mirror of
https://github.com/silverstripe/silverstripe-framework
synced 2024-10-22 14:05:37 +02:00
3873e4ba00
See https://github.com/silverstripe/silverstripe-framework/pull/7037 and https://github.com/silverstripe/silverstripe-framework/issues/6681 Squashed commit of the following: commit8f65e56532
Author: Ingo Schommer <me@chillu.com> Date: Thu Jun 22 22:25:50 2017 +1200 Fixed upgrade guide spelling commit76f95944fa
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 16:38:34 2017 +1200 BUG Fix non-test class manifest including sapphiretest / functionaltest commit9379834cb4
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 15:50:47 2017 +1200 BUG Fix nesting bug in Kernel commit188ce35d82
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 15:14:51 2017 +1200 BUG fix db bootstrapping issues commit7ed4660e7a
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 14:49:07 2017 +1200 BUG Fix issue in DetailedErrorFormatter commit738f50c497
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 11:49:19 2017 +1200 Upgrading notes on mysite/_config.php commit6279d28e5e
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 11:43:28 2017 +1200 Update developer documentation commit5c90d53a84
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 22 10:48:44 2017 +1200 Update installer to not use global databaseConfig commitf9b2ba4755
Author: Damian Mooyman <damian@silverstripe.com> Date: Wed Jun 21 21:04:39 2017 +1200 Fix behat issues commit5b59a912b6
Author: Damian Mooyman <damian@silverstripe.com> Date: Wed Jun 21 17:07:11 2017 +1200 Move HTTPApplication to SilverStripe\Control namespace commite2c4a18f63
Author: Damian Mooyman <damian@silverstripe.com> Date: Wed Jun 21 16:29:03 2017 +1200 More documentation Fix up remaining tests Refactor temp DB into TempDatabase class so it’s available outside of unit tests. commit5d235e64f3
Author: Damian Mooyman <damian@silverstripe.com> Date: Wed Jun 21 12:13:15 2017 +1200 API HTTPRequestBuilder::createFromEnvironment() now cleans up live globals BUG Fix issue with SSViewer Fix Security / View tests commitd88d4ed4e4
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 20 16:39:43 2017 +1200 API Refactor AppKernel into CoreKernel commitf7946aec33
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 20 16:00:40 2017 +1200 Docs and minor cleanup commit12bd31f936
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 20 15:34:34 2017 +1200 API Remove OutputMiddleware API Move environment / global / ini management into Environment class API Move getTempFolder into TempFolder class API Implement HTTPRequestBuilder / CLIRequestBuilder BUG Restore SS_ALLOWED_HOSTS check in original location API CoreKernel now requires $basePath to be passed in API Refactor installer.php to use application to bootstrap API move memstring conversion globals to Convert BUG Fix error in CoreKernel nesting not un-nesting itself properly. commitbba9791146
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 19 18:07:53 2017 +1200 API Create HTTPMiddleware and standardise middleware for request handling commit2a10c2397b
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 19 17:42:42 2017 +1200 Fixed ORM tests commitd75a8d1d93
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 19 17:15:07 2017 +1200 FIx i18n tests commit06364af3c3
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 19 16:59:34 2017 +1200 Fix controller namespace Move states to sub namespace commit2a278e2953
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 19 12:49:45 2017 +1200 Fix forms namespace commitb65c21241b
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 15 18:56:48 2017 +1200 Update API usages commitd1d4375c95
Author: Damian Mooyman <damian@silverstripe.com> Date: Thu Jun 15 18:41:44 2017 +1200 API Refactor $flush into HTPPApplication API Enforce health check in Controller::pushCurrent() API Better global backup / restore Updated Director::test() to use new API commitb220534f06
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 22:05:57 2017 +1200 Move app nesting to a test state helper commit603704165c
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 21:46:04 2017 +1200 Restore kernel stack to fix multi-level nesting commit2f6336a15b
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 17:23:21 2017 +1200 API Implement kernel nesting commitfc7188da7d
