ILIAS  release_5-4 Revision v5.4.26-12-gabc799a52e6
ilRBACTest.php
Go to the documentation of this file.
1 <?php
2 /*
3  +-----------------------------------------------------------------------------+
4  | ILIAS open source |
5  +-----------------------------------------------------------------------------+
6  | Copyright (c) 1998-2006 ILIAS open source, University of Cologne |
7  | |
8  | This program is free software; you can redistribute it and/or |
9  | modify it under the terms of the GNU General Public License |
10  | as published by the Free Software Foundation; either version 2 |
11  | of the License, or (at your option) any later version. |
12  | |
13  | This program is distributed in the hope that it will be useful, |
14  | but WITHOUT ANY WARRANTY; without even the implied warranty of |
15  | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
16  | GNU General Public License for more details. |
17  | |
18  | You should have received a copy of the GNU General Public License |
19  | along with this program; if not, write to the Free Software |
20  | Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
21  +-----------------------------------------------------------------------------+
22 */
23 
35 {
36  protected $backupGlobals = false;
37 
38  protected function setUp()
39  {
40  include_once("./Services/PHPUnit/classes/class.ilUnitUtil.php");
41  ilUnitUtil::performInitialisation();
42  }
43 
50  public function testRbacFA()
51  {
52  global $DIC;
53 
54  $rbacreview = $DIC['rbacreview'];
55  $rbacadmin = $DIC['rbacadmin'];
56 
57  // Protected
58  #$rbacadmin->setProtected(1,4,'y');
59  #$prot = $rbacreview->isProtected(8,4);
60  #$this->assertEquals($prot,true);
61  #$rbacadmin->setProtected(1,4,'n');
62  #$prot = $rbacreview->isProtected(8,4);
63  #$this->assertEquals($prot,false);
64 
65  $rbacreview->getRoleListByObject(8);
66  $rbacreview->getAssignableRoles();
67 
68 
69  $ass = $rbacreview->isAssignable(4, 8);
70  $this->assertEquals($ass, true);
71 
72  $roles = $rbacreview->getRolesOfObject(8);
73 
74  $obj = $rbacreview->getObjectOfRole(4);
75  $this->assertEquals(8, $obj);
76  }
77 
82  public function testRbacUA()
83  {
84  global $DIC;
85 
86  $rbacreview = $DIC['rbacreview'];
87  $rbacadmin = $DIC['rbacadmin'];
88 
89  $obj = ilUtil::_getObjectsByOperations('crs', 'join');
90 
91  $rbacreview->assignedUsers(4);
92  $rbacreview->assignedRoles(6);
93  }
94 
101  public function testRbacTA()
102  {
103  global $DIC;
104 
105  $rbacreview = $DIC['rbacreview'];
106  $rbacadmin = $DIC['rbacadmin'];
107 
108  $sess_ops = $rbacreview->getOperationsOnTypeString('sess');
109 
110  $rbacadmin->assignOperationToObject($rbacreview->getTypeId('sess'), '7');
111  //$new_sess_ops = $rbacreview->getOperationsOnTypeString('sess');
112  //$this->assertEquals(array_merge($sess_ops,array(7)),$new_sess_ops);
113 
114  $rbacadmin->deassignOperationFromObject($rbacreview->getTypeId('sess'), '7');
115  $new_sess_ops = $rbacreview->getOperationsOnTypeString('sess');
116  $this->assertEquals($sess_ops, $new_sess_ops);
117  }
118 
123  public function testRbacPA()
124  {
125  global $DIC;
126 
127  $rbacreview = $DIC['rbacreview'];
128  $rbacadmin = $DIC['rbacadmin'];
129 
130  $sess_ops = $rbacreview->getOperationsOnTypeString('cat');
131 
132  $rbacadmin->revokePermission(1, 4);
133  $rbacadmin->grantPermission(4, array(2,3), 1);
134  }
135 
142  public function testConditions()
143  {
144  include_once './Services/Conditions/classes/class.ilConditionHandler.php';
145 
148 
150  $handler->setTargetRefId(99999);
151  $handler->setTargetObjId(99998);
152  $handler->setTargetType('xxx');
153  $handler->setTriggerRefId(99997);
154  $handler->setTriggerObjId(99996);
155  $handler->setTriggerType('yyy');
156  $handler->setReferenceHandlingType(0);
157  $handler->enableAutomaticValidation(false);
158  $suc = $handler->storeCondition();
159  $this->assertEquals($suc, true);
160 
161  $suc = $handler->checkExists();
162  $this->assertEquals($suc, false);
163 
164  $suc = $handler->delete(99999);
165  $this->assertEquals($suc, true);
166 
167  // syntax check
168  $handler->deleteByObjId(-1);
169  $handler->deleteCondition(-1);
173  }
174 
178  public function testCache()
179  {
180  include_once './Services/AccessControl/classes/class.ilAccessHandler.php';
181 
182  $handler = new ilAccessHandler();
183  $handler->setResults(array(1,2,3));
184  $handler->storeCache();
185  $handler->readCache();
186  $res = $handler->getResults();
187 
188  $this->assertEquals(array(1,2,3), $res);
189  }
190 
198  public function testAssignUser()
199  {
200  global $DIC;
201 
202  $rbacreview = $DIC['rbacreview'];
203  $rbacadmin = $DIC['rbacadmin'];
204  //assign User 15 to role 10
205  $rbacadmin->assignUser(10, 15);
206 
207  $this->assertTrue($rbacreview->isAssigned(15, 10));
208 
209  //Test double assign
210  $rbacadmin->assignUser(10, 15);
211  }
212 
221  public function testDeassignUser()
222  {
223  global $DIC;
224 
225  $rbacreview = $DIC['rbacreview'];
226  $rbacadmin = $DIC['rbacadmin'];
227  //deassign User 15 from role 10
228  $rbacadmin->deassignUser(10, 15);
229 
230  $this->assertFalse($rbacreview->isAssigned(15, 10));
231  }
232 
240  public function testGrantPermission()
241  {
242  global $DIC;
243 
244  $rbacreview = $DIC['rbacreview'];
245  $rbacadmin = $DIC['rbacadmin'];
246  //grant permissions 10,20 and 30 for role 10 on object 60
247  $rbacadmin->grantPermission(10, array(10,20,30), 60);
248 
249  $this->assertEquals($rbacreview->getActiveOperationsOfRole(60, 10), array(10,20,30));
250  }
251 
261  public function testRevokePermission()
262  {
263  global $DIC;
264 
265  $rbacreview = $DIC['rbacreview'];
266  $rbacadmin = $DIC['rbacadmin'];
267  $ilDB = $DIC['ilDB'];
268 
269  $req = $ilDB->query("SELECT ref.ref_id FROM object_reference AS ref LEFT JOIN object_data AS data ON data.obj_id = ref.obj_id WHERE data.type='seas';");
270 
271  $ref_id = 0;
272 
273  while ($row = $ilDB->fetchAssoc($req)) {
274  $ref_id = $row["ref_id"];
275  }
276 
277  $req = $ilDB->query("SELECT obj_id FROM object_data WHERE type='role';");
278  $ilDB->fetchAssoc($req);//First role is protected. Dont use it!
279  $role1 = $ilDB->fetchAssoc($req)["obj_id"];
280  $role2 = $ilDB->fetchAssoc($req)["obj_id"];
281  $role3 = $ilDB->fetchAssoc($req)["obj_id"];
282 
283  //save normal operations
284  $opt1 = $rbacreview->getActiveOperationsOfRole($ref_id, $role1);
285  $opt2 = $rbacreview->getActiveOperationsOfRole($ref_id, $role2);
286  $opt3 = $rbacreview->getActiveOperationsOfRole($ref_id, $role3);
287 
288  $rbacadmin->grantPermission($role1, array(1,2,3,4,5), $ref_id);
289  $rbacadmin->grantPermission($role2, array(1,2,3,4,5), $ref_id);
290  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role1), array(1,2,3,4,5));
291  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role2), array(1,2,3,4,5));
292  $rbacadmin->revokePermission($ref_id);
293  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role1));
294  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role2));
295 
296 
297  $rbacadmin->grantPermission($role1, array(1,2,3,4,5), $ref_id);
298  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role1), array(1,2,3,4,5));
299  $rbacadmin->revokePermission($ref_id, $role1);
300  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role1));
301 
302 
303  $rbacadmin->grantPermission($role2, array(1,2,3,4,5), $ref_id);
304  $rbacadmin->grantPermission($role3, array(1,2,3,4,5), $ref_id);
305  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role2), array(1,2,3,4,5));
