6 * @covers Title::getUserPermissionsErrors
7 * @covers Title::getUserPermissionsErrorsInternal
9 class TitlePermissionTest
extends MediaWikiLangTestCase
{
14 protected $userName, $altUserName;
24 protected $user, $anonUser, $userUser, $altUser;
26 protected function setUp() {
30 $localOffset = date( 'Z' ) / 60;
32 $this->setMwGlobals( [
33 'wgLocaltimezone' => $localZone,
34 'wgLocalTZoffset' => $localOffset,
35 'wgNamespaceProtection' => [
36 NS_MEDIAWIKI
=> 'editinterface',
39 // Without this testUserBlock will use a non-English context on non-English MediaWiki
40 // installations (because of how Title::checkUserBlock is implemented) and fail.
41 RequestContext
::resetMain();
43 $this->userName
= 'Useruser';
44 $this->altUserName
= 'Altuseruser';
45 date_default_timezone_set( $localZone );
47 $this->title
= Title
::makeTitle( NS_MAIN
, "Main Page" );
48 if ( !isset( $this->userUser
) ||
!( $this->userUser
instanceof User
) ) {
49 $this->userUser
= User
::newFromName( $this->userName
);
51 if ( !$this->userUser
->getId() ) {
52 $this->userUser
= User
::createNew( $this->userName
, [
53 "email" => "test@example.com",
54 "real_name" => "Test User" ] );
55 $this->userUser
->load();
58 $this->altUser
= User
::newFromName( $this->altUserName
);
59 if ( !$this->altUser
->getId() ) {
60 $this->altUser
= User
::createNew( $this->altUserName
, [
61 "email" => "alttest@example.com",
62 "real_name" => "Test User Alt" ] );
63 $this->altUser
->load();
66 $this->anonUser
= User
::newFromId( 0 );
68 $this->user
= $this->userUser
;
72 protected function setUserPerm( $perm ) {
73 // Setting member variables is evil!!!
75 if ( is_array( $perm ) ) {
76 $this->user
->mRights
= $perm;
78 $this->user
->mRights
= [ $perm ];
82 protected function setTitle( $ns, $title = "Main_Page" ) {
83 $this->title
= Title
::makeTitle( $ns, $title );
86 protected function setUser( $userName = null ) {
87 if ( $userName === 'anon' ) {
88 $this->user
= $this->anonUser
;
89 } elseif ( $userName === null ||
$userName === $this->userName
) {
90 $this->user
= $this->userUser
;
92 $this->user
= $this->altUser
;
97 * @todo This test method should be split up into separate test methods and
99 * @covers Title::checkQuickPermissions
101 public function testQuickPermissions() {
103 $prefix = $wgContLang->getFormattedNsText( NS_PROJECT
);
105 $this->setUser( 'anon' );
106 $this->setTitle( NS_TALK
);
107 $this->setUserPerm( "createtalk" );
108 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
109 $this->assertEquals( [], $res );
111 $this->setTitle( NS_TALK
);
112 $this->setUserPerm( "createpage" );
113 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
114 $this->assertEquals( [ [ "nocreatetext" ] ], $res );
116 $this->setTitle( NS_TALK
);
117 $this->setUserPerm( "" );
118 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
119 $this->assertEquals( [ [ 'nocreatetext' ] ], $res );
121 $this->setTitle( NS_MAIN
);
122 $this->setUserPerm( "createpage" );
123 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
124 $this->assertEquals( [], $res );
126 $this->setTitle( NS_MAIN
);
127 $this->setUserPerm( "createtalk" );
128 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
129 $this->assertEquals( [ [ 'nocreatetext' ] ], $res );
131 $this->setUser( $this->userName
);
132 $this->setTitle( NS_TALK
);
133 $this->setUserPerm( "createtalk" );
134 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
135 $this->assertEquals( [], $res );
137 $this->setTitle( NS_TALK
);
138 $this->setUserPerm( "createpage" );
139 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
140 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
142 $this->setTitle( NS_TALK
);
143 $this->setUserPerm( "" );
144 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
145 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
147 $this->setTitle( NS_MAIN
);
148 $this->setUserPerm( "createpage" );
149 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
150 $this->assertEquals( [], $res );
152 $this->setTitle( NS_MAIN
);
153 $this->setUserPerm( "createtalk" );
154 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
155 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
157 $this->setTitle( NS_MAIN
);
158 $this->setUserPerm( "" );
159 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
160 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
162 $this->setUser( 'anon' );
