class UserPasswordResetTestCase
Tests resetting a user password.
Hierarchy
- class \DrupalTestCase
- class \DrupalWebTestCase extends \DrupalTestCase
- class \UserPasswordResetTestCase extends \DrupalWebTestCase
- class \DrupalWebTestCase extends \DrupalTestCase
Expanded class hierarchy of UserPasswordResetTestCase
File
-
modules/
user/ user.test, line 492
View source
class UserPasswordResetTestCase extends DrupalWebTestCase {
protected $profile = 'standard';
function setUp() {
parent::setUp('user_form_test');
}
public static function getInfo() {
return array(
'name' => 'Reset password',
'description' => 'Ensure that password reset methods work as expected.',
'group' => 'User',
);
}
/**
* Retrieves password reset email and extracts the login link.
*/
public function getResetURL($bypass_form = FALSE) {
// Assume the most recent email.
$_emails = $this->drupalGetMails();
$email = end($_emails);
$urls = array();
preg_match('#.+user/reset/.+#', $email['body'], $urls);
return $urls[0] . ($bypass_form ? '/login' : '');
}
/**
* Generates login link.
*/
public function generateResetURL($account, $bypass_form = FALSE) {
return user_pass_reset_url($account) . ($bypass_form ? '/login' : '');
}
/**
* Turns a password reset URL into a 'confirm' URL.
*/
public function getConfirmURL($reset_url) {
// Last part is always the hash; replace with "confirm".
$parts = explode('/', $reset_url);
array_pop($parts);
array_push($parts, 'confirm');
return implode('/', $parts);
}
/**
* Tests password reset functionality.
*/
function testUserPasswordReset($use_direct_login_link = FALSE) {
// Create a user.
$account = $this->drupalCreateUser();
$this->drupalLogin($account);
$this->drupalLogout();
// Attempt to reset password.
$edit = array(
'name' => $account->name,
);
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Ensure the correct message is shown for a valid user name.
$password_reset_text = variable_get('user_password_reset_text', t('If %identifier is a valid account, an email will be sent with instructions to reset your password.'));
$this->assertRaw(format_string($password_reset_text, array(
'%identifier' => $account->name,
)), 'Password reset instructions mailed message displayed for a valid user.');
// Ensure that flood control was not triggered.
$this->assertNoText(t('is temporarily blocked. Try again later'), 'Flood control was not triggered by single password reset.');
// Ensure the correct message is shown for a non-existent user name.
$name = $this->randomName();
$edit = array(
'name' => $name,
);
$this->drupalPost('user/password', $edit, t('E-mail new password'));
$password_reset_text = variable_get('user_password_reset_text', t('If %identifier is a valid account, an email will be sent with instructions to reset your password.'));
$this->assertRaw(format_string($password_reset_text, array(
'%identifier' => $name,
)), 'Password reset instructions mailed message displayed for a non-existent user.');
// Create an image field to enable an Ajax request on the user profile page.
$field = array(
'field_name' => 'field_avatar',
'type' => 'image',
'settings' => array(),
'cardinality' => 1,
);
field_create_field($field);
$instance = array(
'field_name' => $field['field_name'],
'entity_type' => 'user',
'label' => 'Avatar',
'bundle' => 'user',
'required' => FALSE,
'settings' => array(),
'widget' => array(
'type' => 'image_image',
'settings' => array(),
),
);
field_create_instance($instance);
variable_del("user_test_pass_reset_form_submit_{$account->uid}");
$resetURL = $this->getResetURL($use_direct_login_link);
$this->drupalGet($resetURL);
// Check successful login.
if (!$use_direct_login_link) {
$this->assertUrl($this->getConfirmURL($resetURL), array(), 'The user is redirected to the reset password confirm form.');
$this->drupalPost(NULL, NULL, t('Log in'));
// The form was fully processed before redirecting.
$form_submit_handled = variable_get("user_test_pass_reset_form_submit_{$account->uid}", FALSE);
$this->assertTrue($form_submit_handled, 'A custom submit handler executed.');
}
$this->assertText('You have just used your one-time login link. It is no longer necessary to use this link to log in. Please change your password.');
// Make sure the Ajax request from uploading a file does not invalidate the
// reset token.
$image = current($this->drupalGetTestFiles('image'));
$edit = array(
'files[field_avatar_und_0]' => drupal_realpath($image->uri),
);
$this->drupalPostAJAX(NULL, $edit, 'field_avatar_und_0_upload_button');
// Change the forgotten password.
