mirror of
https://github.com/BookStackApp/BookStack.git
synced 2024-10-30 07:32:39 +01:00
928 lines
34 KiB
PHP
928 lines
34 KiB
PHP
<?php
|
|
|
|
namespace Tests\Permissions;
|
|
|
|
use BookStack\Actions\Comment;
|
|
use BookStack\Auth\Role;
|
|
use BookStack\Auth\User;
|
|
use BookStack\Entities\Models\Book;
|
|
use BookStack\Entities\Models\Bookshelf;
|
|
use BookStack\Entities\Models\Chapter;
|
|
use BookStack\Entities\Models\Page;
|
|
use BookStack\Uploads\Image;
|
|
use Tests\TestCase;
|
|
use Tests\TestResponse;
|
|
|
|
class RolesTest extends TestCase
|
|
{
|
|
protected $user;
|
|
|
|
public function setUp(): void
|
|
{
|
|
parent::setUp();
|
|
$this->user = $this->getViewer();
|
|
}
|
|
|
|
public function test_admin_can_see_settings()
|
|
{
|
|
$this->asAdmin()->get('/settings')->assertSee('Settings');
|
|
}
|
|
|
|
public function test_cannot_delete_admin_role()
|
|
{
|
|
$adminRole = Role::getRole('admin');
|
|
$deletePageUrl = '/settings/roles/delete/' . $adminRole->id;
|
|
|
|
$this->asAdmin()->get($deletePageUrl);
|
|
$this->delete($deletePageUrl)->assertRedirect($deletePageUrl);
|
|
$this->get($deletePageUrl)->assertSee('cannot be deleted');
|
|
}
|
|
|
|
public function test_role_cannot_be_deleted_if_default()
|
|
{
|
|
$newRole = $this->createNewRole();
|
|
$this->setSettings(['registration-role' => $newRole->id]);
|
|
|
|
$deletePageUrl = '/settings/roles/delete/' . $newRole->id;
|
|
$this->asAdmin()->get($deletePageUrl);
|
|
$this->delete($deletePageUrl)->assertRedirect($deletePageUrl);
|
|
$this->get($deletePageUrl)->assertSee('cannot be deleted');
|
|
}
|
|
|
|
public function test_role_create_update_delete_flow()
|
|
{
|
|
$testRoleName = 'Test Role';
|
|
$testRoleDesc = 'a little test description';
|
|
$testRoleUpdateName = 'An Super Updated role';
|
|
|
|
// Creation
|
|
$this->asAdmin()->get('/settings')
|
|
->click('Roles')
|
|
->seePageIs('/settings/roles')
|
|
->click('Create New Role')
|
|
->type('Test Role', 'display_name')
|
|
->type('A little test description', 'description')
|
|
->press('Save Role')
|
|
->assertDatabaseHas('roles', ['display_name' => $testRoleName, 'description' => $testRoleDesc, 'mfa_enforced' => false])
|
|
->seePageIs('/settings/roles');
|
|
|
|
// Updating
|
|
$this->asAdmin()->get('/settings/roles')
|
|
->assertSee($testRoleDesc)
|
|
->click($testRoleName)
|
|
->type($testRoleUpdateName, '#display_name')
|
|
->check('#mfa_enforced')
|
|
->press('Save Role')
|
|
->assertDatabaseHas('roles', ['display_name' => $testRoleUpdateName, 'description' => $testRoleDesc, 'mfa_enforced' => true])
|
|
->seePageIs('/settings/roles');
|
|
|
|
// Deleting
|
|
$this->asAdmin()->get('/settings/roles')
|
|
->click($testRoleUpdateName)
|
|
->click('Delete Role')
|
|
->assertSee($testRoleUpdateName)
|
|
->press('Confirm')
|
|
->seePageIs('/settings/roles')
|
|
->assertDontSee($testRoleUpdateName);
|
|
}
|
|
|
|
public function test_admin_role_cannot_be_removed_if_user_last_admin()
|
|
{
|
|
$adminRole = Role::where('system_name', '=', 'admin')->first();
|
|
$adminUser = $this->getAdmin();
|
|
$adminRole->users()->where('id', '!=', $adminUser->id)->delete();
|
|
$this->assertEquals($adminRole->users()->count(), 1);
|
|
|
|
$viewerRole = $this->getViewer()->roles()->first();
|
|
|
|
$editUrl = '/settings/users/' . $adminUser->id;
|
|
$this->actingAs($adminUser)->put($editUrl, [
|
|
'name' => $adminUser->name,
|
|
'email' => $adminUser->email,
|
|
'roles' => [
|
|
'viewer' => strval($viewerRole->id),
|
|
],
|
|
])->followRedirects();
|
|
|
|
$this->seePageIs($editUrl);
|
|
$this->assertSee('This user is the only user assigned to the administrator role');
|
|
}
|
|
|
|
public function test_migrate_users_on_delete_works()
|
|
{
|
|
$roleA = Role::query()->create(['display_name' => 'Delete Test A']);