306  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role3), array(1,2,3,4,5));
307  $rbacadmin->revokePermission($ref_id, 0, false);
308  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role2));
309  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role3));
310 
311  $rbacadmin->grantPermission($role3, array(1,2,3,4,5), $ref_id);
312  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($ref_id,$role3), array(1,2,3,4,5));
313  $rbacadmin->revokePermission($ref_id, $role3, false);
314  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($ref_id, $role3));
315 
316  //set normal operations
317  $rbacadmin->grantPermission($role1, $opt1, $ref_id);
318  $rbacadmin->grantPermission($role2, $opt2, $ref_id);
319  $rbacadmin->grantPermission($role3, $opt3, $ref_id);
320  }
321 
331  {
332  global $DIC;
333 
334  $rbacreview = $DIC['rbacreview'];
335  $rbacadmin = $DIC['rbacadmin'];
336  $tree = $DIC['tree'];
337  $ilDB = $DIC['ilDB'];
338  $req = $ilDB->query("SELECT ref.ref_id FROM object_reference AS ref LEFT JOIN object_data AS data ON data.obj_id = ref.obj_id WHERE data.type='adm';");
339 
340  $ref_id = 0;
341 
342  while ($row = $ilDB->fetchAssoc($req)) {
343  $ref_id = $row["ref_id"];
344  }
345 
346  $childs = $tree->getChildIds($ref_id);
347 
348  $req = $ilDB->query("SELECT obj_id FROM object_data WHERE type='role';");
349  $ilDB->fetchAssoc($req);//First role is protected. Dont use it!
350  $role = $ilDB->fetchAssoc($req)["obj_id"];
351 
352  $ops = array();
353 
354  foreach ($childs as $id) {
355  $ops[$id] = $rbacreview->getActiveOperationsOfRole($id, $role);//save normal operations
356  $rbacadmin->grantPermission($role, array(1,2,3,4,5), $id);
357  //$this->assertEquals($rbacreview->getActiveOperationsOfRole($id,$role), array(1,2,3,4,5));
358  }
359 
360  $rbacadmin->revokeSubtreePermissions($ref_id, $role);
361 
362  foreach ($childs as $id) {
363  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($id, $role));
364  $rbacadmin->grantPermission($role, $ops[$id], $id);//set normal operations
365  }
366  }
367 
376  public function testRevokePermissionList()
377  {
378  global $DIC;
379 
380  $rbacreview = $DIC['rbacreview'];
381  $rbacadmin = $DIC['rbacadmin'];
382  $list = array(1001, 1003, 1005, 1007);
383 
384  foreach ($list as $id) {
385  $rbacadmin->grantPermission(123, array(1,2,3,4,5), $id);
386  }
387 
388  $rbacadmin->revokePermissionList($list, 123);
389 
390  foreach ($list as $id) {
391  $this->assertEmpty($rbacreview->getActiveOperationsOfRole($id, 123));
392  }
393  }
394 
402  public function testSetRolePermission()
403  {
404  global $DIC;
405 
406  $rbacreview = $DIC['rbacreview'];
407  $rbacadmin = $DIC['rbacadmin'];
408  $rbacadmin->deleteTemplate(1010);
409 
410  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
411  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
412 
413  $assert = array("a" => array(10,11,13,15),"b" => array(20,22,23,25));
414  $dest = $rbacreview->getAllOperationsOfRole(1010, 1100);
415 
416  sort($dest["a"]);
417  sort($dest["b"]);
418 
419  $this->assertEquals($assert, $dest);
420 
421  $rbacadmin->deleteTemplate(1010);
422  }
423 
432  public function testDeleteRolePermission()
433  {
434  global $DIC;
435 
436  $rbacreview = $DIC['rbacreview'];
437  $rbacadmin = $DIC['rbacadmin'];
438  $rbacadmin->deleteTemplate(1010);
439 
440  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
441  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
442 
443  $rbacadmin->deleteRolePermission(1010, 1100);
444 
445  $this->assertEmpty($rbacreview->getAllOperationsOfRole(1010, 1100));
446 
447  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
448  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
449 
450  $rbacadmin->deleteRolePermission(1010, 1100, "a");
451 
