6 * @covers Title::getUserPermissionsErrors
7 * @covers Title::getUserPermissionsErrorsInternal
9 class TitlePermissionTest
extends MediaWikiLangTestCase
{
14 protected $userName, $altUserName;
24 protected $user, $anonUser, $userUser, $altUser;
26 protected function setUp() {
30 $localOffset = date( 'Z' ) / 60;
32 $this->setMwGlobals( [
33 'wgLocaltimezone' => $localZone,
34 'wgLocalTZoffset' => $localOffset,
35 'wgNamespaceProtection' => [
36 NS_MEDIAWIKI
=> 'editinterface',
39 // Without this testUserBlock will use a non-English context on non-English MediaWiki
40 // installations (because of how Title::checkUserBlock is implemented) and fail.
41 RequestContext
::resetMain();
43 $this->userName
= 'Useruser';
44 $this->altUserName
= 'Altuseruser';
45 date_default_timezone_set( $localZone );
47 $this->title
= Title
::makeTitle( NS_MAIN
, "Main Page" );
48 if ( !isset( $this->userUser
) ||
!( $this->userUser
instanceof User
) ) {
49 $this->userUser
= User
::newFromName( $this->userName
);
51 if ( !$this->userUser
->getId() ) {
52 $this->userUser
= User
::createNew( $this->userName
, [
53 "email" => "test@example.com",
54 "real_name" => "Test User" ] );
55 $this->userUser
->load();
58 $this->altUser
= User
::newFromName( $this->altUserName
);
59 if ( !$this->altUser
->getId() ) {
60 $this->altUser
= User
::createNew( $this->altUserName
, [
61 "email" => "alttest@example.com",
62 "real_name" => "Test User Alt" ] );
63 $this->altUser
->load();
66 $this->anonUser
= User
::newFromId( 0 );
68 $this->user
= $this->userUser
;
72 protected function setUserPerm( $perm ) {
73 // Setting member variables is evil!!!
75 if ( is_array( $perm ) ) {
76 $this->user
->mRights
= $perm;
78 $this->user
->mRights
= [ $perm ];
82 protected function setTitle( $ns, $title = "Main_Page" ) {
83 $this->title
= Title
::makeTitle( $ns, $title );
86 protected function setUser( $userName = null ) {
87 if ( $userName === 'anon' ) {
88 $this->user
= $this->anonUser
;
89 } elseif ( $userName === null ||
$userName === $this->userName
) {
90 $this->user
= $this->userUser
;
92 $this->user
= $this->altUser
;
97 * @todo This test method should be split up into separate test methods and
100 public function testQuickPermissions() {
102 $prefix = $wgContLang->getFormattedNsText( NS_PROJECT
);
104 $this->setUser( 'anon' );
105 $this->setTitle( NS_TALK
);
106 $this->setUserPerm( "createtalk" );
107 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
108 $this->assertEquals( [], $res );
110 $this->setTitle( NS_TALK
);
111 $this->setUserPerm( "createpage" );
112 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
113 $this->assertEquals( [ [ "nocreatetext" ] ], $res );
115 $this->setTitle( NS_TALK
);
116 $this->setUserPerm( "" );
117 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
118 $this->assertEquals( [ [ 'nocreatetext' ] ], $res );
120 $this->setTitle( NS_MAIN
);
121 $this->setUserPerm( "createpage" );
122 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
123 $this->assertEquals( [], $res );
125 $this->setTitle( NS_MAIN
);
126 $this->setUserPerm( "createtalk" );
127 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
128 $this->assertEquals( [ [ 'nocreatetext' ] ], $res );
130 $this->setUser( $this->userName
);
131 $this->setTitle( NS_TALK
);
132 $this->setUserPerm( "createtalk" );
133 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
134 $this->assertEquals( [], $res );
136 $this->setTitle( NS_TALK
);
137 $this->setUserPerm( "createpage" );
138 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
139 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
141 $this->setTitle( NS_TALK
);
142 $this->setUserPerm( "" );
143 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
144 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
146 $this->setTitle( NS_MAIN
);
147 $this->setUserPerm( "createpage" );
148 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
