src_fm_fc_ms_ff
stringlengths
43
86.8k
target
stringlengths
20
276k
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section) { SetupStatusResource setupStatus = findOrCreateSetupStatusResource(competitionId, section.getClass().getName(), section.getId(), Optional.empty()); setupStatus.setCompleted(true); return setupStatusService.saveSetupStatus(setupStatus); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void testMarkSectionCompleteFindOne() { final Long competitionId = 32L; final CompetitionSetupSection section = CompetitionSetupSection.APPLICATION_FORM; final SetupStatusResource foundStatusResource = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withParentId(12L) .withCompleted(Boolean.FALSE).build(); final SetupStatusResource savingStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withParentId(12L) .withCompleted(Boolean.TRUE).build(); final SetupStatusResource savedStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withParentId(12L) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withCompleted(Boolean.TRUE).build(); when(setupStatusService.findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceSuccess(foundStatusResource)); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); service.markSectionComplete(competitionId, section); verify(setupStatusService, times(1)).findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); }
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section) { List<CompetitionSetupSection> allSectionsToMarkIncomplete = getAllSectionsToMarkIncomplete(section); List<ServiceResult<SetupStatusResource>> markIncompleteResults = simpleMap(allSectionsToMarkIncomplete, sectionToMarkIncomplete -> setSectionIncompleteAndUpdate(competitionId, sectionToMarkIncomplete)); return aggregate(markIncompleteResults); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void testMarkSectionIncompleteCreateOne() { final Long competitionId = 32L; final CompetitionSetupSection section = CompetitionSetupSection.APPLICATION_FORM; final SetupStatusResource savingStatus = newSetupStatusResource() .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); savingStatus.setId(null); final SetupStatusResource savedStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); when(setupStatusService.findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceFailure(new Error("GENERAL_NOT_FOUND", HttpStatus.BAD_REQUEST))); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); service.markSectionIncomplete(competitionId, section); verify(setupStatusService, times(1)).findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); } @Test public void testMarkSectionIncompleteWithNextSections() { final long competitionId = 32L; final CompetitionSetupSection section1 = CompetitionSetupSection.COMPLETION_STAGE; final CompetitionSetupSection section2 = CompetitionSetupSection.MILESTONES; final List<SetupStatusResource> savingStatuses = newSetupStatusResource() .withId() .withClassName(CompetitionSetupSection.class.getName()) .withClassPk(section1.getId(), section2.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(false) .build(2); final List<SetupStatusResource> savedStatuses = newSetupStatusResource() .withClassName(CompetitionSetupSection.class.getName()) .withClassPk(section1.getId(), section2.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(false) .build(2); List<CompetitionSetupSection> expectedSectionsToMarkIncomplete = asList(section1, section2); zip(expectedSectionsToMarkIncomplete, savingStatuses, savedStatuses, (section, savingStatus, savedStatus) -> { when(setupStatusService.findSetupStatusAndTarget( CompetitionSetupSection.class.getName(), section.getId(), Competition.class.getName(), competitionId)).thenReturn(serviceFailure(new Error("GENERAL_NOT_FOUND", HttpStatus.BAD_REQUEST))); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); }); ServiceResult<List<SetupStatusResource>> markIncompleteResults = service.markSectionIncomplete(competitionId, section1); assertTrue(markIncompleteResults.isSuccess()); assertEquals(savedStatuses, markIncompleteResults.getSuccess()); zip(expectedSectionsToMarkIncomplete, savingStatuses, savedStatuses, (section, savingStatus, savedStatus) -> { verify(setupStatusService, times(1)).findSetupStatusAndTarget( CompetitionSetupSection.class.getName(), section.getId(), Competition.class.getName(), competitionId); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); }); } @Test public void testMarkSectionIncompleteWithPreviousSections() { final Long competitionId = 32L; final CompetitionSetupSection section = CompetitionSetupSection.MILESTONES; final SetupStatusResource savingStatus = newSetupStatusResource() .withId() .withClassName(CompetitionSetupSection.class.getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE) .build(); final SetupStatusResource savedStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE) .build(); when(setupStatusService.findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceFailure(new Error("GENERAL_NOT_FOUND", HttpStatus.BAD_REQUEST))); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); service.markSectionIncomplete(competitionId, section); verify(setupStatusService, times(1)).findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); }
EmailAddressResolver { public static EmailAddress fromNotificationTarget(NotificationTarget notificationTarget) { return new EmailAddress(notificationTarget.getEmailAddress(), notificationTarget.getName()); } private EmailAddressResolver(); static EmailAddress fromNotificationSource(NotificationSource notificationSource); static EmailAddress fromNotificationTarget(NotificationTarget notificationTarget); }
@Test public void testFromNotificationTargetWithUserNotificationTarget() { User user = newUser().withFirstName("My").withLastName("User").withEmailAddress("[email protected]").build(); UserNotificationTarget notificationTarget = new UserNotificationTarget(user.getName(), user.getEmail()); EmailAddress resolvedEmailAddress = EmailAddressResolver.fromNotificationTarget(notificationTarget); assertEquals("My User", resolvedEmailAddress.getName()); assertEquals("[email protected]", resolvedEmailAddress.getEmailAddress()); }
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection) { SetupStatusResource setupStatus = findOrCreateSetupStatusResource(competitionId, subsection.getClass().getName(), subsection.getId(), Optional.of(parentSection)); setupStatus.setCompleted(true); return setupStatusService.saveSetupStatus(setupStatus); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void testMarkSubsectionCompleteFindOne() { final CompetitionSetupSubsection section = CompetitionSetupSubsection.APPLICATION_DETAILS; final Long competitionId = 32L; final CompetitionSetupSection parentSection = CompetitionSetupSection.APPLICATION_FORM; final SetupStatusResource foundStatusResource = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withParentId(12L) .withCompleted(Boolean.FALSE).build(); final SetupStatusResource savingStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withParentId(12L) .withCompleted(Boolean.TRUE).build(); final SetupStatusResource savedStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withParentId(12L) .withTargetClassName(Competition.class.getName()) .withClassPk(competitionId) .withCompleted(Boolean.TRUE).build(); final SetupStatusResource parentSectionStatus = newSetupStatusResource() .withId(12L) .withClassName(parentSection.getClass().getName()) .withClassPk(parentSection.getId()) .withParentId() .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); when(setupStatusService.findSetupStatusAndTarget(parentSection.getClass().getName(), parentSection.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceSuccess(parentSectionStatus)); when(setupStatusService.findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceSuccess(foundStatusResource)); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); service.markSubsectionComplete(competitionId, parentSection, section); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); }
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection) { SetupStatusResource setupStatus = findOrCreateSetupStatusResource(competitionId, subsection.getClass().getName(), subsection.getId(), Optional.of(parentSection)); setupStatus.setCompleted(false); return setupStatusService.saveSetupStatus(setupStatus); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void testMarkSubsectionIncompleteCreateOne() { final CompetitionSetupSubsection section = CompetitionSetupSubsection.APPLICATION_DETAILS; final Long competitionId = 32L; final CompetitionSetupSection parentSection = CompetitionSetupSection.APPLICATION_FORM; final SetupStatusResource savingStatus = newSetupStatusResource() .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withParentId(12L) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); savingStatus.setId(null); final SetupStatusResource savedStatus = newSetupStatusResource() .withId(13L) .withClassName(section.getClass().getName()) .withClassPk(section.getId()) .withParentId(12L) .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); final SetupStatusResource parentSectionStatus = newSetupStatusResource() .withId(12L) .withClassName(parentSection.getClass().getName()) .withClassPk(parentSection.getId()) .withParentId() .withTargetClassName(Competition.class.getName()) .withTargetId(competitionId) .withCompleted(Boolean.FALSE).build(); when(setupStatusService.findSetupStatusAndTarget(parentSection.getClass().getName(), parentSection.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceSuccess(parentSectionStatus)); when(setupStatusService.findSetupStatusAndTarget(section.getClass().getName(), section.getId(), Competition.class.getName(), competitionId)) .thenReturn(serviceFailure(new Error("GENERAL_NOT_FOUND", HttpStatus.BAD_REQUEST))); when(setupStatusService.saveSetupStatus(savingStatus)).thenReturn(serviceSuccess(savedStatus)); service.markSubsectionIncomplete(competitionId, parentSection, section); verify(setupStatusService, times(1)).saveSetupStatus(savingStatus); }
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<Void> deleteCompetition(long competitionId) { return getCompetition(competitionId).andOnSuccess(competition -> deletePublicContentForCompetition(competition).andOnSuccess(() -> { deleteFormValidatorsForCompetitionQuestions(competition); deleteMilestonesForCompetition(competition); deleteInnovationLead(competition); deleteAllStakeholders(competition); deleteSetupStatus(competition); competitionRepository.delete(competition); return serviceSuccess(); })); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void deleteCompetition() throws Exception { Competition competition = newCompetition() .withSections(newSection() .withQuestions(newQuestion() .withFormInputs(newFormInput() .withInputValidators(newFormValidator().buildSet(2)) .build(1)) .build(1)) .build(1)) .build(); PublicContent publicContent = newPublicContent().build(); when(competitionRepository.findById(competition.getId())).thenReturn(Optional.of(competition)); when(publicContentRepository.findByCompetitionId(competition.getId())).thenReturn(publicContent); ServiceResult<Void> result = service.deleteCompetition(competition.getId()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(competitionRepository, publicContentRepository, innovationLeadRepository, stakeholderRepository, setupStatusRepository, milestoneRepository); inOrder.verify(competitionRepository).findById(competition.getId()); inOrder.verify(publicContentRepository).findByCompetitionId(competition.getId()); inOrder.verify(publicContentRepository).delete(publicContent); inOrder.verify(competitionRepository).save(createCompetitionExpectationsWithoutFormValidators(competition)); inOrder.verify(milestoneRepository).deleteByCompetitionId(competition.getId()); inOrder.verify(innovationLeadRepository).deleteAllInnovationLeads(competition.getId()); inOrder.verify(stakeholderRepository).deleteAllStakeholders(competition.getId()); inOrder.verify(setupStatusRepository).deleteByTargetClassNameAndTargetId(Competition.class.getName(), competition.getId()); inOrder.verify(competitionRepository).delete(competition); inOrder.verifyNoMoreInteractions(); } @Test public void deleteCompetition_competitionNotFound() throws Exception { Competition competition = newCompetition().build(); when(competitionRepository.findById(competition.getId())).thenReturn(Optional.empty()); ServiceResult<Void> result = service.deleteCompetition(competition.getId()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(notFoundError(Competition.class, competition.getId()))); verify(competitionRepository).findById(competition.getId()); verifyNoMoreInteractions(competitionRepository); }
CompetitionSetupServiceImpl extends BaseTransactionalService implements CompetitionSetupService { @Override @Transactional public ServiceResult<CompetitionResource> create() { Competition competition = new Competition(); competition.setSetupComplete(false); return persistNewCompetition(competition); } @Override @Transactional ServiceResult<String> generateCompetitionCode(Long id, ZonedDateTime dateTime); @Override @Transactional ServiceResult<CompetitionResource> save(Long id, CompetitionResource competitionResource); @Override @Transactional ServiceResult<Void> updateCompetitionInitialDetails(final Long competitionId, final CompetitionResource competitionResource, final Long existingInnovationLeadId); @Override @Transactional ServiceResult<CompetitionResource> create(); @Override @Transactional ServiceResult<CompetitionResource> createNonIfs(); @Override ServiceResult<Map<CompetitionSetupSection, Optional<Boolean>>> getSectionStatuses(Long competitionId); @Override ServiceResult<Map<CompetitionSetupSubsection, Optional<Boolean>>> getSubsectionStatuses(Long competitionId); @Override @Transactional ServiceResult<SetupStatusResource> markSectionComplete(Long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<List<SetupStatusResource>> markSectionIncomplete(long competitionId, CompetitionSetupSection section); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionComplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<SetupStatusResource> markSubsectionIncomplete(Long competitionId, CompetitionSetupSection parentSection, CompetitionSetupSubsection subsection); @Override @Transactional ServiceResult<Void> returnToSetup(Long competitionId); @Override @Transactional ServiceResult<Void> markAsSetup(Long competitionId); @Override @Transactional ServiceResult<Void> copyFromCompetitionTypeTemplate(Long competitionId, Long competitionTypeId); @Override @Transactional ServiceResult<Void> deleteCompetition(long competitionId); @Override @Transactional ServiceResult<FileEntryResource> uploadCompetitionTerms(String contentType, String contentLength, String originalFilename, long competitionId, HttpServletRequest request); @Override @Transactional ServiceResult<Void> deleteCompetitionTerms(long competitionId); static final BigDecimal DEFAULT_ASSESSOR_PAY; }
@Test public void create() { Competition competition = newCompetition().build(); CompetitionResource competitionResource = CompetitionResourceBuilder.newCompetitionResource().build(); GrantTermsAndConditions grantTermsAndConditions = new GrantTermsAndConditions(); FileType pdfFileType = new FileType(); when(grantTermsAndConditionsRepository.findOneByTemplate(GrantTermsAndConditionsRepository.DEFAULT_TEMPLATE_NAME)).thenReturn(grantTermsAndConditions); when(fileTypeRepository.findByName("PDF")).thenReturn(pdfFileType); when(competitionRepository.save(any(Competition.class))).thenReturn(competition); when(publicContentService.initialiseByCompetitionId(competition.getId())).thenReturn(serviceSuccess()); when(competitionMapperMock.mapToResource(competition)).thenReturn(competitionResource); ServiceResult<CompetitionResource> result = service.create(); assertTrue(result.isSuccess()); ArgumentCaptor<Competition> captor = ArgumentCaptor.forClass(Competition.class); verify(competitionRepository).save(captor.capture()); Competition savedCompetition = captor.getValue(); assertEquals(false, savedCompetition.getSetupComplete()); assertEquals(grantTermsAndConditions, savedCompetition.getTermsAndConditions()); }
AssessorCountOptionServiceImpl extends BaseTransactionalService implements AssessorCountOptionService { @Override public ServiceResult<List<AssessorCountOptionResource>> findAllByCompetitionType(Long competitionTypeId) { return serviceSuccess(simpleMap(assessorCountOptionRepository.findByCompetitionTypeId(competitionTypeId), assessorCountOptionMapper::mapToResource)); } @Override ServiceResult<List<AssessorCountOptionResource>> findAllByCompetitionType(Long competitionTypeId); }
@Test public void testFindAllByCompetitionType() throws Exception { List<AssessorCountOption> options = AssessorCountOptionFixture.programmeAssessorOptionsList(); List<AssessorCountOptionResource> expectedResponse = AssessorCountOptionFixture.programmeAssessorOptionResourcesList(); when(assessorCountOptionRepositoryMock.findByCompetitionTypeId(anyLong())).thenReturn(options); when(assessorCountOptionMapperMock.mapToResource(same(options.get(0)))).thenReturn((expectedResponse.get(0))); when(assessorCountOptionMapperMock.mapToResource(same(options.get(1)))).thenReturn((expectedResponse.get(1))); when(assessorCountOptionMapperMock.mapToResource(same(options.get(2)))).thenReturn((expectedResponse.get(2))); List<AssessorCountOptionResource> actualResponse = assessorCountOptionService.findAllByCompetitionType(1L).getSuccess(); assertEquals(expectedResponse, actualResponse); verify(assessorCountOptionRepositoryMock, only()).findByCompetitionTypeId(1L); }
CompetitionSetupTemplateServiceImpl implements CompetitionSetupTemplateService { @Override public ServiceResult<Competition> initializeCompetitionByCompetitionTemplate(Long competitionId, Long competitionTypeId) { Optional<CompetitionType> competitionType = competitionTypeRepository.findById(competitionTypeId); if (!competitionType.isPresent()) { return serviceFailure(new Error(COMPETITION_NOT_EDITABLE)); } Optional<Competition> competitionOptional = competitionRepository.findById(competitionId); if (!competitionOptional.isPresent() || competitionIsNotInSetupState(competitionOptional.get())) { return serviceFailure(new Error(COMPETITION_NOT_EDITABLE)); } Competition competition = competitionOptional.get(); competition.setCompetitionType(competitionType.get()); setDefaultAssessorPayAndCountAndAverageAssessorScore(competition); setDefaultOrganisationConfig(competition); setDefaultApplicationConfig(competition); setDefaultProjectDocuments(competition); competitionInitialiser.initialiseFinanceTypes(competition); competitionInitialiser.initialiseProjectSetupColumns(competition); CompetitionTemplate template = templates.get(competition.getCompetitionTypeEnum()); List<SectionBuilder> sectionBuilders = template.sections(); overrideTermsAndConditionsTerminologyForInvestorPartnerships(competition.getFundingType(), sectionBuilders); competition.setSections(sectionBuilders.stream().map(SectionBuilder::build).collect(Collectors.toList())); template.copyTemplatePropertiesToCompetition(competition); overrideTermsAndConditionsForNonGrantCompetitions(competition); questionPriorityOrderService.persistAndPrioritiseSections(competition, competition.getSections(), null); return serviceSuccess(competitionRepository.save(competition)); } @Autowired void setCompetitionTemplates(List<CompetitionTemplate> templateBeans); @Override ServiceResult<Competition> initializeCompetitionByCompetitionTemplate(Long competitionId, Long competitionTypeId); }
@Test public void initializeCompetitionByCompetitionTemplate_competitionTypeCantBeFoundShouldResultException() { CompetitionType competitionType = newCompetitionType().withId(1L).build(); Competition competition = newCompetition().withCompetitionStatus(CompetitionStatus.COMPETITION_SETUP).withId(3L).build(); when(competitionTypeRepositoryMock.findById(competitionType.getId())).thenReturn(Optional.empty()); when(competitionRepositoryMock.findById(competition.getId())).thenReturn(Optional.of(competition)); when(assessorCountOptionRepositoryMock.findByCompetitionTypeIdAndDefaultOptionTrue(competitionType.getId())).thenReturn(Optional.empty()); ServiceResult<Competition> result = service.initializeCompetitionByCompetitionTemplate(competition.getId(), competitionType.getId()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(COMPETITION_NOT_EDITABLE)); } @Test public void initializeCompetitionByCompetitionTemplate_competitionCantBeFoundShouldResultInServiceFailure() { CompetitionType competitionType = newCompetitionType().withId(1L).build(); Competition competition = newCompetition().withCompetitionStatus(CompetitionStatus.COMPETITION_SETUP).withId(3L).build(); when(competitionTypeRepositoryMock.findById(competitionType.getId())).thenReturn(Optional.of(competitionType)); when(competitionRepositoryMock.findById(competition.getId())).thenReturn(Optional.empty()); when(assessorCountOptionRepositoryMock.findByCompetitionTypeIdAndDefaultOptionTrue(competitionType.getId())).thenReturn(Optional.empty()); ServiceResult<Competition> result = service.initializeCompetitionByCompetitionTemplate(competition.getId(), competitionType.getId()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(COMPETITION_NOT_EDITABLE)); } @Test public void initializeCompetitionByCompetitionTemplate_competitionNotInCompetitionSetupShouldResultInServiceFailure() { CompetitionType competitionType = newCompetitionType().withId(1L).build(); Competition competition = newCompetition().withCompetitionStatus(CompetitionStatus.READY_TO_OPEN).withId(3L).build(); when(competitionTypeRepositoryMock.findById(competitionType.getId())).thenReturn(Optional.of(competitionType)); when(competitionRepositoryMock.findById(competition.getId())).thenReturn(Optional.of(competition)); when(assessorCountOptionRepositoryMock.findByCompetitionTypeIdAndDefaultOptionTrue(competitionType.getId())).thenReturn(Optional.empty()); ServiceResult<Competition> result = service.initializeCompetitionByCompetitionTemplate(competition.getId(), competitionType.getId()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(COMPETITION_NOT_EDITABLE)); } @Test public void initializeCompetitionByCompetitionTemplate() { CompetitionType competitionType = newCompetitionType() .withName(PROGRAMME.getText()) .withId(1L) .build(); Competition competition = newCompetition() .withId(3L) .withCompetitionStatus(CompetitionStatus.COMPETITION_SETUP) .withFundingType(FundingType.GRANT) .build(); when(programmeTemplate.sections()).thenReturn(newArrayList(aSection())); when(competitionTypeRepositoryMock.findById(competitionType.getId())).thenReturn(Optional.of(competitionType)); when(competitionRepositoryMock.findById(competition.getId())).thenReturn(Optional.of(competition)); when(assessorCountOptionRepositoryMock.findByCompetitionTypeIdAndDefaultOptionTrue(competitionType.getId())) .thenReturn(Optional.empty()); ServiceResult<Competition> result = service.initializeCompetitionByCompetitionTemplate(competition.getId(), competitionType.getId()); assertTrue(result.isSuccess()); verify(programmeTemplate).copyTemplatePropertiesToCompetition(competition); } @Test public void initializeCompetitionByCompetitionTemplate_fundingTypeTermsAndConditions() { GrantTermsAndConditions fundingTypeTerms = new GrantTermsAndConditions(); CompetitionType competitionType = newCompetitionType() .withName(PROGRAMME.getText()) .withId(1L) .build(); Competition competition = newCompetition() .withId(3L) .withCompetitionStatus(CompetitionStatus.COMPETITION_SETUP) .withFundingType(FundingType.LOAN) .build(); when(grantTermsAndConditionsRepositoryMock.getLatestForFundingType(FundingType.LOAN)).thenReturn(fundingTypeTerms); when(programmeTemplate.sections()).thenReturn(newArrayList(aSection())); when(competitionTypeRepositoryMock.findById(competitionType.getId())).thenReturn(Optional.of(competitionType)); when(competitionRepositoryMock.findById(competition.getId())).thenReturn(Optional.of(competition)); when(assessorCountOptionRepositoryMock.findByCompetitionTypeIdAndDefaultOptionTrue(competitionType.getId())) .thenReturn(Optional.empty()); when(competitionRepositoryMock.save(competition)).thenReturn(competition); ServiceResult<Competition> result = service.initializeCompetitionByCompetitionTemplate(competition.getId(), competitionType.getId()); assertTrue(result.isSuccess()); verify(programmeTemplate).copyTemplatePropertiesToCompetition(competition); assertEquals(result.getSuccess().getTermsAndConditions(), fundingTypeTerms); }
UserPermissionRules { @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") public boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user) { return isSystemRegistrationUser(user); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void systemRegistrationUserCanActivateUsers() { allGlobalRoleUsers.forEach(user -> { if (user.equals(systemRegistrationUser())) { assertTrue(rules.systemRegistrationUserCanActivateUsers(newUserResource().build(), user)); } else { assertFalse(rules.systemRegistrationUserCanActivateUsers(newUserResource().build(), user)); } }); }
ProfileController { @GetMapping("/id/{userId}/get-profile-skills") public RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId) { return profileService.getProfileSkills(userId).toGetResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void getProfileSkills() throws Exception { Long userId = 1L; ProfileSkillsResource profileSkillsResource = newProfileSkillsResource().build(); when(profileServiceMock.getProfileSkills(userId)).thenReturn(serviceSuccess(profileSkillsResource)); mockMvc.perform(get("/profile/id/{id}/get-profile-skills", userId)) .andExpect(status().isOk()) .andExpect(content().string(toJson(profileSkillsResource))); verify(profileServiceMock, only()).getProfileSkills(userId); }
