You are here

class EntityQueryAlterComplexTest in Group 8

Same name and namespace in other branches
  1. 2.0.x tests/src/Kernel/EntityQueryAlterComplexTest.php \Drupal\Tests\group\Kernel\EntityQueryAlterComplexTest

Tests that Group properly checks access for "complex" grouped entities.

By complex entities we mean entities that can be published or unpublished and have a way of determining who owns the entity. This leads to far more complex query alters as we need to take ownership and publication state into account.

@todo Test operations other than view.

@coversDefaultClass \Drupal\group\QueryAccess\EntityQueryAlter @group group

Hierarchy

Expanded class hierarchy of EntityQueryAlterComplexTest

File

tests/src/Kernel/EntityQueryAlterComplexTest.php, line 20

Namespace

Drupal\Tests\group\Kernel
View source
class EntityQueryAlterComplexTest extends GroupKernelTestBase {
  use ViewResultAssertionTrait;

  /**
   * {@inheritdoc}
   */
  public static $modules = [
    'group_test_plugin',
    'node',
    'views',
  ];

  /**
   * The grouped storage to use in testing.
   *
   * @var \Drupal\node\NodeStorageInterface
   */
  protected $storage;

  /**
   * The first group type to use in testing.
   *
   * @var \Drupal\group\Entity\GroupTypeInterface
   */
  protected $groupTypeA;

  /**
   * The second group type to use in testing.
   *
   * @var \Drupal\group\Entity\GroupTypeInterface
   */
  protected $groupTypeB;

  /**
   * {@inheritdoc}
   */
  protected function setUp() {
    parent::setUp();
    $this
      ->installConfig('group_test_plugin');
    $this
      ->installSchema('node', [
      'node_access',
    ]);
    $this
      ->installEntitySchema('node');
    $this->storage = $this->entityTypeManager
      ->getStorage('node');
    $this
      ->createNodeType([
      'type' => 'page',
    ]);
    $this
      ->createNodeType([
      'type' => 'article',
    ]);
    $this->groupTypeA = $this
      ->createGroupType([
      'id' => 'foo',
      'creator_membership' => FALSE,
    ]);
    $this->groupTypeB = $this
      ->createGroupType([
      'id' => 'bar',
      'creator_membership' => FALSE,
    ]);

    /** @var \Drupal\group\Entity\Storage\GroupContentTypeStorageInterface $storage */
    $storage = $this->entityTypeManager
      ->getStorage('group_content_type');
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeA, 'node_as_content:page'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeA, 'node_as_content:article'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeB, 'node_as_content:page'));
    $storage
      ->save($storage
      ->createFromPlugin($this->groupTypeB, 'node_as_content:article'));
  }

  /**
   * Tests that regular access checks still work.
   */
  public function testRegularAccess() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $this
        ->createUser()
        ->id(),
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Regular node query access still works.');
  }

  /**
   * Tests that grouped nodes are properly hidden for members.
   */
  public function testMemberGroupAccessWithoutPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $group
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped node shows up.');

    // Extra hardening: Re-confirm result when another group type does grant
    // access but does not contain the node.
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ])
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped node shows up.');
  }

  /**
   * Tests that grouped nodes are properly hidden for non-members.
   */
  public function testNonMemberGroupAccessWithoutPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped node shows up.');

    // Extra hardening: Re-confirm result when another group type does grant
    // access but does not contain the node.
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped node shows up.');
  }

  /**
   * Tests that grouped nodes are visible to members.
   */
  public function testMemberGroupAccessWithPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $group
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Members can see grouped nodes');
  }

  /**
   * Tests that grouped nodes are visible to non-members.
   */
  public function testNonMemberGroupAccessWithPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Outsiders can see grouped nodes');
  }

  /**
   * Tests the viewing of any published entities for members.
   */
  public function testMemberViewAnyPublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see any published nodes.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see any published nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped published node shows up.');
  }

  /**
   * Tests the viewing of any published entities for non-members.
   */
  public function testNonMemberViewAnyPublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Non-members can see any published nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Non-members can see any published nodes.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped published node shows up.');
  }

  /**
   * Tests the viewing of own published entities for members.
   */
  public function testMemberViewOwnPublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Members can see their own published nodes.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see their own published nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped published node shows up.');
  }

  /**
   * Tests the viewing of own published entities for non-members.
   */
  public function testNonMemberViewOwnPublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view own node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Non-members can see their own published nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped published node shows up.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped published node shows up.');
  }

