2011-03-18 04:23:47 +01:00
< ? php
/**
2011-03-22 10:47:26 +01:00
* @ package cms
2011-03-18 04:23:47 +01:00
* @ subpackage tests
*
* @ todo Test canAddChildren ()
* @ todo Test canCreate ()
*/
class SiteTreePermissionsTest extends FunctionalTest {
2011-03-30 09:04:31 +02:00
static $fixture_file = " SiteTreePermissionsTest.yml " ;
2011-03-18 04:23:47 +01:00
protected $illegalExtensions = array (
'SiteTree' => array ( 'SiteTreeSubsites' )
);
static function set_up_once () {
SiteTreeTest :: set_up_once ();
parent :: set_up_once ();
}
static function tear_down_once () {
SiteTreeTest :: tear_down_once ();
parent :: tear_down_once ();
}
function setUp () {
parent :: setUp ();
$this -> useDraftSite ();
// we're testing HTTP status codes before being redirected to login forms
$this -> autoFollowRedirection = false ;
}
function testAccessingStageWithBlankStage () {
$this -> useDraftSite ( false );
$this -> autoFollowRedirection = false ;
$page = $this -> objFromFixture ( 'Page' , 'draftOnlyPage' );
if ( $member = Member :: currentUser ()) {
$member -> logOut ();
}
$response = $this -> get ( $page -> URLSegment . '?stage=Live' );
$this -> assertEquals ( $response -> getStatusCode (), '404' );
$response = $this -> get ( $page -> URLSegment . '?stage=' );
$this -> assertEquals ( $response -> getStatusCode (), '404' );
// should be prompted for a login
$response = $this -> get ( $page -> URLSegment . '?stage=Stage' );
$this -> assertEquals ( $response -> getStatusCode (), '302' );
$this -> logInWithPermission ( 'ADMIN' );
$response = $this -> get ( $page -> URLSegment . '?stage=Live' );
$this -> assertEquals ( $response -> getStatusCode (), '404' );
$response = $this -> get ( $page -> URLSegment . '?stage=Stage' );
$this -> assertEquals ( $response -> getStatusCode (), '200' );
$response = $this -> get ( $page -> URLSegment . '?stage=' );
$this -> assertEquals ( $response -> getStatusCode (), '404' );
}
function testPermissionCheckingWorksOnDeletedPages () {
// Set up fixture - a published page deleted from draft
$this -> logInWithPermission ( " ADMIN " );
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditOnlySubadminGroup' );
$pageID = $page -> ID ;
$this -> assertTrue ( $page -> doPublish ());
$page -> delete ();
// Re-fetch the page from the live site
$page = Versioned :: get_one_by_stage ( 'SiteTree' , 'Live' , " \" SiteTree \" . \" ID \" = $pageID " );
// subadmin has edit rights on that page
$member = $this -> objFromFixture ( 'Member' , 'subadmin' );
$member -> logIn ();
// Test can_edit_multiple
$this -> assertEquals (
array ( $pageID => true ),
SiteTree :: can_edit_multiple ( array ( $pageID ), $member -> ID )
);
// Test canEdit
$member -> logIn ();
$this -> assertTrue ( $page -> canEdit ());
}
function testPermissionCheckingWorksOnUnpublishedPages () {
// Set up fixture - an unpublished page
$this -> logInWithPermission ( " ADMIN " );
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditOnlySubadminGroup' );
$pageID = $page -> ID ;
$page -> doUnpublish ();
// subadmin has edit rights on that page
$member = $this -> objFromFixture ( 'Member' , 'subadmin' );
$member -> logIn ();
// Test can_edit_multiple
$this -> assertEquals (
array ( $pageID => true ),
SiteTree :: can_edit_multiple ( array ( $pageID ), $member -> ID )
);
// Test canEdit
$member -> logIn ();
$this -> assertTrue ( $page -> canEdit ());
}
function testCanEditOnPageDeletedFromStageAndLiveReturnsFalse () {
// Find a page that exists and delete it from both stage and published
$this -> logInWithPermission ( " ADMIN " );
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditOnlySubadminGroup' );
$pageID = $page -> ID ;
$page -> doUnpublish ();
$page -> delete ();
// We'll need to resurrect the page from the version cache to test this case
$page = Versioned :: get_latest_version ( 'SiteTree' , $pageID );
// subadmin had edit rights on that page, but now it's gone
$member = $this -> objFromFixture ( 'Member' , 'subadmin' );
$member -> logIn ();
$this -> assertFalse ( $page -> canEdit ());
}
function testCanViewStage () {
$page = $this -> objFromFixture ( 'Page' , 'standardpage' );
$editor = $this -> objFromFixture ( 'Member' , 'editor' );