452  $assert = array("b" => array(20,22,23,25));
453  $dest = $rbacreview->getAllOperationsOfRole(1010, 1100);
454 
455  sort($dest["b"]);
456 
457  $this->assertEquals($assert, $dest);
458 
459  $rbacadmin->deleteTemplate(1010);
460  }
461 
471  {
472  global $DIC;
473 
474  $rbacreview = $DIC['rbacreview'];
475  $rbacadmin = $DIC['rbacadmin'];
476  $rbacadmin->deleteTemplate(1010);
477  $rbacadmin->deleteTemplate(2020);
478 
479  $rbacadmin->setRolePermission(1010, "blub", array(10,11), 1100);
480  $rbacadmin->setRolePermission(2020, "bulb", array(20,22), 2200);
481 
482  $rbacadmin->copyRoleTemplatePermissions(1010, 1100, 2200, 2020);
483 
484  $one = $rbacreview->getAllOperationsOfRole(1010, 1100);
485  $two = $rbacreview->getAllOperationsOfRole(2020, 2200);
486  sort($one["blub"]);
487  sort($two["blub"]);
488  $this->assertEquals($one, $two);
489  $rbacadmin->deleteTemplate(1010);
490  $rbacadmin->deleteTemplate(2020);
491  }
492 
504  public function testCopyRolePermissions()
505  {
506  global $DIC;
507 
508  $rbacreview = $DIC['rbacreview'];
509  $rbacadmin = $DIC['rbacadmin'];
510  $ilDB = $DIC['ilDB'];
511 
512  $req = $ilDB->query("SELECT ref.ref_id FROM object_reference AS ref LEFT JOIN object_data AS data ON data.obj_id = ref.obj_id WHERE data.type='seas';");
513 
514  $seas = 0;
515 
516  while ($row = $ilDB->fetchAssoc($req)) {
517  $seas = $row["ref_id"];
518  }
519 
520  $req = $ilDB->query("SELECT ref.ref_id FROM object_reference AS ref LEFT JOIN object_data AS data ON data.obj_id = ref.obj_id WHERE data.type='mail';");
521 
522  $mail = 0;
523 
524  while ($row = $ilDB->fetchAssoc($req)) {
525  $mail = $row["ref_id"];
526  }
527 
528  $req = $ilDB->query("SELECT obj_id FROM object_data WHERE type='role';");
529  $ilDB->fetchAssoc($req);//First role is protected. Dont use it!
530  $role = $ilDB->fetchAssoc($req)["obj_id"];
531 
532  //save normal operations
533  $opt_mail = $rbacreview->getActiveOperationsOfRole($mail, $role);
534  $opt_seas = $rbacreview->getActiveOperationsOfRole($seas, $role);
535  $opt_temp_seas = $rbacreview->getAllOperationsOfRole($role, $seas);
536  $opt_temp_mail = $rbacreview->getAllOperationsOfRole($role, $mail);
537 
538  //set values
539  $rbacadmin->setRolePermission($role, "mail", array(1,2,3,4,5), $mail);
540  $rbacadmin->grantPermission($role, array(1,2,3,4,5), $mail);
541  $rbacadmin->setRolePermission($role, "seas", array(5,6,7,8,9), $seas);
542  $rbacadmin->grantPermission($role, array(5,6,7,8,9), $seas);
543 
544  $rbacadmin->copyRolePermissions($role, $seas, $mail, $role);
545  $this->assertEquals(
546  $rbacreview->getActiveOperationsOfRole($seas, $role),
547  $rbacreview->getActiveOperationsOfRole($mail, $role)
548  );
549 
550  //set normal operations
551  $rbacadmin->grantPermission($role, $opt_seas, $seas);
552  $rbacadmin->grantPermission($role, $opt_mail, $mail);
553 
554  $rbacadmin->deleteRolePermission($role, $mail);
555  $rbacadmin->deleteRolePermission($role, $seas);
556 
557  foreach ($opt_temp_seas as $type => $opt) {
558  $rbacadmin->setRolePermission($role, $type, $opt, $seas);
559  }
560 
561  foreach ($opt_temp_mail as $type => $opt) {
562  $rbacadmin->setRolePermission($role, $type, $opt, $mail);
563  }
564  }
565 
575  {
576  global $DIC;
577 
578  $rbacreview = $DIC['rbacreview'];
579  $rbacadmin = $DIC['rbacadmin'];
580  $rbacadmin->deleteTemplate(1010);
581  $rbacadmin->deleteTemplate(2020);
582  $rbacadmin->deleteTemplate(3030);
583 
584  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
585  $rbacadmin->setRolePermission(2020, "a", array(11,12,13,16), 2200);
586 
587  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
588  $rbacadmin->setRolePermission(2020, "b", array(20,23,24,26), 2200);
589 
590  $rbacadmin->setRolePermission(3030, "c", array(30,33), 3300);
