2021-01-05 22:08:41 +00:00
|
|
|
<?php
|
|
|
|
|
/**
|
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
|
*
|
|
|
|
|
* @file
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
namespace MediaWiki\Tests\Unit\Permissions;
|
|
|
|
|
|
|
|
|
|
use InvalidArgumentException;
|
2021-03-10 19:40:33 +00:00
|
|
|
use MediaWiki\Block\Block;
|
2021-01-05 22:08:41 +00:00
|
|
|
use MediaWiki\Page\PageIdentity;
|
|
|
|
|
use MediaWiki\Page\PageIdentityValue;
|
2021-03-10 19:40:33 +00:00
|
|
|
use MediaWiki\Permissions\Authority;
|
2021-01-05 22:08:41 +00:00
|
|
|
use MediaWiki\Permissions\PermissionManager;
|
|
|
|
|
use MediaWiki\Permissions\PermissionStatus;
|
2021-01-07 20:57:19 +00:00
|
|
|
use MediaWiki\Permissions\UserAuthority;
|
2021-01-05 22:08:41 +00:00
|
|
|
use MediaWikiUnitTestCase;
|
2021-03-10 19:40:33 +00:00
|
|
|
use PHPUnit\Framework\MockObject\MockObject;
|
2022-05-04 06:36:34 +00:00
|
|
|
use Status;
|
2021-01-05 22:08:41 +00:00
|
|
|
use User;
|
|
|
|
|
|
|
|
|
|
/**
|
2021-01-07 20:57:19 +00:00
|
|
|
* @covers \MediaWiki\Permissions\UserAuthority
|
2021-01-05 22:08:41 +00:00
|
|
|
*/
|
2021-01-07 20:57:19 +00:00
|
|
|
class UserAuthorityTest extends MediaWikiUnitTestCase {
|
2021-01-05 22:08:41 +00:00
|
|
|
|
2022-05-04 06:36:34 +00:00
|
|
|
/** @var string[] Some dummy message parameters to test error message formatting. */
|
|
|
|
|
private const FAKE_BLOCK_MESSAGE_PARAMS = [
|
|
|
|
|
'[[User:Blocker|Blocker]]',
|
|
|
|
|
'Block reason that can contain {{templates}}',
|
|
|
|
|
'192.168.0.1',
|
|
|
|
|
'Blocker',
|
|
|
|
|
];
|
|
|
|
|
|
2021-05-03 15:30:14 +00:00
|
|
|
/**
|
|
|
|
|
* @param string[] $permissions
|
2021-03-10 19:40:33 +00:00
|
|
|
* @return PermissionManager
|
2021-05-03 15:30:14 +00:00
|
|
|
*/
|
2021-07-22 03:11:47 +00:00
|
|
|
private function newPermissionsManager( array $permissions ): PermissionManager {
|
2021-03-10 19:40:33 +00:00
|
|
|
/** @var PermissionManager|MockObject $permissionManager */
|
2022-05-21 21:16:30 +00:00
|
|
|
$permissionManager = $this->createMock(
|
2021-01-05 22:08:41 +00:00
|
|
|
PermissionManager::class,
|
2021-03-10 19:40:33 +00:00
|
|
|
[ 'userHasRight', 'userCan', 'getPermissionErrors', 'isBlockedFrom' ]
|
2021-01-05 22:08:41 +00:00
|
|
|
);
|
|
|
|
|
|
2021-05-03 15:30:14 +00:00
|
|
|
$permissionManager->method( 'userHasRight' )->willReturnCallback(
|
2021-02-07 13:10:36 +00:00
|
|
|
static function ( $user, $permission ) use ( $permissions ) {
|
2021-01-05 22:08:41 +00:00
|
|
|
return in_array( $permission, $permissions );
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
|
2021-05-03 15:30:14 +00:00
|
|
|
$permissionManager->method( 'userCan' )->willReturnCallback(
|
|
|
|
|
static function ( $permission, $user ) use ( $permissionManager ) {
|
|
|
|
|
return $permissionManager->userHasRight( $user, $permission );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
|
2021-05-03 15:30:14 +00:00
|
|
|
$permissionManager->method( 'getPermissionErrors' )->willReturnCallback(
|
|
|
|
|
static function ( $permission, $user, $target ) use ( $permissionManager ) {
|
2021-01-05 22:08:41 +00:00
|
|
|
$errors = [];
|
2021-05-03 15:30:14 +00:00
|
|
|
if ( !$permissionManager->userCan( $permission, $user, $target ) ) {
|
2021-01-05 22:08:41 +00:00
|
|
|
$errors[] = [ 'permissionserrors' ];
|
|
|
|
|
}
|
|
|
|
|
|
2021-03-10 19:40:33 +00:00
|
|
|
if ( $user->getBlock() && $permission !== 'read' ) {
|
2022-05-04 06:36:34 +00:00
|
|
|
$errors[] = array_merge(
|
|
|
|
|
[ 'blockedtext-partial' ],
|
|
|
|
|
self::FAKE_BLOCK_MESSAGE_PARAMS
|
|
|
|
|
);
|
2021-03-10 19:40:33 +00:00
|
|
|
}
|
|
|
|
|
|
2021-01-05 22:08:41 +00:00
|
|
|
return $errors;
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
|
2021-03-10 19:40:33 +00:00
|
|
|
$permissionManager->method( 'isBlockedFrom' )->willReturnCallback(
|
|
|
|
|
static function ( User $user, $page ) {
|
|
|
|
|
return $page->getDBkey() === 'Forbidden';
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
return $permissionManager;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function newUser(): User {
|
|
|
|
|
/** @var User|MockObject $actor */
|
|
|
|
|
$actor = $this->createNoOpMock( User::class, [ 'getBlock' ] );
|
|
|
|
|