163 $this->setTitle( NS_USER
, $this->userName
. '' );
164 $this->setUserPerm( "" );
165 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
166 $this->assertEquals( [ [ 'cant-move-user-page' ], [ 'movenologintext' ] ], $res );
168 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
169 $this->setUserPerm( "" );
170 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
171 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
173 $this->setTitle( NS_USER
, $this->userName
. '' );
174 $this->setUserPerm( "move-rootuserpages" );
175 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
176 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
178 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
179 $this->setUserPerm( "move-rootuserpages" );
180 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
181 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
183 $this->setTitle( NS_USER
, $this->userName
. '' );
184 $this->setUserPerm( "" );
185 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
186 $this->assertEquals( [ [ 'cant-move-user-page' ], [ 'movenologintext' ] ], $res );
188 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
189 $this->setUserPerm( "" );
190 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
191 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
193 $this->setTitle( NS_USER
, $this->userName
. '' );
194 $this->setUserPerm( "move-rootuserpages" );
195 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
196 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
198 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
199 $this->setUserPerm( "move-rootuserpages" );
200 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
201 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
203 $this->setUser( $this->userName
);
204 $this->setTitle( NS_FILE
, "img.png" );
205 $this->setUserPerm( "" );
206 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
207 $this->assertEquals( [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ], $res );
209 $this->setTitle( NS_FILE
, "img.png" );
210 $this->setUserPerm( "movefile" );
211 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
212 $this->assertEquals( [ [ 'movenotallowed' ] ], $res );
214 $this->setUser( 'anon' );
215 $this->setTitle( NS_FILE
, "img.png" );
216 $this->setUserPerm( "" );
217 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
218 $this->assertEquals( [ [ 'movenotallowedfile' ], [ 'movenologintext' ] ], $res );
220 $this->setTitle( NS_FILE
, "img.png" );
221 $this->setUserPerm( "movefile" );
222 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
223 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
225 $this->setUser( $this->userName
);
226 $this->setUserPerm( "move" );
227 $this->runGroupPermissions( 'move', [ [ 'movenotallowedfile' ] ] );
229 $this->setUserPerm( "" );
230 $this->runGroupPermissions(
232 [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ]
235 $this->setUser( 'anon' );
236 $this->setUserPerm( "move" );
237 $this->runGroupPermissions( 'move', [ [ 'movenotallowedfile' ] ] );
239 $this->setUserPerm( "" );
240 $this->runGroupPermissions(
242 [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ],
243 [ [ 'movenotallowedfile' ], [ 'movenologintext' ] ]
246 if ( $this->isWikitextNS( NS_MAIN
) ) {
247 // NOTE: some content models don't allow moving
248 // @todo find a Wikitext namespace for testing
250 $this->setTitle( NS_MAIN
);
251 $this->setUser( 'anon' );
252 $this->setUserPerm( "move" );
253 $this->runGroupPermissions( 'move', [] );
255 $this->setUserPerm( "" );
256 $this->runGroupPermissions( 'move', [ [ 'movenotallowed' ] ],
257 [ [ 'movenologintext' ] ] );
259 $this->setUser( $this->userName
);
260 $this->setUserPerm( "" );
261 $this->runGroupPermissions( 'move', [ [ 'movenotallowed' ] ] );
263 $this->setUserPerm( "move" );
264 $this->runGroupPermissions( 'move', [] );
266 $this->setUser( 'anon' );
267 $this->setUserPerm( 'move' );
268 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
269 $this->assertEquals( [], $res );
271 $this->setUserPerm( '' );
272 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
273 $this->assertEquals( [ [ 'movenotallowed' ] ], $res );
276 $this->setTitle( NS_USER
);
277 $this->setUser( $this->userName
);
278 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
279 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
280 $this->assertEquals( [], $res );
