2011-07-11 18:36:29 +00:00
|
|
|
|
<?php
|
|
|
|
|
|
|
2011-07-16 16:09:00 +00:00
|
|
|
|
define( 'NS_UNITTEST', 5600 );
|
|
|
|
|
|
define( 'NS_UNITTEST_TALK', 5601 );
|
|
|
|
|
|
|
2011-07-19 21:41:25 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @group Database
|
|
|
|
|
|
*/
|
2011-07-11 18:36:29 +00:00
|
|
|
|
class UserTest extends MediaWikiTestCase {
|
2012-01-19 14:56:18 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @var User
|
|
|
|
|
|
*/
|
2011-07-16 16:09:00 +00:00
|
|
|
|
protected $user;
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2012-10-08 10:56:20 +00:00
|
|
|
|
protected function setUp() {
|
2011-07-11 18:36:29 +00:00
|
|
|
|
parent::setUp();
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2012-10-08 10:56:20 +00:00
|
|
|
|
$this->setMwGlobals( array(
|
|
|
|
|
|
'wgGroupPermissions' => array(),
|
|
|
|
|
|
'wgRevokePermissions' => array(),
|
|
|
|
|
|
) );
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2011-07-11 18:36:29 +00:00
|
|
|
|
$this->setUpPermissionGlobals();
|
2012-10-08 10:56:20 +00:00
|
|
|
|
|
|
|
|
|
|
$this->user = new User;
|
|
|
|
|
|
$this->user->addGroup( 'unittesters' );
|
2011-07-11 18:36:29 +00:00
|
|
|
|
}
|
2012-10-08 10:56:20 +00:00
|
|
|
|
|
2011-07-11 18:36:29 +00:00
|
|
|
|
private function setUpPermissionGlobals() {
|
|
|
|
|
|
global $wgGroupPermissions, $wgRevokePermissions;
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2011-07-16 16:09:00 +00:00
|
|
|
|
# Data for regular $wgGroupPermissions test
|
2011-07-11 18:36:29 +00:00
|
|
|
|
$wgGroupPermissions['unittesters'] = array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
'test' => true,
|
2011-07-11 18:36:29 +00:00
|
|
|
|
'runtest' => true,
|
|
|
|
|
|
'writetest' => false,
|
|
|
|
|
|
'nukeworld' => false,
|
|
|
|
|
|
);
|
|
|
|
|
|
$wgGroupPermissions['testwriters'] = array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
'test' => true,
|
2011-07-11 18:36:29 +00:00
|
|
|
|
'writetest' => true,
|
|
|
|
|
|
'modifytest' => true,
|
|
|
|
|
|
);
|
2012-10-08 10:56:20 +00:00
|
|
|
|
|
2011-07-16 16:09:00 +00:00
|
|
|
|
# Data for regular $wgRevokePermissions test
|
2011-07-11 18:36:29 +00:00
|
|
|
|
$wgRevokePermissions['formertesters'] = array(
|
|
|
|
|
|
'runtest' => true,
|
|
|
|
|
|
);
|
2013-06-10 19:30:43 +00:00
|
|
|
|
|
|
|
|
|
|
# For the options test
|
|
|
|
|
|
$wgGroupPermissions['*'] = array(
|
|
|
|
|
|
'editmyoptions' => true,
|
|
|
|
|
|
);
|
2011-07-16 16:09:00 +00:00
|
|
|
|
}
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2013-10-21 21:09:13 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::getGroupPermissions
|
|
|
|
|
|
*/
|
2011-07-11 18:36:29 +00:00
|
|
|
|
public function testGroupPermissions() {
|
|
|
|
|
|
$rights = User::getGroupPermissions( array( 'unittesters' ) );
|
|
|
|
|
|
$this->assertContains( 'runtest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'writetest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'modifytest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'nukeworld', $rights );
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2011-07-11 18:36:29 +00:00
