class PasswordPolicyExpirationTestCase in Password Policy 7
Tests of password expiration.
Hierarchy
- class \DrupalTestCase
- class \DrupalWebTestCase
Expanded class hierarchy of PasswordPolicyExpirationTestCase
File
- tests/
password_policy_expiration.test, line 11 - Tests for Password policy module expiration functionality.
View source
class PasswordPolicyExpirationTestCase extends DrupalWebTestCase {
protected $admin;
protected $policyMaker;
/**
* Gets info about the test case.
*/
public static function getInfo() {
return array(
'name' => 'Password expiration',
'description' => 'Test password expiration and related settings.',
'group' => 'Password Policy',
);
}
/**
* Sets up the test.
*/
public function setUp() {
parent::setUp('password_policy');
$this
->createAdmin();
$this
->createPolicyMaker();
}
/**
* Creates a usable admin (UID=1) user.
*
* SimpleTest creates an admin user, but it cannot log in since it has no
* password set. So, we give it a password.
*/
protected function createAdmin() {
global $user;
$pass = user_password();
$edit = array(
'pass' => $pass,
);
user_save($user, $edit);
$user->pass_raw = $pass;
$this->admin = $user;
}
/**
* Creates policy maker.
*/
protected function createPolicyMaker() {
$this->policyMaker = $this
->drupalCreateUser(array(
'administer users',
'administer permissions',
'administer password policies',
'unblock expired accounts',
));
}
/**
* Tests expiration constraint.
*/
public function testExpirationConstraint() {
// Create role to which the expiration policy will apply.
// It is identical to the 'authenticated user' role in permissions. We
// create this separate role because we would like the policy maker user to
// be exempt from the expiration policy.
$expiration_rid = $this
->drupalCreateRole(array());
// Log in policy maker.
$policy_maker_user = $this->policyMaker;
$this
->drupalLogin($policy_maker_user);
// Create a policy.
$policy_name = $this
->createExpirationPolicy(1, $expiration_rid);
// Verify that an expiration rule has been set in the policy.
$pid = db_query('SELECT pid FROM {password_policy} WHERE name = :name', array(
':name' => $policy_name,
))
->fetchField();
$expiration = db_query('SELECT expiration FROM {password_policy} WHERE pid = :pid', array(
':pid' => $pid,
))
->fetchField();
$this
->verbose('Expiration: ' . var_export($expiration, TRUE));
$this
->assertTrue($expiration == 1, 'Verified expiration set.');
// Enable the policy.
$this
->enablePolicy($policy_name);
_password_policy_advance_test_clock(60 * 60 * 24 + 1);
// Create an account to test with.
$name1 = $this
->randomName();
$pass1 = 'aaaaaa';
$edit = array(
'name' => $name1,
'mail' => $name1 . '@example.com',
'pass[pass1]' => $pass1,
'pass[pass2]' => $pass1,
);
$this
->drupalPost('admin/people/create', $edit, 'Create new account');
$uid = db_query('SELECT uid FROM {users} WHERE name = :name', array(
':name' => $name1,
))
->fetchField();
$this
->drupalGet('user/' . $uid . '/edit');
$this
->assertFieldChecked('edit-status-1', 'Account status is set to active.');
// Add user to role covered by expiration policy.
user_multiple_role_edit(array(
$uid,
), 'add_role', $expiration_rid);
// Log out and attempt to log in with the newly created test account.
$this
->drupalLogout();
$edit = array(
'name' => $name1,
'pass' => $pass1,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $name1,
)), 'Account not blocked from logging in.');
_password_policy_advance_test_clock(60 * 60 * 24 + 1);
// Check that password should be expired, once cron runs.
$created = db_query('SELECT created FROM {password_policy_history} WHERE uid = :uid', array(
':uid' => '3',
))
->fetchField();
$this
->verbose('Created: ' . var_export($created, TRUE));
$created = db_query('SELECT created FROM {password_policy} WHERE pid = :pid', array(
':pid' => $pid,
))
->fetchField();
$this
->verbose('$pid ' . $pid . ' created: ' . var_export($created, TRUE));
// Run cron to trigger password expirations.
$this
->cronRun();
// Check that test account has been blocked.
