login="user1"
name="User 1"
email="user1@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<groups id="100"
name="devs"/>
login="user1"
name="User 1"
email="user1@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="1"
user_id="10"
resource_id="1"
login="user2"
name="User 2"
email="user2@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="4"
user_id="11"
resource_id="1"
login="user1"
name="User 1"
email="user1@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="1"
user_id="10"
resource_id="1"
<dataset>
- <users id="1" login="simon" name="Simon Brandhof" email="simon.brandhof@sonarsource.com"/>
- <users id="2" login="godin" name="Evgeny Mandrikov" email="evgeny.mandrikov@sonarsource.com"/>
+ <users id="1"
+ login="simon"
+ name="Simon Brandhof"
+ email="simon.brandhof@sonarsource.com"
+ is_root="[false]"/>
+ <users id="2"
+ login="godin"
+ name="Evgeny Mandrikov"
+ email="evgeny.mandrikov@sonarsource.com"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 " created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[false]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[false]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
- <groups id="1" name="sonar-devs" description="Sonar Devs" created_at="2014-09-08" updated_at="2014-09-08"/>
+ <groups id="1"
+ name="sonar-devs"
+ description="Sonar Devs"
+ created_at="2014-09-08"
+ updated_at="2014-09-08"/>
- <groups_users user_id="101" group_id="1"/>
+ <groups_users user_id="101"
+ group_id="1"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="john" name="John" email="john@email.com" active="[true]" scm_accounts=" jo "
- external_identity_provider="sonarqube" external_identity="john"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="john"
+ name="John"
+ email="john@email.com"
+ active="[true]"
+ scm_accounts=" jo "
+ external_identity_provider="sonarqube"
+ external_identity="john"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="john" name="John" email="john@email.com" active="[true]" scm_accounts=" jo "
- external_identity_provider="sonarqube" external_identity="john"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="john"
+ name="John"
+ email="john@email.com"
+ active="[true]"
+ scm_accounts=" jo "
+ external_identity_provider="sonarqube"
+ external_identity="john"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
- <users id="102" login="technical-account" name="Technical account" email="john@email.com" active="[true]" scm_accounts="[null]"
- external_identity_provider="sonarqube" external_identity="technical-account"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="102"
+ login="technical-account"
+ name="Technical account"
+ email="john@email.com"
+ active="[true]"
+ scm_accounts="[null]"
+ external_identity_provider="sonarqube"
+ external_identity="technical-account"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="john" name="John" email="john@email.com" active="[true]" scm_accounts=" jo "
- external_identity_provider="sonarqube" external_identity="john"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
- <users id="102" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="john"
+ name="John"
+ email="john@email.com"
+ active="[true]"
+ scm_accounts=" jo "
+ external_identity_provider="sonarqube"
+ external_identity="john"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
+ <users id="102"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
- <groups id="1" name="sonar-users" description="Sonar Users" created_at="2014-09-08" updated_at="2014-09-08"/>
+ <groups id="1"
+ name="sonar-users"
+ description="Sonar Users"
+ created_at="2014-09-08"
+ updated_at="2014-09-08"/>
- <groups_users user_id="101" group_id="1"/>
+ <groups_users user_id="101"
+ group_id="1"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[false]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[false]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[false]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="[null]" crypted_password="[null]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[false]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="[null]"
+ crypted_password="[null]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="tech_user" name="Tech user" email="tech@user.fr" active="[true]" scm_accounts="[null]"
- external_identity_provider="sonarqube" external_identity="tech_user"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="tech_user"
+ name="Tech user"
+ email="tech@user.fr"
+ active="[true]"
+ scm_accounts="[null]"
+ external_identity_provider="sonarqube"
+ external_identity="tech_user"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 "
- external_identity_provider="sonarqube" external_identity="marius"
- created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ external_identity_provider="sonarqube"
+ external_identity="marius"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="1" login="user1" name="User1" email="user1@mail.com" active="[true]"
+ <users id="1"
+ login="user1"
+ name="User1"
+ email="user1@mail.com"
+ active="[true]"
scm_accounts=" user_1 u1 "
created_at="1500000000000"
updated_at="1500000000000"
- />
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="1" login="user1" name="User1" email="user1@mail.com" active="[true]"
+ <users id="1"
+ login="user1"
+ name="User1"
+ email="user1@mail.com"
+ active="[true]"
scm_accounts=" user_1 u1 "
created_at="1500000000000"
updated_at="1500000000000"
- />
+ is_root="[false]"/>
<!-- scm accounts with comma -->
- <users id="2" login="user2" name="User2" email="user2@mail.com" active="[true]"
+ <users id="2"
+ login="user2"
+ name="User2"
+ email="user2@mail.com"
+ active="[true]"
scm_accounts=" user,2 user_2 "
created_at="1500000000000"
updated_at="1500000000000"
- />
+ is_root="[false]"/>
<!--no scm account, no email -->
- <users id="3" login="user3" name="User3" email="[null]" active="[false]"
+ <users id="3"
+ login="user3"
+ name="User3"
+ email="[null]"
+ active="[false]"
scm_accounts="[null]"
created_at="1500000000000"
updated_at="1550000000000"
- />
+ is_root="[false]"/>
</dataset>
private Long createdAt;
private Long updatedAt;
private boolean local = true;
+ private boolean root = false;
public Long getId() {
return id;
return this;
}
+ public boolean isRoot() {
+ return root;
+ }
+
+ /**
+ * Setters is not accessible as dedicated requests must be used to update the root flag of a user:
+ * <ul>
+ * <li>a user can not be created root</li>
+ * <li>the generic update method of a user can not change its root flag</li>
+ * </ul>
+ */
+ private void setRoot(boolean root) {
+ this.root = root;
+ }
+
public static String encryptPassword(String password, String salt) {
requireNonNull(password, "Password cannot be empty");
requireNonNull(salt, "Salt cannot be empty");
u.external_identity as "externalIdentity",
u.external_identity_provider as "externalIdentityProvider",
u.user_local as "local",
+ u.is_root as "root",
u.created_at as "createdAt",
u.updated_at as "updatedAt"
</sql>
</delete>
<update id="deactivateUser" parameterType="long">
- UPDATE users SET active=${_false}, email=null, scm_accounts=null,
- external_identity=null, external_identity_provider=null,
- salt=null, crypted_password=null,
- updated_at=#{now,jdbcType=BIGINT} WHERE id=#{id}
+ UPDATE users SET
+ active=${_false},
+ email=null,
+ scm_accounts=null,
+ external_identity=null,
+ external_identity_provider=null,
+ salt=null,
+ crypted_password=null,
+ updated_at=#{now,jdbcType=BIGINT}
+ WHERE
+ id=#{id}
</update>
<insert id="insert" parameterType="User" keyColumn="id" useGeneratedKeys="true" keyProperty="id">
- INSERT INTO users (login, name, email, active, scm_accounts, external_identity, external_identity_provider, user_local, salt, crypted_password, created_at, updated_at)
- VALUES (#{login,jdbcType=VARCHAR}, #{name,jdbcType=VARCHAR}, #{email,jdbcType=VARCHAR}, #{active,jdbcType=BOOLEAN},
- #{scmAccounts,jdbcType=VARCHAR}, #{externalIdentity,jdbcType=VARCHAR}, #{externalIdentityProvider,jdbcType=VARCHAR},
- #{local,jdbcType=BOOLEAN},
- #{salt,jdbcType=VARCHAR}, #{cryptedPassword,jdbcType=VARCHAR},
- #{createdAt,jdbcType=BIGINT}, #{updatedAt,jdbcType=BIGINT})
+ INSERT INTO users (
+ login,
+ name,
+ email,
+ active,
+ scm_accounts,
+ external_identity,
+ external_identity_provider,
+ user_local,
+ salt,
+ crypted_password,
+ is_root,
+ created_at,
+ updated_at
+ )
+ VALUES (
+ #{login,jdbcType=VARCHAR},
+ #{name,jdbcType=VARCHAR},
+ #{email,jdbcType=VARCHAR},
+ #{active,jdbcType=BOOLEAN},
+ #{scmAccounts,jdbcType=VARCHAR},
+ #{externalIdentity,jdbcType=VARCHAR},
+ #{externalIdentityProvider,jdbcType=VARCHAR},
+ #{local,jdbcType=BOOLEAN},
+ #{salt,jdbcType=VARCHAR},
+ #{cryptedPassword,jdbcType=VARCHAR},
+ #{root,jdbcType=BOOLEAN},
+ #{createdAt,jdbcType=BIGINT},
+ #{updatedAt,jdbcType=BIGINT}
+ )
</insert>
<insert id="update" parameterType="User" useGeneratedKeys="false">
- UPDATE users set name=#{name,jdbcType=VARCHAR}, email=#{email,jdbcType=VARCHAR}, active=#{active,jdbcType=BOOLEAN},
- scm_accounts=#{scmAccounts,jdbcType=VARCHAR}, external_identity=#{externalIdentity,jdbcType=VARCHAR}, external_identity_provider=#{externalIdentityProvider,jdbcType=VARCHAR},
- user_local=#{local,jdbcType=BOOLEAN},
- salt=#{salt,jdbcType=VARCHAR}, crypted_password=#{cryptedPassword,jdbcType=BIGINT},
- updated_at=#{updatedAt,jdbcType=BIGINT}
- WHERE login = #{login}
+ UPDATE users set
+ name=#{name,jdbcType=VARCHAR},
+ email=#{email,jdbcType=VARCHAR},
+ active=#{active,jdbcType=BOOLEAN},
+ scm_accounts=#{scmAccounts,jdbcType=VARCHAR},
+ external_identity=#{externalIdentity,jdbcType=VARCHAR},
+ external_identity_provider=#{externalIdentityProvider,jdbcType=VARCHAR},
+ user_local=#{local,jdbcType=BOOLEAN},
+ salt=#{salt,jdbcType=VARCHAR},
+ crypted_password=#{cryptedPassword,jdbcType=BIGINT},
+ updated_at=#{updatedAt,jdbcType=BIGINT}
+ WHERE
+ login = #{login}
</insert>
</mapper>
*/
package org.sonar.db.charset;
-import com.google.common.collect.ImmutableMap;
import java.sql.Connection;
import java.util.List;
import java.util.Map;
private static final String LOGIN_DB_COLUMN = "login";
private static final String NAME_DB_COLUMN = "name";
private static final String USERS_DB_TABLE = "users";
+ private static final String IS_ROOT_DB_COLUMN = "is_root";
SqlExecutor underTest = new SqlExecutor();
@Test
public void executeSelect_executes_PreparedStatement() throws Exception {
- dbTester.executeInsert(USERS_DB_TABLE, ImmutableMap.of(LOGIN_DB_COLUMN, "login1", NAME_DB_COLUMN, "name one"));
- dbTester.executeInsert(USERS_DB_TABLE, ImmutableMap.of(LOGIN_DB_COLUMN, "login2", NAME_DB_COLUMN, "name two"));
+ dbTester.executeInsert(USERS_DB_TABLE, LOGIN_DB_COLUMN, "login1", NAME_DB_COLUMN, "name one", IS_ROOT_DB_COLUMN, false);
+ dbTester.executeInsert(USERS_DB_TABLE, LOGIN_DB_COLUMN, "login2", NAME_DB_COLUMN, "name two", IS_ROOT_DB_COLUMN, false);
try (Connection connection = dbTester.openConnection()) {
List<String[]> users = underTest.select(connection, "select " + LOGIN_DB_COLUMN + ", " + NAME_DB_COLUMN + " from users order by id", new SqlExecutor.StringsConverter(
@Test
public void executeUpdate_executes_PreparedStatement() throws Exception {
- dbTester.executeInsert(USERS_DB_TABLE, ImmutableMap.of(LOGIN_DB_COLUMN, "the_login", NAME_DB_COLUMN, "the name"));
+ dbTester.executeInsert(USERS_DB_TABLE, LOGIN_DB_COLUMN, "the_login", NAME_DB_COLUMN, "the name", IS_ROOT_DB_COLUMN, false);
try (Connection connection = dbTester.openConnection()) {
underTest.executeDdl(connection, "update users set " + NAME_DB_COLUMN + "='new name' where " + LOGIN_DB_COLUMN + "='the_login'");
import static org.sonar.db.user.UserTesting.newUserDto;
public class UserDaoTest {
+ private static final long NOW = 1500000000000L;
+
+ private System2 system2 = mock(System2.class);
@Rule
public ExpectedException thrown = ExpectedException.none();
-
- System2 system2 = mock(System2.class);
-
@Rule
public DbTester db = DbTester.create(system2);
- static final long NOW = 1500000000000L;
-
- DbClient dbClient = db.getDbClient();
-
- UserDao underTest = db.getDbClient().userDao();
- final DbSession session = db.getSession();
+ private DbClient dbClient = db.getDbClient();
+ private DbSession session = db.getSession();
+ private UserDao underTest = db.getDbClient().userDao();
@Before
public void setUp() throws Exception {
assertThat(user.getExternalIdentity()).isEqualTo("johngithub");
assertThat(user.getExternalIdentityProvider()).isEqualTo("github");
assertThat(user.isLocal()).isTrue();
+ assertThat(user.isRoot()).isFalse();
assertThat(user.getCreatedAt()).isEqualTo(date);
assertThat(user.getUpdatedAt()).isEqualTo(date);
}
assertThat(user.getExternalIdentity()).isEqualTo("johngithub");
assertThat(user.getExternalIdentityProvider()).isEqualTo("github");
assertThat(user.isLocal()).isFalse();
+ assertThat(user.isRoot()).isFalse();
assertThat(user.getCreatedAt()).isEqualTo(1418215735482L);
assertThat(user.getUpdatedAt()).isEqualTo(1500000000000L);
}
assertThat(userReloaded.getCryptedPassword()).isNull();
assertThat(userReloaded.getExternalIdentity()).isNull();
assertThat(userReloaded.getExternalIdentityProvider()).isNull();
+ assertThat(userReloaded.isRoot()).isFalse();
assertThat(userReloaded.getUpdatedAt()).isEqualTo(NOW);
assertThat(underTest.selectUserById(session, otherUser.getId())).isNotNull();
assertThat(dto.getScmAccountsAsList()).containsOnly("ma", "marius33");
assertThat(dto.getSalt()).isEqualTo("79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365");
assertThat(dto.getCryptedPassword()).isEqualTo("650d2261c98361e2f67f90ce5c65a95e7d8ea2fg");
+ assertThat(dto.isRoot()).isFalse();
assertThat(dto.getCreatedAt()).isEqualTo(1418215735482L);
assertThat(dto.getUpdatedAt()).isEqualTo(1418215735485L);
+
+ dto = underTest.selectOrFailByLogin(session, "sbrandhof");
+ assertThat(dto.isRoot()).isTrue();
}
@Test
<dataset>
- <projects id="123" kee="com.foo:bar"/>
+ <projects id="123"
+ kee="com.foo:bar"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!--
new rows : sonar-administrators (admin), sonar-users (user & codeviewer), Anyone (user & codeviewer),
-->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="4" group_id="101" resource_id="123" role="user"/>
- <group_roles id="5" group_id="[null]" resource_id="123" role="user"/>
- <group_roles id="6" group_id="101" resource_id="123" role="codeviewer"/>
- <group_roles id="7" group_id="[null]" resource_id="123" role="codeviewer"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="4"
+ group_id="101"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="5"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="6"
+ group_id="101"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="7"
+ group_id="[null]"
+ resource_id="123"
+ role="codeviewer"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_template_20130101_010203"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_template_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
<perm_templates_users/>
<dataset>
- <projects id="123" kee="com.foo:bar"/>
-
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <projects id="123"
+ kee="com.foo:bar"/>
+
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_template_20130101_010203"/>
-
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_template_20130101_010203"/>
+
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
<perm_templates_users/>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <groups id="102" name="sonar-foos"/>
- <groups id="103" name="sonar-bars"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <groups id="102"
+ name="sonar-foos"/>
+ <groups id="103"
+ name="sonar-bars"/>
- <users id="200" login="foo" name="Foo" email="[null]" active="[true]"/>
- <users id="201" login="bar" name="Bar" email="[null]" active="[true]"/>
+ <users id="200"
+ login="foo"
+ name="Foo"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="bar"
+ name="Bar"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!--
new rows
-->
- <group_roles id="3" group_id="102" resource_id="123" role="user"/>
+ <group_roles id="3"
+ group_id="102"
+ resource_id="123"
+ role="user"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default" key_pattern="[null]"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default"
+ key_pattern="[null]"/>
