoteShare') ->with( $this->equalTo('token'), $this->equalTo('user@server.com'), $this->equalTo('myFile'), $this->anything(), $owner, $owner . '@http://localhost/', $sharedBy, $sharedBy . '@http://localhost/' )->willReturn(true); if($owner === $sharedBy) { $this->provider->expects($this->never())->method('sendPermissionUpdate'); } else { $this->provider->expects($this->once())->method('sendPermissionUpdate'); } $this->rootFolder->expects($this->never())->method($this->anything()); $share = $this->provider->create($share); $share->setPermissions(1); $this->provider->update($share); $share = $this->provider->getShareById($share->getId()); $this->assertEquals(1, $share->getPermissions()); } public function datatTestUpdate() { return [ ['sharedBy', 'shareOwner'], ['shareOwner', 'shareOwner'] ]; } public function testGetSharedBy() { $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->addressHandler->expects($this->at(0))->method('splitUserRemote') ->willReturn(['user', 'server.com']); $this->addressHandler->expects($this->at(1))->method('splitUserRemote') ->willReturn(['user2', 'server.com']); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->notifications ->method('sendRemoteShare') ->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $share = $this->shareManager->newShare(); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('user2@server.com') ->setSharedBy('sharedBy2') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share2); $shares = $this->provider->getSharesBy('sharedBy', \OCP\Share::SHARE_TYPE_REMOTE, null, false, -1, 0); $this->assertCount(1, $shares); $this->assertEquals('user@server.com', $shares[0]->getSharedWith()); $this->assertEquals('sharedBy', $shares[0]->getSharedBy()); } public function testGetSharedByWithNode() { $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->notifications ->method('sendRemoteShare') ->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $share = $this->shareManager->newShare(); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share); $node2 = $this->getMockBuilder(File::class)->getMock(); $node2->method('getId')->willReturn(43); $node2->method('getName')->willReturn('myOtherFile'); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node2); $this->provider->create($share2); $shares = $this->provider->getSharesBy('sharedBy', \OCP\Share::SHARE_TYPE_REMOTE, $node2, false, -1, 0); $this->assertCount(1, $shares); $this->assertEquals(43, $shares[0]->getNodeId()); } public function testGetSharedByWithReshares() { $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->notifications ->method('sendRemoteShare') ->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $share = $this->shareManager->newShare(); $share->setSharedWith('user@server.com') ->setSharedBy('shareOwner') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('user2@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share2); $shares = $this->provider->getSharesBy('shareOwner', \OCP\Share::SHARE_TYPE_REMOTE, null, true, -1, 0); $this->assertCount(2, $shares); } public function testGetSharedByWithLimit() { $node = $this->getMockBuilder(File::class)->getMock(); $node->method('getId')->willReturn(42); $node->method('getName')->willReturn('myFile'); $this->addressHandler->expects($this->any())->method('splitUserRemote') ->willReturnCallback(function ($uid) { if ($uid === 'user@server.com') { return ['user', 'server.com']; } return ['user2', 'server.com']; }); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->notifications ->method('sendRemoteShare') ->willReturn(true); $this->rootFolder->expects($this->never())->method($this->anything()); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $share = $this->shareManager->newShare(); $share->setSharedWith('user@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('user2@server.com') ->setSharedBy('sharedBy') ->setShareOwner('shareOwner') ->setPermissions(19) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($node); $this->provider->create($share2); $shares = $this->provider->getSharesBy('shareOwner', \OCP\Share::SHARE_TYPE_REMOTE, null, true, 1, 1); $this->assertCount(1, $shares); $this->assertEquals('user2@server.com', $shares[0]->getSharedWith()); } public function dataDeleteUser() { return [ ['a', 'b', 'c', 'a', true], ['a', 'b', 'c', 'b', false], // The recipient is non local. ['a', 'b', 'c', 'c', false], ['a', 'b', 'c', 'd', false], ]; } /** * @dataProvider dataDeleteUser * * @param string $owner The owner of the share (uid) * @param string $initiator The initiator of the share (uid) * @param string $recipient The recipient of the share (uid/gid/pass) * @param string $deletedUser The user that is deleted * @param bool $rowDeleted Is the row deleted in this setup */ public function testDeleteUser($owner, $initiator, $recipient, $deletedUser, $rowDeleted) { $qb = $this->connection->getQueryBuilder(); $qb->insert('share') ->setValue('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_REMOTE)) ->setValue('uid_owner', $qb->createNamedParameter($owner)) ->setValue('uid_initiator', $qb->createNamedParameter($initiator)) ->setValue('share_with', $qb->createNamedParameter($recipient)) ->setValue('item_type', $qb->createNamedParameter('file')) ->setValue('item_source', $qb->createNamedParameter(42)) ->setValue('file_source', $qb->createNamedParameter(42)) ->execute(); $id = $qb->getLastInsertId(); $this->provider->userDeleted($deletedUser, \OCP\Share::SHARE_TYPE_REMOTE); $qb = $this->connection->getQueryBuilder(); $qb->select('*') ->from('share') ->where( $qb->expr()->eq('id', $qb->createNamedParameter($id)) ); $cursor = $qb->execute(); $data = $cursor->fetchAll(); $cursor->closeCursor(); $this->assertCount($rowDeleted ? 0 : 1, $data); } /** * @dataProvider dataTestIsOutgoingServer2serverShareEnabled * * @param string $isEnabled * @param bool $expected */ public function testIsOutgoingServer2serverShareEnabled($internalOnly, $isEnabled, $expected) { $this->gsConfig->expects($this->once())->method('onlyInternalFederation') ->willReturn($internalOnly); $this->config->expects($this->any())->method('getAppValue') ->with('files_sharing', 'outgoing_server2server_share_enabled', 'yes') ->willReturn($isEnabled); $this->assertSame($expected, $this->provider->isOutgoingServer2serverShareEnabled() ); } public function dataTestIsOutgoingServer2serverShareEnabled() { return [ [false, 'yes', true], [false, 'no', false], [true, 'yes', false], [true, 'no', false], ]; } /** * @dataProvider dataTestIsIncomingServer2serverShareEnabled * * @param string $isEnabled * @param bool $expected */ public function testIsIncomingServer2serverShareEnabled($onlyInternal, $isEnabled, $expected) { $this->gsConfig->expects($this->once())->method('onlyInternalFederation') ->willReturn($onlyInternal); $this->config->expects($this->any())->method('getAppValue') ->with('files_sharing', 'incoming_server2server_share_enabled', 'yes') ->willReturn($isEnabled); $this->assertSame($expected, $this->provider->isIncomingServer2serverShareEnabled() ); } public function dataTestIsIncomingServer2serverShareEnabled() { return [ [false, 'yes', true], [false, 'no', false], [true, 'yes', false], [true, 'no', false], ]; } /** * @dataProvider dataTestIsLookupServerQueriesEnabled * * @param string $isEnabled * @param bool $expected */ public function testIsLookupServerQueriesEnabled($gsEnabled, $isEnabled, $expected) { $this->gsConfig->expects($this->once())->method('isGlobalScaleEnabled') ->willReturn($gsEnabled); $this->config->expects($this->any())->method('getAppValue') ->with('files_sharing', 'lookupServerEnabled', 'yes') ->willReturn($isEnabled); $this->assertSame($expected, $this->provider->isLookupServerQueriesEnabled() ); } public function dataTestIsLookupServerQueriesEnabled() { return [ [false, 'yes', true], [false, 'no', false], [true, 'yes', true], [true, 'no', true], ]; } /** * @dataProvider dataTestIsLookupServerUploadEnabled * * @param