class GroupLevelAccessTest in Organic groups 8
Tests user access to group level entity operations and permissions.
@coversDefaultClass \Drupal\og\OgAccess @group og
Hierarchy
- class \Drupal\KernelTests\KernelTestBase extends \PHPUnit\Framework\TestCase implements ServiceProviderInterface uses AssertContentTrait, AssertLegacyTrait, AssertHelperTrait, ConfigTestTrait, PhpunitCompatibilityTrait, RandomGeneratorTrait, TestRequirementsTrait
- class \Drupal\Tests\og\Kernel\Access\GroupLevelAccessTest
Expanded class hierarchy of GroupLevelAccessTest
File
- tests/
src/ Kernel/ Access/ GroupLevelAccessTest.php, line 23
Namespace
Drupal\Tests\og\Kernel\AccessView source
class GroupLevelAccessTest extends KernelTestBase {
/**
* {@inheritdoc}
*/
public static $modules = [
'system',
'user',
'field',
'og',
'entity_test',
];
/**
* The OgAccess service, this is the system under test.
*
* @var \Drupal\og\OgAccessInterface
*/
protected $ogAccess;
/**
* A user object.
*
* @var \Drupal\user\Entity\User
*/
protected $nonMemberUser;
/**
* The group owner.
*
* @var \Drupal\user\Entity\User
*/
protected $ownerUser;
/**
* An admin user.
*
* @var \Drupal\user\Entity\User
*/
protected $adminUser;
/**
* A second administrator which has an alternative administration role.
*
* @var \Drupal\user\Entity\User
*/
protected $alternativeAdminUser;
/**
* A group entity.
*
* @var \Drupal\entity_test\Entity\EntityTest
*/
protected $group;
/**
* The machine name of the group's bundle.
*
* @var string
*/
protected $groupBundle;
/**
* {@inheritdoc}
*/
protected function setUp() : void {
parent::setUp();
$this
->installConfig([
'og',
]);
$this
->installEntitySchema('og_membership');
$this
->installEntitySchema('user');
$this
->installEntitySchema('entity_test');
$this
->installSchema('system', 'sequences');
$this->ogAccess = $this->container
->get('og.access');
// Declare the test entity as being a group.
$this->groupBundle = mb_strtolower($this
->randomMachineName());
Og::groupTypeManager()
->addGroup('entity_test', $this->groupBundle);
// Create users, and make sure user ID 1 isn't used.
User::create([
'name' => $this
->randomString(),
])
->save();
// Create a user that represents the group owner.
$this->ownerUser = User::create([
'name' => $this
->randomString(),
]);
$this->ownerUser
->save();
// Create a group and associate with the group owner.
$this->group = EntityTest::create([
'type' => $this->groupBundle,
'name' => $this
->randomString(),
'user_id' => $this->ownerUser
->id(),
]);
$this->group
->save();
// Create a non-member.
$this->nonMemberUser = User::create([
'name' => $this
->randomString(),
]);
$this->nonMemberUser
->save();
// Create an administrator user using the role that is created automatically
// when the group is created.
// @see \Drupal\og\EventSubscriber\OgEventSubscriber::provideDefaultRoles()
$admin_role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ADMINISTRATOR);
$this->adminUser = $this
->createUserWithOgRole($admin_role);
// Create another administrator role and assign it to a second test user.
// This is a supported use case: it is possible to have multiple
// administration roles.
/** @var \Drupal\og\OgRoleInterface $alternative_admin_role */
$alternative_admin_role = $this
->createOgRole([], TRUE);
$this->alternativeAdminUser = $this
->createUserWithOgRole($alternative_admin_role);
}
/**
* Test access to an arbitrary permission.
*
* @covers ::userAccess
*/
public function testUserAccessArbitraryPermissions() {
[
$roles,
$users,
] = $this
->setupUserAccessArbitraryPermissions();
// Check the user that has an arbitrary permission in both groups. It should
// have permission to the permission in group 1.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $users['has_permission_in_both_groups'])
->isAllowed());
// This user should not have access to 'some_perm_2' as that was only
// assigned to group 2.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm_2', $users['has_permission_in_both_groups'])
->isNeutral());
// Check the permission of group 1 again.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $users['has_permission_in_both_groups'])
->isAllowed());
// A member user without the correct role.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $users['has_no_permission'])
->isNeutral());
// A non-member user.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->nonMemberUser)
->isNeutral());
// Grant the arbitrary permission to non-members and check that our
// non-member now has the permission.
/** @var \Drupal\og\Entity\OgRole $role */
$role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ANONYMOUS);
$role
->grantPermission('some_perm')
->save();
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->nonMemberUser)
->isAllowed());
// Revoke the arbitrary permission again for non-members and check that our
// poor non-member loses the permission.
