890 lines
27 KiB
PHP
890 lines
27 KiB
PHP
<?php
|
|
/**
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
*
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
* @author Robin Appelman <robin@icewind.nl>
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
*
|
|
* @license AGPL-3.0
|
|
*
|
|
* This code is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
* as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*
|
|
*/
|
|
namespace OCA\FederatedFileSharing\Tests;
|
|
|
|
|
|
use OC\Federation\CloudIdManager;
|
|
use OCA\FederatedFileSharing\AddressHandler;
|
|
use OCA\FederatedFileSharing\FederatedShareProvider;
|
|
use OCA\FederatedFileSharing\Notifications;
|
|
use OCA\FederatedFileSharing\TokenHandler;
|
|
use OCP\Federation\ICloudIdManager;
|
|
use OCP\Files\IRootFolder;
|
|
use OCP\IConfig;
|
|
use OCP\IDBConnection;
|
|
use OCP\IL10N;
|
|
use OCP\ILogger;
|
|
use OCP\IUserManager;
|
|
use OCP\Share\IManager;
|
|
|
|
/**
|
|
* Class FederatedShareProviderTest
|
|
*
|
|
* @package OCA\FederatedFileSharing\Tests
|
|
* @group DB
|
|
*/
|
|
class FederatedShareProviderTest extends \Test\TestCase {
|
|
|
|
/** @var IDBConnection */
|
|
protected $connection;
|
|
/** @var AddressHandler | \PHPUnit_Framework_MockObject_MockObject */
|
|
protected $addressHandler;
|
|
/** @var Notifications | \PHPUnit_Framework_MockObject_MockObject */
|
|
protected $notifications;
|
|
/** @var TokenHandler|\PHPUnit_Framework_MockObject_MockObject */
|
|
protected $tokenHandler;
|
|
/** @var IL10N */
|
|
protected $l;
|
|
/** @var ILogger */
|
|
protected $logger;
|
|
/** @var IRootFolder | \PHPUnit_Framework_MockObject_MockObject */
|
|
protected $rootFolder;
|
|
/** @var IConfig | \PHPUnit_Framework_MockObject_MockObject */
|
|
protected $config;
|
|
/** @var IUserManager | \PHPUnit_Framework_MockObject_MockObject */
|
|
protected $userManager;
|
|
/** @var \OCP\GlobalScale\IConfig|\PHPUnit_Framework_MockObject_MockObject */
|
|
protected $gsConfig;
|
|
|
|
/** @var IManager */
|
|
protected $shareManager;
|
|
/** @var FederatedShareProvider */
|
|
protected $provider;
|
|
|
|
/** @var ICloudIdManager */
|
|
private $cloudIdManager;
|
|
|
|
|
|
public function setUp() {
|
|
parent::setUp();
|
|
|
|
$this->connection = \OC::$server->getDatabaseConnection();
|
|
$this->notifications = $this->getMockBuilder('OCA\FederatedFileSharing\Notifications')
|
|
->disableOriginalConstructor()
|
|
->getMock();
|
|
$this->tokenHandler = $this->getMockBuilder('OCA\FederatedFileSharing\TokenHandler')
|
|
->disableOriginalConstructor()
|
|
->getMock();
|
|
$this->l = $this->getMockBuilder('OCP\IL10N')->getMock();
|
|
$this->l->method('t')
|
|
->will($this->returnCallback(function($text, $parameters = []) {
|
|
return vsprintf($text, $parameters);
|
|
}));
|
|
$this->logger = $this->getMockBuilder('OCP\ILogger')->getMock();
|
|
$this->rootFolder = $this->getMockBuilder('OCP\Files\IRootFolder')->getMock();
|
|
$this->config = $this->getMockBuilder('OCP\IConfig')->getMock();
|
|
$this->userManager = $this->getMockBuilder('OCP\IUserManager')->getMock();
|
|
//$this->addressHandler = new AddressHandler(\OC::$server->getURLGenerator(), $this->l);
|
|
$this->addressHandler = $this->getMockBuilder('OCA\FederatedFileSharing\AddressHandler')->disableOriginalConstructor()->getMock();
|
|
$this->cloudIdManager = new CloudIdManager();
|
|
$this->gsConfig = $this->createMock(\OCP\GlobalScale\IConfig::class);