|
|
$roleB = Role::query()->create(['display_name' => 'Delete Test B']);
|
|
$this->user->attachRole($roleB);
|
|
|
|
$this->assertCount(0, $roleA->users()->get());
|
|
$this->assertCount(1, $roleB->users()->get());
|
|
|
|
$deletePage = $this->asAdmin()->get("/settings/roles/delete/{$roleB->id}");
|
|
$deletePage->assertElementExists('select[name=migrate_role_id]');
|
|
$this->asAdmin()->delete("/settings/roles/delete/{$roleB->id}", [
|
|
'migrate_role_id' => $roleA->id,
|
|
]);
|
|
|
|
$this->assertCount(1, $roleA->users()->get());
|
|
$this->assertEquals($this->user->id, $roleA->users()->first()->id);
|
|
}
|
|
|
|
public function test_manage_user_permission()
|
|
{
|
|
$this->actingAs($this->user)->get('/settings/users')
|
|
->seePageIs('/');
|
|
$this->giveUserPermissions($this->user, ['users-manage']);
|
|
$this->actingAs($this->user)->get('/settings/users')
|
|
->seePageIs('/settings/users');
|
|
}
|
|
|
|
public function test_manage_users_permission_shows_link_in_header_if_does_not_have_settings_manage_permision()
|
|
{
|
|
$usersLink = 'href="' . url('/settings/users') . '"';
|
|
$this->actingAs($this->user)->get('/')->assertDontSee($usersLink);
|
|
$this->giveUserPermissions($this->user, ['users-manage']);
|
|
$this->actingAs($this->user)->get('/')->assertSee($usersLink);
|
|
$this->giveUserPermissions($this->user, ['settings-manage', 'users-manage']);
|
|
$this->actingAs($this->user)->get('/')->assertDontSee($usersLink);
|
|
}
|
|
|
|
public function test_user_cannot_change_email_unless_they_have_manage_users_permission()
|
|
{
|
|
$userProfileUrl = '/settings/users/' . $this->user->id;
|
|
$originalEmail = $this->user->email;
|
|
$this->actingAs($this->user);
|
|
|
|
$this->get($userProfileUrl)
|
|
->assertOk()
|
|
->assertElementExists('input[name=email][disabled]');
|
|
$this->put($userProfileUrl, [
|
|
'name' => 'my_new_name',
|
|
'email' => 'new_email@example.com',
|
|
]);
|
|
$this->assertDatabaseHas('users', [
|
|
'id' => $this->user->id,
|
|
'email' => $originalEmail,
|
|
'name' => 'my_new_name',
|
|
]);
|
|
|
|
$this->giveUserPermissions($this->user, ['users-manage']);
|
|
|
|
$this->get($userProfileUrl)
|
|
->assertOk()
|
|
->assertElementNotExists('input[name=email][disabled]')
|
|
->assertElementExists('input[name=email]');
|
|
$this->put($userProfileUrl, [
|
|
'name' => 'my_new_name_2',
|
|
'email' => 'new_email@example.com',
|
|
]);
|
|
|
|
$this->assertDatabaseHas('users', [
|
|
'id' => $this->user->id,
|
|
'email' => 'new_email@example.com',
|
|
'name' => 'my_new_name_2',
|
|
]);
|
|
}
|
|
|
|
public function test_user_roles_manage_permission()
|
|
{
|
|
$this->actingAs($this->user)->get('/settings/roles')
|
|
->seePageIs('/')->get('/settings/roles/1')->seePageIs('/');
|
|
$this->giveUserPermissions($this->user, ['user-roles-manage']);
|
|
$this->actingAs($this->user)->get('/settings/roles')
|
|
->seePageIs('/settings/roles')->click('Admin')
|
|
->assertSee('Edit Role');
|
|
}
|
|
|
|
public function test_settings_manage_permission()
|
|
{
|
|
$this->actingAs($this->user)->get('/settings')
|
|
->seePageIs('/');
|
|
$this->giveUserPermissions($this->user, ['settings-manage']);
|
|
$this->actingAs($this->user)->get('/settings')
|
|
->seePageIs('/settings')->press('Save Settings')->assertSee('Settings Saved');
|
|
}
|
|
|
|
public function test_restrictions_manage_all_permission()
|
|
{
|
|
$page = Page::take(1)->get()->first();
|
|
$this->actingAs($this->user)->get($page->getUrl())
|
|
->assertDontSee('Permissions')
|
|
->get($page->getUrl() . '/permissions')
|
|
->seePageIs('/');
|
|
$this->giveUserPermissions($this->user, ['restrictions-manage-all']);
|
|
$this->actingAs($this->user)->get($page->getUrl())
|
|
->assertSee('Permissions')
|
|
->click('Permissions')
|
|