string $isEnabled * @param bool $expected */ public function testIsLookupServerUploadEnabled($gsEnabled, $isEnabled, $expected) { $this->gsConfig->expects($this->once())->method('isGlobalScaleEnabled') ->willReturn($gsEnabled); $this->config->expects($this->any())->method('getAppValue') ->with('files_sharing', 'lookupServerUploadEnabled', 'yes') ->willReturn($isEnabled); $this->assertSame($expected, $this->provider->isLookupServerUploadEnabled() ); } public function dataTestIsLookupServerUploadEnabled() { return [ [false, 'yes', true], [false, 'no', false], [true, 'yes', false], [true, 'no', false], ]; } public function testGetSharesInFolder() { $userManager = \OC::$server->getUserManager(); $rootFolder = \OC::$server->getRootFolder(); $u1 = $userManager->createUser('testFed', md5(time())); $u2 = $userManager->createUser('testFed2', md5(time())); $folder1 = $rootFolder->getUserFolder($u1->getUID())->newFolder('foo'); $file1 = $folder1->newFile('bar1'); $file2 = $folder1->newFile('bar2'); $this->tokenHandler->method('generateToken')->willReturn('token'); $this->notifications ->method('sendRemoteShare') ->willReturn(true); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $share1 = $this->shareManager->newShare(); $share1->setSharedWith('user@server.com') ->setSharedBy($u1->getUID()) ->setShareOwner($u1->getUID()) ->setPermissions(\OCP\Constants::PERMISSION_READ) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($file1); $this->provider->create($share1); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('user@server.com') ->setSharedBy($u2->getUID()) ->setShareOwner($u1->getUID()) ->setPermissions(\OCP\Constants::PERMISSION_READ) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($file2); $this->provider->create($share2); $result = $this->provider->getSharesInFolder($u1->getUID(), $folder1, false); $this->assertCount(1, $result); $this->assertCount(1, $result[$file1->getId()]); $result = $this->provider->getSharesInFolder($u1->getUID(), $folder1, true); $this->assertCount(2, $result); $this->assertCount(1, $result[$file1->getId()]); $this->assertCount(1, $result[$file2->getId()]); $u1->delete(); $u2->delete(); } public function testGetAccessList() { $userManager = \OC::$server->getUserManager(); $rootFolder = \OC::$server->getRootFolder(); $u1 = $userManager->createUser('testFed', md5(time())); $folder1 = $rootFolder->getUserFolder($u1->getUID())->newFolder('foo'); $file1 = $folder1->newFile('bar1'); $this->tokenHandler->expects($this->exactly(2)) ->method('generateToken') ->willReturnOnConsecutiveCalls('token1', 'token2'); $this->notifications->expects($this->atLeastOnce()) ->method('sendRemoteShare') ->willReturn(true); $result = $this->provider->getAccessList([$file1], true); $this->assertEquals(['remote' => []], $result); $result = $this->provider->getAccessList([$file1], false); $this->assertEquals(['remote' => false], $result); $this->addressHandler->method('generateRemoteURL') ->willReturn('remoteurl.com'); $share1 = $this->shareManager->newShare(); $share1->setSharedWith('user@server.com') ->setSharedBy($u1->getUID()) ->setShareOwner($u1->getUID()) ->setPermissions(\OCP\Constants::PERMISSION_READ) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($file1); $this->provider->create($share1); $share2 = $this->shareManager->newShare(); $share2->setSharedWith('foobar@localhost') ->setSharedBy($u1->getUID()) ->setShareOwner($u1->getUID()) ->setPermissions(\OCP\Constants::PERMISSION_READ) ->setShareType(\OCP\Share::SHARE_TYPE_REMOTE) ->setNode($file1); $this->provider->create($share2); $result = $this->provider->getAccessList([$file1], true); $this->assertEquals(['remote' => [ 'user@server.com' => [ 'token' => 'token1', 'node_id' => $file1->getId(), ], 'foobar@localhost' => [ 'token' => 'token2', 'node_id' => $file1->getId(), ], ]], $result); $result = $this->provider->getAccessList([$file1], false); $this->assertEquals(['remote' => true], $result); $u1->delete(); } }