|
|
|
|
$this->userManager->expects($this->any())->method('userExists')->willReturn(true);
|
|
|
|
$this->provider = new FederatedShareProvider(
|
|
$this->connection,
|
|
$this->addressHandler,
|
|
$this->notifications,
|
|
$this->tokenHandler,
|
|
$this->l,
|
|
$this->logger,
|
|
$this->rootFolder,
|
|
$this->config,
|
|
$this->userManager,
|
|
$this->cloudIdManager,
|
|
$this->gsConfig
|
|
);
|
|
|
|
$this->shareManager = \OC::$server->getShareManager();
|
|
}
|
|
|
|
public function tearDown() {
|
|
$this->connection->getQueryBuilder()->delete('share')->execute();
|
|
|
|
return parent::tearDown();
|
|
}
|
|
|
|
public function testCreate() {
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
|
|
$this->addressHandler->expects($this->any())->method('generateRemoteURL')
|
|
->willReturn('http://localhost/');
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$this->notifications->expects($this->once())
|
|
->method('sendRemoteShare')
|
|
->with(
|
|
$this->equalTo('token'),
|
|
$this->equalTo('user@server.com'),
|
|
$this->equalTo('myFile'),
|
|
$this->anything(),
|
|
'shareOwner',
|
|
'shareOwner@http://localhost/',
|
|
'sharedBy',
|
|
'sharedBy@http://localhost/'
|
|
)->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->provider->create($share);
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$stmt = $qb->select('*')
|
|
->from('share')
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
|
|
->execute();
|
|
|
|
$data = $stmt->fetch();
|
|
$stmt->closeCursor();
|
|
|
|
$expected = [
|
|
'share_type' => \OCP\Share::SHARE_TYPE_REMOTE,
|
|
'share_with' => 'user@server.com',
|
|
'uid_owner' => 'shareOwner',
|
|
'uid_initiator' => 'sharedBy',
|
|
'item_type' => 'file',
|
|
'item_source' => 42,
|
|
'file_source' => 42,
|
|
'permissions' => 19,
|
|
'accepted' => 0,
|
|
'token' => 'token',
|
|
];
|
|
$this->assertArraySubset($expected, $data);
|
|
|
|
$this->assertEquals($data['id'], $share->getId());
|
|
$this->assertEquals(\OCP\Share::SHARE_TYPE_REMOTE, $share->getShareType());
|
|
$this->assertEquals('user@server.com', $share->getSharedWith());
|
|
$this->assertEquals('sharedBy', $share->getSharedBy());
|
|
$this->assertEquals('shareOwner', $share->getShareOwner());
|
|
$this->assertEquals('file', $share->getNodeType());
|
|
$this->assertEquals(42, $share->getNodeId());
|
|
$this->assertEquals(19, $share->getPermissions());
|
|
$this->assertEquals('token', $share->getToken());
|
|
}
|
|
|
|
public function testCreateCouldNotFindServer() {
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
|
|
$this->addressHandler->expects($this->any())->method('generateRemoteURL')
|
|
->willReturn('http://localhost/');
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$this->notifications->expects($this->once())
|
|
->method('sendRemoteShare')
|
|
->with(
|
|
$this->equalTo('token'),
|
|
$this->equalTo('user@server.com'),
|
|
$this->equalTo('myFile'),
|
|
$this->anything(),
|
|
'shareOwner',
|
|
'shareOwner@http://localhost/',
|
|
'sharedBy',
|
|
'sharedBy@http://localhost/'
|
|
)->willReturn(false);
|
|
|
|
$this->rootFolder->method('getById')
|
|
->with('42')
|
|
->willReturn([$node]);
|
|
|
|
try {
|
|
$share = $this->provider->create($share);
|
|
$this->fail();
|
|
} catch (\Exception $e) {
|
|
$this->assertEquals('Sharing myFile failed, could not find user@server.com, maybe the server is currently unreachable or uses a self-signed certificate.', $e->getMessage());