591  $rbacadmin->setRolePermission(3030, "a", array(30,33), 3300);
592  $rbacadmin->setRolePermission(3030, "b", array(30,33), 3300);
593 
594  $rbacadmin->copyRolePermissionIntersection(1010, 1100, 2020, 2200, 3300, 3030);
595 
596  $intersect = array("a" => array(11,13), "b" => array(20,23));
597  $dest = $rbacreview->getAllOperationsOfRole(3030, 3300);
598 
599  //sort
600  sort($dest["a"]);
601  sort($dest["b"]);
602 
603  $this->assertEquals($intersect, $dest);
604 
605  $rbacadmin->deleteTemplate(1010);
606  $rbacadmin->deleteTemplate(2020);
607  $rbacadmin->deleteTemplate(3030);
608  }
609 
619  public function testCopyRolePermissionUnion()
620  {
621  global $DIC;
622 
623  $rbacreview = $DIC['rbacreview'];
624  $rbacadmin = $DIC['rbacadmin'];
625  $rbacadmin->deleteTemplate(1010);
626  $rbacadmin->deleteTemplate(2020);
627  $rbacadmin->deleteTemplate(3030);
628 
629  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
630  $rbacadmin->setRolePermission(2020, "a", array(11,12,13,16), 2200);
631 
632  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
633  $rbacadmin->setRolePermission(2020, "b", array(20,23,24,26), 2200);
634 
635  $rbacadmin->setRolePermission(1010, "c", array(30,33,34,35), 1100);
636 
637  $rbacadmin->copyRolePermissionUnion(1010, 1100, 2020, 2200, 3030, 3300);
638 
639  $union = array("a" => array(10,11,12,13,15,16), "b" => array(20,22,23,24,25,26), "c" => array(30,33,34,35));
640  $dest = $rbacreview->getAllOperationsOfRole(3030, 3300);
641 
642  sort($dest["a"]);
643  sort($dest["b"]);
644  sort($dest["c"]);
645 
646  $this->assertEquals($union, $dest);
647 
648  $rbacadmin->deleteTemplate(1010);
649  $rbacadmin->deleteTemplate(2020);
650  $rbacadmin->deleteTemplate(3030);
651  }
652 
662  {
663  global $DIC;
664 
665  $rbacreview = $DIC['rbacreview'];
666  $rbacadmin = $DIC['rbacadmin'];
667  $rbacadmin->deleteTemplate(1010);
668  $rbacadmin->deleteTemplate(2020);
669 
670  $rbacadmin->setRolePermission(1010, "a", array(10,11,13,15), 1100);
671  $rbacadmin->setRolePermission(2020, "a", array(11,12,13,16), 2200);
672 
673  $rbacadmin->setRolePermission(1010, "b", array(20,22,23,25), 1100);
674  $rbacadmin->setRolePermission(2020, "b", array(20,23,24,26), 2200);
675 
676  $rbacadmin->setRolePermission(2020, "c", array(30,33,34,35), 2200);
677 
678  $rbacadmin->copyRolePermissionSubtract(1010, 1100, 2020, 2200);
679 
680  $subtract = array("a" => array(12,16), "b" => array(24,26), "c" => array(30,33,34,35));
681  $dest = $rbacreview->getAllOperationsOfRole(2020, 2200);
682 
683  sort($dest["a"]);
684  sort($dest["b"]);
685  sort($dest["c"]);
686 
687  $this->assertEquals($subtract, $dest);
688 
689  $rbacadmin->deleteTemplate(1010);
690  $rbacadmin->deleteTemplate(2020);
691  }
692 
700  public function testAssignOperationToObject()
701  {
702  global $DIC;
703 
704  $rbacreview = $DIC['rbacreview'];
705  $rbacadmin = $DIC['rbacadmin'];
706 
707  $rbacadmin->assignOperationToObject(1001, 10);
708  $rbacadmin->assignOperationToObject(1001, 20);
709 
710  $this->assertEquals($rbacreview->getOperationsOnType(1001), array(10,20));
711  }
712 
720  {
721  global $DIC;
722 
723  $rbacreview = $DIC['rbacreview'];
724  $rbacadmin = $DIC['rbacadmin'];
725  $rbacadmin->deassignOperationFromObject(1001, 10);
726 
727  $this->assertEquals($rbacreview->getOperationsOnType(1001), array(20));
728 
729  $rbacadmin->deassignOperationFromObject(1001, 20);
730 
731  $this->assertEmpty($rbacreview->getOperationsOnType(1001));
732  }
733 }
testRbacPA()
test rbac_pa IL_Init
Definition: ilRBACTest.php:123
if(isset($_REQUEST['delete'])) $list
Definition: registry.php:41
static _getPersistedConditionsOfTrigger($a_trigger_obj_type, $a_trigger_id)
Get all persisted conditions of trigger object Note: This only gets persisted conditions NOT (dynamic...
