@Test public void allowDelegatePotentialOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setPotentialOwners(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardBusinessAdmins() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(CURRENT_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertTrue(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowDelegateBusinessAdmins() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(CURRENT_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertTrue(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardPotentialOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setPotentialOwners(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowForwardBusinessAdmins() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(CURRENT_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertTrue(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowDelegateBusinessAdminsNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardPotentialOwner() { final TaskInstance task = new TaskInstance(); task.setPotentialOwners(Arrays.asList(CURRENT_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertTrue(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowForwardBusinessAdminsNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowDelegatePotentialOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setPotentialOwners(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowDelegateBusinessAdmins() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(CURRENT_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertTrue(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardPotentialOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setPotentialOwners(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowForwardBusinessAdminsNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setBusinessAdmins(Arrays.asList(OTHER_USER)); when(identityProvider.getRoles()).thenReturn(Arrays.asList(CURRENT_USER)); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void preventForwardCompletedTask() { final TaskInstance task = new TaskInstance(); task.setStatus("Completed"); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowDelegateActualOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setActualOwner(OTHER_USER); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardActualOwner() { final TaskInstance task = new TaskInstance(); task.setActualOwner(CURRENT_USER); assertTrue(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowDelegateActualOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setActualOwner(OTHER_USER); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowDelegateActualOwner() { final TaskInstance task = new TaskInstance(); task.setActualOwner(CURRENT_USER); assertTrue(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowDelegateCreatedByNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setCreatedBy(OTHER_USER); assertFalse(new TaskAssignmentSummaryMapper().isDelegationAllowed(task, identityProvider)); }
@Test public void allowForwardActualOwner() { final TaskInstance task = new TaskInstance(); task.setActualOwner(CURRENT_USER); assertTrue(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }
@Test public void allowForwardActualOwnerNotCurrentUser() { final TaskInstance task = new TaskInstance(); task.setActualOwner(OTHER_USER); assertFalse(new TaskAssignmentSummaryMapper().isForwardAllowed(task, identityProvider)); }