code reduction; added unit-tests for Certificates-Command; minor fixes here and there
Signed-off-by: Michael Kaufmann (d00p) <d00p@froxlor.org>
This commit is contained in:
@@ -995,7 +995,7 @@ class FroxlorInstall
|
|||||||
$content .= $this->_status_message('green', $this->_lng['requirements']['installed']);
|
$content .= $this->_status_message('green', $this->_lng['requirements']['installed']);
|
||||||
}
|
}
|
||||||
|
|
||||||
// check for bstring-extension
|
// check for mbstring-extension
|
||||||
$content .= $this->_status_message('begin', $this->_lng['requirements']['phpmbstring']);
|
$content .= $this->_status_message('begin', $this->_lng['requirements']['phpmbstring']);
|
||||||
|
|
||||||
if (! extension_loaded('mbstring')) {
|
if (! extension_loaded('mbstring')) {
|
||||||
|
|||||||
@@ -414,6 +414,49 @@ abstract class ApiCommand
|
|||||||
return $json_response;
|
return $json_response;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* returns an array of customers the current user can access
|
||||||
|
*
|
||||||
|
* @param string $customer_hide_option optional, when called as customer, some options might be hidden due to the panel.customer_hide_options ettings
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
* @return array
|
||||||
|
*/
|
||||||
|
protected function getAllowedCustomerIds($customer_hide_option = '')
|
||||||
|
{
|
||||||
|
$customer_ids = array();
|
||||||
|
if ($this->isAdmin()) {
|
||||||
|
// if we're an admin, list all ftp-users of all the admins customers
|
||||||
|
// or optionally for one specific customer identified by id or loginname
|
||||||
|
$customerid = $this->getParam('customerid', true, 0);
|
||||||
|
$loginname = $this->getParam('loginname', true, '');
|
||||||
|
|
||||||
|
if (! empty($customerid) || ! empty($loginname)) {
|
||||||
|
$_result = $this->apiCall('Customers.get', array(
|
||||||
|
'id' => $customerid,
|
||||||
|
'loginname' => $loginname
|
||||||
|
));
|
||||||
|
$custom_list_result = array(
|
||||||
|
$_result
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
$_custom_list_result = $this->apiCall('Customers.listing');
|
||||||
|
$custom_list_result = $_custom_list_result['list'];
|
||||||
|
}
|
||||||
|
foreach ($custom_list_result as $customer) {
|
||||||
|
$customer_ids[] = $customer['customerid'];
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (!empty($customer_hide_option) && Settings::IsInList('panel.customer_hide_options', $customer_hide_option)) {
|
||||||
|
throw new Exception("You cannot access this resource", 405);
|
||||||
|
}
|
||||||
|
$customer_ids = array(
|
||||||
|
$this->getUserDetail('customerid')
|
||||||
|
);
|
||||||
|
}
|
||||||
|
return $customer_ids;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* increase/decrease a resource field for customers/admins
|
* increase/decrease a resource field for customers/admins
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -50,19 +50,28 @@ class Certificates extends ApiCommand implements ResourceEntity
|
|||||||
'id' => $domainid,
|
'id' => $domainid,
|
||||||
'domainname' => $domainname
|
'domainname' => $domainname
|
||||||
));
|
));
|
||||||
|
$domainid = $domain['id'];
|
||||||
|
|
||||||
// parameters
|
// parameters
|
||||||
$ssl_cert_file = $this->getParam('ssl_cert_file');
|
$ssl_cert_file = $this->getParam('ssl_cert_file');
|
||||||
$ssl_key_file = $this->getParam('ssl_key_file');
|
$ssl_key_file = $this->getParam('ssl_key_file');
|
||||||
$ssl_ca_file = $this->getParam('ssl_ca_file', true, '');
|
$ssl_ca_file = $this->getParam('ssl_ca_file', true, '');
|
||||||
$ssl_cert_chainfile = $this->getParam('ssl_cert_chainfile', true, '');
|
$ssl_cert_chainfile = $this->getParam('ssl_cert_chainfile', true, '');
|