|
|
}
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$stmt = $qb->select('*')
|
|
->from('share')
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
|
|
->execute();
|
|
|
|
$data = $stmt->fetch();
|
|
$stmt->closeCursor();
|
|
|
|
$this->assertFalse($data);
|
|
}
|
|
|
|
public function testCreateException() {
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
|
|
$this->addressHandler->expects($this->any())->method('generateRemoteURL')
|
|
->willReturn('http://localhost/');
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$this->notifications->expects($this->once())
|
|
->method('sendRemoteShare')
|
|
->with(
|
|
$this->equalTo('token'),
|
|
$this->equalTo('user@server.com'),
|
|
$this->equalTo('myFile'),
|
|
$this->anything(),
|
|
'shareOwner',
|
|
'shareOwner@http://localhost/',
|
|
'sharedBy',
|
|
'sharedBy@http://localhost/'
|
|
)->willThrowException(new \Exception('dummy'));
|
|
|
|
$this->rootFolder->method('getById')
|
|
->with('42')
|
|
->willReturn([$node]);
|
|
|
|
try {
|
|
$share = $this->provider->create($share);
|
|
$this->fail();
|
|
} catch (\Exception $e) {
|
|
$this->assertEquals('Sharing myFile failed, could not find user@server.com, maybe the server is currently unreachable or uses a self-signed certificate.', $e->getMessage());
|
|
}
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$stmt = $qb->select('*')
|
|
->from('share')
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
|
|
->execute();
|
|
|
|
$data = $stmt->fetch();
|
|
$stmt->closeCursor();
|
|
|
|
$this->assertFalse($data);
|
|
}
|
|
|
|
public function testCreateShareWithSelf() {
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$this->addressHandler->expects($this->any())->method('compareAddresses')
|
|
->willReturn(true);
|
|
|
|
$shareWith = 'sharedBy@localhost';
|
|
|
|
$share->setSharedWith($shareWith)
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
try {
|
|
$share = $this->provider->create($share);
|
|
$this->fail();
|
|
} catch (\Exception $e) {
|
|
$this->assertEquals('Not allowed to create a federated share with the same user', $e->getMessage());
|
|
}
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$stmt = $qb->select('*')
|
|
->from('share')
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
|
|
->execute();
|
|
|
|
$data = $stmt->fetch();
|
|
$stmt->closeCursor();
|
|
|
|
$this->assertFalse($data);
|
|
}
|
|
|
|
public function testCreateAlreadyShared() {
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
|
|
$this->addressHandler->expects($this->any())->method('generateRemoteURL')
|
|
->willReturn('http://localhost/');
|
|
|
|
$this->notifications->expects($this->once())
|
|
->method('sendRemoteShare')
|
|
->with(
|
|
$this->equalTo('token'),
|
|
$this->equalTo('user@server.com'),
|
|
$this->equalTo('myFile'),
|
|
$this->anything(),
|
|
'shareOwner',
|
|
'shareOwner@http://localhost/',
|
|
'sharedBy',
|
|
'sharedBy@http://localhost/'
|
|
)->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$this->provider->create($share);
|
|
|
|
try {
|
|
$this->provider->create($share);
|
|
} catch (\Exception $e) {
|
|
$this->assertEquals('Sharing myFile failed, because this item is already shared with user@server.com', $e->getMessage());
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @dataProvider datatTestUpdate
|
|
*
|
|
*/
|
|
public function testUpdate($owner, $sharedBy) {
|
|
|
|
$this->provider = $this->getMockBuilder('OCA\FederatedFileSharing\FederatedShareProvider')
|
|
->setConstructorArgs(
|
|
[
|
|
$this->connection,
|
|
$this->addressHandler,
|
|
$this->notifications,
|
|
$this->tokenHandler,
|
|
$this->l,
|
|
$this->logger,
|
|
$this->rootFolder,
|
|
$this->config,
|
|
$this->userManager,
|
|
$this->cloudIdManager,
|
|
$this->gsConfig
|
|
]
|
|
)->setMethods(['sendPermissionUpdate'])->getMock();
|
|
|
|
$share = $this->shareManager->newShare();
|
|
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy($sharedBy)
|
|
->setShareOwner($owner)
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->addressHandler->expects($this->any())->method('generateRemoteURL')
|
|
->willReturn('http://localhost/');
|
|
|
|
$this->notifications->expects($this->once())
|
|
->method('sendRemoteShare')
|
|
->with(
|
|
$this->equalTo('token'),
|
|
$this->equalTo('user@server.com'),
|
|
$this->equalTo('myFile'),
|
|
$this->anything(),
|
|
$owner,
|
|
$owner . '@http://localhost/',
|
|
$sharedBy,
|
|
$sharedBy . '@http://localhost/'
|
|
)->willReturn(true);
|
|
|
|
if($owner === $sharedBy) {
|
|
$this->provider->expects($this->never())->method('sendPermissionUpdate');
|
|
} else {
|
|
$this->provider->expects($this->once())->method('sendPermissionUpdate');
|
|
}
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->provider->create($share);
|
|
|
|
$share->setPermissions(1);
|
|
$this->provider->update($share);
|
|
|
|
$share = $this->provider->getShareById($share->getId());
|
|
|
|
$this->assertEquals(1, $share->getPermissions());
|
|
}
|
|
|
|
public function datatTestUpdate() {
|
|
return [
|
|
['sharedBy', 'shareOwner'],
|
|
['shareOwner', 'shareOwner']
|
|
];
|
|
}
|
|
|
|
public function testGetSharedBy() {
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$this->addressHandler->expects($this->at(0))->method('splitUserRemote')
|
|
->willReturn(['user', 'server.com']);
|
|
|
|
$this->addressHandler->expects($this->at(1))->method('splitUserRemote')
|
|
->willReturn(['user2', 'server.com']);
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->notifications
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->shareManager->newShare();
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share);
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('user2@server.com')
|
|
->setSharedBy('sharedBy2')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share2);
|
|
|
|
$shares = $this->provider->getSharesBy('sharedBy', \OCP\Share::SHARE_TYPE_REMOTE, null, false, -1, 0);
|
|
|
|
$this->assertCount(1, $shares);
|
|
$this->assertEquals('user@server.com', $shares[0]->getSharedWith());
|
|
$this->assertEquals('sharedBy', $shares[0]->getSharedBy());
|
|
}
|
|
|
|
public function testGetSharedByWithNode() {
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->notifications
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->shareManager->newShare();
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share);
|
|
|
|
$node2 = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node2->method('getId')->willReturn(43);
|
|
$node2->method('getName')->willReturn('myOtherFile');
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node2);
|
|
$this->provider->create($share2);
|
|
|
|
$shares = $this->provider->getSharesBy('sharedBy', \OCP\Share::SHARE_TYPE_REMOTE, $node2, false, -1, 0);
|
|
|
|
$this->assertCount(1, $shares);
|
|
$this->assertEquals(43, $shares[0]->getNodeId());
|
|
}
|
|
|
|
public function testGetSharedByWithReshares() {
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->notifications
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->shareManager->newShare();
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('shareOwner')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share);
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('user2@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share2);
|
|
|
|
$shares = $this->provider->getSharesBy('shareOwner', \OCP\Share::SHARE_TYPE_REMOTE, null, true, -1, 0);
|
|
|
|
$this->assertCount(2, $shares);
|
|
}
|
|
|
|
public function testGetSharedByWithLimit() {
|
|
$node = $this->getMockBuilder('\OCP\Files\File')->getMock();
|
|
$node->method('getId')->willReturn(42);
|
|
$node->method('getName')->willReturn('myFile');
|
|
|
|
$this->addressHandler->expects($this->any())->method('splitUserRemote')
|
|
->willReturnCallback(function ($uid) {
|
|
if ($uid === 'user@server.com') {
|
|
return ['user', 'server.com'];
|
|
}
|
|
return ['user2', 'server.com'];
|
|
});
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->notifications
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$this->rootFolder->expects($this->never())->method($this->anything());
|
|
|
|
$share = $this->shareManager->newShare();
|
|
$share->setSharedWith('user@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share);
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('user2@server.com')
|
|
->setSharedBy('sharedBy')
|
|
->setShareOwner('shareOwner')
|
|
->setPermissions(19)
|
|
->setNode($node);
|
|
$this->provider->create($share2);
|
|
|
|
$shares = $this->provider->getSharesBy('shareOwner', \OCP\Share::SHARE_TYPE_REMOTE, null, true, 1, 1);
|
|
|
|
$this->assertCount(1, $shares);
|
|
$this->assertEquals('user2@server.com', $shares[0]->getSharedWith());
|
|
}
|
|
|
|
public function dataDeleteUser() {
|
|
return [
|
|
['a', 'b', 'c', 'a', true],
|
|
['a', 'b', 'c', 'b', false],
|
|
// The recipient is non local.
|
|
['a', 'b', 'c', 'c', false],
|
|
['a', 'b', 'c', 'd', false],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @dataProvider dataDeleteUser
|
|
*
|
|
* @param string $owner The owner of the share (uid)
|
|
* @param string $initiator The initiator of the share (uid)
|
|
* @param string $recipient The recipient of the share (uid/gid/pass)
|
|
* @param string $deletedUser The user that is deleted
|
|
* @param bool $rowDeleted Is the row deleted in this setup
|
|
*/
|
|
public function testDeleteUser($owner, $initiator, $recipient, $deletedUser, $rowDeleted) {
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$qb->insert('share')
|
|
->setValue('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_REMOTE))
|
|
->setValue('uid_owner', $qb->createNamedParameter($owner))
|
|
->setValue('uid_initiator', $qb->createNamedParameter($initiator))
|
|
->setValue('share_with', $qb->createNamedParameter($recipient))
|
|
->setValue('item_type', $qb->createNamedParameter('file'))
|
|
->setValue('item_source', $qb->createNamedParameter(42))
|
|
->setValue('file_source', $qb->createNamedParameter(42))
|
|
->execute();
|
|
|
|
$id = $qb->getLastInsertId();
|
|
|
|
$this->provider->userDeleted($deletedUser, \OCP\Share::SHARE_TYPE_REMOTE);
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
$qb->select('*')
|
|
->from('share')
|
|
->where(
|
|
$qb->expr()->eq('id', $qb->createNamedParameter($id))
|
|
);
|
|
