juergen 2004/02/04 03:35:17
Modified: testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL
denyReadForHalfDirectorySearch.xml
denyReadSearch.xml
Log:
fix hard-coded taminowebdavserver (Michael)
Revision Changes Path
1.13 +36 -36
jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadForHalfDirectorySearch.xml
Index: denyReadForHalfDirectorySearch.xml
===================================================================
RCS file:
/home/cvs/jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadForHalfDirectorySearch.xml,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -r1.12 -r1.13
--- denyReadForHalfDirectorySearch.xml 4 Nov 2003 08:50:50 -0000 1.12
+++ denyReadForHalfDirectorySearch.xml 4 Feb 2004 11:35:17 -0000 1.13
@@ -3,37 +3,37 @@
<test>
<specification>
<abstract> A tree structure is created. A resource is put at the bottom.
- Read access to user %user% is denied halfway down the tree.
- The user then attempts to Search on the resource.</abstract>
+ Read access to user %user% is denied halfway down the tree.
+ The user then attempts to Search on the resource.</abstract>
<description>
- 1) MKCol to create a test collection. All resources will be created
here. This makes for an easy cleanup.
- 2) MKCol to create a level1 collection.
- 3) MKCol to create a level1/level2 collection.
- 4) MKCol to create a level1/level2/level3 collection.
- 5) PUT resource to level 3.
- 6) ACL command to deny read privileges to user %user% on the level 2
collection.
-
- 7) PropFind command on non-acl properties by user %user% on level 1 to
check that read privileges are granted.
- 8) PropFind command on acl properties by user %user% on level 1 to
check that read privileges are granted.
- 9) PropFind command on non-acl properties by user %user% on level 2 to
check that read privileges have been denied.
- 10) PropFind command on acl properties by user %user% on level 2 to
check that read privileges have been denied.
- 11) PropFind command on non-acl properties by user %user% on level 3
to check that read privileges have been denied.
- 12) PropFind command on acl properties by user %user% on level 3 to
check that read privileges have been denied.
- 13) PropFind command on non-acl properties by user %user% on the
resource to check that read privileges have been denied.
- 14) PropFind command on acl properties by user %user% on the resource
to check that read privileges have been denied.
-
- 11) Search performed on non-acl properties by user %user% on level 1.
This should be possible.
- 12) Search performed on acl properties by user %user% on level 1. This
should be possible.
- 13) Search performed on non-acl properties by user %user% on level 2.
This should not be possible.
- 14) Search performed on acl properties by user %user% on level 2. This
should not be possible.
- 15) Search performed on non-acl properties by user %user% on level 3.
This should not be possible.
- 16) Search performed on acl properties by user %user% on level 3. This
should not be possible.
- 17) Search performed on non-acl properties by user %user% on the
resource. This should not be possible.
- 18) Search performed on non-acl properties by user %user% on the
resource. This should not be possible.
-
- 19) return ACL privileges back to normal.
- 20) Delete created resource.
- </description>
+ 1) MKCol to create a test collection. All resources will be created here.
This makes for an easy cleanup.
+ 2) MKCol to create a level1 collection.
+ 3) MKCol to create a level1/level2 collection.
+ 4) MKCol to create a level1/level2/level3 collection.
+ 5) PUT resource to level 3.
+ 6) ACL command to deny read privileges to user %user% on the level 2
collection.
+
+ 7) PropFind command on non-acl properties by user %user% on level 1 to
check that read privileges are granted.
+ 8) PropFind command on acl properties by user %user% on level 1 to check
that read privileges are granted.
+ 9) PropFind command on non-acl properties by user %user% on level 2 to
check that read privileges have been denied.
+ 10) PropFind command on acl properties by user %user% on level 2 to check
that read privileges have been denied.
+ 11) PropFind command on non-acl properties by user %user% on level 3 to
check that read privileges have been denied.
+ 12) PropFind command on acl properties by user %user% on level 3 to check
that read privileges have been denied.
+ 13) PropFind command on non-acl properties by user %user% on the resource
to check that read privileges have been denied.
+ 14) PropFind command on acl properties by user %user% on the resource to
check that read privileges have been denied.
+
+ 11) Search performed on non-acl properties by user %user% on level 1. This
should be possible.
+ 12) Search performed on acl properties by user %user% on level 1. This
should be possible.
+ 13) Search performed on non-acl properties by user %user% on level 2. This
should not be possible.
+ 14) Search performed on acl properties by user %user% on level 2. This
should not be possible.
+ 15) Search performed on non-acl properties by user %user% on level 3. This
should not be possible.
+ 16) Search performed on acl properties by user %user% on level 3. This
should not be possible.
+ 17) Search performed on non-acl properties by user %user% on the resource.
This should not be possible.
+ 18) Search performed on non-acl properties by user %user% on the resource.
This should not be possible.
+
+ 19) return ACL privileges back to normal.
+ 20) Delete created resource.
+ </description>
<expectedResult> The Search should return a 409 Forbidden error.
</expectedResult>
</specification>
<step>
@@ -401,7 +401,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on /%globalVariableServerName%/%globalVariableCollection%/test/level1/level2
by user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
@@ -437,7 +437,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on /%globalVariableServerName%/%globalVariableCollection%/test/level1/level2
by user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
@@ -474,7 +474,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3 by
user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
@@ -510,7 +510,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3 by
user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
@@ -547,7 +547,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3/acl_dasl.xml
by user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
@@ -583,7 +583,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3/acl_dasl.xml
by user %globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
1.9 +7 -7
jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadSearch.xml
Index: denyReadSearch.xml
===================================================================
RCS file:
/home/cvs/jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadSearch.xml,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- denyReadSearch.xml 4 Nov 2003 08:50:51 -0000 1.8
+++ denyReadSearch.xml 4 Feb 2004 11:35:17 -0000 1.9
@@ -4,12 +4,12 @@
<specification>
<abstract> A user is denied read access to a resource. The user then attempts
to Search.</abstract>
<description>
- 1) Put a resource to the server.
- 2) ACL command to deny read privelages to user %user%.
- 3) PropFind command by user %user% to check that read privelages have
been denied.
- 4) Search performed on created resource. This should not be possible.
- 5) Delete created resource.
- </description>
+ 1) Put a resource to the server.
+ 2) ACL command to deny read privelages to user %user%.
+ 3) PropFind command by user %user% to check that read privelages have been
denied.
+ 4) Search performed on created resource. This should not be possible.
+ 5) Delete created resource.
+ </description>
<expectedResult> The Search should return a 409 Forbidden error.
</expectedResult>
</specification>
<step>
@@ -93,7 +93,7 @@
<body
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response>
- <D:href>/taminowebdavserver</D:href>
+ <D:href>/%globalVariableServerName%</D:href>
<D:status>HTTP/1.1 403 Forbidden</D:status>
<D:responsedescription
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
denied on /%globalVariableServerName%/%globalVariableCollection%/acl_dasl.xml by user
%globalVariableUserPath% for action
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
</D:response>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]