class GroupQueryAccessHandlerTest in Group 8
Same name and namespace in other branches
- 2.0.x tests/src/Kernel/GroupQueryAccessHandlerTest.php \Drupal\Tests\group\Kernel\GroupQueryAccessHandlerTest
Tests the behavior of group query access handler.
@coversDefaultClass \Drupal\group\Entity\Access\GroupQueryAccessHandler @group group
Hierarchy
- class \Drupal\KernelTests\KernelTestBase extends \PHPUnit\Framework\TestCase implements ServiceProviderInterface uses AssertContentTrait, AssertLegacyTrait, AssertHelperTrait, ConfigTestTrait, PhpunitCompatibilityTrait, RandomGeneratorTrait, TestRequirementsTrait
- class \Drupal\KernelTests\Core\Entity\EntityKernelTestBase uses DeprecatedServicePropertyTrait, UserCreationTrait
- class \Drupal\Tests\group\Kernel\GroupKernelTestBase
- class \Drupal\Tests\group\Kernel\GroupQueryAccessHandlerTest
- class \Drupal\Tests\group\Kernel\GroupKernelTestBase
- class \Drupal\KernelTests\Core\Entity\EntityKernelTestBase uses DeprecatedServicePropertyTrait, UserCreationTrait
Expanded class hierarchy of GroupQueryAccessHandlerTest
File
- tests/
src/ Kernel/ GroupQueryAccessHandlerTest.php, line 16
Namespace
Drupal\Tests\group\KernelView source
class GroupQueryAccessHandlerTest extends GroupKernelTestBase {
/**
* The query access handler.
*
* @var \Drupal\group\Entity\Access\GroupQueryAccessHandler
*/
protected $handler;
/**
* {@inheritdoc}
*/
protected function setUp() {
parent::setUp();
$entity_type = $this->entityTypeManager
->getDefinition('group');
$this->handler = GroupQueryAccessHandler::createInstance($this->container, $entity_type);
}
/**
* Tests that the the query is not altered for people who can bypass access.
*
* @covers ::getConditions
*/
public function testBypassAccess() {
$user = $this
->createUser([], [
'bypass group access',
]);
foreach ([
'view',
'update',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
}
}
/**
* Tests that the query has no results for people without any access.
*
* @covers ::getConditions
*/
public function testNoAccess() {
$user = new AnonymousUserSession();
foreach ([
'view',
'update',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with view access in just the type scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupTypeViewAccess() {
$user = $this
->getCurrentUser();
$conditions = $this->handler
->getConditions('view', $user);
$expected_conditions = [
(new ConditionGroup())
->addCondition('status', 1)
->addCondition('type', [
'default',
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'update',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with update access in just the type scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupTypeUpdateAccess() {
$user = $this
->getCurrentUser();
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->grantPermission('edit group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('update', $user);
$expected_conditions = [
new Condition('type', [
'default',
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with update access in just the type scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupTypeDeleteAccess() {
$user = $this
->getCurrentUser();
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->grantPermission('delete group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('delete', $user);
$expected_conditions = [
new Condition('type', [
'default',
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'update',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with view access in just the group scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupViewAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
// Remove the 'view group' permission from the default group type's outsider
// role so the user only has the permission for the groups they are in.
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('view', $user);
$expected_conditions = [
(new ConditionGroup())
->addCondition('status', 1)
->addCondition('id', [
$group
->id(),
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'update',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with update access in just the group scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupUpdateAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
// Remove the 'view group' permission from the default group type's outsider
// role so the user only has the permission for the groups they are in.
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->revokePermission('view group')
->save();
// Make sure members have access.
$this->entityTypeManager
->getStorage('group_role')
->load('default-member')
->grantPermission('edit group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('update', $user);
$expected_conditions = [
new Condition('id', [
$group
->id(),
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with delete access in just the group scope.
*
* @covers ::getConditions
*/
public function testOnlyGroupDeleteAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
// Remove the 'view group' permission from the default group type's outsider
// role so the user only has the permission for the groups they are in.
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->revokePermission('view group')
->save();
// Make sure members have access.
$this->entityTypeManager
->getStorage('group_role')
->load('default-member')
->grantPermission('delete group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('delete', $user);
$expected_conditions = [
new Condition('id', [
$group
->id(),
]),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'update',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with view access in both scopes.