ProfileController { @PutMapping("/id/{userId}/update-profile-skills") public RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills) { return profileService.updateProfileSkills(id, profileSkills).toPutResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void updateProfileSkills() throws Exception { ProfileSkillsEditResource profileSkillsEditResource = newProfileSkillsEditResource() .withSkillsAreas(RandomStringUtils.random(5000)) .build(); Long userId = 1L; when(profileServiceMock.updateProfileSkills(userId, profileSkillsEditResource)).thenReturn(serviceSuccess()); mockMvc.perform(put("/profile/id/{id}/update-profile-skills", userId) .contentType(APPLICATION_JSON) .content(objectMapper.writeValueAsString(profileSkillsEditResource))) .andExpect(status().isOk()); verify(profileServiceMock, only()).updateProfileSkills(userId, profileSkillsEditResource); } @Test public void updateProfileSkills_invalid() throws Exception { ProfileSkillsEditResource profileSkillsEditResource = newProfileSkillsEditResource() .withSkillsAreas(RandomStringUtils.random(5001)) .build(); Long userId = 1L; when(profileServiceMock.updateProfileSkills(userId, profileSkillsEditResource)).thenReturn(serviceSuccess()); mockMvc.perform(put("/profile/id/{id}/update-profile-skills", userId) .contentType(APPLICATION_JSON) .content(objectMapper.writeValueAsString(profileSkillsEditResource))) .andExpect(status().isNotAcceptable()); verify(profileServiceMock, never()).updateProfileSkills(userId, profileSkillsEditResource); }
ProfileController { @GetMapping("/id/{userId}/get-profile-agreement") public RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId) { return profileService.getProfileAgreement(userId).toGetResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void getProfileAgreement() throws Exception { Long userId = 1L; ProfileAgreementResource profileAgreementResource = newProfileAgreementResource().build(); when(profileServiceMock.getProfileAgreement(userId)).thenReturn(serviceSuccess(profileAgreementResource)); mockMvc.perform(get("/profile/id/{id}/get-profile-agreement", userId)) .andExpect(status().isOk()) .andExpect(content().string(toJson(profileAgreementResource))); verify(profileServiceMock, only()).getProfileAgreement(userId); }
ProfileController { @PutMapping("/id/{userId}/update-profile-agreement") public RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId) { return profileService.updateProfileAgreement(userId).toPutResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void updateProfileAgreement() throws Exception { Long userId = 1L; when(profileServiceMock.updateProfileAgreement(userId)).thenReturn(serviceSuccess()); mockMvc.perform(put("/profile/id/{id}/update-profile-agreement", userId)) .andExpect(status().isOk()); verify(profileServiceMock, only()).updateProfileAgreement(userId); }
ProfileController { @GetMapping("/id/{userId}/get-user-profile") public RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId) { return profileService.getUserProfile(userId).toGetResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void getProfileAddress() throws Exception { Long userId = 1L; UserProfileResource profileDetails = newUserProfileResource().build(); when(profileServiceMock.getUserProfile(userId)).thenReturn(serviceSuccess(profileDetails)); mockMvc.perform(get("/profile/id/{userId}/get-user-profile", userId) .contentType(APPLICATION_JSON)) .andExpect(status().isOk()) .andExpect(content().string(toJson(profileDetails))); verify(profileServiceMock, only()).getUserProfile(userId); }
ProfileController { @PutMapping("/id/{userId}/update-user-profile") public RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails) { return profileService.updateUserProfile(userId, profileDetails).toPutResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void updateProfileAddress() throws Exception { UserProfileResource profileDetails = newUserProfileResource().build(); Long userId = 1L; when(profileServiceMock.updateUserProfile(userId, profileDetails)).thenReturn(serviceSuccess(newUserResource().build())); mockMvc.perform(put("/profile/id/{userId}/update-user-profile", userId) .contentType(APPLICATION_JSON) .content(objectMapper.writeValueAsString(profileDetails))) .andExpect(status().isOk()); verify(profileServiceMock, only()).updateUserProfile(userId, profileDetails); }
ProfileController { @GetMapping("/id/{userId}/profile-status") public RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId) { return profileService.getUserProfileStatus(userId).toGetResponse(); } @GetMapping("/id/{userId}/get-profile-skills") RestResult<ProfileSkillsResource> getProfileSkills(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-skills") RestResult<Void> updateProfileSkills(@PathVariable("userId") long id, @Valid @RequestBody ProfileSkillsEditResource profileSkills); @GetMapping("/id/{userId}/get-profile-agreement") RestResult<ProfileAgreementResource> getProfileAgreement(@PathVariable("userId") long userId); @PutMapping("/id/{userId}/update-profile-agreement") RestResult<Void> updateProfileAgreement(@PathVariable("userId") long userId); @GetMapping("/id/{userId}/get-user-profile") RestResult<UserProfileResource> getUserProfile(@PathVariable("userId") Long userId); @PutMapping("/id/{userId}/update-user-profile") RestResult<Void> updateUserProfile(@PathVariable("userId") Long userId, @RequestBody UserProfileResource profileDetails); @GetMapping("/id/{userId}/profile-status") RestResult<UserProfileStatusResource> getUserProfileStatus(@PathVariable("userId") Long userId); }
@Test public void getUserProfileStatus() throws Exception { UserProfileStatusResource profileStatus = newUserProfileStatusResource().build(); Long userId = 1L; when(profileServiceMock.getUserProfileStatus(userId)).thenReturn(serviceSuccess(profileStatus)); mockMvc.perform(get("/profile/id/{userId}/profile-status", userId) .contentType(APPLICATION_JSON) .content(objectMapper.writeValueAsString(profileStatus))) .andExpect(status().isOk()); verify(profileServiceMock, only()).getUserProfileStatus(userId); }
UserPermissionRules { @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") public boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user) { return isSystemRegistrationUser(user); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void systemRegistrationUserChangeUsersPasswords() { allGlobalRoleUsers.forEach(user -> allGlobalRoleUsers.forEach(otherUser -> { if (user.equals(systemRegistrationUser())) { assertTrue(rules.systemRegistrationUserCanChangePasswordsForUsers(otherUser, user)); } else { assertFalse(rules.systemRegistrationUserCanChangePasswordsForUsers(otherUser, user)); } })); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override public ServiceResult<ProfileSkillsResource> getProfileSkills(long userId) { return find(userRepository.findById(userId), notFoundError(User.class, userId)) .andOnSuccess(user -> { ProfileSkillsResource profileSkillsResource = new ProfileSkillsResource(); profileSkillsResource.setUser(user.getId()); Optional<Profile> profile = profileRepository.findById(user.getProfileId()); if (profile.isPresent()) { profileSkillsResource.setInnovationAreas(simpleMap(profile.get().getInnovationAreas(), innovationArea -> innovationAreaMapper.mapToResource(innovationArea))); profileSkillsResource.setBusinessType(profile.get().getBusinessType()); profileSkillsResource.setSkillsAreas(profile.get().getSkillsAreas()); } return serviceSuccess(profileSkillsResource); }); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void getProfileSkills() { List<InnovationArea> innovationAreas = newInnovationArea() .withId(1L, 2L) .withName("Data", "Cyber Security") .build(2); List<InnovationAreaResource> innovationAreaResources = newInnovationAreaResource() .withId(1L, 2L) .withName("Data", "Cyber Security") .build(2); User existingUser = newUser().build(); Profile profile = newProfile() .withAddress(newAddress().build()) .withAgreement(newAgreement().build()) .withBusinessType(ACADEMIC) .withSkillsAreas("Skills") .withInnovationAreas(innovationAreas) .build(); existingUser.setProfileId(profile.getId()); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); when(profileRepositoryMock.findById(existingUser.getProfileId())).thenReturn(Optional.of(profile)); when(innovationAreaMapperMock.mapToResource(innovationAreas.get(0))).thenReturn(innovationAreaResources.get(0)); when(innovationAreaMapperMock.mapToResource(innovationAreas.get(1))).thenReturn(innovationAreaResources.get(1)); ProfileSkillsResource response = service.getProfileSkills(existingUser.getId()).getSuccess(); assertEquals(existingUser.getId(), response.getUser()); assertThat(response.getInnovationAreas(), containsInAnyOrder(innovationAreaResources.toArray(new InnovationAreaResource[innovationAreaResources.size()]))); assertEquals(ACADEMIC, response.getBusinessType()); assertEquals("Skills", response.getSkillsAreas()); InOrder inOrder = inOrder(userRepositoryMock, profileRepositoryMock, innovationAreaMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(profileRepositoryMock).findById(existingUser.getProfileId()); inOrder.verify(innovationAreaMapperMock, times(2)).mapToResource(isA(InnovationArea.class)); inOrder.verifyNoMoreInteractions(); } @Test public void getProfileSkills_userDoesNotExist() { long userIdNotExists = 1L; ServiceResult<ProfileSkillsResource> response = service.getProfileSkills(userIdNotExists); assertTrue(response.getFailure().is(notFoundError(User.class, userIdNotExists))); verify(userRepositoryMock, only()).findById(userIdNotExists); } @Test public void getProfileSkills_noSkills() { User existingUser = newUser() .withProfileId(1L) .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileSkillsResource expected = newProfileSkillsResource() .withUser(existingUser.getId()) .build(); ProfileSkillsResource response = service.getProfileSkills(existingUser.getId()).getSuccess(); assertEquals(expected, response); verify(userRepositoryMock).findById(existingUser.getId()); verifyNoMoreInteractions(userRepositoryMock); } @Test public void getProfileSkills_userDoesNotHaveProfileYet() { User existingUser = newUser() .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileSkillsResource expected = newProfileSkillsResource() .withUser(existingUser.getId()) .build(); ProfileSkillsResource response = service.getProfileSkills(existingUser.getId()).getSuccess(); assertEquals(expected, response); verify(userRepositoryMock).findById(existingUser.getId()); verifyNoMoreInteractions(userRepositoryMock); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override @Transactional public ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills) { return find(userRepository.findById(userId), notFoundError(User.class, userId)) .andOnSuccess(user -> updateUserProfileSkills(user, profileSkills)); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void updateProfileSkills() { long userId = 1L; Profile existingProfile = newProfile() .withAddress(newAddress().build()) .withAgreement(newAgreement().build()) .withBusinessType(ACADEMIC) .withSkillsAreas("Skills") .build(); User existingUser = newUser() .withId(userId) .withProfileId(existingProfile.getId()) .build(); when(profileRepositoryMock.findById(existingProfile.getId())).thenReturn(Optional.of(existingProfile)); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); Profile updatedProfile = newProfile() .with(id(existingUser.getProfileId())) .withAddress(existingProfile.getAddress()) .withBusinessType(BUSINESS) .withSkillsAreas("Updated") .withAgreement(existingProfile.getAgreement()) .build(); when(profileRepositoryMock.save(updatedProfile)).thenReturn(updatedProfile); ServiceResult<Void> result = service.updateProfileSkills(existingUser.getId(), newProfileSkillsEditResource() .withUser(existingUser.getId()) .withBusinessType(BUSINESS) .withSkillsAreas("Updated") .build()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(userId); inOrder.verify(profileRepositoryMock).save(updatedProfile); inOrder.verifyNoMoreInteractions(); } @Test public void updateProfileSkills_userDoesNotExist() { long userId = 1L; ServiceResult<Void> result = service.updateProfileSkills(userId, newProfileSkillsEditResource().build()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(notFoundError(User.class, userId))); verify(userRepositoryMock).findById(userId); verifyNoMoreInteractions(userRepositoryMock); } @Test public void updateProfileSkills_userDoesNotHaveProfileYet() { long userId = 1L; Profile profile = newProfile() .withId(23L) .withBusinessType(BUSINESS) .withSkillsAreas("Updated") .build(); User existingUser = newUser() .withId(userId) .withProfileId(profile.getId()) .build(); when(userRepositoryMock.findById(userId)).thenReturn(Optional.of(existingUser)); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); when(profileRepositoryMock.save(any(Profile.class))).thenReturn(newProfile().build(), profile); ServiceResult<Void> result = service.updateProfileSkills(existingUser.getId(), newProfileSkillsEditResource() .withUser(existingUser.getId()) .withBusinessType(BUSINESS) .withSkillsAreas("Updated") .build()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(userId); inOrder.verify(profileRepositoryMock).findById(profile.getId()); inOrder.verify(profileRepositoryMock).save(profile); inOrder.verifyNoMoreInteractions(); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override public ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId) { return find(userRepository.findById(userId), notFoundError(User.class, userId)) .andOnSuccess(user -> getCurrentAgreement().andOnSuccess(currentAgreement -> { Profile profile = profileRepository.findById(user.getProfileId()).orElse(null); boolean hasAgreement = profile != null && profile.getAgreement() != null; boolean hasCurrentAgreement = hasAgreement && currentAgreement.getId().equals(profile.getAgreement().getId()); ProfileAgreementResource profileAgreementResource = new ProfileAgreementResource(); profileAgreementResource.setUser(user.getId()); profileAgreementResource.setAgreement(agreementMapper.mapToResource(currentAgreement)); profileAgreementResource.setCurrentAgreement(hasCurrentAgreement); if (hasCurrentAgreement) { profileAgreementResource.setAgreementSignedDate(profile.getAgreementSignedDate()); } return serviceSuccess(profileAgreementResource); }) ); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void getProfileAgreement() { Agreement currentAgreement = newAgreement() .build(); AgreementResource currentAgreementResource = newAgreementResource().build(); ZonedDateTime agreementSignedDate = now(); Profile profile = newProfile() .withAgreement(currentAgreement) .withAgreementSignedDate(agreementSignedDate) .build(); User existingUser = newUser() .withProfileId(profile.getId()) .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(agreementMapperMock.mapToResource(currentAgreement)).thenReturn(currentAgreementResource); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileAgreementResource expected = newProfileAgreementResource() .withUser(existingUser.getId()) .withAgreement(currentAgreementResource) .withCurrentAgreement(true) .withAgreementSignedDate(agreementSignedDate) .build(); ProfileAgreementResource response = service.getProfileAgreement(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(agreementRepositoryMock, userRepositoryMock, agreementMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(agreementMapperMock).mapToResource(currentAgreement); inOrder.verifyNoMoreInteractions(); } @Test public void getProfileAgreement_userDoesNotExist() { long userIdNotExists = 1L; ServiceResult<ProfileAgreementResource> response = service.getProfileAgreement(userIdNotExists); assertTrue(response.getFailure().is(notFoundError(User.class, userIdNotExists))); verify(userRepositoryMock, only()).findById(userIdNotExists); verifyZeroInteractions(agreementRepositoryMock); verifyZeroInteractions(agreementMapperMock); } @Test public void getProfileAgreement_noAgreement() { Agreement currentAgreement = newAgreement() .build(); AgreementResource currentAgreementResource = newAgreementResource().build(); User existingUser = newUser() .withProfileId(1L) .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(agreementMapperMock.mapToResource(currentAgreement)).thenReturn(currentAgreementResource); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileAgreementResource expected = newProfileAgreementResource() .withUser(existingUser.getId()) .withAgreement(currentAgreementResource) .withCurrentAgreement(false) .withAgreementSignedDate((ZonedDateTime) null) .build(); ProfileAgreementResource response = service.getProfileAgreement(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(agreementRepositoryMock, userRepositoryMock, agreementMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(agreementMapperMock).mapToResource(currentAgreement); inOrder.verifyNoMoreInteractions(); } @Test public void getProfileAgreement_noCurrentAgreement() { Agreement currentAgreement = newAgreement() .build(); AgreementResource currentAgreementResource = newAgreementResource().build(); User existingUser = newUser() .withProfileId(10L) .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(agreementMapperMock.mapToResource(currentAgreement)).thenReturn(currentAgreementResource); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileAgreementResource expected = newProfileAgreementResource() .withUser(existingUser.getId()) .withAgreement(currentAgreementResource) .withCurrentAgreement(false) .withAgreementSignedDate((ZonedDateTime) null) .build(); ProfileAgreementResource response = service.getProfileAgreement(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(agreementRepositoryMock, userRepositoryMock, agreementMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(agreementMapperMock).mapToResource(currentAgreement); inOrder.verifyNoMoreInteractions(); } @Test public void getProfileAgreement_userDoesNotHaveProfileYet() { Agreement currentAgreement = newAgreement() .build(); AgreementResource currentAgreementResource = newAgreementResource().build(); User existingUser = newUser() .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(agreementMapperMock.mapToResource(currentAgreement)).thenReturn(currentAgreementResource); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ProfileAgreementResource expected = newProfileAgreementResource() .withUser(existingUser.getId()) .withAgreement(currentAgreementResource) .withCurrentAgreement(false) .withAgreementSignedDate((ZonedDateTime) null) .build(); ProfileAgreementResource response = service.getProfileAgreement(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(agreementRepositoryMock, userRepositoryMock, agreementMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(agreementMapperMock).mapToResource(currentAgreement); inOrder.verifyNoMoreInteractions(); }
UserPermissionRules { @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") public boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user) { return userToUpdate.getId().equals(user.getId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void anyoneCanChangeTheirOwnPassword() { allGlobalRoleUsers.forEach(user -> allGlobalRoleUsers.forEach(otherUser -> { if (user.equals(otherUser)) { assertTrue(rules.usersCanChangeTheirOwnPassword(otherUser, user)); } else { assertFalse(rules.usersCanChangeTheirOwnPassword(otherUser, user)); } })); } @Test public void usersCanChangeTheirOwnPasswords() { UserResource user = newUserResource().build(); assertTrue(rules.usersCanChangeTheirOwnPassword(user, user)); } @Test public void usersCanChangeTheirOwnPasswordsButAttemptingToUpdateAnotherUsersPassword() { UserResource user = newUserResource().build(); UserResource anotherUser = newUserResource().build(); assertFalse(rules.usersCanChangeTheirOwnPassword(user, anotherUser)); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { private void updateProfileAgreement(User user, Agreement agreement) { Profile profile = getOrCreateUserProfile(user); profile.setAgreementSignedDate(ZonedDateTime.now()); profile.setAgreement(agreement); profileRepository.save(profile); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void updateProfileAgreement() { ZonedDateTime expectedAgreementSignedDate = ZonedDateTime.of(2016, 10, 11, 12, 13, 14, 0, ZoneId.systemDefault()); Profile profile = newProfile() .withAgreement(newAgreement().build()) .withAgreementSignedDate((ZonedDateTime) null) .build(); User existingUser = newUser() .withProfileId(profile.getId()) .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); Agreement currentAgreement = newAgreement() .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(userRepositoryMock.save(createUserExpectations(existingUser.getId(), newProfile() .withId(existingUser.getProfileId()) .withAgreement(currentAgreement) .withAgreementSignedDate(expectedAgreementSignedDate) .build()))).thenReturn(newUser().build()); ServiceResult<Void> result = service.updateProfileAgreement(existingUser.getId()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, agreementRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(profileRepositoryMock, times(2)).findById(profile.getId()); inOrder.verify(profileRepositoryMock).save(profile); inOrder.verifyNoMoreInteractions(); } @Test public void updateProfileAgreement_userDoesNotExist() { long userIdNotExists = 1L; ServiceResult<Void> result = service.updateProfileAgreement(userIdNotExists); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(notFoundError(User.class, userIdNotExists))); verify(userRepositoryMock, only()).findById(userIdNotExists); verifyZeroInteractions(agreementRepositoryMock); verifyZeroInteractions(agreementMapperMock); } @Test public void updateProfileAgreement_noAgreement() { ZonedDateTime expectedAgreementSignedDate = ZonedDateTime.of(2016, 10, 11, 12, 13, 14, 0, ZoneId.systemDefault()); Profile initialProfile = newProfile() .build(); User existingUser = newUser() .withProfileId(initialProfile.getId()) .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); Agreement currentAgreement = newAgreement() .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); Profile updatedProfile = newProfile() .with(id(existingUser.getProfileId())) .withAgreement(currentAgreement) .withAgreementSignedDate(expectedAgreementSignedDate) .build(); when(profileRepositoryMock.save(updatedProfile)).thenReturn(updatedProfile); when(profileRepositoryMock.findById(initialProfile.getId())) .thenReturn(Optional.of(initialProfile), Optional.of(initialProfile), Optional.of(updatedProfile)); ServiceResult<Void> result = service.updateProfileAgreement(existingUser.getId()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, agreementRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(profileRepositoryMock, times(2)).findById(updatedProfile.getId()); inOrder.verify(profileRepositoryMock).save(any(Profile.class)); inOrder.verifyNoMoreInteractions(); } @Test public void updateProfileAgreement_noCurrentAgreement() { ZonedDateTime expectedAgreementSignedDate = ZonedDateTime.of(2016, 10, 11, 12, 13, 14, 0, ZoneId.systemDefault()); Profile initialProfile = newProfile() .withAgreement(newAgreement().withId(1L).build()) .withAgreementSignedDate(now()) .build(); User existingUser = newUser() .withProfileId(initialProfile.getId()) .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); Agreement currentAgreement = newAgreement() .withId(2L) .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); Profile updatedProfile = newProfile() .with(id(existingUser.getProfileId())) .withAgreement(currentAgreement) .withAgreementSignedDate(expectedAgreementSignedDate) .build(); when(profileRepositoryMock.save(updatedProfile)).thenReturn(updatedProfile); when(profileRepositoryMock.findById(initialProfile.getId())) .thenReturn(Optional.of(initialProfile), Optional.of(initialProfile), Optional.of(updatedProfile)); ServiceResult<Void> result = service.updateProfileAgreement(existingUser.getId()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, agreementRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(profileRepositoryMock, times(2)).findById(updatedProfile.getId()); inOrder.verify(profileRepositoryMock).save(any(Profile.class)); inOrder.verifyNoMoreInteractions(); } @Test public void updateProfileAgreement_agreementAlreadySigned() { Agreement currentAgreement = newAgreement() .build(); Profile profile = newProfile() .withAgreement(currentAgreement) .withAgreementSignedDate(now()) .build(); User existingUser = newUser() .withProfileId(profile.getId()) .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); when(profileRepositoryMock.findById(existingUser.getProfileId())).thenReturn(Optional.of(profile)); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); ServiceResult<Void> result = service.updateProfileAgreement(existingUser.getId()); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(badRequestError("validation.assessorprofileagreementform.terms.alreadysigned"))); InOrder inOrder = inOrder(userRepositoryMock, agreementRepositoryMock, userRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verifyNoMoreInteractions(); } @Test public void updateProfileAgreement_userDoesNotHaveProfileYet() { ZonedDateTime expectedAgreementSignedDate = ZonedDateTime.of(2016, 10, 11, 12, 13, 14, 0, ZoneId.systemDefault()); User existingUser = newUser() .withId(1L) .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); Agreement currentAgreement = newAgreement() .build(); when(agreementRepositoryMock.findByCurrentTrue()).thenReturn(currentAgreement); Profile newProfile = newProfile() .with(id(null)) .build(); Long profileId = 23L; Profile savedProfile = newProfile() .withId(profileId) .build(); Profile profileWithAgreement = newProfile() .withId(profileId) .withAgreement(currentAgreement) .withAgreementSignedDate(expectedAgreementSignedDate) .build(); when(profileRepositoryMock.save(newProfile)).thenReturn(savedProfile); when(profileRepositoryMock.findById(profileId)).thenReturn(Optional.of(savedProfile), Optional.of(profileWithAgreement)); ServiceResult<Void> result = service.updateProfileAgreement(existingUser.getId()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, agreementRepositoryMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(agreementRepositoryMock).findByCurrentTrue(); inOrder.verify(profileRepositoryMock).findById(profileId); inOrder.verify(profileRepositoryMock).save(any(Profile.class)); inOrder.verifyNoMoreInteractions(); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override public ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId) { return getUser(userId).andOnSuccess(this::getProfileStatusForUser); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void getUserProfileStatus() { User user = newUser().build(); when(userRepositoryMock.findById(user.getId())).thenReturn(Optional.of(user)); ServiceResult<UserProfileStatusResource> result = service.getUserProfileStatus(user.getId()); assertTrue(result.isSuccess()); assertEquals(newUserProfileStatusResource().withUser(user.getId()).build(), result.getSuccess()); verify(userRepositoryMock, only()).findById(user.getId()); } @Test public void getUserProfileStatus_complete() { Profile profile = newProfile() .withSkillsAreas("skills") .withAgreementSignedDate(now()) .build(); User user = newUser() .withAffiliations( newAffiliation().withModifiedOn(now().minusYears(0)).build(1) ) .withProfileId(profile.getId()) .build(); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); when(userRepositoryMock.findById(user.getId())).thenReturn(Optional.of(user)); ServiceResult<UserProfileStatusResource> result = service.getUserProfileStatus(user.getId()); assertTrue(result.isSuccess()); assertEquals( newUserProfileStatusResource() .withUser(user.getId()) .withSkillsComplete(true) .withAffliliationsComplete(true) .withAgreementComplete(true) .build(), result.getSuccess() ); verify(userRepositoryMock, only()).findById(user.getId()); } @Test public void getUserProfileStatus_skillsComplete() { Profile profile = newProfile() .withSkillsAreas("skills") .build(); User user = newUser() .withProfileId(profile.getId()) .build(); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); when(userRepositoryMock.findById(user.getId())).thenReturn(Optional.of(user)); ServiceResult<UserProfileStatusResource> result = service.getUserProfileStatus(user.getId()); assertTrue(result.isSuccess()); assertEquals( newUserProfileStatusResource() .withUser(user.getId()) .withSkillsComplete(true) .withAffliliationsComplete(false) .withAgreementComplete(false) .build(), result.getSuccess() ); verify(userRepositoryMock, only()).findById(user.getId()); } @Test public void getUserProfileStatus_affiliationsComplete() { User user = newUser() .withAffiliations( newAffiliation().withModifiedOn(now().minusYears(0)).build(1) ) .build(); when(userRepositoryMock.findById(user.getId())).thenReturn(Optional.of(user)); ServiceResult<UserProfileStatusResource> result = service.getUserProfileStatus(user.getId()); assertTrue(result.isSuccess()); assertEquals( newUserProfileStatusResource() .withUser(user.getId()) .withSkillsComplete(false) .withAffliliationsComplete(true) .withAgreementComplete(false) .build(), result.getSuccess() ); verify(userRepositoryMock, only()).findById(user.getId()); } @Test public void getUserProfileStatus_agreementComplete() { Profile profile = newProfile() .withAgreementSignedDate(now()) .build(); User user = newUser() .withProfileId(profile.getId()) .build(); when(profileRepositoryMock.findById(profile.getId())).thenReturn(Optional.of(profile)); when(userRepositoryMock.findById(user.getId())).thenReturn(Optional.of(user)); ServiceResult<UserProfileStatusResource> result = service.getUserProfileStatus(user.getId()); assertTrue(result.isSuccess()); assertEquals( newUserProfileStatusResource() .withUser(user.getId()) .withSkillsComplete(false) .withAffliliationsComplete(false) .withAgreementComplete(true) .build(), result.getSuccess() ); verify(userRepositoryMock, only()).findById(user.getId()); }