$this
->drupalLogin($policy_maker_user);
$this
->drupalGet('user/' . $uid . '/edit');
$this
->assertFieldChecked('edit-status-0', 'Account status is set to blocked.');
$this
->drupalGet('admin/people/expired');
$this
->assertText('unblock', 'Account marked as blocked on Expired Accounts tab.');
// Log out and attempt to log in to the expired account again, to verify
// block.
$this
->drupalLogout();
$edit = array(
'name' => $name1,
'pass' => $pass1,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertText(t('The username !name has not been activated or is blocked.', array(
'!name' => $name1,
)), 'Account blocked from logging in.');
// Log in as policy making user to unblock the test user.
$this
->drupalLogin($policy_maker_user);
$this
->drupalPost('admin/people/expired/unblock/' . $uid, array(), t('Unblock user'));
$this
->assertText(t('The user !name has been unblocked.', array(
'!name' => $name1,
)), 'Account account has been unblocked.');
$this
->drupalGet('admin/people/expired');
$this
->assertNoText('unblock', 'Account not marked as blocked on Expired Accounts tab.');
// Log out and attempt to log in the expired account again.
$this
->drupalLogout();
$edit = array(
'name' => $name1,
'pass' => $pass1,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $name1,
)), 'Account not blocked from logging in.');
$this
->assertNoText(t('User login'), 'Check that login block is not shown, to verify user successfully logged in.');
$this
->assertRaw(t('Your password has expired. You must change your password to proceed on the site.'), 'User forced to change password.');
// Change test user account's password.
$pass2 = 'bbbbbb';
$edit = array(
'current_pass' => $pass1,
'pass[pass1]' => $pass2,
'pass[pass2]' => $pass2,
);
$this
->drupalPost('user/' . $uid . '/edit', $edit, t('Save'));
$this
->assertText(t('The changes have been saved.'), format_string('1st password change: !pass', array(
'!pass' => $pass2,
)));
$this
->drupalGet('node');
$this
->drupalLogout();
// Run cron to trigger password expirations.
$this
->cronRun();
// Log in to confirm password not seen as expired now that it has changed.
$edit = array(
'name' => $name1,
'pass' => $pass1,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $name1,
)), 'Account not blocked from logging in.');
$this
->assertNoText(t('User login'), 'Check that login block is not shown, to verify user successfully logged in.');
$this
->drupalLogout();
// Delete test policy.
$this
->drupalLogin($policy_maker_user);
$this
->drupalPost('admin/config/people/password_policy/' . $pid . '/delete', array(), t('Delete'));
$this
->assertText('Password policy ' . $policy_name . ' was deleted.', 'Default password policy ' . $policy_name . 'was deleted');
}
/**
* Tests unblocking an expired account via user edit form.
*/
public function testUnblockingExpiredAccountViaUserEditForm() {
// Create an account to test with.
$account = $this
->drupalCreateUser();
$expiration_rid = $this
->assignToNewRole($account);
// Set 180-day expiration policy.
$expiration_days = 180;
$this
->setExpirationPolicy($expiration_days, $expiration_rid);
// Advance to at least one second past expiration.
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock($expiration_days * $one_day + 1);
// Run cron to trigger password expirations.
$this
->cronRun();
// Confirm account blocked.
$edit = array(
'name' => $account->name,
'pass' => $account->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertText(t('The username !name has not been activated or is blocked.', array(
'!name' => $account->name,
)), 'Account blocked from logging in.');
// Unblock account using user edit form.
$admin = $this->admin;
$this
->drupalLogin($admin);
$edit = array(
'status' => 1,
);
$this
->drupalPost("user/{$account->uid}/edit", $edit, t('Save'));
$this
->drupalLogout();
// Run cron since it could errantly reblock account.
$this
->cronRun();
// Confirm account unblocked.
$edit = array(
'name' => $account->name,
'pass' => $account->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $account->name,
)), 'Account not blocked from logging in.');
}
/**
* Tests unblocking a "reblocked" account.
*
* By "reblocked" account we mean one that was blocked due to password
* expiration, unblocked, then blocked again due to the password not being
* changed within 24 hours.
*/
public function testUnblockingReblockedAccount() {
// Create role to which the expiration policy will apply.
$expiration_rid = $this
->drupalCreateRole(array());
// Add user covered by expiration policy.
$account = $this
->drupalCreateUser();
user_multiple_role_edit(array(
$account->uid,
), 'add_role', $expiration_rid);
// Set an expiration policy.
