MediaWiki REL1_33
SessionInfoTest.php
Go to the documentation of this file.
1<?php
2
3namespace MediaWiki\Session;
4
6
13
14 public function testBasics() {
15 $anonInfo = UserInfo::newAnonymous();
16 $userInfo = UserInfo::newFromName( 'UTSysop', true );
17 $unverifiedUserInfo = UserInfo::newFromName( 'UTSysop', false );
18
19 try {
21 $this->fail( 'Expected exception not thrown', 'priority < min' );
22 } catch ( \InvalidArgumentException $ex ) {
23 $this->assertSame( 'Invalid priority', $ex->getMessage(), 'priority < min' );
24 }
25
26 try {
28 $this->fail( 'Expected exception not thrown', 'priority > max' );
29 } catch ( \InvalidArgumentException $ex ) {
30 $this->assertSame( 'Invalid priority', $ex->getMessage(), 'priority > max' );
31 }
32
33 try {
34 new SessionInfo( SessionInfo::MIN_PRIORITY, [ 'id' => 'ABC?' ] );
35 $this->fail( 'Expected exception not thrown', 'bad session ID' );
36 } catch ( \InvalidArgumentException $ex ) {
37 $this->assertSame( 'Invalid session ID', $ex->getMessage(), 'bad session ID' );
38 }
39
40 try {
41 new SessionInfo( SessionInfo::MIN_PRIORITY, [ 'userInfo' => new \stdClass ] );
42 $this->fail( 'Expected exception not thrown', 'bad userInfo' );
43 } catch ( \InvalidArgumentException $ex ) {
44 $this->assertSame( 'Invalid userInfo', $ex->getMessage(), 'bad userInfo' );
45 }
46
47 try {
49 $this->fail( 'Expected exception not thrown', 'no provider, no id' );
50 } catch ( \InvalidArgumentException $ex ) {
51 $this->assertSame( 'Must supply an ID when no provider is given', $ex->getMessage(),
52 'no provider, no id' );
53 }
54
55 try {
56 new SessionInfo( SessionInfo::MIN_PRIORITY, [ 'copyFrom' => new \stdClass ] );
57 $this->fail( 'Expected exception not thrown', 'bad copyFrom' );
58 } catch ( \InvalidArgumentException $ex ) {
59 $this->assertSame( 'Invalid copyFrom', $ex->getMessage(),
60 'bad copyFrom' );
61 }
62
63 $manager = new SessionManager();
64 $provider = $this->getMockBuilder( SessionProvider::class )
65 ->setMethods( [ 'persistsSessionId', 'canChangeUser', '__toString' ] )
66 ->getMockForAbstractClass();
67 $provider->setManager( $manager );
68 $provider->expects( $this->any() )->method( 'persistsSessionId' )
69 ->will( $this->returnValue( true ) );
70 $provider->expects( $this->any() )->method( 'canChangeUser' )
71 ->will( $this->returnValue( true ) );
72 $provider->expects( $this->any() )->method( '__toString' )
73 ->will( $this->returnValue( 'Mock' ) );
74
75 $provider2 = $this->getMockBuilder( SessionProvider::class )
76 ->setMethods( [ 'persistsSessionId', 'canChangeUser', '__toString' ] )
77 ->getMockForAbstractClass();
78 $provider2->setManager( $manager );
79 $provider2->expects( $this->any() )->method( 'persistsSessionId' )
80 ->will( $this->returnValue( true ) );
81 $provider2->expects( $this->any() )->method( 'canChangeUser' )
82 ->will( $this->returnValue( true ) );
83 $provider2->expects( $this->any() )->method( '__toString' )
84 ->will( $this->returnValue( 'Mock2' ) );
85
86 try {
88 'provider' => $provider,
89 'userInfo' => $anonInfo,
90 'metadata' => 'foo',
91 ] );
92 $this->fail( 'Expected exception not thrown', 'bad metadata' );
93 } catch ( \InvalidArgumentException $ex ) {
94 $this->assertSame( 'Invalid metadata', $ex->getMessage(), 'bad metadata' );
95 }
96
97 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
98 'provider' => $provider,
99 'userInfo' => $anonInfo
100 ] );
101 $this->assertSame( $provider, $info->getProvider() );
102 $this->assertNotNull( $info->getId() );
103 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
104 $this->assertSame( $anonInfo, $info->getUserInfo() );
105 $this->assertTrue( $info->isIdSafe() );
106 $this->assertFalse( $info->forceUse() );
107 $this->assertFalse( $info->wasPersisted() );
108 $this->assertFalse( $info->wasRemembered() );
109 $this->assertFalse( $info->forceHTTPS() );
110 $this->assertNull( $info->getProviderMetadata() );
111
112 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
113 'provider' => $provider,
114 'userInfo' => $unverifiedUserInfo,
115 'metadata' => [ 'Foo' ],
116 ] );
117 $this->assertSame( $provider, $info->getProvider() );
118 $this->assertNotNull( $info->getId() );
119 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
120 $this->assertSame( $unverifiedUserInfo, $info->getUserInfo() );
121 $this->assertTrue( $info->isIdSafe() );
122 $this->assertFalse( $info->forceUse() );
123 $this->assertFalse( $info->wasPersisted() );
124 $this->assertFalse( $info->wasRemembered() );
125 $this->assertFalse( $info->forceHTTPS() );
126 $this->assertSame( [ 'Foo' ], $info->getProviderMetadata() );
127
128 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
129 'provider' => $provider,
130 'userInfo' => $userInfo
131 ] );
132 $this->assertSame( $provider, $info->getProvider() );
133 $this->assertNotNull( $info->getId() );
134 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
135 $this->assertSame( $userInfo, $info->getUserInfo() );
136 $this->assertTrue( $info->isIdSafe() );
137 $this->assertFalse( $info->forceUse() );
138 $this->assertFalse( $info->wasPersisted() );
139 $this->assertTrue( $info->wasRemembered() );
140 $this->assertFalse( $info->forceHTTPS() );
141 $this->assertNull( $info->getProviderMetadata() );
142
143 $id = $manager->generateSessionId();
144
145 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
146 'provider' => $provider,
147 'id' => $id,
148 'persisted' => true,
149 'userInfo' => $anonInfo
150 ] );
151 $this->assertSame( $provider, $info->getProvider() );
152 $this->assertSame( $id, $info->getId() );
153 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
154 $this->assertSame( $anonInfo, $info->getUserInfo() );
155 $this->assertFalse( $info->isIdSafe() );
156 $this->assertFalse( $info->forceUse() );
157 $this->assertTrue( $info->wasPersisted() );
158 $this->assertFalse( $info->wasRemembered() );
159 $this->assertFalse( $info->forceHTTPS() );
160 $this->assertNull( $info->getProviderMetadata() );
161
162 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
163 'provider' => $provider,
164 'id' => $id,
165 'userInfo' => $userInfo
166 ] );
167 $this->assertSame( $provider, $info->getProvider() );
168 $this->assertSame( $id, $info->getId() );
169 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
170 $this->assertSame( $userInfo, $info->getUserInfo() );
171 $this->assertFalse( $info->isIdSafe() );
172 $this->assertFalse( $info->forceUse() );
173 $this->assertFalse( $info->wasPersisted() );
174 $this->assertTrue( $info->wasRemembered() );
175 $this->assertFalse( $info->forceHTTPS() );
176 $this->assertNull( $info->getProviderMetadata() );
177
178 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
179 'id' => $id,
180 'persisted' => true,
181 'userInfo' => $userInfo,
182 'metadata' => [ 'Foo' ],
183 ] );
184 $this->assertSame( $id, $info->getId() );
185 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
186 $this->assertSame( $userInfo, $info->getUserInfo() );
187 $this->assertFalse( $info->isIdSafe() );
188 $this->assertFalse( $info->forceUse() );
189 $this->assertTrue( $info->wasPersisted() );
190 $this->assertFalse( $info->wasRemembered() );
191 $this->assertFalse( $info->forceHTTPS() );
192 $this->assertNull( $info->getProviderMetadata() );
193
194 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
195 'id' => $id,
196 'remembered' => true,
197 'userInfo' => $userInfo,
198 ] );
199 $this->assertFalse( $info->wasRemembered(), 'no provider' );
200
201 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
202 'provider' => $provider,
203 'id' => $id,
204 'remembered' => true,
205 ] );
206 $this->assertFalse( $info->wasRemembered(), 'no user' );
207
208 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
209 'provider' => $provider,
210 'id' => $id,
211 'remembered' => true,
212 'userInfo' => $anonInfo,
213 ] );
214 $this->assertFalse( $info->wasRemembered(), 'anonymous user' );
215
216 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
217 'provider' => $provider,
218 'id' => $id,
219 'remembered' => true,
220 'userInfo' => $unverifiedUserInfo,
221 ] );
222 $this->assertFalse( $info->wasRemembered(), 'unverified user' );
223
224 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
225 'provider' => $provider,
226 'id' => $id,
227 'remembered' => false,
228 'userInfo' => $userInfo,
229 ] );
230 $this->assertFalse( $info->wasRemembered(), 'specific override' );
231
232 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
233 'id' => $id,
234 'idIsSafe' => true,
235 ] );
236 $this->assertSame( $id, $info->getId() );
237 $this->assertSame( SessionInfo::MIN_PRIORITY + 5, $info->getPriority() );
238 $this->assertTrue( $info->isIdSafe() );
239
240 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