|
|
|
|
$rights = User::getGroupPermissions( array( 'unittesters', 'testwriters' ) );
|
|
|
|
|
|
$this->assertContains( 'runtest', $rights );
|
|
|
|
|
|
$this->assertContains( 'writetest', $rights );
|
|
|
|
|
|
$this->assertContains( 'modifytest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'nukeworld', $rights );
|
|
|
|
|
|
}
|
2013-02-14 11:36:35 +00:00
|
|
|
|
|
2013-10-21 21:09:13 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::getGroupPermissions
|
|
|
|
|
|
*/
|
2011-07-11 18:36:29 +00:00
|
|
|
|
public function testRevokePermissions() {
|
|
|
|
|
|
$rights = User::getGroupPermissions( array( 'unittesters', 'formertesters' ) );
|
|
|
|
|
|
$this->assertNotContains( 'runtest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'writetest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'modifytest', $rights );
|
2011-10-11 10:02:50 +00:00
|
|
|
|
$this->assertNotContains( 'nukeworld', $rights );
|
2011-07-11 18:36:29 +00:00
|
|
|
|
}
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2013-10-21 21:09:13 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::getRights
|
|
|
|
|
|
*/
|
2011-07-16 16:09:00 +00:00
|
|
|
|
public function testUserPermissions() {
|
|
|
|
|
|
$rights = $this->user->getRights();
|
|
|
|
|
|
$this->assertContains( 'runtest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'writetest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'modifytest', $rights );
|
|
|
|
|
|
$this->assertNotContains( 'nukeworld', $rights );
|
|
|
|
|
|
}
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2011-07-16 16:09:00 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @dataProvider provideGetGroupsWithPermission
|
2013-10-21 21:09:13 +00:00
|
|
|
|
* @covers User::getGroupsWithPermission
|
2011-07-16 16:09:00 +00:00
|
|
|
|
*/
|
2011-12-12 06:03:01 +00:00
|
|
|
|
public function testGetGroupsWithPermission( $expected, $right ) {
|
|
|
|
|
|
$result = User::getGroupsWithPermission( $right );
|
2011-07-16 16:09:00 +00:00
|
|
|
|
sort( $result );
|
|
|
|
|
|
sort( $expected );
|
2011-10-11 10:02:50 +00:00
|
|
|
|
|
2011-12-12 06:03:01 +00:00
|
|
|
|
$this->assertEquals( $expected, $result, "Groups with permission $right" );
|
2011-07-16 16:09:00 +00:00
|
|
|
|
}
|
2012-01-19 14:56:18 +00:00
|
|
|
|
|
2012-10-08 10:56:20 +00:00
|
|
|
|
public static function provideGetGroupsWithPermission() {
|
2011-07-16 16:09:00 +00:00
|
|
|
|
return array(
|
2011-10-11 10:02:50 +00:00
|
|
|
|
array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
array( 'unittesters', 'testwriters' ),
|
2011-12-12 06:03:01 +00:00
|
|
|
|
'test'
|
2011-10-11 10:02:50 +00:00
|
|
|
|
),
|
|
|
|
|
|
array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
array( 'unittesters' ),
|
2011-12-12 06:03:01 +00:00
|
|
|
|
'runtest'
|
2011-07-16 16:09:00 +00:00
|
|
|
|
),
|
2011-10-11 10:02:50 +00:00
|
|
|
|
array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
array( 'testwriters' ),
|
2011-12-12 06:03:01 +00:00
|
|
|
|
'writetest'
|
2011-07-16 16:09:00 +00:00
|
|
|
|
),
|
2011-10-11 10:02:50 +00:00
|
|
|
|
array(
|
2011-07-16 16:09:00 +00:00
|
|
|
|
array( 'testwriters' ),
|
2011-12-12 06:03:01 +00:00
|
|
|
|
'modifytest'
|
2011-10-11 10:02:50 +00:00
|
|
|
|
),
|
2011-07-16 16:09:00 +00:00
|
|
|
|
);
|
|
|
|
|
|
}
|
2011-10-11 09:17:36 +00:00
|
|
|
|
|
2014-07-01 16:31:07 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @dataProvider provideIPs
|
|
|
|
|
|
* @covers User::isIP
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testIsIP( $value, $result, $message ) {
|
|
|
|
|
|
$this->assertEquals( $this->user->isIP( $value ), $result, $message );
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
public static function provideIPs() {
|
|
|
|
|
|
return array(
|
|
|
|
|
|
array( '', false, 'Empty string' ),
|
|
|
|
|
|
array( ' ', false, 'Blank space' ),
|
|
|
|
|
|
array( '10.0.0.0', true, 'IPv4 private 10/8' ),
|
|
|
|
|
|
array( '10.255.255.255', true, 'IPv4 private 10/8' ),
|
|
|
|
|
|
array( '192.168.1.1', true, 'IPv4 private 192.168/16' ),
|
|
|
|
|
|
array( '203.0.113.0', true, 'IPv4 example' ),
|
|
|
|
|
|
array( '2002:ffff:ffff:ffff:ffff:ffff:ffff:ffff', true, 'IPv6 example' ),
|
|
|
|
|
|
// Not valid IPs but classified as such by MediaWiki for negated asserting
|
|
|
|
|
|
// of whether this might be the identifier of a logged-out user or whether
|
|
|
|
|
|
// to allow usernames like it.
|
|
|
|
|
|
array( '300.300.300.300', true, 'Looks too much like an IPv4 address' ),
|
|
|
|
|
|
array( '203.0.113.xxx', true, 'Assigned by UseMod to cloaked logged-out users' ),
|
|
|
|
|
|
);
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2011-10-11 10:25:58 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @dataProvider provideUserNames
|
2013-10-21 21:09:13 +00:00
|
|
|
|
* @covers User::isValidUserName
|
2011-10-11 10:25:58 +00:00
|
|
|
|
*/
|
|
|
|
|
|
public function testIsValidUserName( $username, $result, $message ) {
|
|
|
|
|
|
$this->assertEquals( $this->user->isValidUserName( $username ), $result, $message );
|
2011-10-11 09:17:36 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
2012-10-08 10:56:20 +00:00
|
|
|
|
public static function provideUserNames() {
|
2011-10-11 10:25:58 +00:00
|
|
|
|
return array(
|
|
|
|
|
|
array( '', false, 'Empty string' ),
|
|
|
|
|
|
array( ' ', false, 'Blank space' ),
|
|
|
|
|
|
array( 'abcd', false, 'Starts with small letter' ),
|
2013-02-14 11:36:35 +00:00
|
|
|
|
array( 'Ab/cd', false, 'Contains slash' ),
|
|
|
|
|
|
array( 'Ab cd', true, 'Whitespace' ),
|
|
|
|
|
|
array( '192.168.1.1', false, 'IP' ),
|
2011-10-11 10:25:58 +00:00
|
|
|
|
array( 'User:Abcd', false, 'Reserved Namespace' ),
|
2013-02-14 11:36:35 +00:00
|
|
|
|
array( '12abcd232', true, 'Starts with Numbers' ),
|
|
|
|
|
|
array( '?abcd', true, 'Start with ? mark' ),
|
2011-10-11 10:25:58 +00:00
|
|
|
|
array( '#abcd', false, 'Start with #' ),
|
2013-02-14 11:36:35 +00:00
|
|
|
|
array( 'Abcdകഖഗഘ', true, ' Mixed scripts' ),
|
|
|
|
|
|
array( 'ജോസ്തോമസ്', false, 'ZWNJ- Format control character' ),
|
2011-10-11 10:25:58 +00:00
|
|
|
|
array( 'Ab cd', false, ' Ideographic space' ),
|
2014-07-01 16:31:07 +00:00
|
|
|
|
array( '300.300.300.300', false, 'Looks too much like an IPv4 address' ),
|
|
|
|
|
|