*
* @covers ::getConditions
*/
public function testCombinedViewAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
$conditions = $this->handler
->getConditions('view', $user);
$expected_conditions = [
(new ConditionGroup('AND'))
->addCondition('status', 1)
->addCondition((new ConditionGroup('OR'))
->addCondition((new ConditionGroup())
->addCondition('type', [
'default',
])
->addCondition('id', [
$group
->id(),
], 'NOT IN'))
->addCondition('id', [
$group
->id(),
])),
];
$this
->assertEquals(1, $conditions
->count());
$this
->assertEquals('OR', $conditions
->getConjunction());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'update',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with update access in both scopes.
*
* @covers ::getConditions
*/
public function testCombinedUpdateAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
$this->entityTypeManager
->getStorage('group_role')
->load('default-member')
->grantPermission('edit group')
->revokePermission('view group')
->save();
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->grantPermission('edit group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('update', $user);
$expected_conditions = [
(new ConditionGroup())
->addCondition('type', [
'default',
])
->addCondition('id', [
$group
->id(),
], 'NOT IN'),
new Condition('id', [
$group
->id(),
]),
];
$this
->assertEquals(2, $conditions
->count());
$this
->assertEquals('OR', $conditions
->getConjunction());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'delete',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for people with delete access in both scopes.
*
* @covers ::getConditions
*/
public function testCombinedDeleteAccess() {
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
$this->entityTypeManager
->getStorage('group_role')
->load('default-member')
->grantPermission('delete group')
->revokePermission('view group')
->save();
$this->entityTypeManager
->getStorage('group_role')
->load('default-outsider')
->grantPermission('delete group')
->revokePermission('view group')
->save();
$conditions = $this->handler
->getConditions('delete', $user);
$expected_conditions = [
(new ConditionGroup())
->addCondition('type', [
'default',
])
->addCondition('id', [
$group
->id(),
], 'NOT IN'),
new Condition('id', [
$group
->id(),
]),
];
$this
->assertEquals(2, $conditions
->count());
$this
->assertEquals('OR', $conditions
->getConjunction());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
foreach ([
'view',
'update',
] as $operation) {
$conditions = $this->handler
->getConditions($operation, $user);
$this
->assertEquals(0, $conditions
->count());
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertTrue($conditions
->isAlwaysFalse());
}
}
/**
* Tests the conditions for view unpublished access.
*
* @covers ::getConditions
*/
public function testUnpublishedViewAccess() {
// Repeat set-up from ::testCombinedViewAccess() as we can reuse it.
$user = $this
->getCurrentUser();
$group = $this
->createGroup();
$group
->addMember($user);
// Create a group type that allows viewing of any unpublished groups.
$any_unpub = $this
->createGroupType([
'id' => 'any_unpub',
]);
$any_unpub
->getOutsiderRole()
->grantPermission('view any unpublished group')
->save();
$any_unpub
->getMemberRole()
->grantPermission('view any unpublished group')
->save();
$any_group = $this
->createGroup([
'type' => 'any_unpub',
]);
$any_group
->addMember($user);
// Create a group type that allows viewing of own unpublished groups.
$own_unpub = $this
->createGroupType([
'id' => 'own_unpub',
]);
$own_unpub
->getOutsiderRole()
->grantPermission('view own unpublished group')
->save();
$own_unpub
->getMemberRole()
->grantPermission('view own unpublished group')
->save();
$own_group = $this
->createGroup([
'type' => 'own_unpub',
'uid' => $user
->id(),
]);
$own_group
->addMember($user);
$memberships = [
$group
->id(),
$any_group
->id(),
$own_group
->id(),
];
$conditions = $this->handler
->getConditions('view', $user);
$expected_conditions = [
(new ConditionGroup('AND'))
->addCondition('status', 0)
->addCondition((new ConditionGroup('OR'))
->addCondition((new ConditionGroup())
->addCondition('type', [
'any_unpub',
])
->addCondition('id', $memberships, 'NOT IN'))
->addCondition('id', [
$any_group
->id(),
])
->addCondition((new ConditionGroup())
->addCondition('uid', $user
->id())
->addCondition((new ConditionGroup('OR'))
->addCondition((new ConditionGroup())
->addCondition('type', [
'own_unpub',
])
->addCondition('id', $memberships, 'NOT IN'))
->addCondition('id', [
$own_group
->id(),
])))),
(new ConditionGroup('AND'))
->addCondition('status', 1)
->addCondition((new ConditionGroup('OR'))
->addCondition((new ConditionGroup())
->addCondition('type', [
'default',
])
->addCondition('id', $memberships, 'NOT IN'))
->addCondition('id', [
$group
->id(),
])),
];
$this
->assertEquals(2, $conditions
->count());
$this
->assertEquals('OR', $conditions
->getConjunction());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
$this
->assertEquals([
'user',
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
// Verify that having the admin permission simplifies things.
