fixed up the unit test permission yml to better match the way we do permissions (#363)

Co-authored-by: jasquat <jasquat@users.noreply.github.com>
This commit is contained in:
jasquat 2023-06-29 14:21:15 -04:00 committed by GitHub
parent f80c52ba38
commit d810d9b01f
3 changed files with 9 additions and 23 deletions

View File

@ -29,20 +29,10 @@ permissions:
allowed_permissions: [all] allowed_permissions: [all]
uri: ELEVATED uri: ELEVATED
read-all: basic-permission:
groups: ["Finance Team", hr, admin]
allowed_permissions: [read]
uri: /*
process-instances-find-by-id:
groups: [everybody] groups: [everybody]
allowed_permissions: [read] allowed_permissions: [all]
uri: /process-instances/find-by-id/* uri: BASIC
tasks-crud:
groups: [everybody]
allowed_permissions: [create, read, update, delete]
uri: /tasks/*
finance-admin-group: finance-admin-group:
groups: ["Finance Team"] groups: ["Finance Team"]
@ -54,12 +44,7 @@ permissions:
allowed_permissions: [start] allowed_permissions: [start]
uri: PG:finance uri: PG:finance
finance-admin-model-lanes: read-all-finance:
groups: ["Finance Team"] groups: [hr]
allowed_permissions: [create, read, update, delete] allowed_permissions: [read]
uri: /process-models/finance:model_with_lanes/* uri: PG:finance
finance-admin-instance-run:
groups: ["Finance Team"]
allowed_permissions: [create, read, update, delete]
uri: /process-instances/*

View File

@ -61,7 +61,7 @@ class TestFlaskOpenId(BaseTest):
"redirect_url": "http://localhost:7000/v1.0/login_return", "redirect_url": "http://localhost:7000/v1.0/login_return",
} }
response = client.post("/openid/token", data=data, headers=headers) response = client.post("/openid/token", data=data, headers=headers)
assert response assert response.status_code == 200
assert response.is_json assert response.is_json
assert "access_token" in response.json assert "access_token" in response.json
assert "id_token" in response.json assert "id_token" in response.json

View File

@ -48,6 +48,7 @@ class TestAuthorizationService(BaseTest):
self.assert_user_has_permission(users["testuser2"], "update", "/v1.0/process-groups/finance:model1") self.assert_user_has_permission(users["testuser2"], "update", "/v1.0/process-groups/finance:model1")
self.assert_user_has_permission(users["testuser2"], "update", "/v1.0/process-groups", expected_result=False) self.assert_user_has_permission(users["testuser2"], "update", "/v1.0/process-groups", expected_result=False)
self.assert_user_has_permission(users["testuser2"], "read", "/v1.0/process-groups") self.assert_user_has_permission(users["testuser2"], "read", "/v1.0/process-groups")
self.assert_user_has_permission(users["testuser2"], "update", "/v1.0/process-groups", expected_result=False)
def test_user_can_be_added_to_human_task_on_first_login( def test_user_can_be_added_to_human_task_on_first_login(
self, self,