]> source.dussan.org Git - sonarqube.git/commitdiff
SONAR-8134 prepare support of organizations in permission DAO
authorSimon Brandhof <simon.brandhof@sonarsource.com>
Wed, 12 Oct 2016 15:44:35 +0000 (17:44 +0200)
committerSimon Brandhof <simon.brandhof@sonarsource.com>
Thu, 13 Oct 2016 10:13:10 +0000 (12:13 +0200)
63 files changed:
server/sonar-server/src/test/java/org/sonar/server/computation/task/projectanalysis/step/ApplyPermissionsStepTest.java
server/sonar-server/src/test/resources/org/sonar/server/issue/index/IssueAuthorizationDaoTest/no_authorization.xml
server/sonar-server/src/test/resources/org/sonar/server/issue/index/IssueAuthorizationDaoTest/shared.xml
server/sonar-server/src/test/resources/org/sonar/server/issue/index/IssueAuthorizationIndexerTest/index.xml
sonar-db/src/main/java/org/sonar/db/DbClient.java
sonar-db/src/main/java/org/sonar/db/permission/GroupPermissionDao.java
sonar-db/src/main/java/org/sonar/db/permission/GroupPermissionMapper.java
sonar-db/src/main/java/org/sonar/db/permission/PermissionRepository.java
sonar-db/src/main/java/org/sonar/db/permission/UserPermissionDto.java
sonar-db/src/main/resources/org/sonar/db/permission/GroupPermissionMapper.xml
sonar-db/src/main/resources/org/sonar/db/permission/UserPermissionMapper.xml
sonar-db/src/test/java/org/sonar/db/permission/GroupPermissionDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/PermissionDbTester.java
sonar-db/src/test/java/org/sonar/db/permission/PermissionRepositoryTest.java
sonar-db/src/test/java/org/sonar/db/permission/UserPermissionDaoTest.java
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/fail_when_no_default_template_is_defined.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesSeveralPattern.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole.xml [deleted file]
sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/hasRoles.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/anonymous_should_be_authorized.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/group_should_be_authorized.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/is_authorized_component_key_for_global_permission.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/keep_authorized_project_ids_for_user.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/keep_authorized_users_for_role_and_project_for_anonymous.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/keep_authorized_users_for_role_and_project_for_group.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/keep_authorized_users_for_role_and_project_for_user.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/should_return_global_permissions_for_anonymous.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/should_return_root_project_keys_for_anonymous.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/should_return_root_project_keys_for_group.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/should_return_root_project_keys_for_user.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionDaoTest/user_should_be_authorized.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/apply_default_permission_template.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/apply_default_permission_template_by_component_id.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_apply_permission_template.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_group_permission-result.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_group_permission.xml
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission-result.xml [deleted file]
sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission.xml [deleted file]

index 6920d4dcf16d0a4b9658899aea754af8db13bf42..4e1ea34e76a047c302cc1a7eae4dfb5f909b2451 100644 (file)
@@ -123,7 +123,7 @@ public class ApplyPermissionsStepTest extends BaseStepTest {
     ComponentDto projectDto = ComponentTesting.newProjectDto(ROOT_UUID).setKey(ROOT_KEY).setAuthorizationUpdatedAt(SOME_DATE);
     dbClient.componentDao().insert(dbSession, projectDto);
     // Permissions are already set on the project
-    dbClient.roleDao().insertGroupRole(dbSession, new GroupPermissionDto().setRole(UserRole.USER).setGroupId(null).setResourceId(projectDto.getId()));
+    dbClient.groupPermissionDao().insert(dbSession, new GroupPermissionDto().setRole(UserRole.USER).setGroupId(null).setResourceId(projectDto.getId()));
 
     dbSession.commit();
 
@@ -163,7 +163,7 @@ public class ApplyPermissionsStepTest extends BaseStepTest {
     ComponentDto viewDto = newView(ROOT_UUID).setKey(ROOT_KEY).setAuthorizationUpdatedAt(SOME_DATE);
     dbClient.componentDao().insert(dbSession, viewDto);
     // Permissions are already set on the view
-    dbClient.roleDao().insertGroupRole(dbSession, new GroupPermissionDto().setRole(UserRole.USER).setGroupId(null).setResourceId(viewDto.getId()));
+    dbClient.groupPermissionDao().insert(dbSession, new GroupPermissionDto().setRole(UserRole.USER).setGroupId(null).setResourceId(viewDto.getId()));
 
     dbSession.commit();
 
index 2145b3a4cf948bdefbdce46855bd5f46a20ec45c..a60740ae4779fb102b148d33e9ebb9c5babeb721 100644 (file)
          active="[true]"
          is_root="[false]"/>
   <groups id="100"
-          name="devs"/>
+          name="devs"
+          organization_uuid="org1"/>
 
   <user_roles id="1"
               user_id="10"
               resource_id="2"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <group_roles id="1"
                group_id="100"
                resource_id="2"
index a360a813b0c4e0d67f6f65a4a73dbeba1bb0ba18..de252c7a2a7f447837c08604beb0a095a1cf41bd 100644 (file)
   <user_roles id="1"
               user_id="10"
               resource_id="1"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="10"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
   <user_roles id="3"
               user_id="10"
               resource_id="2"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
 
   <!-- group devs has user access on ABC only -->
   <groups id="100"
-          name="devs"/>
+          name="devs"
+          organization_uuid="org1"/>
   <group_roles id="1"
                group_id="100"
                resource_id="1"
   <user_roles id="4"
               user_id="11"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
   <user_roles id="5"
               user_id="11"
               resource_id="2"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
 
 </dataset>
index 25864891fe3ad9dcf56a5916e5891a2c1486a064..fe8f0095cce7ba8f29d8ca26ace9098f0b3feb96 100644 (file)
   <user_roles id="1"
               user_id="10"
               resource_id="1"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="10"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
   <user_roles id="3"
               user_id="10"
               resource_id="2"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
 
   <groups id="100"
-          name="devs"/>
+          name="devs"
+          organization_uuid="org1"/>
   <group_roles id="1"
                group_id="100"
                resource_id="1"
index aea31886d8f98f3517002333690c162414ac78e9..a86820b115da191c158d669ac1137769206f4dbd 100644 (file)
@@ -51,6 +51,7 @@ import org.sonar.db.metric.MetricDao;
 import org.sonar.db.notification.NotificationQueueDao;
 import org.sonar.db.organization.OrganizationDao;
 import org.sonar.db.permission.GroupPermissionDao;
+import org.sonar.db.permission.PermissionDao;
 import org.sonar.db.permission.UserPermissionDao;
 import org.sonar.db.permission.template.PermissionTemplateCharacteristicDao;
 import org.sonar.db.permission.template.PermissionTemplateDao;
@@ -67,7 +68,6 @@ import org.sonar.db.rule.RuleDao;
 import org.sonar.db.rule.RuleRepositoryDao;
 import org.sonar.db.source.FileSourceDao;
 import org.sonar.db.user.AuthorDao;
-import org.sonar.db.permission.PermissionDao;
 import org.sonar.db.user.GroupDao;
 import org.sonar.db.user.GroupMembershipDao;
 import org.sonar.db.user.RoleDao;
index 15168a282166051994e3af6649cb717f88439dfe..653dbf2c111aa9bd8b347416b57a40e50f320cf6 100644 (file)
@@ -37,6 +37,10 @@ public class GroupPermissionDao implements Dao {
   private static final String COMPONENT_ID_PARAMETER = "componentId";
   private static final String ANYONE_GROUP_PARAMETER = "anyoneGroup";
 
+  /**
+   * @deprecated not compatible with organizations.
+   */
+  @Deprecated
   public int countGroups(DbSession session, String permission, @Nullable Long componentId) {
     Map<String, Object> parameters = new HashMap<>();
     parameters.put("permission", permission);
@@ -47,16 +51,26 @@ public class GroupPermissionDao implements Dao {
   }
 
   /**
-   * ordered by group names
+   * @return group names, sorted in alphabetical order
+   * @deprecated not compatible with organizations.
    */
+  @Deprecated
   public List<String> selectGroupNamesByPermissionQuery(DbSession dbSession, PermissionQuery query) {
     return mapper(dbSession).selectGroupNamesByPermissionQuery(query, new RowBounds(query.getPageOffset(), query.getPageSize()));
   }
 
+  /**
+   * @deprecated not compatible with organizations.
+   */
+  @Deprecated
   public int countGroupsByPermissionQuery(DbSession dbSession, PermissionQuery query) {
     return mapper(dbSession).countGroupsByPermissionQuery(query);
   }
 
+  /**
+   * @deprecated group name parameter is not enough to identify a group. It is not compatible with organizations.
+   */
+  @Deprecated
   public List<GroupPermissionDto> selectGroupPermissionsByGroupNamesAndProject(DbSession dbSession, List<String> groupNames, @Nullable Long projectId) {
     return executeLargeInputs(groupNames, groups -> mapper(dbSession).selectGroupPermissionByGroupNames(groups, projectId));
   }
@@ -77,6 +91,28 @@ public class GroupPermissionDao implements Dao {
       });
   }
 
+  /**
+   * @return the permissions granted to the requested group, optionally on the requested project. An
+   * empty list is returned if the group or project do not exist.
+   */
+  public List<String> selectGroupPermissions(DbSession session, long groupId, @Nullable Long projectId) {
+    return session.getMapper(GroupPermissionMapper.class).selectGroupPermissions(groupId, projectId);
+  }
+
+  /**
+   * @return the permissions granted to Anyone virtual group, optionally on the requested project. An
+   * empty list is returned if the project does not exist.
+   * @deprecated not compatible with organizations if {@code projectId} is null. Should have an organization parameter.
+   */
+  @Deprecated
+  public List<String> selectAnyonePermissions(DbSession session, @Nullable Long projectId) {
+    return session.getMapper(GroupPermissionMapper.class).selectAnyonePermissions(projectId);
+  }
+
+  public void insert(DbSession dbSession, GroupPermissionDto dto) {
+    mapper(dbSession).insert(dto);
+  }
+
   private static GroupPermissionMapper mapper(DbSession session) {
     return session.getMapper(GroupPermissionMapper.class);
   }
index 5d5c05afafb44302a7cf8c7d216124af3ba17804..331aa4097872bf0a6f3341a828a83fbd014a83ee 100644 (file)
@@ -28,13 +28,35 @@ import org.apache.ibatis.session.RowBounds;
 
 public interface GroupPermissionMapper {
 
+  /**
+   * @deprecated does not support organizations
+   */
+  @Deprecated
   int countGroups(Map<String, Object> parameters);
 
+  /**
+   * @deprecated does not support organizations
+   */
+  @Deprecated
   List<String> selectGroupNamesByPermissionQuery(@Param("query") PermissionQuery query, RowBounds rowBounds);
 
+  /**
+   * @deprecated does not support organizations
+   */
+  @Deprecated
   int countGroupsByPermissionQuery(@Param("query") PermissionQuery query);
 
+  /**
+   * @deprecated does not support organizations
+   */
+  @Deprecated
   List<GroupPermissionDto> selectGroupPermissionByGroupNames(@Param("groupNames") List<String> groupNames, @Nullable @Param("projectId") Long projectId);
 
   void groupsCountByProjectIdAndPermission(Map<String, Object> parameters, ResultHandler resultHandler);
+
+  List<String> selectGroupPermissions(@Param("groupId") long groupId, @Nullable @Param("projectId") Long projectId);
+
+  List<String> selectAnyonePermissions(@Nullable @Param("projectId") Long projectId);
+
+  void insert(GroupPermissionDto dto);
 }
index 01718c0367bbb81c979a92127b4b062d94921507..6b27584b2abfc9d0de6162745b7a1f25d466c165 100644 (file)
@@ -36,7 +36,6 @@ import org.sonar.db.permission.template.PermissionTemplateCharacteristicDto;
 import org.sonar.db.permission.template.PermissionTemplateDto;
 import org.sonar.db.permission.template.PermissionTemplateGroupDto;
 import org.sonar.db.permission.template.PermissionTemplateUserDto;
-import org.sonar.db.user.GroupDto;
 
 import static org.sonar.api.security.DefaultGroups.isAnyone;
 
@@ -57,57 +56,12 @@ public class PermissionRepository {
     this.settings = settings;
   }
 
-  /**
-   * @param updateProjectAuthorizationDate is false when doing bulk action in order to not update the same project multiple times for nothing
-   */
-  private void insertUserPermission(@Nullable Long resourceId, Long userId, String permission, boolean updateProjectAuthorizationDate, DbSession session) {
-    UserPermissionDto userPermissionDto = new UserPermissionDto(permission, userId, resourceId);
-    if (updateProjectAuthorizationDate) {
-      updateProjectAuthorizationDate(session, resourceId);
-    }
-    dbClient.userPermissionDao().insert(session, userPermissionDto);
-  }
-
-  public void insertUserPermission(@Nullable Long resourceId, Long userId, String permission, DbSession session) {
-    insertUserPermission(resourceId, userId, permission, true, session);
-  }
-
-  public void deleteUserPermission(@Nullable ComponentDto project, String login, String permission, DbSession session) {
-    if (project != null) {
-      dbClient.userPermissionDao().delete(session, login, project.uuid(), permission);
-      updateProjectAuthorizationDate(session, project.getId());
-    } else {
-      dbClient.userPermissionDao().delete(session, login, null, permission);
-    }
-  }
-
-  /**
-   * @param updateProjectAuthorizationDate is false when doing bulk action in order to not update the same project multiple times for nothing
-   */
-  private void insertGroupPermission(@Nullable Long resourceId, @Nullable Long groupId, String permission, boolean updateProjectAuthorizationDate, DbSession session) {
-    GroupPermissionDto groupRole = new GroupPermissionDto()
+  private void insertGroupPermission(@Nullable Long resourceId, @Nullable Long groupId, String permission, DbSession session) {
+    GroupPermissionDto dto = new GroupPermissionDto()
       .setRole(permission)
       .setGroupId(groupId)
       .setResourceId(resourceId);
-    if (updateProjectAuthorizationDate) {
-      updateProjectAuthorizationDate(session, resourceId);
-    }
-    dbClient.roleDao().insertGroupRole(session, groupRole);
-  }
-
-  public void insertGroupPermission(@Nullable Long resourceId, @Nullable Long groupId, String permission, DbSession session) {
-    insertGroupPermission(resourceId, groupId, permission, true, session);
-  }
-
-  public void insertGroupPermission(@Nullable Long resourceId, String groupName, String permission, DbSession session) {
-    if (isAnyone(groupName)) {
-      insertGroupPermission(resourceId, (Long) null, permission, session);
-    } else {
-      GroupDto group = dbClient.groupDao().selectByName(session, groupName);
-      if (group != null) {
-        insertGroupPermission(resourceId, group.getId(), permission, session);
-      }
-    }
+    dbClient.groupPermissionDao().insert(session, dto);
   }
 
   public void deleteGroupPermission(@Nullable Long resourceId, @Nullable Long groupId, String permission, DbSession session) {
@@ -133,19 +87,24 @@ public class PermissionRepository {
   }
 
   private void applyPermissionTemplate(DbSession session, String templateUuid, ComponentDto project, @Nullable Long currentUserId) {
-    PermissionTemplate permissionTemplate = dbClient.permissionTemplateDao().selectPermissionTemplateWithPermissions(session, templateUuid);
+    PermissionTemplate template = dbClient.permissionTemplateDao().selectPermissionTemplateWithPermissions(session, templateUuid);
     updateProjectAuthorizationDate(session, project.getId());
     dbClient.roleDao().deleteGroupRolesByResourceId(session, project.getId());
     dbClient.userPermissionDao().delete(session, null, project.uuid(), null);
 
-    List<PermissionTemplateUserDto> usersPermissions = permissionTemplate.getUserPermissions();
-    usersPermissions.forEach(userPermission -> insertUserPermission(project.getId(), userPermission.getUserId(), userPermission.getPermission(), false, session));
+    List<PermissionTemplateUserDto> usersPermissions = template.getUserPermissions();
+    String organizationUuid = template.getTemplate().getOrganizationUuid();
+    usersPermissions
+      .forEach(up -> {
+        UserPermissionDto dto = new UserPermissionDto(organizationUuid, up.getPermission(), up.getUserId(), project.getId());
+        dbClient.userPermissionDao().insert(session, dto);
+      });
 
-    List<PermissionTemplateGroupDto> groupsPermissions = permissionTemplate.getGroupPermissions();
+    List<PermissionTemplateGroupDto> groupsPermissions = template.getGroupPermissions();
     groupsPermissions.forEach(groupPermission -> insertGroupPermission(project.getId(), isAnyone(groupPermission.getGroupName()) ? null : groupPermission.getGroupId(),
-      groupPermission.getPermission(), false, session));
+      groupPermission.getPermission(), session));
 
-    List<PermissionTemplateCharacteristicDto> characteristics = permissionTemplate.getCharacteristics();
+    List<PermissionTemplateCharacteristicDto> characteristics = template.getCharacteristics();
     if (currentUserId != null) {
       Set<String> permissionsForCurrentUserAlreadyInDb = usersPermissions.stream()
         .filter(userPermission -> currentUserId.equals(userPermission.getUserId()))
@@ -154,7 +113,10 @@ public class PermissionRepository {
       characteristics.stream()
         .filter(PermissionTemplateCharacteristicDto::getWithProjectCreator)
         .filter(characteristic -> !permissionsForCurrentUserAlreadyInDb.contains(characteristic.getPermission()))
-        .forEach(characteristic -> insertUserPermission(project.getId(), currentUserId, characteristic.getPermission(), false, session));
+        .forEach(c -> {
+          UserPermissionDto dto = new UserPermissionDto(template.getTemplate().getOrganizationUuid(), c.getPermission(), currentUserId, project.getId());
+          dbClient.userPermissionDao().insert(session, dto);
+        });
     }
   }
 
index 3801c5bc42b901c7a237605bc2f2b7144f427d13..52e02b26730e1f6e15a0ba447b020590f6c23e81 100644 (file)
@@ -23,6 +23,8 @@ import javax.annotation.CheckForNull;
 import javax.annotation.Nullable;
 
 public class UserPermissionDto {
+
+  private String organizationUuid;
   private String permission;
   private long userId;
   private Long componentId;
@@ -31,10 +33,11 @@ public class UserPermissionDto {
     // used by MyBatis
   }
 
-  public UserPermissionDto(String permission, long userId, @Nullable Long componentId) {
+  public UserPermissionDto(String organizationUuid, String permission, long userId, @Nullable Long componentId) {
+    this.organizationUuid = organizationUuid;
+    this.permission = permission;
     this.userId = userId;
     this.componentId = componentId;
-    this.permission = permission;
   }
 
   public String getPermission() {
@@ -45,6 +48,10 @@ public class UserPermissionDto {
     return userId;
   }
 
+  public String getOrganizationUuid() {
+    return organizationUuid;
+  }
+
   /**
    * @return {@code null} if it's a global permission, else return the project id.
    */
@@ -58,6 +65,7 @@ public class UserPermissionDto {
     StringBuilder sb = new StringBuilder("UserPermissionDto{");
     sb.append("permission='").append(permission).append('\'');
     sb.append(", userId=").append(userId);
+    sb.append(", organizationUuid=").append(organizationUuid);
     sb.append(", componentId=").append(componentId);
     sb.append('}');
     return sb.toString();
index 6d0a5ce7e5f59d8311e8370ae69ed44eacc61c41..1d1e33d64d1850872642783cb417b64d4c6bf8a4 100644 (file)
       </if>
   </select>
 
+  <select id="selectGroupPermissions" parameterType="map" resultType="String">
+    select gr.role
+    from group_roles gr
+    where gr.group_id = #{groupId}
+    and
+    <if test="projectId == null">
+      gr.resource_id is null
+    </if>
+    <if test="projectId != null">
+      gr.resource_id = #{projectId}
+    </if>
+  </select>
+
+  <select id="selectAnyonePermissions" parameterType="map" resultType="String">
+    select gr.role
+    from group_roles gr
+    where gr.group_id is null
+    and
+    <if test="projectId == null">
+      gr.resource_id is null
+    </if>
+    <if test="projectId != null">
+      gr.resource_id = #{projectId}
+    </if>
+  </select>
+
+  <insert id="insert" parameterType="GroupPermission" keyColumn="id" useGeneratedKeys="true" keyProperty="id">
+    insert into group_roles (
+    group_id,
+    resource_id,
+    role
+    ) values (
+    #{groupId,jdbcType=BIGINT},
+    #{resourceId,jdbcType=BIGINT},
+    #{role,jdbcType=VARCHAR}
+    )
+  </insert>
 </mapper>
index 6f8feb13e5119f632adeb9d4f80f20f243e232cf..b9163e08ad0b0f4004ab15a9501419600c6ce983 100644 (file)
@@ -6,6 +6,7 @@
   <select id="selectByQuery" parameterType="map" resultType="org.sonar.db.permission.ExtendedUserPermissionDto">
     select
       u.id as userId,
+      ur.organization_uuid as organizationUuid,
       ur.resource_id as componentId,
       ur.role as permission,
       u.login as userLogin,
   </select>
 
   <insert id="insert" parameterType="org.sonar.db.permission.UserPermissionDto" useGeneratedKeys="false">
-    insert into user_roles (user_id, resource_id, role)
-    values (#{userId,jdbcType=BIGINT}, #{componentId,jdbcType=BIGINT}, #{permission,jdbcType=VARCHAR})
+    insert into user_roles (
+    organization_uuid,
+    user_id,
+    resource_id,
+    role
+    ) values (
+    #{organizationUuid,jdbcType=VARCHAR},
+    #{userId,jdbcType=BIGINT},
+    #{componentId,jdbcType=BIGINT},
+    #{permission,jdbcType=VARCHAR}
+    )
   </insert>
 
   <delete id="delete" parameterType="map">
index ce4b29ae5d38d272cff1d6982462987d78dbee00..2d67ad7deaae361e08530ba2204d7d78445b27e6 100644 (file)
@@ -31,7 +31,6 @@ import org.sonar.db.DbSession;
 import org.sonar.db.DbTester;
 import org.sonar.db.component.ComponentDbTester;
 import org.sonar.db.component.ComponentDto;
-import org.sonar.db.user.GroupDbTester;
 import org.sonar.db.user.GroupDto;
 
 import static java.util.Arrays.asList;
@@ -49,22 +48,25 @@ import static org.sonar.db.user.GroupTesting.newGroupDto;
 
 public class GroupPermissionDaoTest {
 
-  private static final long COMPONENT_ID = 100L;
+  private static final long GROUP_1_ID = 10L;
+  private static final long GROUP_2_ID = 11L;
+  private static final long PROJECT_1_ID = 100L;
+  private static final Long ANYONE_ID = null;
+  private static final long UNKNOWN_PROJECT_ID = -1L;
+  private static final long UNKNOWN_GROUP_ID = -1L;
 
   @Rule
   public DbTester db = DbTester.create(System2.INSTANCE);
-  private GroupDbTester groupDb = new GroupDbTester(db);
   private PermissionDbTester permissionDb = new PermissionDbTester(db);
   private ComponentDbTester componentDb = new ComponentDbTester(db);
   private DbSession dbSession = db.getSession();
-
   private GroupPermissionDao underTest = new GroupPermissionDao();
 
   @Test
   public void group_count_by_permission_and_component_id() {
-    GroupDto group1 = groupDb.insertGroup();
-    GroupDto group2 = groupDb.insertGroup();
-    GroupDto group3 = groupDb.insertGroup();
+    GroupDto group1 = db.users().insertGroup(newGroupDto());
+    GroupDto group2 = db.users().insertGroup(newGroupDto());
+    GroupDto group3 = db.users().insertGroup(newGroupDto());
 
     permissionDb.addProjectPermissionToGroup(ISSUE_ADMIN, group1.getId(), 42L);
     permissionDb.addProjectPermissionToGroup(ADMIN, group1.getId(), 123L);
@@ -86,9 +88,9 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query() {
-    GroupDto group1 = groupDb.insertGroup(newGroupDto());
-    GroupDto group2 = groupDb.insertGroup(newGroupDto());
-    GroupDto group3 = groupDb.insertGroup(newGroupDto());
+    GroupDto group1 = db.users().insertGroup(newGroupDto());
+    GroupDto group2 = db.users().insertGroup(newGroupDto());
+    GroupDto group3 = db.users().insertGroup(newGroupDto());
     permissionDb.addGlobalPermissionToGroup(SCAN_EXECUTION, null);
 
