X-Git-Url: http://source.bookstackapp.com/bookstack/blobdiff_plain/75a4fc905ba3bb6a8b011caf7354b208256841f5..refs/pull/5721/head:/tests/TestCase.php diff --git a/tests/TestCase.php b/tests/TestCase.php index 5d0545b66..a8636fb15 100644 --- a/tests/TestCase.php +++ b/tests/TestCase.php @@ -1,20 +1,58 @@ entities = new EntityProvider(); + $this->users = new UserRoleProvider(); + $this->permissions = new PermissionsProvider($this->users); + $this->files = new FileProvider(); + + parent::setUp(); + + // We can uncomment the below to run tests with failings upon deprecations. + // Can't leave on since some deprecations can only be fixed upstream. + // $this->withoutDeprecationHandling(); + } /** * The base URL to use while testing the application. - * - * @var string */ - protected $baseUrl = 'http://localhost'; - private $admin; + protected string $baseUrl = 'http://localhost'; /** * Creates the application. @@ -23,177 +61,210 @@ class TestCase extends Illuminate\Foundation\Testing\TestCase */ public function createApplication() { - $app = require __DIR__.'/../bootstrap/app.php'; - - $app->make(Illuminate\Contracts\Console\Kernel::class)->bootstrap(); + /** @var \Illuminate\Foundation\Application $app */ + $app = require __DIR__ . '/../bootstrap/app.php'; + $app->register(TestServiceProvider::class); + $app->make(Kernel::class)->bootstrap(); return $app; } + /** + * Set the current user context to be an admin. + */ public function asAdmin() { - if($this->admin === null) { - $adminRole = \BookStack\Role::getRole('admin'); - $this->admin = $adminRole->users->first(); - } - return $this->actingAs($this->admin); + return $this->actingAs($this->users->admin()); } /** - * Quickly sets an array of settings. - * @param $settingsArray + * Set the current user context to be an editor. */ - protected function setSettings($settingsArray) + public function asEditor() { - $settings = app('BookStack\Services\SettingService'); - foreach ($settingsArray as $key => $value) { - $settings->put($key, $value); - } + return $this->actingAs($this->users->editor()); } /** - * Create a group of entities that belong to a specific user. - * @param $creatorUser - * @param $updaterUser - * @return array + * Set the current user context to be a viewer. */ - protected function createEntityChainBelongingToUser($creatorUser, $updaterUser = false) + public function asViewer() { - if ($updaterUser === false) $updaterUser = $creatorUser; - $book = factory(BookStack\Book::class)->create(['created_by' => $creatorUser->id, 'updated_by' => $updaterUser->id]); - $chapter = factory(BookStack\Chapter::class)->create(['created_by' => $creatorUser->id, 'updated_by' => $updaterUser->id]); - $page = factory(BookStack\Page::class)->create(['created_by' => $creatorUser->id, 'updated_by' => $updaterUser->id, 'book_id' => $book->id]); - $book->chapters()->saveMany([$chapter]); - $chapter->pages()->saveMany([$page]); - $restrictionService = $this->app[\BookStack\Services\PermissionService::class]; - $restrictionService->buildJointPermissionsForEntity($book); - return [ - 'book' => $book, - 'chapter' => $chapter, - 'page' => $page - ]; + return $this->actingAs($this->users->viewer()); } /** - * Quick way to create a new user - * @param array $attributes - * @return mixed + * Quickly sets an array of settings. */ - protected function getNewUser($attributes = []) + protected function setSettings(array $settingsArray): void { - $user = factory(\BookStack\User::class)->create($attributes); - $role = \BookStack\Role::getRole('editor'); - $user->attachRole($role);; - return $user; + $settings = app(SettingService::class); + foreach ($settingsArray as $key => $value) { + $settings->put($key, $value); + } } /** - * Quick way to create a new user without any permissions - * @param array $attributes - * @return mixed + * Mock the http client used in BookStack http calls. */ - protected function getNewBlankUser($attributes = []) + protected function mockHttpClient(array $responses = []): HttpClientHistory { - $user = factory(\BookStack\User::class)->create($attributes); - return $user; + return $this->app->make(HttpRequestService::class)->mockClient($responses); } /** - * Assert that a given string is seen inside an element. - * - * @param bool|string|null $element - * @param integer $position - * @param string $text - * @param bool $negate - * @return $this + * Run a set test with the given env variable. + * Remembers the original and resets the value after test. + * Database config is juggled so the value can be restored when + * parallel testing are used, where multiple databases exist. */ - protected function seeInNthElement($element, $position, $text, $negate = false) + protected function runWithEnv(array $valuesByKey, callable $callback, bool $handleDatabase = true): void { - $method = $negate ? 