$role
->revokePermission('some_perm')
->save();
$this
->assertFalse($this->ogAccess
->userAccess($this->group, 'some_perm', $this->nonMemberUser)
->isAllowed());
// Make the non-member a member with the role. They should regain the
// permission.
$membership = Og::createMembership($this->group, $this->nonMemberUser);
$membership
->addRole($roles['arbitrary_permission'])
->save();
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->nonMemberUser)
->isAllowed());
// Group admin user should have access regardless.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->adminUser)
->isAllowed());
$this
->assertTrue($this->ogAccess
->userAccess($this->group, $this
->randomMachineName(), $this->adminUser)
->isAllowed());
// Also group admins that have a custom admin role should have access.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->alternativeAdminUser)
->isAllowed());
$this
->assertTrue($this->ogAccess
->userAccess($this->group, $this
->randomMachineName(), $this->alternativeAdminUser)
->isAllowed());
// The admin user should no longer have access if the role is demoted from
// being an admin role.
$admin_role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ADMINISTRATOR);
$admin_role
->setIsAdmin(FALSE)
->save();
$this
->assertFalse($this->ogAccess
->userAccess($this->group, 'some_perm', $this->adminUser)
->isAllowed());
$this
->assertFalse($this->ogAccess
->userAccess($this->group, $this
->randomMachineName(), $this->adminUser)
->isAllowed());
// The group owner should have access using the default configuration.
$this
->assertTrue($this->ogAccess
->userAccess($this->group, 'some_perm', $this->ownerUser)
->isAllowed());
// Change the configuration to no longer grant full access to the group
// owner. This should revoke access.
$this
->config('og.settings')
->set('group_manager_full_access', FALSE)
->save();
$this
->assertFalse($this->ogAccess
->userAccess($this->group, 'some_perm', $this->ownerUser)
->isAllowed());
}
/**
* Sets up a matrix of users and roles with arbitrary permissions.
*
* @return array[]
* A tuple containing the created test roles and users.
*/
protected function setupUserAccessArbitraryPermissions() {
$roles = [];
$users = [];
// Create another group to test per group/per account permission caching.
// This is a group of the same entity type and bundle.
$alternate_group = EntityTest::create([
'type' => $this->groupBundle,
'name' => $this
->randomString(),
'user_id' => $this->ownerUser
->id(),
]);
$alternate_group
->save();
// Create a role with an arbitrary permission to test with.
$roles['arbitrary_permission'] = $this
->createOgRole([
'some_perm',
]);
// Create a role with an arbitrary permission which will only be granted to
// a member of the second group.
$alternate_role = OgRole::create();
$alternate_role
->setName($this
->randomMachineName())
->setLabel($this
->randomString())
->setGroupType($alternate_group
->getEntityTypeId())
->setGroupBundle($alternate_group
->bundle())
->grantPermission('some_perm_2')
->save();
$roles['alternate'] = $alternate_role;
// Create a user which is a member of both test groups and has an arbitrary
// permission in both. This allows us to test that permissions do not leak
// between different groups.
$user = $this
->createUserWithOgRole($roles['arbitrary_permission']);
$membership = Og::createMembership($alternate_group, $user);
$membership
->addRole($alternate_role)
->save();
$users['has_permission_in_both_groups'] = $user;
// Create a user which is a member and has a role without any permissions.
$role_without_permissions = $this
->createOgRole();
$user = $this
->createUserWithOgRole($role_without_permissions);
$users['has_no_permission'] = $user;
return [
$roles,
$users,
];
}
/**
* Test access to the entity operation permissions on groups.
*
* This tests that the entity operations "update" and "delete" are controlled
* by the respective group level permissions.
*
* @covers ::userAccessEntityOperation
* @dataProvider groupEntityOperationPermissionsTestProvider
*/
public function testGroupEntityOperationPermissions(string $user, array $access_matrix) : void {
$users = $this
->setupGroupEntityOperationPermissions();
$user = $users[$user];
foreach ($access_matrix as $operation => $expected_access) {
// Check that the correct access is returned.
$result = $this->ogAccess
->userAccessEntityOperation($operation, $this->group, $user);
$this
->assertEquals($expected_access, $result
->isAllowed());
// Also check that the access result is correctly communicated to
// hook_entity_access().