     List<String> groupNames = underTest.selectGroupNamesByPermissionQuery(dbSession, PermissionQuery.builder().build());
@@ -97,9 +99,9 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_is_ordered_by_group_names() {
-    groupDb.insertGroup(newGroupDto().setName("Group-2"));
-    groupDb.insertGroup(newGroupDto().setName("Group-3"));
-    groupDb.insertGroup(newGroupDto().setName("Group-1"));
+    db.users().insertGroup(newGroupDto().setName("Group-2"));
+    db.users().insertGroup(newGroupDto().setName("Group-3"));
+    db.users().insertGroup(newGroupDto().setName("Group-1"));
     permissionDb.addGlobalPermissionToGroup(SCAN_EXECUTION, null);
 
     assertThat(underTest.selectGroupNamesByPermissionQuery(dbSession,
@@ -108,9 +110,9 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void count_groups_by_query() {
-    GroupDto group1 = groupDb.insertGroup(newGroupDto().setName("Group-1"));
-    GroupDto group2 = groupDb.insertGroup(newGroupDto().setName("Group-2"));
-    GroupDto group3 = groupDb.insertGroup(newGroupDto().setName("Group-3"));
+    GroupDto group1 = db.users().insertGroup(newGroupDto().setName("Group-1"));
+    GroupDto group2 = db.users().insertGroup(newGroupDto().setName("Group-2"));
+    GroupDto group3 = db.users().insertGroup(newGroupDto().setName("Group-3"));
     permissionDb.addGlobalPermissionToGroup(SCAN_EXECUTION, null);
     permissionDb.addGlobalPermissionToGroup(PROVISIONING, group1.getId());
 
@@ -128,9 +130,9 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_with_global_permission() {
-    GroupDto group1 = groupDb.insertGroup(newGroupDto().setName("Group-1"));
-    GroupDto group2 = groupDb.insertGroup(newGroupDto().setName("Group-2"));
-    GroupDto group3 = groupDb.insertGroup(newGroupDto().setName("Group-3"));
+    GroupDto group1 = db.users().insertGroup(newGroupDto().setName("Group-1"));
+    GroupDto group2 = db.users().insertGroup(newGroupDto().setName("Group-2"));
+    GroupDto group3 = db.users().insertGroup(newGroupDto().setName("Group-3"));
 
     ComponentDto project = componentDb.insertComponent(newProjectDto());
 
@@ -152,9 +154,9 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_with_project_permissions() {
-    GroupDto group1 = groupDb.insertGroup();
-    GroupDto group2 = groupDb.insertGroup();
-    GroupDto group3 = groupDb.insertGroup();
+    GroupDto group1 = db.users().insertGroup(newGroupDto());
+    GroupDto group2 = db.users().insertGroup(newGroupDto());
+    GroupDto group3 = db.users().insertGroup(newGroupDto());
 
     ComponentDto project = componentDb.insertComponent(newProjectDto());
     ComponentDto anotherProject = componentDb.insertComponent(newProjectDto());
@@ -180,7 +182,7 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_paginated() {
-    IntStream.rangeClosed(0, 9).forEach(i -> groupDb.insertGroup(newGroupDto().setName(i + "-name")));
+    IntStream.rangeClosed(0, 9).forEach(i -> db.users().insertGroup(newGroupDto().setName(i + "-name")));
 
     assertThat(underTest.selectGroupNamesByPermissionQuery(dbSession,
       PermissionQuery.builder().setPageIndex(2).setPageSize(3).build())).containsExactly("3-name", "4-name", "5-name");
@@ -188,8 +190,8 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_with_search_query() {
-    GroupDto group = groupDb.insertGroup(newGroupDto().setName("group-anyone"));
-    groupDb.insertGroup(newGroupDto().setName("unknown"));
+    GroupDto group = db.users().insertGroup(newGroupDto().setName("group-anyone"));
+    db.users().insertGroup(newGroupDto().setName("unknown"));
     permissionDb.addGlobalPermissionToGroup(SCAN_EXECUTION, group.getId());
 
     assertThat(underTest.selectGroupNamesByPermissionQuery(dbSession,
@@ -198,7 +200,7 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_groups_by_query_does_not_return_anyone_when_group_roles_is_empty() {
-    GroupDto group = groupDb.insertGroup();
+    GroupDto group = db.users().insertGroup(newGroupDto());
 
     assertThat(underTest.selectGroupNamesByPermissionQuery(dbSession,
       PermissionQuery.builder().build()))
@@ -208,14 +210,14 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_group_permissions_by_group_names_on_global_permissions() {
-    GroupDto group1 = groupDb.insertGroup(newGroupDto().setName("Group-1"));
+    GroupDto group1 = db.users().insertGroup(newGroupDto().setName("Group-1"));
     permissionDb.addGlobalPermissionToGroup(SCAN_EXECUTION, group1.getId());
 
-    GroupDto group2 = groupDb.insertGroup(newGroupDto().setName("Group-2"));
+    GroupDto group2 = db.users().insertGroup(newGroupDto().setName("Group-2"));
     ComponentDto project = componentDb.insertComponent(newProjectDto());
     permissionDb.addProjectPermissionToGroup(UserRole.ADMIN, group2.getId(), project.getId());
 
-    GroupDto group3 = groupDb.insertGroup(newGroupDto().setName("Group-3"));
+    GroupDto group3 = db.users().insertGroup(newGroupDto().setName("Group-3"));
     permissionDb.addGlobalPermissionToGroup(SYSTEM_ADMIN, group3.getId());
 
     // Anyone
@@ -245,14 +247,14 @@ public class GroupPermissionDaoTest {
 
   @Test
   public void select_group_permissions_by_group_names_on_project_permissions() {
-    GroupDto group1 = groupDb.insertGroup(newGroupDto().setName("Group-1"));
+    GroupDto group1 = db.users().insertGroup(newGroupDto().setName("Group-1"));
     permissionDb.addGlobalPermissionToGroup(PROVISIONING, group1.getId());
 
-    GroupDto group2 = groupDb.insertGroup(newGroupDto().setName("Group-2"));
+    GroupDto group2 = db.users().insertGroup(newGroupDto().setName("Group-2"));
     ComponentDto project = componentDb.insertComponent(newProjectDto());
     permissionDb.addProjectPermissionToGroup(USER, group2.getId(), project.getId());
 
-    GroupDto group3 = groupDb.insertGroup(newGroupDto().setName("Group-3"));
+    GroupDto group3 = db.users().insertGroup(newGroupDto().setName("Group-3"));
     permissionDb.addProjectPermissionToGroup(USER, group3.getId(), project.getId());
 
     // Anyone group
@@ -279,4 +281,36 @@ public class GroupPermissionDaoTest {
     assertThat(underTest.selectGroupPermissionsByGroupNamesAndProject(dbSession, Collections.emptyList(), project.getId())).isEmpty();
   }
 