'assertNotRegExp' : 'assertRegExp'; + Env::disablePutenv(); + $originals = []; + foreach ($valuesByKey as $key => $value) { + $originals[$key] = $_SERVER[$key] ?? null; - $rawPattern = preg_quote($text, '/'); + if (is_null($value)) { + unset($_SERVER[$key]); + } else { + $_SERVER[$key] = $value; + } + } - $escapedPattern = preg_quote(e($text), '/'); + $database = config('database.connections.mysql_testing.database'); + $this->refreshApplication(); - $content = $this->crawler->filter($element)->eq($position)->html(); + if ($handleDatabase) { + DB::purge(); + config()->set('database.connections.mysql_testing.database', $database); + DB::beginTransaction(); + } - $pattern = $rawPattern == $escapedPattern - ? $rawPattern : "({$rawPattern}|{$escapedPattern})"; + $callback(); - $this->$method("/$pattern/i", $content); + if ($handleDatabase) { + DB::rollBack(); + } - return $this; + foreach ($originals as $key => $value) { + if (is_null($value)) { + unset($_SERVER[$key]); + } else { + $_SERVER[$key] = $value; + } + } } /** - * Assert that the current page matches a given URI. - * - * @param string $uri - * @return $this + * Check the keys and properties in the given map to include + * exist, albeit not exclusively, within the map to check. */ - protected function seePageUrlIs($uri) + protected function assertArrayMapIncludes(array $mapToInclude, array $mapToCheck, string $message = ''): void { - $this->assertEquals( - $uri, $this->currentUri, "Did not land on expected page [{$uri}].\n" - ); + $passed = true; - return $this; + foreach ($mapToInclude as $key => $value) { + if (!isset($mapToCheck[$key]) || $mapToCheck[$key] !== $mapToInclude[$key]) { + $passed = false; + } + } + + $toIncludeStr = print_r($mapToInclude, true); + $toCheckStr = print_r($mapToCheck, true); + self::assertThat($passed, self::isTrue(), "Failed asserting that given map:\n\n{$toCheckStr}\n\nincludes:\n\n{$toIncludeStr}"); } /** - * Do a forced visit that does not error out on exception. - * @param string $uri - * @param array $parameters - * @param array $cookies - * @param array $files - * @return $this + * Assert a permission error has occurred. */ - protected function forceVisit($uri, $parameters = [], $cookies = [], $files = []) + protected function assertPermissionError($response) { - $method = 'GET'; - $uri = $this->prepareUrlForRequest($uri); - $this->call($method, $uri, $parameters, $cookies, $files); - $this->clearInputs()->followRedirects(); - $this->currentUri = $this->app->make('request')->fullUrl(); - $this->crawler = new Crawler($this->response->getContent(), $uri); - return $this; + PHPUnit::assertTrue($this->isPermissionError($response->baseResponse ?? $response->response), 'Failed asserting the response contains a permission error.'); } /** - * Click the text within the selected element. - * @param $parentElement - * @param $linkText - * @return $this + * Assert a permission error has occurred. */ - protected function clickInElement($parentElement, $linkText) + protected function assertNotPermissionError($response) { - $elem = $this->crawler->filter($parentElement); - $link = $elem->selectLink($linkText); - $this->visit($link->link()->getUri()); - return $this; + PHPUnit::assertFalse($this->isPermissionError($response->baseResponse ?? $response->response), 'Failed asserting the response does not contain a permission error.'); } /** - * Check if the page contains the given element. - * @param string $selector - * @return bool + * Check if the given response is a permission error. */ - protected function pageHasElement($selector) + private function isPermissionError($response): bool { - $elements = $this->crawler->filter($selector); - $this->assertTrue(count($elements) > 0, "The page does not contain an element matching " . $selector); - return $this; + if ($response->status() === 403 && $response instanceof JsonResponse) { + $errMessage = $response->getData(true)['error']['message'] ?? ''; + return $errMessage === 'You do not have permission to perform the requested action.'; + } + + return $response->status() === 302 + && $response->headers->get('Location') === url('/') + && str_starts_with(session()->pull('error', ''), 'You do not have permission to access'); + } + + /** + * Assert that the session has a particular error notification message set. + */ + protected function assertSessionError(string $message) + { + $error = session()->get('error'); + PHPUnit::assertTrue($error === $message, "Failed asserting the session contains an error. \nFound: {$error}\nExpecting: {$message}"); } /** - * Check if the page contains the given element. - * @param string $selector - * @return bool + * Assert the session contains a specific entry. */ - protected function pageNotHasElement($selector) + protected function assertSessionHas(string $key): self { - $elements = $this->crawler->filter($selector); - $this->assertFalse(count($elements) > 0, "The page contains " . count($elements) . " elements matching " . $selector); + $this->assertTrue(session()->has($key), "Session does not contain a [{$key}] entry"); + return $this; } + + protected function assertNotificationContains(\Illuminate\Testing\TestResponse $resp, string $text) + { + return $this->withHtml($resp)->assertElementContains('.notification[role="alert"]', $text); + } + + /** + * Set a test handler as the logging interface for the application. + * Allows capture of logs for checking against during tests. + */ + protected function withTestLogger(): TestHandler + { + $monolog = new Logger('testing'); + $testHandler = new TestHandler(); + $monolog->pushHandler($testHandler); + + Log::extend('testing', function () use ($monolog) { + return $monolog; + }); + Log::setDefaultDriver('testing'); + + return $testHandler; + } + + /** + * Assert that an activity entry exists of the given key. + * Checks the activity belongs to the given entity if provided. + */ + protected function assertActivityExists(string $type, ?Entity $entity = null, string $detail = '') + { + $detailsToCheck = ['type' => $type]; + + if ($entity) { + $detailsToCheck['loggable_type'] = $entity->getMorphClass(); + $detailsToCheck['loggable_id'] = $entity->id; + } + + if ($detail) { + $detailsToCheck['detail'] = $detail; + } + + $this->assertDatabaseHas('activities', $detailsToCheck); + } }