241 'id' => $id,
242 'forceUse' => true,
243 ] );
244 $this->assertFalse( $info->forceUse(), 'no provider' );
245
246 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
247 'provider' => $provider,
248 'forceUse' => true,
249 ] );
250 $this->assertFalse( $info->forceUse(), 'no id' );
251
252 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 5, [
253 'provider' => $provider,
254 'id' => $id,
255 'forceUse' => true,
256 ] );
257 $this->assertTrue( $info->forceUse(), 'correct use' );
258
260 'id' => $id,
261 'forceHTTPS' => 1,
262 ] );
263 $this->assertTrue( $info->forceHTTPS() );
264
265 $fromInfo = new SessionInfo( SessionInfo::MIN_PRIORITY, [
266 'id' => $id . 'A',
267 'provider' => $provider,
268 'userInfo' => $userInfo,
269 'idIsSafe' => true,
270 'forceUse' => true,
271 'persisted' => true,
272 'remembered' => true,
273 'forceHTTPS' => true,
274 'metadata' => [ 'foo!' ],
275 ] );
276 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 4, [
277 'copyFrom' => $fromInfo,
278 ] );
279 $this->assertSame( $id . 'A', $info->getId() );
280 $this->assertSame( SessionInfo::MIN_PRIORITY + 4, $info->getPriority() );
281 $this->assertSame( $provider, $info->getProvider() );
282 $this->assertSame( $userInfo, $info->getUserInfo() );
283 $this->assertTrue( $info->isIdSafe() );
284 $this->assertTrue( $info->forceUse() );
285 $this->assertTrue( $info->wasPersisted() );
286 $this->assertTrue( $info->wasRemembered() );
287 $this->assertTrue( $info->forceHTTPS() );
288 $this->assertSame( [ 'foo!' ], $info->getProviderMetadata() );
289
290 $info = new SessionInfo( SessionInfo::MIN_PRIORITY + 4, [
291 'id' => $id . 'X',
292 'provider' => $provider2,
293 'userInfo' => $unverifiedUserInfo,
294 'idIsSafe' => false,
295 'forceUse' => false,
296 'persisted' => false,
297 'remembered' => false,
298 'forceHTTPS' => false,
299 'metadata' => null,
300 'copyFrom' => $fromInfo,
301 ] );
302 $this->assertSame( $id . 'X', $info->getId() );
303 $this->assertSame( SessionInfo::MIN_PRIORITY + 4, $info->getPriority() );
304 $this->assertSame( $provider2, $info->getProvider() );
305 $this->assertSame( $unverifiedUserInfo, $info->getUserInfo() );
306 $this->assertFalse( $info->isIdSafe() );
307 $this->assertFalse( $info->forceUse() );
308 $this->assertFalse( $info->wasPersisted() );
309 $this->assertFalse( $info->wasRemembered() );
310 $this->assertFalse( $info->forceHTTPS() );
311 $this->assertNull( $info->getProviderMetadata() );
312
314 'id' => $id,
315 ] );
316 $this->assertSame(
317 '[' . SessionInfo::MIN_PRIORITY . "]null<null>$id",
318 (string)$info,
319 'toString'
320 );
321
323 'provider' => $provider,
324 'id' => $id,
325 'persisted' => true,
326 'userInfo' => $userInfo
327 ] );
328 $this->assertSame(
329 '[' . SessionInfo::MIN_PRIORITY . "]Mock<+:{$userInfo->getId()}:UTSysop>$id",
330 (string)$info,
331 'toString'
332 );
333
335 'provider' => $provider,
336 'id' => $id,
337 'persisted' => true,
338 'userInfo' => $unverifiedUserInfo
339 ] );
340 $this->assertSame(
341 '[' . SessionInfo::MIN_PRIORITY . "]Mock<-:{$userInfo->getId()}:UTSysop>$id",
342 (string)$info,
343 'toString'
344 );
345 }
346
347 public function testCompare() {
348 $id = 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa';
349 $info1 = new SessionInfo( SessionInfo::MIN_PRIORITY + 1, [ 'id' => $id ] );
350 $info2 = new SessionInfo( SessionInfo::MIN_PRIORITY + 2, [ 'id' => $id ] );
351
352 $this->assertTrue( SessionInfo::compare( $info1, $info2 ) < 0, '<' );
353 $this->assertTrue( SessionInfo::compare( $info2, $info1 ) > 0, '>' );
354 $this->assertTrue( SessionInfo::compare( $info1, $info1 ) === 0, '==' );
355 }
356}
Apache License January AND DISTRIBUTION Definitions License shall mean the terms and conditions for use
Session Database MediaWiki\Session\SessionInfo.
Value object returned by SessionProvider.
const MIN_PRIORITY
Minimum allowed priority.
const MAX_PRIORITY
Maximum allowed priority.
static compare( $a, $b)
Compare two SessionInfo objects by priority.
This serves as the entry point to the MediaWiki session handling system.
static newFromName( $name, $verified=false)
Create an instance for a logged-in user by name.
Definition UserInfo.php:103
static newAnonymous()
Create an instance for an anonymous (i.e.
Definition UserInfo.php:75
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition injection.txt:37