  /**
   * Tests the viewing of any unpublished entities for members.
   */
  public function testMemberViewAnyUnpublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see any unpublished nodes.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see any unpublished nodes.');

    // This is actually a core issue, but for now unpublished nodes show up in
    // entity queries when there are no node grants defining modules.
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped unpublished node shows up.');
  }

  /**
   * Tests the viewing of any unpublished entities for non-members.
   */
  public function testNonMemberViewAnyUnpublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view any unpublished node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Non-members can see any unpublished nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Non-members can see any unpublished nodes.');

    // This is actually a core issue, but for now unpublished nodes show up in
    // entity queries when there are no node grants defining modules.
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped unpublished node shows up.');
  }

  /**
   * Tests the viewing of own unpublished entities for members.
   */
  public function testMemberViewOwnUnpublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Members can see their own unpublished nodes.');
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
      $node_3
        ->id(),
    ], 'Members can see their own unpublished nodes.');

    // This is actually a core issue, but for now unpublished nodes show up in
    // entity queries when there are no node grants defining modules.
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped unpublished node shows up.');
  }

  /**
   * Tests the viewing of own unpublished entities for non-members.
   */
  public function testNonMemberViewOwnUnpublishedAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('view own unpublished node_as_content:page entity')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_1, 'node_as_content:page');
    $group_a
      ->addMember($account);
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_3, 'node_as_content:page');
    $group_b
      ->addMember($account);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Non-members can see their own unpublished nodes.');
    $this
      ->setCurrentUser($this
      ->createUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped unpublished node shows up.');

    // This is actually a core issue, but for now unpublished nodes show up in
    // entity queries when there are no node grants defining modules.
    $this
      ->setCurrentUser($account);
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Only the ungrouped unpublished node shows up.');
  }

  /**
   * Tests the admin access for members.
   */
  public function testMemberAdminAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_6 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $this->groupTypeB
      ->getMemberRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_3, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_a
      ->addMember($this
      ->getCurrentUser());
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_5, 'node_as_content:page');
    $group_b
      ->addContent($node_6, 'node_as_content:page');
    $group_b
      ->addMember($this
      ->getCurrentUser());
    $expected = [
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
      $node_4
        ->id(),
      $node_5
        ->id(),
      $node_6
        ->id(),
    ];
    $this
      ->assertQueryAccessResult($expected, 'Admin member can see anything regardless of owner or published status.');
  }

  /**
   * Tests the admin access for non-members.
   */
  public function testNonMemberAdminAccess() {
    $account = $this
      ->createUser();
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_3 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_4 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
    ]);
    $node_5 = $this
      ->createNode([
      'type' => 'page',
      'uid' => $account
        ->id(),
    ]);
    $node_6 = $this
      ->createNode([
      'type' => 'page',
      'status' => 0,
      'uid' => $account
        ->id(),
    ]);
    $this->groupTypeA
      ->getOutsiderRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $this->groupTypeB
      ->getOutsiderRole()
      ->grantPermission('administer node_as_content:page')
      ->save();
    $group_a = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group_a
      ->addContent($node_3, 'node_as_content:page');
    $group_a
      ->addContent($node_4, 'node_as_content:page');
    $group_b = $this
      ->createGroup([
      'type' => $this->groupTypeB
        ->id(),
    ]);
    $group_b
      ->addContent($node_5, 'node_as_content:page');
    $group_b
      ->addContent($node_6, 'node_as_content:page');
    $expected = [
      $node_1
        ->id(),
      $node_2
        ->id(),
      $node_3
        ->id(),
      $node_4
        ->id(),
      $node_5
        ->id(),
      $node_6
        ->id(),
    ];
    $this
      ->assertQueryAccessResult($expected, 'Admin non-member can see anything regardless of owner or published status.');
  }

  /**
   * Tests that adding new group content clears caches.
   */
  public function testNewGroupContent() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Outsiders can see ungrouped nodes');

    // This should clear the cache.
    $group
      ->addContent($node_1, 'node_as_content:page');
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Outsiders can see ungrouped nodes');
  }

