Merge "Disable Cucumber scenarios that are broken in daily Jenkins jobs"
[lhc/web/wiklou.git] / tests / phpunit / includes / session / BotPasswordSessionProviderTest.php
1 <?php
2
3 namespace MediaWiki\Session;
4
5 use Psr\Log\LogLevel;
6 use MediaWikiTestCase;
7 use User;
8
9 /**
10 * @group Session
11 * @group Database
12 * @covers MediaWiki\Session\BotPasswordSessionProvider
13 */
14 class BotPasswordSessionProviderTest extends MediaWikiTestCase {
15
16 private $config;
17
18 private function getProvider( $name = null, $prefix = null ) {
19 global $wgSessionProviders;
20
21 $params = [
22 'priority' => 40,
23 'sessionCookieName' => $name,
24 'sessionCookieOptions' => [],
25 ];
26 if ( $prefix !== null ) {
27 $params['sessionCookieOptions']['prefix'] = $prefix;
28 }
29
30 if ( !$this->config ) {
31 $this->config = new \HashConfig( [
32 'CookiePrefix' => 'wgCookiePrefix',
33 'EnableBotPasswords' => true,
34 'BotPasswordsDatabase' => false,
35 'SessionProviders' => $wgSessionProviders + [
36 BotPasswordSessionProvider::class => [
37 'class' => BotPasswordSessionProvider::class,
38 'args' => [ $params ],
39 ]
40 ],
41 ] );
42 }
43 $manager = new SessionManager( [
44 'config' => new \MultiConfig( [ $this->config, \RequestContext::getMain()->getConfig() ] ),
45 'logger' => new \Psr\Log\NullLogger,
46 'store' => new TestBagOStuff,
47 ] );
48
49 return $manager->getProvider( BotPasswordSessionProvider::class );
50 }
51
52 protected function setUp() {
53 parent::setUp();
54
55 $this->setMwGlobals( [
56 'wgEnableBotPasswords' => true,
57 'wgBotPasswordsDatabase' => false,
58 'wgCentralIdLookupProvider' => 'local',
59 'wgGrantPermissions' => [
60 'test' => [ 'read' => true ],
61 ],
62 ] );
63 }
64
65 public function addDBDataOnce() {
66 $passwordFactory = new \PasswordFactory();
67 $passwordFactory->init( \RequestContext::getMain()->getConfig() );
68 $passwordHash = $passwordFactory->newFromPlaintext( 'foobaz' );
69
70 $userId = \CentralIdLookup::factory( 'local' )->centralIdFromName( 'UTSysop' );
71
72 $dbw = wfGetDB( DB_MASTER );
73 $dbw->delete(
74 'bot_passwords',
75 [ 'bp_user' => $userId, 'bp_app_id' => 'BotPasswordSessionProvider' ],
76 __METHOD__
77 );
78 $dbw->insert(
79 'bot_passwords',
80 [
81 'bp_user' => $userId,
82 'bp_app_id' => 'BotPasswordSessionProvider',
83 'bp_password' => $passwordHash->toString(),
84 'bp_token' => 'token!',
85 'bp_restrictions' => '{"IPAddresses":["127.0.0.0/8"]}',
86 'bp_grants' => '["test"]',
87 ],
88 __METHOD__
89 );
90 }
91
92 public function testConstructor() {
93 try {
94 $provider = new BotPasswordSessionProvider();
95 $this->fail( 'Expected exception not thrown' );
96 } catch ( \InvalidArgumentException $ex ) {
97 $this->assertSame(
98 'MediaWiki\\Session\\BotPasswordSessionProvider::__construct: priority must be specified',
99 $ex->getMessage()
100 );
101 }
102
103 try {
104 $provider = new BotPasswordSessionProvider( [
105 'priority' => SessionInfo::MIN_PRIORITY - 1
106 ] );
107 $this->fail( 'Expected exception not thrown' );
108 } catch ( \InvalidArgumentException $ex ) {
109 $this->assertSame(
110 'MediaWiki\\Session\\BotPasswordSessionProvider::__construct: Invalid priority',
111 $ex->getMessage()
112 );
113 }
114
115 try {
116 $provider = new BotPasswordSessionProvider( [
117 'priority' => SessionInfo::MAX_PRIORITY + 1
118 ] );
119 $this->fail( 'Expected exception not thrown' );
120 } catch ( \InvalidArgumentException $ex ) {
121 $this->assertSame(
122 'MediaWiki\\Session\\BotPasswordSessionProvider::__construct: Invalid priority',
123 $ex->getMessage()
124 );
125 }
126
127 $provider = new BotPasswordSessionProvider( [
128 'priority' => 40
129 ] );
130 $priv = \TestingAccessWrapper::newFromObject( $provider );
131 $this->assertSame( 40, $priv->priority );
132 $this->assertSame( '_BPsession', $priv->sessionCookieName );
133 $this->assertSame( [], $priv->sessionCookieOptions );
134