$expiration_days = 7;
$this
->setExpirationPolicy($expiration_days, $expiration_rid);
// Allow the password to expire.
$seven_days_one_second = 60 * 60 * 24 * 7 + 1;
_password_policy_advance_test_clock($seven_days_one_second);
$this
->cronRun();
// Log in as policy making user to unblock the test user.
$this
->drupalLogin($this->policyMaker);
$this
->drupalPost('admin/people/expired/unblock/' . $account->uid, array(), t('Unblock user'));
$this
->assertText(t('The user !name has been unblocked.', array(
'!name' => $account->name,
)), 'Account account has been unblocked.');
$this
->drupalGet('admin/people/expired');
$this
->assertNoText('unblock', 'Account not marked as blocked on Expired Accounts tab.');
$this
->drupalLogout();
// Wait over one day so account is reblocked.
$one_day_one_second = 60 * 60 * 24 + 1;
_password_policy_advance_test_clock($one_day_one_second);
$this
->cronRun();
// Attempt to log in. User should be blocked.
$edit = array(
'name' => $account->name,
'pass' => $account->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertText(t('The username !name has not been activated or is blocked.', array(
'!name' => $account->name,
)), 'Account blocked from logging in.');
// Log in as policy making user to unblock the test user.
$this
->drupalLogin($this->policyMaker);
$this
->drupalPost('admin/people/expired/unblock/' . $account->uid, array(), t('Unblock user'));
$this
->assertText(t('The user !name has been unblocked.', array(
'!name' => $account->name,
)), 'Account account has been unblocked.');
$this
->drupalGet('admin/people/expired');
$this
->assertNoText('unblock', 'Account not marked as blocked on Expired Accounts tab.');
$this
->drupalLogout();
// Attempt to log in. User should not be blocked.
$edit = array(
'name' => $account->name,
'pass' => $account->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $account->name,
)), 'Account not blocked from logging in.');
$this
->drupalLogout();
}
/**
* Tests "Admin (UID=1) password expires" being disabled (i.e., unchecked).
*/
public function testAdminExpirationDisabled() {
$this
->disableAdminExpiration();
// Set an expiration policy.
$expiration_days = 30;
$this
->setExpirationPolicy($expiration_days);
$this
->cronRun();
// Advance to at least one second past expiration.
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock($expiration_days * $one_day + 1);
$this
->cronRun();
// Attempt login as admin and confirm password not expired.
$admin = $this->admin;
$edit = array(
'name' => $admin->name,
'pass' => $admin->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertNoText(t('The username !name has not been activated or is blocked.', array(
'!name' => $admin->name,
)), 'Admin not blocked from logging in.');
}
/**
* Tests "Admin (UID=1) password expires" being enabled (i.e., checked).
*
* This is the default setting.
*/
public function testAdminExpirationEnabled() {
// Set an expiration policy.
$expiration_days = 30;
$this
->setExpirationPolicy($expiration_days);
$this
->cronRun();
// Advance to at least one second past expiration.
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock($expiration_days * $one_day + 1);
$this
->cronRun();
// Attempt login as admin and confirm password expired.
$admin = $this->admin;
$edit = array(
'name' => $admin->name,
'pass' => $admin->pass_raw,
);
$this
->drupalPost('user/login', $edit, t('Log in'));
$this
->assertText(t('The username !name has not been activated or is blocked.', array(
'!name' => $admin->name,
)), 'Admin blocked from logging in.');
}
/**
* Tests expiration warning e-mails.
*/
public function testWarningEmails() {
$expiration_days = 180;
$rid = DRUPAL_AUTHENTICATED_RID;
$warning = '14,7';
$this
->setExpirationPolicy($expiration_days, $rid, $warning);
// Disable admin (UID=1) expiration to prevent multiple expiration emails.
$this
->disableAdminExpiration();
// Start at 180 days before expiration.
// By "day" in the rest of this method, a 24-hour period of time is meant,
// not a calendar day.
$this
->cronRun();
$this
->assertNoMail('No e-mails sent initially.');
// Advance to one second past 90 days before expiration.
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock(90 * $one_day + 1);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent before first expiration warning day.');
// Advance to one second past 14 days before expiration.