||||||
|
|
||||||
|
// validate whether the domain does not already have an entry
|
||||||
|
$result = $this->apiCall('Certificates.get', array(
|
||||||
|
'id' => $domainid
|
||||||
|
));
|
||||||
|
if (empty($result)) {
|
||||||
$this->addOrUpdateCertificate($domain['id'], $ssl_cert_file, $ssl_key_file, $ssl_ca_file, $ssl_cert_chainfile, true);
|
$this->addOrUpdateCertificate($domain['id'], $ssl_cert_file, $ssl_key_file, $ssl_ca_file, $ssl_cert_chainfile, true);
|
||||||
$idna_convert = new idna_convert_wrapper();
|
|
||||||
$this->logger()->logAction($this->isAdmin() ? ADM_ACTION : USR_ACTION, LOG_INFO, "[API] added ssl-certificate for '" . $domain['domain'] . "'");
|
$this->logger()->logAction($this->isAdmin() ? ADM_ACTION : USR_ACTION, LOG_INFO, "[API] added ssl-certificate for '" . $domain['domain'] . "'");
|
||||||
$result = $this->apiCall('Certificates.get', array(
|
$result = $this->apiCall('Certificates.get', array(
|
||||||
'id' => $domain['id']
|
'id' => $domain['id']
|
||||||
));
|
));
|
||||||
return $this->response(200, "successfull", $result);
|
return $this->response(200, "successfull", $result);
|
||||||
}
|
}
|
||||||
|
throw new Exception("Domain '" . $domain['domain'] . "' already has a certificate. Did you mean to call update?", 406);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* return ssl-certificate entry for given domain by either id or domainname
|
* return ssl-certificate entry for given domain by either id or domainname
|
||||||
|
|||||||
@@ -448,43 +448,14 @@ class Ftps extends ApiCommand implements ResourceEntity
|
|||||||
*/
|
*/
|
||||||
public function listing()
|
public function listing()
|
||||||
{
|
{
|
||||||
if ($this->isAdmin()) {
|
$customer_ids = $this->getAllowedCustomerIds('ftp');
|
||||||
// if we're an admin, list all ftp-users of all the admins customers
|
|
||||||
// or optionally for one specific customer identified by id or loginname
|
|
||||||
$customerid = $this->getParam('customerid', true, 0);
|
|
||||||
$loginname = $this->getParam('loginname', true, '');
|
|
||||||
|
|
||||||
if (! empty($customerid) || ! empty($loginname)) {
|
|
||||||
$_result = $this->apiCall('Customers.get', array(
|
|
||||||
'id' => $customerid,
|
|
||||||
'loginname' => $loginname
|
|
||||||
));
|
|
||||||
$custom_list_result = array(
|
|
||||||
$_result
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
$_custom_list_result = $this->apiCall('Customers.listing');
|
|
||||||
$custom_list_result = $_custom_list_result['list'];
|
|
||||||
}
|
|
||||||
$customer_ids = array();
|
|
||||||
foreach ($custom_list_result as $customer) {
|
|
||||||
$customer_ids[] = $customer['customerid'];
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (Settings::IsInList('panel.customer_hide_options', 'ftp')) {
|
|
||||||
throw new Exception("You cannot access this resource", 405);
|
|
||||||
}
|
|
||||||
$customer_ids = array(
|
|
||||||
$this->getUserDetail('customerid')
|
|
||||||
);
|
|
||||||
}
|
|
||||||
$result = array();
|
$result = array();
|
||||||
$params['customerid'] = implode(", ", $customer_ids);
|
$params['customerid'] = implode(", ", $customer_ids);
|
||||||
$result_stmt = Database::prepare("
|
$result_stmt = Database::prepare("
|
||||||
SELECT * FROM `" . TABLE_FTP_USERS . "`
|
SELECT * FROM `" . TABLE_FTP_USERS . "`
|
||||||
WHERE `customerid` IN (:customerid)
|
WHERE `customerid` IN (:customerid)
|
||||||
");
|
");
|
||||||
Database::pexecute($result_stmt, $params);
|
Database::pexecute($result_stmt, $params, true, true);
|
||||||
while ($row = $result_stmt->fetch(PDO::FETCH_ASSOC)) {
|
while ($row = $result_stmt->fetch(PDO::FETCH_ASSOC)) {
|
||||||
$result[] = $row;
|
