123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108 |
- <?php defined('SYSPATH') OR die('Kohana bootstrap needs to be included before tests run');
- /**
- * Tests Kohana_Security
- *
- * @group kohana
- * @group kohana.core
- * @group kohana.core.security
- *
- * @package Kohana
- * @category Tests
- */
- class Kohana_SecurityTest extends Unittest_TestCase
- {
- /**
- * Provides test data for test_envode_php_tags()
- *
- * @return array Test data sets
- */
- public function provider_encode_php_tags()
- {
- return array(
- array("<?php echo 'helloo'; ?>", "<?php echo 'helloo'; ?>"),
- );
- }
- /**
- * Tests Security::encode_php_tags()
- *
- * @test
- * @dataProvider provider_encode_php_tags
- * @covers Security::encode_php_tags
- */
- public function test_encode_php_tags($expected, $input)
- {
- $this->assertSame($expected, Security::encode_php_tags($input));
- }
- /**
- * Provides test data for test_strip_image_tags()
- *
- * @return array Test data sets
- */
- public function provider_strip_image_tags()
- {
- return array(
- array('foo', '<img src="foo" />'),
- );
- }
- /**
- * Tests Security::strip_image_tags()
- *
- * @test
- * @dataProvider provider_strip_image_tags
- * @covers Security::strip_image_tags
- */
- public function test_strip_image_tags($expected, $input)
- {
- $this->assertSame($expected, Security::strip_image_tags($input));
- }
- /**
- * Provides test data for Security::token()
- *
- * @return array Test data sets
- */
- public function provider_csrf_token()
- {
- // Unfortunately this data provider has to use the session in order to
- // generate its data. If headers have already been sent then this method
- // throws an error, even if the test is does not run. If we return an
- // empty array then this also causes an error, so the only way to get
- // around it is to return an array of misc data and have the test skip
- // if headers have been sent. It's annoying this hack has to be
- // implemented, but the security code isn't exactly brilliantly
- // implemented. Ideally we'd be able to inject a session instance
- if (headers_sent())
- return array(array('', '', 0));
- $array = array();
- for ($i = 0; $i <= 4; $i++)
- {
- Security::$token_name = 'token_'.$i;
- $array[] = array(Security::token(TRUE), Security::check(Security::token(FALSE)), $i);
- }
- return $array;
- }
- /**
- * Tests Security::token()
- *
- * @test
- * @dataProvider provider_csrf_token
- * @covers Security::token
- */
- public function test_csrf_token($expected, $input, $iteration)
- {
- if (headers_sent()) {
- $this->markTestSkipped('Headers have already been sent, session not available');
- }
- Security::$token_name = 'token_'.$iteration;
- $this->assertSame(TRUE, $input);
- $this->assertSame($expected, Security::token(FALSE));
- Session::instance()->delete(Security::$token_name);
- }
- }
|