CCM NG: Renamed privilege property of the Privilege entity to label to avoid naming confusion.
git-svn-id: https://svn.libreccm.org/ccm/ccm_ng@3541 8810af33-2d31-482b-a856-94f89814c4dfpull/2/head
parent
6a334f9277
commit
6d76f200d7
|
|
@ -52,11 +52,11 @@ import javax.xml.bind.annotation.XmlRootElement;
|
||||||
@NamedQueries({
|
@NamedQueries({
|
||||||
@NamedQuery(name = "findPrivilegeByName",
|
@NamedQuery(name = "findPrivilegeByName",
|
||||||
query = "SELECT p FROM Privilege p "
|
query = "SELECT p FROM Privilege p "
|
||||||
+ "WHERE p.privilege = :name"),
|
+ "WHERE p.label = :label"),
|
||||||
@NamedQuery(name = "isPrivilegeInUse",
|
@NamedQuery(name = "isPrivilegeInUse",
|
||||||
query = "SELECT COUNT(p) FROM Permission p "
|
query = "SELECT COUNT(p) FROM Permission p "
|
||||||
+ " JOIN p.grantedPrivilege g "
|
+ " JOIN p.grantedPrivilege g "
|
||||||
+ " WHERE g.privilege = :name")
|
+ " WHERE g.label = :label")
|
||||||
})
|
})
|
||||||
@XmlRootElement(name = "privilege", namespace = CORE_XML_NS)
|
@XmlRootElement(name = "privilege", namespace = CORE_XML_NS)
|
||||||
public class Privilege implements Serializable {
|
public class Privilege implements Serializable {
|
||||||
|
|
@ -69,11 +69,10 @@ public class Privilege implements Serializable {
|
||||||
@XmlElement(name = "privilege-id", namespace = CORE_XML_NS)
|
@XmlElement(name = "privilege-id", namespace = CORE_XML_NS)
|
||||||
private long privilegeId;
|
private long privilegeId;
|
||||||
|
|
||||||
@Column(name = "privilege", length = 255, nullable = false)
|
@Column(name = "label", length = 255, nullable = false)
|
||||||
//Field is named like this in the old PDL class, don't want to change it now
|
//Field is named like this in the old PDL class, don't want to change it now
|
||||||
@SuppressWarnings("PMD.AvoidFieldNameMatchingTypeName")
|
@XmlElement(name = "label", namespace = CORE_XML_NS)
|
||||||
@XmlElement(name = "privilege", namespace = CORE_XML_NS)
|
private String label;
|
||||||
private String privilege;
|
|
||||||
|
|
||||||
public long getPrivilegeId() {
|
public long getPrivilegeId() {
|
||||||
return privilegeId;
|
return privilegeId;
|
||||||
|
|
@ -83,19 +82,19 @@ public class Privilege implements Serializable {
|
||||||
this.privilegeId = privilegeId;
|
this.privilegeId = privilegeId;
|
||||||
}
|
}
|
||||||
|
|
||||||
public String getPrivilege() {
|
public String getLabel() {
|
||||||
return privilege;
|
return label;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setPrivilege(final String privilege) {
|
public void setLabel(final String label) {
|
||||||
this.privilege = privilege;
|
this.label = label;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public int hashCode() {
|
public int hashCode() {
|
||||||
int hash = 7;
|
int hash = 7;
|
||||||
hash = 43 * hash + (int) (privilegeId ^ (privilegeId >>> 32));
|
hash = 43 * hash + (int) (privilegeId ^ (privilegeId >>> 32));
|
||||||
hash = 43 * hash + Objects.hashCode(privilege);
|
hash = 43 * hash + Objects.hashCode(label);
|
||||||
return hash;
|
return hash;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -115,7 +114,7 @@ public class Privilege implements Serializable {
|
||||||
if (privilegeId != other.getPrivilegeId()) {
|
if (privilegeId != other.getPrivilegeId()) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
return Objects.equals(privilege, other.getPrivilege());
|
return Objects.equals(label, other.getLabel());
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean canEqual(final Object obj) {
|
public boolean canEqual(final Object obj) {
|
||||||
|
|
@ -130,7 +129,7 @@ public class Privilege implements Serializable {
|
||||||
+ " }",
|
+ " }",
|
||||||
super.toString(),
|
super.toString(),
|
||||||
privilegeId,
|
privilegeId,
|
||||||
privilege);
|
label);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -41,23 +41,23 @@ public class PrivilegeRepository {
|
||||||
/**
|
/**
|
||||||
* Finds the {@link Privilege} identified by {@code name}.