$result[] = $row;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -425,36 +425,7 @@ class Mysqls extends ApiCommand implements ResourceEntity
|
|||||||
{
|
{
|
||||||
$result = array();
|
$result = array();
|
||||||
$dbserver = $this->getParam('mysql_server', true, - 1);
|
$dbserver = $this->getParam('mysql_server', true, - 1);
|
||||||
if ($this->isAdmin()) {
|
$customer_ids = $this->getAllowedCustomerIds('mysql');
|
||||||
// if we're an admin, list all databases of all the admins customers
|
|
||||||
// or optionally for one specific customer identified by id or loginname
|
|
||||||
$customerid = $this->getParam('customerid', true, 0);
|
|
||||||
$loginname = $this->getParam('loginname', true, '');
|
|
||||||
|
|
||||||
if (! empty($customer_id) || ! empty($loginname)) {
|
|
||||||
$customer = $this->apiCall('Customers.get', array(
|
|
||||||
'id' => $customerid,
|
|
||||||
'loginname' => $loginname
|
|
||||||
));
|
|
||||||
$custom_list_result = array(
|
|
||||||
$customer
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
$_custom_list_result = $this->apiCall('Customers.listing');
|
|
||||||
$custom_list_result = $_custom_list_result['list'];
|
|
||||||
}
|
|
||||||
$customer_ids = array();
|
|
||||||
foreach ($custom_list_result as $customer) {
|
|
||||||
$customer_ids[] = $customer['customerid'];
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (Settings::IsInList('panel.customer_hide_options', 'mysql')) {
|
|
||||||
throw new Exception("You cannot access this resource", 405);
|
|
||||||
}
|
|
||||||
$customer_ids = array(
|
|
||||||
$this->getUserDetail('customerid')
|
|
||||||
);
|
|
||||||
}
|
|
||||||
$result_stmt = Database::prepare("
|
$result_stmt = Database::prepare("
|
||||||
SELECT * FROM `" . TABLE_PANEL_DATABASES . "`
|
SELECT * FROM `" . TABLE_PANEL_DATABASES . "`
|
||||||
WHERE `customerid`= :customerid AND `dbserver` = :dbserver
|
WHERE `customerid`= :customerid AND `dbserver` = :dbserver
|
||||||
|
|||||||
@@ -247,6 +247,7 @@ class SubDomains extends ApiCommand implements ResourceEntity
|
|||||||
$stmt = Database::prepare("
|
$stmt = Database::prepare("
|
||||||
INSERT INTO `" . TABLE_PANEL_DOMAINS . "` SET
|
INSERT INTO `" . TABLE_PANEL_DOMAINS . "` SET
|
||||||
`customerid` = :customerid,
|
`customerid` = :customerid,
|
||||||
|
`adminid` = :adminid,
|
||||||
`domain` = :domain,
|
`domain` = :domain,
|
||||||
`documentroot` = :documentroot,
|
`documentroot` = :documentroot,
|
||||||
`aliasdomain` = :aliasdomain,
|
`aliasdomain` = :aliasdomain,
|
||||||
@@ -268,6 +269,7 @@ class SubDomains extends ApiCommand implements ResourceEntity
|
|||||||
");
|
");
|
||||||
$params = array(
|
$params = array(
|
||||||
"customerid" => $customer['customerid'],
|
"customerid" => $customer['customerid'],
|
||||||
|
"adminid" => $customer['adminid'],
|
||||||
"domain" => $completedomain,
|
"domain" => $completedomain,
|
||||||
"documentroot" => $path,
|
"documentroot" => $path,
|
||||||
"aliasdomain" => $aliasdomain != 0 ? $aliasdomain : null,
|
"aliasdomain" => $aliasdomain != 0 ? $aliasdomain : null,
|
||||||
|
|||||||
@@ -14,6 +14,7 @@
|
|||||||
<directory>tests/IpsAndPorts</directory>
|
<directory>tests/IpsAndPorts</directory>
|
||||||
<directory>tests/Domains</directory>
|
<directory>tests/Domains</directory>
|
||||||
<directory>tests/SubDomains</directory>
|
<directory>tests/SubDomains</directory>
|
||||||
|
<directory>tests/Certificates</directory>
|
||||||
<directory>tests/Ftps</directory>
|
<directory>tests/Ftps</directory>
|
||||||
</testsuite>
|
</testsuite>
|
||||||
</testsuites>
|
</testsuites>
|
||||||
|
|||||||
194
tests/Certificates/CertificatesTest.php
Normal file
194
tests/Certificates/CertificatesTest.php
Normal file
@@ -0,0 +1,194 @@
|
|||||||
|
<?php
|
||||||
|
use PHPUnit\Framework\TestCase;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @covers ApiCommand
|
||||||
|
* @covers Certificates
|
||||||
|
*/
|
||||||
|
class CertificatesTest extends TestCase
|
||||||
|
{
|
||||||
|
|
||||||
|
public function testAdminCertificatesAdd()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
|
||||||
|
$certdata = $this->generateKey();
|
||||||
|
$json_result = Certificates::getLocal($admin_userdata, array(
|
||||||
|
'domainname' => 'test2.local',
|
||||||
|
'ssl_cert_file' => $certdata['cert'],
|
||||||
|
'ssl_key_file' => $certdata['key']
|
||||||
|
))->add();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(3, $result['domainid']);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testResellerCertificatesAddAgain()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
// get reseller
|
||||||
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'reseller'
|
||||||
|
))->get();
|
||||||
|
$reseller_userdata = json_decode($json_result, true)['data'];
|
||||||
|
$reseller_userdata['adminsession'] = 1;
|
||||||
|
|
||||||
|
$certdata = $this->generateKey();
|
||||||
|
$this->expectExceptionCode(406);
|
||||||
|
$this->expectExceptionMessage("Domain 'test2.local' already has a certificate. Did you mean to call update?");
|
||||||
|
$json_result = Certificates::getLocal($reseller_userdata, array(
|
||||||
|
'domainname' => 'test2.local',
|
||||||
|
'ssl_cert_file' => $certdata['cert'],
|
||||||
|
'ssl_key_file' => $certdata['key']
|
||||||
|
))->add();
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testCustomerCertificatesAdd()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
// get customer
|
||||||
|
$json_result = Customers::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'test1'
|
||||||
|
))->get();
|
||||||
|
$customer_userdata = json_decode($json_result, true)['data'];
|
||||||
|
|
||||||
|
$certdata = $this->generateKey();
|
||||||
|
$json_result = Certificates::getLocal($customer_userdata, array(
|
||||||
|
'domainname' => 'mysub2.test2.local',
|
||||||
|
'ssl_cert_file' => $certdata['cert'],
|
||||||
|
'ssl_key_file' => $certdata['key']
|
||||||
|
))->add();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(5, $result['domainid']);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testAdminCertificatesList()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
|
||||||
|
$json_result = Certificates::getLocal($admin_userdata)->listing();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(2, $result['count']);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testResellerCertificatesList()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
// get reseller
|
||||||
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'reseller'
|
||||||
|
))->get();
|
||||||
|
$reseller_userdata = json_decode($json_result, true)['data'];
|
||||||
|
$reseller_userdata['adminsession'] = 1;
|
||||||
|
|
||||||
|
$json_result = Certificates::getLocal($reseller_userdata)->listing();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(2, $result['count']);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testCustomerCertificatesList()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
|
||||||
|
// get customer
|
||||||
|
$json_result = Customers::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'test1'
|
||||||
|
))->get();
|
||||||
|
$customer_userdata = json_decode($json_result, true)['data'];
|
||||||
|
$json_result = Certificates::getLocal($customer_userdata)->listing();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(2, $result['count']);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testAdminCertificatesUpdate()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
|
||||||
|
$certdata = $this->generateKey();