135 $provider = new BotPasswordSessionProvider( [
136 'priority' => 40,
137 'sessionCookieName' => null,
138 ] );
139 $priv = \TestingAccessWrapper::newFromObject( $provider );
140 $this->assertSame( '_BPsession', $priv->sessionCookieName );
141
142 $provider = new BotPasswordSessionProvider( [
143 'priority' => 40,
144 'sessionCookieName' => 'Foo',
145 'sessionCookieOptions' => [ 'Bar' ],
146 ] );
147 $priv = \TestingAccessWrapper::newFromObject( $provider );
148 $this->assertSame( 'Foo', $priv->sessionCookieName );
149 $this->assertSame( [ 'Bar' ], $priv->sessionCookieOptions );
150 }
151
152 public function testBasics() {
153 $provider = $this->getProvider();
154
155 $this->assertTrue( $provider->persistsSessionId() );
156 $this->assertFalse( $provider->canChangeUser() );
157
158 $this->assertNull( $provider->newSessionInfo() );
159 $this->assertNull( $provider->newSessionInfo( 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa' ) );
160 }
161
162 public function testProvideSessionInfo() {
163 $provider = $this->getProvider();
164 $request = new \FauxRequest;
165 $request->setCookie( '_BPsession', 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'wgCookiePrefix' );
166
167 if ( !defined( 'MW_API' ) ) {
168 $this->assertNull( $provider->provideSessionInfo( $request ) );
169 define( 'MW_API', 1 );
170 }
171
172 $info = $provider->provideSessionInfo( $request );
173 $this->assertInstanceOf( SessionInfo::class, $info );
174 $this->assertSame( 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', $info->getId() );
175
176 $this->config->set( 'EnableBotPasswords', false );
177 $this->assertNull( $provider->provideSessionInfo( $request ) );
178 $this->config->set( 'EnableBotPasswords', true );
179
180 $this->assertNull( $provider->provideSessionInfo( new \FauxRequest ) );
181 }
182
183 public function testNewSessionInfoForRequest() {
184 $provider = $this->getProvider();
185 $user = \User::newFromName( 'UTSysop' );
186 $request = $this->getMock( 'FauxRequest', [ 'getIP' ] );
187 $request->expects( $this->any() )->method( 'getIP' )
188 ->will( $this->returnValue( '127.0.0.1' ) );
189 $bp = \BotPassword::newFromUser( $user, 'BotPasswordSessionProvider' );
190
191 $session = $provider->newSessionForRequest( $user, $bp, $request );
192 $this->assertInstanceOf( Session::class, $session );
193
194 $this->assertEquals( $session->getId(), $request->getSession()->getId() );
195 $this->assertEquals( $user->getName(), $session->getUser()->getName() );
196
197 $this->assertEquals( [
198 'centralId' => $bp->getUserCentralId(),
199 'appId' => $bp->getAppId(),
200 'token' => $bp->getToken(),
201 'rights' => [ 'read' ],
202 ], $session->getProviderMetadata() );
203
204 $this->assertEquals( [ 'read' ], $session->getAllowedUserRights() );
205 }
206
207 public function testCheckSessionInfo() {
208 $logger = new \TestLogger( true );
209 $provider = $this->getProvider();
210 $provider->setLogger( $logger );
211
212 $user = \User::newFromName( 'UTSysop' );
213 $request = $this->getMock( 'FauxRequest', [ 'getIP' ] );
214 $request->expects( $this->any() )->method( 'getIP' )
215 ->will( $this->returnValue( '127.0.0.1' ) );
216 $bp = \BotPassword::newFromUser( $user, 'BotPasswordSessionProvider' );
217
218 $data = [
219 'provider' => $provider,
220 'id' => 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa',
221 'userInfo' => UserInfo::newFromUser( $user, true ),
222 'persisted' => false,
223 'metadata' => [
224 'centralId' => $bp->getUserCentralId(),
225 'appId' => $bp->getAppId(),
226 'token' => $bp->getToken(),
227 ],
228 ];
229 $dataMD = $data['metadata'];
230
231 foreach ( array_keys( $data['metadata'] ) as $key ) {
232 $data['metadata'] = $dataMD;
233 unset( $data['metadata'][$key] );
234 $info = new SessionInfo( SessionInfo::MIN_PRIORITY, $data );
235 $metadata = $info->getProviderMetadata();
236
237 $this->assertFalse( $provider->refreshSessionInfo( $info, $request, $metadata ) );