- <permission_templates id="2" name="Start with foo" kee="foo_tmpl" key_pattern="foo\..*"/>
- <permission_templates id="3" name="Start with bar" kee="bar_tmpl" key_pattern="bar\..*"/>
+ <permission_templates id="2"
+ name="Start with foo"
+ kee="foo_tmpl"
+ key_pattern="foo\..*"/>
+ <permission_templates id="3"
+ name="Start with bar"
+ kee="bar_tmpl"
+ key_pattern="bar\..*"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="2" group_id="102" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="3" group_id="103" permission_reference="user"/>
+ <perm_templates_groups id="2"
+ template_id="2"
+ group_id="102"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="3"
+ group_id="103"
+ permission_reference="user"/>
<perm_templates_users/>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <groups id="102" name="sonar-foos"/>
- <groups id="103" name="sonar-bars"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <groups id="102"
+ name="sonar-foos"/>
+ <groups id="103"
+ name="sonar-bars"/>
- <users id="200" login="foo" name="Foo" email="[null]" active="[true]"/>
- <users id="201" login="bar" name="Bar" email="[null]" active="[true]"/>
+ <users id="200"
+ login="foo"
+ name="Foo"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="bar"
+ name="Bar"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default" key_pattern="[null]"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default"
+ key_pattern="[null]"/>
- <permission_templates id="2" name="Start with foo" kee="foo_tmpl" key_pattern="foo\..*"/>
- <permission_templates id="3" name="Start with bar" kee="bar_tmpl" key_pattern="bar\..*"/>
+ <permission_templates id="2"
+ name="Start with foo"
+ kee="foo_tmpl"
+ key_pattern="foo\..*"/>
+ <permission_templates id="3"
+ name="Start with bar"
+ kee="bar_tmpl"
+ key_pattern="bar\..*"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="2" group_id="102" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="3" group_id="103" permission_reference="user"/>
+ <perm_templates_groups id="2"
+ template_id="2"
+ group_id="102"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="3"
+ group_id="103"
+ permission_reference="user"/>
<perm_templates_users/>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- created permissions should be based on the TRK template -->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="4" group_id="101" resource_id="123" role="admin"/>
- <group_roles id="5" group_id="100" resource_id="123" role="user"/>
- <group_roles id="6" group_id="100" resource_id="123" role="codeviewer"/>
- <group_roles id="7" group_id="[null]" resource_id="123" role="codeviewer"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="4"
+ group_id="101"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="5"
+ group_id="100"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="6"
+ group_id="100"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="7"
+ group_id="[null]"
+ resource_id="123"
+ role="codeviewer"/>
- <user_roles id="2" user_id="200" resource_id="123" role="codeviewer"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="codeviewer"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default"/>
+ <permission_templates id="1"
+ name="default"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
<!-- default permission template for TRK -->
- <permission_templates id="2" name="default_for_TRK"/>
+ <permission_templates id="2"
+ name="default_for_TRK"/>
- <perm_templates_groups id="6" template_id="2" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="7" template_id="2" group_id="101" permission_reference="admin"/>
- <perm_templates_groups id="8" template_id="2" group_id="100" permission_reference="user"/>
- <perm_templates_groups id="9" template_id="2" group_id="100" permission_reference="codeviewer"/>
- <perm_templates_groups id="10" template_id="2" group_id="[null]" permission_reference="codeviewer"/>
+ <perm_templates_groups id="6"
+ template_id="2"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="7"
+ template_id="2"
+ group_id="101"
+ permission_reference="admin"/>
+ <perm_templates_groups id="8"
+ template_id="2"
+ group_id="100"
+ permission_reference="user"/>
+ <perm_templates_groups id="9"
+ template_id="2"
+ group_id="100"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="10"
+ template_id="2"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
- <perm_templates_users id="1" template_id="2" user_id="200" permission_reference="codeviewer"/>
+ <perm_templates_users id="1"
+ template_id="2"
+ user_id="200"
+ permission_reference="codeviewer"/>
</dataset>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_20130101_010203"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
<!-- default permission template for TRK -->
- <permission_templates id="2" name="default_for_TRK" kee="default_for_trk_20130101_010203"/>
+ <permission_templates id="2"
+ name="default_for_TRK"
+ kee="default_for_trk_20130101_010203"/>
- <perm_templates_groups id="6" template_id="2" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="7" template_id="2" group_id="101" permission_reference="admin"/>
- <perm_templates_groups id="8" template_id="2" group_id="100" permission_reference="user"/>
- <perm_templates_groups id="9" template_id="2" group_id="100" permission_reference="codeviewer"/>
- <perm_templates_groups id="10" template_id="2" group_id="[null]" permission_reference="codeviewer"/>
+ <perm_templates_groups id="6"
+ template_id="2"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="7"
+ template_id="2"
+ group_id="101"
+ permission_reference="admin"/>
+ <perm_templates_groups id="8"
+ template_id="2"
+ group_id="100"
+ permission_reference="user"/>
+ <perm_templates_groups id="9"
+ template_id="2"
+ group_id="100"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="10"
+ template_id="2"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
- <perm_templates_users id="1" template_id="2" user_id="200" permission_reference="codeviewer"/>
+ <perm_templates_users id="1"
+ template_id="2"
+ user_id="200"
+ permission_reference="codeviewer"/>
</dataset>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <groups id="102" name="sonar-foos"/>
- <groups id="103" name="sonar-bars"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <groups id="102"
+ name="sonar-foos"/>
+ <groups id="103"
+ name="sonar-bars"/>
- <users id="200" login="foo" name="Foo" email="[null]" active="[true]"/>
- <users id="201" login="bar" name="Bar" email="[null]" active="[true]"/>
+ <users id="200"
+ login="foo"
+ name="Foo"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="bar"
+ name="Bar"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default" key_pattern="[null]"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default"
+ key_pattern="[null]"/>
- <permission_templates id="2" name="Start with foo" kee="foo_tmpl" key_pattern="foo\..*"/>
- <permission_templates id="3" name="Start with foo again" kee="foo2_tmpl" key_pattern="foo.*"/>
+ <permission_templates id="2"
+ name="Start with foo"
+ kee="foo_tmpl"
+ key_pattern="foo\..*"/>
+ <permission_templates id="3"
+ name="Start with foo again"
+ kee="foo2_tmpl"
+ key_pattern="foo.*"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="2" group_id="102" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="3" group_id="103" permission_reference="user"/>
+ <perm_templates_groups id="2"
+ template_id="2"
+ group_id="102"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="3"
+ group_id="103"
+ permission_reference="user"/>
<perm_templates_users/>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- new rows : sonar-administrators (admin) -->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
<!-- default permission template -->
- <permission_templates id="1" name="default_template" kee="default_template_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
+ <permission_templates id="1"
+ name="default_template"
+ kee="default_template_20130101_010203"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
</dataset>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for TRK -->
- <permission_templates id="1" name="default_template" kee="default_template_20130101_010203"/>
+ <permission_templates id="1"
