2021-06-26 17:23:15 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace Tests\Unit;
|
2020-04-04 02:16:05 +02:00
|
|
|
|
2020-07-28 13:59:43 +02:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2023-04-23 16:04:35 +02:00
|
|
|
use Illuminate\Support\Facades\Mail;
|
|
|
|
use Symfony\Component\Mailer\Transport\Smtp\EsmtpTransport;
|
2020-04-04 02:16:05 +02:00
|
|
|
use Tests\TestCase;
|
2019-06-23 17:01:15 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class ConfigTest
|
|
|
|
* Many of the tests here are to check on tweaks made
|
|
|
|
* to maintain backwards compatibility.
|
|
|
|
*/
|
|
|
|
class ConfigTest extends TestCase
|
|
|
|
{
|
|
|
|
public function test_filesystem_images_falls_back_to_storage_type_var()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('STORAGE_TYPE', 'local_secure', function () {
|
2019-09-14 15:12:39 +02:00
|
|
|
$this->checkEnvConfigResult('STORAGE_IMAGE_TYPE', 's3', 'filesystems.images', 's3');
|
|
|
|
$this->checkEnvConfigResult('STORAGE_IMAGE_TYPE', null, 'filesystems.images', 'local_secure');
|
|
|
|
});
|
2019-06-23 17:01:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_filesystem_attachments_falls_back_to_storage_type_var()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('STORAGE_TYPE', 'local_secure', function () {
|
2019-09-14 15:12:39 +02:00
|
|
|
$this->checkEnvConfigResult('STORAGE_ATTACHMENT_TYPE', 's3', 'filesystems.attachments', 's3');
|
|
|
|
$this->checkEnvConfigResult('STORAGE_ATTACHMENT_TYPE', null, 'filesystems.attachments', 'local_secure');
|
|
|
|
});
|
2019-06-23 17:01:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_app_url_blank_if_old_default_value()
|
|
|
|
{
|
|
|
|
$initUrl = 'https://example.com/docs';
|
|
|
|
$oldDefault = 'http://bookstack.dev';
|
|
|
|
$this->checkEnvConfigResult('APP_URL', $initUrl, 'app.url', $initUrl);
|
|
|
|
$this->checkEnvConfigResult('APP_URL', $oldDefault, 'app.url', '');
|
|
|
|
}
|
|
|
|
|
2020-07-28 13:59:43 +02:00
|
|
|
public function test_errorlog_plain_webserver_channel()
|
|
|
|
{
|
|
|
|
// We can't full test this due to it being targeted for the SAPI logging handler
|
|
|
|
// so we just overwrite that component so we can capture the error log output.
|
|
|
|
config()->set([
|
|
|
|
'logging.channels.errorlog_plain_webserver.handler_with' => [0],
|
|
|
|
]);
|
|
|
|
|
|
|
|
$temp = tempnam(sys_get_temp_dir(), 'bs-test');
|
2021-06-26 17:23:15 +02:00
|
|
|
$original = ini_set('error_log', $temp);
|
2020-07-28 13:59:43 +02:00
|
|
|
|
|
|
|
Log::channel('errorlog_plain_webserver')->info('Aww, look, a cute puppy');
|
|
|
|
|
2021-06-26 17:23:15 +02:00
|
|
|
ini_set('error_log', $original);
|
2020-07-28 13:59:43 +02:00
|
|
|
|
|
|
|
$output = file_get_contents($temp);
|
|
|
|
$this->assertStringContainsString('Aww, look, a cute puppy', $output);
|
|
|
|
$this->assertStringNotContainsString('INFO', $output);
|
|
|
|
$this->assertStringNotContainsString('info', $output);
|
|
|
|
$this->assertStringNotContainsString('testing', $output);
|
|
|
|
}
|
|
|
|
|
2021-03-16 14:03:07 +01:00
|
|
|
public function test_session_cookie_uses_sub_path_from_app_url()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://example.com', 'session.path', '/');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://a.com/b', 'session.path', '/b');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://a.com/b/d/e', 'session.path', '/b/d/e');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', '', 'session.path', '/');
|
|
|
|
}
|
|
|
|
|
2021-05-08 14:07:25 +02:00
|
|
|
public function test_saml2_idp_authn_context_string_parsed_as_space_separated_array()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult(
|
|
|
|
'SAML2_IDP_AUTHNCONTEXT',
|
|
|
|
'urn:federation:authentication:windows urn:federation:authentication:linux',
|
|
|
|
'saml2.onelogin.security.requestedAuthnContext',
|
|
|
|
['urn:federation:authentication:windows', 'urn:federation:authentication:linux']
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-08-31 21:22:42 +02:00
|
|
|
public function test_dompdf_remote_fetching_controlled_by_allow_untrusted_server_fetching_false()
|
|
|
|
{
|
2022-07-17 15:32:09 +02:00
|
|
|
$this->checkEnvConfigResult('ALLOW_UNTRUSTED_SERVER_FETCHING', 'false', 'dompdf.options.enable_remote', false);
|
|
|
|
$this->checkEnvConfigResult('ALLOW_UNTRUSTED_SERVER_FETCHING', 'true', 'dompdf.options.enable_remote', true);
|
2021-08-31 21:22:42 +02:00
|
|
|
}
|
|
|
|
|
2022-01-30 18:40:42 +01:00
|
|
|
public function test_dompdf_paper_size_options_are_limited()
|
|
|
|
{
|
2022-07-17 15:32:09 +02:00
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'cat', 'dompdf.options.default_paper_size', 'a4');
|
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'letter', 'dompdf.options.default_paper_size', 'letter');
|
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'a4', 'dompdf.options.default_paper_size', 'a4');
|
2022-01-30 18:40:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_snappy_paper_size_options_are_limited()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'cat', 'snappy.pdf.options.page-size', 'A4');
|
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'letter', 'snappy.pdf.options.page-size', 'Letter');
|
|
|
|
$this->checkEnvConfigResult('EXPORT_PAGE_SIZE', 'a4', 'snappy.pdf.options.page-size', 'A4');
|
|
|
|
}
|
|
|
|
|
2023-04-23 16:04:35 +02:00
|
|
|
public function test_sendmail_command_is_configurable()
|
2023-02-17 15:25:38 +01:00
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult('MAIL_SENDMAIL_COMMAND', '/var/sendmail -o', 'mail.mailers.sendmail.path', '/var/sendmail -o');
|
|
|
|
}
|
|
|
|
|
2023-04-23 16:04:35 +02:00
|
|
|
public function test_mail_disable_ssl_verification_alters_mailer()
|
|
|
|
{
|
|
|
|
$getStreamOptions = function (): array {
|
|
|
|
/** @var EsmtpTransport $transport */
|
|
|
|
$transport = Mail::mailer('smtp')->getSymfonyTransport();
|
|
|
|
return $transport->getStream()->getStreamOptions();
|
|
|
|
};
|
|
|
|
|
|
|
|
$this->assertEmpty($getStreamOptions());
|
|
|
|
|
|
|
|
|
|
|
|
$this->runWithEnv('MAIL_VERIFY_SSL', 'false', function () use ($getStreamOptions) {
|
|
|
|
$options = $getStreamOptions();
|
|
|
|
$this->assertArrayHasKey('ssl', $options);
|
|
|
|
$this->assertFalse($options['ssl']['verify_peer']);
|
|
|
|
$this->assertFalse($options['ssl']['verify_peer_name']);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2023-06-24 12:27:18 +02:00
|
|
|
public function test_non_null_mail_encryption_options_enforce_smtp_scheme()
|
|
|
|
{
|
2023-07-04 16:21:31 +02:00
|
|
|
$this->checkEnvConfigResult('MAIL_ENCRYPTION', 'tls', 'mail.mailers.smtp.tls_required', true);
|
|
|
|
$this->checkEnvConfigResult('MAIL_ENCRYPTION', 'ssl', 'mail.mailers.smtp.tls_required', true);
|
|
|
|
$this->checkEnvConfigResult('MAIL_ENCRYPTION', 'null', 'mail.mailers.smtp.tls_required', false);
|
2023-06-24 12:27:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_smtp_scheme_and_certain_port_forces_tls_usage()
|
|
|
|
{
|
2023-07-04 16:21:31 +02:00
|
|
|
$isMailTlsRequired = function () {
|
|
|
|
/** @var \BookStack\App\Mail\EsmtpTransport $transport */
|
2023-06-24 12:27:18 +02:00
|
|
|
$transport = Mail::mailer('smtp')->getSymfonyTransport();
|
|
|
|
Mail::purge('smtp');
|
2023-07-04 16:21:31 +02:00
|
|
|
return $transport->getTlsRequirement();
|
2023-06-24 12:27:18 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
config()->set([
|
2023-07-04 16:21:31 +02:00
|
|
|
'mail.mailers.smtp.tls_required' => null,
|
2023-06-24 12:27:18 +02:00
|
|
|
'mail.mailers.smtp.port' => 587,
|
|
|
|
]);
|
|
|
|
|
2023-07-04 16:21:31 +02:00
|
|
|
$this->assertFalse($isMailTlsRequired());
|
2023-06-24 12:27:18 +02:00
|
|
|
|
|
|
|
config()->set([
|
2023-07-04 16:21:31 +02:00
|
|
|
'mail.mailers.smtp.tls_required' => 'tls',
|
2023-06-24 12:27:18 +02:00
|
|
|
'mail.mailers.smtp.port' => 587,
|
|
|
|
]);
|
|
|
|
|
2023-07-04 16:21:31 +02:00
|
|
|
$this->assertTrue($isMailTlsRequired());
|
2023-06-24 12:27:18 +02:00
|
|
|
|
|
|
|
config()->set([
|
2023-07-04 16:21:31 +02:00
|
|
|
'mail.mailers.smtp.tls_required' => null,
|
2023-06-24 12:27:18 +02:00
|
|
|
'mail.mailers.smtp.port' => 465,
|
|
|
|
]);
|
|
|
|
|
2023-07-04 16:21:31 +02:00
|
|
|
$this->assertTrue($isMailTlsRequired());
|
2023-06-24 12:27:18 +02:00
|
|
|
}
|
|
|
|
|
2019-06-23 17:01:15 +02:00
|
|
|
/**
|
|
|
|
* Set an environment variable of the given name and value
|
|
|
|
* then check the given config key to see if it matches the given result.
|
|
|
|
* Providing a null $envVal clears the variable.
|
2021-06-26 17:23:15 +02:00
|
|
|
*
|
2021-05-08 14:23:28 +02:00
|
|
|
* @param mixed $expectedResult
|
2019-06-23 17:01:15 +02:00
|
|
|
*/
|
2021-05-08 14:23:28 +02:00
|
|
|
protected function checkEnvConfigResult(string $envName, ?string $envVal, string $configKey, $expectedResult)
|
2019-06-23 17:01:15 +02:00
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv($envName, $envVal, function () use ($configKey, $expectedResult) {
|
2019-09-14 15:12:39 +02:00
|
|
|
$this->assertEquals($expectedResult, config($configKey));
|
|
|
|
});
|
2019-06-23 17:01:15 +02:00
|
|
|
}
|
2021-06-26 17:23:15 +02:00
|
|
|
}
|