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 15:43:13 2017 +1200 Fix core tests commita0ae723514
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 15:23:52 2017 +1200 Fix manifest tests commitca03395251
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 15:00:00 2017 +1200 API Move extension management into test state commitc66d433977
Author: Damian Mooyman <damian@silverstripe.com> Date: Tue Jun 13 14:10:59 2017 +1200 API Refactor SapphireTest state management into SapphireTestState API Remove Injector::unregisterAllObjects() API Remove FakeController commitf26ae75c6e
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 12 18:04:34 2017 +1200 Implement basic CLI application object commit001d559662
Author: Damian Mooyman <damian@silverstripe.com> Date: Mon Jun 12 17:39:38 2017 +1200 Remove references to SapphireTest::is_running_test() Upgrade various code commitde079c041d
Author: Damian Mooyman <damian@silverstripe.com> Date: Wed Jun 7 18:07:33 2017 +1200 API Implement APP object API Refactor of Session
533 lines
20 KiB
PHP
533 lines
20 KiB
PHP
<?php
|
|
|
|
namespace SilverStripe\Control\Tests;
|
|
|
|
use InvalidArgumentException;
|
|
use SilverStripe\Control\Controller;
|
|
use SilverStripe\Control\Director;
|
|
use SilverStripe\Control\Tests\ControllerTest\AccessBaseController;
|
|
use SilverStripe\Control\Tests\ControllerTest\AccessSecuredController;
|
|
use SilverStripe\Control\Tests\ControllerTest\AccessWildcardSecuredController;
|
|
use SilverStripe\Control\Tests\ControllerTest\ContainerController;
|
|
use SilverStripe\Control\Tests\ControllerTest\HasAction;
|
|
use SilverStripe\Control\Tests\ControllerTest\HasAction_Unsecured;
|
|
use SilverStripe\Control\Tests\ControllerTest\IndexSecuredController;
|
|
use SilverStripe\Control\Tests\ControllerTest\SubController;
|
|
use SilverStripe\Control\Tests\ControllerTest\TestController;
|
|
use SilverStripe\Control\Tests\ControllerTest\UnsecuredController;
|
|
use SilverStripe\Dev\Deprecation;
|
|
use SilverStripe\Dev\FunctionalTest;
|
|
use SilverStripe\Security\Member;
|
|
use SilverStripe\Security\Security;
|
|
use SilverStripe\View\SSViewer;
|
|
|
|
class ControllerTest extends FunctionalTest
|
|
{
|
|
|
|
protected static $fixture_file = 'ControllerTest.yml';
|
|
|
|
protected $autoFollowRedirection = false;
|
|
|
|
protected $depSettings = null;
|
|
|
|
protected static $extra_controllers = [
|
|
AccessBaseController::class,
|
|
AccessSecuredController::class,
|
|
AccessWildcardSecuredController::class,
|
|
ContainerController::class,
|
|
HasAction::class,
|
|
HasAction_Unsecured::class,
|
|
IndexSecuredController::class,
|
|
SubController::class,
|
|
TestController::class,
|
|
UnsecuredController::class,
|
|
];
|
|
|
|
protected function setUp()
|
|
{
|
|
parent::setUp();
|
|
Director::config()->update('alternate_base_url', '/');
|
|
$this->depSettings = Deprecation::dump_settings();
|
|
|
|
// Add test theme
|
|
$themeDir = substr(__DIR__, strlen(FRAMEWORK_DIR)) . '/ControllerTest/';
|
|
$themes = [
|
|
"silverstripe/framework:{$themeDir}",
|
|
SSViewer::DEFAULT_THEME
|
|
];
|
|
SSViewer::set_themes($themes);
|
|
}
|
|
|
|
protected function tearDown()
|
|
{
|
|
Deprecation::restore_settings($this->depSettings);
|
|
parent::tearDown();
|
|
}
|
|
|
|
public function testDefaultAction()
|
|
{
|
|
/* For a controller with a template, the default action will simple run that template. */
|
|
$response = $this->get("TestController/");
|
|
$this->assertRegExp("/This is the main template. Content is 'default content'/", $response->getBody());
|
|
}
|
|
|
|
public function testMethodActions()
|
|
{
|
|
/* The Action can refer to a method that is called on the object. If a method returns an array, then it
|
|
* will be used to customise the template data */
|
|
$response = $this->get("TestController/methodaction");
|
|
$this->assertRegExp("/This is the main template. Content is 'methodaction content'./", $response->getBody());
|
|
|
|
/* If the method just returns a string, then that will be used as the response */
|
|
$response = $this->get("TestController/stringaction");
|
|
$this->assertRegExp("/stringaction was called./", $response->getBody());
|
|
}
|
|
|
|
public function testTemplateActions()
|
|
{
|
|
/* If there is no method, it can be used to point to an alternative template. */
|
|
$response = $this->get("TestController/templateaction");
|
|
$this->assertRegExp(
|
|
"/This is the template for templateaction. Content is 'default content'./",
|
|
$response->getBody()
|
|
);
|
|
}
|
|
|
|
public function testUndefinedActions()
|
|
{
|
|
$response = $this->get('IndexSecuredController/undefinedaction');
|
|
$this->assertInstanceOf('SilverStripe\\Control\\HTTPResponse', $response);
|
|
$this->assertEquals(404, $response->getStatusCode(), 'Undefined actions return a not found response.');
|
|
}
|
|
|
|
public function testAllowedActions()
|
|
{
|
|
$adminUser = $this->objFromFixture(Member::class, 'admin');
|
|
|
|
$response = $this->get("UnsecuredController/");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted on index action without $allowed_actions on defining controller, ' .
|
|
'when called without an action in the URL'
|
|
);
|
|
|
|
$response = $this->get("UnsecuredController/index");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access denied on index action without $allowed_actions on defining controller, ' .
|
|
'when called with an action in the URL'
|
|
);
|
|
|
|
$response = $this->get("UnsecuredController/method1");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action without $allowed_actions on defining controller, ' .
|
|
'when called without an action in the URL'
|
|
);
|
|
|
|
$response = $this->get("AccessBaseController/");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted on index with empty $allowed_actions on defining controller, ' .
|
|
'when called without an action in the URL'
|
|
);
|
|
|
|
$response = $this->get("AccessBaseController/index");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted on index with empty $allowed_actions on defining controller, ' .
|
|
'when called with an action in the URL'
|
|
);
|
|
|
|
$response = $this->get("AccessBaseController/method1");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with empty $allowed_actions on defining controller'
|
|
);
|
|
|
|
$response = $this->get("AccessBaseController/method2");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with empty $allowed_actions on defining controller, ' .
|
|
'even when action is allowed in subclasses (allowed_actions don\'t inherit)'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted on index with non-empty $allowed_actions on defining controller, ' .
|
|
'even when index isn\'t specifically mentioned in there'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/method1");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action which is only defined in parent controller, ' .
|
|
'even when action is allowed in currently called class (allowed_actions don\'t inherit)'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/method2");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted on action originally defined with empty $allowed_actions on parent controller, ' .
|
|
'because it has been redefined in the subclass'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/templateaction");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with $allowed_actions on defining controller, ' .
|
|
'if action is not a method but rather a template discovered by naming convention'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/templateaction");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with $allowed_actions on defining controller, ' .
|
|
'if action is not a method but rather a template discovered by naming convention'
|
|
);
|
|
|
|
Security::setCurrentUser($adminUser);
|
|
$response = $this->get("AccessSecuredController/templateaction");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
'Access granted for logged in admin on action with $allowed_actions on defining controller, ' .
|
|
'if action is not a method but rather a template discovered by naming convention'
|
|
);
|
|
|
|
Security::setCurrentUser(null);
|
|
$response = $this->get("AccessSecuredController/adminonly");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with $allowed_actions on defining controller, ' .
|
|
'when restricted by unmatched permission code'
|
|
);
|
|
|
|
$response = $this->get("AccessSecuredController/aDmiNOnlY");
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
'Access denied on action with $allowed_actions on defining controller, ' .