$websiteuser = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$this -> assertTrue ( $page -> canViewStage ( 'Live' , $websiteuser ));
$this -> assertFalse ( $page -> canViewStage ( 'Stage' , $websiteuser ));
$this -> assertTrue ( $page -> canViewStage ( 'Live' , $editor ));
$this -> assertTrue ( $page -> canViewStage ( 'Stage' , $editor ));
}
function testAccessTabOnlyDisplaysWithGrantAccessPermissions () {
$page = $this -> objFromFixture ( 'Page' , 'standardpage' );
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> session () -> inst_set ( 'loggedInAs' , $subadminuser -> ID );
2011-04-15 06:35:19 +02:00
$fields = $page -> getSettingsFields ();
2011-03-18 04:23:47 +01:00
$this -> assertFalse (
$fields -> dataFieldByName ( 'CanViewType' ) -> isReadonly (),
'Users with SITETREE_GRANT_ACCESS permission can change "view" permissions in cms fields'
);
$this -> assertFalse (
$fields -> dataFieldByName ( 'CanEditType' ) -> isReadonly (),
'Users with SITETREE_GRANT_ACCESS permission can change "edit" permissions in cms fields'
);
$editoruser = $this -> objFromFixture ( 'Member' , 'editor' );
$this -> session () -> inst_set ( 'loggedInAs' , $editoruser -> ID );
2011-04-15 06:35:19 +02:00
$fields = $page -> getSettingsFields ();
2011-03-18 04:23:47 +01:00
$this -> assertTrue (
$fields -> dataFieldByName ( 'CanViewType' ) -> isReadonly (),
'Users without SITETREE_GRANT_ACCESS permission cannot change "view" permissions in cms fields'
);
$this -> assertTrue (
$fields -> dataFieldByName ( 'CanEditType' ) -> isReadonly (),
'Users without SITETREE_GRANT_ACCESS permission cannot change "edit" permissions in cms fields'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
}
function testRestrictedViewLoggedInUsers () {
$page = $this -> objFromFixture ( 'Page' , 'restrictedViewLoggedInUsers' );
// unauthenticated users
$this -> assertFalse (
$page -> canView ( FALSE ),
'Unauthenticated members cant view a page marked as "Viewable for any logged in users"'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
$response = $this -> get ( $page -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
302 ,
'Unauthenticated members cant view a page marked as "Viewable for any logged in users"'
);
// website users
$websiteuser = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$this -> assertTrue (
$page -> canView ( $websiteuser ),
'Authenticated members can view a page marked as "Viewable for any logged in users" even if they dont have access to the CMS'
);
$this -> session () -> inst_set ( 'loggedInAs' , $websiteuser -> ID );
$response = $this -> get ( $page -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
200 ,
'Authenticated members can view a page marked as "Viewable for any logged in users" even if they dont have access to the CMS'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
}
function testRestrictedViewOnlyTheseUsers () {
$page = $this -> objFromFixture ( 'Page' , 'restrictedViewOnlyWebsiteUsers' );
// unauthenticcated users
$this -> assertFalse (
$page -> canView ( FALSE ),
'Unauthenticated members cant view a page marked as "Viewable by these groups"'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
$response = $this -> get ( $page -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
302 ,
'Unauthenticated members cant view a page marked as "Viewable by these groups"'
);
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertFalse (
$page -> canView ( $subadminuser ),
'Authenticated members cant view a page marked as "Viewable by these groups" if theyre not in the listed groups'
);
$this -> session () -> inst_set ( 'loggedInAs' , $subadminuser -> ID );
$response = $this -> get ( $page -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
403 ,
'Authenticated members cant view a page marked as "Viewable by these groups" if theyre not in the listed groups'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
// website users
$websiteuser = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$this -> assertTrue (
$page -> canView ( $websiteuser ),
'Authenticated members can view a page marked as "Viewable by these groups" if theyre in the listed groups'
);
$this -> session () -> inst_set ( 'loggedInAs' , $websiteuser -> ID );
$response = $this -> get ( $page -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
200 ,
'Authenticated members can view a page marked as "Viewable by these groups" if theyre in the listed groups'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
}
function testRestrictedEditLoggedInUsers () {
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditLoggedInUsers' );
// unauthenticcated users
$this -> assertFalse (
$page -> canEdit ( FALSE ),
'Unauthenticated members cant edit a page marked as "Editable by logged in users"'
);
// website users
$websiteuser = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$websiteuser -> logIn ();
$this -> assertFalse (
$page -> canEdit ( $websiteuser ),
'Authenticated members cant edit a page marked as "Editable by logged in users" if they dont have cms permissions'
);
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertTrue (
$page -> canEdit ( $subadminuser ),
'Authenticated members can edit a page marked as "Editable by logged in users" if they have cms permissions and belong to any of these groups'
);
}
function testRestrictedEditOnlySubadminGroup () {
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditOnlySubadminGroup' );
// unauthenticated users
$this -> assertFalse (
$page -> canEdit ( FALSE ),
'Unauthenticated members cant edit a page marked as "Editable by these groups"'
);
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertTrue (
$page -> canEdit ( $subadminuser ),
'Authenticated members can view a page marked as "Editable by these groups" if theyre in the listed groups'
);
// website users
$websiteuser = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$this -> assertFalse (
$page -> canEdit ( $websiteuser ),
'Authenticated members cant edit a page marked as "Editable by these groups" if theyre not in the listed groups'
);
}
function testRestrictedViewInheritance () {
$parentPage = $this -> objFromFixture ( 'Page' , 'parent_restrictedViewOnlySubadminGroup' );
$childPage = $this -> objFromFixture ( 'Page' , 'child_restrictedViewOnlySubadminGroup' );
// unauthenticated users
$this -> assertFalse (
$childPage -> canView ( FALSE ),
'Unauthenticated members cant view a page marked as "Viewable by these groups" by inherited permission'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
$response = $this -> get ( $childPage -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
302 ,
'Unauthenticated members cant view a page marked as "Viewable by these groups" by inherited permission'
);
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertTrue (
$childPage -> canView ( $subadminuser ),
'Authenticated members can view a page marked as "Viewable by these groups" if theyre in the listed groups by inherited permission'
);
$this -> session () -> inst_set ( 'loggedInAs' , $subadminuser -> ID );
$response = $this -> get ( $childPage -> RelativeLink ());
$this -> assertEquals (
$response -> getStatusCode (),
200 ,
'Authenticated members can view a page marked as "Viewable by these groups" if theyre in the listed groups by inherited permission'
);
$this -> session () -> inst_set ( 'loggedInAs' , null );
}
function testRestrictedEditInheritance () {
$parentPage = $this -> objFromFixture ( 'Page' , 'parent_restrictedEditOnlySubadminGroup' );
$childPage = $this -> objFromFixture ( 'Page' , 'child_restrictedEditOnlySubadminGroup' );
// unauthenticated users
$this -> assertFalse (
$childPage -> canEdit ( FALSE ),
'Unauthenticated members cant edit a page marked as "Editable by these groups" by inherited permission'
);
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertTrue (
$childPage -> canEdit ( $subadminuser ),
'Authenticated members can edit a page marked as "Editable by these groups" if theyre in the listed groups by inherited permission'
);
}
function testDeleteRestrictedChild () {
$parentPage = $this -> objFromFixture ( 'Page' , 'deleteTestParentPage' );
$childPage = $this -> objFromFixture ( 'Page' , 'deleteTestChildPage' );
// unauthenticated users
$this -> assertFalse (
$parentPage -> canDelete ( FALSE ),
'Unauthenticated members cant delete a page if it doesnt have delete permissions on any of its descendants'
);
$this -> assertFalse (
$childPage -> canDelete ( FALSE ),
'Unauthenticated members cant delete a child page marked as "Editable by these groups"'
);
}
function testRestrictedEditLoggedInUsersDeletedFromStage () {
$page = $this -> objFromFixture ( 'Page' , 'restrictedEditLoggedInUsers' );
$pageID = $page -> ID ;
$this -> logInWithPermission ( " ADMIN " );
$page -> doPublish ();
$page -> deleteFromStage ( 'Stage' );
// Get the live version of the page
$page = Versioned :: get_one_by_stage ( " SiteTree " , " Live " , " \" SiteTree \" . \" ID \" = $pageID " );
$this -> assertTrue ( is_object ( $page ), 'Versioned::get_one_by_stage() is returning an object' );
// subadmin users
$subadminuser = $this -> objFromFixture ( 'Member' , 'subadmin' );
$this -> assertTrue (
$page -> canEdit ( $subadminuser ),
'Authenticated members can edit a page that was deleted from stage and marked as "Editable by logged in users" if they have cms permissions and belong to any of these groups'
);
}
function testInheritCanViewFromSiteConfig () {
$page = $this -> objFromFixture ( 'Page' , 'inheritWithNoParent' );
$siteconfig = $this -> objFromFixture ( 'SiteConfig' , 'default' );
$editor = $this -> objFromFixture ( 'Member' , 'editor' );
$editorGroup = $this -> objFromFixture ( 'Group' , 'editorgroup' );
$siteconfig -> CanViewType = 'Anyone' ;
$siteconfig -> write ();
$this -> assertTrue ( $page -> canView ( FALSE ), 'Anyone can view a page when set to inherit from the SiteConfig, and SiteConfig has canView set to LoggedInUsers' );
$siteconfig -> CanViewType = 'LoggedInUsers' ;
$siteconfig -> write ();
$this -> assertFalse ( $page -> canView ( FALSE ), 'Anonymous can\'t view a page when set to inherit from the SiteConfig, and SiteConfig has canView set to LoggedInUsers' );
$siteconfig -> CanViewType = 'LoggedInUsers' ;
$siteconfig -> write ();
$this -> assertTrue ( $page -> canView ( $editor ), 'Users can view a page when set to inherit from the SiteConfig, and SiteConfig has canView set to LoggedInUsers' );
$siteconfig -> CanViewType = 'OnlyTheseUsers' ;
$siteconfig -> ViewerGroups () -> add ( $editorGroup );
$siteconfig -> write ();
$this -> assertTrue ( $page -> canView ( $editor ), 'Editors can view a page when set to inherit from the SiteConfig, and SiteConfig has canView set to OnlyTheseUsers' );
$this -> assertFalse ( $page -> canView ( FALSE ), 'Anonymous can\'t view a page when set to inherit from the SiteConfig, and SiteConfig has canView set to OnlyTheseUsers' );
}
function testInheritCanEditFromSiteConfig () {
$page = $this -> objFromFixture ( 'Page' , 'inheritWithNoParent' );
$siteconfig = $this -> objFromFixture ( 'SiteConfig' , 'default' );
$editor = $this -> objFromFixture ( 'Member' , 'editor' );
$user = $this -> objFromFixture ( 'Member' , 'websiteuser' );
$editorGroup = $this -> objFromFixture ( 'Group' , 'editorgroup' );
$siteconfig -> CanEditType = 'LoggedInUsers' ;
$siteconfig -> write ();
$this -> assertFalse ( $page -> canEdit ( FALSE ), 'Anonymous can\'t edit a page when set to inherit from the SiteConfig, and SiteConfig has canEdit set to LoggedInUsers' );
$this -> session () -> inst_set ( 'loggedInAs' , $editor -> ID );
$this -> assertTrue ( $page -> canEdit (), 'Users can edit a page when set to inherit from the SiteConfig, and SiteConfig has canEdit set to LoggedInUsers' );
$siteconfig -> CanEditType = 'OnlyTheseUsers' ;
$siteconfig -> EditorGroups () -> add ( $editorGroup );
$siteconfig -> write ();
$this -> assertTrue ( $page -> canEdit ( $editor ), 'Editors can edit a page when set to inherit from the SiteConfig, and SiteConfig has canEdit set to OnlyTheseUsers' );
$this -> session () -> inst_set ( 'loggedInAs' , null );
$this -> assertFalse ( $page -> canEdit ( FALSE ), 'Anonymous can\'t edit a page when set to inherit from the SiteConfig, and SiteConfig has canEdit set to OnlyTheseUsers' );
$this -> session () -> inst_set ( 'loggedInAs' , $user -> ID );
$this -> assertFalse ( $page -> canEdit ( $user ), 'Website user can\'t edit a page when set to inherit from the SiteConfig, and SiteConfig has canEdit set to OnlyTheseUsers' );
}
}
?>