diff --git a/core/core.services.yml b/core/core.services.yml index d5482e4fa1c912f2f031b836e7e1b504582340d8..22cb21e24deaca9a7f965e2bb69e10efbce5f4de 100644 --- a/core/core.services.yml +++ b/core/core.services.yml @@ -1576,13 +1576,24 @@ services: tags: - { name: service_collector, call: addAccessPolicy, tag: access_policy } Drupal\Core\Session\AccessPolicyChainInterface: '@access_policy_processor' + access_policy.super_user: + class: Drupal\Core\Session\SuperUserAccessPolicy + tags: + - { name: access_policy } + Drupal\Core\Session\SuperUserAccessPolicy: '@access_policy.super_user' + access_policy.user_roles: + class: Drupal\Core\Session\UserRolesAccessPolicy + arguments: ['@entity_type.manager'] + tags: + - { name: access_policy } + Drupal\Core\Session\UserRolesAccessPolicy: '@access_policy.user_roles' permission_checker: class: Drupal\Core\Session\PermissionChecker - arguments: ['@entity_type.manager'] + arguments: ['@access_policy_processor'] Drupal\Core\Session\PermissionCheckerInterface: '@permission_checker' user_permissions_hash_generator: class: Drupal\Core\Session\PermissionsHashGenerator - arguments: ['@private_key', '@cache.bootstrap', '@cache.static', '@entity_type.manager'] + arguments: ['@private_key', '@cache.static', '@access_policy_processor'] Drupal\Core\Session\PermissionsHashGeneratorInterface: '@user_permissions_hash_generator' current_user: class: Drupal\Core\Session\AccountProxy diff --git a/core/lib/Drupal/Core/Cache/Context/AccountPermissionsCacheContext.php b/core/lib/Drupal/Core/Cache/Context/AccountPermissionsCacheContext.php index c101968663c1f0b185b3f9c6608bb68143e637eb..af2766469c50048a95ed90f6b96d1a91c13ec27e 100644 --- a/core/lib/Drupal/Core/Cache/Context/AccountPermissionsCacheContext.php +++ b/core/lib/Drupal/Core/Cache/Context/AccountPermissionsCacheContext.php @@ -2,7 +2,6 @@ namespace Drupal\Core\Cache\Context; -use Drupal\Core\Cache\CacheableMetadata; use Drupal\Core\Session\AccountInterface; use Drupal\Core\Session\PermissionsHashGeneratorInterface; @@ -51,17 +50,7 @@ public function getContext() { * {@inheritdoc} */ public function getCacheableMetadata() { - $cacheable_metadata = new CacheableMetadata(); - - // The permissions hash changes when: - // - a user is updated to have different roles; - $tags = ['user:' . $this->user->id()]; - // - a role is updated to have different permissions. - foreach ($this->user->getRoles() as $rid) { - $tags[] = "config:user.role.$rid"; - } - - return $cacheable_metadata->setCacheTags($tags); + return $this->permissionsHashGenerator->getCacheableMetadata($this->user); } } diff --git a/core/lib/Drupal/Core/Session/PermissionChecker.php b/core/lib/Drupal/Core/Session/PermissionChecker.php index 7c4c259efb03c624b34c388eab6dcf3bd427c57e..e46b546bc8de8ad0d08e99518cd17b37f3fa9e96 100644 --- a/core/lib/Drupal/Core/Session/PermissionChecker.php +++ b/core/lib/Drupal/Core/Session/PermissionChecker.php @@ -9,24 +9,19 @@ */ class PermissionChecker implements PermissionCheckerInterface { - /** - * Constructs a PermissionChecker object. - * - * @param \Drupal\Core\Entity\EntityTypeManagerInterface $entityTypeManager - * The entity type manager. - */ - public function __construct(protected EntityTypeManagerInterface $entityTypeManager) {} + public function __construct(protected EntityTypeManagerInterface|AccessPolicyProcessorInterface $processor) { + if ($this->processor instanceof EntityTypeManagerInterface) { + @trigger_error('Calling ' . __METHOD__ . '() without the $processor argument is deprecated in drupal:10.3.0 and will be required in drupal:11.0.0. See https://www.drupal.org/node/3402107', E_USER_DEPRECATED); + $this->processor = \Drupal::service('access_policy_processor'); + } + } /** * {@inheritdoc} */ public function hasPermission(string $permission, AccountInterface $account): bool { - // User #1 has all privileges. - if ((int) $account->id() === 1) { - return TRUE; - } - - return $this->entityTypeManager->getStorage('user_role')->isPermissionInRoles($permission, $account->getRoles()); + $item = $this->processor->processAccessPolicies($account)->getItem(); + return $item && $item->hasPermission($permission); } } diff --git a/core/lib/Drupal/Core/Session/PermissionsHashGenerator.php b/core/lib/Drupal/Core/Session/PermissionsHashGenerator.php index db837b7691fef532b49dd2873269934268311a7e..c15afc3ca1d74bbb3c21f52a9d4d7abd1b8a8e58 100644 --- a/core/lib/Drupal/Core/Session/PermissionsHashGenerator.php +++ b/core/lib/Drupal/Core/Session/PermissionsHashGenerator.php @@ -2,7 +2,7 @@ namespace Drupal\Core\Session; -use Drupal\Core\Entity\EntityTypeManagerInterface; +use Drupal\Core\Cache\CacheableMetadata; use Drupal\Core\PrivateKey; use Drupal\Core\Cache\Cache; use Drupal\Core\Cache\CacheBackendInterface; @@ -21,73 +21,83 @@ class PermissionsHashGenerator implements PermissionsHashGeneratorInterface { protected $privateKey; /** - * The cache backend interface to use for the persistent cache. + * The cache backend interface to use for the static cache. * * @var \Drupal\Core\Cache\CacheBackendInterface */ - protected $cache; + protected $static; /** - * The cache backend interface to use for the static cache. + * The access policy processor. * - * @var \Drupal\Core\Cache\CacheBackendInterface + * @var \Drupal\Core\Session\AccessPolicyProcessorInterface */ - protected $static; + protected $processor; /** * Constructs a PermissionsHashGenerator object. * * @param \Drupal\Core\PrivateKey $private_key * The private key service. - * @param \Drupal\Core\Cache\CacheBackendInterface $cache - * The cache backend interface to use for the persistent cache. * @param \Drupal\Core\Cache\CacheBackendInterface $static * The cache backend interface to use for the static cache. - * @param \Drupal\Core\Entity\EntityTypeManagerInterface|null $entityTypeManager - * The entity type manager. + * @param \Drupal\Core\Session\AccessPolicyProcessorInterface|\Drupal\Core\Cache\CacheBackendInterface $processor + * The access policy processor. */ - public function __construct(PrivateKey $private_key, CacheBackendInterface $cache, CacheBackendInterface $static, protected ?EntityTypeManagerInterface $entityTypeManager = NULL) { + public function __construct(PrivateKey $private_key, CacheBackendInterface $static, AccessPolicyProcessorInterface|CacheBackendInterface $processor) { $this->privateKey = $private_key; - $this->cache = $cache; - $this->static = $static; - if ($this->entityTypeManager === NULL) { - @trigger_error('Calling ' . __METHOD__ . '() without the $entityTypeManager argument is deprecated in drupal:10.1.0 and will be required in drupal:11.0.0. See https://www.drupal.org/node/3348138', E_USER_DEPRECATED); - $this->entityTypeManager = \Drupal::entityTypeManager(); + if ($processor instanceof CacheBackendInterface) { + @trigger_error('Calling ' . __METHOD__ . '() without the $processor argument is deprecated in drupal:10.3.0 and will be required in drupal:11.0.0. See https://www.drupal.org/node/3402110', E_USER_DEPRECATED); + $this->static = $processor; + $this->processor = \Drupal::service('access_policy_processor'); + return; } + $this->static = $static; + $this->processor = $processor; } /** * {@inheritdoc} - * - * Cached by role, invalidated whenever permissions change. */ public function generate(AccountInterface $account) { - // User 1 is the super user, and can always access all permissions. Use a - // different, unique identifier for the hash. - if ($account->id() == 1) { - return $this->hash('is-super-user'); - } + // We can use a simple per-user static cache here because we already cache + // the permissions more efficiently in the access policy processor. On top + // of that, there is only a tiny chance of a hash being generated for more + // than one account during a single request. + $cid = 'permissions_hash_' . $account->id(); - $sorted_roles = $account->getRoles(); - sort($sorted_roles); - $role_list = implode(',', $sorted_roles); - $cid = "user_permissions_hash:$role_list"; + // Retrieve the hash from the