Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:124791 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id D408A1A00B7 for ; Tue, 6 Aug 2024 06:09:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1722924677; bh=e44iu4ByiWyrgNKusygMrDg/CcL7ZrH/uLZOfqce9wQ=; h=Subject:From:To:Date:From; b=OJGTYzvLa4HJ0bCeboqAJU232MChnTsRrGXrnrf6ZDNPxgvM7c5zbBSAoE4dlIqFf h8lvw9LyZBBbBRI/p6bmCZOTsZtyOlmFGKghoQMdloVy8zZJmYTggAsy1xAwSRIqJ9 hb1NpBpacXGkWweWV7bBTntc/srSljGWfnea1bb58r30a4U2aj3ND0X001qMY20kTq cEuVhOeAVUw9ubllmyy/vEtf49iSdNcJBk5uVhPR1oRfq7bO95UavZbavheoIkp6Hl eRCoHOH+f6p9GhqqNJ6pEep3uOkexW5aBbD6KmZf7MtFdDTcDbDy6ZTPMqMihibLKY PML58Xrts9aFQ== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 7378218003E for ; Tue, 6 Aug 2024 06:11:17 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_PASS, SPF_PASS autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from ageofdream.com (ageofdream.com [45.33.21.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Tue, 6 Aug 2024 06:11:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ageofdream.com; s=ageofdream; t=1722924574; bh=e44iu4ByiWyrgNKusygMrDg/CcL7ZrH/uLZOfqce9wQ=; h=Subject:From:To:Date:From; b=N9wezJoeh6Px535k3eDRPx64vNk3rRE9kuu9hG6bQcQI5TDDMWMw2UgA4tVWsQliq mH1tyaWqVBDx31w7OXkuK2EPrC1SX9TV0H2HpK0PMYGiFNbEr4bodpciysS4PGAc93 +g2ErC52BpJs1pQNhuGWsZBJVVsXEX+n9GdBrge5ysUHEqssOX1CtL2yY8a/fvEdk2 3Vzr0/RNiqj2fOjaeXBdIpBzNkq9yyKAqf6N0eCDLt0R8mXhIIkEPFxGcFCb4w9EwL Xbl3QlLbLLxs7G3WY9v4Yca2tFs/GGze29HN7m2VIjN6SAfyvDaFsrVsTpzCNpQK0T Pn4dn1l7IZjsQ== Received: from [192.168.1.7] (unknown [72.255.193.122]) by ageofdream.com (Postfix) with ESMTPSA id D702125090 for ; Tue, 6 Aug 2024 02:09:34 -0400 (EDT) Message-ID: Subject: [PHP-DEV] [Discussion] Sandbox API To: PHP internals Date: Tue, 06 Aug 2024 02:09:34 -0400 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.4-2 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net x-ms-reactions: disallow MIME-Version: 1.0 From: lists@ageofdream.com (Nick Lockheart) Sand Box: A first class API that allows unit testing of code with mocks and stubs of other classes or functions, without the need to modify the class under test. This is an initial idea of how a Sand Box API could work: $oSandbox =3D new SPLSandBox(); $oSandbox->MockFunction('\mocks\fopen','\fopen'); $oSandbox->MockFunction('\mocks\fread','\fread'); $oSandbox->MockFunction('\mocks\fwrite','\fwrite'); $oSandbox->MockFunction('\mocks\fclose','\fclose'); $oFileManager =3D $oSandbox->GetInstance('MyFileManager'); $oFileManager->WriteFile('/path/to/file.txt'); Let's break down what's happening: The call to `new SPLSandBox();` creates a sandbox instance. When we then call `$oSandbox->MockFunction()`, we specify the name of a function that's generally available to the PHP application, and also specify the name of that function as it should appear to code running inside the sandbox. In this case, we have told the sandbox that any call to \fopen, \fread, \fwrite, or \fclose by sandboxed code should be remapped to \mocks\fopen, \mocks\fread, \mocks\fwrite, and \mocks\fclose. The code in the sandbox is completely unaware of this and remains unchanged. The line: $oFileManager =3D $oSandbox->GetInstance('MyFileManager'); Creates a **sandboxed** instance of the MyFileManager class. $oFileManager is exactly the same as it normally is, but any calls it makes to a function will use the Mock function instead, if defined by `MockFunction()`, or will simply fail if no mock has been loaded into the sandbox. We then tell the sandboxed instance of the MyFileManager class to write out a file. The `MyFileManager::WriteFile()` method calls to `\fopen`, `\fwrite`, and `\fclose`. But, unknown to MyFileManager, the sandbox has remapped those calls to the mock functions we specified instead. If you know how a chroot jail works on Linux, this will seem very familiar. Pass in all the dependencies the class under test needs, remapped to stubs, then get a sandboxed instance of the class to test with.