/** * Verify that an administrator can read a protected resource. */ @Test @DisplayName("Verify that an administrator can read a protected resource") default void testAdminCanReadProtectedResource() { try (final Response res = target(getProtectedContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can control the child of a protected resource. */ @Test @DisplayName("Verify that an administrator can control the child of a protected resource") default void testAdminCanControlProtectedResourceChild() { try (final Response res = target(getProtectedContainerChild() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(NOT_FOUND, fromStatusCode(res.getStatus()), NOT_FOUND_RESPONSE); } }
/** * Verify that an administrator can read the child of a default ACL resource. */ @Test @DisplayName("Verify that an administrator can read the child of a default ACL resource") default void testCanReadDefaultAclResourceChild() { try (final Response res = target(getDefaultContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can control a public resource. */ @Test @DisplayName("Verify that an administrator can control a public resource") default void testAdminCanControlPublicResource() { try (final Response res = target(getPublicContainer() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can control a private resource. */ @Test @DisplayName("Verify that an administrator can control a private resource") default void testAdminCanControlPrivateResource() { try (final Response res = target(getPrivateContainer() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can control a group-controlled resource. */ @Test @DisplayName("Verify that an administrator can control a group-controlled resource") default void testAdminCanControlGroupResource() { try (final Response res = target(getGroupContainer() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can't find the ACL resource. */ @Test @DisplayName("Verify that an administrator can't find the ACL resource") default void testCanControlDefaultAclResourceChild() { try (final Response res = target(getDefaultContainerChild() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(NOT_FOUND, fromStatusCode(res.getStatus()), NOT_FOUND_RESPONSE); } } }
/** * Verify that an administrator can read a private resource. */ @Test @DisplayName("Verify that an administrator can read a private resource") default void testAdminCanReadPrivateResource() { try (final Response res = target(getPrivateContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can read the child of a private resource. */ @Test @DisplayName("Verify that an administrator can read the child of a private resource") default void testAdminCanReadPrivateResourceChild() { try (final Response res = target(getPrivateContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can control the child of a private resource. */ @Test @DisplayName("Verify that an administrator can control the child of a private resource") default void testAdminCanControlPrivateResourceChild() { try (final Response res = target(getPrivateContainerChild() + EXT_ACL).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(NOT_FOUND, fromStatusCode(res.getStatus()), NOT_FOUND_RESPONSE); } }
/** * Verify that an administrator can read a group-controlled resource. */ @Test @DisplayName("Verify that an administrator can read a group-controlled resource") default void testAdminCanReadGroupResource() { try (final Response res = target(getGroupContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can read a default ACL resource. */ @Test @DisplayName("Verify that an administrator can read a default ACL resource") default void testCanReadDefaultAclResource() { try (final Response res = target(getDefaultContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can read the child of a public resource. */ @Test @DisplayName("Verify that an administrator can read the child of a public resource") default void testAdminCanReadPublicResourceChild() { try (final Response res = target(getPublicContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can read the child of a protected resource. */ @Test @DisplayName("Verify that an administrator can read the child of a protected resource") default void testAdminCanReadProtectedResourceChild() { try (final Response res = target(getProtectedContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()).get()) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a private resource. */ @Test @DisplayName("Verify that an administrator can write to a private resource") default void testAdminCanWritePrivateResource() { try (final Response res = target(getPrivateContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a public resource. */ @Test @DisplayName("Verify that an administrator can write to a public resource") default void testAdminCanWritePublicResource() { try (final Response res = target(getPublicContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a protected resource. */ @Test @DisplayName("Verify that an administrator can write to a protected resource") default void testAdminCanWriteProtectedResource() { try (final Response res = target(getProtectedContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to the child of a protected resource. */ @Test @DisplayName("Verify that an administrator can write to the child of a protected resource") default void testAdminCanWriteProtectedResourceChild() { try (final Response res = target(getProtectedContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to the child of a public resource. */ @Test @DisplayName("Verify that an administrator can write to the child of a public resource") default void testAdminCanWritePublicResourceChild() { try (final Response res = target(getPublicContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a group-controlled resource. */ @Test @DisplayName("Verify that an administrator can write to a group-controlled resource") default void testAdminCanWriteGroupResource() { try (final Response res = target(getGroupContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }