mirror of
https://github.com/nextcloud/server.git
synced 2026-03-08 17:30:52 -04:00
support for primary groups actually the problem is only known on AD, it is only needed to take care of their attributes adjust to ADs special behaviour this change was not intended cache the SID value so it is not requested over and over again theres only one, use singular we are access add tests for new Access methods add tests for new Group methods address scrutinizer findings, mostly doc call ldap_explode_dn from ldap wrapper, enables tests without php5-ldap PHP Doc yo dawg, i heard you like backslashes … php doc fix PHPDoc updated and typos fixed while reviewing
130 lines
4 KiB
PHP
130 lines
4 KiB
PHP
<?php
|
|
/**
|
|
* ownCloud
|
|
*
|
|
* @author Arthur Schiwon
|
|
* @copyright 2013 Arthur Schiwon blizzz@owncloud.com
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
* License as published by the Free Software Foundation; either
|
|
* version 3 of the License, or any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
namespace OCA\user_ldap\tests;
|
|
|
|
use \OCA\user_ldap\lib\Access;
|
|
use \OCA\user_ldap\lib\Connection;
|
|
use \OCA\user_ldap\lib\ILDAPWrapper;
|
|
|
|
class Test_Access extends \PHPUnit_Framework_TestCase {
|
|
private function getConnecterAndLdapMock() {
|
|
static $conMethods;
|
|
static $accMethods;
|
|
static $umMethods;
|
|
|
|
if(is_null($conMethods) || is_null($accMethods)) {
|
|
$conMethods = get_class_methods('\OCA\user_ldap\lib\Connection');
|
|
$accMethods = get_class_methods('\OCA\user_ldap\lib\Access');
|
|
$umMethods = get_class_methods('\OCA\user_ldap\lib\user\Manager');
|
|
}
|
|
$lw = $this->getMock('\OCA\user_ldap\lib\ILDAPWrapper');
|
|
$connector = $this->getMock('\OCA\user_ldap\lib\Connection',
|
|
$conMethods,
|
|
array($lw, null, null));
|
|
$um = $this->getMock('\OCA\user_ldap\lib\user\Manager',
|
|
$umMethods, array(
|
|
$this->getMock('\OCP\IConfig'),
|
|
$this->getMock('\OCA\user_ldap\lib\FilesystemHelper'),
|
|
$this->getMock('\OCA\user_ldap\lib\LogWrapper'),
|
|
$this->getMock('\OCP\IAvatarManager'),
|
|
$this->getMock('\OCP\Image')));
|
|
|
|
return array($lw, $connector, $um);
|
|
}
|
|
|
|
public function testEscapeFilterPartValidChars() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$input = 'okay';
|
|
$this->assertTrue($input === $access->escapeFilterPart($input));
|
|
}
|
|
|
|
public function testEscapeFilterPartEscapeWildcard() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$input = '*';
|
|
$expected = '\\\\*';
|
|
$this->assertTrue($expected === $access->escapeFilterPart($input));
|
|
}
|
|
|
|
public function testEscapeFilterPartEscapeWildcard2() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$input = 'foo*bar';
|
|
$expected = 'foo\\\\*bar';
|
|
$this->assertTrue($expected === $access->escapeFilterPart($input));
|
|
}
|
|
|
|
public function testConvertSID2StrSuccess() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$sidBinary = file_get_contents(__DIR__ . '/data/sid.dat');
|
|
$sidExpected = 'S-1-5-21-249921958-728525901-1594176202';
|
|
|
|
$this->assertSame($sidExpected, $access->convertSID2Str($sidBinary));
|
|
}
|
|
|
|
public function testConvertSID2StrInputError() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$sidIllegal = 'foobar';
|
|
$sidExpected = '';
|
|
|
|
$this->assertSame($sidExpected, $access->convertSID2Str($sidIllegal));
|
|
}
|
|
|
|
public function testGetDomainDNFromDNSuccess() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$inputDN = 'uid=zaphod,cn=foobar,dc=my,dc=server,dc=com';
|
|
$domainDN = 'dc=my,dc=server,dc=com';
|
|
|
|
$lw->expects($this->once())
|
|
->method('explodeDN')
|
|
->with($inputDN, 0)
|
|
->will($this->returnValue(explode(',', $inputDN)));
|
|
|
|
$this->assertSame($domainDN, $access->getDomainDNFromDN($inputDN));
|
|
}
|
|
|
|
public function testGetDomainDNFromDNError() {
|
|
list($lw, $con, $um) = $this->getConnecterAndLdapMock();
|
|
$access = new Access($con, $lw, $um);
|
|
|
|
$inputDN = 'foobar';
|
|
$expected = '';
|
|
|
|
$lw->expects($this->once())
|
|
->method('explodeDN')
|
|
->with($inputDN, 0)
|
|
->will($this->returnValue(false));
|
|
|
|
$this->assertSame($expected, $access->getDomainDNFromDN($inputDN));
|
|
}
|
|
}
|