TSK-1210: replaced group names with new group names

This commit is contained in:
Mustapha Zorgati 2020-06-05 20:37:23 +02:00
parent 92f81a6d2b
commit 6952ce8959
48 changed files with 352 additions and 352 deletions

View File

@ -36,7 +36,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateMasterClassification() void testCreateMasterClassification()
throws ClassificationAlreadyExistException, ClassificationNotFoundException, throws ClassificationAlreadyExistException, ClassificationNotFoundException,
@ -62,7 +62,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithMasterCopy() void testCreateClassificationWithMasterCopy()
throws ClassificationAlreadyExistException, ClassificationNotFoundException, throws ClassificationAlreadyExistException, ClassificationNotFoundException,
@ -111,7 +111,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithExistingMaster() void testCreateClassificationWithExistingMaster()
throws DomainNotFoundException, ClassificationAlreadyExistException, NotAuthorizedException, throws DomainNotFoundException, ClassificationAlreadyExistException, NotAuthorizedException,
@ -134,7 +134,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateChildInDomainAndCopyInMaster() throws TaskanaException { void testCreateChildInDomainAndCopyInMaster() throws TaskanaException {
Classification parent = classificationService.newClassification("Key0816", "DOMAIN_A", "TASK"); Classification parent = classificationService.newClassification("Key0816", "DOMAIN_A", "TASK");
@ -154,7 +154,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithInvalidValues() { void testCreateClassificationWithInvalidValues() {
classificationService.createClassificationQuery().count(); classificationService.createClassificationQuery().count();
@ -176,7 +176,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationAlreadyExisting() throws TaskanaException { void testCreateClassificationAlreadyExisting() throws TaskanaException {
Classification classification = classificationService.newClassification("Key3", "", "TASK"); Classification classification = classificationService.newClassification("Key3", "", "TASK");
@ -188,7 +188,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationInUnknownDomain() { void testCreateClassificationInUnknownDomain() {
Classification classification = Classification classification =
@ -199,7 +199,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationOfUnknownType() { void testCreateClassificationOfUnknownType() {
Classification classification = Classification classification =
@ -210,7 +210,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationOfUnknownCategory() { void testCreateClassificationOfUnknownCategory() {
Classification classification = Classification classification =
@ -222,7 +222,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithInvalidParentId() { void testCreateClassificationWithInvalidParentId() {
Classification classification = classificationService.newClassification("Key5", "", "TASK"); Classification classification = classificationService.newClassification("Key5", "", "TASK");
@ -233,7 +233,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithInvalidParentKey() { void testCreateClassificationWithInvalidParentKey() {
Classification classification = classificationService.newClassification("Key5", "", "TASK"); Classification classification = classificationService.newClassification("Key5", "", "TASK");
@ -244,7 +244,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testCreateClassificationWithExplicitId() { void testCreateClassificationWithExplicitId() {
ClassificationImpl classification = ClassificationImpl classification =
@ -256,7 +256,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void should_beAbleToCreateNewClassification_When_ClassificationCopy() throws Exception { void should_beAbleToCreateNewClassification_When_ClassificationCopy() throws Exception {
ClassificationImpl oldClassification = ClassificationImpl oldClassification =

View File

@ -41,7 +41,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testDeleteClassificationInDomainUserIsNotAuthorized() { void testDeleteClassificationInDomainUserIsNotAuthorized() {
ThrowingCallable call = () -> classificationService.deleteClassification("L140101", "DOMAIN_A"); ThrowingCallable call = () -> classificationService.deleteClassification("L140101", "DOMAIN_A");
@ -65,7 +65,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testThrowExeptionIfDeleteClassificationWithExistingTasks() { void testThrowExeptionIfDeleteClassificationWithExistingTasks() {
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "DOMAIN_A"); ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "DOMAIN_A");
@ -74,7 +74,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testThrowExeptionIfDeleteMasterClassificationWithExistingTasks() { void testThrowExeptionIfDeleteMasterClassificationWithExistingTasks() {
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", ""); ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "");
@ -100,7 +100,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testThrowExceptionWhenChildClassificationIsInUseAndRollback() void testThrowExceptionWhenChildClassificationIsInUseAndRollback()
throws ClassificationNotFoundException { throws ClassificationNotFoundException {

View File

@ -124,7 +124,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateTaskOnClassificationKeyCategoryChange() throws Exception { void testUpdateTaskOnClassificationKeyCategoryChange() throws Exception {
setupTest(); setupTest();
@ -156,7 +156,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateClassificationNotLatestAnymore() void testUpdateClassificationNotLatestAnymore()
throws ClassificationNotFoundException, NotAuthorizedException, ConcurrencyException, throws ClassificationNotFoundException, NotAuthorizedException, ConcurrencyException,
@ -183,7 +183,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateClassificationParentIdToInvalid() throws ClassificationNotFoundException { void testUpdateClassificationParentIdToInvalid() throws ClassificationNotFoundException {
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A"); Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");
@ -194,7 +194,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateClassificationParentKeyToInvalid() throws ClassificationNotFoundException { void testUpdateClassificationParentKeyToInvalid() throws ClassificationNotFoundException {
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A"); Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");

View File

@ -46,7 +46,7 @@ import pro.taskana.workbasket.api.models.WorkbasketAccessItem;
@ExtendWith(JaasExtension.class) @ExtendWith(JaasExtension.class)
public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest { public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testTimestampsOnTaskUpdate() void testTimestampsOnTaskUpdate()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -73,7 +73,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
assertThat(retrievedTask).isEqualTo(updatedTask); assertThat(retrievedTask).isEqualTo(updatedTask);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreatedTaskObjectEqualsReadTaskObjectInNewTimezone() void testCreatedTaskObjectEqualsReadTaskObjectInNewTimezone()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -111,7 +111,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
assertThat(readTask).isEqualTo(createdTask); assertThat(readTask).isEqualTo(createdTask);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testTimestampsOnClassificationUpdate() void testTimestampsOnClassificationUpdate()
throws ClassificationNotFoundException, InvalidArgumentException, ConcurrencyException, throws ClassificationNotFoundException, InvalidArgumentException, ConcurrencyException,
@ -133,7 +133,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testTimestampsOnCreateMasterClassification() void testTimestampsOnCreateMasterClassification()
throws ClassificationAlreadyExistException, ClassificationNotFoundException, throws ClassificationAlreadyExistException, ClassificationNotFoundException,
@ -157,7 +157,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
assertThat(retrievedClassification).isEqualTo(classification); assertThat(retrievedClassification).isEqualTo(classification);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testTimestampsOnWorkbasketUpdate() void testTimestampsOnWorkbasketUpdate()
throws ConcurrencyException, NotAuthorizedException, WorkbasketNotFoundException { throws ConcurrencyException, NotAuthorizedException, WorkbasketNotFoundException {

View File

@ -37,7 +37,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
.createWorkbasketQuery() .createWorkbasketQuery()
.nameLike("%") .nameLike("%")
.accessIdsHavePermission( .accessIdsHavePermission(
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2") WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
.list(); .list();
}; };
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
@ -56,7 +56,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
.createWorkbasketQuery() .createWorkbasketQuery()
.nameLike("%") .nameLike("%")
.accessIdsHavePermission( .accessIdsHavePermission(
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2") WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
.list(); .list();
}; };
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
@ -76,7 +76,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
.createWorkbasketQuery() .createWorkbasketQuery()
.nameLike("%") .nameLike("%")
.accessIdsHavePermission( .accessIdsHavePermission(
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2") WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
.list(); .list();
assertThat(results).hasSize(13); assertThat(results).hasSize(13);
@ -95,7 +95,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
.createWorkbasketQuery() .createWorkbasketQuery()
.nameLike("%") .nameLike("%")
.accessIdsHavePermission( .accessIdsHavePermission(
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2") WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
.list(); .list();
assertThat(results).hasSize(13); assertThat(results).hasSize(13);

View File

@ -37,7 +37,7 @@ import pro.taskana.workbasket.api.exceptions.WorkbasketNotFoundException;
@ExtendWith(JaasExtension.class) @ExtendWith(JaasExtension.class)
class CallbackStateAccTest extends AbstractAccTest { class CallbackStateAccTest extends AbstractAccTest {
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateTaskWithDifferentCallbackStates() void testCreateTaskWithDifferentCallbackStates()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -63,7 +63,7 @@ class CallbackStateAccTest extends AbstractAccTest {
assertThat(createdTask.getCallbackState()).isEqualTo(CallbackState.CLAIMED); assertThat(createdTask.getCallbackState()).isEqualTo(CallbackState.CLAIMED);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testDeletionOfTaskWithWrongCallbackStateIsBlocked() void testDeletionOfTaskWithWrongCallbackStateIsBlocked()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -110,7 +110,7 @@ class CallbackStateAccTest extends AbstractAccTest {
.hasMessageEndingWith(endOfMessage); .hasMessageEndingWith(endOfMessage);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testUpdateOfCallbackState() void testUpdateOfCallbackState()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -176,7 +176,7 @@ class CallbackStateAccTest extends AbstractAccTest {
assertThat(bulkResult3.containsErrors()).isFalse(); assertThat(bulkResult3.containsErrors()).isFalse();
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testInvalidUpdateOfCallbackStateToNone() void testInvalidUpdateOfCallbackStateToNone()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -212,7 +212,7 @@ class CallbackStateAccTest extends AbstractAccTest {
assertThat(failedTaskIds).hasSize(3); assertThat(failedTaskIds).hasSize(3);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testInvalidUpdateOfCallbackStateToComplete() void testInvalidUpdateOfCallbackStateToComplete()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -252,7 +252,7 @@ class CallbackStateAccTest extends AbstractAccTest {
assertThat(failedTaskIds).hasSize(2).doesNotContain(createdTask3.getExternalId()); assertThat(failedTaskIds).hasSize(2).doesNotContain(createdTask3.getExternalId());
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testInvalidUpdateOfCallbackStateToClaimed() void testInvalidUpdateOfCallbackStateToClaimed()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -296,7 +296,7 @@ class CallbackStateAccTest extends AbstractAccTest {
.containsOnly(createdTask2.getExternalId(), createdTask3.getExternalId()); .containsOnly(createdTask2.getExternalId(), createdTask3.getExternalId());
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testInvalidUpdateOfCallbackStateToRequired() void testInvalidUpdateOfCallbackStateToRequired()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -333,7 +333,7 @@ class CallbackStateAccTest extends AbstractAccTest {
assertThat(failedTaskIds).containsOnly(createdTask3.getExternalId()); assertThat(failedTaskIds).containsOnly(createdTask3.getExternalId());
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testQueriesWithCallbackState() throws Exception { void testQueriesWithCallbackState() throws Exception {
resetDb(false); resetDb(false);