array( '302.113.311.900', false, 'Looks too much like an IPv4 address' ),
|
|
|
|
|
|
array( '203.0.113.xxx', false, 'Reserved for usage by UseMod for cloaked logged-out users' ),
|
2011-10-11 10:25:58 +00:00
|
|
|
|
);
|
|
|
|
|
|
}
|
2012-08-13 08:18:18 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Test, if for all rights a right- message exist,
|
|
|
|
|
|
* which is used on Special:ListGroupRights as help text
|
|
|
|
|
|
* Extensions and core
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testAllRightsWithMessage() {
|
2014-07-01 16:31:07 +00:00
|
|
|
|
// Getting all user rights, for core: User::$mCoreRights, for extensions: $wgAvailableRights
|
2012-08-13 08:18:18 +00:00
|
|
|
|
$allRights = User::getAllRights();
|
|
|
|
|
|
$allMessageKeys = Language::getMessageKeysFor( 'en' );
|
|
|
|
|
|
|
|
|
|
|
|
$rightsWithMessage = array();
|
|
|
|
|
|
foreach ( $allMessageKeys as $message ) {
|
|
|
|
|
|
// === 0: must be at beginning of string (position 0)
|
|
|
|
|
|
if ( strpos( $message, 'right-' ) === 0 ) {
|
|
|
|
|
|
$rightsWithMessage[] = substr( $message, strlen( 'right-' ) );
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sort( $allRights );
|
|
|
|
|
|
sort( $rightsWithMessage );
|
|
|
|
|
|
|
|
|
|
|
|
$this->assertEquals(
|
|
|
|
|
|
$allRights,
|
|
|
|
|
|
$rightsWithMessage,
|
|
|
|
|
|
'Each user rights (core/extensions) has a corresponding right- message.'
|
|
|
|
|
|
);
|
|
|
|
|
|
}
|
2012-10-18 03:03:10 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Test User::editCount
|
2012-10-26 11:02:48 +00:00
|
|
|
|
* @group medium
|
2013-10-21 21:09:13 +00:00
|
|
|
|
* @covers User::getEditCount
|
2012-10-18 03:03:10 +00:00
|
|
|
|
*/
|
|
|
|
|
|
public function testEditCount() {
|
|
|
|
|
|
$user = User::newFromName( 'UnitTestUser' );
|
2014-09-20 15:11:00 +00:00
|
|
|
|
|
|
|
|
|
|
if ( !$user->getId() ) {
|
|
|
|
|
|
$user->addToDatabase();
|
|
|
|
|
|
}
|
2012-10-18 03:03:10 +00:00
|
|
|
|
|
2012-10-26 11:02:48 +00:00
|
|
|
|
// let the user have a few (3) edits
|
2012-11-08 17:05:46 +00:00
|
|
|
|
$page = WikiPage::factory( Title::newFromText( 'Help:UserTest_EditCount' ) );
|
2013-02-14 11:36:35 +00:00
|
|
|
|
for ( $i = 0; $i < 3; $i++ ) {
|
2013-01-28 10:27:15 +00:00
|
|
|
|
$page->doEdit( (string)$i, 'test', 0, false, $user );
|
2012-10-18 03:03:10 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
$user->clearInstanceCache();
|
2014-04-24 12:50:36 +00:00
|
|
|
|
$this->assertEquals(
|
|
|
|
|
|
3,
|
|
|
|
|
|
$user->getEditCount(),
|
|
|
|
|
|
'After three edits, the user edit count should be 3'
|
|
|
|
|
|
);
|
2012-10-18 03:03:10 +00:00
|
|
|
|
|
|
|
|
|
|
// increase the edit count and clear the cache
|
|
|
|
|
|
$user->incEditCount();
|
|
|
|
|
|
|
|
|
|
|
|
$user->clearInstanceCache();
|
2014-04-24 12:50:36 +00:00
|
|
|
|
$this->assertEquals(
|
|
|
|
|
|
4,
|
|
|
|
|
|
$user->getEditCount(),
|
|
|
|
|
|
'After increasing the edit count manually, the user edit count should be 4'
|
|
|
|
|
|
);
|
2012-10-18 03:03:10 +00:00
|
|
|
|
}
|
2012-10-29 20:07:49 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Test changing user options.