+  @Test
+  public void selectGroupPermissions() {
+    permissionDb.addGlobalPermissionToGroup("perm1", ANYONE_ID);
+    permissionDb.addGlobalPermissionToGroup("perm2", GROUP_1_ID);
+    permissionDb.addGlobalPermissionToGroup("perm3", GROUP_1_ID);
+    permissionDb.addGlobalPermissionToGroup("perm4", GROUP_2_ID);
+    permissionDb.addProjectPermissionToGroup("perm5", GROUP_1_ID, PROJECT_1_ID);
+    permissionDb.addProjectPermissionToGroup("perm6", ANYONE_ID, PROJECT_1_ID);
+
+    // select global permissions on group
+    assertThat(underTest.selectGroupPermissions(dbSession, GROUP_1_ID, null)).containsOnly("perm2", "perm3");
+    assertThat(underTest.selectGroupPermissions(dbSession, UNKNOWN_GROUP_ID, null)).isEmpty();
+
+    // select project permissions on group
+    assertThat(underTest.selectGroupPermissions(dbSession, GROUP_1_ID, PROJECT_1_ID)).containsOnly("perm5");
+    assertThat(underTest.selectGroupPermissions(dbSession, GROUP_1_ID, UNKNOWN_PROJECT_ID)).isEmpty();
+  }
+
+  @Test
+  public void selectAnyonePermissions() {
+    permissionDb.addGlobalPermissionToGroup("perm1", ANYONE_ID);
+    permissionDb.addGlobalPermissionToGroup("perm2", GROUP_1_ID);
+    permissionDb.addProjectPermissionToGroup("perm3", GROUP_1_ID, PROJECT_1_ID);
+    permissionDb.addProjectPermissionToGroup("perm4",ANYONE_ID, PROJECT_1_ID);
+
+    // select global permissions on group
+    assertThat(underTest.selectAnyonePermissions(dbSession, null)).containsOnly("perm1");
+
+    // select project permissions on group
+    assertThat(underTest.selectAnyonePermissions(dbSession, PROJECT_1_ID)).containsOnly("perm4");
+    assertThat(underTest.selectAnyonePermissions(dbSession, UNKNOWN_PROJECT_ID)).isEmpty();
+  }
 }
index a398d5f1293a7fefc6aac81cacfabf9903afa14a..bb64257e3b444e6907f2d06e68793adf5d885b15 100644 (file)
@@ -36,13 +36,8 @@ public class PermissionDbTester {
     this.dbSession = db.getSession();
   }
 
-  public void addGlobalPermissionToUser(String permission, long userId) {
-    dbClient.userPermissionDao().insert(dbSession, new UserPermissionDto(permission, userId, null));
-    db.commit();
-  }
-
   public void addProjectPermissionToGroup(String permission, @Nullable Long groupId, long componentId) {
-    dbClient.roleDao().insertGroupRole(dbSession, new GroupPermissionDto()
+    dbClient.groupPermissionDao().insert(dbSession, new GroupPermissionDto()
       .setRole(permission)
       .setGroupId(groupId)
       .setResourceId(componentId));
@@ -50,7 +45,7 @@ public class PermissionDbTester {
   }
 
   public void addGlobalPermissionToGroup(String permission, @Nullable Long groupId) {
-    dbClient.roleDao().insertGroupRole(dbSession, new GroupPermissionDto()
+    dbClient.groupPermissionDao().insert(dbSession, new GroupPermissionDto()
       .setRole(permission)
       .setGroupId(groupId));
     db.commit();
index 2bfefb3664b9e68ccdbe5e0cab2fa7cbc8b8676a..5b53fef921f9072c6b97d8e08f9f355a800124a3 100644 (file)
@@ -34,16 +34,15 @@ import org.sonar.db.DbTester;
 import org.sonar.db.component.ComponentDto;
 import org.sonar.db.permission.template.PermissionTemplateDbTester;
 import org.sonar.db.permission.template.PermissionTemplateDto;
-import org.sonar.db.user.GroupDbTester;
 import org.sonar.db.user.GroupDto;
 import org.sonar.db.user.RoleDao;
-import org.sonar.db.user.UserDbTester;
 import org.sonar.db.user.UserDto;
 
 import static org.assertj.core.api.Assertions.assertThat;
 import static org.mockito.Mockito.mock;
 import static org.mockito.Mockito.when;
 import static org.sonar.core.permission.GlobalPermissions.SCAN_EXECUTION;
+import static org.sonar.db.user.GroupTesting.newGroupDto;
 
 public class PermissionRepositoryTest {
 
@@ -59,13 +58,10 @@ public class PermissionRepositoryTest {
   @Rule
   public DbTester dbTester = DbTester.create(system2);
 
-  GroupDbTester groupDb = new GroupDbTester(dbTester);
-  UserDbTester userDb = new UserDbTester(dbTester);
-  PermissionTemplateDbTester templateDb = new PermissionTemplateDbTester(dbTester);
-  DbSession session = dbTester.getSession();
-
-  Settings settings = new MapSettings();
-  PermissionRepository underTest = new PermissionRepository(dbTester.getDbClient(), settings);
+  private PermissionTemplateDbTester templateDb = new PermissionTemplateDbTester(dbTester);
+  private DbSession session = dbTester.getSession();
+  private Settings settings = new MapSettings();
+  private PermissionRepository underTest = new PermissionRepository(dbTester.getDbClient(), settings);
 
   @Before
   public void setUp() {
@@ -114,65 +110,6 @@ public class PermissionRepositoryTest {
     dbTester.assertDbUnitTable(getClass(), "apply_default_permission_template-result.xml", "user_roles", "user_id", "resource_id", "role");
   }
 
-  @Test
-  public void should_add_user_permission() {
-    dbTester.prepareDbUnit(getClass(), "should_add_user_permission.xml");
-
-    underTest.insertUserPermission(PROJECT.getId(), 200L, UserRole.ADMIN, session);
-    session.commit();
-
-    dbTester.assertDbUnitTable(getClass(), "should_add_user_permission-result.xml", "user_roles", "user_id", "resource_id", "role");
-    dbTester.assertDbUnitTable(getClass(), "should_add_user_permission-result.xml", "projects", "authorization_updated_at");
-
-    checkAuthorizationUpdatedAtIsUpdated();
-  }
-
-  @Test
-  public void should_delete_user_permission() {
-    dbTester.prepareDbUnit(getClass(), "should_delete_user_permission.xml");
-
-    underTest.deleteUserPermission(PROJECT, "dave.loper", UserRole.ADMIN, session);
-    session.commit();
-
-    dbTester.assertDbUnitTable(getClass(), "should_delete_user_permission-result.xml", "user_roles", "user_id", "resource_id", "role");
-    dbTester.assertDbUnitTable(getClass(), "should_delete_user_permission-result.xml", "projects", "authorization_updated_at");
-    checkAuthorizationUpdatedAtIsUpdated();
-  }
-
-  @Test
-  public void should_insert_group_permission() {
-    dbTester.prepareDbUnit(getClass(), "should_insert_group_permission.xml");
-
-    underTest.insertGroupPermission(PROJECT.getId(), 100L, UserRole.USER, session);
-    session.commit();
-
-    dbTester.assertDbUnitTable(getClass(), "should_insert_group_permission-result.xml", "group_roles", "group_id", "resource_id", "role");
-    dbTester.assertDbUnitTable(getClass(), "should_insert_group_permission-result.xml", "projects", "authorization_updated_at");
-    checkAuthorizationUpdatedAtIsUpdated();
-  }
-
-  @Test
-  public void should_insert_group_name_permission() {
-    dbTester.prepareDbUnit(getClass(), "should_insert_group_permission.xml");
-
-    underTest.insertGroupPermission(PROJECT.getId(), "devs", UserRole.USER, session);
-    session.commit();
-
-    dbTester.assertDbUnitTable(getClass(), "should_insert_group_permission-result.xml", "group_roles", "group_id", "resource_id", "role");
-    dbTester.assertDbUnitTable(getClass(), "should_insert_group_permission-result.xml", "projects", "authorization_updated_at");
-  }
-
-  @Test
-  public void should_insert_anyone_group_permission() {
-    dbTester.prepareDbUnit(getClass(), "should_insert_anyone_group_permission.xml");
-
-    underTest.insertGroupPermission(PROJECT.getId(), "Anyone", UserRole.USER, session);
-    session.commit();
-
-    dbTester.assertDbUnitTable(getClass(), "should_insert_anyone_group_permission-result.xml", "group_roles", "group_id", "resource_id", "role");
-    dbTester.assertDbUnitTable(getClass(), "should_insert_anyone_group_permission-result.xml", "projects", "authorization_updated_at");
-  }
-
   @Test
   public void should_delete_group_permission() {
     dbTester.prepareDbUnit(getClass(), "should_delete_group_permission.xml");
@@ -187,9 +124,9 @@ public class PermissionRepositoryTest {
 
