TSK-1210: replaced group names with new group names
This commit is contained in:
parent
92f81a6d2b
commit
6952ce8959
|
@ -36,7 +36,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateMasterClassification()
|
void testCreateMasterClassification()
|
||||||
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
||||||
|
@ -62,7 +62,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithMasterCopy()
|
void testCreateClassificationWithMasterCopy()
|
||||||
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
||||||
|
@ -111,7 +111,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithExistingMaster()
|
void testCreateClassificationWithExistingMaster()
|
||||||
throws DomainNotFoundException, ClassificationAlreadyExistException, NotAuthorizedException,
|
throws DomainNotFoundException, ClassificationAlreadyExistException, NotAuthorizedException,
|
||||||
|
@ -134,7 +134,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateChildInDomainAndCopyInMaster() throws TaskanaException {
|
void testCreateChildInDomainAndCopyInMaster() throws TaskanaException {
|
||||||
Classification parent = classificationService.newClassification("Key0816", "DOMAIN_A", "TASK");
|
Classification parent = classificationService.newClassification("Key0816", "DOMAIN_A", "TASK");
|
||||||
|
@ -154,7 +154,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithInvalidValues() {
|
void testCreateClassificationWithInvalidValues() {
|
||||||
classificationService.createClassificationQuery().count();
|
classificationService.createClassificationQuery().count();
|
||||||
|
@ -176,7 +176,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationAlreadyExisting() throws TaskanaException {
|
void testCreateClassificationAlreadyExisting() throws TaskanaException {
|
||||||
Classification classification = classificationService.newClassification("Key3", "", "TASK");
|
Classification classification = classificationService.newClassification("Key3", "", "TASK");
|
||||||
|
@ -188,7 +188,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationInUnknownDomain() {
|
void testCreateClassificationInUnknownDomain() {
|
||||||
Classification classification =
|
Classification classification =
|
||||||
|
@ -199,7 +199,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationOfUnknownType() {
|
void testCreateClassificationOfUnknownType() {
|
||||||
Classification classification =
|
Classification classification =
|
||||||
|
@ -210,7 +210,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationOfUnknownCategory() {
|
void testCreateClassificationOfUnknownCategory() {
|
||||||
Classification classification =
|
Classification classification =
|
||||||
|
@ -222,7 +222,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithInvalidParentId() {
|
void testCreateClassificationWithInvalidParentId() {
|
||||||
Classification classification = classificationService.newClassification("Key5", "", "TASK");
|
Classification classification = classificationService.newClassification("Key5", "", "TASK");
|
||||||
|
@ -233,7 +233,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithInvalidParentKey() {
|
void testCreateClassificationWithInvalidParentKey() {
|
||||||
Classification classification = classificationService.newClassification("Key5", "", "TASK");
|
Classification classification = classificationService.newClassification("Key5", "", "TASK");
|
||||||
|
@ -244,7 +244,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testCreateClassificationWithExplicitId() {
|
void testCreateClassificationWithExplicitId() {
|
||||||
ClassificationImpl classification =
|
ClassificationImpl classification =
|
||||||
|
@ -256,7 +256,7 @@ class CreateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void should_beAbleToCreateNewClassification_When_ClassificationCopy() throws Exception {
|
void should_beAbleToCreateNewClassification_When_ClassificationCopy() throws Exception {
|
||||||
ClassificationImpl oldClassification =
|
ClassificationImpl oldClassification =
|
||||||
|
|
|
@ -41,7 +41,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testDeleteClassificationInDomainUserIsNotAuthorized() {
|
void testDeleteClassificationInDomainUserIsNotAuthorized() {
|
||||||
ThrowingCallable call = () -> classificationService.deleteClassification("L140101", "DOMAIN_A");
|
ThrowingCallable call = () -> classificationService.deleteClassification("L140101", "DOMAIN_A");
|
||||||
|
@ -65,7 +65,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testThrowExeptionIfDeleteClassificationWithExistingTasks() {
|
void testThrowExeptionIfDeleteClassificationWithExistingTasks() {
|
||||||
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "DOMAIN_A");
|
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "DOMAIN_A");
|
||||||
|
@ -74,7 +74,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testThrowExeptionIfDeleteMasterClassificationWithExistingTasks() {
|
void testThrowExeptionIfDeleteMasterClassificationWithExistingTasks() {
|
||||||
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "");
|
ThrowingCallable call = () -> classificationService.deleteClassification("L1050", "");
|
||||||
|
@ -100,7 +100,7 @@ class DeleteClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testThrowExceptionWhenChildClassificationIsInUseAndRollback()
|
void testThrowExceptionWhenChildClassificationIsInUseAndRollback()
|
||||||
throws ClassificationNotFoundException {
|
throws ClassificationNotFoundException {
|
||||||
|
|
|
@ -124,7 +124,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateTaskOnClassificationKeyCategoryChange() throws Exception {
|
void testUpdateTaskOnClassificationKeyCategoryChange() throws Exception {
|
||||||
setupTest();
|
setupTest();
|
||||||
|
@ -156,7 +156,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateClassificationNotLatestAnymore()
|
void testUpdateClassificationNotLatestAnymore()
|
||||||
throws ClassificationNotFoundException, NotAuthorizedException, ConcurrencyException,
|
throws ClassificationNotFoundException, NotAuthorizedException, ConcurrencyException,
|
||||||
|
@ -183,7 +183,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateClassificationParentIdToInvalid() throws ClassificationNotFoundException {
|
void testUpdateClassificationParentIdToInvalid() throws ClassificationNotFoundException {
|
||||||
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");
|
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");
|
||||||
|
@ -194,7 +194,7 @@ class UpdateClassificationAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateClassificationParentKeyToInvalid() throws ClassificationNotFoundException {
|
void testUpdateClassificationParentKeyToInvalid() throws ClassificationNotFoundException {
|
||||||
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");
|
Classification classification = classificationService.getClassification("T2100", "DOMAIN_A");
|
||||||
|
|
|
@ -46,7 +46,7 @@ import pro.taskana.workbasket.api.models.WorkbasketAccessItem;
|
||||||
@ExtendWith(JaasExtension.class)
|
@ExtendWith(JaasExtension.class)
|
||||||
public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testTimestampsOnTaskUpdate()
|
void testTimestampsOnTaskUpdate()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -73,7 +73,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
||||||
assertThat(retrievedTask).isEqualTo(updatedTask);
|
assertThat(retrievedTask).isEqualTo(updatedTask);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreatedTaskObjectEqualsReadTaskObjectInNewTimezone()
|
void testCreatedTaskObjectEqualsReadTaskObjectInNewTimezone()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -111,7 +111,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
||||||
assertThat(readTask).isEqualTo(createdTask);
|
assertThat(readTask).isEqualTo(createdTask);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testTimestampsOnClassificationUpdate()
|
void testTimestampsOnClassificationUpdate()
|
||||||
throws ClassificationNotFoundException, InvalidArgumentException, ConcurrencyException,
|
throws ClassificationNotFoundException, InvalidArgumentException, ConcurrencyException,
|
||||||
|
@ -133,7 +133,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testTimestampsOnCreateMasterClassification()
|
void testTimestampsOnCreateMasterClassification()
|
||||||
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
throws ClassificationAlreadyExistException, ClassificationNotFoundException,
|
||||||
|
@ -157,7 +157,7 @@ public class UpdateObjectsUseUtcTimeStampsAccTest extends AbstractAccTest {
|
||||||
assertThat(retrievedClassification).isEqualTo(classification);
|
assertThat(retrievedClassification).isEqualTo(classification);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testTimestampsOnWorkbasketUpdate()
|
void testTimestampsOnWorkbasketUpdate()
|
||||||
throws ConcurrencyException, NotAuthorizedException, WorkbasketNotFoundException {
|
throws ConcurrencyException, NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
|
|
@ -37,7 +37,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.nameLike("%")
|
.nameLike("%")
|
||||||
.accessIdsHavePermission(
|
.accessIdsHavePermission(
|
||||||
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2")
|
WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
|
||||||
.list();
|
.list();
|
||||||
};
|
};
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
|
@ -56,7 +56,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.nameLike("%")
|
.nameLike("%")
|
||||||
.accessIdsHavePermission(
|
.accessIdsHavePermission(
|
||||||
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2")
|
WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
|
||||||
.list();
|
.list();
|
||||||
};
|
};
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
|
@ -76,7 +76,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.nameLike("%")
|
.nameLike("%")
|
||||||
.accessIdsHavePermission(
|
.accessIdsHavePermission(
|
||||||
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2")
|
WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
|
||||||
.list();
|
.list();
|
||||||
|
|
||||||
assertThat(results).hasSize(13);
|
assertThat(results).hasSize(13);
|
||||||
|
@ -95,7 +95,7 @@ class WorkbasketQueryAccTest extends AbstractAccTest {
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.nameLike("%")
|
.nameLike("%")
|
||||||
.accessIdsHavePermission(
|
.accessIdsHavePermission(
|
||||||
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2")
|
WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
|
||||||
.list();
|
.list();
|
||||||
|
|
||||||
assertThat(results).hasSize(13);
|
assertThat(results).hasSize(13);
|
||||||
|
|
|
@ -37,7 +37,7 @@ import pro.taskana.workbasket.api.exceptions.WorkbasketNotFoundException;
|
||||||
@ExtendWith(JaasExtension.class)
|
@ExtendWith(JaasExtension.class)
|
||||||
class CallbackStateAccTest extends AbstractAccTest {
|
class CallbackStateAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithDifferentCallbackStates()
|
void testCreateTaskWithDifferentCallbackStates()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -63,7 +63,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.getCallbackState()).isEqualTo(CallbackState.CLAIMED);
|
assertThat(createdTask.getCallbackState()).isEqualTo(CallbackState.CLAIMED);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testDeletionOfTaskWithWrongCallbackStateIsBlocked()
|
void testDeletionOfTaskWithWrongCallbackStateIsBlocked()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -110,7 +110,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
.hasMessageEndingWith(endOfMessage);
|
.hasMessageEndingWith(endOfMessage);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testUpdateOfCallbackState()
|
void testUpdateOfCallbackState()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -176,7 +176,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
assertThat(bulkResult3.containsErrors()).isFalse();
|
assertThat(bulkResult3.containsErrors()).isFalse();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testInvalidUpdateOfCallbackStateToNone()
|
void testInvalidUpdateOfCallbackStateToNone()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -212,7 +212,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
assertThat(failedTaskIds).hasSize(3);
|
assertThat(failedTaskIds).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testInvalidUpdateOfCallbackStateToComplete()
|
void testInvalidUpdateOfCallbackStateToComplete()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -252,7 +252,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
assertThat(failedTaskIds).hasSize(2).doesNotContain(createdTask3.getExternalId());
|
assertThat(failedTaskIds).hasSize(2).doesNotContain(createdTask3.getExternalId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testInvalidUpdateOfCallbackStateToClaimed()
|
void testInvalidUpdateOfCallbackStateToClaimed()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -296,7 +296,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
.containsOnly(createdTask2.getExternalId(), createdTask3.getExternalId());
|
.containsOnly(createdTask2.getExternalId(), createdTask3.getExternalId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testInvalidUpdateOfCallbackStateToRequired()
|
void testInvalidUpdateOfCallbackStateToRequired()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -333,7 +333,7 @@ class CallbackStateAccTest extends AbstractAccTest {
|
||||||
assertThat(failedTaskIds).containsOnly(createdTask3.getExternalId());
|
assertThat(failedTaskIds).containsOnly(createdTask3.getExternalId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueriesWithCallbackState() throws Exception {
|
void testQueriesWithCallbackState() throws Exception {
|
||||||
resetDb(false);
|
resetDb(false);
|
||||||
|
|
|
@ -38,7 +38,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
resetDb(false);
|
resetDb(false);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQeryCancelledTasks() {
|
void testQeryCancelledTasks() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -46,7 +46,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(taskSummaries).hasSize(5);
|
assertThat(taskSummaries).hasSize(5);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelReadyTask()
|
void testCancelReadyTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
|
||||||
|
@ -73,7 +73,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(cancelledTask.getState()).isEqualTo(TaskState.CANCELLED);
|
assertThat(cancelledTask.getState()).isEqualTo(TaskState.CANCELLED);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelClaimedTask()
