Skip to content

Commit

Permalink
Merge pull request DSpace#9692 from DSpace/backport-9691-to-dspace-8_x
Browse files Browse the repository at this point in the history
[Port dspace-8_x] Fix random test failures in LinksetRestControllerIT and ManageGroupsFeatureIT
  • Loading branch information
tdonohue authored Jul 10, 2024
2 parents 97baa39 + 755e3f1 commit 61078fc
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 41 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ public void testSubGroupOfAdminGroup() throws Exception {

// Verify an ePerson in a subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -285,7 +285,7 @@ public void testSubSubGroupOfAdminGroup() throws Exception {

// Verify an ePerson in a sub-subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -502,7 +502,7 @@ public void testSubGroupOfAdminGroupNoCommunityGroupPermission() throws Exceptio

// Verify an ePerson in a subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -636,7 +636,7 @@ public void testSubSubGroupOfAdminGroupNoCommunityGroupPermission() throws Excep

// Verify an ePerson in a sub-subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -897,7 +897,7 @@ public void testSubGroupOfAdminGroupNoCollectionGroupPermission() throws Excepti

// Verify an ePerson in a subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -1051,7 +1051,7 @@ public void testSubSubGroupOfAdminGroupNoCollectionGroupPermission() throws Exce

// Verify an ePerson in a sub-subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -1352,7 +1352,7 @@ public void testSubGroupOfAdminGroupNoComColGroupPermission() throws Exception {

// Verify an ePerson in a subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down Expand Up @@ -1526,7 +1526,7 @@ public void testSubSubGroupOfAdminGroupNoComColGroupPermission() throws Exceptio

// Verify an ePerson in a sub-subgroup of the site administrators has this feature
getClient(token).perform(get("/api/authz/authorizations/search/object?embed=feature&uri="
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID()))
+ "http://localhost/api/core/sites/" + siteService.findSite(context).getID() + "&feature=canManageGroups"))
.andExpect(status().isOk())
.andExpect(
jsonPath("$._embedded.authorizations[?(@._embedded.feature.id=='canManageGroups')]")
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,15 +41,12 @@
import org.dspace.content.RelationshipType;
import org.dspace.content.WorkspaceItem;
import org.dspace.content.authority.Choices;
import org.dspace.content.authority.service.ChoiceAuthorityService;
import org.dspace.content.authority.service.MetadataAuthorityService;
import org.dspace.content.service.BitstreamService;
import org.dspace.content.service.ItemService;
import org.dspace.content.service.RelationshipTypeService;
import org.dspace.core.Constants;
import org.dspace.eperson.Group;
import org.dspace.services.ConfigurationService;
import org.dspace.services.factory.DSpaceServicesFactory;
import org.dspace.util.SimpleMapConverter;
import org.hamcrest.Matchers;
import org.junit.Before;
Expand All @@ -68,12 +65,6 @@ public class LinksetRestControllerIT extends AbstractControllerIntegrationTest {
@Autowired
private ConfigurationService configurationService;

@Autowired
private MetadataAuthorityService metadataAuthorityService;

@Autowired
private ChoiceAuthorityService choiceAuthorityService;

@Autowired
private ItemService itemService;

Expand Down Expand Up @@ -736,10 +727,6 @@ public void findTypedLinkForBitstream() throws Exception {
.andExpect(jsonPath("$[?(@.href == '" + uiUrl + "/signposting/linksets/" + item.getID() + "/json" +
"' && @.rel == 'linkset' " +
"&& @.type == 'application/linkset+json')]").exists());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand Down Expand Up @@ -781,10 +768,6 @@ public void findTypedLinkForBitstreamWithType() throws Exception {
"&& @.type == 'application/linkset+json')]").exists())
.andExpect(jsonPath("$[?(@.href == 'https://schema.org/ScholarlyArticle' " +
"&& @.rel == 'type')]").exists());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand Down Expand Up @@ -814,10 +797,6 @@ public void findTypedLinkForRestrictedBitstream() throws Exception {

getClient().perform(get("/signposting/links/" + bitstream.getID()))
.andExpect(status().isUnauthorized());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand Down Expand Up @@ -845,10 +824,6 @@ public void findTypedLinkForBitstreamUnderEmbargo() throws Exception {

getClient().perform(get("/signposting/links/" + bitstream.getID()))
.andExpect(status().isUnauthorized());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand All @@ -875,10 +850,6 @@ public void findTypedLinkForBitstreamOfWorkspaceItem() throws Exception {

getClient().perform(get("/signposting/links/" + bitstream.getID()))
.andExpect(status().isUnauthorized());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand All @@ -891,10 +862,6 @@ public void findTypedLinkForUnDiscoverableItem() throws Exception {

getClient().perform(get("/signposting/links/" + item.getID()))
.andExpect(status().isUnauthorized());

DSpaceServicesFactory.getInstance().getConfigurationService().reloadConfig();
metadataAuthorityService.clearCache();
choiceAuthorityService.clearCache();
}

@Test
Expand Down

0 comments on commit 61078fc

Please sign in to comment.