You are here

class GroupLevelAccessTest in Organic groups 8

Tests user access to group level entity operations and permissions.

@coversDefaultClass \Drupal\og\OgAccess @group og

Hierarchy

Expanded class hierarchy of GroupLevelAccessTest

File

tests/src/Kernel/Access/GroupLevelAccessTest.php, line 23

Namespace

Drupal\Tests\og\Kernel\Access
View source
class GroupLevelAccessTest extends KernelTestBase {

  /**
   * {@inheritdoc}
   */
  public static $modules = [
    'system',
    'user',
    'field',
    'og',
    'entity_test',
  ];

  /**
   * The OgAccess service, this is the system under test.
   *
   * @var \Drupal\og\OgAccessInterface
   */
  protected $ogAccess;

  /**
   * A user object.
   *
   * @var \Drupal\user\Entity\User
   */
  protected $nonMemberUser;

  /**
   * The group owner.
   *
   * @var \Drupal\user\Entity\User
   */
  protected $ownerUser;

  /**
   * An admin user.
   *
   * @var \Drupal\user\Entity\User
   */
  protected $adminUser;

  /**
   * A second administrator which has an alternative administration role.
   *
   * @var \Drupal\user\Entity\User
   */
  protected $alternativeAdminUser;

  /**
   * A group entity.
   *
   * @var \Drupal\entity_test\Entity\EntityTest
   */
  protected $group;

  /**
   * The machine name of the group's bundle.
   *
   * @var string
   */
  protected $groupBundle;

  /**
   * {@inheritdoc}
   */
  protected function setUp() : void {
    parent::setUp();
    $this
      ->installConfig([
      'og',
    ]);
    $this
      ->installEntitySchema('og_membership');
    $this
      ->installEntitySchema('user');
    $this
      ->installEntitySchema('entity_test');
    $this
      ->installSchema('system', 'sequences');
    $this->ogAccess = $this->container
      ->get('og.access');

    // Declare the test entity as being a group.
    $this->groupBundle = mb_strtolower($this
      ->randomMachineName());
    Og::groupTypeManager()
      ->addGroup('entity_test', $this->groupBundle);

    // Create users, and make sure user ID 1 isn't used.
    User::create([
      'name' => $this
        ->randomString(),
    ])
      ->save();

    // Create a user that represents the group owner.
    $this->ownerUser = User::create([
      'name' => $this
        ->randomString(),
    ]);
    $this->ownerUser
      ->save();

    // Create a group and associate with the group owner.
    $this->group = EntityTest::create([
      'type' => $this->groupBundle,
      'name' => $this
        ->randomString(),
      'user_id' => $this->ownerUser
        ->id(),
    ]);
    $this->group
      ->save();

    // Create a non-member.
    $this->nonMemberUser = User::create([
      'name' => $this
        ->randomString(),
    ]);
    $this->nonMemberUser
      ->save();

    // Create an administrator user using the role that is created automatically
    // when the group is created.
    // @see \Drupal\og\EventSubscriber\OgEventSubscriber::provideDefaultRoles()
    $admin_role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ADMINISTRATOR);
    $this->adminUser = $this
      ->createUserWithOgRole($admin_role);

    // Create another administrator role and assign it to a second test user.
    // This is a supported use case: it is possible to have multiple
    // administration roles.

    /** @var \Drupal\og\OgRoleInterface $alternative_admin_role */
    $alternative_admin_role = $this
      ->createOgRole([], TRUE);
    $this->alternativeAdminUser = $this
      ->createUserWithOgRole($alternative_admin_role);
  }

  /**
   * Test access to an arbitrary permission.
   *
   * @covers ::userAccess
   */
  public function testUserAccessArbitraryPermissions() {
    [
      $roles,
      $users,
    ] = $this
      ->setupUserAccessArbitraryPermissions();

    // Check the user that has an arbitrary permission in both groups. It should
    // have permission to the permission in group 1.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $users['has_permission_in_both_groups'])
      ->isAllowed());

    // This user should not have access to 'some_perm_2' as that was only
    // assigned to group 2.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm_2', $users['has_permission_in_both_groups'])
      ->isNeutral());

    // Check the permission of group 1 again.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $users['has_permission_in_both_groups'])
      ->isAllowed());

    // A member user without the correct role.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $users['has_no_permission'])
      ->isNeutral());

    // A non-member user.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->nonMemberUser)
      ->isNeutral());

    // Grant the arbitrary permission to non-members and check that our
    // non-member now has the permission.

    /** @var \Drupal\og\Entity\OgRole $role */
    $role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ANONYMOUS);
    $role
      ->grantPermission('some_perm')
      ->save();
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->nonMemberUser)
      ->isAllowed());

    // Revoke the arbitrary permission again for non-members and check that our
    // poor non-member loses the permission.
    $role
      ->revokePermission('some_perm')
      ->save();
    $this
      ->assertFalse($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->nonMemberUser)
      ->isAllowed());

    // Make the non-member a member with the role. They should regain the
    // permission.
    $membership = Og::createMembership($this->group, $this->nonMemberUser);
    $membership
      ->addRole($roles['arbitrary_permission'])
      ->save();
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->nonMemberUser)
      ->isAllowed());

    // Group admin user should have access regardless.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->adminUser)
      ->isAllowed());
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, $this
      ->randomMachineName(), $this->adminUser)
      ->isAllowed());

    // Also group admins that have a custom admin role should have access.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->alternativeAdminUser)
      ->isAllowed());
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, $this
      ->randomMachineName(), $this->alternativeAdminUser)
      ->isAllowed());

    // The admin user should no longer have access if the role is demoted from
    // being an admin role.
    $admin_role = OgRole::loadByGroupAndName($this->group, OgRoleInterface::ADMINISTRATOR);
    $admin_role
      ->setIsAdmin(FALSE)
      ->save();
    $this
      ->assertFalse($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->adminUser)
      ->isAllowed());
    $this
      ->assertFalse($this->ogAccess
      ->userAccess($this->group, $this
      ->randomMachineName(), $this->adminUser)
      ->isAllowed());

    // The group owner should have access using the default configuration.
    $this
      ->assertTrue($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->ownerUser)
      ->isAllowed());

    // Change the configuration to no longer grant full access to the group
    // owner. This should revoke access.
    $this
      ->config('og.settings')
      ->set('group_manager_full_access', FALSE)
      ->save();
    $this
      ->assertFalse($this->ogAccess
      ->userAccess($this->group, 'some_perm', $this->ownerUser)
      ->isAllowed());
  }

  /**
   * Sets up a matrix of users and roles with arbitrary permissions.
   *
   * @return array[]
   *   A tuple containing the created test roles and users.
   */
  protected function setupUserAccessArbitraryPermissions() {
    $roles = [];
    $users = [];

    // Create another group to test per group/per account permission caching.
    // This is a group of the same entity type and bundle.
    $alternate_group = EntityTest::create([
      'type' => $this->groupBundle,
      'name' => $this
        ->randomString(),
      'user_id' => $this->ownerUser
        ->id(),
    ]);
    $alternate_group
      ->save();

    // Create a role with an arbitrary permission to test with.
    $roles['arbitrary_permission'] = $this
      ->createOgRole([
      'some_perm',
    ]);

    // Create a role with an arbitrary permission which will only be granted to
    // a member of the second group.
    $alternate_role = OgRole::create();
    $alternate_role
      ->setName($this
      ->randomMachineName())
      ->setLabel($this
      ->randomString())
      ->setGroupType($alternate_group
      ->getEntityTypeId())
      ->setGroupBundle($alternate_group
      ->bundle())
      ->grantPermission('some_perm_2')
      ->save();
    $roles['alternate'] = $alternate_role;

    // Create a user which is a member of both test groups and has an arbitrary
    // permission in both. This allows us to test that permissions do not leak
    // between different groups.
    $user = $this
      ->createUserWithOgRole($roles['arbitrary_permission']);
    $membership = Og::createMembership($alternate_group, $user);
    $membership
      ->addRole($alternate_role)
      ->save();
    $users['has_permission_in_both_groups'] = $user;

    // Create a user which is a member and has a role without any permissions.
    $role_without_permissions = $this
      ->createOgRole();
    $user = $this
      ->createUserWithOgRole($role_without_permissions);
    $users['has_no_permission'] = $user;
    return [
      $roles,
      $users,
    ];
  }

  /**
   * Test access to the entity operation permissions on groups.
   *
   * This tests that the entity operations "update" and "delete" are controlled
   * by the respective group level permissions.
   *
   * @covers ::userAccessEntityOperation
   * @dataProvider groupEntityOperationPermissionsTestProvider
   */
  public function testGroupEntityOperationPermissions(string $user, array $access_matrix) : void {
    $users = $this
      ->setupGroupEntityOperationPermissions();
    $user = $users[$user];
    foreach ($access_matrix as $operation => $expected_access) {

      // Check that the correct access is returned.
      $result = $this->ogAccess
        ->userAccessEntityOperation($operation, $this->group, $user);
      $this
        ->assertEquals($expected_access, $result
        ->isAllowed());

      // Also check that the access result is correctly communicated to
      // hook_entity_access().
      $arguments = [
        $this->group,
        $operation,
        $user,
      ];
      $hook_result = \Drupal::moduleHandler()
        ->invokeAll('entity_access', $arguments);

      // The hook returns an array of access results, add them all up.
      if (empty($hook_result)) {
        $result = AccessResult::neutral();
      }
      else {

        /** @var \Drupal\Core\Access\AccessResultInterface $result */
        $result = array_shift($hook_result);
        foreach ($hook_result as $other) {
          $result = $result
            ->orIf($other);
        }
      }
      $this
        ->assertEquals($expected_access, $result
        ->isAllowed());
    }
  }

  /**
   * Returns test users with permissions to perform group entity operations.
   *
   * @return \Drupal\user\UserInterface[]
   *   The test users.
   */
  protected function setupGroupEntityOperationPermissions() : array {

    // Return the users from the generic test setup.
    $users = [
      'owner' => $this->ownerUser,
      'non-member' => $this->nonMemberUser,
      'admin' => $this->adminUser,
      'alternative-admin' => $this->alternativeAdminUser,
    ];

    // A group member with the group level permission 'update group' which maps
    // to the 'update' entity operation.
    $role_with_update_permission = $this
      ->createOgRole([
      OgAccess::UPDATE_GROUP_PERMISSION,
    ]);
    $user = $this
      ->createUserWithOgRole($role_with_update_permission);
    $users['update'] = $user;

    // A group member with the group level permission 'delete group' which maps
    // to the 'delete' entity operation.
    $role_with_delete_permission = $this
      ->createOgRole([
      OgAccess::DELETE_GROUP_PERMISSION,
    ]);
    $user = $this
      ->createUserWithOgRole($role_with_delete_permission);
    $users['delete'] = $user;
    return $users;
  }

  /**
   * Provides test data to check access to group level entity permissions.
   *
   * @see ::testDefaultGroupPermissions()
   */
  public function groupEntityOperationPermissionsTestProvider() : array {
    return [
      [
        // The user performing the entity operations.
        'owner',
        // Whether or not the user should have access to the group entity
        // operation.
        [
          'update' => TRUE,
          'delete' => TRUE,
        ],
      ],
      [
        'non-member',
        [
          'update' => FALSE,
          'delete' => FALSE,
        ],
      ],
      [
        'delete',
        [
          'update' => FALSE,
          'delete' => TRUE,
        ],
      ],
      [
        'update',
        [
          'update' => TRUE,
          'delete' => FALSE,
        ],
      ],
      [
        'admin',
        [
          'update' => TRUE,
          'delete' => TRUE,
        ],
      ],
      [
        'alternative-admin',
        [
          'update' => TRUE,
          'delete' => TRUE,
        ],
      ],
    ];
  }

  /**
   * Creates an OG role with the given permissions and admin flag.
   *
   * @param string[] $permissions
   *   The permissions to set on the role.
   * @param bool $is_admin
   *   Whether or not this is an admin role.
   *
   * @return \Drupal\og\OgRoleInterface
   *   The newly created role.
   */
  protected function createOgRole(array $permissions = [], bool $is_admin = FALSE) : OgRoleInterface {

    /** @var \Drupal\og\OgRoleInterface $role */
    $role = OgRole::create();
    $role
      ->setName($this
      ->randomMachineName())
      ->setLabel($this
      ->randomString())
      ->setGroupType($this->group
      ->getEntityTypeId())
      ->setGroupBundle($this->groupBundle)
      ->setIsAdmin($is_admin);
    foreach ($permissions as $permission) {
      $role
        ->grantPermission($permission);
    }
    $role
      ->save();
    return $role;
  }

  /**
   * Creates a test user and assigns it a membership with the given role.
   *
   * @param \Drupal\og\OgRoleInterface $role
   *   The OG role to assign to the newly created user.
   *
   * @return \Drupal\user\UserInterface
   *   The newly created user.
   */
  protected function createUserWithOgRole(OgRoleInterface $role) : UserInterface {
    $user = User::create([
      'name' => $this
        ->randomString(),
    ]);
    $user
      ->save();
    $membership = Og::createMembership($this->group, $user);
    $membership
      ->addRole($role)
      ->save();
    return $user;
  }

}

Members

Namesort descending Modifiers Type Description Overrides
AssertContentTrait::$content protected property The current raw content.
AssertContentTrait::$drupalSettings protected property The drupalSettings value from the current raw $content.
AssertContentTrait::$elements protected property The XML structure parsed from the current raw $content. 1
AssertContentTrait::$plainTextContent protected property The plain-text content of raw $content (text nodes).
AssertContentTrait::assertEscaped protected function Passes if the raw text IS found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertField protected function Asserts that a field exists with the given name or ID.
AssertContentTrait::assertFieldById protected function Asserts that a field exists with the given ID and value.
AssertContentTrait::assertFieldByName protected function Asserts that a field exists with the given name and value.
AssertContentTrait::assertFieldByXPath protected function Asserts that a field exists in the current page by the given XPath.
AssertContentTrait::assertFieldChecked protected function Asserts that a checkbox field in the current page is checked.
AssertContentTrait::assertFieldsByValue protected function Asserts that a field exists in the current page with a given Xpath result.
AssertContentTrait::assertLink protected function Passes if a link with the specified label is found.
AssertContentTrait::assertLinkByHref protected function Passes if a link containing a given href (part) is found.
AssertContentTrait::assertNoDuplicateIds protected function Asserts that each HTML ID is used for just a single element.
AssertContentTrait::assertNoEscaped protected function Passes if the raw text IS NOT found escaped on the loaded page, fail otherwise.
AssertContentTrait::assertNoField protected function Asserts that a field does not exist with the given name or ID.
AssertContentTrait::assertNoFieldById protected function Asserts that a field does not exist with the given ID and value.
AssertContentTrait::assertNoFieldByName protected function Asserts that a field does not exist with the given name and value.
AssertContentTrait::assertNoFieldByXPath protected function Asserts that a field does not exist or its value does not match, by XPath.
AssertContentTrait::assertNoFieldChecked protected function Asserts that a checkbox field in the current page is not checked.
AssertContentTrait::assertNoLink protected function Passes if a link with the specified label is not found.
AssertContentTrait::assertNoLinkByHref protected function Passes if a link containing a given href (part) is not found.
AssertContentTrait::assertNoLinkByHrefInMainRegion protected function Passes if a link containing a given href is not found in the main region.
AssertContentTrait::assertNoOption protected function Asserts that a select option in the current page does not exist.
AssertContentTrait::assertNoOptionSelected protected function Asserts that a select option in the current page is not checked.
AssertContentTrait::assertNoPattern protected function Triggers a pass if the perl regex pattern is not found in raw content.
AssertContentTrait::assertNoRaw protected function Passes if the raw text is NOT found on the loaded page, fail otherwise.
AssertContentTrait::assertNoText protected function Passes if the page (with HTML stripped) does not contains the text.
AssertContentTrait::assertNoTitle protected function Pass if the page title is not the given string.
AssertContentTrait::assertNoUniqueText protected function Passes if the text is found MORE THAN ONCE on the text version of the page.
AssertContentTrait::assertOption protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertOptionByText protected function Asserts that a select option with the visible text exists.
AssertContentTrait::assertOptionSelected protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionSelectedWithDrupalSelector protected function Asserts that a select option in the current page is checked.
AssertContentTrait::assertOptionWithDrupalSelector protected function Asserts that a select option in the current page exists.
AssertContentTrait::assertPattern protected function Triggers a pass if the Perl regex pattern is found in the raw content.
AssertContentTrait::assertRaw protected function Passes if the raw text IS found on the loaded page, fail otherwise.
AssertContentTrait::assertText protected function Passes if the page (with HTML stripped) contains the text.
AssertContentTrait::assertTextHelper protected function Helper for assertText and assertNoText.
AssertContentTrait::assertTextPattern protected function Asserts that a Perl regex pattern is found in the plain-text content.
AssertContentTrait::assertThemeOutput protected function Asserts themed output.
AssertContentTrait::assertTitle protected function Pass if the page title is the given string.
AssertContentTrait::assertUniqueText protected function Passes if the text is found ONLY ONCE on the text version of the page.
AssertContentTrait::assertUniqueTextHelper protected function Helper for assertUniqueText and assertNoUniqueText.
AssertContentTrait::buildXPathQuery protected function Builds an XPath query.
AssertContentTrait::constructFieldXpath protected function Helper: Constructs an XPath for the given set of attributes and value.
AssertContentTrait::cssSelect protected function Searches elements using a CSS selector in the raw content.
AssertContentTrait::getAllOptions protected function Get all option elements, including nested options, in a select.
AssertContentTrait::getDrupalSettings protected function Gets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::getRawContent protected function Gets the current raw content.
AssertContentTrait::getSelectedItem protected function Get the selected value from a select field.
AssertContentTrait::getTextContent protected function Retrieves the plain-text content from the current raw content.
AssertContentTrait::getUrl protected function Get the current URL from the cURL handler. 1
AssertContentTrait::parse protected function Parse content returned from curlExec using DOM and SimpleXML.
AssertContentTrait::removeWhiteSpace protected function Removes all white-space between HTML tags from the raw content.
AssertContentTrait::setDrupalSettings protected function Sets the value of drupalSettings for the currently-loaded page.
AssertContentTrait::setRawContent protected function Sets the raw content (e.g. HTML).
AssertContentTrait::xpath protected function Performs an xpath search on the contents of the internal browser.
AssertHelperTrait::castSafeStrings protected static function Casts MarkupInterface objects into strings.
AssertLegacyTrait::assert protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::assertEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertSame() instead.
AssertLegacyTrait::assertIdenticalObject protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertEquals() instead.
AssertLegacyTrait::assertNotEqual protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotEquals() instead.
AssertLegacyTrait::assertNotIdentical protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertNotSame() instead.
AssertLegacyTrait::pass protected function Deprecated Scheduled for removal in Drupal 10.0.0. Use self::assertTrue() instead.
AssertLegacyTrait::verbose protected function
ConfigTestTrait::configImporter protected function Returns a ConfigImporter object to import test configuration.
ConfigTestTrait::copyConfig protected function Copies configuration objects from source storage to target storage.
GroupLevelAccessTest::$adminUser protected property An admin user.
GroupLevelAccessTest::$alternativeAdminUser protected property A second administrator which has an alternative administration role.
GroupLevelAccessTest::$group protected property A group entity.
GroupLevelAccessTest::$groupBundle protected property The machine name of the group's bundle.
GroupLevelAccessTest::$modules public static property Modules to enable. Overrides KernelTestBase::$modules
GroupLevelAccessTest::$nonMemberUser protected property A user object.
GroupLevelAccessTest::$ogAccess protected property The OgAccess service, this is the system under test.
GroupLevelAccessTest::$ownerUser protected property The group owner.
GroupLevelAccessTest::createOgRole protected function Creates an OG role with the given permissions and admin flag.
GroupLevelAccessTest::createUserWithOgRole protected function Creates a test user and assigns it a membership with the given role.
GroupLevelAccessTest::groupEntityOperationPermissionsTestProvider public function Provides test data to check access to group level entity permissions.
GroupLevelAccessTest::setUp protected function Overrides KernelTestBase::setUp
GroupLevelAccessTest::setupGroupEntityOperationPermissions protected function Returns test users with permissions to perform group entity operations.
GroupLevelAccessTest::setupUserAccessArbitraryPermissions protected function Sets up a matrix of users and roles with arbitrary permissions.
GroupLevelAccessTest::testGroupEntityOperationPermissions public function Test access to the entity operation permissions on groups.
GroupLevelAccessTest::testUserAccessArbitraryPermissions public function Test access to an arbitrary permission.
KernelTestBase::$backupGlobals protected property Back up and restore any global variables that may be changed by tests.
KernelTestBase::$backupStaticAttributes protected property Back up and restore static class properties that may be changed by tests.
KernelTestBase::$backupStaticAttributesBlacklist protected property Contains a few static class properties for performance.
KernelTestBase::$classLoader protected property
KernelTestBase::$configImporter protected property @todo Move into Config test base class. 7
KernelTestBase::$configSchemaCheckerExclusions protected static property An array of config object names that are excluded from schema checking.
KernelTestBase::$container protected property
KernelTestBase::$databasePrefix protected property
KernelTestBase::$preserveGlobalState protected property Do not forward any global state from the parent process to the processes that run the actual tests.
KernelTestBase::$root protected property The app root.
KernelTestBase::$runTestInSeparateProcess protected property Kernel tests are run in separate processes because they allow autoloading of code from extensions. Running the test in a separate process isolates this behavior from other tests. Subclasses should not override this property.
KernelTestBase::$siteDirectory protected property
KernelTestBase::$strictConfigSchema protected property Set to TRUE to strict check all configuration saved. 6
KernelTestBase::$vfsRoot protected property The virtual filesystem root directory.
KernelTestBase::assertPostConditions protected function 1
KernelTestBase::bootEnvironment protected function Bootstraps a basic test environment.
KernelTestBase::bootKernel private function Bootstraps a kernel for a test.
KernelTestBase::config protected function Configuration accessor for tests. Returns non-overridden configuration.
KernelTestBase::disableModules protected function Disables modules for this test.
KernelTestBase::enableModules protected function Enables modules for this test.
KernelTestBase::getConfigSchemaExclusions protected function Gets the config schema exclusions for this test.
KernelTestBase::getDatabaseConnectionInfo protected function Returns the Database connection info to be used for this test. 1
KernelTestBase::getDatabasePrefix public function
KernelTestBase::getExtensionsForModules private function Returns Extension objects for $modules to enable.
KernelTestBase::getModulesToEnable private static function Returns the modules to enable for this test.
KernelTestBase::initFileCache protected function Initializes the FileCache component.
KernelTestBase::installConfig protected function Installs default configuration for a given list of modules.
KernelTestBase::installEntitySchema protected function Installs the storage schema for a specific entity type.
KernelTestBase::installSchema protected function Installs database tables from a module schema definition.
KernelTestBase::isTestInIsolation Deprecated protected function Returns whether the current test method is running in a separate process.
KernelTestBase::prepareTemplate protected function
KernelTestBase::register public function Registers test-specific services. Overrides ServiceProviderInterface::register 26
KernelTestBase::render protected function Renders a render array. 1
KernelTestBase::setInstallProfile protected function Sets the install profile and rebuilds the container to update it.
KernelTestBase::setSetting protected function Sets an in-memory Settings variable.
KernelTestBase::setUpBeforeClass public static function 1
KernelTestBase::setUpFilesystem protected function Sets up the filesystem, so things like the file directory. 2
KernelTestBase::stop protected function Stops test execution.
KernelTestBase::tearDown protected function 6
KernelTestBase::tearDownCloseDatabaseConnection public function @after
KernelTestBase::vfsDump protected function Dumps the current state of the virtual filesystem to STDOUT.
KernelTestBase::__get Deprecated public function BC: Automatically resolve former KernelTestBase class properties.
KernelTestBase::__sleep public function Prevents serializing any properties.
PhpunitCompatibilityTrait::getMock Deprecated public function Returns a mock object for the specified class using the available method.
PhpunitCompatibilityTrait::setExpectedException Deprecated public function Compatibility layer for PHPUnit 6 to support PHPUnit 4 code.
RandomGeneratorTrait::$randomGenerator protected property The random generator.
RandomGeneratorTrait::getRandomGenerator protected function Gets the random generator for the utility methods.
RandomGeneratorTrait::randomMachineName protected function Generates a unique random string containing letters and numbers. 1
RandomGeneratorTrait::randomObject public function Generates a random PHP object.
RandomGeneratorTrait::randomString public function Generates a pseudo-random string of ASCII characters of codes 32 to 126.
RandomGeneratorTrait::randomStringValidate public function Callback for random string validation.
StorageCopyTrait::replaceStorageContents protected static function Copy the configuration from one storage to another and remove stale items.
TestRequirementsTrait::checkModuleRequirements private function Checks missing module requirements.
TestRequirementsTrait::checkRequirements protected function Check module requirements for the Drupal use case. 1
TestRequirementsTrait::getDrupalRoot protected static function Returns the Drupal root directory.