Newer
Older
<?php
/**
* Copyright (c) 2012, Agence Française Informatique (AFI). All rights reserved.
*
* it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE as published by
* the Free Software Foundation.
*
* There are special exceptions to the terms and conditions of the AGPL as it
* is applied to this software (see README file).
*
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU AFFERO GENERAL PUBLIC LICENSE
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
require_once 'AbstractControllerTestCase.php';
abstract class PortailWithOneLoginModuleTestCase extends AbstractControllerTestCase {
public function setUp() {
parent::setUp();
Storm_Test_ObjectWrapper::onLoaderOfModel('Class_IntBib')
->whenCalled('findAllBy')
->answers([]);
$cfg_accueil = ['modules' => [4 => ['division' => '4',
'id_module' => 4,
'type_module' => 'LOGIN',
'preferences' => [
'identifiant' => 'Numéro de carte',
'mot_de_passe'=> 'Année de naissance',
'identifiant_exemple' => 'jj-mm-aaaa',
'mot_de_passe_exemple' => '1983',
'titre_connecte' => 'Vous êtes connecté(e)',
'lien_connexion' => 'please, log me',
'lien_mot_de_passe_oublie' => 'me rappelle plus',
'profil_redirect' => 1,
'profil_logout_redirect' => 0]]],
'options' => []];
Class_Profil::getCurrentProfil()
->setBrowser('opac')
->setCfgAccueil(ZendAfi_Filters_Serialize::serialize($cfg_accueil));
}
}
class AuthControllerInviteLoggedTest extends PortailWithOneLoginModuleTestCase {
protected function _loginHook($account) {
$account->ROLE = "invite";
$account->ROLE_LEVEL = 1;
}
public function setUp() {
parent::setUp();
$this->dispatch('/opac/',true);
}
/** @test */
public function noLinkPretsShouldBePresent() {
$this->assertNotXPath('//div[@id="boite_login"]//a[contains(@href, "prets")]');
}
/** @test */
public function linkSeDeconnecterShouldBePresent() {
$this->assertXPath('//div[@id="boite_login"]//a[contains(@href, "auth/logout")]');
}
/** @test */
public function actionIndexShouldRedirectToOpac() {
$this->bootstrap();
$this->dispatch('/auth', true);
$this->assertRedirectTo('/opac');
}
}
class AuthControllerAbonneSIGBLoggedTest extends PortailWithOneLoginModuleTestCase {
$this->emprunteur_patrick = Class_WebService_SIGB_Emprunteur::newInstance(5, 'patrick')
->empruntsAddAll(array(Class_WebService_SIGB_Emprunt::newInstanceWithEmptyExemplaire()
->setDateRetour('23/12/2056'),
Class_WebService_SIGB_Emprunt::newInstanceWithEmptyExemplaire()
->setDateRetour('3/2/2056'),
Class_WebService_SIGB_Emprunt::newInstanceWithEmptyExemplaire()
->setDateRetour('23/1/1999')))
->reservationsAddAll(array(Class_WebService_SIGB_Reservation::newInstanceWithEmptyExemplaire()));
ZendAfi_Auth::getInstance()->logUser(
Class_Users::newInstanceWithId(5,
['login' => 'patrick',
'idabon' => 456,
'role_level' => ZendAfi_Acl_AdminControllerRoles::ABONNE_SIGB,
'id_site' => 1,
'fiche_sigb' => ['fiche' => $this->emprunteur_patrick]]));
/** @test */
public function redirectProfilShouldBeProfil1(){
$this->assertXPath('//a[contains(@href,"abonne/fiche/id_profil/1")]');
}
/** @test */
public function linkPretsShouldBePresent() {
$this->assertXPathContentContains('//div[@id="boite_login"]//a[contains(@href, "prets")]', '3');
}
/** @test */
public function linkReservationsShouldBePresent() {
$this->assertXPath('//div[@id="boite_login"]//a[contains(@href, "reservations")]');
}
/** @test */
public function linkSeDeconnecterShouldBePresent() {
$this->assertXPath('//div[@id="boite_login"]//a[contains(@href, "auth/logout")]');
}
/**
* @test
* @group pagetitles
*/
public function pageAuthLoginBarreNavShouldBeConnexion() {
$this->bootstrap();
$this->dispatch('/opac/auth/login',true);
$this->assertXPathContentContains('//div[@class="barre_nav"]/span','Connexion');
}
class AuthControllerAbonneSIGBLoggedLogoutTest
extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
$this->dispatch('/opac/auth/logout');
}
/** @test */
public function shouldRedirectToRoot() {
$this->assertRedirectTo('/');
}
class AuthControllerWithProfilPageAbonneSIGBLoggedLogoutTest
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
extends PortailWithOneLoginModuleTestCase {
protected $_profile, $_parent_profile;
public function setUp() {
parent::setUp();
$this->_parent_profile = Class_Profil::getCurrentProfil();
$this->_profile = $this->fixture('Class_Profil',
['id' => 22,
'browser' => 'opac',
'libelle' => 'Profil Adulte',
'hauteur_banniere' => 150,
'couleur_texte_bandeau' => '#F2C',
'couleur_lien_bandeau' => '#234',
'menu_haut_on' => true,
'cfg_menus' => [],
'commentaire' => 'Super bib',
'ref_tags' => 'bib,Adulte',
'parent_profil' => $this->_parent_profile]);
Class_Profil::setCurrentProfil($this->_profile);
}
/** @test **/
public function withoutLogoutProfileShouldRedirectToParentProfile() {
$this->dispatch('/opac/auth/logout');
$this->assertRedirectTo('/opac/index/index/id_profil/2');
}
/** @test **/
public function withLogoutProfile6InParentShouldRedirectToIt() {
$cfg_accueil = $this->_parent_profile->getCfgAccueilAsArray();
$cfg_accueil['modules'][4]['preferences']['profil_logout_redirect'] = 6;
$this->_parent_profile
->setCfgAccueil(ZendAfi_Filters_Serialize::serialize($cfg_accueil));
$this->dispatch('/opac/auth/logout');
$this->assertRedirectTo('/opac/index/index/id_profil/6');
}