|
void testCancelClaimedTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException {
|
||||||
|
@ -91,7 +91,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(numTasksCancelled).isEqualTo(6);
|
assertThat(numTasksCancelled).isEqualTo(6);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelCompletedTask() {
|
void testCancelCompletedTask() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -103,7 +103,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelTerminatedTask() {
|
void testCancelTerminatedTask() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -114,7 +114,7 @@ class CancelTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelCancelledTask() {
|
void testCancelCancelledTask() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
|
|
@ -35,7 +35,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCompleteTask()
|
void testCompleteTask()
|
||||||
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
|
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
|
||||||
|
@ -70,7 +70,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getModified()).isNotEqualTo(completedTask.getCreated());
|
assertThat(completedTask.getModified()).isNotEqualTo(completedTask.getCreated());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCompleteTaskTwice()
|
void testCompleteTaskTwice()
|
||||||
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
|
throws TaskNotFoundException, InvalidStateException, InvalidOwnerException,
|
||||||
|
@ -81,7 +81,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask2).isEqualTo(completedTask);
|
assertThat(completedTask2).isEqualTo(completedTask);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceCompleteAlreadyClaimed()
|
void testForceCompleteAlreadyClaimed()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -107,7 +107,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
|
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceCompleteNotClaimed()
|
void testForceCompleteNotClaimed()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -132,7 +132,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
|
assertThat(completedTask.getCompleted()).isEqualTo(completedTask.getModified());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCompleteTaskThrowsErrors() {
|
void testCompleteTaskThrowsErrors() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -162,7 +162,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimTaskWithDefaultFlag()
|
void testClaimTaskWithDefaultFlag()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -192,7 +192,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(claimedTask.getModified()).isEqualTo(claimedTask.getClaimed());
|
assertThat(claimedTask.getModified()).isEqualTo(claimedTask.getClaimed());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceClaimTaskFromOtherUser()
|
void testForceClaimTaskFromOtherUser()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -222,7 +222,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(taskAfterClaim.isRead()).isTrue();
|
assertThat(taskAfterClaim.isRead()).isTrue();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimTaskNotExisting() {
|
void testClaimTaskNotExisting() {
|
||||||
|
|
||||||
|
@ -234,7 +234,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(TaskNotFoundException.class);
|
assertThatThrownBy(call).isInstanceOf(TaskNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimTaskWithInvalidState() {
|
void testClaimTaskWithInvalidState() {
|
||||||
|
|
||||||
|
@ -246,7 +246,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimTaskWithInvalidOwner() {
|
void testClaimTaskWithInvalidOwner() {
|
||||||
|
|
||||||
|
@ -258,7 +258,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelClaimForcedWithInvalidState() {
|
void testCancelClaimForcedWithInvalidState() {
|
||||||
|
|
||||||
|
@ -270,7 +270,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelClaimDefaultFlag()
|
void testCancelClaimDefaultFlag()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, ClassificationNotFoundException,
|
throws NotAuthorizedException, WorkbasketNotFoundException, ClassificationNotFoundException,
|
||||||
|
@ -317,7 +317,7 @@ class CompleteTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(taskAfter.isRead()).isTrue();
|
assertThat(taskAfter.isRead()).isTrue();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelClaimWithInvalidOwner() {
|
void testCancelClaimWithInvalidOwner() {
|
||||||
|
|
||||||
|
|
|
@ -44,7 +44,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
private final TaskService taskService = taskanaEngine.getTaskService();
|
private final TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_beAbleToCreateNewTask_When_TaskCopy() throws Exception {
|
void should_beAbleToCreateNewTask_When_TaskCopy() throws Exception {
|
||||||
Task oldTask = taskService.getTask("TKI:000000000000000000000000000000000000");
|
Task oldTask = taskService.getTask("TKI:000000000000000000000000000000000000");
|
||||||
|
@ -59,7 +59,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
.containsOnly(newTask.getId());
|
.containsOnly(newTask.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateSimpleManualTask()
|
void testCreateSimpleManualTask()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -94,7 +94,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.isTransferred()).isFalse();
|
assertThat(createdTask.isTransferred()).isFalse();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_createTask_When_ObjectReferenceSystemAndSystemInstanceIsNull()
|
void should_createTask_When_ObjectReferenceSystemAndSystemInstanceIsNull()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -135,7 +135,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.getCreator()).isEqualTo(CurrentUserContext.getUserid());
|
assertThat(createdTask.getCreator()).isEqualTo(CurrentUserContext.getUserid());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testIdempotencyOfTaskCreation()
|
void testIdempotencyOfTaskCreation()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -177,7 +177,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
|
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateSimpleTaskWithCustomAttributes()
|
void testCreateSimpleTaskWithCustomAttributes()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -245,7 +245,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
|
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateExternalTaskWithAttachment()
|
void testCreateExternalTaskWithAttachment()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -331,7 +331,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
|
assertThat(customAttributesForCreate).isEqualTo(customAttributesFromDb);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateExternalTaskWithMultipleAttachments()
|
void testCreateExternalTaskWithMultipleAttachments()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -383,7 +383,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(readTask.getAttachments().get(0).getObjectReference()).isNotNull();
|
assertThat(readTask.getAttachments().get(0).getObjectReference()).isNotNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPrioDurationOfTaskFromAttachmentsAtCreate()
|
void testPrioDurationOfTaskFromAttachmentsAtCreate()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -443,7 +443,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
.isEqualTo(readTask.getDue());
|
.isEqualTo(readTask.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfAttachmentIsInvalid() throws ClassificationNotFoundException {
|
void testThrowsExceptionIfAttachmentIsInvalid() throws ClassificationNotFoundException {
|
||||||
|
|
||||||
|
@ -498,7 +498,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
createSimpleCustomProperties(3)));
|
createSimpleCustomProperties(3)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testUseCustomNameIfSetForNewTask()
|
void testUseCustomNameIfSetForNewTask()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -516,7 +516,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.getName()).isEqualTo("Test Name");
|
assertThat(createdTask.getName()).isEqualTo("Test Name");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testUseClassificationMetadataFromCorrectDomainForNewTask()
|
void testUseClassificationMetadataFromCorrectDomainForNewTask()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -534,7 +534,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.getPriority()).isEqualTo(2);
|
assertThat(createdTask.getPriority()).isEqualTo(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetExceptionIfWorkbasketDoesNotExist() {
|
void testGetExceptionIfWorkbasketDoesNotExist() {
|
||||||
|
|
||||||
|
@ -547,7 +547,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
|
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetExceptionIfAppendIsNotPermitted() {
|
void testGetExceptionIfAppendIsNotPermitted() {
|
||||||
|
|
||||||
|
@ -560,7 +560,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfMandatoryPrimaryObjectReferenceIsNotSetOrIncomplete() {
|
void testThrowsExceptionIfMandatoryPrimaryObjectReferenceIsNotSetOrIncomplete() {
|
||||||
|
|
||||||
|
@ -586,7 +586,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
testCreateTask.accept(createObjectReference(null, "SYSTEM_A", "INSTANCE_A", "VNR", "1234567"));
|
testCreateTask.accept(createObjectReference(null, "SYSTEM_A", "INSTANCE_A", "VNR", "1234567"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSetDomainFromWorkbasket()
|
void testSetDomainFromWorkbasket()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -608,7 +608,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(createdTask.getDomain()).isEqualTo(workbasket.getDomain());
|
assertThat(createdTask.getDomain()).isEqualTo(workbasket.getDomain());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreatedTaskObjectEqualsReadTaskObject()
|
void testCreatedTaskObjectEqualsReadTaskObject()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -642,7 +642,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(readTask).isEqualTo(createdTask);
|
assertThat(readTask).isEqualTo(createdTask);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateSimpleTaskWithCallbackInfo()
|
void testCreateSimpleTaskWithCallbackInfo()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -689,7 +689,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskAlreadyExisting() throws NotAuthorizedException, TaskNotFoundException {
|
void testCreateTaskAlreadyExisting() throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
|
||||||
|
@ -699,7 +699,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
|
assertThatThrownBy(call).isInstanceOf(TaskAlreadyExistException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskNotAuthorizedOnWorkbasket() {
|
void testCreateTaskNotAuthorizedOnWorkbasket() {
|
||||||
|
|
||||||
|
@ -709,7 +709,7 @@ class CreateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithWorkbasketMarkedForDeletion()
|
void testCreateTaskWithWorkbasketMarkedForDeletion()
|
||||||
throws NotAuthorizedException, InvalidStateException, TaskNotFoundException,
|
throws NotAuthorizedException, InvalidStateException, TaskNotFoundException,
|
||||||
|
|
|
@ -23,7 +23,7 @@ public class CreateTaskCommentAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_CreateTaskComment_For_TaskComment()
|
void should_CreateTaskComment_For_TaskComment()
|
||||||
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
|
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
|
||||||
|
@ -46,7 +46,7 @@ public class CreateTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskCommentsAfterInsert).hasSize(3);
|
assertThat(taskCommentsAfterInsert).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToCreateTaskComment_When_TaskIdIsNullOrNonExisting() {
|
void should_FailToCreateTaskComment_When_TaskIdIsNullOrNonExisting() {
|
||||||
|
|
||||||
|
|
|
@ -31,7 +31,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testDeleteSingleTaskNotAuthorized() {
|
void testDeleteSingleTaskNotAuthorized() {
|
||||||
|
|
||||||
|
@ -67,7 +67,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-2",
|
user = "user-1-2",
|
||||||
groups = {"group_1", "admin"})
|
groups = {"group-1", "admin"})
|
||||||
@Test
|
@Test
|
||||||
void testDeleteSingleTask()
|
void testDeleteSingleTask()
|
||||||
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {
|
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {
|
||||||
|
@ -101,7 +101,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-2",
|
user = "user-1-2",
|
||||||
groups = {"group_1", "admin"})
|
groups = {"group-1", "admin"})
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfTaskIsNotCompleted()
|
void testThrowsExceptionIfTaskIsNotCompleted()
|
||||||
throws TaskNotFoundException, NotAuthorizedException {
|
throws TaskNotFoundException, NotAuthorizedException {
|
||||||
|
@ -117,7 +117,7 @@ class DeleteTaskAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-2",
|
user = "user-1-2",
|
||||||
groups = {"group_1", "admin"})
|
groups = {"group-1", "admin"})
|
||||||
@Test
|
@Test
|
||||||
void testForceDeleteTaskIfNotCompleted()
|
void testForceDeleteTaskIfNotCompleted()
|
||||||
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {
|
throws TaskNotFoundException, InvalidStateException, NotAuthorizedException {
|
||||||
|
|
|
@ -27,7 +27,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_DeleteTaskComment_For_TaskCommentId()
|
void should_DeleteTaskComment_For_TaskCommentId()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
||||||
|
@ -47,7 +47,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskCommentsAfterDeletion).hasSize(1);
|
assertThat(taskCommentsAfterDeletion).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToDeleteTaskComment_When_UserHasNoAuthorization()
|
void should_FailToDeleteTaskComment_When_UserHasNoAuthorization()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -92,7 +92,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskCommentsAfterDeletion).hasSize(1);
|
assertThat(taskCommentsAfterDeletion).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToDeleteTaskComment_When_TaskCommentIdIsInvalid()
|
void should_FailToDeleteTaskComment_When_TaskCommentIdIsInvalid()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -115,7 +115,7 @@ public class DeleteTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskCommentsAfterDeletion).hasSize(3);
|
assertThat(taskCommentsAfterDeletion).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToDeleteTaskComment_When_TaskCommentIsNotExisting()
|
