You are here

class EntityAccessComplexTest in Group 8

Same name and namespace in other branches
  1. 2.0.x tests/src/Kernel/EntityAccessComplexTest.php \Drupal\Tests\group\Kernel\EntityAccessComplexTest

Tests that Group properly checks access for "complex" grouped entities.

By complex entities we mean entities that can be published or unpublished and have a way of determining who owns the entity.

@group group

Hierarchy

Expanded class hierarchy of EntityAccessComplexTest

File

tests/src/Kernel/EntityAccessComplexTest.php, line 15

Namespace

Drupal\Tests\group\Kernel
View source
class EntityAccessComplexTest extends GroupKernelTestBase {

  /**
   * {@inheritdoc}
   */
  public static $modules = [
    'group_test_plugin',
    'node',
  ];

  /**
   * The node storage to use in testing.
   *
   * @var \Drupal\Core\Entity\ContentEntityStorageInterface
   */
  protected $storage;

  /**
   * The access control handler to use in testing.
   *
   * @var \Drupal\Core\Entity\EntityAccessControlHandlerInterface
   */
  protected $accessControlHandler;

  /**
   * The first group type to use in testing.
   *
   * @var \Drupal\group\Entity\GroupTypeInterface
   */
  protected $groupTypeA;

  /**
   * The second group type to use in testing.
   *
   * @var \Drupal\group\Entity\GroupTypeInterface
   */
  protected $groupTypeB;

  /**
   * The required permissions for our node checks.
   *
   * @var string[]
   */
  protected $permissions = [
    'access content',
    'view own unpublished content',
    'edit own page content',
    'edit any page content',
    'delete any page content',
    'delete any page content',
  ];

  /**
   * {@inheritdoc}
   */
  protected function setUp() {
    parent::setUp();
    $this
      ->installConfig([
      'user',
      'group_test_plugin',
    ]);
    $this
      ->installSchema('node', [
      'node_access',
    ]);
    $this
      ->installEntitySchema('node');
    $this->storage = $this->entityTypeManager
      ->getStorage('node');
    $this->accessControlHandler = $this->entityTypeManager
      ->getAccessControlHandler('node');
    $this
      ->createNodeType([
      'type' => 'page',
    ]);
    $this
      ->createNodeType([
      'type' => 'article',
    ]);
    $this->groupTypeA = $this
      ->createGroupType([
      'id' => 'foo',
      'creator_membership' => FALSE,
    ]);
    $this->groupTypeB = $this
      ->createGroupType([
      'id' => 'bar',
      'creator_membership' => FALSE,
    ]);

    /** @var \Drupal\group\Entity\Storage\GroupContentTypeStorageInterface $storage */
    $storage = $this->entityTypeManager
      ->getStorage('group_content_type');
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeA, 'node_as_content:page'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeA, 'node_as_content:article'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeB, 'node_as_content:page'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeB, 'node_as_content:article'));
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
  }

  /**
   * Tests that regular access checks work.
   */
  public function testRegularAccess() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Regular view access works.');
  }

  /**
   * Tests that grouped nodes are properly hidden.
   */
  public function testMemberGroupAccessWithoutPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $group
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Cannot view the grouped node.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Only the ungrouped node shows up.');
  }

  /**
   * Tests that grouped nodes are properly hidden.
   */
  public function testNonMemberGroupAccessWithoutPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Cannot view the grouped node.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Only the ungrouped node shows up.');
  }

  /**
   * Tests that grouped nodes are visible to members.
   */
  public function testMemberGroupAccessWithPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $group
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'The ungrouped node can be viewed.');
  }

  /**
   * Tests that grouped nodes are visible to non-members.
   */
  public function testNonMemberGroupAccessWithPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Outsiders can see grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'The node can be viewed.');
  }

  /**
   * Tests the viewing of any published grouped entities for members.
   */
  public function testMemberViewAnyPublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);

    // Sanity check: Verify that we don't touch unpublished nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see any published grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see any published grouped nodes without permission.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of any published grouped entities for non-members.
   */
  public function testNonMemberViewAnyPublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);

