You are here

class GroupContentQueryAccessHandlerTest in Group 2.0.x

Same name and namespace in other branches
  1. 8 tests/src/Kernel/GroupContentQueryAccessHandlerTest.php \Drupal\Tests\group\Kernel\GroupContentQueryAccessHandlerTest

Tests the behavior of group content query access handler.

@coversDefaultClass \Drupal\group\Entity\Access\GroupContentQueryAccessHandler @group group

Hierarchy

Expanded class hierarchy of GroupContentQueryAccessHandlerTest

File

tests/src/Kernel/GroupContentQueryAccessHandlerTest.php, line 16

Namespace

Drupal\Tests\group\Kernel
View source
class GroupContentQueryAccessHandlerTest extends GroupKernelTestBase {

  /**
   * {@inheritdoc}
   */
  public static $modules = [
    'group_test_plugin',
  ];

  /**
   * The query access handler.
   *
   * @var \Drupal\group\Entity\Access\GroupContentQueryAccessHandler
   */
  protected $handler;

  /**
   * The group type to run tests on.
   *
   * @var \Drupal\group\Entity\GroupTypeInterface
   */
  protected $groupType;

  /**
   * The group content type to run tests on.
   *
   * @var \Drupal\group\Entity\GroupContentTypeInterface
   */
  protected $groupContentType;

  /**
   * {@inheritdoc}
   */
  protected function setUp() {
    parent::setUp();

    // Create uid: 1 here so that it's skipped in test cases.
    $admin_user = $this
      ->createUser();
    $entity_type = $this->entityTypeManager
      ->getDefinition('group');
    $this->handler = GroupContentQueryAccessHandler::createInstance($this->container, $entity_type);

    // Create a group type where anonymous users have no access, authenticated
    // users can view group content and member users can update group content.
    $this->groupType = $this
      ->createGroupType();

    // Enable the test plugins on the group type.

    /** @var \Drupal\group\Entity\Storage\GroupContentTypeStorageInterface $storage */
    $storage = $this->entityTypeManager
      ->getStorage('group_content_type');
    $this->groupContentType = $storage
      ->createFromPlugin($this->groupType, 'user_as_content');
    $this->groupContentType
      ->save();
  }

  /**
   * Tests that the the query is not altered for people who can bypass access.
   *
   * @covers ::getConditions
   */
  public function testBypassAccess() {
    $user = $this
      ->createUser([], [
      'bypass group access',
    ]);
    foreach ([
      'view',
      'update',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertFalse($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests that the query has no results for people without any access.
   *
   * @covers ::getConditions
   */
  public function testNoAccess() {
    $user = new AnonymousUserSession();
    foreach ([
      'view',
      'update',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for people with access in just the group type scope.
   *
   * @covers ::getConditions
   */
  public function testGroupTypeAccess() {
    $user = $this
      ->createUser();

    // Allow outsiders to view any content.
    $group_role = $this->groupType
      ->getOutsiderRole();
    $group_role
      ->grantPermission('view user_as_content relation')
      ->save();

    // Allow members to update any content.
    $group_role = $this->groupType
      ->getMemberRole();
    $group_role
      ->grantPermission('update any user_as_content relation')
      ->save();
    $conditions = $this->handler
      ->getConditions('view', $user);
    $expected_conditions = [
      new Condition('type', [
        $this->groupContentType
          ->id(),
      ]),
    ];
    $this
      ->assertEquals(1, $conditions
      ->count());
    $this
      ->assertEquals($expected_conditions, $conditions
      ->getConditions());
    $this
      ->assertEqualsCanonicalizing([
      'user.group_permissions',
      'user.permissions',
    ], $conditions
      ->getCacheContexts());
    $this
      ->assertFalse($conditions
      ->isAlwaysFalse());
    foreach ([
      'update',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for people with access in just the group scope.
   *
   * @covers ::getConditions
   */
  public function testGroupAccess() {
    $user = $this
      ->createUser();
    $group = $this
      ->createGroup([
      'type' => $this->groupType
        ->id(),
    ]);
    $group
      ->addMember($user);

    // Allow members to update any content.
    $group_role = $this->groupType
      ->getMemberRole();
    $group_role
      ->grantPermission('update any user_as_content relation')
      ->save();
    $conditions = $this->handler
      ->getConditions('update', $user);
    $expected_conditions = [
      new Condition('gid', [
        $group
          ->id(),
      ]),
    ];
    $this
      ->assertEquals(1, $conditions
      ->count());
    $this
      ->assertEquals($expected_conditions, $conditions
      ->getConditions());
    $this
      ->assertEqualsCanonicalizing([
      'user.group_permissions',
      'user.permissions',
    ], $conditions
      ->getCacheContexts());
    $this
      ->assertFalse($conditions
      ->isAlwaysFalse());
    foreach ([
      'view',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for people with access in both scopes.
   *
   * @covers ::getConditions
   */
  public function testCombinedAccess() {
    $user = $this
      ->createUser();
    $group = $this
      ->createGroup([
      'type' => $this->groupType
        ->id(),
    ]);
    $group
      ->addMember($user);

    // Allow outsiders to view any content.
    $group_role = $this->groupType
      ->getOutsiderRole();
    $group_role
      ->grantPermission('view user_as_content relation')
      ->save();

    // Allow members to view any content.
    $group_role = $this->groupType
      ->getMemberRole();
    $group_role
      ->grantPermission('view user_as_content relation')
      ->save();
    $conditions = $this->handler
      ->getConditions('view', $user);
    $expected_sub_condition = new ConditionGroup();
    $expected_conditions = [
      $expected_sub_condition
        ->addCondition('type', [
        $this->groupContentType
          ->id(),
      ])
        ->addCondition('gid', [
        $group
          ->id(),
      ], 'NOT IN'),
      new Condition('gid', [
        $group
          ->id(),
      ]),
    ];
    $this
      ->assertEquals(2, $conditions
      ->count());
    $this
      ->assertEquals('OR', $conditions
      ->getConjunction());
    $this
      ->assertEquals($expected_conditions, $conditions
      ->getConditions());
    $this
      ->assertEqualsCanonicalizing([
      'user.group_permissions',
      'user.permissions',
    ], $conditions
      ->getCacheContexts());
    $this
      ->assertFalse($conditions
      ->isAlwaysFalse());
    foreach ([
      'update',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for owner access in the group type scope.
   *
   * @covers ::getConditions
   */
  public function testOwnerGroupTypeAccess() {
    $user = $this
      ->createUser();
    $group = $this
      ->createGroup([
      'type' => $this->groupType
        ->id(),
    ]);
    $group
      ->addMember($user);

    // Allow outsiders to edit their own content.
    $group_role = $this->groupType
      ->getOutsiderRole();
    $group_role
      ->grantPermission('update own user_as_content relation')
      ->save();
    $conditions = $this->handler
      ->getConditions('update', $user);
    $expected_sub_condition = new ConditionGroup();
    $expected_conditions = [
      $expected_sub_condition
        ->addCondition('uid', $user
        ->id())
        ->addCondition('type', [
        $this->groupContentType
          ->id(),
      ])
        ->addCondition('gid', [
        $group
          ->id(),
      ], 'NOT IN'),
    ];
    $this
      ->assertEquals(1, $conditions
      ->count());
    $this
      ->assertEquals('OR', $conditions
      ->getConjunction());
    $this
      ->assertEquals($expected_conditions, $conditions
      ->getConditions());
    $this
      ->assertEqualsCanonicalizing([
      'user',
      'user.group_permissions',
      'user.permissions',
    ], $conditions
      ->getCacheContexts());
    $this
      ->assertFalse($conditions
      ->isAlwaysFalse());
    foreach ([
      'view',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for owner access in the group scope.
   *
   * @covers ::getConditions
   */
  public function testOwnerGroupAccess() {
    $user = $this
      ->createUser();
    $group = $this
      ->createGroup([
      'type' => $this->groupType
        ->id(),
    ]);
    $group
      ->addMember($user);

    // Allow members to edit their own content.
    $group_role = $this->groupType
      ->getMemberRole();
    $group_role
      ->grantPermission('update own user_as_content relation')
      ->save();
    $conditions = $this->handler
      ->getConditions('update', $user);
    $expected_sub_condition = new ConditionGroup();
    $expected_conditions = [
      $expected_sub_condition
        ->addCondition('uid', $user
        ->id())
        ->addCondition('gid', [
        $group
          ->id(),
      ]),
    ];
    $this
      ->assertEquals(1, $conditions
      ->count());
    $this
      ->assertEquals('OR', $conditions
      ->getConjunction());
    $this
      ->assertEquals($expected_conditions, $conditions
      ->getConditions());
    $this
      ->assertEqualsCanonicalizing([
      'user',
      'user.group_permissions',
      'user.permissions',
    ], $conditions
      ->getCacheContexts());
    $this
      ->assertFalse($conditions
      ->isAlwaysFalse());
    foreach ([
      'view',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $this
        ->assertEquals(0, $conditions
        ->count());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertTrue($conditions
        ->isAlwaysFalse());
    }
  }

  /**
   * Tests the conditions for admin access.
   *
   * @covers ::getConditions
   */
  public function testAdminAccess() {
    $user = $this
      ->createUser();
    $group = $this
      ->createGroup([
      'type' => $this->groupType
        ->id(),
    ]);
    $group
      ->addMember($user);

    // Allow members to administer all content.
    $group_role = $this->groupType
      ->getMemberRole();
    $group_role
      ->grantPermission('administer user_as_content')
      ->save();
    foreach ([
      'view',
      'update',
      'delete',
    ] as $operation) {
      $conditions = $this->handler
        ->getConditions($operation, $user);
      $expected_conditions = [
        new Condition('gid', [
          $group
            ->id(),
        ]),
      ];
      $this
        ->assertEquals(1, $conditions
        ->count());
      $this
        ->assertEquals('OR', $conditions
        ->getConjunction());
      $this
        ->assertEquals($expected_conditions, $conditions
        ->getConditions());
      $this
        ->assertEqualsCanonicalizing([
        'user.group_permissions',
        'user.permissions',
      ], $conditions
        ->getCacheContexts());
      $this
        ->assertFalse($conditions
        ->isAlwaysFalse());
    }
  }

}

Members

Namesort descending Modifiers Type Description Overrides
AssertContentTrait::$content protected property The current raw content.
AssertContentTrait::$drupalSettings protected property The drupalSettings value from the current raw $content.
AssertContentTrait::$elements protected property The XML structure parsed from the current raw $content. 1
AssertContentTrait::$plainTextContent protected property The plain-text content of raw $content (text nodes).
AssertContentTrait::assertEscaped protected function Passes if the raw text IS found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertField protected function Asserts that a field exists with the given name or ID.
AssertContentTrait::assertFieldById protected function Asserts that a field exists with the given ID and value.
AssertContentTrait::assertFieldByName protected function Asserts that a field exists with the given name and value.
AssertContentTrait::assertFieldByXPath protected function Asserts that a field exists in the current page by the given XPath.
AssertContentTrait::assertFieldChecked protected function Asserts that a checkbox field in the current page is checked.
AssertContentTrait::assertFieldsByValue protected function Asserts that a field exists in the current page with a given Xpath result.
AssertContentTrait::assertLink protected function Passes if a link with the specified label is found.
AssertContentTrait::assertLinkByHref protected function Passes if a link containing a given href (part) is found.
AssertContentTrait::assertNoDuplicateIds protected function Asserts that each HTML ID is used for just a single element.
AssertContentTrait::assertNoEscaped protected function Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertNoField protected function Asserts that a field does not exist with the given name or ID.
AssertContentTrait::assertNoFieldById protected function Asserts that a field does not exist with the given ID and value.
AssertContentTrait::assertNoFieldByName protected function Asserts that a field does not exist with the given name and value.
AssertContentTrait::assertNoFieldByXPath protected function Asserts that a field does not exist or its value does not match, by XPath.
AssertContentTrait::assertNoFieldChecked protected function Asserts that a checkbox field in the current page is not checked.
AssertContentTrait::assertNoLink protected function Passes if a link with the specified label is not found.
AssertContentTrait::assertNoLinkByHref protected function Passes if a link containing a given href (part) is not found.
AssertContentTrait::assertNoLinkByHrefInMainRegion protected function Passes if a link containing a given href is not found in the main region.
AssertContentTrait::assertNoOption protected function Asserts that a select option in the current page does not exist.
AssertContentTrait::assertNoOptionSelected protected function Asserts that a select option in the current page is not checked.
AssertContentTrait::assertNoPattern protected function Triggers a pass if the perl regex pattern is not found in raw content.
AssertContentTrait::assertNoRaw protected function Passes if the raw text is NOT found on the loaded page, fail otherwise.
AssertContentTrait::assertNoText protected function Passes if the page (with HTML stripped) does not contains the text.
AssertContentTrait::assertNoTitle protected function Pass if the page title is not the given string.
AssertContentTrait::assertNoUniqueText protected function Passes if the text is found MORE THAN ONCE on the text version of the page.
AssertContentTrait::assertOption protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertOptionByText protected function Asserts that a select option with the visible text exists.
AssertContentTrait::assertOptionSelected protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionSelectedWithDrupalSelector protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionWithDrupalSelector protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertPattern protected function Triggers a pass if the Perl regex pattern is found in the raw content.
AssertContentTrait::assertRaw protected function Passes if the raw text IS found on the loaded page, fail otherwise.
AssertContentTrait::assertText protected function Passes if the page (with HTML stripped) contains the text.
AssertContentTrait::assertTextHelper protected function Helper for assertText and assertNoText.
AssertContentTrait::assertTextPattern protected function Asserts that a Perl regex pattern is found in the plain-text content.
AssertContentTrait::assertThemeOutput protected function Asserts themed output.
AssertContentTrait::assertTitle protected function Pass if the page title is the given string.
AssertContentTrait::assertUniqueText protected function Passes if the text is found ONLY ONCE on the text version of the page.
AssertContentTrait::assertUniqueTextHelper protected function Helper for assertUniqueText and assertNoUniqueText.
AssertContentTrait::buildXPathQuery protected function Builds an XPath query.
AssertContentTrait::constructFieldXpath protected function Helper: Constructs an XPath for the given set of attributes and value.
AssertContentTrait::cssSelect protected function Searches elements using a CSS selector in the raw content.
AssertContentTrait::getAllOptions protected function Get all option elements, including nested options, in a select.
AssertContentTrait::getDrupalSettings protected function Gets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::getRawContent protected function Gets the current raw content.
AssertContentTrait::getSelectedItem protected function Get the selected value from a select field.
AssertContentTrait::getTextContent protected function Retrieves the plain-text content from the current raw content.
AssertContentTrait::getUrl protected function Get the current URL from the cURL handler. 1
AssertContentTrait::parse protected function Parse content returned from curlExec using DOM and SimpleXML.
AssertContentTrait::removeWhiteSpace protected function Removes all white-space between HTML tags from the raw content.
AssertContentTrait::setDrupalSettings protected function Sets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::setRawContent protected function Sets the raw content (e.g. HTML).
AssertContentTrait::xpath protected function Performs an xpath search on the contents of the internal browser.
AssertLegacyTrait::assert Deprecated protected function
AssertLegacyTrait::assertEqual Deprecated protected function
AssertLegacyTrait::assertIdentical Deprecated protected function
AssertLegacyTrait::assertIdenticalObject Deprecated protected function
AssertLegacyTrait::assertNotEqual Deprecated protected function
AssertLegacyTrait::assertNotIdentical Deprecated protected function
AssertLegacyTrait::pass Deprecated protected function
AssertLegacyTrait::verbose Deprecated protected function
ConfigTestTrait::configImporter protected function Returns a ConfigImporter object to import test configuration.
ConfigTestTrait::copyConfig protected function Copies configuration objects from source storage to target storage.
EntityKernelTestBase::$entityTypeManager protected property The entity type manager service. 1
EntityKernelTestBase::$generatedIds protected property A list of generated identifiers.
EntityKernelTestBase::$state protected property The state service.
EntityKernelTestBase::createUser protected function Creates a user.
EntityKernelTestBase::generateRandomEntityId protected function Generates a random ID avoiding collisions.
EntityKernelTestBase::getHooksInfo protected function Returns the entity_test hook invocation info.
EntityKernelTestBase::installModule protected function Installs a module and refreshes services.
EntityKernelTestBase::refreshServices protected function Refresh services. 1
EntityKernelTestBase::reloadEntity protected function Reloads the given entity from the storage and returns it.
EntityKernelTestBase::uninstallModule protected function Uninstalls a module and refreshes services.
ExtensionListTestTrait::getModulePath protected function Gets the path for the specified module.
ExtensionListTestTrait::getThemePath protected function Gets the path for the specified theme.
GroupContentQueryAccessHandlerTest::$groupContentType protected property The group content type to run tests on.
GroupContentQueryAccessHandlerTest::$groupType protected property The group type to run tests on.
GroupContentQueryAccessHandlerTest::$handler protected property The query access handler.
GroupContentQueryAccessHandlerTest::$modules public static property @todo Refactor tests to not automatically use group_test_config unless they have a good reason to. Overrides GroupKernelTestBase::$modules
GroupContentQueryAccessHandlerTest::setUp protected function Overrides GroupKernelTestBase::setUp
GroupContentQueryAccessHandlerTest::testAdminAccess public function Tests the conditions for admin access.
GroupContentQueryAccessHandlerTest::testBypassAccess public function Tests that the the query is not altered for people who can bypass access.
GroupContentQueryAccessHandlerTest::testCombinedAccess public function Tests the conditions for people with access in both scopes.
GroupContentQueryAccessHandlerTest::testGroupAccess public function Tests the conditions for people with access in just the group scope.
GroupContentQueryAccessHandlerTest::testGroupTypeAccess public function Tests the conditions for people with access in just the group type scope.
GroupContentQueryAccessHandlerTest::testNoAccess public function Tests that the query has no results for people without any access.
GroupContentQueryAccessHandlerTest::testOwnerGroupAccess public function Tests the conditions for owner access in the group scope.
GroupContentQueryAccessHandlerTest::testOwnerGroupTypeAccess public function Tests the conditions for owner access in the group type scope.
GroupKernelTestBase::$pluginManager protected property The group relation plugin manager.
GroupKernelTestBase::createGroup protected function Creates a group.
GroupKernelTestBase::createGroupType protected function Creates a group type.
GroupKernelTestBase::getCurrentUser protected function Gets the current user so you can run some checks against them.
KernelTestBase::$backupGlobals protected property Back up and restore any global variables that may be changed by tests.
KernelTestBase::$backupStaticAttributes protected property Back up and restore static class properties that may be changed by tests.
KernelTestBase::$backupStaticAttributesBlacklist protected property Contains a few static class properties for performance.
KernelTestBase::$classLoader protected property
KernelTestBase::$configImporter protected property @todo Move into Config test base class. 7
KernelTestBase::$configSchemaCheckerExclusions protected static property An array of config object names that are excluded from schema checking.
KernelTestBase::$container protected property
KernelTestBase::$databasePrefix protected property
KernelTestBase::$preserveGlobalState protected property Do not forward any global state from the parent process to the processes that run the actual tests.
KernelTestBase::$root protected property The app root.
KernelTestBase::$runTestInSeparateProcess protected property Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property.
KernelTestBase::$siteDirectory protected property
KernelTestBase::$strictConfigSchema protected property Set to TRUE to strict check all configuration saved. 6
KernelTestBase::$vfsRoot protected property The virtual filesystem root directory.
KernelTestBase::assertPostConditions protected function 1
KernelTestBase::bootEnvironment protected function Bootstraps a basic test environment.
KernelTestBase::bootKernel private function Bootstraps a kernel for a test.
KernelTestBase::config protected function Configuration accessor for tests. Returns non-overridden configuration.
KernelTestBase::disableModules protected function Disables modules for this test.
KernelTestBase::enableModules protected function Enables modules for this test.
KernelTestBase::getConfigSchemaExclusions protected function Gets the config schema exclusions for this test.
KernelTestBase::getDatabaseConnectionInfo protected function Returns the Database connection info to be used for this test. 3
KernelTestBase::getDatabasePrefix public function
KernelTestBase::getExtensionsForModules private function Returns Extension objects for $modules to enable.
KernelTestBase::getModulesToEnable private static function Returns the modules to enable for this test.
KernelTestBase::initFileCache protected function Initializes the FileCache component.
KernelTestBase::installConfig protected function Installs default configuration for a given list of modules.
KernelTestBase::installEntitySchema protected function Installs the storage schema for a specific entity type.
KernelTestBase::installSchema protected function Installs database tables from a module schema definition.
KernelTestBase::prepareTemplate protected function
KernelTestBase::register public function Registers test-specific services. Overrides ServiceProviderInterface::register 24
KernelTestBase::render protected function Renders a render array. 1
KernelTestBase::setInstallProfile protected function Sets the install profile and rebuilds the container to update it.
KernelTestBase::setSetting protected function Sets an in-memory Settings variable.
KernelTestBase::setUpBeforeClass public static function 1
KernelTestBase::setUpFilesystem protected function Sets up the filesystem, so things like the file directory. 2
KernelTestBase::stop protected function Stops test execution.
KernelTestBase::tearDown protected function 4
KernelTestBase::tearDownCloseDatabaseConnection public function @after
KernelTestBase::vfsDump protected function Dumps the current state of the virtual filesystem to STDOUT.
KernelTestBase::__sleep public function Prevents serializing any properties.
PhpUnitWarnings::$deprecationWarnings private static property Deprecation warnings from PHPUnit to raise with @trigger_error().
PhpUnitWarnings::addWarning public function Converts PHPUnit deprecation warnings to E_USER_DEPRECATED.
RandomGeneratorTrait::$randomGenerator protected property The random generator.
RandomGeneratorTrait::getRandomGenerator protected function Gets the random generator for the utility methods.
RandomGeneratorTrait::randomMachineName protected function Generates a unique random string containing letters and numbers. 1
RandomGeneratorTrait::randomObject public function Generates a random PHP object.
RandomGeneratorTrait::randomString public function Generates a pseudo-random string of ASCII characters of codes 32 to 126.
RandomGeneratorTrait::randomStringValidate public function Callback for random string validation.
StorageCopyTrait::replaceStorageContents protected static function Copy the configuration from one storage to another and remove stale items.
TestRequirementsTrait::checkModuleRequirements private function Checks missing module requirements.
TestRequirementsTrait::checkRequirements protected function Check module requirements for the Drupal use case. 1
TestRequirementsTrait::getDrupalRoot protected static function Returns the Drupal root directory.
UserCreationTrait::checkPermissions protected function Checks whether a given list of permission names is valid. Aliased as: drupalCheckPermissions
UserCreationTrait::createAdminRole protected function Creates an administrative role. Aliased as: drupalCreateAdminRole
UserCreationTrait::createRole protected function Creates a role with specified permissions. Aliased as: drupalCreateRole
UserCreationTrait::createUser protected function Create a user with a given set of permissions. Aliased as: drupalCreateUser
UserCreationTrait::grantPermissions protected function Grant permissions to a user role. Aliased as: drupalGrantPermissions
UserCreationTrait::setCurrentUser protected function Switch the current logged in user. Aliased as: drupalSetCurrentUser
UserCreationTrait::setUpCurrentUser protected function Creates a random user account and sets it as current user. Aliased as: drupalSetUpCurrentUser