UserModelTest.php 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. <?php
  2. namespace Tests\Feature\Models;
  3. use App\Models\AuthLog;
  4. use App\Models\Group;
  5. use App\Models\TwoFAccount;
  6. use App\Models\User;
  7. use Illuminate\Auth\Events\PasswordReset;
  8. use Illuminate\Support\Facades\DB;
  9. use Illuminate\Support\Facades\Event;
  10. use Illuminate\Support\Facades\Password;
  11. use Illuminate\Support\Facades\Storage;
  12. use PHPUnit\Framework\Attributes\CoversClass;
  13. use Tests\Data\OtpTestData;
  14. use Tests\FeatureTestCase;
  15. /**
  16. * UserModelTest test class
  17. */
  18. #[CoversClass(User::class)]
  19. class UserModelTest extends FeatureTestCase
  20. {
  21. /**
  22. * @test
  23. */
  24. public function test_admin_scope_returns_only_admin()
  25. {
  26. User::factory()->count(4)->create();
  27. $firstAdmin = User::factory()->administrator()->create([
  28. 'name' => 'first',
  29. ]);
  30. $secondAdmin = User::factory()->administrator()->create([
  31. 'name' => 'secondAdmin',
  32. ]);
  33. $admins = User::admins()->get();
  34. $this->assertCount(2, $admins);
  35. $this->assertEquals($admins[0]->is_admin, true);
  36. $this->assertEquals($admins[1]->is_admin, true);
  37. $this->assertEquals($admins[0]->name, $firstAdmin->name);
  38. $this->assertEquals($admins[1]->name, $secondAdmin->name);
  39. }
  40. /**
  41. * @test
  42. */
  43. public function test_isAdministrator_returns_correct_state()
  44. {
  45. $user = User::factory()->create();
  46. $admin = User::factory()->administrator()->create();
  47. $this->assertEquals($user->isAdministrator(), false);
  48. $this->assertEquals($admin->isAdministrator(), true);
  49. }
  50. /**
  51. * @test
  52. */
  53. public function test_promoteToAdministrator_sets_administrator_status()
  54. {
  55. $user = User::factory()->create();
  56. $user->promoteToAdministrator();
  57. $this->assertEquals($user->isAdministrator(), true);
  58. }
  59. /**
  60. * @test
  61. */
  62. public function test_promoteToAdministrator_demote_administrator_status()
  63. {
  64. $admin = User::factory()->administrator()->create();
  65. // We need another admin to prevent demoting event returning false
  66. // and blocking the demotion
  67. $another_admin = User::factory()->administrator()->create();
  68. $admin->promoteToAdministrator(false);
  69. $admin->save();
  70. $this->assertFalse($admin->isAdministrator());
  71. }
  72. /**
  73. * @test
  74. */
  75. public function test_resetPassword_resets_password_with_success()
  76. {
  77. $user = User::factory()->create();
  78. $oldPassword = $user->password;
  79. $user->resetPassword();
  80. $this->assertNotEquals($user->password, $oldPassword);
  81. }
  82. /**
  83. * @test
  84. */
  85. public function test_resetPassword_dispatch_event()
  86. {
  87. Event::fake();
  88. $user = User::factory()->create();
  89. Event::assertDispatched(
  90. PasswordReset::class,
  91. $user->resetPassword()
  92. );
  93. }
  94. /**
  95. * @test
  96. */
  97. public function test_delete_removes_user_data()
  98. {
  99. $user = User::factory()->create();
  100. TwoFAccount::factory()->for($user)->create();
  101. AuthLog::factory()->for($user, 'authenticatable')->create();
  102. Group::factory()->for($user)->create();
  103. DB::table('webauthn_credentials')->insert([
  104. 'id' => '-VOLFKPY-_FuMI_sJ7gMllK76L3VoRUINj6lL_Z3qDg',
  105. 'authenticatable_type' => \App\Models\User::class,
  106. 'authenticatable_id' => $user->id,
  107. 'user_id' => 'e8af6f703f8042aa91c30cf72289aa07',
  108. 'counter' => 0,
  109. 'rp_id' => 'http://localhost',
  110. 'origin' => 'http://localhost',
  111. 'aaguid' => '00000000-0000-0000-0000-000000000000',
  112. 'attestation_format' => 'none',
  113. 'public_key' => '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',
  114. 'updated_at' => now(),
  115. 'created_at' => now(),
  116. ]);
  117. $user->createToken('myToken', []);
  118. Password::broker('webauthn')->createToken($user);
  119. Password::broker()->createToken($user);
  120. $user->delete();
  121. $this->assertDatabaseMissing('twofaccounts', [
  122. 'user_id' => $user->id,
  123. ]);
  124. $this->assertDatabaseMissing('groups', [
  125. 'user_id' => $user->id,
  126. ]);
  127. $this->assertDatabaseMissing('webauthn_credentials', [
  128. 'authenticatable_id' => $user->id,
  129. ]);
  130. $this->assertDatabaseMissing(config('auth.passwords.webauthn.table'), [
  131. 'email' => $user->email,
  132. ]);
  133. $this->assertDatabaseMissing('oauth_access_tokens', [
  134. 'user_id' => $user->id,
  135. ]);
  136. $this->assertDatabaseMissing(config('auth.passwords.users.table'), [
  137. 'email' => $user->email,
  138. ]);
  139. $this->assertDatabaseMissing('auth_logs', [
  140. 'authenticatable_id' => $user->id,
  141. ]);
  142. }
  143. /**
  144. * @test
  145. */
  146. public function test_delete_flushes_icons_of_user_twofaccounts()
  147. {
  148. Storage::fake('icons');
  149. $user = User::factory()->create();
  150. $twofaccount = TwoFAccount::factory()->for($user)->create();
  151. $twofaccount->setIcon(base64_decode(OtpTestData::ICON_PNG_DATA), 'png');
  152. $twofaccount->save();
  153. Storage::disk('icons')->assertExists($twofaccount->icon);
  154. $user->delete();
  155. Storage::disk('icons')->assertMissing($twofaccount->icon);
  156. }
  157. /**
  158. * @test
  159. */
  160. public function test_delete_does_not_delete_the_only_admin()
  161. {
  162. $admin = User::factory()->administrator()->create();
  163. $this->assertEquals(1, User::admins()->count());
  164. $isDeleted = $admin->delete();
  165. $this->assertFalse($isDeleted);
  166. }
  167. }