    // Sanity check: Verify that we don't touch unpublished nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see any published grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see any published grouped nodes without permission.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of any published grouped entities for anonymous.
   */
  public function testAnonymousViewAnyPublishedAccess() {
    $this->entityTypeManager
      ->getStorage('user_role')
      ->load('anonymous')
      ->grantPermission('access content')
      ->save();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);

    // Sanity check: Verify that we don't touch unpublished nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $this
      ->setCurrentUser(new AnonymousUserSession());
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Anonymous cannot see published grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Anonymous cannot see published grouped nodes without permission.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'Anonymous can see published ungrouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this->groupTypeA
      ->getAnonymousRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getAnonymousRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Anonymous can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Anonymous can see any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'Anonymous can see published ungrouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of own published grouped entities for members.
   */
  public function testMemberViewOwnPublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);

    // Sanity check: Verify that we don't touch unpublished nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see their own published grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see their own published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of own published grouped entities for non-members.
   */
  public function testNonMemberViewOwnPublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);

    // Sanity check: Verify that we don't touch unpublished nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see their own published grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see their own published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see published grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The published node can be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The unpublished grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of any unpublished grouped entities for members.
   */
  public function testMemberViewAnyUnpublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);

    // Sanity check: Verify that we don't touch published nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see any unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see any unpublished grouped nodes without permission.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see any unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of any unpublished grouped entities for non-members.
   */
  public function testNonMemberViewAnyUnpublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);

    // Sanity check: Verify that we don't touch published nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see any unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see any unpublished grouped nodes without permission.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members can see any unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of any unpublished grouped entities for anonymous.
   */
  public function testAnonymousViewAnyUnpublishedAccess() {
    $this->entityTypeManager
      ->getStorage('user_role')
      ->load('anonymous')
      ->grantPermission('access content')
      ->save();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);

    // Sanity check: Verify that we don't touch published nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $this
      ->setCurrentUser(new AnonymousUserSession());
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Anonymous cannot see unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Anonymous cannot see unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'Anonymous cannot see unpublished ungrouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this->groupTypeA
      ->getAnonymousRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getAnonymousRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Anonymous can see any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Anonymous can see any unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'Anonymous cannot see unpublished ungrouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of own unpublished grouped entities for members.
   */
  public function testMemberViewOwnUnpublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);

    // Sanity check: Verify that we don't touch published nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see their own unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Members can see their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'view'), 'Members can see their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
  }

  /**
   * Tests the viewing of own unpublished grouped entities for non-members.
   */
  public function testNonMemberViewOwnUnpublishedAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);

    // Sanity check: Verify that we don't touch published nodes.
    $node_4 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see their own unpublished grouped nodes without permission.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->accessControlHandler
      ->resetCache();
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members can see their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node can be viewed by the owner.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Non-members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Non-members cannot see unpublished grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'view'), 'Members cannot see unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'view'), 'The unpublished node cannot be viewed.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'view'), 'The published grouped node cannot be viewed.');
  }

  /**
   * Tests the updating of any grouped entities for members.
   */
  public function testMemberUpdateAnyAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('update any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('update any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Members can update any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Members can update any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Members can update any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Members can update any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Non-members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Non-members cannot update unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
  }

  /**
   * Tests the updating of any grouped entities for non-members.
   */
  public function testNonMemberUpdateAnyAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('update any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('update any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Non-members can update any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Non-members can update any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Non-members can update any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Non-members can update any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Members cannot update unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'The ungrouped node can be updated.');
  }

  /**
   * Tests the updating of own grouped entities for members.
   */
  public function testMemberUpdateOwnAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('update own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('update own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_2, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addContent($node_4, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Members can update their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Members can update their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'update'), 'Members cannot update published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'update'), 'Members cannot update unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Members cannot update published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Members cannot update unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'update'), 'Members can update their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_4, 'update'), 'Members can update their own unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Members cannot update unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'update'), 'Members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'update'), 'Members cannot update unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
  }

  /**
   * Tests the updating of own grouped entities for non-members.
   */
  public function testNonMemberUpdateOwnAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('update own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('update own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_2, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addContent($node_4, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'update'), 'Non-members can update their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'update'), 'Non-members can update their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'update'), 'Non-members cannot update published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'update'), 'Non-members cannot update unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Non-members cannot update published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Non-members cannot update unpublished grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'update'), 'Non-members cannot update published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'update'), 'Non-members cannot update unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'update'), 'Members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'update'), 'Members cannot update unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'update'), 'Members cannot update published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'update'), 'Members cannot update unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'update'), 'The ungrouped node can be updated.');
  }

  /**
   * Tests the deleting of any grouped entities for members.
   */
  public function testMemberDeleteAnyAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 1,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('delete any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('delete any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members can delete any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members can delete any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members can delete any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members can delete any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Non-members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Non-members cannot delete unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
  }

  /**
   * Tests the deleting of any grouped entities for non-members.
   */
  public function testNonMemberDeleteAnyAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('delete any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('delete any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_2, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Non-members can delete any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Non-members can delete any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Non-members can delete any published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Non-members can delete any unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members cannot delete unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'The ungrouped node can be deleted.');
  }

  /**
   * Tests the deleting of own grouped entities for members.
   */
  public function testMemberDeleteOwnAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('delete own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('delete own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_2, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addContent($node_4, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members can delete their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members can delete their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'delete'), 'Members cannot delete published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'delete'), 'Members cannot delete unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members cannot delete published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members cannot delete unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_3, 'delete'), 'Members can delete their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_4, 'delete'), 'Members can delete their own unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members cannot delete unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'delete'), 'Members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'delete'), 'Members cannot delete unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
  }

  /**
   * Tests the deleting of own grouped entities for non-members.
   */
  public function testNonMemberDeleteOwnAccess() {
    $account = $this
      ->createUser([], $this->permissions);
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('delete own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('delete own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addContent($node_2, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addContent($node_4, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_1, 'delete'), 'Non-members can delete their own published grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_2, 'delete'), 'Non-members can delete their own unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'delete'), 'Non-members cannot delete published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'delete'), 'Non-members cannot delete unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($this
      ->createUser([], $this->permissions));
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Non-members cannot delete published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Non-members cannot delete unpublished grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'delete'), 'Non-members cannot delete published grouped nodes they do not own.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'delete'), 'Non-members cannot delete unpublished grouped nodes they do not own.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_1, 'delete'), 'Members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_2, 'delete'), 'Members cannot delete unpublished grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_3, 'delete'), 'Members cannot delete published grouped nodes.');
    $this
      ->assertFalse($this->accessControlHandler
      ->access($node_4, 'delete'), 'Members cannot delete unpublished grouped nodes.');
    $this
      ->assertTrue($this->accessControlHandler
      ->access($node_5, 'delete'), 'The ungrouped node can be deleted.');
  }

  /**
   * Creates a node.
   *
   * @param array $values
   *   (optional) The values used to create the entity.
   *
   * @return \Drupal\node\Entity\Node
   *   The created node entity.
   */
  protected function createNode(array $values = []) {
    $node = $this->storage
      ->create($values + [
      'title' => $this
        ->randomString(),
    ]);
    $node
      ->enforceIsNew();
    $this->storage
      ->save($node);
    return $node;
  }

  /**
   * Creates a node type.
   *
   * @param array $values
   *   (optional) The values used to create the entity.
   *
   * @return \Drupal\node\Entity\NodeType
   *   The created node type entity.
   */
  protected function createNodeType(array $values = []) {
    $storage = $this->entityTypeManager
      ->getStorage('node_type');
    $node_type = $storage
      ->create($values + [
      'type' => $this
        ->randomMachineName(),
      'label' => $this
        ->randomString(),
    ]);
    $storage
      ->save($node_type);
    return $node_type;
  }

}

Members

Namesort descending Modifiers Type Description Overrides
AssertContentTrait::$content protected property The current raw content.
AssertContentTrait::$drupalSettings protected property The drupalSettings value from the current raw $content.
AssertContentTrait::$elements protected property The XML structure parsed from the current raw $content. 1
AssertContentTrait::$plainTextContent protected property The plain-text content of raw $content (text nodes).
AssertContentTrait::assertEscaped protected function Passes if the raw text IS found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertField protected function Asserts that a field exists with the given name or ID.
AssertContentTrait::assertFieldById protected function Asserts that a field exists with the given ID and value.
AssertContentTrait::assertFieldByName protected function Asserts that a field exists with the given name and value.
AssertContentTrait::assertFieldByXPath protected function Asserts that a field exists in the current page by the given XPath.
AssertContentTrait::assertFieldChecked protected function Asserts that a checkbox field in the current page is checked.
AssertContentTrait::assertFieldsByValue protected function Asserts that a field exists in the current page with a given Xpath result.
AssertContentTrait::assertLink protected function Passes if a link with the specified label is found.
AssertContentTrait::assertLinkByHref protected function Passes if a link containing a given href (part) is found.
AssertContentTrait::assertNoDuplicateIds protected function Asserts that each HTML ID is used for just a single element.
AssertContentTrait::assertNoEscaped protected function Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertNoField protected function Asserts that a field does not exist with the given name or ID.
AssertContentTrait::assertNoFieldById protected function Asserts that a field does not exist with the given ID and value.
AssertContentTrait::assertNoFieldByName protected function Asserts that a field does not exist with the given name and value.
AssertContentTrait::assertNoFieldByXPath protected function Asserts that a field does not exist or its value does not match, by XPath.
AssertContentTrait::assertNoFieldChecked protected function Asserts that a checkbox field in the current page is not checked.
AssertContentTrait::assertNoLink protected function Passes if a link with the specified label is not found.
AssertContentTrait::assertNoLinkByHref protected function Passes if a link containing a given href (part) is not found.
AssertContentTrait::assertNoLinkByHrefInMainRegion protected function Passes if a link containing a given href is not found in the main region.
AssertContentTrait::assertNoOption protected function Asserts that a select option in the current page does not exist.
AssertContentTrait::assertNoOptionSelected protected function Asserts that a select option in the current page is not checked.
AssertContentTrait::assertNoPattern protected function Triggers a pass if the perl regex pattern is not found in raw content.
AssertContentTrait::assertNoRaw protected function Passes if the raw text is NOT found on the loaded page, fail otherwise.
AssertContentTrait::assertNoText protected function Passes if the page (with HTML stripped) does not contains the text.
AssertContentTrait::assertNoTitle protected function Pass if the page title is not the given string.
AssertContentTrait::assertNoUniqueText protected function Passes if the text is found MORE THAN ONCE on the text version of the page.
AssertContentTrait::assertOption protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertOptionByText protected function Asserts that a select option with the visible text exists.
AssertContentTrait::assertOptionSelected protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionSelectedWithDrupalSelector protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionWithDrupalSelector protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertPattern protected function Triggers a pass if the Perl regex pattern is found in the raw content.
AssertContentTrait::assertRaw protected function Passes if the raw text IS found on the loaded page, fail otherwise.
AssertContentTrait::assertText protected function Passes if the page (with HTML stripped) contains the text.
AssertContentTrait::assertTextHelper protected function Helper for assertText and assertNoText.
AssertContentTrait::assertTextPattern protected function Asserts that a Perl regex pattern is found in the plain-text content.
AssertContentTrait::assertThemeOutput protected function Asserts themed output.
AssertContentTrait::assertTitle protected function Pass if the page title is the given string.
AssertContentTrait::assertUniqueText protected function Passes if the text is found ONLY ONCE on the text version of the page.
AssertContentTrait::assertUniqueTextHelper protected function Helper for assertUniqueText and assertNoUniqueText.
AssertContentTrait::buildXPathQuery protected function Builds an XPath query.
AssertContentTrait::constructFieldXpath protected function Helper: Constructs an XPath for the given set of attributes and value.
AssertContentTrait::cssSelect protected function Searches elements using a CSS selector in the raw content.
AssertContentTrait::getAllOptions protected function Get all option elements, including nested options, in a select.
AssertContentTrait::getDrupalSettings protected function Gets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::getRawContent protected function Gets the current raw content.
AssertContentTrait::getSelectedItem protected function Get the selected value from a select field.
AssertContentTrait::getTextContent protected function Retrieves the plain-text content from the current raw content.
AssertContentTrait::getUrl protected function Get the current URL from the cURL handler. 1
AssertContentTrait::parse protected function Parse content returned from curlExec using DOM and SimpleXML.
AssertContentTrait::removeWhiteSpace protected function Removes all white-space between HTML tags from the raw content.
AssertContentTrait::setDrupalSettings protected function Sets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::setRawContent protected function Sets the raw content (e.g. HTML).
AssertContentTrait::xpath protected function Performs an xpath search on the contents of the internal browser.
AssertHelperTrait::castSafeStrings protected static function Casts MarkupInterface objects into strings.
AssertLegacyTrait::assert protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::assertEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertSame() instead.
AssertLegacyTrait::assertIdenticalObject protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertNotEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotEquals() instead.
AssertLegacyTrait::assertNotIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotSame() instead.
AssertLegacyTrait::pass protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::verbose protected function
ConfigTestTrait::configImporter protected function Returns a ConfigImporter object to import test configuration.
ConfigTestTrait::copyConfig protected function Copies configuration objects from source storage to target storage.
DeprecatedServicePropertyTrait::__get public function Allows to access deprecated/removed properties.
EntityAccessComplexTest::$accessControlHandler protected property The access control handler to use in testing.
EntityAccessComplexTest::$groupTypeA protected property The first group type to use in testing.
EntityAccessComplexTest::$groupTypeB protected property The second group type to use in testing.
EntityAccessComplexTest::$modules public static property @todo Refactor tests to not automatically use group_test_config unless they have a good reason to. Overrides GroupKernelTestBase::$modules
EntityAccessComplexTest::$permissions protected property The required permissions for our node checks.
EntityAccessComplexTest::$storage protected property The node storage to use in testing.
EntityAccessComplexTest::createNode protected function Creates a node.
EntityAccessComplexTest::createNodeType protected function Creates a node type.
EntityAccessComplexTest::setUp protected function Overrides GroupKernelTestBase::setUp
EntityAccessComplexTest::testAnonymousViewAnyPublishedAccess public function Tests the viewing of any published grouped entities for anonymous.
EntityAccessComplexTest::testAnonymousViewAnyUnpublishedAccess public function Tests the viewing of any unpublished grouped entities for anonymous.
EntityAccessComplexTest::testMemberDeleteAnyAccess public function Tests the deleting of any grouped entities for members.
EntityAccessComplexTest::testMemberDeleteOwnAccess public function Tests the deleting of own grouped entities for members.
EntityAccessComplexTest::testMemberGroupAccessWithoutPermission public function Tests that grouped nodes are properly hidden.
EntityAccessComplexTest::testMemberGroupAccessWithPermission public function Tests that grouped nodes are visible to members.
EntityAccessComplexTest::testMemberUpdateAnyAccess public function Tests the updating of any grouped entities for members.
EntityAccessComplexTest::testMemberUpdateOwnAccess public function Tests the updating of own grouped entities for members.
EntityAccessComplexTest::testMemberViewAnyPublishedAccess public function Tests the viewing of any published grouped entities for members.
EntityAccessComplexTest::testMemberViewAnyUnpublishedAccess public function Tests the viewing of any unpublished grouped entities for members.
EntityAccessComplexTest::testMemberViewOwnPublishedAccess public function Tests the viewing of own published grouped entities for members.
EntityAccessComplexTest::testMemberViewOwnUnpublishedAccess public function Tests the viewing of own unpublished grouped entities for members.
EntityAccessComplexTest::testNonMemberDeleteAnyAccess public function Tests the deleting of any grouped entities for non-members.
EntityAccessComplexTest::testNonMemberDeleteOwnAccess public function Tests the deleting of own grouped entities for non-members.
EntityAccessComplexTest::testNonMemberGroupAccessWithoutPermission public function Tests that grouped nodes are properly hidden.
EntityAccessComplexTest::testNonMemberGroupAccessWithPermission public function Tests that grouped nodes are visible to non-members.
EntityAccessComplexTest::testNonMemberUpdateAnyAccess public function Tests the updating of any grouped entities for non-members.
EntityAccessComplexTest::testNonMemberUpdateOwnAccess public function Tests the updating of own grouped entities for non-members.
EntityAccessComplexTest::testNonMemberViewAnyPublishedAccess public function Tests the viewing of any published grouped entities for non-members.
EntityAccessComplexTest::testNonMemberViewAnyUnpublishedAccess public function Tests the viewing of any unpublished grouped entities for non-members.
EntityAccessComplexTest::testNonMemberViewOwnPublishedAccess public function Tests the viewing of own published grouped entities for non-members.
EntityAccessComplexTest::testNonMemberViewOwnUnpublishedAccess public function Tests the viewing of own unpublished grouped entities for non-members.
EntityAccessComplexTest::testRegularAccess public function Tests that regular access checks work.
EntityKernelTestBase::$deprecatedProperties protected property The list of deprecated services.
EntityKernelTestBase::$entityTypeManager protected property The entity type manager service. 1
EntityKernelTestBase::$generatedIds protected property A list of generated identifiers.
EntityKernelTestBase::$state protected property The state service.
EntityKernelTestBase::createUser protected function Creates a user.
EntityKernelTestBase::generateRandomEntityId protected function Generates a random ID avoiding collisions.
EntityKernelTestBase::getHooksInfo protected function Returns the entity_test hook invocation info.
EntityKernelTestBase::installModule protected function Installs a module and refreshes services.
EntityKernelTestBase::refreshServices protected function Refresh services. 1
EntityKernelTestBase::reloadEntity protected function Reloads the given entity from the storage and returns it.
EntityKernelTestBase::uninstallModule protected function Uninstalls a module and refreshes services.
GroupKernelTestBase::$pluginManager protected property The content enabler plugin manager.
GroupKernelTestBase::createGroup protected function Creates a group.
GroupKernelTestBase::createGroupType protected function Creates a group type.
GroupKernelTestBase::getCurrentUser protected function Gets the current user so you can run some checks against them.
KernelTestBase::$backupGlobals protected property Back up and restore any global variables that may be changed by tests.
KernelTestBase::$backupStaticAttributes protected property Back up and restore static class properties that may be changed by tests.
KernelTestBase::$backupStaticAttributesBlacklist protected property Contains a few static class properties for performance.
KernelTestBase::$classLoader protected property
KernelTestBase::$configImporter protected property @todo Move into Config test base class. 7
KernelTestBase::$configSchemaCheckerExclusions protected static property An array of config object names that are excluded from schema checking.
KernelTestBase::$container protected property
KernelTestBase::$databasePrefix protected property
KernelTestBase::$preserveGlobalState protected property Do not forward any global state from the parent process to the processes that run the actual tests.
KernelTestBase::$root protected property The app root.
KernelTestBase::$runTestInSeparateProcess protected property Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property.
KernelTestBase::$siteDirectory protected property
KernelTestBase::$strictConfigSchema protected property Set to TRUE to strict check all configuration saved. 6
KernelTestBase::$vfsRoot protected property The virtual filesystem root directory.
KernelTestBase::assertPostConditions protected function 1
KernelTestBase::bootEnvironment protected function Bootstraps a basic test environment.
KernelTestBase::bootKernel private function Bootstraps a kernel for a test.
KernelTestBase::config protected function Configuration accessor for tests. Returns non-overridden configuration.
KernelTestBase::disableModules protected function Disables modules for this test.
KernelTestBase::enableModules protected function Enables modules for this test.
KernelTestBase::getConfigSchemaExclusions protected function Gets the config schema exclusions for this test.
KernelTestBase::getDatabaseConnectionInfo protected function Returns the Database connection info to be used for this test. 1
KernelTestBase::getDatabasePrefix public function
KernelTestBase::getExtensionsForModules private function Returns Extension objects for $modules to enable.
KernelTestBase::getModulesToEnable private static function Returns the modules to enable for this test.
KernelTestBase::initFileCache protected function Initializes the FileCache component.
KernelTestBase::installConfig protected function Installs default configuration for a given list of modules.
KernelTestBase::installEntitySchema protected function Installs the storage schema for a specific entity type.
KernelTestBase::installSchema protected function Installs database tables from a module schema definition.
KernelTestBase::isTestInIsolation Deprecated protected function Returns whether the current test method is running in a separate process.
KernelTestBase::prepareTemplate protected function
KernelTestBase::register public function Registers test-specific services. Overrides ServiceProviderInterface::register 26
KernelTestBase::render protected function Renders a render array. 1
KernelTestBase::setInstallProfile protected function Sets the install profile and rebuilds the container to update it.
KernelTestBase::setSetting protected function Sets an in-memory Settings variable.
KernelTestBase::setUpBeforeClass public static function 1
KernelTestBase::setUpFilesystem protected function Sets up the filesystem, so things like the file directory. 2
KernelTestBase::stop protected function Stops test execution.
KernelTestBase::tearDown protected function 6
KernelTestBase::tearDownCloseDatabaseConnection public function @after
KernelTestBase::vfsDump protected function Dumps the current state of the virtual filesystem to STDOUT.
KernelTestBase::__sleep public function Prevents serializing any properties.
PhpunitCompatibilityTrait::getMock Deprecated public function Returns a mock object for the specified class using the available method.
PhpunitCompatibilityTrait::setExpectedException Deprecated public function Compatibility layer for PHPUnit 6 to support PHPUnit 4 code.
RandomGeneratorTrait::$randomGenerator protected property The random generator.
RandomGeneratorTrait::getRandomGenerator protected function Gets the random generator for the utility methods.
RandomGeneratorTrait::randomMachineName protected function Generates a unique random string containing letters and numbers. 1
RandomGeneratorTrait::randomObject public function Generates a random PHP object.
RandomGeneratorTrait::randomString public function Generates a pseudo-random string of ASCII characters of codes 32 to 126.
RandomGeneratorTrait::randomStringValidate public function Callback for random string validation.
StorageCopyTrait::replaceStorageContents protected static function Copy the configuration from one storage to another and remove stale items.
TestRequirementsTrait::checkModuleRequirements private function Checks missing module requirements.
TestRequirementsTrait::checkRequirements protected function Check module requirements for the Drupal use case. 1
TestRequirementsTrait::getDrupalRoot protected static function Returns the Drupal root directory.
UserCreationTrait::checkPermissions protected function Checks whether a given list of permission names is valid. Aliased as: drupalCheckPermissions
UserCreationTrait::createAdminRole protected function Creates an administrative role. Aliased as: drupalCreateAdminRole
UserCreationTrait::createRole protected function Creates a role with specified permissions. Aliased as: drupalCreateRole
UserCreationTrait::createUser protected function Create a user with a given set of permissions. Aliased as: drupalCreateUser
UserCreationTrait::grantPermissions protected function Grant permissions to a user role. Aliased as: drupalGrantPermissions
UserCreationTrait::setCurrentUser protected function Switch the current logged in user. Aliased as: drupalSetCurrentUser
UserCreationTrait::setUpCurrentUser protected function Creates a random user account and sets it as current user. Aliased as: drupalSetUpCurrentUser