static cache if available. if ($static_cache = $this->static->get($cid)) { return $static_cache->data; } + + // Otherwise hash the permissions and store them in the static cache. + $calculated_permissions = $this->processor->processAccessPolicies($account); + $item = $calculated_permissions->getItem(); + + // This should never happen, but in case nothing defined permissions for the + // current user, even if empty, we need to have _some_ hash too. + if ($item === FALSE) { + $hash = 'no-access-policies'; + } + // If the calculated permissions item grants admin rights, we can simplify + // the entry by setting it to 'is-admin' rather than calculating an actual + // hash. This is because admin flagged calculated permissions + // automatically empty out the permissions array. + elseif ($item->isAdmin()) { + $hash = 'is-admin'; + } + // Sort the permissions by name to ensure we don't get mismatching hashes + // for people with the same permissions, just because the order of the + // permissions happened to differ. else { - $tags = Cache::buildTags('config:user.role', $sorted_roles, '.'); - if ($cache = $this->cache->get($cid)) { - $permissions_hash = $cache->data; - } - else { - $permissions_hash = $this->doGenerate($sorted_roles); - $this->cache->set($cid, $permissions_hash, Cache::PERMANENT, $tags); - } - $this->static->set($cid, $permissions_hash, Cache::PERMANENT, $tags); + $permissions = $item->getPermissions(); + sort($permissions); + $hash = $this->hash(serialize($permissions)); } - return $permissions_hash; + $this->static->set($cid, $hash, Cache::PERMANENT, $calculated_permissions->getCacheTags()); + return $hash; } /** @@ -98,21 +108,22 @@ public function generate(AccountInterface $account) { * * @return string * The permissions hash. + * + * @deprecated in drupal:10.3.0 and is removed from drupal:11.0.0. There is no + * replacement. + * + * @see https://www.drupal.org/node/3435842 */ protected function doGenerate(array $roles) { - $permissions_by_role = []; - /** @var \Drupal\user\RoleInterface[] $entities */ - $entities = $this->entityTypeManager->getStorage('user_role')->loadMultiple($roles); - foreach ($roles as $role) { - // Note that for admin roles (\Drupal\user\RoleInterface::isAdmin()), the - // permissions returned will be empty ($permissions = []). Therefore the - // presence of the role ID as a key in $permissions_by_role is essential - // to ensure that the hash correctly recognizes admin roles. (If the hash - // was based solely on the union of $permissions, the admin roles would - // effectively be no-ops, allowing for hash collisions.) - $permissions_by_role[$role] = isset($entities[$role]) ? $entities[$role]->getPermissions() : []; - } - return $this->hash(serialize($permissions_by_role)); + @trigger_error(__METHOD__ . '() is deprecated in drupal:10.3.0 and is removed from drupal:11.0.0. There is no replacement. See https://www.drupal.org/node/3435842', E_USER_DEPRECATED); + return ''; + } + + /** + * {@inheritdoc} + */ + public function getCacheableMetadata(AccountInterface $account): CacheableMetadata { + return CacheableMetadata::createFromObject($this->processor->processAccessPolicies($account)); } /** diff --git a/core/lib/Drupal/Core/Session/PermissionsHashGeneratorInterface.php b/core/lib/Drupal/Core/Session/PermissionsHashGeneratorInterface.php index 46d957804edea24e165d6a7fc5a479a953f86188..c89f4256173b7ca605dbfd2800855bad9ae2df03 100644 --- a/core/lib/Drupal/Core/Session/PermissionsHashGeneratorInterface.php +++ b/core/lib/Drupal/Core/Session/PermissionsHashGeneratorInterface.php @@ -2,6 +2,8 @@ namespace Drupal\Core\Session; +use Drupal\Core\Cache\CacheableMetadata; + /** * Defines the user permissions hash generator interface. */ @@ -18,4 +20,15 @@ interface PermissionsHashGeneratorInterface { */ public function generate(AccountInterface $account); + /** + * Gets the cacheability metadata for the generated hash. + * + * @param \Drupal\Core\Session\AccountInterface $account + * The user account for which to get the permissions hash. + * + * @return \Drupal\Core\Cache\CacheableMetadata + * A cacheable metadata object. + */ + public function getCacheableMetadata(AccountInterface $account): CacheableMetadata; + } diff --git a/core/lib/Drupal/Core/Session/SuperUserAccessPolicy.php b/core/lib/Drupal/Core/Session/SuperUserAccessPolicy.php new file mode 100644 index 0000000000000000000000000000000000000000..6c37d9db020c552e6914dae00fb43e242c18ea30 --- /dev/null +++ b/core/lib/Drupal/Core/Session/SuperUserAccessPolicy.php @@ -0,0 +1,32 @@ +<?php + +declare(strict_types=1); + +namespace Drupal\Core\Session; + +/** + * Grants user 1 an all access pass. + */ +class SuperUserAccessPolicy extends AccessPolicyBase { + + /** + * {@inheritdoc} + */ + public function calculatePermissions(AccountInterface $account, string $scope): RefinableCalculatedPermissionsInterface { + $calculated_permissions = parent::calculatePermissions($account, $scope); + + if (((int) $account->id()) !== 1) { + return $calculated_permissions; + } + + return $calculated_permissions->addItem(new CalculatedPermissionsItem([], TRUE)); + } + + /** + * {@inheritdoc} + */ + public function getPersistentCacheContexts(): array { + return ['user.is_super_user']; + } + +} diff --git a/core/lib/Drupal/Core/Session/UserRolesAccessPolicy.php b/core/lib/Drupal/Core/Session/UserRolesAccessPolicy.php new file mode 100644 index 0000000000000000000000000000000000000000..1b2d985211e84f8d269e925622be94cad48b6388 --- /dev/null +++ b/core/lib/Drupal/Core/Session/UserRolesAccessPolicy.php @@ -0,0 +1,41 @@ +<?php + +declare(strict_types=1); + +namespace Drupal\Core\Session; + +use Drupal\Core\Entity\EntityTypeManagerInterface; + +/** + * Grants permissions based on a user's roles. + */ +class UserRolesAccessPolicy extends AccessPolicyBase { + + public function __construct(protected EntityTypeManagerInterface $entityTypeManager) {} + + /** + * {@inheritdoc} + */ + public function calculatePermissions(AccountInterface $account, string $scope): RefinableCalculatedPermissionsInterface { + $calculated_permissions = parent::calculatePermissions($account, $scope); + + /** @var \Drupal\user\RoleInterface[] $user_roles */ + $user_roles = $this->entityTypeManager->getStorage('user_role')->loadMultiple($account->getRoles()); + + foreach ($user_roles as $user_role) { + $calculated_permissions + ->addItem(new CalculatedPermissionsItem($user_role->getPermissions(), $user_role->isAdmin())) + ->addCacheableDependency($user_role); + } + + return $calculated_permissions; + } + + /** + * {@inheritdoc} + */ + public function getPersistentCacheContexts(): array { + return ['user.roles']; + } + +} diff --git a/core/profiles/demo_umami/tests/src/FunctionalJavascript/OpenTelemetryAuthenticatedPerformanceTest.php b/core/profiles/demo_umami/tests/src/FunctionalJavascript/OpenTelemetryAuthenticatedPerformanceTest.php index cd50c3b118846975814627f30d7a036039d8274d..55252faff7582ea37efc4b8aa631506f86a35cb1 100644 --- a/core/profiles/demo_umami/tests/src/FunctionalJavascript/OpenTelemetryAuthenticatedPerformanceTest.php +++ b/core/profiles/demo_umami/tests/src/FunctionalJavascript/OpenTelemetryAuthenticatedPerformanceTest.php @@ -42,6 +42,7 @@ public function testFrontPageAuthenticatedWarmCache(): void { 'SELECT "roles_target_id" FROM "user__roles" WHERE "entity_id" = "10"', 'SELECT "config"."name" AS "name" FROM "config" "config" WHERE ("collection" = "") AND ("name" LIKE "language.entity.%" ESCAPE ' . "'\\\\'" . ') ORDER BY "collection" ASC, "name" ASC', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "asset.css_js_query_string" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "drupal.test_wait_terminate" ) AND "collection" = "state"', @@ -49,8 +50,8 @@ public function testFrontPageAuthenticatedWarmCache(): void { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(9, $performance_data->getQueryCount()); - $this->assertSame(45, $performance_data->getCacheGetCount()); + $this->assertSame(10, $performance_data->getQueryCount()); + $this->assertSame(44, $performance_data->getCacheGetCount()); $this->assertSame(0, $performance_data->getCacheSetCount()); $this->assertSame(0, $performance_data->getCacheDeleteCount()); $this->assertSame(0, $performance_data->getCacheTagChecksumCount()); diff --git a/core/profiles/standard/tests/src/FunctionalJavascript/StandardPerformanceTest.php b/core/profiles/standard/tests/src/FunctionalJavascript/StandardPerformanceTest.php index af52184ecc38ef5a1679eb3aee4e3700c99aa9a8..4ad67fee30b685d0ae04bfb205e28ff718eb2d20 100644 --- a/core/profiles/standard/tests/src/FunctionalJavascript/StandardPerformanceTest.php +++ b/core/profiles/standard/tests/src/FunctionalJavascript/StandardPerformanceTest.php @@ -59,6 +59,7 @@ public function testAnonymous() { 'SELECT "base_table"."id" AS "id", "base_table"."path" AS "path", "base_table"."alias" AS "alias", "base_table"."langcode" AS "langcode" FROM "path_alias" "base_table" WHERE ("base_table"."status" = 1) AND ("base_table"."alias" LIKE "/node" ESCAPE ' . "'\\\\'" . ') AND ("base_table"."langcode" IN ("en", "und")) ORDER BY "base_table"."langcode" ASC, "base_table"."id" DESC', 'SELECT "name", "route", "fit" FROM "router" WHERE "pattern_outline" IN ( "/node" ) AND "number_parts" >= 1', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "views.view_route_names" ) AND "collection" = "state"', 'SELECT COUNT(*) AS "expression" FROM (SELECT 1 AS "expression" FROM "node_field_data" "node_field_data" WHERE ("node_field_data"."promote" = 1) AND ("node_field_data"."status" = 1)) "subquery"', 'SELECT "node_field_data"."sticky" AS "node_field_data_sticky", "node_field_data"."created" AS "node_field_data_created", "node_field_data"."nid" AS "nid" FROM "node_field_data" "node_field_data" WHERE ("node_field_data"."promote" = 1) AND ("node_field_data"."status" = 1) ORDER BY "node_field_data_sticky" DESC, "node_field_data_created" DESC LIMIT 10 OFFSET 0', @@ -94,12 +95,12 @@ public function testAnonymous() { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(35, $performance_data->getQueryCount()); - $this->assertSame(137, $performance_data->getCacheGetCount()); + $this->assertSame(36, $performance_data->getQueryCount()); + $this->assertSame(136, $performance_data->getCacheGetCount()); $this->assertSame(47, $performance_data->getCacheSetCount()); $this->assertSame(0, $performance_data->getCacheDeleteCount()); - $this->assertCountBetween(40, 43, $performance_data->getCacheTagChecksumCount()); - $this->assertCountBetween(47, 50, $performance_data->getCacheTagIsValidCount()); + $this->assertCountBetween(39, 42, $performance_data->getCacheTagChecksumCount()); + $this->assertCountBetween(45, 48, $performance_data->getCacheTagIsValidCount()); $this->assertSame(0, $performance_data->getCacheTagInvalidationCount()); // Test node page. @@ -112,6 +113,7 @@ public function testAnonymous() { 'SELECT "base_table"."id" AS "id", "base_table"."path" AS "path", "base_table"."alias" AS "alias", "base_table"."langcode" AS "langcode" FROM "path_alias" "base_table" WHERE ("base_table"."status" = 1) AND ("base_table"."alias" LIKE "/node/1" ESCAPE ' . "'\\\\'" . ') AND ("base_table"."langcode" IN ("en", "und")) ORDER BY "base_table"."langcode" ASC, "base_table"."id" DESC', 'SELECT "name", "route", "fit" FROM "router" WHERE "pattern_outline" IN ( "/node/1", "/node/%", "/node" ) AND "number_parts" >= 2', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "data" FROM "config" WHERE "collection" = "" AND "name" IN ( "core.entity_view_display.node.article.full" )', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "theme:stark" ) AND "collection" = "config.entity.key_store.block"', @@ -125,12 +127,12 @@ public function testAnonymous() { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(13, $performance_data->getQueryCount()); - $this->assertSame(95, $performance_data->getCacheGetCount()); + $this->assertSame(14, $performance_data->getQueryCount()); + $this->assertSame(94, $performance_data->getCacheGetCount()); $this->assertSame(16, $performance_data->getCacheSetCount()); $this->assertSame(0, $performance_data->getCacheDeleteCount()); - $this->assertCountBetween(24, 25, $performance_data->getCacheTagChecksumCount()); - $this->assertCountBetween(41, 42, $performance_data->getCacheTagIsValidCount()); + $this->assertCountBetween(23, 24, $performance_data->getCacheTagChecksumCount()); + $this->assertCountBetween(40, 41, $performance_data->getCacheTagIsValidCount()); $this->assertSame(0, $performance_data->getCacheTagInvalidationCount()); // Test user profile page. @@ -149,6 +151,7 @@ public function testAnonymous() { 'SELECT "t".* FROM "user__roles" "t" WHERE ("entity_id" IN (2)) AND ("deleted" = 0) AND ("langcode" IN ("en", "und", "zxx")) ORDER BY "delta" ASC', 'SELECT "t".* FROM "user__user_picture" "t" WHERE ("entity_id" IN (2)) AND ("deleted" = 0) AND ("langcode" IN ("en", "und", "zxx")) ORDER BY "delta" ASC', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "data" FROM "config" WHERE "collection" = "" AND "name" IN ( "core.entity_view_display.user.user.full" )', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "theme:stark" ) AND "collection" = "config.entity.key_store.block"', @@ -161,12 +164,12 @@ public function testAnonymous() { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(17, $performance_data->getQueryCount()); - $this->assertSame(81, $performance_data->getCacheGetCount()); + $this->assertSame(18, $performance_data->getQueryCount()); + $this->assertSame(80, $performance_data->getCacheGetCount()); $this->assertSame(16, $performance_data->getCacheSetCount()); $this->assertSame(0, $performance_data->getCacheDeleteCount()); - $this->assertCountBetween(24, 25, $performance_data->getCacheTagChecksumCount()); - $this->assertCountBetween(36, 37, $performance_data->getCacheTagIsValidCount()); + $this->assertCountBetween(23, 24, $performance_data->getCacheTagChecksumCount()); + $this->assertCountBetween(34, 35, $performance_data->getCacheTagIsValidCount()); $this->assertSame(0, $performance_data->getCacheTagInvalidationCount()); } @@ -214,6 +217,7 @@ public function testLogin(): void { 'SELECT "t".* FROM "user__roles" "t" WHERE ("entity_id" IN (2)) AND ("deleted" = 0) AND ("langcode" IN ("en", "und", "zxx")) ORDER BY "delta" ASC', 'SELECT "t".* FROM "user__user_picture" "t" WHERE ("entity_id" IN (2)) AND ("deleted" = 0) AND ("langcode" IN ("en", "und", "zxx")) ORDER BY "delta" ASC', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "asset.css_js_query_string" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "drupal.test_wait_terminate" ) AND "collection" = "state"', @@ -221,12 +225,12 @@ public function testLogin(): void { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(25, $performance_data->getQueryCount()); - $this->assertSame(64, $performance_data->getCacheGetCount()); + $this->assertSame(26, $performance_data->getQueryCount()); + $this->assertSame(63, $performance_data->getCacheGetCount()); $this->assertSame(1, $performance_data->getCacheSetCount()); $this->assertSame(1, $performance_data->getCacheDeleteCount()); $this->assertSame(1, $performance_data->getCacheTagChecksumCount()); - $this->assertSame(28, $performance_data->getCacheTagIsValidCount()); + $this->assertSame(29, $performance_data->getCacheTagIsValidCount()); $this->assertSame(0, $performance_data->getCacheTagInvalidationCount()); } @@ -257,6 +261,7 @@ public function testLoginBlock(): void { $expected_queries = [ 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "views.view_route_names" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "theme:stark" ) AND "collection" = "config.entity.key_store.block"', @@ -281,6 +286,7 @@ public function testLoginBlock(): void { 'SELECT * FROM "users_field_data" "u" WHERE "u"."uid" = "2" AND "u"."default_langcode" = 1', 'SELECT "roles_target_id" FROM "user__roles" WHERE "entity_id" = "2"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.maintenance_mode" ) AND "collection" = "state"', + 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "system.private_key" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "twig_extension_hash_prefix" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "asset.css_js_query_string" ) AND "collection" = "state"', 'SELECT "name", "value" FROM "key_value" WHERE "name" IN ( "drupal.test_wait_terminate" ) AND "collection" = "state"', @@ -288,8 +294,8 @@ public function testLoginBlock(): void { ]; $recorded_queries = $performance_data->getQueries(); $this->assertSame($expected_queries, $recorded_queries); - $this->assertSame(29, $performance_data->getQueryCount()); - $this->assertSame(108, $performance_data->getCacheGetCount()); + $this->assertSame(31, $performance_data->getQueryCount()); + $this->assertSame(106, $performance_data->getCacheGetCount()); $this->assertSame(1, $performance_data->getCacheSetCount()); $this->assertSame(1, $performance_data->getCacheDeleteCount()); $this->assertSame(1, $performance_data->getCacheTagChecksumCount()); diff --git a/core/tests/Drupal/KernelTests/Core/Render/RenderCacheTest.php b/core/tests/Drupal/KernelTests/Core/Render/RenderCacheTest.php index 919c18be6b8551b1cefa0b549f7de20bd3a464c1..67a755379241e199805669e29bf628650ce8ba60 100644 --- a/core/tests/Drupal/KernelTests/Core/Render/RenderCacheTest.php +++ b/core/tests/Drupal/KernelTests/Core/Render/RenderCacheTest.php @@ -70,16 +70,16 @@ protected function doTestUser1WithContexts($contexts) { ], ]; $element = $test_element; - $element['#markup'] = 'content for user 1'; + $element['#markup'] = 'content for admin users'; $output = \Drupal::service('renderer')->renderRoot($element); - $this->assertEquals('content for user 1', $output); + $this->assertEquals('content for admin users', $output); // Verify the cache is working by rendering the same element but with // different markup passed in; the result should be the same. $element = $test_element; $element['#markup'] = 'should not be used'; $output = \Drupal::service('renderer')->renderRoot($element); - $this->assertEquals('content for user 1', $output); + $this->assertEquals('content for admin users', $output); \Drupal::service('account_switcher')->switchBack(); // Verify that the first authenticated user does not see the same content @@ -100,13 +100,14 @@ protected function doTestUser1WithContexts($contexts) { $this->assertEquals('content for authenticated users', $output); \Drupal::service('account_switcher')->switchBack(); - // Verify that the admin user (who has an admin role without explicit - // permissions) does not share the same cache. + // The admin user should have the same cache as user 1, as the admin role + // has the same permissions hash. \Drupal::service('account_switcher')->switchTo($admin_user); $element = $test_element; - $element['#markup'] = 'content for admin user'; + $element['#markup'] = 'content that is role specific'; $output = \Drupal::service('renderer')->renderRoot($element); - $this->assertEquals('content for admin user', $output); + $expected = in_array('user.roles', $contexts, TRUE) ? 'content that is role specific' : 'content for admin users'; + $this->assertEquals($expected, $output); \Drupal::service('account_switcher')->switchBack(); } diff --git a/core/tests/Drupal/KernelTests/Core/Session/UserRolesPermissionsTest.php b/core/tests/Drupal/KernelTests/Core/Session/UserRolesPermissionsTest.php new file mode 100644 index 0000000000000000000000000000000000000000..284e47bbad4d1897be1d56745b9d062d9569046d --- /dev/null +++ b/core/tests/Drupal/KernelTests/Core/Session/UserRolesPermissionsTest.php @@ -0,0 +1,43 @@ +<?php + +namespace Drupal\KernelTests\Core\Session; + +use Drupal\KernelTests\KernelTestBase; +use Drupal\Tests\user\Traits\UserCreationTrait; + +/** + * Test case for getting permissions from user roles. + * + * @group Session + */ +class UserRolesPermissionsTest extends KernelTestBase { + + use UserCreationTrait; + + /** + * {@inheritdoc} + */ + protected static $modules = ['system', 'user']; + + /** + * {@inheritdoc} + */ + protected function setUp(): void { + parent::setUp(); + $this->installEntitySchema('user'); + } + + /** + * Tests that assigning a role grants that role's permissions. + */ + public function testPermissionChange(): void { + // Create two accounts to avoid dealing with user 1. + $this->createUser(); + $account = $this->createUser(); + + $this->assertFalse($account->hasPermission('administer modules')); + $account->addRole($this->createRole(['administer modules']))->save(); + $this->assertTrue($account->hasPermission('administer modules')); + } + +} diff --git a/core/tests/Drupal/Tests/Core/Session/PermissionCheckerTest.php b/core/tests/Drupal/Tests/Core/Session/PermissionCheckerTest.php new file mode 100644 index 0000000000000000000000000000000000000000..2e5189f4f1f78cb817421d2a5286d13d3ab892b6 --- /dev/null +++ b/core/tests/Drupal/Tests/Core/Session/PermissionCheckerTest.php @@ -0,0 +1,110 @@ +<?php + +declare(strict_types=1); + +namespace Drupal\Tests\Core\Session; + +use Drupal\Core\Session\AccessPolicyProcessorInterface; +use Drupal\Core\Session\AccountInterface; +use Drupal\Core\Session\CalculatedPermissions; +use Drupal\Core\Session\CalculatedPermissionsItem; +use Drupal\Core\Session\PermissionChecker; +use Drupal\Core\Session\RefinableCalculatedPermissions; +use Drupal\Tests\UnitTestCase; + +/** + * @coversDefaultClass \Drupal\Core\Session\PermissionChecker + * @group Session + */ +class PermissionCheckerTest extends UnitTestCase { + + /** + * The permission checker to run tests on. + * + * @var \Drupal\Core\Session\PermissionChecker + */ + protected $checker; + + /** + * The mocked access policy processor. + * + * @var \Drupal\Core\Session\AccessPolicyProcessorInterface|\Prophecy\Prophecy\ObjectProphecy + */ + protected $processor; + + /** + * The mocked account to use for testing. + * + * @var \Drupal\Core\Session\AccountInterface + */ + protected $account; + + /** + * {@inheritdoc} + */ + protected function setUp(): void { + parent::setUp(); + $this->processor = $this->prophesize(AccessPolicyProcessorInterface::class); + $this->checker = new PermissionChecker($this->processor->reveal()); + $this->account = $this->prophesize(AccountInterface::class)->reveal(); + } + + /** + * Tests the hasPermission method under normal circumstances. + */ + public function testHasPermission(): void { + $calculated_permissions = new CalculatedPermissions( + (new RefinableCalculatedPermissions())->addItem( + new CalculatedPermissionsItem(['foo']) + ) + ); + $this->processor->processAccessPolicies($this->account)->willReturn($calculated_permissions); + $this->assertTrue($this->checker->hasPermission('foo', $this->account)); + $this->assertFalse($this->checker->hasPermission('bar', $this->account)); + } + + /** + * Tests the hasPermission method when no policy added something. + */ + public function testHasPermissionEmpty(): void { + $calculated_permissions = new CalculatedPermissions(new RefinableCalculatedPermissions()); + $this->processor->processAccessPolicies($this->account)->willReturn($calculated_permissions); + $this->assertFalse($this->checker->hasPermission('foo', $this->account)); + $this->assertFalse($this->checker->hasPermission('bar', $this->account)); + } + + /** + * Tests the hasPermission method when mixed scopes and identifiers exist. + */ + public function testHasPermissionMixed(): void { + $calculated_permissions = new CalculatedPermissions( + (new RefinableCalculatedPermissions())->addItem( + new CalculatedPermissionsItem(['foo']) + )->addItem( + new CalculatedPermissionsItem(['bar'], identifier: 'other-identifier') + )->addItem( + new CalculatedPermissionsItem(['baz'], FALSE, 'other-scope', 'other-identifier') + ) + ); + $this->processor->processAccessPolicies($this->account)->willReturn($calculated_permissions); + $this->assertTrue($this->checker->hasPermission('foo', $this->account)); + $this->assertFalse($this->checker->hasPermission('bar', $this->account)); + $this->assertFalse($this->checker->hasPermission('baz', $this->account)); + } + + /** + * Tests the hasPermission method with only contrib scopes and identifiers. + */ + public function testHasPermissionOnlyContrib(): void { + $calculated_permissions = new CalculatedPermissions( + (new RefinableCalculatedPermissions())->addItem( + new CalculatedPermissionsItem(['baz'], FALSE, 'other-scope', 'other-identifier') + ) + ); + $this->processor->processAccessPolicies($this->account)->willReturn($calculated_permissions); + $this->assertFalse($this->checker->hasPermission('foo', $this->account)); + $this->assertFalse($this->checker->hasPermission('bar', $this->account)); + $this->assertFalse($this->checker->hasPermission('baz', $this->account)); + } + +} diff --git a/core/tests/Drupal/Tests/Core/Session/PermissionsHashGeneratorTest.php b/core/tests/Drupal/Tests/Core/Session/PermissionsHashGeneratorTest.php index 79c191f59252b1b9194e9aa9f306c97fa3498f7c..067472b3b05f13652b4ebcbf2176e32a00d8b27f 100644 --- a/core/tests/Drupal/Tests/Core/Session/PermissionsHashGeneratorTest.php +++ b/core/tests/Drupal/Tests/Core/Session/PermissionsHashGeneratorTest.php @@ -5,11 +5,18 @@ namespace Drupal\Tests\Core\Session; use Drupal\Component\Utility\Crypt; -use Drupal\Core\Entity\EntityTypeManagerInterface; +use Drupal\Core\Cache\Cache; +use Drupal\Core\Cache\CacheBackendInterface; +use Drupal\Core\PrivateKey; +use Drupal\Core\Session\AccessPolicyProcessorInterface; +use Drupal\Core\Session\AccountInterface; +use Drupal\Core\Session\CalculatedPermissions; +use Drupal\Core\Session\CalculatedPermissionsItem; use Drupal\Core\Session\PermissionsHashGenerator; +use Drupal\Core\Session\RefinableCalculatedPermissions; use Drupal\Core\Site\Settings; use Drupal\Tests\UnitTestCase; -use Drupal\user\RoleStorageInterface; +use Prophecy\Argument; /** * @coversDefaultClass \Drupal\Core\Session\PermissionsHashGenerator @@ -18,53 +25,32 @@ class PermissionsHashGeneratorTest extends UnitTestCase { /** - * The mocked super user account. + * The mocked user 1 account. * - * @var \Drupal\user\UserInterface|\PHPUnit\Framework\MockObject\MockObject + * @var \Drupal\Core\Session\AccountInterface */ protected $account1; /** - * A mocked account. + * The mocked user 2 account. * - * @var \Drupal\user\UserInterface|\PHPUnit\Framework\MockObject\MockObject + * @var \Drupal\Core\Session\AccountInterface */ protected $account2; - /** - * An "updated" mocked account. - * - * @var \Drupal\user\UserInterface|\PHPUnit\Framework\MockObject\MockObject - */ - protected $account2Updated; - - /** - * A different account. - * - * @var \Drupal\user\UserInterface|\PHPUnit\Framework\MockObject\MockObject - */ - protected $account3; - - /** - * The mocked private key service. - * - * @var \Drupal\Core\PrivateKey|\PHPUnit\Framework\MockObject\MockObject - */ - protected $privateKey; - /** * The mocked cache backend. * - * @var \Drupal\Core\Cache\CacheBackendInterface|\PHPUnit\Framework\MockObject\MockObject + * @var \Drupal\Core\Cache\CacheBackendInterface|\Prophecy\Prophecy\ObjectProphecy */ - protected $cache; + protected $staticCache; /** - * The mocked cache backend. + * The mocked access policy processor. * - * @var \Drupal\Core\Cache\CacheBackendInterface|\PHPUnit\Framework\MockObject\MockObject + * @var \Drupal\Core\Session\AccessPolicyProcessorInterface|\Prophecy\Prophecy\ObjectProphecy */ - protected $staticCache; + protected $processor; /** * The permission hash class being tested. @@ -81,182 +67,112 @@ protected function setUp(): void { new Settings(['hash_salt' => 'test']); - // The mocked super user account, with the same roles as Account 2. - $this->account1 = $this->getMockBuilder('Drupal\user\Entity\User') - ->disableOriginalConstructor() - ->onlyMethods(['getRoles', 'id']) - ->getMock(); - $this->account1->expects($this->any()) - ->method('id') - ->willReturn(1); - $this->account1->expects($this->never()) - ->method('getRoles'); - - // Account 2: 'administrator' and 'authenticated' roles. - $roles_1 = ['administrator', 'authenticated']; - $this->account2 = $this->getMockBuilder('Drupal\user\Entity\User') - ->disableOriginalConstructor() - ->onlyMethods(['getRoles', 'id']) - ->getMock(); - $this->account2->expects($this->any()) - ->method('getRoles') - ->willReturn($roles_1); - $this->account2->expects($this->any()) - ->method('id') - ->willReturn(2); + $this->account1 = $this->prophesize(AccountInterface::class); + $this->account1->id()->willReturn(1); + $this->account1 = $this->account1->reveal(); - // Account 3: 'authenticated' and 'administrator' roles (different order). - $roles_3 = ['authenticated', 'administrator']; - $this->account3 = $this->getMockBuilder('Drupal\user\Entity\User') - ->disableOriginalConstructor() - ->onlyMethods(['getRoles', 'id']) - ->getMock(); - $this->account3->expects($this->any()) - ->method('getRoles') - ->willReturn($roles_3); - $this->account3->expects($this->any()) - ->method('id') - ->willReturn(3); + $this->account2 = $this->prophesize(AccountInterface::class); + $this->account2->id()->willReturn(2); + $this->account2 = $this->account2->reveal(); - // Updated account 2: now also 'editor' role. - $roles_2_updated = ['editor', 'administrator', 'authenticated']; - $this->account2Updated = $this->getMockBuilder('Drupal\user\Entity\User') - ->disableOriginalConstructor() - ->onlyMethods(['getRoles', 'id']) - ->getMock(); - $this->account2Updated->expects($this->any()) - ->method('getRoles') - ->willReturn($roles_2_updated); - $this->account2Updated->expects($this->any()) - ->method('id') - ->willReturn(2); + $private_key = $this->prophesize(PrivateKey::class); + $private_key->get()->willReturn(Crypt::randomBytesBase64(55)); - // Mocked private key + cache services. - $random = Crypt::randomBytesBase64(55); - $this->privateKey = $this->getMockBuilder('Drupal\Core\PrivateKey') - ->disableOriginalConstructor() - ->onlyMethods(['get']) - ->getMock(); - $this->privateKey->expects($this->any()) - ->method('get') - ->willReturn($random); - $this->cache = $this->getMockBuilder('Drupal\Core\Cache\CacheBackendInterface') - ->disableOriginalConstructor() - ->getMock(); - $this->staticCache = $this->getMockBuilder('Drupal\Core\Cache\CacheBackendInterface') - ->disableOriginalConstructor() - ->getMock(); - $entityTypeManager = $this->getMockBuilder(EntityTypeManagerInterface::class) - ->disableOriginalConstructor() - ->getMock(); + $this->staticCache = $this->prophesize(CacheBackendInterface::class); + $this->staticCache->get(Argument::any())->willReturn(FALSE); + $this->staticCache->set(Argument::cetera())->shouldBeCalled(); - $roleStorage = $this->getMockBuilder(RoleStorageInterface::class) - ->disableOriginalConstructor() - ->getMock(); + $this->processor = $this->prophesize(AccessPolicyProcessorInterface::class); - $entityTypeManager->expects($this->any()) - ->method('getStorage') - ->with('user_role') - ->willReturn($roleStorage); - - $this->permissionsHash = new PermissionsHashGenerator($this->privateKey, $this->cache, $this->staticCache, $entityTypeManager); + $this->permissionsHash = new PermissionsHashGenerator( + $private_key->reveal(), + $this->staticCache->reveal(), + $this->processor->reveal() + ); } /** + * Tests the generate method for regular accounts. + * * @covers ::generate */ - public function testGenerate() { - // Ensure that the super user (user 1) always gets the same hash. - $super_user_hash = $this->permissionsHash->generate($this->account1); - - // Ensure that two user accounts with the same roles generate the same hash. + public function testGenerateRegular() { + $permissions = new CalculatedPermissions( + (new RefinableCalculatedPermissions())->addItem(new CalculatedPermissionsItem([ + 'permission foo', + 'permission bar', + ])) + ); + $this->processor->processAccessPolicies($this->account1)->willReturn($permissions); + $this->processor->processAccessPolicies($this->account2)->willReturn($permissions); + + // Check that two accounts with the same permissions generate the same hash. + $hash_1 = $this->permissionsHash->generate($this->account1); $hash_2 = $this->permissionsHash->generate($this->account2); - $hash_3 = $this->permissionsHash->generate($this->account3); - $this->assertSame($hash_2, $hash_3, 'Different users with the same roles generate the same permissions hash.'); - - $this->assertNotSame($hash_2, $super_user_hash, 'User 1 has a different hash despite having the same roles'); - - // Compare with hash for user account 1 with an additional role. - $updated_hash_2 = $this->permissionsHash->generate($this->account2Updated); - $this->assertNotSame($hash_2, $updated_hash_2, 'Same user with updated roles generates different permissions hash.'); + $this->assertSame($hash_1, $hash_2, 'Different users with the same permissions generate the same permissions hash.'); } /** + * Tests the generate method for admin users. + * * @covers ::generate */ - public function testGeneratePersistentCache() { - // Set expectations for the mocked cache backend. - $expected_cid = 'user_permissions_hash:administrator,authenticated'; - - $mock_cache = new \stdClass(); - $mock_cache->data = 'test_hash_here'; + public function testGenerateAdmin() { + $permissions = new CalculatedPermissions((new RefinableCalculatedPermissions())->addItem(new CalculatedPermissionsItem([], TRUE))); + $this->processor->processAccessPolicies($this->account1)->willReturn($permissions); + $this->processor->processAccessPolicies($this->account2)->willReturn($permissions); - $this->staticCache->expects($this->once()) - ->method('get') - ->with($expected_cid) - ->willReturn(FALSE); - $this->staticCache->expects($this->once()) - ->method('set') - ->with($expected_cid, $this->isType('string')); - - $this->cache->expects($this->once()) - ->method('get') - ->with($expected_cid) - ->willReturn($mock_cache); - $this->cache->expects($this->never()) - ->method('set'); + // Check that two accounts with the same permissions generate the same hash. + $hash_1 = $this->permissionsHash->generate($this->account1); + $hash_2 = $this->permissionsHash->generate($this->account2); + $this->assertSame($hash_1, $hash_2, 'Different admins generate the same permissions hash.'); - $this->permissionsHash->generate($this->account2); + // Check that the generated hash is simply 'is-admin'. + $this->assertSame('is-admin', $hash_1, 'Admins generate the string "is-admin" as their permissions hash.'); } /** + * Tests the generate method with no access policies. + * * @covers ::generate */ - public function testGenerateStaticCache() { - // Set expectations for the mocked cache backend. - $expected_cid = 'user_permissions_hash:administrator,authenticated'; + public function testGenerateNoAccessPolicies() { + $permissions = new CalculatedPermissions(new RefinableCalculatedPermissions()); + $this->processor->processAccessPolicies($this->account1)->willReturn($permissions); + $this->processor->processAccessPolicies($this->account2)->willReturn($permissions); - $mock_cache = new \stdClass(); - $mock_cache->data = 'test_hash_here'; - - $this->staticCache->expects($this->once()) - ->method('get') - ->with($expected_cid) - ->willReturn($mock_cache); - $this->staticCache->expects($this->never()) - ->method('set'); - - $this->cache->expects($this->never()) - ->method('get'); - $this->cache->expects($this->never()) - ->method('set'); + // Check that two accounts with the same permissions generate the same hash. + $hash_1 = $this->permissionsHash->generate($this->account1); + $hash_2 = $this->permissionsHash->generate($this->account2); + $this->assertSame($hash_1, $hash_2, 'Different accounts generate the same permissions hash when there are no policies.'); - $this->permissionsHash->generate($this->account2); + // Check that the generated hash is simply 'no-access-policies'. + $this->assertSame('no-access-policies', $hash_1, 'Accounts generate the string "is-admin" as their permissions hash when no policies are defined.'); } /** - * Tests the generate method with no cache returned. + * Tests the generate method's caching. + * + * @covers ::generate */ - public function testGenerateNoCache() { - // Set expectations for the mocked cache backend. - $expected_cid = 'user_permissions_hash:administrator,authenticated'; - - $this->staticCache->expects($this->once()) - ->method('get') - ->with($expected_cid) - ->willReturn(FALSE); - $this->staticCache->expects($this->once()) - ->method('set') - ->with($expected_cid, $this->isType('string')); + public function testGenerateCache() { + $permissions = new CalculatedPermissions(new RefinableCalculatedPermissions()); + $this->processor->processAccessPolicies($this->account1)->willReturn($permissions); + $this->processor->processAccessPolicies($this->account2)->willReturn($permissions); + + // Test that set is called with the right cache ID. + $this->staticCache->set('permissions_hash_1', 'no-access-policies', Cache::PERMANENT, [])->shouldBeCalledOnce(); + $this->staticCache->set('permissions_hash_2', 'no-access-policies', Cache::PERMANENT, [])->shouldBeCalledOnce(); + $this->permissionsHash->generate($this->account1); + $this->permissionsHash->generate($this->account2); - $this->cache->expects($this->once()) - ->method('get') - ->with($expected_cid) - ->willReturn(FALSE); - $this->cache->expects($this->once()) - ->method('set') - ->with($expected_cid, $this->isType('string')); + // Verify that ::set() isn't called more when ::get() returns something. + $cache_return = new \stdClass(); + $cache_return->data = 'no-access-policies'; + $this->staticCache->get('permissions_hash_1')->willReturn($cache_return); + $this->staticCache->get('permissions_hash_2')->willReturn($cache_return); + $this->permissionsHash->generate($this->account1); $this->permissionsHash->generate($this->account2); } diff --git a/core/tests/Drupal/Tests/Core/Session/SuperUserAccessPolicyTest.php b/core/tests/Drupal/Tests/Core/Session/SuperUserAccessPolicyTest.php new file mode 100644 index 0000000000000000000000000000000000000000..13b7feec432da3cdbb948ada7d3e6166bb52a09d --- /dev/null +++ b/core/tests/Drupal/Tests/Core/Session/SuperUserAccessPolicyTest.php @@ -0,0 +1,140 @@ +<?php + +declare(strict_types=1); + +namespace Drupal\Tests\Core\Session; + +use Drupal\Core\Cache\Cache; +use Drupal\Core\Cache\Context\CacheContextsManager; +use Drupal\Core\Session\AccessPolicyInterface; +use Drupal\Core\Session\AccountInterface; +use Drupal\Core\Session\CalculatedPermissionsItem; +use Drupal\Core\Session\RefinableCalculatedPermissions; +use Drupal\Core\Session\SuperUserAccessPolicy; +use Drupal\Tests\UnitTestCase; +use Prophecy\Argument; +use Symfony\Component\DependencyInjection\ContainerInterface; + +/** + * @coversDefaultClass \Drupal\Core\Session\SuperUserAccessPolicy + * @group Session + */ +class SuperUserAccessPolicyTest extends UnitTestCase { + + /** + * The access policy to test. + * + * @var \Drupal\Core\Session\SuperUserAccessPolicy + */ + protected $accessPolicy; + + /** + * {@inheritdoc} + */ + protected function setUp(): void { + parent::setUp(); + $this->accessPolicy = new SuperUserAccessPolicy(); + + $cache_context_manager = $this->prophesize(CacheContextsManager::class); + $cache_context_manager->assertValidTokens(Argument::any())->willReturn(TRUE); + + $container = $this->prophesize(ContainerInterface::class); + $container->get('cache_contexts_manager')->willReturn($cache_context_manager->reveal()); + \Drupal::setContainer($container->reveal()); + } + + /** + * @covers ::applies + */ + public function testApplies(): void { + $this->assertTrue($this->accessPolicy->applies(AccessPolicyInterface::SCOPE_DRUPAL)); + $this->assertFalse($this->accessPolicy->applies('another scope')); + $this->assertFalse($this->accessPolicy->applies($this->randomString())); + } + + /** + * Tests the calculatePermissions method. + * + * @param int $uid + * The UID for the account the policy checks. + * @param bool $expect_admin_rights + * Whether to expect admin rights to be granted. + * + * @covers ::calculatePermissions + * @dataProvider calculatePermissionsProvider + */ + public function testCalculatePermissions(int $uid, bool $expect_admin_rights): void { + $account = $this->prophesize(AccountInterface::class); + $account->id()->willReturn($uid); + $calculated_permissions = $this->accessPolicy->calculatePermissions($account->reveal(), AccessPolicyInterface::SCOPE_DRUPAL); + + if ($expect_admin_rights) { + $this->assertCount(1, $calculated_permissions->getItems(), 'Only one calculated permissions item was added.'); + $item = $calculated_permissions->getItem(); + $this->assertSame([], $item->getPermissions()); + $this->assertTrue($item->isAdmin()); + } + + $this->assertSame([], $calculated_permissions->getCacheTags()); + $this->assertSame(['user.is_super_user'], $calculated_permissions->getCacheContexts()); + $this->assertSame(Cache::PERMANENT, $calculated_permissions->getCacheMaxAge()); + } + + /** + * Data provider for testCalculatePermissions. + * + * @return array + * A list of test scenarios. + */ + public function calculatePermissionsProvider(): array { + $cases['is-super-user'] = [1, TRUE]; + $cases['is-normal-user'] = [2, FALSE]; + return $cases; + } + + /** + * Tests the alterPermissions method. + * + * @param int $uid + * The UID for the account the policy checks. + * + * @covers ::alterPermissions + * @dataProvider alterPermissionsProvider + */ + public function testAlterPermissions(int $uid): void { + $account = $this->prophesize(AccountInterface::class); + $account->id()->willReturn($uid); + + $calculated_permissions = new RefinableCalculatedPermissions(); + $calculated_permissions->addItem(new CalculatedPermissionsItem(['foo'])); + $calculated_permissions->addCacheTags(['bar']); + $calculated_permissions->addCacheContexts(['baz']); + + $this->accessPolicy->alterPermissions($account->reveal(), AccessPolicyInterface::SCOPE_DRUPAL, $calculated_permissions); + $this->assertSame(['foo'], $calculated_permissions->getItem()->getPermissions()); + $this->assertSame(['bar'], $calculated_permissions->getCacheTags()); + $this->assertSame(['baz'], $calculated_permissions->getCacheContexts()); + } + + /** + * Data provider for testAlterPermissions. + * + * @return array + * A list of test scenarios. + */ + public function alterPermissionsProvider(): array { + $cases['is-super-user'] = [1]; + $cases['is-normal-user'] = [2]; + return $cases; + } + + /** + * Tests the getPersistentCacheContexts method. + * + * @covers ::getPersistentCacheContexts + */ + public function testGetPersistentCacheContexts(): void { + $this->assertSame(['user.is_super_user'], $this->accessPolicy->getPersistentCacheContexts(AccessPolicyInterface::SCOPE_DRUPAL)); + } + +} diff --git a/core/tests/Drupal/Tests/Core/Session/UserRolesAccessPolicyTest.php b/core/tests/Drupal/Tests/Core/Session/UserRolesAccessPolicyTest.php new file mode 100644 index 0000000000000000000000000000000000000000..dc7613a9b2b9cd4e30f679822997c9cfea11d0b8 --- /dev/null +++ b/core/tests/Drupal/Tests/Core/Session/UserRolesAccessPolicyTest.php @@ -0,0 +1,189 @@ +<?php + +declare(strict_types=1); + +namespace Drupal\Tests\Core\Session; + +use Drupal\Core\Cache\Cache; +use Drupal\Core\Cache\Context\CacheContextsManager; +use Drupal\Core\Entity\EntityTypeManagerInterface; +use Drupal\Core\Session\AccessPolicyInterface; +use Drupal\Core\Session\AccountInterface; +use Drupal\Core\Session\CalculatedPermissionsItem; +use Drupal\Core\Session\RefinableCalculatedPermissions; +use Drupal\Core\Session\UserRolesAccessPolicy; +use Drupal\Tests\UnitTestCase; +use Drupal\user\RoleInterface; +use Drupal\user\RoleStorageInterface; +use Prophecy\Argument; +use Symfony\Component\DependencyInjection\ContainerInterface; + +/** + * @coversDefaultClass \Drupal\Core\Session\UserRolesAccessPolicy + * @group Session + */ +class UserRolesAccessPolicyTest extends UnitTestCase { + + /** + * The access policy to test. + * + * @var \Drupal\Core\Session\UserRolesAccessPolicy + */ + protected $accessPolicy; + + /** + * The mocked entity type manager service. + * + * @var \Drupal\Core\Entity\EntityTypeManagerInterface|\Prophecy\Prophecy\ObjectProphecy + */ + protected $entityTypeManager; + + /** + * {@inheritdoc} + */ + protected function setUp(): void { + parent::setUp(); + + $this->entityTypeManager = $this->prophesize(EntityTypeManagerInterface::class); + $this->accessPolicy = new UserRolesAccessPolicy($this->entityTypeManager->reveal()); + + $cache_context_manager = $this->prophesize(CacheContextsManager::class); + $cache_context_manager->assertValidTokens(Argument::any())->willReturn(TRUE); + + $container = $this->prophesize(ContainerInterface::class); + $container->get('cache_contexts_manager')->willReturn($cache_context_manager->reveal()); + \Drupal::setContainer($container->reveal()); + } + + /** + * @covers ::applies + */ + public function testApplies(): void { + $this->assertTrue($this->accessPolicy->applies(AccessPolicyInterface::SCOPE_DRUPAL)); + $this->assertFalse($this->accessPolicy->applies('another scope')); + $this->assertFalse($this->accessPolicy->applies($this->randomString())); + } + + /** + * Tests the calculatePermissions method. + * + * @param array $roles + * The roles to grant the account. + * @param bool $expect_admin_rights + * Whether to expect admin rights to be granted. + * + * @covers ::calculatePermissions + * @dataProvider calculatePermissionsProvider + */ + public function testCalculatePermissions(array $roles, bool $expect_admin_rights): void { + $account = $this->prophesize(AccountInterface::class); + $account->getRoles()->willReturn(array_keys($roles)); + + $total_permissions = $cache_tags = $mocked_roles = []; + foreach ($roles as $role_id => $role) { + $total_permissions = array_merge($total_permissions, $role['permissions']); + $cache_tags[] = "config:user.role.$role_id"; + + $mocked_role = $this->prophesize(RoleInterface::class); + $mocked_role->getPermissions()->willReturn($role['permissions']); + $mocked_role->isAdmin()->willReturn($role['is_admin']); + $mocked_role->getCacheTags()->willReturn(["config:user.role.$role_id"]); + $mocked_role->getCacheContexts()->willReturn([]); + $mocked_role->getCacheMaxAge()->willReturn(Cache::PERMANENT); + $mocked_roles[$role_id] = $mocked_role->reveal(); + } + + $role_storage = $this->prophesize(RoleStorageInterface::class); + $role_storage->loadMultiple(array_keys($roles))->willReturn($mocked_roles); + $this->entityTypeManager->getStorage('user_role')->willReturn($role_storage->reveal()); + + $calculated_permissions = $this->accessPolicy->calculatePermissions($account->reveal(), AccessPolicyInterface::SCOPE_DRUPAL); + + if (!empty($roles)) { + $this->assertCount(1, $calculated_permissions->getItems(), 'Only one calculated permissions item was added.'); + $item = $calculated_permissions->getItem(); + + if ($expect_admin_rights) { + $this->assertSame([], $item->getPermissions()); + $this->assertTrue($item->isAdmin()); + } + else { + $this->assertSame($total_permissions, $item->getPermissions()); + $this->assertFalse($item->isAdmin()); + } + } + + $this->assertSame($cache_tags, $calculated_permissions->getCacheTags()); + $this->assertSame(['user.roles'], $calculated_permissions->getCacheContexts()); + $this->assertSame(Cache::PERMANENT, $calculated_permissions->getCacheMaxAge()); + } + + /** + * Data provider for testCalculatePermissions. + * + * @return array + * A list of test scenarios. + */ + public function calculatePermissionsProvider(): array { + $cases['no-roles'] = [ + 'roles' => [], + 'has-admin' => FALSE, + ]; + $cases['some-roles'] = [ + 'roles' => [ + 'role_foo' => [ + 'permissions' => ['foo'], + 'is_admin' => FALSE, + ], + 'role_bar' => [ + 'permissions' => ['bar'], + 'is_admin' => FALSE, + ], + ], + 'has-admin' => FALSE, + ]; + $cases['admin-role'] = [ + 'roles' => [ + 'role_foo' => [ + 'permissions' => ['foo'], + 'is_admin' => FALSE, + ], + 'role_bar' => [ + 'permissions' => ['bar'], + 'is_admin' => TRUE, + ], + ], + 'has-admin' => TRUE, + ]; + return $cases; + } + + /** + * Tests the alterPermissions method. + * + * @covers ::alterPermissions + */ + public function testAlterPermissions(): void { + $account = $this->prophesize(AccountInterface::class); + + $calculated_permissions = new RefinableCalculatedPermissions(); + $calculated_permissions->addItem(new CalculatedPermissionsItem(['foo'])); + $calculated_permissions->addCacheTags(['bar']); + $calculated_permissions->addCacheContexts(['baz']); + + $this->accessPolicy->alterPermissions($account->reveal(), AccessPolicyInterface::SCOPE_DRUPAL, $calculated_permissions); + $this->assertSame(['foo'], $calculated_permissions->getItem()->getPermissions()); + $this->assertSame(['bar'], $calculated_permissions->getCacheTags()); + $this->assertSame(['baz'], $calculated_permissions->getCacheContexts()); + } + + /** + * Tests the getPersistentCacheContexts method. + * + * @covers ::getPersistentCacheContexts + */ + public function testGetPersistentCacheContexts(): void { + $this->assertSame(['user.roles'], $this->accessPolicy->getPersistentCacheContexts(AccessPolicyInterface::SCOPE_DRUPAL)); + } + +} diff --git a/core/tests/Drupal/Tests/Core/Session/UserSessionTest.php b/core/tests/Drupal/Tests/Core/Session/UserSessionTest.php index ef01736b764a68aa1a9db0d164cba03036195026..77599733d4a3ea0d0c698a8fe81090978d315a25 100644 --- a/core/tests/Drupal/Tests/Core/Session/UserSessionTest.php +++ b/core/tests/Drupal/Tests/Core/Session/UserSessionTest.php @@ -4,10 +4,7 @@ namespace Drupal\Tests\Core\Session; -use Drupal\Component\Datetime\Time; -use Drupal\Core\Cache\MemoryCache\MemoryCache; use Drupal\Core\DependencyInjection\ContainerBuilder; -use Drupal\Core\Session\PermissionChecker; use Drupal\Core\Session\UserSession; use Drupal\Tests\UnitTestCase; use Drupal\user\Entity\User; @@ -19,27 +16,6 @@ */ class UserSessionTest extends UnitTestCase { - /** - * The user sessions used in the test. - * - * @var \Drupal\Core\Session\AccountInterface[] - */ - protected $users = []; - - /** - * Provides test data for getHasPermission(). - * - * @return array - */ - public static function providerTestHasPermission() { - $data = []; - $data[] = ['example permission', ['user_one', 'user_two'], ['user_last']]; - $data[] = ['another example permission', ['user_two'], ['user_one', 'user_last']]; - $data[] = ['final example permission', [], ['user_one', 'user_two', 'user_last']]; - - return $data; - } - /** * Setups a user session for the test. * @@ -57,104 +33,23 @@ protected function createUserSession(array $rids = [], $authenticated = FALSE) { } /** - * {@inheritdoc} + * Tests the has permission method. + * + * @see \Drupal\Core\Session\UserSession::hasPermission() */ - protected function setUp(): void { - parent::setUp(); + public function testHasPermission(): void { + $user = $this->createUserSession(); - $roles = []; - $roles['role_one'] = $this->getMockBuilder('Drupal\user\Entity\Role') - ->disableOriginalConstructor() - ->onlyMethods(['hasPermission']) - ->getMock(); - $roles['role_one']->expects($this->any()) - ->method('hasPermission') - ->willReturnMap([ - ['example permission', TRUE], - ['another example permission', FALSE], - ['last example permission', FALSE], - ]); + $permission_checker = $this->prophesize('Drupal\Core\Session\PermissionCheckerInterface'); + $permission_checker->hasPermission('example permission', $user)->willReturn(TRUE); + $permission_checker->hasPermission('another example permission', $user)->willReturn(FALSE); - $roles['role_two'] = $this->getMockBuilder('Drupal\user\Entity\Role') - ->disableOriginalConstructor() - ->onlyMethods(['hasPermission']) - ->getMock(); - $roles['role_two']->expects($this->any()) - ->method('hasPermission') - ->willReturnMap([ - ['example permission', TRUE], - ['another example permission', TRUE], - ['last example permission', FALSE], - ]); - - $roles['anonymous'] = $this->getMockBuilder('Drupal\user\Entity\Role') - ->disableOriginalConstructor() - ->onlyMethods(['hasPermission']) - ->getMock(); - $roles['anonymous']->expects($this->any()) - ->method('hasPermission') - ->willReturnMap([ - ['example permission', FALSE], - ['another example permission', FALSE], - ['last example permission', FALSE], - ]); - - $role_storage = $this->getMockBuilder('Drupal\user\RoleStorage') - ->setConstructorArgs(['role', new MemoryCache(new Time())]) - ->disableOriginalConstructor() - ->onlyMethods(['loadMultiple']) - ->getMock(); - $role_storage->expects($this->any()) - ->method('loadMultiple') - ->willReturnMap([ - [[], []], - [NULL, $roles], - [['anonymous'], [$roles['anonymous']]], - [['anonymous', 'role_one'], [$roles['role_one']]], - [['anonymous', 'role_two'], [$roles['role_two']]], - [ - ['anonymous', 'role_one', 'role_two'], - [$roles['role_one'], $roles['role_two']], - ], - ]); - - $entity_type_manager = $this->createMock('Drupal\Core\Entity\EntityTypeManagerInterface'); - $entity_type_manager->expects($this->any()) - ->method('getStorage') - ->with($this->equalTo('user_role')) - ->willReturn($role_storage); $container = new ContainerBuilder(); - $container->set('entity_type.manager', $entity_type_manager); - $container->set('permission_checker', new PermissionChecker($entity_type_manager)); + $container->set('permission_checker', $permission_checker->reveal()); \Drupal::setContainer($container); - $this->users['user_one'] = $this->createUserSession(['role_one']); - $this->users['user_two'] = $this->createUserSession(['role_one', 'role_two']); - $this->users['user_three'] = $this->createUserSession(['role_two'], TRUE); - $this->users['user_last'] = $this->createUserSession(); - } - - /** - * Tests the has permission method. - * - * @param string $permission - * The permission to check. - * @param \Drupal\Core\Session\AccountInterface[] $sessions_with_access - * The users with access. - * @param \Drupal\Core\Session\AccountInterface[] $sessions_without_access - * The users without access. - * - * @dataProvider providerTestHasPermission - * - * @see \Drupal\Core\Session\UserSession::hasPermission() - */ - public function testHasPermission($permission, array $sessions_with_access, array $sessions_without_access) { - foreach ($sessions_with_access as $name) { - $this->assertTrue($this->users[$name]->hasPermission($permission)); - } - foreach ($sessions_without_access as $name) { - $this->assertFalse($this->users[$name]->hasPermission($permission)); - } + $this->assertTrue($user->hasPermission('example permission')); + $this->assertFalse($user->hasPermission('another example permission')); } /** @@ -164,8 +59,9 @@ public function testHasPermission($permission, array $sessions_with_access, arra * @todo Move roles constants to a class/interface */ public function testUserGetRoles() { - $this->assertEquals([RoleInterface::AUTHENTICATED_ID, 'role_two'], $this->users['user_three']->getRoles()); - $this->assertEquals(['role_two'], $this->users['user_three']->getRoles(TRUE)); + $user = $this->createUserSession(['role_two'], TRUE); + $this->assertEquals([RoleInterface::AUTHENTICATED_ID, 'role_two'], $user->getRoles()); + $this->assertEquals(['role_two'], $user->getRoles(TRUE)); } /** @@ -174,11 +70,16 @@ public function testUserGetRoles() { * @covers ::hasRole */ public function testHasRole() { - $this->assertTrue($this->users['user_one']->hasRole('role_one')); - $this->assertFalse($this->users['user_two']->hasRole('no role')); - $this->assertTrue($this->users['user_three']->hasRole(RoleInterface::AUTHENTICATED_ID)); - $this->assertFalse($this->users['user_three']->hasRole(RoleInterface::ANONYMOUS_ID)); - $this->assertTrue($this->users['user_last']->hasRole(RoleInterface::ANONYMOUS_ID)); + $user1 = $this->createUserSession(['role_one']); + $user2 = $this->createUserSession(['role_one', 'role_two']); + $user3 = $this->createUserSession(['role_two'], TRUE); + $user4 = $this->createUserSession(); + + $this->assertTrue($user1->hasRole('role_one')); + $this->assertFalse($user2->hasRole('no role')); + $this->assertTrue($user3->hasRole(RoleInterface::AUTHENTICATED_ID)); + $this->assertFalse($user3->hasRole(RoleInterface::ANONYMOUS_ID)); + $this->assertTrue($user4->hasRole(RoleInterface::ANONYMOUS_ID)); } /**