$actor->method( 'getBlock' )->willReturn( null );
|
|
|
|
|
return $actor;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function newAuthority( array $permissions, User $actor = null ): Authority {
|
2022-05-21 21:16:30 +00:00
|
|
|
/** @var PermissionManager|MockObject $permissionManager */
|
2021-03-10 19:40:33 +00:00
|
|
|
$permissionManager = $this->newPermissionsManager( $permissions );
|
2021-01-07 20:57:19 +00:00
|
|
|
return new UserAuthority(
|
2021-03-10 19:40:33 +00:00
|
|
|
$actor ?? $this->newUser(),
|
2021-01-05 22:08:41 +00:00
|
|
|
$permissionManager
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
2021-03-10 19:40:33 +00:00
|
|
|
public function testGetUser() {
|
|
|
|
|
$user = $this->newUser();
|
|
|
|
|
$authority = $this->newAuthority( [], $user );
|
|
|
|
|
|
|
|
|
|
$this->assertSame( $user, $authority->getUser() );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testGetUserBlockNotBlocked() {
|
|
|
|
|
$authority = $this->newAuthority( [] );
|
|
|
|
|
$this->assertNull( $authority->getBlock() );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param Block|null $block
|
|
|
|
|
*
|
|
|
|
|
* @return MockObject|User
|
|
|
|
|
*/
|
|
|
|
|
private function getBlockedUser( $block = null ) {
|
|
|
|
|
$block = $block ?: $this->createNoOpMock( Block::class );
|
|
|
|
|
|
|
|
|
|
$user = $this->createNoOpMock( User::class, [ 'getBlock' ] );
|
|
|
|
|
$user->method( 'getBlock' )
|
|
|
|
|
->willReturn( $block );
|
|
|
|
|
|
|
|
|
|
return $user;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testGetUserBlockWasBlocked() {
|
|
|
|
|
$block = $this->createNoOpMock( Block::class );
|
|
|
|
|
$user = $this->getBlockedUser( $block );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
2021-03-10 19:40:33 +00:00
|
|
|
$authority = $this->newAuthority( [], $user );
|
|
|
|
|
$this->assertSame( $block, $authority->getBlock() );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testBlockedUserCanRead() {
|
|
|
|
|
$block = $this->createNoOpMock( Block::class );
|
|
|
|
|
$user = $this->getBlockedUser( $block );
|
|
|
|
|
|
|
|
|
|
$authority = $this->newAuthority( [ 'read', 'edit' ], $user );
|
|
|
|
|
|
|
|
|
|
$status = PermissionStatus::newEmpty();
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
|
|
|
|
$this->assertTrue( $authority->authorizeRead( 'read', $target, $status ) );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusOK( $status );
|
2021-03-10 19:40:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testBlockedUserCanNotWrite() {
|
|
|
|
|
$block = $this->createNoOpMock( Block::class );
|
|
|
|
|
$user = $this->getBlockedUser( $block );
|
|
|
|
|
|
|
|
|
|
$authority = $this->newAuthority( [ 'read', 'edit' ], $user );
|
|
|
|
|
|
|
|
|
|
$status = PermissionStatus::newEmpty();
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
|
|
|
|
$this->assertFalse( $authority->authorizeRead( 'edit', $target, $status ) );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusNotOK( $status );
|
2021-03-10 19:40:33 +00:00
|
|
|
$this->assertSame( $block, $status->getBlock() );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testPermissions() {
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->isAllowed( 'foo' ) );
|
|
|
|
|
$this->assertTrue( $authority->isAllowed( 'bar' ) );
|
|
|
|
|
$this->assertFalse( $authority->isAllowed( 'quux' ) );
|
|
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->isAllowedAll( 'foo', 'bar' ) );
|
|
|
|
|
$this->assertTrue( $authority->isAllowedAny( 'bar', 'quux' ) );
|
|
|
|
|
|
|
|
|
|
$this->assertFalse( $authority->isAllowedAll( 'foo', 'quux' ) );
|
|
|
|
|
$this->assertFalse( $authority->isAllowedAny( 'xyzzy', 'quux' ) );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testProbablyCan() {
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->probablyCan( 'foo', $target ) );
|
|
|
|
|
$this->assertTrue( $authority->probablyCan( 'bar', $target ) );
|
|
|
|
|
$this->assertFalse( $authority->probablyCan( 'quux', $target ) );
|
|
|
|
|
|
|
|
|
|
$status = new PermissionStatus();
|
|
|
|
|
$authority->probablyCan( 'foo', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$authority->probablyCan( 'quux', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusNotOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testDefinitlyCan() {
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->definitelyCan( 'foo', $target ) );
|
|
|
|
|
$this->assertTrue( $authority->definitelyCan( 'bar', $target ) );
|
|
|
|
|
$this->assertFalse( $authority->definitelyCan( 'quux', $target ) );
|
|
|
|
|
|
|
|
|
|
$status = new PermissionStatus();
|
|
|
|
|
$authority->definitelyCan( 'foo', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$authority->definitelyCan( 'quux', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusNotOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthorizeRead() {
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->authorizeRead( 'foo', $target ) );
|
|
|
|
|
$this->assertTrue( $authority->authorizeRead( 'bar', $target ) );
|
|
|
|
|
$this->assertFalse( $authority->authorizeRead( 'quux', $target ) );
|
|
|
|
|
|
|
|
|
|
$status = new PermissionStatus();
|
|
|
|
|
$authority->authorizeRead( 'foo', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$authority->authorizeRead( 'quux', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusNotOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthorizeWrite() {
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->assertTrue( $authority->authorizeWrite( 'foo', $target ) );
|
|
|
|
|
$this->assertTrue( $authority->authorizeWrite( 'bar', $target ) );
|
|
|
|
|
$this->assertFalse( $authority->authorizeWrite( 'quux', $target ) );
|
|
|
|
|
|
|
|
|
|
$status = new PermissionStatus();
|
|
|
|
|
$authority->authorizeWrite( 'foo', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$authority->authorizeWrite( 'quux', $target, $status );
|
2022-03-04 22:00:02 +00:00
|
|
|
$this->assertStatusNotOK( $status );
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testIsAllowedAnyThrowsOnEmptySet() {
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->expectException( InvalidArgumentException::class );
|
|
|
|
|
$authority->isAllowedAny();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testIsAllowedAllThrowsOnEmptySet() {
|
2021-05-03 15:30:14 +00:00
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ] );
|
2021-01-05 22:08:41 +00:00
|
|
|
|
|
|
|
|
$this->expectException( InvalidArgumentException::class );
|
|
|
|
|
$authority->isAllowedAll();
|
|
|
|
|
}
|
|
|
|
|
|
2021-03-10 19:40:33 +00:00
|
|
|
public function testGetBlock_none() {
|
|
|
|
|
$actor = $this->newUser();
|
|
|
|
|
|
|
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ], $actor );
|
|
|
|
|
|
|
|
|
|
$this->assertNull( $authority->getBlock() );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testGetBlock_blocked() {
|
|
|
|
|
$block = $this->createNoOpMock( Block::class );
|
|
|
|
|
$actor = $this->getBlockedUser( $block );
|
|
|
|
|
|
|
|
|
|
$authority = $this->newAuthority( [ 'foo', 'bar' ], $actor );
|
|
|
|
|
|
|
|
|
|
$this->assertSame( $block, $authority->getBlock() );
|
|
|
|
|
}
|
2022-05-04 06:36:34 +00:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Regression test for T306494: check that when creating a PermissionStatus,
|
|
|
|
|
* the message contains all parameters and when converted to a Status, the parameters
|
|
|
|
|
* are not wikitext escaped.
|
|
|
|
|
*/
|
|
|
|
|
public function testInternalCanWithPermissionStatusMessageFormatting() {
|
|
|
|
|
$block = $this->createNoOpMock( Block::class );
|
|
|
|
|
$user = $this->getBlockedUser( $block );
|
|
|
|
|
|
|
|
|
|
$authority = $this->newAuthority( [ 'read', 'edit' ], $user );
|
|
|
|
|
|
|
|
|
|
$permissionStatus = PermissionStatus::newEmpty();
|
|
|
|
|
$target = new PageIdentityValue( 321, NS_MAIN, __METHOD__, PageIdentity::LOCAL );
|
|
|
|
|
|
|
|
|
|
$authority->authorizeWrite(
|
|
|
|
|
'edit',
|
|
|
|
|
$target,
|
|
|
|
|
$permissionStatus
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$this->assertTrue( $permissionStatus->hasMessage( 'blockedtext-partial' ) );
|
|
|
|
|
|
|
|
|
|
$status = Status::wrap( $permissionStatus );
|
|
|
|
|
|
|
|
|
|
$message = $status->getMessage();
|
|
|
|
|
$this->assertEquals( 'blockedtext-partial', $message->getKey() );
|
|
|
|
|
$this->assertArrayEquals(
|
|
|
|
|
self::FAKE_BLOCK_MESSAGE_PARAMS,
|
|
|
|
|
$message->getParams()
|
|
|
|
|
);
|
|
|
|
|
}
|
2021-01-05 22:08:41 +00:00
|
|
|
}
|