SessionTest SessionTest(
$methodName
)
|
|
Parameters:
void testAcquireNewPersistentSession(
)
|
|
void testAcquireNewPersistentSessionRetryOnCollision(
)
|
|
void testAcquireNewPersistentSessionWithGivenSessionId(
)
|
|
void testAuthTokenRoundtrip(
)
|
|
void testCompareIdentifiers(
)
|
|
void testEmptySessionData(
)
|
|
void testExpireSessions(
)
|
|
void testGetCreationAndModificationDate(
)
|
|
void testGetSerializedSession(
)
|
|
void testHasSiteAdminSessionExpired(
)
|
|
void testInitAndStartDoNotGenerateAuthToken(
)
|
|
void testInitEmptyEmptyRemoteId(
)
|
|
void testInitEmptySecure(
)
|
|
void testInitEmptyVerifyNoCookieIsSet(
)
|
|
void testInitEmptyWithUserId(
)
|
|
void testInitForExistingSession(
)
|
|
void testInitInvalidSessionId(
)
|
|
void testInitRemoteIdentifier(
)
|
|
Normally we initialize remoteIdentifer when a session is created and check it on each request for session hijack protection. However, in some cases (create new session for print services to access) we initialize with empty remoteIdentifier. In this case the first init() call should allow access and set the remoteIdentifier based on this request.
void testInitSwitchToSecure(
)
|
|
void testInitSwitchToUnsecure(
)
|
|
void testInitWithFixCookieVars(
)
|
|
void testIsCorrectAuthToken(
)
|
|
void testIsCorrectAuthTokenCanHandleNull(
)
|
|
void testIsCorrectAuthTokenForForgedAuthToken(
)
|
|
void testIsCorrectAuthTokenForSessionWithoutAuthToken(
)
|
|
void testIsPersistentSessionAllowedForRequest(
)
|
|
Check that we don't save sessions for core.DownloadItem, migrate.Redirect and CSS requests.
void testIsPersistentSessionAllowedForRequestCachesResult(
)
|
|
void testIsPersistentSessionRequired(
)
|
|
void testIsUsingCookies(
)
|
|
void testLoadedSessionData(
)
|
|
void testLoadSessionData(
)
|
|
void testLoadSessionDataExpiredSession(
)
|
|
User agents should not send back expired cookies (RFC 2965), but what if they do? Thus Gallery should not blindly load the session data for a given sessionId, but first check if the session already expired.
void testLoadSessionDataLoadMiss(
)
|
|
void testMisidentifiedSearchEngineSessionBecomesRegisteredUser(
)
|
|
void testNewSessionCollision(
)
|
|
void testRegenerateFromGuestToGuest(
)
|
|
void testRegenerateFromGuestToLoggedIn(
)
|
|
void testRegenerateSessionId(
)
|
|
void testReplaceSessionIdInDataDoReplaceSessionIdIfNecessaryOnNestedObject(
)
|
|
void testReplaceSessionIdInDataDoStringReplaceOnNestedArray(
)
|
|
void testReplaceTempSessionIdIfNecessaryDoNothing(
)
|
|
void testReplaceTempSessionIdIfNecessaryRemove(
)
|
|
void testReplaceTempSessionIdIfNecessaryRemovesTrailingQueryStringSeparator(
)
|
|
void testReplaceTempSessionIdIfNecessaryReplace(
)
|
|
void testResumeMisidentifiedSearchEngineSessionAsRegisteredUser(
)
|
|
void testSameSessionDifferentRemoteIdentifier(
)
|
|
void testSaveCallsExpireSessions(
)
|
|
void testSaveDoNotSaveIfSessionIdEmpty(
)
|
|
void testSaveNewSession(
)
|
|
void testSaveResaveExistingSessionDataChanged(
)
|
|
void testSaveResaveExistingSessionNoDataChangedDoNotTouch(
)
|
|
void testSaveResaveExistingSessionNoDataChangedTouch(
)
|
|
void testSaveReturnsErrorOnMissingUserId(
)
|
|
void testSaveSessionShouldNotSave(
)
|
|
Test if save() actually doesn't save if the current request is in the exclude list.
void testSearchEngineCrawlerSessions(
)
|
|
void testSearchEngineCrawlerSessionsAsExplicitGuestUser(
)
|
|
void testSessionCookieDomain(
)
|
|
void testSessionCookieHeaderAndPersistence(
)
|
|
void testSessionIdInUrlOverridesCookie(
)
|
|
void testSessionInitializesIsUsingCookies(
)
|
|
void testSessionKeyAndTempSessionHaveNoSpecialCharacters(
)
|
|
Our replaceTempSessionIdIfNecessary() code and the page caching assume that the session key and the temp session string have no characters that change when HTML or URL encoded.
void testSessionSaveLoad(
)
|
|
void testSetCookieDeleteCookie(
)
|
|
void testSetCookieNoExpirationDate(
)
|
|
void testSetCookieSecure(
)
|
|
void _markSessionForCleanup(
$session
)
|
|
Parameters: