You are here

class DateFormatAccessControlHandlerTest in Drupal 10

Same name and namespace in other branches
  1. 8 core/modules/system/tests/src/Kernel/DateFormatAccessControlHandlerTest.php \Drupal\Tests\system\Kernel\DateFormatAccessControlHandlerTest
  2. 9 core/modules/system/tests/src/Kernel/DateFormatAccessControlHandlerTest.php \Drupal\Tests\system\Kernel\DateFormatAccessControlHandlerTest

@coversDefaultClass \Drupal\system\DateFormatAccessControlHandler @group system

Hierarchy

Expanded class hierarchy of DateFormatAccessControlHandlerTest

File

core/modules/system/tests/src/Kernel/DateFormatAccessControlHandlerTest.php, line 16

Namespace

Drupal\Tests\system\Kernel
View source
class DateFormatAccessControlHandlerTest extends KernelTestBase {
  use UserCreationTrait {
    createUser as drupalCreateUser;
  }

  /**
   * Modules to enable.
   *
   * @var array
   */
  protected static $modules = [
    'system',
    'user',
  ];

  /**
   * The date_format access control handler.
   *
   * @var \Drupal\Core\Entity\EntityAccessControlHandlerInterface
   */
  protected $accessControlHandler;

  /**
   * {@inheritdoc}
   */
  protected function setUp() : void {
    parent::setUp();
    $this
      ->installEntitySchema('date_format');
    $this
      ->installEntitySchema('user');
    $this
      ->installSchema('system', 'sequences');
    $this->accessControlHandler = $this->container
      ->get('entity_type.manager')
      ->getAccessControlHandler('date_format');
  }

  /**
   * @covers ::checkAccess
   * @covers ::checkCreateAccess
   * @dataProvider testAccessProvider
   */
  public function testAccess($which_user, $which_entity, $view_label_access_result, $view_access_result, $update_access_result, $delete_access_result, $create_access_result) {

    // We must always create user 1, so that a "normal" user has an ID >1.
    $root_user = $this
      ->drupalCreateUser();
    if ($which_user === 'user1') {
      $user = $root_user;
    }
    else {
      $permissions = $which_user === 'admin' ? [
        'administer site configuration',
      ] : [];
      $user = $this
        ->drupalCreateUser($permissions);
    }
    $entity_values = $which_entity === 'unlocked' ? [
      'locked' => FALSE,
    ] : [
      'locked' => TRUE,
    ];
    $entity_values['id'] = $this
      ->randomMachineName();
    $entity = DateFormat::create($entity_values);
    $entity
      ->save();
    static::assertEquals($view_label_access_result, $this->accessControlHandler
      ->access($entity, 'view label', $user, TRUE));
    static::assertEquals($view_access_result, $this->accessControlHandler
      ->access($entity, 'view', $user, TRUE));
    static::assertEquals($update_access_result, $this->accessControlHandler
      ->access($entity, 'update', $user, TRUE));
    static::assertEquals($delete_access_result, $this->accessControlHandler
      ->access($entity, 'delete', $user, TRUE));
    static::assertEquals($create_access_result, $this->accessControlHandler
      ->createAccess(NULL, $user, [], TRUE));
  }
  public function testAccessProvider() {
    $c = new ContainerBuilder();
    $cache_contexts_manager = $this
      ->prophesize(CacheContextsManager::class);
    $cache_contexts_manager
      ->assertValidTokens()
      ->willReturn(TRUE);
    $cache_contexts_manager
      ->reveal();
    $c
      ->set('cache_contexts_manager', $cache_contexts_manager);
    \Drupal::setContainer($c);
    return [
      'permissionless + unlocked' => [
        'permissionless',
        'unlocked',
        AccessResult::allowed(),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required."),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required.")
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required.")
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required."),
      ],
      'permissionless + locked' => [
        'permissionless',
        'locked',
        AccessResult::allowed(),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required."),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::neutral()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->setReason("The 'administer site configuration' permission is required."),
      ],
      'admin + unlocked' => [
        'admin',
        'unlocked',
        AccessResult::allowed(),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
      ],
      'admin + locked' => [
        'admin',
        'locked',
        AccessResult::allowed(),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
      ],
      'user1 + unlocked' => [
        'user1',
        'unlocked',
        AccessResult::allowed(),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ])
          ->addCacheTags([
          'rendered',
        ]),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
      ],
      'user1 + locked' => [
        'user1',
        'locked',
        AccessResult::allowed(),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::forbidden()
          ->addCacheTags([
          'rendered',
        ])
          ->setReason("The DateFormat config entity is locked."),
        AccessResult::allowed()
          ->addCacheContexts([
          'user.permissions',
        ]),
      ],
    ];
  }

}

Members