$any_unpub
->getOutsiderRole()
->grantPermission('administer group')
->save();
$own_unpub
->getOutsiderRole()
->grantPermission('administer group')
->save();
$any_unpub
->getMemberRole()
->grantPermission('administer group')
->save();
$own_unpub
->getMemberRole()
->grantPermission('administer group')
->save();
$conditions = $this->handler
->getConditions('view', $user);
$expected_conditions = [
// Notice how we no longer need to check for status or owner when it comes
// to groups that had the "view any" or "view own" permission, but now
// have the admin permission instead.
(new ConditionGroup())
->addCondition('type', [
'any_unpub',
'own_unpub',
])
->addCondition('id', $memberships, 'NOT IN'),
new Condition('id', [
$any_group
->id(),
$own_group
->id(),
]),
// Notice how this is the exact same expectation we had in the above test.
(new ConditionGroup('AND'))
->addCondition('status', 1)
->addCondition((new ConditionGroup('OR'))
->addCondition((new ConditionGroup())
->addCondition('type', [
'default',
])
->addCondition('id', $memberships, 'NOT IN'))
->addCondition('id', [
$group
->id(),
])),
];
$this
->assertEquals(3, $conditions
->count());
$this
->assertEquals('OR', $conditions
->getConjunction());
$this
->assertEquals($expected_conditions, $conditions
->getConditions());
// Notice how the user cache context is missing now.
$this
->assertEquals([
'user.group_permissions',
'user.permissions',
], $conditions
->getCacheContexts());
$this
->assertFalse($conditions
->isAlwaysFalse());
}
}
Members
Name | Modifiers | Type | Description | Overrides |
---|---|---|---|---|
AssertContentTrait:: |
protected | property | The current raw content. | |
AssertContentTrait:: |
protected | property | The drupalSettings value from the current raw $content. | |
AssertContentTrait:: |
protected | property | The XML structure parsed from the current raw $content. | 1 |
AssertContentTrait:: |
protected | property | The plain-text content of raw $content (text nodes). | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS found escaped on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given name or ID. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given ID and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given name and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists in the current page by the given XPath. | |
AssertContentTrait:: |
protected | function | Asserts that a checkbox field in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists in the current page with a given Xpath result. | |
AssertContentTrait:: |
protected | function | Passes if a link with the specified label is found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href (part) is found. | |
AssertContentTrait:: |
protected | function | Asserts that each HTML ID is used for just a single element. | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given name or ID. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given ID and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given name and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist or its value does not match, by XPath. | |
AssertContentTrait:: |
protected | function | Asserts that a checkbox field in the current page is not checked. | |
AssertContentTrait:: |
protected | function | Passes if a link with the specified label is not found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href (part) is not found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href is not found in the main region. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page does not exist. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is not checked. | |
AssertContentTrait:: |
protected | function | Triggers a pass if the perl regex pattern is not found in raw content. | |
AssertContentTrait:: |
protected | function | Passes if the raw text is NOT found on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Passes if the page (with HTML stripped) does not contains the text. | |
AssertContentTrait:: |
protected | function | Pass if the page title is not the given string. | |
AssertContentTrait:: |
protected | function | Passes if the text is found MORE THAN ONCE on the text version of the page. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page exists. | |
AssertContentTrait:: |
protected | function | Asserts that a select option with the visible text exists. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page exists. | |
AssertContentTrait:: |
protected | function | Triggers a pass if the Perl regex pattern is found in the raw content. | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS found on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Passes if the page (with HTML stripped) contains the text. | |
AssertContentTrait:: |
protected | function | Helper for assertText and assertNoText. | |
AssertContentTrait:: |
protected | function | Asserts that a Perl regex pattern is found in the plain-text content. | |
AssertContentTrait:: |
protected | function | Asserts themed output. | |
AssertContentTrait:: |
protected | function | Pass if the page title is the given string. | |
AssertContentTrait:: |
protected | function | Passes if the text is found ONLY ONCE on the text version of the page. | |
AssertContentTrait:: |
protected | function | Helper for assertUniqueText and assertNoUniqueText. | |
AssertContentTrait:: |
protected | function | Builds an XPath query. | |
AssertContentTrait:: |
protected | function | Helper: Constructs an XPath for the given set of attributes and value. | |
AssertContentTrait:: |
protected | function | Searches elements using a CSS selector in the raw content. | |
AssertContentTrait:: |
protected | function | Get all option elements, including nested options, in a select. | |
AssertContentTrait:: |
protected | function | Gets the value of drupalSettings for the currently-loaded page. | |
AssertContentTrait:: |
protected | function | Gets the current raw content. | |
AssertContentTrait:: |
protected | function | Get the selected value from a select field. | |
AssertContentTrait:: |
protected | function | Retrieves the plain-text content from the current raw content. | |
AssertContentTrait:: |
protected | function | Get the current URL from the cURL handler. | 1 |
AssertContentTrait:: |
protected | function | Parse content returned from curlExec using DOM and SimpleXML. | |
AssertContentTrait:: |
protected | function | Removes all white-space between HTML tags from the raw content. | |
AssertContentTrait:: |
protected | function | Sets the value of drupalSettings for the currently-loaded page. | |
AssertContentTrait:: |
protected | function | Sets the raw content (e.g. HTML). | |
AssertContentTrait:: |
protected | function | Performs an xpath search on the contents of the internal browser. | |
AssertHelperTrait:: |
protected static | function | Casts MarkupInterface objects into strings. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertSame() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotSame() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead. | |
AssertLegacyTrait:: |
protected | function | ||
ConfigTestTrait:: |
protected | function | Returns a ConfigImporter object to import test configuration. | |
ConfigTestTrait:: |
protected | function | Copies configuration objects from source storage to target storage. | |
DeprecatedServicePropertyTrait:: |
public | function | Allows to access deprecated/removed properties. | |
EntityKernelTestBase:: |
protected | property | The list of deprecated services. | |
EntityKernelTestBase:: |
protected | property | The entity type manager service. | 1 |
EntityKernelTestBase:: |
protected | property | A list of generated identifiers. | |
EntityKernelTestBase:: |
protected | property | The state service. | |
EntityKernelTestBase:: |
protected | function | Creates a user. | |
EntityKernelTestBase:: |
protected | function | Generates a random ID avoiding collisions. | |
EntityKernelTestBase:: |
protected | function | Returns the entity_test hook invocation info. | |
EntityKernelTestBase:: |
protected | function | Installs a module and refreshes services. | |
EntityKernelTestBase:: |
protected | function | Refresh services. | 1 |
EntityKernelTestBase:: |
protected | function | Reloads the given entity from the storage and returns it. | |
EntityKernelTestBase:: |
protected | function | Uninstalls a module and refreshes services. | |
GroupKernelTestBase:: |
public static | property |
@todo Refactor tests to not automatically use group_test_config unless they
have a good reason to. Overrides EntityKernelTestBase:: |
10 |
GroupKernelTestBase:: |
protected | property | The content enabler plugin manager. | |
GroupKernelTestBase:: |
protected | function | Creates a group. | |
GroupKernelTestBase:: |
protected | function | Creates a group type. | |
GroupKernelTestBase:: |
protected | function | Gets the current user so you can run some checks against them. | |
GroupQueryAccessHandlerTest:: |
protected | property | The query access handler. | |
GroupQueryAccessHandlerTest:: |
protected | function |
Overrides GroupKernelTestBase:: |
|
GroupQueryAccessHandlerTest:: |
public | function | Tests that the the query is not altered for people who can bypass access. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with delete access in both scopes. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with update access in both scopes. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with view access in both scopes. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests that the query has no results for people without any access. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with delete access in just the group scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with update access in just the type scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with update access in just the type scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with view access in just the type scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with update access in just the group scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for people with view access in just the group scope. | |
GroupQueryAccessHandlerTest:: |
public | function | Tests the conditions for view unpublished access. | |
KernelTestBase:: |
protected | property | Back up and restore any global variables that may be changed by tests. | |
KernelTestBase:: |
protected | property | Back up and restore static class properties that may be changed by tests. | |
KernelTestBase:: |
protected | property | Contains a few static class properties for performance. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | @todo Move into Config test base class. | 7 |
KernelTestBase:: |
protected static | property | An array of config object names that are excluded from schema checking. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | Do not forward any global state from the parent process to the processes that run the actual tests. | |
KernelTestBase:: |
protected | property | The app root. | |
KernelTestBase:: |
protected | property | Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | Set to TRUE to strict check all configuration saved. | 6 |
KernelTestBase:: |
protected | property | The virtual filesystem root directory. | |
KernelTestBase:: |
protected | function | 1 | |
KernelTestBase:: |
protected | function | Bootstraps a basic test environment. | |
KernelTestBase:: |
private | function | Bootstraps a kernel for a test. | |
KernelTestBase:: |
protected | function | Configuration accessor for tests. Returns non-overridden configuration. | |
KernelTestBase:: |
protected | function | Disables modules for this test. | |
KernelTestBase:: |
protected | function | Enables modules for this test. | |
KernelTestBase:: |
protected | function | Gets the config schema exclusions for this test. | |
KernelTestBase:: |
protected | function | Returns the Database connection info to be used for this test. | 1 |
KernelTestBase:: |
public | function | ||
KernelTestBase:: |
private | function | Returns Extension objects for $modules to enable. | |
KernelTestBase:: |
private static | function | Returns the modules to enable for this test. | |
KernelTestBase:: |
protected | function | Initializes the FileCache component. | |
KernelTestBase:: |
protected | function | Installs default configuration for a given list of modules. | |
KernelTestBase:: |
protected | function | Installs the storage schema for a specific entity type. | |
KernelTestBase:: |
protected | function | Installs database tables from a module schema definition. | |
KernelTestBase:: |
protected | function | Returns whether the current test method is running in a separate process. | |
KernelTestBase:: |
protected | function | ||
KernelTestBase:: |
public | function |
Registers test-specific services. Overrides ServiceProviderInterface:: |
26 |
KernelTestBase:: |
protected | function | Renders a render array. | 1 |
KernelTestBase:: |
protected | function | Sets the install profile and rebuilds the container to update it. | |
KernelTestBase:: |
protected | function | Sets an in-memory Settings variable. | |
KernelTestBase:: |
public static | function | 1 | |
KernelTestBase:: |
protected | function | Sets up the filesystem, so things like the file directory. | 2 |
KernelTestBase:: |
protected | function | Stops test execution. | |
KernelTestBase:: |
protected | function | 6 | |
KernelTestBase:: |
public | function | @after | |
KernelTestBase:: |
protected | function | Dumps the current state of the virtual filesystem to STDOUT. | |
KernelTestBase:: |
public | function | Prevents serializing any properties. | |
PhpunitCompatibilityTrait:: |
public | function | Returns a mock object for the specified class using the available method. | |
PhpunitCompatibilityTrait:: |
public | function | Compatibility layer for PHPUnit 6 to support PHPUnit 4 code. | |
RandomGeneratorTrait:: |
protected | property | The random generator. | |
RandomGeneratorTrait:: |
protected | function | Gets the random generator for the utility methods. | |
RandomGeneratorTrait:: |
protected | function | Generates a unique random string containing letters and numbers. | 1 |
RandomGeneratorTrait:: |
public | function | Generates a random PHP object. | |
RandomGeneratorTrait:: |
public | function | Generates a pseudo-random string of ASCII characters of codes 32 to 126. | |
RandomGeneratorTrait:: |
public | function | Callback for random string validation. | |
StorageCopyTrait:: |
protected static | function | Copy the configuration from one storage to another and remove stale items. | |
TestRequirementsTrait:: |
private | function | Checks missing module requirements. | |
TestRequirementsTrait:: |
protected | function | Check module requirements for the Drupal use case. | 1 |
TestRequirementsTrait:: |
protected static | function | Returns the Drupal root directory. | |
UserCreationTrait:: |
protected | function | Checks whether a given list of permission names is valid. Aliased as: drupalCheckPermissions | |
UserCreationTrait:: |
protected | function | Creates an administrative role. Aliased as: drupalCreateAdminRole | |
UserCreationTrait:: |
protected | function | Creates a role with specified permissions. Aliased as: drupalCreateRole | |
UserCreationTrait:: |
protected | function | Create a user with a given set of permissions. Aliased as: drupalCreateUser | |
UserCreationTrait:: |
protected | function | Grant permissions to a user role. Aliased as: drupalGrantPermissions | |
UserCreationTrait:: |
protected | function | Switch the current logged in user. Aliased as: drupalSetCurrentUser | |
UserCreationTrait:: |
protected | function | Creates a random user account and sets it as current user. Aliased as: drupalSetUpCurrentUser |