|
||||||
|
$json_result = Certificates::getLocal($admin_userdata, array(
|
||||||
|
'domainname' => 'test2.local',
|
||||||
|
'ssl_cert_file' => $certdata['cert'],
|
||||||
|
'ssl_key_file' => $certdata['key']
|
||||||
|
))->update();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(3, $result['domainid']);
|
||||||
|
$this->assertEquals(str_replace("\n", "", $certdata['cert']), str_replace("\n", "", $result['ssl_cert_file']));
|
||||||
|
}
|
||||||
|
|
||||||
|
public function testCustomerCertificatesUpdate()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
// get customer
|
||||||
|
$json_result = Customers::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'test1'
|
||||||
|
))->get();
|
||||||
|
$customer_userdata = json_decode($json_result, true)['data'];
|
||||||
|
|
||||||
|
$certdata = $this->generateKey();
|
||||||
|
$json_result = Certificates::getLocal($customer_userdata, array(
|
||||||
|
'domainname' => 'mysub2.test2.local',
|
||||||
|
'ssl_cert_file' => $certdata['cert'],
|
||||||
|
'ssl_key_file' => $certdata['key']
|
||||||
|
))->update();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(5, $result['domainid']);
|
||||||
|
$this->assertEquals(str_replace("\n", "", $certdata['cert']), str_replace("\n", "", $result['ssl_cert_file']));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @depends testAdminCertificatesUpdate
|
||||||
|
*/
|
||||||
|
public function testCustomerCertificatesDelete()
|
||||||
|
{
|
||||||
|
global $admin_userdata;
|
||||||
|
|
||||||
|
// get customer
|
||||||
|
$json_result = Customers::getLocal($admin_userdata, array(
|
||||||
|
'loginname' => 'test1'
|
||||||
|
))->get();
|
||||||
|
$customer_userdata = json_decode($json_result, true)['data'];
|
||||||
|
$json_result = Certificates::getLocal($customer_userdata, array(
|
||||||
|
'id' => 1
|
||||||
|
))->delete();
|
||||||
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
$this->assertEquals(3, $result['domainid']);
|
||||||
|
}
|
||||||
|
|
||||||
|
private function generateKey()
|
||||||
|
{
|
||||||
|
$dn = array(
|
||||||
|
"countryName" => "DE",
|
||||||
|
"stateOrProvinceName" => "Hessen",
|
||||||
|
"localityName" => "Frankfurt",
|
||||||
|
"organizationName" => "Froxlor",
|
||||||
|
"organizationalUnitName" => "Testing",
|
||||||
|
"commonName" => "test2.local",
|
||||||
|
"emailAddress" => "team@froxlor.org"
|
||||||
|
);
|
||||||
|
|
||||||
|
// generate key pair
|
||||||
|
$privkey = openssl_pkey_new(array(
|
||||||
|
"private_key_bits" => 2048,
|
||||||
|
"private_key_type" => OPENSSL_KEYTYPE_RSA
|
||||||
|
));
|
||||||
|
|
||||||
|
// generate csr
|
||||||
|
$csr = openssl_csr_new($dn, $privkey, array(
|
||||||
|
'digest_alg' => 'sha256'
|
||||||
|
));
|
||||||
|
|
||||||
|
// generate self-signed certificate
|
||||||
|
$sscert = openssl_csr_sign($csr, null, $privkey, 365, array(
|
||||||
|
'digest_alg' => 'sha256'
|
||||||
|
));
|
||||||
|
|
||||||
|
// export
|
||||||
|
openssl_csr_export($csr, $csrout);
|
||||||
|
openssl_x509_export($sscert, $certout);
|
||||||
|
openssl_pkey_export($privkey, $pkeyout, null);
|
||||||
|
|
||||||
|
return array(
|
||||||
|
'cert' => $certout,
|
||||||
|
'key' => $pkeyout
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -77,10 +77,10 @@ class DomainsTest extends TestCase
|
|||||||
public function testResellerDomainsAddWithCanEditPhpSettingsAllowedIp()
|
public function testResellerDomainsAddWithCanEditPhpSettingsAllowedIp()
|
||||||
{
|
{
|
||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
// first, allow reseller access to ip #3
|
// first, allow reseller access to ip #4
|
||||||
Admins::getLocal($admin_userdata, array(
|
Admins::getLocal($admin_userdata, array(
|
||||||
'loginname' => 'reseller',
