class TaxonomyAccessConfigTest in Taxonomy Access Control 7
Tests the module's configuration forms.
Hierarchy
- class \DrupalTestCase
- class \DrupalWebTestCase
- class \TaxonomyAccessTestCase
- class \TaxonomyAccessConfigTest
- class \TaxonomyAccessTestCase
- class \DrupalWebTestCase
Expanded class hierarchy of TaxonomyAccessConfigTest
File
- ./
taxonomy_access.test, line 423 - Automated tests for the Taxonomy Access Control module.
View source
class TaxonomyAccessConfigTest extends TaxonomyAccessTestCase {
protected $articles = array();
protected $pages = array();
protected $vocabs = array();
protected $terms = array();
public static function getInfo() {
return array(
'name' => 'Configuration forms',
'description' => 'Test module configuration forms.',
'group' => 'Taxonomy Access Control',
);
}
public function setUp() {
parent::setUp();
// Add two taxonomy fields to pages.
foreach (array(
'v1',
'v2',
) as $vocab) {
$this->vocabs[$vocab] = $this
->createVocab($vocab);
$this
->createField($vocab);
$this->terms[$vocab . 't1'] = $this
->createTerm($vocab . 't1', $this->vocabs[$vocab]);
$this->terms[$vocab . 't2'] = $this
->createTerm($vocab . 't2', $this->vocabs[$vocab]);
}
// Set up a variety of nodes with different term combinations.
$this->articles['no_tags'] = $this
->createArticle();
$this->articles['one_tag'] = $this
->createArticle(array(
$this
->randomName(),
));
$this->articles['two_tags'] = $this
->createArticle(array(
$this
->randomName(),
$this
->randomName(),
));
$this->pages['no_tags'] = $this
->createPage();
foreach ($this->terms as $t1) {
$this->pages[$t1->name] = $this
->createPage(array(
$t1->name,
));
foreach ($this->terms as $t2) {
$this->pages[$t1->name . '_' . $t2->name] = $this
->createPage(array(
$t1->name,
$t2->name,
));
}
}
}
/**
* Creates a page with the specified terms.
*
* @param array $terms
* (optional) An array of term names to tag the page. Defaults to array().
*
* @return object
* The node object.
*/
function createPage($tags = array()) {
$v1 = array();
$v2 = array();
foreach ($tags as $name) {
switch ($this->terms[$name]->vid) {
case $this->vocabs['v1']->vid:
$v1[] = array(
'tid' => $this->terms[$name]->tid,
);
break;
case $this->vocabs['v2']->vid:
$v2[] = array(
'tid' => $this->terms[$name]->tid,
);
break;
}
}
// Bloody $langcodes.
$v1 = array(
LANGUAGE_NONE => $v1,
);
$v2 = array(
LANGUAGE_NONE => $v2,
);
$settings = array(
'type' => 'page',
'v1' => $v1,
'v2' => $v2,
);
return $this
->drupalCreateNode($settings);
}
/*
@todo
- check anon and auth forms
- add recursive for vocab and for term
- change multiple
- delete multiple
- configure create and list
*/
/**
* Tests the initial state of the test environment.
*
* Verifies that:
* - Access to all nodes is denied for anonymous users.
* - The main admin page provides the correct configuration links.
*/
public function testSetUpCheck() {
// Visit all nodes as anonymous and verify that access is denied.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(403, t("Access to %name article (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
// Log in as the regular_user.
$this
->drupalLogin($this->users['regular_user']);
// Visit all nodes and verify that access is denied.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(403, t("Access to %name article (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Confirm that only edit links are available for anon. and auth.
$this
->checkRoleConfig(array(
DRUPAL_ANONYMOUS_RID => TRUE,
DRUPAL_AUTHENTICATED_RID => TRUE,
));
}
/**
* Tests configuring a global default.
*
* Verifies that:
* - Access is updated for all nodes when there are no other configurations.
* - Access is updated for the correct nodes when there are specific term
* and vocabulary configurations.
*/
public function testGlobalDefaultConfig() {
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to give anonymous view allow in the global default.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->configureFormRow($edit, TAXONOMY_ACCESS_GLOBAL_DEFAULT, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->drupalPost(NULL, $edit, 'Save all');
// Log out.
$this
->drupalLogout();
// Visit each node and verify that access is allowed.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(200, t("Access to %name article (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
// Add some specific configurations programmatically.
// Set the v1 default to view allow.
$default_config = _taxonomy_access_format_grant_record($this->vocabs['v1']->vid, DRUPAL_ANONYMOUS_RID, array(
'view' => TAXONOMY_ACCESS_NODE_ALLOW,
), TRUE);
taxonomy_access_set_default_grants(array(
$default_config,
));
// Set v1t1 and v2t1 to view allow.
$term_configs = array();
foreach (array(
'v1t1',
'v2t1',
) as $name) {
$term_configs[] = _taxonomy_access_format_grant_record($this->terms[$name]->vid, DRUPAL_ANONYMOUS_RID, array(
'view' => TAXONOMY_ACCESS_NODE_ALLOW,
));
}
taxonomy_access_set_term_grants($term_configs);
// This leaves articles and the v2t2 page controlled by the global default.
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to give anonymous view deny in the global default.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->configureFormRow($edit, TAXONOMY_ACCESS_GLOBAL_DEFAULT, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_DENY);
$this
->drupalPost(NULL, $edit, 'Save all');
// Log out.
$this
->drupalLogout();
// Visit each artile and verify that access is denied.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(403, t("Access to %name article (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
// Visit each page.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
switch (TRUE) {
// If the page has no tags, access should be denied.
case $key == 'no_tags':
// If the page is tagged with v2t2, access should be denied.
case strpos($key, 'v2t2') !== FALSE:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Otherwise, access should be allowed.
default:
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
}
}
}
/**
* Tests configuring vocabulary defaults.
*
* Verifies that:
* - Access is updated correctly when the vocabulary default is added and
* configured.
* - Access is updated correctly when there is a specific term configuration
* in the vocabulary.
* - Access is updated correctly when multiple defaults are changed.
* - Access is updated correctly when the vocabulary default is deleted.
*/
public function testVocabularyDefaultConfig() {
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Enable the vocabulary.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
// @todo
// - Ensure that all vocabularies are options in the "Add" fieldset.
$edit = array();
$edit['enable_vocab'] = $this->vocabs['v1']->vid;
$this
->drupalPost(NULL, $edit, t('Add'));
// @todo
// - Ensure that the vocabulary is removed from the "Add" fieldset.
// - Ensure that the fieldset for the vocabulary appears.
// - Ensure that no other fieldsets or rows appear.
// Give anonymous view allow for the v1 default.
$edit = array();
$this
->configureFormRow($edit, $this->vocabs['v1']->vid, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->drupalPost(NULL, $edit, 'Save all');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
// If the page is tagged with a v1 term, access should be allowed.
if (strpos($key, 'v1') !== FALSE) {
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
else {
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
}
// Programmatically enable v2 and add a specific configuration for v2t1.
taxonomy_access_enable_vocab($this->vocabs['v2']->vid, DRUPAL_ANONYMOUS_RID);
$term_config = _taxonomy_access_format_grant_record($this->terms['v2t1']->tid, DRUPAL_ANONYMOUS_RID, array(
'view' => TAXONOMY_ACCESS_NODE_IGNORE,
));
taxonomy_access_set_term_grants(array(
$term_config,
));
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to give anonymous view deny for the v2 default.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->configureFormRow($edit, $this->vocabs['v2']->vid, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_DENY);
$this
->drupalPost(NULL, $edit, 'Save all');
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
switch (TRUE) {
// If the page is tagged with v2t2, the v2 default is inherited: Deny.
case strpos($key, 'v2t2') !== FALSE:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Otherwise, if the page is tagged with v1, it's allowed.
case strpos($key, 'v1') !== FALSE:
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Access should be denied by default.
default:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
}
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the form to change the configuration: Allow for v2; Deny for v1.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->configureFormRow($edit, $this->vocabs['v2']->vid, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->configureFormRow($edit, $this->vocabs['v1']->vid, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_DENY);
$this
->drupalPost(NULL, $edit, 'Save all');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
switch (TRUE) {
// If the page is tagged with a v1 term, access should be denied.
case strpos($key, 'v1') !== FALSE:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Otherwise, if the page is tagged with v2t2, the default is
// inherited and access should be allowed.
case strpos($key, 'v2t2') !== FALSE:
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Access should be denied by default.
default:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
}
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to disable v1.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$this
->clickLink(t('delete all v1 access rules'));
$this
->assertText("Are you sure you want to delete all Taxonomy access rules for v1", t('Disable form for vocabulary loaded.'));
$this
->drupalPost(NULL, array(), 'Delete all');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
// If the page is tagged with v2t2, access should be allowed.
if (strpos($key, 'v2t2') !== FALSE) {
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
else {
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
}
}
/**
* Tests configuring specific terms.
