Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
S
slapos.core
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Titouan Soulard
slapos.core
Commits
f7a3329c
Commit
f7a3329c
authored
Jan 16, 2023
by
Romain Courteaud
🐸
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
slapos_erp5: test Upgrade Decision local roles
parent
74f4cb3a
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
43 additions
and
311 deletions
+43
-311
master/bt5/slapos_erp5/PortalTypeRolesTemplateItem/Upgrade%20Decision.xml
...s_erp5/PortalTypeRolesTemplateItem/Upgrade%20Decision.xml
+2
-0
master/bt5/slapos_erp5/TestTemplateItem/portal_components/test.erp5.testSlapOSERP5GroupRoleSecurity.py
...l_components/test.erp5.testSlapOSERP5GroupRoleSecurity.py
+41
-311
No files found.
master/bt5/slapos_erp5/PortalTypeRolesTemplateItem/Upgrade%20Decision.xml
View file @
f7a3329c
...
@@ -22,6 +22,7 @@
...
@@ -22,6 +22,7 @@
<property
id=
'base_category_script'
>
ERP5Type_getSecurityCategoryFromContent
</property>
<property
id=
'base_category_script'
>
ERP5Type_getSecurityCategoryFromContent
</property>
<multi_property
id=
'category'
>
function/production/agent
</multi_property>
<multi_property
id=
'category'
>
function/production/agent
</multi_property>
<multi_property
id=
'base_category'
>
source_project
</multi_property>
<multi_property
id=
'base_category'
>
source_project
</multi_property>
<multi_property
id=
'base_category'
>
function
</multi_property>
</role>
</role>
<role
id=
'Assignor'
>
<role
id=
'Assignor'
>
<property
id=
'title'
>
Source Project Production Manager
</property>
<property
id=
'title'
>
Source Project Production Manager
</property>
...
@@ -30,6 +31,7 @@
...
@@ -30,6 +31,7 @@
<property
id=
'base_category_script'
>
ERP5Type_getSecurityCategoryFromContent
</property>
<property
id=
'base_category_script'
>
ERP5Type_getSecurityCategoryFromContent
</property>
<multi_property
id=
'category'
>
function/production/manager
</multi_property>
<multi_property
id=
'category'
>
function/production/manager
</multi_property>
<multi_property
id=
'base_category'
>
source_project
</multi_property>
<multi_property
id=
'base_category'
>
source_project
</multi_property>
<multi_property
id=
'base_category'
>
function
</multi_property>
</role>
</role>
<role
id=
'Assignee'
>
<role
id=
'Assignee'
>
<property
id=
'title'
>
User
</property>
<property
id=
'title'
>
User
</property>
...
...
master/bt5/slapos_erp5/TestTemplateItem/portal_components/test.erp5.testSlapOSERP5GroupRoleSecurity.py
View file @
f7a3329c
...
@@ -1800,328 +1800,58 @@ class TestUpgradeDecisionModule(TestSlapOSGroupRoleSecurityMixin):
...
@@ -1800,328 +1800,58 @@ class TestUpgradeDecisionModule(TestSlapOSGroupRoleSecurityMixin):
module
=
self
.
portal
.
upgrade_decision_module
module
=
self
.
portal
.
upgrade_decision_module
self
.
changeOwnership
(
module
)
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
self
.
assertSecurityGroup
(
module
,
[
'
G-COMPANY'
,
'R-MEMB
ER'
,
self
.
user_id
],
True
)
[
'
F-PRODUCTION*'
,
'F-CUSTOM
ER'
,
self
.
user_id
],
True
)
self
.
assertRoles
(
module
,
'
G-COMPANY'
,
[
'Auditor'
,
'Auth
or'
])
self
.
assertRoles
(
module
,
'
F-PRODUCTION*'
,
[
'Audit
or'
])
self
.
assertRoles
(
module
,
'
R-MEMBER'
,
[
'Auditor'
,
'Auth
or'
])
self
.
assertRoles
(
module
,
'
F-CUSTOMER'
,
[
'Audit
or'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestUpgradeDecision
(
TestSlapOSGroupRoleSecurityMixin
):
class
TestUpgradeDecision
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_GroupCompany
(
self
):
ticket_portal_type
=
'Upgrade Decision'
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
portal_type
=
'Upgrade Decision'
)
def
test_default
(
self
):
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
support_request
=
self
.
portal
.
getDefaultModuleValue
(
self
.
ticket_portal_type
).
newContent
(
self
.
assertSecurityGroup
(
upgrade_decision
,
portal_type
=
self
.
ticket_portal_type
)
[
'G-COMPANY'
,
self
.
user_id
],
False
)
support_request
.
updateLocalRolesOnSecurityGroups
()
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertSecurityGroup
(
support_request
,
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
[
self
.
user_id
],
False
)
self
.
assertRoles
(
support_request
,
self
.
user_id
,
[
'Owner'
])
def
test_Customer
(
self
):
def
test_Customer
(
self
):
reference
=
'TESTPERSON-%s'
%
self
.
generateNewId
()
reference
=
'TESTPERSON-%s'
%
self
.
generateNewId
()
person
=
self
.
portal
.
person_module
.
newContent
(
portal_type
=
'Person'
,
person
=
self
.
portal
.
person_module
.
newContent
(
portal_type
=
'Person'
,
reference
=
reference
)
reference
=
reference
)
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
support_request
=
self
.
portal
.
getDefaultModuleValue
(
self
.
ticket_portal_type
)
.
newContent
(
portal_type
=
'Upgrade Decision'
,
portal_type
=
self
.
ticket_portal_type
,
destination_decision_value
=
person
,
destination_decision_value
=
person
,
)
)
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
support_request
.
updateLocalRolesOnSecurityGroups
()
self
.
assertSecurityGroup
(
upgrade_decision
,
self
.
assertSecurityGroup
(
support_request
,
[
'G-COMPANY'
,
person
.
getUserId
(),
self
.
user_id
],
False
)
[
person
.
getUserId
(),
self
.
user_id
],
False
)
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
support_request
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
upgrade_decision
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
support_request
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
def
test_ProjectMember
(
self
):
project
=
self
.
addProject
()
person
=
self
.
makePerson
(
project
,
user
=
1
)
compute_node
=
self
.
portal
.
compute_node_module
.
newContent
(
portal_type
=
'Compute Node'
,
source_administration
=
person
.
getRelativeUrl
())
project
=
self
.
portal
.
project_module
.
newContent
(
portal_type
=
'Project'
)
self
.
tic
()
self
.
login
(
person
.
getUserId
())
compute_node
.
ComputeNode_createMovement
(
destination
=
person
.
getRelativeUrl
(),
destination_project
=
project
.
getRelativeUrl
())
self
.
login
()
self
.
tic
()
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
portal_type
=
'Upgrade Decision'
,
destination_decision_value
=
person
)
upgrade_decision
.
newContent
(
portal_type
=
"Upgrade Decision Line"
,
aggregate
=
compute_node
.
getRelativeUrl
()
)
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
self
.
assertSecurityGroup
(
upgrade_decision
,
[
'G-COMPANY'
,
person
.
getUserId
(),
self
.
user_id
,
project
.
getReference
()],
False
)
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
upgrade_decision
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
upgrade_decision
,
project
.
getReference
(),
[
'Assignee'
])
def
test_ProjectMember_InstanceTree
(
self
):
project
=
self
.
addProject
()
person
=
self
.
makePerson
(
project
,
user
=
1
)
instance_tree
=
self
.
portal
.
instance_tree_module
.
newContent
(
portal_type
=
'Instance Tree'
,
reference
=
"INSTTREETEST-%s"
%
self
.
generateNewId
(),
title
=
"INSTTREETEST-%s"
%
self
.
generateNewId
(),
destination_section
=
person
.
getRelativeUrl
(),
follow_up_value
=
project
)
project
=
self
.
portal
.
project_module
.
newContent
(
portal_type
=
'Project'
)
self
.
tic
()
self
.
login
(
person
.
getUserId
())
instance_tree
.
InstanceTree_createMovement
(
destination_project
=
project
.
getRelativeUrl
())
self
.
login
()
self
.
tic
()
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
portal_type
=
'Upgrade Decision'
,
destination_decision_value
=
person
)
upgrade_decision
.
newContent
(
portal_type
=
"Upgrade Decision Line"
,
aggregate
=
instance_tree
.
getRelativeUrl
()
)
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
self
.
assertSecurityGroup
(
upgrade_decision
,
[
'G-COMPANY'
,
person
.
getUserId
(),
self
.
user_id
,
project
.
getReference
()],
False
)
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
upgrade_decision
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
upgrade_decision
,
project
.
getReference
(),
[
'Assignee'
])
def
test_
OrganisationMember
(
self
):
def
test_
SourceProject
(
self
):
project
=
self
.
addProject
()
project
=
self
.
addProject
()
person
=
self
.
makePerson
(
project
,
user
=
1
)
support_request
=
self
.
portal
.
getDefaultModuleValue
(
self
.
ticket_portal_type
).
newContent
(
compute_node
=
self
.
portal
.
compute_node_module
.
newContent
(
portal_type
=
self
.
ticket_portal_type
,
portal_type
=
'Compute Node'
,
source_project_value
=
project
)
follow_up_value
=
project
)
support_request
.
updateLocalRolesOnSecurityGroups
()
organisation
=
self
.
portal
.
organisation_module
.
newContent
(
self
.
assertSecurityGroup
(
support_request
,
[
self
.
user_id
,
portal_type
=
'Organisation'
,
'%s_F-PRODAGNT'
%
project
.
getReference
(),
reference
=
"TESTO-%s"
%
self
.
generateNewId
())
'%s_F-PRODMAN'
%
project
.
getReference
()],
False
)
self
.
assertRoles
(
support_request
,
self
.
user_id
,
[
'Owner'
])
self
.
tic
()
self
.
assertRoles
(
support_request
,
'%s_F-PRODMAN'
%
project
.
getReference
(),
[
'Assignor'
])
self
.
login
(
person
.
getUserId
())
self
.
assertRoles
(
support_request
,
'%s_F-PRODAGNT'
%
project
.
getReference
(),
[
'Assignee'
])
compute_node
.
ComputeNode_createMovement
(
destination
=
person
.
getRelativeUrl
(),
destination_section
=
organisation
.
getRelativeUrl
())
self
.
login
()
self
.
tic
()
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
portal_type
=
'Upgrade Decision'
,
destination_decision_value
=
person
)
upgrade_decision
.
newContent
(
def
test_DestinationProject
(
self
):
portal_type
=
"Upgrade Decision Line"
,
aggregate
=
compute_node
.
getRelativeUrl
()
)
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
self
.
assertSecurityGroup
(
upgrade_decision
,
[
'G-COMPANY'
,
person
.
getUserId
(),
self
.
user_id
,
organisation
.
getReference
()],
False
)
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
upgrade_decision
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
upgrade_decision
,
organisation
.
getReference
(),
[
'Assignee'
])
def
test_OrganisationMember_InstanceTree
(
self
):
project
=
self
.
addProject
()
project
=
self
.
addProject
()
person
=
self
.
makePerson
(
project
,
user
=
1
)
support_request
=
self
.
portal
.
getDefaultModuleValue
(
self
.
ticket_portal_type
).
newContent
(
instance_tree
=
self
.
portal
.
instance_tree_module
.
newContent
(
portal_type
=
self
.
ticket_portal_type
,
portal_type
=
'Instance Tree'
,
destination_project_value
=
project
)
reference
=
"INSTTREETEST-%s"
%
self
.
generateNewId
(),
support_request
.
updateLocalRolesOnSecurityGroups
()
title
=
"INSTTREETEST-%s"
%
self
.
generateNewId
(),
self
.
assertSecurityGroup
(
support_request
,
[
self
.
user_id
,
destination_section
=
person
.
getRelativeUrl
(),
'%s_F-PRODAGNT'
%
project
.
getReference
(),
follow_up_value
=
project
'%s_F-PRODMAN'
%
project
.
getReference
()],
False
)
)
self
.
assertRoles
(
support_request
,
self
.
user_id
,
[
'Owner'
])
organisation
=
self
.
portal
.
organisation_module
.
newContent
(
self
.
assertRoles
(
support_request
,
'%s_F-PRODMAN'
%
project
.
getReference
(),
[
'Assignor'
])
portal_type
=
'Organisation'
,
self
.
assertRoles
(
support_request
,
'%s_F-PRODAGNT'
%
project
.
getReference
(),
[
'Assignee'
])
reference
=
"TESTO-%s"
%
self
.
generateNewId
())
self
.
tic
()
self
.
login
(
person
.
getUserId
())
instance_tree
.
InstanceTree_createMovement
(
destination
=
organisation
.
getRelativeUrl
())
self
.
login
()
self
.
tic
()
upgrade_decision
=
self
.
portal
.
upgrade_decision_module
.
newContent
(
portal_type
=
'Upgrade Decision'
,
destination_decision_value
=
person
)
upgrade_decision
.
newContent
(
portal_type
=
"Upgrade Decision Line"
,
aggregate
=
instance_tree
.
getRelativeUrl
()
)
upgrade_decision
.
updateLocalRolesOnSecurityGroups
()
self
.
assertSecurityGroup
(
upgrade_decision
,
[
'G-COMPANY'
,
person
.
getUserId
(),
self
.
user_id
,
organisation
.
getReference
()],
False
)
self
.
assertRoles
(
upgrade_decision
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
upgrade_decision
,
person
.
getUserId
(),
[
'Assignee'
])
self
.
assertRoles
(
upgrade_decision
,
self
.
user_id
,
[
'Owner'
])
self
.
assertRoles
(
upgrade_decision
,
organisation
.
getReference
(),
[
'Assignee'
])
class
TestDataStreamModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataStreamModule
(
self
):
module
=
self
.
portal
.
data_stream_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
'R-COMPUTER'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataStream
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataStream
(
self
):
data_stream
=
self
.
portal
.
data_stream_module
.
newContent
(
portal_type
=
'Data Stream'
)
self
.
assertSecurityGroup
(
data_stream
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_stream
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_stream
,
'R-COMPUTER'
,
[
'Assignor'
])
self
.
assertRoles
(
data_stream
,
self
.
user_id
,
[
'Owner'
])
class
TestDataIngestionModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataIngestionModule
(
self
):
module
=
self
.
portal
.
data_ingestion_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
'R-COMPUTER'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataIngestion
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataIngestion
(
self
):
data_ingestion
=
self
.
portal
.
data_ingestion_module
.
newContent
(
portal_type
=
'Data Ingestion'
)
self
.
assertSecurityGroup
(
data_ingestion
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_ingestion
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_ingestion
,
'R-COMPUTER'
,
[
'Assignor'
])
self
.
assertRoles
(
data_ingestion
,
self
.
user_id
,
[
'Owner'
])
class
TestDataOperationModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataOperationModule
(
self
):
module
=
self
.
portal
.
data_operation_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
'R-COMPUTER'
,
[
'Auditor'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataOperation
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataOperation
(
self
):
data_operation
=
self
.
portal
.
data_operation_module
.
newContent
(
portal_type
=
'Data Operation'
)
self
.
assertSecurityGroup
(
data_operation
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_operation
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_operation
,
'R-COMPUTER'
,
[
'Auditor'
])
self
.
assertRoles
(
data_operation
,
self
.
user_id
,
[
'Owner'
])
class
TestDataSupplyModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataSupplyModule
(
self
):
module
=
self
.
portal
.
data_supply_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
'R-COMPUTER'
,
[
'Auditor'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataSupply
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataSupply
(
self
):
data_supply
=
self
.
portal
.
data_supply_module
.
newContent
(
portal_type
=
'Data Supply'
)
self
.
assertSecurityGroup
(
data_supply
,
[
'G-COMPANY'
,
'R-COMPUTER'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_supply
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_supply
,
'R-COMPUTER'
,
[
'Auditor'
])
self
.
assertRoles
(
data_supply
,
self
.
user_id
,
[
'Owner'
])
class
TestDataMappingModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataMappingModule
(
self
):
module
=
self
.
portal
.
data_mapping_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataMapping
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataMapping
(
self
):
data_mapping
=
self
.
portal
.
data_mapping_module
.
newContent
(
portal_type
=
'Data Mapping'
)
self
.
assertSecurityGroup
(
data_mapping
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_mapping
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_mapping
,
self
.
user_id
,
[
'Owner'
])
class
TestDataTransformationModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataTransformationModule
(
self
):
module
=
self
.
portal
.
data_transformation_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataTransformation
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataTransformation
(
self
):
data_transformation
=
self
.
portal
.
data_transformation_module
.
newContent
(
portal_type
=
'Data Transformation'
)
self
.
assertSecurityGroup
(
data_transformation
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_transformation
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_transformation
,
self
.
user_id
,
[
'Owner'
])
class
TestDataArrayModule
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataArrayModule
(
self
):
module
=
self
.
portal
.
data_array_module
self
.
changeOwnership
(
module
)
self
.
assertSecurityGroup
(
module
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
module
,
'G-COMPANY'
,
[
'Auditor'
,
'Author'
])
self
.
assertRoles
(
module
,
self
.
user_id
,
[
'Owner'
])
class
TestDataArray
(
TestSlapOSGroupRoleSecurityMixin
):
def
test_DataArray
(
self
):
data_array
=
self
.
portal
.
data_array_module
.
newContent
(
portal_type
=
'Data Array'
)
self
.
assertSecurityGroup
(
data_array
,
[
'G-COMPANY'
,
self
.
user_id
],
False
)
self
.
assertRoles
(
data_array
,
'G-COMPANY'
,
[
'Assignor'
])
self
.
assertRoles
(
data_array
,
self
.
user_id
,
[
'Owner'
])
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment