5 tests disabled in API12Test and API121Test

This commit is contained in:
Petar Bozin 2017-02-26 23:12:45 +01:00
parent a2d4eeba4a
commit 5adb06edba
4 changed files with 21 additions and 24 deletions

5
sbt.sh
View File

@ -1,4 +1,7 @@
#!/bin/sh
export SBT_OPTS="-Xmx1024m -Xms1024m -Xss2048k -XX:MaxPermSize=1024m"
sbt $1 $2 $3 $4
echo "sbt $@"
sbt $@
#$1 $2 $3 $4

View File

@ -95,15 +95,17 @@ object Remotedata extends Views with Users with Counterparties with AccountHolde
)
}
catch {
case k: ActorKilledException => return Empty ~> APIFailure(s"View $viewUID. not found", 404)
case k: ClassCastException => k.getMessage match {
case "Cannot cast net.liftweb.common.Failure to java.lang.Boolean" =>
return Empty ~> APIFailure(s"View $viewUID. not removed", 400)
case "Cannot cast net.liftweb.common.ParamFailure to java.lang.Boolean" =>
return Empty ~> APIFailure(s"View $viewUID. not found", 404)
case _ =>
return Empty ~> APIFailure(s"Unknown error", 406)
}
case e: Throwable => throw e
}
if ( res.getOrElse(false) ) {
res
}
else
Empty ~> Failure("access cannot be revoked")
res
}
def revokeAllPermissions(bankId : BankId, accountId: AccountId, user : User) : Box[Boolean] = {

View File

@ -1940,8 +1940,7 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(viewsBefore -1)
}
/* TODO temporary disabled until revokePermission fixed
/* TODO temp disabled for akka remotedata
scenario("we will revoke the access of a user to owner view on an bank account if there is more than one user", API1_2, DeletePermission) {
Given("We will use an access token")
val bankId = randomBank
@ -1959,8 +1958,7 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId1, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(viewsBefore -1)
}
*/
scenario("we cannot revoke the access of a user to owner view on an bank account if there is only one user", API1_2, DeletePermission) {
Given("We will use an access token")
val bankId = randomBank
@ -1982,7 +1980,6 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
val viewUsersAfter = view.users
viewUsersAfter.length should equal(viewUsersBefore.length)
}
*/
scenario("we cannot revoke the access to a user that does not exist", API1_2, DeletePermission) {
Given("We will use an access token with a random user Id")
@ -1994,7 +1991,6 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
reply.code should equal (400)
}
/* TODO temporary disabled until revokePermission fixed
scenario("we cannot revoke the access of a user to owner view on a bank account if that user is an account holder of that account", API1_2, DeletePermission) {
Given("A user is the account holder of an account (and has access to the owner view)")
val bankId = randomBank
@ -2029,7 +2025,6 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(viewsBefore)
}
*/
scenario("we cannot revoke a user access to a view on an bank account because the user does not have owner view access", API1_2, DeletePermission) {
Given("We will use an access token")
@ -2046,7 +2041,7 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
}
}
feature("Revoke a user access to all the views on a bank account"){
/* TODO temporary disabled until revokePermission fixed
/* TODO temp disabled for akka remotedata
scenario("we will revoke the access of a user to all the views on an bank account", API1_2, DeletePermissions) {
Given("We will use an access token")
val bankId = randomBank
@ -2062,7 +2057,7 @@ class API1_2_1Test extends User1AllPrivileges with DefaultUsers with PrivateUser
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(0)
}
*/
*/
scenario("we cannot revoke the access to all views for a user that does not exist", API1_2, DeletePermissions) {
Given("We will use an access token with a random user Id")

View File

@ -1359,7 +1359,6 @@ class API1_2Test extends User1AllPrivileges with DefaultUsers {
}
}
/* TODO temporary disabled tests until revokePermission fixed
feature("Revoke a user access to a view on a bank account"){
scenario("we will revoke the access of a user to a view different from owner on an bank account", API1_2, DeletePermission) {
Given("We will use an access token")
@ -1377,7 +1376,7 @@ class API1_2Test extends User1AllPrivileges with DefaultUsers {
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(viewsBefore -1)
}
/* TODO temp disabled for akka remotedata
scenario("we will revoke the access of a user to owner view on an bank account if there is more than one user", API1_2, DeletePermission) {
Given("We will use an access token")
val bankId = randomBank
@ -1395,7 +1394,7 @@ class API1_2Test extends User1AllPrivileges with DefaultUsers {
val viewsAfter = getUserAccountPermission(bankId, bankAccount.id, userId1, user1).body.extract[ViewsJSON].views.length
viewsAfter should equal(viewsBefore -1)
}
*/
scenario("we cannot revoke the access of a user to owner view on an bank account if there is only one user", API1_2, DeletePermission) {
Given("We will use an access token")
val bankId = randomBank
@ -1450,10 +1449,9 @@ class API1_2Test extends User1AllPrivileges with DefaultUsers {
reply.code should equal (400)
}
}
*/
feature("Revoke a user access to all the views on a bank account"){
/*TODO temporary disabled tests until revokePermission fixed
/* TODO temp disabled for akka remotedata
scenario("we will revoke the access of a user to all the views on an bank account", API1_2, DeletePermissions) {
Given("We will use an access token")
val bankId = randomBank
@ -1467,8 +1465,7 @@ class API1_2Test extends User1AllPrivileges with DefaultUsers {
Then("we should get a 204 no content code")
reply.code should equal (204)
}
*/
*/
scenario("we cannot revoke the access to a user that does not exist", API1_2, DeletePermissions) {
Given("We will use an access token with a random user Id")
val bankId = randomBank