testGrantPermission()
Test grant Permission Method DB: rbac_pa.
Definition: ilRBACTest.php:240
$type
testCopyRoleTemplatePermissions()
Test Copy Role Template Permission Method DB: rbac_template.
Definition: ilRBACTest.php:470
global $DIC
Definition: saml.php:7
testRevokePermission()
Test revoke Permission Method DB: rbac_pa.
Definition: ilRBACTest.php:261
static _getObjectsByOperations($a_obj_type, $a_operation, $a_usr_id=0, $limit=0)
Get all objects of a specific type and check access This function is not recursive, instead it parses the serialized rbac_pa entries.
testAssignUser()
Test Assign User Method DB: rbac_ua.
Definition: ilRBACTest.php:198
if(!array_key_exists('StateId', $_REQUEST)) $id
testSetRolePermission()
Test Set Role Permission Method DB: rbac_template.
Definition: ilRBACTest.php:402
testCopyRolePermissions()
Test Method DB: rbac_template DB: rbac_pa.
Definition: ilRBACTest.php:504
$req
Definition: getUserInfo.php:20
testRevokePermissionList()
Test revokePermissionList Method DB: rbac_pa.
Definition: ilRBACTest.php:376
testCache()
IL_Init
Definition: ilRBACTest.php:178
Interface ilAccessHandler.
testRbacUA()
test rbac_ua IL_Init
Definition: ilRBACTest.php:82
testAssignOperationToObject()
Test assignOperationToObject Method DB: rbac_ta.
Definition: ilRBACTest.php:700
Unit tests for tree table needsInstalledILIAS.
Definition: ilRBACTest.php:34
foreach($_POST as $key=> $value) $res
testConditions()
test preconditions IL_Init
Definition: ilRBACTest.php:142
testDeassignUser()
Test deassign user Method DB: rbac_ua.
Definition: ilRBACTest.php:221
static _getDistinctTargetRefIds()
Get all target ref ids.
static _deleteTargetConditionsByRefId($a_target_ref_id)
Delete conditions by target ref id Note: only conditions on the target type are deleted Conditions on...
$row
INTERNAL CLASS: Please do not use in consumer code.
testRbacTA()
rbac ta test IL_Init
Definition: ilRBACTest.php:101
testCopyRolePermissionUnion()
Test Copy Role Permission Union Method DB: rbac_template.
Definition: ilRBACTest.php:619
testRbacFA()
RBAC FA tests IL_Init.
Definition: ilRBACTest.php:50
global $ilDB
static _getPersistedConditionsOfTarget($a_target_ref_id, $a_target_obj_id, $a_target_type="")
get all persisted conditions of target object
testCopyRolePermissionIntersection()
Test Copy Role Permission Intersection Method DB: rbac_template.
Definition: ilRBACTest.php:574
testCopyRolePermissionSubtract()
Test Copy Role Permission Subtract Method DB: rbac_template.
Definition: ilRBACTest.php:661
$handler
testDeassignOperationFromObject()
Test deassignOperationFromObject Method ilRbacReview $rbacreview ilRbacAdmin $rbacadmin testAssign...
Definition: ilRBACTest.php:719
testRevokeSubtreePermissions()
Test revokeSubtreePermissions Method DB: rbac_pa.
Definition: ilRBACTest.php:330
testDeleteRolePermission()
Test Delete Role Permission Method DB: rbac_template.
Definition: ilRBACTest.php:432