$password = user_password();
$edit = array(
'pass[pass1]' => $password,
'pass[pass2]' => $password,
);
$this->drupalPost(NULL, $edit, t('Save'));
$this->assertText(t('The changes have been saved.'), 'Forgotten password changed.');
// Ensure blocked and deleted accounts can't access the direct login link.
$this->drupalLogout();
$reset_url = $this->generateResetURL($account, $use_direct_login_link);
user_save($account, array(
'status' => 0,
));
$this->drupalGet($reset_url);
$this->assertResponse(403);
user_delete($account->uid);
$this->drupalGet($reset_url);
$this->assertResponse(403);
}
/**
* Test user-based flood control on password reset.
*/
function testPasswordResetFloodControlPerUser() {
// Set a very low limit for testing.
variable_set('user_pass_reset_user_limit', 2);
// Create a user.
$account = $this->drupalCreateUser();
$this->drupalLogin($account);
$this->drupalLogout();
$edit = array(
'name' => $account->name,
);
// Try 2 requests that should not trigger flood control.
for ($i = 0; $i < 2; $i++) {
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Confirm the password reset.
$password_reset_text = variable_get('user_password_reset_text', t('If %identifier is a valid account, an email will be sent with instructions to reset your password.'));
$this->assertRaw(format_string($password_reset_text, array(
'%identifier' => $account->name,
)), 'Password reset instructions mailed message displayed.');
// Ensure that flood control was not triggered.
$this->assertNoText(t('is temporarily blocked. Try again later'), 'Flood control was not triggered by password reset.');
}
// A successful password reset should clear flood events.
$resetURL = $this->getResetURL();
$this->drupalGet($resetURL);
// Check successful login.
$this->drupalPost(NULL, NULL, t('Log in'));
$this->drupalLogout();
// Try 2 requests that should not trigger flood control.
for ($i = 0; $i < 2; $i++) {
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Confirm the password reset.
$password_reset_text = variable_get('user_password_reset_text', t('If %identifier is a valid account, an email will be sent with instructions to reset your password.'));
$this->assertRaw(format_string($password_reset_text, array(
'%identifier' => $account->name,
)), 'Password reset instructions mailed message displayed.');
// Ensure that flood control was not triggered.
$this->assertNoText(t('is temporarily blocked. Try again later'), 'Flood control was not triggered by password reset.');
}
// The next request should trigger flood control
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Confirm the password reset was blocked.
$this->assertNoText(t('Further instructions have been sent to your e-mail address.'), 'Password reset instructions mailed message not displayed for excessive password resets.');
// Ensure that flood control was triggered.
$this->assertText(t('Sorry, there have been more than 2 password reset attempts for this account. It is temporarily blocked.'), 'Flood control was triggered by excessive password resets for one user.');
}
/**
* Test IP-based flood control on password reset.
*/
function testPasswordResetFloodControlPerIp() {
// Set a very low limit for testing.
variable_set('user_pass_reset_ip_limit', 2);
// Try 2 requests that should not trigger flood control.
for ($i = 0; $i < 2; $i++) {
$name = $this->randomName();
$edit = array(
'name' => $name,
);
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Confirm the password reset was not blocked.
$password_reset_text = variable_get('user_password_reset_text', t('If %identifier is a valid account, an email will be sent with instructions to reset your password.'));
$this->assertRaw(format_string($password_reset_text, array(
'%identifier' => $name,
)), 'Password reset instructions mailed message displayed.');
// Ensure that flood control was not triggered.
$this->assertNoText(t('is temporarily blocked. Try again later'), 'Flood control was not triggered by password reset.');
}
// The next request should trigger flood control
$name = $this->randomName();
$edit = array(
'name' => $name,
);
$this->drupalPost('user/password', $edit, t('E-mail new password'));
// Confirm the password reset was blocked early. Note that @name is used
// instead of %name as assertText() works with plain text not HTML.
$this->assertNoText(t('Sorry, @name is not recognized as a user name or an e-mail address.', array(
'@name' => $name,
)), 'User name not recognized message not displayed.');
// Ensure that flood control was triggered.
$this->assertText(t('Sorry, too many password reset attempts from your IP address. This IP address is temporarily blocked.'), 'Flood control was triggered by excessive password resets from one IP.');
}
/**
* Test user password reset while logged in.
*/
function testUserPasswordResetLoggedIn($use_direct_login_link = FALSE) {
$another_account = $this->drupalCreateUser();
$account = $this->drupalCreateUser();
$this->drupalLogin($account);
// Make sure the test account has a valid password.
user_save($account, array(
'pass' => user_password(),
));
// Try to use the login link while logged in as a different user.
// Generate one time login link.