$cursor = $qb->execute();
|
|
$data = $cursor->fetchAll();
|
|
$cursor->closeCursor();
|
|
|
|
$this->assertCount($rowDeleted ? 0 : 1, $data);
|
|
}
|
|
|
|
/**
|
|
* @dataProvider dataTestIsOutgoingServer2serverShareEnabled
|
|
*
|
|
* @param string $isEnabled
|
|
* @param bool $expected
|
|
*/
|
|
public function testIsOutgoingServer2serverShareEnabled($internalOnly, $isEnabled, $expected) {
|
|
$this->gsConfig->expects($this->once())->method('onlyInternalFederation')
|
|
->willReturn($internalOnly);
|
|
$this->config->expects($this->any())->method('getAppValue')
|
|
->with('files_sharing', 'outgoing_server2server_share_enabled', 'yes')
|
|
->willReturn($isEnabled);
|
|
|
|
$this->assertSame($expected,
|
|
$this->provider->isOutgoingServer2serverShareEnabled()
|
|
);
|
|
}
|
|
|
|
public function dataTestIsOutgoingServer2serverShareEnabled() {
|
|
return [
|
|
[false, 'yes', true],
|
|
[false, 'no', false],
|
|
[true, 'yes', false],
|
|
[true, 'no', false],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @dataProvider dataTestIsIncomingServer2serverShareEnabled
|
|
*
|
|
* @param string $isEnabled
|
|
* @param bool $expected
|
|
*/
|
|
public function testIsIncomingServer2serverShareEnabled($onlyInternal, $isEnabled, $expected) {
|
|
$this->gsConfig->expects($this->once())->method('onlyInternalFederation')
|
|
->willReturn($onlyInternal);
|
|
$this->config->expects($this->any())->method('getAppValue')
|
|
->with('files_sharing', 'incoming_server2server_share_enabled', 'yes')
|
|
->willReturn($isEnabled);
|
|
|
|
$this->assertSame($expected,
|
|
$this->provider->isIncomingServer2serverShareEnabled()
|
|
);
|
|
}
|
|
|
|
public function dataTestIsIncomingServer2serverShareEnabled() {
|
|
return [
|
|
[false, 'yes', true],
|
|
[false, 'no', false],
|
|
[true, 'yes', false],
|
|
[true, 'no', false],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @dataProvider dataTestIsLookupServerQueriesEnabled
|
|
*
|
|
* @param string $isEnabled
|
|
* @param bool $expected
|
|
*/
|
|
public function testIsLookupServerQueriesEnabled($gsEnabled, $isEnabled, $expected) {
|
|
$this->gsConfig->expects($this->once())->method('isGlobalScaleEnabled')
|
|
->willReturn($gsEnabled);
|
|
$this->config->expects($this->any())->method('getAppValue')
|
|
->with('files_sharing', 'lookupServerEnabled', 'no')
|
|
->willReturn($isEnabled);
|
|
|
|
$this->assertSame($expected,
|
|
$this->provider->isLookupServerQueriesEnabled()
|
|
);
|
|
}
|
|
|
|
|
|
public function dataTestIsLookupServerQueriesEnabled() {
|
|
return [
|
|
[false, 'yes', true],
|
|
[false, 'no', false],
|
|
[true, 'yes', true],
|
|
[true, 'no', true],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @dataProvider dataTestIsLookupServerUploadEnabled
|
|
*
|
|
* @param string $isEnabled
|
|
* @param bool $expected
|
|
*/
|
|
public function testIsLookupServerUploadEnabled($gsEnabled, $isEnabled, $expected) {
|
|
$this->gsConfig->expects($this->once())->method('isGlobalScaleEnabled')
|
|
->willReturn($gsEnabled);
|
|
$this->config->expects($this->any())->method('getAppValue')
|
|
->with('files_sharing', 'lookupServerUploadEnabled', 'yes')
|
|
->willReturn($isEnabled);
|
|
|
|
$this->assertSame($expected,
|
|
$this->provider->isLookupServerUploadEnabled()
|
|
);
|
|
}
|
|
|
|
public function dataTestIsLookupServerUploadEnabled() {
|
|
return [
|
|
[false, 'yes', true],
|
|
[false, 'no', false],
|
|
[true, 'yes', false],
|
|
[true, 'no', false],