238 $this->assertSame( [
239 [ LogLevel::INFO, 'Session "{session}": Missing metadata: {missing}' ]
240 ], $logger->getBuffer() );
241 $logger->clearBuffer();
242 }
243
244 $data['metadata'] = $dataMD;
245 $data['metadata']['appId'] = 'Foobar';
246 $info = new SessionInfo( SessionInfo::MIN_PRIORITY, $data );
247 $metadata = $info->getProviderMetadata();
248 $this->assertFalse( $provider->refreshSessionInfo( $info, $request, $metadata ) );
249 $this->assertSame( [
250 [ LogLevel::INFO, 'Session "{session}": No BotPassword for {centralId} {appId}' ],
251 ], $logger->getBuffer() );
252 $logger->clearBuffer();
253
254 $data['metadata'] = $dataMD;
255 $data['metadata']['token'] = 'Foobar';
256 $info = new SessionInfo( SessionInfo::MIN_PRIORITY, $data );
257 $metadata = $info->getProviderMetadata();
258 $this->assertFalse( $provider->refreshSessionInfo( $info, $request, $metadata ) );
259 $this->assertSame( [
260 [ LogLevel::INFO, 'Session "{session}": BotPassword token check failed' ],
261 ], $logger->getBuffer() );
262 $logger->clearBuffer();
263
264 $request2 = $this->getMock( 'FauxRequest', [ 'getIP' ] );
265 $request2->expects( $this->any() )->method( 'getIP' )
266 ->will( $this->returnValue( '10.0.0.1' ) );
267 $data['metadata'] = $dataMD;
268 $info = new SessionInfo( SessionInfo::MIN_PRIORITY, $data );
269 $metadata = $info->getProviderMetadata();
270 $this->assertFalse( $provider->refreshSessionInfo( $info, $request2, $metadata ) );
271 $this->assertSame( [
272 [ LogLevel::INFO, 'Session "{session}": Restrictions check failed' ],
273 ], $logger->getBuffer() );
274 $logger->clearBuffer();
275
276 $info = new SessionInfo( SessionInfo::MIN_PRIORITY, $data );
277 $metadata = $info->getProviderMetadata();
278 $this->assertTrue( $provider->refreshSessionInfo( $info, $request, $metadata ) );
279 $this->assertSame( [], $logger->getBuffer() );
280 $this->assertEquals( $dataMD + [ 'rights' => [ 'read' ] ], $metadata );
281 }
282
283 public function testGetAllowedUserRights() {
284 $logger = new \TestLogger( true );
285 $provider = $this->getProvider();
286 $provider->setLogger( $logger );
287
288 $backend = TestUtils::getDummySessionBackend();
289 $backendPriv = \TestingAccessWrapper::newFromObject( $backend );
290
291 try {
292 $provider->getAllowedUserRights( $backend );
293 $this->fail( 'Expected exception not thrown' );
294 } catch ( \InvalidArgumentException $ex ) {
295 $this->assertSame( 'Backend\'s provider isn\'t $this', $ex->getMessage() );
296 }
297
298 $backendPriv->provider = $provider;
299 $backendPriv->providerMetadata = [ 'rights' => [ 'foo', 'bar', 'baz' ] ];
300 $this->assertSame( [ 'foo', 'bar', 'baz' ], $provider->getAllowedUserRights( $backend ) );
301 $this->assertSame( [], $logger->getBuffer() );
302
303 $backendPriv->providerMetadata = [ 'foo' => 'bar' ];
304 $this->assertSame( [], $provider->getAllowedUserRights( $backend ) );
305 $this->assertSame( [
306 [
307 LogLevel::DEBUG,
308 'MediaWiki\\Session\\BotPasswordSessionProvider::getAllowedUserRights: ' .
309 'No provider metadata, returning no rights allowed'
310 ]
311 ], $logger->getBuffer() );
312 $logger->clearBuffer();
313
314 $backendPriv->providerMetadata = [ 'rights' => 'bar' ];
315 $this->assertSame( [], $provider->getAllowedUserRights( $backend ) );
316 $this->assertSame( [
317 [
318 LogLevel::DEBUG,
319 'MediaWiki\\Session\\BotPasswordSessionProvider::getAllowedUserRights: ' .
320 'No provider metadata, returning no rights allowed'
321 ]
322 ], $logger->getBuffer() );
323 $logger->clearBuffer();
324
325 $backendPriv->providerMetadata = null;
326 $this->assertSame( [], $provider->getAllowedUserRights( $backend ) );
327 $this->assertSame( [
328 [
329 LogLevel::DEBUG,
330 'MediaWiki\\Session\\BotPasswordSessionProvider::getAllowedUserRights: ' .
331 'No provider metadata, returning no rights allowed'
332 ]
333 ], $logger->getBuffer() );
334 $logger->clearBuffer();
335 }
336 }