gloas
committed
}
abstract class AuthControllerNobodyLoggedTestCase extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
ZendAfi_Auth::getInstance()->clearIdentity();
}
class AuthControllerNobodyLoggedActivateTest extends AuthControllerNobodyLoggedTestCase {
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
const ERROR_MESSAGE = 'Un probleme est survenu lors de l\'activation';
const OK_MESSAGE = 'Ok, compte cree';
public function setUp() {
parent::setUp();
Class_UsersNonValid::beVolatile();
Class_Users::beVolatile();
$this->fixture('Class_AdminVar', ['id' => 'USER_NON_VALIDATED',
'valeur' => self::ERROR_MESSAGE]);
$this->fixture('Class_AdminVar', ['id' => 'USER_VALIDATED',
'valeur' => self::OK_MESSAGE]);
}
/** @test */
public function withoutKeyShouldRedirect() {
$this->dispatch('/opac/auth/activeuser', true);
$this->assertRedirect();
}
/** @test */
public function withUnknownKeyShouldDisplayError() {
$this->dispatch('/opac/auth/activeuser/c/666', true);
$this->assertXPathContentContains('//div', self::ERROR_MESSAGE);
}
/** @test */
public function withKnownKeyShouldCreateUserAndDeleteNonValid() {
$this->fixture('Class_UsersNonValid', ['id' => 12,
'cle' => '777',
'login' => 'harlock',
'mail' => 'harlock@afi-sa.fr',
'password' => 'cosmos']);
$this->dispatch('/opac/auth/activeuser/c/777', true);
$this->assertXPathContentContains('//div', self::OK_MESSAGE);
// non valid deleted
$this->assertEquals(0, Class_UsersNonValid::countBy([]));
// user created
$created = Class_Users::findFirstBy(['order' => 'id desc']);
$this->assertEquals('harlock@afi-sa.fr', $created->getMail());
}

llaffont
committed
class AuthControllerNobodyLoggedAndRegistrationAllowedBoiteLoginTest
extends AuthControllerNobodyLoggedTestCase {
public function setUp() {
parent::setUp();

llaffont
committed
Class_AdminVar::getLoader()
->newInstanceWithId('INTERDIRE_ENREG_UTIL')
->setValeur(0);
/** @test */
public function loginSubmitShouldBePresent(){
$this->assertXPath('//div[@id="boite_login"]//input[@type="submit"]');
}
/** @test */
public function titleShouldBeSeConnecter(){
$this->assertXPathContentContains('//h1','Se connecter');
}
/** @test **/
public function inputLoginShouldSubmitOnKey13Pressed() {
$this->assertXPath('//div[@id="boite_login"]//input[contains(@onkeypress,"if (event.keyCode == 13) {this.form.submit();return false;}")]');
}
/** @test */
public function loginLinkShouldBePresent() {
$this->assertXPathContentContains('//div[@id="boite_login"]//a[contains(@onclick, "submit")]',
'please, log me');
}
/** @test */
public function lostPassLinkShouldBePresent() {
$this->assertXPathContentContains('//div[@id="boite_login"]//tr/td[@colspan="2"]/a[contains(@href, "auth/lostpass")]',
'me rappelle plus');
}
/** @test */
public function registerLinkShouldBePresent() {
$this->assertXPathContentContains('//div[@id="boite_login"]//a[contains(@href, "auth/register")]', "S'enregistrer");
}
/** @test */
public function shouldAccessRegisterPage() {
$this->bootstrap();
$this->dispatch('auth/register', true);
$this->assertAction('register');
$this->assertController('auth');
$this->assertNotRedirect('/');
}
/** @test */
public function inputIdentifiantShouldHavePlaceHolderJJ_MM_AAAA() {
$this->assertXPath('//input[@name="username"][@placeholder="jj-mm-aaaa"]');
}

llaffont
committed
/** @test */
public function inputPasswordShouldHavePlaceHolder1983() {
$this->assertXPath('//input[@name="password"][@placeholder="1983"]');
}

llaffont
committed
/** @test */
function headShouldContainsAbonnesJS() {
$this->assertXPath('//head//script[contains(@src,"public/opac/js/abonne.js")]');
}
/** @test */
function headShouldContainsAdminCommonJS() {
$this->assertXPath('//head//script[contains(@src,"public/admin/js/common.js")]');
}
/** @test */
function headShouldContainsJQuery() {
$this->assertXPath('//head//script[contains(@src, "jquery")]');
}
/** @test */
public function globalCssShouldBeLoadedAfterJQueryUiCss() {
$pos_jquery = strpos($this->_response->getBody(), 'js/jquery_ui/css');
$pos_global = strpos($this->_response->getBody(), 'css/global.css');
$this->assertTrue(($pos_jquery < $pos_global) && ($pos_jquery > 0));
}

llaffont
committed
class AuthControllerNobodyLoggedAndRegistrationAllowedAjaxLoginTest extends AuthControllerNobodyLoggedTestCase {

llaffont
committed
Class_AdminVar::getLoader()
->newInstanceWithId('INTERDIRE_ENREG_UTIL')
->setValeur(0);

llaffont
committed
$this->dispatch('/opac/auth/popup-login/render/popup', true);
$this->_xpath = new Storm_Test_XPath();
$this->_json = json_decode($this->_response->getBody());
}

llaffont
committed
public function testLinkLostPassword() {
$this->_xpath->assertXPath($this->_json->content,
'//div//a[contains(@onclick, "getUsername")]');
}

llaffont
committed
public function testLinkSenregistrer() {
$this->_xpath->assertXPath($this->_json->content,
'//div//a[contains(@href, "auth/register")]');
$this->_xpath->assertXPathContentContains(
$this->_json->content,
'//div//a[contains(@href, "auth/register")]',
"S'enregistrer");
}
/** @test */
public function noLinkShouldHaveRenderPopup() {
$this->_xpath->assertNotXPath($this->_json->content,
'//div//a[contains(@href, "render/popup")]');
}