|
2013-10-21 21:09:13 +00:00
|
|
|
|
* @covers User::setOption
|
|
|
|
|
|
* @covers User::getOption
|
2012-10-29 20:07:49 +00:00
|
|
|
|
*/
|
|
|
|
|
|
public function testOptions() {
|
|
|
|
|
|
$user = User::newFromName( 'UnitTestUser' );
|
2014-09-20 15:11:00 +00:00
|
|
|
|
|
|
|
|
|
|
if ( !$user->getId() ) {
|
|
|
|
|
|
$user->addToDatabase();
|
|
|
|
|
|
}
|
2012-10-29 20:07:49 +00:00
|
|
|
|
|
2014-09-20 16:56:04 +00:00
|
|
|
|
$user->setOption( 'userjs-someoption', 'test' );
|
2012-10-29 20:07:49 +00:00
|
|
|
|
$user->setOption( 'cols', 200 );
|
|
|
|
|
|
$user->saveSettings();
|
|
|
|
|
|
|
|
|
|
|
|
$user = User::newFromName( 'UnitTestUser' );
|
2014-09-20 16:56:04 +00:00
|
|
|
|
$this->assertEquals( 'test', $user->getOption( 'userjs-someoption' ) );
|
2012-10-29 20:07:49 +00:00
|
|
|
|
$this->assertEquals( 200, $user->getOption( 'cols' ) );
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Bug 37963
|
|
|
|
|
|
* Make sure defaults are loaded when setOption is called.
|
2013-10-21 21:09:13 +00:00
|
|
|
|
* @covers User::loadOptions
|
2012-10-29 20:07:49 +00:00
|
|
|
|
*/
|
|
|
|
|
|
public function testAnonOptions() {
|
|
|
|
|
|
global $wgDefaultUserOptions;
|
2014-09-20 16:56:04 +00:00
|
|
|
|
$this->user->setOption( 'userjs-someoption', 'test' );
|
2012-10-29 20:07:49 +00:00
|
|
|
|
$this->assertEquals( $wgDefaultUserOptions['cols'], $this->user->getOption( 'cols' ) );
|
2014-09-20 16:56:04 +00:00
|
|
|
|
$this->assertEquals( 'test', $this->user->getOption( 'userjs-someoption' ) );
|
2012-10-29 20:07:49 +00:00
|
|
|
|
}
|
Password Expiration
Add functionality to expire users' passwords:
* Adds column to the user table to keep a password expiration
* Adds $wgPasswordExpirationDays, which will force users to reset
their passwords after a set number of days. By default, this set
to false, so passwords never expire.
* Adds a default grace period of 7 days, where if the user's password
is expired, they can still login, but are encouraged to reset their
password.
* Adds hook 'LoginPasswordResetMessage' to update reset message, in
case an extension wants to vary the message on a particular reset
event.
* Adds hook 'ResetPasswordExpiration' to allow extensions to change
the expiration date when the user resets their password. E.g., if
an extension wants to vary the expiration based on the user's group.
If the user is in the grace period, they get a password reset form
added to the login successful page. If an extension prevents showing
the login successful page (like CentralAuth), it should be updated to
show a password change form during the grace period. After the grace
period, the user will not be able to login without changing their
password.
Also prevents a successful reset if the user is "changing" their
password to their existing password.
No passwords will expire by default. Sites will have to call
User->expirePassword() from their own maintenance script to trigger a
password reset for a user.
