@@ -519,7 +519,7 @@ class CsmRbacTests {
519519 fun `add custom role definition` () {
520520 val definition = getCommonRolesDefinition()
521521 val customRole = " custom_role"
522- val customRolePermissions = listOf (PERMISSION_READ_DATA , " custom_permission" )
522+ val customRolePermissions = listOf (PERMISSION_READ , " custom_permission" )
523523 definition.permissions.put(customRole, customRolePermissions)
524524 val expected: MutableMap <String , List <String >> =
525525 mutableMapOf (
@@ -538,7 +538,7 @@ class CsmRbacTests {
538538 val definition = getCommonRolesDefinition()
539539 val customRole = " custom_role"
540540 val customPermission = " custom_permission"
541- val customRolePermissions = listOf (PERMISSION_READ_DATA , customPermission)
541+ val customRolePermissions = listOf (PERMISSION_READ , customPermission)
542542 definition.permissions.put(customRole, customRolePermissions)
543543 val rbacTest = CsmRbac (csmPlatformProperties, admin)
544544 rbacTest.setUserRole(rbacSecurity, USER_NEW_READER , customRole, definition)
@@ -553,7 +553,7 @@ class CsmRbacTests {
553553 val rbacTest = CsmRbac (csmPlatformProperties, admin)
554554 rbacTest.setUserRole(rbacSecurity, USER_READER , ROLE_VIEWER , definition)
555555 every { securityContext.authentication } returns (userAuthentication as Authentication )
556- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
556+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
557557 }
558558
559559 @Test
@@ -567,7 +567,7 @@ class CsmRbacTests {
567567 RbacAccessControl (USER_READER , ROLE_VIEWER ),
568568 ))
569569 every { securityContext.authentication } returns (userAuthentication as Authentication )
570- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
570+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
571571 }
572572
573573 @Test
@@ -581,7 +581,7 @@ class CsmRbacTests {
581581 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
582582 ))
583583 every { securityContext.authentication } returns (userAuthentication as Authentication )
584- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ_DATA , USER_READER , definition))
584+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_READ , USER_READER , definition))
585585 }
586586
587587 @Test
@@ -595,7 +595,7 @@ class CsmRbacTests {
595595 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
596596 ))
597597 every { securityContext.authentication } returns (userAuthentication as Authentication )
598- assertFalse(rbacTest.check(rbacSecurity, PERMISSION_EDIT_SECURITY , USER_READER , definition))
598+ assertFalse(rbacTest.check(rbacSecurity, PERMISSION_WRITE_SECURITY , USER_READER , definition))
599599 }
600600
601601 @Test
@@ -624,7 +624,7 @@ class CsmRbacTests {
624624 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
625625 ))
626626 every { securityContext.authentication } returns (userAuthentication as Authentication )
627- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_EDIT , USER_WRITER , definition))
627+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_WRITE , USER_WRITER , definition))
628628 }
629629
630630 @Test
@@ -638,7 +638,7 @@ class CsmRbacTests {
638638 RbacAccessControl (USER_MAIL_TOKEN , ROLE_EDITOR ),
639639 ))
640640 every { securityContext.authentication } returns (userAuthentication as Authentication )
641- assertDoesNotThrow { rbacTest.verify(rbacSecurity, PERMISSION_EDIT , definition) }
641+ assertDoesNotThrow { rbacTest.verify(rbacSecurity, PERMISSION_WRITE , definition) }
642642 }
643643
644644 @Test
@@ -652,7 +652,7 @@ class CsmRbacTests {
652652 RbacAccessControl (USER_WRITER , ROLE_EDITOR ),
653653 ))
654654 every { securityContext.authentication } returns (userAuthentication as Authentication )
655- assertTrue(rbacTest.check(rbacSecurity, PERMISSION_EDIT , USER_WRITER , definition))
655+ assertTrue(rbacTest.check(rbacSecurity, PERMISSION_WRITE , USER_WRITER , definition))
656656 }
657657
658658 @Test
0 commit comments