|
'loginname' => 'reseller',
|
||||||
'ipaddress' => 3
|
'ipaddress' => 4
|
||||||
))->update();
|
))->update();
|
||||||
// get reseller
|
// get reseller
|
||||||
$json_result = Admins::getLocal($admin_userdata, array(
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
@@ -91,7 +91,7 @@ class DomainsTest extends TestCase
|
|||||||
$data = [
|
$data = [
|
||||||
'domain' => 'test2.local',
|
'domain' => 'test2.local',
|
||||||
'customerid' => 1,
|
'customerid' => 1,
|
||||||
'ipandport' => 3,
|
'ipandport' => 4,
|
||||||
'isemaildomain' => 1,
|
'isemaildomain' => 1,
|
||||||
'subcanemaildomain' => 2
|
'subcanemaildomain' => 2
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
$json_result = IpsAndPorts::getLocal($admin_userdata)->listing();
|
$json_result = IpsAndPorts::getLocal($admin_userdata)->listing();
|
||||||
$result = json_decode($json_result, true)['data'];
|
$result = json_decode($json_result, true)['data'];
|
||||||
$this->assertEquals(1, $result['count']);
|
$this->assertEquals(2, $result['count']);
|
||||||
$this->assertEquals('82.149.225.46', $result['list'][0]['ip']);
|
$this->assertEquals('82.149.225.46', $result['list'][0]['ip']);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -40,7 +40,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
];
|
];
|
||||||
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->add();
|
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->add();
|
||||||
$result = json_decode($json_result, true)['data'];
|
$result = json_decode($json_result, true)['data'];
|
||||||
$this->assertEquals(2, $result['id']);
|
$this->assertEquals(3, $result['id']);
|
||||||
$this->assertEquals(80, $result['port']);
|
$this->assertEquals(80, $result['port']);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -66,7 +66,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
];
|
];
|
||||||
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->add();
|
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->add();
|
||||||
$result = json_decode($json_result, true)['data'];
|
$result = json_decode($json_result, true)['data'];
|
||||||
$this->assertEquals(3, $result['id']);
|
$this->assertEquals(4, $result['id']);
|
||||||
$this->assertEquals('/var/www/html/', $result['docroot']);
|
$this->assertEquals('/var/www/html/', $result['docroot']);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -84,10 +84,10 @@ class IpsAndPortsTest extends TestCase
|
|||||||
public function testResellerIpsAndPortsList()
|
public function testResellerIpsAndPortsList()
|
||||||
{
|
{
|
||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
// update reseller to allow ip access to ip id #2
|
// update reseller to allow ip access to ip id #3
|
||||||
$json_result = Admins::getLocal($admin_userdata, array(
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
'loginname' => 'reseller',
|
'loginname' => 'reseller',
|
||||||
'ipaddress' => array(2)
|
'ipaddress' => array(3)
|
||||||
))->update();
|
))->update();
|
||||||
$reseller_userdata = json_decode($json_result, true)['data'];
|
$reseller_userdata = json_decode($json_result, true)['data'];
|
||||||
$reseller_userdata['adminsession'] = 1;
|
$reseller_userdata['adminsession'] = 1;
|
||||||
@@ -109,7 +109,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
))->get();
|
))->get();
|
||||||
$reseller_userdata = json_decode($json_result, true)['data'];
|
$reseller_userdata = json_decode($json_result, true)['data'];
|
||||||
$reseller_userdata['adminsession'] = 1;
|
$reseller_userdata['adminsession'] = 1;
|
||||||
$json_result = IpsAndPorts::getLocal($reseller_userdata, array('id' => 2))->get();
|
$json_result = IpsAndPorts::getLocal($reseller_userdata, array('id' => 3))->get();
|
||||||