->assertSee('Page Permissions')->seePageIs($page->getUrl() . '/permissions');
|
|
}
|
|
|
|
public function test_restrictions_manage_own_permission()
|
|
{
|
|
/** @var Page $otherUsersPage */
|
|
$otherUsersPage = Page::query()->first();
|
|
$content = $this->createEntityChainBelongingToUser($this->user);
|
|
|
|
// Set a different creator on the page we're checking to ensure
|
|
// that the owner fields are checked
|
|
$page = $content['page']; /** @var Page $page */
|
|
$page->created_by = $otherUsersPage->id;
|
|
$page->owned_by = $this->user->id;
|
|
$page->save();
|
|
|
|
// Check can't restrict other's content
|
|
$this->actingAs($this->user)->get($otherUsersPage->getUrl())
|
|
->assertDontSee('Permissions')
|
|
->get($otherUsersPage->getUrl() . '/permissions')
|
|
->seePageIs('/');
|
|
// Check can't restrict own content
|
|
$this->actingAs($this->user)->get($page->getUrl())
|
|
->assertDontSee('Permissions')
|
|
->get($page->getUrl() . '/permissions')
|
|
->seePageIs('/');
|
|
|
|
$this->giveUserPermissions($this->user, ['restrictions-manage-own']);
|
|
|
|
// Check can't restrict other's content
|
|
$this->actingAs($this->user)->get($otherUsersPage->getUrl())
|
|
->assertDontSee('Permissions')
|
|
->get($otherUsersPage->getUrl() . '/permissions')
|
|
->seePageIs('/');
|
|
// Check can restrict own content
|
|
$this->actingAs($this->user)->get($page->getUrl())
|
|
->assertSee('Permissions')
|
|
->click('Permissions')
|
|
->seePageIs($page->getUrl() . '/permissions');
|
|
}
|
|
|
|
/**
|
|
* Check a standard entity access permission.
|
|
*
|
|
* @param string $permission
|
|
* @param array $accessUrls Urls that are only accessible after having the permission
|
|
* @param array $visibles Check this text, In the buttons toolbar, is only visible with the permission
|
|
*/
|
|
private function checkAccessPermission($permission, $accessUrls = [], $visibles = [])
|
|
{
|
|
foreach ($accessUrls as $url) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->seePageIs('/');
|
|
}
|
|
foreach ($visibles as $url => $text) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->assertElementNotContains('.action-buttons', $text);
|
|
}
|
|
|
|
$this->giveUserPermissions($this->user, [$permission]);
|
|
|
|
foreach ($accessUrls as $url) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->seePageIs($url);
|
|
}
|
|
foreach ($visibles as $url => $text) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->assertSee($text);
|
|
}
|
|
}
|
|
|
|
public function test_bookshelves_create_all_permissions()
|
|
{
|
|
$this->checkAccessPermission('bookshelf-create-all', [
|
|
'/create-shelf',
|
|
], [
|
|
'/shelves' => 'New Shelf',
|
|
]);
|
|
|
|
$this->get('/create-shelf')
|
|
->type('test shelf', 'name')
|
|
->type('shelf desc', 'description')
|
|
->press('Save Shelf')
|
|
->seePageIs('/shelves/test-shelf');
|
|
}
|
|
|
|
public function test_bookshelves_edit_own_permission()
|
|
{
|
|
/** @var Bookshelf $otherShelf */
|
|
$otherShelf = Bookshelf::query()->first();
|
|
$ownShelf = $this->newShelf(['name' => 'test-shelf', 'slug' => 'test-shelf']);
|
|
$ownShelf->forceFill(['owned_by' => $this->user->id, 'updated_by' => $this->user->id])->save();
|
|
$this->regenEntityPermissions($ownShelf);
|
|
|
|
$this->checkAccessPermission('bookshelf-update-own', [
|
|
$ownShelf->getUrl('/edit'),
|
|
], [
|
|
$ownShelf->getUrl() => 'Edit',
|
|
]);
|
|
|
|
$this->get($otherShelf->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Edit')
|
|
->get($otherShelf->getUrl('/edit'))
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_bookshelves_edit_all_permission()
|
|
{
|
|
/** @var Bookshelf $otherShelf */
|
|
$otherShelf = Bookshelf::query()->first();
|
|
$this->checkAccessPermission('bookshelf-update-all', [
|
|
$otherShelf->getUrl('/edit'),
|
|
], [
|
|