UserPermissionRules { @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") public boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user) { List<Application> applicationsWhereThisUserIsInConsortium = getApplicationsRelatedToUserByProcessRoles(user, consortiumProcessRoleFilter); List<ProcessRole> otherProcessRolesForThoseApplications = getAllProcessRolesForApplications(applicationsWhereThisUserIsInConsortium); List<ProcessRole> allConsortiumProcessRoles = simpleFilter(otherProcessRolesForThoseApplications, consortiumProcessRoleFilter); List<User> allConsortiumUsers = simpleMap(allConsortiumProcessRoles, ProcessRole::getUser); return simpleMap(allConsortiumUsers, User::getId).contains(userToView.getId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void consortiumMembersCanViewOtherConsortiumMembers() { Application application1 = newApplication().build(); when(applicationRepository.findById(application1.getId())).thenReturn(Optional.of(application1)); User application1Lead1 = newUser().build(); User application1Lead2 = newUser().build(); User application1Lead3AndApplication2Collaborator2 = newUser().build(); User application1Collaborator1 = newUser().build(); User application1Collaborator2 = newUser().build(); List<ProcessRole> application1ConsortiumRoles = newProcessRole().withApplication(application1). withRole(Role.LEADAPPLICANT, Role.LEADAPPLICANT, Role.LEADAPPLICANT, Role.COLLABORATOR, Role.COLLABORATOR). withUser(application1Lead1, application1Lead2, application1Lead3AndApplication2Collaborator2, application1Collaborator1, application1Collaborator2). build(5); List<User> application1Consortium = simpleMap(application1ConsortiumRoles, ProcessRole::getUser); List<UserResource> application1ConsortiumResources = simpleMap(application1Consortium, userResourceForUser()); when(processRoleRepository.findByUserId(application1Lead1.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(0))); when(processRoleRepository.findByUserId(application1Lead2.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(1))); when(processRoleRepository.findByUserId(application1Collaborator1.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(3))); when(processRoleRepository.findByUserId(application1Collaborator2.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(4))); Application application2 = newApplication().build(); when(applicationRepository.findById(application2.getId())).thenReturn(Optional.of(application2)); User application2Lead = newUser().build(); User application2Collaborator1 = newUser().build(); List<ProcessRole> application2ConsortiumRoles = newProcessRole().withApplication(application2). withRole(Role.LEADAPPLICANT, Role.COLLABORATOR, Role.COLLABORATOR). withUser(application2Lead, application2Collaborator1, application1Lead3AndApplication2Collaborator2). build(3); List<User> application2Consortium = simpleMap(application2ConsortiumRoles, ProcessRole::getUser); List<UserResource> application2ConsortiumResources = simpleMap(application2Consortium, userResourceForUser()); when(processRoleRepository.findByUserId(application2Lead.getId())). thenReturn(singletonList(application2ConsortiumRoles.get(0))); when(processRoleRepository.findByUserId(application2Collaborator1.getId())). thenReturn(singletonList(application2ConsortiumRoles.get(1))); when(processRoleRepository.findByUserId(application1Lead3AndApplication2Collaborator2.getId())). thenReturn(asList(application1ConsortiumRoles.get(2), application2ConsortiumRoles.get(2))); application1ConsortiumResources.forEach(user -> application1ConsortiumResources.forEach(otherUser -> assertTrue(rules.consortiumMembersCanViewOtherConsortiumMembers(otherUser, user)))); application2ConsortiumResources.forEach(user -> application2ConsortiumResources.forEach(otherUser -> assertTrue(rules.consortiumMembersCanViewOtherConsortiumMembers(otherUser, user)))); application1ConsortiumResources.forEach(consortium1User -> application2ConsortiumResources.forEach(consortium2User -> { if (asList(consortium1User.getId(), consortium2User.getId()).contains(application1Lead3AndApplication2Collaborator2.getId())) { assertTrue(rules.consortiumMembersCanViewOtherConsortiumMembers(consortium2User, consortium1User)); assertTrue(rules.consortiumMembersCanViewOtherConsortiumMembers(consortium1User, consortium2User)); } else { assertFalse(rules.consortiumMembersCanViewOtherConsortiumMembers(consortium2User, consortium1User)); assertFalse(rules.consortiumMembersCanViewOtherConsortiumMembers(consortium1User, consortium2User)); } })); } @Test public void consortiumMembersCanViewOtherConsortiumMembersButNotAssessors() { Application application1 = newApplication().build(); User applicationLead = newUser().build(); User applicationCollaborator = newUser().build(); User applicationAssessor = newUser().build(); List<ProcessRole> applicationConsortiumRoles = newProcessRole().withApplication(application1). withRole(Role.LEADAPPLICANT, Role.COLLABORATOR). withUser(applicationLead, applicationCollaborator). build(2); ProcessRole assessorProcessRole = newProcessRole().withApplication(application1).withRole(Role.ASSESSOR). withUser(applicationAssessor).build(); List<User> applicationConsortium = simpleMap(applicationConsortiumRoles, ProcessRole::getUser); List<UserResource> applicationConsortiumResources = simpleMap(applicationConsortium, userResourceForUser()); UserResource applicationAssessorResource = userResourceForUser().apply(applicationAssessor); combineLists(applicationConsortiumRoles, assessorProcessRole).forEach(role -> when(processRoleRepository.findById(role.getId())).thenReturn(Optional.of(role))); applicationConsortiumResources.forEach(consortiumUser -> assertFalse(rules.consortiumMembersCanViewOtherConsortiumMembers(applicationAssessorResource, consortiumUser))); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override public ServiceResult<UserProfileResource> getUserProfile(Long userId) { return find(userRepository.findById(userId), notFoundError(User.class, userId)) .andOnSuccess(user -> { UserProfileResource profileDetails = assignUserProfileDetails(user); if (user.getProfileId() != null) { Profile profile = profileRepository.findById(user.getProfileId()).get(); profileDetails.setAddress(addressMapper.mapToResource(profile.getAddress())); profileDetails.setCreatedBy(profile.getCreatedBy().getName()); profileDetails.setCreatedOn(profile.getCreatedOn()); profileDetails.setModifiedBy(profile.getModifiedBy().getName()); profileDetails.setModifiedOn(profile.getModifiedOn()); } return serviceSuccess(profileDetails); }); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void getUserProfile() { User createdByUser = newUser().withFirstName("abc").withLastName("def").build(); Profile existingProfile = newProfile() .withAddress(newAddress().withId(1L).build()) .withAgreement(newAgreement().build()) .withBusinessType(ACADEMIC) .withSkillsAreas("Skills") .withCreatedBy(createdByUser) .withCreatedOn(now()) .withModifiedBy(createdByUser) .withModifiedOn(now()) .build(); User existingUser = newUser() .withProfileId(existingProfile.getId()) .build(); AddressResource addressResource = newAddressResource().build(); when(profileRepositoryMock.findById(existingProfile.getId())).thenReturn(Optional.of(existingProfile)); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); when(addressMapperMock.mapToResource(existingProfile.getAddress())).thenReturn(addressResource); UserProfileResource expected = newUserProfileResource() .withUser(existingUser.getId()) .withFirstName(existingUser.getFirstName()) .withLastName(existingUser.getLastName()) .withEmail(existingUser.getEmail()) .withAddress(addressResource) .withCreatedBy(createdByUser.getName()) .withCreatedOn(now()) .withModifiedBy(createdByUser.getName()) .withModifiedOn(now()) .build(); UserProfileResource response = service.getUserProfile(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(userRepositoryMock, addressMapperMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verify(addressMapperMock).mapToResource(existingProfile.getAddress()); inOrder.verifyNoMoreInteractions(); } @Test public void getUserProfile_userDoesNotHaveProfileYet() { User existingUser = newUser() .build(); when(userRepositoryMock.findById(existingUser.getId())).thenReturn(Optional.of(existingUser)); UserProfileResource expected = newUserProfileResource() .withUser(existingUser.getId()) .withFirstName(existingUser.getFirstName()) .withLastName(existingUser.getLastName()) .withEmail(existingUser.getEmail()) .build(); UserProfileResource response = service.getUserProfile(existingUser.getId()).getSuccess(); assertEquals(expected, response); InOrder inOrder = inOrder(userRepositoryMock); inOrder.verify(userRepositoryMock).findById(existingUser.getId()); inOrder.verifyNoMoreInteractions(); verifyZeroInteractions(addressMapperMock); }
ProfileServiceImpl extends BaseTransactionalService implements ProfileService { @Override @Transactional @UserUpdate public ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails) { return find(userRepository.findById(userId), notFoundError(User.class, userId)) .andOnSuccess(user -> updateUserProfileDetails(user, profileDetails)) .andOnSuccessReturn(userMapper::mapToResource); } @Override ServiceResult<ProfileSkillsResource> getProfileSkills(long userId); @Override @Transactional ServiceResult<Void> updateProfileSkills(long userId, ProfileSkillsEditResource profileSkills); @Override ServiceResult<ProfileAgreementResource> getProfileAgreement(long userId); @Override @Transactional ServiceResult<Void> updateProfileAgreement(long userId); @Override ServiceResult<UserProfileResource> getUserProfile(Long userId); @Override @Transactional @UserUpdate ServiceResult<UserResource> updateUserProfile(Long userId, UserProfileResource profileDetails); @Override ServiceResult<UserProfileStatusResource> getUserProfileStatus(Long userId); }
@Test public void updateUserProfile() { Long userId = 1L; Profile originalProfile = newProfile() .withAddress(newAddress().build()) .build(); User existingUser = newUser() .withProfileId(originalProfile.getId()) .build(); when(profileRepositoryMock.findById(originalProfile.getId())).thenReturn(Optional.of(originalProfile)); when(userRepositoryMock.findById(userId)).thenReturn(Optional.of(existingUser)); AddressResource addressResource = newAddressResource().build(); Address address = newAddress().build(); when(addressMapperMock.mapToDomain(addressResource)).thenReturn(address); Profile updatedProfile = newProfile() .with(id(existingUser.getProfileId())) .withAddress(address) .build(); when(profileRepositoryMock.save(updatedProfile)).thenReturn(updatedProfile); ServiceResult<UserResource> result = service.updateUserProfile(userId, newUserProfileResource() .withAddress(addressResource) .build()); assertTrue(result.isSuccess()); InOrder inOrder = inOrder(userRepositoryMock, addressMapperMock, profileRepositoryMock); inOrder.verify(userRepositoryMock).findById(userId); inOrder.verify(profileRepositoryMock).findById(originalProfile.getId()); inOrder.verify(addressMapperMock).mapToDomain(addressResource); inOrder.verify(profileRepositoryMock).save(updatedProfile); inOrder.verifyNoMoreInteractions(); }
DoiExpiryServiceImpl extends BaseTransactionalService implements DoiExpiryService { @Override @Transactional public void notifyExpiredDoi() { ZonedDateTime expiry = Profile.startOfCurrentFinancialYear(ZonedDateTime.now()).atStartOfDay(ZoneId.systemDefault()); Page<User> expired = affiliationRepository.findUserToBeNotifiedOfExpiry(expiry, PageRequest.of(0, 1)); expired.getContent().stream().findFirst().ifPresent(this::notifyExpiry); } DoiExpiryServiceImpl(AffiliationRepository affiliationRepository, ProfileRepository profileRepository, NotificationService notificationService, SystemNotificationSource systemNotificationSource, @Value("${ifs.web.baseURL}") String webBaseUrl); @Override @Transactional void notifyExpiredDoi(); }
@Test public void notifyExpiredDoi() { long profileId = 5L; ZonedDateTime expiry = Profile.startOfCurrentFinancialYear(ZonedDateTime.now()).atStartOfDay(ZoneId.systemDefault()); User userToNotify = newUser() .withProfileId(profileId) .withEmailAddress("[email protected]") .withFirstName("Someone") .withLastName("Smith") .withAffiliations(newAffiliation().withModifiedOn(ZonedDateTime.of(2019, 4, 6, 0, 0, 0, 0, ZoneId.systemDefault())).build(1)) .build(); Profile profile = newProfile().build(); when(affiliationRepository.findUserToBeNotifiedOfExpiry(expiry, PageRequest.of(0, 1))).thenReturn(new PageImpl<>(singletonList(userToNotify))); when(notificationService.sendNotificationWithFlush(any(Notification.class), eq(EMAIL))).thenReturn(serviceSuccess()); when(profileRepository.findById(profileId)).thenReturn(Optional.of(profile)); doiExpiryService.notifyExpiredDoi(); ArgumentCaptor<Notification> argumentCaptor = ArgumentCaptor.forClass(Notification.class); verify(notificationService).sendNotificationWithFlush(argumentCaptor.capture(), eq(EMAIL)); Notification notification = argumentCaptor.getValue(); assertEquals(notification.getTo().size(), 1); assertEquals(notification.getTo().get(0).getEmailAddress(), userToNotify.getEmail()); assertEquals(notification.getTo().get(0).getName(), userToNotify.getName()); assertEquals(notification.getMessageKey().name(), "ASSESSOR_AFFILIATION_EXPIRED"); assertEquals(notification.getGlobalArguments().get("webBaseUrl"), webBaseUrl); assertEquals(notification.getGlobalArguments().get("affiliationModifiedDate"), "6 April 2019"); assertEquals(notification.getFrom(), systemNotificationSource); assertNotNull(profile.getDoiNotifiedOn()); }
Profile extends AuditableEntity { public void addInnovationAreas(Set<InnovationArea> innovationAreas) { innovationAreas.forEach(this::addInnovationArea); } Profile(); void signAgreement(Agreement agreement, ZonedDateTime signedDate); Long getId(); void setId(Long id); Address getAddress(); void setAddress(Address address); String getSkillsAreas(); void setSkillsAreas(String skillsAreas); Set<InnovationArea> getInnovationAreas(); void addInnovationArea(InnovationArea innovationArea); void addInnovationAreas(Set<InnovationArea> innovationAreas); BusinessType getBusinessType(); void setBusinessType(BusinessType businessType); Agreement getAgreement(); void setAgreement(Agreement agreement); ZonedDateTime getAgreementSignedDate(); void setAgreementSignedDate(ZonedDateTime agreementSignedDate); boolean isCompliant(User user); static boolean isAffiliationsComplete(User user); static LocalDate startOfCurrentFinancialYear(ZonedDateTime now); ZonedDateTime getDoiNotifiedOn(); void setDoiNotifiedOn(ZonedDateTime doiNotifiedOn); @Override boolean equals(Object o); @Override int hashCode(); }
@Test public void testAddInnovationAreas() { InnovationArea expectedInnovationArea1 = newInnovationArea().withName("Innovation Area A").build(); InnovationArea expectedInnovationArea2 = newInnovationArea().withName("Innovation Area B").build(); Profile profile = newProfile().build(); profile.addInnovationAreas(newHashSet(expectedInnovationArea1, expectedInnovationArea2)); Set<InnovationArea> innovationAreas = profile.getInnovationAreas(); assertEquals(2, innovationAreas.size()); assertTrue(innovationAreas.contains(expectedInnovationArea1)); assertTrue(innovationAreas.contains(expectedInnovationArea2)); }
Profile extends AuditableEntity { public static boolean isAffiliationsComplete(User user) { Optional<ZonedDateTime> doiLastSignedDateTime = user.getAffiliations().stream().findAny().map(AuditableEntity::getModifiedOn); return doiLastSignedDateTime.isPresent() && doiLastSignedDateTime.get() .isAfter(startOfCurrentFinancialYear( ZonedDateTime.now()).atStartOfDay(ZoneId.systemDefault()) ); } Profile(); void signAgreement(Agreement agreement, ZonedDateTime signedDate); Long getId(); void setId(Long id); Address getAddress(); void setAddress(Address address); String getSkillsAreas(); void setSkillsAreas(String skillsAreas); Set<InnovationArea> getInnovationAreas(); void addInnovationArea(InnovationArea innovationArea); void addInnovationAreas(Set<InnovationArea> innovationAreas); BusinessType getBusinessType(); void setBusinessType(BusinessType businessType); Agreement getAgreement(); void setAgreement(Agreement agreement); ZonedDateTime getAgreementSignedDate(); void setAgreementSignedDate(ZonedDateTime agreementSignedDate); boolean isCompliant(User user); static boolean isAffiliationsComplete(User user); static LocalDate startOfCurrentFinancialYear(ZonedDateTime now); ZonedDateTime getDoiNotifiedOn(); void setDoiNotifiedOn(ZonedDateTime doiNotifiedOn); @Override boolean equals(Object o); @Override int hashCode(); }
@Test public void isAffiliationsComplete_none() { User user = newUser().build(); assertFalse(Profile.isAffiliationsComplete(user)); } @Test public void isAffiliationsComplete_completed() { User user = newUser().withAffiliations(newAffiliation().withModifiedOn(ZonedDateTime.now()).build(1)).build(); assertTrue(Profile.isAffiliationsComplete(user)); } @Test public void isAffiliationsComplete_expired() { User user = newUser().withAffiliations(newAffiliation().withModifiedOn(ZonedDateTime.now().minusYears(1)).build(1)).build(); assertFalse(Profile.isAffiliationsComplete(user)); }
Profile extends AuditableEntity { public static LocalDate startOfCurrentFinancialYear(ZonedDateTime now) { if (!DOI_EXPIRE_DATE.isAfter(MonthDay.of(now.getMonth(), now.getDayOfMonth()))) { return DOI_EXPIRE_DATE.atYear(now.getYear()); } else { return DOI_EXPIRE_DATE.atYear(now.getYear()-1); } } Profile(); void signAgreement(Agreement agreement, ZonedDateTime signedDate); Long getId(); void setId(Long id); Address getAddress(); void setAddress(Address address); String getSkillsAreas(); void setSkillsAreas(String skillsAreas); Set<InnovationArea> getInnovationAreas(); void addInnovationArea(InnovationArea innovationArea); void addInnovationAreas(Set<InnovationArea> innovationAreas); BusinessType getBusinessType(); void setBusinessType(BusinessType businessType); Agreement getAgreement(); void setAgreement(Agreement agreement); ZonedDateTime getAgreementSignedDate(); void setAgreementSignedDate(ZonedDateTime agreementSignedDate); boolean isCompliant(User user); static boolean isAffiliationsComplete(User user); static LocalDate startOfCurrentFinancialYear(ZonedDateTime now); ZonedDateTime getDoiNotifiedOn(); void setDoiNotifiedOn(ZonedDateTime doiNotifiedOn); @Override boolean equals(Object o); @Override int hashCode(); }
@Test public void startOfCurrentFinancialYear() { assertEquals(LocalDate.of(2017, 04, 06), Profile.startOfCurrentFinancialYear(ZonedDateTime.parse("2018-04-05T11:59:59+00:00"))); assertEquals(LocalDate.of(2018, 04, 06), Profile.startOfCurrentFinancialYear(ZonedDateTime.parse("2018-04-06T00:00:00+00:00"))); assertEquals(LocalDate.of(2018, 04, 06), Profile.startOfCurrentFinancialYear(ZonedDateTime.parse("2018-04-06T00:00:01+00:00"))); }
RestGrantEndpoint implements GrantEndpoint { @Override public ServiceResult<Void> send(Grant grant) { List<Grant> grantAsList = singletonList(grant); Either<ResponseEntity<Void>, ResponseEntity<JsonNode>> response = adaptor.restPostWithEntity(silRestServiceUrl + path, grantAsList, JsonNode.class, Void.class, HttpStatus.OK, HttpStatus.ACCEPTED); return response.mapLeftOrRight( failure -> { LOG.debug("Sent grant FAILURE : " + toJson(grant)); return serviceFailure(new Error(GRANT_PROCESS_SEND_FAILED, failure.getStatusCode())); }, success -> { LOG.debug("Sent grant SUCCESS : " + toJson(grant)); return serviceSuccess(); } ); } @Override ServiceResult<Void> send(Grant grant); }
@Test public void send() { Grant grant = new Grant(); String expectedUrl = "http: ResponseEntity<String> returnedEntity = new ResponseEntity<>( new ObjectNode(jsonNodeFactory).put("Success", "Accepted").toString(), ACCEPTED); when(mockRestTemplate.postForEntity(expectedUrl, adaptor.jsonEntity(singletonList(grant)), String.class)) .thenReturn(returnedEntity); ServiceResult<Void> sendProjectResult = service.send(grant); assertTrue(sendProjectResult.isSuccess()); } @Test public void send_failure() { Grant grant = new Grant(); String expectedUrl = "http: ResponseEntity<String> returnedEntity = new ResponseEntity<>(INTERNAL_SERVER_ERROR); when(mockRestTemplate.postForEntity(expectedUrl, adaptor.jsonEntity(singletonList(grant)), String.class)) .thenReturn(returnedEntity); ServiceResult<Void> sendProjectResult = service.send(grant); assertTrue(sendProjectResult.isFailure()); Error error = sendProjectResult.getFailure().getErrors().get(0); assertThat(error.getStatusCode(), equalTo(INTERNAL_SERVER_ERROR)); assertThat(error.getErrorKey(), equalTo(GRANT_PROCESS_SEND_FAILED.getErrorKey())); }
RestSilCrmEndpoint implements SilCrmEndpoint { @Override public ServiceResult<Void> updateContact(SilContact silContact) { return handlingErrors(() -> { final Either<ResponseEntity<SilCrmError>, ResponseEntity<Void>> response = adaptor.restPostWithEntity(silRestServiceUrl + silCrmContacts, silContact, Void.class, SilCrmError.class, HttpStatus.ACCEPTED); return response.mapLeftOrRight(failure -> { LOG.error("Error updating SIL contact " + silContact); return serviceFailure(new Error(CONTACT_NOT_UPDATED)); }, success -> serviceSuccess()); } ); } @Override ServiceResult<Void> updateContact(SilContact silContact); }
@Test public void testUpdateContact() { SilContact silContact = new SilContact(); String expectedUrl = "http: ResponseEntity<String> returnedEntity = new ResponseEntity<>(ACCEPTED); when(mockRestTemplate.postForEntity(expectedUrl, adaptor.jsonEntity(silContact), String.class)).thenReturn(returnedEntity); ServiceResult<Void> sendMailResult = service.updateContact(silContact); assertTrue(sendMailResult.isSuccess()); }
SpendProfileCostFilter { public List<FinanceCostTotalResource> filterBySpendProfile(List<FinanceCostTotalResource> financeCostTotalResources) { return simpleFilter( financeCostTotalResources, financeResource -> financeResource.getFinanceRowType().isIncludedInSpendProfile() ); } List<FinanceCostTotalResource> filterBySpendProfile(List<FinanceCostTotalResource> financeCostTotalResources); }
@Test public void filterBySpendProfile() { List<FinanceCostTotalResource> financeCostTotalResources = newFinanceCostTotalResource() .withFinanceRowType(FinanceRowType.values()) .build(FinanceRowType.values().length); List<FinanceCostTotalResource> financeCostTotalResourceResult = spendProfileCostFilter .filterBySpendProfile(financeCostTotalResources); List<FinanceCostTotalResource> expectedCostTotalResources = newFinanceCostTotalResource() .withFinanceRowType( FinanceRowType.LABOUR, FinanceRowType.OVERHEADS, FinanceRowType.MATERIALS, FinanceRowType.CAPITAL_USAGE, FinanceRowType.SUBCONTRACTING_COSTS, FinanceRowType.TRAVEL, FinanceRowType.OTHER_COSTS, FinanceRowType.PROCUREMENT_OVERHEADS, FinanceRowType.VAT, FinanceRowType.ASSOCIATE_SALARY_COSTS, FinanceRowType.ASSOCIATE_DEVELOPMENT_COSTS, FinanceRowType.CONSUMABLES, FinanceRowType.ASSOCIATE_SUPPORT, FinanceRowType.KNOWLEDGE_BASE, FinanceRowType.ESTATE_COSTS, FinanceRowType.KTP_TRAVEL ) .build(16); assertThat(financeCostTotalResourceResult) .usingRecursiveFieldByFieldElementComparator() .containsExactlyInAnyOrder(expectedCostTotalResources.toArray(new FinanceCostTotalResource[expectedCostTotalResources.size()])); }
ApplicationFinanceTotalsSenderImpl implements ApplicationFinanceTotalsSender { @Override @Transactional(readOnly = true, propagation = Propagation.REQUIRES_NEW) public ServiceResult<Void> sendFinanceTotalsForApplication(Long applicationId) { LOG.debug("Initiating sendFinanceTotalsForApplication for applicationId: {}", applicationId); List<ApplicationFinanceResource> applicationFinanceResources = applicationFinanceHandler.getApplicationFinances(applicationId); List<FinanceCostTotalResource> financeCostTotalResourceList = financeCostTotalResourceMapper .mapFromApplicationFinanceResourceListToList(applicationFinanceResources); if (financeCostTotalResourceList.isEmpty()) { LOG.debug("Ignoring empty financeCostTotalResources for applicationId: {}", applicationId); return serviceSuccess(); } return costTotalEndpoint.sendCostTotals(applicationId, spendProfileCostFilter.filterBySpendProfile(financeCostTotalResourceList)); } @Autowired ApplicationFinanceTotalsSenderImpl( ApplicationFinanceHandler applicationFinanceHandler, FinanceCostTotalResourceMapper financeCostTotalResourceMapper, SpendProfileCostFilter spendProfileCostFilter, AsyncRestCostTotalEndpoint costTotalEndpoint ); @Override @Transactional(readOnly = true, propagation = Propagation.REQUIRES_NEW) ServiceResult<Void> sendFinanceTotalsForApplication(Long applicationId); }
@Test public void sendFinanceTotalsForApplication() { Long applicationId = 1L; FinanceRowType financeRowType = FinanceRowType.LABOUR; FinanceRowCostCategory financeRowCostCategory = newDefaultCostCategory().build(); Map<FinanceRowType, FinanceRowCostCategory> costs = MapFunctions.asMap(financeRowType, financeRowCostCategory); List<ApplicationFinanceResource> applicationFinanceResource = newApplicationFinanceResource() .withId(1L) .withFinanceOrganisationDetails(costs) .build(1); List<FinanceCostTotalResource> expectedFinanceCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(financeRowType) .withFinanceId(1L) .withTotal(new BigDecimal(10000)) .build(1); List<FinanceCostTotalResource> expectedFilteredFinanceCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(FinanceRowType.LABOUR) .withFinanceId(1L) .withTotal(new BigDecimal(10000)) .build(1); when(applicationFinanceHandler.getApplicationFinances(applicationId)).thenReturn(applicationFinanceResource); when(financeCostTotalResourceMapper.mapFromApplicationFinanceResourceListToList(any())) .thenReturn(expectedFinanceCostTotalResource); when(spendProfileCostFilter.filterBySpendProfile(expectedFinanceCostTotalResource)) .thenReturn(expectedFilteredFinanceCostTotalResource); when(costTotalEndpoint.sendCostTotals(isA(Long.class), same(expectedFilteredFinanceCostTotalResource))) .thenReturn(serviceSuccess()); ServiceResult<Void> serviceResult = applicationFinanceTotalsSender.sendFinanceTotalsForApplication(applicationId); assertTrue(serviceResult.isSuccess()); verify(costTotalEndpoint, times(1)).sendCostTotals(isA(Long.class), same(expectedFilteredFinanceCostTotalResource)); }
AllFinanceTotalsSenderImpl implements AllFinanceTotalsSender { @Override @Transactional(readOnly = true) public ServiceResult<Void> sendAllFinanceTotals() { LOG.debug("Initiating sendAllFinanceTotals."); try (Stream<Application> applications = submittedApplicationsStream()) { applications.forEach(application -> applicationFinanceTotalsSender.sendFinanceTotalsForApplication(application.getId())); } LOG.debug("Completed sendAllFinanceTotals"); return ServiceResult.serviceSuccess(); } @Override @Transactional(readOnly = true) ServiceResult<Void> sendAllFinanceTotals(); }
@Test public void sendAllFinanceTotals() { Stream<Application> applicationsStream = newApplication() .withCompetition(newCompetition().withId(1L).build()) .build(2) .stream(); when(applicationRepository.findByApplicationProcessActivityStateIn(submittedAndFinishedStates)) .thenReturn(applicationsStream); ServiceResult<Void> serviceResult = allFinanceTotalsSender.sendAllFinanceTotals(); assertTrue(serviceResult.isSuccess()); verify(applicationRepository, only()).findByApplicationProcessActivityStateIn(any()); verify(applicationFinanceTotalsSender, times(2)).sendFinanceTotalsForApplication(any()); verifyNoMoreInteractions(applicationRepository, applicationFinanceTotalsSender); }
AsyncRestCostTotalEndpoint { public ServiceResult<Void> sendCostTotals(Long applicationId, List<FinanceCostTotalResource> financeCostTotalResources) { sendCostTotalsCompletable(applicationId, financeCostTotalResources); return ServiceResult.serviceSuccess(); } @Autowired AsyncRestCostTotalEndpoint( @Qualifier("finance_data_service_adaptor") AbstractRestTemplateAdaptor restTemplateAdaptor, HashBasedMacTokenHandler hashBasedMacTokenHandler, @Value("${ifs.finance-totals.authSecretKey}") String financeTotalsKey ); ServiceResult<Void> sendCostTotals(Long applicationId, List<FinanceCostTotalResource> financeCostTotalResources); }
@Test public void sendCostTotals() throws Exception { String url = "/cost-totals"; List<FinanceCostTotalResource> costTotalResources = newFinanceCostTotalResource() .build(2); HttpHeaders authHeader = new HttpHeaders(); authHeader.add("X-AUTH-TOKEN", hashBasedMacTokenHandler.calculateHash("supersecretkey", toJson(costTotalResources))); when(restTemplateAdaptorMock.restPostWithEntityAsync(url, costTotalResources, authHeader, Void.class)) .thenReturn(new CompletableFuture<>()); costTotalEndpoint.sendCostTotals(1L, costTotalResources); verify(restTemplateAdaptorMock).restPostWithEntityAsync(url, costTotalResources, authHeader, Void.class); }
FinanceCostTotalResourceMapper { public List<FinanceCostTotalResource> mapFromApplicationFinanceResourceToList( ApplicationFinanceResource applicationFinanceResource ) { return simpleMap( applicationFinanceResource.getFinanceOrganisationDetails().entrySet(), cat -> buildFinanceCostTotalResource( FinanceType.APPLICATION, cat.getKey(), cat.getValue(), applicationFinanceResource.getId() ) ); } List<FinanceCostTotalResource> mapFromApplicationFinanceResourceListToList( List<ApplicationFinanceResource> applicationFinanceResources ); List<FinanceCostTotalResource> mapFromApplicationFinanceResourceToList( ApplicationFinanceResource applicationFinanceResource ); }
@Test public void mapFromApplicationFinanceResourceList() { Long financeId = 1L; OtherCost otherCost = newOtherCost() .withCost(BigDecimal.valueOf(1000)).build(); DefaultCostCategory otherCostCategory = newDefaultCostCategory().withCosts(Arrays.asList(otherCost)).build(); otherCostCategory.calculateTotal(); Materials materialCost = newMaterials() .withCost(BigDecimal.valueOf(500)) .withQuantity(10).build(); DefaultCostCategory materialCostCategory = newDefaultCostCategory().withCosts(Arrays.asList(materialCost)).build(); materialCostCategory.calculateTotal(); Map<FinanceRowType, FinanceRowCostCategory> costs = MapFunctions.asMap( FinanceRowType.OTHER_COSTS, otherCostCategory, FinanceRowType.MATERIALS, materialCostCategory ); ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource() .withId(financeId) .withFinanceOrganisationDetails(costs).build(); List<FinanceCostTotalResource> actualResult = financeCostTotalResourceMapper.mapFromApplicationFinanceResourceToList(applicationFinanceResource); FinanceCostTotalResource expectedOtherCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(FinanceRowType.OTHER_COSTS) .withTotal(new BigDecimal(1000)) .withFinanceId(financeId).build(); FinanceCostTotalResource expectedMaterialCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(FinanceRowType.MATERIALS) .withTotal(new BigDecimal(5000)) .withFinanceId(financeId).build(); assertThat(actualResult) .usingFieldByFieldElementComparator() .contains(expectedOtherCostTotalResource, expectedMaterialCostTotalResource); }
UserPermissionRules { @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") public boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user) { List<Application> applicationsThatThisUserIsAssessing = getApplicationsRelatedToUserByProcessRoles(user, assessorProcessRoleFilter); List<ProcessRole> processRolesForAllApplications = getAllProcessRolesForApplications(applicationsThatThisUserIsAssessing); List<ProcessRole> allConsortiumProcessRoles = simpleFilter(processRolesForAllApplications, consortiumProcessRoleFilter); List<User> allConsortiumUsers = simpleMap(allConsortiumProcessRoles, ProcessRole::getUser); return simpleMap(allConsortiumUsers, User::getId).contains(userToView.getId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void assessorsCanViewConsortiumMembersForApplicationsTheyAreAssessing() { Application application1 = newApplication().build(); Application application2 = newApplication().build(); Application application3 = newApplication().build(); when(applicationRepository.findById(application1.getId())).thenReturn(Optional.of(application1)); when(applicationRepository.findById(application2.getId())).thenReturn(Optional.of(application2)); when(applicationRepository.findById(application3.getId())).thenReturn(Optional.of(application3)); User application1Lead = newUser().build(); User application2Collaborator = newUser().build(); User application3Lead = newUser().build(); User assessorForApplications1And2 = newUser().build(); User panelAssessorForApplication1 = newUser().build(); ProcessRole application1LeadProcessRole = newProcessRole(). withApplication(application1). withRole(Role.LEADAPPLICANT). withUser(application1Lead). build(); ProcessRole application2CollaboratorProcessRole = newProcessRole(). withApplication(application2). withRole(Role.COLLABORATOR). withUser(application2Collaborator). build(); ProcessRole application3LeadProcessRole = newProcessRole(). withApplication(application3). withRole(Role.LEADAPPLICANT). withUser(application3Lead). build(); List<ProcessRole> assessorProcessRoles = newProcessRole(). withApplication(application1, application2). withRole(Role.ASSESSOR, Role.ASSESSOR). withUser(assessorForApplications1And2, assessorForApplications1And2). build(2); List<ProcessRole> panelAssessorProcessRole = newProcessRole() .withApplication(application1) .withRole(Role.PANEL_ASSESSOR) .withUser(panelAssessorForApplication1) .build(1); when(processRoleRepository.findByUserId(application1Lead.getId())). thenReturn(singletonList(application1LeadProcessRole)); when(processRoleRepository.findByUserId(application2Collaborator.getId())). thenReturn(singletonList(application2CollaboratorProcessRole)); when(processRoleRepository.findByUserId(application3Lead.getId())). thenReturn(singletonList(application3LeadProcessRole)); when(processRoleRepository.findByUserId(assessorForApplications1And2.getId())). thenReturn(assessorProcessRoles); when(processRoleRepository.findByUserId(panelAssessorForApplication1.getId())). thenReturn(panelAssessorProcessRole); UserResource application1LeadResource = userResourceForUser().apply(application1Lead); UserResource application2CollaboratorResource = userResourceForUser().apply(application2Collaborator); UserResource application3LeadResource = userResourceForUser().apply(application3Lead); UserResource assessorForApplications1And2Resource = userResourceForUser().apply(assessorForApplications1And2); UserResource panelAssessorForApplications1Resource = userResourceForUser().apply(panelAssessorForApplication1); assertTrue(rules.assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(application1LeadResource, assessorForApplications1And2Resource)); assertTrue(rules.assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(application2CollaboratorResource, assessorForApplications1And2Resource)); assertTrue(rules.assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(application1LeadResource, panelAssessorForApplications1Resource)); assertFalse(rules.assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(application3LeadResource, assessorForApplications1And2Resource)); }
FinanceCostTotalResourceMapper { public List<FinanceCostTotalResource> mapFromApplicationFinanceResourceListToList( List<ApplicationFinanceResource> applicationFinanceResources ) { return flattenLists(applicationFinanceResources, this::mapFromApplicationFinanceResourceToList); } List<FinanceCostTotalResource> mapFromApplicationFinanceResourceListToList( List<ApplicationFinanceResource> applicationFinanceResources ); List<FinanceCostTotalResource> mapFromApplicationFinanceResourceToList( ApplicationFinanceResource applicationFinanceResource ); }
@Test public void mapFromApplicationFinanceResourceListToList() { Long financeId = 1L; OtherCost otherCost = newOtherCost() .withCost(BigDecimal.valueOf(1000)).build(); DefaultCostCategory otherCostCategory = newDefaultCostCategory().withCosts(Arrays.asList(otherCost)).build(); otherCostCategory.calculateTotal(); Materials materialCost = newMaterials() .withCost(BigDecimal.valueOf(500)) .withQuantity(10).build(); DefaultCostCategory materialCostCategory = newDefaultCostCategory().withCosts(Arrays.asList(materialCost)).build(); materialCostCategory.calculateTotal(); Map<FinanceRowType, FinanceRowCostCategory> costs = MapFunctions.asMap( FinanceRowType.OTHER_COSTS, otherCostCategory, FinanceRowType.MATERIALS, materialCostCategory ); List<ApplicationFinanceResource> applicationFinanceResources = newApplicationFinanceResource() .withId(financeId) .withFinanceOrganisationDetails(costs).build(2); List<FinanceCostTotalResource> actualResult = financeCostTotalResourceMapper.mapFromApplicationFinanceResourceListToList(applicationFinanceResources); FinanceCostTotalResource expectedOtherCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(FinanceRowType.OTHER_COSTS) .withTotal(new BigDecimal(1000)) .withFinanceId(financeId).build(); FinanceCostTotalResource expectedMaterialCostTotalResource = newFinanceCostTotalResource() .withFinanceType(FinanceType.APPLICATION) .withFinanceRowType(FinanceRowType.MATERIALS) .withTotal(new BigDecimal(5000)) .withFinanceId(financeId).build(); assertThat(actualResult).usingFieldByFieldElementComparator().contains(expectedOtherCostTotalResource, expectedMaterialCostTotalResource, expectedOtherCostTotalResource, expectedMaterialCostTotalResource); }
GrantClaimMaximumPermissionRules extends BasePermissionRules { @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they have an application for the competition") public boolean usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden (CompetitionResource competition, UserResource user) { return usersRolesService.userHasApplicationForCompetition(user.getId(), competition.getId()).getSuccess(); } @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are an internal user") boolean internalUserCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they have an application for the competition") boolean usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are in a project for the competition") boolean userInAProjectCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); }
@Test public void usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden() { CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().build(); when(usersRolesService.userHasApplicationForCompetition(user.getId(), competition.getId())) .thenReturn(serviceSuccess(true)); assertTrue(rules.usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden(competition, user)); verify(usersRolesService, only()).userHasApplicationForCompetition(user.getId(), competition.getId()); } @Test public void usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden_noApplicationForCompetition() { CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().build(); when(usersRolesService.userHasApplicationForCompetition(user.getId(), competition.getId())) .thenReturn(serviceSuccess(false)); assertFalse(rules.usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden(competition, user)); verify(usersRolesService, only()).userHasApplicationForCompetition(user.getId(), competition.getId()); }
GrantClaimMaximumPermissionRules extends BasePermissionRules { @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are an internal user") public boolean internalUserCanCheckMaxFundingLevelOverridden (CompetitionResource competition, UserResource user) { return isInternal(user); } @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are an internal user") boolean internalUserCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they have an application for the competition") boolean usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are in a project for the competition") boolean userInAProjectCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); }
@Test public void internalUserCanCheckMaxFundingLevelOverridden_compAdminUser() { CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().withRoleGlobal(COMP_ADMIN).build(); assertTrue(rules.internalUserCanCheckMaxFundingLevelOverridden(competition, user)); verify(usersRolesService, never()).userHasApplicationForCompetition(isA(Long.class), isA(Long.class)); } @Test public void internalUsercanCheckMaxFundingLevelOverridden_projectFinanceUser() { CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().withRoleGlobal(PROJECT_FINANCE).build(); assertTrue(rules.internalUserCanCheckMaxFundingLevelOverridden(competition, user)); verify(usersRolesService, never()).userHasApplicationForCompetition(isA(Long.class), isA(Long.class)); }
GrantClaimMaximumPermissionRules extends BasePermissionRules { @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are in a project for the competition") public boolean userInAProjectCanCheckMaxFundingLevelOverridden (CompetitionResource competition, UserResource user) { return projectUserRepository.existsByProjectApplicationCompetitionIdAndUserId(competition.getId(), user.getId()); } @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are an internal user") boolean internalUserCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they have an application for the competition") boolean usersWithApplicationForCompetitionCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); @PermissionRule(value = "MAX_FUNDING_LEVEL_OVERRIDDEN", description = "A user can see the grant claim maximums if they are in a project for the competition") boolean userInAProjectCanCheckMaxFundingLevelOverridden(CompetitionResource competition, UserResource user); }
@Test public void userInAProjectCanCheckMaxFundingLevelOverridden(){ CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().build(); when(projectUserRepository.existsByProjectApplicationCompetitionIdAndUserId(competition.getId(), user.getId())) .thenReturn(true); assertTrue(rules.userInAProjectCanCheckMaxFundingLevelOverridden(competition, user)); } @Test public void userInAProjectCanCheckMaxFundingLevelOverridden_noProject(){ CompetitionResource competition = newCompetitionResource().build(); UserResource user = newUserResource().build(); when(projectUserRepository.existsByProjectApplicationCompetitionIdAndUserId(competition.getId(), user.getId())) .thenReturn(false); assertFalse(rules.userInAProjectCanCheckMaxFundingLevelOverridden(competition, user)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") public boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAConsortiumMemberOnApplication(applicationFinanceResource, user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void consortiumCanSeeTheApplicationFinancesForTheirOrganisation() { assertTrue(rules.consortiumCanSeeTheApplicationFinancesForTheirOrganisation(applicationFinance, leadApplicant)); assertTrue(rules.consortiumCanSeeTheApplicationFinancesForTheirOrganisation(applicationFinance, collaborator)); assertTrue(rules.consortiumCanSeeTheApplicationFinancesForTheirOrganisation(otherApplicationFinance, otherLeadApplicant)); assertFalse(rules.consortiumCanSeeTheApplicationFinancesForTheirOrganisation(applicationFinance, otherLeadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") public boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAssessor(applicationFinanceResource.getApplication(), user) || isInterviewAssessor(applicationFinanceResource.getApplication(), user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess() { assertTrue(rules.assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(applicationFinance, assessor)); assertFalse(rules.assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(otherApplicationFinance, assessor)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") public boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isKta(applicationFinanceResource.getApplication(), user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess() { assertTrue(rules.ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(applicationFinance, kta)); assertFalse(rules.ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(otherApplicationFinance, kta)); }
UserPermissionRules { @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") public boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user) { List<Application> applicationsWhereThisUserIsInConsortium = getApplicationsRelatedToUserByProcessRoles(user, consortiumProcessRoleFilter); return simpleMap(applicationsWhereThisUserIsInConsortium, Application::getId).contains(processRole.getApplicationId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void consortiumMembersCanViewTheProcessRolesOtherConsortiumMembers() { Application application1 = newApplication().build(); when(applicationRepository.findById(application1.getId())).thenReturn(Optional.of(application1)); User application1Lead1 = newUser().build(); User application1Lead2 = newUser().build(); User application1Lead3AndApplication2Collaborator2 = newUser().build(); User application1Collaborator1 = newUser().build(); User application1Collaborator2 = newUser().build(); List<ProcessRole> application1ConsortiumRoles = newProcessRole().withApplication(application1). withRole(Role.LEADAPPLICANT, Role.LEADAPPLICANT, Role.LEADAPPLICANT, Role.COLLABORATOR, Role.COLLABORATOR). withUser(application1Lead1, application1Lead2, application1Lead3AndApplication2Collaborator2, application1Collaborator1, application1Collaborator2).build(2); List<User> application1Consortium = simpleMap(application1ConsortiumRoles, ProcessRole::getUser); List<UserResource> application1ConsortiumResources = simpleMap(application1Consortium, userResourceForUser()); when(processRoleRepository.findByUserId(application1Lead1.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(0))); when(processRoleRepository.findByUserId(application1Lead2.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(1))); ProcessRoleResource validResource = newProcessRoleResource().withApplication(application1.getId()).build(); ProcessRoleResource invalidResource = newProcessRoleResource().withApplication(10L).build(); assertTrue(rules.consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(validResource, application1ConsortiumResources.get(0))); assertFalse(rules.consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(invalidResource, application1ConsortiumResources.get(0))); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") public boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isInternal(user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void internalUserCanSeeApplicationFinancesForOrganisations() { allGlobalRoleUsers.forEach(user -> allGlobalRoleUsers.forEach(otherUser -> { if (allInternalUsers.contains(user)) { assertTrue(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, user)); } else { assertFalse(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, user)); } })); } @Test public void internalUserCanGetApplicationFinance() { assertTrue(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, compAdmin)); assertTrue(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, projectFinanceUser())); assertFalse(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, collaborator)); assertFalse(rules.internalUserCanSeeApplicationFinancesForOrganisations(applicationFinance, leadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") public boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { Application application = applicationRepository.findById(applicationFinanceResource.getApplication()).get(); return userIsStakeholderInCompetition(application.getCompetition().getId(), user.getId()); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void stakeholdersCanSeeApplicationFinancesForOrganisations() { ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource() .withApplication(application.getId()) .build(); when(applicationRepository.findById(applicationFinanceResource.getApplication())).thenReturn(Optional.of(application)); when(stakeholderRepository.existsByCompetitionIdAndUserId(application.getCompetition().getId(), stakeholderResource.getId())).thenReturn(true); assertTrue(rules.stakeholdersCanSeeApplicationFinancesForOrganisations(applicationFinanceResource, stakeholderResource)); allInternalUsers.forEach(user -> assertFalse(rules.stakeholdersCanSeeApplicationFinancesForOrganisations(applicationFinanceResource, user))); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") public boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAConsortiumMemberOnApplicationOrIsLeadApplicant(applicationFinanceResource, user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void updateCosts() { assertTrue(rules.consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(applicationFinance, leadApplicant)); assertTrue(rules.consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(applicationFinance, collaborator)); assertFalse(rules.consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(applicationFinance, otherLeadApplicant)); assertFalse(rules.consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(applicationFinance, compAdmin)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") public boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { Application application = applicationRepository.findById(applicationFinanceResource.getApplication()).get(); return userIsStakeholderInCompetition(application.getCompetition().getId(), user.getId()); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void stakeholdersCanViewCostsToApplicationFinance() { ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource() .withApplication(application.getId()) .build(); when(applicationRepository.findById(applicationFinanceResource.getApplication())).thenReturn(Optional.of(application)); when(stakeholderRepository.existsByCompetitionIdAndUserId(application.getCompetition().getId(), stakeholderResource.getId())).thenReturn(true); assertTrue(rules.stakeholdersCanAddACostToApplicationFinance(applicationFinanceResource, stakeholderResource)); allInternalUsers.forEach(user -> assertFalse(rules.stakeholdersCanAddACostToApplicationFinance(applicationFinanceResource, user))); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") public boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isInternal(user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void internalUserCanGetFileResourceForPartner() { assertTrue(rules.internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(applicationFinance, compAdmin)); assertTrue(rules.internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(applicationFinance, projectFinanceUser())); assertFalse(rules.internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(applicationFinance, collaborator)); assertFalse(rules.internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(applicationFinance, leadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") public boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAConsortiumMemberOnApplicationAndOrganisation(applicationFinanceResource, user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation() { assertTrue(rules.consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, leadApplicant)); assertTrue(rules.consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, collaborator)); assertFalse(rules.consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, otherLeadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") public boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAConsortiumMemberOnApplicationAndOrganisation(applicationFinanceResource, user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation() { assertTrue(rules.consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, leadApplicant)); assertTrue(rules.consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, collaborator)); assertFalse(rules.consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, otherLeadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") public boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return isAConsortiumMemberOnApplicationAndOrganisation(applicationFinanceResource, user); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation() { assertTrue(rules.consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, leadApplicant)); assertTrue(rules.consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, collaborator)); assertFalse(rules.consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(applicationFinance, otherLeadApplicant)); }
ApplicationFinancePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") public boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user) { return monitoringOfficerCanViewApplication(applicationFinanceResource.getApplication(), user.getId()); } @PermissionRule(value = "READ", description = "The consortium can see the application finances of their own organisation") boolean consortiumCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean projectUsersCanSeeTheApplicationFinancesForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "The projectUsers can see the application finances of their own organisation") boolean externalFinanceUsersCanSeeTheApplicationFinancesForApplicationsTheyAreAssignedTo(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An assessor can see the application finances for organisations in the applications they assess") boolean assessorCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "An internal user can see application finances for organisations") boolean internalUserCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can see application finances for organisations") boolean monitoringOfficersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can see application finances for organisations on applications they are assigned to") boolean stakeholdersCanSeeApplicationFinancesForOrganisations(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ", description = "A kta can see the application finances for organisations in the applications they assess") boolean ktaCanSeeTheApplicationFinanceForOrganisationsInApplicationsTheyAssess(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "The consortium can add a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanAddACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Internal users can add a cost to the application finances") boolean internalUserCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "Stakeholders can add a cost to the application finances they are assigned to") boolean stakeholdersCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "ADD_COST", description = "An assessor can add a cost to the application finances") boolean assessorCanAddACostToApplicationFinance(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_COST", description = "The consortium can update a cost to the application finances of their own organisation or if lead applicant") boolean consortiumCanUpdateACostToApplicationFinanceForTheirOrganisationOrIsLeadApplicant(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "The consortium can get file entry resource for finance section of a collaborator") boolean consortiumMemberCanGetFileEntryResourceByFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean internalUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "READ_FILE_ENTRY", description = "An internal user can get file entry resource for finance section of a collaborator") boolean assessorUserCanGetFileEntryResourceForFinanceIdOfACollaborator(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "CREATE_FILE_ENTRY", description = "A consortium member can create a file entry for the finance section for their organisation") boolean consortiumMemberCanCreateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "UPDATE_FILE_ENTRY", description = "A consortium member can update a file entry for the finance section for their organisation") boolean consortiumMemberCanUpdateAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); @PermissionRule(value = "DELETE_FILE_ENTRY", description = "A consortium member can delete a file entry for the finance section for their organisation") boolean consortiumMemberCanDeleteAFileForTheApplicationFinanceForTheirOrganisation(final ApplicationFinanceResource applicationFinanceResource, final UserResource user); }
@Test public void monitoringOfficersCanSeeApplicationFinancesForOrganisations() { Project project = newProject().build(); when(projectRepository.findOneByApplicationId(anyLong())).thenReturn(project); when(projectMonitoringOfficerRepository.existsByProjectIdAndUserId(project.getId(), monitoringOfficerUser().getId())).thenReturn(true); allGlobalRoleUsers.forEach(user -> { if (user.hasRole(MONITORING_OFFICER)) { assertTrue(rules.monitoringOfficersCanSeeApplicationFinancesForOrganisations(applicationFinance, monitoringOfficerUser())); } else { Assert.assertFalse(rules.monitoringOfficersCanSeeApplicationFinancesForOrganisations(applicationFinance, user)); } }); }
UserPermissionRules { @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") public boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user) { List<Application> applicationsThatThisUserIsAssessing = getApplicationsRelatedToUserByProcessRoles(user, assessorProcessRoleFilter); return simpleMap(applicationsThatThisUserIsAssessing, Application::getId).contains(processRole.getApplicationId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing() { Application application1 = newApplication().build(); when(applicationRepository.findById(application1.getId())).thenReturn(Optional.of(application1)); User application1Assessor1 = newUser().build(); User application1Assessor2 = newUser().build(); List<ProcessRole> application1ConsortiumRoles = newProcessRole().withApplication(application1). withRole(Role.ASSESSOR, Role.ASSESSOR, Role.ASSESSOR). withUser(application1Assessor1, application1Assessor2).build(2); List<User> application1Consortium = simpleMap(application1ConsortiumRoles, ProcessRole::getUser); List<UserResource> application1ConsortiumResources = simpleMap(application1Consortium, userResourceForUser()); when(processRoleRepository.findByUserId(application1Assessor1.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(0))); when(processRoleRepository.findByUserId(application1Assessor2.getId())). thenReturn(singletonList(application1ConsortiumRoles.get(1))); ProcessRoleResource validResource = newProcessRoleResource().withApplication(application1.getId()).build(); ProcessRoleResource invalidResource = newProcessRoleResource().withApplication(10L).build(); assertTrue(rules.assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(validResource, application1ConsortiumResources.get(0))); assertFalse(rules.assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(invalidResource, application1ConsortiumResources.get(0))); }
FinanceTotalsPermissionRules extends BasePermissionRules { @PermissionRule(value = "SEND_APPLICATION_TOTALS", description = "Internal users and lead applicants are allowed to send the application totals.") public boolean leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(final ApplicationResource applicationResource, final UserResource user) { return isLeadApplicant(applicationResource.getId(), user) || isInternal(user) || isSystemMaintenanceUser(user); } @PermissionRule(value = "SEND_APPLICATION_TOTALS", description = "Internal users and lead applicants are allowed to send the application totals.") boolean leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(final ApplicationResource applicationResource, final UserResource user); }
@Test public void leadApplicantCanUpdateTotalsForAnApplication() { UserResource userResource = newUserResource().withId(1L).build(); ApplicationResource application = newApplicationResource().withId(1L).build(); when(processRoleRepository.existsByUserIdAndApplicationIdAndRole(userResource.getId(), application.getId(), LEADAPPLICANT)).thenReturn(true); boolean result = rules.leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(application, userResource); assertTrue(result); } @Test public void leadApplicantCanUpdateTotalsForAnApplication_returnsFalseWhenNoProcessRoleFound() { ApplicationResource application = newApplicationResource().withId(1L).build(); boolean result = rules.leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(application, newUserResource().withId(2L).build()); assertFalse(result); } @Test public void internalUserCanUpdateTotalsForAnApplication() { ApplicationResource application = newApplicationResource().withId(1L).build(); boolean result = rules.leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(application, newUserResource().withRolesGlobal(singletonList(SYSTEM_MAINTAINER) ).build()); assertTrue(result); } @Test public void internalUserCanUpdateTotalsForAnApplication_returnsFalseWhenNoProcessRoleFound() { ApplicationResource application = newApplicationResource().withId(1L).build(); boolean result = rules.leadApplicantAndInternalUsersCanUpdateTotalsForAnApplication(application, newUserResource().withRolesGlobal(singletonList(COLLABORATOR) ).build()); assertFalse(result); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") public boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user) { return isCollaborator(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation() { assertTrue(rules.consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, leadApplicant)); assertTrue(rules.consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, collaborator)); assertFalse(rules.consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, otherLeadApplicant)); assertFalse(rules.consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, compAdmin)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") public boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user) { return isCollaborator(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation() { assertTrue(rules.consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(overheads, leadApplicant)); assertTrue(rules.consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(overheads, collaborator)); assertFalse(rules.consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(overheads, otherLeadApplicant)); assertFalse(rules.consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(overheads, compAdmin)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") public boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user) { return isCollaborator(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation() { assertTrue(rules.consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(overheads, leadApplicant)); assertTrue(rules.consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(overheads, collaborator)); assertFalse(rules.consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(overheads, otherLeadApplicant)); assertFalse(rules.consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(overheads, compAdmin)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") public boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user) { return isCollaborator(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation() { assertTrue(rules.consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(overheads, leadApplicant)); assertTrue(rules.consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(overheads, collaborator)); assertFalse(rules.consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(overheads, otherLeadApplicant)); assertFalse(rules.consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(overheads, compAdmin)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") public boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user) { return isCollaborator(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation() { assertTrue(rules.consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, leadApplicant)); assertTrue(rules.consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, collaborator)); assertFalse(rules.consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, otherLeadApplicant)); assertFalse(rules.consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(overheads, compAdmin)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") public boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user) { return isDownloadableBeforeSubmission(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void supportAndIfsAdminUsersCanReadContentsOfAnOverheadsFileForAnApplication() { assertTrue(rules.supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(overheads, supportUser)); assertTrue(rules.supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(overheads, ifsAdmin)); assertFalse(rules.supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(overheads, projectFinance)); assertFalse(rules.supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(overheads, innovationLead)); assertFalse(rules.supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(overheads, compAdmin)); }
UserPermissionRules { @PermissionRule(value = "UPDATE", description = "A User can update their own profile") public boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user) { return userToUpdate.getId().equals(user.getId()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void usersCanUpdateTheirOwnProfiles() { UserResource user = newUserResource().build(); assertTrue(rules.usersCanUpdateTheirOwnProfiles(user, user)); } @Test public void usersCanUpdateTheirOwnProfilesButAttemptingToUpdateAnotherUsersProfile() { UserResource user = newUserResource().build(); UserResource anotherUser = newUserResource().build(); assertFalse(rules.usersCanUpdateTheirOwnProfiles(user, anotherUser)); }
OverheadFilePermissionRules extends BasePermissionRules { @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") public boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user) { return isDownloadableAfterSubmission(overheads, user); } @PermissionRule(value = "CREATE_OVERHEAD_FILE", description = "The consortium can create the overhead file for their application and organisation") boolean consortiumCanCreateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "UPDATE_OVERHEAD_FILE", description = "The consortium can update the overhead file for their application and organisation") boolean consortiumCanUpdateAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "DELETE_OVERHEAD_FILE", description = "The consortium can delete the overhead file for their application and organisation") boolean consortiumCanDeleteAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The consortium can read the overhead file details for their application and organisation") boolean consortiumCanReadDetailsAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_DETAILS", description = "The internal user can read the overhead file details for any application and organisation") boolean internalUserCanReadDetailsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Support and Ifs Admin user can read the overhead file contents for any unsubmitted application and organisation") boolean supportAndIfsAdminCanReadContentsOfAnOverheadsFileForANotSubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "Internal users can read the overhead file contents for any submitted application and organisation") boolean internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(final ApplicationFinanceRow overheads, final UserResource user); @PermissionRule(value = "READ_OVERHEAD_CONTENTS", description = "The consortium can read the overhead file contents for their application and organisation") boolean consortiumCanReadContentsOfAnOverheadsFileForTheirApplicationAndOrganisation(final ApplicationFinanceRow overheads, final UserResource user); }
@Test public void compAdminAndInnovationLeadAndProjectFinanceUsersCanReadDetailsOfAnOverheadsFileForASubmittedApplication() { assertTrue(rules.internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(submittedOverheads, projectFinance)); assertTrue(rules.internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(submittedOverheads, compAdmin)); assertTrue(rules.internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(submittedOverheads, innovationLead)); assertTrue(rules.internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(submittedOverheads, supportUser)); assertTrue(rules.internalUsersCanReadContentsOfAnOverheadsFileForASubmittedApplication(submittedOverheads, ifsAdmin)); }
ApplicationFinanceRowController { @PostMapping public RestResult<FinanceRowItem> create(@RequestBody final FinanceRowItem financeRowItem) { return applicationFinanceRowService.create(financeRowItem.getTargetId(), financeRowItem).toPostCreateResponse(); } @GetMapping("/{id}") RestResult<FinanceRowItem> get(@PathVariable final long id); @PostMapping RestResult<FinanceRowItem> create(@RequestBody final FinanceRowItem financeRowItem); @PutMapping("/{id}") RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem); @DeleteMapping("/{id}") RestResult<Void> delete(@PathVariable final long id); }
@Test public void create() throws Exception { FinanceRowItem financeRowItem = new GrantClaimPercentage(1L); when(financeRowCostsServiceMock.create(1L, financeRowItem)).thenReturn(serviceSuccess(new GrantClaimPercentage(1L))); mockMvc.perform(post("/application-finance-row") .contentType(MediaType.APPLICATION_JSON) .content(objectMapper.writeValueAsString(financeRowItem))) .andExpect(status().isCreated()); verify(financeRowCostsServiceMock, times(1)).create(1L, financeRowItem); }
ApplicationFinanceRowController { @PutMapping("/{id}") public RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem) { RestResult<FinanceRowItem> updateResult = applicationFinanceRowService.update(id, financeRowItem).toGetResponse(); if(updateResult.isFailure()){ return RestResult.restFailure(updateResult.getFailure()); } else { FinanceRowItem updatedFinanceRowItem = updateResult.getSuccess(); ValidationMessages validationMessages = validationUtil.validateCostItem(updatedFinanceRowItem); return RestResult.restSuccess(validationMessages); } } @GetMapping("/{id}") RestResult<FinanceRowItem> get(@PathVariable final long id); @PostMapping RestResult<FinanceRowItem> create(@RequestBody final FinanceRowItem financeRowItem); @PutMapping("/{id}") RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem); @DeleteMapping("/{id}") RestResult<Void> delete(@PathVariable final long id); }
@Test public void updateShouldReturnEmptyResponseOnWrongId() throws Exception { GrantClaimPercentage costItem = new GrantClaimPercentage(1L); when(financeRowCostsServiceMock.update(eq(123L), isA(FinanceRowItem.class))).thenReturn(serviceFailure(notFoundError(FinanceRowMetaField.class, 123L))); mockMvc.perform(put("/application-finance-row/{id}", "123") .contentType(MediaType.APPLICATION_JSON) .content(objectMapper.writeValueAsString(costItem))) .andExpect(status().isNotFound()) .andReturn(); verify(financeRowCostsServiceMock, times(1)).update(eq(123L), isA(FinanceRowItem.class)); } @Test public void updateShouldReturnIsCorrectOnCorrectValues() throws Exception { GrantClaimPercentage costItem = new GrantClaimPercentage(1L); when(financeRowCostsServiceMock.update(eq(123L), isA(FinanceRowItem.class))).thenReturn(serviceSuccess(costItem)); mockMvc.perform(put("/application-finance-row/{id}", "123") .contentType(MediaType.APPLICATION_JSON) .content(objectMapper.writeValueAsString(costItem))) .andExpect(status().isOk()); verify(financeRowCostsServiceMock, times(1)).update(eq(123L), isA(FinanceRowItem.class)); }
ApplicationFinanceRowController { @DeleteMapping("/{id}") public RestResult<Void> delete(@PathVariable final long id) { return applicationFinanceRowService.delete(id).toDeleteResponse(); } @GetMapping("/{id}") RestResult<FinanceRowItem> get(@PathVariable final long id); @PostMapping RestResult<FinanceRowItem> create(@RequestBody final FinanceRowItem financeRowItem); @PutMapping("/{id}") RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem); @DeleteMapping("/{id}") RestResult<Void> delete(@PathVariable final long id); }
@Test public void deleteCostAPICallShouldRenderResponse() throws Exception { when(financeRowCostsServiceMock.delete(123L)).thenReturn(serviceSuccess()); mockMvc.perform(delete("/application-finance-row/123")) .andExpect(status().isNoContent()); verify(financeRowCostsServiceMock, times(1)).delete(123L); }
ProjectFinanceRowController { @PutMapping("/{id}") public RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem) { ValidationMessages validationMessages = validationUtil.validateProjectCostItem(financeRowItem); if(!validationMessages.hasErrors()){ RestResult<FinanceRowItem> updateResult = projectFinanceRowService.update(id, financeRowItem).toGetResponse(); if (updateResult.isFailure()) { return restFailure(updateResult.getFailure()); } } return restSuccess(validationMessages); } @PostMapping RestResult<FinanceRowItem> addWithResponse(@RequestBody final FinanceRowItem financeRowItem); @GetMapping("/{id}") RestResult<FinanceRowItem> get(@PathVariable final long id); @PutMapping("/{id}") RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem); @DeleteMapping("/{id}") RestResult<Void> delete(@PathVariable final long id); }
@Test public void updateShouldReturnEmptyResponseOnWrongId() throws Exception { when(validationUtil.validateProjectCostItem(isA(FinanceRowItem.class))).thenReturn(new ValidationMessages()); GrantClaimPercentage costItem = new GrantClaimPercentage(1L); when(projectFinanceRowServiceMock.update(eq(123L), isA(FinanceRowItem.class))).thenReturn(serviceFailure(notFoundError(FinanceRowMetaField.class, 123L))); mockMvc.perform(put("/project-finance-row/{id}", "123") .contentType(MediaType.APPLICATION_JSON) .content(new ObjectMapper().writeValueAsString(costItem))) .andExpect(status().isNotFound()) .andReturn(); verify(projectFinanceRowServiceMock, times(1)).update(eq(123L), isA(FinanceRowItem.class)); } @Test public void updateShouldReturnIsCorrectOnCorrectValues() throws Exception { when(validationUtil.validateProjectCostItem(isA(FinanceRowItem.class))).thenReturn(new ValidationMessages()); GrantClaimPercentage costItem = new GrantClaimPercentage(1L); when(projectFinanceRowServiceMock.update(eq(123L), isA(FinanceRowItem.class))).thenReturn(serviceSuccess(costItem)); mockMvc.perform(put("/project-finance-row/{id}", "123") .contentType(MediaType.APPLICATION_JSON) .content(new ObjectMapper().writeValueAsString(costItem))) .andExpect(status().isOk()); verify(projectFinanceRowServiceMock, times(1)).update(eq(123L), isA(FinanceRowItem.class)); }
ProjectFinanceRowController { @DeleteMapping("/{id}") public RestResult<Void> delete(@PathVariable final long id) { return projectFinanceRowService.delete(id).toDeleteResponse(); } @PostMapping RestResult<FinanceRowItem> addWithResponse(@RequestBody final FinanceRowItem financeRowItem); @GetMapping("/{id}") RestResult<FinanceRowItem> get(@PathVariable final long id); @PutMapping("/{id}") RestResult<ValidationMessages> update(@PathVariable final long id, @RequestBody final FinanceRowItem financeRowItem); @DeleteMapping("/{id}") RestResult<Void> delete(@PathVariable final long id); }
@Test public void deleteCostAPICallShouldRenderResponse() throws Exception { when(projectFinanceRowServiceMock.delete(123L)).thenReturn(serviceSuccess()); mockMvc.perform(delete("/project-finance-row/123")) .andExpect(status().isNoContent()); verify(projectFinanceRowServiceMock, times(1)).delete(123L); }
ApplicationFinanceController { @GetMapping("/finance-document/fileentry") public RestResult<FileEntryResource> getFileDetails(@RequestParam("applicationFinanceId") long applicationFinanceId) throws IOException { return financeFileEntryService.getFileContents(applicationFinanceId). andOnSuccessReturn(FileAndContents::getFileEntry). toGetResponse(); } @GetMapping("/find-by-application-organisation/{applicationId}/{organisationId}") RestResult<ApplicationFinanceResource> findByApplicationOrganisation( @PathVariable("applicationId") final Long applicationId, @PathVariable("organisationId") final Long organisationId); @GetMapping("/find-by-application/{applicationId}") RestResult<List<ApplicationFinanceResource>> findByApplication( @PathVariable("applicationId") final Long applicationId); @GetMapping("/get-research-participation-percentage/{applicationId}") RestResult<Double> getResearchParticipationPercentage(@PathVariable("applicationId") final Long applicationId); @GetMapping("/get-by-id/{applicationFinanceId}") RestResult<ApplicationFinanceResource> findOne(@PathVariable("applicationFinanceId") final Long applicationFinanceId); @PostMapping("/update/{applicationFinanceId}") RestResult<ApplicationFinanceResource> update(@PathVariable("applicationFinanceId") final Long applicationFinanceId, @RequestBody final ApplicationFinanceResource applicationFinance); @GetMapping("/finance-details/{applicationId}/{organisationId}") RestResult<ApplicationFinanceResource> financeDetails(@PathVariable("applicationId") final Long applicationId, @PathVariable("organisationId") final Long organisationId); @GetMapping("/finance-details/{applicationId}") RestResult<List<ApplicationFinanceResource>> financeDetails(@PathVariable("applicationId") final Long applicationId); @GetMapping("/finance-totals/{applicationId}") RestResult<List<ApplicationFinanceResource>> financeTotals(@PathVariable("applicationId") final Long applicationId); @PostMapping(value = "/finance-document", produces = "application/json") RestResult<FileEntryResource> addFinanceDocument( @RequestHeader(value = "Content-Type", required = false) String contentType, @RequestHeader(value = "Content-Length", required = false) String contentLength, @RequestParam(value = "applicationFinanceId") long applicationFinanceId, @RequestParam(value = "filename", required = false) String originalFilename, HttpServletRequest request); @PutMapping(value = "/finance-document", produces = "application/json") RestResult<Void> updateFinanceDocument( @RequestHeader(value = "Content-Type", required = false) String contentType, @RequestHeader(value = "Content-Length", required = false) String contentLength, @RequestParam(value = "applicationFinanceId") long applicationFinanceId, @RequestParam(value = "filename", required = false) String originalFilename, HttpServletRequest request); @DeleteMapping(value = "/finance-document", produces = "application/json") RestResult<Void> deleteFinanceDocument( @RequestParam("applicationFinanceId") long applicationFinanceId); @GetMapping("/finance-document") @ResponseBody ResponseEntity<Object> getFileContents( @RequestParam("applicationFinanceId") long applicationFinanceId); @GetMapping("/finance-document/fileentry") RestResult<FileEntryResource> getFileDetails(@RequestParam("applicationFinanceId") long applicationFinanceId); }
@Test public void getFileDetails() throws Exception { FileEntryResource fileEntry = newFileEntryResource().build(); when(financeFileEntryServiceMock.getFileContents(123)).thenReturn(serviceSuccess(new BasicFileAndContents(fileEntry, () -> null))); mockMvc.perform(get("/applicationfinance/finance-document/fileentry?applicationFinanceId=123")) .andExpect(status().isOk()) .andExpect(content().json(toJson(fileEntry))); }
ApplicationFinanceController { @GetMapping("/finance-details/{applicationId}/{organisationId}") public RestResult<ApplicationFinanceResource> financeDetails(@PathVariable("applicationId") final Long applicationId, @PathVariable("organisationId") final Long organisationId) { return financeService.financeDetails(applicationId, organisationId).toGetResponse(); } @GetMapping("/find-by-application-organisation/{applicationId}/{organisationId}") RestResult<ApplicationFinanceResource> findByApplicationOrganisation( @PathVariable("applicationId") final Long applicationId, @PathVariable("organisationId") final Long organisationId); @GetMapping("/find-by-application/{applicationId}") RestResult<List<ApplicationFinanceResource>> findByApplication( @PathVariable("applicationId") final Long applicationId); @GetMapping("/get-research-participation-percentage/{applicationId}") RestResult<Double> getResearchParticipationPercentage(@PathVariable("applicationId") final Long applicationId); @GetMapping("/get-by-id/{applicationFinanceId}") RestResult<ApplicationFinanceResource> findOne(@PathVariable("applicationFinanceId") final Long applicationFinanceId); @PostMapping("/update/{applicationFinanceId}") RestResult<ApplicationFinanceResource> update(@PathVariable("applicationFinanceId") final Long applicationFinanceId, @RequestBody final ApplicationFinanceResource applicationFinance); @GetMapping("/finance-details/{applicationId}/{organisationId}") RestResult<ApplicationFinanceResource> financeDetails(@PathVariable("applicationId") final Long applicationId, @PathVariable("organisationId") final Long organisationId); @GetMapping("/finance-details/{applicationId}") RestResult<List<ApplicationFinanceResource>> financeDetails(@PathVariable("applicationId") final Long applicationId); @GetMapping("/finance-totals/{applicationId}") RestResult<List<ApplicationFinanceResource>> financeTotals(@PathVariable("applicationId") final Long applicationId); @PostMapping(value = "/finance-document", produces = "application/json") RestResult<FileEntryResource> addFinanceDocument( @RequestHeader(value = "Content-Type", required = false) String contentType, @RequestHeader(value = "Content-Length", required = false) String contentLength, @RequestParam(value = "applicationFinanceId") long applicationFinanceId, @RequestParam(value = "filename", required = false) String originalFilename, HttpServletRequest request); @PutMapping(value = "/finance-document", produces = "application/json") RestResult<Void> updateFinanceDocument( @RequestHeader(value = "Content-Type", required = false) String contentType, @RequestHeader(value = "Content-Length", required = false) String contentLength, @RequestParam(value = "applicationFinanceId") long applicationFinanceId, @RequestParam(value = "filename", required = false) String originalFilename, HttpServletRequest request); @DeleteMapping(value = "/finance-document", produces = "application/json") RestResult<Void> deleteFinanceDocument( @RequestParam("applicationFinanceId") long applicationFinanceId); @GetMapping("/finance-document") @ResponseBody ResponseEntity<Object> getFileContents( @RequestParam("applicationFinanceId") long applicationFinanceId); @GetMapping("/finance-document/fileentry") RestResult<FileEntryResource> getFileDetails(@RequestParam("applicationFinanceId") long applicationFinanceId); }
@Test public void financeDetails() throws Exception { ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource().build(); when(financeServiceMock.financeDetails(123L, 456L)).thenReturn(serviceSuccess(applicationFinanceResource)); mockMvc.perform(get("/applicationfinance/finance-details/{applicationId}/{organisationId}", "123", "456")) .andExpect(status().isOk()) .andExpect(content().json(toJson(applicationFinanceResource))); verify(financeServiceMock).financeDetails(123L, 456L); } @Test public void getFinanceDetailsForApplication() throws Exception { List<ApplicationFinanceResource> applicationFinanceResources = newApplicationFinanceResource().build(3); when(financeServiceMock.financeDetails(123L)).thenReturn(serviceSuccess(applicationFinanceResources)); mockMvc.perform(get("/applicationfinance/finance-details/{applicationId}", "123")) .andExpect(status().isOk()) .andExpect(content().json(toJson(applicationFinanceResources))); verify(financeServiceMock).financeDetails(123L); }
NotificationServiceImpl implements NotificationService { @Override public ServiceResult<Void> sendNotificationWithFlush(Notification notification, NotificationMedium notificationMedium, NotificationMedium... otherNotificationMedia) { return sendNotification(sender -> sender.sendNotificationWithFlush(notification), notificationMedium, otherNotificationMedia); } @Override ServiceResult<Void> sendNotification(Notification notification, NotificationMedium notificationMedium, NotificationMedium... otherNotificationMedia); @Override ServiceResult<Void> sendNotificationWithFlush(Notification notification, NotificationMedium notificationMedium, NotificationMedium... otherNotificationMedia); }
@Test public void testSendNotificationByEmail() { Notification notificationToSend = newNotification().build(); when(mockEmailNotificationSender.sendNotificationWithFlush(notificationToSend)).thenReturn(serviceSuccess(notificationToSend)); ServiceResult<Void> result = service.sendNotificationWithFlush(notificationToSend, EMAIL); assertTrue(result.isSuccess()); verify(mockEmailNotificationSender).sendNotificationWithFlush(notificationToSend); verify(mockLoggingNotificationSender, never()).sendNotificationWithFlush(notificationToSend); } @Test public void testSendNotificationByEmailAndLogging() { Notification notificationToSend = newNotification().build(); when(mockEmailNotificationSender.sendNotificationWithFlush(notificationToSend)).thenReturn(serviceSuccess(notificationToSend)); when(mockLoggingNotificationSender.sendNotificationWithFlush(notificationToSend)).thenReturn(serviceSuccess(notificationToSend)); ServiceResult<Void> result = service.sendNotificationWithFlush(notificationToSend, EMAIL, LOGGING); assertTrue(result.isSuccess()); verify(mockEmailNotificationSender).sendNotificationWithFlush(notificationToSend); verify(mockLoggingNotificationSender).sendNotificationWithFlush(notificationToSend); } @Test public void testSendNotificationByEmailDeclaredTwiceButOnlySendOnce() { Notification notificationToSend = newNotification().build(); when(mockEmailNotificationSender.sendNotificationWithFlush(notificationToSend)).thenReturn(serviceSuccess(notificationToSend)); ServiceResult<Void> result = service.sendNotificationWithFlush(notificationToSend, EMAIL, EMAIL); assertTrue(result.isSuccess()); verify(mockEmailNotificationSender, times(1)).sendNotificationWithFlush(notificationToSend); verify(mockLoggingNotificationSender, never()).sendNotificationWithFlush(notificationToSend); } @Test public void testSendNotificationByEmailButSenderFails() { Notification notificationToSend = newNotification().build(); Error errorResponse = new Error(EMAILS_NOT_SENT_MULTIPLE, INTERNAL_SERVER_ERROR); when(mockEmailNotificationSender.sendNotificationWithFlush(notificationToSend)).thenReturn(serviceFailure(errorResponse)); ServiceResult<Void> result = service.sendNotificationWithFlush(notificationToSend, EMAIL); assertTrue(result.isFailure()); assertTrue(result.getFailure().is(errorResponse)); }
AbstractOrganisationFinanceController { @GetMapping("/with-growth-table") public RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId) { return getOrganisationFinanceService().getOrganisationWithGrowthTable(targetId, organisationId).toGetResponse(); } @GetMapping("/with-growth-table") RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/without-growth-table") RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/ktp-financial-years") RestResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears( @PathVariable long targetId, @PathVariable long organisationId); @PostMapping("/with-growth-table") RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances); @PostMapping("/without-growth-table") RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances); @PostMapping("/ktp-financial-years") RestResult<Void> updateOrganisationFinancesKtpYears( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesKtpYearsResource finances); @GetMapping("/show-state-aid") RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId); }
@Test public void getOrganisationWithGrowthTable() throws Exception { OrganisationFinancesWithGrowthTableResource expectedOrganisationFinances = new OrganisationFinancesWithGrowthTableResource(); when(organisationFinanceService. getOrganisationWithGrowthTable(targetId, organisationId)) .thenReturn(serviceSuccess(expectedOrganisationFinances)); mockMvc.perform(get("/root/{targetId}/organisation/{organisationId}/finance/with-growth-table", targetId, organisationId)) .andExpect(status().isOk()) .andExpect(content().json(toJson(expectedOrganisationFinances))); }
AbstractOrganisationFinanceController { @GetMapping("/without-growth-table") public RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId) { return getOrganisationFinanceService().getOrganisationWithoutGrowthTable(targetId, organisationId).toGetResponse(); } @GetMapping("/with-growth-table") RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/without-growth-table") RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/ktp-financial-years") RestResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears( @PathVariable long targetId, @PathVariable long organisationId); @PostMapping("/with-growth-table") RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances); @PostMapping("/without-growth-table") RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances); @PostMapping("/ktp-financial-years") RestResult<Void> updateOrganisationFinancesKtpYears( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesKtpYearsResource finances); @GetMapping("/show-state-aid") RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId); }
@Test public void getOrganisationWithoutGrowthTable() throws Exception { OrganisationFinancesWithoutGrowthTableResource expectedOrganisationFinances = new OrganisationFinancesWithoutGrowthTableResource(); when(organisationFinanceService.getOrganisationWithoutGrowthTable(targetId, organisationId)) .thenReturn(serviceSuccess(expectedOrganisationFinances)); mockMvc.perform(get("/root/{targetId}/organisation/{organisationId}/finance/without-growth-table", targetId, organisationId)) .andExpect(status().isOk()) .andExpect(content().json(toJson(expectedOrganisationFinances))); }
AbstractOrganisationFinanceController { @PostMapping("/with-growth-table") public RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances) { return getOrganisationFinanceService().updateOrganisationWithGrowthTable(targetId, organisationId, finances).toPostResponse(); } @GetMapping("/with-growth-table") RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/without-growth-table") RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/ktp-financial-years") RestResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears( @PathVariable long targetId, @PathVariable long organisationId); @PostMapping("/with-growth-table") RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances); @PostMapping("/without-growth-table") RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances); @PostMapping("/ktp-financial-years") RestResult<Void> updateOrganisationFinancesKtpYears( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesKtpYearsResource finances); @GetMapping("/show-state-aid") RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId); }
@Test public void updateOrganisationWithGrowthTable() throws Exception { OrganisationFinancesWithGrowthTableResource organisationFinances = new OrganisationFinancesWithGrowthTableResource(); when(organisationFinanceService.updateOrganisationWithGrowthTable(targetId, organisationId, organisationFinances)).thenReturn(serviceSuccess()); mockMvc.perform(post("/root/{targetId}/organisation/{organisationId}/finance/with-growth-table", targetId, organisationId) .contentType(APPLICATION_JSON) .content(toJson(organisationFinances))) .andExpect(status().isOk()); verify(organisationFinanceService, times(1)).updateOrganisationWithGrowthTable(targetId, organisationId, organisationFinances); }
AbstractOrganisationFinanceController { @PostMapping("/without-growth-table") public RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances) { return getOrganisationFinanceService().updateOrganisationWithoutGrowthTable(targetId, organisationId, finances).toPostResponse(); } @GetMapping("/with-growth-table") RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/without-growth-table") RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/ktp-financial-years") RestResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears( @PathVariable long targetId, @PathVariable long organisationId); @PostMapping("/with-growth-table") RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances); @PostMapping("/without-growth-table") RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances); @PostMapping("/ktp-financial-years") RestResult<Void> updateOrganisationFinancesKtpYears( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesKtpYearsResource finances); @GetMapping("/show-state-aid") RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId); }
@Test public void updateOrganisationWithoutGrowthTable() throws Exception { OrganisationFinancesWithoutGrowthTableResource organisationFinances = new OrganisationFinancesWithoutGrowthTableResource(); when(organisationFinanceService.updateOrganisationWithoutGrowthTable(targetId, organisationId, organisationFinances)).thenReturn(serviceSuccess()); mockMvc.perform(post("/root/{targetId}/organisation/{organisationId}/finance/without-growth-table", targetId, organisationId) .contentType(APPLICATION_JSON) .content(toJson(organisationFinances))) .andExpect(status().isOk()); verify(organisationFinanceService, times(1)).updateOrganisationWithoutGrowthTable(targetId, organisationId, organisationFinances); }
AbstractOrganisationFinanceController { @GetMapping("/show-state-aid") public RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId) { return getOrganisationFinanceService().isShowStateAidAgreement(targetId, organisationId).toGetResponse(); } @GetMapping("/with-growth-table") RestResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/without-growth-table") RestResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId); @GetMapping("/ktp-financial-years") RestResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears( @PathVariable long targetId, @PathVariable long organisationId); @PostMapping("/with-growth-table") RestResult<Void> updateOrganisationWithGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithGrowthTableResource finances); @PostMapping("/without-growth-table") RestResult<Void> updateOrganisationWithoutGrowthTable( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesWithoutGrowthTableResource finances); @PostMapping("/ktp-financial-years") RestResult<Void> updateOrganisationFinancesKtpYears( @PathVariable long targetId, @PathVariable long organisationId, @RequestBody OrganisationFinancesKtpYearsResource finances); @GetMapping("/show-state-aid") RestResult<Boolean> isShowStateAidAgreement( @PathVariable long targetId, @PathVariable long organisationId); }
@Test public void isShowStateAidAgreement() throws Exception { when(organisationFinanceService.isShowStateAidAgreement(targetId, organisationId)).thenReturn(serviceSuccess(true)); mockMvc.perform(get("/root/{targetId}/organisation/{organisationId}/finance/show-state-aid", targetId, organisationId)).andExpect(status().isOk()) .andExpect(content().string("true")); }
GrantClaimMaximumController { @GetMapping("/{id}") public RestResult<GrantClaimMaximumResource> getGrantClaimMaximumById(@PathVariable("id") final long id) { return grantClaimMaximumService.getGrantClaimMaximumById(id).toGetResponse(); } GrantClaimMaximumController(GrantClaimMaximumService grantClaimMaximumService); @GetMapping("/{id}") RestResult<GrantClaimMaximumResource> getGrantClaimMaximumById(@PathVariable("id") final long id); @PostMapping("/revert-to-default/{competitionId}") RestResult<Set<Long>> revertToDefault(@PathVariable("competitionId") final long competitionId); @PostMapping("/") RestResult<GrantClaimMaximumResource> update(@RequestBody final GrantClaimMaximumResource gcm); @GetMapping("/maximum-funding-level-overridden/{competitionId}") RestResult<Boolean> isMaximumFundingLevelOverridden(@PathVariable("competitionId") final long competitionId); }
@Test public void getGrantClaimMaximumById() throws Exception { GrantClaimMaximumResource gcm = newGrantClaimMaximumResource().build(); when(grantClaimMaximumService.getGrantClaimMaximumById(gcm.getId())).thenReturn(serviceSuccess(gcm)); mockMvc.perform(get("/grant-claim-maximum/{id}", gcm.getId())) .andExpect(status().isOk()) .andExpect(content().json(toJson(gcm))); verify(grantClaimMaximumService, only()).getGrantClaimMaximumById(gcm.getId()); } @Test public void getGrantClaimMaximumByIdNotFound() throws Exception { when(grantClaimMaximumService.getGrantClaimMaximumById(1L)).thenReturn(serviceFailure(notFoundError(GrantClaimMaximum.class, 1L))); mockMvc.perform(get("/grant-claim-maximum/{id}", 1L)) .andExpect(status().isNotFound()); verify(grantClaimMaximumService, only()).getGrantClaimMaximumById(1L); }
GrantClaimMaximumController { @GetMapping("/maximum-funding-level-overridden/{competitionId}") public RestResult<Boolean> isMaximumFundingLevelOverridden(@PathVariable("competitionId") final long competitionId) { return grantClaimMaximumService.isMaximumFundingLevelOverridden(competitionId).toGetResponse(); } GrantClaimMaximumController(GrantClaimMaximumService grantClaimMaximumService); @GetMapping("/{id}") RestResult<GrantClaimMaximumResource> getGrantClaimMaximumById(@PathVariable("id") final long id); @PostMapping("/revert-to-default/{competitionId}") RestResult<Set<Long>> revertToDefault(@PathVariable("competitionId") final long competitionId); @PostMapping("/") RestResult<GrantClaimMaximumResource> update(@RequestBody final GrantClaimMaximumResource gcm); @GetMapping("/maximum-funding-level-overridden/{competitionId}") RestResult<Boolean> isMaximumFundingLevelOverridden(@PathVariable("competitionId") final long competitionId); }
@Test public void isMaximumFundingLevelOverridden() throws Exception { long competitionId = 1L; boolean expectedResult = true; when(grantClaimMaximumService.isMaximumFundingLevelOverridden(competitionId)).thenReturn(serviceSuccess (expectedResult)); mockMvc.perform(get("/grant-claim-maximum/maximum-funding-level-overridden/{competitionId}", competitionId) .contentType(MediaType.APPLICATION_JSON)) .andExpect(content().string(String.valueOf(expectedResult))) .andExpect(status().isOk()); verify(grantClaimMaximumService).isMaximumFundingLevelOverridden(competitionId); }
CostTotalMaintenanceController { @PutMapping("/send-all") public RestResult<Void> sendAll() { return allFinanceTotalsSender.sendAllFinanceTotals().toPutResponse(); } @PutMapping("/send-all") RestResult<Void> sendAll(); }
@Test public void sendAll() throws Exception { when(allFinanceTotalsSenderMock.sendAllFinanceTotals()).thenReturn(ServiceResult.serviceSuccess()); mockMvc.perform(put("/cost/send-all")) .andExpect(status().isOk()); verify(allFinanceTotalsSenderMock, only()).sendAllFinanceTotals(); }
UserPermissionRules { @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") public boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user) { return hasPermissionToGrantRole(user); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void allowedRolesCanUpdateUsersToMonitoringOfficers() { UserResource userToUpdate = newUserResource().build(); assertTrue(rules.adminsCanUpdateUserDetails(userToUpdate, compAdminUser())); assertTrue(rules.adminsCanUpdateUserDetails(userToUpdate, projectFinanceUser())); assertTrue(rules.adminsCanUpdateUserDetails(userToUpdate, ifsAdminUser())); assertFalse(rules.adminsCanUpdateUserDetails(userToUpdate, assessorUser())); }
ApplicationFinanceHandlerImpl implements ApplicationFinanceHandler { @Override public BigDecimal getResearchParticipationPercentage(Long applicationId) { List<ApplicationFinanceResource> applicationFinanceResources = this.getApplicationTotals(applicationId); BigDecimal totalCosts = applicationFinanceResources.stream() .map(ApplicationFinanceResource::getTotal) .reduce(BigDecimal.ZERO, BigDecimal::add); BigDecimal researchCosts = applicationFinanceResources.stream() .filter(f -> OrganisationTypeEnum.isResearchParticipationOrganisation(organisationRepository.findById(f.getOrganisation()).get().getOrganisationType().getId()) ) .map(ApplicationFinanceResource::getTotal) .reduce(BigDecimal.ZERO, BigDecimal::add); BigDecimal researchParticipation = BigDecimal.ZERO; if (totalCosts.compareTo(BigDecimal.ZERO) != 0) { researchParticipation = researchCosts.divide(totalCosts, 6, BigDecimal.ROUND_HALF_UP); } researchParticipation = researchParticipation.multiply(BigDecimal.valueOf(100)); return researchParticipation.setScale(2, BigDecimal.ROUND_CEILING); } @Override ApplicationFinanceResource getApplicationOrganisationFinances(ApplicationFinanceResourceId applicationFinanceResourceId); @Override List<ApplicationFinanceResource> getApplicationFinances(Long applicationId); @Override List<ApplicationFinanceResource> getApplicationTotals(Long applicationId); @Override BigDecimal getResearchParticipationPercentage(Long applicationId); }
@Test public void getResearchParticipationPercentage_roundedUp() { BigDecimal expectedRawPercentage = new BigDecimal("50.002400"); BigDecimal expectedPercentage = new BigDecimal("50.01"); ApplicationFinanceResource researchFinanceResource = newApplicationFinanceResource().build(); researchFinanceResource.setFinanceOrganisationDetails(researchOrgFinances); BigDecimal researchTotalCost = researchFinanceResource.getTotal(); ApplicationFinanceResource businessFinanceResource = newApplicationFinanceResource().build(); businessFinanceResource.setFinanceOrganisationDetails(businessOrgFinances); BigDecimal businessTotalCost = businessFinanceResource.getTotal(); BigDecimal totalCost = researchTotalCost.add(businessTotalCost); BigDecimal rawResearchPercentage = researchTotalCost .divide(totalCost, 6, BigDecimal.ROUND_HALF_UP) .multiply(BigDecimal.valueOf(100)); assertEquals(expectedRawPercentage, rawResearchPercentage); BigDecimal result = handler.getResearchParticipationPercentage(applicationId); assertEquals(expectedPercentage, result); }
ProjectFinanceHandlerImpl implements ProjectFinanceHandler { @Override @Transactional public BigDecimal getResearchParticipationPercentageFromProject(long projectId){ List<ProjectFinanceResource> applicationFinanceResources = this.getFinanceChecksTotals(projectId); BigDecimal totalCosts = applicationFinanceResources.stream() .map(ProjectFinanceResource::getTotal) .reduce(BigDecimal.ZERO, BigDecimal::add); BigDecimal researchCosts = applicationFinanceResources.stream() .filter(f -> OrganisationTypeEnum.isResearchParticipationOrganisation(organisationRepository.findById(f.getOrganisation()).get().getOrganisationType().getId()) ) .map(ProjectFinanceResource::getTotal) .reduce(BigDecimal.ZERO, BigDecimal::add); BigDecimal researchParticipation = BigDecimal.ZERO; if(totalCosts.compareTo(BigDecimal.ZERO)!=0) { researchParticipation = researchCosts.divide(totalCosts, 6, BigDecimal.ROUND_HALF_UP); } researchParticipation = researchParticipation.multiply(BigDecimal.valueOf(100)); return researchParticipation.setScale(2, BigDecimal.ROUND_HALF_UP); } @Override @Transactional BigDecimal getResearchParticipationPercentageFromProject(long projectId); @Override @Transactional ServiceResult<ProjectFinanceResource> getProjectOrganisationFinances(ProjectFinanceResourceId projectFinanceResourceId); @Override @Transactional List<ProjectFinanceResource> getFinanceChecksTotals(long projectId); }
@Test public void getResearchParticipationPercentageFromProject() { BigDecimal result = handler.getResearchParticipationPercentageFromProject(projectId); assertNotNull(result); }
ProjectFinanceHandlerImpl implements ProjectFinanceHandler { @Override @Transactional public ServiceResult<ProjectFinanceResource> getProjectOrganisationFinances(ProjectFinanceResourceId projectFinanceResourceId) { return getProjectFinanceForOrganisation(projectFinanceResourceId.getProjectId(), projectFinanceResourceId.getOrganisationId()). andOnSuccessReturn( projectFinance -> { ProjectFinanceResource projectFinanceResource = null; if(projectFinance!=null) { projectFinanceResource = projectFinanceMapper.mapToResource(projectFinance); setProjectFinanceDetails(projectFinanceResource, projectFinance.getProject().getApplication().getCompetition()); } return projectFinanceResource; } ); } @Override @Transactional BigDecimal getResearchParticipationPercentageFromProject(long projectId); @Override @Transactional ServiceResult<ProjectFinanceResource> getProjectOrganisationFinances(ProjectFinanceResourceId projectFinanceResourceId); @Override @Transactional List<ProjectFinanceResource> getFinanceChecksTotals(long projectId); }
@Test public void getProjectOrganisationFinances() { ServiceResult<ProjectFinanceResource> result = handler.getProjectOrganisationFinances(projectFinanceResourceId); assertTrue(result.isSuccess()); assertEquals(result.getSuccess(), projectFinanceResource); }
ProjectFinanceHandlerImpl implements ProjectFinanceHandler { @Override @Transactional public List<ProjectFinanceResource> getFinanceChecksTotals(long projectId) { return find(projectRepository.findById(projectId), notFoundError(Project.class, projectId)).andOnSuccessReturn(project -> { List<ProjectFinanceResource> financeResources = new ArrayList<>(); project.getPartnerOrganisations().stream() .map(PartnerOrganisation::getOrganisation) .map(organisation -> getProjectFinanceForOrganisation(projectId, organisation.getId()).getSuccess()) .forEach(finance -> { ProjectFinanceResource financeResource = projectFinanceMapper.mapToResource(finance); OrganisationTypeFinanceHandler organisationFinanceHandler = organisationFinanceDelegate.getOrganisationFinanceHandler(finance.getProject().getApplication().getCompetition().getId(), finance.getOrganisation().getOrganisationType().getId()); EnumMap<FinanceRowType, FinanceRowCostCategory> costs = new EnumMap<>(organisationFinanceHandler.getProjectOrganisationFinances(financeResource.getId())); financeResource.setFinanceOrganisationDetails(costs); financeResources.add(financeResource); }); return financeResources; }).getSuccess(); } @Override @Transactional BigDecimal getResearchParticipationPercentageFromProject(long projectId); @Override @Transactional ServiceResult<ProjectFinanceResource> getProjectOrganisationFinances(ProjectFinanceResourceId projectFinanceResourceId); @Override @Transactional List<ProjectFinanceResource> getFinanceChecksTotals(long projectId); }
@Test public void getFinanceChecksTotals() { List<ProjectFinanceResource> result = handler.getFinanceChecksTotals(projectId); assertTrue(result.size() > 0); } @Test public void getFinanceChecksTotals_willCreateFinances() { when(projectFinanceRepositoryMock.findByProjectIdAndOrganisationId(projectFinanceResourceId.getProjectId(), projectFinanceResourceId.getOrganisationId())).thenReturn(Optional.empty()); CostCategoryType costCategoryTypeForOrganisation = newCostCategoryType(). withCostCategoryGroup(newCostCategoryGroup(). withCostCategories(newCostCategory().withName("Cat1", "Cat2").build(2)). build()). build(); when(costCategoryTypeStrategy.getOrCreateCostCategoryTypeForSpendProfile(projectFinanceResourceId.getProjectId(), projectFinanceResourceId.getOrganisationId())).thenReturn(serviceSuccess(costCategoryTypeForOrganisation)); when(financeChecksGenerator.createMvpFinanceChecksFigures(project, organisation, costCategoryTypeForOrganisation)).thenReturn(serviceSuccess()); when(financeChecksGenerator.createFinanceChecksFigures(project, organisation)).thenReturn(serviceSuccess(projectFinance)); List<ProjectFinanceResource> result = handler.getFinanceChecksTotals(projectId); assertTrue(result.size() > 0); verify(costCategoryTypeStrategy).getOrCreateCostCategoryTypeForSpendProfile(projectFinanceResourceId.getProjectId(), projectFinanceResourceId.getOrganisationId()); verify(financeChecksGenerator).createMvpFinanceChecksFigures(project, organisation, costCategoryTypeForOrganisation); verify(financeChecksGenerator).createFinanceChecksFigures(project, organisation); }
FinanceValidationUtil { @Transactional(readOnly = true) public ValidationMessages validateProjectCostItem(FinanceRowItem costItem) { BeanPropertyBindingResult bindingResult = new BeanPropertyBindingResult(costItem, "costItem"); invokeProjectCostValidator(costItem, bindingResult); return buildValidationMessages(costItem, bindingResult); } List<ValidationMessages> validateCostItem(FinanceRowType type, FinanceRowCostCategory costCategory); @Transactional(readOnly = true) ValidationMessages validateCostItem(FinanceRowItem costItem); @Transactional(readOnly = true) ValidationMessages validateProjectCostItem(FinanceRowItem costItem); }
@Test public void validateProjectCostItem(){ Materials material = new Materials(1L); material.setCost(BigDecimal.valueOf(100)); material.setItem(""); material.setQuantity(5); when(applicationValidatorServiceMock.getProjectCostHandler(material)).thenReturn(new MaterialsHandler()); ValidationMessages validationMessages = validationUtil.validateProjectCostItem(material); assertNotNull(validationMessages); assertEquals(validationMessages.getErrors().size(), 1); assertEquals(validationMessages.getFieldErrors("item").get(0).getErrorKey(), "validation.field.must.not.be.blank"); assertEquals(validationMessages.getFieldErrors("item").get(0).getStatusCode(), HttpStatus.NOT_ACCEPTABLE); }
AbstractFinanceService extends BaseTransactionalService { protected void updateFinancialYearData(D dbFinance, F financeResource) { if (financeResource.getOrganisationSize() != null) { dbFinance.setOrganisationSize(financeResource.getOrganisationSize()); } if (dbFinance.getCompetition().getFundingType() == FundingType.KTP) { updateKtpYears(financeResource, dbFinance); } else if (TRUE.equals(dbFinance.getCompetition().getIncludeProjectGrowthTable())) { updateGrowthTable(financeResource, dbFinance); } else { updateEmployeesAndTurnover(financeResource, dbFinance); } } }
@Test public void updateFinanceDetails_IncludeProjectGrowthTable() { competition.setIncludeProjectGrowthTable(false); EmployeesAndTurnover employeesAndTurnover = new EmployeesAndTurnover(); when(finance.getEmployeesAndTurnover()).thenReturn(employeesAndTurnover); EmployeesAndTurnoverResource employeesAndTurnoverResource = new EmployeesAndTurnoverResource(); BigDecimal expectedTurnover = BigDecimal.valueOf(1); Long expectedEmployees = 2L; employeesAndTurnoverResource.setTurnover(expectedTurnover); employeesAndTurnoverResource.setEmployees(expectedEmployees); when(financeResource.getFinancialYearAccounts()).thenReturn(employeesAndTurnoverResource); service.updateFinancialYearData(finance, financeResource); assertEquals(expectedEmployees, employeesAndTurnover.getEmployees()); assertEquals(expectedTurnover, employeesAndTurnover.getTurnover()); verify(finance).setOrganisationSize(OrganisationSize.SMALL); } @Test public void updateFinanceDetails_NotIncludeProjectGrowthTable() { competition.setIncludeProjectGrowthTable(true); GrowthTable growthTable = new GrowthTable(); when(finance.getGrowthTable()).thenReturn(growthTable); GrowthTableResource growthTableResource = new GrowthTableResource(); BigDecimal expectedAnnualExport = BigDecimal.valueOf(3); BigDecimal expectedAnnualProfits = BigDecimal.valueOf(4); BigDecimal expectedAnnualTurnover = BigDecimal.valueOf(5); BigDecimal expectedResearchAndDevelopment = BigDecimal.valueOf(6); LocalDate expectedFinancialYearEnd = LocalDate.now(); Long expectedEmployees = 7L; growthTableResource.setAnnualExport(expectedAnnualExport); growthTableResource.setAnnualProfits(expectedAnnualProfits); growthTableResource.setAnnualTurnover(expectedAnnualTurnover); growthTableResource.setResearchAndDevelopment(expectedResearchAndDevelopment); growthTableResource.setFinancialYearEnd(expectedFinancialYearEnd); growthTableResource.setEmployees(expectedEmployees); when(financeResource.getFinancialYearAccounts()).thenReturn(growthTableResource); service.updateFinancialYearData(finance, financeResource); assertEquals(expectedAnnualExport, growthTable.getAnnualExport()); assertEquals(expectedAnnualProfits, growthTable.getAnnualProfits()); assertEquals(expectedAnnualTurnover, growthTable.getAnnualTurnover()); assertEquals(expectedResearchAndDevelopment, growthTable.getResearchAndDevelopment()); assertEquals(expectedFinancialYearEnd, growthTable.getFinancialYearEnd()); assertEquals(expectedEmployees, growthTable.getEmployees()); } @Test public void updateFinanceDetails_ktpFinancialYears() { competition.setFundingType(FundingType.KTP); KtpFinancialYears ktpFinancialYears = new KtpFinancialYears(); ktpFinancialYears.setYears(Lists.newArrayList( new KtpFinancialYear(0, ktpFinancialYears), new KtpFinancialYear(1, ktpFinancialYears), new KtpFinancialYear(2, ktpFinancialYears) )); when(finance.getKtpFinancialYears()).thenReturn(ktpFinancialYears); KtpYearsResource ktpYearsResource = new KtpYearsResource(); ktpYearsResource.setYears(newKtpYearResource() .withYear(0,1,2) .withTurnover(BigDecimal.valueOf(1)) .withPreTaxProfit(BigDecimal.valueOf(2)) .withCurrentAssets(BigDecimal.valueOf(3)) .withLiabilities(BigDecimal.valueOf(4)) .withShareholderValue(BigDecimal.valueOf(5)) .withLoans(BigDecimal.valueOf(6)) .withEmployees(7L) .build(3)); ktpYearsResource.setFinancialYearEnd(LocalDate.now()); ktpYearsResource.setGroupEmployees(1L); when(financeResource.getFinancialYearAccounts()).thenReturn(ktpYearsResource); service.updateFinancialYearData(finance, financeResource); assertEquals(ktpYearsResource.getGroupEmployees(), ktpFinancialYears.getGroupEmployees()); assertEquals(ktpYearsResource.getFinancialYearEnd(), ktpFinancialYears.getFinancialYearEnd()); KtpFinancialYear year0 = ktpFinancialYears.getYears().stream().filter(year -> year.getYear() == 0).findAny().get(); assertEquals(ktpYearsResource.getYears().get(0).getTurnover(), year0.getTurnover()); assertEquals(ktpYearsResource.getYears().get(0).getPreTaxProfit(), year0.getPreTaxProfit()); assertEquals(ktpYearsResource.getYears().get(0).getCurrentAssets(), year0.getCurrentAssets()); assertEquals(ktpYearsResource.getYears().get(0).getLiabilities(), year0.getLiabilities()); assertEquals(ktpYearsResource.getYears().get(0).getLoans(), year0.getLoans()); assertEquals(ktpYearsResource.getYears().get(0).getEmployees(), year0.getEmployees()); KtpFinancialYear year1 = ktpFinancialYears.getYears().stream().filter(year -> year.getYear() == 1).findAny().get(); assertEquals(ktpYearsResource.getYears().get(1).getTurnover(), year1.getTurnover()); assertEquals(ktpYearsResource.getYears().get(1).getPreTaxProfit(), year1.getPreTaxProfit()); assertEquals(ktpYearsResource.getYears().get(1).getCurrentAssets(), year1.getCurrentAssets()); assertEquals(ktpYearsResource.getYears().get(1).getLiabilities(), year1.getLiabilities()); assertEquals(ktpYearsResource.getYears().get(1).getLoans(), year1.getLoans()); assertEquals(ktpYearsResource.getYears().get(1).getEmployees(), year1.getEmployees()); KtpFinancialYear year2 = ktpFinancialYears.getYears().stream().filter(year -> year.getYear() == 2).findAny().get(); assertEquals(ktpYearsResource.getYears().get(2).getTurnover(), year2.getTurnover()); assertEquals(ktpYearsResource.getYears().get(2).getPreTaxProfit(), year2.getPreTaxProfit()); assertEquals(ktpYearsResource.getYears().get(2).getCurrentAssets(), year2.getCurrentAssets()); assertEquals(ktpYearsResource.getYears().get(2).getLiabilities(), year2.getLiabilities()); assertEquals(ktpYearsResource.getYears().get(2).getLoans(), year2.getLoans()); assertEquals(ktpYearsResource.getYears().get(2).getEmployees(), year2.getEmployees()); }
ApplicationFinanceServiceImpl extends AbstractFinanceService<ApplicationFinance, ApplicationFinanceResource> implements ApplicationFinanceService { @Override @Transactional public ServiceResult<ApplicationFinanceResource> findApplicationFinanceByApplicationIdAndOrganisation(long applicationId, long organisationId) { Optional<ApplicationFinance> finance = applicationFinanceRepository.findByApplicationIdAndOrganisationId(applicationId, organisationId); if (!finance.isPresent()) { return createApplicationFinance(applicationId, organisationId); } return serviceSuccess(applicationFinanceMapper.mapToResource(finance.get())); } @Override @Transactional ServiceResult<ApplicationFinanceResource> findApplicationFinanceByApplicationIdAndOrganisation(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> findApplicationFinanceByApplication(long applicationId); @Override ServiceResult<Double> getResearchParticipationPercentage(long applicationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeTotals(long applicationId); @Override ServiceResult<ApplicationFinanceResource> getApplicationFinanceById(long applicationFinanceId); @Override @Transactional ServiceResult<ApplicationFinanceResource> financeDetails(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeDetails(long applicationId); @Override @Transactional ServiceResult<ApplicationFinanceResource> updateApplicationFinance(long applicationFinanceId, ApplicationFinanceResource applicationFinance); @Override ServiceResult<Boolean> collaborativeFundingCriteriaMet(long applicationId); @Override ServiceResult<Boolean> fundingSoughtValid(long applicationId); }
@Test public void findApplicationFinanceByApplicationIdAndOrganisation() { Organisation organisation = newOrganisation().build(); Application application = newApplication().build(); ApplicationFinance existingFinance = newApplicationFinance().withOrganisation(organisation).withApplication(application).build(); when(applicationFinanceRepositoryMock.findByApplicationIdAndOrganisationId(123L, 456L)).thenReturn(Optional.of(existingFinance)); ApplicationFinanceResource expectedFinance = newApplicationFinanceResource(). with(id(existingFinance.getId())). withOrganisation(organisation.getId()). withApplication(application.getId()). build(); when(applicationFinanceRepositoryMock.findByApplicationIdAndOrganisationId(123L, 456L)).thenReturn(Optional.of(existingFinance)); when(applicationFinanceMapperMock.mapToResource(existingFinance)).thenReturn(expectedFinance); ServiceResult<ApplicationFinanceResource> result = service.findApplicationFinanceByApplicationIdAndOrganisation(123L, 456L); assertTrue(result.isSuccess()); assertEquals(expectedFinance, result.getSuccess()); }
ApplicationFinanceServiceImpl extends AbstractFinanceService<ApplicationFinance, ApplicationFinanceResource> implements ApplicationFinanceService { @Override public ServiceResult<List<ApplicationFinanceResource>> findApplicationFinanceByApplication(long applicationId) { return find(applicationFinanceRepository.findByApplicationId(applicationId), notFoundError(ApplicationFinance.class, applicationId)).andOnSuccessReturn(applicationFinances -> { List<ApplicationFinanceResource> applicationFinanceResources = new ArrayList<>(); if (applicationFinances != null) { applicationFinances.stream().forEach(af -> applicationFinanceResources.add(applicationFinanceMapper.mapToResource(af))); } return applicationFinanceResources; }); } @Override @Transactional ServiceResult<ApplicationFinanceResource> findApplicationFinanceByApplicationIdAndOrganisation(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> findApplicationFinanceByApplication(long applicationId); @Override ServiceResult<Double> getResearchParticipationPercentage(long applicationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeTotals(long applicationId); @Override ServiceResult<ApplicationFinanceResource> getApplicationFinanceById(long applicationFinanceId); @Override @Transactional ServiceResult<ApplicationFinanceResource> financeDetails(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeDetails(long applicationId); @Override @Transactional ServiceResult<ApplicationFinanceResource> updateApplicationFinance(long applicationFinanceId, ApplicationFinanceResource applicationFinance); @Override ServiceResult<Boolean> collaborativeFundingCriteriaMet(long applicationId); @Override ServiceResult<Boolean> fundingSoughtValid(long applicationId); }
@Test public void findApplicationFinanceByApplicationId() { Organisation organisation = newOrganisation().build(); Application application = newApplication().build(); ApplicationFinance existingFinance = newApplicationFinance().withOrganisation(organisation).withApplication(application).build(); when(applicationFinanceRepositoryMock.findByApplicationId(123L)).thenReturn(Collections.singletonList(existingFinance)); ApplicationFinanceResource expectedFinance = newApplicationFinanceResource(). with(id(existingFinance.getId())). withOrganisation(organisation.getId()). withApplication(application.getId()). build(); when(applicationFinanceRepositoryMock.findByApplicationId(123L)).thenReturn(singletonList(existingFinance)); when(applicationFinanceMapperMock.mapToResource(existingFinance)).thenReturn(expectedFinance); ServiceResult<List<ApplicationFinanceResource>> result = service.findApplicationFinanceByApplication(123L); assertTrue(result.isSuccess()); assertEquals(singletonList(expectedFinance), result.getSuccess()); }
ApplicationFinanceServiceImpl extends AbstractFinanceService<ApplicationFinance, ApplicationFinanceResource> implements ApplicationFinanceService { @Override @Transactional public ServiceResult<ApplicationFinanceResource> financeDetails(long applicationId, long organisationId) { Optional<ApplicationFinance> finance = applicationFinanceRepository.findByApplicationIdAndOrganisationId(applicationId, organisationId); if (!finance.isPresent()) { ServiceResult<ApplicationFinanceResource> result = createApplicationFinance(applicationId, organisationId); if (result.isFailure()) { return result; } } ApplicationFinanceResourceId applicationFinanceResourceId = new ApplicationFinanceResourceId(applicationId, organisationId); return getApplicationFinanceForOrganisation(applicationFinanceResourceId); } @Override @Transactional ServiceResult<ApplicationFinanceResource> findApplicationFinanceByApplicationIdAndOrganisation(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> findApplicationFinanceByApplication(long applicationId); @Override ServiceResult<Double> getResearchParticipationPercentage(long applicationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeTotals(long applicationId); @Override ServiceResult<ApplicationFinanceResource> getApplicationFinanceById(long applicationFinanceId); @Override @Transactional ServiceResult<ApplicationFinanceResource> financeDetails(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeDetails(long applicationId); @Override @Transactional ServiceResult<ApplicationFinanceResource> updateApplicationFinance(long applicationFinanceId, ApplicationFinanceResource applicationFinance); @Override ServiceResult<Boolean> collaborativeFundingCriteriaMet(long applicationId); @Override ServiceResult<Boolean> fundingSoughtValid(long applicationId); }
@Test public void findApplicationFinanceDetailsByApplicationId() { List<ApplicationFinanceResource> existingFinances = newApplicationFinanceResource().withApplication(1L).build(3); when(applicationFinanceHandlerMock.getApplicationFinances(1L)).thenReturn(existingFinances); ServiceResult<List<ApplicationFinanceResource>> result = service.financeDetails(1L); assertTrue(result.isSuccess()); assertEquals(existingFinances, result.getSuccess()); }
ApplicationFinanceServiceImpl extends AbstractFinanceService<ApplicationFinance, ApplicationFinanceResource> implements ApplicationFinanceService { @Override @Transactional public ServiceResult<ApplicationFinanceResource> updateApplicationFinance(long applicationFinanceId, ApplicationFinanceResource applicationFinance) { return getOpenApplication(applicationFinance.getApplication()).andOnSuccess(app -> find(applicationFinance(applicationFinanceId)).andOnSuccess(dbFinance -> { updateFinancialYearData(dbFinance, applicationFinance); if (applicationFinance.getWorkPostcode() != null) { dbFinance.setWorkPostcode(applicationFinance.getWorkPostcode()); } if (applicationFinance.getInternationalLocation() != null) { dbFinance.setInternationalLocation(applicationFinance.getInternationalLocation()); } if (StringUtils.isEmpty(applicationFinance.getJustification())) { dbFinance.setJustification(null); } else { dbFinance.setJustification(applicationFinance.getJustification()); } Long financeFileEntryId = applicationFinance.getFinanceFileEntry(); dbFinance = setFinanceUpload(dbFinance, financeFileEntryId); dbFinance = applicationFinanceRepository.save(dbFinance); return serviceSuccess(applicationFinanceMapper.mapToResource(dbFinance)); }) ); } @Override @Transactional ServiceResult<ApplicationFinanceResource> findApplicationFinanceByApplicationIdAndOrganisation(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> findApplicationFinanceByApplication(long applicationId); @Override ServiceResult<Double> getResearchParticipationPercentage(long applicationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeTotals(long applicationId); @Override ServiceResult<ApplicationFinanceResource> getApplicationFinanceById(long applicationFinanceId); @Override @Transactional ServiceResult<ApplicationFinanceResource> financeDetails(long applicationId, long organisationId); @Override ServiceResult<List<ApplicationFinanceResource>> financeDetails(long applicationId); @Override @Transactional ServiceResult<ApplicationFinanceResource> updateApplicationFinance(long applicationFinanceId, ApplicationFinanceResource applicationFinance); @Override ServiceResult<Boolean> collaborativeFundingCriteriaMet(long applicationId); @Override ServiceResult<Boolean> fundingSoughtValid(long applicationId); }
@Test public void updateApplicationFinancePostcode() { Long applicationId = 1L; Long applicationFinanceId = 8L; String postcode = "POSTCODE"; Application application = newApplication().withId(applicationId).withCompetition(newCompetition().withCompetitionStatus(CompetitionStatus.OPEN).build()).build(); when(applicationRepositoryMock.findById(applicationId)).thenReturn(Optional.of(application)); ApplicationFinance applicationFinance = newApplicationFinance().withApplication(application).withEmployeesAndTurnover(new EmployeesAndTurnover()).build(); when(applicationFinanceRepositoryMock.findById(applicationFinanceId)).thenReturn(Optional.of(applicationFinance)); ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource() .withApplication(applicationId) .withFinancialYearAccounts(newEmployeesAndTurnoverResource().build()) .withWorkPostcode(postcode).build(); ServiceResult<ApplicationFinanceResource> result = service.updateApplicationFinance(applicationFinanceId, applicationFinanceResource); assertTrue(result.isSuccess()); verify(applicationFinanceRepositoryMock).save(applicationFinance); assertEquals(postcode, applicationFinance.getWorkPostcode()); } @Test public void updateApplicationFinanceInternationalLocation() { Long applicationId = 1L; Long applicationFinanceId = 8L; String location = "LOCATION"; Application application = newApplication().withId(applicationId).withCompetition(newCompetition().withCompetitionStatus(CompetitionStatus.OPEN).build()).build(); when(applicationRepositoryMock.findById(applicationId)).thenReturn(Optional.of(application)); ApplicationFinance applicationFinance = newApplicationFinance().withApplication(application).withEmployeesAndTurnover(new EmployeesAndTurnover()).build(); when(applicationFinanceRepositoryMock.findById(applicationFinanceId)).thenReturn(Optional.of(applicationFinance)); ApplicationFinanceResource applicationFinanceResource = newApplicationFinanceResource() .withApplication(applicationId) .withFinancialYearAccounts(newEmployeesAndTurnoverResource().build()) .withInternationalLocation(location).build(); ServiceResult<ApplicationFinanceResource> result = service.updateApplicationFinance(applicationFinanceId, applicationFinanceResource); assertTrue(result.isSuccess()); verify(applicationFinanceRepositoryMock).save(applicationFinance); assertEquals(location, applicationFinance.getInternationalLocation()); }
AbstractOrganisationFinanceService extends BaseTransactionalService implements OrganisationFinanceService { @Override public ServiceResult<Boolean> isShowStateAidAgreement(long targetId, long organisationId) { return getStateAidEligibilityForCompetition(targetId).andOnSuccess(eligibility -> { if (!eligibility) { return serviceSuccess(false); } return isBusinessOrganisation(organisationId); }); } @Override ServiceResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears(long targetId, long organisationId); @Override @Transactional ServiceResult<Void> updateOrganisationWithGrowthTable(long targetId, long organisationId, OrganisationFinancesWithGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationWithoutGrowthTable(long targetId, long organisationId, OrganisationFinancesWithoutGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationKtpYears(long targetId, long organisationId, OrganisationFinancesKtpYearsResource finances); @Override ServiceResult<Boolean> isShowStateAidAgreement(long targetId, long organisationId); }
@Test public void isShowStateAidAgreement_whenStateAidIsTrue() { competition.setStateAid(true); when(organisationService.findById(organisationId)).thenReturn(serviceSuccess(organisation)); assertTrue((boolean) service.isShowStateAidAgreement(targetId, organisationId).getSuccess()); } @Test public void isShowStateAidAgreement_whenStateAidIsFalse() { competition.setStateAid(false); when(organisationService.findById(organisationId)).thenReturn(serviceSuccess(organisation)); assertFalse((boolean) service.isShowStateAidAgreement(targetId, organisationId).getSuccess()); }
AbstractOrganisationFinanceService extends BaseTransactionalService implements OrganisationFinanceService { @Override @Transactional public ServiceResult<Void> updateOrganisationWithoutGrowthTable(long targetId, long organisationId, OrganisationFinancesWithoutGrowthTableResource finances) { long competitionId = getCompetitionId(targetId); Finance finance = getFinance(targetId, organisationId).getSuccess(); updateOrganisationSize(finance, competitionId, finances.getOrganisationSize()); EmployeesAndTurnoverResource employeesAndTurnover = (EmployeesAndTurnoverResource) finance.getFinancialYearAccounts(); employeesAndTurnover.setTurnover(finances.getTurnover()); employeesAndTurnover.setEmployees(finances.getHeadCount()); updateFinance(finance).getSuccess(); return serviceSuccess(); } @Override ServiceResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears(long targetId, long organisationId); @Override @Transactional ServiceResult<Void> updateOrganisationWithGrowthTable(long targetId, long organisationId, OrganisationFinancesWithGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationWithoutGrowthTable(long targetId, long organisationId, OrganisationFinancesWithoutGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationKtpYears(long targetId, long organisationId, OrganisationFinancesKtpYearsResource finances); @Override ServiceResult<Boolean> isShowStateAidAgreement(long targetId, long organisationId); }
@Test public void updateOrganisationWithoutGrowthTable_whenStateAidIncludedAndAgreed() { when(finance.getFinancialYearAccounts()).thenReturn(employeesAndTurnoverResource); when(grantClaimMaximumService.isMaximumFundingLevelOverridden(competitionId)).thenReturn(serviceSuccess(false)); when(finance.getGrantClaim()).thenReturn(grantClaim); assertEquals(serviceSuccess(), service.updateOrganisationWithoutGrowthTable(targetId, organisationId, organisationFinancesWithoutGrowthTableResource)); assertEquals(organisationFinancesWithoutGrowthTableResource.getTurnover(), employeesAndTurnoverResource.getTurnover()); assertEquals(organisationFinancesWithoutGrowthTableResource.getHeadCount(), employeesAndTurnoverResource.getEmployees()); verify(grantClaim).reset(); }
AbstractOrganisationFinanceService extends BaseTransactionalService implements OrganisationFinanceService { @Override @Transactional public ServiceResult<Void> updateOrganisationWithGrowthTable(long targetId, long organisationId, OrganisationFinancesWithGrowthTableResource finances) { long competitionId = getCompetitionId(targetId); Finance finance = getFinance(targetId, organisationId).getSuccess(); updateOrganisationSize(finance, competitionId, finances.getOrganisationSize()); GrowthTableResource growthTable = (GrowthTableResource) finance.getFinancialYearAccounts(); growthTable.setFinancialYearEnd(ofNullable(finances.getFinancialYearEnd()).map(YearMonth::atEndOfMonth).orElse(null)); growthTable.setAnnualTurnover(finances.getAnnualTurnoverAtLastFinancialYear()); growthTable.setAnnualProfits(finances.getAnnualProfitsAtLastFinancialYear()); growthTable.setAnnualExport(finances.getAnnualExportAtLastFinancialYear()); growthTable.setResearchAndDevelopment(finances.getResearchAndDevelopmentSpendAtLastFinancialYear()); growthTable.setEmployees(finances.getHeadCountAtLastFinancialYear()); updateFinance(finance).getSuccess(); return serviceSuccess(); } @Override ServiceResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears(long targetId, long organisationId); @Override @Transactional ServiceResult<Void> updateOrganisationWithGrowthTable(long targetId, long organisationId, OrganisationFinancesWithGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationWithoutGrowthTable(long targetId, long organisationId, OrganisationFinancesWithoutGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationKtpYears(long targetId, long organisationId, OrganisationFinancesKtpYearsResource finances); @Override ServiceResult<Boolean> isShowStateAidAgreement(long targetId, long organisationId); }
@Test public void updateOrganisationWithGrowthTable_whenStateAidIncludedAndAgreed() { when(finance.getFinancialYearAccounts()).thenReturn(growthTableResource); when(grantClaimMaximumService.isMaximumFundingLevelOverridden(competitionId)).thenReturn(serviceSuccess(true)); assertEquals(serviceSuccess(), service.updateOrganisationWithGrowthTable(targetId, organisationId, organisationFinancesWithGrowthTableResource)); assertEquals(ofNullable(organisationFinancesWithGrowthTableResource.getFinancialYearEnd()) .map(YearMonth::atEndOfMonth).orElse(null), growthTableResource.getFinancialYearEnd()); assertEquals(organisationFinancesWithGrowthTableResource.getAnnualTurnoverAtLastFinancialYear(), growthTableResource.getAnnualTurnover()); assertEquals(organisationFinancesWithGrowthTableResource.getAnnualProfitsAtLastFinancialYear(), growthTableResource.getAnnualProfits()); assertEquals(organisationFinancesWithGrowthTableResource.getAnnualExportAtLastFinancialYear(), growthTableResource.getAnnualExport()); assertEquals(organisationFinancesWithGrowthTableResource.getResearchAndDevelopmentSpendAtLastFinancialYear(), growthTableResource.getResearchAndDevelopment()); assertEquals(organisationFinancesWithGrowthTableResource.getHeadCountAtLastFinancialYear(), growthTableResource.getEmployees()); }
AbstractOrganisationFinanceService extends BaseTransactionalService implements OrganisationFinanceService { @Override @Transactional public ServiceResult<Void> updateOrganisationKtpYears(long targetId, long organisationId, OrganisationFinancesKtpYearsResource finances) { long competitionId = getCompetitionId(targetId); Finance finance = getFinance(targetId, organisationId).getSuccess(); updateOrganisationSize(finance, competitionId, finances.getOrganisationSize()); KtpYearsResource ktpYearsResource = (KtpYearsResource) finance.getFinancialYearAccounts(); ktpYearsResource.setYears(finances.getYears()); ktpYearsResource.setGroupEmployees(finances.getGroupEmployees()); ktpYearsResource.setFinancialYearEnd(ofNullable(finances.getFinancialYearEnd()).map(YearMonth::atEndOfMonth).orElse(null)); updateFinance(finance).getSuccess(); return serviceSuccess(); } @Override ServiceResult<OrganisationFinancesWithGrowthTableResource> getOrganisationWithGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesWithoutGrowthTableResource> getOrganisationWithoutGrowthTable(long targetId, long organisationId); @Override ServiceResult<OrganisationFinancesKtpYearsResource> getOrganisationKtpYears(long targetId, long organisationId); @Override @Transactional ServiceResult<Void> updateOrganisationWithGrowthTable(long targetId, long organisationId, OrganisationFinancesWithGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationWithoutGrowthTable(long targetId, long organisationId, OrganisationFinancesWithoutGrowthTableResource finances); @Override @Transactional ServiceResult<Void> updateOrganisationKtpYears(long targetId, long organisationId, OrganisationFinancesKtpYearsResource finances); @Override ServiceResult<Boolean> isShowStateAidAgreement(long targetId, long organisationId); }
@Test public void updateOrganisationKtpFinancialYears() { OrganisationFinancesKtpYearsResource organisationFinancesKtpYearsResource = newOrganisationFinancesKtpYearsResource() .withOrganisationSize(OrganisationSize.SMALL) .withFinancialYearEnd(YearMonth.now().minusMonths(1)) .withGroupEmployees(2L) .withKtpYears(newKtpYearResource() .withYear(0,1,2) .withTurnover(BigDecimal.valueOf(1)) .withPreTaxProfit(BigDecimal.valueOf(2)) .withCurrentAssets(BigDecimal.valueOf(3)) .withLiabilities(BigDecimal.valueOf(4)) .withShareholderValue(BigDecimal.valueOf(5)) .withLoans(BigDecimal.valueOf(6)) .withEmployees(7L) .build(3)) .build(); KtpYearsResource yearsResource = new KtpYearsResource(); when(finance.getFinancialYearAccounts()).thenReturn(yearsResource); when(grantClaimMaximumService.isMaximumFundingLevelOverridden(competitionId)).thenReturn(serviceSuccess(false)); when(finance.getGrantClaim()).thenReturn(grantClaim); assertEquals(serviceSuccess(), service.updateOrganisationKtpYears(targetId, organisationId, organisationFinancesKtpYearsResource)); assertEquals(organisationFinancesKtpYearsResource.getYears(), yearsResource.getYears()); assertEquals(organisationFinancesKtpYearsResource.getFinancialYearEnd(), YearMonth.from(yearsResource.getFinancialYearEnd())); assertEquals(organisationFinancesKtpYearsResource.getGroupEmployees(), yearsResource.getGroupEmployees()); verify(grantClaim).reset(); }
ApplicationFinanceRowServiceImpl extends BaseTransactionalService implements ApplicationFinanceRowService { @Override public ServiceResult<FinanceRowItem> get(final long financeRowId) { Optional<FinanceRowItem> financeRowItem = financeRowRepository.findById(financeRowId).map(applicationFinanceRow -> { ApplicationFinance applicationFinance = applicationFinanceRow.getTarget(); OrganisationTypeFinanceHandler organisationFinanceHandler = organisationFinanceDelegate.getOrganisationFinanceHandler(applicationFinance.getApplication().getCompetition().getId(), applicationFinance.getOrganisation().getOrganisationType().getId()); return organisationFinanceHandler.toResource(applicationFinanceRow); }); if (!financeRowItem.isPresent()) { LOG.error("IFS-5593 unable to find a FinanceRowItem for financeRowId: " + financeRowId); } return financeRowItem.map(item -> serviceSuccess(item)).orElse(serviceFailure(GENERAL_NOT_FOUND)); } @Override ServiceResult<FinanceRowItem> get(final long financeRowId); @Override @Transactional ServiceResult<FinanceRowItem> create(long applicationFinanceId, final FinanceRowItem financeRowItem); @Override @Transactional ServiceResult<FinanceRowItem> update(final long financeRowId, final FinanceRowItem newCostItem); @Override @Transactional ServiceResult<Void> delete(final long financeRowId); @Override FinanceRowHandler getCostHandler(long financeRowId); }
@Test public void getCostItemNotFound() { long doesNotExistId = -1L; ServiceResult<FinanceRowItem> result = service.get(doesNotExistId); assertTrue(result.isFailure()); assertEquals("GENERAL_NOT_FOUND", result.getErrors().get(0).getErrorKey()); } @Test public void getCostItem() { long doesExistId = 1L; FinanceRowItem financeRowItem = newSubContractingCost() .withId(doesExistId) .withCost(new BigDecimal(10)) .withCountry("Country") .withName("name") .withRole("role") .withTargetId(applicationFinance.getId()) .build(); Competition competition = newCompetition().build(); Application application = newApplication().withCompetition(competition).build(); OrganisationType organisationType = newOrganisationType().withOrganisationType(RESEARCH).build(); Organisation organisation = newOrganisation().withOrganisationType(organisationType).build(); ApplicationFinance applicationFinance = newApplicationFinance().withApplication(application).withOrganisation(organisation).build(); ApplicationFinanceRow applicationFinanceRow = newApplicationFinanceRow().withId(doesExistId).withTarget(applicationFinance).build(); when(applicationFinanceRowRepositoryMock.findById(doesExistId)).thenReturn(Optional.of(applicationFinanceRow )); when(organisationFinanceDelegateMock.getOrganisationFinanceHandler(competition.getId(), organisationType.getId())).thenReturn(organisationFinanceDefaultHandlerMock); when(organisationFinanceDefaultHandlerMock.toResource(applicationFinanceRow)).thenReturn(financeRowItem); ServiceResult<FinanceRowItem> result = service.get(doesExistId); assertTrue(result.isSuccess()); assertEquals(financeRowItem, result.getSuccess()); InOrder inOrder = inOrder(applicationFinanceRowRepositoryMock, organisationFinanceDelegateMock, organisationFinanceDefaultHandlerMock); inOrder.verify(applicationFinanceRowRepositoryMock).findById(doesExistId); inOrder.verify(organisationFinanceDelegateMock).getOrganisationFinanceHandler(competition.getId(), organisationType.getId()); inOrder.verify(organisationFinanceDefaultHandlerMock).toResource(applicationFinanceRow); }
UserPermissionRules { @PermissionRule(value = "READ", description = "A user can read their own profile skills") public boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user) { return user.getId().equals(profileSkills.getUser()); } @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "An internal user can invite a monitoring officer and create the pending user associated.") boolean compAdminProjectFinanceCanCreateMonitoringOfficer(UserCreationResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "CREATE", description = "A System Registration User can create new Users on behalf of non-logged in users") boolean systemRegistrationUserCanCreateUsers(UserRegistrationResource userToCreate, UserResource user); @PermissionRule(value = "VERIFY", description = "A System Registration User can send a new User a verification link by e-mail") boolean systemRegistrationUserCanSendUserVerificationEmail(UserResource userToSendVerificationEmail, UserResource user); @PermissionRule(value = "READ", description = "Any user can view themselves") boolean anyUserCanViewThemselves(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Internal users can view everyone") boolean internalUsersCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Stakeholders can view users in competitions they are assigned to") boolean stakeholdersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Competition finance users can view users in competitions they are assigned to") boolean competitionFinanceUsersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Monitoring officers can view users in projects they are assigned to") boolean monitoringOfficersCanViewUsersInCompetitionsTheyAreAssignedTo(UserResource userToView, UserResource user); @PermissionRule(value = "READ_USER_ORGANISATION", description = "Internal support users can view all users and associated organisations") boolean internalUsersCanViewUserOrganisation(UserOrganisationResource userToView, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "IFS admins can update all users email addresses") boolean ifsAdminCanUpdateAllEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "Support users can update external users email addresses ") boolean supportCanUpdateExternalUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE_USER_EMAIL", description = "System Maintenance update all users email addresses") boolean systemMaintenanceUserCanUpdateUsersEmailAddresses(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ_INTERNAL", description = "Administrators can view internal users") boolean internalUsersCanViewEveryone(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Support users and administrators can view external users") boolean supportUsersCanViewExternalUsers(ManageUserPageResource userToView, UserResource user); @PermissionRule(value = "READ", description = "The System Registration user can view everyone") boolean systemRegistrationUserCanViewEveryone(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Comp admins and project finance can view assessors") boolean compAdminAndProjectFinanceCanViewAssessors(UserPageResource usersToView, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewOtherConsortiumMembers(UserResource userToView, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewConsortiumUsersOnApplicationsTheyAreAssessing(UserResource userToView, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "A User should be able to change their own password") boolean usersCanChangeTheirOwnPassword(UserResource userToUpdate, UserResource user); @PermissionRule(value = "CHANGE_PASSWORD", description = "The System Registration user should be able to change passwords on behalf of other Users") boolean systemRegistrationUserCanChangePasswordsForUsers(UserResource userToUpdate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A System Registration User can activate Users") boolean systemRegistrationUserCanActivateUsers(UserResource userToCreate, UserResource user); @PermissionRule(value = "UPDATE", description = "A User can update their own profile") boolean usersCanUpdateTheirOwnProfiles(UserResource userToUpdate, UserResource user); @PermissionRule(value = "UPDATE", description = "An admin user can update user details to assign monitoring officers") boolean adminsCanUpdateUserDetails(UserResource userToUpdate, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile skills") boolean usersCanViewTheirOwnProfileSkills(ProfileSkillsResource profileSkills, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own profile agreement") boolean usersCanViewTheirOwnProfileAgreement(ProfileAgreementResource profileAgreementResource, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own affiliations") boolean usersCanViewTheirOwnAffiliations(AffiliationResource affiliation, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A user can read their own profile") boolean usersCanViewTheirOwnProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ_USER_PROFILE", description = "A ifs admin user can read any user's profile") boolean ifsAdminCanViewAnyUsersProfile(UserProfileResource profileDetails, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as Comp Admin and Exec can read the user's profile status") boolean usersAndCompAdminCanViewProfileStatus(UserProfileStatusResource profileStatus, UserResource user); @PermissionRule(value = "READ", description = "A user can read their own role") boolean usersCanViewTheirOwnProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Consortium members (Lead Applicants and Collaborators) can view the process role of others in their Consortium Teams on their various Applications") boolean consortiumMembersCanViewTheProcessRolesOfOtherConsortiumMembers(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Project managers and partners can view the process role for the same organisation") boolean projectPartnersCanViewTheProcessRolesWithinSameApplication(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "The user, as well as internal users can read the user's process role") boolean usersAndInternalUsersCanViewProcessRole(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "READ", description = "Assessors can view the process roles of members of individual Consortiums on the various Applications that they are assessing") boolean assessorsCanViewTheProcessRolesOfConsortiumUsersOnApplicationsTheyAreAssessing(ProcessRoleResource processRole, UserResource user); @PermissionRule(value = "CHECK_USER_APPLICATION", description = "The user can check if they have an application for the competition") boolean userCanCheckTheyHaveApplicationForCompetition(UserResource userToCheck, UserResource user); @PermissionRule(value = "EDIT_INTERNAL_USER", description = "Only an IFS Administrator can edit an internal user") boolean ifsAdminCanEditInternalUser(final UserResource userToEdit, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "IFS Administrator can deactivate Users") boolean ifsAdminCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "A Support user can deactivate external Users") boolean supportUserCanDeactivateExternalUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "DEACTIVATE", description = "System Maintenance can deactivate Users") boolean systemMaintenanceUserCanDeactivateUsers(UserResource userToDeactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "IFS Administrator can reactivate Users") boolean ifsAdminCanReactivateUsers(UserResource userToReactivate, UserResource user); @PermissionRule(value = "ACTIVATE", description = "A Support user can reactivate external Users") boolean supportUserCanReactivateExternalUsers(UserResource userToActivate, UserResource user); @PermissionRule(value = "AGREE_TERMS", description = "A user can accept the site terms and conditions") boolean usersCanAgreeSiteTermsAndConditions(UserResource userToUpdate, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An assessor can request applicant role") boolean assessorCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant monitoring officer role") boolean isGrantingMonitoringOfficerRoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An admin user can grant a KTA role") boolean isGrantingKTARoleAndHasPermission(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An stakeholder can request applicant role") boolean stakeholderCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "GRANT_ROLE", description = "An monitoring officer can request applicant role") boolean monitoringOfficerCanRequestApplicantRole(GrantRoleCommand roleCommand, UserResource user); @PermissionRule(value = "CAN_VIEW_OWN_DASHBOARD", description = "User is requesting own dashboard") boolean isViewingOwnDashboard(UserResource userToView, UserResource user); }
@Test public void usersCanViewTheirOwnProfileSkills() { UserResource user = newUserResource().build(); ProfileSkillsResource profileSkillsResource = newProfileSkillsResource() .withUser(user.getId()) .build(); assertTrue(rules.usersCanViewTheirOwnProfileSkills(profileSkillsResource, user)); } @Test public void usersCanViewTheirOwnProfileSkillsButAttemptingToViewAnotherUsersProfileSkills() { UserResource user = newUserResource().build(); UserResource anotherUser = newUserResource().build(); ProfileSkillsResource profileSkillsResource = newProfileSkillsResource() .withUser(user.getId()) .build(); assertFalse(rules.usersCanViewTheirOwnProfileSkills(profileSkillsResource, anotherUser)); }
ApplicationFinanceRowServiceImpl extends BaseTransactionalService implements ApplicationFinanceRowService { @Override @Transactional public ServiceResult<FinanceRowItem> update(final long financeRowId, final FinanceRowItem newCostItem) { Application application = financeRowRepository.findById(financeRowId).get().getTarget().getApplication(); return getOpenApplication(application.getId()).andOnSuccess(app -> doUpdate(financeRowId, newCostItem).andOnSuccessReturn(cost -> { OrganisationTypeFinanceHandler organisationFinanceHandler = organisationFinanceDelegate.getOrganisationFinanceHandler(((ApplicationFinanceRow) cost).getTarget().getApplication().getCompetition().getId(), ((ApplicationFinanceRow) cost).getTarget().getOrganisation().getOrganisationType().getId()); return organisationFinanceHandler.toResource((ApplicationFinanceRow) cost); }) ); } @Override ServiceResult<FinanceRowItem> get(final long financeRowId); @Override @Transactional ServiceResult<FinanceRowItem> create(long applicationFinanceId, final FinanceRowItem financeRowItem); @Override @Transactional ServiceResult<FinanceRowItem> update(final long financeRowId, final FinanceRowItem newCostItem); @Override @Transactional ServiceResult<Void> delete(final long financeRowId); @Override FinanceRowHandler getCostHandler(long financeRowId); }
@Test public void noAttachedMetaValueDoesNotCreateOrUpdateMetaValue() { ApplicationFinanceRow convertedApplicationFinanceRow = newApplicationFinanceRow() .withTarget(applicationFinance).build(); ApplicationFinanceRow currentApplicationFinanceRow = newApplicationFinanceRow() .withTarget(applicationFinance).build(); when(applicationFinanceRowRepositoryMock.findById(costId)).thenReturn(Optional.of(currentApplicationFinanceRow)); when(organisationFinanceDefaultHandlerMock.toApplicationDomain(any())).thenReturn(convertedApplicationFinanceRow); when(organisationFinanceDefaultHandlerMock.updateCost(any())).thenReturn(currentApplicationFinanceRow); when(financeRowMetaValueRepositoryMock.financeRowIdAndFinanceRowMetaFieldId(any(), any())).thenReturn(null); when(financeRowMetaFieldRepositoryMock.findById(financeRowMetaField.getId())).thenReturn(Optional.of(financeRowMetaField)); ServiceResult<FinanceRowItem> result = service.update(costId, newFinanceRowItem); assertTrue(result.isSuccess()); verify(financeRowMetaValueRepositoryMock, times(0)).save(any(FinanceRowMetaValue.class)); }