Bug: 54997
Change-Id: I92a9fc63b409b182b1d7b48781d73fc7216f8061
2013-10-09 18:09:28 +00:00
|
|
|
|
|
2014-03-12 01:47:29 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Test password validity checks. There are 3 checks in core,
|
|
|
|
|
|
* - ensure the password meets the minimal length
|
|
|
|
|
|
* - ensure the password is not the same as the username
|
|
|
|
|
|
* - ensure the username/password combo isn't forbidden
|
|
|
|
|
|
* @covers User::checkPasswordValidity()
|
|
|
|
|
|
* @covers User::getPasswordValidity()
|
|
|
|
|
|
* @covers User::isValidPassword()
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testCheckPasswordValidity() {
|
2014-12-26 16:29:15 +00:00
|
|
|
|
$this->setMwGlobals( array(
|
2015-04-23 01:48:48 +00:00
|
|
|
|
'wgPasswordPolicy' => array(
|
|
|
|
|
|
'policies' => array(
|
|
|
|
|
|
'sysop' => array(
|
|
|
|
|
|
'MinimalPasswordLength' => 8,
|
|
|
|
|
|
'MinimumPasswordLengthToLogin' => 1,
|
|
|
|
|
|
'PasswordCannotMatchUsername' => 1,
|
|
|
|
|
|
),
|
|
|
|
|
|
'default' => array(
|
|
|
|
|
|
'MinimalPasswordLength' => 6,
|
|
|
|
|
|
'PasswordCannotMatchUsername' => true,
|
|
|
|
|
|
'PasswordCannotMatchBlacklist' => true,
|
|
|
|
|
|
'MaximalPasswordLength' => 30,
|
|
|
|
|
|
),
|
|
|
|
|
|
),
|
|
|
|
|
|
'checks' => array(
|
|
|
|
|
|
'MinimalPasswordLength' => 'PasswordPolicyChecks::checkMinimalPasswordLength',
|
|
|
|
|
|
'MinimumPasswordLengthToLogin' => 'PasswordPolicyChecks::checkMinimumPasswordLengthToLogin',
|
|
|
|
|
|
'PasswordCannotMatchUsername' => 'PasswordPolicyChecks::checkPasswordCannotMatchUsername',
|
|
|
|
|
|
'PasswordCannotMatchBlacklist' => 'PasswordPolicyChecks::checkPasswordCannotMatchBlacklist',
|
|
|
|
|
|
'MaximalPasswordLength' => 'PasswordPolicyChecks::checkMaximalPasswordLength',
|
|
|
|
|
|
),
|
|
|
|
|
|
),
|
2014-12-26 16:29:15 +00:00
|
|
|
|
) );
|
2015-04-23 01:48:48 +00:00
|
|
|
|
|
2014-03-12 01:47:29 +00:00
|
|
|
|
$user = User::newFromName( 'Useruser' );
|
|
|
|
|
|
// Sanity
|
|
|
|
|
|
$this->assertTrue( $user->isValidPassword( 'Password1234' ) );
|
|
|
|
|
|
|
|
|
|
|
|
// Minimum length
|
|
|
|
|
|
$this->assertFalse( $user->isValidPassword( 'a' ) );
|
|
|
|
|
|
$this->assertFalse( $user->checkPasswordValidity( 'a' )->isGood() );
|
2014-12-26 16:29:15 +00:00
|
|
|
|
$this->assertTrue( $user->checkPasswordValidity( 'a' )->isOK() );
|
2014-03-12 01:47:29 +00:00
|
|
|
|
$this->assertEquals( 'passwordtooshort', $user->getPasswordValidity( 'a' ) );
|
|
|
|
|
|
|
2014-12-26 16:29:15 +00:00
|
|
|
|
// Maximum length
|
|
|
|
|
|
$longPass = str_repeat( 'a', 31 );
|
|
|
|
|
|
$this->assertFalse( $user->isValidPassword( $longPass ) );
|
|
|
|
|
|
$this->assertFalse( $user->checkPasswordValidity( $longPass )->isGood() );
|
|
|
|
|
|
$this->assertFalse( $user->checkPasswordValidity( $longPass )->isOK() );
|
|
|
|
|
|