|
|
'regardless of capitalization'
|
|
);
|
|
|
|
$response = $this->get('AccessSecuredController/protectedmethod');
|
|
$this->assertEquals(
|
|
404,
|
|
$response->getStatusCode(),
|
|
"Access denied to protected method even if its listed in allowed_actions"
|
|
);
|
|
|
|
Security::setCurrentUser($adminUser);
|
|
$response = $this->get("AccessSecuredController/adminonly");
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
"Permission codes are respected when set in \$allowed_actions"
|
|
);
|
|
|
|
Security::setCurrentUser(null);
|
|
$response = $this->get('AccessBaseController/extensionmethod1');
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
"Access granted to method defined in allowed_actions on extension, " .
|
|
"where method is also defined on extension"
|
|
);
|
|
|
|
$response = $this->get('AccessSecuredController/extensionmethod1');
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
"Access granted to method defined in allowed_actions on extension, " .
|
|
"where method is also defined on extension, even when called in a subclass"
|
|
);
|
|
|
|
$response = $this->get('AccessBaseController/extensionmethod2');
|
|
$this->assertEquals(
|
|
404,
|
|
$response->getStatusCode(),
|
|
"Access denied to method not defined in allowed_actions on extension, " .
|
|
"where method is also defined on extension"
|
|
);
|
|
|
|
$response = $this->get('IndexSecuredController/');
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
"Access denied when index action is limited through allowed_actions, " .
|
|
"and doesn't satisfy checks, and action is empty"
|
|
);
|
|
|
|
$response = $this->get('IndexSecuredController/index');
|
|
$this->assertEquals(
|
|
403,
|
|
$response->getStatusCode(),
|
|
"Access denied when index action is limited through allowed_actions, " .
|
|
"and doesn't satisfy checks"
|
|
);
|
|
|
|
Security::setCurrentUser($adminUser);
|
|
$response = $this->get('IndexSecuredController/');
|
|
$this->assertEquals(
|
|
200,
|
|
$response->getStatusCode(),
|
|
"Access granted when index action is limited through allowed_actions, " .
|
|
"and does satisfy checks"
|
|
);
|
|
Security::setCurrentUser(null);
|
|
}
|
|
|
|
public function testWildcardAllowedActions()
|
|
{
|
|
$this->setExpectedException(InvalidArgumentException::class, "Invalid allowed_action '*'");
|
|
$this->get('AccessWildcardSecuredController');
|
|
}
|
|
|
|
/**
|
|
* Test Controller::join_links()
|
|
*/
|
|
public function testJoinLinks()
|
|
{
|
|
/* Controller::join_links() will reliably join two URL-segments together so that they will be
|
|
* appropriately parsed by the URL parser */
|
|
$this->assertEquals("admin/crm/MyForm", Controller::join_links("admin/crm", "MyForm"));
|
|
$this->assertEquals("admin/crm/MyForm", Controller::join_links("admin/crm/", "MyForm"));
|
|
|
|
/* It will also handle appropriate combination of querystring variables */
|
|
$this->assertEquals("admin/crm/MyForm?flush=1", Controller::join_links("admin/crm/?flush=1", "MyForm"));
|
|
$this->assertEquals("admin/crm/MyForm?flush=1", Controller::join_links("admin/crm/", "MyForm?flush=1"));
|
|
$this->assertEquals(
|
|
"admin/crm/MyForm?field=1&other=1",
|
|
Controller::join_links("admin/crm/?field=1", "MyForm?other=1")
|
|
);
|
|
|
|
/* It can handle arbitrary numbers of components, and will ignore empty ones */
|
|
$this->assertEquals("admin/crm/MyForm/", Controller::join_links("admin/", "crm", "", "MyForm/"));
|
|
$this->assertEquals(
|
|
"admin/crm/MyForm/?a=1&b=2",
|
|
Controller::join_links("admin/?a=1", "crm", "", "MyForm/?b=2")
|
|
);
|
|
|
|
/* It can also be used to attach additional get variables to a link */
|
|
$this->assertEquals("admin/crm?flush=1", Controller::join_links("admin/crm", "?flush=1"));
|
|
$this->assertEquals("admin/crm?existing=1&flush=1", Controller::join_links("admin/crm?existing=1", "?flush=1"));
|
|
$this->assertEquals(
|
|
"admin/crm/MyForm?a=1&b=2&c=3",
|
|
Controller::join_links("?a=1", "admin/crm", "?b=2", "MyForm?c=3")
|
|
);
|
|
|
|
// And duplicates are handled nicely
|
|
$this->assertEquals(
|
|
"admin/crm?foo=2&bar=3&baz=1",
|
|
Controller::join_links("admin/crm?foo=1&bar=1&baz=1", "?foo=2&bar=3")
|
|
);
|
|
|
|
$this->assertEquals(
|
|
'admin/action',
|
|
Controller::join_links('admin/', '/', '/action'),
|
|
'Test that multiple slashes are trimmed.'