282 $this->setUserPerm( "move" );
283 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
284 $this->assertEquals( [ [ 'cant-move-to-user-page' ] ], $res );
286 $this->setUser( 'anon' );
287 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
288 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
289 $this->assertEquals( [], $res );
291 $this->setTitle( NS_USER
, "User/subpage" );
292 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
293 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
294 $this->assertEquals( [], $res );
296 $this->setUserPerm( "move" );
297 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
298 $this->assertEquals( [], $res );
300 $this->setUser( 'anon' );
303 [ [ 'badaccess-groups', "*, [[$prefix:Users|Users]]", 2 ] ],
304 [ [ 'badaccess-group0' ] ],
311 "[[$prefix:Administrators|Administrators]]", 1 ],
314 [ [ 'badaccess-group0' ], [ 'protect-cantedit' ] ],
315 [ [ 'protect-cantedit' ] ],
318 '' => [ [], [], [], true ]
321 foreach ( [ "edit", "protect", "" ] as $action ) {
322 $this->setUserPerm( null );
323 $this->assertEquals( $check[$action][0],
324 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
325 $this->assertEquals( $check[$action][0],
326 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
327 $this->assertEquals( $check[$action][0],
328 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
330 global $wgGroupPermissions;
331 $old = $wgGroupPermissions;
332 $wgGroupPermissions = [];
334 $this->assertEquals( $check[$action][1],
335 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
336 $this->assertEquals( $check[$action][1],
337 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
338 $this->assertEquals( $check[$action][1],
339 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
340 $wgGroupPermissions = $old;
342 $this->setUserPerm( $action );
343 $this->assertEquals( $check[$action][2],
344 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
345 $this->assertEquals( $check[$action][2],
346 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
347 $this->assertEquals( $check[$action][2],
348 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
350 $this->setUserPerm( $action );
351 $this->assertEquals( $check[$action][3],
352 $this->title
->userCan( $action, $this->user
, true ) );
353 $this->assertEquals( $check[$action][3],
354 $this->title
->quickUserCan( $action, $this->user
) );
355 # count( User::getGroupsWithPermissions( $action ) ) < 1
359 protected function runGroupPermissions( $action, $result, $result2 = null ) {
360 global $wgGroupPermissions;
362 if ( $result2 === null ) {
366 $wgGroupPermissions['autoconfirmed']['move'] = false;
367 $wgGroupPermissions['user']['move'] = false;
368 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
369 $this->assertEquals( $result, $res );
371 $wgGroupPermissions['autoconfirmed']['move'] = true;
372 $wgGroupPermissions['user']['move'] = false;
373 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
374 $this->assertEquals( $result2, $res );
376 $wgGroupPermissions['autoconfirmed']['move'] = true;
377 $wgGroupPermissions['user']['move'] = true;
378 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
379 $this->assertEquals( $result2, $res );
381 $wgGroupPermissions['autoconfirmed']['move'] = false;
382 $wgGroupPermissions['user']['move'] = true;
383 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
384 $this->assertEquals( $result2, $res );
388 * @todo This test method should be split up into separate test methods and
390 * @covers Title::checkSpecialsAndNSPermissions
392 public function testSpecialsAndNSPermissions() {
393 global $wgNamespaceProtection;
394 $this->setUser( $this->userName
);
396 $this->setTitle( NS_SPECIAL
);
398 $this->assertEquals( [ [ 'badaccess-group0' ], [ 'ns-specialprotected' ] ],
399 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
401 $this->setTitle( NS_MAIN
);
402 $this->setUserPerm( 'bogus' );
403 $this->assertEquals( [],
404 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
406 $this->setTitle( NS_MAIN
);
407 $this->setUserPerm( '' );
408 $this->assertEquals( [ [ 'badaccess-group0' ] ],
409 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
411 $wgNamespaceProtection[NS_USER
] = [ 'bogus' ];
413 $this->setTitle( NS_USER
);
414 $this->setUserPerm( '' );
415 $this->assertEquals( [ [ 'badaccess-group0' ],
416 [ 'namespaceprotected', 'User', 'bogus' ] ],
417 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
419 $this->setTitle( NS_MEDIAWIKI
);
420 $this->setUserPerm( 'bogus' );
421 $this->assertEquals( [ [ 'protectedinterface', 'bogus' ] ],
422 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
424 $this->setTitle( NS_MEDIAWIKI
);
425 $this->setUserPerm( 'bogus' );
426 $this->assertEquals( [ [ 'protectedinterface', 'bogus' ] ],
427 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
429 $wgNamespaceProtection = null;
431 $this->setUserPerm( 'bogus' );
432 $this->assertEquals( [],
433 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
434 $this->assertEquals( true,
435 $this->title
->userCan( 'bogus', $this->user
) );
437 $this->setUserPerm( '' );
438 $this->assertEquals( [ [ 'badaccess-group0' ] ],
439 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
440 $this->assertEquals( false,
441 $this->title
->userCan( 'bogus', $this->user
) );
445 * @todo This test method should be split up into separate test methods and
447 * @covers Title::checkUserConfigPermissions
449 public function testJsConfigEditPermissions() {
450 $this->setUser( $this->userName
);
452 $this->setTitle( NS_USER
, $this->userName
. '/test.js' );
453 $this->runConfigEditPermissions(
454 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
456 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
457 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
458 [ [ 'badaccess-group0' ] ],
460 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
461 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
462 [ [ 'badaccess-group0' ] ]
467 * @todo This test method should be split up into separate test methods and
469 * @covers Title::checkUserConfigPermissions
471 public function testJsonConfigEditPermissions() {
472 $this->setUser( $this->userName
);
474 $this->setTitle( NS_USER
, $this->userName
. '/test.json' );
475 $this->runConfigEditPermissions(
476 [ [ 'badaccess-group0' ], [ 'mycustomjsonprotected', 'bogus' ] ],
478 [ [ 'badaccess-group0' ], [ 'mycustomjsonprotected', 'bogus' ] ],
479 [ [ 'badaccess-group0' ] ],
480 [ [ 'badaccess-group0' ], [ 'mycustomjsonprotected', 'bogus' ] ],
482 [ [ 'badaccess-group0' ], [ 'mycustomjsonprotected', 'bogus' ] ],
483 [ [ 'badaccess-group0' ] ],
484 [ [ 'badaccess-group0' ], [ 'mycustomjsonprotected', 'bogus' ] ]
489 * @todo This test method should be split up into separate test methods and
491 * @covers Title::checkUserConfigPermissions
493 public function testCssConfigEditPermissions() {
494 $this->setUser( $this->userName
);
496 $this->setTitle( NS_USER
, $this->userName
. '/test.css' );
497 $this->runConfigEditPermissions(
498 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
500 [ [ 'badaccess-group0' ] ],
501 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
502 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
504 [ [ 'badaccess-group0' ] ],
505 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
506 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ]
511 * @todo This test method should be split up into separate test methods and
513 * @covers Title::checkUserConfigPermissions
515 public function testOtherJsConfigEditPermissions() {
516 $this->setUser( $this->userName
);
518 $this->setTitle( NS_USER
, $this->altUserName
. '/test.js' );
519 $this->runConfigEditPermissions(
520 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
522 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
523 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
524 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
526 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
527 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
528 [ [ 'badaccess-group0' ] ]
533 * @todo This test method should be split up into separate test methods and
535 * @covers Title::checkUserConfigPermissions
537 public function testOtherJsonConfigEditPermissions() {
538 $this->setUser( $this->userName
);
540 $this->setTitle( NS_USER
, $this->altUserName
. '/test.json' );
541 $this->runConfigEditPermissions(
542 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ],
544 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ],
545 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ],
546 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ],
548 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ],
549 [ [ 'badaccess-group0' ] ],
