juergen     2004/02/04 03:35:17

  Modified:    testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL
                        denyReadForHalfDirectorySearch.xml
                        denyReadSearch.xml
  Log:
  fix hard-coded taminowebdavserver (Michael)
  
  Revision  Changes    Path
  1.13      +36 -36    
jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadForHalfDirectorySearch.xml
  
  Index: denyReadForHalfDirectorySearch.xml
  ===================================================================
  RCS file: 
/home/cvs/jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadForHalfDirectorySearch.xml,v
  retrieving revision 1.12
  retrieving revision 1.13
  diff -u -r1.12 -r1.13
  --- denyReadForHalfDirectorySearch.xml        4 Nov 2003 08:50:50 -0000       1.12
  +++ denyReadForHalfDirectorySearch.xml        4 Feb 2004 11:35:17 -0000       1.13
  @@ -3,37 +3,37 @@
   <test>
     <specification>
       <abstract> A tree structure is created. A resource is put at the bottom.
  -             Read access to user %user% is denied halfway down the tree.
  -             The user then attempts to Search on the resource.</abstract>
  +        Read access to user %user% is denied halfway down the tree.
  +        The user then attempts to Search on the resource.</abstract>
       <description>
  -             1) MKCol to create a test collection. All resources will be created 
here. This makes for an easy cleanup.
  -             2) MKCol to create a level1 collection.
  -             3) MKCol to create a level1/level2 collection.
  -             4) MKCol to create a level1/level2/level3 collection.
  -             5) PUT resource to level 3.
  -             6) ACL command to deny read privileges to user %user% on the level 2 
collection.
  -             
  -             7) PropFind command on non-acl properties by user %user% on level 1 to 
check that read privileges are granted.
  -             8) PropFind command on acl properties by user %user% on level 1 to 
check that read privileges are granted.
  -             9) PropFind command on non-acl properties by user %user% on level 2 to 
check that read privileges have been denied.
  -             10) PropFind command on acl properties by user %user% on level 2 to 
check that read privileges have been denied.
  -             11) PropFind command on non-acl properties by user %user% on level 3 
to check that read privileges have been denied.
  -             12) PropFind command on acl properties by user %user% on level 3 to 
check that read privileges have been denied.
  -             13) PropFind command on non-acl properties by user %user% on the 
resource to check that read privileges have been denied.
  -             14) PropFind command on acl properties by user %user% on the resource 
to check that read privileges have been denied.
  -             
  -             11) Search performed on non-acl properties by user %user% on level 1. 
This should be possible.
  -             12) Search performed on acl properties by user %user% on level 1. This 
should be possible.
  -             13) Search performed on non-acl properties by user %user% on level 2. 
This should not be possible.
  -             14) Search performed on acl properties by user %user% on level 2. This 
should not be possible.
  -             15) Search performed on non-acl properties by user %user% on level 3. 
This should not be possible.
  -             16) Search performed on acl properties by user %user% on level 3. This 
should not be possible.
  -             17) Search performed on non-acl properties by user %user% on the 
resource. This should not be possible.
  -             18) Search performed on non-acl properties by user %user% on the 
resource. This should not be possible.
  -             
  -             19) return ACL privileges back to normal.
  -             20) Delete created resource.
  -             </description>
  +        1) MKCol to create a test collection. All resources will be created here. 
This makes for an easy cleanup.
  +        2) MKCol to create a level1 collection.
  +        3) MKCol to create a level1/level2 collection.
  +        4) MKCol to create a level1/level2/level3 collection.
  +        5) PUT resource to level 3.
  +        6) ACL command to deny read privileges to user %user% on the level 2 
collection.
  +        
  +        7) PropFind command on non-acl properties by user %user% on level 1 to 
check that read privileges are granted.
  +        8) PropFind command on acl properties by user %user% on level 1 to check 
that read privileges are granted.
  +        9) PropFind command on non-acl properties by user %user% on level 2 to 
check that read privileges have been denied.
  +        10) PropFind command on acl properties by user %user% on level 2 to check 
that read privileges have been denied.
  +        11) PropFind command on non-acl properties by user %user% on level 3 to 
check that read privileges have been denied.
  +        12) PropFind command on acl properties by user %user% on level 3 to check 
that read privileges have been denied.
  +        13) PropFind command on non-acl properties by user %user% on the resource 
to check that read privileges have been denied.
  +        14) PropFind command on acl properties by user %user% on the resource to 
check that read privileges have been denied.
  +        
  +        11) Search performed on non-acl properties by user %user% on level 1. This 
should be possible.
  +        12) Search performed on acl properties by user %user% on level 1. This 
should be possible.
  +        13) Search performed on non-acl properties by user %user% on level 2. This 
should not be possible.
  +        14) Search performed on acl properties by user %user% on level 2. This 
should not be possible.
  +        15) Search performed on non-acl properties by user %user% on level 3. This 
should not be possible.
  +        16) Search performed on acl properties by user %user% on level 3. This 
should not be possible.
  +        17) Search performed on non-acl properties by user %user% on the resource. 
This should not be possible.
  +        18) Search performed on non-acl properties by user %user% on the resource. 
This should not be possible.
  +        
  +        19) return ACL privileges back to normal.
  +        20) Delete created resource.
  +        </description>
       <expectedResult> The Search should return a 409 Forbidden error. 
</expectedResult>
     </specification>
     <step>
  @@ -401,7 +401,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on /%globalVariableServerName%/%globalVariableCollection%/test/level1/level2 
by user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  @@ -437,7 +437,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on /%globalVariableServerName%/%globalVariableCollection%/test/level1/level2 
by user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  @@ -474,7 +474,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on 
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3 by 
user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  @@ -510,7 +510,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on 
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3 by 
user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  @@ -547,7 +547,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on 
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3/acl_dasl.xml
 by user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  @@ -583,7 +583,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on 
/%globalVariableServerName%/%globalVariableCollection%/test/level1/level2/level3/acl_dasl.xml
 by user %globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  
  
  
  1.9       +7 -7      
jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadSearch.xml
  
  Index: denyReadSearch.xml
  ===================================================================
  RCS file: 
/home/cvs/jakarta-slide/testsuite/testsuite/junit/xmltestcases/DASL/functional/select/ACL/denyReadSearch.xml,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -u -r1.8 -r1.9
  --- denyReadSearch.xml        4 Nov 2003 08:50:51 -0000       1.8
  +++ denyReadSearch.xml        4 Feb 2004 11:35:17 -0000       1.9
  @@ -4,12 +4,12 @@
     <specification>
       <abstract> A user is denied read access to a resource. The user then attempts 
to Search.</abstract>
       <description>
  -             1) Put a resource to the server.
  -             2) ACL command to deny read privelages to user %user%.
  -             3) PropFind command by user %user% to check that read privelages have 
been denied.
  -             4) Search performed on created resource. This should not be possible.
  -             5) Delete created resource.
  -             </description>
  +        1) Put a resource to the server.
  +        2) ACL command to deny read privelages to user %user%.
  +        3) PropFind command by user %user% to check that read privelages have been 
denied.
  +        4) Search performed on created resource. This should not be possible.
  +        5) Delete created resource.
  +        </description>
       <expectedResult> The Search should return a 409 Forbidden error. 
</expectedResult>
     </specification>
     <step>
  @@ -93,7 +93,7 @@
         <body 
varUsage="globalVariableCollection,globalVariableUserPath,globalVariableServerName,user,host"><![CDATA[<?xml
 version="1.0" encoding="utf-8"?>
   <D:multistatus xmlns:D="DAV:">
     <D:response>
  -    <D:href>/taminowebdavserver</D:href>
  +    <D:href>/%globalVariableServerName%</D:href>
       <D:status>HTTP/1.1 403 Forbidden</D:status>
       <D:responsedescription 
varUsage="globalVariableUserPath,globalVariableRootUserPath,globalVariableServerName,user,host">Access
 denied on /%globalVariableServerName%/%globalVariableCollection%/acl_dasl.xml by user 
%globalVariableUserPath% for action 
/%globalVariableServerName%/administration/security/actions/read</D:responsedescription>
     </D:response>
  
  
  

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to