summaryrefslogtreecommitdiffstats
path: root/tests/Modules/PermissionManager/PermissionUtilTest.php
blob: 2452d7dc37b13c8724781680f2af1ba4fd470a1f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
<?php

use PHPUnit\Framework\TestCase;

/**
 * PermissionUtil tests adapted to the SQLite-backed Database backend and real Location class.
 *
 */
class PermissionUtilTest extends TestCase
{
	protected function setUp(): void
	{
		Database::resetSchema();
		User::reset();
		$_GET = $_POST = $_REQUEST = $_SERVER = [];
		// Use real Location implementation
		$GLOBALS['__TEST_USE_REAL_CLASSES'] = ['Location'];
		require_once __DIR__ . '/../../../modules-available/locations/inc/location.inc.php';
	}

	public function testUserHasPermissionAnyLocationWithWildcardMatch(): void
	{
		User::$id = 2; // not special admin
		require_once __DIR__ . '/../../../modules-available/permissionmanager/inc/permissionutil.inc.php';
		// Create a role that grants permissionmanager.roles.* and assign it to user 2
		Database::exec('INSERT INTO role (roleid, rolename, builtin, roledescription) VALUES (:id, :n, 0, :d)', ['id' => 3, 'n' => 'Roles', 'd' => '']);
		Database::exec('INSERT INTO role_x_user (userid, roleid) VALUES (:u, :r)', ['u' => 2, 'r' => 3]);
		Database::exec('INSERT INTO role_x_permission (roleid, permissionid) VALUES (:r, :p)', ['r' => 3, 'p' => 'permissionmanager.roles.*']);
		// Also add one row in role_x_location to satisfy INNER JOIN in location-specific queries; for ANY (null) use NULL
		Database::exec('INSERT INTO role_x_location (roleid, locationid) VALUES (:r, NULL)', ['r' => 3]);
		$this->assertTrue(PermissionUtil::userHasPermission(2, 'permissionmanager.roles.*', null));
		// cached second call should also return true
		$this->assertTrue(PermissionUtil::userHasPermission(2, 'permissionmanager.roles.*', null));
	}

	public function testUserHasPermissionLocationSpecificWithParentInheritance(): void
	{
		User::$id = 3;
		require_once __DIR__ . '/../../../modules-available/permissionmanager/inc/permissionutil.inc.php';
		// Seed: create role 4 granting users.view at location 2 (parent of 4)
		Database::exec('INSERT INTO role (roleid, rolename, builtin, roledescription) VALUES (:id, :n, 0, :d)', ['id' => 4, 'n' => 'Users', 'd' => '']);
		Database::exec('INSERT INTO role_x_user (userid, roleid) VALUES (:u, :r)', ['u' => 3, 'r' => 4]);
		Database::exec('INSERT INTO role_x_permission (roleid, permissionid) VALUES (:r, :p)', ['r' => 4, 'p' => 'permissionmanager.users.view']);
		Database::exec('INSERT INTO role_x_location (roleid, locationid) VALUES (:r, :l)', ['r' => 4, 'l' => 2]);
		// userHasPermission should return true for location 4 by inheritance (2 is parent of 4 in seed)
		$this->assertTrue(PermissionUtil::userHasPermission(3, 'permissionmanager.users.view', 4));
		// And false for unrelated location (3)
		$this->assertFalse(PermissionUtil::userHasPermission(3, 'permissionmanager.users.view', 3));
	}

	public function testAdminBypassForPermissionManager(): void
	{
		// userid 1 always allowed for permissionmanager.*
		User::$id = 1;
		require_once __DIR__ . '/../../../modules-available/permissionmanager/inc/permissionutil.inc.php';
		$this->assertTrue(PermissionUtil::userHasPermission(1, 'permissionmanager.*', null));
		$this->assertTrue(PermissionUtil::userHasPermission(1, 'permissionmanager.roles.edit', 5));
	}

	public function testGetAllowedLocationsGlobalAndSpecific(): void
	{
		User::$id = 5;
		require_once __DIR__ . '/../../../modules-available/permissionmanager/inc/permissionutil.inc.php';
		// Case 1: global permission (locationid NULL -> treated as 0 and expands to all)
		Database::exec('INSERT INTO role (roleid, rolename, builtin, roledescription) VALUES (:id, :n, 0, :d)', ['id' => 5, 'n' => 'Global', 'd' => '']);
		Database::exec('INSERT INTO role_x_user (userid, roleid) VALUES (:u, :r)', ['u' => 5, 'r' => 5]);
		Database::exec('INSERT INTO role_x_permission (roleid, permissionid) VALUES (:r, :p)', ['r' => 5, 'p' => 'permissionmanager.users.view']);
		Database::exec('INSERT INTO role_x_location (roleid, locationid) VALUES (:r, NULL)', ['r' => 5]);
		$locs = PermissionUtil::getAllowedLocations(5, 'permissionmanager.users.view');
		$this->assertContains(0, $locs);
		$this->assertContains(1, $locs);
		$this->assertContains(2, $locs);
		$this->assertContains(4, $locs);

		// Case 2: specific base location expands with children (location 2 -> includes 4)
		Database::exec('INSERT INTO role (roleid, rolename, builtin, roledescription) VALUES (:id, :n, 0, :d)', ['id' => 6, 'n' => 'Loc', 'd' => '']);
		Database::exec('INSERT INTO role_x_user (userid, roleid) VALUES (:u, :r)', ['u' => 5, 'r' => 6]);
		Database::exec('INSERT INTO role_x_permission (roleid, permissionid) VALUES (:r, :p)', ['r' => 6, 'p' => 'permissionmanager.roles.*']);
		Database::exec('INSERT INTO role_x_location (roleid, locationid) VALUES (:r, :l)', ['r' => 6, 'l' => 2]);
		$locs2 = PermissionUtil::getAllowedLocations(5, 'permissionmanager.roles.edit');
		$this->assertNotContains(0, $locs2);
		$this->assertContains(2, $locs2);
		$this->assertContains(4, $locs2);
	}
}