use of org.orcid.jaxb.model.v3.dev1.record.OtherName in project ORCID-Source by ORCID.
the class OrcidSecurityManager_generalTest method testPersonalDetails_When_AllPrivate_NoSource_ReadPublicToken.
@Test
public void testPersonalDetails_When_AllPrivate_NoSource_ReadPublicToken() {
SecurityContextTestUtils.setUpSecurityContext(ORCID_1, CLIENT_1, ScopePathType.READ_PUBLIC);
Name name = createName(Visibility.PRIVATE);
Biography bio = createBiography(Visibility.PRIVATE);
OtherName o1 = createOtherName(Visibility.PRIVATE, CLIENT_2);
OtherName o2 = createOtherName(Visibility.PRIVATE, CLIENT_2);
OtherName o3 = createOtherName(Visibility.PRIVATE, CLIENT_2);
OtherNames otherNames = new OtherNames();
otherNames.setOtherNames(new ArrayList<OtherName>(Arrays.asList(o1, o2, o3)));
PersonalDetails p = new PersonalDetails();
p.setBiography(bio);
p.setName(name);
p.setOtherNames(otherNames);
orcidSecurityManager.checkAndFilter(ORCID_1, p);
assertNotNull(p);
assertNull(p.getName());
assertNull(p.getBiography());
assertNotNull(p.getOtherNames());
assertNotNull(p.getOtherNames().getOtherNames());
assertTrue(p.getOtherNames().getOtherNames().isEmpty());
}
use of org.orcid.jaxb.model.v3.dev1.record.OtherName in project ORCID-Source by ORCID.
the class OrcidSecurityManager_generalTest method testCollection_When_NotSource_ReadLimitedToken.
@Test
public void testCollection_When_NotSource_ReadLimitedToken() {
SecurityContextTestUtils.setUpSecurityContext(ORCID_1, CLIENT_1, ScopePathType.ORCID_BIO_READ_LIMITED);
List<OtherName> list = new ArrayList<OtherName>();
OtherName o1 = createOtherName(Visibility.PUBLIC, CLIENT_2);
OtherName o2 = createOtherName(Visibility.LIMITED, CLIENT_2);
OtherName o3 = createOtherName(Visibility.PRIVATE, CLIENT_2);
list.add(o1);
list.add(o2);
list.add(o3);
orcidSecurityManager.checkAndFilter(ORCID_1, list, ScopePathType.ORCID_BIO_READ_LIMITED);
assertEquals(2, list.size());
assertTrue(list.contains(o1));
assertTrue(list.contains(o2));
assertFalse(list.contains(o3));
}
use of org.orcid.jaxb.model.v3.dev1.record.OtherName in project ORCID-Source by ORCID.
the class OrcidSecurityManager_generalTest method testCollection_When_NotSource_WrongReadLimitedToken.
@Test
public void testCollection_When_NotSource_WrongReadLimitedToken() {
SecurityContextTestUtils.setUpSecurityContext(ORCID_1, CLIENT_1, ScopePathType.ORCID_WORKS_READ_LIMITED);
List<OtherName> list = new ArrayList<OtherName>();
OtherName o1 = createOtherName(Visibility.PUBLIC, CLIENT_2);
OtherName o2 = createOtherName(Visibility.LIMITED, CLIENT_2);
OtherName o3 = createOtherName(Visibility.PRIVATE, CLIENT_2);
list.add(o1);
list.add(o2);
list.add(o3);
orcidSecurityManager.checkAndFilter(ORCID_1, list, ScopePathType.ORCID_BIO_READ_LIMITED);
assertEquals(1, list.size());
assertTrue(list.contains(o1));
assertFalse(list.contains(o2));
assertFalse(list.contains(o3));
}
use of org.orcid.jaxb.model.v3.dev1.record.OtherName in project ORCID-Source by ORCID.
the class OrcidSecurityManager_generalTest method testCollection_When_NotSource_ReadLimitedToken_NothingPublic.
@Test
public void testCollection_When_NotSource_ReadLimitedToken_NothingPublic() {
SecurityContextTestUtils.setUpSecurityContext(ORCID_1, CLIENT_1, ScopePathType.ORCID_BIO_READ_LIMITED);
List<OtherName> list = new ArrayList<OtherName>();
OtherName o1 = createOtherName(Visibility.PRIVATE, CLIENT_2);
OtherName o2 = createOtherName(Visibility.LIMITED, CLIENT_2);
OtherName o3 = createOtherName(Visibility.PRIVATE, CLIENT_2);
OtherName o4 = createOtherName(Visibility.LIMITED, CLIENT_2);
OtherName o5 = createOtherName(Visibility.PRIVATE, CLIENT_2);
list.add(o1);
list.add(o2);
list.add(o3);
list.add(o4);
list.add(o5);
orcidSecurityManager.checkAndFilter(ORCID_1, list, ScopePathType.ORCID_BIO_READ_LIMITED);
assertEquals(2, list.size());
assertFalse(list.contains(o1));
assertTrue(list.contains(o2));
assertFalse(list.contains(o3));
assertTrue(list.contains(o4));
assertFalse(list.contains(o5));
}
use of org.orcid.jaxb.model.v3.dev1.record.OtherName in project ORCID-Source by ORCID.
the class OrcidSecurityManager_generalTest method testCollection_When_SourceOfPrivate_ReadPublicScope.
@Test
public void testCollection_When_SourceOfPrivate_ReadPublicScope() {
SecurityContextTestUtils.setUpSecurityContext(ORCID_1, CLIENT_1, ScopePathType.READ_PUBLIC);
List<OtherName> list = new ArrayList<OtherName>();
OtherName o1 = createOtherName(Visibility.PUBLIC, CLIENT_2);
OtherName o2 = createOtherName(Visibility.LIMITED, CLIENT_2);
OtherName o3 = createOtherName(Visibility.PRIVATE, CLIENT_1);
list.add(o1);
list.add(o2);
list.add(o3);
orcidSecurityManager.checkAndFilter(ORCID_1, list, ScopePathType.ORCID_BIO_READ_LIMITED);
assertEquals(2, list.size());
assertTrue(list.contains(o1));
assertFalse(list.contains(o2));
assertTrue(list.contains(o3));
}
Aggregations