|
* Finds the {@link Privilege} identified by {@code name}.
|
||||||
*
|
*
|
||||||
* @param name The name of the privilege to return.
|
* @param label The name of the privilege to return.
|
||||||
*
|
*
|
||||||
* @return The requested privilege.
|
* @return The requested privilege.
|
||||||
*
|
*
|
||||||
* @throws UnknownPrivilegeException if there is no privilege identified by
|
* @throws UnknownPrivilegeException if there is no privilege identified by
|
||||||
* the provided {@code name}.
|
* the provided {@code name}.
|
||||||
*/
|
*/
|
||||||
public Privilege retrievePrivilege(final String name) {
|
public Privilege retrievePrivilege(final String label) {
|
||||||
final TypedQuery<Privilege> query = entityManager.createNamedQuery(
|
final TypedQuery<Privilege> query = entityManager.createNamedQuery(
|
||||||
"findPrivilegeByName", Privilege.class);
|
"findPrivilegeByName", Privilege.class);
|
||||||
query.setParameter("name", name);
|
query.setParameter("label", label);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
return query.getSingleResult();
|
return query.getSingleResult();
|
||||||
} catch (NoResultException ex) {
|
} catch (NoResultException ex) {
|
||||||
throw new UnknownPrivilegeException(String.format(
|
throw new UnknownPrivilegeException(String.format(
|
||||||
"There is no privilege \"%s\".", name), ex);
|
"There is no privilege \"%s\".", label), ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -68,13 +68,13 @@ public class PrivilegeRepository {
|
||||||
*
|
*
|
||||||
* ToDo: Check if current user is system user.
|
* ToDo: Check if current user is system user.
|
||||||
*
|
*
|
||||||
* @param privilegeName The privilege to create.
|
* @param label The privilege to create.
|
||||||
*
|
*
|
||||||
* @return The new privilege.
|
* @return The new privilege.
|
||||||
*/
|
*/
|
||||||
public Privilege createPrivilege(final String privilegeName) {
|
public Privilege createPrivilege(final String label) {
|
||||||
final Privilege privilege = new Privilege();
|
final Privilege privilege = new Privilege();
|
||||||
privilege.setPrivilege(privilegeName);
|
privilege.setLabel(label);
|
||||||
|
|
||||||
entityManager.persist(privilege);
|
entityManager.persist(privilege);
|
||||||
|
|
||||||
|
|
@ -104,15 +104,15 @@ public class PrivilegeRepository {
|
||||||
/**
|
/**
|
||||||
* Checks a {@link Privilege} is in use.
|
* Checks a {@link Privilege} is in use.
|
||||||
*
|
*
|
||||||
* @param privilegeName The name of the privilege to check.
|
* @param label The name of the privilege to check.
|
||||||
*
|
*
|
||||||
* @return {@code true} if the privilege is in use (there is a least one
|
* @return {@code true} if the privilege is in use (there is a least one
|
||||||
* permission using it), {@code false} otherwise.
|
* permission using it), {@code false} otherwise.
|
||||||
*/
|
*/
|
||||||
public boolean isPrivilegeInUse(final String privilegeName) {
|
public boolean isPrivilegeInUse(final String label) {
|
||||||
final TypedQuery<Long> query = entityManager.createNamedQuery(
|
final TypedQuery<Long> query = entityManager.createNamedQuery(
|
||||||
"isPrivilegeInUse", Long.class);
|
"isPrivilegeInUse", Long.class);
|
||||||
query.setParameter("name", privilegeName);
|
query.setParameter("label", label);
|
||||||
|
|
||||||
final Long result = query.getSingleResult();
|
final Long result = query.getSingleResult();
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -63,14 +63,15 @@ import javax.xml.bind.annotation.XmlTransient;
|
||||||
query = "SELECT u FROM User u WHERE u.screenName = :screenname"),
|
query = "SELECT u FROM User u WHERE u.screenName = :screenname"),
|
||||||
@NamedQuery(name = "findUserByEmailAddress",
|
@NamedQuery(name = "findUserByEmailAddress",
|
||||||
query = "SELECT u FROM User u JOIN u.emailAddresses e "
|
query = "SELECT u FROM User u JOIN u.emailAddresses e "
|
||||||
+ "WHERE e.address = :emailAddress")})
|
+ "WHERE e.address = :emailAddress")})
|
||||||
@XmlRootElement(name = "user", namespace = CORE_XML_NS)
|
@XmlRootElement(name = "user", namespace = CORE_XML_NS)
|
||||||
//Supressing a few warnings from PMD because they misleading here.
|
//Supressing a few warnings from PMD because they misleading here.
|
||||||
//User is perfectly fine class name, and the complexity is not to high...
|
//User is perfectly fine class name, and the complexity is not to high...
|
||||||
@SuppressWarnings({"PMD.ShortClassName",
|
@SuppressWarnings({"PMD.ShortClassName",
|
||||||
"PMD.CyclomaticComplexity",
|
"PMD.CyclomaticComplexity",
|
||||||
"PMD.StdCyclomaticComplexity",
|
"PMD.StdCyclomaticComplexity",
|
||||||
"PMD.ModifiedCyclomaticComplexity"})
|
"PMD.ModifiedCyclomaticComplexity",
|
||||||
|
"PMD.GodClass"})
|
||||||
public class User extends Subject implements Serializable {
|
public class User extends Subject implements Serializable {
|
||||||
|
|
||||||
private static final long serialVersionUID = 892038270064849732L;
|
private static final long serialVersionUID = 892038270064849732L;
|
||||||
|
|
@ -80,10 +81,10 @@ public class User extends Subject implements Serializable {
|
||||||
*/
|
*/
|
||||||
@Embedded
|
@Embedded
|
||||||
@AssociationOverride(
|
@AssociationOverride(
|
||||||
name = "user_names",
|
name = "user_names",
|
||||||
joinTable = @JoinTable(name = "user_names",
|
joinTable = @JoinTable(name = "user_names",
|
||||||
joinColumns = {
|
joinColumns = {
|
||||||
@JoinColumn(name = " user_id")}))
|
@JoinColumn(name = " user_id")}))
|
||||||
@XmlElement(name = "person-name", namespace = CORE_XML_NS)
|
@XmlElement(name = "person-name", namespace = CORE_XML_NS)
|
||||||
private PersonName name;
|
private PersonName name;
|
||||||
|
|
||||||
|
|
@ -294,7 +295,7 @@ public class User extends Subject implements Serializable {
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void setGroupMemberships(
|
protected void setGroupMemberships(
|
||||||
final List<GroupMembership> groupMemberships) {
|
final List<GroupMembership> groupMemberships) {
|
||||||
this.groupMemberships = groupMemberships;
|
this.groupMemberships = groupMemberships;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -303,7 +304,7 @@ public class User extends Subject implements Serializable {
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void removeGroupMembership(
|
protected void removeGroupMembership(
|
||||||
final GroupMembership groupMembership) {
|
final GroupMembership groupMembership) {
|
||||||
groupMemberships.remove(groupMembership);
|
groupMemberships.remove(groupMembership);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -386,12 +387,12 @@ public class User extends Subject implements Serializable {
|
||||||
@Override
|
@Override
|
||||||
public String toString(final String data) {
|
public String toString(final String data) {
|
||||||
return super.toString(String.format(", name = %s, "
|
return super.toString(String.format(", name = %s, "
|
||||||
+ "screenName = \"%s\", "
|
+ "screenName = \"%s\", "
|
||||||
+ "emailAddress = { %s }"
|
+ "emailAddress = { %s }"
|
||||||
+ "banned = %b, "
|
+ "banned = %b, "
|
||||||
+ "ssoLogin = \"%s\" "
|
+ "ssoLogin = \"%s\" "
|
||||||
+ "hashAlgorithm = \"%s\" "
|
+ "hashAlgorithm = \"%s\" "
|
||||||
+ "passwordResetRequired = %b%s",
|
+ "passwordResetRequired = %b%s",
|
||||||
Objects.toString(name),
|
Objects.toString(name),
|
||||||
screenName,
|
screenName,
|
||||||
Objects.toString(emailAddresses),
|
Objects.toString(emailAddresses),
|
||||||
|
|
|
||||||
|
|
@ -162,7 +162,7 @@ public class PermissionRepositoryTest {
|
||||||
assertThat(permissionsJdoe.size(), is(1));
|
assertThat(permissionsJdoe.size(), is(1));
|
||||||
assertThat(permissionsJdoe.get(0).getObject().getDisplayName(),
|
assertThat(permissionsJdoe.get(0).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 2")));
|
is(equalTo("Test Object 2")));
|
||||||
assertThat(permissionsJdoe.get(0).getGrantedPrivilege().getPrivilege(),
|