   @Test
   public void would_user_have_permission_with_default_permission_template() {
-    UserDto user = userDb.insertUser();
-    GroupDto group = groupDb.insertGroup();
-    groupDb.addUserToGroup(user.getId(), group.getId());
+    UserDto user = dbTester.users().insertUser();
+    GroupDto group = dbTester.users().insertGroup(newGroupDto());
+    dbTester.users().insertMember(group, user);
     PermissionTemplateDto template = templateDb.insertTemplate();
     setDefaultTemplateUuid(template.getUuid());
     templateDb.addProjectCreatorToTemplate(template.getId(), SCAN_EXECUTION);
index d6c2af7f53b4cf35c3db589047634de8e4da227a..6b9f7a6f7084222f5c56a6686d9ac1ac40f7f874 100644 (file)
@@ -320,14 +320,14 @@ public class UserPermissionDaoTest {
   }
 
   private UserPermissionDto insertGlobalPermission(String permission, long userId) {
-    UserPermissionDto dto = new UserPermissionDto(permission, userId, null);
+    UserPermissionDto dto = new UserPermissionDto(dbTester.getDefaultOrganization().getUuid(), permission, userId, null);
     underTest.insert(dbTester.getSession(), dto);
     dbTester.commit();
     return dto;
   }
 
   private UserPermissionDto insertProjectPermission(String permission, long userId, long projectId) {
-    UserPermissionDto dto = new UserPermissionDto(permission, userId, projectId);
+    UserPermissionDto dto = new UserPermissionDto(dbTester.getDefaultOrganization().getUuid(), permission, userId, projectId);
     underTest.insert(dbTester.getSession(), dto);
     dbTester.commit();
     return dto;
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/fail_when_no_default_template_is_defined.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/fail_when_no_default_template_is_defined.xml
deleted file mode 100644 (file)
index 1fffc1f..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-<dataset>
-
-  <projects id="123" kee="project"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles-result.xml
deleted file mode 100644 (file)
index 9ead92b..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="com.foo:bar"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!--
-  new rows : sonar-administrators (admin), sonar-users (user & codeviewer), Anyone (user & codeviewer),
-   -->
-  <group_roles id="3"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-  <group_roles id="4"
-               group_id="101"
-               resource_id="123"
-               role="user"/>
-  <group_roles id="5"
-               group_id="[null]"
-               resource_id="123"
-               role="user"/>
-  <group_roles id="6"
-               group_id="101"
-               resource_id="123"
-               role="codeviewer"/>
-  <group_roles id="7"
-               group_id="[null]"
-               resource_id="123"
-               role="codeviewer"/>
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default_template_20130101_010203"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="2"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="user"/>
-  <perm_templates_groups id="4"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="5"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-  <perm_templates_users/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles.xml
deleted file mode 100644 (file)
index 609b3e5..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<dataset>
-
-  <projects id="123"
-            kee="com.foo:bar"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default_template_20130101_010203"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="2"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="user"/>
-  <perm_templates_groups id="4"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="5"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-  <perm_templates_users/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern-result.xml
deleted file mode 100644 (file)
index 3402bd2..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <groups id="102"
-          name="sonar-foos"/>
-  <groups id="103"
-          name="sonar-bars"/>
-
-  <users id="200"
-         login="foo"
-         name="Foo"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-  <users id="201"
-         login="bar"
-         name="Bar"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!--
-  new rows
-   -->
-  <group_roles id="3"
-               group_id="102"
-               resource_id="123"
-               role="user"/>
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default"
-                        key_pattern="[null]"/>
-
-  <permission_templates id="2"
-                        name="Start with foo"
-                        kee="foo_tmpl"
-                        key_pattern="foo\..*"/>
-  <permission_templates id="3"
-                        name="Start with bar"
-                        kee="bar_tmpl"
-                        key_pattern="bar\..*"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-
-  <perm_templates_groups id="2"
-                         template_id="2"
-                         group_id="102"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="3"
-                         group_id="103"
-                         permission_reference="user"/>
-
-  <perm_templates_users/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesPattern.xml
deleted file mode 100644 (file)
index fa4c829..0000000
+++ /dev/null
@@ -1,73 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <groups id="102"
-          name="sonar-foos"/>
-  <groups id="103"
-          name="sonar-bars"/>
-
-  <users id="200"
-         login="foo"
-         name="Foo"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-  <users id="201"
-         login="bar"
-         name="Bar"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default"
-                        key_pattern="[null]"/>
-
-  <permission_templates id="2"
-                        name="Start with foo"
-                        kee="foo_tmpl"
-                        key_pattern="foo\..*"/>
-  <permission_templates id="3"
-                        name="Start with bar"
-                        kee="bar_tmpl"
-                        key_pattern="bar\..*"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-
-  <perm_templates_groups id="2"
-                         template_id="2"
-                         group_id="102"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="3"
-                         group_id="103"
-                         permission_reference="user"/>
-
-  <perm_templates_users/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject-result.xml
deleted file mode 100644 (file)
index e79b0f2..0000000
+++ /dev/null
@@ -1,114 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- created permissions should be based on the TRK template -->
-  <group_roles id="3"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-  <group_roles id="4"
-               group_id="101"
-               resource_id="123"
-               role="admin"/>
-  <group_roles id="5"
-               group_id="100"
-               resource_id="123"
-               role="user"/>
-  <group_roles id="6"
-               group_id="100"
-               resource_id="123"
-               role="codeviewer"/>
-  <group_roles id="7"
-               group_id="[null]"
-               resource_id="123"
-               role="codeviewer"/>
-
-  <user_roles id="2"
-              user_id="200"
-              resource_id="123"
-              role="codeviewer"/>
-
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="2"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="user"/>
-  <perm_templates_groups id="4"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="5"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-
-  <!-- default permission template for TRK -->
-  <permission_templates id="2"
-                        name="default_for_TRK"/>
-
-  <perm_templates_groups id="6"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="7"
-                         template_id="2"
-                         group_id="101"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="8"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="user"/>
-  <perm_templates_groups id="9"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="10"
-                         template_id="2"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-  <perm_templates_users id="1"
-                        template_id="2"
-                        user_id="200"
-                        permission_reference="codeviewer"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesProject.xml
deleted file mode 100644 (file)
index 1cd2d2c..0000000
+++ /dev/null
@@ -1,89 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default_20130101_010203"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="2"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="user"/>
-  <perm_templates_groups id="4"
-                         template_id="1"
-                         group_id="101"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="5"
-                         template_id="1"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-
-  <!-- default permission template for TRK -->
-  <permission_templates id="2"
-                        name="default_for_TRK"
-                        kee="default_for_trk_20130101_010203"/>
-
-  <perm_templates_groups id="6"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="7"
-                         template_id="2"
-                         group_id="101"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="8"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="user"/>
-  <perm_templates_groups id="9"
-                         template_id="2"
-                         group_id="100"
-                         permission_reference="codeviewer"/>
-  <perm_templates_groups id="10"
-                         template_id="2"
-                         group_id="[null]"
-                         permission_reference="codeviewer"/>
-
-  <perm_templates_users id="1"
-                        template_id="2"
-                        user_id="200"
-                        permission_reference="codeviewer"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesSeveralPattern.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRolesSeveralPattern.xml
deleted file mode 100644 (file)
index 231a7cd..0000000
+++ /dev/null
@@ -1,73 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <groups id="102"
-          name="sonar-foos"/>
-  <groups id="103"
-          name="sonar-bars"/>
-
-  <users id="200"
-         login="foo"
-         name="Foo"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-  <users id="201"
-         login="bar"
-         name="Bar"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-
-  <!-- default permission template for all qualifiers -->
-  <permission_templates id="1"
-                        name="default"
-                        kee="default"
-                        key_pattern="[null]"/>
-
-  <permission_templates id="2"
-                        name="Start with foo"
-                        kee="foo_tmpl"
-                        key_pattern="foo\..*"/>
-  <permission_templates id="3"
-                        name="Start with foo again"
-                        kee="foo2_tmpl"
-                        key_pattern="foo.*"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-
-  <perm_templates_groups id="2"
-                         template_id="2"
-                         group_id="102"
-                         permission_reference="user"/>
-  <perm_templates_groups id="3"
-                         template_id="3"
-                         group_id="103"
-                         permission_reference="user"/>
-
-  <perm_templates_users/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group-result.xml
deleted file mode 100644 (file)
index fa6f0be..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- new rows : sonar-administrators (admin) -->
-  <group_roles id="3"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-
-  <!-- default permission template -->
-  <permission_templates id="1"
-                        name="default_template"
-                        kee="default_template_20130101_010203"/>
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_unknown_group.xml
deleted file mode 100644 (file)
index 0f911d4..0000000
+++ /dev/null
@@ -1,44 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- default permission template for TRK -->
-  <permission_templates id="1"
-                        name="default_template"
-                        kee="default_template_20130101_010203"/>
-
-  <perm_templates_groups id="1"
-                         template_id="1"
-                         group_id="100"
-                         permission_reference="admin"/>
-  <perm_templates_groups id="2"
-                         template_id="1"
-                         group_id="999"
-                         permission_reference="admin"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users-result.xml
deleted file mode 100644 (file)
index eb800a9..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-  <users id="201"
-         login="disabled"
-         name="Disabled"
-         email="[null]"
-         active="[false]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- new row : marius (admin) -->
-  <user_roles id="2"
-              user_id="200"
-              resource_id="123"
-              role="admin"/>
-
-  <!-- default permission template for TRK -->
-  <permission_templates id="1"
-                        name="default_for_TRK"
-                        kee="default_for_trk_20130101_010203"/>
-
-  <perm_templates_users id="1"
-                        template_id="1"
-                        user_id="200"
-                        permission_reference="admin"/>
-  <perm_templates_users id="2"
-                        template_id="1"
-                        user_id="201"
-                        permission_reference="admin"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantDefaultRoles_users.xml
deleted file mode 100644 (file)
index c56ed11..0000000
+++ /dev/null
@@ -1,50 +0,0 @@
-<dataset>
-  <projects id="123"
-            kee="foo.project"/>
-
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-  <users id="201"
-         login="disabled"
-         name="Disabled"
-         email="[null]"
-         active="[false]"
-         is_root="[false]"/>
-
-  <!-- on other resources -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="1"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="101"
-               resource_id="1"
-               role="user"/>
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- default permission template for TRK -->
-  <permission_templates id="1"
-                        name="default_for_TRK"
-                        kee="default_for_trk_20130101_010203"/>
-
-  <perm_templates_users id="1"
-                        template_id="1"
-                        user_id="200"
-                        permission_reference="admin"/>
-  <perm_templates_users id="2"
-                        template_id="1"
-                        user_id="201"
-                        permission_reference="admin"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole-result.xml
deleted file mode 100644 (file)
index 9d3ae47..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <group_roles group_id="100" resource_id="123" role="admin"/>
-</dataset>
\ No newline at end of file
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole.xml
deleted file mode 100644 (file)
index 8e0c38f..0000000
+++ /dev/null
@@ -1,4 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone-result.xml
deleted file mode 100644 (file)
index 62ecece..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <group_roles id="1" group_id="[null]" resource_id="123" role="admin"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_anyone.xml
deleted file mode 100644 (file)
index 8e0c38f..0000000
+++ /dev/null
@@ -1,4 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found-result.xml
deleted file mode 100644 (file)
index 41ed8af..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <!-- already existed -->
-  <group_roles id="1" group_id="[null]" resource_id="123" role="admin"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_group_not_found.xml
deleted file mode 100644 (file)
index 41ed8af..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <!-- already existed -->
-  <group_roles id="1" group_id="[null]" resource_id="123" role="admin"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted-result.xml
deleted file mode 100644 (file)
index 41ed8af..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <!-- already existed -->
-  <group_roles id="1" group_id="[null]" resource_id="123" role="admin"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantGroupRole_ignore_if_not_persisted.xml
deleted file mode 100644 (file)
index 41ed8af..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-<dataset>
-  <groups id="100" name="sonar-administrators"/>
-  <groups id="101" name="sonar-users"/>
-
-  <!-- already existed -->
-  <group_roles id="1" group_id="[null]" resource_id="123" role="admin"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole-result.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole-result.xml
deleted file mode 100644 (file)
index 0710211..0000000
+++ /dev/null
@@ -1,13 +0,0 @@
-<dataset>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <user_roles user_id="200"
-              resource_id="123"
-              role="admin"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/grantUserRole.xml
deleted file mode 100644 (file)
index 9b20620..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<dataset>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/hasRoles.xml b/sonar-db/src/test/resources/org/sonar/core/resource/DefaultResourcePermissionsTest/hasRoles.xml
deleted file mode 100644 (file)
index a24d8cb..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-<dataset>
-  <groups id="100"
-          name="sonar-administrators"/>
-  <groups id="101"
-          name="sonar-users"/>
-  <users id="200"
-         login="marius"
-         name="Marius"
-         email="[null]"
-         active="[true]"
-         is_root="[false]"/>
-
-  <!-- only_users -->
-  <user_roles id="1"
-              user_id="200"
-              resource_id="1"
-              role="admin"/>
-
-  <!-- only_groups -->
-  <group_roles id="1"
-               group_id="100"
-               resource_id="2"
-               role="admin"/>
-
-  <!-- groups_and_users -->
-  <group_roles id="2"
-               group_id="101"
-               resource_id="3"
-               role="user"/>
-  <user_roles id="2"
-              user_id="200"
-              resource_id="3"
-              role="admin"/>
-
-</dataset>
index edee0fdd08c961cab3b4f2fe8edb2357b2241cab..82ffcce1b25a063884990928316b8c47c1990d65 100644 (file)
@@ -3,7 +3,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index 6bad834a95b94078210fb9b24135ddea0370324a..5b3b2431da406d781656acd1ad59932516bf9e34 100644 (file)
@@ -5,7 +5,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index e36e5b909f29a5f9632ec3a2fc4565dc64a105bb..749bd6e5ba1c73a94ba36d81752891b0a944b235 100644 (file)
@@ -5,7 +5,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index ac23aa7233e32cebd015fc0f6ba602097f43650d..b9e79133a134bf53be02ff23ed89002815a74813 100644 (file)
@@ -4,11 +4,13 @@
   <user_roles id="1"
               user_id="100"
               resource_id="300"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="100"
               resource_id="400"
-              role="codeviewer"/>
+              role="codeviewer"
+              organization_uuid="org1"/>
 
   <projects id="300"
             kee="pj-w-snapshot"
index 93356a34bdabd5422072dd36bc6171f177b2c51f..edbc14d2a5781cf7b7515ed8448deb8d0e4dc823 100644 (file)
@@ -4,15 +4,18 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="101"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="3"
               user_id="102"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
 
   <groups_users user_id="100"
                 group_id="200"/>
index 3b7278e4c0a5ced4de8df4f7ecbf00f1c57565a8..0c6ecc21c5248aeb869a1b20b28f8970153c46a5 100644 (file)
@@ -4,15 +4,18 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="101"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="3"
               user_id="102"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
 
   <groups_users user_id="100"
                 group_id="200"/>
index 173657868ecc0045c4b2bf882de55afc1f3d75d7..e24046e8ea20d0fe99157b02a65f34129e29ef1b 100644 (file)
@@ -4,19 +4,23 @@
   <user_roles id="1"
               user_id="100"
               resource_id="300"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="101"
               resource_id="300"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="3"
               user_id="102"
               resource_id="300"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
   <user_roles id="4"
               user_id="100"
               resource_id="400"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
 
   <groups_users user_id="100"
                 group_id="200"/>
index 515b647b270c93f5e0de024094e1378bc412e9ac..69d6d1deac141b2c4c7c77b2c9b9859202a66ebb 100644 (file)
@@ -1,11 +1,23 @@
 <dataset>
 
-  <user_roles id="1" user_id="100" resource_id="[null]" role="user"/>
+  <user_roles id="1"
+              user_id="100"
+              resource_id="[null]"
+              role="user"
+              organization_uuid="org1"/>
 
-  <groups_users user_id="1" group_id="200"/>
-  <groups_users user_id="1" group_id="201"/>
+  <groups_users user_id="1"
+                group_id="200"/>
+  <groups_users user_id="1"
+                group_id="201"/>
 
-  <group_roles id="200" group_id="[null]" resource_id="[null]" role="user"/>
-  <group_roles id="201" group_id="[null]" resource_id="[null]" role="admin"/>
+  <group_roles id="200"
+               group_id="[null]"
+               resource_id="[null]"
+               role="user"/>
+  <group_roles id="201"
+               group_id="[null]"
+               resource_id="[null]"
+               role="admin"/>
 
 </dataset>
index 2478b403566743dda2bb5692a950fe7ad8b72bbf..7349539dd9eb7a84df14b9c3dee9ae59f20a84aa 100644 (file)
@@ -3,7 +3,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index 09588924dc94a380ed18561b8e3da864ed35254f..feedb08c4aff239c4ef267fec3501471bb3479cc 100644 (file)
@@ -5,7 +5,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="999"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index 19098f180fea89983e1b56e7244991245a1a51cb..66b1d888164264ff9a11fbc16e5bcba4301d6dbf 100644 (file)
@@ -4,7 +4,8 @@
   <user_roles id="1"
               user_id="100"
               resource_id="300"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index 176e9eb9c3ed7239bcc6d3cca0dfcb35a0400e9d..1c5b029197291a138787100cfa6c09979b00bc2b 100644 (file)
@@ -4,11 +4,13 @@
   <user_roles id="1"
               user_id="100"
               resource_id="300"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <user_roles id="2"
               user_id="100"
               resource_id="400"
-              role="user"/>
+              role="user"
+              organization_uuid="org1"/>
   <groups_users user_id="100"
                 group_id="200"/>
   <group_roles id="1"
index 69ef3dc8a0ab7d0151afdab477416465d7691a49..2d06c000c5f6b77de783c09113b9f9ad05d93732 100644 (file)
             id="123"/>
 
   <groups id="100"
-          name="sonar-administrators"/>
+          name="sonar-administrators"
+          organization_uuid="org1"/>
   <groups id="101"
-          name="sonar-users"/>
+          name="sonar-users"
+          organization_uuid="org1"/>
 
   <users id="200"
          login="marius"
   <user_roles id="1"
               user_id="200"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
 
   <!-- default permission template for all qualifiers -->
   <permission_templates id="1"
                         name="default"
-                        kee="default_20130101_010203"/>
+                        kee="default_20130101_010203"
+                        organization_uuid="org1"/>
 
   <perm_templates_groups id="1"
                          template_id="1"
index fbb7723c0b9e1a6b8af269d3a331d04d14e83e4f..f6766db51cc2240bcc0350a061a06c62ed9c27d3 100644 (file)
             id="123"/>
 
   <groups id="100"
-          name="sonar-administrators"/>
+          name="sonar-administrators"
+          organization_uuid="org1"/>
   <groups id="101"
-          name="sonar-users"/>
+          name="sonar-users"
+          organization_uuid="org1"/>
 
   <users id="200"
          login="marius"
   <user_roles id="1"
               user_id="200"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
 
   <!-- default permission template for all qualifiers -->
   <permission_templates id="1"
                         name="default"
-                        kee="default_20130101_010203"/>
+                        kee="default_20130101_010203"
+                        organization_uuid="org1"/>
 
   <perm_templates_groups id="1"
                          template_id="1"
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission-result.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission-result.xml
deleted file mode 100644 (file)
index 893a26c..0000000
+++ /dev/null
@@ -1,34 +0,0 @@
-<dataset>
-
-  <users id="200"
-         login="dave.loper"
-         name="Dave Loper"
-         email="dave.loper@company.net"
-         active="[true]"
-         is_root="[false]"/>
-
-  <user_roles id="1"
-              user_id="200"
-              resource_id="123"
-              role="user"/>
-  <user_roles id="2"
-              user_id="200"
-              resource_id="123"
-              role="admin"/>
-
-  <projects id="100"
-            root_id="[null]"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_add_user_permission.xml
deleted file mode 100644 (file)
index d05c847..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-<dataset>
-
-  <users id="200"
-         login="dave.loper"
-         name="Dave Loper"
-         email="dave.loper@company.net"
-         active="[true]"
-         is_root="[false]"/>
-
-  <user_roles id="1"
-              user_id="200"
-              resource_id="123"
-              role="user"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-</dataset>
index 49d49e682dfb5efb9b6bd1e0e9ed6415ba48b1a1..02d96a190728f3f2055f735d1767cdfbfcaa3e83 100644 (file)
             id="123"/>
 
   <groups id="100"
-          name="sonar-administrators"/>
+          name="sonar-administrators"
+          organization_uuid="org1"/>
   <groups id="101"
-          name="sonar-users"/>
+          name="sonar-users"
+          organization_uuid="org1"/>
 
   <users id="200"
          login="marius"
   <user_roles id="1"
               user_id="200"
               resource_id="1"
-              role="admin"/>
+              role="admin"
+              organization_uuid="org1"/>
 
 
   <!-- default permission template for all qualifiers -->
   <permission_templates id="1"
                         name="default"
-                        kee="default_20130101_010203"/>
+                        kee="default_20130101_010203"
+                        organization_uuid="org1"/>
 
   <perm_templates_groups id="1"
                          template_id="1"
index 930c3265d8ec6102fb56a9612d756e04b0323030..6411c7d483222c45a5c9466ed63c15b64a7c3ad4 100644 (file)
@@ -1,7 +1,8 @@
 <dataset>
 
   <groups id="100"
-          name="devs"/>
+          name="devs"
+          organization_uuid="org1"/>
 
   <group_roles id="1"
                group_id="100"
index b39a3dfe4bb6f32582d8b157d18d8e9ddd04fe01..003db1cfaa537988577952ea858bfaedcfd8bc0b 100644 (file)
@@ -1,7 +1,8 @@
 <dataset>
 
   <groups id="100"
-          name="devs"/>
+          name="devs"
+          organization_uuid="org1"/>
 
   <group_roles id="1"
                group_id="100"
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission-result.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission-result.xml
deleted file mode 100644 (file)
index d05c847..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-<dataset>
-
-  <users id="200"
-         login="dave.loper"
-         name="Dave Loper"
-         email="dave.loper@company.net"
-         active="[true]"
-         is_root="[false]"/>
-
-  <user_roles id="1"
-              user_id="200"
-              resource_id="123"
-              role="user"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_delete_user_permission.xml
deleted file mode 100644 (file)
index 4cdf709..0000000
+++ /dev/null
@@ -1,36 +0,0 @@
-<dataset>
-
-  <users id="200"
-         login="dave.loper"
-         name="Dave Loper"
-         email="dave.loper@company.net"
-         active="[true]"
-         is_root="[false]"/>
-
-  <user_roles id="1"
-              user_id="200"
-              resource_id="123"
-              role="user"/>
-  <user_roles id="2"
-              user_id="200"
-              resource_id="123"
-              role="admin"/>
-
-  <projects uuid="THE_PROJECT_UUID"
-            uuid_path="NOT_USED"
-            root_uuid="THE_PROJECT_UUID"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission-result.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission-result.xml
deleted file mode 100644 (file)
index e4ce3ca..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-<dataset>
-
-  <groups id="100"
-          name="devs"/>
-
-  <group_roles id="1"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="[null]"
-               resource_id="123"
-               role="user"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_anyone_group_permission.xml
deleted file mode 100644 (file)
index 63bc614..0000000
+++ /dev/null
@@ -1,29 +0,0 @@
-<dataset>
-
-  <groups id="100"
-          name="devs"/>
-
-  <group_roles id="1"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission-result.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission-result.xml
deleted file mode 100644 (file)
index b39a3df..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-<dataset>
-
-  <groups id="100"
-          name="devs"/>
-
-  <group_roles id="1"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-  <group_roles id="2"
-               group_id="100"
-               resource_id="123"
-               role="user"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-</dataset>
diff --git a/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission.xml b/sonar-db/src/test/resources/org/sonar/db/permission/PermissionRepositoryTest/should_insert_group_permission.xml
deleted file mode 100644 (file)
index 930c326..0000000
+++ /dev/null
@@ -1,28 +0,0 @@
-<dataset>
-
-  <groups id="100"
-          name="devs"/>
-
-  <group_roles id="1"
-               group_id="100"
-               resource_id="123"
-               role="admin"/>
-
-  <projects uuid="A"
-            uuid_path="NOT_USED"
-            root_uuid="A"
-            scope="PRJ"
-            qualifier="TRK"
-            kee="org.struts:struts"
-            name="Struts"
-            description="the description"
-            long_name="Apache Struts"
-            enabled="[true]"
-            language="java"
-            copy_component_uuid="[null]"
-            developer_uuid="[null]"
-            path="[null]"
-            authorization_updated_at="123456789"
-            id="123"/>
-
-</dataset>