550 [ [ 'badaccess-group0' ], [ 'customjsonprotected', 'bogus' ] ]
555 * @todo This test method should be split up into separate test methods and
557 * @covers Title::checkUserConfigPermissions
559 public function testOtherCssConfigEditPermissions() {
560 $this->setUser( $this->userName
);
562 $this->setTitle( NS_USER
, $this->altUserName
. '/test.css' );
563 $this->runConfigEditPermissions(
564 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
566 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
567 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
568 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
570 [ [ 'badaccess-group0' ] ],
571 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
572 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ]
577 * @todo This test method should be split up into separate test methods and
579 * @covers Title::checkUserConfigPermissions
581 public function testOtherNonConfigEditPermissions() {
582 $this->setUser( $this->userName
);
584 $this->setTitle( NS_USER
, $this->altUserName
. '/tempo' );
585 $this->runConfigEditPermissions(
586 [ [ 'badaccess-group0' ] ],
588 [ [ 'badaccess-group0' ] ],
589 [ [ 'badaccess-group0' ] ],
590 [ [ 'badaccess-group0' ] ],
592 [ [ 'badaccess-group0' ] ],
593 [ [ 'badaccess-group0' ] ],
594 [ [ 'badaccess-group0' ] ]
598 protected function runConfigEditPermissions(
607 $this->setUserPerm( '' );
608 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
609 $this->assertEquals( $resultNone, $result );
611 $this->setUserPerm( 'editmyusercss' );
612 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
613 $this->assertEquals( $resultMyCss, $result );
615 $this->setUserPerm( 'editmyuserjson' );
616 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
617 $this->assertEquals( $resultMyJson, $result );
619 $this->setUserPerm( 'editmyuserjs' );
620 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
621 $this->assertEquals( $resultMyJs, $result );
623 $this->setUserPerm( 'editusercss' );
624 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
625 $this->assertEquals( $resultUserCss, $result );
627 $this->setUserPerm( 'edituserjson' );
628 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
629 $this->assertEquals( $resultUserJson, $result );
631 $this->setUserPerm( 'edituserjs' );
632 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
633 $this->assertEquals( $resultUserJs, $result );
635 $this->setUserPerm( [ 'edituserjs', 'edituserjson', 'editusercss' ] );
636 $result = $this->title
->getUserPermissionsErrors( 'bogus', $this->user
);
637 $this->assertEquals( [ [ 'badaccess-group0' ] ], $result );
641 * @todo This test method should be split up into separate test methods and
643 * @covers Title::checkPageRestrictions
645 public function testPageRestrictions() {
648 $prefix = $wgContLang->getFormattedNsText( NS_PROJECT
);
650 $this->setTitle( NS_MAIN
);
651 $this->title
->mRestrictionsLoaded
= true;
652 $this->setUserPerm( "edit" );
653 $this->title
->mRestrictions
= [ "bogus" => [ 'bogus', "sysop", "protect", "" ] ];
655 $this->assertEquals( [],
656 $this->title
->getUserPermissionsErrors( 'edit',
659 $this->assertEquals( true,
660 $this->title
->quickUserCan( 'edit', $this->user
) );
661 $this->title
->mRestrictions
= [ "edit" => [ 'bogus', "sysop", "protect", "" ],
662 "bogus" => [ 'bogus', "sysop", "protect", "" ] ];
664 $this->assertEquals( [ [ 'badaccess-group0' ],
665 [ 'protectedpagetext', 'bogus', 'bogus' ],
666 [ 'protectedpagetext', 'editprotected', 'bogus' ],
667 [ 'protectedpagetext', 'protect', 'bogus' ] ],
668 $this->title
->getUserPermissionsErrors( 'bogus',
670 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
671 [ 'protectedpagetext', 'editprotected', 'edit' ],
672 [ 'protectedpagetext', 'protect', 'edit' ] ],
673 $this->title
->getUserPermissionsErrors( 'edit',
675 $this->setUserPerm( "" );
676 $this->assertEquals( [ [ 'badaccess-group0' ],
677 [ 'protectedpagetext', 'bogus', 'bogus' ],
678 [ 'protectedpagetext', 'editprotected', 'bogus' ],
679 [ 'protectedpagetext', 'protect', 'bogus' ] ],
680 $this->title
->getUserPermissionsErrors( 'bogus',
682 $this->assertEquals( [ [ 'badaccess-groups', "*, [[$prefix:Users|Users]]", 2 ],
683 [ 'protectedpagetext', 'bogus', 'edit' ],
684 [ 'protectedpagetext', 'editprotected', 'edit' ],
685 [ 'protectedpagetext', 'protect', 'edit' ] ],
686 $this->title
->getUserPermissionsErrors( 'edit',