*
* Verifies that:
* - Access is updated correctly when the term configuration is added.
* - Access is updated correctly when there is a vocabulary default.
* - Access is updated correctly when multiple configurations are changed.
* - Access is updated correctly when the term configuration is deleted.
*/
public function testTermConfig() {
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to enable v1 and give anonymous view allow for v1t1.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$edit['enable_vocab'] = $this->vocabs['v1']->vid;
$this
->drupalPost(NULL, $edit, t('Add'));
$edit = array();
$this
->addFormRow($edit, $this->vocabs['v1']->vid, $this->terms['v1t1']->tid, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->drupalPost(NULL, $edit, 'Add');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
// If the page is tagged with v1t1, access should be allowed.
if (strpos($key, 'v1t1') !== FALSE) {
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
else {
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
}
// Enable v2 programmatically.
taxonomy_access_enable_vocab($this->vocabs['v2']->vid, DRUPAL_ANONYMOUS_RID);
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the admin form to give anonymous view deny for v2t1.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->addFormRow($edit, $this->vocabs['v2']->vid, $this->terms['v2t1']->tid, TAXONOMY_ACCESS_NODE_DENY);
$this
->drupalPost(NULL, $edit, 'Add');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
switch (TRUE) {
// If the page is tagged with v2t1, access should be denied.
case strpos($key, 'v2t1') !== FALSE:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Otherwise, if the page is tagged with v1t1, it's allowed.
case strpos($key, 'v1t1') !== FALSE:
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Access should be denied by default.
default:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
}
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the form to change the configuration: Allow for v2t1; Deny for v1t1.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$this
->configureFormRow($edit, $this->vocabs['v2']->vid, $this->terms['v2t1']->tid, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->configureFormRow($edit, $this->vocabs['v1']->vid, $this->terms['v1t1']->tid, TAXONOMY_ACCESS_NODE_DENY);
$this
->drupalPost(NULL, $edit, 'Save all');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
switch (TRUE) {
// If the page is tagged with v1t1, access should be denied.
case strpos($key, 'v1t1') !== FALSE:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Otherwise, if the page is tagged with v2t1, it's allowed.
case strpos($key, 'v2t1') !== FALSE:
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
// Access should be denied by default.
default:
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
break;
}
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Use the form to delete the v2t1 configuration.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$edit["grants[{$this->vocabs['v2']->vid}][{$this->terms['v2t1']->tid}][remove]"] = 1;
$this
->drupalPost(NULL, $edit, 'Delete selected');
// Log out.
$this
->drupalLogout();
// Visit each page and verify whether access is allowed or denied.
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
// Access to all pages should be denied.
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
}
/**
* Tests adding a term configuration with children.
*
* @todo
* Check that node access is updated for these as well.
*/
public function testTermWithChildren() {
// Create some additional taxonomy terms in a hierarchy:
// v1
// - v1t1
// - - v1t1c1
// - - - v1t1c1g1
// - - - v1t1c1g2
// - - v1t1c2
// - - v1t2
$this->terms['v1t1c1'] = $this
->createTerm('v1t1c1', $this->vocabs['v1'], $this->terms['v1t1']->tid);
$this->terms['v1t1c2'] = $this
->createTerm('v1t1c2', $this->vocabs['v1'], $this->terms['v1t1']->tid);
$this->terms['v1t1c1g1'] = $this
->createTerm('v1t1c1g1', $this->vocabs['v1'], $this->terms['v1t1c1']->tid);
$this->terms['v1t1c1g2'] = $this
->createTerm('v1t1c1g2', $this->vocabs['v1'], $this->terms['v1t1c1']->tid);
// Add pages tagged with each.
foreach (array(
'v1t1c1',
'v1t1c2',
'v1t1c1g1',
'v1t1c1g2',
) as $name) {
$this->pages[$name] = $this
->createPage(array(
$name,
));
}
// Log in as the administrator.
$this
->drupalLogin($this->users['site_admin']);
// Enable v1 programmatically.
taxonomy_access_enable_vocab($this->vocabs['v1']->vid, DRUPAL_ANONYMOUS_RID);
// Use the admin form to give anonymous view allow for v1t1 and children.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . '/role/' . DRUPAL_ANONYMOUS_RID . '/edit');
$edit = array();
$edit["new[{$this->vocabs['v1']->vid}][recursive]"] = 1;
$this
->addFormRow($edit, $this->vocabs['v1']->vid, $this->terms['v1t1']->tid, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->drupalPost(NULL, $edit, 'Add');
}
/**
* Tests enabling and disabling TAC for a custom role.
*/
public function testRoleEnableDisable() {
// Save some typing.
$rid = $this->user_roles['regular_user']->rid;
$name = $this->user_roles['regular_user']->name;
// Check that the role is disabled by default.
$this
->checkRoleConfig(array(
DRUPAL_ANONYMOUS_RID => TRUE,
DRUPAL_AUTHENTICATED_RID => TRUE,
$rid => FALSE,
));
// Test enabling the role.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . "/role/{$rid}/edit");
// Check that there is:
// - An enable link
// - No disable link
// @todo
// - No grant tables.
$this
->checkRoleEnableLink($rid, TRUE);
$this
->checkRoleDisableLink($rid, FALSE);
// Enable the role and check that there is:
// - A disable link
// - No enable link
// @todo
// - A global default table (with correct values?)
// - An "Add vocabulary" fieldset.
// - No vocabulary fieldsets or term data.
$this
->clickLink(format_string('Enable @name', array(
'@name' => $name,
)));
$this
->checkRoleEnableLink($rid, FALSE);
$this
->checkRoleDisableLink($rid, TRUE);
// Update the global default to allow view.
$edit = array();
$this
->configureFormRow($edit, TAXONOMY_ACCESS_GLOBAL_DEFAULT, TAXONOMY_ACCESS_VOCABULARY_DEFAULT, TAXONOMY_ACCESS_NODE_ALLOW);
$this
->drupalPost(NULL, $edit, 'Save all');
// Confirm that all three roles are enabled.
$this
->checkRoleConfig(array(
DRUPAL_ANONYMOUS_RID => TRUE,
DRUPAL_AUTHENTICATED_RID => TRUE,
$rid => TRUE,
));
// Check that the role is configured.
$r = db_query('SELECT grant_view FROM {taxonomy_access_default}
WHERE vid = :vid AND rid = :rid', array(
':vid' => TAXONOMY_ACCESS_GLOBAL_DEFAULT,
':rid' => $rid,
))
->fetchField();
$this
->assertTrue($r == TAXONOMY_ACCESS_NODE_ALLOW, t('Used form to grant the role %role view in the global default.', array(
'%role' => $name,
)));
// Log in as the regular_user.
$this
->drupalLogout();
$this
->drupalLogin($this->users['regular_user']);
// Visit each node and verify that access is allowed.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(200, t("Access to %name article (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
$this
->assertResponse(200, t("Access to %name page (nid %nid) is allowed.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
// Log in as the administrator.
$this
->drupalLogout();
$this
->drupalLogin($this->users['site_admin']);
// Test disabling the role.
$this
->drupalGet(TAXONOMY_ACCESS_CONFIG . "/role/{$rid}/edit");
$this
->clickLink(t('Disable @name', array(
'@name' => $name,
)));
$this
->assertText("Are you sure you want to delete all taxonomy access rules for the role {$name}", t('Disable form for role loaded.'));
$this
->drupalPost(NULL, array(), 'Delete all');
// Confirm that a confirmation message appears.
$this
->assertText("All taxonomy access rules deleted for role {$name}", t('Confirmation message found.'));
// Check that there is:
// - An enable link
// - No disable link
// @todo
// - No grant tables.