$reset_url = $this->generateResetURL($another_account, $use_direct_login_link);
$this->drupalGet($reset_url);
$this->assertRaw(t('Another user (%other_user) is already logged into the site on this computer, but you tried to use a one-time link for user %resetting_user. Please <a href="!logout">logout</a> and try using the link again.', array(
'%other_user' => $account->name,
'%resetting_user' => $another_account->name,
'!logout' => url('user/logout'),
)));
// Test the link for a deleted user while logged in.
user_delete($another_account->uid);
$this->drupalGet($reset_url);
$this->assertText('The one-time login link you clicked is invalid.');
// Generate a one time login link for the logged-in user.
$fapi_action = $use_direct_login_link ? 'build' : 'submit';
variable_del("user_test_pass_reset_form_{$fapi_action}_{$account->uid}");
$reset_url = $this->generateResetURL($account, $use_direct_login_link);
$this->drupalGet($reset_url);
if ($use_direct_login_link) {
// The form is never fully built; user is logged out (session destroyed)
// and redirected to the same URL, then logged in again and redirected
// during form build.
$form_built = variable_get("user_test_pass_reset_form_build_{$account->uid}", FALSE);
$this->assertTrue(!$form_built, 'The password reset form was never fully built.');
}
else {
$this->assertUrl($this->getConfirmURL($reset_url), array(), 'The user is redirected to the reset password confirm form.');
$this->assertText('Reset password');
$this->drupalPost(NULL, NULL, t('Log in'));
// The form was fully processed before redirecting.
$form_submit_handled = variable_get("user_test_pass_reset_form_submit_{$account->uid}", FALSE);
$this->assertTrue($form_submit_handled, 'A custom submit handler executed.');
}
$this->assertText('You have just used your one-time login link. It is no longer necessary to use this link to log in. Please change your password.');
// The user can change the forgotten password on the page they are
// redirected to.
$pass = user_password();
$edit = array(
'pass[pass1]' => $pass,
'pass[pass2]' => $pass,
);
$this->drupalPost(NULL, $edit, t('Save'));
$this->assertText('The changes have been saved.');
}
/**
* Test direct login link that bypasses the password reset form.
*/
function testUserDirectLogin() {
$this->testUserPasswordReset(TRUE);
$this->testUserPasswordResetLoggedIn(TRUE);
}
/**
* Attempts login using an expired password reset link.
*/
function testUserPasswordResetExpired() {
// Set password reset timeout variable to 43200 seconds = 12 hours.
$timeout = 43200;
variable_set('user_password_reset_timeout', $timeout);
// Create a user.
$account = $this->drupalCreateUser();
$this->drupalLogin($account);
// Load real user object.
$account = user_load($account->uid, TRUE);
$this->drupalLogout();
// To attempt an expired password reset, create a password reset link as if
// its request time was 60 seconds older than the allowed limit of timeout.
$bogus_timestamp = REQUEST_TIME - variable_get('user_password_reset_timeout', 86400) - 60;
$this->drupalGet("user/reset/{$account->uid}/{$bogus_timestamp}/" . user_pass_rehash($account->pass, $bogus_timestamp, $account->login, $account->uid, $account->mail));
$this->assertText(t('You have tried to use a one-time login link that has expired. Please request a new one using the form below.'), 'Expired password reset request rejected.');
}
/**
* Prefill the text box on incorrect login via link to password reset page.
*/
function testUserPasswordTextboxFilled() {
$this->drupalGet('user/login');
$edit = array(
'name' => $this->randomName(),
'pass' => $this->randomName(),
);
$this->drupalPost('user', $edit, t('Log in'));
$this->assertRaw(t('Sorry, unrecognized username or password. <a href="@password">Have you forgotten your password?</a>', array(
'@password' => url('user/password', array(
'query' => array(
'name' => $edit['name'],
),
)),
)));
unset($edit['pass']);
$this->drupalGet('user/password', array(
'query' => array(
'name' => $edit['name'],
),
));
$this->assertFieldByName('name', $edit['name'], 'User name found.');
}
/**
* Make sure that users cannot forge password reset URLs of other users.
*/
function testResetImpersonation() {
// Make sure user 1 has a valid password, so it does not interfere with the
// test user accounts that are created below.
$account = user_load(1);
user_save($account, array(
'pass' => user_password(),
));
// Create two identical user accounts except for the user name. They must
// have the same empty password, so we can't use $this->drupalCreateUser().
$edit = array();
$edit['name'] = $this->randomName();
$edit['mail'] = $edit['name'] . '@example.com';
$edit['status'] = 1;
$user1 = user_save(drupal_anonymous_user(), $edit);
$edit['name'] = $this->randomName();
$user2 = user_save(drupal_anonymous_user(), $edit);
// The password reset URL must not be valid for the second user when only
// the user ID is changed in the URL.
$reset_url = user_pass_reset_url($user1);
$attack_reset_url = str_replace("user/reset/{$user1->uid}", "user/reset/{$user2->uid}", $reset_url);
$this->drupalGet($attack_reset_url);
$this->assertNoText($user2->name, 'The invalid password reset page does not show the user name.');
$this->assertUrl('user/password', array(), 'The user is redirected to the password reset request page.');
$this->assertText('You have tried to use a one-time login link that has either been used or is no longer valid. Please request a new one using the form below.');
// When legacy code calls user_pass_rehash() without providing the $uid
// parameter, neither password reset URL should be valid since it is
// impossible for the system to determine which user account the token was
// intended for.
$timestamp = REQUEST_TIME;
// Pass an explicit NULL for the $uid parameter of user_pass_rehash()
// rather than not passing it at all, to avoid triggering PHP warnings in
// the test.
$reset_url_token = user_pass_rehash($user1->pass, $timestamp, $user1->login, NULL);
$reset_url = url("user/reset/{$user1->uid}/{$timestamp}/{$reset_url_token}", array(
'absolute' => TRUE,
));
$this->drupalGet($reset_url);
$this->assertNoText($user1->name, 'The invalid password reset page does not show the user name.');
$this->assertUrl('user/password', array(), 'The user is redirected to the password reset request page.');
$this->assertText('You have tried to use a one-time login link that has either been used or is no longer valid. Please request a new one using the form below.');
$attack_reset_url = str_replace("user/reset/{$user1->uid}", "user/reset/{$user2->uid}", $reset_url);
$this->drupalGet($attack_reset_url);
$this->assertNoText($user2->name, 'The invalid password reset page does not show the user name.');
$this->assertUrl('user/password', array(), 'The user is redirected to the password reset request page.');
$this->assertText('You have tried to use a one-time login link that has either been used or is no longer valid. Please request a new one using the form below.');
// To verify that user_pass_rehash() never returns a valid result in the
// above situation (even if legacy code also called it to attempt to
// validate the token, rather than just to generate the URL), check that a
// second call with the same parameters produces a different result.
$new_reset_url_token = user_pass_rehash($user1->pass, $timestamp, $user1->login, NULL);
$this->assertNotEqual($reset_url_token, $new_reset_url_token);
// However, when the duplicate account is removed, the password reset URL
// should be valid.
user_delete($user2->uid);
$reset_url_token = user_pass_rehash($user1->pass, $timestamp, $user1->login, NULL);
$reset_url = url("user/reset/{$user1->uid}/{$timestamp}/{$reset_url_token}", array(
'absolute' => TRUE,
));
$this->drupalGet($reset_url);
$this->assertText($user1->name, 'The valid password reset page shows the user name.');
$this->assertUrl($this->getConfirmURL($reset_url), array(), 'The user is redirected to the reset password confirm form.');
$this->assertNoText('You have tried to use a one-time login link that has either been used or is no longer valid. Please request a new one using the form below.');
}
/**
* Make sure that password reset URLs are invalidated when the user's email
* address changes.
*/
function testResetInvalidation() {
$account = $this->drupalCreateUser();
$original_reset_url = user_pass_reset_url($account);
user_save($account, array(
'mail' => '1' . $account->mail,
));
$this->drupalGet($original_reset_url);
$this->assertText('You have tried to use a one-time login link that has either been used or is no longer valid. Please request a new one using the form below.');
}
}
Members
Title Sort descending | Modifiers | Object type | Summary | Overriden Title | Overrides |
---|---|---|---|---|---|
DrupalTestCase::$assertions | protected | property | Assertions thrown in that test case. | ||
DrupalTestCase::$databasePrefix | protected | property | The database prefix of this test run. | ||
DrupalTestCase::$originalFileDirectory | protected | property | The original file directory, before it was changed for testing purposes. | ||
DrupalTestCase::$originalLanguage | protected | property | The original language. | ||
DrupalTestCase::$originalLanguageDefault | protected | property | The original default language. | ||
DrupalTestCase::$originalTheme | protected | property | The original theme. | ||
DrupalTestCase::$originalThemeKey | protected | property | The original theme key. | ||
DrupalTestCase::$originalThemePath | protected | property | The original theme path. | ||
DrupalTestCase::$results | public | property | Current results of this test case. | ||
DrupalTestCase::$setup | protected | property | Flag to indicate whether the test has been set up. | ||
DrupalTestCase::$setupDatabasePrefix | protected | property | |||
DrupalTestCase::$setupEnvironment | protected | property | |||
DrupalTestCase::$skipClasses | protected | property | This class is skipped when looking for the source of an assertion. | ||
DrupalTestCase::$testId | protected | property | The test run ID. | ||
DrupalTestCase::$timeLimit | protected | property | Time limit for the test. | ||
DrupalTestCase::$useSetupInstallationCache | public | property | Whether to cache the installation part of the setUp() method. | ||
DrupalTestCase::$useSetupModulesCache | public | property | Whether to cache the modules installation part of the setUp() method. | ||
DrupalTestCase::$verboseDirectoryUrl | protected | property | URL to the verbose output file directory. | ||
DrupalTestCase::assert | protected | function | Internal helper: stores the assert. | ||
DrupalTestCase::assertEqual | protected | function | Check to see if two values are equal. | ||
DrupalTestCase::assertFalse | protected | function | Check to see if a value is false (an empty string, 0, NULL, or FALSE). | ||
DrupalTestCase::assertIdentical | protected | function | Check to see if two values are identical. | ||
DrupalTestCase::assertNotEqual | protected | function | Check to see if two values are not equal. | ||
DrupalTestCase::assertNotIdentical | protected | function | Check to see if two values are not identical. | ||
DrupalTestCase::assertNotNull | protected | function | Check to see if a value is not NULL. | ||
DrupalTestCase::assertNull | protected | function | Check to see if a value is NULL. | ||
DrupalTestCase::assertTrue | protected | function | Check to see if a value is not false (not an empty string, 0, NULL, or FALSE). | ||
DrupalTestCase::deleteAssert | public static | function | Delete an assertion record by message ID. | ||
DrupalTestCase::error | protected | function | Fire an error assertion. | 1 | |
DrupalTestCase::errorHandler | public | function | Handle errors during test runs. | 1 | |
DrupalTestCase::exceptionHandler | protected | function | Handle exceptions. | ||
DrupalTestCase::fail | protected | function | Fire an assertion that is always negative. | ||
DrupalTestCase::generatePermutations | public static | function | Converts a list of possible parameters into a stack of permutations. | ||
DrupalTestCase::getAssertionCall | protected | function | Cycles through backtrace until the first non-assertion method is found. | ||
DrupalTestCase::getDatabaseConnection | public static | function | Returns the database connection to the site running Simpletest. | ||
DrupalTestCase::insertAssert | public static | function | Store an assertion from outside the testing context. | ||
DrupalTestCase::pass | protected | function | Fire an assertion that is always positive. | ||
DrupalTestCase::randomName | public static | function | Generates a random string containing letters and numbers. | ||
DrupalTestCase::randomString | public static | function | Generates a random string of ASCII characters of codes 32 to 126. | ||
DrupalTestCase::run | public | function | Run all tests in this class. | ||
DrupalTestCase::verbose | protected | function | Logs a verbose message in a text file. | ||
DrupalWebTestCase::$additionalCurlOptions | protected | property | Additional cURL options. | ||
DrupalWebTestCase::$content | protected | property | The content of the page currently loaded in the internal browser. | ||
DrupalWebTestCase::$cookieFile | protected | property | The current cookie file used by cURL. | ||
DrupalWebTestCase::$cookies | protected | property | The cookies of the page currently loaded in the internal browser. | ||
DrupalWebTestCase::$curlHandle | protected | property | The handle of the current cURL connection. | ||
DrupalWebTestCase::$drupalSettings | protected | property | The value of the Drupal.settings JavaScript variable for the page currently loaded in the internal browser. | ||
