ba29147e34
Renamed recovery methods in Util{} for clarity Added note about bug causing slow page load and redundant keypair generation recoveryAdmin functionality not yet complete
283 lines
No EOL
8.7 KiB
PHP
Executable file
283 lines
No EOL
8.7 KiB
PHP
Executable file
<?php
|
|
/**
|
|
* Copyright (c) 2012 Sam Tuke <samtuke@owncloud.com>
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
* later.
|
|
* See the COPYING-README file.
|
|
*/
|
|
|
|
//require_once "PHPUnit/Framework/TestCase.php";
|
|
require_once realpath( dirname(__FILE__).'/../../../lib/base.php' );
|
|
require_once realpath( dirname(__FILE__).'/../lib/crypt.php' );
|
|
require_once realpath( dirname(__FILE__).'/../lib/keymanager.php' );
|
|
require_once realpath( dirname(__FILE__).'/../lib/proxy.php' );
|
|
require_once realpath( dirname(__FILE__).'/../lib/stream.php' );
|
|
require_once realpath( dirname(__FILE__).'/../lib/util.php' );
|
|
require_once realpath( dirname(__FILE__).'/../appinfo/app.php' );
|
|
|
|
// Load mockery files
|
|
require_once 'Mockery/Loader.php';
|
|
require_once 'Hamcrest/Hamcrest.php';
|
|
$loader = new \Mockery\Loader;
|
|
$loader->register();
|
|
|
|
use \Mockery as m;
|
|
use OCA\Encryption;
|
|
|
|
class Test_Enc_Util extends \PHPUnit_Framework_TestCase {
|
|
|
|
function setUp() {
|
|
// reset backend
|
|
\OC_User::useBackend('database');
|
|
|
|
\OC_User::setUserId( 'admin' );
|
|
$this->userId = 'admin';
|
|
$this->pass = 'admin';
|
|
|
|
// set content for encrypting / decrypting in tests
|
|
$this->dataUrl = realpath( dirname(__FILE__).'/../lib/crypt.php' );
|
|
$this->dataShort = 'hats';
|
|
$this->dataLong = file_get_contents( realpath( dirname(__FILE__).'/../lib/crypt.php' ) );
|
|
$this->legacyData = realpath( dirname(__FILE__).'/legacy-text.txt' );
|
|
$this->legacyEncryptedData = realpath( dirname(__FILE__).'/legacy-encrypted-text.txt' );
|
|
|
|
$keypair = Encryption\Crypt::createKeypair();
|
|
|
|
$this->genPublicKey = $keypair['publicKey'];
|
|
$this->genPrivateKey = $keypair['privateKey'];
|
|
|
|
$this->publicKeyDir = '/' . 'public-keys';
|
|
$this->encryptionDir = '/' . $this->userId . '/' . 'files_encryption';
|
|
$this->keyfilesPath = $this->encryptionDir . '/' . 'keyfiles';
|
|
$this->publicKeyPath = $this->publicKeyDir . '/' . $this->userId . '.public.key'; // e.g. data/public-keys/admin.public.key
|
|
$this->privateKeyPath = $this->encryptionDir . '/' . $this->userId . '.private.key'; // e.g. data/admin/admin.private.key
|
|
|
|
$this->view = new \OC_FilesystemView( '/' );
|
|
|
|
$userHome = \OC_User::getHome($this->userId);
|
|
$this->dataDir = str_replace('/'.$this->userId, '', $userHome);
|
|
|
|
\OC\Files\Filesystem::init( $this->userId, '/' );
|
|
\OC\Files\Filesystem::mount( 'OC_Filestorage_Local', array('datadir' => $this->dataDir), '/' );
|
|
|
|
$params['uid'] = $this->userId;
|
|
$params['password'] = $this->pass;
|
|
OCA\Encryption\Hooks::login($params);
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
$this->util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
}
|
|
|
|
function tearDown(){
|
|
|
|
m::close();
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief test that paths set during User construction are correct
|
|
*
|
|
*
|
|
*
|
|
*/
|
|
function testKeyPaths() {
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
|
|
$util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
$this->assertEquals( $this->publicKeyDir, $util->getPath( 'publicKeyDir' ) );
|
|
$this->assertEquals( $this->encryptionDir, $util->getPath( 'encryptionDir' ) );
|
|
$this->assertEquals( $this->keyfilesPath, $util->getPath( 'keyfilesPath' ) );
|
|
$this->assertEquals( $this->publicKeyPath, $util->getPath( 'publicKeyPath' ) );
|
|
$this->assertEquals( $this->privateKeyPath, $util->getPath( 'privateKeyPath' ) );
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief test setup of encryption directories when they don't yet exist
|
|
*/
|
|
function testSetupServerSideNotSetup() {
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
|
|
$mockView->shouldReceive( 'file_exists' )->times(7)->andReturn( false );
|
|
$mockView->shouldReceive( 'mkdir' )->times(6)->andReturn( true );
|
|
$mockView->shouldReceive( 'file_put_contents' )->withAnyArgs();
|
|
|
|
$util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
$this->assertEquals( true, $util->setupServerSide( $this->pass ) );
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief test setup of encryption directories when they already exist
|
|
*/
|
|
function testSetupServerSideIsSetup() {
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
|
|
$mockView->shouldReceive( 'file_exists' )->times(8)->andReturn( true );
|
|
$mockView->shouldReceive( 'file_put_contents' )->withAnyArgs();
|
|
|
|
$util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
$this->assertEquals( true, $util->setupServerSide( $this->pass ) );
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief test checking whether account is ready for encryption, when it isn't ready
|
|
*/
|
|
function testReadyNotReady() {
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
|
|
$mockView->shouldReceive( 'file_exists' )->times(1)->andReturn( false );
|
|
|
|
$util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
$this->assertEquals( false, $util->ready() );