  /**
   * Tests that adding new permissions clears caches.
   *
   * This is actually tested in the permission calculator, but added here also
   * for additional hardening. It does not really clear the cached conditions,
   * but rather return a different set as your user.group_permissions cache
   * context value changes.
   *
   * We will not test any further scenarios that trigger a change in your group
   * permissions as those are -as mentioned above- tested elsewhere. It just
   * seemed like a good idea to at least test one scenario here.
   */
  public function testNewPermission() {
    $node_1 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $node_2 = $this
      ->createNode([
      'type' => 'page',
    ]);
    $group = $this
      ->createGroup([
      'type' => $this->groupTypeA
        ->id(),
    ]);
    $group
      ->addContent($node_1, 'node_as_content:page');
    $group
      ->addMember($this
      ->getCurrentUser());
    $this
      ->assertQueryAccessResult([
      $node_2
        ->id(),
    ], 'Members can only see ungrouped nodes');

    // This should trigger a different set of conditions.
    $this->groupTypeA
      ->getMemberRole()
      ->grantPermission('view any node_as_content:page entity')
      ->save();
    $this
      ->assertQueryAccessResult([
      $node_1
        ->id(),
      $node_2
        ->id(),
    ], 'Outsiders can see grouped nodes');
  }

  /**
   * Asserts that the view returns the expected results.
   *
   * @param int[] $expected
   *   The expected node IDs.
   * @param $message
   *   The message for the assertion.
   */
  protected function assertQueryAccessResult($expected, $message) {
    $ids = $this->storage
      ->getQuery()
      ->execute();
    $this
      ->assertEqualsCanonicalizing($expected, array_keys($ids), $message);
    $views_expected = [];
    foreach ($expected as $value) {
      $views_expected[] = [
        'nid' => $value,
      ];
    }
    $view = Views::getView('node_as_content');
    $view
      ->execute();
    $this
      ->assertIdenticalResultsetHelper($view, $views_expected, [
      'nid' => 'nid',
    ], 'assertEqualsCanonicalizing', $message);
  }

  /**
   * Creates a node.
   *
   * @param array $values
   *   (optional) The values used to create the entity.
   *
   * @return \Drupal\node\Entity\Node
   *   The created node entity.
   */
  protected function createNode(array $values = []) {
    $node = $this->storage
      ->create($values + [
      'title' => $this
        ->randomString(),
    ]);
    $node
      ->enforceIsNew();
    $this->storage
      ->save($node);
    return $node;
  }

  /**
   * Creates a node type.
   *
   * @param array $values
   *   (optional) The values used to create the entity.
   *
   * @return \Drupal\node\Entity\NodeType
   *   The created node type entity.
   */
  protected function createNodeType(array $values = []) {
    $storage = $this->entityTypeManager
      ->getStorage('node_type');
    $node_type = $storage
      ->create($values + [
      'type' => $this
        ->randomMachineName(),
      'label' => $this
        ->randomString(),
    ]);
    $storage
      ->save($node_type);
    return $node_type;
  }