View File

@ -38,7 +38,7 @@ class CancelTaskAccTest extends AbstractAccTest {
resetDb(false); resetDb(false);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQeryCancelledTasks() { void testQeryCancelledTasks() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -46,7 +46,7 @@ class CancelTaskAccTest extends AbstractAccTest {
assertThat(taskSummaries).hasSize(5); assertThat(taskSummaries).hasSize(5);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCancelReadyTask() void testCancelReadyTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException { throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
@ -73,7 +73,7 @@ class CancelTaskAccTest extends AbstractAccTest {
assertThat(cancelledTask.getState()).isEqualTo(TaskState.CANCELLED); assertThat(cancelledTask.getState()).isEqualTo(TaskState.CANCELLED);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testCancelClaimedTask() void testCancelClaimedTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException { throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
@ -91,7 +91,7 @@ class CancelTaskAccTest extends AbstractAccTest {
assertThat(numTasksCancelled).isEqualTo(6); assertThat(numTasksCancelled).isEqualTo(6);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCancelCompletedTask() { void testCancelCompletedTask() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -103,7 +103,7 @@ class CancelTaskAccTest extends AbstractAccTest {
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class); assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testCancelTerminatedTask() { void testCancelTerminatedTask() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -114,7 +114,7 @@ class CancelTaskAccTest extends AbstractAccTest {
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class); assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testCancelCancelledTask() { void testCancelCancelledTask() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =

View File

@ -35,7 +35,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCompleteTask() void testCompleteTask()
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException, throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
@ -70,7 +70,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getModified()).isNotEqualTo(completedTask.getCreated()); assertThat(completedTask.getModified()).isNotEqualTo(completedTask.getCreated());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCompleteTaskTwice() void testCompleteTaskTwice()
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException, throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
@ -81,7 +81,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(completedTask2).isEqualTo(completedTask); assertThat(completedTask2).isEqualTo(completedTask);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testForceCompleteAlreadyClaimed() void testForceCompleteAlreadyClaimed()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -107,7 +107,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified()); assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testForceCompleteNotClaimed() void testForceCompleteNotClaimed()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -132,7 +132,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified()); assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCompleteTaskThrowsErrors() { void testCompleteTaskThrowsErrors() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -162,7 +162,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testClaimTaskWithDefaultFlag() void testClaimTaskWithDefaultFlag()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -192,7 +192,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(claimedTask.getModified()).isEqualTo(claimedTask.getClaimed()); assertThat(claimedTask.getModified()).isEqualTo(claimedTask.getClaimed());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testForceClaimTaskFromOtherUser() void testForceClaimTaskFromOtherUser()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -222,7 +222,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(taskAfterClaim.isRead()).isTrue(); assertThat(taskAfterClaim.isRead()).isTrue();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testClaimTaskNotExisting() { void testClaimTaskNotExisting() {
@ -234,7 +234,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(TaskNotFoundException.class); assertThatThrownBy(call).isInstanceOf(TaskNotFoundException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testClaimTaskWithInvalidState() { void testClaimTaskWithInvalidState() {
@ -246,7 +246,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class); assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testClaimTaskWithInvalidOwner() { void testClaimTaskWithInvalidOwner() {
@ -258,7 +258,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCancelClaimForcedWithInvalidState() { void testCancelClaimForcedWithInvalidState() {
@ -270,7 +270,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class); assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCancelClaimDefaultFlag() void testCancelClaimDefaultFlag()
throws NotAuthorizedException, WorkbasketNotFoundException, ClassificationNotFoundException, throws NotAuthorizedException, WorkbasketNotFoundException, ClassificationNotFoundException,
@ -317,7 +317,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
assertThat(taskAfter.isRead()).isTrue(); assertThat(taskAfter.isRead()).isTrue();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCancelClaimWithInvalidOwner() { void testCancelClaimWithInvalidOwner() {

View File

@ -44,7 +44,7 @@ class CreateTaskAccTest extends AbstractAccTest {
private final TaskService taskService = taskanaEngine.getTaskService(); private final TaskService taskService = taskanaEngine.getTaskService();
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_beAbleToCreateNewTask_When_TaskCopy() throws Exception { void should_beAbleToCreateNewTask_When_TaskCopy() throws Exception {
Task oldTask = taskService.getTask("TKI:000000000000000000000000000000000000"); Task oldTask = taskService.getTask("TKI:000000000000000000000000000000000000");
@ -59,7 +59,7 @@ class CreateTaskAccTest extends AbstractAccTest {
.containsOnly(newTask.getId()); .containsOnly(newTask.getId());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateSimpleManualTask() void testCreateSimpleManualTask()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -94,7 +94,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(createdTask.isTransferred()).isFalse(); assertThat(createdTask.isTransferred()).isFalse();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_createTask_When_ObjectReferenceSystemAndSystemInstanceIsNull() void should_createTask_When_ObjectReferenceSystemAndSystemInstanceIsNull()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -135,7 +135,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(createdTask.getCreator()).isEqualTo(CurrentUserContext.getUserid()); assertThat(createdTask.getCreator()).isEqualTo(CurrentUserContext.getUserid());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testIdempotencyOfTaskCreation() void testIdempotencyOfTaskCreation()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -177,7 +177,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class); assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateSimpleTaskWithCustomAttributes() void testCreateSimpleTaskWithCustomAttributes()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -245,7 +245,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb); assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateExternalTaskWithAttachment() void testCreateExternalTaskWithAttachment()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -331,7 +331,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb); assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateExternalTaskWithMultipleAttachments() void testCreateExternalTaskWithMultipleAttachments()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -383,7 +383,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(readTask.getAttachments().get(0).getObjectReference()).isNotNull(); assertThat(readTask.getAttachments().get(0).getObjectReference()).isNotNull();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testPrioDurationOfTaskFromAttachmentsAtCreate() void testPrioDurationOfTaskFromAttachmentsAtCreate()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -443,7 +443,7 @@ class CreateTaskAccTest extends AbstractAccTest {
.isEqualTo(readTask.getDue()); .isEqualTo(readTask.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testThrowsExceptionIfAttachmentIsInvalid() throws ClassificationNotFoundException { void testThrowsExceptionIfAttachmentIsInvalid() throws ClassificationNotFoundException {
@ -498,7 +498,7 @@ class CreateTaskAccTest extends AbstractAccTest {
createSimpleCustomProperties(3))); createSimpleCustomProperties(3)));
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testUseCustomNameIfSetForNewTask() void testUseCustomNameIfSetForNewTask()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -516,7 +516,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(createdTask.getName()).isEqualTo("Test Name"); assertThat(createdTask.getName()).isEqualTo("Test Name");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testUseClassificationMetadataFromCorrectDomainForNewTask() void testUseClassificationMetadataFromCorrectDomainForNewTask()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -534,7 +534,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(createdTask.getPriority()).isEqualTo(2); assertThat(createdTask.getPriority()).isEqualTo(2);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetExceptionIfWorkbasketDoesNotExist() { void testGetExceptionIfWorkbasketDoesNotExist() {
@ -547,7 +547,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class); assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetExceptionIfAppendIsNotPermitted() { void testGetExceptionIfAppendIsNotPermitted() {
@ -560,7 +560,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testThrowsExceptionIfMandatoryPrimaryObjectReferenceIsNotSetOrIncomplete() { void testThrowsExceptionIfMandatoryPrimaryObjectReferenceIsNotSetOrIncomplete() {
@ -586,7 +586,7 @@ class CreateTaskAccTest extends AbstractAccTest {
testCreateTask.accept(createObjectReference(null, "SYSTEM_A", "INSTANCE_A", "VNR", "1234567")); testCreateTask.accept(createObjectReference(null, "SYSTEM_A", "INSTANCE_A", "VNR", "1234567"));
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testSetDomainFromWorkbasket() void testSetDomainFromWorkbasket()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -608,7 +608,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(createdTask.getDomain()).isEqualTo(workbasket.getDomain()); assertThat(createdTask.getDomain()).isEqualTo(workbasket.getDomain());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreatedTaskObjectEqualsReadTaskObject() void testCreatedTaskObjectEqualsReadTaskObject()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -642,7 +642,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThat(readTask).isEqualTo(createdTask); assertThat(readTask).isEqualTo(createdTask);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateSimpleTaskWithCallbackInfo() void testCreateSimpleTaskWithCallbackInfo()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -689,7 +689,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateTaskAlreadyExisting() throws NotAuthorizedException, TaskNotFoundException { void testCreateTaskAlreadyExisting() throws NotAuthorizedException, TaskNotFoundException {
@ -699,7 +699,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class); assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testCreateTaskNotAuthorizedOnWorkbasket() { void testCreateTaskNotAuthorizedOnWorkbasket() {
@ -709,7 +709,7 @@ class CreateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCreateTaskWithWorkbasketMarkedForDeletion() void testCreateTaskWithWorkbasketMarkedForDeletion()
throws NotAuthorizedException, InvalidStateException, TaskNotFoundException, throws NotAuthorizedException, InvalidStateException, TaskNotFoundException,

View File

@ -23,7 +23,7 @@ public class CreateTaskCommentAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_CreateTaskComment_For_TaskComment() void should_CreateTaskComment_For_TaskComment()
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException { throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
@ -46,7 +46,7 @@ public class CreateTaskCommentAccTest extends AbstractAccTest {
assertThat(taskCommentsAfterInsert).hasSize(3); assertThat(taskCommentsAfterInsert).hasSize(3);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToCreateTaskComment_When_TaskIdIsNullOrNonExisting() { void should_FailToCreateTaskComment_When_TaskIdIsNullOrNonExisting() {

View File

@ -31,7 +31,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testDeleteSingleTaskNotAuthorized() { void testDeleteSingleTaskNotAuthorized() {
@ -67,7 +67,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-2", user = "user-1-2",
groups = {"group_1", "admin"}) groups = {"group-1", "admin"})
@Test @Test
void testDeleteSingleTask() void testDeleteSingleTask()
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException { throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {
@ -101,7 +101,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-2", user = "user-1-2",
groups = {"group_1", "admin"}) groups = {"group-1", "admin"})
@Test @Test
void testThrowsExceptionIfTaskIsNotCompleted() void testThrowsExceptionIfTaskIsNotCompleted()
throws TaskNotFoundException, NotAuthorizedException { throws TaskNotFoundException, NotAuthorizedException {
@ -117,7 +117,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-2", user = "user-1-2",
groups = {"group_1", "admin"}) groups = {"group-1", "admin"})
@Test @Test
void testForceDeleteTaskIfNotCompleted() void testForceDeleteTaskIfNotCompleted()
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException { throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {

View File

@ -27,7 +27,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_DeleteTaskComment_For_TaskCommentId() void should_DeleteTaskComment_For_TaskCommentId()
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException, throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
@ -47,7 +47,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
assertThat(taskCommentsAfterDeletion).hasSize(1); assertThat(taskCommentsAfterDeletion).hasSize(1);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_FailToDeleteTaskComment_When_UserHasNoAuthorization() void should_FailToDeleteTaskComment_When_UserHasNoAuthorization()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -92,7 +92,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
assertThat(taskCommentsAfterDeletion).hasSize(1); assertThat(taskCommentsAfterDeletion).hasSize(1);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToDeleteTaskComment_When_TaskCommentIdIsInvalid() void should_FailToDeleteTaskComment_When_TaskCommentIdIsInvalid()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -115,7 +115,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
assertThat(taskCommentsAfterDeletion).hasSize(3); assertThat(taskCommentsAfterDeletion).hasSize(3);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToDeleteTaskComment_When_TaskCommentIsNotExisting() void should_FailToDeleteTaskComment_When_TaskCommentIsNotExisting()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {

View File

@ -27,7 +27,7 @@ class GetTaskAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ReturnTask_When_RequestingTaskByTaskId() void should_ReturnTask_When_RequestingTaskByTaskId()
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException { throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
@ -80,7 +80,7 @@ class GetTaskAccTest extends AbstractAccTest {
assertThat(task.getCustomAttribute("16")).isEqualTo("custom16"); assertThat(task.getCustomAttribute("16")).isEqualTo("custom16");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_RequestedTaskByIdIsNotExisting() { void should_ThrowException_When_RequestedTaskByIdIsNotExisting() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -25,7 +25,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ReturnTaskComments_For_TaskId() throws NotAuthorizedException, TaskNotFoundException { void should_ReturnTaskComments_For_TaskId() throws NotAuthorizedException, TaskNotFoundException {
@ -37,7 +37,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
assertThat(taskComments).hasSize(3); assertThat(taskComments).hasSize(3);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ReturnEmptyList_When_TaskCommentsDontExist() void should_ReturnEmptyList_When_TaskCommentsDontExist()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -47,7 +47,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
assertThat(taskService.getTaskComments("TKI:000000000000000000000000000000000036")).isEmpty(); assertThat(taskService.getTaskComments("TKI:000000000000000000000000000000000036")).isEmpty();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToReturnTaskComments_When_TaskIstNotVisible() { void should_FailToReturnTaskComments_When_TaskIstNotVisible() {
@ -60,7 +60,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
assertThatThrownBy(httpCall).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(httpCall).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ReturnTaskComment_For_TaskCommentId() void should_ReturnTaskComment_For_TaskCommentId()
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException, throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
@ -73,7 +73,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
assertThat(taskComment.getCreator()).isEqualTo("user-1-1"); assertThat(taskComment.getCreator()).isEqualTo("user-1-1");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToReturnTaskComment_When_TaskCommentIsNotExisting() { void should_FailToReturnTaskComment_When_TaskCommentIsNotExisting() {
@ -84,7 +84,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
assertThatThrownBy(lambda).isInstanceOf(TaskCommentNotFoundException.class); assertThatThrownBy(lambda).isInstanceOf(TaskCommentNotFoundException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToReturntaskComment_When_TaskIstNotVisible() { void should_FailToReturntaskComment_When_TaskIstNotVisible() {

View File

@ -58,7 +58,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(columnValueList).hasSize(5); assertThat(columnValueList).hasSize(5);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryByClassificationNameIn() { void testQueryByClassificationNameIn() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -79,7 +79,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(tasks).hasSize(1); assertThat(tasks).hasSize(1);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryByClassificationNameLike() { void testQueryByClassificationNameLike() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -96,7 +96,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(tasks).hasSize(32); assertThat(tasks).hasSize(32);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testSelectByAttachmentClassificationNameLike() { void testSelectByAttachmentClassificationNameLike() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -117,7 +117,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(tasks).hasSize(7); assertThat(tasks).hasSize(7);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testSelectByAttachmentClassificationNameIn() { void testSelectByAttachmentClassificationNameIn() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -138,7 +138,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(tasks).hasSize(4); assertThat(tasks).hasSize(4);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryAndCountMatchForClassificationName() { void testQueryAndCountMatchForClassificationName() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -150,7 +150,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
assertThat(tasks).hasSize((int) numberOfTasks); assertThat(tasks).hasSize((int) numberOfTasks);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryAndCountForAttachmentClassificationName() { void testQueryAndCountForAttachmentClassificationName() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -34,7 +34,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetAttachmentSummariesFromTask() { void testGetAttachmentSummariesFromTask() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -58,7 +58,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
assertThat(attachmentSummaries).isEmpty(); assertThat(attachmentSummaries).isEmpty();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testIfNewTaskHasEmptyAttachmentList() { void testIfNewTaskHasEmptyAttachmentList() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -67,7 +67,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
assertThat(task.asSummary().getAttachmentSummaries()).isNotNull(); assertThat(task.asSummary().getAttachmentSummaries()).isNotNull();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ConfirmIfAttachmentSummariesAreCorrect_When_UsingTaskQueryAndGetTaskById() void should_ConfirmIfAttachmentSummariesAreCorrect_When_UsingTaskQueryAndGetTaskById()
throws TaskNotFoundException, NotAuthorizedException { throws TaskNotFoundException, NotAuthorizedException {
@ -92,7 +92,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
toArray(originalAttachments)); // but not same reference toArray(originalAttachments)); // but not same reference
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ConfirmIfAttachmentSummariesAreCorrect() void should_ConfirmIfAttachmentSummariesAreCorrect()
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException { throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {

View File

@ -150,7 +150,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForOwnerLike() { void testQueryForOwnerLike() {
@ -169,7 +169,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForParentBusinessProcessId() { void testQueryForParentBusinessProcessId() {
@ -190,7 +190,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForName() { void testQueryForName() {
@ -205,7 +205,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForClassificationKey() { void testQueryForClassificationKey() {
@ -227,7 +227,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThat(result4).hasSize(7); assertThat(result4).hasSize(7);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForAttachmentInSummary() void testQueryForAttachmentInSummary()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -284,7 +284,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThat(countAllExternalIds).isEqualTo(countAllIds); assertThat(countAllExternalIds).isEqualTo(countAllIds);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@TestFactory @TestFactory
Stream<DynamicTest> testQueryForCustomX() { Stream<DynamicTest> testQueryForCustomX() {
List<Triplet<String, String[], Integer>> list = List<Triplet<String, String[], Integer>> list =
@ -326,7 +326,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThat(result2).hasSize(expectedResult); assertThat(result2).hasSize(expectedResult);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForCustom7WithExceptionInLike() { void testQueryForCustom7WithExceptionInLike() {
@ -338,7 +338,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class); assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForCustom7WithExceptionInIn() throws InvalidArgumentException { void testQueryForCustom7WithExceptionInIn() throws InvalidArgumentException {
@ -358,7 +358,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class); assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForCustom7WithException() throws InvalidArgumentException { void testQueryForCustom7WithException() throws InvalidArgumentException {
@ -372,7 +372,7 @@ class QueryTasksAccTest extends AbstractAccTest {
assertThat(result2).hasSize(2); assertThat(result2).hasSize(2);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryTaskByCustomAttributes() void testQueryTaskByCustomAttributes()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -418,7 +418,7 @@ class QueryTasksAccTest extends AbstractAccTest {
} }
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryAndCountMatch() { void testQueryAndCountMatch() {
TaskQuery taskQuery = taskService.createTaskQuery(); TaskQuery taskQuery = taskService.createTaskQuery();
@ -838,7 +838,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForExternalIdIn() { void testQueryForExternalIdIn() {
@ -867,7 +867,7 @@ class QueryTasksAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryForExternalIdLike() { void testQueryForExternalIdLike() {

View File

@ -23,7 +23,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryTasksByExcactValueOfObjectReference() throws SystemException { void testQueryTasksByExcactValueOfObjectReference() throws SystemException {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -34,7 +34,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryTasksByExcactValueAndTypeOfObjectReference() throws SystemException { void testQueryTasksByExcactValueAndTypeOfObjectReference() throws SystemException {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -49,7 +49,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryTasksByValueLikeOfObjectReference() throws SystemException { void testQueryTasksByValueLikeOfObjectReference() throws SystemException {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -27,7 +27,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testCreatedWithin2Intervals() { void testCreatedWithin2Intervals() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -59,7 +59,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testCreatedBefore() { void testCreatedBefore() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -84,7 +84,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testCreatedAfter() { void testCreatedAfter() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -109,7 +109,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testClaimedWithin2Intervals() { void testClaimedWithin2Intervals() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -141,7 +141,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testCompletedWithin() { void testCompletedWithin() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -166,7 +166,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testModifiedWithin() { void testModifiedWithin() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -191,7 +191,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testPlannedWithin() { void testPlannedWithin() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -216,7 +216,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testDueWithin() { void testDueWithin() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -21,7 +21,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void should_ReturnAllTasksByWildcardSearch_For_ProvidedSearchValue() { void should_ReturnAllTasksByWildcardSearch_For_ProvidedSearchValue() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -43,7 +43,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void should_ReturnAllTasks_For_ProvidedSearchValueAndAdditionalParameters() { void should_ReturnAllTasks_For_ProvidedSearchValueAndAdditionalParameters() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -67,7 +67,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void should_ThrowException_When_NotUsingSearchFieldsAndValueParamsTogether() { void should_ThrowException_When_NotUsingSearchFieldsAndValueParamsTogether() {

View File

@ -26,7 +26,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForWorkbasketKeyDomain() { void testQueryForWorkbasketKeyDomain() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -50,7 +50,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
assertThat(result2).hasSize(52); assertThat(result2).hasSize(52);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testThrowsExceptionIfNoOpenerPermissionOnQueriedWorkbasket() { void testThrowsExceptionIfNoOpenerPermissionOnQueriedWorkbasket() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -65,7 +65,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedToQueryWorkbasketException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedToQueryWorkbasketException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testThrowsExceptionIfNoOpenerPermissionOnAtLeastOneQueriedWorkbasket() { void testThrowsExceptionIfNoOpenerPermissionOnAtLeastOneQueriedWorkbasket() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -21,7 +21,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testGetFirstPageOfTaskQueryWithOffset() { void testGetFirstPageOfTaskQueryWithOffset() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -33,7 +33,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(10); assertThat(results).hasSize(10);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testSecondPageOfTaskQueryWithOffset() { void testSecondPageOfTaskQueryWithOffset() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -45,7 +45,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(10); assertThat(results).hasSize(10);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testListOffsetAndLimitOutOfBounds() { void testListOffsetAndLimitOutOfBounds() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -75,7 +75,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(3); assertThat(results).hasSize(3);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testPaginationWithPages() { void testPaginationWithPages() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -121,7 +121,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(2); assertThat(results).hasSize(2);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testPaginationNullAndNegativeLimitsIgnoring() { void testPaginationNullAndNegativeLimitsIgnoring() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -157,7 +157,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(10); assertThat(results).hasSize(10);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testCountOfTaskQuery() { void testCountOfTaskQuery() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -169,7 +169,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
assertThat(count).isEqualTo(22L); assertThat(count).isEqualTo(22L);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testCountOfTaskQueryWithAttachmentChannelFilter() { void testCountOfTaskQueryWithAttachmentChannelFilter() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -31,7 +31,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByModifiedAndDomain() { void testSortByModifiedAndDomain() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -55,7 +55,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByTaskIdDesc() { void testSortByTaskIdDesc() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -82,7 +82,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByTaskIdAsc() { void testSortByTaskIdAsc() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -106,7 +106,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByDomainNameAndCreated() { void testSortByDomainNameAndCreated() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -128,7 +128,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByPorSystemNoteDueAndOwner() { void testSortByPorSystemNoteDueAndOwner() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -160,7 +160,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByPorSystemInstanceParentProcPlannedAndState() { void testSortByPorSystemInstanceParentProcPlannedAndState() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -192,7 +192,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByPorCompanyAndClaimed() { void testSortByPorCompanyAndClaimed() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -225,7 +225,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortByWbKeyPrioPorValueAndCompleted() { void testSortByWbKeyPrioPorValueAndCompleted() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -258,7 +258,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testSortBpIdClassificationIdDescriptionAndPorType() { void testSortBpIdClassificationIdDescriptionAndPorType() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();

View File

@ -26,7 +26,7 @@ import pro.taskana.task.api.models.TaskSummary;
public class ServiceLevelOfAllTasksAccTest extends AbstractAccTest { public class ServiceLevelOfAllTasksAccTest extends AbstractAccTest {
TaskService taskService; TaskService taskService;
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void testSetPlannedPropertyOnAllTasks() throws SQLException { void testSetPlannedPropertyOnAllTasks() throws SQLException {
taskService = taskanaEngine.getTaskService(); taskService = taskanaEngine.getTaskService();

View File

@ -55,7 +55,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
/* CREATE TASK */ /* CREATE TASK */
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_CalculatePlannedDateAtCreate() void should_CalculatePlannedDateAtCreate()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -90,7 +90,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(expectedPlanned).isEqualTo(readTask.getPlanned()); assertThat(expectedPlanned).isEqualTo(readTask.getPlanned());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_calculateDueDateAtCreate() void should_calculateDueDateAtCreate()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -122,7 +122,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(expectedDue).isEqualTo(readTask.getDue()); assertThat(expectedDue).isEqualTo(readTask.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_NotThrowException_When_DueAndPlannedAreConsistent() void should_NotThrowException_When_DueAndPlannedAreConsistent()
throws ClassificationNotFoundException { throws ClassificationNotFoundException {
@ -150,7 +150,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThatCode(call).doesNotThrowAnyException(); assertThatCode(call).doesNotThrowAnyException();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_DueAndPlannedAreInconsistent() { void should_ThrowException_When_DueAndPlannedAreInconsistent() {
@ -170,7 +170,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class); assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_VerifyThatCreateAndPlannedAreClose() throws Exception { void should_VerifyThatCreateAndPlannedAreClose() throws Exception {
@ -195,7 +195,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
/* UPDATE TASK */ /* UPDATE TASK */
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_DueAndPlannedAreChangedInconsistently() throws Exception { void should_ThrowException_When_DueAndPlannedAreChangedInconsistently() throws Exception {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -209,7 +209,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
+ "date 2020-07-02T00:00:00Z not matching the service level PT24H."); + "date 2020-07-02T00:00:00Z not matching the service level PT24H.");
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void should_SetPlanned_When_SetPlannedRequestContainsDuplicateTaskIds() void should_SetPlanned_When_SetPlannedRequestContainsDuplicateTaskIds()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -246,7 +246,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(due4).isEqualTo(dueExpected); assertThat(due4).isEqualTo(dueExpected);
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void should_SetPlanned_When_RequestContainsDuplicatesAndNotExistingTaskIds() void should_SetPlanned_When_RequestContainsDuplicatesAndNotExistingTaskIds()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -273,7 +273,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(due5).isEqualTo(dueExpected); assertThat(due5).isEqualTo(dueExpected);
} }
@WithAccessId(user = "user-1-1", groups = "group_2") @WithAccessId(user = "user-1-1", groups = "group-2")
@Test @Test
void should_SetPlanned_When_RequestContainsTasksWithAttachments() void should_SetPlanned_When_RequestContainsTasksWithAttachments()
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException, throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
@ -352,7 +352,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
// |TAI:000000000000000000000000000000000014 | CLI:100000000000000000000000000000000004,| P14D | // |TAI:000000000000000000000000000000000014 | CLI:100000000000000000000000000000000004,| P14D |
// +-----------------------------------------+------------------------------------------+------+ // +-----------------------------------------+------------------------------------------+------+
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void should_ReturnBulkLog_When_UserIsNotAuthorizedForTasks() { void should_ReturnBulkLog_When_UserIsNotAuthorizedForTasks() {
String tkId1 = "TKI:000000000000000000000000000000000008"; String tkId1 = "TKI:000000000000000000000000000000000008";
@ -373,7 +373,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
.hasOnlyElementsOfType(NotAuthorizedException.class); .hasOnlyElementsOfType(NotAuthorizedException.class);
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetPlannedPropertyOfTasks_When_RequestedByAdminUser() void should_SetPlannedPropertyOfTasks_When_RequestedByAdminUser()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -398,7 +398,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(dueBulk4).isEqualTo(getInstant("2020-05-22T07:00:00")); assertThat(dueBulk4).isEqualTo(getInstant("2020-05-22T07:00:00"));
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_DoNothing_When_SetPlannedIsCalledWithEmptyTasksList() { void should_DoNothing_When_SetPlannedIsCalledWithEmptyTasksList() {
Instant planned = getInstant("2020-05-03T07:00:00"); Instant planned = getInstant("2020-05-03T07:00:00");
@ -416,7 +416,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
// |TAI:000000000000000000000000000000000007 | CLI:100000000000000000000000000000000008 | P1D | // |TAI:000000000000000000000000000000000007 | CLI:100000000000000000000000000000000008 | P1D |
// |TKI:000000000000000000000000000000000066 | CLI:100000000000000000000000000000000024 | P0D | // |TKI:000000000000000000000000000000000066 | CLI:100000000000000000000000000000000024 | P0D |
// +-----------------------------------------+------------------------------------------+------+ // +-----------------------------------------+------------------------------------------+------+
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetPlannedPropertyWithBulkUpdate_When_RequestContainsASingleTask() void should_SetPlannedPropertyWithBulkUpdate_When_RequestContainsASingleTask()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -432,7 +432,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getDue()).isEqualTo(planned.plus(Duration.ofDays(days))); assertThat(task.getDue()).isEqualTo(planned.plus(Duration.ofDays(days)));
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetPlannedPropertyOnSingle_When_UpdateTaskWasCalled() void should_SetPlannedPropertyOnSingle_When_UpdateTaskWasCalled()
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException, throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
@ -448,7 +448,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getDue()).isEqualTo(task.getPlanned().plus(Duration.ofDays(days))); assertThat(task.getDue()).isEqualTo(task.getPlanned().plus(Duration.ofDays(days)));
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetPlanned_When_OnlyDueWasChanged() void should_SetPlanned_When_OnlyDueWasChanged()
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException, throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
@ -464,7 +464,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getPlanned()).isEqualTo(getInstant("2020-05-08T07:00:00")); // Friday assertThat(task.getPlanned()).isEqualTo(getInstant("2020-05-08T07:00:00")); // Friday
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetDue_When_OnlyPlannedWasChanged() void should_SetDue_When_OnlyPlannedWasChanged()
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException, throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
@ -482,7 +482,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days))); assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetPlanned_When_DueIsChangedAndPlannedIsNulled() void should_SetPlanned_When_DueIsChangedAndPlannedIsNulled()
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException, throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
@ -499,7 +499,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days))); assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void should_SetDue_When_TaskUpdateIsCalled() void should_SetDue_When_TaskUpdateIsCalled()
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException, throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
@ -533,7 +533,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getDue()).isEqualTo(getInstant("2020-05-15T07:00:00")); assertThat(task.getDue()).isEqualTo(getInstant("2020-05-15T07:00:00"));
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreWeekendDays() void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreWeekendDays()
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException, throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
@ -564,7 +564,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
assertThat(task.getDue()).isEqualTo(getInstant("2020-03-20T07:00:00")); // friday assertThat(task.getDue()).isEqualTo(getInstant("2020-03-20T07:00:00")); // friday
} }
@WithAccessId(user = "user-1-4", groups = "group_1") @WithAccessId(user = "user-1-4", groups = "group-1")
@Test @Test
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreOnWeekends_ServiceLevel_P0D() void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreOnWeekends_ServiceLevel_P0D()
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException, throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
@ -637,7 +637,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
+ "due date 2020-03-23T07:00:00Z not matching the service level PT0S."); + "due date 2020-03-23T07:00:00Z not matching the service level PT0S.");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_notThrowServiceLevelViolation_IfWeekendOrHolidaysBetweenDates() void should_notThrowServiceLevelViolation_IfWeekendOrHolidaysBetweenDates()
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException, throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,

View File

@ -37,7 +37,7 @@ import pro.taskana.task.api.models.TaskSummary;
@ExtendWith(JaasExtension.class) @ExtendWith(JaasExtension.class)
public class SetOwnerAccTest extends AbstractAccTest { public class SetOwnerAccTest extends AbstractAccTest {
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testSetOwnerAndSubsequentClaimSucceeds() void testSetOwnerAndSubsequentClaimSucceeds()
throws TaskNotFoundException, NotAuthorizedException, InvalidStateException, throws TaskNotFoundException, NotAuthorizedException, InvalidStateException,
@ -59,7 +59,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
assertThat(taskClaimed.getOwner()).isEqualTo("user-1-2"); assertThat(taskClaimed.getOwner()).isEqualTo("user-1-2");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testSetOwnerViaUpdateTaskNotAuthorized() { void testSetOwnerViaUpdateTaskNotAuthorized() {
@ -73,7 +73,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
.isInstanceOf(NotAuthorizedException.class); .isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testSetOwnerOfClaimedTaskFails() throws TaskNotFoundException, NotAuthorizedException { void testSetOwnerOfClaimedTaskFails() throws TaskNotFoundException, NotAuthorizedException {
@ -87,7 +87,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
.isInstanceOf(InvalidStateException.class); .isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testSetOwnerNotAuthorized() { void testSetOwnerNotAuthorized() {
@ -103,7 +103,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
assertThat(results.getErrorForId(taskReadyId)).isInstanceOf(NotAuthorizedException.class); assertThat(results.getErrorForId(taskReadyId)).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void testSetOwnerOfTasksWithDuplicatesSucceeds() { void testSetOwnerOfTasksWithDuplicatesSucceeds() {
@ -118,7 +118,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
assertThat(results.containsErrors()).isFalse(); assertThat(results.containsErrors()).isFalse();
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void testSetOwnerOfTasksWithDuplicatesAndNotExistingSucceeds() { void testSetOwnerOfTasksWithDuplicatesAndNotExistingSucceeds() {
List<String> taskIds = List<String> taskIds =
@ -136,7 +136,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
.isInstanceOf(TaskNotFoundException.class); .isInstanceOf(TaskNotFoundException.class);
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void testSetOwnerOfTasksWithNoQualifyingTasks() { void testSetOwnerOfTasksWithNoQualifyingTasks() {
@ -152,7 +152,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
assertThat(results.getErrorMap()).hasSize(3); assertThat(results.getErrorMap()).hasSize(3);
} }
@WithAccessId(user = "user-3-2", groups = "group_2") @WithAccessId(user = "user-3-2", groups = "group-2")
@Test @Test
void testSetOwnerWithEmptyList() { void testSetOwnerWithEmptyList() {
List<String> taskIds = new ArrayList<>(); List<String> taskIds = new ArrayList<>();
@ -161,7 +161,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
assertThat(results.containsErrors()).isFalse(); assertThat(results.containsErrors()).isFalse();
} }
@WithAccessId(user = "user-1-2", groups = "group_2") @WithAccessId(user = "user-1-2", groups = "group-2")
@Test @Test
void testSetOwnerWithAllTasksAndVariousExceptions() void testSetOwnerWithAllTasksAndVariousExceptions()
throws NoSuchFieldException, IllegalAccessException, SQLException { throws NoSuchFieldException, IllegalAccessException, SQLException {
@ -190,7 +190,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
.areExactly(23, notAuthorizedException); .areExactly(23, notAuthorizedException);
} }
@WithAccessId(user = "admin", groups = "group_2") @WithAccessId(user = "admin", groups = "group-2")
@Test @Test
void testSetOwnerWithAllTasksAndVariousExceptionsAsAdmin() throws SQLException { void testSetOwnerWithAllTasksAndVariousExceptionsAsAdmin() throws SQLException {
resetDb(false); resetDb(false);

View File

@ -36,7 +36,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
taskService = taskanaEngine.getTaskService(); taskService = taskanaEngine.getTaskService();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ReturnAllTerminatedTasks_When_QueryTerminatedState() { void should_ReturnAllTerminatedTasks_When_QueryTerminatedState() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -44,7 +44,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
assertThat(taskSummaries).hasSize(5); assertThat(taskSummaries).hasSize(5);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@WithAccessId(user = "taskadmin") @WithAccessId(user = "taskadmin")
@TestTemplate @TestTemplate
void should_TerminateTask_When_TaskStateIsReady() void should_TerminateTask_When_TaskStateIsReady()
@ -58,7 +58,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
assertThat(numTasks).isEqualTo(6); assertThat(numTasks).isEqualTo(6);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@WithAccessId(user = "taskadmin") @WithAccessId(user = "taskadmin")
@TestTemplate @TestTemplate
void should_TerminateTask_When_TaskStateIsClaimed() void should_TerminateTask_When_TaskStateIsClaimed()
@ -77,7 +77,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
assertThat(numTasksTerminated).isEqualTo(6); assertThat(numTasksTerminated).isEqualTo(6);
} }
@WithAccessId(user = "taskadmin", groups = "group_1") @WithAccessId(user = "taskadmin", groups = "group-1")
@Test @Test
void should_ThrowException_When_TerminateTaskWithTaskStateCompleted() { void should_ThrowException_When_TerminateTaskWithTaskStateCompleted() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -98,7 +98,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(taskanaCall).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(taskanaCall).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "taskadmin", groups = "group_1") @WithAccessId(user = "taskadmin", groups = "group-1")
@Test @Test
void should_ThrowException_When_TerminateTaskWithTaskStateTerminated() { void should_ThrowException_When_TerminateTaskWithTaskStateTerminated() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =
@ -109,7 +109,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class); assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "taskadmin", groups = "group_1") @WithAccessId(user = "taskadmin", groups = "group-1")
@Test @Test
void should_ThrowException_When_TerminateTaskWithTaskStateCancelled() { void should_ThrowException_When_TerminateTaskWithTaskStateCancelled() {
List<TaskSummary> taskSummaries = List<TaskSummary> taskSummaries =

View File

@ -38,7 +38,7 @@ class TransferTaskAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_TransferTaskToWorkbasket_When_WorkbasketIdIsProvided() void should_TransferTaskToWorkbasket_When_WorkbasketIdIsProvided()
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException, throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
@ -77,7 +77,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY); assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_TransferTaskToWorkbasket_When_WorkbasketKeyAndDomainIsProvided() void should_TransferTaskToWorkbasket_When_WorkbasketKeyAndDomainIsProvided()
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException, throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
@ -96,7 +96,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY); assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ChangeDomain_When_TransferingTaskToWorkbasketWithDifferentDomain() void should_ChangeDomain_When_TransferingTaskToWorkbasketWithDifferentDomain()
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException, throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
@ -111,7 +111,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThat(transferedTask.getDomain()).isNotEqualTo(domain1); assertThat(transferedTask.getDomain()).isNotEqualTo(domain1);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_UserHasNoTransferAuthorization() void should_ThrowException_When_UserHasNoTransferAuthorization()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -125,7 +125,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_DestinationWorkbasketDoesNotExist() void should_ThrowException_When_DestinationWorkbasketDoesNotExist()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -142,7 +142,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class); assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TaskToTransferDoesNotExist() { void should_ThrowException_When_TaskToTransferDoesNotExist() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -174,7 +174,7 @@ class TransferTaskAccTest extends AbstractAccTest {
+ "'WBI:100000000000000000000000000000000005' is needed."); + "'WBI:100000000000000000000000000000000005' is needed.");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TransferWithNoAppendAuthorization() void should_ThrowException_When_TransferWithNoAppendAuthorization()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -194,7 +194,7 @@ class TransferTaskAccTest extends AbstractAccTest {
+ "'WBI:100000000000000000000000000000000008' is needed."); + "'WBI:100000000000000000000000000000000008' is needed.");
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TaskToTransferIsAlreadyCompleted() void should_ThrowException_When_TaskToTransferIsAlreadyCompleted()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -208,7 +208,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class); assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_BulkTransferTasks_When_WorkbasketIdIsProvided() void should_BulkTransferTasks_When_WorkbasketIdIsProvided()
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException, throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
@ -245,7 +245,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThat(transferredTask.getOwner()).isNull(); assertThat(transferredTask.getOwner()).isNull();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_BulkTransferOnlyValidTasks_When_SomeTasksToTransferCauseExceptions() void should_BulkTransferOnlyValidTasks_When_SomeTasksToTransferCauseExceptions()
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException, throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
@ -322,7 +322,7 @@ class TransferTaskAccTest extends AbstractAccTest {
.hasMessageContaining("APPEND"); .hasMessageContaining("APPEND");
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_TransferTasks_When_TransferTasksWithListNotSupportingRemove() { void should_TransferTasks_When_TransferTasksWithListNotSupportingRemove() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -336,7 +336,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThatCode(call).doesNotThrowAnyException(); assertThatCode(call).doesNotThrowAnyException();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TransferTasksWithInvalidTasksIdList() { void should_ThrowException_When_TransferTasksWithInvalidTasksIdList() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -361,7 +361,7 @@ class TransferTaskAccTest extends AbstractAccTest {
.hasMessage("TaskIds must not contain only invalid arguments."); .hasMessage("TaskIds must not contain only invalid arguments.");
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TransferEmptyTaskIdList() { void should_ThrowException_When_TransferEmptyTaskIdList() {
TaskService taskService = taskanaEngine.getTaskService(); TaskService taskService = taskanaEngine.getTaskService();
@ -373,7 +373,7 @@ class TransferTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class); assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_BulkTransferTasks_When_WorkbasketKeyAndDomainIsProvided() void should_BulkTransferTasks_When_WorkbasketKeyAndDomainIsProvided()
throws WorkbasketNotFoundException, NotAuthorizedException, InvalidArgumentException, throws WorkbasketNotFoundException, NotAuthorizedException, InvalidArgumentException,

View File

@ -39,7 +39,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
private final TaskService taskService = taskanaEngine.getTaskService(); private final TaskService taskService = taskanaEngine.getTaskService();
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdatePrimaryObjectReferenceOfTask_When_Requested() void should_UpdatePrimaryObjectReferenceOfTask_When_Requested()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -67,7 +67,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID"); assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdatePrimaryObjectReferenceOfTask_When_ObjectreferenceSystemAndSystemInstanceIsNull() void should_UpdatePrimaryObjectReferenceOfTask_When_ObjectreferenceSystemAndSystemInstanceIsNull()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -96,7 +96,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID"); assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_MandatoryPrimaryObjectReferenceIsNotSetOrIncomplete() void should_ThrowException_When_MandatoryPrimaryObjectReferenceIsNotSetOrIncomplete()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -124,7 +124,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
.isInstanceOf(InvalidArgumentException.class); .isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_TaskHasAlreadyBeenUpdated() void should_ThrowException_When_TaskHasAlreadyBeenUpdated()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -156,7 +156,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThatCode(updateTaskCall).doesNotThrowAnyException(); assertThatCode(updateTaskCall).doesNotThrowAnyException();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdateTaskProperties_When_ClassificationOfTaskIsChanged() throws Exception { void should_UpdateTaskProperties_When_ClassificationOfTaskIsChanged() throws Exception {
Task task = taskService.getTask("TKI:000000000000000000000000000000000000"); Task task = taskService.getTask("TKI:000000000000000000000000000000000000");
@ -174,7 +174,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThat(task.getDescription()).isEqualTo(updatedTask.getDescription()); assertThat(task.getDescription()).isEqualTo(updatedTask.getDescription());
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_UpdateReadFlagOfTask_When_SetTaskReadIsCalled() void should_UpdateReadFlagOfTask_When_SetTaskReadIsCalled()
throws TaskNotFoundException, NotAuthorizedException { throws TaskNotFoundException, NotAuthorizedException {
@ -195,7 +195,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
.isInstanceOf(TaskNotFoundException.class); .isInstanceOf(TaskNotFoundException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdateTask_When_CustomPropertiesOfTaskWereChanged() void should_UpdateTask_When_CustomPropertiesOfTaskWereChanged()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -209,7 +209,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThat(updatedTask).isNotNull(); assertThat(updatedTask).isNotNull();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_ThrowException_When_ModificationOfWorkbasketKeyIsAttempted() void should_ThrowException_When_ModificationOfWorkbasketKeyIsAttempted()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -221,7 +221,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
.isInstanceOf(InvalidArgumentException.class); .isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdateNoTasks_When_UpdateTasksWithUnmatchedObjectReferenceWasCalled() void should_UpdateNoTasks_When_UpdateTasksWithUnmatchedObjectReferenceWasCalled()
throws InvalidArgumentException { throws InvalidArgumentException {
@ -241,7 +241,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
assertThat(taskIds).isEmpty(); assertThat(taskIds).isEmpty();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_UpdateTasks_When_MatchingPrimaryObjectReferenceWasChanged() void should_UpdateTasks_When_MatchingPrimaryObjectReferenceWasChanged()
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException { throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
@ -268,7 +268,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
} }
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void should_UpdateTaskCustomAttributes_When_UpdateTasksIsCalled() void should_UpdateTaskCustomAttributes_When_UpdateTasksIsCalled()
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException { throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
@ -295,7 +295,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
} }
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdateCallbackInfo_When_RequestedByApi() void should_UpdateCallbackInfo_When_RequestedByApi()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,

View File

@ -75,7 +75,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task).isNotNull(); assertThat(task).isNotNull();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddNewAttachment() void testAddNewAttachment()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -95,7 +95,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
.containsOnly(task.getModified()); .containsOnly(task.getModified());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddValidAttachmentTwice() void testAddValidAttachmentTwice()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -118,7 +118,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
.containsOnly(task.getModified()); .containsOnly(task.getModified());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddNewAttachmentTwiceWithoutTaskanaMethodWillThrowAttachmentPersistenceException() void testAddNewAttachmentTwiceWithoutTaskanaMethodWillThrowAttachmentPersistenceException()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -138,7 +138,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(AttachmentPersistenceException.class); assertThatThrownBy(call).isInstanceOf(AttachmentPersistenceException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddExistingAttachmentAgainWillUpdateWhenNotEqual() void testAddExistingAttachmentAgainWillUpdateWhenNotEqual()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -174,7 +174,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue()); assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddExistingAttachmentAgainWillDoNothingWhenEqual() void testAddExistingAttachmentAgainWillDoNothingWhenEqual()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -198,7 +198,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getAttachments()).hasSize(attachmentCount2); assertThat(task.getAttachments()).hasSize(attachmentCount2);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddAttachmentAsNullValueWillBeIgnored() void testAddAttachmentAsNullValueWillBeIgnored()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -232,7 +232,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue()); assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testRemoveAttachment() void testRemoveAttachment()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -254,7 +254,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue()); assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testRemoveAttachmentWithNullAndNotAddedId() void testRemoveAttachmentWithNullAndNotAddedId()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -277,7 +277,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getAttachments()).hasSize(attachmentCount); // persisted, still same assertThat(task.getAttachments()).hasSize(attachmentCount); // persisted, still same
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testUpdateAttachment() void testUpdateAttachment()
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException, throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
@ -314,7 +314,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue()); assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void modifyExistingAttachment() void modifyExistingAttachment()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -411,7 +411,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(faxFound && rohrpostFound).isTrue(); assertThat(faxFound && rohrpostFound).isTrue();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void replaceExistingAttachments() void replaceExistingAttachments()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -472,7 +472,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
assertThat(task.getAttachments().get(0).getChannel()).isEqualTo("DHL"); assertThat(task.getAttachments().get(0).getChannel()).isEqualTo("DHL");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testPrioDurationOfTaskFromAttachmentsAtUpdate() void testPrioDurationOfTaskFromAttachmentsAtUpdate()
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException, throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
@ -535,7 +535,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
.isEqualTo(readTask.getDue()); .isEqualTo(readTask.getDue());
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testAddCustomAttributeToAttachment() void testAddCustomAttributeToAttachment()
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,

View File

@ -27,7 +27,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_UpdateTaskComment_For_TaskComment() void should_UpdateTaskComment_For_TaskComment()
throws TaskCommentNotFoundException, NotAuthorizedException, ConcurrencyException, throws TaskCommentNotFoundException, NotAuthorizedException, ConcurrencyException,
@ -51,7 +51,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
assertThat(taskCommentsAfterUpdate.get(0).getTextField()).isEqualTo("updated textfield"); assertThat(taskCommentsAfterUpdate.get(0).getTextField()).isEqualTo("updated textfield");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_FailToUpdateTaskComment_When_UserHasNoAuthorization() void should_FailToUpdateTaskComment_When_UserHasNoAuthorization()
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException, throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
@ -78,7 +78,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
.isEqualTo("some other text in textfield"); .isEqualTo("some other text in textfield");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void should_FailToUpdateTaskComment_When_UserTriesToUpdateTaskByManipulatingOwner() void should_FailToUpdateTaskComment_When_UserTriesToUpdateTaskByManipulatingOwner()
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException, throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
@ -99,7 +99,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
assertThatThrownBy(updateTaskCommentCall).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(updateTaskCommentCall).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void should_FailToUpdateTaskComment_When_TaskCommentWasModifiedConcurrently() void should_FailToUpdateTaskComment_When_TaskCommentWasModifiedConcurrently()
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException, throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,

View File

@ -33,7 +33,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testClaimTask() void testClaimTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -53,7 +53,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(claimedTask.getOwner()).isEqualTo("user-1-2"); assertThat(claimedTask.getOwner()).isEqualTo("user-1-2");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testThrowsExceptionIfTaskIsAlreadyClaimed() void testThrowsExceptionIfTaskIsAlreadyClaimed()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -69,7 +69,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testClaimAlreadyClaimedByCallerTask() void testClaimAlreadyClaimedByCallerTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -80,7 +80,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
taskService.claim(task.getId()); taskService.claim(task.getId());
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testForceClaimTaskWhichIsAlreadyClaimedByAnotherUser() void testForceClaimTaskWhichIsAlreadyClaimedByAnotherUser()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -96,7 +96,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testCancelClaimTask() void testCancelClaimTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -114,7 +114,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(unclaimedTask.getOwner()).isNull(); assertThat(unclaimedTask.getOwner()).isNull();
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testThrowsExceptionIfCancelClaimOfTaskFromAnotherUser() void testThrowsExceptionIfCancelClaimOfTaskFromAnotherUser()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -130,7 +130,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testForceCancelClaimOfTaskFromAnotherUser() void testForceCancelClaimOfTaskFromAnotherUser()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -148,7 +148,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(unclaimedTask.getOwner()).isNull(); assertThat(unclaimedTask.getOwner()).isNull();
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testCompleteTask() void testCompleteTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -170,7 +170,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getOwner()).isEqualTo("user-1-2"); assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testForceCompleteUnclaimedTask() void testForceCompleteUnclaimedTask()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -189,7 +189,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getOwner()).isEqualTo("user-1-2"); assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testThrowsExceptionIfCompletingClaimedTaskOfAnotherUser() void testThrowsExceptionIfCompletingClaimedTaskOfAnotherUser()
throws NotAuthorizedException, TaskNotFoundException { throws NotAuthorizedException, TaskNotFoundException {
@ -205,7 +205,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class); assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testForceCompleteClaimedTaskOfAnotherUser() void testForceCompleteClaimedTaskOfAnotherUser()
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException, throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
@ -224,7 +224,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
assertThat(completedTask.getOwner()).isEqualTo("user-1-2"); assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
} }
@WithAccessId(user = "user-1-2", groups = "group_1") @WithAccessId(user = "user-1-2", groups = "group-1")
@Test @Test
void testBulkCompleteTasks() void testBulkCompleteTasks()
throws NotAuthorizedException, InvalidArgumentException, TaskNotFoundException { throws NotAuthorizedException, InvalidArgumentException, TaskNotFoundException {

View File

@ -22,7 +22,7 @@ import pro.taskana.workbasket.api.exceptions.WorkbasketNotFoundException;
@ExtendWith(JaasExtension.class) @ExtendWith(JaasExtension.class)
class TaskRoutingAccTest extends AbstractAccTest { class TaskRoutingAccTest extends AbstractAccTest {
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCreateTaskWithoutWorkbasketAndVoidNewTaskMethod() void testCreateTaskWithoutWorkbasketAndVoidNewTaskMethod()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -45,7 +45,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
.isEqualTo(createdTask.getWorkbasketSummary().getId()); .isEqualTo(createdTask.getWorkbasketSummary().getId());
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCreateTaskWithNullWorkbasket() void testCreateTaskWithNullWorkbasket()
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException, throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
@ -60,7 +60,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
.isInstanceOf(InvalidArgumentException.class); .isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCreateTaskWithNullRouting() throws InvalidArgumentException { void testCreateTaskWithNullRouting() throws InvalidArgumentException {
@ -74,7 +74,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
.isInstanceOf(InvalidArgumentException.class); .isInstanceOf(InvalidArgumentException.class);
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testCreateTaskWithRoutingToMultipleWorkbaskets() throws InvalidArgumentException { void testCreateTaskWithRoutingToMultipleWorkbaskets() throws InvalidArgumentException {

View File

@ -80,7 +80,7 @@ class CreateWorkbasketAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void should_beAbleToCreateNewWorkbasket_When_WorkbasketCopy() throws Exception { void should_beAbleToCreateNewWorkbasket_When_WorkbasketCopy() throws Exception {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -89,7 +89,7 @@ class DeleteWorkbasketAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-1", user = "user-1-1",
groups = {"teamlead_1", "group_1", "businessadmin"}) groups = {"teamlead_1", "group-1", "businessadmin"})
@Test @Test
void testDeleteWorkbasketAlsoAsDistributionTarget() void testDeleteWorkbasketAlsoAsDistributionTarget()
throws WorkbasketNotFoundException, NotAuthorizedException { throws WorkbasketNotFoundException, NotAuthorizedException {

View File

@ -25,7 +25,7 @@ class DeleteWorkbasketAuthorizationsAccTest extends AbstractAccTest {
ThrowingCallable deleteWorkbasketAccessItemCall = ThrowingCallable deleteWorkbasketAccessItemCall =
() -> { () -> {
workbasketService.deleteWorkbasketAccessItemsForAccessId("group_1"); workbasketService.deleteWorkbasketAccessItemsForAccessId("group-1");
}; };
assertThatThrownBy(deleteWorkbasketAccessItemCall).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(deleteWorkbasketAccessItemCall).isInstanceOf(NotAuthorizedException.class);

View File

@ -78,7 +78,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-1", user = "user-1-1",
groups = {"teamlead-1", "group_1", "group_2", "businessadmin"}) groups = {"teamlead-1", "group-1", "group-2", "businessadmin"})
@Test @Test
void testDistributionTargetCallsWithNonExistingWorkbaskets() void testDistributionTargetCallsWithNonExistingWorkbaskets()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -124,7 +124,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
assertThat(distributionTargets).hasSize(4); assertThat(distributionTargets).hasSize(4);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@WithAccessId(user = "taskadmin") @WithAccessId(user = "taskadmin")
@TestTemplate @TestTemplate
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdminAndMakesDistTargetCalls() { void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdminAndMakesDistTargetCalls() {
@ -169,7 +169,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2", "businessadmin"}) groups = {"group-1", "group-2", "businessadmin"})
@Test @Test
void testAddAndRemoveDistributionTargets() void testAddAndRemoveDistributionTargets()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -224,7 +224,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testAddDistributionTargetsFailsNotAuthorized() void testAddDistributionTargetsFailsNotAuthorized()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -247,7 +247,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2", "businessadmin"}) groups = {"group-1", "group-2", "businessadmin"})
@Test @Test
void testSetDistributionTargets() void testSetDistributionTargets()
throws NotAuthorizedException, WorkbasketNotFoundException, SQLException { throws NotAuthorizedException, WorkbasketNotFoundException, SQLException {
@ -277,7 +277,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testGetDistributionSourcesById() throws NotAuthorizedException, WorkbasketNotFoundException { void testGetDistributionSourcesById() throws NotAuthorizedException, WorkbasketNotFoundException {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -299,7 +299,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testGetDistributionSourcesByKeyDomain() void testGetDistributionSourcesByKeyDomain()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -334,7 +334,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-2-2", user = "user-2-2",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
@Test @Test
void testQueryDistributionSourcesThrowsWorkbasketNotFound() { void testQueryDistributionSourcesThrowsWorkbasketNotFound() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -28,7 +28,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketById() throws NotAuthorizedException, WorkbasketNotFoundException { void testGetWorkbasketById() throws NotAuthorizedException, WorkbasketNotFoundException {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -83,7 +83,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
assertThat(retrievedWorkbasket).isNotNull(); assertThat(retrievedWorkbasket).isNotNull();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketByKeyAndDomain() void testGetWorkbasketByKeyAndDomain()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -106,7 +106,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
assertThat(workbasket.getCustom4()).isEqualTo("custom4"); assertThat(workbasket.getCustom4()).isEqualTo("custom4");
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketPermissions() { void testGetWorkbasketPermissions() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -120,7 +120,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
assertThat(permissions.contains(WorkbasketPermission.APPEND)).isTrue(); assertThat(permissions.contains(WorkbasketPermission.APPEND)).isTrue();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketPermissionsForInvalidWorkbasketId() { void testGetWorkbasketPermissionsForInvalidWorkbasketId() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -130,7 +130,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
assertThat(permissions).isEmpty(); assertThat(permissions).isEmpty();
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketAsSummary() throws NotAuthorizedException, WorkbasketNotFoundException { void testGetWorkbasketAsSummary() throws NotAuthorizedException, WorkbasketNotFoundException {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -196,7 +196,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testGetWorkbasketByIdNotExisting() { void testGetWorkbasketByIdNotExisting() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -36,7 +36,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
workbasketService = taskanaEngine.getWorkbasketService(); workbasketService = taskanaEngine.getWorkbasketService();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1_1") @WithAccessId(user = "teamlead-1", groups = "group-1_1")
@Test @Test
void testQueryAllForUserMultipleTimes() { void testQueryAllForUserMultipleTimes() {
WorkbasketQuery query = workbasketService.createWorkbasketQuery(); WorkbasketQuery query = workbasketService.createWorkbasketQuery();
@ -78,7 +78,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(workbaskets).hasSize(count); assertThat(workbaskets).hasSize(count);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketValuesForColumnName() { void testQueryWorkbasketValuesForColumnName() {
List<String> columnValueList = workbasketService.createWorkbasketQuery().listValues(NAME, null); List<String> columnValueList = workbasketService.createWorkbasketQuery().listValues(NAME, null);
@ -95,7 +95,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(columnValueList).hasSize(4); assertThat(columnValueList).hasSize(4);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByDomain() { void testQueryWorkbasketByDomain() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -103,7 +103,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(1); assertThat(results).hasSize(1);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByDomainAndType() { void testQueryWorkbasketByDomainAndType() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -115,7 +115,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(6); assertThat(results).hasSize(6);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByName() { void testQueryWorkbasketByName() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -127,7 +127,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
.isEqualTo("GPK_KSC"); .isEqualTo("GPK_KSC");
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByNameStartsWith() { void testQueryWorkbasketByNameStartsWith() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -135,7 +135,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(3); assertThat(results).hasSize(3);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByNameContains() { void testQueryWorkbasketByNameContains() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -146,7 +146,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(5); assertThat(results).hasSize(5);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByNameContainsCaseInsensitive() { void testQueryWorkbasketByNameContainsCaseInsensitive() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -154,7 +154,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(2); assertThat(results).hasSize(2);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByDescription() { void testQueryWorkbasketByDescription() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -167,7 +167,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(9); assertThat(results).hasSize(9);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByOwnerLike() { void testQueryWorkbasketByOwnerLike() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -179,7 +179,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(1); assertThat(results).hasSize(1);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByKey() { void testQueryWorkbasketByKey() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -187,7 +187,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(1); assertThat(results).hasSize(1);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByMultipleKeys() { void testQueryWorkbasketByMultipleKeys() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -195,7 +195,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(2); assertThat(results).hasSize(2);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByMultipleKeysWithUnknownKey() { void testQueryWorkbasketByMultipleKeysWithUnknownKey() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -203,7 +203,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(2); assertThat(results).hasSize(2);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByKeyContains() { void testQueryWorkbasketByKeyContains() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -211,7 +211,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(3); assertThat(results).hasSize(3);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByKeyContainsIgnoreCase() { void testQueryWorkbasketByKeyContainsIgnoreCase() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -219,7 +219,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(3); assertThat(results).hasSize(3);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByKeyOrNameContainsIgnoreCase() { void testQueryWorkbasketByKeyOrNameContainsIgnoreCase() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -227,7 +227,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(9); assertThat(results).hasSize(9);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByNameStartsWithSortedByNameAscending() { void testQueryWorkbasketByNameStartsWithSortedByNameAscending() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -279,7 +279,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
.isSortedAccordingTo(CASE_INSENSITIVE_ORDER.reversed()); .isSortedAccordingTo(CASE_INSENSITIVE_ORDER.reversed());
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByCreated() { void testQueryWorkbasketByCreated() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -287,7 +287,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results).hasSize(9); assertThat(results).hasSize(9);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByModified() { void testQueryWorkbasketByModified() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -310,14 +310,14 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
.createWorkbasketQuery() .createWorkbasketQuery()
.nameLike("%") .nameLike("%")
.accessIdsHavePermission( .accessIdsHavePermission(
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2") WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
.orderByName(DESCENDING) .orderByName(DESCENDING)
.list(); .list();
assertThat(results).hasSize(13); assertThat(results).hasSize(13);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryWorkbasketByDomainLike() { void testQueryWorkbasketByDomainLike() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -346,7 +346,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
.containsOnly(toArray(expectedIds)); .containsOnly(toArray(expectedIds));
} }
@WithAccessId(user = "admin", groups = "group_1") @WithAccessId(user = "admin", groups = "group-1")
@Test @Test
void testQueryWorkbasketByOwnerInOrderByDomainDesc() { void testQueryWorkbasketByOwnerInOrderByDomainDesc() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -361,7 +361,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
assertThat(results.get(1).getId()).isEqualTo("WBI:100000000000000000000000000000000001"); assertThat(results.get(1).getId()).isEqualTo("WBI:100000000000000000000000000000000001");
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testQueryForCustom1In() { void testQueryForCustom1In() {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =

View File

@ -59,7 +59,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
List<WorkbasketAccessItem> results = List<WorkbasketAccessItem> results =
workbasketService workbasketService
.createWorkbasketAccessItemQuery() .createWorkbasketAccessItemQuery()
.accessIdIn("user-1-1", "group_1") .accessIdIn("user-1-1", "group-1")
.list(); .list();
assertThat(results).hasSize(8); assertThat(results).hasSize(8);
} }
@ -73,7 +73,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
() -> { () -> {
workbasketService workbasketService
.createWorkbasketAccessItemQuery() .createWorkbasketAccessItemQuery()
.accessIdIn("user-1-1", "group_1") .accessIdIn("user-1-1", "group-1")
.list(); .list();
}; };
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class); assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
@ -86,7 +86,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
WorkbasketAccessItemQuery query = WorkbasketAccessItemQuery query =
workbasketService workbasketService
.createWorkbasketAccessItemQuery() .createWorkbasketAccessItemQuery()
.accessIdIn("user-1-1", "group_1") .accessIdIn("user-1-1", "group-1")
.orderByAccessId(SortDirection.DESCENDING) .orderByAccessId(SortDirection.DESCENDING)
.orderByWorkbasketId(SortDirection.DESCENDING); .orderByWorkbasketId(SortDirection.DESCENDING);
List<WorkbasketAccessItem> results = query.list(); List<WorkbasketAccessItem> results = query.list();
@ -102,7 +102,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
List<WorkbasketAccessItem> results = List<WorkbasketAccessItem> results =
workbasketService workbasketService
.createWorkbasketAccessItemQuery() .createWorkbasketAccessItemQuery()
.accessIdIn("user-1-1", "group_1") .accessIdIn("user-1-1", "group-1")
.workbasketIdIn( .workbasketIdIn(
"WBI:100000000000000000000000000000000006", "WBI:100000000000000000000000000000000006",
"WBI:100000000000000000000000000000000002") "WBI:100000000000000000000000000000000002")

View File

@ -69,7 +69,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
workbasketService workbasketService
.createWorkbasketQuery() .createWorkbasketQuery()
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1") .accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
.list(); .list();
assertThat(results).hasSize(6); assertThat(results).hasSize(6);
} }
@ -82,7 +82,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
workbasketService workbasketService
.createWorkbasketQuery() .createWorkbasketQuery()
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1") .accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
.orderByName(asc) .orderByName(asc)
.list(); .list();
assertThat(results).hasSize(6); assertThat(results).hasSize(6);
@ -97,7 +97,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
workbasketService workbasketService
.createWorkbasketQuery() .createWorkbasketQuery()
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1") .accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
.orderByName(desc) .orderByName(desc)
.orderByKey(asc) .orderByKey(asc)
.list(); .list();
@ -113,7 +113,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
workbasketService workbasketService
.createWorkbasketQuery() .createWorkbasketQuery()
.accessIdsHavePermission(WorkbasketPermission.DISTRIBUTE, "user-1-1", "group_1") .accessIdsHavePermission(WorkbasketPermission.DISTRIBUTE, "user-1-1", "group-1")
.list(); .list();
assertThat(results).hasSize(2); assertThat(results).hasSize(2);
List<String> keys = new ArrayList<>(Arrays.asList("GPK_KSC_1", "USER-1-1")); List<String> keys = new ArrayList<>(Arrays.asList("GPK_KSC_1", "USER-1-1"));
@ -122,7 +122,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
} }
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@Test @Test
void testQueryAllTransferTargetsForUserAndGroupFromSubject() throws SystemException { void testQueryAllTransferTargetsForUserAndGroupFromSubject() throws SystemException {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -20,7 +20,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
super(); super();
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testGetFirstPageOfWorkbasketQueryWithOffset() { void testGetFirstPageOfWorkbasketQueryWithOffset() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -29,7 +29,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(5); assertThat(results).hasSize(5);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testGetSecondPageOfWorkbasketQueryWithOffset() { void testGetSecondPageOfWorkbasketQueryWithOffset() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -38,7 +38,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(4); assertThat(results).hasSize(4);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testListOffsetAndLimitOutOfBounds() { void testListOffsetAndLimitOutOfBounds() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -57,7 +57,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(3); assertThat(results).hasSize(3);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testPaginationWithPages() { void testPaginationWithPages() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -103,7 +103,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(4); assertThat(results).hasSize(4);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testPaginationNullAndNegativeLimitsIgnoring() { void testPaginationNullAndNegativeLimitsIgnoring() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -139,7 +139,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(results).hasSize(9); assertThat(results).hasSize(9);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testCountOfWorkbasketQuery() { void testCountOfWorkbasketQuery() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -147,7 +147,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
assertThat(count).isEqualTo(9L); assertThat(count).isEqualTo(9L);
} }
@WithAccessId(user = "teamlead-1", groups = "group_1") @WithAccessId(user = "teamlead-1", groups = "group-1")
@Test @Test
void testWorkbasketQueryDomA() { void testWorkbasketQueryDomA() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -27,7 +27,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateWorkbasket() void testUpdateWorkbasket()
throws NotAuthorizedException, WorkbasketNotFoundException, ConcurrencyException { throws NotAuthorizedException, WorkbasketNotFoundException, ConcurrencyException {
@ -61,7 +61,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateWorkbasketWithConcurrentModificationShouldThrowException() void testUpdateWorkbasketWithConcurrentModificationShouldThrowException()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -79,7 +79,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateWorkbasketOfNonExistingWorkbasketShouldThrowException() void testUpdateWorkbasketOfNonExistingWorkbasketShouldThrowException()
throws NotAuthorizedException, WorkbasketNotFoundException { throws NotAuthorizedException, WorkbasketNotFoundException {
@ -96,7 +96,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
.isThrownBy(() -> workbasketService.updateWorkbasket(workbasket)); .isThrownBy(() -> workbasketService.updateWorkbasket(workbasket));
} }
@WithAccessId(user = "user-1-1", groups = "group_1") @WithAccessId(user = "user-1-1", groups = "group-1")
@WithAccessId(user = "taskadmin") @WithAccessId(user = "taskadmin")
@TestTemplate @TestTemplate
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdmin() void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdmin()

View File

@ -23,7 +23,7 @@ public class UpdateWorkbasketAuthorizations2AccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdatedAccessItemListToEmptyList() throws Exception { void testUpdatedAccessItemListToEmptyList() throws Exception {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();

View File

@ -60,7 +60,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateWorkbasketAccessItemSucceeds() void testUpdateWorkbasketAccessItemSucceeds()
throws InvalidArgumentException, NotAuthorizedException, WorkbasketNotFoundException, throws InvalidArgumentException, NotAuthorizedException, WorkbasketNotFoundException,
@ -96,7 +96,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdateWorkbasketAccessItemRejected() void testUpdateWorkbasketAccessItemRejected()
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException, throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
@ -145,7 +145,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "user-1-1", user = "user-1-1",
groups = {"group_2", "businessadmin"}) groups = {"group-2", "businessadmin"})
@Test @Test
void testUpdatedAccessItemLeadsToNotAuthorizedException() void testUpdatedAccessItemLeadsToNotAuthorizedException()
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException, throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
@ -155,7 +155,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
String wbKey = "USER-2-1"; String wbKey = "USER-2-1";
String wbDomain = "DOMAIN_A"; String wbDomain = "DOMAIN_A";
final String groupName = "group_2"; final String groupName = "group-2";
Task newTask = taskService.newTask(wbKey, wbDomain); Task newTask = taskService.newTask(wbKey, wbDomain);
newTask.setClassificationKey("T2100"); newTask.setClassificationKey("T2100");
@ -191,7 +191,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testUpdatedAccessItemList() throws Exception { void testUpdatedAccessItemList() throws Exception {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -231,7 +231,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testInsertAccessItemList() throws Exception { void testInsertAccessItemList() throws Exception {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -269,7 +269,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@WithAccessId( @WithAccessId(
user = "teamlead_1", user = "teamlead_1",
groups = {"group_1", "businessadmin"}) groups = {"group-1", "businessadmin"})
@Test @Test
void testDeleteAccessItemForAccessItemId() throws Exception { void testDeleteAccessItemForAccessItemId() throws Exception {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
@ -282,7 +282,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
} }
List<WorkbasketAccessItem> accessList = new ArrayList<>(originalList); List<WorkbasketAccessItem> accessList = new ArrayList<>(originalList);
WorkbasketAccessItem newItem = workbasketService.newWorkbasketAccessItem(wbId, "group_1"); WorkbasketAccessItem newItem = workbasketService.newWorkbasketAccessItem(wbId, "group-1");
accessList.add(newItem); accessList.add(newItem);
assertThat(accessList).isNotEqualTo(originalList); assertThat(accessList).isNotEqualTo(originalList);
workbasketService.setWorkbasketAccessItems(wbId, accessList); workbasketService.setWorkbasketAccessItems(wbId, accessList);
@ -305,7 +305,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
@Test @Test
void testDeleteAccessItemsForAccessId() throws NotAuthorizedException { void testDeleteAccessItemsForAccessId() throws NotAuthorizedException {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
final String accessId = "group_1"; final String accessId = "group-1";
final long accessIdCountBefore = final long accessIdCountBefore =
workbasketService.createWorkbasketAccessItemQuery().accessIdIn(accessId).count(); workbasketService.createWorkbasketAccessItemQuery().accessIdIn(accessId).count();

View File

@ -23,7 +23,7 @@ class WorkbasketQueryWithOrderedPaginationAccTest extends AbstractAccTest {
@Test @Test
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
void testGetFirstPageOfTaskQueryWithOffset() { void testGetFirstPageOfTaskQueryWithOffset() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
List<WorkbasketSummary> results = List<WorkbasketSummary> results =
@ -42,7 +42,7 @@ class WorkbasketQueryWithOrderedPaginationAccTest extends AbstractAccTest {
@Test @Test
@WithAccessId( @WithAccessId(
user = "teamlead-1", user = "teamlead-1",
groups = {"group_1", "group_2"}) groups = {"group-1", "group-2"})
void testGetSecondPageOfTaskQueryWithOffset() { void testGetSecondPageOfTaskQueryWithOffset() {
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService(); WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
List<WorkbasketSummary> results = List<WorkbasketSummary> results =

View File

@ -7,23 +7,23 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
-- group internal access -- group internal access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- teamlead substitution -- teamlead substitution
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- cross team tranfers -- cross team tranfers
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group_1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group-1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group_1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group-1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Team GPK access -- Team GPK access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group_1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group-1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group_2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group-2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
-- Cross team GPK access -- Cross team GPK access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
@ -31,10 +31,10 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Access to other domains -- Access to other domains
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group_1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group-1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group_2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group-2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Access to workbaskets for sorting test -- Access to workbaskets for sorting test
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);

View File

@ -7,23 +7,23 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
-- group internal access -- group internal access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- teamlead substitution -- teamlead substitution
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- cross team tranfers -- cross team tranfers
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group_1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group-1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group_1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group-1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Team GPK access -- Team GPK access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group_1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group-1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group_2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group-2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
-- Cross team GPK access -- Cross team GPK access
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
@ -31,10 +31,10 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Access to other domains -- Access to other domains
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group_1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group-1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group_2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group-2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
-- Access to workbaskets for sorting test -- Access to workbaskets for sorting test
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true); INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);