_password_policy_advance_test_clock(76 * $one_day);
$this
->cronRun();
$warning_subject = t('Password expiration warning for !username at !site', array(
'!username' => $this->policyMaker->name,
'!site' => variable_get('site_name', 'Drupal'),
));
$this
->assertMail('subject', $warning_subject, 'First expiration warning e-mail sent.');
$this
->clearMails();
// Advance to one second past 10 days before expiration.
_password_policy_advance_test_clock(4 * $one_day);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent between first and second expiration warning days.');
// Advance to one second past 7 days before expiration.
_password_policy_advance_test_clock(3 * $one_day);
$this
->cronRun();
$warning_subject = t('Password expiration warning for !username at !site', array(
'!username' => $this->policyMaker->name,
'!site' => variable_get('site_name', 'Drupal'),
));
$this
->assertMail('subject', $warning_subject, 'Second expiration warning e-mail sent.');
$this
->clearMails();
// Advance to one second past 6 days before expiration.
_password_policy_advance_test_clock(1 * $one_day);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent after expiration warnings and before expiration.');
// Advance to one second past day before expiration.
_password_policy_advance_test_clock(6 * $one_day);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent after expiration warnings and less than one day before expiration.');
// Advance to one second past 3 days after expiration.
_password_policy_advance_test_clock(3 * $one_day);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent after expiration.');
}
/**
* Tests warning e-mails not sent when they are disabled.
*
* Limitation: This method does not test that e-mails are not sent on the
* exact second of expiration.
*/
public function testWarningEmailsDisabled() {
$expiration_days = 2;
$rid = DRUPAL_AUTHENTICATED_RID;
$warning = '';
$this
->setExpirationPolicy($expiration_days, $rid, $warning);
// Run cron at least one second past two days before expiration.
// By "day" in the rest of this method, a 24-hour period of time is meant,
// not a calendar day.
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock($one_day + 1);
$this
->cronRun();
// Run cron at least one second past day before expiration.
_password_policy_advance_test_clock($one_day);
$this
->cronRun();
// Run cron at least one second past expiration.
_password_policy_advance_test_clock($one_day);
$this
->cronRun();
$this
->assertNoMail('No e-mails sent.');
}
/**
* Tests tokens replacement in warning e-mails.
*
* Importantly, this tests the Password Policy tokens.
*/
public function testWarningEmailsTokens() {
$expiration_days = 30;
$rid = DRUPAL_AUTHENTICATED_RID;
$warning = '14';
$this
->setExpirationPolicy($expiration_days, $rid, $warning);
// Disable admin (UID=1) expiration to prevent multiple expiration emails.
$this
->disableAdminExpiration();
// Trigger expiration warning e-mail.
// (Advance to one second past 14 days before expiration and run cron.)
$one_day = 24 * 60 * 60;
_password_policy_advance_test_clock(16 * $one_day + 1);
$this
->cronRun();
// Assert correct subject.
$warning_subject = t('Password expiration warning for !username at !site', array(
'!username' => $this->policyMaker->name,
'!site' => variable_get('site_name', 'Drupal'),
));
$this
->assertMail('subject', $warning_subject, "Tokens replaced in subject correctly.");
// Assert correct body.
$edit_url = _password_policy_get_preferred_password_edit_url_for_user($this->policyMaker);
global $language;
$langcode = isset($language) ? $language->language : NULL;
$warning_body = t("!username,\n\nYour password at !site will expire in less than !days_left day(s).\n\nPlease go to !edit_url to change your password.", array(
'!username' => $this->policyMaker->name,
'!site' => variable_get('site_name', 'Drupal'),
'!days_left' => '14',
'!edit_url' => $edit_url,
), array(
'langcode' => $langcode,
));
// assertMail() does not seem to work for the body because the mail
// functions insert some whitespace into the body. assertMailString() seems
// to work, though.
$this
->assertMailString('body', $warning_body, 1);
}
/**
* Sets expiration policy.
*
* Has Policy Maker user create and enable an expiration policy.
*
* @param int $expiration
* Number of days after which password expires.
* @param int $rid
* (optional) Role ID to which this policy should apply.
* @param string $warning
* (optional) Comma-delimited list of numbers of days before expiration on
* which expiration warnings are to be sent.
*/
protected function setExpirationPolicy($expiration, $rid = DRUPAL_AUTHENTICATED_RID, $warning = '') {
$policy_maker = $this->policyMaker;
$this
->drupalLogin($policy_maker);
$name = $this
->createExpirationPolicy($expiration, $rid, $warning);
$this
->enablePolicy($name);
$this
->drupalLogout();
}
/**
* Disables "Admin (UID=1) password expires" setting.
*/
protected function disableAdminExpiration() {
$admin = $this->admin;
$this
->drupalLogin($admin);
$edit = array(
'password_policy_admin' => FALSE,
);
$this
->drupalPost('admin/config/people/password_policy', $edit, t('Save configuration'));
$this
->drupalLogout();
}
/**
* Creates expiration policy.
*
* @param int $expiration
* Number of days after which password expires.
* @param int $rid
* (optional) Role ID to which this policy should apply.
* @param string $warning
* (optional) Comma-delimited list of numbers of days before expiration on
* which expiration warnings are to be sent.
*
* @return string
* Name of created policy.
*/
protected function createExpirationPolicy($expiration, $rid = DRUPAL_AUTHENTICATED_RID, $warning = '') {
$policy_name = $this
->randomName();
$edit = array(
'name' => $policy_name,
'expiration' => $expiration,
'warning' => $warning,
"roles[{$rid}]" => $rid,
);
$this
->drupalPost('admin/config/people/password_policy/add', $edit, t('Create'));
$created_text = "Policy {$policy_name} has been created.";
$this
->assertText($created_text, $created_text);
return $policy_name;
}
/**
* Enables policy.
*/
protected function enablePolicy($policy_name) {
$pid = db_query('SELECT pid FROM {password_policy} WHERE name = :name', array(
':name' => $policy_name,
))
->fetchField();
$edit = array(
"policies[{$pid}][enabled]" => $pid,
);
$this
->drupalPost('admin/config/people/password_policy/list', $edit, t('Save changes'));
$this
->assertText(t('The changes have been saved.'), 'Form submitted successfully.');
$this
->drupalGet('admin/config/people/password_policy');
$enabled = db_query('SELECT enabled FROM {password_policy} WHERE pid = :pid', array(
':pid' => $pid,
))
->fetchField();
$this
->assertTrue($enabled == 1, 'Policy enabled.');
}
/**
* Assigns user to a newly created role.
*
* @param object $account
* User object.
*
* @return int
* Role ID of newly created role.
*/
protected function assignToNewRole($account) {
$expiration_rid = $this
->drupalCreateRole(array());
user_multiple_role_edit(array(
$account->uid,
), 'add_role', $expiration_rid);
return $expiration_rid;
}
/**
* Asserts that no e-mail has been sent.
*
* Specifically, asserts that no e-mail has been sent since the e-mails
* collected during the test were last cleared.
*/
protected function assertNoMail($message) {
$captured_emails = variable_get('drupal_test_email_collector', array());
$this
->assertTrue(empty($captured_emails), $message);
}
/**
* Clears all e-mails collected during test.
*/
protected function clearMails() {
variable_set('drupal_test_email_collector', array());
}
}
Members
Name | Modifiers | Type | Description | Overrides |
---|---|---|---|---|
DrupalTestCase:: |
protected | property | Assertions thrown in that test case. | |
DrupalTestCase:: |
protected | property | The database prefix of this test run. | |
DrupalTestCase:: |
protected | property | The original file directory, before it was changed for testing purposes. | |
DrupalTestCase:: |
public | property | Current results of this test case. | |
DrupalTestCase:: |
protected | property | Flag to indicate whether the test has been set up. | |
DrupalTestCase:: |
protected | property | ||
DrupalTestCase:: |
protected | property | ||
DrupalTestCase:: |
protected | property | This class is skipped when looking for the source of an assertion. | |
DrupalTestCase:: |
protected | property | The test run ID. | |
DrupalTestCase:: |
protected | property | Time limit for the test. | |
DrupalTestCase:: |
public | property | Whether to cache the installation part of the setUp() method. | |
DrupalTestCase:: |
public | property | Whether to cache the modules installation part of the setUp() method. | |
DrupalTestCase:: |
protected | property | URL to the verbose output file directory. | |
DrupalTestCase:: |
protected | function | Internal helper: stores the assert. | |
DrupalTestCase:: |
protected | function | Check to see if two values are equal. | |
DrupalTestCase:: |
protected | function | Check to see if a value is false (an empty string, 0, NULL, or FALSE). | |
DrupalTestCase:: |
protected | function | Check to see if two values are identical. | |
DrupalTestCase:: |
protected | function | Check to see if two values are not equal. | |
DrupalTestCase:: |
protected | function | Check to see if two values are not identical. | |
DrupalTestCase:: |
protected | function | Check to see if a value is not NULL. | |
DrupalTestCase:: |
protected | function | Check to see if a value is NULL. | |
DrupalTestCase:: |
protected | function | Check to see if a value is not false (not an empty string, 0, NULL, or FALSE). | |
DrupalTestCase:: |
public static | function | Delete an assertion record by message ID. | |
DrupalTestCase:: |
protected | function | Fire an error assertion. | 1 |
DrupalTestCase:: |
public | function | Handle errors during test runs. | 1 |
DrupalTestCase:: |
protected | function | Handle exceptions. | |
DrupalTestCase:: |
protected | function | Fire an assertion that is always negative. | |
DrupalTestCase:: |
public static | function | Converts a list of possible parameters into a stack of permutations. | |
DrupalTestCase:: |
protected | function | Cycles through backtrace until the first non-assertion method is found. | |
DrupalTestCase:: |
public static | function | Returns the database connection to the site running Simpletest. | |
DrupalTestCase:: |
public static | function | Store an assertion from outside the testing context. | |
DrupalTestCase:: |
protected | function | Fire an assertion that is always positive. | |
DrupalTestCase:: |
public static | function | Generates a random string containing letters and numbers. | |
DrupalTestCase:: |
public static | function | Generates a random string of ASCII characters of codes 32 to 126. | |
DrupalTestCase:: |
public | function | Run all tests in this class. | |
DrupalTestCase:: |
protected | function | Logs a verbose message in a text file. | |
DrupalWebTestCase:: |
protected | property | Additional cURL options. | |
DrupalWebTestCase:: |
protected | property | The content of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The current cookie file used by cURL. | |
DrupalWebTestCase:: |
protected | property | The cookies of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The handle of the current cURL connection. | |
DrupalWebTestCase:: |
protected | property | The value of the Drupal.settings JavaScript variable for the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The parsed version of the page. | |
DrupalWebTestCase:: |
protected | property | Whether the files were copied to the test files directory. | |
DrupalWebTestCase:: |
protected | property | The headers of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | HTTP authentication credentials (<username>:<password>). | |
DrupalWebTestCase:: |
protected | property | HTTP authentication method | |
DrupalWebTestCase:: |
protected | property | The current user logged in using the internal browser. | |
DrupalWebTestCase:: |
protected | property | The original shutdown handlers array, before it was cleaned for testing purposes. | |
DrupalWebTestCase:: |
protected | property | The original user, before it was changed to a clean uid = 1 for testing purposes. | |
DrupalWebTestCase:: |
protected | property | The content of the page currently loaded in the internal browser (plain text version). | |
DrupalWebTestCase:: |
protected | property | The profile to install as a basis for testing. | 20 |
DrupalWebTestCase:: |
protected | property | The number of redirects followed during the handling of a request. | |
DrupalWebTestCase:: |
protected | property | The current session ID, if available. | |
DrupalWebTestCase:: |
protected | property | The current session name, if available. | |
DrupalWebTestCase:: |
protected | property | The URL currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists with the given name or ID. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page with the given ID and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page with the given name and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page by the given XPath. | |
DrupalWebTestCase:: |
protected | function | Asserts that a checkbox field in the current page is checked. | |
DrupalWebTestCase:: |
protected | function | Pass if a link with the specified label is found, and optional with the specified index. | |
DrupalWebTestCase:: |
protected | function | Pass if a link containing a given href (part) is found. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the given value. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the pattern in it. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the string in it. | |
DrupalWebTestCase:: |
protected | function | Asserts that each HTML ID is used for just a single element. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given name or ID. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given ID and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given name and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field doesn't exist or its value doesn't match, by XPath. | |
DrupalWebTestCase:: |
protected | function | Asserts that a checkbox field in the current page is not checked. | |
DrupalWebTestCase:: |
protected | function | Pass if a link with the specified label is not found. | |
DrupalWebTestCase:: |
protected | function | Pass if a link containing a given href (part) is not found. | |
DrupalWebTestCase:: |
protected | function | Asserts that a select option in the current page is not checked. | |
DrupalWebTestCase:: |
protected | function | Will trigger a pass if the perl regex pattern is not present in raw content. | |
DrupalWebTestCase:: |
protected | function | Pass if the raw text is NOT found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. | |
DrupalWebTestCase:: |
protected | function | Asserts the page did not return the specified response code. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is NOT found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. | |
DrupalWebTestCase:: |
protected | function | Pass if the page title is not the given string. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is found MORE THAN ONCE on the text version of the page. | |
DrupalWebTestCase:: |
protected | function | Asserts that a select option in the current page is checked. | |
DrupalWebTestCase:: |
protected | function | Will trigger a pass if the Perl regex pattern is found in the raw content. | |
DrupalWebTestCase:: |
protected | function | Pass if the raw text IS found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. | |
DrupalWebTestCase:: |
protected | function | Asserts the page responds with the specified response code. | |
DrupalWebTestCase:: |
protected | function | Pass if the text IS found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. | |
DrupalWebTestCase:: |
protected | function | Helper for assertText and assertNoText. | |
DrupalWebTestCase:: |
protected | function | Asserts themed output. | |
DrupalWebTestCase:: |
protected | function | Pass if the page title is the given string. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is found ONLY ONCE on the text version of the page. | |
DrupalWebTestCase:: |
protected | function | Helper for assertUniqueText and assertNoUniqueText. | |
DrupalWebTestCase:: |
protected | function | Pass if the internal browser's URL matches the given path. | |
DrupalWebTestCase:: |
protected | function | Builds an XPath query. | |
DrupalWebTestCase:: |
protected | function | Changes the database connection to the prefixed one. | |
DrupalWebTestCase:: |
protected | function | Check for meta refresh tag and if found call drupalGet() recursively. This function looks for the http-equiv attribute to be set to "Refresh" and is case-sensitive. | |
DrupalWebTestCase:: |
protected | function | Check to make sure that the array of permissions are valid. | |
DrupalWebTestCase:: |
protected | function | Follows a link by name. | |
DrupalWebTestCase:: |
protected | function | Helper function: construct an XPath for the given set of attributes and value. | |
DrupalWebTestCase:: |
protected | function | Copy the setup cache from/to another table and files directory. | |
DrupalWebTestCase:: |
protected | function | Runs cron in the Drupal installed by Simpletest. | |
DrupalWebTestCase:: |
protected | function | Close the cURL handler and unset the handler. | |
DrupalWebTestCase:: |
protected | function | Initializes and executes a cURL request. | |
DrupalWebTestCase:: |
protected | function | Reads headers and registers errors received from the tested site. | |
DrupalWebTestCase:: |
protected | function | Initializes the cURL connection. | |
DrupalWebTestCase:: |
protected | function | Compare two files based on size and file name. | |
DrupalWebTestCase:: |
protected | function | Creates a custom content type based on default settings. | |
DrupalWebTestCase:: |
protected | function | Creates a node based on default settings. | |
DrupalWebTestCase:: |
protected | function | Creates a role with specified permissions. | |
DrupalWebTestCase:: |
protected | function | Create a user with a given set of permissions. | |
DrupalWebTestCase:: |
protected | function | Retrieves a Drupal path or an absolute path. | |
DrupalWebTestCase:: |
protected | function | Retrieve a Drupal path or an absolute path and JSON decode the result. | |
DrupalWebTestCase:: |
protected | function | Gets the current raw HTML of requested page. | |
DrupalWebTestCase:: |
protected | function | Gets the value of an HTTP response header. If multiple requests were required to retrieve the page, only the headers from the last request will be checked by default. However, if TRUE is passed as the second argument, all requests will be processed… | |
DrupalWebTestCase:: |
protected | function | Gets the HTTP response headers of the requested page. Normally we are only interested in the headers returned by the last request. However, if a page is redirected or HTTP authentication is in use, multiple requests will be required to retrieve the… | |
DrupalWebTestCase:: |
protected | function | Gets an array containing all e-mails sent during this test case. | |
DrupalWebTestCase:: |
function | Get a node from the database based on its title. | ||
DrupalWebTestCase:: |
protected | function | Gets the value of the Drupal.settings JavaScript variable for the currently loaded page. | |
DrupalWebTestCase:: |
protected | function | Get a list files that can be used in tests. | |
DrupalWebTestCase:: |
protected | function | Generate a token for the currently logged in user. | |
DrupalWebTestCase:: |
protected | function | Retrieves only the headers for a Drupal path or an absolute path. | |
DrupalWebTestCase:: |
protected | function | Log in a user with the internal browser. | |
DrupalWebTestCase:: |
protected | function | ||
DrupalWebTestCase:: |
protected | function | Execute a POST request on a Drupal page. It will be done as usual POST request with SimpleBrowser. | |
DrupalWebTestCase:: |
protected | function | Execute an Ajax submission. | |
DrupalWebTestCase:: |
protected | function | Sets the raw HTML content. This can be useful when a page has been fetched outside of the internal browser and assertions need to be made on the returned page. | |
DrupalWebTestCase:: |
protected | function | Sets the value of the Drupal.settings JavaScript variable for the currently loaded page. | |
DrupalWebTestCase:: |
protected | function | Takes a path and returns an absolute path. | |
DrupalWebTestCase:: |
protected | function | Get all option elements, including nested options, in a select. | |
DrupalWebTestCase:: |
protected | function | Get the selected value from a select field. | |
DrupalWebTestCase:: |
protected | function | Returns the cache key used for the setup caching. | |
DrupalWebTestCase:: |
protected | function | Get the current URL from the cURL handler. | |
DrupalWebTestCase:: |
protected | function | Handle form input related to drupalPost(). Ensure that the specified fields exist and attempt to create POST data in the correct manner for the particular field type. | |
DrupalWebTestCase:: |
protected | function | Copies the cached tables and files for a cached installation setup. | |
DrupalWebTestCase:: |
protected | function | Parse content returned from curlExec using DOM and SimpleXML. | |
DrupalWebTestCase:: |
protected | function | Preload the registry from the testing site. | |
DrupalWebTestCase:: |
protected | function | Generates a database prefix for running tests. | |
DrupalWebTestCase:: |
protected | function | Prepares the current environment for running the test. | |
DrupalWebTestCase:: |
protected | function | Recursively copy one directory to another. | |
DrupalWebTestCase:: |
protected | function | Refresh the in-memory set of variables. Useful after a page request is made that changes a variable in a different thread. | 1 |
DrupalWebTestCase:: |
protected | function | Reset all data structures after having enabled new modules. | |
DrupalWebTestCase:: |
protected | function | Store the installation setup to a cache. | |
DrupalWebTestCase:: |
protected | function | Delete created files and temporary files directory, delete the tables created by setUp(), and reset the database prefix. | 6 |
DrupalWebTestCase:: |
protected | function | Outputs to verbose the most recent $count emails sent. | |
DrupalWebTestCase:: |
protected | function | Perform an xpath search on the contents of the internal browser. The search is relative to the root element (HTML tag normally) of the page. | |
DrupalWebTestCase:: |
function |
Constructor for DrupalWebTestCase. Overrides DrupalTestCase:: |
1 | |
PasswordPolicyExpirationTestCase:: |
protected | property | ||
PasswordPolicyExpirationTestCase:: |
protected | property | ||
PasswordPolicyExpirationTestCase:: |
protected | function | Asserts that no e-mail has been sent. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Assigns user to a newly created role. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Clears all e-mails collected during test. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Creates a usable admin (UID=1) user. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Creates expiration policy. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Creates policy maker. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Disables "Admin (UID=1) password expires" setting. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Enables policy. | |
PasswordPolicyExpirationTestCase:: |
public static | function | Gets info about the test case. | |
PasswordPolicyExpirationTestCase:: |
protected | function | Sets expiration policy. | |
PasswordPolicyExpirationTestCase:: |
public | function |
Sets up the test. Overrides DrupalWebTestCase:: |
|
PasswordPolicyExpirationTestCase:: |
public | function | Tests "Admin (UID=1) password expires" being disabled (i.e., unchecked). | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests "Admin (UID=1) password expires" being enabled (i.e., checked). | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests expiration constraint. | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests unblocking an expired account via user edit form. | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests unblocking a "reblocked" account. | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests expiration warning e-mails. | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests warning e-mails not sent when they are disabled. | |
PasswordPolicyExpirationTestCase:: |
public | function | Tests tokens replacement in warning e-mails. |