$otherShelf->getUrl() => 'Edit',
|
|
]);
|
|
}
|
|
|
|
public function test_bookshelves_delete_own_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['bookshelf-update-all']);
|
|
/** @var Bookshelf $otherShelf */
|
|
$otherShelf = Bookshelf::query()->first();
|
|
$ownShelf = $this->newShelf(['name' => 'test-shelf', 'slug' => 'test-shelf']);
|
|
$ownShelf->forceFill(['owned_by' => $this->user->id, 'updated_by' => $this->user->id])->save();
|
|
$this->regenEntityPermissions($ownShelf);
|
|
|
|
$this->checkAccessPermission('bookshelf-delete-own', [
|
|
$ownShelf->getUrl('/delete'),
|
|
], [
|
|
$ownShelf->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$this->get($otherShelf->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Delete')
|
|
->get($otherShelf->getUrl('/delete'))
|
|
->seePageIs('/');
|
|
$this->get($ownShelf->getUrl())->get($ownShelf->getUrl('/delete'))
|
|
->press('Confirm')
|
|
->seePageIs('/shelves')
|
|
->assertDontSee($ownShelf->name);
|
|
}
|
|
|
|
public function test_bookshelves_delete_all_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['bookshelf-update-all']);
|
|
/** @var Bookshelf $otherShelf */
|
|
$otherShelf = Bookshelf::query()->first();
|
|
$this->checkAccessPermission('bookshelf-delete-all', [
|
|
$otherShelf->getUrl('/delete'),
|
|
], [
|
|
$otherShelf->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$this->get($otherShelf->getUrl())->get($otherShelf->getUrl('/delete'))
|
|
->press('Confirm')
|
|
->seePageIs('/shelves')
|
|
->assertDontSee($otherShelf->name);
|
|
}
|
|
|
|
public function test_books_create_all_permissions()
|
|
{
|
|
$this->checkAccessPermission('book-create-all', [
|
|
'/create-book',
|
|
], [
|
|
'/books' => 'Create New Book',
|
|
]);
|
|
|
|
$this->get('/create-book')
|
|
->type('test book', 'name')
|
|
->type('book desc', 'description')
|
|
->press('Save Book')
|
|
->seePageIs('/books/test-book');
|
|
}
|
|
|
|
public function test_books_edit_own_permission()
|
|
{
|
|
/** @var Book $otherBook */
|
|
$otherBook = Book::query()->take(1)->get()->first();
|
|
$ownBook = $this->createEntityChainBelongingToUser($this->user)['book'];
|
|
$this->checkAccessPermission('book-update-own', [
|
|
$ownBook->getUrl() . '/edit',
|
|
], [
|
|
$ownBook->getUrl() => 'Edit',
|
|
]);
|
|
|
|
$this->get($otherBook->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Edit')
|
|
->get($otherBook->getUrl() . '/edit')
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_books_edit_all_permission()
|
|
{
|
|
/** @var Book $otherBook */
|
|
$otherBook = Book::query()->take(1)->get()->first();
|
|
$this->checkAccessPermission('book-update-all', [
|
|
$otherBook->getUrl() . '/edit',
|
|
], [
|
|
$otherBook->getUrl() => 'Edit',
|
|
]);
|
|
}
|
|
|
|
public function test_books_delete_own_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['book-update-all']);
|
|
/** @var Book $otherBook */
|
|
$otherBook = Book::query()->take(1)->get()->first();
|
|
$ownBook = $this->createEntityChainBelongingToUser($this->user)['book'];
|
|
$this->checkAccessPermission('book-delete-own', [
|
|
$ownBook->getUrl() . '/delete',
|
|
], [
|
|
$ownBook->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$this->get($otherBook->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Delete')
|
|
->get($otherBook->getUrl() . '/delete')
|
|
->seePageIs('/');
|
|
$this->get($ownBook->getUrl())->get($ownBook->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs('/books')
|
|
->assertDontSee($ownBook->name);
|
|
}
|
|
|
|
public function test_books_delete_all_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['book-update-all']);
|
|
/** @var Book $otherBook */
|
|
$otherBook = Book::query()->take(1)->get()->first();
|
|
$this->checkAccessPermission('book-delete-all', [
|
|
$otherBook->getUrl() . '/delete',
|
|
], [
|
|
$otherBook->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$this->get($otherBook->getUrl())->get($otherBook->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs('/books')
|
|
->assertDontSee($otherBook->name);
|
|
}
|
|
|
|
public function test_chapter_create_own_permissions()
|
|
{
|
|
/** @var Book $book */
|
|
$book = Book::query()->take(1)->get()->first();
|
|
$ownBook = $this->createEntityChainBelongingToUser($this->user)['book'];
|
|
$this->checkAccessPermission('chapter-create-own', [
|
|
$ownBook->getUrl('/create-chapter'),
|
|
], [
|
|
$ownBook->getUrl() => 'New Chapter',
|
|
]);
|
|
|
|
$this->get($ownBook->getUrl('/create-chapter'))
|
|
->type('test chapter', 'name')
|
|
->type('chapter desc', 'description')
|
|
->press('Save Chapter')
|
|
->seePageIs($ownBook->getUrl('/chapter/test-chapter'));
|
|
|
|
$this->get($book->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'New Chapter')
|
|
->get($book->getUrl('/create-chapter'))
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_chapter_create_all_permissions()
|
|
{
|
|
$book = Book::take(1)->get()->first();
|
|
$this->checkAccessPermission('chapter-create-all', [
|
|
$book->getUrl('/create-chapter'),
|
|
], [
|
|
$book->getUrl() => 'New Chapter',
|
|
]);
|
|
|
|
$this->get($book->getUrl('/create-chapter'))
|
|
->type('test chapter', 'name')
|
|
->type('chapter desc', 'description')
|
|
->press('Save Chapter')
|
|
->seePageIs($book->getUrl('/chapter/test-chapter'));
|
|
}
|
|
|
|
public function test_chapter_edit_own_permission()
|
|
{
|
|
$otherChapter = Chapter::take(1)->get()->first();
|
|
$ownChapter = $this->createEntityChainBelongingToUser($this->user)['chapter'];
|
|
$this->checkAccessPermission('chapter-update-own', [
|
|
$ownChapter->getUrl() . '/edit',
|
|
], [
|
|
$ownChapter->getUrl() => 'Edit',
|
|
]);
|
|
|
|
$this->get($otherChapter->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Edit')
|
|
->get($otherChapter->getUrl() . '/edit')
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_chapter_edit_all_permission()
|
|
{
|
|
/** @var Chapter $otherChapter */
|
|
$otherChapter = Chapter::query()->take(1)->get()->first();
|
|
$this->checkAccessPermission('chapter-update-all', [
|
|
$otherChapter->getUrl() . '/edit',
|
|
], [
|
|
$otherChapter->getUrl() => 'Edit',
|
|
]);
|
|
}
|
|
|
|
public function test_chapter_delete_own_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['chapter-update-all']);
|
|
/** @var Chapter $otherChapter */
|
|
$otherChapter = Chapter::query()->take(1)->get()->first();
|
|
$ownChapter = $this->createEntityChainBelongingToUser($this->user)['chapter'];
|
|
$this->checkAccessPermission('chapter-delete-own', [
|
|
$ownChapter->getUrl() . '/delete',
|
|
], [
|
|
$ownChapter->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$bookUrl = $ownChapter->book->getUrl();
|
|
$this->get($otherChapter->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Delete')
|
|
->get($otherChapter->getUrl() . '/delete')
|
|
->seePageIs('/');
|
|
$this->get($ownChapter->getUrl())->get($ownChapter->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs($bookUrl)
|
|
->assertElementNotContains('.book-content', $ownChapter->name);
|
|
}
|
|
|
|
public function test_chapter_delete_all_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['chapter-update-all']);
|
|
$otherChapter = Chapter::take(1)->get()->first();
|
|
$this->checkAccessPermission('chapter-delete-all', [
|
|
$otherChapter->getUrl() . '/delete',
|
|
], [
|
|
$otherChapter->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$bookUrl = $otherChapter->book->getUrl();
|
|
$this->get($otherChapter->getUrl())->get($otherChapter->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs($bookUrl)
|
|
->assertElementNotContains('.book-content', $otherChapter->name);
|
|
}
|
|
|
|
public function test_page_create_own_permissions()
|
|
{
|
|
/** @var Book $book */
|
|
$book = Book::query()->first();
|
|
/** @var Chapter $chapter */
|
|
$chapter = Chapter::query()->first();
|
|
|
|
$entities = $this->createEntityChainBelongingToUser($this->user);
|
|
$ownBook = $entities['book'];
|
|
$ownChapter = $entities['chapter'];
|
|
|
|
$createUrl = $ownBook->getUrl('/create-page');
|
|
$createUrlChapter = $ownChapter->getUrl('/create-page');
|
|
$accessUrls = [$createUrl, $createUrlChapter];
|
|
|
|
foreach ($accessUrls as $url) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->seePageIs('/');
|
|
}
|
|
|
|
$this->checkAccessPermission('page-create-own', [], [
|
|
$ownBook->getUrl() => 'New Page',
|
|
$ownChapter->getUrl() => 'New Page',
|
|
]);
|
|
|
|
$this->giveUserPermissions($this->user, ['page-create-own']);
|
|
|
|
foreach ($accessUrls as $index => $url) {
|
|
$this->actingAs($this->user)->get($url);
|
|
$expectedUrl = Page::where('draft', '=', true)->orderBy('id', 'desc')->first()->getUrl();
|
|
$this->seePageIs($expectedUrl);
|
|
}
|
|
|
|
$this->get($createUrl)
|
|
->type('test page', 'name')
|
|
->type('page desc', 'html')
|
|
->press('Save Page')
|
|
->seePageIs($ownBook->getUrl('/page/test-page'));
|
|
|
|
$this->get($book->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'New Page')
|
|
->get($book->getUrl() . '/create-page')
|
|
->seePageIs('/');
|
|
$this->get($chapter->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'New Page')
|
|
->get($chapter->getUrl() . '/create-page')
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_page_create_all_permissions()
|
|
{
|
|
$book = Book::take(1)->get()->first();
|
|
$chapter = Chapter::take(1)->get()->first();
|
|
$createUrl = $book->getUrl('/create-page');
|
|
|
|
$createUrlChapter = $chapter->getUrl('/create-page');
|
|
$accessUrls = [$createUrl, $createUrlChapter];
|
|
|
|
foreach ($accessUrls as $url) {
|
|
$this->actingAs($this->user)->get($url)
|
|
->seePageIs('/');
|
|
}
|
|
|
|
$this->checkAccessPermission('page-create-all', [], [
|
|
$book->getUrl() => 'New Page',
|
|
$chapter->getUrl() => 'New Page',
|
|
]);
|
|
|
|
$this->giveUserPermissions($this->user, ['page-create-all']);
|
|
|
|
foreach ($accessUrls as $index => $url) {
|
|
$this->actingAs($this->user)->get($url);
|
|
$expectedUrl = Page::where('draft', '=', true)->orderBy('id', 'desc')->first()->getUrl();
|
|
$this->seePageIs($expectedUrl);
|
|
}
|
|
|
|
$this->get($createUrl)
|
|
->type('test page', 'name')
|
|
->type('page desc', 'html')
|
|
->press('Save Page')
|
|
->seePageIs($book->getUrl('/page/test-page'));
|
|
|
|
$this->get($chapter->getUrl('/create-page'))
|
|
->type('new test page', 'name')
|
|
->type('page desc', 'html')
|
|
->press('Save Page')
|
|
->seePageIs($book->getUrl('/page/new-test-page'));
|
|
}
|
|
|
|
public function test_page_edit_own_permission()
|
|
{
|
|
$otherPage = Page::take(1)->get()->first();
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->checkAccessPermission('page-update-own', [
|
|
$ownPage->getUrl() . '/edit',
|
|
], [
|
|
$ownPage->getUrl() => 'Edit',
|
|
]);
|
|
|
|
$this->get($otherPage->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Edit')
|
|
->get($otherPage->getUrl() . '/edit')
|
|
->seePageIs('/');
|
|
}
|
|
|
|
public function test_page_edit_all_permission()
|
|
{
|
|
$otherPage = Page::take(1)->get()->first();
|
|
$this->checkAccessPermission('page-update-all', [
|
|
$otherPage->getUrl() . '/edit',
|
|
], [
|
|
$otherPage->getUrl() => 'Edit',
|
|
]);
|
|
}
|
|
|
|
public function test_page_delete_own_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['page-update-all']);
|
|
$otherPage = Page::take(1)->get()->first();
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->checkAccessPermission('page-delete-own', [
|
|
$ownPage->getUrl() . '/delete',
|
|
], [
|
|
$ownPage->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$parent = $ownPage->chapter ?? $ownPage->book;
|
|
$this->get($otherPage->getUrl())
|
|
->assertElementNotContains('.action-buttons', 'Delete')
|
|
->get($otherPage->getUrl() . '/delete')
|
|
->seePageIs('/');
|
|
$this->get($ownPage->getUrl())->get($ownPage->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs($parent->getUrl())
|
|
->assertElementNotContains('.book-content', $ownPage->name);
|
|
}
|
|
|
|
public function test_page_delete_all_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['page-update-all']);
|
|
$otherPage = Page::take(1)->get()->first();
|
|
$this->checkAccessPermission('page-delete-all', [
|
|
$otherPage->getUrl() . '/delete',
|
|
], [
|
|
$otherPage->getUrl() => 'Delete',
|
|
]);
|
|
|
|
$parent = $otherPage->chapter ?? $otherPage->book;
|
|
$this->get($otherPage->getUrl())->get($otherPage->getUrl() . '/delete')
|
|
->press('Confirm')
|
|
->seePageIs($parent->getUrl())
|
|
->assertElementNotContains('.book-content', $otherPage->name);
|
|
}
|
|
|
|
public function test_public_role_visible_in_user_edit_screen()
|
|
{
|
|
$user = User::first();
|
|
$adminRole = Role::getSystemRole('admin');
|
|
$publicRole = Role::getSystemRole('public');
|
|
$this->asAdmin()->get('/settings/users/' . $user->id)
|
|
->assertElementExists('[name="roles[' . $adminRole->id . ']"]')
|
|
->assertElementExists('[name="roles[' . $publicRole->id . ']"]');
|
|
}
|
|
|
|
public function test_public_role_visible_in_role_listing()
|
|
{
|
|
$this->asAdmin()->get('/settings/roles')
|
|
->assertSee('Admin')
|
|
->assertSee('Public');
|
|
}
|
|
|
|
public function test_public_role_visible_in_default_role_setting()
|
|
{
|
|
$this->asAdmin()->get('/settings')
|
|
->assertElementExists('[data-system-role-name="admin"]')
|
|
->assertElementExists('[data-system-role-name="public"]');
|
|
}
|
|
|
|
public function test_public_role_not_deleteable()
|
|
{
|
|
$this->asAdmin()->get('/settings/roles')
|
|
->click('Public')
|
|
->assertSee('Edit Role')
|
|
->click('Delete Role')
|
|
->press('Confirm')
|
|
->assertSee('Delete Role')
|
|
->assertSee('Cannot be deleted');
|
|
}
|
|
|
|
public function test_image_delete_own_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['image-update-all']);
|
|
$page = Page::first();
|
|
$image = factory(Image::class)->create(['uploaded_to' => $page->id, 'created_by' => $this->user->id, 'updated_by' => $this->user->id]);
|
|
|
|
$this->actingAs($this->user)->json('delete', '/images/' . $image->id)
|
|
->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['image-delete-own']);
|
|
|
|
$this->actingAs($this->user)->json('delete', '/images/' . $image->id)
|
|
->assertOk()
|
|
->assertDatabaseMissing('images', ['id' => $image->id]);
|
|
}
|
|
|
|
public function test_image_delete_all_permission()
|
|
{
|
|
$this->giveUserPermissions($this->user, ['image-update-all']);
|
|
$admin = $this->getAdmin();
|
|
$page = Page::first();
|
|
$image = factory(Image::class)->create(['uploaded_to' => $page->id, 'created_by' => $admin->id, 'updated_by' => $admin->id]);
|
|
|
|
$this->actingAs($this->user)->json('delete', '/images/' . $image->id)
|
|
->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['image-delete-own']);
|
|
|
|
$this->actingAs($this->user)->json('delete', '/images/' . $image->id)
|
|
->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['image-delete-all']);
|
|
|
|
$this->actingAs($this->user)->json('delete', '/images/' . $image->id)
|
|
->assertOk()
|
|
->assertDatabaseMissing('images', ['id' => $image->id]);
|
|
}
|
|
|
|
public function test_role_permission_removal()
|
|
{
|
|
// To cover issue fixed in f99c8ff99aee9beb8c692f36d4b84dc6e651e50a.
|
|
/** @var Page $page */
|
|
$page = Page::query()->first();
|
|
$viewerRole = Role::getRole('viewer');
|
|
$viewer = $this->getViewer();
|
|
$this->actingAs($viewer)->get($page->getUrl())->assertOk();
|
|
|
|
$this->asAdmin()->put('/settings/roles/' . $viewerRole->id, [
|
|
'display_name' => $viewerRole->display_name,
|
|
'description' => $viewerRole->description,
|
|
'permission' => [],
|
|
])->assertStatus(302);
|
|
|
|
$this->actingAs($viewer)->get($page->getUrl())->assertStatus(404);
|
|
}
|
|
|
|
public function test_empty_state_actions_not_visible_without_permission()
|
|
{
|
|
$admin = $this->getAdmin();
|
|
// Book links
|
|
$book = factory(Book::class)->create(['created_by' => $admin->id, 'updated_by' => $admin->id]);
|
|
$this->regenEntityPermissions($book);
|
|
$this->actingAs($this->getViewer())->get($book->getUrl())
|
|
->assertDontSee('Create a new page')
|
|
->assertDontSee('Add a chapter');
|
|
|
|
// Chapter links
|
|
$chapter = factory(Chapter::class)->create(['created_by' => $admin->id, 'updated_by' => $admin->id, 'book_id' => $book->id]);
|
|
$this->regenEntityPermissions($chapter);
|
|
$this->actingAs($this->getViewer())->get($chapter->getUrl())
|
|
->assertDontSee('Create a new page')
|
|
->assertDontSee('Sort the current book');
|
|
}
|
|
|
|
public function test_comment_create_permission()
|
|
{
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
|
|
$this->actingAs($this->user)
|
|
->addComment($ownPage)
|
|
->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['comment-create-all']);
|
|
|
|
$this->actingAs($this->user)
|
|
->addComment($ownPage)
|
|
->assertOk();
|
|
}
|
|
|
|
public function test_comment_update_own_permission()
|
|
{
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->giveUserPermissions($this->user, ['comment-create-all']);
|
|
$this->actingAs($this->user)->addComment($ownPage);
|
|
/** @var Comment $comment */
|
|
$comment = $ownPage->comments()->latest()->first();
|
|
|
|
// no comment-update-own
|
|
$this->actingAs($this->user)->updateComment($comment)->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['comment-update-own']);
|
|
|
|
// now has comment-update-own
|
|
$this->actingAs($this->user)->updateComment($comment)->assertOk();
|
|
}
|
|
|
|
public function test_comment_update_all_permission()
|
|
{
|
|
/** @var Page $ownPage */
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->asAdmin()->addComment($ownPage);
|
|
/** @var Comment $comment */
|
|
$comment = $ownPage->comments()->latest()->first();
|
|
|
|
// no comment-update-all
|
|
$this->actingAs($this->user)->updateComment($comment)->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['comment-update-all']);
|
|
|
|
// now has comment-update-all
|
|
$this->actingAs($this->user)->updateComment($comment)->assertOk();
|
|
}
|
|
|
|
public function test_comment_delete_own_permission()
|
|
{
|
|
/** @var Page $ownPage */
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->giveUserPermissions($this->user, ['comment-create-all']);
|
|
$this->actingAs($this->user)->addComment($ownPage);
|
|
|
|
/** @var Comment $comment */
|
|
$comment = $ownPage->comments()->latest()->first();
|
|
|
|
// no comment-delete-own
|
|
$this->actingAs($this->user)->deleteComment($comment)->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['comment-delete-own']);
|
|
|
|
// now has comment-update-own
|
|
$this->actingAs($this->user)->deleteComment($comment)->assertOk();
|
|
}
|
|
|
|
public function test_comment_delete_all_permission()
|
|
{
|
|
/** @var Page $ownPage */
|
|
$ownPage = $this->createEntityChainBelongingToUser($this->user)['page'];
|
|
$this->asAdmin()->addComment($ownPage);
|
|
/** @var Comment $comment */
|
|
$comment = $ownPage->comments()->latest()->first();
|
|
|
|
// no comment-delete-all
|
|
$this->actingAs($this->user)->deleteComment($comment)->assertStatus(403);
|
|
|
|
$this->giveUserPermissions($this->user, ['comment-delete-all']);
|
|
|
|
// now has comment-delete-all
|
|
$this->actingAs($this->user)->deleteComment($comment)->assertOk();
|
|
}
|
|
|
|
private function addComment(Page $page): TestResponse
|
|
{
|
|
$comment = factory(Comment::class)->make();
|
|
return $this->postJson("/comment/$page->id", $comment->only('text', 'html'));
|
|
}
|
|
|
|
private function updateComment(Comment $comment): TestResponse
|
|
{
|
|
$commentData = factory(Comment::class)->make();
|
|
return $this->putJson("/comment/{$comment->id}", $commentData->only('text', 'html'));
|
|
}
|
|
|
|
private function deleteComment(Comment $comment): TestResponse
|
|
{
|
|
return $this->json('DELETE', '/comment/' . $comment->id);
|
|
}
|
|
}
|