X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=tests%2Fsrc%2FConsole%2FServerBlockConsoleTest.php;h=202714fb1f020c4dbfb0b9df3b91ca4dd628e462;hb=7dadc7f6dc0b1e68bfa5937b3a3fa3fd9cdcacd1;hp=ef6cc0dacb8f44c3eec9c0b34e331588b270bbb6;hpb=c1dbb256561ecdb19fe0541628b1ec0f06d95dfa;p=friendica.git diff --git a/tests/src/Console/ServerBlockConsoleTest.php b/tests/src/Console/ServerBlockConsoleTest.php index ef6cc0dacb..202714fb1f 100644 --- a/tests/src/Console/ServerBlockConsoleTest.php +++ b/tests/src/Console/ServerBlockConsoleTest.php @@ -1,9 +1,29 @@ . + * + */ namespace Friendica\Test\src\Console; use Friendica\Console\ServerBlock; -use Friendica\Core\Config\IConfiguration; +use Friendica\Core\Config\Capability\IManageConfigValues; +use Mockery; class ServerBlockConsoleTest extends ConsoleTest { @@ -17,12 +37,16 @@ class ServerBlockConsoleTest extends ConsoleTest 'reason' => 'Illegal content', ] ]; + /** + * @var IManageConfigValues|Mockery\LegacyMockInterface|Mockery\MockInterface + */ + private $configMock; - protected function setUp() + protected function setUp() : void { parent::setUp(); - $this->configMock = \Mockery::mock(IConfiguration::class); + $this->configMock = Mockery::mock(IManageConfigValues::class); } /** @@ -50,7 +74,7 @@ class ServerBlockConsoleTest extends ConsoleTest CONS; - $this->assertEquals($output, $txt); + self::assertEquals($output, $txt); } /** @@ -82,7 +106,7 @@ CONS; $console->setArgument(2, 'I like it!'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'I like it!\')' . PHP_EOL, $txt); + self::assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'I like it!\')' . PHP_EOL, $txt); } /** @@ -113,7 +137,7 @@ CONS; $console->setArgument(1, 'testme.now'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'' . ServerBlock::DEFAULT_REASON . '\')' . PHP_EOL, $txt); + self::assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'' . ServerBlock::DEFAULT_REASON . '\')' . PHP_EOL, $txt); } /** @@ -150,7 +174,7 @@ CONS; $console->setArgument(2, 'Other reason'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . PHP_EOL, $txt); + self::assertEquals('The domain \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . PHP_EOL, $txt); } /** @@ -182,7 +206,7 @@ CONS; $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is not more blocked' . PHP_EOL, $txt); + self::assertEquals('The domain \'pod.ordoevangelistarum.com\' is not more blocked' . PHP_EOL, $txt); } /** @@ -194,7 +218,7 @@ CONS; $console->setArgument(0, 'wrongcommand'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Unknown command', $txt); + self::assertStringStartsWith('[Warning] Unknown command', $txt); } /** @@ -213,7 +237,7 @@ CONS; $console->setArgument(1, 'not.exiting'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'not.exiting\' is not blocked.' . PHP_EOL, $txt); + self::assertEquals('The domain \'not.exiting\' is not blocked.' . PHP_EOL, $txt); } /** @@ -225,7 +249,7 @@ CONS; $console->setArgument(0, 'add'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Add needs a domain and optional a reason.', $txt); + self::assertStringStartsWith('[Warning] Add needs a domain and optional a reason.', $txt); } /** @@ -256,7 +280,7 @@ CONS; $console->setArgument(1, 'testme.now'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t save \'testme.now\' as blocked server' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t save \'testme.now\' as blocked server' . PHP_EOL, $txt); } /** @@ -288,7 +312,7 @@ CONS; $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked servers' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked servers' . PHP_EOL, $txt); } /** @@ -300,7 +324,7 @@ CONS; $console->setArgument(0, 'remove'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); + self::assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); } /** @@ -315,14 +339,18 @@ CONS; $help = << [-h|--help|-?] [-v] - bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock [-h|--help|-?] [-v] + bin/console serverblock add [-h|--help|-?] [-v] + bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock export + bin/console serverblock import Description - With this tool, you can list the current blocked server domain patterns + With this tool, you can list the current blocked server domain patterns or you can add / remove a blocked server domain pattern from the list. - + Using the export and import options you can share your server blocklist + with other node admins by CSV files. + Patterns are case-insensitive shell wildcard comprising the following special characters: - * : Any number of characters - ? : Any single character @@ -334,6 +362,6 @@ Options HELP; - $this->assertEquals($help, $txt); + self::assertEquals($help, $txt); } }