. /** * Tests for core_userkey_manager class. * * @package auth_userkey * @copyright 2016 Dmitrii Metelkin (dmitriim@catalyst-au.net) * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ defined('MOODLE_INTERNAL') || die(); use auth_userkey\core_userkey_manager; /** * Tests for core_userkey_manager class. * * @copyright 2016 Dmitrii Metelkin (dmitriim@catalyst-au.net) * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ class core_userkey_manager_testcase extends advanced_testcase { /** * Test user object. * @var */ protected $user; /** * Test config object. * @var */ protected $config; /** * Initial set up. */ public function setUp() { $this->resetAfterTest(); $this->user = self::getDataGenerator()->create_user(); $this->config = new stdClass(); } /** * Test that core_userkey_manager implements userkey_manager_interface interface. */ public function test_implements_userkey_manager_interface() { $manager = new core_userkey_manager($this->user->id, $this->config); $expected = 'auth_userkey\userkey_manager_interface'; $this->assertInstanceOf($expected, $manager); } /** * Test that we can use user ID of not existing user. */ public function test_that_manager_does_not_care_if_user_is_not_exists() { $brokenuserid = 500; $manager = new core_userkey_manager($brokenuserid, $this->config); $expected = 'auth_userkey\userkey_manager_interface'; $this->assertInstanceOf($expected, $manager); } /** * Test that key gets created correctly if config option iprestriction is not set. */ public function test_create_correct_key_if_iprestriction_is_not_set() { global $DB; $_SERVER['HTTP_CLIENT_IP'] = '192.168.1.1'; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option iprestriction is set to true. */ public function test_create_correct_key_if_iprestriction_is_true() { global $DB; $this->config->iprestriction = true; $_SERVER['HTTP_CLIENT_IP'] = '192.168.1.1'; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = '192.168.1.1'; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option iprestriction is set to true and we set allowedips. */ public function test_create_correct_key_if_iprestriction_is_true_and_we_set_allowedips() { global $DB; $this->config->iprestriction = true; $manager = new core_userkey_manager($this->user->id, $this->config, '192.168.1.3'); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = '192.168.1.3'; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option iprestriction is set to false. */ public function test_create_correct_key_if_iprestriction_is_false() { global $DB; $this->config->iprestriction = false; $_SERVER['HTTP_CLIENT_IP'] = '192.168.1.1'; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option iprestriction is set to false and we set allowedips. */ public function test_create_correct_key_if_iprestriction_is_falseand_we_set_allowedips() { global $DB; $this->config->iprestriction = false; $_SERVER['HTTP_CLIENT_IP'] = '192.168.1.1'; $manager = new core_userkey_manager($this->user->id, $this->config, '192.168.1.1'); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option iprestriction is set to a string. */ public function test_create_correct_key_if_iprestriction_is_string() { global $DB; $this->config->iprestriction = 'string'; $_SERVER['HTTP_CLIENT_IP'] = '192.168.1.1'; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = '192.168.1.1'; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option keylifetime is not set. */ public function test_create_correct_key_if_keylifetime_is_not_set() { global $DB; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 60; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option keylifetime is set to integer. */ public function test_create_correct_key_if_keylifetime_is_set_to_integer() { global $DB; $this->config->keylifetime = 3000; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 3000; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that key gets created correctly if config option keylifetime is set to a string. */ public function test_create_correct_key_if_keylifetime_is_set_to_string() { global $DB; $this->config->keylifetime = '3000'; $manager = new core_userkey_manager($this->user->id, $this->config); $value = $manager->create_key(); $actualkey = $DB->get_record('user_private_key', array('userid' => $this->user->id)); $expectedvalue = $value; $expecteduserid = $this->user->id; $expectedscript = 'auth/userkey'; $expectedinstance = $this->user->id; $expectediprestriction = null; $expectedvaliduntil = time() + 3000; $this->assertEquals($expectedvalue, $actualkey->value); $this->assertEquals($expecteduserid, $actualkey->userid); $this->assertEquals($expectedscript, $actualkey->script); $this->assertEquals($expectedinstance, $actualkey->instance); $this->assertEquals($expectediprestriction, $actualkey->iprestriction); $this->assertEquals($expectedvaliduntil, $actualkey->validuntil); } /** * Test that we can delete created key. */ public function test_can_delete_created_key() { global $DB; $manager = new core_userkey_manager($this->user->id, $this->config); $manager->create_key(); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(1, count($keys)); $manager->delete_key(); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(0, count($keys)); } /** * Test that we can delete all existing keys. */ public function test_can_delete_all_existing_keys() { global $DB; $manager = new core_userkey_manager($this->user->id, $this->config); create_user_key('auth/userkey', $this->user->id); create_user_key('auth/userkey', $this->user->id); create_user_key('auth/userkey', $this->user->id); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(3, count($keys)); $manager->delete_key(); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(0, count($keys)); } /** * Test that we create only one key. */ public function test_create_only_one_key() { global $DB; $manager = new core_userkey_manager($this->user->id, $this->config); create_user_key('auth/userkey', $this->user->id); create_user_key('auth/userkey', $this->user->id); create_user_key('auth/userkey', $this->user->id); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(3, count($keys)); $manager->create_key(); $keys = $DB->get_records('user_private_key', array('userid' => $this->user->id)); $this->assertEquals(1, count($keys)); } }