149 $this->assertEquals( [], $res );
151 $this->setTitle( NS_MAIN
);
152 $this->setUserPerm( "createtalk" );
153 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
154 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
156 $this->setTitle( NS_MAIN
);
157 $this->setUserPerm( "" );
158 $res = $this->title
->getUserPermissionsErrors( 'create', $this->user
);
159 $this->assertEquals( [ [ 'nocreate-loggedin' ] ], $res );
161 $this->setUser( 'anon' );
162 $this->setTitle( NS_USER
, $this->userName
. '' );
163 $this->setUserPerm( "" );
164 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
165 $this->assertEquals( [ [ 'cant-move-user-page' ], [ 'movenologintext' ] ], $res );
167 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
168 $this->setUserPerm( "" );
169 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
170 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
172 $this->setTitle( NS_USER
, $this->userName
. '' );
173 $this->setUserPerm( "move-rootuserpages" );
174 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
175 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
177 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
178 $this->setUserPerm( "move-rootuserpages" );
179 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
180 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
182 $this->setTitle( NS_USER
, $this->userName
. '' );
183 $this->setUserPerm( "" );
184 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
185 $this->assertEquals( [ [ 'cant-move-user-page' ], [ 'movenologintext' ] ], $res );
187 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
188 $this->setUserPerm( "" );
189 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
190 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
192 $this->setTitle( NS_USER
, $this->userName
. '' );
193 $this->setUserPerm( "move-rootuserpages" );
194 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
195 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
197 $this->setTitle( NS_USER
, $this->userName
. '/subpage' );
198 $this->setUserPerm( "move-rootuserpages" );
199 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
200 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
202 $this->setUser( $this->userName
);
203 $this->setTitle( NS_FILE
, "img.png" );
204 $this->setUserPerm( "" );
205 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
206 $this->assertEquals( [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ], $res );
208 $this->setTitle( NS_FILE
, "img.png" );
209 $this->setUserPerm( "movefile" );
210 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
211 $this->assertEquals( [ [ 'movenotallowed' ] ], $res );
213 $this->setUser( 'anon' );
214 $this->setTitle( NS_FILE
, "img.png" );
215 $this->setUserPerm( "" );
216 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
217 $this->assertEquals( [ [ 'movenotallowedfile' ], [ 'movenologintext' ] ], $res );
219 $this->setTitle( NS_FILE
, "img.png" );
220 $this->setUserPerm( "movefile" );
221 $res = $this->title
->getUserPermissionsErrors( 'move', $this->user
);
222 $this->assertEquals( [ [ 'movenologintext' ] ], $res );
224 $this->setUser( $this->userName
);
225 $this->setUserPerm( "move" );
226 $this->runGroupPermissions( 'move', [ [ 'movenotallowedfile' ] ] );
228 $this->setUserPerm( "" );
229 $this->runGroupPermissions(
231 [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ]
234 $this->setUser( 'anon' );
235 $this->setUserPerm( "move" );
236 $this->runGroupPermissions( 'move', [ [ 'movenotallowedfile' ] ] );
238 $this->setUserPerm( "" );
239 $this->runGroupPermissions(
241 [ [ 'movenotallowedfile' ], [ 'movenotallowed' ] ],
242 [ [ 'movenotallowedfile' ], [ 'movenologintext' ] ]
245 if ( $this->isWikitextNS( NS_MAIN
) ) {
246 // NOTE: some content models don't allow moving
247 // @todo find a Wikitext namespace for testing
249 $this->setTitle( NS_MAIN
);
250 $this->setUser( 'anon' );