$result = json_decode($json_result, true)['data'];
|
$result = json_decode($json_result, true)['data'];
|
||||||
$this->assertEquals('82.149.225.47', $result['ip']);
|
$this->assertEquals('82.149.225.47', $result['ip']);
|
||||||
}
|
}
|
||||||
@@ -120,7 +120,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
public function testResellerIpsAndPortsGetRestrictedNotOwned()
|
public function testResellerIpsAndPortsGetRestrictedNotOwned()
|
||||||
{
|
{
|
||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
// update reseller to allow ip access to ip id #2
|
// get reseller
|
||||||
$json_result = Admins::getLocal($admin_userdata, array(
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
'loginname' => 'reseller'
|
'loginname' => 'reseller'
|
||||||
))->get();
|
))->get();
|
||||||
@@ -134,7 +134,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
public function testResellerIpsAndPortsAdd()
|
public function testResellerIpsAndPortsAdd()
|
||||||
{
|
{
|
||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
// update reseller to allow ip access to ip id #2
|
// get reseller
|
||||||
$json_result = Admins::getLocal($admin_userdata, array(
|
$json_result = Admins::getLocal($admin_userdata, array(
|
||||||
'loginname' => 'reseller'
|
'loginname' => 'reseller'
|
||||||
))->get();
|
))->get();
|
||||||
@@ -230,7 +230,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
$reseller_userdata = json_decode($json_result, true)['data'];
|
$reseller_userdata = json_decode($json_result, true)['data'];
|
||||||
$reseller_userdata['adminsession'] = 1;
|
$reseller_userdata['adminsession'] = 1;
|
||||||
$data = [
|
$data = [
|
||||||
'id' => 2,
|
'id' => 3,
|
||||||
'ip' => '82.149.225.46'
|
'ip' => '82.149.225.46'
|
||||||
];
|
];
|
||||||
$this->expectExceptionMessage("This IP/Port combination already exists.");
|
$this->expectExceptionMessage("This IP/Port combination already exists.");
|
||||||
@@ -251,7 +251,7 @@ class IpsAndPortsTest extends TestCase
|
|||||||
{
|
{
|
||||||
global $admin_userdata;
|
global $admin_userdata;
|
||||||
$data = [
|
$data = [
|
||||||
'id' => 2
|
'id' => 3
|
||||||
];
|
];
|
||||||
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->delete();
|
$json_result = IpsAndPorts::getLocal($admin_userdata, $data)->delete();
|
||||||
$result = json_decode($json_result, true)['data'];
|
$result = json_decode($json_result, true)['data'];
|
||||||
|
|||||||
@@ -103,6 +103,20 @@ Database::query("INSERT INTO `" . TABLE_PANEL_IPSANDPORTS . "` SET
|
|||||||
$defaultip = Database::lastInsertId();
|
$defaultip = Database::lastInsertId();
|
||||||
Settings::Set('system.defaultip', $defaultip, true);
|
Settings::Set('system.defaultip', $defaultip, true);
|
||||||
|
|
||||||
|
// add ssl ip (system default)
|
||||||
|
Database::query("INSERT INTO `" . TABLE_PANEL_IPSANDPORTS . "` SET
|
||||||
|
`ip` = '82.149.225.56',
|
||||||
|
`port` = '443',
|
||||||
|
`listen_statement` = '0',
|
||||||
|
`namevirtualhost_statement` = '0',
|
||||||
|
`vhostcontainer` = '1',
|
||||||
|
`vhostcontainer_servername_statement` = '1',
|
||||||
|
`specialsettings` = '',
|
||||||
|
`ssl` = '1'
|
||||||
|
");
|
||||||
|
$defaultip = Database::lastInsertId();
|
||||||
|
Settings::Set('system.defaultsslip', $defaultip, true);
|
||||||
|
|
||||||
// get userdata of admin 'admin'
|
// get userdata of admin 'admin'
|
||||||
$sel_stmt = Database::prepare("SELECT * FROM `" . TABLE_PANEL_ADMINS . "` WHERE `adminid` = '1'");
|
$sel_stmt = Database::prepare("SELECT * FROM `" . TABLE_PANEL_ADMINS . "` WHERE `adminid` = '1'");
|
||||||
$admin_userdata = Database::pexecute_first($sel_stmt);
|
$admin_userdata = Database::pexecute_first($sel_stmt);
|
||||||
|
|||||||
Reference in New Issue
Block a user