llaffont
committed
}
class AuthControllerNobodyLoggedAndNoRegistrationTest extends AuthControllerNobodyLoggedTestCase {
public function setUp() {
parent::setUp();
$interdire_enregistrement = new Class_AdminVar();
$interdire_enregistrement
->setId('INTERDIRE_ENREG_UTIL')
->setValeur(1);
Class_AdminVar::getLoader()->cacheInstance($interdire_enregistrement);
public function testLinkSenregistrerNotHere() {
$this->assertNotXPath('//div[@id="boite_login"]//a[contains(@href, "auth/register")]');
}
public function testCannotAccessRegisterPage() {
$this->dispatch('auth/register');
$this->assertRedirect('/');
}
class AuthControllerNobodyLoggedAndNoRegistrationOnLoginPageTest extends AuthControllerNobodyLoggedTestCase {
public function setUp() {
parent::setUp();
$interdire_enregistrement = new Class_AdminVar();
$interdire_enregistrement
->setId('INTERDIRE_ENREG_UTIL')
->setValeur(1);
Class_AdminVar::getLoader()->cacheInstance($interdire_enregistrement);
/** @test **/
public function linkRegisterShouldNotBeDisplayInLoggingBox() {
$this->assertNotXPath('//div[@id="boite_login"]//a[contains(@href, "auth/register")]');
}
/** @test **/
public function linkRegisterShouldNotBeDisplayInPageAuthLogin() {
$this->assertNotXPath('//div[@id="fieldset-login_form"]//a[contains(@href, "auth/register")]');
}
/** @test */
public function formActionShouldBeLogin() {
$this->assertXPath('//form[@action="/auth/login"]');
}
}

llaffont
committed
class AuthControllerNobodyLoggedAndNoRegistrationAllowedAjaxLoginTest extends AuthControllerNobodyLoggedTestCase {

llaffont
committed
Class_AdminVar::getLoader()
->newInstanceWithId('INTERDIRE_ENREG_UTIL')
->setValeur(1);

llaffont
committed
$this->_xpath = new Storm_Test_XPath();
$this->_json = json_decode($this->_response->getBody());
}

llaffont
committed
public function testLinkLostPassword() {
$this->_xpath->assertXPath($this->_json->content,
'//div//a[contains(@onclick, "getUsername")]');
}

llaffont
committed
public function testNoLinkSenregistrer() {
$this->_xpath->assertNotXPath($this->_json->content,
'//div//a[contains(@href, "auth/register")]');
}

llaffont
committed
}
class AuthControllerNobodyLoggedTest extends PortailWithOneLoginModuleTestCase {
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
public function setUp() {
parent::setUp();
ZendAfi_Auth::getInstance()->clearIdentity();
$this->dispatch('/opac');
}
/**
* @group integration
* @test
*/
public function pageShouldBeHtml5Valid() {
$this->assertHTML5($this->_response->getBody());
}
/** @test */
public function pageShouldNotContainsRedirectInput() {
$this->assertNotXPath('//input[@name="redirect"]');
}
/** @test */
public function formActionShouldBeBoiteLogin() {
$this->assertXPath('//div[@id="boite_login"]//form[@action="/auth/boite-login/id_module/4"]');
}
/** @test */
public function withRedirectParamPageShouldContainsRedirectInput() {
$this->bootstrap();
$this->dispatch('/opac/auth/login/redirect/'.urlencode('/opac/paniers'));
$this->assertXPath('//input[@name="redirect"][@value="/opac/paniers"]');
}
/** @test */
public function pageShouldNotContainsAjoutPanierInput() {
$this->assertNotXPath('//input[@name="ajoutPanier"]');
}
class AuthControllerNumilogConnectedUserDeconnexionTest extends PortailWithOneLoginModuleTestCase {
$this->dispatch('/opac/auth/login?service=http://numilog?deconnexion=ok', true);
}

efalcy
committed
/**
* @test
*/
public function pageShouldBeRedirectedToHome() {
$this->assertRedirectTo('/opac');

efalcy
committed

efalcy
committed
}
class AuthControllerNoLoggedTest extends AuthControllerNobodyLoggedTestCase {
/** @test */
public function pageAuthLoginWithServiceShouldIncludeHiddenService() {
$this->dispatch('/opac/auth/login?service=http://monurlservice',true);
$this->assertXPath('//input[@type="hidden"][@value="http://monurlservice"]');
}

efalcy
committed
class AuthControllerUserIsLoggedTest extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
$marcus = $this->fixture('Class_Users', [
'id' => 1,
'pseudo' => '',
'login' => 'sysadm',
'password' => 'sysadmPassword',
'nom' => 'Miller',
'prenom' => 'Marcus']);
ZendAfi_Auth::getInstance()->logUser($marcus);
$this->dispatch('/opac/auth/login',true);
}
/** @test */
public function bienvenueMarcusMillerShouldBePresent() {
$this->assertXPath('//div//div[@class="welcome"][contains(text(),"Bienvenue Marcus")]//span[@data-name="last-name"][contains(text(), "Miller")]');
}
}