void should_FailToDeleteTaskComment_When_TaskCommentIsNotExisting()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
|
|
@ -27,7 +27,7 @@ class GetTaskAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnTask_When_RequestingTaskByTaskId()
|
void should_ReturnTask_When_RequestingTaskByTaskId()
|
||||||
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
|
throws TaskNotFoundException, NotAuthorizedException, InvalidArgumentException {
|
||||||
|
@ -80,7 +80,7 @@ class GetTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getCustomAttribute("16")).isEqualTo("custom16");
|
assertThat(task.getCustomAttribute("16")).isEqualTo("custom16");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_RequestedTaskByIdIsNotExisting() {
|
void should_ThrowException_When_RequestedTaskByIdIsNotExisting() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -25,7 +25,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnTaskComments_For_TaskId() throws NotAuthorizedException, TaskNotFoundException {
|
void should_ReturnTaskComments_For_TaskId() throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskComments).hasSize(3);
|
assertThat(taskComments).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnEmptyList_When_TaskCommentsDontExist()
|
void should_ReturnEmptyList_When_TaskCommentsDontExist()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -47,7 +47,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskService.getTaskComments("TKI:000000000000000000000000000000000036")).isEmpty();
|
assertThat(taskService.getTaskComments("TKI:000000000000000000000000000000000036")).isEmpty();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToReturnTaskComments_When_TaskIstNotVisible() {
|
void should_FailToReturnTaskComments_When_TaskIstNotVisible() {
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(httpCall).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(httpCall).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnTaskComment_For_TaskCommentId()
|
void should_ReturnTaskComment_For_TaskCommentId()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
||||||
|
@ -73,7 +73,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskComment.getCreator()).isEqualTo("user-1-1");
|
assertThat(taskComment.getCreator()).isEqualTo("user-1-1");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToReturnTaskComment_When_TaskCommentIsNotExisting() {
|
void should_FailToReturnTaskComment_When_TaskCommentIsNotExisting() {
|
||||||
|
|
||||||
|
@ -84,7 +84,7 @@ public class GetTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(lambda).isInstanceOf(TaskCommentNotFoundException.class);
|
assertThatThrownBy(lambda).isInstanceOf(TaskCommentNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToReturntaskComment_When_TaskIstNotVisible() {
|
void should_FailToReturntaskComment_When_TaskIstNotVisible() {
|
||||||
|
|
||||||
|
|
|
@ -58,7 +58,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(columnValueList).hasSize(5);
|
assertThat(columnValueList).hasSize(5);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryByClassificationNameIn() {
|
void testQueryByClassificationNameIn() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -79,7 +79,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(tasks).hasSize(1);
|
assertThat(tasks).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryByClassificationNameLike() {
|
void testQueryByClassificationNameLike() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -96,7 +96,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(tasks).hasSize(32);
|
assertThat(tasks).hasSize(32);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSelectByAttachmentClassificationNameLike() {
|
void testSelectByAttachmentClassificationNameLike() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -117,7 +117,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(tasks).hasSize(7);
|
assertThat(tasks).hasSize(7);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSelectByAttachmentClassificationNameIn() {
|
void testSelectByAttachmentClassificationNameIn() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -138,7 +138,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(tasks).hasSize(4);
|
assertThat(tasks).hasSize(4);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryAndCountMatchForClassificationName() {
|
void testQueryAndCountMatchForClassificationName() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -150,7 +150,7 @@ class QueryTaskByClassificationNameAccTest extends AbstractAccTest {
|
||||||
assertThat(tasks).hasSize((int) numberOfTasks);
|
assertThat(tasks).hasSize((int) numberOfTasks);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryAndCountForAttachmentClassificationName() {
|
void testQueryAndCountForAttachmentClassificationName() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -34,7 +34,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetAttachmentSummariesFromTask() {
|
void testGetAttachmentSummariesFromTask() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -58,7 +58,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
|
||||||
assertThat(attachmentSummaries).isEmpty();
|
assertThat(attachmentSummaries).isEmpty();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testIfNewTaskHasEmptyAttachmentList() {
|
void testIfNewTaskHasEmptyAttachmentList() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -67,7 +67,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
|
||||||
assertThat(task.asSummary().getAttachmentSummaries()).isNotNull();
|
assertThat(task.asSummary().getAttachmentSummaries()).isNotNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ConfirmIfAttachmentSummariesAreCorrect_When_UsingTaskQueryAndGetTaskById()
|
void should_ConfirmIfAttachmentSummariesAreCorrect_When_UsingTaskQueryAndGetTaskById()
|
||||||
throws TaskNotFoundException, NotAuthorizedException {
|
throws TaskNotFoundException, NotAuthorizedException {
|
||||||
|
@ -92,7 +92,7 @@ class QueryTaskWithAttachmentAccTest extends AbstractAccTest {
|
||||||
toArray(originalAttachments)); // but not same reference
|
toArray(originalAttachments)); // but not same reference
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ConfirmIfAttachmentSummariesAreCorrect()
|
void should_ConfirmIfAttachmentSummariesAreCorrect()
|
||||||
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
||||||
|
|
|
@ -150,7 +150,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForOwnerLike() {
|
void testQueryForOwnerLike() {
|
||||||
|
|
||||||
|
@ -169,7 +169,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForParentBusinessProcessId() {
|
void testQueryForParentBusinessProcessId() {
|
||||||
|
|
||||||
|
@ -190,7 +190,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForName() {
|
void testQueryForName() {
|
||||||
|
|
||||||
|
@ -205,7 +205,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForClassificationKey() {
|
void testQueryForClassificationKey() {
|
||||||
|
|
||||||
|
@ -227,7 +227,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThat(result4).hasSize(7);
|
assertThat(result4).hasSize(7);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForAttachmentInSummary()
|
void testQueryForAttachmentInSummary()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -284,7 +284,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThat(countAllExternalIds).isEqualTo(countAllIds);
|
assertThat(countAllExternalIds).isEqualTo(countAllIds);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@TestFactory
|
@TestFactory
|
||||||
Stream<DynamicTest> testQueryForCustomX() {
|
Stream<DynamicTest> testQueryForCustomX() {
|
||||||
List<Triplet<String, String[], Integer>> list =
|
List<Triplet<String, String[], Integer>> list =
|
||||||
|
@ -326,7 +326,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThat(result2).hasSize(expectedResult);
|
assertThat(result2).hasSize(expectedResult);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForCustom7WithExceptionInLike() {
|
void testQueryForCustom7WithExceptionInLike() {
|
||||||
|
|
||||||
|
@ -338,7 +338,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForCustom7WithExceptionInIn() throws InvalidArgumentException {
|
void testQueryForCustom7WithExceptionInIn() throws InvalidArgumentException {
|
||||||
|
|
||||||
|
@ -358,7 +358,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForCustom7WithException() throws InvalidArgumentException {
|
void testQueryForCustom7WithException() throws InvalidArgumentException {
|
||||||
|
|
||||||
|
@ -372,7 +372,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
assertThat(result2).hasSize(2);
|
assertThat(result2).hasSize(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryTaskByCustomAttributes()
|
void testQueryTaskByCustomAttributes()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -418,7 +418,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryAndCountMatch() {
|
void testQueryAndCountMatch() {
|
||||||
TaskQuery taskQuery = taskService.createTaskQuery();
|
TaskQuery taskQuery = taskService.createTaskQuery();
|
||||||
|
@ -838,7 +838,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForExternalIdIn() {
|
void testQueryForExternalIdIn() {
|
||||||
|
|
||||||
|
@ -867,7 +867,7 @@ class QueryTasksAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryForExternalIdLike() {
|
void testQueryForExternalIdLike() {
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryTasksByExcactValueOfObjectReference() throws SystemException {
|
void testQueryTasksByExcactValueOfObjectReference() throws SystemException {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -34,7 +34,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryTasksByExcactValueAndTypeOfObjectReference() throws SystemException {
|
void testQueryTasksByExcactValueAndTypeOfObjectReference() throws SystemException {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -49,7 +49,7 @@ class QueryTasksByObjectReferenceAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryTasksByValueLikeOfObjectReference() throws SystemException {
|
void testQueryTasksByValueLikeOfObjectReference() throws SystemException {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -27,7 +27,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testCreatedWithin2Intervals() {
|
void testCreatedWithin2Intervals() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -59,7 +59,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testCreatedBefore() {
|
void testCreatedBefore() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -84,7 +84,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testCreatedAfter() {
|
void testCreatedAfter() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -109,7 +109,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testClaimedWithin2Intervals() {
|
void testClaimedWithin2Intervals() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -141,7 +141,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testCompletedWithin() {
|
void testCompletedWithin() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -166,7 +166,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testModifiedWithin() {
|
void testModifiedWithin() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -191,7 +191,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testPlannedWithin() {
|
void testPlannedWithin() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -216,7 +216,7 @@ class QueryTasksByTimeIntervalsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testDueWithin() {
|
void testDueWithin() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -21,7 +21,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnAllTasksByWildcardSearch_For_ProvidedSearchValue() {
|
void should_ReturnAllTasksByWildcardSearch_For_ProvidedSearchValue() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -43,7 +43,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnAllTasks_For_ProvidedSearchValueAndAdditionalParameters() {
|
void should_ReturnAllTasks_For_ProvidedSearchValueAndAdditionalParameters() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -67,7 +67,7 @@ public class QueryTasksByWildcardSearchAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_NotUsingSearchFieldsAndValueParamsTogether() {
|
void should_ThrowException_When_NotUsingSearchFieldsAndValueParamsTogether() {
|
||||||
|
|
||||||
|
|
|
@ -26,7 +26,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForWorkbasketKeyDomain() {
|
void testQueryForWorkbasketKeyDomain() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -50,7 +50,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(result2).hasSize(52);
|
assertThat(result2).hasSize(52);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfNoOpenerPermissionOnQueriedWorkbasket() {
|
void testThrowsExceptionIfNoOpenerPermissionOnQueriedWorkbasket() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -65,7 +65,7 @@ class QueryTasksByWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedToQueryWorkbasketException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedToQueryWorkbasketException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfNoOpenerPermissionOnAtLeastOneQueriedWorkbasket() {
|
void testThrowsExceptionIfNoOpenerPermissionOnAtLeastOneQueriedWorkbasket() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -21,7 +21,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetFirstPageOfTaskQueryWithOffset() {
|
void testGetFirstPageOfTaskQueryWithOffset() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -33,7 +33,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(10);
|
assertThat(results).hasSize(10);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSecondPageOfTaskQueryWithOffset() {
|
void testSecondPageOfTaskQueryWithOffset() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -45,7 +45,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(10);
|
assertThat(results).hasSize(10);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testListOffsetAndLimitOutOfBounds() {
|
void testListOffsetAndLimitOutOfBounds() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -75,7 +75,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(3);
|
assertThat(results).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPaginationWithPages() {
|
void testPaginationWithPages() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -121,7 +121,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(2);
|
assertThat(results).hasSize(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPaginationNullAndNegativeLimitsIgnoring() {
|
void testPaginationNullAndNegativeLimitsIgnoring() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -157,7 +157,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(10);
|
assertThat(results).hasSize(10);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCountOfTaskQuery() {
|
void testCountOfTaskQuery() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -169,7 +169,7 @@ class QueryTasksWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(count).isEqualTo(22L);
|
assertThat(count).isEqualTo(22L);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCountOfTaskQueryWithAttachmentChannelFilter() {
|
void testCountOfTaskQueryWithAttachmentChannelFilter() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -31,7 +31,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByModifiedAndDomain() {
|
void testSortByModifiedAndDomain() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -55,7 +55,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByTaskIdDesc() {
|
void testSortByTaskIdDesc() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -82,7 +82,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByTaskIdAsc() {
|
void testSortByTaskIdAsc() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -106,7 +106,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByDomainNameAndCreated() {
|
void testSortByDomainNameAndCreated() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -128,7 +128,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByPorSystemNoteDueAndOwner() {
|
void testSortByPorSystemNoteDueAndOwner() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -160,7 +160,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByPorSystemInstanceParentProcPlannedAndState() {
|
void testSortByPorSystemInstanceParentProcPlannedAndState() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -192,7 +192,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByPorCompanyAndClaimed() {
|
void testSortByPorCompanyAndClaimed() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -225,7 +225,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortByWbKeyPrioPorValueAndCompleted() {
|
void testSortByWbKeyPrioPorValueAndCompleted() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -258,7 +258,7 @@ class QueryTasksWithSortingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testSortBpIdClassificationIdDescriptionAndPorType() {
|
void testSortBpIdClassificationIdDescriptionAndPorType() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -26,7 +26,7 @@ import pro.taskana.task.api.models.TaskSummary;
|
||||||
public class ServiceLevelOfAllTasksAccTest extends AbstractAccTest {
|
public class ServiceLevelOfAllTasksAccTest extends AbstractAccTest {
|
||||||
TaskService taskService;
|
TaskService taskService;
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetPlannedPropertyOnAllTasks() throws SQLException {
|
void testSetPlannedPropertyOnAllTasks() throws SQLException {
|
||||||
taskService = taskanaEngine.getTaskService();
|
taskService = taskanaEngine.getTaskService();
|
||||||
|
|
|
@ -55,7 +55,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
/* CREATE TASK */
|
/* CREATE TASK */
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_CalculatePlannedDateAtCreate()
|
void should_CalculatePlannedDateAtCreate()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -90,7 +90,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(expectedPlanned).isEqualTo(readTask.getPlanned());
|
assertThat(expectedPlanned).isEqualTo(readTask.getPlanned());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_calculateDueDateAtCreate()
|
void should_calculateDueDateAtCreate()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -122,7 +122,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(expectedDue).isEqualTo(readTask.getDue());
|
assertThat(expectedDue).isEqualTo(readTask.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_NotThrowException_When_DueAndPlannedAreConsistent()
|
void should_NotThrowException_When_DueAndPlannedAreConsistent()
|
||||||
throws ClassificationNotFoundException {
|
throws ClassificationNotFoundException {
|
||||||
|
@ -150,7 +150,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThatCode(call).doesNotThrowAnyException();
|
assertThatCode(call).doesNotThrowAnyException();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_DueAndPlannedAreInconsistent() {
|
void should_ThrowException_When_DueAndPlannedAreInconsistent() {
|
||||||
|
|
||||||
|
@ -170,7 +170,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_VerifyThatCreateAndPlannedAreClose() throws Exception {
|
void should_VerifyThatCreateAndPlannedAreClose() throws Exception {
|
||||||
|
|
||||||
|
@ -195,7 +195,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
/* UPDATE TASK */
|
/* UPDATE TASK */
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_DueAndPlannedAreChangedInconsistently() throws Exception {
|
void should_ThrowException_When_DueAndPlannedAreChangedInconsistently() throws Exception {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -209,7 +209,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
+ "date 2020-07-02T00:00:00Z not matching the service level PT24H.");
|
+ "date 2020-07-02T00:00:00Z not matching the service level PT24H.");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlanned_When_SetPlannedRequestContainsDuplicateTaskIds()
|
void should_SetPlanned_When_SetPlannedRequestContainsDuplicateTaskIds()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -246,7 +246,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(due4).isEqualTo(dueExpected);
|
assertThat(due4).isEqualTo(dueExpected);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlanned_When_RequestContainsDuplicatesAndNotExistingTaskIds()
|
void should_SetPlanned_When_RequestContainsDuplicatesAndNotExistingTaskIds()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -273,7 +273,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(due5).isEqualTo(dueExpected);
|
assertThat(due5).isEqualTo(dueExpected);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_2")
|
@WithAccessId(user = "user-1-1", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlanned_When_RequestContainsTasksWithAttachments()
|
void should_SetPlanned_When_RequestContainsTasksWithAttachments()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
||||||
|
@ -352,7 +352,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
// |TAI:000000000000000000000000000000000014 | CLI:100000000000000000000000000000000004,| P14D |
|
// |TAI:000000000000000000000000000000000014 | CLI:100000000000000000000000000000000004,| P14D |
|
||||||
// +-----------------------------------------+------------------------------------------+------+
|
// +-----------------------------------------+------------------------------------------+------+
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnBulkLog_When_UserIsNotAuthorizedForTasks() {
|
void should_ReturnBulkLog_When_UserIsNotAuthorizedForTasks() {
|
||||||
String tkId1 = "TKI:000000000000000000000000000000000008";
|
String tkId1 = "TKI:000000000000000000000000000000000008";
|
||||||
|
@ -373,7 +373,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
.hasOnlyElementsOfType(NotAuthorizedException.class);
|
.hasOnlyElementsOfType(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlannedPropertyOfTasks_When_RequestedByAdminUser()
|
void should_SetPlannedPropertyOfTasks_When_RequestedByAdminUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -398,7 +398,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(dueBulk4).isEqualTo(getInstant("2020-05-22T07:00:00"));
|
assertThat(dueBulk4).isEqualTo(getInstant("2020-05-22T07:00:00"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_DoNothing_When_SetPlannedIsCalledWithEmptyTasksList() {
|
void should_DoNothing_When_SetPlannedIsCalledWithEmptyTasksList() {
|
||||||
Instant planned = getInstant("2020-05-03T07:00:00");
|
Instant planned = getInstant("2020-05-03T07:00:00");
|
||||||
|
@ -416,7 +416,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
// |TAI:000000000000000000000000000000000007 | CLI:100000000000000000000000000000000008 | P1D |
|
// |TAI:000000000000000000000000000000000007 | CLI:100000000000000000000000000000000008 | P1D |
|
||||||
// |TKI:000000000000000000000000000000000066 | CLI:100000000000000000000000000000000024 | P0D |
|
// |TKI:000000000000000000000000000000000066 | CLI:100000000000000000000000000000000024 | P0D |
|
||||||
// +-----------------------------------------+------------------------------------------+------+
|
// +-----------------------------------------+------------------------------------------+------+
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlannedPropertyWithBulkUpdate_When_RequestContainsASingleTask()
|
void should_SetPlannedPropertyWithBulkUpdate_When_RequestContainsASingleTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -432,7 +432,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getDue()).isEqualTo(planned.plus(Duration.ofDays(days)));
|
assertThat(task.getDue()).isEqualTo(planned.plus(Duration.ofDays(days)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlannedPropertyOnSingle_When_UpdateTaskWasCalled()
|
void should_SetPlannedPropertyOnSingle_When_UpdateTaskWasCalled()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
||||||
|
@ -448,7 +448,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getDue()).isEqualTo(task.getPlanned().plus(Duration.ofDays(days)));
|
assertThat(task.getDue()).isEqualTo(task.getPlanned().plus(Duration.ofDays(days)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlanned_When_OnlyDueWasChanged()
|
void should_SetPlanned_When_OnlyDueWasChanged()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
||||||
|
@ -464,7 +464,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned()).isEqualTo(getInstant("2020-05-08T07:00:00")); // Friday
|
assertThat(task.getPlanned()).isEqualTo(getInstant("2020-05-08T07:00:00")); // Friday
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetDue_When_OnlyPlannedWasChanged()
|
void should_SetDue_When_OnlyPlannedWasChanged()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
||||||
|
@ -482,7 +482,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
|
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetPlanned_When_DueIsChangedAndPlannedIsNulled()
|
void should_SetPlanned_When_DueIsChangedAndPlannedIsNulled()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
||||||
|
@ -499,7 +499,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
|
assertThat(task.getPlanned()).isEqualTo(task.getDue().plus(Duration.ofDays(days)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void should_SetDue_When_TaskUpdateIsCalled()
|
void should_SetDue_When_TaskUpdateIsCalled()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidArgumentException,
|
||||||
|
@ -533,7 +533,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getDue()).isEqualTo(getInstant("2020-05-15T07:00:00"));
|
assertThat(task.getDue()).isEqualTo(getInstant("2020-05-15T07:00:00"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreWeekendDays()
|
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreWeekendDays()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
||||||
|
@ -564,7 +564,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getDue()).isEqualTo(getInstant("2020-03-20T07:00:00")); // friday
|
assertThat(task.getDue()).isEqualTo(getInstant("2020-03-20T07:00:00")); // friday
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-4", groups = "group_1")
|
@WithAccessId(user = "user-1-4", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreOnWeekends_ServiceLevel_P0D()
|
void should_UpdateTaskPlannedOrDue_When_PlannedOrDueAreOnWeekends_ServiceLevel_P0D()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
||||||
|
@ -637,7 +637,7 @@ public class ServiceLevelPriorityAccTest extends AbstractAccTest {
|
||||||
+ "due date 2020-03-23T07:00:00Z not matching the service level PT0S.");
|
+ "due date 2020-03-23T07:00:00Z not matching the service level PT0S.");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_notThrowServiceLevelViolation_IfWeekendOrHolidaysBetweenDates()
|
void should_notThrowServiceLevelViolation_IfWeekendOrHolidaysBetweenDates()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
throws NotAuthorizedException, TaskNotFoundException, ClassificationNotFoundException,
|
||||||
|
|
|
@ -37,7 +37,7 @@ import pro.taskana.task.api.models.TaskSummary;
|
||||||
@ExtendWith(JaasExtension.class)
|
@ExtendWith(JaasExtension.class)
|
||||||
public class SetOwnerAccTest extends AbstractAccTest {
|
public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerAndSubsequentClaimSucceeds()
|
void testSetOwnerAndSubsequentClaimSucceeds()
|
||||||
throws TaskNotFoundException, NotAuthorizedException, InvalidStateException,
|
throws TaskNotFoundException, NotAuthorizedException, InvalidStateException,
|
||||||
|
@ -59,7 +59,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
assertThat(taskClaimed.getOwner()).isEqualTo("user-1-2");
|
assertThat(taskClaimed.getOwner()).isEqualTo("user-1-2");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerViaUpdateTaskNotAuthorized() {
|
void testSetOwnerViaUpdateTaskNotAuthorized() {
|
||||||
|
|
||||||
|
@ -73,7 +73,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(NotAuthorizedException.class);
|
.isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerOfClaimedTaskFails() throws TaskNotFoundException, NotAuthorizedException {
|
void testSetOwnerOfClaimedTaskFails() throws TaskNotFoundException, NotAuthorizedException {
|
||||||
|
|
||||||
|
@ -87,7 +87,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(InvalidStateException.class);
|
.isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerNotAuthorized() {
|
void testSetOwnerNotAuthorized() {
|
||||||
|
|
||||||
|
@ -103,7 +103,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
assertThat(results.getErrorForId(taskReadyId)).isInstanceOf(NotAuthorizedException.class);
|
assertThat(results.getErrorForId(taskReadyId)).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerOfTasksWithDuplicatesSucceeds() {
|
void testSetOwnerOfTasksWithDuplicatesSucceeds() {
|
||||||
|
|
||||||
|
@ -118,7 +118,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
assertThat(results.containsErrors()).isFalse();
|
assertThat(results.containsErrors()).isFalse();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerOfTasksWithDuplicatesAndNotExistingSucceeds() {
|
void testSetOwnerOfTasksWithDuplicatesAndNotExistingSucceeds() {
|
||||||
List<String> taskIds =
|
List<String> taskIds =
|
||||||
|
@ -136,7 +136,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(TaskNotFoundException.class);
|
.isInstanceOf(TaskNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerOfTasksWithNoQualifyingTasks() {
|
void testSetOwnerOfTasksWithNoQualifyingTasks() {
|
||||||
|
|
||||||
|
@ -152,7 +152,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
assertThat(results.getErrorMap()).hasSize(3);
|
assertThat(results.getErrorMap()).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-3-2", groups = "group_2")
|
@WithAccessId(user = "user-3-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerWithEmptyList() {
|
void testSetOwnerWithEmptyList() {
|
||||||
List<String> taskIds = new ArrayList<>();
|
List<String> taskIds = new ArrayList<>();
|
||||||
|
@ -161,7 +161,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
assertThat(results.containsErrors()).isFalse();
|
assertThat(results.containsErrors()).isFalse();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_2")
|
@WithAccessId(user = "user-1-2", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerWithAllTasksAndVariousExceptions()
|
void testSetOwnerWithAllTasksAndVariousExceptions()
|
||||||
throws NoSuchFieldException, IllegalAccessException, SQLException {
|
throws NoSuchFieldException, IllegalAccessException, SQLException {
|
||||||
|
@ -190,7 +190,7 @@ public class SetOwnerAccTest extends AbstractAccTest {
|
||||||
.areExactly(23, notAuthorizedException);
|
.areExactly(23, notAuthorizedException);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_2")
|
@WithAccessId(user = "admin", groups = "group-2")
|
||||||
@Test
|
@Test
|
||||||
void testSetOwnerWithAllTasksAndVariousExceptionsAsAdmin() throws SQLException {
|
void testSetOwnerWithAllTasksAndVariousExceptionsAsAdmin() throws SQLException {
|
||||||
resetDb(false);
|
resetDb(false);
|
||||||
|
|
|
@ -36,7 +36,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
taskService = taskanaEngine.getTaskService();
|
taskService = taskanaEngine.getTaskService();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ReturnAllTerminatedTasks_When_QueryTerminatedState() {
|
void should_ReturnAllTerminatedTasks_When_QueryTerminatedState() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -44,7 +44,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(taskSummaries).hasSize(5);
|
assertThat(taskSummaries).hasSize(5);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@WithAccessId(user = "taskadmin")
|
@WithAccessId(user = "taskadmin")
|
||||||
@TestTemplate
|
@TestTemplate
|
||||||
void should_TerminateTask_When_TaskStateIsReady()
|
void should_TerminateTask_When_TaskStateIsReady()
|
||||||
|
@ -58,7 +58,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(numTasks).isEqualTo(6);
|
assertThat(numTasks).isEqualTo(6);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@WithAccessId(user = "taskadmin")
|
@WithAccessId(user = "taskadmin")
|
||||||
@TestTemplate
|
@TestTemplate
|
||||||
void should_TerminateTask_When_TaskStateIsClaimed()
|
void should_TerminateTask_When_TaskStateIsClaimed()
|
||||||
|
@ -77,7 +77,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(numTasksTerminated).isEqualTo(6);
|
assertThat(numTasksTerminated).isEqualTo(6);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "taskadmin", groups = "group_1")
|
@WithAccessId(user = "taskadmin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TerminateTaskWithTaskStateCompleted() {
|
void should_ThrowException_When_TerminateTaskWithTaskStateCompleted() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -98,7 +98,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(taskanaCall).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(taskanaCall).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "taskadmin", groups = "group_1")
|
@WithAccessId(user = "taskadmin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TerminateTaskWithTaskStateTerminated() {
|
void should_ThrowException_When_TerminateTaskWithTaskStateTerminated() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
@ -109,7 +109,7 @@ class TerminateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(taskanaCall).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "taskadmin", groups = "group_1")
|
@WithAccessId(user = "taskadmin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TerminateTaskWithTaskStateCancelled() {
|
void should_ThrowException_When_TerminateTaskWithTaskStateCancelled() {
|
||||||
List<TaskSummary> taskSummaries =
|
List<TaskSummary> taskSummaries =
|
||||||
|
|
|
@ -38,7 +38,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_TransferTaskToWorkbasket_When_WorkbasketIdIsProvided()
|
void should_TransferTaskToWorkbasket_When_WorkbasketIdIsProvided()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
||||||
|
@ -77,7 +77,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
|
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_TransferTaskToWorkbasket_When_WorkbasketKeyAndDomainIsProvided()
|
void should_TransferTaskToWorkbasket_When_WorkbasketKeyAndDomainIsProvided()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
||||||
|
@ -96,7 +96,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
|
assertThat(transferredTask.getState()).isEqualTo(TaskState.READY);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ChangeDomain_When_TransferingTaskToWorkbasketWithDifferentDomain()
|
void should_ChangeDomain_When_TransferingTaskToWorkbasketWithDifferentDomain()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
throws NotAuthorizedException, WorkbasketNotFoundException, TaskNotFoundException,
|
||||||
|
@ -111,7 +111,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(transferedTask.getDomain()).isNotEqualTo(domain1);
|
assertThat(transferedTask.getDomain()).isNotEqualTo(domain1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_UserHasNoTransferAuthorization()
|
void should_ThrowException_When_UserHasNoTransferAuthorization()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -125,7 +125,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_DestinationWorkbasketDoesNotExist()
|
void should_ThrowException_When_DestinationWorkbasketDoesNotExist()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -142,7 +142,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
|
assertThatThrownBy(call).isInstanceOf(WorkbasketNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TaskToTransferDoesNotExist() {
|
void should_ThrowException_When_TaskToTransferDoesNotExist() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -174,7 +174,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
+ "'WBI:100000000000000000000000000000000005' is needed.");
|
+ "'WBI:100000000000000000000000000000000005' is needed.");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TransferWithNoAppendAuthorization()
|
void should_ThrowException_When_TransferWithNoAppendAuthorization()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -194,7 +194,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
+ "'WBI:100000000000000000000000000000000008' is needed.");
|
+ "'WBI:100000000000000000000000000000000008' is needed.");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TaskToTransferIsAlreadyCompleted()
|
void should_ThrowException_When_TaskToTransferIsAlreadyCompleted()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -208,7 +208,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidStateException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_BulkTransferTasks_When_WorkbasketIdIsProvided()
|
void should_BulkTransferTasks_When_WorkbasketIdIsProvided()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
||||||
|
@ -245,7 +245,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(transferredTask.getOwner()).isNull();
|
assertThat(transferredTask.getOwner()).isNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_BulkTransferOnlyValidTasks_When_SomeTasksToTransferCauseExceptions()
|
void should_BulkTransferOnlyValidTasks_When_SomeTasksToTransferCauseExceptions()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
||||||
|
@ -322,7 +322,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
.hasMessageContaining("APPEND");
|
.hasMessageContaining("APPEND");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_TransferTasks_When_TransferTasksWithListNotSupportingRemove() {
|
void should_TransferTasks_When_TransferTasksWithListNotSupportingRemove() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -336,7 +336,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThatCode(call).doesNotThrowAnyException();
|
assertThatCode(call).doesNotThrowAnyException();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TransferTasksWithInvalidTasksIdList() {
|
void should_ThrowException_When_TransferTasksWithInvalidTasksIdList() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -361,7 +361,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
.hasMessage("TaskIds must not contain only invalid arguments.");
|
.hasMessage("TaskIds must not contain only invalid arguments.");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TransferEmptyTaskIdList() {
|
void should_ThrowException_When_TransferEmptyTaskIdList() {
|
||||||
TaskService taskService = taskanaEngine.getTaskService();
|
TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
@ -373,7 +373,7 @@ class TransferTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_BulkTransferTasks_When_WorkbasketKeyAndDomainIsProvided()
|
void should_BulkTransferTasks_When_WorkbasketKeyAndDomainIsProvided()
|
||||||
throws WorkbasketNotFoundException, NotAuthorizedException, InvalidArgumentException,
|
throws WorkbasketNotFoundException, NotAuthorizedException, InvalidArgumentException,
|
||||||
|
|
|
@ -39,7 +39,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
private final TaskService taskService = taskanaEngine.getTaskService();
|
private final TaskService taskService = taskanaEngine.getTaskService();
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdatePrimaryObjectReferenceOfTask_When_Requested()
|
void should_UpdatePrimaryObjectReferenceOfTask_When_Requested()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -67,7 +67,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
|
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdatePrimaryObjectReferenceOfTask_When_ObjectreferenceSystemAndSystemInstanceIsNull()
|
void should_UpdatePrimaryObjectReferenceOfTask_When_ObjectreferenceSystemAndSystemInstanceIsNull()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -96,7 +96,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
|
assertThat(updatedTask.getParentBusinessProcessId()).isEqualTo("MY_PARENT_PROCESS_ID");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_MandatoryPrimaryObjectReferenceIsNotSetOrIncomplete()
|
void should_ThrowException_When_MandatoryPrimaryObjectReferenceIsNotSetOrIncomplete()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -124,7 +124,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(InvalidArgumentException.class);
|
.isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_TaskHasAlreadyBeenUpdated()
|
void should_ThrowException_When_TaskHasAlreadyBeenUpdated()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -156,7 +156,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThatCode(updateTaskCall).doesNotThrowAnyException();
|
assertThatCode(updateTaskCall).doesNotThrowAnyException();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTaskProperties_When_ClassificationOfTaskIsChanged() throws Exception {
|
void should_UpdateTaskProperties_When_ClassificationOfTaskIsChanged() throws Exception {
|
||||||
Task task = taskService.getTask("TKI:000000000000000000000000000000000000");
|
Task task = taskService.getTask("TKI:000000000000000000000000000000000000");
|
||||||
|
@ -174,7 +174,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getDescription()).isEqualTo(updatedTask.getDescription());
|
assertThat(task.getDescription()).isEqualTo(updatedTask.getDescription());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateReadFlagOfTask_When_SetTaskReadIsCalled()
|
void should_UpdateReadFlagOfTask_When_SetTaskReadIsCalled()
|
||||||
throws TaskNotFoundException, NotAuthorizedException {
|
throws TaskNotFoundException, NotAuthorizedException {
|
||||||
|
@ -195,7 +195,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(TaskNotFoundException.class);
|
.isInstanceOf(TaskNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTask_When_CustomPropertiesOfTaskWereChanged()
|
void should_UpdateTask_When_CustomPropertiesOfTaskWereChanged()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -209,7 +209,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(updatedTask).isNotNull();
|
assertThat(updatedTask).isNotNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_ThrowException_When_ModificationOfWorkbasketKeyIsAttempted()
|
void should_ThrowException_When_ModificationOfWorkbasketKeyIsAttempted()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -221,7 +221,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(InvalidArgumentException.class);
|
.isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateNoTasks_When_UpdateTasksWithUnmatchedObjectReferenceWasCalled()
|
void should_UpdateNoTasks_When_UpdateTasksWithUnmatchedObjectReferenceWasCalled()
|
||||||
throws InvalidArgumentException {
|
throws InvalidArgumentException {
|
||||||
|
@ -241,7 +241,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(taskIds).isEmpty();
|
assertThat(taskIds).isEmpty();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTasks_When_MatchingPrimaryObjectReferenceWasChanged()
|
void should_UpdateTasks_When_MatchingPrimaryObjectReferenceWasChanged()
|
||||||
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
||||||
|
@ -268,7 +268,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTaskCustomAttributes_When_UpdateTasksIsCalled()
|
void should_UpdateTaskCustomAttributes_When_UpdateTasksIsCalled()
|
||||||
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
throws InvalidArgumentException, TaskNotFoundException, NotAuthorizedException {
|
||||||
|
@ -295,7 +295,7 @@ class UpdateTaskAccTest extends AbstractAccTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateCallbackInfo_When_RequestedByApi()
|
void should_UpdateCallbackInfo_When_RequestedByApi()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
|
|
@ -75,7 +75,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task).isNotNull();
|
assertThat(task).isNotNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddNewAttachment()
|
void testAddNewAttachment()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -95,7 +95,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
.containsOnly(task.getModified());
|
.containsOnly(task.getModified());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddValidAttachmentTwice()
|
void testAddValidAttachmentTwice()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -118,7 +118,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
.containsOnly(task.getModified());
|
.containsOnly(task.getModified());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddNewAttachmentTwiceWithoutTaskanaMethodWillThrowAttachmentPersistenceException()
|
void testAddNewAttachmentTwiceWithoutTaskanaMethodWillThrowAttachmentPersistenceException()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -138,7 +138,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(AttachmentPersistenceException.class);
|
assertThatThrownBy(call).isInstanceOf(AttachmentPersistenceException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddExistingAttachmentAgainWillUpdateWhenNotEqual()
|
void testAddExistingAttachmentAgainWillUpdateWhenNotEqual()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -174,7 +174,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
|
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddExistingAttachmentAgainWillDoNothingWhenEqual()
|
void testAddExistingAttachmentAgainWillDoNothingWhenEqual()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -198,7 +198,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getAttachments()).hasSize(attachmentCount2);
|
assertThat(task.getAttachments()).hasSize(attachmentCount2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddAttachmentAsNullValueWillBeIgnored()
|
void testAddAttachmentAsNullValueWillBeIgnored()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -232,7 +232,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
|
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testRemoveAttachment()
|
void testRemoveAttachment()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -254,7 +254,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
|
assertThat(task.getPlanned().plus(Duration.ofDays(1))).isEqualTo(task.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testRemoveAttachmentWithNullAndNotAddedId()
|
void testRemoveAttachmentWithNullAndNotAddedId()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -277,7 +277,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getAttachments()).hasSize(attachmentCount); // persisted, still same
|
assertThat(task.getAttachments()).hasSize(attachmentCount); // persisted, still same
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testUpdateAttachment()
|
void testUpdateAttachment()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
throws TaskNotFoundException, ClassificationNotFoundException, InvalidArgumentException,
|
||||||
|
@ -314,7 +314,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
|
assertThat(task.getPlanned().plus(Duration.ofDays(calendarDays))).isEqualTo(task.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void modifyExistingAttachment()
|
void modifyExistingAttachment()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -411,7 +411,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(faxFound && rohrpostFound).isTrue();
|
assertThat(faxFound && rohrpostFound).isTrue();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void replaceExistingAttachments()
|
void replaceExistingAttachments()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -472,7 +472,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
assertThat(task.getAttachments().get(0).getChannel()).isEqualTo("DHL");
|
assertThat(task.getAttachments().get(0).getChannel()).isEqualTo("DHL");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPrioDurationOfTaskFromAttachmentsAtUpdate()
|
void testPrioDurationOfTaskFromAttachmentsAtUpdate()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, ClassificationNotFoundException,
|
||||||
|
@ -535,7 +535,7 @@ class UpdateTaskAttachmentsAccTest extends AbstractAccTest {
|
||||||
.isEqualTo(readTask.getDue());
|
.isEqualTo(readTask.getDue());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testAddCustomAttributeToAttachment()
|
void testAddCustomAttributeToAttachment()
|
||||||
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws TaskNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
|
|
@ -27,7 +27,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_UpdateTaskComment_For_TaskComment()
|
void should_UpdateTaskComment_For_TaskComment()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, ConcurrencyException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, ConcurrencyException,
|
||||||
|
@ -51,7 +51,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThat(taskCommentsAfterUpdate.get(0).getTextField()).isEqualTo("updated textfield");
|
assertThat(taskCommentsAfterUpdate.get(0).getTextField()).isEqualTo("updated textfield");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToUpdateTaskComment_When_UserHasNoAuthorization()
|
void should_FailToUpdateTaskComment_When_UserHasNoAuthorization()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
||||||
|
@ -78,7 +78,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
|
||||||
.isEqualTo("some other text in textfield");
|
.isEqualTo("some other text in textfield");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToUpdateTaskComment_When_UserTriesToUpdateTaskByManipulatingOwner()
|
void should_FailToUpdateTaskComment_When_UserTriesToUpdateTaskByManipulatingOwner()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
||||||
|
@ -99,7 +99,7 @@ public class UpdateTaskCommentAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(updateTaskCommentCall).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(updateTaskCommentCall).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void should_FailToUpdateTaskComment_When_TaskCommentWasModifiedConcurrently()
|
void should_FailToUpdateTaskComment_When_TaskCommentWasModifiedConcurrently()
|
||||||
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
throws TaskCommentNotFoundException, NotAuthorizedException, TaskNotFoundException,
|
||||||
|
|
|
@ -33,7 +33,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimTask()
|
void testClaimTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -53,7 +53,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(claimedTask.getOwner()).isEqualTo("user-1-2");
|
assertThat(claimedTask.getOwner()).isEqualTo("user-1-2");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfTaskIsAlreadyClaimed()
|
void testThrowsExceptionIfTaskIsAlreadyClaimed()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -69,7 +69,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testClaimAlreadyClaimedByCallerTask()
|
void testClaimAlreadyClaimedByCallerTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -80,7 +80,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
taskService.claim(task.getId());
|
taskService.claim(task.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceClaimTaskWhichIsAlreadyClaimedByAnotherUser()
|
void testForceClaimTaskWhichIsAlreadyClaimedByAnotherUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -96,7 +96,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCancelClaimTask()
|
void testCancelClaimTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -114,7 +114,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(unclaimedTask.getOwner()).isNull();
|
assertThat(unclaimedTask.getOwner()).isNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfCancelClaimOfTaskFromAnotherUser()
|
void testThrowsExceptionIfCancelClaimOfTaskFromAnotherUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -130,7 +130,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceCancelClaimOfTaskFromAnotherUser()
|
void testForceCancelClaimOfTaskFromAnotherUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -148,7 +148,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(unclaimedTask.getOwner()).isNull();
|
assertThat(unclaimedTask.getOwner()).isNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCompleteTask()
|
void testCompleteTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -170,7 +170,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceCompleteUnclaimedTask()
|
void testForceCompleteUnclaimedTask()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -189,7 +189,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testThrowsExceptionIfCompletingClaimedTaskOfAnotherUser()
|
void testThrowsExceptionIfCompletingClaimedTaskOfAnotherUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException {
|
throws NotAuthorizedException, TaskNotFoundException {
|
||||||
|
@ -205,7 +205,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
assertThatThrownBy(call).isInstanceOf(InvalidOwnerException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testForceCompleteClaimedTaskOfAnotherUser()
|
void testForceCompleteClaimedTaskOfAnotherUser()
|
||||||
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
throws NotAuthorizedException, TaskNotFoundException, InvalidStateException,
|
||||||
|
@ -224,7 +224,7 @@ class WorkOnTaskAccTest extends AbstractAccTest {
|
||||||
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
assertThat(completedTask.getOwner()).isEqualTo("user-1-2");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-2", groups = "group_1")
|
@WithAccessId(user = "user-1-2", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testBulkCompleteTasks()
|
void testBulkCompleteTasks()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, TaskNotFoundException {
|
throws NotAuthorizedException, InvalidArgumentException, TaskNotFoundException {
|
||||||
|
|
|
@ -22,7 +22,7 @@ import pro.taskana.workbasket.api.exceptions.WorkbasketNotFoundException;
|
||||||
@ExtendWith(JaasExtension.class)
|
@ExtendWith(JaasExtension.class)
|
||||||
class TaskRoutingAccTest extends AbstractAccTest {
|
class TaskRoutingAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithoutWorkbasketAndVoidNewTaskMethod()
|
void testCreateTaskWithoutWorkbasketAndVoidNewTaskMethod()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -45,7 +45,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
|
||||||
.isEqualTo(createdTask.getWorkbasketSummary().getId());
|
.isEqualTo(createdTask.getWorkbasketSummary().getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithNullWorkbasket()
|
void testCreateTaskWithNullWorkbasket()
|
||||||
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
throws WorkbasketNotFoundException, ClassificationNotFoundException, NotAuthorizedException,
|
||||||
|
@ -60,7 +60,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(InvalidArgumentException.class);
|
.isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithNullRouting() throws InvalidArgumentException {
|
void testCreateTaskWithNullRouting() throws InvalidArgumentException {
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ class TaskRoutingAccTest extends AbstractAccTest {
|
||||||
.isInstanceOf(InvalidArgumentException.class);
|
.isInstanceOf(InvalidArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCreateTaskWithRoutingToMultipleWorkbaskets() throws InvalidArgumentException {
|
void testCreateTaskWithRoutingToMultipleWorkbaskets() throws InvalidArgumentException {
|
||||||
|
|
||||||
|
|
|
@ -80,7 +80,7 @@ class CreateWorkbasketAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void should_beAbleToCreateNewWorkbasket_When_WorkbasketCopy() throws Exception {
|
void should_beAbleToCreateNewWorkbasket_When_WorkbasketCopy() throws Exception {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -89,7 +89,7 @@ class DeleteWorkbasketAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-1",
|
user = "user-1-1",
|
||||||
groups = {"teamlead_1", "group_1", "businessadmin"})
|
groups = {"teamlead_1", "group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testDeleteWorkbasketAlsoAsDistributionTarget()
|
void testDeleteWorkbasketAlsoAsDistributionTarget()
|
||||||
throws WorkbasketNotFoundException, NotAuthorizedException {
|
throws WorkbasketNotFoundException, NotAuthorizedException {
|
||||||
|
|
|
@ -25,7 +25,7 @@ class DeleteWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
ThrowingCallable deleteWorkbasketAccessItemCall =
|
ThrowingCallable deleteWorkbasketAccessItemCall =
|
||||||
() -> {
|
() -> {
|
||||||
workbasketService.deleteWorkbasketAccessItemsForAccessId("group_1");
|
workbasketService.deleteWorkbasketAccessItemsForAccessId("group-1");
|
||||||
};
|
};
|
||||||
|
|
||||||
assertThatThrownBy(deleteWorkbasketAccessItemCall).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(deleteWorkbasketAccessItemCall).isInstanceOf(NotAuthorizedException.class);
|
||||||
|
|
|
@ -78,7 +78,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-1",
|
user = "user-1-1",
|
||||||
groups = {"teamlead-1", "group_1", "group_2", "businessadmin"})
|
groups = {"teamlead-1", "group-1", "group-2", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testDistributionTargetCallsWithNonExistingWorkbaskets()
|
void testDistributionTargetCallsWithNonExistingWorkbaskets()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -124,7 +124,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
assertThat(distributionTargets).hasSize(4);
|
assertThat(distributionTargets).hasSize(4);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@WithAccessId(user = "taskadmin")
|
@WithAccessId(user = "taskadmin")
|
||||||
@TestTemplate
|
@TestTemplate
|
||||||
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdminAndMakesDistTargetCalls() {
|
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdminAndMakesDistTargetCalls() {
|
||||||
|
@ -169,7 +169,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2", "businessadmin"})
|
groups = {"group-1", "group-2", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testAddAndRemoveDistributionTargets()
|
void testAddAndRemoveDistributionTargets()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -224,7 +224,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testAddDistributionTargetsFailsNotAuthorized()
|
void testAddDistributionTargetsFailsNotAuthorized()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -247,7 +247,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2", "businessadmin"})
|
groups = {"group-1", "group-2", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testSetDistributionTargets()
|
void testSetDistributionTargets()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, SQLException {
|
throws NotAuthorizedException, WorkbasketNotFoundException, SQLException {
|
||||||
|
@ -277,7 +277,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testGetDistributionSourcesById() throws NotAuthorizedException, WorkbasketNotFoundException {
|
void testGetDistributionSourcesById() throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -299,7 +299,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testGetDistributionSourcesByKeyDomain()
|
void testGetDistributionSourcesByKeyDomain()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -334,7 +334,7 @@ class DistributionTargetsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-2-2",
|
user = "user-2-2",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
@Test
|
@Test
|
||||||
void testQueryDistributionSourcesThrowsWorkbasketNotFound() {
|
void testQueryDistributionSourcesThrowsWorkbasketNotFound() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -28,7 +28,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketById() throws NotAuthorizedException, WorkbasketNotFoundException {
|
void testGetWorkbasketById() throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -83,7 +83,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(retrievedWorkbasket).isNotNull();
|
assertThat(retrievedWorkbasket).isNotNull();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketByKeyAndDomain()
|
void testGetWorkbasketByKeyAndDomain()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -106,7 +106,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(workbasket.getCustom4()).isEqualTo("custom4");
|
assertThat(workbasket.getCustom4()).isEqualTo("custom4");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketPermissions() {
|
void testGetWorkbasketPermissions() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -120,7 +120,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(permissions.contains(WorkbasketPermission.APPEND)).isTrue();
|
assertThat(permissions.contains(WorkbasketPermission.APPEND)).isTrue();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketPermissionsForInvalidWorkbasketId() {
|
void testGetWorkbasketPermissionsForInvalidWorkbasketId() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -130,7 +130,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(permissions).isEmpty();
|
assertThat(permissions).isEmpty();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketAsSummary() throws NotAuthorizedException, WorkbasketNotFoundException {
|
void testGetWorkbasketAsSummary() throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -196,7 +196,7 @@ class GetWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetWorkbasketByIdNotExisting() {
|
void testGetWorkbasketByIdNotExisting() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -36,7 +36,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
workbasketService = taskanaEngine.getWorkbasketService();
|
workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1_1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryAllForUserMultipleTimes() {
|
void testQueryAllForUserMultipleTimes() {
|
||||||
WorkbasketQuery query = workbasketService.createWorkbasketQuery();
|
WorkbasketQuery query = workbasketService.createWorkbasketQuery();
|
||||||
|
@ -78,7 +78,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(workbaskets).hasSize(count);
|
assertThat(workbaskets).hasSize(count);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketValuesForColumnName() {
|
void testQueryWorkbasketValuesForColumnName() {
|
||||||
List<String> columnValueList = workbasketService.createWorkbasketQuery().listValues(NAME, null);
|
List<String> columnValueList = workbasketService.createWorkbasketQuery().listValues(NAME, null);
|
||||||
|
@ -95,7 +95,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(columnValueList).hasSize(4);
|
assertThat(columnValueList).hasSize(4);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByDomain() {
|
void testQueryWorkbasketByDomain() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -103,7 +103,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(1);
|
assertThat(results).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByDomainAndType() {
|
void testQueryWorkbasketByDomainAndType() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -115,7 +115,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(6);
|
assertThat(results).hasSize(6);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByName() {
|
void testQueryWorkbasketByName() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -127,7 +127,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
.isEqualTo("GPK_KSC");
|
.isEqualTo("GPK_KSC");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByNameStartsWith() {
|
void testQueryWorkbasketByNameStartsWith() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -135,7 +135,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(3);
|
assertThat(results).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByNameContains() {
|
void testQueryWorkbasketByNameContains() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -146,7 +146,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(5);
|
assertThat(results).hasSize(5);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByNameContainsCaseInsensitive() {
|
void testQueryWorkbasketByNameContainsCaseInsensitive() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -154,7 +154,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(2);
|
assertThat(results).hasSize(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByDescription() {
|
void testQueryWorkbasketByDescription() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -167,7 +167,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(9);
|
assertThat(results).hasSize(9);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByOwnerLike() {
|
void testQueryWorkbasketByOwnerLike() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -179,7 +179,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(1);
|
assertThat(results).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByKey() {
|
void testQueryWorkbasketByKey() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -187,7 +187,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(1);
|
assertThat(results).hasSize(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByMultipleKeys() {
|
void testQueryWorkbasketByMultipleKeys() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -195,7 +195,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(2);
|
assertThat(results).hasSize(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByMultipleKeysWithUnknownKey() {
|
void testQueryWorkbasketByMultipleKeysWithUnknownKey() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -203,7 +203,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(2);
|
assertThat(results).hasSize(2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByKeyContains() {
|
void testQueryWorkbasketByKeyContains() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -211,7 +211,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(3);
|
assertThat(results).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByKeyContainsIgnoreCase() {
|
void testQueryWorkbasketByKeyContainsIgnoreCase() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -219,7 +219,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(3);
|
assertThat(results).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByKeyOrNameContainsIgnoreCase() {
|
void testQueryWorkbasketByKeyOrNameContainsIgnoreCase() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -227,7 +227,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(9);
|
assertThat(results).hasSize(9);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByNameStartsWithSortedByNameAscending() {
|
void testQueryWorkbasketByNameStartsWithSortedByNameAscending() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -279,7 +279,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
.isSortedAccordingTo(CASE_INSENSITIVE_ORDER.reversed());
|
.isSortedAccordingTo(CASE_INSENSITIVE_ORDER.reversed());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByCreated() {
|
void testQueryWorkbasketByCreated() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -287,7 +287,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(9);
|
assertThat(results).hasSize(9);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByModified() {
|
void testQueryWorkbasketByModified() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -310,14 +310,14 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.nameLike("%")
|
.nameLike("%")
|
||||||
.accessIdsHavePermission(
|
.accessIdsHavePermission(
|
||||||
WorkbasketPermission.TRANSFER, "teamlead-1", "group_1", "group_2")
|
WorkbasketPermission.TRANSFER, "teamlead-1", "group-1", "group-2")
|
||||||
.orderByName(DESCENDING)
|
.orderByName(DESCENDING)
|
||||||
.list();
|
.list();
|
||||||
|
|
||||||
assertThat(results).hasSize(13);
|
assertThat(results).hasSize(13);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByDomainLike() {
|
void testQueryWorkbasketByDomainLike() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -346,7 +346,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
.containsOnly(toArray(expectedIds));
|
.containsOnly(toArray(expectedIds));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "admin", groups = "group_1")
|
@WithAccessId(user = "admin", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryWorkbasketByOwnerInOrderByDomainDesc() {
|
void testQueryWorkbasketByOwnerInOrderByDomainDesc() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -361,7 +361,7 @@ class QueryWorkbasketAccTest extends AbstractAccTest {
|
||||||
assertThat(results.get(1).getId()).isEqualTo("WBI:100000000000000000000000000000000001");
|
assertThat(results.get(1).getId()).isEqualTo("WBI:100000000000000000000000000000000001");
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryForCustom1In() {
|
void testQueryForCustom1In() {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
|
|
@ -59,7 +59,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketAccessItem> results =
|
List<WorkbasketAccessItem> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketAccessItemQuery()
|
.createWorkbasketAccessItemQuery()
|
||||||
.accessIdIn("user-1-1", "group_1")
|
.accessIdIn("user-1-1", "group-1")
|
||||||
.list();
|
.list();
|
||||||
assertThat(results).hasSize(8);
|
assertThat(results).hasSize(8);
|
||||||
}
|
}
|
||||||
|
@ -73,7 +73,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
|
||||||
() -> {
|
() -> {
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketAccessItemQuery()
|
.createWorkbasketAccessItemQuery()
|
||||||
.accessIdIn("user-1-1", "group_1")
|
.accessIdIn("user-1-1", "group-1")
|
||||||
.list();
|
.list();
|
||||||
};
|
};
|
||||||
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
assertThatThrownBy(call).isInstanceOf(NotAuthorizedException.class);
|
||||||
|
@ -86,7 +86,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
|
||||||
WorkbasketAccessItemQuery query =
|
WorkbasketAccessItemQuery query =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketAccessItemQuery()
|
.createWorkbasketAccessItemQuery()
|
||||||
.accessIdIn("user-1-1", "group_1")
|
.accessIdIn("user-1-1", "group-1")
|
||||||
.orderByAccessId(SortDirection.DESCENDING)
|
.orderByAccessId(SortDirection.DESCENDING)
|
||||||
.orderByWorkbasketId(SortDirection.DESCENDING);
|
.orderByWorkbasketId(SortDirection.DESCENDING);
|
||||||
List<WorkbasketAccessItem> results = query.list();
|
List<WorkbasketAccessItem> results = query.list();
|
||||||
|
@ -102,7 +102,7 @@ class QueryWorkbasketAccessItemsAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketAccessItem> results =
|
List<WorkbasketAccessItem> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketAccessItemQuery()
|
.createWorkbasketAccessItemQuery()
|
||||||
.accessIdIn("user-1-1", "group_1")
|
.accessIdIn("user-1-1", "group-1")
|
||||||
.workbasketIdIn(
|
.workbasketIdIn(
|
||||||
"WBI:100000000000000000000000000000000006",
|
"WBI:100000000000000000000000000000000006",
|
||||||
"WBI:100000000000000000000000000000000002")
|
"WBI:100000000000000000000000000000000002")
|
||||||
|
|
|
@ -69,7 +69,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1")
|
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
|
||||||
.list();
|
.list();
|
||||||
assertThat(results).hasSize(6);
|
assertThat(results).hasSize(6);
|
||||||
}
|
}
|
||||||
|
@ -82,7 +82,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1")
|
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
|
||||||
.orderByName(asc)
|
.orderByName(asc)
|
||||||
.list();
|
.list();
|
||||||
assertThat(results).hasSize(6);
|
assertThat(results).hasSize(6);
|
||||||
|
@ -97,7 +97,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group_1")
|
.accessIdsHavePermission(WorkbasketPermission.APPEND, "user-1-1", "group-1")
|
||||||
.orderByName(desc)
|
.orderByName(desc)
|
||||||
.orderByKey(asc)
|
.orderByKey(asc)
|
||||||
.list();
|
.list();
|
||||||
|
@ -113,7 +113,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
workbasketService
|
workbasketService
|
||||||
.createWorkbasketQuery()
|
.createWorkbasketQuery()
|
||||||
.accessIdsHavePermission(WorkbasketPermission.DISTRIBUTE, "user-1-1", "group_1")
|
.accessIdsHavePermission(WorkbasketPermission.DISTRIBUTE, "user-1-1", "group-1")
|
||||||
.list();
|
.list();
|
||||||
assertThat(results).hasSize(2);
|
assertThat(results).hasSize(2);
|
||||||
List<String> keys = new ArrayList<>(Arrays.asList("GPK_KSC_1", "USER-1-1"));
|
List<String> keys = new ArrayList<>(Arrays.asList("GPK_KSC_1", "USER-1-1"));
|
||||||
|
@ -122,7 +122,7 @@ class QueryWorkbasketByPermissionAccTest extends AbstractAccTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testQueryAllTransferTargetsForUserAndGroupFromSubject() throws SystemException {
|
void testQueryAllTransferTargetsForUserAndGroupFromSubject() throws SystemException {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -20,7 +20,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
super();
|
super();
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetFirstPageOfWorkbasketQueryWithOffset() {
|
void testGetFirstPageOfWorkbasketQueryWithOffset() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -29,7 +29,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(5);
|
assertThat(results).hasSize(5);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testGetSecondPageOfWorkbasketQueryWithOffset() {
|
void testGetSecondPageOfWorkbasketQueryWithOffset() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -38,7 +38,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(4);
|
assertThat(results).hasSize(4);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testListOffsetAndLimitOutOfBounds() {
|
void testListOffsetAndLimitOutOfBounds() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -57,7 +57,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(3);
|
assertThat(results).hasSize(3);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPaginationWithPages() {
|
void testPaginationWithPages() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -103,7 +103,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(4);
|
assertThat(results).hasSize(4);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testPaginationNullAndNegativeLimitsIgnoring() {
|
void testPaginationNullAndNegativeLimitsIgnoring() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -139,7 +139,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(results).hasSize(9);
|
assertThat(results).hasSize(9);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testCountOfWorkbasketQuery() {
|
void testCountOfWorkbasketQuery() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -147,7 +147,7 @@ class QueryWorkbasketsWithPaginationAccTest extends AbstractAccTest {
|
||||||
assertThat(count).isEqualTo(9L);
|
assertThat(count).isEqualTo(9L);
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "teamlead-1", groups = "group_1")
|
@WithAccessId(user = "teamlead-1", groups = "group-1")
|
||||||
@Test
|
@Test
|
||||||
void testWorkbasketQueryDomA() {
|
void testWorkbasketQueryDomA() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -27,7 +27,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateWorkbasket()
|
void testUpdateWorkbasket()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException, ConcurrencyException {
|
throws NotAuthorizedException, WorkbasketNotFoundException, ConcurrencyException {
|
||||||
|
@ -61,7 +61,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateWorkbasketWithConcurrentModificationShouldThrowException()
|
void testUpdateWorkbasketWithConcurrentModificationShouldThrowException()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -79,7 +79,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateWorkbasketOfNonExistingWorkbasketShouldThrowException()
|
void testUpdateWorkbasketOfNonExistingWorkbasketShouldThrowException()
|
||||||
throws NotAuthorizedException, WorkbasketNotFoundException {
|
throws NotAuthorizedException, WorkbasketNotFoundException {
|
||||||
|
@ -96,7 +96,7 @@ class UpdateWorkbasketAccTest extends AbstractAccTest {
|
||||||
.isThrownBy(() -> workbasketService.updateWorkbasket(workbasket));
|
.isThrownBy(() -> workbasketService.updateWorkbasket(workbasket));
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithAccessId(user = "user-1-1", groups = "group_1")
|
@WithAccessId(user = "user-1-1", groups = "group-1")
|
||||||
@WithAccessId(user = "taskadmin")
|
@WithAccessId(user = "taskadmin")
|
||||||
@TestTemplate
|
@TestTemplate
|
||||||
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdmin()
|
void should_ThrowException_When_UserRoleIsNotAdminOrBusinessAdmin()
|
||||||
|
|
|
@ -23,7 +23,7 @@ public class UpdateWorkbasketAuthorizations2AccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdatedAccessItemListToEmptyList() throws Exception {
|
void testUpdatedAccessItemListToEmptyList() throws Exception {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
|
|
@ -60,7 +60,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateWorkbasketAccessItemSucceeds()
|
void testUpdateWorkbasketAccessItemSucceeds()
|
||||||
throws InvalidArgumentException, NotAuthorizedException, WorkbasketNotFoundException,
|
throws InvalidArgumentException, NotAuthorizedException, WorkbasketNotFoundException,
|
||||||
|
@ -96,7 +96,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdateWorkbasketAccessItemRejected()
|
void testUpdateWorkbasketAccessItemRejected()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
||||||
|
@ -145,7 +145,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "user-1-1",
|
user = "user-1-1",
|
||||||
groups = {"group_2", "businessadmin"})
|
groups = {"group-2", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdatedAccessItemLeadsToNotAuthorizedException()
|
void testUpdatedAccessItemLeadsToNotAuthorizedException()
|
||||||
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
throws NotAuthorizedException, InvalidArgumentException, WorkbasketNotFoundException,
|
||||||
|
@ -155,7 +155,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
String wbKey = "USER-2-1";
|
String wbKey = "USER-2-1";
|
||||||
String wbDomain = "DOMAIN_A";
|
String wbDomain = "DOMAIN_A";
|
||||||
final String groupName = "group_2";
|
final String groupName = "group-2";
|
||||||
|
|
||||||
Task newTask = taskService.newTask(wbKey, wbDomain);
|
Task newTask = taskService.newTask(wbKey, wbDomain);
|
||||||
newTask.setClassificationKey("T2100");
|
newTask.setClassificationKey("T2100");
|
||||||
|
@ -191,7 +191,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testUpdatedAccessItemList() throws Exception {
|
void testUpdatedAccessItemList() throws Exception {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -231,7 +231,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testInsertAccessItemList() throws Exception {
|
void testInsertAccessItemList() throws Exception {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -269,7 +269,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
|
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead_1",
|
user = "teamlead_1",
|
||||||
groups = {"group_1", "businessadmin"})
|
groups = {"group-1", "businessadmin"})
|
||||||
@Test
|
@Test
|
||||||
void testDeleteAccessItemForAccessItemId() throws Exception {
|
void testDeleteAccessItemForAccessItemId() throws Exception {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
|
@ -282,7 +282,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
List<WorkbasketAccessItem> accessList = new ArrayList<>(originalList);
|
List<WorkbasketAccessItem> accessList = new ArrayList<>(originalList);
|
||||||
WorkbasketAccessItem newItem = workbasketService.newWorkbasketAccessItem(wbId, "group_1");
|
WorkbasketAccessItem newItem = workbasketService.newWorkbasketAccessItem(wbId, "group-1");
|
||||||
accessList.add(newItem);
|
accessList.add(newItem);
|
||||||
assertThat(accessList).isNotEqualTo(originalList);
|
assertThat(accessList).isNotEqualTo(originalList);
|
||||||
workbasketService.setWorkbasketAccessItems(wbId, accessList);
|
workbasketService.setWorkbasketAccessItems(wbId, accessList);
|
||||||
|
@ -305,7 +305,7 @@ class UpdateWorkbasketAuthorizationsAccTest extends AbstractAccTest {
|
||||||
@Test
|
@Test
|
||||||
void testDeleteAccessItemsForAccessId() throws NotAuthorizedException {
|
void testDeleteAccessItemsForAccessId() throws NotAuthorizedException {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
final String accessId = "group_1";
|
final String accessId = "group-1";
|
||||||
final long accessIdCountBefore =
|
final long accessIdCountBefore =
|
||||||
workbasketService.createWorkbasketAccessItemQuery().accessIdIn(accessId).count();
|
workbasketService.createWorkbasketAccessItemQuery().accessIdIn(accessId).count();
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ class WorkbasketQueryWithOrderedPaginationAccTest extends AbstractAccTest {
|
||||||
@Test
|
@Test
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
void testGetFirstPageOfTaskQueryWithOffset() {
|
void testGetFirstPageOfTaskQueryWithOffset() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
@ -42,7 +42,7 @@ class WorkbasketQueryWithOrderedPaginationAccTest extends AbstractAccTest {
|
||||||
@Test
|
@Test
|
||||||
@WithAccessId(
|
@WithAccessId(
|
||||||
user = "teamlead-1",
|
user = "teamlead-1",
|
||||||
groups = {"group_1", "group_2"})
|
groups = {"group-1", "group-2"})
|
||||||
void testGetSecondPageOfTaskQueryWithOffset() {
|
void testGetSecondPageOfTaskQueryWithOffset() {
|
||||||
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
WorkbasketService workbasketService = taskanaEngine.getWorkbasketService();
|
||||||
List<WorkbasketSummary> results =
|
List<WorkbasketSummary> results =
|
||||||
|
|
|
@ -7,23 +7,23 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
-- group internal access
|
-- group internal access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- teamlead substitution
|
-- teamlead substitution
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- cross team tranfers
|
-- cross team tranfers
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group_1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group-1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group_1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group-1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- Team GPK access
|
-- Team GPK access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group_1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group-1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group_2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group-2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
-- Cross team GPK access
|
-- Cross team GPK access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
|
@ -31,10 +31,10 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
|
|
||||||
-- Access to other domains
|
-- Access to other domains
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group_1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group-1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group_2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group-2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
|
|
||||||
-- Access to workbaskets for sorting test
|
-- Access to workbaskets for sorting test
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
|
|
|
@ -7,23 +7,23 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000005', 'WBI:100000000000000000000000000000000008', 'user-2-1', 'Simone Müller' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000006', 'WBI:100000000000000000000000000000000009', 'user-2-2', 'Tim Schläfrig' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
-- group internal access
|
-- group internal access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000007', 'WBI:100000000000000000000000000000000004', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000008', 'WBI:100000000000000000000000000000000005', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000009', 'WBI:100000000000000000000000000000000006', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group_1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000010', 'WBI:100000000000000000000000000000000007', 'group-1', 'DevelopersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000011', 'WBI:100000000000000000000000000000000008', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000012', 'WBI:100000000000000000000000000000000009', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- teamlead substitution
|
-- teamlead substitution
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000013', 'WBI:100000000000000000000000000000000004', 'teamlead-2', 'Frauke Faul' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000014', 'WBI:100000000000000000000000000000000005', 'teamlead-1', 'Titus Toll' , true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- cross team tranfers
|
-- cross team tranfers
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000015', 'WBI:100000000000000000000000000000000006', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group_2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000016', 'WBI:100000000000000000000000000000000007', 'group-2', 'UsersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group_1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000017', 'WBI:100000000000000000000000000000000008', 'group-1', 'DevelopersGroup' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group_1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000018', 'WBI:100000000000000000000000000000000009', 'group-1', 'DevelopersGroup' , true, false, true, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
-- Team GPK access
|
-- Team GPK access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group_1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000019', 'WBI:100000000000000000000000000000000002', 'group-1', 'DevelopersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group_2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000020', 'WBI:100000000000000000000000000000000003', 'group-2', 'UsersGroup' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
-- Cross team GPK access
|
-- Cross team GPK access
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000021', 'WBI:100000000000000000000000000000000001', 'teamlead-1', 'Titus Toll' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000022', 'WBI:100000000000000000000000000000000001', 'teamlead-2', 'Frauke Faul' , true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
|
@ -31,10 +31,10 @@ INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:10000000000000000000000000000000
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000123', 'WBI:100000000000000000000000000000000010', 'teamlead-1', 'Titus Toll' , true, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
|
|
||||||
-- Access to other domains
|
-- Access to other domains
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group_1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000023', 'WBI:100000000000000000000000000000000012', 'group-1', 'DevelopersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group_2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000024', 'WBI:100000000000000000000000000000000013', 'group-2', 'UsersGroup' , true, false, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000025', 'WBI:100000000000000000000000000000000014', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group_2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WAI:100000000000000000000000000000000026', 'WBI:100000000000000000000000000000000015', 'group-2', 'UsersGroup' , true, true, true, true, false, false, false, false, false, false, false, false, false, false, false, false, false);
|
||||||
|
|
||||||
-- Access to workbaskets for sorting test
|
-- Access to workbaskets for sorting test
|
||||||
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
INSERT INTO WORKBASKET_ACCESS_LIST VALUES ('WBI:000000000000000000000000000000000900', 'WBI:000000000000000000000000000000000900', 'max', 'Behrendt, Maximilian', true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true, true);
|
||||||
|
|
Loading…
Reference in New Issue