688 $this->setUserPerm( [ "edit", "editprotected" ] );
689 $this->assertEquals( [ [ 'badaccess-group0' ],
690 [ 'protectedpagetext', 'bogus', 'bogus' ],
691 [ 'protectedpagetext', 'protect', 'bogus' ] ],
692 $this->title
->getUserPermissionsErrors( 'bogus',
694 $this->assertEquals( [
695 [ 'protectedpagetext', 'bogus', 'edit' ],
696 [ 'protectedpagetext', 'protect', 'edit' ] ],
697 $this->title
->getUserPermissionsErrors( 'edit',
700 $this->title
->mCascadeRestriction
= true;
701 $this->setUserPerm( "edit" );
702 $this->assertEquals( false,
703 $this->title
->quickUserCan( 'bogus', $this->user
) );
704 $this->assertEquals( false,
705 $this->title
->quickUserCan( 'edit', $this->user
) );
706 $this->assertEquals( [ [ 'badaccess-group0' ],
707 [ 'protectedpagetext', 'bogus', 'bogus' ],
708 [ 'protectedpagetext', 'editprotected', 'bogus' ],
709 [ 'protectedpagetext', 'protect', 'bogus' ] ],
710 $this->title
->getUserPermissionsErrors( 'bogus',
712 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
713 [ 'protectedpagetext', 'editprotected', 'edit' ],
714 [ 'protectedpagetext', 'protect', 'edit' ] ],
715 $this->title
->getUserPermissionsErrors( 'edit',
718 $this->setUserPerm( [ "edit", "editprotected" ] );
719 $this->assertEquals( false,
720 $this->title
->quickUserCan( 'bogus', $this->user
) );
721 $this->assertEquals( false,
722 $this->title
->quickUserCan( 'edit', $this->user
) );
723 $this->assertEquals( [ [ 'badaccess-group0' ],
724 [ 'protectedpagetext', 'bogus', 'bogus' ],
725 [ 'protectedpagetext', 'protect', 'bogus' ],
726 [ 'protectedpagetext', 'protect', 'bogus' ] ],
727 $this->title
->getUserPermissionsErrors( 'bogus',
729 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
730 [ 'protectedpagetext', 'protect', 'edit' ],
731 [ 'protectedpagetext', 'protect', 'edit' ] ],
732 $this->title
->getUserPermissionsErrors( 'edit',
737 * @covers Title::checkCascadingSourcesRestrictions
739 public function testCascadingSourcesRestrictions() {
740 $this->setTitle( NS_MAIN
, "test page" );
741 $this->setUserPerm( [ "edit", "bogus" ] );
743 $this->title
->mCascadeSources
= [
744 Title
::makeTitle( NS_MAIN
, "Bogus" ),
745 Title
::makeTitle( NS_MAIN
, "UnBogus" )
747 $this->title
->mCascadingRestrictions
= [
748 "bogus" => [ 'bogus', "sysop", "protect", "" ]
751 $this->assertEquals( false,
752 $this->title
->userCan( 'bogus', $this->user
) );
753 $this->assertEquals( [
754 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ],
755 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ],
756 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ] ],
757 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
759 $this->assertEquals( true,
760 $this->title
->userCan( 'edit', $this->user
) );
761 $this->assertEquals( [],
762 $this->title
->getUserPermissionsErrors( 'edit', $this->user
) );
766 * @todo This test method should be split up into separate test methods and
768 * @covers Title::checkActionPermissions
770 public function testActionPermissions() {
771 $this->setUserPerm( [ "createpage" ] );
772 $this->setTitle( NS_MAIN
, "test page" );
773 $this->title
->mTitleProtection
['permission'] = '';
774 $this->title
->mTitleProtection
['user'] = $this->user
->getId();
775 $this->title
->mTitleProtection
['expiry'] = 'infinity';
776 $this->title
->mTitleProtection
['reason'] = 'test';
777 $this->title
->mCascadeRestriction
= false;
779 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
780 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
781 $this->assertEquals( false,
782 $this->title
->userCan( 'create', $this->user
) );
784 $this->title
->mTitleProtection
['permission'] = 'editprotected';
785 $this->setUserPerm( [ 'createpage', 'protect' ] );
786 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
787 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
788 $this->assertEquals( false,
789 $this->title
->userCan( 'create', $this->user
) );
791 $this->setUserPerm( [ 'createpage', 'editprotected' ] );
792 $this->assertEquals( [],
793 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
794 $this->assertEquals( true,
795 $this->title
->userCan( 'create', $this->user
) );
797 $this->setUserPerm( [ 'createpage' ] );
798 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
799 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
800 $this->assertEquals( false,
801 $this->title
->userCan( 'create', $this->user