$arguments = [
$this->group,
$operation,
$user,
];
$hook_result = \Drupal::moduleHandler()
->invokeAll('entity_access', $arguments);
// The hook returns an array of access results, add them all up.
if (empty($hook_result)) {
$result = AccessResult::neutral();
}
else {
/** @var \Drupal\Core\Access\AccessResultInterface $result */
$result = array_shift($hook_result);
foreach ($hook_result as $other) {
$result = $result
->orIf($other);
}
}
$this
->assertEquals($expected_access, $result
->isAllowed());
}
}
/**
* Returns test users with permissions to perform group entity operations.
*
* @return \Drupal\user\UserInterface[]
* The test users.
*/
protected function setupGroupEntityOperationPermissions() : array {
// Return the users from the generic test setup.
$users = [
'owner' => $this->ownerUser,
'non-member' => $this->nonMemberUser,
'admin' => $this->adminUser,
'alternative-admin' => $this->alternativeAdminUser,
];
// A group member with the group level permission 'update group' which maps
// to the 'update' entity operation.
$role_with_update_permission = $this
->createOgRole([
OgAccess::UPDATE_GROUP_PERMISSION,
]);
$user = $this
->createUserWithOgRole($role_with_update_permission);
$users['update'] = $user;
// A group member with the group level permission 'delete group' which maps
// to the 'delete' entity operation.
$role_with_delete_permission = $this
->createOgRole([
OgAccess::DELETE_GROUP_PERMISSION,
]);
$user = $this
->createUserWithOgRole($role_with_delete_permission);
$users['delete'] = $user;
return $users;
}
/**
* Provides test data to check access to group level entity permissions.
*
* @see ::testDefaultGroupPermissions()
*/
public function groupEntityOperationPermissionsTestProvider() : array {
return [
[
// The user performing the entity operations.
'owner',
// Whether or not the user should have access to the group entity
// operation.
[
'update' => TRUE,
'delete' => TRUE,
],
],
[
'non-member',
[
'update' => FALSE,
'delete' => FALSE,
],
],
[
'delete',
[
'update' => FALSE,
'delete' => TRUE,
],
],
[
'update',
[
'update' => TRUE,
'delete' => FALSE,
],
],
[
'admin',
[
'update' => TRUE,
'delete' => TRUE,
],
],
[
'alternative-admin',
[
'update' => TRUE,
'delete' => TRUE,
],
],
];
}
/**
* Creates an OG role with the given permissions and admin flag.
*
* @param string[] $permissions
* The permissions to set on the role.
* @param bool $is_admin
* Whether or not this is an admin role.
*
* @return \Drupal\og\OgRoleInterface
* The newly created role.
*/
protected function createOgRole(array $permissions = [], bool $is_admin = FALSE) : OgRoleInterface {
/** @var \Drupal\og\OgRoleInterface $role */
$role = OgRole::create();
$role
->setName($this
->randomMachineName())
->setLabel($this
->randomString())
->setGroupType($this->group
->getEntityTypeId())
->setGroupBundle($this->groupBundle)
->setIsAdmin($is_admin);
foreach ($permissions as $permission) {
$role
->grantPermission($permission);
}
$role
->save();
return $role;
}
/**
* Creates a test user and assigns it a membership with the given role.
*
* @param \Drupal\og\OgRoleInterface $role
* The OG role to assign to the newly created user.
*
* @return \Drupal\user\UserInterface
* The newly created user.
*/
protected function createUserWithOgRole(OgRoleInterface $role) : UserInterface {
$user = User::create([
'name' => $this
->randomString(),
]);
$user
->save();
$membership = Og::createMembership($this->group, $user);
$membership
->addRole($role)
->save();
return $user;
}
}
Members
Name | Modifiers | Type | Description | Overrides |
---|---|---|---|---|
AssertContentTrait:: |
protected | property | The current raw content. | |
AssertContentTrait:: |
protected | property | The drupalSettings value from the current raw $content. | |
AssertContentTrait:: |
protected | property | The XML structure parsed from the current raw $content. | 1 |
AssertContentTrait:: |
protected | property | The plain-text content of raw $content (text nodes). | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS found escaped on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given name or ID. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given ID and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists with the given name and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists in the current page by the given XPath. | |
AssertContentTrait:: |
protected | function | Asserts that a checkbox field in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a field exists in the current page with a given Xpath result. | |
AssertContentTrait:: |
protected | function | Passes if a link with the specified label is found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href (part) is found. | |
AssertContentTrait:: |
protected | function | Asserts that each HTML ID is used for just a single element. | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given name or ID. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given ID and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist with the given name and value. | |
AssertContentTrait:: |
protected | function | Asserts that a field does not exist or its value does not match, by XPath. | |
AssertContentTrait:: |
protected | function | Asserts that a checkbox field in the current page is not checked. | |
AssertContentTrait:: |
protected | function | Passes if a link with the specified label is not found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href (part) is not found. | |
AssertContentTrait:: |
protected | function | Passes if a link containing a given href is not found in the main region. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page does not exist. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is not checked. | |
AssertContentTrait:: |
protected | function | Triggers a pass if the perl regex pattern is not found in raw content. | |
AssertContentTrait:: |
protected | function | Passes if the raw text is NOT found on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Passes if the page (with HTML stripped) does not contains the text. | |
AssertContentTrait:: |
protected | function | Pass if the page title is not the given string. | |
AssertContentTrait:: |
protected | function | Passes if the text is found MORE THAN ONCE on the text version of the page. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page exists. | |
AssertContentTrait:: |
protected | function | Asserts that a select option with the visible text exists. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page is checked. | |
AssertContentTrait:: |
protected | function | Asserts that a select option in the current page exists. | |
AssertContentTrait:: |
protected | function | Triggers a pass if the Perl regex pattern is found in the raw content. | |
AssertContentTrait:: |
protected | function | Passes if the raw text IS found on the loaded page, fail otherwise. | |
AssertContentTrait:: |
protected | function | Passes if the page (with HTML stripped) contains the text. | |
AssertContentTrait:: |
protected | function | Helper for assertText and assertNoText. | |
AssertContentTrait:: |
protected | function | Asserts that a Perl regex pattern is found in the plain-text content. | |
AssertContentTrait:: |
protected | function | Asserts themed output. | |
AssertContentTrait:: |
protected | function | Pass if the page title is the given string. | |
AssertContentTrait:: |
protected | function | Passes if the text is found ONLY ONCE on the text version of the page. | |
AssertContentTrait:: |
protected | function | Helper for assertUniqueText and assertNoUniqueText. | |
AssertContentTrait:: |
protected | function | Builds an XPath query. | |
AssertContentTrait:: |
protected | function | Helper: Constructs an XPath for the given set of attributes and value. | |
AssertContentTrait:: |
protected | function | Searches elements using a CSS selector in the raw content. | |
AssertContentTrait:: |
protected | function | Get all option elements, including nested options, in a select. | |
AssertContentTrait:: |
protected | function | Gets the value of drupalSettings for the currently-loaded page. | |
AssertContentTrait:: |
protected | function | Gets the current raw content. | |
AssertContentTrait:: |
protected | function | Get the selected value from a select field. | |
AssertContentTrait:: |
protected | function | Retrieves the plain-text content from the current raw content. | |
AssertContentTrait:: |
protected | function | Get the current URL from the cURL handler. | 1 |
AssertContentTrait:: |
protected | function | Parse content returned from curlExec using DOM and SimpleXML. | |
AssertContentTrait:: |
protected | function | Removes all white-space between HTML tags from the raw content. | |
AssertContentTrait:: |
protected | function | Sets the value of drupalSettings for the currently-loaded page. | |
AssertContentTrait:: |
protected | function | Sets the raw content (e.g. HTML). | |
AssertContentTrait:: |
protected | function | Performs an xpath search on the contents of the internal browser. | |
AssertHelperTrait:: |
protected static | function | Casts MarkupInterface objects into strings. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertSame() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotEquals() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotSame() instead. | |
AssertLegacyTrait:: |
protected | function | Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead. | |
AssertLegacyTrait:: |
protected | function | ||
ConfigTestTrait:: |
protected | function | Returns a ConfigImporter object to import test configuration. | |
ConfigTestTrait:: |
protected | function | Copies configuration objects from source storage to target storage. | |
GroupLevelAccessTest:: |
protected | property | An admin user. | |
GroupLevelAccessTest:: |
protected | property | A second administrator which has an alternative administration role. | |
GroupLevelAccessTest:: |
protected | property | A group entity. | |
GroupLevelAccessTest:: |
protected | property | The machine name of the group's bundle. | |
GroupLevelAccessTest:: |
public static | property |
Modules to enable. Overrides KernelTestBase:: |
|
GroupLevelAccessTest:: |
protected | property | A user object. | |
GroupLevelAccessTest:: |
protected | property | The OgAccess service, this is the system under test. | |
GroupLevelAccessTest:: |
protected | property | The group owner. | |
GroupLevelAccessTest:: |
protected | function | Creates an OG role with the given permissions and admin flag. | |
GroupLevelAccessTest:: |
protected | function | Creates a test user and assigns it a membership with the given role. | |
GroupLevelAccessTest:: |
public | function | Provides test data to check access to group level entity permissions. | |
