2018-04-15 01:47:13 +08:00
|
|
|
<?php namespace Tests;
|
|
|
|
|
2019-10-05 19:55:01 +08:00
|
|
|
use BookStack\Auth\User;
|
2018-09-25 19:30:50 +08:00
|
|
|
use BookStack\Entities\Book;
|
2019-10-05 19:55:01 +08:00
|
|
|
use BookStack\Entities\Bookshelf;
|
|
|
|
use BookStack\Entities\Chapter;
|
2018-09-25 19:30:50 +08:00
|
|
|
use BookStack\Entities\Entity;
|
|
|
|
use BookStack\Entities\Page;
|
2019-10-05 19:55:01 +08:00
|
|
|
use BookStack\Entities\Repos\BookRepo;
|
|
|
|
use BookStack\Entities\Repos\BookshelfRepo;
|
|
|
|
use BookStack\Entities\Repos\ChapterRepo;
|
2018-09-25 19:30:50 +08:00
|
|
|
use BookStack\Auth\Permissions\PermissionsRepo;
|
|
|
|
use BookStack\Auth\Role;
|
|
|
|
use BookStack\Auth\Permissions\PermissionService;
|
2018-10-13 18:27:55 +08:00
|
|
|
use BookStack\Entities\Repos\PageRepo;
|
2018-09-25 19:30:50 +08:00
|
|
|
use BookStack\Settings\SettingService;
|
2019-07-18 05:36:49 +08:00
|
|
|
use BookStack\Uploads\HttpFetcher;
|
2019-09-14 21:12:39 +08:00
|
|
|
use Illuminate\Support\Env;
|
2019-10-05 19:55:01 +08:00
|
|
|
use Mockery;
|
|
|
|
use Throwable;
|
2018-04-15 01:47:13 +08:00
|
|
|
|
|
|
|
trait SharedTestHelpers
|
|
|
|
{
|
|
|
|
|
|
|
|
protected $admin;
|
|
|
|
protected $editor;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set the current user context to be an admin.
|
|
|
|
* @return $this
|
|
|
|
*/
|
|
|
|
public function asAdmin()
|
|
|
|
{
|
|
|
|
return $this->actingAs($this->getAdmin());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the current admin user.
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function getAdmin() {
|
|
|
|
if($this->admin === null) {
|
|
|
|
$adminRole = Role::getSystemRole('admin');
|
|
|
|
$this->admin = $adminRole->users->first();
|
|
|
|
}
|
|
|
|
return $this->admin;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set the current user context to be an editor.
|
|
|
|
* @return $this
|
|
|
|
*/
|
|
|
|
public function asEditor()
|
|
|
|
{
|
|
|
|
return $this->actingAs($this->getEditor());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a editor user.
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
protected function getEditor() {
|
|
|
|
if($this->editor === null) {
|
|
|
|
$editorRole = Role::getRole('editor');
|
|
|
|
$this->editor = $editorRole->users->first();
|
|
|
|
}
|
|
|
|
return $this->editor;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get an instance of a user with 'viewer' permissions
|
|
|
|
* @param $attributes
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
protected function getViewer($attributes = [])
|
|
|
|
{
|
2019-10-05 19:55:01 +08:00
|
|
|
$user = Role::getRole('viewer')->users()->first();
|
2018-04-15 01:47:13 +08:00
|
|
|
if (!empty($attributes)) $user->forceFill($attributes)->save();
|
|
|
|
return $user;
|
|
|
|
}
|
|
|
|
|
2018-09-21 22:15:16 +08:00
|
|
|
/**
|
|
|
|
* Regenerate the permission for an entity.
|
|
|
|
* @param Entity $entity
|
2019-10-05 19:55:01 +08:00
|
|
|
* @throws Throwable
|
2018-09-21 22:15:16 +08:00
|
|
|
*/
|
|
|
|
protected function regenEntityPermissions(Entity $entity)
|
|
|
|
{
|
2019-09-20 07:18:28 +08:00
|
|
|
$entity->rebuildPermissions();
|
2018-09-21 22:15:16 +08:00
|
|
|
$entity->load('jointPermissions');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create and return a new bookshelf.
|
|
|
|
* @param array $input
|
2019-10-05 19:55:01 +08:00
|
|
|
* @return Bookshelf
|
2018-09-21 22:15:16 +08:00
|
|
|
*/
|
|
|
|
public function newShelf($input = ['name' => 'test shelf', 'description' => 'My new test shelf']) {
|
2019-10-05 19:55:01 +08:00
|
|
|
return app(BookshelfRepo::class)->create($input, []);
|
2018-09-21 22:15:16 +08:00
|
|
|
}
|
|
|
|
|
2018-04-15 01:47:13 +08:00
|
|
|
/**
|
|
|
|
* Create and return a new book.
|
|
|
|
* @param array $input
|
|
|
|
* @return Book
|
|
|
|
*/
|
|
|
|
public function newBook($input = ['name' => 'test book', 'description' => 'My new test book']) {
|
2019-10-05 19:55:01 +08:00
|
|
|
return app(BookRepo::class)->create($input);
|
2018-04-15 01:47:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create and return a new test chapter
|
|
|
|
* @param array $input
|
|
|
|
* @param Book $book
|
2019-10-05 19:55:01 +08:00
|
|
|
* @return Chapter
|
2018-04-15 01:47:13 +08:00
|
|
|
*/
|
|
|
|
public function newChapter($input = ['name' => 'test chapter', 'description' => 'My new test chapter'], Book $book) {
|
2019-10-05 19:55:01 +08:00
|
|
|
return app(ChapterRepo::class)->create($input, $book);
|
2018-04-15 01:47:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create and return a new test page
|
|
|
|
* @param array $input
|
2018-09-23 22:15:44 +08:00
|
|
|
* @return Page
|
2019-10-05 19:55:01 +08:00
|
|
|
* @throws Throwable
|
2018-04-15 01:47:13 +08:00
|
|
|
*/
|
|
|
|
public function newPage($input = ['name' => 'test page', 'html' => 'My new test page']) {
|
|
|
|
$book = Book::first();
|
2018-10-13 18:27:55 +08:00
|
|
|
$pageRepo = app(PageRepo::class);
|
2019-10-05 19:55:01 +08:00
|
|
|
$draftPage = $pageRepo->getNewDraftPage($book);
|
|
|
|
return $pageRepo->publishDraft($draftPage, $input);
|
2018-04-15 01:47:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Quickly sets an array of settings.
|
|
|
|
* @param $settingsArray
|
|
|
|
*/
|
|
|
|
protected function setSettings($settingsArray)
|
|
|
|
{
|
|
|
|
$settings = app(SettingService::class);
|
|
|
|
foreach ($settingsArray as $key => $value) {
|
|
|
|
$settings->put($key, $value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Manually set some permissions on an entity.
|
|
|
|
* @param Entity $entity
|
|
|
|
* @param array $actions
|
|
|
|
* @param array $roles
|
|
|
|
*/
|
|
|
|
protected function setEntityRestrictions(Entity $entity, $actions = [], $roles = [])
|
|
|
|
{
|
|
|
|
$entity->restricted = true;
|
|
|
|
$entity->permissions()->delete();
|
|
|
|
|
|
|
|
$permissions = [];
|
|
|
|
foreach ($actions as $action) {
|
|
|
|
foreach ($roles as $role) {
|
|
|
|
$permissions[] = [
|
|
|
|
'role_id' => $role->id,
|
|
|
|
'action' => strtolower($action)
|
|
|
|
];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$entity->permissions()->createMany($permissions);
|
|
|
|
|
|
|
|
$entity->save();
|
|
|
|
$entity->load('permissions');
|
|
|
|
$this->app[PermissionService::class]->buildJointPermissionsForEntity($entity);
|
|
|
|
$entity->load('jointPermissions');
|
|
|
|
}
|
|
|
|
|
2018-09-21 22:15:16 +08:00
|
|
|
/**
|
|
|
|
* Give the given user some permissions.
|
2019-10-05 19:55:01 +08:00
|
|
|
* @param User $user
|
2018-09-21 22:15:16 +08:00
|
|
|
* @param array $permissions
|
|
|
|
*/
|
2019-10-05 19:55:01 +08:00
|
|
|
protected function giveUserPermissions(User $user, $permissions = [])
|
2018-09-21 22:15:16 +08:00
|
|
|
{
|
|
|
|
$newRole = $this->createNewRole($permissions);
|
|
|
|
$user->attachRole($newRole);
|
|
|
|
$user->load('roles');
|
|
|
|
$user->permissions(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new basic role for testing purposes.
|
|
|
|
* @param array $permissions
|
|
|
|
* @return Role
|
|
|
|
*/
|
|
|
|
protected function createNewRole($permissions = [])
|
|
|
|
{
|
|
|
|
$permissionRepo = app(PermissionsRepo::class);
|
|
|
|
$roleData = factory(Role::class)->make()->toArray();
|
|
|
|
$roleData['permissions'] = array_flip($permissions);
|
|
|
|
return $permissionRepo->saveNewRole($roleData);
|
|
|
|
}
|
|
|
|
|
2019-07-18 05:36:49 +08:00
|
|
|
/**
|
|
|
|
* Mock the HttpFetcher service and return the given data on fetch.
|
|
|
|
* @param $returnData
|
|
|
|
* @param int $times
|
|
|
|
*/
|
|
|
|
protected function mockHttpFetch($returnData, int $times = 1)
|
|
|
|
{
|
2019-10-05 19:55:01 +08:00
|
|
|
$mockHttp = Mockery::mock(HttpFetcher::class);
|
2019-07-18 05:36:49 +08:00
|
|
|
$this->app[HttpFetcher::class] = $mockHttp;
|
|
|
|
$mockHttp->shouldReceive('fetch')
|
|
|
|
->times($times)
|
|
|
|
->andReturn($returnData);
|
|
|
|
}
|
|
|
|
|
2019-09-14 21:12:39 +08:00
|
|
|
/**
|
|
|
|
* Run a set test with the given env variable.
|
|
|
|
* Remembers the original and resets the value after test.
|
|
|
|
* @param string $name
|
|
|
|
* @param $value
|
|
|
|
* @param callable $callback
|
|
|
|
*/
|
|
|
|
protected function runWithEnv(string $name, $value, callable $callback)
|
|
|
|
{
|
|
|
|
Env::disablePutenv();
|
2019-09-20 08:18:59 +08:00
|
|
|
$originalVal = $_SERVER[$name] ?? null;
|
2019-09-14 21:12:39 +08:00
|
|
|
|
|
|
|
if (is_null($value)) {
|
|
|
|
unset($_SERVER[$name]);
|
|
|
|
} else {
|
|
|
|
$_SERVER[$name] = $value;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->refreshApplication();
|
|
|
|
$callback();
|
|
|
|
|
|
|
|
if (is_null($originalVal)) {
|
|
|
|
unset($_SERVER[$name]);
|
|
|
|
} else {
|
|
|
|
$_SERVER[$name] = $originalVal;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check the keys and properties in the given map to include
|
|
|
|
* exist, albeit not exclusively, within the map to check.
|
|
|
|
* @param array $mapToInclude
|
|
|
|
* @param array $mapToCheck
|
|
|
|
* @param string $message
|
|
|
|
*/
|
|
|
|
protected function assertArrayMapIncludes(array $mapToInclude, array $mapToCheck, string $message = '') : void
|
|
|
|
{
|
|
|
|
$passed = true;
|
|
|
|
|
|
|
|
foreach ($mapToInclude as $key => $value) {
|
|
|
|
if (!isset($mapToCheck[$key]) || $mapToCheck[$key] !== $mapToInclude[$key]) {
|
|
|
|
$passed = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$toIncludeStr = print_r($mapToInclude, true);
|
|
|
|
$toCheckStr = print_r($mapToCheck, true);
|
|
|
|
self::assertThat($passed, self::isTrue(), "Failed asserting that given map:\n\n{$toCheckStr}\n\nincludes:\n\n{$toIncludeStr}");
|
|
|
|
}
|
|
|
|
|
2020-02-02 21:10:21 +08:00
|
|
|
/**
|
|
|
|
* Assert a permission error has occurred.
|
|
|
|
*/
|
|
|
|
protected function assertPermissionError($response)
|
|
|
|
{
|
|
|
|
if ($response instanceof BrowserKitTest) {
|
|
|
|
$response = \Illuminate\Foundation\Testing\TestResponse::fromBaseResponse($response->response);
|
|
|
|
}
|
|
|
|
|
|
|
|
$response->assertRedirect('/');
|
|
|
|
$this->assertSessionHas('error');
|
|
|
|
$error = session()->pull('error');
|
|
|
|
$this->assertStringStartsWith('You do not have permission to access', $error);
|
|
|
|
}
|
|
|
|
|
2018-04-15 01:47:13 +08:00
|
|
|
}
|