2021-06-26 11:23:15 -04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace Tests\Unit;
|
2020-04-03 20:16:05 -04:00
|
|
|
|
2020-07-28 07:59:43 -04:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2020-04-03 20:16:05 -04:00
|
|
|
use Tests\TestCase;
|
2019-06-23 11:01:15 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class ConfigTest
|
|
|
|
* Many of the tests here are to check on tweaks made
|
|
|
|
* to maintain backwards compatibility.
|
|
|
|
*/
|
|
|
|
class ConfigTest extends TestCase
|
|
|
|
{
|
|
|
|
public function test_filesystem_images_falls_back_to_storage_type_var()
|
|
|
|
{
|
2021-06-26 11:23:15 -04:00
|
|
|
$this->runWithEnv('STORAGE_TYPE', 'local_secure', function () {
|
2019-09-14 09:12:39 -04:00
|
|
|
$this->checkEnvConfigResult('STORAGE_IMAGE_TYPE', 's3', 'filesystems.images', 's3');
|
|
|
|
$this->checkEnvConfigResult('STORAGE_IMAGE_TYPE', null, 'filesystems.images', 'local_secure');
|
|
|
|
});
|
2019-06-23 11:01:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_filesystem_attachments_falls_back_to_storage_type_var()
|
|
|
|
{
|
2021-06-26 11:23:15 -04:00
|
|
|
$this->runWithEnv('STORAGE_TYPE', 'local_secure', function () {
|
2019-09-14 09:12:39 -04:00
|
|
|
$this->checkEnvConfigResult('STORAGE_ATTACHMENT_TYPE', 's3', 'filesystems.attachments', 's3');
|
|
|
|
$this->checkEnvConfigResult('STORAGE_ATTACHMENT_TYPE', null, 'filesystems.attachments', 'local_secure');
|
|
|
|
});
|
2019-06-23 11:01:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_app_url_blank_if_old_default_value()
|
|
|
|
{
|
|
|
|
$initUrl = 'https://example.com/docs';
|
|
|
|
$oldDefault = 'http://bookstack.dev';
|
|
|
|
$this->checkEnvConfigResult('APP_URL', $initUrl, 'app.url', $initUrl);
|
|
|
|
$this->checkEnvConfigResult('APP_URL', $oldDefault, 'app.url', '');
|
|
|
|
}
|
|
|
|
|
2020-07-28 07:59:43 -04:00
|
|
|
public function test_errorlog_plain_webserver_channel()
|
|
|
|
{
|
|
|
|
// We can't full test this due to it being targeted for the SAPI logging handler
|
|
|
|
// so we just overwrite that component so we can capture the error log output.
|
|
|
|
config()->set([
|
|
|
|
'logging.channels.errorlog_plain_webserver.handler_with' => [0],
|
|
|
|
]);
|
|
|
|
|
|
|
|
$temp = tempnam(sys_get_temp_dir(), 'bs-test');
|
2021-06-26 11:23:15 -04:00
|
|
|
$original = ini_set('error_log', $temp);
|
2020-07-28 07:59:43 -04:00
|
|
|
|
|
|
|
Log::channel('errorlog_plain_webserver')->info('Aww, look, a cute puppy');
|
|
|
|
|
2021-06-26 11:23:15 -04:00
|
|
|
ini_set('error_log', $original);
|
2020-07-28 07:59:43 -04:00
|
|
|
|
|
|
|
$output = file_get_contents($temp);
|
|
|
|
$this->assertStringContainsString('Aww, look, a cute puppy', $output);
|
|
|
|
$this->assertStringNotContainsString('INFO', $output);
|
|
|
|
$this->assertStringNotContainsString('info', $output);
|
|
|
|
$this->assertStringNotContainsString('testing', $output);
|
|
|
|
}
|
|
|
|
|
2021-03-16 09:03:07 -04:00
|
|
|
public function test_session_cookie_uses_sub_path_from_app_url()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://example.com', 'session.path', '/');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://a.com/b', 'session.path', '/b');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', 'https://a.com/b/d/e', 'session.path', '/b/d/e');
|
|
|
|
$this->checkEnvConfigResult('APP_URL', '', 'session.path', '/');
|
|
|
|
}
|
|
|
|
|
2021-05-08 08:07:25 -04:00
|
|
|
public function test_saml2_idp_authn_context_string_parsed_as_space_separated_array()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult(
|
|
|
|
'SAML2_IDP_AUTHNCONTEXT',
|
|
|
|
'urn:federation:authentication:windows urn:federation:authentication:linux',
|
|
|
|
'saml2.onelogin.security.requestedAuthnContext',
|
|
|
|
['urn:federation:authentication:windows', 'urn:federation:authentication:linux']
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-08-31 15:22:42 -04:00
|
|
|
public function test_dompdf_remote_fetching_controlled_by_allow_untrusted_server_fetching_false()
|
|
|
|
{
|
|
|
|
$this->checkEnvConfigResult('ALLOW_UNTRUSTED_SERVER_FETCHING', 'false', 'dompdf.defines.enable_remote', false);
|
|
|
|
$this->checkEnvConfigResult('ALLOW_UNTRUSTED_SERVER_FETCHING', 'true', 'dompdf.defines.enable_remote', true);
|
|
|
|
}
|
|
|
|
|
2019-06-23 11:01:15 -04:00
|
|
|
/**
|
|
|
|
* Set an environment variable of the given name and value
|
|
|
|
* then check the given config key to see if it matches the given result.
|
|
|
|
* Providing a null $envVal clears the variable.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2021-05-08 08:23:28 -04:00
|
|
|
* @param mixed $expectedResult
|
2019-06-23 11:01:15 -04:00
|
|
|
*/
|
2021-05-08 08:23:28 -04:00
|
|
|
protected function checkEnvConfigResult(string $envName, ?string $envVal, string $configKey, $expectedResult)
|
2019-06-23 11:01:15 -04:00
|
|
|
{
|
2021-06-26 11:23:15 -04:00
|
|
|
$this->runWithEnv($envName, $envVal, function () use ($configKey, $expectedResult) {
|
2019-09-14 09:12:39 -04:00
|
|
|
$this->assertEquals($expectedResult, config($configKey));
|
|
|
|
});
|
2019-06-23 11:01:15 -04:00
|
|
|
}
|
2021-06-26 11:23:15 -04:00
|
|
|
}
|