|
|
];
|
|
}
|
|
|
|
public function testGetSharesInFolder() {
|
|
$userManager = \OC::$server->getUserManager();
|
|
$rootFolder = \OC::$server->getRootFolder();
|
|
|
|
$u1 = $userManager->createUser('testFed', md5(time()));
|
|
$u2 = $userManager->createUser('testFed2', md5(time()));
|
|
|
|
$folder1 = $rootFolder->getUserFolder($u1->getUID())->newFolder('foo');
|
|
$file1 = $folder1->newFile('bar1');
|
|
$file2 = $folder1->newFile('bar2');
|
|
|
|
$this->tokenHandler->method('generateToken')->willReturn('token');
|
|
$this->notifications
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$share1 = $this->shareManager->newShare();
|
|
$share1->setSharedWith('user@server.com')
|
|
->setSharedBy($u1->getUID())
|
|
->setShareOwner($u1->getUID())
|
|
->setPermissions(\OCP\Constants::PERMISSION_READ)
|
|
->setNode($file1);
|
|
$this->provider->create($share1);
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('user@server.com')
|
|
->setSharedBy($u2->getUID())
|
|
->setShareOwner($u1->getUID())
|
|
->setPermissions(\OCP\Constants::PERMISSION_READ)
|
|
->setNode($file2);
|
|
$this->provider->create($share2);
|
|
|
|
$result = $this->provider->getSharesInFolder($u1->getUID(), $folder1, false);
|
|
$this->assertCount(1, $result);
|
|
$this->assertCount(1, $result[$file1->getId()]);
|
|
|
|
$result = $this->provider->getSharesInFolder($u1->getUID(), $folder1, true);
|
|
$this->assertCount(2, $result);
|
|
$this->assertCount(1, $result[$file1->getId()]);
|
|
$this->assertCount(1, $result[$file2->getId()]);
|
|
|
|
$u1->delete();
|
|
$u2->delete();
|
|
}
|
|
|
|
public function testGetAccessList() {
|
|
$userManager = \OC::$server->getUserManager();
|
|
$rootFolder = \OC::$server->getRootFolder();
|
|
|
|
$u1 = $userManager->createUser('testFed', md5(time()));
|
|
|
|
$folder1 = $rootFolder->getUserFolder($u1->getUID())->newFolder('foo');
|
|
$file1 = $folder1->newFile('bar1');
|
|
|
|
$this->tokenHandler->expects($this->exactly(2))
|
|
->method('generateToken')
|
|
->willReturnOnConsecutiveCalls('token1', 'token2');
|
|
$this->notifications->expects($this->atLeastOnce())
|
|
->method('sendRemoteShare')
|
|
->willReturn(true);
|
|
|
|
$result = $this->provider->getAccessList([$file1], true);
|
|
$this->assertEquals(['remote' => []], $result);
|
|
|
|
$result = $this->provider->getAccessList([$file1], false);
|
|
$this->assertEquals(['remote' => false], $result);
|
|
|
|
$share1 = $this->shareManager->newShare();
|
|
$share1->setSharedWith('user@server.com')
|
|
->setSharedBy($u1->getUID())
|
|
->setShareOwner($u1->getUID())
|
|
->setPermissions(\OCP\Constants::PERMISSION_READ)
|
|
->setNode($file1);
|
|
$this->provider->create($share1);
|
|
|
|
$share2 = $this->shareManager->newShare();
|
|
$share2->setSharedWith('foobar@localhost')
|
|
->setSharedBy($u1->getUID())
|
|
->setShareOwner($u1->getUID())
|
|
->setPermissions(\OCP\Constants::PERMISSION_READ)
|
|
->setNode($file1);
|
|
$this->provider->create($share2);
|
|
|
|
$result = $this->provider->getAccessList([$file1], true);
|
|
$this->assertEquals(['remote' => [
|
|
'user@server.com' => [
|
|
'token' => 'token1',
|
|
'node_id' => $file1->getId(),
|
|
],
|
|
'foobar@localhost' => [
|
|
'token' => 'token2',
|
|
'node_id' => $file1->getId(),
|
|
],
|
|
]], $result);
|
|
|
|
$result = $this->provider->getAccessList([$file1], false);
|
|
$this->assertEquals(['remote' => true], $result);
|
|
|
|
$u1->delete();
|
|
}
|
|
}
|