+ name="default_template"
+ kee="default_template_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="999" permission_reference="admin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="999"
+ permission_reference="admin"/>
</dataset>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
- <users id="201" login="disabled" name="Disabled" email="[null]" active="[false]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="disabled"
+ name="Disabled"
+ email="[null]"
+ active="[false]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- new row : marius (admin) -->
- <user_roles id="2" user_id="200" resource_id="123" role="admin"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="admin"/>
<!-- default permission template for TRK -->
- <permission_templates id="1" name="default_for_TRK" kee="default_for_trk_20130101_010203"/>
+ <permission_templates id="1"
+ name="default_for_TRK"
+ kee="default_for_trk_20130101_010203"/>
- <perm_templates_users id="1" template_id="1" user_id="200" permission_reference="admin"/>
- <perm_templates_users id="2" template_id="1" user_id="201" permission_reference="admin"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="200"
+ permission_reference="admin"/>
+ <perm_templates_users id="2"
+ template_id="1"
+ user_id="201"
+ permission_reference="admin"/>
</dataset>
<dataset>
- <projects id="123" kee="foo.project"/>
+ <projects id="123"
+ kee="foo.project"/>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
- <users id="201" login="disabled" name="Disabled" email="[null]" active="[false]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="disabled"
+ name="Disabled"
+ email="[null]"
+ active="[false]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- default permission template for TRK -->
- <permission_templates id="1" name="default_for_TRK" kee="default_for_trk_20130101_010203"/>
+ <permission_templates id="1"
+ name="default_for_TRK"
+ kee="default_for_trk_20130101_010203"/>
- <perm_templates_users id="1" template_id="1" user_id="200" permission_reference="admin"/>
- <perm_templates_users id="2" template_id="1" user_id="201" permission_reference="admin"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="200"
+ permission_reference="admin"/>
+ <perm_templates_users id="2"
+ template_id="1"
+ user_id="201"
+ permission_reference="admin"/>
</dataset>
<dataset>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
- <user_roles user_id="200" resource_id="123" role="admin"/>
+ <user_roles user_id="200"
+ resource_id="123"
+ role="admin"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- only_users -->
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- only_groups -->
- <group_roles id="1" group_id="100" resource_id="2" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="2"
+ role="admin"/>
<!-- groups_and_users -->
- <group_roles id="2" group_id="101" resource_id="3" role="user"/>
- <user_roles id="2" user_id="200" resource_id="3" role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="3"
+ role="user"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="3"
+ role="admin"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <users id="42" login="obiwan" name="Obiwan" email="obiwan@keno.bi"
- created_at="1418215735482" updated_at="1418215735482" active="[true]"/>
+ <users id="42"
+ login="obiwan"
+ name="Obiwan"
+ email="obiwan@keno.bi"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
<dashboards
- id="1"
- user_id="1"
- name="My Dashboard"
- description="Dashboard shared by admin"
- column_layout="100%"
- shared="[true]"
- />
+ id="1"
+ user_id="1"
+ name="My Dashboard"
+ description="Dashboard shared by admin"
+ column_layout="100%"
+ shared="[true]"
+ />
<dashboards
- id="2"
- user_id="[null]"
- name="Default Dashboard"
- description="Dashboard provided by system"
- column_layout="100%"
- shared="[true]"
- />
+ id="2"
+ user_id="[null]"
+ name="Default Dashboard"
+ description="Dashboard provided by system"
+ column_layout="100%"
+ shared="[true]"
+ />
<dashboards
- id="4"
- user_id="[null]"
- name="User Dashboard"
- description="Won't appear, not anonymous"
- column_layout="100%"
- shared="[true]"
- />
+ id="4"
+ user_id="[null]"
+ name="User Dashboard"
+ description="Won't appear, not anonymous"
+ column_layout="100%"
+ shared="[true]"
+ />
<!-- Dashboard with ID 1 appears after ID 2 -->
<active_dashboards
- id="1"
- dashboard_id="1"
- user_id="[null]"
- order_index="2"/>
+ id="1"
+ dashboard_id="1"
+ user_id="[null]"
+ order_index="2"/>
<!-- Dashboard with ID 2 appears before ID 1 -->
<active_dashboards
- id="2"
- dashboard_id="2"
- user_id="[null]"
- order_index="1"/>
+ id="2"
+ dashboard_id="2"
+ user_id="[null]"
+ order_index="1"/>
<!-- Dashboard with ID 4 does not appear (not anonymous) -->
<active_dashboards
- id="4"
- dashboard_id="4"
- user_id="42"
- order_index="1"/>
+ id="4"
+ dashboard_id="4"
+ user_id="42"
+ order_index="1"/>
</dataset>
<dataset>
- <users id="24" login="anakin" name="Anakin" email="anakin@skywalk.er"
- created_at="1418215735482" updated_at="1418215735482" active="[true]"/>
- <users id="42" login="obiwan" name="Obiwan" email="obiwan@keno.bi"
- created_at="1418215735482" updated_at="1418215735482" active="[true]"/>
+ <users id="24"
+ login="anakin"
+ name="Anakin"
+ email="anakin@skywalk.er"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="42"
+ login="obiwan"
+ name="Obiwan"
+ email="obiwan@keno.bi"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
<dashboards
- id="1"
- user_id="1"
- name="My Dashboard"
- description="Dashboard shared by admin"
- column_layout="100%"
- shared="[true]"
- />
+ id="1"
+ user_id="1"
+ name="My Dashboard"
+ description="Dashboard shared by admin"
+ column_layout="100%"
+ shared="[true]"
+ />
<dashboards
- id="2"
- user_id="[null]"
- name="Default Dashboard"
- description="Dashboard provided by system"
- column_layout="100%"
- shared="[true]"
- />
+ id="2"
+ user_id="[null]"
+ name="Default Dashboard"
+ description="Dashboard provided by system"
+ column_layout="100%"
+ shared="[true]"
+ />
<dashboards
- id="4"
- user_id="[null]"
- name="Anonymous Dashboard"
- description="Won't appear, anonymous"
- column_layout="100%"
- shared="[true]"
- />
+ id="4"
+ user_id="[null]"
+ name="Anonymous Dashboard"
+ description="Won't appear, anonymous"
+ column_layout="100%"
+ shared="[true]"
+ />
<dashboards
- id="5"
- user_id="[null]"
- name="Another User Dashboard"
- description="Won't appear, different user"
- column_layout="100%"
- shared="[true]"
- />
+ id="5"
+ user_id="[null]"
+ name="Another User Dashboard"
+ description="Won't appear, different user"
+ column_layout="100%"
+ shared="[true]"
+ />
<!-- Dashboard with ID 1 appears after ID 2 -->
<active_dashboards
- id="1"
- dashboard_id="1"
- user_id="42"
- order_index="2"/>
+ id="1"
+ dashboard_id="1"
+ user_id="42"
+ order_index="2"/>
<!-- Dashboard with ID 2 appears before ID 1 -->
<active_dashboards
- id="2"
- dashboard_id="2"
- user_id="42"
- order_index="1"/>
+ id="2"
+ dashboard_id="2"
+ user_id="42"
+ order_index="1"/>
<!-- Dashboard with ID 4 does not appear (anonymous) -->
<active_dashboards
- id="4"
- dashboard_id="4"
- user_id="[null]"
- order_index="1"/>
+ id="4"
+ dashboard_id="4"
+ user_id="[null]"
+ order_index="1"/>
<!-- Dashboard with ID 5 does not appear (another user) -->
<active_dashboards
- id="5"
- dashboard_id="5"
- user_id="24"
- order_index="1"/>
+ id="5"
+ dashboard_id="5"
+ user_id="24"
+ order_index="1"/>
</dataset>
<dataset>
- <users id="10" login="anyone_user"/>
+ <users id="10"
+ login="anyone_user"
+ is_root="[false]"/>
- <user_roles id="1" user_id="10" resource_id="[null]" role="user"/>
+ <user_roles id="1"
+ user_id="10"
+ resource_id="[null]"
+ role="user"/>
- <groups_users user_id="10" group_id="[null]"/>
+ <groups_users user_id="10"
+ group_id="[null]"/>
- <group_roles id="1" group_id="[null]" resource_id="[null]" role="profileadmin"/>
+ <group_roles id="1"
+ group_id="[null]"
+ resource_id="[null]"
+ role="profileadmin"/>
</dataset>
<dataset>
<!-- user 10 has no direct grant access, but is in the 'user' group 200 and in the 'admin' group 201 -->
- <users id="10" login="john"/>
+ <users id="10"
+ login="john"
+ is_root="[false]"/>
<!-- user 11 has no direct grant access, but is in the 'user' group 200 -->
- <users id="11" login="arthur"/>
+ <users id="11"
+ login="arthur"
+ is_root="[false]"/>
- <user_roles id="1" user_id="999" resource_id="[null]" role="user"/>
- <user_roles id="2" user_id="999" resource_id="[null]" role="user"/>
+ <user_roles id="1"
+ user_id="999"
+ resource_id="[null]"
+ role="user"/>
+ <user_roles id="2"
+ user_id="999"
+ resource_id="[null]"
+ role="user"/>
- <groups_users user_id="10" group_id="200"/>
- <groups_users user_id="10" group_id="201"/>
- <groups_users user_id="11" group_id="200"/>
+ <groups_users user_id="10"
+ group_id="200"/>
+ <groups_users user_id="10"
+ group_id="201"/>
+ <groups_users user_id="11"
+ group_id="200"/>
- <group_roles id="1" group_id="200" resource_id="[null]" role="user"/>
- <group_roles id="2" group_id="201" resource_id="[null]" role="admin"/>
+ <group_roles id="1"
+ group_id="200"
+ resource_id="[null]"
+ role="user"/>
+ <group_roles id="2"
+ group_id="201"
+ resource_id="[null]"
+ role="admin"/>
</dataset>
<dataset>
<!-- user 10 has no group, but has direct role 'user' and 'admin' -->
- <users id="10" login="john"/>
+ <users id="10"
+ login="john"
+ is_root="[false]"/>
<!-- user 11 has no group, but has direct role 'user' -->
- <users id="11" login="arthur"/>
+ <users id="11"
+ login="arthur"
+ is_root="[false]"/>
- <user_roles id="1" user_id="10" resource_id="[null]" role="user"/>
- <user_roles id="2" user_id="10" resource_id="[null]" role="admin"/>
- <user_roles id="3" user_id="11" resource_id="[null]" role="user"/>
+ <user_roles id="1"
+ user_id="10"
+ resource_id="[null]"
+ role="user"/>
+ <user_roles id="2"
+ user_id="10"
+ resource_id="[null]"
+ role="admin"/>
+ <user_roles id="3"
+ user_id="11"
+ resource_id="[null]"
+ role="user"/>
- <groups_users user_id="999" group_id="200"/>
- <groups_users user_id="999" group_id="201"/>
+ <groups_users user_id="999"
+ group_id="200"/>
+ <groups_users user_id="999"
+ group_id="201"/>
- <group_roles id="200" group_id="200" resource_id="[null]" role="user"/>
- <group_roles id="201" group_id="200" resource_id="[null]" role="admin"/>
+ <group_roles id="200"
+ group_id="200"
+ resource_id="[null]"
+ role="user"/>
+ <group_roles id="201"
+ group_id="200"
+ resource_id="[null]"
+ role="admin"/>
</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
- <users id="201" login="janette" name="Janette" email="[null]" active="[true]"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="janette"
+ name="Janette"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- new groups permissions : sonar-administrators (admin), sonar-users (user & codeviewer), Anyone (user & codeviewer) -->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="4" group_id="101" resource_id="123" role="user"/>
- <group_roles id="5" group_id="[null]" resource_id="123" role="user"/>
- <group_roles id="6" group_id="101" resource_id="123" role="codeviewer"/>
- <group_roles id="7" group_id="[null]" resource_id="123" role="codeviewer"/>
- <group_roles id="8" group_id="100" resource_id="123" role="issueadmin"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="4"
+ group_id="101"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="5"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="6"
+ group_id="101"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="7"
+ group_id="[null]"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="8"
+ group_id="100"
+ resource_id="123"
+ role="issueadmin"/>
<!-- new user permission : marius (admin) & janette (user) -->
- <user_roles id="2" user_id="200" resource_id="123" role="admin"/>
- <user_roles id="3" user_id="201" resource_id="123" role="admin"/>
- <user_roles id="4" user_id="201" resource_id="123" role="user"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="admin"/>
+ <user_roles id="3"
+ user_id="201"
+ resource_id="123"
+ role="admin"/>
+ <user_roles id="4"
+ user_id="201"
+ resource_id="123"
+ role="user"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_20130101_010203"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
- <perm_templates_groups id="6" template_id="1" group_id="100" permission_reference="issueadmin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="6"
+ template_id="1"
+ group_id="100"
+ permission_reference="issueadmin"/>
- <perm_templates_users id="1" template_id="1" user_id="200" permission_reference="admin"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="200"
+ permission_reference="admin"/>
</dataset>
login="marius"
name="Marius"
email="[null]"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<users id="201"
login="janette"
name="Janette"
email="[null]"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
<group_roles id="1"
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
- <users id="201" login="janette" name="Janette" email="[null]" active="[true]"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="janette"
+ name="Janette"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- new groups permissions : sonar-administrators (admin), sonar-users (user & codeviewer), Anyone (user & codeviewer) -->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="4" group_id="101" resource_id="123" role="user"/>
- <group_roles id="5" group_id="[null]" resource_id="123" role="user"/>
- <group_roles id="6" group_id="101" resource_id="123" role="codeviewer"/>
- <group_roles id="7" group_id="[null]" resource_id="123" role="codeviewer"/>
- <group_roles id="8" group_id="100" resource_id="123" role="issueadmin"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="4"
+ group_id="101"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="5"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="6"
+ group_id="101"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="7"
+ group_id="[null]"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="8"
+ group_id="100"
+ resource_id="123"
+ role="issueadmin"/>
<!-- new user permission : marius (admin) & janette (user) -->
- <user_roles id="2" user_id="200" resource_id="123" role="admin"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_20130101_010203"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
- <perm_templates_groups id="6" template_id="1" group_id="100" permission_reference="issueadmin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="6"
+ template_id="1"
+ group_id="100"
+ permission_reference="issueadmin"/>
- <perm_templates_users id="1" template_id="1" user_id="200" permission_reference="admin"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="200"
+ permission_reference="admin"/>
</dataset>
login="marius"
name="Marius"
email="[null]"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
<group_roles id="1"
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <user_roles id="1" user_id="200" resource_id="123" role="user"/>
- <user_roles id="2" user_id="200" resource_id="123" role="admin"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="user"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="admin"/>
- <projects id="100" root_id="[null]" scope="PRJ" qualifier="TRK" kee="org.struts:struts" name="Struts"
- description="the description" long_name="Apache Struts"
- enabled="[true]" language="java" copy_component_uuid="[null]" developer_uuid="[null]" path="[null]"
+ <projects id="100"
+ root_id="[null]"
+ scope="PRJ"
+ qualifier="TRK"
+ kee="org.struts:struts"
+ name="Struts"
+ description="the description"
+ long_name="Apache Struts"
+ enabled="[true]"
+ language="java"
+ copy_component_uuid="[null]"
+ developer_uuid="[null]"
+ path="[null]"
authorization_updated_at="123456789"/>
</dataset>
login="dave.loper"
name="Dave Loper"
email="dave.loper@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="1"
user_id="200"
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
- <group_roles id="1" group_id="100" resource_id="1" role="admin"/>
- <group_roles id="2" group_id="101" resource_id="1" role="user"/>
- <user_roles id="1" user_id="200" resource_id="1" role="admin"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="1"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="101"
+ resource_id="1"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="1"
+ role="admin"/>
<!-- new groups permissions : sonar-administrators (admin), sonar-users (user & codeviewer), Anyone (user & codeviewer) -->
- <group_roles id="3" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="4" group_id="101" resource_id="123" role="user"/>
- <group_roles id="5" group_id="[null]" resource_id="123" role="user"/>
- <group_roles id="6" group_id="101" resource_id="123" role="codeviewer"/>
- <group_roles id="7" group_id="[null]" resource_id="123" role="codeviewer"/>
- <group_roles id="8" group_id="100" resource_id="123" role="issueadmin"/>
+ <group_roles id="3"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="4"
+ group_id="101"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="5"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <group_roles id="6"
+ group_id="101"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="7"
+ group_id="[null]"
+ resource_id="123"
+ role="codeviewer"/>
+ <group_roles id="8"
+ group_id="100"
+ resource_id="123"
+ role="issueadmin"/>
<!-- new user permission : marius (admin) -->
- <user_roles id="2" user_id="200" resource_id="123" role="admin"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="123"
+ role="admin"/>
<!-- default permission template for all qualifiers -->
- <permission_templates id="1" name="default" kee="default_20130101_010203"/>
+ <permission_templates id="1"
+ name="default"
+ kee="default_20130101_010203"/>
- <perm_templates_groups id="1" template_id="1" group_id="100" permission_reference="admin"/>
- <perm_templates_groups id="2" template_id="1" group_id="101" permission_reference="user"/>
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="user"/>
- <perm_templates_groups id="4" template_id="1" group_id="101" permission_reference="codeviewer"/>
- <perm_templates_groups id="5" template_id="1" group_id="[null]" permission_reference="codeviewer"/>
- <perm_templates_groups id="6" template_id="1" group_id="100" permission_reference="issueadmin"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="100"
+ permission_reference="admin"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="101"
+ permission_reference="user"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="user"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="101"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="5"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="codeviewer"/>
+ <perm_templates_groups id="6"
+ template_id="1"
+ group_id="100"
+ permission_reference="issueadmin"/>
- <perm_templates_users id="1" template_id="1" user_id="200" permission_reference="admin"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="200"
+ permission_reference="admin"/>
</dataset>
login="marius"
name="Marius"
email="[null]"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<!-- on other resources -->
<group_roles id="1"
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
- <user_roles id="1" user_id="200" resource_id="123" role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="user"/>
- <group_roles id="1" group_id="100" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
login="dave.loper"
name="Dave Loper"
email="dave.loper@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="1"
user_id="200"
login="dave.loper"
name="Dave Loper"
email="dave.loper@company.net"
- active="[true]"/>
+ active="[true]"
+ is_root="[false]"/>
<user_roles id="1"
user_id="200"
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
<user_roles/>
<group_roles/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
- <user_roles id="1" user_id="200" resource_id="123" role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="user"/>
- <group_roles id="1" group_id="100" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <permission_templates id="1" name="my template" kee="my_template_20130102_030405" description="my description"
- created_at="[null]" updated_at="[null]"/>
+ <permission_templates id="1"
+ name="my template"
+ kee="my_template_20130102_030405"
+ description="my description"
+ created_at="[null]"
+ updated_at="[null]"/>
- <users id="1" login="user1" name="user1"/>
- <users id="2" login="user2" name="user2"/>
+ <users id="1"
+ login="user1"
+ name="user1"
+ is_root="[false]"/>
+ <users id="2"
+ login="user2"
+ name="user2"
+ is_root="[false]"/>
- <groups id="1" name="group1"/>
- <groups id="2" name="group2"/>
+ <groups id="1"
+ name="group1"/>
+ <groups id="2"
+ name="group2"/>
</dataset>
<dataset>
- <permission_templates id="1" name="my template" kee="my_template_20130102_030405" description="my description"
- created_at="[null]" updated_at="[null]"/>
+ <permission_templates id="1"
+ name="my template"
+ kee="my_template_20130102_030405"
+ description="my description"
+ created_at="[null]"
+ updated_at="[null]"/>
- <perm_templates_users id="1" template_id="1" user_id="1" permission_reference="user_permission1"/>
- <perm_templates_users id="2" template_id="1" user_id="2" permission_reference="user_permission1"/>
- <perm_templates_users id="3" template_id="1" user_id="2" permission_reference="user_permission2"/>
+ <perm_templates_users id="1"
+ template_id="1"
+ user_id="1"
+ permission_reference="user_permission1"/>
+ <perm_templates_users id="2"
+ template_id="1"
+ user_id="2"
+ permission_reference="user_permission1"/>
+ <perm_templates_users id="3"
+ template_id="1"
+ user_id="2"
+ permission_reference="user_permission2"/>
- <users id="1" login="login1" name="user1"/>
- <users id="2" login="login2" name="user2"/>
+ <users id="1"
+ login="login1"
+ name="user1"
+ is_root="[false]"/>
+ <users id="2"
+ login="login2"
+ name="user2"
+ is_root="[false]"/>
- <perm_templates_groups id="1" template_id="1" group_id="1" permission_reference="group_permission1"/>
- <perm_templates_groups id="2" template_id="1" group_id="2" permission_reference="group_permission1"/>
+ <perm_templates_groups id="1"
+ template_id="1"
+ group_id="1"
+ permission_reference="group_permission1"/>
+ <perm_templates_groups id="2"
+ template_id="1"
+ group_id="2"
+ permission_reference="group_permission1"/>
<!-- Anyone group -->
- <perm_templates_groups id="3" template_id="1" group_id="[null]" permission_reference="group_permission2"/>
+ <perm_templates_groups id="3"
+ template_id="1"
+ group_id="[null]"
+ permission_reference="group_permission2"/>
<!-- Unmatched group -->
- <perm_templates_groups id="4" template_id="1" group_id="999999" permission_reference="group_permission2"/>
+ <perm_templates_groups id="4"
+ template_id="1"
+ group_id="999999"
+ permission_reference="group_permission2"/>
- <groups id="1" name="group1"/>
- <groups id="2" name="group2"/>
+ <groups id="1"
+ name="group1"/>
+ <groups id="2"
+ name="group2"/>
</dataset>
<dataset>
- <users id="200" login="user1" name="User1" active="[true]"/>
- <users id="201" login="user2" name="User2" active="[true]"/>
- <users id="202" login="user3" name="User3" active="[true]"/>
- <users id="999" login="disabledUser" name="disabledUser" active="[false]"/>
+ <users id="200"
+ login="user1"
+ name="User1"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="user2"
+ name="User2"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="202"
+ login="user3"
+ name="User3"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="999"
+ login="disabledUser"
+ name="disabledUser"
+ active="[false]"
+ is_root="[false]"/>
- <perm_templates_users id="1" user_id="200" permission_reference="user" template_id="50"/>
- <perm_templates_users id="2" user_id="200" permission_reference="admin" template_id="50"/>
- <perm_templates_users id="3" user_id="200" permission_reference="codeviewer" template_id="50"/>
+ <perm_templates_users id="1"
+ user_id="200"
+ permission_reference="user"
+ template_id="50"/>
+ <perm_templates_users id="2"
+ user_id="200"
+ permission_reference="admin"
+ template_id="50"/>
+ <perm_templates_users id="3"
+ user_id="200"
+ permission_reference="codeviewer"
+ template_id="50"/>
- <perm_templates_users id="4" user_id="201" permission_reference="user" template_id="50"/>
+ <perm_templates_users id="4"
+ user_id="201"
+ permission_reference="user"
+ template_id="50"/>
</dataset>
<dataset>
- <users id="200" login="user1" name="User1" active="[true]"/>
- <users id="201" login="user2" name="User2" active="[true]"/>
- <users id="202" login="user3" name="User3" active="[true]"/>
+ <users id="200"
+ login="user1"
+ name="User1"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="user2"
+ name="User2"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="202"
+ login="user3"
+ name="User3"
+ active="[true]"
+ is_root="[false]"/>
- <perm_templates_users id="1" user_id="200" permission_reference="user" template_id="50"/>
- <perm_templates_users id="2" user_id="200" permission_reference="admin" template_id="50"/>
- <perm_templates_users id="3" user_id="200" permission_reference="codeviewer" template_id="50"/>
- <perm_templates_users id="4" user_id="200" permission_reference="user" template_id="51"/>
+ <perm_templates_users id="1"
+ user_id="200"
+ permission_reference="user"
+ template_id="50"/>
+ <perm_templates_users id="2"
+ user_id="200"
+ permission_reference="admin"
+ template_id="50"/>
+ <perm_templates_users id="3"
+ user_id="200"
+ permission_reference="codeviewer"
+ template_id="50"/>
+ <perm_templates_users id="4"
+ user_id="200"
+ permission_reference="user"
+ template_id="51"/>
- <perm_templates_users id="5" user_id="201" permission_reference="user" template_id="50"/>
+ <perm_templates_users id="5"
+ user_id="201"
+ permission_reference="user"
+ template_id="50"/>
</dataset>
<dataset>
- <users id="200" login="user3" name="User3" active="[true]"/>
- <users id="201" login="user1" name="User1" active="[true]"/>
- <users id="202" login="user2" name="User2" active="[true]"/>
+ <users id="200"
+ login="user3"
+ name="User3"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="user1"
+ name="User1"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="202"
+ login="user2"
+ name="User2"
+ active="[true]"
+ is_root="[false]"/>
- <perm_templates_users id="1" user_id="200" permission_reference="user" template_id="50"/>
- <perm_templates_users id="2" user_id="200" permission_reference="admin" template_id="50"/>
- <perm_templates_users id="3" user_id="200" permission_reference="codeviewer" template_id="50"/>
+ <perm_templates_users id="1"
+ user_id="200"
+ permission_reference="user"
+ template_id="50"/>
+ <perm_templates_users id="2"
+ user_id="200"
+ permission_reference="admin"
+ template_id="50"/>
+ <perm_templates_users id="3"
+ user_id="200"
+ permission_reference="codeviewer"
+ template_id="50"/>
- <perm_templates_users id="4" user_id="201" permission_reference="user" template_id="50"/>
+ <perm_templates_users id="4"
+ user_id="201"
+ permission_reference="user"
+ template_id="50"/>
</dataset>
<dataset>
- <groups id="1" name="sonar-users" description="Sonar Users" created_at="2014-09-07" updated_at="2014-09-08"/>
- <groups id="2" name="sonar-admins" description="Sonar Admins" created_at="2014-09-07" updated_at="2014-09-08"/>
- <groups id="3" name="sonar-reviewers" description="Sonar Reviewers" created_at="2014-09-07" updated_at="2014-09-08"/>
+ <groups id="1"
+ name="sonar-users"
+ description="Sonar Users"
+ created_at="2014-09-07"
+ updated_at="2014-09-08"/>
+ <groups id="2"
+ name="sonar-admins"
+ description="Sonar Admins"
+ created_at="2014-09-07"
+ updated_at="2014-09-08"/>
+ <groups id="3"
+ name="sonar-reviewers"
+ description="Sonar Reviewers"
+ created_at="2014-09-07"
+ updated_at="2014-09-08"/>
- <groups_users user_id="100" group_id="1"/>
- <groups_users user_id="100" group_id="2"/>
+ <groups_users user_id="100"
+ group_id="1"/>
+ <groups_users user_id="100"
+ group_id="2"/>
- <users id="100" login="john" name="John" email="jo@hn.com" created_at="1418215735482" updated_at="1418215735482" active="[true]"/>
+ <users id="100"
+ login="john"
+ name="John"
+ email="jo@hn.com"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <groups id="100" name="sonar-administrators" description="System administrators"/>
- <groups id="101" name="sonar-users" description="Any new users created will automatically join this group"/>
- <groups id="102" name="sonar-reviewers" description="Reviewers"/>
+ <groups id="100"
+ name="sonar-administrators"
+ description="System administrators"/>
+ <groups id="101"
+ name="sonar-users"
+ description="Any new users created will automatically join this group"/>
+ <groups id="102"
+ name="sonar-reviewers"
+ description="Reviewers"/>
<!-- user 200 is in all groups -->
- <groups_users user_id="200" group_id="100"/>
- <groups_users user_id="200" group_id="101"/>
- <groups_users user_id="200" group_id="102"/>
+ <groups_users user_id="200"
+ group_id="100"/>
+ <groups_users user_id="200"
+ group_id="101"/>
+ <groups_users user_id="200"
+ group_id="102"/>
<!-- user 201 is in users group -->
- <groups_users user_id="201" group_id="101"/>
+ <groups_users user_id="201"
+ group_id="101"/>
- <users id="200" login="two-hundred"/>
- <users id="201" login="two-hundred-one"/>
- <users id="202" login="two-hundred-two"/>
+ <users id="200"
+ login="two-hundred"
+ is_root="[false]"/>
+ <users id="201"
+ login="two-hundred-one"
+ is_root="[false]"/>
+ <users id="202"
+ login="two-hundred-two"
+ is_root="[false]"/>
</dataset>
<dataset>
- <groups id="100" name="sonar-administrators" description="System administrators"/>
- <groups id="101" name="sonar-users" description="Any new users created will automatically join this group"/>
- <groups id="102" name="sonar-reviewers" description="Reviewers"/>
- <groups id="103" name="sonar-nobody" description="Nobody in this group"/>
+ <groups id="100"
+ name="sonar-administrators"
+ description="System administrators"/>
+ <groups id="101"
+ name="sonar-users"
+ description="Any new users created will automatically join this group"/>
+ <groups id="102"
+ name="sonar-reviewers"
+ description="Reviewers"/>
+ <groups id="103"
+ name="sonar-nobody"
+ description="Nobody in this group"/>
<!-- user 200 is in all groups -->
- <groups_users user_id="200" group_id="100"/>
- <groups_users user_id="200" group_id="101"/>
- <groups_users user_id="200" group_id="102"/>
+ <groups_users user_id="200"
+ group_id="100"/>
+ <groups_users user_id="200"
+ group_id="101"/>
+ <groups_users user_id="200"
+ group_id="102"/>
<!-- user 201 is in users group -->
- <groups_users user_id="201" group_id="101"/>
+ <groups_users user_id="201"
+ group_id="101"/>
- <users id="200" login="admin" name="Admin" active="[true]"/>
- <users id="201" login="not.admin" name="Not Admin" active="[true]"/>
- <users id="202" login="inactive" name="Inactive" active="[false]"/>
+ <users id="200"
+ login="admin"
+ name="Admin"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="201"
+ login="not.admin"
+ name="Not Admin"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="202"
+ login="inactive"
+ name="Inactive"
+ active="[false]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
- <user_roles id="1" user_id="200" resource_id="123" role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="user"/>
- <group_roles id="1" group_id="100" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
<user_roles/>
<group_roles/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <users id="200" login="dave.loper" name="Dave Loper" email="dave.loper@company.net" active="[true]"/>
+ <users id="200"
+ login="dave.loper"
+ name="Dave Loper"
+ email="dave.loper@company.net"
+ active="[true]"
+ is_root="[false]"/>
- <groups id="100" name="devs"/>
+ <groups id="100"
+ name="devs"/>
- <user_roles id="1" user_id="200" resource_id="123" role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="user"/>
- <group_roles id="1" group_id="100" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
- <group_roles id="1" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="2" group_id="[null]" resource_id="123" role="user"/>
- <user_roles id="1" user_id="200" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="codeviewer"/>
<!-- other resource -->
- <group_roles id="3" group_id="101" resource_id="999" role="codeviewer"/>
- <user_roles id="2" user_id="200" resource_id="999" role="codeviewer"/>
+ <group_roles id="3"
+ group_id="101"
+ resource_id="999"
+ role="codeviewer"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="999"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
<!--<group_roles id="1" group_id="100" resource_id="123" role="admin"/>-->
<!--<group_roles id="2" group_id="[null]" resource_id="123" role="user"/>-->
<!--<user_roles id="1" user_id="200" resource_id="123" role="codeviewer"/>-->
<!-- other resource -->
- <group_roles id="3" group_id="101" resource_id="999" role="codeviewer"/>
- <user_roles id="2" user_id="200" resource_id="999" role="codeviewer"/>
+ <group_roles id="3"
+ group_id="101"
+ resource_id="999"
+ role="codeviewer"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="999"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
- <group_roles id="1" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="2" group_id="[null]" resource_id="123" role="user"/>
- <user_roles id="1" user_id="200" resource_id="123" role="codeviewer"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
+ <user_roles id="1"
+ user_id="200"
+ resource_id="123"
+ role="codeviewer"/>
<!-- other resource -->
- <group_roles id="3" group_id="101" resource_id="999" role="codeviewer"/>
- <user_roles id="2" user_id="200" resource_id="999" role="codeviewer"/>
+ <group_roles id="3"
+ group_id="101"
+ resource_id="999"
+ role="codeviewer"/>
+ <user_roles id="2"
+ user_id="200"
+ resource_id="999"
+ role="codeviewer"/>
-</dataset>
\ No newline at end of file
+</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
- <group_roles id="1" group_id="100" resource_id="123" role="admin"/>
- <group_roles id="2" group_id="[null]" resource_id="123" role="user"/>
+ <group_roles id="1"
+ group_id="100"
+ resource_id="123"
+ role="admin"/>
+ <group_roles id="2"
+ group_id="[null]"
+ resource_id="123"
+ role="user"/>
</dataset>
<dataset>
- <groups id="100" name="sonar-administrators"/>
- <groups id="101" name="sonar-users"/>
- <users id="200" login="marius" name="Marius" email="[null]" active="[true]"/>
-</dataset>
\ No newline at end of file
+ <groups id="100"
+ name="sonar-administrators"/>
+ <groups id="101"
+ name="sonar-users"/>
+ <users id="200"
+ login="marius"
+ name="Marius"
+ email="[null]"
+ active="[true]"
+ is_root="[false]"/>
+</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 " created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
- <users id="102" login="sbrandhof" name="Simon Brandhof" email="marius@lesbronzes.fr" active="[true]" scm_accounts="[null]" created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
+ <users id="102"
+ login="sbrandhof"
+ name="Simon Brandhof"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts="[null]"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="1" login="john" name="John" email="jo@hn.com" created_at="1418215735482" updated_at="1418215735482"
- active="[true]"/>
+ <users id="1"
+ login="john"
+ name="John"
+ email="jo@hn.com"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
<!-- inactive -->
- <users id="50" login="inactive_user" name="Disabled" email="inactive@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[false]"/>
+ <users id="50"
+ login="inactive_user"
+ name="Disabled"
+ email="inactive@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[false]"
+ is_root="[false]"/>
<!-- active -->
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
- <users id="102" login="jcdus" name="Jean-Claude Dus" email="jcdus@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="102"
+ login="jcdus"
+ name="Jean-Claude Dus"
+ email="jcdus@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="100" login="inactive_user" name="Disabled" email="inactive@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[false]"/>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
- <users id="102" login="jcdus" name="Jean-Claude Dus" email="jcdus@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="100"
+ login="inactive_user"
+ name="Disabled"
+ email="inactive@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[false]"
+ is_root="[false]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="102"
+ login="jcdus"
+ name="Jean-Claude Dus"
+ email="jcdus@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="100" login="inactive_user" name="Disabled" email="inactive@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[false]"/>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
- <users id="102" login="jcdus" name="Jean-Claude Dus" email="jcdus@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="100"
+ login="inactive_user"
+ name="Disabled"
+ email="inactive@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[false]"
+ is_root="[false]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="102"
+ login="jcdus"
+ name="Jean-Claude Dus"
+ email="jcdus@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="100" login="inactive_user" name="Disabled" email="inactive@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[false]"/>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="100"
+ login="inactive_user"
+ name="Disabled"
+ email="inactive@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[false]"
+ is_root="[false]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
- <users id="102" login="sbrandhof" name="Simon Brandhof" email="marius@lesbronzes.fr" created_at="1418215735482"
- updated_at="1418215735485" active="[true]"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
+ <users id="102"
+ login="sbrandhof"
+ name="Simon Brandhof"
+ email="marius@lesbronzes.fr"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ active="[true]"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 " created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
- <users id="102" login="sbrandhof" name="Simon Brandhof" email="marius@lesbronzes.fr" active="[true]" scm_accounts="[null]" created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"/>
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
+ <users id="102"
+ login="sbrandhof"
+ name="Simon Brandhof"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts="[null]"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"
+ is_root="[true]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 " created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
- <users id="102" login="sbrandhof" name="Simon Brandhof" email="sbrandhof@lesbronzes.fr" active="[true]" scm_accounts="[null]" created_at="1418215735482"
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ created_at="1418215735482"
updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"/>
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
+ <users id="102"
+ login="sbrandhof"
+ name="Simon Brandhof"
+ email="sbrandhof@lesbronzes.fr"
+ active="[true]"
+ scm_accounts="[null]"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="101" login="marius" name="Marius" email="marius@lesbronzes.fr" active="[true]" scm_accounts=" ma marius33 " created_at="1418215735482" updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"/>
- <users id="102" login="sbrandhof" name="Simon Brandhof" email="marius@lesbronzes.fr" active="[true]" scm_accounts="[null]" created_at="1418215735482"
+ <users id="101"
+ login="marius"
+ name="Marius"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts=" ma marius33 "
+ created_at="1418215735482"
updated_at="1418215735485"
- salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366" crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"/>
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8365"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fg"
+ is_root="[false]"/>
+ <users id="102"
+ login="sbrandhof"
+ name="Simon Brandhof"
+ email="marius@lesbronzes.fr"
+ active="[true]"
+ scm_accounts="[null]"
+ created_at="1418215735482"
+ updated_at="1418215735485"
+ salt="79bd6a8e79fb8c76ac8b121cc7e8e11ad1af8366"
+ crypted_password="650d2261c98361e2f67f90ce5c65a95e7d8ea2fh"
+ is_root="[false]"/>
</dataset>
<dataset>
- <users id="1" login="john" name="John" email="jo@hn.com" created_at="1418215735482" updated_at="1418215735482"
- active="[true]"/>
+ <users id="1"
+ login="john"
+ name="John"
+ email="jo@hn.com"
+ created_at="1418215735482"
+ updated_at="1418215735482"
+ active="[true]"
+ is_root="[false]"/>
</dataset>