}
}
+ /**
+ * Unit tests to check the operation of locked contexts.
+ *
+ * Note: We only check the admin user here.
+ * If the admin cannot do it, then no-one can.
+ *
+ * @dataProvider locked_context_provider
+ * @param string[] $lockedcontexts The list of contexts, by name, to mark as locked
+ * @param string[] $blocked The list of contexts which will be 'blocked' by has_capability
+ */
+ public function test_locked_contexts_for_admin_with_config($lockedcontexts, $blocked) {
+ global $DB;
+
+ $this->resetAfterTest();
+ set_config('contextlocking', 1);
+ set_config('contextlockappliestoadmin', 0);
+
+ $generator = $this->getDataGenerator();
+ $otheruser = $generator->create_user();
+
+ // / (system)
+ // /Cat1
+ // /Cat1/Block
+ // /Cat1/Course1
+ // /Cat1/Course1/Block
+ // /Cat1/Course2
+ // /Cat1/Course2/Block
+ // /Cat1/Cat1a
+ // /Cat1/Cat1a/Block
+ // /Cat1/Cat1a/Course1
+ // /Cat1/Cat1a/Course1/Block
+ // /Cat1/Cat1a/Course2
+ // /Cat1/Cat1a/Course2/Block
+ // /Cat1/Cat1b
+ // /Cat1/Cat1b/Block
+ // /Cat1/Cat1b/Course1
+ // /Cat1/Cat1b/Course1/Block
+ // /Cat1/Cat1b/Course2
+ // /Cat1/Cat1b/Course2/Block
+ // /Cat2
+ // /Cat2/Block
+ // /Cat2/Course1
+ // /Cat2/Course1/Block
+ // /Cat2/Course2
+ // /Cat2/Course2/Block
+ // /Cat2/Cat2a
+ // /Cat2/Cat2a/Block
+ // /Cat2/Cat2a/Course1
+ // /Cat2/Cat2a/Course1/Block
+ // /Cat2/Cat2a/Course2
+ // /Cat2/Cat2a/Course2/Block
+ // /Cat2/Cat2b
+ // /Cat2/Cat2b/Block
+ // /Cat2/Cat2b/Course1
+ // /Cat2/Cat2b/Course1/Block
+ // /Cat2/Cat2b/Course2
+ // /Cat2/Cat2b/Course2/Block
+
+ $adminuser = \core_user::get_user_by_username('admin');
+ $contexts = (object) [
+ 'system' => \context_system::instance(),
+ 'adminuser' => \context_user::instance($adminuser->id),
+ ];
+
+ $cat1 = $generator->create_category();
+ $cat1a = $generator->create_category(['parent' => $cat1->id]);
+ $cat1b = $generator->create_category(['parent' => $cat1->id]);
+
+ $contexts->cat1 = \context_coursecat::instance($cat1->id);
+ $contexts->cat1a = \context_coursecat::instance($cat1a->id);
+ $contexts->cat1b = \context_coursecat::instance($cat1b->id);
+
+ $cat1course1 = $generator->create_course(['category' => $cat1->id]);
+ $cat1course2 = $generator->create_course(['category' => $cat1->id]);
+ $cat1acourse1 = $generator->create_course(['category' => $cat1a->id]);
+ $cat1acourse2 = $generator->create_course(['category' => $cat1a->id]);
+ $cat1bcourse1 = $generator->create_course(['category' => $cat1b->id]);
+ $cat1bcourse2 = $generator->create_course(['category' => $cat1b->id]);
+
+ $contexts->cat1course1 = \context_course::instance($cat1course1->id);
+ $contexts->cat1acourse1 = \context_course::instance($cat1acourse1->id);
+ $contexts->cat1bcourse1 = \context_course::instance($cat1bcourse1->id);
+ $contexts->cat1course2 = \context_course::instance($cat1course2->id);
+ $contexts->cat1acourse2 = \context_course::instance($cat1acourse2->id);
+ $contexts->cat1bcourse2 = \context_course::instance($cat1bcourse2->id);
+
+ $cat1block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1->id]);
+ $cat1ablock = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1a->id]);
+ $cat1bblock = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1b->id]);
+ $cat1course1block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1course1->id]);
+ $cat1course2block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1course2->id]);
+ $cat1acourse1block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1acourse1->id]);
+ $cat1acourse2block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1acourse2->id]);
+ $cat1bcourse1block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1bcourse1->id]);
+ $cat1bcourse2block = $generator->create_block('online_users', ['parentcontextid' => $contexts->cat1bcourse2->id]);
+
+ $contexts->cat1block = \context_block::instance($cat1block->id);
+ $contexts->cat1ablock = \context_block::instance($cat1ablock->id);
+ $contexts->cat1bblock = \context_block::instance($cat1bblock->id);
+ $contexts->cat1course1block = \context_block::instance($cat1course1block->id);
+ $contexts->cat1course2block = \context_block::instance($cat1course2block->id);
+ $contexts->cat1acourse1block = \context_block::instance($cat1acourse1block->id);
+ $contexts->cat1acourse2block = \context_block::instance($cat1acourse2block->id);
+ $contexts->cat1bcourse1block = \context_block::instance($cat1bcourse1block->id);
+ $contexts->cat1bcourse2block = \context_block::instance($cat1bcourse2block->id);
+
+ $writecapability = 'moodle/block:edit';
+ $readcapability = 'moodle/block:view';
+ $managecapability = 'moodle/site:managecontextlocks';
+
+ $this->setAdminUser();
+ $totest = (array) $contexts;
+ foreach ($totest as $context) {
+ $this->assertTrue(has_capability($writecapability, $context));
+ $this->assertTrue(has_capability($readcapability, $context));
+ $this->assertTrue(has_capability($managecapability, $context));
+ }
+
+ // Lock the specified contexts.
+ foreach ($lockedcontexts as $contextname => $value) {
+ $contexts->$contextname->set_locked($value);
+ }
+
+ // All read capabilities should remain.
+ foreach ((array) $contexts as $context) {
+ $this->assertTrue(has_capability($readcapability, $context));
+ $this->assertTrue(has_capability($managecapability, $context));
+ }
+
+ // Check writes.
+ foreach ((array) $contexts as $contextname => $context) {
+ $this->assertTrue(has_capability($writecapability, $context));
+ }
+
+ $this->setUser($otheruser);
+ // Check writes.
+ foreach ((array) $contexts as $contextname => $context) {
+ $this->assertFalse(has_capability($writecapability, $context));
+ }
+
+ // Disable the contextlocking experimental feature.
+ set_config('contextlocking', 0);
+
+ $this->setAdminUser();
+ // All read capabilities should remain.
+ foreach ((array) $contexts as $context) {
+ $this->assertTrue(has_capability($readcapability, $context));
+ $this->assertTrue(has_capability($managecapability, $context));
+ }
+
+ // All write capabilities should now be present again.
+ foreach ((array) $contexts as $contextname => $context) {
+ $this->assertTrue(has_capability($writecapability, $context));
+ }
+
+ $this->setUser($otheruser);
+ // Check writes.
+ foreach ((array) $contexts as $contextname => $context) {
+ $this->assertFalse(has_capability($writecapability, $context));
+ }
+ }
+
/**
* Data provider for testing that has_capability() deals with locked contexts.
*