$this->assertEquals( 'passwordtoolong', $user->getPasswordValidity( $longPass ) );
|
|
|
|
|
|
|
2014-03-12 01:47:29 +00:00
|
|
|
|
// Matches username
|
|
|
|
|
|
$this->assertFalse( $user->checkPasswordValidity( 'Useruser' )->isGood() );
|
2014-12-26 16:29:15 +00:00
|
|
|
|
$this->assertTrue( $user->checkPasswordValidity( 'Useruser' )->isOK() );
|
2014-03-12 01:47:29 +00:00
|
|
|
|
$this->assertEquals( 'password-name-match', $user->getPasswordValidity( 'Useruser' ) );
|
|
|
|
|
|
|
|
|
|
|
|
// On the forbidden list
|
|
|
|
|
|
$this->assertFalse( $user->checkPasswordValidity( 'Passpass' )->isGood() );
|
|
|
|
|
|
$this->assertEquals( 'password-login-forbidden', $user->getPasswordValidity( 'Passpass' ) );
|
|
|
|
|
|
}
|
2014-08-25 18:24:10 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::getCanonicalName()
|
|
|
|
|
|
* @dataProvider provideGetCanonicalName
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testGetCanonicalName( $name, $expectedArray, $msg ) {
|
|
|
|
|
|
foreach ( $expectedArray as $validate => $expected ) {
|
|
|
|
|
|
$this->assertEquals(
|
|
|
|
|
|
$expected,
|
2015-02-27 05:35:08 +00:00
|
|
|
|
User::getCanonicalName( $name, $validate === 'false' ? false : $validate ),
|
2014-08-25 18:24:10 +00:00
|
|
|
|
$msg . ' (' . $validate . ')'
|
|
|
|
|
|
);
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2014-09-18 01:28:26 +00:00
|
|
|
|
public static function provideGetCanonicalName() {
|
2014-08-25 18:24:10 +00:00
|
|
|
|
return array(
|
2015-02-27 05:35:08 +00:00
|
|
|
|
array( ' Trailing space ', array( 'creatable' => 'Trailing space' ), 'Trailing spaces' ),
|
2014-12-12 08:41:27 +00:00
|
|
|
|
// @todo FIXME: Maybe the creatable name should be 'Talk:Username' or false to reject?
|
2014-08-25 18:24:10 +00:00
|
|
|
|
array( 'Talk:Username', array( 'creatable' => 'Username', 'usable' => 'Username',
|
|
|
|
|
|
'valid' => 'Username', 'false' => 'Talk:Username' ), 'Namespace prefix' ),
|
|
|
|
|
|
array( ' name with # hash', array( 'creatable' => false, 'usable' => false ), 'With hash' ),
|
|
|
|
|
|
array( 'Multi spaces', array( 'creatable' => 'Multi spaces',
|
|
|
|
|
|
'usable' => 'Multi spaces' ), 'Multi spaces' ),
|
|
|
|
|
|
array( 'lowercase', array( 'creatable' => 'Lowercase' ), 'Lowercase' ),
|
|
|
|
|
|
array( 'in[]valid', array( 'creatable' => false, 'usable' => false, 'valid' => false,
|
|
|
|
|
|
'false' => 'In[]valid' ), 'Invalid' ),
|
|
|
|
|
|
array( 'with / slash', array( 'creatable' => false, 'usable' => false, 'valid' => false,
|
|
|
|
|
|
'false' => 'With / slash' ), 'With slash' ),
|
|
|
|
|
|
);
|
|
|
|
|
|
}
|
2014-12-11 08:59:28 +00:00
|
|
|
|
|
2015-01-13 18:25:41 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::equals
|
|
|
|
|
|
*/
|
2014-12-11 08:59:28 +00:00
|
|
|
|
public function testEquals() {
|
|
|
|
|
|
$first = User::newFromName( 'EqualUser' );
|
|
|
|
|
|
$second = User::newFromName( 'EqualUser' );
|
|
|
|
|
|
|
|
|
|
|
|
$this->assertTrue( $first->equals( $first ) );
|
|
|
|
|
|
$this->assertTrue( $first->equals( $second ) );
|
|
|
|
|
|
$this->assertTrue( $second->equals( $first ) );
|
|
|
|
|
|
|
|
|
|
|
|
$third = User::newFromName( '0' );
|
|
|
|
|
|
$fourth = User::newFromName( '000' );
|
|
|
|
|
|
|
|
|
|
|
|
$this->assertFalse( $third->equals( $fourth ) );
|
|
|
|
|
|
$this->assertFalse( $fourth->equals( $third ) );
|
|
|
|
|
|
|
|
|
|
|
|
// Test users loaded from db with id
|
|
|
|
|
|
$user = User::newFromName( 'EqualUnitTestUser' );
|
|
|
|
|
|
if ( !$user->getId() ) {
|
|
|
|
|
|
$user->addToDatabase();
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
$id = $user->getId();
|
|
|
|
|
|
|
|
|
|
|
|
$fifth = User::newFromId( $id );
|
|
|
|
|
|
$sixth = User::newFromName( 'EqualUnitTestUser' );
|
|
|
|
|
|
$this->assertTrue( $fifth->equals( $sixth ) );
|
|
|
|
|
|
}
|
2015-04-02 01:15:50 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::getId
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testGetId() {
|
|
|
|
|
|
$user = User::newFromName( 'UTSysop' );
|
|
|
|
|
|
$this->assertTrue( $user->getId() > 0 );
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::isLoggedIn
|
|
|
|
|
|
* @covers User::isAnon
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testLoggedIn() {
|
|
|
|
|
|
$user = User::newFromName( 'UTSysop' );
|
|
|
|
|
|
$this->assertTrue( $user->isLoggedIn() );
|
|
|
|
|
|
$this->assertFalse( $user->isAnon() );
|
|
|
|
|
|
|
|
|
|
|
|
// Non-existent users are perceived as anonymous
|
|
|
|
|
|
$user = User::newFromName( 'UTNonexistent' );
|
|
|
|
|
|
$this->assertFalse( $user->isLoggedIn() );
|
|
|
|
|
|
$this->assertTrue( $user->isAnon() );
|
|
|
|
|
|
|
|
|
|
|
|
$user = new User;
|
|
|
|
|
|
$this->assertFalse( $user->isLoggedIn() );
|
|
|
|
|
|
$this->assertTrue( $user->isAnon() );
|
|
|
|
|
|
}
|
2015-04-07 20:50:00 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* @covers User::checkAndSetTouched
|
|
|
|
|
|
*/
|
|
|
|
|
|
public function testCheckAndSetTouched() {
|
|
|
|
|
|
$user = TestingAccessWrapper::newFromObject( User::newFromName( 'UTSysop' ) );
|
|
|
|
|
|
$this->assertTrue( $user->isLoggedIn() );
|
|
|
|
|
|
|
|
|
|
|
|
$touched = $user->getDBTouched();
|
|
|
|
|
|
$this->assertTrue(
|
|
|
|
|
|
$user->checkAndSetTouched(), "checkAndSetTouched() succeded" );
|
|
|
|
|
|
$this->assertGreaterThan(
|
|
|
|
|
|
$touched, $user->getDBTouched(), "user_touched increased with casOnTouched()" );
|
|
|
|
|
|
|
|
|
|
|
|
$touched = $user->getDBTouched();
|
|
|
|
|
|
$this->assertTrue(
|
|
|
|
|
|
$user->checkAndSetTouched(), "checkAndSetTouched() succeded #2" );
|
|
|
|
|
|
$this->assertGreaterThan(
|
|
|
|
|
|
$touched, $user->getDBTouched(), "user_touched increased with casOnTouched() #2" );
|
|
|
|
|
|
}
|
2011-07-19 21:41:25 +00:00
|
|
|
|
}
|