assertThat(permissionsJdoe.get(0).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
|
|
||||||
final List<Permission> permissionsMmuster = permissionRepository
|
final List<Permission> permissionsMmuster = permissionRepository
|
||||||
|
|
@ -173,7 +173,7 @@ public class PermissionRepositoryTest {
|
||||||
.findPermissionsForSubject(admins);
|
.findPermissionsForSubject(admins);
|
||||||
assertThat(permissionsAdmins.size(), is(1));
|
assertThat(permissionsAdmins.size(), is(1));
|
||||||
assertThat(permissionsAdmins.get(0).getObject(), is(nullValue()));
|
assertThat(permissionsAdmins.get(0).getObject(), is(nullValue()));
|
||||||
assertThat(permissionsAdmins.get(0).getGrantedPrivilege().getPrivilege(),
|
assertThat(permissionsAdmins.get(0).getGrantedPrivilege().getLabel(),
|
||||||
is("admin"));
|
is("admin"));
|
||||||
|
|
||||||
final List<Permission> permissionsUsers = permissionRepository
|
final List<Permission> permissionsUsers = permissionRepository
|
||||||
|
|
@ -181,7 +181,7 @@ public class PermissionRepositoryTest {
|
||||||
assertThat(permissionsUsers.size(), is(1));
|
assertThat(permissionsUsers.size(), is(1));
|
||||||
assertThat(permissionsUsers.get(0).getObject().getDisplayName(),
|
assertThat(permissionsUsers.get(0).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 1")));
|
is(equalTo("Test Object 1")));
|
||||||
assertThat(permissionsUsers.get(0).getGrantedPrivilege().getPrivilege(),
|
assertThat(permissionsUsers.get(0).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
|
|
||||||
final List<Permission> permissionsAuthors = permissionRepository
|
final List<Permission> permissionsAuthors = permissionRepository
|
||||||
|
|
@ -193,9 +193,9 @@ public class PermissionRepositoryTest {
|
||||||
is(equalTo("Test Object 1")));
|
is(equalTo("Test Object 1")));
|
||||||
final Set<String> privileges = new HashSet<>();
|
final Set<String> privileges = new HashSet<>();
|
||||||
privileges.add(permissionsAuthors.get(0).getGrantedPrivilege()
|
privileges.add(permissionsAuthors.get(0).getGrantedPrivilege()
|
||||||
.getPrivilege());
|
.getLabel());
|
||||||
privileges.add(permissionsAuthors.get(1).getGrantedPrivilege()
|
privileges.add(permissionsAuthors.get(1).getGrantedPrivilege()
|
||||||
.getPrivilege());
|
.getLabel());
|
||||||
assertThat(privileges, hasItem("read"));
|
assertThat(privileges, hasItem("read"));
|
||||||
assertThat(privileges, hasItem("write"));
|
assertThat(privileges, hasItem("write"));
|
||||||
}
|
}
|
||||||
|
|
@ -227,9 +227,9 @@ public class PermissionRepositoryTest {
|
||||||
@Override
|
@Override
|
||||||
public int compare(final Permission permission1,
|
public int compare(final Permission permission1,
|
||||||
final Permission permission2) {
|
final Permission permission2) {
|
||||||
int result = permission1.getGrantedPrivilege().getPrivilege()
|
int result = permission1.getGrantedPrivilege().getLabel()
|
||||||
.compareToIgnoreCase(permission2.getGrantedPrivilege()
|
.compareToIgnoreCase(permission2.getGrantedPrivilege()
|
||||||
.getPrivilege());
|
.getLabel());
|
||||||
|
|
||||||
if (result == 0) {
|
if (result == 0) {
|
||||||
result = permission1.getObject().getDisplayName().compareTo(
|
result = permission1.getObject().getDisplayName().compareTo(
|
||||||
|
|
@ -250,19 +250,19 @@ public class PermissionRepositoryTest {
|
||||||
|
|
||||||
});
|
});
|
||||||
|
|
||||||
assertThat(jdoePermissions.get(0).getGrantedPrivilege().getPrivilege(),
|
assertThat(jdoePermissions.get(0).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(jdoePermissions.get(0).getObject().getDisplayName(),
|
assertThat(jdoePermissions.get(0).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 1")));
|
is(equalTo("Test Object 1")));
|
||||||
assertThat(jdoePermissions.get(1).getGrantedPrivilege().getPrivilege(),
|
assertThat(jdoePermissions.get(1).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(jdoePermissions.get(1).getObject().getDisplayName(),
|
assertThat(jdoePermissions.get(1).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 1")));
|
is(equalTo("Test Object 1")));
|
||||||
assertThat(jdoePermissions.get(2).getGrantedPrivilege().getPrivilege(),
|
assertThat(jdoePermissions.get(2).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(jdoePermissions.get(2).getObject().getDisplayName(),
|
assertThat(jdoePermissions.get(2).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 2")));
|
is(equalTo("Test Object 2")));
|
||||||
assertThat(jdoePermissions.get(3).getGrantedPrivilege().getPrivilege(),
|
assertThat(jdoePermissions.get(3).getGrantedPrivilege().getLabel(),
|
||||||
is(equalTo("write")));
|
is(equalTo("write")));
|
||||||
assertThat(jdoePermissions.get(3).getObject().getDisplayName(),
|
assertThat(jdoePermissions.get(3).getObject().getDisplayName(),
|
||||||
is(equalTo("Test Object 1")));
|
is(equalTo("Test Object 1")));
|
||||||
|
|
@ -271,7 +271,7 @@ public class PermissionRepositoryTest {
|
||||||
.findPermissionsForUser(mmuster);
|
.findPermissionsForUser(mmuster);
|
||||||
assertThat(mmusterPermissions.size(), is(1));
|
assertThat(mmusterPermissions.size(), is(1));
|
||||||
assertThat(mmusterPermissions.get(0).getGrantedPrivilege()
|
assertThat(mmusterPermissions.get(0).getGrantedPrivilege()
|
||||||
.getPrivilege(),
|
.getLabel(),
|
||||||
is(equalTo("admin")));
|
is(equalTo("admin")));
|
||||||
assertThat(mmusterPermissions.get(0).getObject(), is(nullValue()));
|
assertThat(mmusterPermissions.get(0).getObject(), is(nullValue()));
|
||||||
}
|
}
|
||||||
|
|
@ -308,21 +308,21 @@ public class PermissionRepositoryTest {
|
||||||
|
|
||||||
});
|
});
|
||||||
assertThat(object1Permissions.get(0).getGrantedPrivilege()
|
assertThat(object1Permissions.get(0).getGrantedPrivilege()
|
||||||
.getPrivilege(),
|
.getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(object1Permissions.get(0).getGrantee(),
|
assertThat(object1Permissions.get(0).getGrantee(),
|
||||||
is(instanceOf(Group.class)));
|
is(instanceOf(Group.class)));
|
||||||
assertThat(((Group) object1Permissions.get(0).getGrantee()).getName(),
|
assertThat(((Group) object1Permissions.get(0).getGrantee()).getName(),
|
||||||
is(equalTo("authors")));
|
is(equalTo("authors")));
|
||||||
assertThat(object1Permissions.get(1).getGrantedPrivilege()
|
assertThat(object1Permissions.get(1).getGrantedPrivilege()
|
||||||
.getPrivilege(),
|
.getLabel(),
|
||||||
is(equalTo("write")));
|
is(equalTo("write")));
|
||||||
assertThat(object1Permissions.get(1).getGrantee(),
|
assertThat(object1Permissions.get(1).getGrantee(),
|
||||||
is(instanceOf(Group.class)));
|
is(instanceOf(Group.class)));
|
||||||
assertThat(((Group) object1Permissions.get(1).getGrantee()).getName(),
|
assertThat(((Group) object1Permissions.get(1).getGrantee()).getName(),
|
||||||
is(equalTo("authors")));
|
is(equalTo("authors")));
|
||||||
assertThat(object1Permissions.get(2).getGrantedPrivilege()
|
assertThat(object1Permissions.get(2).getGrantedPrivilege()
|
||||||
.getPrivilege(),
|
.getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(object1Permissions.get(2).getGrantee(),
|
assertThat(object1Permissions.get(2).getGrantee(),
|
||||||
is(instanceOf(Group.class)));
|
is(instanceOf(Group.class)));
|
||||||
|
|
@ -333,7 +333,7 @@ public class PermissionRepositoryTest {
|
||||||
.findPermissionsForCcmObject(object2);
|
.findPermissionsForCcmObject(object2);
|
||||||
assertThat(object2Permissions.size(), is(1));
|
assertThat(object2Permissions.size(), is(1));
|
||||||
assertThat(object2Permissions.get(0).getGrantedPrivilege()
|
assertThat(object2Permissions.get(0).getGrantedPrivilege()
|
||||||
.getPrivilege(),
|
.getLabel(),
|
||||||
is(equalTo("read")));
|
is(equalTo("read")));
|
||||||
assertThat(object2Permissions.get(0).getGrantee(),
|
assertThat(object2Permissions.get(0).getGrantee(),
|
||||||
is(instanceOf(User.class)));
|
is(instanceOf(User.class)));
|
||||||
|
|
@ -366,10 +366,10 @@ public class PermissionRepositoryTest {
|
||||||
final User mmuster = userRepository.findByScreenName("mmuster");
|
final User mmuster = userRepository.findByScreenName("mmuster");
|
||||||
|
|
||||||
final TypedQuery<Privilege> query1 = entityManager.createQuery(
|
final TypedQuery<Privilege> query1 = entityManager.createQuery(
|
||||||
"SELECT p FROM Privilege p WHERE p.privilege = 'read'",
|
"SELECT p FROM Privilege p WHERE p.label = 'read'",
|
||||||
Privilege.class);
|
Privilege.class);
|
||||||
final TypedQuery<Privilege> query2 = entityManager.createQuery(
|
final TypedQuery<Privilege> query2 = entityManager.createQuery(
|
||||||
"SELECT p FROM Privilege p WHERE p.privilege = 'write'",
|
"SELECT p FROM Privilege p WHERE p.label = 'write'",
|
||||||
Privilege.class);
|
Privilege.class);
|
||||||
|
|
||||||
final CcmObject object = ccmObjectRepository.findById(-40L);
|
final CcmObject object = ccmObjectRepository.findById(-40L);
|
||||||
|
|
|
||||||
|
|
@ -131,9 +131,9 @@ public class PrivilegeRepositoryTest {
|
||||||
assertThat(read, is(not(nullValue())));
|
assertThat(read, is(not(nullValue())));
|
||||||
assertThat(write, is(not(nullValue())));
|
assertThat(write, is(not(nullValue())));
|
||||||
|
|
||||||
assertThat(admin.getPrivilege(), is(equalTo("admin")));
|
assertThat(admin.getLabel(), is(equalTo("admin")));
|
||||||
assertThat(read.getPrivilege(), is(equalTo("read")));
|
assertThat(read.getLabel(), is(equalTo("read")));
|
||||||
assertThat(write.getPrivilege(), is(equalTo("write")));
|
assertThat(write.getLabel(), is(equalTo("write")));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test(expected = UnknownPrivilegeException.class)
|
@Test(expected = UnknownPrivilegeException.class)
|
||||||
|
|
|
||||||
|
|
@ -94,19 +94,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -40,
|
"privilege_id": -40,
|
||||||
"privilege": "unused"
|
"label": "unused"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"ccm_objects":
|
"ccm_objects":
|
||||||
|
|
|
||||||
|
|
@ -94,19 +94,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -40,
|
"privilege_id": -40,
|
||||||
"privilege": "unused"
|
"label": "unused"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"ccm_objects":
|
"ccm_objects":
|
||||||
|
|
|
||||||
|
|
@ -94,19 +94,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -40,
|
"privilege_id": -40,
|
||||||
"privilege": "unused"
|
"label": "unused"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"ccm_objects":
|
"ccm_objects":
|
||||||
|
|
|
||||||
|
|
@ -94,19 +94,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -40,
|
"privilege_id": -40,
|
||||||
"privilege": "unused"
|
"label": "unused"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"ccm_objects":
|
"ccm_objects":
|
||||||
|
|
|
||||||
|
|
@ -3,19 +3,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -40,
|
"privilege_id": -40,
|
||||||
"privilege": "publish"
|
"label": "publish"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
@ -3,11 +3,11 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
@ -3,15 +3,15 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"privilege_id": -10,
|
"privilege_id": -10,
|
||||||
"privilege": "admin"
|
"label": "admin"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -20,
|
"privilege_id": -20,
|
||||||
"privilege": "read"
|
"label": "read"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"privilege_id": -30,
|
"privilege_id": -30,
|
||||||
"privilege": "write"
|
"label": "write"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
Loading…
Reference in New Issue