|
|
|
|
# TODO: Add more tests here to check that if any of the dirs are
|
|
# then false will be returned. Use strict ordering?
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief test checking whether account is ready for encryption, when it is ready
|
|
*/
|
|
function testReadyIsReady() {
|
|
|
|
$mockView = m::mock('OC_FilesystemView');
|
|
|
|
$mockView->shouldReceive( 'file_exists' )->times(5)->andReturn( true );
|
|
|
|
$util = new Encryption\Util( $mockView, $this->userId );
|
|
|
|
$this->assertEquals( true, $util->ready() );
|
|
|
|
# TODO: Add more tests here to check that if any of the dirs are
|
|
# then false will be returned. Use strict ordering?
|
|
|
|
}
|
|
|
|
function testFindEncFiles() {
|
|
|
|
// $this->view->chroot( "/data/{$this->userId}/files" );
|
|
|
|
$util = new Encryption\Util( $this->view, $this->userId );
|
|
|
|
$files = $util->findEncFiles( '/', 'encrypted' );
|
|
|
|
var_dump( $files );
|
|
|
|
# TODO: Add more tests here to check that if any of the dirs are
|
|
# then false will be returned. Use strict ordering?
|
|
|
|
}
|
|
|
|
function testRecoveryEnabledForUser() {
|
|
|
|
$util = new Encryption\Util( $this->view, $this->userId );
|
|
|
|
// Record the value so we can return it to it's original state later
|
|
$enabled = $util->recoveryEnabledForUser();
|
|
|
|
$this->assertTrue( $util->setRecoveryForUser( 1 ) );
|
|
|
|
$this->assertEquals( 1, $util->recoveryEnabledForUser() );
|
|
|
|
$this->assertTrue( $util->setRecoveryForUser( 0 ) );
|
|
|
|
$this->assertEquals( 0, $util->recoveryEnabledForUser() );
|
|
|
|
// Return the setting to it's previous state
|
|
$this->assertTrue( $util->setRecoveryForUser( $enabled ) );
|
|
|
|
}
|
|
|
|
function testGetUidAndFilename() {
|
|
|
|
\OC_User::setUserId( 'admin' );
|
|
|
|
$filename = 'tmp-'.time().'.test';
|
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
$this->view->file_put_contents($this->userId . '/files/' . $filename, $this->dataShort);
|
|
|
|
// Re-enable proxy - our work is done
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
$util = new Encryption\Util( $this->view, $this->userId );
|
|
|
|
list($fileOwnerUid, $file) = $util->getUidAndFilename( $filename );
|
|
|
|
$this->assertEquals('admin', $fileOwnerUid);
|
|
|
|
$this->assertEquals($file, $filename);
|
|
}
|
|
|
|
// /**
|
|
// * @brief test decryption using legacy blowfish method
|
|
// * @depends testLegacyEncryptLong
|
|
// */
|
|
// function testLegacyKeyRecryptKeyfileDecrypt( $recrypted ) {
|
|
//
|
|
// $decrypted = Encryption\Crypt::keyDecryptKeyfile( $recrypted['data'], $recrypted['key'], $this->genPrivateKey );
|
|
//
|
|
// $this->assertEquals( $this->dataLong, $decrypted );
|
|
//
|
|
// }
|
|
|
|
// // Cannot use this test for now due to hidden dependencies in OC_FileCache
|
|
// function testIsLegacyEncryptedContent() {
|
|
//
|
|
// $keyfileContent = OCA\Encryption\Crypt::symmetricEncryptFileContent( $this->legacyEncryptedData, 'hat' );
|
|
//
|
|
// $this->assertFalse( OCA\Encryption\Crypt::isLegacyEncryptedContent( $keyfileContent, '/files/admin/test.txt' ) );
|
|
//
|
|
// OC_FileCache::put( '/admin/files/legacy-encrypted-test.txt', $this->legacyEncryptedData );
|
|
//
|
|
// $this->assertTrue( OCA\Encryption\Crypt::isLegacyEncryptedContent( $this->legacyEncryptedData, '/files/admin/test.txt' ) );
|
|
//
|
|
// }
|
|
|
|
// // Cannot use this test for now due to need for different root in OC_Filesystem_view class
|
|
// function testGetLegacyKey() {
|
|
//
|
|
// $c = new \OCA\Encryption\Util( $view, false );
|
|
//
|
|
// $bool = $c->getLegacyKey( 'admin' );
|
|
//
|
|
// $this->assertTrue( $bool );
|
|
//
|
|
// $this->assertTrue( $c->legacyKey );
|
|
//
|
|
// $this->assertTrue( is_int( $c->legacyKey ) );
|
|
//
|
|
// $this->assertTrue( strlen( $c->legacyKey ) == 20 );
|
|
//
|
|
// }
|
|
|
|
// // Cannot use this test for now due to need for different root in OC_Filesystem_view class
|
|
// function testLegacyDecrypt() {
|
|
//
|
|
// $c = new OCA\Encryption\Util( $this->view, false );
|
|
//
|
|
// $bool = $c->getLegacyKey( 'admin' );
|
|
//
|
|
// $encrypted = $c->legacyEncrypt( $this->data, $c->legacyKey );
|
|
//
|
|
// $decrypted = $c->legacyDecrypt( $encrypted, $c->legacyKey );
|
|
//
|
|
// $this->assertEquals( $decrypted, $this->data );
|
|
//
|
|
// }
|
|
|
|
} |