$this
->checkRoleEnableLink($rid, TRUE);
$this
->checkRoleDisableLink($rid, FALSE);
// Confirm edit/enable/disable links are in their original state.
$this
->checkRoleConfig(array(
DRUPAL_ANONYMOUS_RID => TRUE,
DRUPAL_AUTHENTICATED_RID => TRUE,
$rid => FALSE,
));
// Check that the role is no longer configured.
$r = db_query('SELECT grant_view FROM {taxonomy_access_default}
WHERE rid = :rid', array(
':rid' => $rid,
))
->fetchAll();
$this
->assertTrue(empty($r), t('All records removed for role %role.', array(
'%role' => $name,
)));
// @todo
// - Add a term configuration and make sure that gets deleted too.
// Log in as the regular_user.
$this
->drupalLogout();
$this
->drupalLogin($this->users['regular_user']);
// Visit all nodes and verify that access is again denied.
foreach ($this->articles as $key => $article) {
$this
->drupalGet('node/' . $article->nid);
$this
->assertResponse(403, t("Access to %name article (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $article->nid,
)));
}
foreach ($this->pages as $key => $page) {
$this
->drupalGet('node/' . $page->nid);
$this
->assertResponse(403, t("Access to %name page (nid %nid) is denied.", array(
'%name' => $key,
'%nid' => $page->nid,
)));
}
}
}
Members
Name | Modifiers | Type | Description | Overrides |
---|---|---|---|---|
DrupalTestCase:: |
protected | property | Assertions thrown in that test case. | |
DrupalTestCase:: |
protected | property | The database prefix of this test run. | |
DrupalTestCase:: |
protected | property | The original file directory, before it was changed for testing purposes. | |
DrupalTestCase:: |
public | property | Current results of this test case. | |
DrupalTestCase:: |
protected | property | Flag to indicate whether the test has been set up. | |
DrupalTestCase:: |
protected | property | ||
DrupalTestCase:: |
protected | property | ||
DrupalTestCase:: |
protected | property | This class is skipped when looking for the source of an assertion. | |
DrupalTestCase:: |
protected | property | The test run ID. | |
DrupalTestCase:: |
protected | property | Time limit for the test. | |
DrupalTestCase:: |
public | property | Whether to cache the installation part of the setUp() method. | |
DrupalTestCase:: |
public | property | Whether to cache the modules installation part of the setUp() method. | |
DrupalTestCase:: |
protected | property | URL to the verbose output file directory. | |
DrupalTestCase:: |
protected | function | Internal helper: stores the assert. | |
DrupalTestCase:: |
protected | function | Check to see if two values are equal. | |
DrupalTestCase:: |
protected | function | Check to see if a value is false (an empty string, 0, NULL, or FALSE). | |
DrupalTestCase:: |
protected | function | Check to see if two values are identical. | |
DrupalTestCase:: |
protected | function | Check to see if two values are not equal. | |
DrupalTestCase:: |
protected | function | Check to see if two values are not identical. | |
DrupalTestCase:: |
protected | function | Check to see if a value is not NULL. | |
DrupalTestCase:: |
protected | function | Check to see if a value is NULL. | |
DrupalTestCase:: |
protected | function | Check to see if a value is not false (not an empty string, 0, NULL, or FALSE). | |
DrupalTestCase:: |
public static | function | Delete an assertion record by message ID. | |
DrupalTestCase:: |
protected | function | Fire an error assertion. | 1 |
DrupalTestCase:: |
public | function | Handle errors during test runs. | 1 |
DrupalTestCase:: |
protected | function | Handle exceptions. | |
DrupalTestCase:: |
protected | function | Fire an assertion that is always negative. | |
DrupalTestCase:: |
public static | function | Converts a list of possible parameters into a stack of permutations. | |
DrupalTestCase:: |
protected | function | Cycles through backtrace until the first non-assertion method is found. | |
DrupalTestCase:: |
public static | function | Returns the database connection to the site running Simpletest. | |
DrupalTestCase:: |
public static | function | Store an assertion from outside the testing context. | |
DrupalTestCase:: |
protected | function | Fire an assertion that is always positive. | |
DrupalTestCase:: |
public static | function | Generates a random string containing letters and numbers. | |
DrupalTestCase:: |
public static | function | Generates a random string of ASCII characters of codes 32 to 126. | |
DrupalTestCase:: |
public | function | Run all tests in this class. | |
DrupalTestCase:: |
protected | function | Logs a verbose message in a text file. | |
DrupalWebTestCase:: |
protected | property | Additional cURL options. | |
DrupalWebTestCase:: |