GroupLevelAccessTest:: |
protected | function |
Overrides KernelTestBase:: |
|
GroupLevelAccessTest:: |
protected | function | Returns test users with permissions to perform group entity operations. | |
GroupLevelAccessTest:: |
protected | function | Sets up a matrix of users and roles with arbitrary permissions. | |
GroupLevelAccessTest:: |
public | function | Test access to the entity operation permissions on groups. | |
GroupLevelAccessTest:: |
public | function | Test access to an arbitrary permission. | |
KernelTestBase:: |
protected | property | Back up and restore any global variables that may be changed by tests. | |
KernelTestBase:: |
protected | property | Back up and restore static class properties that may be changed by tests. | |
KernelTestBase:: |
protected | property | Contains a few static class properties for performance. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | @todo Move into Config test base class. | 7 |
KernelTestBase:: |
protected static | property | An array of config object names that are excluded from schema checking. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | Do not forward any global state from the parent process to the processes that run the actual tests. | |
KernelTestBase:: |
protected | property | The app root. | |
KernelTestBase:: |
protected | property | Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property. | |
KernelTestBase:: |
protected | property | ||
KernelTestBase:: |
protected | property | Set to TRUE to strict check all configuration saved. | 6 |
KernelTestBase:: |
protected | property | The virtual filesystem root directory. | |
KernelTestBase:: |
protected | function | 1 | |
KernelTestBase:: |
protected | function | Bootstraps a basic test environment. | |
KernelTestBase:: |
private | function | Bootstraps a kernel for a test. | |
KernelTestBase:: |
protected | function | Configuration accessor for tests. Returns non-overridden configuration. | |
KernelTestBase:: |
protected | function | Disables modules for this test. | |
KernelTestBase:: |
protected | function | Enables modules for this test. | |
KernelTestBase:: |
protected | function | Gets the config schema exclusions for this test. | |
KernelTestBase:: |
protected | function | Returns the Database connection info to be used for this test. | 1 |
KernelTestBase:: |
public | function | ||
KernelTestBase:: |
private | function | Returns Extension objects for $modules to enable. | |
KernelTestBase:: |
private static | function | Returns the modules to enable for this test. | |
KernelTestBase:: |
protected | function | Initializes the FileCache component. | |
KernelTestBase:: |
protected | function | Installs default configuration for a given list of modules. | |
KernelTestBase:: |
protected | function | Installs the storage schema for a specific entity type. | |
KernelTestBase:: |
protected | function | Installs database tables from a module schema definition. | |
KernelTestBase:: |
protected | function | Returns whether the current test method is running in a separate process. | |
KernelTestBase:: |
protected | function | ||
KernelTestBase:: |
public | function |
Registers test-specific services. Overrides ServiceProviderInterface:: |
26 |
KernelTestBase:: |
protected | function | Renders a render array. | 1 |
KernelTestBase:: |
protected | function | Sets the install profile and rebuilds the container to update it. | |
KernelTestBase:: |
protected | function | Sets an in-memory Settings variable. | |
KernelTestBase:: |
public static | function | 1 | |
KernelTestBase:: |
protected | function | Sets up the filesystem, so things like the file directory. | 2 |
KernelTestBase:: |
protected | function | Stops test execution. | |
KernelTestBase:: |
protected | function | 6 | |
KernelTestBase:: |
public | function | @after | |
KernelTestBase:: |
protected | function | Dumps the current state of the virtual filesystem to STDOUT. | |
KernelTestBase:: |
public | function | BC: Automatically resolve former KernelTestBase class properties. | |
KernelTestBase:: |
public | function | Prevents serializing any properties. | |
PhpunitCompatibilityTrait:: |
public | function | Returns a mock object for the specified class using the available method. | |
PhpunitCompatibilityTrait:: |
public | function | Compatibility layer for PHPUnit 6 to support PHPUnit 4 code. | |
RandomGeneratorTrait:: |
protected | property | The random generator. | |
RandomGeneratorTrait:: |
protected | function | Gets the random generator for the utility methods. | |
RandomGeneratorTrait:: |
protected | function | Generates a unique random string containing letters and numbers. | 1 |
RandomGeneratorTrait:: |
public | function | Generates a random PHP object. | |
RandomGeneratorTrait:: |
public | function | Generates a pseudo-random string of ASCII characters of codes 32 to 126. | |
RandomGeneratorTrait:: |
public | function | Callback for random string validation. | |
StorageCopyTrait:: |
protected static | function | Copy the configuration from one storage to another and remove stale items. | |
TestRequirementsTrait:: |
private | function | Checks missing module requirements. | |
TestRequirementsTrait:: |
protected | function | Check module requirements for the Drupal use case. | 1 |
TestRequirementsTrait:: |
protected static | function | Returns the Drupal root directory. |