251 $this->setUserPerm( "move" );
252 $this->runGroupPermissions( 'move', [] );
254 $this->setUserPerm( "" );
255 $this->runGroupPermissions( 'move', [ [ 'movenotallowed' ] ],
256 [ [ 'movenologintext' ] ] );
258 $this->setUser( $this->userName
);
259 $this->setUserPerm( "" );
260 $this->runGroupPermissions( 'move', [ [ 'movenotallowed' ] ] );
262 $this->setUserPerm( "move" );
263 $this->runGroupPermissions( 'move', [] );
265 $this->setUser( 'anon' );
266 $this->setUserPerm( 'move' );
267 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
268 $this->assertEquals( [], $res );
270 $this->setUserPerm( '' );
271 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
272 $this->assertEquals( [ [ 'movenotallowed' ] ], $res );
275 $this->setTitle( NS_USER
);
276 $this->setUser( $this->userName
);
277 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
278 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
279 $this->assertEquals( [], $res );
281 $this->setUserPerm( "move" );
282 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
283 $this->assertEquals( [ [ 'cant-move-to-user-page' ] ], $res );
285 $this->setUser( 'anon' );
286 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
287 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
288 $this->assertEquals( [], $res );
290 $this->setTitle( NS_USER
, "User/subpage" );
291 $this->setUserPerm( [ "move", "move-rootuserpages" ] );
292 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
293 $this->assertEquals( [], $res );
295 $this->setUserPerm( "move" );
296 $res = $this->title
->getUserPermissionsErrors( 'move-target', $this->user
);
297 $this->assertEquals( [], $res );
299 $this->setUser( 'anon' );
302 [ [ 'badaccess-groups', "*, [[$prefix:Users|Users]]", 2 ] ],
303 [ [ 'badaccess-group0' ] ],
310 "[[$prefix:Administrators|Administrators]]", 1 ],
313 [ [ 'badaccess-group0' ], [ 'protect-cantedit' ] ],
314 [ [ 'protect-cantedit' ] ],
317 '' => [ [], [], [], true ]
320 foreach ( [ "edit", "protect", "" ] as $action ) {
321 $this->setUserPerm( null );
322 $this->assertEquals( $check[$action][0],
323 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
324 $this->assertEquals( $check[$action][0],
325 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
326 $this->assertEquals( $check[$action][0],
327 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
329 global $wgGroupPermissions;
330 $old = $wgGroupPermissions;
331 $wgGroupPermissions = [];
333 $this->assertEquals( $check[$action][1],
334 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
335 $this->assertEquals( $check[$action][1],
336 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
337 $this->assertEquals( $check[$action][1],
338 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
339 $wgGroupPermissions = $old;
341 $this->setUserPerm( $action );
342 $this->assertEquals( $check[$action][2],
343 $this->title
->getUserPermissionsErrors( $action, $this->user
, true ) );
344 $this->assertEquals( $check[$action][2],
345 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'full' ) );
346 $this->assertEquals( $check[$action][2],
347 $this->title
->getUserPermissionsErrors( $action, $this->user
, 'secure' ) );
349 $this->setUserPerm( $action );
350 $this->assertEquals( $check[$action][3],
351 $this->title
->userCan( $action, $this->user
, true ) );
352 $this->assertEquals( $check[$action][3],
353 $this->title
->quickUserCan( $action, $this->user
) );
354 # count( User::getGroupsWithPermissions( $action ) ) < 1
358 protected function runGroupPermissions( $action, $result, $result2 = null ) {
359 global $wgGroupPermissions;
361 if ( $result2 === null ) {
365 $wgGroupPermissions['autoconfirmed']['move'] = false;
366 $wgGroupPermissions['user']['move'] = false;
367 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
368 $this->assertEquals( $result, $res );
370 $wgGroupPermissions['autoconfirmed']['move'] = true;
371 $wgGroupPermissions['user']['move'] = false;
372 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
373 $this->assertEquals( $result2, $res );
375 $wgGroupPermissions['autoconfirmed']['move'] = true;
376 $wgGroupPermissions['user']['move'] = true;
377 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
378 $this->assertEquals( $result2, $res );
380 $wgGroupPermissions['autoconfirmed']['move'] = false;
381 $wgGroupPermissions['user']['move'] = true;
382 $res = $this->title
->getUserPermissionsErrors( $action, $this->user
);
383 $this->assertEquals( $result2, $res );
387 * @todo This test method should be split up into separate test methods and
390 public function testSpecialsAndNSPermissions() {
391 global $wgNamespaceProtection;
392 $this->setUser( $this->userName
);
394 $this->setTitle( NS_SPECIAL
);
396 $this->assertEquals( [ [ 'badaccess-group0' ], [ 'ns-specialprotected' ] ],
397 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
399 $this->setTitle( NS_MAIN
);
400 $this->setUserPerm( 'bogus' );
401 $this->assertEquals( [],
402 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
404 $this->setTitle( NS_MAIN
);
405 $this->setUserPerm( '' );
406 $this->assertEquals( [ [ 'badaccess-group0' ] ],
407 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
409 $wgNamespaceProtection[NS_USER
] = [ 'bogus' ];
411 $this->setTitle( NS_USER
);
412 $this->setUserPerm( '' );
413 $this->assertEquals( [ [ 'badaccess-group0' ],
414 [ 'namespaceprotected', 'User', 'bogus' ] ],
415 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
417 $this->setTitle( NS_MEDIAWIKI
);
418 $this->setUserPerm( 'bogus' );
419 $this->assertEquals( [ [ 'protectedinterface', 'bogus' ] ],
420 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
422 $this->setTitle( NS_MEDIAWIKI
);
423 $this->setUserPerm( 'bogus' );
424 $this->assertEquals( [ [ 'protectedinterface', 'bogus' ] ],
425 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
427 $wgNamespaceProtection = null;
429 $this->setUserPerm( 'bogus' );
430 $this->assertEquals( [],
431 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
432 $this->assertEquals( true,
433 $this->title
->userCan( 'bogus', $this->user
) );
435 $this->setUserPerm( '' );
436 $this->assertEquals( [ [ 'badaccess-group0' ] ],
437 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
438 $this->assertEquals( false,
439 $this->title
->userCan( 'bogus', $this->user
) );
443 * @todo This test method should be split up into separate test methods and
446 public function testCssAndJavascriptPermissions() {
447 $this->setUser( $this->userName
);
449 $this->setTitle( NS_USER
, $this->userName
. '/test.js' );
450 $this->runCSSandJSPermissions(
451 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
452 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
453 [ [ 'badaccess-group0' ] ],
454 [ [ 'badaccess-group0' ], [ 'mycustomjsprotected', 'bogus' ] ],
455 [ [ 'badaccess-group0' ] ]
458 $this->setTitle( NS_USER
, $this->userName
. '/test.css' );
459 $this->runCSSandJSPermissions(
460 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
461 [ [ 'badaccess-group0' ] ],
462 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ],
463 [ [ 'badaccess-group0' ] ],
464 [ [ 'badaccess-group0' ], [ 'mycustomcssprotected', 'bogus' ] ]
467 $this->setTitle( NS_USER
, $this->altUserName
. '/test.js' );
468 $this->runCSSandJSPermissions(
469 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
470 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
471 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
472 [ [ 'badaccess-group0' ], [ 'customjsprotected', 'bogus' ] ],
473 [ [ 'badaccess-group0' ] ]
476 $this->setTitle( NS_USER
, $this->altUserName
. '/test.css' );
477 $this->runCSSandJSPermissions(
478 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
479 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
480 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ],
