@@ -518,7 +518,7 @@ class CsmRbacTests {
518518 fun `add custom role definition` () {
519519 val definition = getCommonRolesDefinition()
520520 val customRole = " custom_role"
521- val customRolePermissions = listOf (PERMISSION_READ_DATA , " custom_permission" )
521+ val customRolePermissions = listOf (PERMISSION_READ , " custom_permission" )
522522 definition.permissions.put(customRole, customRolePermissions)
523523 val expected: MutableMap <String , List <String >> =
524524 mutableMapOf (
@@ -537,7 +537,7 @@ class CsmRbacTests {
537537 val definition = getCommonRolesDefinition()
538538 val customRole = " custom_role"
539539 val customPermission = " custom_permission"
540- val customRolePermissions = listOf (PERMISSION_READ_DATA , customPermission)
540+ val customRolePermissions = listOf (PERMISSION_READ , customPermission)
541541 definition.permissions.put(customRole, customRolePermissions)
542542 val rbacTest = CsmRbac (csmPlatformProperties, admin)
543543 rbacTest.setUserRole(rbacSecurity, USER_NEW_READER , customRole, definition)
@@ -552,7 +552,7 @@ class CsmRbacTests {
552552 val rbacTest = CsmRbac (csmPlatformProperties, admin)
553553 rbacTest.setUserRole(rbacSecurity, USER_READER , ROLE_VIEWER , definition)
554554 every { securityContext.authentication } returns (userAuthentication as Authentication )
555- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
555+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
556556 }
557557
558558 @Test
@@ -567,7 +567,7 @@ class CsmRbacTests {
567567 RbacAccessControl (USER_READER , ROLE_VIEWER ),
568568 ))
569569 every { securityContext.authentication } returns (userAuthentication as Authentication )
570- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
570+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
571571 }
572572
573573 @Test
@@ -582,7 +582,7 @@ class CsmRbacTests {
582582 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
583583 ))
584584 every { securityContext.authentication } returns (userAuthentication as Authentication )
585- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
585+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
586586 }
587587
588588 @Test
@@ -597,7 +597,7 @@ class CsmRbacTests {
597597 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
598598 ))
599599 every { securityContext.authentication } returns (userAuthentication as Authentication )
600- assertFalse(rbacTest.check(rbacSecurity, PERMISSION_EDIT_SECURITY , USER_READER , definition))
600+ assertFalse(rbacTest.check(rbacSecurity, PERMISSION_WRITE_SECURITY , USER_READER , definition))
601601 }
602602
603603 @Test
@@ -628,7 +628,7 @@ class CsmRbacTests {
628628 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
629629 ))
630630 every { securityContext.authentication } returns (userAuthentication as Authentication )
631- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_EDIT , USER_WRITER , definition))
631+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_WRITE , USER_WRITER , definition))
632632 }
633633
634634 @Test
@@ -643,7 +643,7 @@ class CsmRbacTests {
643643 RbacAccessControl (USER_MAIL_TOKEN , ROLE_EDITOR ),
644644 ))
645645 every { securityContext.authentication } returns (userAuthentication as Authentication )
646- assertDoesNotThrow { rbacTest.verify(rbacSecurity, PERMISSION_EDIT , definition) }
646+ assertDoesNotThrow { rbacTest.verify(rbacSecurity, PERMISSION_WRITE , definition) }
647647 }
648648
649649 @Test
@@ -658,6 +658,6 @@ class CsmRbacTests {
658658 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
659659 ))
660660 every { securityContext.authentication } returns (userAuthentication as Authentication )
661- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_EDIT , USER_WRITER , definition))
661+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_WRITE , USER_WRITER , definition))
662662 }
663663}
0 commit comments