DrupalWebTestCase::$elements | protected | property | The parsed version of the page. | ||
DrupalWebTestCase::$generatedTestFiles | protected | property | Whether the files were copied to the test files directory. | ||
DrupalWebTestCase::$headers | protected | property | The headers of the page currently loaded in the internal browser. | ||
DrupalWebTestCase::$httpauth_credentials | protected | property | HTTP authentication credentials (<username>:<password>). | ||
DrupalWebTestCase::$httpauth_method | protected | property | HTTP authentication method | ||
DrupalWebTestCase::$loggedInUser | protected | property | The current user logged in using the internal browser. | ||
DrupalWebTestCase::$originalCleanUrl | protected | property | The original clean_url variable value. | ||
DrupalWebTestCase::$originalLanguageUrl | protected | property | The original language URL. | ||
DrupalWebTestCase::$originalProfile | protected | property | The original active installation profile. | ||
DrupalWebTestCase::$originalShutdownCallbacks | protected | property | The original shutdown handlers array, before it was cleaned for testing purposes. | ||
DrupalWebTestCase::$originalUser | protected | property | The original user, before it was changed to a clean uid = 1 for testing purposes. | ||
DrupalWebTestCase::$plainTextContent | protected | property | The content of the page currently loaded in the internal browser (plain text version). | ||
DrupalWebTestCase::$private_files_directory | protected | property | The private files directory created for testing purposes. | ||
DrupalWebTestCase::$public_files_directory | protected | property | The public files directory created for testing purposes. | ||
DrupalWebTestCase::$redirect_count | protected | property | The number of redirects followed during the handling of a request. | ||
DrupalWebTestCase::$session_id | protected | property | The current session ID, if available. | ||
DrupalWebTestCase::$session_name | protected | property | The current session name, if available. | ||
DrupalWebTestCase::$temp_files_directory | protected | property | The temporary files directory created for testing purposes. | ||
DrupalWebTestCase::$url | protected | property | The URL currently loaded in the internal browser. | ||
DrupalWebTestCase::assertField | protected | function | Asserts that a field exists with the given name or ID. | ||
DrupalWebTestCase::assertFieldById | protected | function | Asserts that a field exists in the current page with the given ID and value. | ||
DrupalWebTestCase::assertFieldByName | protected | function | Asserts that a field exists in the current page with the given name and value. | ||
DrupalWebTestCase::assertFieldByXPath | protected | function | Asserts that a field exists in the current page by the given XPath. | ||
DrupalWebTestCase::assertFieldChecked | protected | function | Asserts that a checkbox field in the current page is checked. | ||
DrupalWebTestCase::assertLink | protected | function | Pass if a link with the specified label is found, and optional with the specified index. |
||
DrupalWebTestCase::assertLinkByHref | protected | function | Pass if a link containing a given href (part) is found. | ||
DrupalWebTestCase::assertMail | protected | function | Asserts that the most recently sent e-mail message has the given value. | ||
DrupalWebTestCase::assertMailPattern | protected | function | Asserts that the most recently sent e-mail message has the pattern in it. | ||
DrupalWebTestCase::assertMailString | protected | function | Asserts that the most recently sent e-mail message has the string in it. | ||
DrupalWebTestCase::assertNoDuplicateIds | protected | function | Asserts that each HTML ID is used for just a single element. | ||
DrupalWebTestCase::assertNoField | protected | function | Asserts that a field does not exist with the given name or ID. | ||
DrupalWebTestCase::assertNoFieldById | protected | function | Asserts that a field does not exist with the given ID and value. | ||
DrupalWebTestCase::assertNoFieldByName | protected | function | Asserts that a field does not exist with the given name and value. | ||
DrupalWebTestCase::assertNoFieldByXPath | protected | function | Asserts that a field doesn't exist or its value doesn't match, by XPath. | ||
DrupalWebTestCase::assertNoFieldChecked | protected | function | Asserts that a checkbox field in the current page is not checked. | ||
DrupalWebTestCase::assertNoLink | protected | function | Pass if a link with the specified label is not found. | ||
DrupalWebTestCase::assertNoLinkByHref | protected | function | Pass if a link containing a given href (part) is not found. | ||
DrupalWebTestCase::assertNoOptionSelected | protected | function | Asserts that a select option in the current page is not checked. | ||
DrupalWebTestCase::assertNoPattern | protected | function | Will trigger a pass if the perl regex pattern is not present in raw content. | ||
DrupalWebTestCase::assertNoRaw | protected | function | Pass if the raw text is NOT found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. |
||
DrupalWebTestCase::assertNoResponse | protected | function | Asserts the page did not return the specified response code. | ||
DrupalWebTestCase::assertNoText | protected | function | Pass if the text is NOT found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. |
||
DrupalWebTestCase::assertNoTitle | protected | function | Pass if the page title is not the given string. | ||
DrupalWebTestCase::assertNoUniqueText | protected | function | Pass if the text is found MORE THAN ONCE on the text version of the page. | ||
DrupalWebTestCase::assertOptionSelected | protected | function | Asserts that a select option in the current page is checked. | ||
DrupalWebTestCase::assertPattern | protected | function | Will trigger a pass if the Perl regex pattern is found in the raw content. | ||
DrupalWebTestCase::assertRaw | protected | function | Pass if the raw text IS found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated. |
||
DrupalWebTestCase::assertResponse | protected | function | Asserts the page responds with the specified response code. | ||
DrupalWebTestCase::assertText | protected | function | Pass if the text IS found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents. |
||
DrupalWebTestCase::assertTextHelper | protected | function | Helper for assertText and assertNoText. | ||
DrupalWebTestCase::assertThemeOutput | protected | function | Asserts themed output. | ||
DrupalWebTestCase::assertTitle | protected | function | Pass if the page title is the given string. | ||
DrupalWebTestCase::assertUniqueText | protected | function | Pass if the text is found ONLY ONCE on the text version of the page. | ||
DrupalWebTestCase::assertUniqueTextHelper | protected | function | Helper for assertUniqueText and assertNoUniqueText. | ||
DrupalWebTestCase::assertUrl | protected | function | Pass if the internal browser's URL matches the given path. | ||
DrupalWebTestCase::buildXPathQuery | protected | function | Builds an XPath query. | ||
DrupalWebTestCase::changeDatabasePrefix | protected | function | Changes the database connection to the prefixed one. | ||
DrupalWebTestCase::checkForMetaRefresh | protected | function | Check for meta refresh tag and if found call drupalGet() recursively. This function looks for the http-equiv attribute to be set to "Refresh" and is case-sensitive. |
||
DrupalWebTestCase::checkPermissions | protected | function | Check to make sure that the array of permissions are valid. | ||
DrupalWebTestCase::clickLink | protected | function | Follows a link by name. | ||
DrupalWebTestCase::constructFieldXpath | protected | function | Helper function: construct an XPath for the given set of attributes and value. | ||
DrupalWebTestCase::copySetupCache | protected | function | Copy the setup cache from/to another table and files directory. | ||
DrupalWebTestCase::cronRun | protected | function | Runs cron in the Drupal installed by Simpletest. | ||
DrupalWebTestCase::curlClose | protected | function | Close the cURL handler and unset the handler. | ||
DrupalWebTestCase::curlExec | protected | function | Initializes and executes a cURL request. | ||
DrupalWebTestCase::curlHeaderCallback | protected | function | Reads headers and registers errors received from the tested site. | ||
DrupalWebTestCase::curlInitialize | protected | function | Initializes the cURL connection. | ||
DrupalWebTestCase::drupalCompareFiles | protected | function | Compare two files based on size and file name. | ||
DrupalWebTestCase::drupalCreateContentType | protected | function | Creates a custom content type based on default settings. | ||
DrupalWebTestCase::drupalCreateNode | protected | function | Creates a node based on default settings. | ||
DrupalWebTestCase::drupalCreateRole | protected | function | Creates a role with specified permissions. | ||
DrupalWebTestCase::drupalCreateUser | protected | function | Create a user with a given set of permissions. | ||
DrupalWebTestCase::drupalGet | protected | function | Retrieves a Drupal path or an absolute path. | ||
DrupalWebTestCase::drupalGetAJAX | protected | function | Retrieve a Drupal path or an absolute path and JSON decode the result. | ||
DrupalWebTestCase::drupalGetContent | protected | function | Gets the current raw HTML of requested page. | ||
DrupalWebTestCase::drupalGetHeader | protected | function | Gets the value of an HTTP response header. If multiple requests were required to retrieve the page, only the headers from the last request will be checked by default. However, if TRUE is passed as the second argument, all requests will be processed… |
||
DrupalWebTestCase::drupalGetHeaders | protected | function | Gets the HTTP response headers of the requested page. Normally we are only interested in the headers returned by the last request. However, if a page is redirected or HTTP authentication is in use, multiple requests will be required to retrieve the… |
||
DrupalWebTestCase::drupalGetMails | protected | function | Gets an array containing all e-mails sent during this test case. | ||
DrupalWebTestCase::drupalGetNodeByTitle | function | Get a node from the database based on its title. | |||
DrupalWebTestCase::drupalGetSettings | protected | function | Gets the value of the Drupal.settings JavaScript variable for the currently loaded page. | ||
DrupalWebTestCase::drupalGetTestFiles | protected | function | Get a list files that can be used in tests. | ||
DrupalWebTestCase::drupalGetToken | protected | function | Generate a token for the currently logged in user. | ||
DrupalWebTestCase::drupalHead | protected | function | Retrieves only the headers for a Drupal path or an absolute path. | ||
DrupalWebTestCase::drupalLogin | protected | function | Log in a user with the internal browser. | ||
DrupalWebTestCase::drupalLogout | protected | function | |||
DrupalWebTestCase::drupalPost | protected | function | Execute a POST request on a Drupal page. It will be done as usual POST request with SimpleBrowser. |
||
DrupalWebTestCase::drupalPostAJAX | protected | function | Execute an Ajax submission. | ||
DrupalWebTestCase::drupalSetContent | protected | function | Sets the raw HTML content. This can be useful when a page has been fetched outside of the internal browser and assertions need to be made on the returned page. |
||
DrupalWebTestCase::drupalSetSettings | protected | function | Sets the value of the Drupal.settings JavaScript variable for the currently loaded page. | ||
DrupalWebTestCase::getAbsoluteUrl | protected | function | Takes a path and returns an absolute path. | ||
DrupalWebTestCase::getAllOptions | protected | function | Get all option elements, including nested options, in a select. | ||
DrupalWebTestCase::getSelectedItem | protected | function | Get the selected value from a select field. | ||
DrupalWebTestCase::getSetupCacheKey | protected | function | Returns the cache key used for the setup caching. | ||
DrupalWebTestCase::getUrl | protected | function | Get the current URL from the cURL handler. | ||
DrupalWebTestCase::handleForm | protected | function | Handle form input related to drupalPost(). Ensure that the specified fields exist and attempt to create POST data in the correct manner for the particular field type. |
||
DrupalWebTestCase::loadSetupCache | protected | function | Copies the cached tables and files for a cached installation setup. | ||
DrupalWebTestCase::parse | protected | function | Parse content returned from curlExec using DOM and SimpleXML. | ||
DrupalWebTestCase::preloadRegistry | protected | function | Preload the registry from the testing site. | ||
DrupalWebTestCase::prepareDatabasePrefix | protected | function | Generates a database prefix for running tests. | ||
DrupalWebTestCase::prepareEnvironment | protected | function | Prepares the current environment for running the test. | ||
DrupalWebTestCase::recursiveDirectoryCopy | protected | function | Recursively copy one directory to another. | ||
DrupalWebTestCase::refreshVariables | protected | function | Refresh the in-memory set of variables. Useful after a page request is made that changes a variable in a different thread. |
1 | |
DrupalWebTestCase::resetAll | protected | function | Reset all data structures after having enabled new modules. | ||
DrupalWebTestCase::storeSetupCache | protected | function | Store the installation setup to a cache. | ||
DrupalWebTestCase::tearDown | protected | function | Delete created files and temporary files directory, delete the tables created by setUp(), and reset the database prefix. |
7 | |
DrupalWebTestCase::verboseEmail | protected | function | Outputs to verbose the most recent $count emails sent. | ||
DrupalWebTestCase::xpath | protected | function | Perform an xpath search on the contents of the internal browser. The search is relative to the root element (HTML tag normally) of the page. |
||
DrupalWebTestCase::__construct | function | Constructor for DrupalWebTestCase. | Overrides DrupalTestCase::__construct | 1 | |
UserPasswordResetTestCase::$profile | protected | property | The profile to install as a basis for testing. | Overrides DrupalWebTestCase::$profile | |
UserPasswordResetTestCase::generateResetURL | public | function | Generates login link. | ||
UserPasswordResetTestCase::getConfirmURL | public | function | Turns a password reset URL into a 'confirm' URL. | ||
UserPasswordResetTestCase::getInfo | public static | function | |||
UserPasswordResetTestCase::getResetURL | public | function | Retrieves password reset email and extracts the login link. | ||
UserPasswordResetTestCase::setUp | function | Sets up a Drupal site for running functional and integration tests. | Overrides DrupalWebTestCase::setUp | ||
UserPasswordResetTestCase::testPasswordResetFloodControlPerIp | function | Test IP-based flood control on password reset. | |||
UserPasswordResetTestCase::testPasswordResetFloodControlPerUser | function | Test user-based flood control on password reset. | |||
UserPasswordResetTestCase::testResetImpersonation | function | Make sure that users cannot forge password reset URLs of other users. | |||
UserPasswordResetTestCase::testResetInvalidation | function | Make sure that password reset URLs are invalidated when the user's email address changes. |
|||
UserPasswordResetTestCase::testUserDirectLogin | function | Test direct login link that bypasses the password reset form. | |||
UserPasswordResetTestCase::testUserPasswordReset | function | Tests password reset functionality. | |||
UserPasswordResetTestCase::testUserPasswordResetExpired | function | Attempts login using an expired password reset link. | |||
UserPasswordResetTestCase::testUserPasswordResetLoggedIn | function | Test user password reset while logged in. | |||
UserPasswordResetTestCase::testUserPasswordTextboxFilled | function | Prefill the text box on incorrect login via link to password reset page. |
Buggy or inaccurate documentation? Please file an issue. Need support? Need help programming? Connect with the Drupal community.