}

Members

Namesort descending Modifiers Type Description Overrides
AssertContentTrait::$content protected property The current raw content.
AssertContentTrait::$drupalSettings protected property The drupalSettings value from the current raw $content.
AssertContentTrait::$elements protected property The XML structure parsed from the current raw $content. 1
AssertContentTrait::$plainTextContent protected property The plain-text content of raw $content (text nodes).
AssertContentTrait::assertEscaped protected function Passes if the raw text IS found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertField protected function Asserts that a field exists with the given name or ID.
AssertContentTrait::assertFieldById protected function Asserts that a field exists with the given ID and value.
AssertContentTrait::assertFieldByName protected function Asserts that a field exists with the given name and value.
AssertContentTrait::assertFieldByXPath protected function Asserts that a field exists in the current page by the given XPath.
AssertContentTrait::assertFieldChecked protected function Asserts that a checkbox field in the current page is checked.
AssertContentTrait::assertFieldsByValue protected function Asserts that a field exists in the current page with a given Xpath result.
AssertContentTrait::assertLink protected function Passes if a link with the specified label is found.
AssertContentTrait::assertLinkByHref protected function Passes if a link containing a given href (part) is found.
AssertContentTrait::assertNoDuplicateIds protected function Asserts that each HTML ID is used for just a single element.
AssertContentTrait::assertNoEscaped protected function Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertNoField protected function Asserts that a field does not exist with the given name or ID.
AssertContentTrait::assertNoFieldById protected function Asserts that a field does not exist with the given ID and value.
AssertContentTrait::assertNoFieldByName protected function Asserts that a field does not exist with the given name and value.
AssertContentTrait::assertNoFieldByXPath protected function Asserts that a field does not exist or its value does not match, by XPath.
AssertContentTrait::assertNoFieldChecked protected function Asserts that a checkbox field in the current page is not checked.
AssertContentTrait::assertNoLink protected function Passes if a link with the specified label is not found.
AssertContentTrait::assertNoLinkByHref protected function Passes if a link containing a given href (part) is not found.
AssertContentTrait::assertNoLinkByHrefInMainRegion protected function Passes if a link containing a given href is not found in the main region.
AssertContentTrait::assertNoOption protected function Asserts that a select option in the current page does not exist.
AssertContentTrait::assertNoOptionSelected protected function Asserts that a select option in the current page is not checked.
AssertContentTrait::assertNoPattern protected function Triggers a pass if the perl regex pattern is not found in raw content.
AssertContentTrait::assertNoRaw protected function Passes if the raw text is NOT found on the loaded page, fail otherwise.
AssertContentTrait::assertNoText protected function Passes if the page (with HTML stripped) does not contains the text.
AssertContentTrait::assertNoTitle protected function Pass if the page title is not the given string.
AssertContentTrait::assertNoUniqueText protected function Passes if the text is found MORE THAN ONCE on the text version of the page.
AssertContentTrait::assertOption protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertOptionByText protected function Asserts that a select option with the visible text exists.
AssertContentTrait::assertOptionSelected protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionSelectedWithDrupalSelector protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionWithDrupalSelector protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertPattern protected function Triggers a pass if the Perl regex pattern is found in the raw content.
AssertContentTrait::assertRaw protected function Passes if the raw text IS found on the loaded page, fail otherwise.
AssertContentTrait::assertText protected function Passes if the page (with HTML stripped) contains the text.
AssertContentTrait::assertTextHelper protected function Helper for assertText and assertNoText.
AssertContentTrait::assertTextPattern protected function Asserts that a Perl regex pattern is found in the plain-text content.
AssertContentTrait::assertThemeOutput protected function Asserts themed output.
AssertContentTrait::assertTitle protected function Pass if the page title is the given string.
AssertContentTrait::assertUniqueText protected function Passes if the text is found ONLY ONCE on the text version of the page.
AssertContentTrait::assertUniqueTextHelper protected function Helper for assertUniqueText and assertNoUniqueText.
AssertContentTrait::buildXPathQuery protected function Builds an XPath query.
AssertContentTrait::constructFieldXpath protected function Helper: Constructs an XPath for the given set of attributes and value.
AssertContentTrait::cssSelect protected function Searches elements using a CSS selector in the raw content.
AssertContentTrait::getAllOptions protected function Get all option elements, including nested options, in a select.
AssertContentTrait::getDrupalSettings protected function Gets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::getRawContent protected function Gets the current raw content.
AssertContentTrait::getSelectedItem protected function Get the selected value from a select field.
AssertContentTrait::getTextContent protected function Retrieves the plain-text content from the current raw content.
AssertContentTrait::getUrl protected function Get the current URL from the cURL handler. 1
AssertContentTrait::parse protected function Parse content returned from curlExec using DOM and SimpleXML.
AssertContentTrait::removeWhiteSpace protected function Removes all white-space between HTML tags from the raw content.
AssertContentTrait::setDrupalSettings protected function Sets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::setRawContent protected function Sets the raw content (e.g. HTML).
AssertContentTrait::xpath protected function Performs an xpath search on the contents of the internal browser.
AssertHelperTrait::castSafeStrings protected static function Casts MarkupInterface objects into strings.
AssertLegacyTrait::assert protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::assertEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertSame() instead.
AssertLegacyTrait::assertIdenticalObject protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertNotEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotEquals() instead.
AssertLegacyTrait::assertNotIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotSame() instead.
AssertLegacyTrait::pass protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::verbose protected function
ConfigTestTrait::configImporter protected function Returns a ConfigImporter object to import test configuration.
ConfigTestTrait::copyConfig protected function Copies configuration objects from source storage to target storage.
DeprecatedServicePropertyTrait::__get public function Allows to access deprecated/removed properties.
EntityKernelTestBase::$deprecatedProperties protected property The list of deprecated services.
EntityKernelTestBase::$entityTypeManager protected property The entity type manager service. 1
EntityKernelTestBase::$generatedIds protected property A list of generated identifiers.
EntityKernelTestBase::$state protected property The state service.
EntityKernelTestBase::createUser protected function Creates a user.
EntityKernelTestBase::generateRandomEntityId protected function Generates a random ID avoiding collisions.
EntityKernelTestBase::getHooksInfo protected function Returns the entity_test hook invocation info.
EntityKernelTestBase::installModule protected function Installs a module and refreshes services.
EntityKernelTestBase::refreshServices protected function Refresh services. 1
EntityKernelTestBase::reloadEntity protected function Reloads the given entity from the storage and returns it.
EntityKernelTestBase::uninstallModule protected function Uninstalls a module and refreshes services.
EntityQueryAlterComplexTest::$groupTypeA protected property The first group type to use in testing.
EntityQueryAlterComplexTest::$groupTypeB protected property The second group type to use in testing.
EntityQueryAlterComplexTest::$modules public static property @todo Refactor tests to not automatically use group_test_config unless they have a good reason to. Overrides GroupKernelTestBase::$modules
EntityQueryAlterComplexTest::$storage protected property The grouped storage to use in testing.
EntityQueryAlterComplexTest::assertQueryAccessResult protected function Asserts that the view returns the expected results.
EntityQueryAlterComplexTest::createNode protected function Creates a node.
EntityQueryAlterComplexTest::createNodeType protected function Creates a node type.
EntityQueryAlterComplexTest::setUp protected function Overrides GroupKernelTestBase::setUp
EntityQueryAlterComplexTest::testMemberAdminAccess public function Tests the admin access for members.
EntityQueryAlterComplexTest::testMemberGroupAccessWithoutPermission public function Tests that grouped nodes are properly hidden for members.
EntityQueryAlterComplexTest::testMemberGroupAccessWithPermission public function Tests that grouped nodes are visible to members.
EntityQueryAlterComplexTest::testMemberViewAnyPublishedAccess public function Tests the viewing of any published entities for members.
EntityQueryAlterComplexTest::testMemberViewAnyUnpublishedAccess public function Tests the viewing of any unpublished entities for members.
EntityQueryAlterComplexTest::testMemberViewOwnPublishedAccess public function Tests the viewing of own published entities for members.
EntityQueryAlterComplexTest::testMemberViewOwnUnpublishedAccess public function Tests the viewing of own unpublished entities for members.
EntityQueryAlterComplexTest::testNewGroupContent public function Tests that adding new group content clears caches.
EntityQueryAlterComplexTest::testNewPermission public function Tests that adding new permissions clears caches.
EntityQueryAlterComplexTest::testNonMemberAdminAccess public function Tests the admin access for non-members.
EntityQueryAlterComplexTest::testNonMemberGroupAccessWithoutPermission public function Tests that grouped nodes are properly hidden for non-members.
EntityQueryAlterComplexTest::testNonMemberGroupAccessWithPermission public function Tests that grouped nodes are visible to non-members.
EntityQueryAlterComplexTest::testNonMemberViewAnyPublishedAccess public function Tests the viewing of any published entities for non-members.
EntityQueryAlterComplexTest::testNonMemberViewAnyUnpublishedAccess public function Tests the viewing of any unpublished entities for non-members.
EntityQueryAlterComplexTest::testNonMemberViewOwnPublishedAccess public function Tests the viewing of own published entities for non-members.
EntityQueryAlterComplexTest::testNonMemberViewOwnUnpublishedAccess public function Tests the viewing of own unpublished entities for non-members.
EntityQueryAlterComplexTest::testRegularAccess public function Tests that regular access checks still work.
GroupKernelTestBase::$pluginManager protected property The content enabler plugin manager.
GroupKernelTestBase::createGroup protected function Creates a group.
GroupKernelTestBase::createGroupType protected function Creates a group type.
GroupKernelTestBase::getCurrentUser protected function Gets the current user so you can run some checks against them.
KernelTestBase::$backupGlobals protected property Back up and restore any global variables that may be changed by tests.
KernelTestBase::$backupStaticAttributes protected property Back up and restore static class properties that may be changed by tests.
KernelTestBase::$backupStaticAttributesBlacklist protected property Contains a few static class properties for performance.
KernelTestBase::$classLoader protected property
KernelTestBase::$configImporter protected property @todo Move into Config test base class. 7
KernelTestBase::$configSchemaCheckerExclusions protected static property An array of config object names that are excluded from schema checking.
KernelTestBase::$container protected property
KernelTestBase::$databasePrefix protected property
KernelTestBase::$preserveGlobalState protected property Do not forward any global state from the parent process to the processes that run the actual tests.
KernelTestBase::$root protected property The app root.
KernelTestBase::$runTestInSeparateProcess protected property Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property.
KernelTestBase::$siteDirectory protected property
KernelTestBase::$strictConfigSchema protected property Set to TRUE to strict check all configuration saved. 6
KernelTestBase::$vfsRoot protected property The virtual filesystem root directory.
KernelTestBase::assertPostConditions protected function 1
KernelTestBase::bootEnvironment protected function Bootstraps a basic test environment.
KernelTestBase::bootKernel private function Bootstraps a kernel for a test.
KernelTestBase::config protected function Configuration accessor for tests. Returns non-overridden configuration.
KernelTestBase::disableModules protected function Disables modules for this test.
KernelTestBase::enableModules protected function Enables modules for this test.
KernelTestBase::getConfigSchemaExclusions protected function Gets the config schema exclusions for this test.
KernelTestBase::getDatabaseConnectionInfo protected function Returns the Database connection info to be used for this test. 1
KernelTestBase::getDatabasePrefix public function
KernelTestBase::getExtensionsForModules private function Returns Extension objects for $modules to enable.
KernelTestBase::getModulesToEnable private static function Returns the modules to enable for this test.
KernelTestBase::initFileCache protected function Initializes the FileCache component.
KernelTestBase::installConfig protected function Installs default configuration for a given list of modules.
KernelTestBase::installEntitySchema protected function Installs the storage schema for a specific entity type.
KernelTestBase::installSchema protected function Installs database tables from a module schema definition.
KernelTestBase::isTestInIsolation Deprecated protected function Returns whether the current test method is running in a separate process.
KernelTestBase::prepareTemplate protected function
KernelTestBase::register public function Registers test-specific services. Overrides ServiceProviderInterface::register 26
KernelTestBase::render protected function Renders a render array. 1
KernelTestBase::setInstallProfile protected function Sets the install profile and rebuilds the container to update it.
KernelTestBase::setSetting protected function Sets an in-memory Settings variable.
KernelTestBase::setUpBeforeClass public static function 1
KernelTestBase::setUpFilesystem protected function Sets up the filesystem, so things like the file directory. 2
KernelTestBase::stop protected function Stops test execution.
KernelTestBase::tearDown protected function 6
KernelTestBase::tearDownCloseDatabaseConnection public function @after
KernelTestBase::vfsDump protected function Dumps the current state of the virtual filesystem to STDOUT.
KernelTestBase::__sleep public function Prevents serializing any properties.
PhpunitCompatibilityTrait::getMock Deprecated public function Returns a mock object for the specified class using the available method.
PhpunitCompatibilityTrait::setExpectedException Deprecated public function Compatibility layer for PHPUnit 6 to support PHPUnit 4 code.
RandomGeneratorTrait::$randomGenerator protected property The random generator.
RandomGeneratorTrait::getRandomGenerator protected function Gets the random generator for the utility methods.
RandomGeneratorTrait::randomMachineName protected function Generates a unique random string containing letters and numbers. 1
RandomGeneratorTrait::randomObject public function Generates a random PHP object.
RandomGeneratorTrait::randomString public function Generates a pseudo-random string of ASCII characters of codes 32 to 126.
RandomGeneratorTrait::randomStringValidate public function Callback for random string validation.
StorageCopyTrait::replaceStorageContents protected static function Copy the configuration from one storage to another and remove stale items.
TestRequirementsTrait::checkModuleRequirements private function Checks missing module requirements.
TestRequirementsTrait::checkRequirements protected function Check module requirements for the Drupal use case. 1
TestRequirementsTrait::getDrupalRoot protected static function Returns the Drupal root directory.
UserCreationTrait::checkPermissions protected function Checks whether a given list of permission names is valid. Aliased as: drupalCheckPermissions
UserCreationTrait::createAdminRole protected function Creates an administrative role. Aliased as: drupalCreateAdminRole
UserCreationTrait::createRole protected function Creates a role with specified permissions. Aliased as: drupalCreateRole
UserCreationTrait::createUser protected function Create a user with a given set of permissions. Aliased as: drupalCreateUser
UserCreationTrait::grantPermissions protected function Grant permissions to a user role. Aliased as: drupalGrantPermissions
UserCreationTrait::setCurrentUser protected function Switch the current logged in user. Aliased as: drupalSetCurrentUser
UserCreationTrait::setUpCurrentUser protected function Creates a random user account and sets it as current user. Aliased as: drupalSetUpCurrentUser
ViewResultAssertionTrait::assertIdenticalResultset protected function Verifies that a result set returned by a View matches expected values.
ViewResultAssertionTrait::assertIdenticalResultsetHelper protected function Performs View result assertions.
ViewResultAssertionTrait::assertNotIdenticalResultset protected function Verifies that a result set returned by a View differs from certain values.