protected | property | The content of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The current cookie file used by cURL. | |
DrupalWebTestCase:: |
protected | property | The cookies of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The handle of the current cURL connection. | |
DrupalWebTestCase:: |
protected | property | The value of the Drupal.settings JavaScript variable for the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | The parsed version of the page. | |
DrupalWebTestCase:: |
protected | property | Whether the files were copied to the test files directory. | |
DrupalWebTestCase:: |
protected | property | The headers of the page currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | property | HTTP authentication credentials (<username>:<password>). | |
DrupalWebTestCase:: |
protected | property | HTTP authentication method | |
DrupalWebTestCase:: |
protected | property | The current user logged in using the internal browser. | |
DrupalWebTestCase:: |
protected | property | The original shutdown handlers array, before it was cleaned for testing purposes. | |
DrupalWebTestCase:: |
protected | property | The original user, before it was changed to a clean uid = 1 for testing purposes. | |
DrupalWebTestCase:: |
protected | property | The content of the page currently loaded in the internal browser (plain text version). | |
DrupalWebTestCase:: |
protected | property | The profile to install as a basis for testing. | 20 |
DrupalWebTestCase:: |
protected | property | The number of redirects followed during the handling of a request. | |
DrupalWebTestCase:: |
protected | property | The current session ID, if available. | |
DrupalWebTestCase:: |
protected | property | The current session name, if available. | |
DrupalWebTestCase:: |
protected | property | The URL currently loaded in the internal browser. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists with the given name or ID. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page with the given ID and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page with the given name and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field exists in the current page by the given XPath. | |
DrupalWebTestCase:: |
protected | function | Asserts that a checkbox field in the current page is checked. | |
DrupalWebTestCase:: |
protected | function | Pass if a link with the specified label is found, and optional with the specified index. | |
DrupalWebTestCase:: |
protected | function | Pass if a link containing a given href (part) is found. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the given value. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the pattern in it. | |
DrupalWebTestCase:: |
protected | function | Asserts that the most recently sent e-mail message has the string in it. | |
DrupalWebTestCase:: |
protected | function | Asserts that each HTML ID is used for just a single element. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given name or ID. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given ID and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field does not exist with the given name and value. | |
DrupalWebTestCase:: |
protected | function | Asserts that a field doesn't exist or its value doesn't match, by XPath. | |
DrupalWebTestCase:: |
protected | function | Asserts that a checkbox field in the current page is not checked. | |
DrupalWebTestCase:: |
protected | function | Pass if a link with the specified label is not found. | |
DrupalWebTestCase:: |
protected | function | Pass if a link containing a given href (part) is not found. | |
DrupalWebTestCase:: |
protected | function | Asserts that a select option in the current page is not checked. | |
DrupalWebTestCase:: |
protected | function | Will trigger a pass if the perl regex pattern is not present in raw content. | |
DrupalWebTestCase:: |
protected | function | Pass if the raw text is NOT found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. | |
DrupalWebTestCase:: |
protected | function | Asserts the page did not return the specified response code. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is NOT found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. | |
DrupalWebTestCase:: |
protected | function | Pass if the page title is not the given string. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is found MORE THAN ONCE on the text version of the page. | |
DrupalWebTestCase:: |
protected | function | Asserts that a select option in the current page is checked. | |
DrupalWebTestCase:: |
protected | function | Will trigger a pass if the Perl regex pattern is found in the raw content. | |
DrupalWebTestCase:: |
protected | function | Pass if the raw text IS found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. | |
DrupalWebTestCase:: |
protected | function | Asserts the page responds with the specified response code. | |
DrupalWebTestCase:: |
protected | function | Pass if the text IS found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. | |
DrupalWebTestCase:: |
protected | function | Helper for assertText and assertNoText. | |
DrupalWebTestCase:: |
protected | function | Asserts themed output. | |
DrupalWebTestCase:: |
protected | function | Pass if the page title is the given string. | |
DrupalWebTestCase:: |
protected | function | Pass if the text is found ONLY ONCE on the text version of the page. | |
DrupalWebTestCase:: |
protected | function | Helper for assertUniqueText and assertNoUniqueText. | |
DrupalWebTestCase:: |
protected | function | Pass if the internal browser's URL matches the given path. | |
DrupalWebTestCase:: |
protected | function | Builds an XPath query. | |
DrupalWebTestCase:: |
protected | function | Changes the database connection to the prefixed one. | |
DrupalWebTestCase:: |
protected | function | Check for meta refresh tag and if found call drupalGet() recursively. This function looks for the http-equiv attribute to be set to "Refresh" and is case-sensitive. | |
DrupalWebTestCase:: |
protected | function | Check to make sure that the array of permissions are valid. | |
DrupalWebTestCase:: |
protected | function | Follows a link by name. | |
DrupalWebTestCase:: |
protected | function | Helper function: construct an XPath for the given set of attributes and value. | |
DrupalWebTestCase:: |
protected | function | Copy the setup cache from/to another table and files directory. | |
DrupalWebTestCase:: |
protected | function | Runs cron in the Drupal installed by Simpletest. | |
DrupalWebTestCase:: |
protected | function | Close the cURL handler and unset the handler. | |
DrupalWebTestCase:: |
protected | function | Initializes and executes a cURL request. | |
DrupalWebTestCase:: |
protected | function | Reads headers and registers errors received from the tested site. | |
DrupalWebTestCase:: |
protected | function | Initializes the cURL connection. | |
DrupalWebTestCase:: |
protected | function | Compare two files based on size and file name. | |
DrupalWebTestCase:: |
protected | function | Creates a custom content type based on default settings. | |
DrupalWebTestCase:: |
protected | function | Creates a node based on default settings. | |
DrupalWebTestCase:: |
protected | function | Creates a role with specified permissions. | |
DrupalWebTestCase:: |
protected | function | Create a user with a given set of permissions. | |
DrupalWebTestCase:: |
protected | function | Retrieves a Drupal path or an absolute path. | |
DrupalWebTestCase:: |
protected | function | Retrieve a Drupal path or an absolute path and JSON decode the result. | |
DrupalWebTestCase:: |
protected | function | Gets the current raw HTML of requested page. | |
DrupalWebTestCase:: |
protected | function | Gets the value of an HTTP response header. If multiple requests were required to retrieve the page, only the headers from the last request will be checked by default. However, if TRUE is passed as the second argument, all requests will be processed… | |
DrupalWebTestCase:: |
protected | function | Gets the HTTP response headers of the requested page. Normally we are only interested in the headers returned by the last request. However, if a page is redirected or HTTP authentication is in use, multiple requests will be required to retrieve the… | |
DrupalWebTestCase:: |
protected | function | Gets an array containing all e-mails sent during this test case. | |
DrupalWebTestCase:: |
function | Get a node from the database based on its title. | ||
DrupalWebTestCase:: |
protected | function | Gets the value of the Drupal.settings JavaScript variable for the currently loaded page. | |
DrupalWebTestCase:: |
protected | function | Get a list files that can be used in tests. | |
DrupalWebTestCase:: |
protected | function | Generate a token for the currently logged in user. | |
DrupalWebTestCase:: |
protected | function | Retrieves only the headers for a Drupal path or an absolute path. | |
DrupalWebTestCase:: |
protected | function | Log in a user with the internal browser. | |
DrupalWebTestCase:: |
protected | function | ||
DrupalWebTestCase:: |
protected | function | Execute a POST request on a Drupal page. It will be done as usual POST request with SimpleBrowser. | |
DrupalWebTestCase:: |
protected | function | Execute an Ajax submission. | |
DrupalWebTestCase:: |
protected | function | Sets the raw HTML content. This can be useful when a page has been fetched outside of the internal browser and assertions need to be made on the returned page. | |
DrupalWebTestCase:: |
protected | function | Sets the value of the Drupal.settings JavaScript variable for the currently loaded page. | |
DrupalWebTestCase:: |
protected | function | Takes a path and returns an absolute path. | |
DrupalWebTestCase:: |
protected | function | Get all option elements, including nested options, in a select. | |
DrupalWebTestCase:: |
protected | function | Get the selected value from a select field. | |
DrupalWebTestCase:: |
protected | function | Returns the cache key used for the setup caching. | |
DrupalWebTestCase:: |
protected | function | Get the current URL from the cURL handler. | |
DrupalWebTestCase:: |
protected | function | Handle form input related to drupalPost(). Ensure that the specified fields exist and attempt to create POST data in the correct manner for the particular field type. | |
DrupalWebTestCase:: |
protected | function | Copies the cached tables and files for a cached installation setup. | |
DrupalWebTestCase:: |
protected | function | Parse content returned from curlExec using DOM and SimpleXML. | |
DrupalWebTestCase:: |
protected | function | Preload the registry from the testing site. | |
DrupalWebTestCase:: |
protected | function | Generates a database prefix for running tests. | |
DrupalWebTestCase:: |
protected | function | Prepares the current environment for running the test. | |
DrupalWebTestCase:: |
protected | function | Recursively copy one directory to another. | |
DrupalWebTestCase:: |
protected | function | Refresh the in-memory set of variables. Useful after a page request is made that changes a variable in a different thread. | 1 |
DrupalWebTestCase:: |
protected | function | Reset all data structures after having enabled new modules. | |
DrupalWebTestCase:: |
protected | function | Store the installation setup to a cache. | |
DrupalWebTestCase:: |
protected | function | Delete created files and temporary files directory, delete the tables created by setUp(), and reset the database prefix. | 6 |
DrupalWebTestCase:: |
protected | function | Outputs to verbose the most recent $count emails sent. | |
DrupalWebTestCase:: |
protected | function | Perform an xpath search on the contents of the internal browser. The search is relative to the root element (HTML tag normally) of the page. | |
DrupalWebTestCase:: |
function |
Constructor for DrupalWebTestCase. Overrides DrupalTestCase:: |
1 | |
TaxonomyAccessConfigTest:: |
protected | property | ||
TaxonomyAccessConfigTest:: |
protected | property | ||
TaxonomyAccessConfigTest:: |
protected | property | ||
TaxonomyAccessConfigTest:: |
protected | property | ||
TaxonomyAccessConfigTest:: |
function | Creates a page with the specified terms. | ||
TaxonomyAccessConfigTest:: |
public static | function | ||
TaxonomyAccessConfigTest:: |
public | function |
Sets up a Drupal site for running functional and integration tests. Overrides TaxonomyAccessTestCase:: |
|
TaxonomyAccessConfigTest:: |
public | function | Tests configuring a global default. | |
TaxonomyAccessConfigTest:: |
public | function | Tests enabling and disabling TAC for a custom role. | |
TaxonomyAccessConfigTest:: |
public | function | Tests the initial state of the test environment. | |
TaxonomyAccessConfigTest:: |
public | function | Tests configuring specific terms. | |
TaxonomyAccessConfigTest:: |
public | function | Tests adding a term configuration with children. | |
TaxonomyAccessConfigTest:: |
public | function | Tests configuring vocabulary defaults. | |
TaxonomyAccessTestCase:: |
protected | property | ||
TaxonomyAccessTestCase:: |
protected | property | ||
TaxonomyAccessTestCase:: |
protected | property | ||
TaxonomyAccessTestCase:: |
function | Adds a term row on the role configuration form. | ||
TaxonomyAccessTestCase:: |
function | Asserts that a status column and "Configure" link is found for the role. | ||
TaxonomyAccessTestCase:: |
function | Asserts that a disable link is or is not found for the role. | ||
TaxonomyAccessTestCase:: |
function | Asserts that an enable link is or is not found for the role. | ||
TaxonomyAccessTestCase:: |
function | Configures a row on the TAC configuration form. | ||
TaxonomyAccessTestCase:: |
function | Creates an article with the specified terms. | ||
TaxonomyAccessTestCase:: |
function | Creates a taxonomy field and adds it to the page content type. | ||
TaxonomyAccessTestCase:: |
function | Creates a new term in the specified vocabulary. | ||
TaxonomyAccessTestCase:: |
function | Creates a vocabulary with a certain name. | ||
TaxonomyAccessTestCase:: |
function | Submits the node access rebuild form. |