mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-31 17:39:05 +00:00
RM-7062 Fix automation tests
This commit is contained in:
@@ -151,21 +151,6 @@ public class AuditAddToHoldTests extends BaseRMRestTest
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Data provider with invalid users that can not add content to a hold
|
|
||||||
*
|
|
||||||
* @return the userModel
|
|
||||||
*/
|
|
||||||
@DataProvider (name = "invalidUsersForAddToHold")
|
|
||||||
public Object[][] getInvalidUsersForAddToHold()
|
|
||||||
{
|
|
||||||
return new UserModel[][]
|
|
||||||
{
|
|
||||||
{ rmManagerNoReadOnHold },
|
|
||||||
{ rmManagerNoReadOnNode }
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Given a document/record/record folder is added to a hold
|
* Given a document/record/record folder is added to a hold
|
||||||
* When I view the audit log
|
* When I view the audit log
|
||||||
@@ -269,11 +254,11 @@ public class AuditAddToHoldTests extends BaseRMRestTest
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Given a document is added to a hold
|
* Given a document is added to a hold
|
||||||
* When I view the audit log as an user with no Read permissions over the hold or the document
|
* When I view the audit log as an user with no Read permissions over the document
|
||||||
* Then the add to hold entry isn't visible
|
* Then the add to hold entry isn't visible
|
||||||
*/
|
*/
|
||||||
@Test (dataProvider = "invalidUsersForAddToHold")
|
@Test
|
||||||
public void addToHoldAuditEntryNotVisible(UserModel user)
|
public void addToHoldAuditEntryNotVisible()
|
||||||
{
|
{
|
||||||
STEP("Create a new file");
|
STEP("Create a new file");
|
||||||
FileModel contentToBeAdded = dataContent.usingAdmin().usingSite(privateSite)
|
FileModel contentToBeAdded = dataContent.usingAdmin().usingSite(privateSite)
|
||||||
@@ -285,7 +270,33 @@ public class AuditAddToHoldTests extends BaseRMRestTest
|
|||||||
|
|
||||||
STEP("Check that an user with no Read permissions can't see the entry for the add to hold event.");
|
STEP("Check that an user with no Read permissions can't see the entry for the add to hold event.");
|
||||||
assertTrue("The list of events should not contain Add to Hold entry ",
|
assertTrue("The list of events should not contain Add to Hold entry ",
|
||||||
rmAuditService.getAuditEntriesFilteredByEvent(user, ADD_TO_HOLD).isEmpty());
|
rmAuditService.getAuditEntriesFilteredByEvent(rmManagerNoReadOnNode, ADD_TO_HOLD).isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given a document is added to a hold
|
||||||
|
* When I view the audit log as an user with no Read permissions over the hold
|
||||||
|
* Then the the hold name is replaced in the add to hold entry
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void addToHoldAuditEntryHoldNameNotVisible()
|
||||||
|
{
|
||||||
|
STEP("Create a new file");
|
||||||
|
FileModel contentToBeAdded = dataContent.usingAdmin().usingSite(privateSite)
|
||||||
|
.createContent(CMISUtil.DocumentType.TEXT_PLAIN);
|
||||||
|
rmAuditService.clearAuditLog();
|
||||||
|
|
||||||
|
STEP("Add file to hold.");
|
||||||
|
holdsAPI.addItemToHold(rmAdmin.getUsername(), rmAdmin.getPassword(), contentToBeAdded.getNodeRefWithoutVersion(), HOLD1);
|
||||||
|
|
||||||
|
auditEntries = rmAuditService.getAuditEntriesFilteredByEvent(rmManagerNoReadOnHold, ADD_TO_HOLD);
|
||||||
|
|
||||||
|
STEP("Check that an user with no Read permissions can't see the hold name in the add to hold event.");
|
||||||
|
String replacementHoldName = "You don't have permission to view this hold.";
|
||||||
|
assertEquals("The list of events should contain the Add to Hold entry", 1, auditEntries.size());
|
||||||
|
assertTrue("The hold name should not be visible in the Add to Hold entry ",
|
||||||
|
auditEntries.stream().anyMatch(entry -> entry.getChangedValues().contains(
|
||||||
|
ImmutableMap.of("new", replacementHoldName, "previous", "", "name", "Hold Name"))));
|
||||||
}
|
}
|
||||||
|
|
||||||
@AfterClass (alwaysRun = true)
|
@AfterClass (alwaysRun = true)
|
||||||
|
@@ -162,21 +162,6 @@ public class AuditRemoveFromHoldTests extends BaseRMRestTest
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Data provider with invalid users that can not remove content from a hold
|
|
||||||
*
|
|
||||||
* @return the userModel
|
|
||||||
*/
|
|
||||||
@DataProvider (name = "invalidUsersForRemoveFromHold")
|
|
||||||
public Object[][] getInvalidUsersForRemoveFromHold()
|
|
||||||
{
|
|
||||||
return new UserModel[][]
|
|
||||||
{
|
|
||||||
{ rmManagerNoReadOnHold },
|
|
||||||
{ rmManagerNoReadOnNode }
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Given a document/record/record folder is removed from a hold
|
* Given a document/record/record folder is removed from a hold
|
||||||
* When I view the audit log
|
* When I view the audit log
|
||||||
@@ -280,11 +265,11 @@ public class AuditRemoveFromHoldTests extends BaseRMRestTest
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Given a document/record/record folder is removed from a hold
|
* Given a document/record/record folder is removed from a hold
|
||||||
* When I view the audit log as an user with no Read permissions over the hold or the node
|
* When I view the audit log as an user with no Read permissions over the node
|
||||||
* Then the remove from hold entry isn't visible
|
* Then the remove from hold entry isn't visible
|
||||||
*/
|
*/
|
||||||
@Test (dataProvider = "invalidUsersForRemoveFromHold")
|
@Test
|
||||||
public void removeFromHoldAuditEntryNotVisible(UserModel user)
|
public void removeFromHoldAuditEntryNotVisible()
|
||||||
{
|
{
|
||||||
STEP("Add content to a hold.");
|
STEP("Add content to a hold.");
|
||||||
FileModel heldFile = dataContent.usingAdmin().usingSite(privateSite)
|
FileModel heldFile = dataContent.usingAdmin().usingSite(privateSite)
|
||||||
@@ -298,7 +283,35 @@ public class AuditRemoveFromHoldTests extends BaseRMRestTest
|
|||||||
|
|
||||||
STEP("Check that an user with no Read permissions can't see the entry for the remove from hold event.");
|
STEP("Check that an user with no Read permissions can't see the entry for the remove from hold event.");
|
||||||
assertTrue("The list of events should not contain Remove from Hold entry ",
|
assertTrue("The list of events should not contain Remove from Hold entry ",
|
||||||
rmAuditService.getAuditEntriesFilteredByEvent(user, REMOVE_FROM_HOLD).isEmpty());
|
rmAuditService.getAuditEntriesFilteredByEvent(rmManagerNoReadOnNode, REMOVE_FROM_HOLD).isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given a document/record/record folder is removed from a hold
|
||||||
|
* When I view the audit log as an user with no Read permissions over the hold
|
||||||
|
* Then the the hold name is replaced in the remove from hold entry
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void removeFromHoldAuditEntryHoldNameNotVisible()
|
||||||
|
{
|
||||||
|
STEP("Add content to a hold.");
|
||||||
|
FileModel heldFile = dataContent.usingAdmin().usingSite(privateSite)
|
||||||
|
.createContent(CMISUtil.DocumentType.TEXT_PLAIN);
|
||||||
|
holdsAPI.addItemToHold(rmAdmin.getUsername(), rmAdmin.getPassword(), heldFile.getNodeRefWithoutVersion(), HOLD1);
|
||||||
|
|
||||||
|
rmAuditService.clearAuditLog();
|
||||||
|
|
||||||
|
STEP("Remove held content from the hold.");
|
||||||
|
holdsAPI.removeItemFromHold(rmAdmin.getUsername(), rmAdmin.getPassword(), heldFile.getNodeRefWithoutVersion(), HOLD1);
|
||||||
|
|
||||||
|
auditEntries = rmAuditService.getAuditEntriesFilteredByEvent(rmManagerNoReadOnHold, REMOVE_FROM_HOLD);
|
||||||
|
|
||||||
|
STEP("Check that an user with no Read permissions can't see the hold name in the remove from hold event.");
|
||||||
|
String replacementHoldName = "You don't have permission to view this hold.";
|
||||||
|
assertEquals("The list of events should contain the Remove from Hold entry", 1, auditEntries.size());
|
||||||
|
assertTrue("The hold name should not be visible in the Remove from Hold entry ",
|
||||||
|
auditEntries.stream().anyMatch(entry -> entry.getChangedValues().contains(
|
||||||
|
ImmutableMap.of("new", "", "previous", replacementHoldName, "name", "Hold Name"))));
|
||||||
}
|
}
|
||||||
|
|
||||||
@AfterClass (alwaysRun = true)
|
@AfterClass (alwaysRun = true)
|
||||||
|
Reference in New Issue
Block a user