Package gwtappcontainer.server.apps.security

Examples of gwtappcontainer.server.apps.security.SecurityAPI


    }       
             
    public User loginAsInvalidUser() {
     
      //first delete userentity (if present) by logging as admin
      SecurityAPI api = new SecurityAPI();
      api.deleteUser(email, loginAsSuperUser());
     
      //change to non-admin
      userServiceTestHelper.setEnvIsLoggedIn(true)
    .setEnvEmail(email).setEnvIsAdmin(false);
     
View Full Code Here


    }
   
    public User loginAsValidUser() { 
      //logs in as a valid user that exists in ishaportal security userentity
     
      SecurityAPI api = new SecurityAPI();
      api.addUser(email, loginAsSuperUser());
     
      userServiceTestHelper.setEnvEmail(email);
      return UserServiceFactory.getUserService().getCurrentUser();
    }
View Full Code Here

      return UserServiceFactory.getUserService().getCurrentUser();
    }
   
    public User loginWithPrivilege(String privilege) {
           
      SecurityAPI api = new SecurityAPI();
      @SuppressWarnings("unused")
    APIResponse response = api.addPrivilege(privilege, loginAsSuperUser());
     
      //delete user if exists and add it again
      response = api.deleteUser(email, loginAsSuperUser());
           
      response = api.addUser(email, loginAsSuperUser());           
     
      response = api.assignPrivilegeToUser(email, privilege, loginAsSuperUser());           
     
      userServiceTestHelper.setEnvEmail(email);
      return UserServiceFactory.getUserService().getCurrentUser();
    }     
View Full Code Here

   
    User user = userService.getCurrentUser();
    assertTrue(user != null);
    assertTrue(user.getEmail().equals(helper.getEmail()))
   
    SecurityAPI api = new SecurityAPI();
    APIResponse response = api.getUser(helper.getEmail());
    assertTrue(response.object == null);       
  }
View Full Code Here

   
    User user = userService.getCurrentUser();
    assertTrue(user != null);
    assertTrue(user.getEmail().equals(helper.getEmail()));   
   
    SecurityAPI api = new SecurityAPI();
    APIResponse response = api.getUser(helper.getEmail());
    assertTrue(response.object != null);
  }
View Full Code Here

   
    User user = userService.getCurrentUser();
    assertTrue(user != null);
    assertTrue(user.getEmail().equals(helper.getEmail()));   
   
    SecurityAPI api = new SecurityAPI();
    APIResponse response = api.getUser(helper.getEmail());
    UserProp prop = (UserProp) response.object;
    assertTrue(prop.email.equals(helper.getEmail()));
   
    assertTrue(prop.privileges.contains("TEST"));
   
    //add another privilege.
    helper.loginWithPrivilege("test2");
    //old privilage should be removed
    response = api.getUser(helper.getEmail());
    prop = (UserProp) response.object; 
    assertTrue(prop.privileges.contains("TEST2"));
    assertTrue(! prop.privileges.contains("TEST"));
   
  }
View Full Code Here

    assertTrue(userProp.roles.size() == 0);       
  }
 
  @Test
  public void assignPrivilegeToUserTest() {
    SecurityAPI api = new SecurityAPI();
    api.addPrivilege("privilege1", helper.loginAsSuperUser());
    api.addPrivilege("privilege2", helper.loginAsSuperUser());
   
    api.addUser("test@test.com", helper.loginAsSuperUser());
   
    APIResponse response = api.assignPrivilegeToUser("test@test.com",
        "privilege1", null);
    assertTrue(response.statusCode == Status.ERROR_LOGIN_REQUIRED);
   
    response = api.assignPrivilegeToUser("test@test.com",
        "privilege1", helper.loginAsInvalidUser());
    assertTrue(response.statusCode == Status.ERROR_INVALID_USER);
   
    response = api.assignPrivilegeToUser("test@test.com",
        "privilege1", helper.loginAsValidUser());
    assertTrue(response.statusCode == Status.ERROR_INSUFFICIENT_PERMISSION);
   
    response = api.assignPrivilegeToUser("test@test.com",
        "privilege1", helper.loginWithPrivilege(Privileges.EDIT_USER));
    assertTrue(response.statusCode == Status.SUCCESS);
   
    UserProp userProp = (UserProp) api.getUser("test@test.com").object;
    assertTrue(userProp.privileges.contains("PRIVILEGE1"));
           
    //no exception
   
    //admin can assign as well
    response = api.assignPrivilegeToUser("test@test.com",
        "privilege2", helper.loginAsSuperUser());
    assertTrue(response.statusCode == Status.SUCCESS);
   
    userProp = (UserProp) api.getUser("test@test.com").object;
    assertTrue(userProp.privileges.contains("PRIVILEGE2"));                   
  }
View Full Code Here

    assertTrue(userProp.privileges.contains("PRIVILEGE2"));                   
  }
 
  @Test
  public void unassignPrivilegeToUserTest() {
    SecurityAPI api = new SecurityAPI();
    api.addPrivilege("privilege1", helper.loginAsSuperUser());
    api.addPrivilege("privilege2", helper.loginAsSuperUser());
   
    String email = "test@dummy1fkj.com";
    api.addUser(email, helper.loginAsSuperUser());
    api.assignPrivilegeToUser(email, "privilege1",
        helper.loginAsSuperUser());
    api.assignPrivilegeToUser(email, "privilege2",
        helper.loginAsSuperUser());   
   
    APIResponse response = api.unassignPrivilegeToUser(email,
        "privilege1", null);
    assertTrue(response.statusCode == Status.ERROR_LOGIN_REQUIRED);
   
    response = api.unassignPrivilegeToUser(email,
        "privilege1", helper.loginAsInvalidUser());
    assertTrue(response.statusCode == Status.ERROR_INVALID_USER);
   
    response = api.unassignPrivilegeToUser(email,
        "privilege1", helper.loginAsValidUser());
    assertTrue(response.statusCode == Status.ERROR_INSUFFICIENT_PERMISSION);
   
    response = api.unassignPrivilegeToUser(email,
        "privilege1", helper.loginAsSuperUser());
    System.out.println("status 1: " + response.statusCode);
    UserProp userProp = (UserProp) api.getUser(email).object;
    assertTrue(! userProp.privileges.contains("PRIVILEGE1"));
    System.out.println("user prop: " + userProp);
    assertTrue(response.statusCode == Status.SUCCESS);           
   
    //admin can unassign as well
    response = api.unassignPrivilegeToUser(email,
        "privilege2", helper.loginAsSuperUser());
    assertTrue(response.statusCode == Status.SUCCESS);
   
    userProp = (UserProp) api.getUser(email).object;
    assertTrue(! userProp.privileges.contains("PRIVILEGE2"));                           
  }
View Full Code Here

  }
 
  @SuppressWarnings("unchecked")
  @Test
  public void addRoleTest() {
    SecurityAPI api = new SecurityAPI();
   
    //should have the right privilege
    APIResponse response = api.addRole("test", null);
    assertTrue(response.statusCode == Status.ERROR_LOGIN_REQUIRED);
   
    response = api.addRole("test", helper.loginAsInvalidUser());
    assertTrue(response.statusCode == Status.ERROR_INVALID_USER);
   
    response = api.addRole("test", helper.loginAsValidUser());
    assertTrue(response.statusCode == Status.ERROR_INSUFFICIENT_PERMISSION);
   
    response = api.addRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));
    assertTrue(response.statusCode == Status.SUCCESS);
   
    response = api.getAllRoles();
    TreeSet<RoleProp> all = (TreeSet<RoleProp>) response.object;
    assertTrue(all.first().role.equals("TEST"));
   
    //adding the same role again should give correct error
    response = api.addRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));   
    assertTrue(response.statusCode == Status.ERROR_RESOURCE_ALREADY_EXISTS);
   
    //admin can add as well
    response = api.addRole("test2", helper.loginAsSuperUser());
    assertTrue(response.statusCode == Status.SUCCESS);
    response = api.getAllRoles();

    all = (TreeSet<RoleProp>) response.object;
    assertTrue(all.last().role.equals("TEST2"));     
  }
View Full Code Here

  }
 
  @SuppressWarnings("unchecked")
  @Test
  public void deleteRoleTest() {
    SecurityAPI api = new SecurityAPI();
   
    APIResponse response = api.addRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));
   
    //should have the right privilege
    response = api.deleteRole("test", null);
    assertTrue(response.statusCode == Status.ERROR_LOGIN_REQUIRED);
   
    response = api.deleteRole("test", helper.loginAsInvalidUser());
    assertTrue(response.statusCode == Status.ERROR_INVALID_USER);
   
    response = api.deleteRole("test", helper.loginAsValidUser());
    assertTrue(response.statusCode == Status.ERROR_INSUFFICIENT_PERMISSION);
   
    response = api.deleteRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));
    assertTrue(response.statusCode == Status.SUCCESS);
   
    response = api.getAllRoles();
    TreeSet<RoleProp> all = (TreeSet<RoleProp>) response.object;
    assertTrue(all.size() == 0);
   
    //deleting the same role again should give correct error
    response = api.deleteRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));   
    assertTrue(response.statusCode == Status.ERROR_RESOURCE_DOES_NOT_EXIST);
       
    //admin can delete as well
    //first add before deleting
    response = api.addRole("test",
        helper.loginWithPrivilege(Privileges.EDIT_ROLE));
    assertTrue(response.statusCode == Status.SUCCESS);
   
    response = api.deleteRole("test", helper.loginAsSuperUser());
    assertTrue(response.statusCode == Status.SUCCESS);
    all = (TreeSet<RoleProp>) api.getAllRoles().object;
    assertTrue(all.size() == 0);   
  }
View Full Code Here

TOP

Related Classes of gwtappcontainer.server.apps.security.SecurityAPI

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.