|
|
);
|
|
|
|
$this->assertEquals('/admin/action', Controller::join_links('/admin', 'action'));
|
|
|
|
/* One fragment identifier is handled as you would expect */
|
|
$this->assertEquals("my-page?arg=var#subsection", Controller::join_links("my-page#subsection", "?arg=var"));
|
|
|
|
/* If there are multiple, it takes the last one */
|
|
$this->assertEquals(
|
|
"my-page?arg=var#second-section",
|
|
Controller::join_links("my-page#subsection", "?arg=var", "#second-section")
|
|
);
|
|
|
|
/* Does type-safe checks for zero value */
|
|
$this->assertEquals("my-page/0", Controller::join_links("my-page", 0));
|
|
|
|
// Test array args
|
|
$this->assertEquals(
|
|
"admin/crm/MyForm?a=1&b=2&c=3",
|
|
Controller::join_links(["?a=1", "admin/crm", "?b=2", "MyForm?c=3"])
|
|
);
|
|
}
|
|
|
|
public function testLink()
|
|
{
|
|
$controller = new HasAction();
|
|
$this->assertEquals('HasAction/', $controller->Link());
|
|
$this->assertEquals('HasAction/', $controller->Link(null));
|
|
$this->assertEquals('HasAction/', $controller->Link(false));
|
|
$this->assertEquals('HasAction/allowed-action/', $controller->Link('allowed-action'));
|
|
}
|
|
|
|
/**
|
|
* @covers \SilverStripe\Control\Controller::hasAction
|
|
*/
|
|
public function testHasAction()
|
|
{
|
|
$controller = new HasAction();
|
|
$unsecuredController = new HasAction_Unsecured();
|
|
$securedController = new AccessSecuredController();
|
|
|
|
$this->assertFalse(
|
|
$controller->hasAction('1'),
|
|
'Numeric actions do not slip through.'
|
|
);
|
|
//$this->assertFalse(
|
|
// $controller->hasAction('lowercase_permission'),
|
|
// 'Lowercase permission does not slip through.'
|
|
//);
|
|
$this->assertFalse(
|
|
$controller->hasAction('undefined'),
|
|
'undefined actions do not exist'
|
|
);
|
|
$this->assertTrue(
|
|
$controller->hasAction('allowed_action'),
|
|
'allowed actions are recognised'
|
|
);
|
|
$this->assertTrue(
|
|
$controller->hasAction('template_action'),
|
|
'action-specific templates are recognised'
|
|
);
|
|
|
|
$this->assertTrue(
|
|
$unsecuredController->hasAction('defined_action'),
|
|
'Without an allowed_actions, any defined methods are recognised as actions'
|
|
);
|
|
|
|
$this->assertTrue(
|
|
$securedController->hasAction('adminonly'),
|
|
'Method is generally visible even if its denied via allowed_actions'
|
|
);
|
|
|
|
$this->assertFalse(
|
|
$securedController->hasAction('protectedmethod'),
|
|
'Method is not visible when protected, even if its defined in allowed_actions'
|
|
);
|
|
|
|
$this->assertTrue(
|
|
$securedController->hasAction('extensionmethod1'),
|
|
'Method is visible when defined on an extension and part of allowed_actions'
|
|
);
|
|
|
|
$this->assertFalse(
|
|
$securedController->hasAction('internalextensionmethod'),
|
|
'Method is not visible when defined on an extension, but not part of allowed_actions'
|
|
);
|
|
|
|
$this->assertFalse(
|
|
$securedController->hasAction('protectedextensionmethod'),
|
|
'Method is not visible when defined on an extension, part of allowed_actions, ' .
|
|
'but with protected visibility'
|
|
);
|
|
}
|
|
|
|
/* Controller::BaseURL no longer exists, but was just a direct call to Director::BaseURL, so not sure what this
|
|
* code was supposed to test
|
|
public function testBaseURL() {
|
|
Config::modify()->merge('Director', 'alternate_base_url', '/baseurl/');
|
|
$this->assertEquals(Controller::BaseURL(), Director::BaseURL());
|
|
}
|
|
*/
|
|
|
|
public function testRedirectBackByReferer()
|
|
{
|
|
$internalRelativeUrl = Controller::join_links(Director::baseURL(), '/some-url');
|
|
$internalAbsoluteUrl = Controller::join_links(Director::absoluteBaseURL(), '/some-url');
|
|
|
|
$response = $this->get(
|
|
'TestController/redirectbacktest',
|
|
null,
|
|
array('Referer' => $internalRelativeUrl)
|
|
);
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
$this->assertEquals(
|
|
$internalAbsoluteUrl,
|
|
$response->getHeader('Location'),
|
|
"Redirects on internal relative URLs"
|
|
);
|
|
|
|
$response = $this->get(
|
|
'TestController/redirectbacktest',
|
|
null,
|
|
array('Referer' => $internalAbsoluteUrl)
|
|
);
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
$this->assertEquals(
|
|
$internalAbsoluteUrl,
|
|
$response->getHeader('Location'),
|
|
"Redirects on internal absolute URLs"
|
|
);
|
|
|
|
$externalAbsoluteUrl = 'http://myhost.com/some-url';
|
|
$response = $this->get(
|
|
'TestController/redirectbacktest',
|
|
null,
|
|
array('Referer' => $externalAbsoluteUrl)
|
|
);
|
|
$this->assertEquals(
|
|
Director::absoluteBaseURL(),
|
|
$response->getHeader('Location'),
|
|
"Redirects back to home page on external url"
|
|
);
|
|
}
|
|
|
|
public function testRedirectBackByBackUrl()
|
|
{
|
|
$internalRelativeUrl = Controller::join_links(Director::baseURL(), '/some-url');
|
|
$internalAbsoluteUrl = Controller::join_links(Director::absoluteBaseURL(), '/some-url');
|
|
|
|
$response = $this->get('TestController/redirectbacktest?BackURL=' . urlencode($internalRelativeUrl));
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
$this->assertEquals(
|
|
$internalAbsoluteUrl,
|
|
$response->getHeader('Location'),
|
|
"Redirects on internal relative URLs"
|
|
);
|
|
|
|
// BackURL is internal link
|
|
$internalAbsoluteUrl = Director::absoluteBaseURL() . '/some-url';
|
|
$link = 'TestController/redirectbacktest?BackURL=' . urlencode($internalAbsoluteUrl);
|
|
$response = $this->get($link);
|
|
$this->assertEquals($internalAbsoluteUrl, $response->getHeader('Location'));
|
|
$this->assertEquals(
|
|
302,
|
|
$response->getStatusCode(),
|
|
"Redirects on internal absolute URLs"
|
|
);
|
|
|
|
// Note that this test is affected by the prior ->get()
|
|
$externalAbsoluteUrl = 'http://myhost.com/some-url';
|
|
$response = $this->get('TestController/redirectbacktest?BackURL=' . urlencode($externalAbsoluteUrl));
|
|
$this->assertEquals(
|
|
Director::absoluteURL($link),
|
|
$response->getHeader('Location'),
|
|
"If BackURL Is external link, fall back to last url (Referer)"
|
|
);
|
|
}
|
|
|
|
public function testSubActions()
|
|
{
|
|
// If a controller action returns another controller, ensure that the $action variable is correctly forwarded
|
|
$response = $this->get("ContainerController/subcontroller/subaction");
|
|
$this->assertEquals('subaction', $response->getBody());
|
|
|
|
// Handle nested action
|
|
$response = $this->get('ContainerController/subcontroller/substring/subvieweraction');
|
|
$this->assertEquals('Hope this works', $response->getBody());
|
|
}
|
|
}
|