481 [ [ 'badaccess-group0' ] ],
482 [ [ 'badaccess-group0' ], [ 'customcssprotected', 'bogus' ] ]
485 $this->setTitle( NS_USER
, $this->altUserName
. '/tempo' );
486 $this->runCSSandJSPermissions(
487 [ [ 'badaccess-group0' ] ],
488 [ [ 'badaccess-group0' ] ],
489 [ [ 'badaccess-group0' ] ],
490 [ [ 'badaccess-group0' ] ],
491 [ [ 'badaccess-group0' ] ]
495 protected function runCSSandJSPermissions( $result0, $result1, $result2, $result3, $result4 ) {
496 $this->setUserPerm( '' );
497 $this->assertEquals( $result0,
498 $this->title
->getUserPermissionsErrors( 'bogus',
501 $this->setUserPerm( 'editmyusercss' );
502 $this->assertEquals( $result1,
503 $this->title
->getUserPermissionsErrors( 'bogus',
506 $this->setUserPerm( 'editmyuserjs' );
507 $this->assertEquals( $result2,
508 $this->title
->getUserPermissionsErrors( 'bogus',
511 $this->setUserPerm( 'editusercss' );
512 $this->assertEquals( $result3,
513 $this->title
->getUserPermissionsErrors( 'bogus',
516 $this->setUserPerm( 'edituserjs' );
517 $this->assertEquals( $result4,
518 $this->title
->getUserPermissionsErrors( 'bogus',
521 $this->setUserPerm( 'editusercssjs' );
522 $this->assertEquals( [ [ 'badaccess-group0' ] ],
523 $this->title
->getUserPermissionsErrors( 'bogus',
526 $this->setUserPerm( [ 'edituserjs', 'editusercss' ] );
527 $this->assertEquals( [ [ 'badaccess-group0' ] ],
528 $this->title
->getUserPermissionsErrors( 'bogus',
533 * @todo This test method should be split up into separate test methods and
536 public function testPageRestrictions() {
539 $prefix = $wgContLang->getFormattedNsText( NS_PROJECT
);
541 $this->setTitle( NS_MAIN
);
542 $this->title
->mRestrictionsLoaded
= true;
543 $this->setUserPerm( "edit" );
544 $this->title
->mRestrictions
= [ "bogus" => [ 'bogus', "sysop", "protect", "" ] ];
546 $this->assertEquals( [],
547 $this->title
->getUserPermissionsErrors( 'edit',
550 $this->assertEquals( true,
551 $this->title
->quickUserCan( 'edit', $this->user
) );
552 $this->title
->mRestrictions
= [ "edit" => [ 'bogus', "sysop", "protect", "" ],
553 "bogus" => [ 'bogus', "sysop", "protect", "" ] ];
555 $this->assertEquals( [ [ 'badaccess-group0' ],
556 [ 'protectedpagetext', 'bogus', 'bogus' ],
557 [ 'protectedpagetext', 'editprotected', 'bogus' ],
558 [ 'protectedpagetext', 'protect', 'bogus' ] ],
559 $this->title
->getUserPermissionsErrors( 'bogus',
561 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
562 [ 'protectedpagetext', 'editprotected', 'edit' ],
563 [ 'protectedpagetext', 'protect', 'edit' ] ],
564 $this->title
->getUserPermissionsErrors( 'edit',
566 $this->setUserPerm( "" );
567 $this->assertEquals( [ [ 'badaccess-group0' ],
568 [ 'protectedpagetext', 'bogus', 'bogus' ],
569 [ 'protectedpagetext', 'editprotected', 'bogus' ],
570 [ 'protectedpagetext', 'protect', 'bogus' ] ],
571 $this->title
->getUserPermissionsErrors( 'bogus',
573 $this->assertEquals( [ [ 'badaccess-groups', "*, [[$prefix:Users|Users]]", 2 ],
574 [ 'protectedpagetext', 'bogus', 'edit' ],
575 [ 'protectedpagetext', 'editprotected', 'edit' ],
576 [ 'protectedpagetext', 'protect', 'edit' ] ],
577 $this->title
->getUserPermissionsErrors( 'edit',
579 $this->setUserPerm( [ "edit", "editprotected" ] );
580 $this->assertEquals( [ [ 'badaccess-group0' ],
581 [ 'protectedpagetext', 'bogus', 'bogus' ],
582 [ 'protectedpagetext', 'protect', 'bogus' ] ],
583 $this->title
->getUserPermissionsErrors( 'bogus',
585 $this->assertEquals( [
586 [ 'protectedpagetext', 'bogus', 'edit' ],
587 [ 'protectedpagetext', 'protect', 'edit' ] ],
588 $this->title
->getUserPermissionsErrors( 'edit',
591 $this->title
->mCascadeRestriction
= true;
592 $this->setUserPerm( "edit" );
593 $this->assertEquals( false,
594 $this->title
->quickUserCan( 'bogus', $this->user
) );
595 $this->assertEquals( false,
596 $this->title
->quickUserCan( 'edit', $this->user
) );
597 $this->assertEquals( [ [ 'badaccess-group0' ],
598 [ 'protectedpagetext', 'bogus', 'bogus' ],
599 [ 'protectedpagetext', 'editprotected', 'bogus' ],
600 [ 'protectedpagetext', 'protect', 'bogus' ] ],
601 $this->title
->getUserPermissionsErrors( 'bogus',
603 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
604 [ 'protectedpagetext', 'editprotected', 'edit' ],
605 [ 'protectedpagetext', 'protect', 'edit' ] ],
606 $this->title
->getUserPermissionsErrors( 'edit',
609 $this->setUserPerm( [ "edit", "editprotected" ] );
610 $this->assertEquals( false,
611 $this->title
->quickUserCan( 'bogus', $this->user
) );
612 $this->assertEquals( false,
613 $this->title
->quickUserCan( 'edit', $this->user
) );
614 $this->assertEquals( [ [ 'badaccess-group0' ],
615 [ 'protectedpagetext', 'bogus', 'bogus' ],
616 [ 'protectedpagetext', 'protect', 'bogus' ],
617 [ 'protectedpagetext', 'protect', 'bogus' ] ],
618 $this->title
->getUserPermissionsErrors( 'bogus',
620 $this->assertEquals( [ [ 'protectedpagetext', 'bogus', 'edit' ],
621 [ 'protectedpagetext', 'protect', 'edit' ],
622 [ 'protectedpagetext', 'protect', 'edit' ] ],
623 $this->title
->getUserPermissionsErrors( 'edit',
627 public function testCascadingSourcesRestrictions() {
628 $this->setTitle( NS_MAIN
, "test page" );
629 $this->setUserPerm( [ "edit", "bogus" ] );
631 $this->title
->mCascadeSources
= [
632 Title
::makeTitle( NS_MAIN
, "Bogus" ),
633 Title
::makeTitle( NS_MAIN
, "UnBogus" )
635 $this->title
->mCascadingRestrictions
= [
636 "bogus" => [ 'bogus', "sysop", "protect", "" ]
639 $this->assertEquals( false,
640 $this->title
->userCan( 'bogus', $this->user
) );
641 $this->assertEquals( [
642 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ],
643 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ],
644 [ "cascadeprotected", 2, "* [[:Bogus]]\n* [[:UnBogus]]\n", 'bogus' ] ],
645 $this->title
->getUserPermissionsErrors( 'bogus', $this->user
) );
647 $this->assertEquals( true,
648 $this->title
->userCan( 'edit', $this->user
) );
649 $this->assertEquals( [],
650 $this->title
->getUserPermissionsErrors( 'edit', $this->user
) );
654 * @todo This test method should be split up into separate test methods and
657 public function testActionPermissions() {
658 $this->setUserPerm( [ "createpage" ] );
659 $this->setTitle( NS_MAIN
, "test page" );
660 $this->title
->mTitleProtection
['permission'] = '';
661 $this->title
->mTitleProtection
['user'] = $this->user
->getId();
662 $this->title
->mTitleProtection
['expiry'] = 'infinity';
663 $this->title
->mTitleProtection
['reason'] = 'test';
664 $this->title
->mCascadeRestriction
= false;
666 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
667 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
668 $this->assertEquals( false,
669 $this->title
->userCan( 'create', $this->user
) );
671 $this->title
->mTitleProtection
['permission'] = 'editprotected';
672 $this->setUserPerm( [ 'createpage', 'protect' ] );
673 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
674 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
675 $this->assertEquals( false,
676 $this->title
->userCan( 'create', $this->user
) );
678 $this->setUserPerm( [ 'createpage', 'editprotected' ] );
679 $this->assertEquals( [],
680 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
681 $this->assertEquals( true,
682 $this->title
->userCan( 'create', $this->user
) );
684 $this->setUserPerm( [ 'createpage' ] );
685 $this->assertEquals( [ [ 'titleprotected', 'Useruser', 'test' ] ],
686 $this->title
->getUserPermissionsErrors( 'create', $this->user
) );
687 $this->assertEquals( false,
688 $this->title
->userCan( 'create', $this->user
) );
690 $this->setTitle( NS_MEDIA
, "test page" );
691 $this->setUserPerm( [ "move" ] );
692 $this->assertEquals( false,
693 $this->title
->userCan( 'move', $this->user
) );
694 $this->assertEquals( [ [ 'immobile-source-namespace', 'Media' ] ],
695 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
697 $this->setTitle( NS_HELP
, "test page" );
698 $this->assertEquals( [],
699 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
700 $this->assertEquals( true,
701 $this->title
->userCan( 'move', $this->user
) );
703 $this->title
->mInterwiki
= "no";
704 $this->assertEquals( [ [ 'immobile-source-page' ] ],
705 $this->title
->getUserPermissionsErrors( 'move', $this->user
) );
706 $this->assertEquals( false,
707 $this->title
->userCan( 'move', $this->user
) );
709 $this->setTitle( NS_MEDIA
, "test page" );
710 $this->assertEquals( false,
711 $this->title
->userCan( 'move-target', $this->user
) );
712 $this->assertEquals( [ [ 'immobile-target-namespace', 'Media' ] ],
713 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
715 $this->setTitle( NS_HELP
, "test page" );
716 $this->assertEquals( [],
717 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
718 $this->assertEquals( true,
719 $this->title
->userCan( 'move-target', $this->user
) );
721 $this->title
->mInterwiki
= "no";
722 $this->assertEquals( [ [ 'immobile-target-page' ] ],
723 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
724 $this->assertEquals( false,
725 $this->title
->userCan( 'move-target', $this->user
) );
728 public function testUserBlock() {
729 global $wgEmailConfirmToEdit, $wgEmailAuthentication;
730 $wgEmailConfirmToEdit = true;
731 $wgEmailAuthentication = true;
733 $this->setUserPerm( [ "createpage", "move" ] );
734 $this->setTitle( NS_HELP
, "test page" );
737 $this->assertEquals( [ [ 'confirmedittext' ] ],
738 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
739 $wgEmailConfirmToEdit = false;
740 $this->assertEquals( true, $this->title
->userCan( 'move-target', $this->user
) );
742 # $wgEmailConfirmToEdit && !$user->isEmailConfirmed() && $action != 'createaccount'
743 $this->assertEquals( [],
744 $this->title
->getUserPermissionsErrors( 'move-target',
750 $this->user
->mBlockedby
= $this->user
->getId();
751 $this->user
->mBlock
= new Block( [
752 'address' => '127.0.8.1',
753 'by' => $this->user
->getId(),
754 'reason' => 'no reason given',
755 'timestamp' => $prev +
3600,
759 $this->user
->mBlock
->mTimestamp
= 0;
760 $this->assertEquals( [ [ 'autoblockedtext',
761 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
762 'Useruser', null, 'infinite', '127.0.8.1',
763 $wgLang->timeanddate( wfTimestamp( TS_MW
, $prev ), true ) ] ],
764 $this->title
->getUserPermissionsErrors( 'move-target',
767 $this->assertEquals( false, $this->title
->userCan( 'move-target', $this->user
) );
768 // quickUserCan should ignore user blocks
769 $this->assertEquals( true, $this->title
->quickUserCan( 'move-target', $this->user
) );
771 global $wgLocalTZoffset;
772 $wgLocalTZoffset = -60;
773 $this->user
->mBlockedby
= $this->user
->getName();
774 $this->user
->mBlock
= new Block( [
775 'address' => '127.0.8.1',
776 'by' => $this->user
->getId(),
777 'reason' => 'no reason given',
782 $this->assertEquals( [ [ 'blockedtext',
783 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
784 'Useruser', null, '23:00, 31 December 1969', '127.0.8.1',
785 $wgLang->timeanddate( wfTimestamp( TS_MW
, $now ), true ) ] ],
786 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );
787 # $action != 'read' && $action != 'createaccount' && $user->isBlockedFrom( $this )
788 # $user->blockedFor() == ''
789 # $user->mBlock->mExpiry == 'infinity'
791 $this->user
->mBlockedby
= $this->user
->getName();
792 $this->user
->mBlock
= new Block( [
793 'address' => '127.0.8.1',
794 'by' => $this->user
->getId(),
795 'reason' => 'no reason given',
799 'systemBlock' => 'test',
801 $this->assertEquals( [ [ 'systemblockedtext',
802 '[[User:Useruser|Useruser]]', 'no reason given', '127.0.0.1',
803 'Useruser', 'test', '23:00, 31 December 1969', '127.0.8.1',
804 $wgLang->timeanddate( wfTimestamp( TS_MW
, $now ), true ) ] ],
805 $this->title
->getUserPermissionsErrors( 'move-target', $this->user
) );