Matthias Meusburger
committed
class AuthControllerUserNameIsEscaped extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
$marcus = $this->fixture('Class_Users',
['id' => 1,
'pseudo' => '',
'login' => 'sysadm',
'password' => 'sysadmPassword',
'nom' => '<script>Miller',
'prenom' => '<script>Marcus']);
ZendAfi_Auth::getInstance()->logUser($marcus);
$this->dispatch('/opac/auth/login',true);
}
/** @test */
public function userNameShouldBeEscaped() {
$this->assertXPathContentContains("//div[@class='welcome']", "Bienvenue <script>Marcus");
}
/** @test */
public function userSurNameShouldBeEscaped() {
$this->assertXPathContentContains("//span[@data-name='last-name']", "<script>Miller");
}

Matthias Meusburger
committed
}
class AuthControllerPseudoIsEscaped extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
$marcus = $this->fixture('Class_Users',
['id' => 1,
'pseudo' => '<script>pseudo',
'login' => 'sysadm',
'password' => 'sysadmPassword',
'nom' => 'Miller',
'prenom' => 'Marcus']);
ZendAfi_Auth::getInstance()->logUser($marcus);
$this->dispatch('/opac/auth/login',true);
}
/** @test */
public function userPseudoShouldBeEscaped() {
$this->assertXPathContentContains("//div[@class='welcome']", "Bienvenue <script>pseudo");
}

Matthias Meusburger
committed
}
class AuthControllerAdminIsLoggedTest extends PortailWithOneLoginModuleTestCase {
public function setUp() {
parent::setUp();
$this->sysadm = $this->fixture('Class_Users',
['id' => 1,
'pseudo' => 'sysadm',
'role_level' => ZendAfi_Acl_AdminControllerRoles::ADMIN_PORTAIL,
'role' => 'super_admin',
'login' => 'sysadm',
'password' => 'sysadmPassword',
'id_site' => 1]);
ZendAfi_Auth::getInstance()->logUser($this->sysadm);
$this->dispatch('/opac/auth/login',true);
}
public function testBoiteLoginDisplaysBienvenueSysadm() {
$this->assertQueryContentContains('#boite_login .welcome',
/** @test */
public function shouldNotDisplayExpiredSubscription() {
$this->assertNotXPath('//div[@class="boite login"]//p',
public function testLinkSeDeconnecter() {
$this->assertXPath('//div[@id="boite_login"]//a[contains(@href, "auth/logout")]');
$this->assertXPathContentContains('//div[@id="boite_login"]//a[contains(@href, "auth/logout")]',
'Se déconnecter');
}
public function testLinkFonctionAdmin() {
$this->assertXPath("//div[@class='configuration_module']//img[contains(@onclick,'admin/modules/auth?config=site&type_module=auth&id_profil=2&action1=login')]");
}
/** @test **/
public function lienMonCompteShouldContainsClassAccount() {
$this->assertXPath('//div[@class="form"]/a[@class="account-link"]');
}
/** @test **/
public function lienSeDeconnecerShouldContainsClassAccountDisconnect() {
$this->assertXPath('//div[@class="form"]/a[@class="account-disconnect"]');
}
}
class AuthControllerPostTest extends AuthControllerNobodyLoggedTestCase {
public function setup() {
parent::setup();
$this->_referer= BASE_URL.'/cms/viewarticle/12';
$_SERVER['HTTP_REFERER'] = $this->_referer;
}
public function loggingWithOutFillingUsername() {
$this->postDispatch('/opac/auth/boite-login?id_module=4',
array('username' => 'My overkill username',
'password' => ''),true);
}
public function loggingWithOutFillingPassword() {
$this->postDispatch('/opac/auth/boite-login?id_module=4',
array('username' => 'My overkill username',
'password' => ''),true);
}
public function loggingWithWrongInformation() {
$this->postDispatch('/opac/auth/boite-login?id_module=4',
['username' => 'foo', 'password' => 'bar'],true);
}
public function ajaxLoginWithWrongInformation() {
$this->postDispatch('/opac/auth/ajax-login?id_module=4',
['username' => 'foo',
'password' => 'zoork',
'redirect' => '/auth/panier'],true);
}
public function loggedAsAdmin() {
$admin = Class_Users::newInstanceWithId(34, ['login' => 'admin'])->beAdminPortail();
ZendAfi_Auth::getInstance()->logUser($admin);
$this->dispatch('/opac/auth/boite-login?id_module=4',true);
}
/** @test */
public function emptyUsernameShouldRedirectToReferer() {
$this->loggingWithOutFillingUsername();
$this->assertRedirectTo($this->_referer);
}
/* @test */
public function emptyUsernamePostActionShouldDisplayFlashMessengerWithMessageEntrezVotreIdentifiant() {
$this->loggingWithOutFillingUsername();
$this->assertFlashMessengerContentContains('Entrez votre identifiant');
}
/** @test */
public function emptyPasswordPostActionShouldDisplayFlashMessengerWithMessageEntrezVotreMotDePasse() {
$this->loggingWithOutFillingPassword();
$this->assertFlashMessengerContentContains('Entrez votre mot de passe');
}
/** @test */
public function withAuthenticationFailureFlashMessengerShouldDisplayMessageIdentifiantOuMotDePasseIncorrect(){
$this->loggingWithWrongInformation();
$this->assertFlashMessengerContentContains('Identifiant ou mot de passe incorrect');
}
/** @test */
public function invalidAjaxAuthenticationShouldRedirectToActionReferrerWithPopupInFlash() {
$this->ajaxLoginWithWrongInformation();
$this->assertRedirectTo($this->_referer);
$this->assertFlashMessengerEquals([[ZendAfi_Controller_Action_Helper_FlashMessenger::NOTIFICATION => ['message' => 'Identifiant ou mot de passe incorrect.']],
[ZendAfi_Controller_Action_Helper_FlashMessenger::POPUP => ['url' => '/auth/popup-login?redirect='.urlencode('/auth/panier')]]]);
/** @test */
public function validAuthenticationTitreBoiteShouldBeVousEtesConnecte () {
$this->loggedAsAdmin();
$this->assertXPathContentContains('//div[@class="boite login"]//h1','Vous êtes connecté(e)');
}
abstract class AuthControllerPostSimpleTestCase extends AuthControllerNobodyLoggedTestCase {
protected $_auth;
public function setUp() {
parent::setUp();
$this->_auth = Storm_Test_ObjectWrapper::mock()
->whenCalled('authenticateLoginPassword')
->answers(false)
->whenCalled('hasIdentity')
->answers(false)
->whenCalled('getIdentity')
->answers(null);
ZendAfi_Auth::setInstance($this->_auth);
}
public function tearDown() {
ZendAfi_Auth::setInstance(null);
parent::tearDown();
}
}
abstract class AuthControllerPostSimpleSuccessfulTestCase extends AuthControllerPostSimpleTestCase {
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
protected
$_web_analytics_client,
$_marcel;
public function setUp() {
parent::setUp();
$this->group_musicme = $this->fixture('Class_UserGroup',
['id' => 20,
'libelle' => 'Multimedia'])
->addRight(Class_UserGroup::RIGHT_ACCES_MUSICME);
$this->_marcel = Storm_Test_ObjectWrapper::on(
Class_Users::newInstanceWithId(2, ['nom' => 'Marcel','login' =>'foo'])
->beAbonneSIGB()
->setUserGroups([$this->group_musicme]));
Class_Users::cacheInstance($this->_marcel);
$this->_marcel
->whenCalled('registerNotificationsOn')
->willDo(function($notifiable) {
$notifiable->notify('Message de notification');
});
$this->_auth
->whenCalled('authenticateLoginPassword')
->with('foo', 'bar')
->willDo(
function() {
$user = new stdClass();
$user->ID_USER = $this->_marcel->getId();
$this->_auth->whenCalled('getIdentity')->answers($user);
return true;
});
$this->_web_analytics_client = Storm_Test_ObjectWrapper::mock()
->whenCalled('trackEvent')
->answers(true);
ZendAfi_Controller_Action_Helper_TrackEvent::setDefaultWebAnalyticsClient($this->_web_analytics_client);
}
}
class AuthControllerPostSimpleSuccessfulTest extends AuthControllerPostSimpleSuccessfulTestCase {
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
public function setUp() {
parent::setUp();
$this->postDispatch('/opac/auth/login',
['username' => 'foo', 'password' => 'bar'],true);
}
/** @test */
public function responseShouldBeARedirectToOPAC() {
$this->assertRedirectTo('/opac');
}
/** @test */
public function trackEventShouldBeGenerated() {
$this->assertTrue($this->_web_analytics_client->methodHasBeenCalledWithParams('trackEvent',
['authentification',
'connexion',
'utilisateur',
2]));
}
/** @test */
public function flasMessengerShouldContainMessageDeNotification() {
$this->assertFlashMessengerContains([ZendAfi_Controller_Action_Helper_FlashMessenger::NOTIFICATION => ['message' => 'Message de notification',
'display' => 'popup']]);
}
}
class AuthControllerAjaxLoginPostTest extends AuthControllerPostSimpleSuccessfulTestCase {
public function setUp() {
parent::setUp();
$_SERVER['HTTP_REFERER'] = '/recherche/viewnotice';
$this->postDispatch('/opac/auth/ajax-login',
['username' => 'foo', 'password' => 'bar'], true);
}
/** @test */
public function flashMessengerShouldContainMessageDeNotification() {
$this->assertFlashMessengerContains(
[ZendAfi_Controller_Action_Helper_FlashMessenger::NOTIFICATION => ['message' => 'Message de notification']]);
}
/** @test */
public function responseShouldRedirectToReferrer() {
$this->assertRedirectTo('/recherche/viewnotice');
}
}
class AuthControllerBoiteLoginPostTest extends AuthControllerPostSimpleSuccessfulTestCase {
public function setUp() {
parent::setUp();
$_SERVER['HTTP_REFERER'] = '/recherche/viewnotice';
$this->postDispatch('/opac/auth/boite-login',
['username' => 'foo', 'password' => 'bar'],true);
}
/** @test */
public function flashMessengerShouldContainMessageDeNotification() {
$this->assertFlashMessengerContains(
[ZendAfi_Controller_Action_Helper_FlashMessenger::NOTIFICATION => ['message' => 'Message de notification',
'display' => ZendAfi_Controller_Action_Helper_FlashMessenger::POPUP]]);
}
/** @test */
public function responseShouldRedirectToReferrer() {
$this->assertRedirectTo('/recherche/viewnotice');
}

llaffont
committed
class AuthControllerPostSimpleSuccessfulWithRedirectTest extends AuthControllerPostSimpleSuccessfulTestCase {

llaffont
committed
$this->postDispatch('/opac/auth/login',
['username' => 'foo',
'password' => 'bar',
'redirect' => '/opac/paniers']);
}

llaffont
committed
/** @test */
public function responseShouldRedirectToOpacPaniers() {
$this->assertRedirectTo('/opac/paniers');
}

llaffont
committed
}
abstract class AuthControllerLecturaTestCase extends AuthControllerPostSimpleTestCase {
protected $server_host;
public function setUp() {
parent::setUp();
$this->server_host = $_SERVER['HTTP_HOST'];
$_SERVER['HTTPS']='on';
$_SERVER['HTTP_HOST'] = 'test.webuser.lectura.fr';
$this->fixture('Class_AdminVar', ['id' => 'LECTURA_DOMAIN',
'valeur' => 'test.webuser.lectura.fr']);
Class_Users::beVolatile();
public function tearDown() {
unset($_SERVER['HTTPS']);
$_SERVER['HTTP_HOST'] = $this->server_host;
parent::tearDown();
}
}
class AuthControllerPostWrongUserFromLecturaClientTest extends AuthControllerLecturaTestCase {