) );
803 $this->setTitle( NS_MEDIA
, "test page" );
804 $this->setUserPerm( [ "move" ] );
805 $this->assertEquals( false,
806 $this->title
->userCan( 'move', $this->user
) );
807 $this->assertEquals( [ [ 'immobile-source-namespace', 'Media' ] ],
808 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
810 $this->setTitle( NS_HELP
, "test page" );
811 $this->assertEquals( [],
812 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
813 $this->assertEquals( true,
814 $this->title
->userCan( 'move', $this->user
) );
816 $this->title
->mInterwiki
= "no";
817 $this->assertEquals( [ [ 'immobile-source-page' ] ],
818 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
819 $this->assertEquals( false,
820 $this->title
->userCan( 'move', $this->user
) );
822 $this->setTitle( NS_MEDIA
, "test page" );
823 $this->assertEquals( false,
824 $this->title
->userCan( 'move-target', $this->user
) );
825 $this->assertEquals( [ [ 'immobile-target-namespace', 'Media' ] ],
826 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
828 $this->setTitle( NS_HELP
, "test page" );
829 $this->assertEquals( [],
830 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
831 $this->assertEquals( true,
832 $this->title
->userCan( 'move-target', $this->user
) );
834 $this->title
->mInterwiki
= "no";
835 $this->assertEquals( [ [ 'immobile-target-page' ] ],
836 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
837 $this->assertEquals( false,
838 $this->title
->userCan( 'move-target', $this->user
) );
842 * @covers Title::checkUserBlock
844 public function testUserBlock() {
845 $this->setMwGlobals( [
846 'wgEmailConfirmToEdit' => true,
847 'wgEmailAuthentication' => true,
850 $this->setUserPerm( [ "createpage", "move" ] );
851 $this->setTitle( NS_HELP
, "test page" );
853 # $wgEmailConfirmToEdit only applies to 'edit' action
854 $this->assertEquals( [],
855 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
856 $this->assertContains( [ 'confirmedittext' ],
857 $this->title
->getUserPermissionsErrors( 'edit', $this->user
) );
859 $this->setMwGlobals( 'wgEmailConfirmToEdit', false );
860 $this->assertNotContains( [ 'confirmedittext' ],
861 $this->title
->getUserPermissionsErrors( 'edit', $this->user
) );
863 # $wgEmailConfirmToEdit && !$user->isEmailConfirmed() && $action != 'createaccount'
864 $this->assertEquals( [],
865 $this->title
->getUserPermissionsErrors( 'move-target',
871 $this->user
->mBlockedby
= $this->user
->getId();
872 $this->user
->mBlock
= new Block( [
873 'address' => '127.0.8.1',
874 'by' => $this->user
->getId(),
875 'reason' => 'no reason given',
876 'timestamp' => $prev +
3600,
880 $this->user
->mBlock
->mTimestamp
= 0;
881 $this->assertEquals( [ [ 'autoblockedtext',
882 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
883 'Useruser', null, 'infinite', '127.0.8.1',
884 $wgLang->timeanddate( wfTimestamp( TS_MW
, $prev ), true ) ] ],
885 $this->title
->getUserPermissionsErrors( 'move-target',
888 $this->assertEquals( false, $this->title
->userCan( 'move-target', $this->user
) );
889 // quickUserCan should ignore user blocks
890 $this->assertEquals( true, $this->title
->quickUserCan( 'move-target', $this->user
) );
892 global $wgLocalTZoffset;
893 $wgLocalTZoffset = -60;
894 $this->user
->mBlockedby
= $this->user
->getName();
895 $this->user
->mBlock
= new Block( [
896 'address' => '127.0.8.1',
897 'by' => $this->user
->getId(),
898 'reason' => 'no reason given',
903 $this->assertEquals( [ [ 'blockedtext',
904 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
905 'Useruser', null, '23:00, 31 December 1969', '127.0.8.1',
906 $wgLang->timeanddate( wfTimestamp( TS_MW
, $now ), true ) ] ],
907 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
908 # $action != 'read' && $action != 'createaccount' && $user->isBlockedFrom( $this )
909 # $user->blockedFor() == ''
910 # $user->mBlock->mExpiry == 'infinity'
912 $this->user
->mBlockedby
= $this->user
->getName();
913 $this->user
->mBlock
= new Block( [
914 'address' => '127.0.8.1',
915 'by' => $this->user
->getId(),
916 'reason' => 'no reason given',
920 'systemBlock' => 'test',
922 $this->assertEquals( [ [ 'systemblockedtext',
923 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
924 'Useruser', 'test', '23:00, 31 December 1969', '127.0.8.1',
925 $wgLang->timeanddate( wfTimestamp( TS_MW
, $now ), true ) ] ],
926 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );