Linux aries.aptans.com 4.18.0-348.20.1.lve.1.el8.x86_64 #1 SMP Wed Mar 16 08:45:39 EDT 2022 x86_64
Apache
: 135.181.142.107 | : 172.69.17.165
Cant Read [ /etc/named.conf ]
7.4.33
aja
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
aja /
public_html /
ead.aptans /
lib /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
analytics
[ DIR ]
drwxr-xr-x
behat
[ DIR ]
drwxr-xr-x
content
[ DIR ]
drwxr-xr-x
event
[ DIR ]
drwxr-xr-x
external
[ DIR ]
drwxr-xr-x
fixtures
[ DIR ]
drwxr-xr-x
other
[ DIR ]
drwxr-xr-x
output
[ DIR ]
drwxr-xr-x
performance
[ DIR ]
drwxr-xr-x
plugininfo
[ DIR ]
drwxr-xr-x
accesslib_has_capability_test....
29.73
KB
-rw-rw-r--
accesslib_test.php
219.29
KB
-rw-rw-r--
adhoc_task_test.php
18.44
KB
-rw-rw-r--
adminlib_test.php
4.38
KB
-rw-rw-r--
admintree_test.php
17.32
KB
-rw-r--r--
ajaxlib_test.php
4.36
KB
-rw-rw-r--
analysers_test.php
12.95
KB
-rw-r--r--
antivirus_test.php
8.69
KB
-rw-rw-r--
authlib_test.php
19.91
KB
-rw-r--r--
blocklib_test.php
35.27
KB
-rw-rw-r--
calendar_cron_task_test.php
2.69
KB
-rw-rw-r--
check_test.php
1.97
KB
-rw-r--r--
client_test.php
4.34
KB
-rw-r--r--
collator_test.php
11.99
KB
-rw-r--r--
completion_daily_task_test.php
5.24
KB
-rw-r--r--
completionlib_test.php
62.1
KB
-rw-rw-r--
component_test.php
40.17
KB
-rw-rw-r--
componentlib_test.php
6.64
KB
-rw-r--r--
configonlylib_test.php
6.15
KB
-rw-r--r--
content_test.php
4.77
KB
-rw-r--r--
core_media_player_native_test....
6.54
KB
-rw-r--r--
core_renderer_template_exploit...
17.28
KB
-rw-r--r--
coverage.php
1.93
KB
-rw-rw-r--
cronlib_test.php
6.89
KB
-rw-r--r--
csslib_test.php
1.79
KB
-rw-r--r--
csvclass_test.php
5.57
KB
-rw-r--r--
curl_security_helper_test.php
14.71
KB
-rw-r--r--
customcontext_test.php
3.79
KB
-rw-r--r--
dataformat_test.php
3.74
KB
-rw-r--r--
datalib_test.php
47.8
KB
-rw-r--r--
datalib_update_with_unique_ind...
6.31
KB
-rw-r--r--
date_legacy_test.php
13.9
KB
-rw-r--r--
date_test.php
24.48
KB
-rw-rw-r--
editorlib_test.php
2.01
KB
-rw-r--r--
encryption_test.php
8.68
KB
-rw-r--r--
environment_test.php
8.54
KB
-rw-r--r--
event_context_locked_test.php
4.11
KB
-rw-r--r--
event_course_module_instance_l...
2.7
KB
-rw-r--r--
event_course_module_viewed.php
3.33
KB
-rw-r--r--
event_deprecated_test.php
1.49
KB
-rw-r--r--
event_grade_deleted_test.php
3.25
KB
-rw-r--r--
event_profile_field_test.php
12.44
KB
-rw-r--r--
event_unknown_logged_test.php
1.92
KB
-rw-r--r--
event_user_graded_test.php
10.07
KB
-rw-r--r--
event_user_password_updated_te...
2.89
KB
-rw-r--r--
exporter_test.php
11.02
KB
-rw-r--r--
externallib_test.php
29.7
KB
-rw-r--r--
filelib_test.php
70.92
KB
-rw-rw-r--
filestorage_zip_archive_test.p...
2.75
KB
-rw-r--r--
filetypes_test.php
10.2
KB
-rw-r--r--
filter_manager_test.php
3.48
KB
-rw-r--r--
filterlib_test.php
36.72
KB
-rw-r--r--
formslib_test.php
39.6
KB
-rw-r--r--
gdlib_test.php
5.92
KB
-rw-r--r--
googlelib_test.php
1.54
KB
-rw-r--r--
gradelib_test.php
9.74
KB
-rw-r--r--
grades_externallib_test.php
24.66
KB
-rw-rw-r--
grading_externallib_test.php
26.27
KB
-rw-r--r--
grouplib_test.php
84.23
KB
-rw-rw-r--
h5p_clean_orphaned_records_tas...
3.12
KB
-rw-r--r--
h5p_get_content_types_task_tes...
2.69
KB
-rw-r--r--
html2text_test.php
7.58
KB
-rw-r--r--
html_writer_test.php
8.74
KB
-rw-rw-r--
htmlpurifier_test.php
22.67
KB
-rw-r--r--
ip_utils_test.php
14.27
KB
-rw-r--r--
jquery_test.php
1.76
KB
-rw-r--r--
ldaplib_test.php
17.72
KB
-rw-r--r--
licenselib_test.php
11.58
KB
-rw-r--r--
lock_config_test.php
3.39
KB
-rw-r--r--
lock_test.php
5.5
KB
-rw-r--r--
markdown_test.php
2.45
KB
-rw-r--r--
mathslib_test.php
11.12
KB
-rw-r--r--
medialib_test.php
20.19
KB
-rw-rw-r--
message_test.php
12.46
KB
-rw-rw-r--
messageinbound_test.php
5.89
KB
-rw-r--r--
messagelib_test.php
56.39
KB
-rw-rw-r--
minify_test.php
3.14
KB
-rw-r--r--
modinfolib_test.php
44.15
KB
-rw-rw-r--
moodle_page_test.php
29.58
KB
-rw-rw-r--
moodle_url_test.php
12.85
KB
-rw-r--r--
moodlelib_test.php
216.85
KB
-rw-rw-r--
mustache_template_finder_test....
7.4
KB
-rw-r--r--
mustache_template_source_loade...
18.06
KB
-rw-r--r--
myprofilelib_test.php
10.44
KB
-rw-r--r--
navigationlib_test.php
26.28
KB
-rw-rw-r--
notification_test.php
4.61
KB
-rw-r--r--
oauth2_test.php
17.57
KB
-rw-r--r--
output_mustache_helper_collect...
8.09
KB
-rw-r--r--
outputcomponents_test.php
29.67
KB
-rw-r--r--
outputfactories_test.php
6.8
KB
-rw-r--r--
outputrequirementslib_test.php
5.38
KB
-rw-r--r--
pdflib_test.php
1.51
KB
-rw-r--r--
persistent_test.php
19.95
KB
-rw-rw-r--
plugin_manager_test.php
27.39
KB
-rw-r--r--
portfoliolib_test.php
8.4
KB
-rw-r--r--
progress_display_test.php
3.75
KB
-rw-r--r--
progress_test.php
14.48
KB
-rw-r--r--
qrcode_test.php
1.88
KB
-rw-r--r--
questionlib_test.php
96.9
KB
-rw-rw-r--
regex_test.php
1.88
KB
-rw-r--r--
report_helper_test.php
3.68
KB
-rw-rw-r--
requirejs_test.php
3.73
KB
-rw-r--r--
rsslib_test.php
6.9
KB
-rw-r--r--
rtlcss_test.php
56.86
KB
-rw-r--r--
sample_questions.ser
141.76
KB
-rw-r--r--
sample_questions.xml
102.62
KB
-rw-r--r--
sample_questions_with_old_imag...
4.85
KB
-rw-r--r--
sample_questions_with_old_imag...
4.08
KB
-rw-r--r--
sample_questions_wrong.xml
102.57
KB
-rw-r--r--
scheduled_task_test.php
29.98
KB
-rw-rw-r--
scss_test.php
4.26
KB
-rw-r--r--
session_manager_test.php
33.96
KB
-rw-r--r--
session_redis_test.php
13.27
KB
-rw-r--r--
sessionlib_test.php
11.86
KB
-rw-r--r--
setuplib_test.php
19.63
KB
-rw-r--r--
statslib_test.php
26.75
KB
-rw-r--r--
string_manager_standard_test.p...
10.05
KB
-rw-rw-r--
tablelib_test.php
23.53
KB
-rw-r--r--
task_database_logger_test.php
20.15
KB
-rw-r--r--
task_logging_test.php
17.31
KB
-rw-r--r--
task_manager_test.php
11.2
KB
-rw-r--r--
task_running_test.php
6.58
KB
-rw-r--r--
text_test.php
21.09
KB
-rw-rw-r--
theme_config_test.php
9.81
KB
-rw-rw-r--
time_splittings_test.php
15.09
KB
-rw-r--r--
update_api_test.php
6.75
KB
-rw-r--r--
update_checker_test.php
10.86
KB
-rw-r--r--
update_code_manager_test.php
9.06
KB
-rw-r--r--
update_validator_test.php
18.44
KB
-rw-r--r--
upgrade_util_test.php
5.65
KB
-rw-r--r--
upgradelib_test.php
69.1
KB
-rw-rw-r--
user_menu_test.php
3.82
KB
-rw-rw-r--
user_test.php
32.36
KB
-rw-rw-r--
useragent_test.php
83.88
KB
-rw-rw-r--
weblib_format_text_test.php
12.11
KB
-rw-r--r--
weblib_test.php
35.1
KB
-rw-rw-r--
xhprof_test.php
3.32
KB
-rw-r--r--
xhtml_container_stack_test.php
4.16
KB
-rw-r--r--
xmlize_test.php
2.72
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : authlib_test.php
<?php // This file is part of Moodle - http://moodle.org/ // // Moodle is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Moodle is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Moodle. If not, see <http://www.gnu.org/licenses/>. /** * Authentication related tests. * * @package core_auth * @category phpunit * @copyright 2012 Petr Skoda {@link http://skodak.org} * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ defined('MOODLE_INTERNAL') || die(); /** * Functional test for authentication related APIs. */ class core_authlib_testcase extends advanced_testcase { public function test_lockout() { global $CFG; require_once("$CFG->libdir/authlib.php"); $this->resetAfterTest(); $oldlog = ini_get('error_log'); ini_set('error_log', "$CFG->dataroot/testlog.log"); // Prevent standard logging. unset_config('noemailever'); set_config('lockoutthreshold', 0); set_config('lockoutwindow', 60*20); set_config('lockoutduration', 60*30); $user = $this->getDataGenerator()->create_user(); // Test lockout is disabled when threshold not set. $this->assertFalse(login_is_lockedout($user)); login_attempt_failed($user); login_attempt_failed($user); login_attempt_failed($user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); // Test lockout threshold works. set_config('lockoutthreshold', 3); login_attempt_failed($user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); $sink = $this->redirectEmails(); login_attempt_failed($user); $this->assertCount(1, $sink->get_messages()); $sink->close(); $this->assertTrue(login_is_lockedout($user)); // Test unlock works. login_unlock_account($user); $this->assertFalse(login_is_lockedout($user)); // Test lockout window works. login_attempt_failed($user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); set_user_preference('login_failed_last', time()-60*20-10, $user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); // Test valid login resets window. login_attempt_valid($user); $this->assertFalse(login_is_lockedout($user)); login_attempt_failed($user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); // Test lock duration works. $sink = $this->redirectEmails(); login_attempt_failed($user); $this->assertCount(1, $sink->get_messages()); $sink->close(); $this->assertTrue(login_is_lockedout($user)); set_user_preference('login_lockout', time()-60*30+10, $user); $this->assertTrue(login_is_lockedout($user)); set_user_preference('login_lockout', time()-60*30-10, $user); $this->assertFalse(login_is_lockedout($user)); // Test lockout ignored pref works. set_user_preference('login_lockout_ignored', 1, $user); login_attempt_failed($user); login_attempt_failed($user); login_attempt_failed($user); login_attempt_failed($user); $this->assertFalse(login_is_lockedout($user)); ini_set('error_log', $oldlog); } public function test_authenticate_user_login() { global $CFG; $this->resetAfterTest(); $oldlog = ini_get('error_log'); ini_set('error_log', "$CFG->dataroot/testlog.log"); // Prevent standard logging. unset_config('noemailever'); set_config('lockoutthreshold', 0); set_config('lockoutwindow', 60*20); set_config('lockoutduration', 60*30); $_SERVER['HTTP_USER_AGENT'] = 'no browser'; // Hack around missing user agent in CLI scripts. $user1 = $this->getDataGenerator()->create_user(array('username'=>'username1', 'password'=>'password1', 'email'=>'email1@example.com')); $user2 = $this->getDataGenerator()->create_user(array('username'=>'username2', 'password'=>'password2', 'email'=>'email2@example.com', 'suspended'=>1)); $user3 = $this->getDataGenerator()->create_user(array('username'=>'username3', 'password'=>'password3', 'email'=>'email2@example.com', 'auth'=>'nologin')); // Normal login. $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1'); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals($user1->id, $result->id); // Normal login with reason. $reason = null; $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1', false, $reason); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); // Test login via email $reason = null; $this->assertEmpty($CFG->authloginviaemail); $sink = $this->redirectEvents(); $result = authenticate_user_login('email1@example.com', 'password1', false, $reason); $sink->close(); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_NOUSER, $reason); set_config('authloginviaemail', 1); $this->assertNotEmpty($CFG->authloginviaemail); $sink = $this->redirectEvents(); $result = authenticate_user_login('email1@example.com', 'password1'); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals($user1->id, $result->id); $reason = null; $sink = $this->redirectEvents(); $result = authenticate_user_login('email2@example.com', 'password2', false, $reason); $events = $sink->get_events(); $sink->close(); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_NOUSER, $reason); set_config('authloginviaemail', 0); $reason = null; // Capture failed login event. $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'nopass', false, $reason); $events = $sink->get_events(); $sink->close(); $event = array_pop($events); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_FAILED, $reason); // Test Event. $this->assertInstanceOf('\core\event\user_login_failed', $event); $expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username1'); $this->assertEventLegacyLogData($expectedlogdata, $event); $eventdata = $event->get_data(); $this->assertSame($eventdata['other']['username'], 'username1'); $this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_FAILED); $this->assertEventContextNotUsed($event); // Capture failed login token. unset($CFG->alternateloginurl); unset($CFG->disablelogintoken); $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken'); $events = $sink->get_events(); $sink->close(); $event = array_pop($events); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_FAILED, $reason); // Test Event. $this->assertInstanceOf('\core\event\user_login_failed', $event); $expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username1'); $this->assertEventLegacyLogData($expectedlogdata, $event); $eventdata = $event->get_data(); $this->assertSame($eventdata['other']['username'], 'username1'); $this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_FAILED); $this->assertEventContextNotUsed($event); // Login should work with invalid token if CFG login token settings override it. $CFG->alternateloginurl = 'http://localhost/'; $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken'); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); unset($CFG->alternateloginurl); $CFG->disablelogintoken = true; $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken'); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); unset($CFG->disablelogintoken); // Normal login with valid token. $reason = null; $token = \core\session\manager::get_login_token(); $sink = $this->redirectEvents(); $result = authenticate_user_login('username1', 'password1', false, $reason, $token); $events = $sink->get_events(); $sink->close(); $this->assertEmpty($events); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); $reason = null; // Capture failed login event. $sink = $this->redirectEvents(); $result = authenticate_user_login('username2', 'password2', false, $reason); $events = $sink->get_events(); $sink->close(); $event = array_pop($events); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_SUSPENDED, $reason); // Test Event. $this->assertInstanceOf('\core\event\user_login_failed', $event); $expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username2'); $this->assertEventLegacyLogData($expectedlogdata, $event); $eventdata = $event->get_data(); $this->assertSame($eventdata['other']['username'], 'username2'); $this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_SUSPENDED); $this->assertEventContextNotUsed($event); $reason = null; // Capture failed login event. $sink = $this->redirectEvents(); $result = authenticate_user_login('username3', 'password3', false, $reason); $events = $sink->get_events(); $sink->close(); $event = array_pop($events); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_SUSPENDED, $reason); // Test Event. $this->assertInstanceOf('\core\event\user_login_failed', $event); $expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username3'); $this->assertEventLegacyLogData($expectedlogdata, $event); $eventdata = $event->get_data(); $this->assertSame($eventdata['other']['username'], 'username3'); $this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_SUSPENDED); $this->assertEventContextNotUsed($event); $reason = null; // Capture failed login event. $sink = $this->redirectEvents(); $result = authenticate_user_login('username4', 'password3', false, $reason); $events = $sink->get_events(); $sink->close(); $event = array_pop($events); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_NOUSER, $reason); // Test Event. $this->assertInstanceOf('\core\event\user_login_failed', $event); $expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username4'); $this->assertEventLegacyLogData($expectedlogdata, $event); $eventdata = $event->get_data(); $this->assertSame($eventdata['other']['username'], 'username4'); $this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_NOUSER); $this->assertEventContextNotUsed($event); set_config('lockoutthreshold', 3); $reason = null; $result = authenticate_user_login('username1', 'nopass', false, $reason); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_FAILED, $reason); $result = authenticate_user_login('username1', 'nopass', false, $reason); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_FAILED, $reason); $sink = $this->redirectEmails(); $result = authenticate_user_login('username1', 'nopass', false, $reason); $this->assertCount(1, $sink->get_messages()); $sink->close(); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_FAILED, $reason); $result = authenticate_user_login('username1', 'password1', false, $reason); $this->assertFalse($result); $this->assertEquals(AUTH_LOGIN_LOCKOUT, $reason); $result = authenticate_user_login('username1', 'password1', true, $reason); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); ini_set('error_log', $oldlog); // Test password policy check on login. $CFG->passwordpolicy = 0; $CFG->passwordpolicycheckonlogin = 1; // First test with password policy disabled. $user4 = $this->getDataGenerator()->create_user(array('username' => 'username4', 'password' => 'a')); $sink = $this->redirectEvents(); $reason = null; $result = authenticate_user_login('username4', 'a', false, $reason); $events = $sink->get_events(); $sink->close(); $notifications = \core\notification::fetch(); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); $this->assertEquals(get_user_preferences('auth_forcepasswordchange', false, $result), false); // Check no events. $this->assertEquals(count($events), 0); // Check no notifications. $this->assertEquals(count($notifications), 0); // Now test with the password policy enabled, flip reset flag. $sink = $this->redirectEvents(); $reason = null; $CFG->passwordpolicy = 1; $result = authenticate_user_login('username4', 'a', false, $reason); $events = $sink->get_events(); $sink->close(); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); $this->assertEquals(get_user_preferences('auth_forcepasswordchange', true, $result), true); // Check that an event was emitted for the policy failure. $this->assertEquals(count($events), 1); $this->assertEquals(reset($events)->eventname, '\core\event\user_password_policy_failed'); // Check notification fired. $notifications = \core\notification::fetch(); $this->assertEquals(count($notifications), 1); // Now the same tests with a user that passes the password policy. $user5 = $this->getDataGenerator()->create_user(array('username' => 'username5', 'password' => 'ThisPassword1sSecure!')); $reason = null; $CFG->passwordpolicy = 0; $sink = $this->redirectEvents(); $result = authenticate_user_login('username5', 'ThisPassword1sSecure!', false, $reason); $events = $sink->get_events(); $sink->close(); $notifications = \core\notification::fetch(); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); $this->assertEquals(get_user_preferences('auth_forcepasswordchange', false, $result), false); // Check no events. $this->assertEquals(count($events), 0); // Check no notifications. $this->assertEquals(count($notifications), 0); $reason = null; $CFG->passwordpolicy = 1; $sink = $this->redirectEvents(); $result = authenticate_user_login('username5', 'ThisPassword1sSecure!', false, $reason); $events = $sink->get_events(); $sink->close(); $notifications = \core\notification::fetch(); $this->assertInstanceOf('stdClass', $result); $this->assertEquals(AUTH_LOGIN_OK, $reason); $this->assertEquals(get_user_preferences('auth_forcepasswordchange', false, $result), false); // Check no events. $this->assertEquals(count($events), 0); // Check no notifications. $this->assertEquals(count($notifications), 0); } public function test_user_loggedin_event_exceptions() { try { $event = \core\event\user_loggedin::create(array('objectid' => 1)); $this->fail('\core\event\user_loggedin requires other[\'username\']'); } catch(Exception $e) { $this->assertInstanceOf('coding_exception', $e); } } /** * Test the {@link signup_validate_data()} duplicate email validation. */ public function test_signup_validate_data_same_email() { global $CFG; require_once($CFG->libdir . '/authlib.php'); require_once($CFG->libdir . '/phpmailer/moodle_phpmailer.php'); require_once($CFG->dirroot . '/user/profile/lib.php'); $this->resetAfterTest(); $CFG->registerauth = 'email'; $CFG->passwordpolicy = false; // In this test, we want to check accent-sensitive email search. However, accented email addresses do not pass // the default `validate_email()` and Moodle does not yet provide a CFG switch to allow such emails. So we // inject our own validation method here and revert it back once we are done. This custom validator method is // identical to the default 'php' validator with the only difference: it has the FILTER_FLAG_EMAIL_UNICODE set // so that it allows to use non-ASCII characters in email addresses. $defaultvalidator = moodle_phpmailer::$validator; moodle_phpmailer::$validator = function($address) { return (bool) filter_var($address, FILTER_VALIDATE_EMAIL, FILTER_FLAG_EMAIL_UNICODE); }; // Check that two users cannot share the same email address if the site is configured so. // Emails in Moodle are supposed to be case-insensitive (and accent-sensitive but accents are not yet supported). $CFG->allowaccountssameemail = false; $u1 = $this->getDataGenerator()->create_user([ 'username' => 'abcdef', 'email' => 'abcdef@example.com', ]); $formdata = [ 'username' => 'newuser', 'firstname' => 'First', 'lastname' => 'Last', 'password' => 'weak', 'email' => 'ABCDEF@example.com', ]; $errors = signup_validate_data($formdata, []); $this->assertStringContainsString('This email address is already registered.', $errors['email']); // Emails are accent-sensitive though so if we change a -> á in the u1's email, it should pass. // Please note that Moodle does not normally support such emails yet. We test the DB search sensitivity here. $formdata['email'] = 'ábcdef@example.com'; $errors = signup_validate_data($formdata, []); $this->assertArrayNotHasKey('email', $errors); // Check that users can share the same email if the site is configured so. $CFG->allowaccountssameemail = true; $formdata['email'] = 'abcdef@example.com'; $errors = signup_validate_data($formdata, []); $this->assertArrayNotHasKey('email', $errors); // Restore the original email address validator. moodle_phpmailer::$validator = $defaultvalidator; } }
Close