blob: dadff03b5db3a3b90c2d2b22c7ebc8039210e9e5 [file] [log] [blame]
sg481n43854a92017-08-03 17:27:34 -04001set XX@NS <pass>
2set testid@aaf.att.com <pass>
3set testunused@aaf.att.com <pass>
4set bogus boguspass
5#delay 10
6set NFR 0
7as testid@aaf.att.com
8# TC_Perm2.10.0.POS Print NS to prove ok
9ns list name com.test.TC_Perm2.@[user.name]
10** Expect 200 **
11
12List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
13--------------------------------------------------------------------------------
14 *** Namespace Not Found ***
15
16# TC_Perm2.10.1.POS Create Namespace with valid IDs and Responsible Parties
17ns create com.test.TC_Perm2.@[user.name] @[user.name] testid@aaf.att.com
18** Expect 201 **
19Created Namespace
20
21as testid@aaf.att.com
22# TC_Perm2.20.1.POS List Data on non-Empty NS
23ns list name com.test.TC_Perm2.@[user.name]
24** Expect 200 **
25
26List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
27--------------------------------------------------------------------------------
28com.test.TC_Perm2.@[THE_USER]
29 Administrators
30 testid@aaf.att.com
31 Responsible Parties
32 @[THE_USER]@csp.att.com
33 Roles
34 com.test.TC_Perm2.@[THE_USER].admin
35 com.test.TC_Perm2.@[THE_USER].owner
36 Permissions
37 com.test.TC_Perm2.@[THE_USER].access * *
38 com.test.TC_Perm2.@[THE_USER].access * read
39
40# TC_Perm2.20.10.POS Add Perms with specific Instance and Action
41perm create com.test.TC_Perm2.@[user.name].p.A myInstance myAction
42** Expect 201 **
43Created Permission
44
45# TC_Perm2.20.11.POS Add Perms with specific Instance and Star
46perm create com.test.TC_Perm2.@[user.name].p.A myInstance *
47** Expect 201 **
48Created Permission
49
50# TC_Perm2.20.12.POS Add Perms with Stars for Instance and Action
51perm create com.test.TC_Perm2.@[user.name].p.A * *
52** Expect 201 **
53Created Permission
54
55perm create com.test.TC_Perm2.@[user.name].p.phoneCalls * spy
56** Expect 201 **
57Created Permission
58
59# TC_Perm2.20.20.POS Create role
60role create com.test.TC_Perm2.@[user.name].p.superUser
61** Expect 201 **
62Created Role
63
64role create com.test.TC_Perm2.@[user.name].p.secret
65** Expect 201 **
66Created Role
67
68# TC_Perm2.20.21.POS Grant sub-NS perms to role
69perm grant com.test.TC_Perm2.@[user.name].p.A myInstance myAction com.test.TC_Perm2.@[user.name].p.superUser
70** Expect 201 **
71Granted Permission [com.test.TC_Perm2.@[THE_USER].p.A|myInstance|myAction] to Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
72
73perm grant com.test.TC_Perm2.@[user.name].p.A myInstance * com.test.TC_Perm2.@[user.name].p.superUser
74** Expect 201 **
75Granted Permission [com.test.TC_Perm2.@[THE_USER].p.A|myInstance|*] to Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
76
77perm grant com.test.TC_Perm2.@[user.name].p.A * * com.test.TC_Perm2.@[user.name].p.superUser
78** Expect 201 **
79Granted Permission [com.test.TC_Perm2.@[THE_USER].p.A|*|*] to Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
80
81perm grant com.test.TC_Perm2.@[user.name].p.phoneCalls * spy com.test.TC_Perm2.@[user.name].p.secret
82** Expect 201 **
83Granted Permission [com.test.TC_Perm2.@[THE_USER].p.phoneCalls|*|spy] to Role [com.test.TC_Perm2.@[THE_USER].p.secret]
84
85# TC_Perm2.20.30.POS List Data on non-Empty NS
86ns list name com.test.TC_Perm2.@[user.name]
87** Expect 200 **
88
89List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
90--------------------------------------------------------------------------------
91com.test.TC_Perm2.@[THE_USER]
92 Administrators
93 testid@aaf.att.com
94 Responsible Parties
95 @[THE_USER]@csp.att.com
96 Roles
97 com.test.TC_Perm2.@[THE_USER].admin
98 com.test.TC_Perm2.@[THE_USER].owner
99 com.test.TC_Perm2.@[THE_USER].p.secret
100 com.test.TC_Perm2.@[THE_USER].p.superUser
101 Permissions
102 com.test.TC_Perm2.@[THE_USER].access * *
103 com.test.TC_Perm2.@[THE_USER].access * read
104 com.test.TC_Perm2.@[THE_USER].p.A * *
105 com.test.TC_Perm2.@[THE_USER].p.A myInstance *
106 com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
107 com.test.TC_Perm2.@[THE_USER].p.phoneCalls * spy
108
109# TC_Perm2.20.40.POS Create role
110role create com.test.TC_Perm2.@[user.name].p.watcher
111** Expect 201 **
112Created Role
113
114as XX@NS
115# TC_Perm2.20.50.POS Grant view perms to watcher role
116perm create com.att.aaf.perm :com.test.TC_Perm2.@[user.name].p.A:myInstance:myAction view com.test.TC_Perm2.@[user.name].p.watcher
117** Expect 201 **
118Created Permission
119Granted Permission [com.att.aaf.perm|:com.test.TC_Perm2.@[THE_USER].p.A:myInstance:myAction|view] to Role [com.test.TC_Perm2.@[THE_USER].p.watcher]
120
121perm create com.att.aaf.perm :com.test.TC_Perm2.@[user.name].p.A:*:* view com.test.TC_Perm2.@[user.name].p.watcher
122** Expect 201 **
123Created Permission
124Granted Permission [com.att.aaf.perm|:com.test.TC_Perm2.@[THE_USER].p.A:*:*|view] to Role [com.test.TC_Perm2.@[THE_USER].p.watcher]
125
126as testid@aaf.att.com
127# TC_Perm2.30.1.POS List Data on non-Empty NS
128ns list name com.test.TC_Perm2.@[user.name]
129** Expect 200 **
130
131List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
132--------------------------------------------------------------------------------
133com.test.TC_Perm2.@[THE_USER]
134 Administrators
135 testid@aaf.att.com
136 Responsible Parties
137 @[THE_USER]@csp.att.com
138 Roles
139 com.test.TC_Perm2.@[THE_USER].admin
140 com.test.TC_Perm2.@[THE_USER].owner
141 com.test.TC_Perm2.@[THE_USER].p.secret
142 com.test.TC_Perm2.@[THE_USER].p.superUser
143 com.test.TC_Perm2.@[THE_USER].p.watcher
144 Permissions
145 com.test.TC_Perm2.@[THE_USER].access * *
146 com.test.TC_Perm2.@[THE_USER].access * read
147 com.test.TC_Perm2.@[THE_USER].p.A * *
148 com.test.TC_Perm2.@[THE_USER].p.A myInstance *
149 com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
150 com.test.TC_Perm2.@[THE_USER].p.phoneCalls * spy
151
152# TC_Perm2.30.2.POS Create Sub-ns when Roles that exist
153ns create com.test.TC_Perm2.@[user.name].p @[user.name] testid@aaf.att.com
154** Expect 201 **
155Created Namespace
156
157# TC_Perm2.30.3.POS List Data on NS with sub-roles
158ns list name com.test.TC_Perm2.@[user.name]
159** Expect 200 **
160
161List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
162--------------------------------------------------------------------------------
163com.test.TC_Perm2.@[THE_USER]
164 Administrators
165 testid@aaf.att.com
166 Responsible Parties
167 @[THE_USER]@csp.att.com
168 Roles
169 com.test.TC_Perm2.@[THE_USER].admin
170 com.test.TC_Perm2.@[THE_USER].owner
171 Permissions
172 com.test.TC_Perm2.@[THE_USER].access * *
173 com.test.TC_Perm2.@[THE_USER].access * read
174
175ns list name com.test.TC_Perm2.@[user.name].p
176** Expect 200 **
177
178List Namespaces by Name[com.test.TC_Perm2.@[THE_USER].p]
179--------------------------------------------------------------------------------
180com.test.TC_Perm2.@[THE_USER].p
181 Administrators
182 testid@aaf.att.com
183 Responsible Parties
184 @[THE_USER]@csp.att.com
185 Roles
186 com.test.TC_Perm2.@[THE_USER].p.admin
187 com.test.TC_Perm2.@[THE_USER].p.owner
188 com.test.TC_Perm2.@[THE_USER].p.secret
189 com.test.TC_Perm2.@[THE_USER].p.superUser
190 com.test.TC_Perm2.@[THE_USER].p.watcher
191 Permissions
192 com.test.TC_Perm2.@[THE_USER].p.A * *
193 com.test.TC_Perm2.@[THE_USER].p.A myInstance *
194 com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
195 com.test.TC_Perm2.@[THE_USER].p.access * *
196 com.test.TC_Perm2.@[THE_USER].p.access * read
197 com.test.TC_Perm2.@[THE_USER].p.phoneCalls * spy
198
199as testunused@aaf.att.com
200# TC_Perm2.40.1.NEG Non-admin, not granted user should not view
201perm list name com.test.TC_Perm2.@[user.name].p.A
202** Expect 200 **
203
204List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
205--------------------------------------------------------------------------------
206PERM Type Instance Action
207--------------------------------------------------------------------------------
208
209
210as testid@aaf.att.com
211# Tens test user granted to permission
212# TC_Perm2.40.10.POS Add user to superUser role
213user role add testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.superUser
214** Expect 201 **
215Added Role [com.test.TC_Perm2.@[THE_USER].p.superUser] to User [testunused@aaf.att.com]
216
217as testunused@aaf.att.com
218# TC_Perm2.40.11.POS Non-admin, granted user should view
219perm list name com.test.TC_Perm2.@[user.name].p.A
220** Expect 200 **
221
222List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
223--------------------------------------------------------------------------------
224PERM Type Instance Action
225--------------------------------------------------------------------------------
226com.test.TC_Perm2.@[THE_USER].p.A * *
227com.test.TC_Perm2.@[THE_USER].p.A myInstance *
228com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
229
230
231as testid@aaf.att.com
232# TC_Perm2.40.12.POS Ungrant perm with wildcards
233perm ungrant com.test.TC_Perm2.@[user.name].p.A * * com.test.TC_Perm2.@[user.name].p.superUser
234** Expect 200 **
235UnGranted Permission [com.test.TC_Perm2.@[THE_USER].p.A|*|*] from Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
236
237as testunused@aaf.att.com
238# TC_Perm2.40.13.POS Non-admin, granted user should view
239perm list name com.test.TC_Perm2.@[user.name].p.A
240** Expect 200 **
241
242List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
243--------------------------------------------------------------------------------
244PERM Type Instance Action
245--------------------------------------------------------------------------------
246com.test.TC_Perm2.@[THE_USER].p.A myInstance *
247com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
248
249
250as testid@aaf.att.com
251# TC_Perm2.40.19.POS Remove user from superUser role
252user role del testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.superUser
253** Expect 200 **
254Removed Role [com.test.TC_Perm2.@[THE_USER].p.superUser] from User [testunused@aaf.att.com]
255
256# Twenties test user granted explicit view permission
257# TC_Perm2.40.20.POS Add user to watcher role
258user role add testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.watcher
259** Expect 201 **
260Added Role [com.test.TC_Perm2.@[THE_USER].p.watcher] to User [testunused@aaf.att.com]
261
262as testunused@aaf.att.com
263# TC_Perm2.40.21.NEG Non-admin, granted explicit view perm user should view
264perm list name com.test.TC_Perm2.@[user.name].p.A
265** Expect 200 **
266
267List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
268--------------------------------------------------------------------------------
269PERM Type Instance Action
270--------------------------------------------------------------------------------
271
272
273as XX@NS
274# TC_Perm2.40.22.POS Ungrant perm with wildcards
275perm ungrant com.att.aaf.perm :com.test.TC_Perm2.@[user.name].p.A:*:* view com.test.TC_Perm2.@[user.name].p.watcher
276** Expect 200 **
277UnGranted Permission [com.att.aaf.perm|:com.test.TC_Perm2.@[THE_USER].p.A:*:*|view] from Role [com.test.TC_Perm2.@[THE_USER].p.watcher]
278
279as testunused@aaf.att.com
280# TC_Perm2.40.23.POS Non-admin, granted user should view
281perm list name com.test.TC_Perm2.@[user.name].p.A
282** Expect 200 **
283
284List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
285--------------------------------------------------------------------------------
286PERM Type Instance Action
287--------------------------------------------------------------------------------
288
289
290as testid@aaf.att.com
291# TC_Perm2.40.29.POS Remove user from watcher role
292user role del testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.watcher
293** Expect 200 **
294Removed Role [com.test.TC_Perm2.@[THE_USER].p.watcher] from User [testunused@aaf.att.com]
295
296# Thirties test admin user
297# TC_Perm2.40.30.POS Admin should be able to view
298perm list name com.test.TC_Perm2.@[user.name].p.A
299** Expect 200 **
300
301List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
302--------------------------------------------------------------------------------
303PERM Type Instance Action
304--------------------------------------------------------------------------------
305com.test.TC_Perm2.@[THE_USER].p.A * *
306com.test.TC_Perm2.@[THE_USER].p.A myInstance *
307com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
308
309
310# TC_Perm2.40.31.POS Add new admin for sub-NS
311ns admin add com.test.TC_Perm2.@[user.name].p testunused@aaf.att.com
312** Expect 201 **
313Admin testunused@aaf.att.com added to com.test.TC_Perm2.@[THE_USER].p
314
315# TC_Perm2.40.32.POS Remove admin from sub-NS
316ns admin del com.test.TC_Perm2.@[user.name].p testid@aaf.att.com
317** Expect 200 **
318Admin testid@aaf.att.com deleted from com.test.TC_Perm2.@[THE_USER].p
319
320# TC_Perm2.40.34.POS Admin of parent NS should be able to view
321perm list name com.test.TC_Perm2.@[user.name].p.A
322** Expect 200 **
323
324List Child Permissions[com.test.TC_Perm2.@[THE_USER].p.A]
325--------------------------------------------------------------------------------
326PERM Type Instance Action
327--------------------------------------------------------------------------------
328com.test.TC_Perm2.@[THE_USER].p.A * *
329com.test.TC_Perm2.@[THE_USER].p.A myInstance *
330com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
331
332
333# TC_Perm2.40.80.POS Add new admin for sub-NS
334ns admin add com.test.TC_Perm2.@[user.name].p testid@aaf.att.com
335** Expect 201 **
336Admin testid@aaf.att.com added to com.test.TC_Perm2.@[THE_USER].p
337
338# TC_Perm2.40.81.POS Remove admin from sub-NS
339ns admin del com.test.TC_Perm2.@[user.name].p testunused@aaf.att.com
340** Expect 200 **
341Admin testunused@aaf.att.com deleted from com.test.TC_Perm2.@[THE_USER].p
342
343# TC_Perm2.41.1.POS Add user to some roles with perms attached
344as testid@aaf.att.com
345user role add testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.superUser
346** Expect 201 **
347Added Role [com.test.TC_Perm2.@[THE_USER].p.superUser] to User [testunused@aaf.att.com]
348
349user role add testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.watcher
350** Expect 201 **
351Added Role [com.test.TC_Perm2.@[THE_USER].p.watcher] to User [testunused@aaf.att.com]
352
353user role add XX@NS com.test.TC_Perm2.@[user.name].p.secret
354** Expect 201 **
355Added Role [com.test.TC_Perm2.@[THE_USER].p.secret] to User [XX@NS]
356
357# TC_Perm2.41.10.POS List by User when Same as Caller
358as testunused@aaf.att.com
359perm list user testunused@aaf.att.com
360** Expect 200 **
361
362List Permissions by User[testunused@aaf.att.com]
363--------------------------------------------------------------------------------
364PERM Type Instance Action
365--------------------------------------------------------------------------------
366com.att.aaf.perm :com.test.TC_Perm2.@[THE_USER].p.A:myInstance:myAction view
367com.test.TC_Perm2.@[THE_USER].p.A myInstance *
368com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
369
370
371# TC_NS2.41.15.POS List by User when not same as Caller, but own/admin namespace of Roles
372as testid@aaf.att.com
373perm list user testunused@aaf.att.com
374** Expect 200 **
375
376List Permissions by User[testunused@aaf.att.com]
377--------------------------------------------------------------------------------
378PERM Type Instance Action
379--------------------------------------------------------------------------------
380com.test.TC_Perm2.@[THE_USER].p.A myInstance *
381com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
382
383
384# TC_Perm2.41.20.POS List by User when not same as Caller, but parent owner/admin of Namespace
385as XX@NS
386perm list user testunused@aaf.att.com
387** Expect 200 **
388
389List Permissions by User[testunused@aaf.att.com]
390--------------------------------------------------------------------------------
391PERM Type Instance Action
392--------------------------------------------------------------------------------
393com.att.aaf.perm :com.test.TC_Perm2.@[THE_USER].p.A:myInstance:myAction view
394com.test.TC_Perm2.@[THE_USER].p.A myInstance *
395com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
396
397
398# TC_Perm2.41.80.NEG List by User when not Caller nor associated to Namespace (nothing should be shown)
399as testunused@aaf.att.com
400perm list user XX@NS
401** Expect 200 **
402
403List Permissions by User[XX@NS]
404--------------------------------------------------------------------------------
405PERM Type Instance Action
406--------------------------------------------------------------------------------
407
408
409# TC_Perm2.41.99.POS Remove users from roles for later test
410as testid@aaf.att.com
411user role del testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.superUser
412** Expect 200 **
413Removed Role [com.test.TC_Perm2.@[THE_USER].p.superUser] from User [testunused@aaf.att.com]
414
415user role del testunused@aaf.att.com com.test.TC_Perm2.@[user.name].p.watcher
416** Expect 200 **
417Removed Role [com.test.TC_Perm2.@[THE_USER].p.watcher] from User [testunused@aaf.att.com]
418
419user role del XX@NS com.test.TC_Perm2.@[user.name].p.secret
420** Expect 200 **
421Removed Role [com.test.TC_Perm2.@[THE_USER].p.secret] from User [XX@NS]
422
423# TC_Perm2.42.10.POS List Roles from NS when not allowed to see NS
424as testid@aaf.att.com
425perm list ns com.test.TC_Perm2.@[user.name].p
426** Expect 200 **
427
428List Perms by NS [com.test.TC_Perm2.@[THE_USER].p]
429--------------------------------------------------------------------------------
430PERM Type Instance Action
431--------------------------------------------------------------------------------
432com.test.TC_Perm2.@[THE_USER].p.A * *
433com.test.TC_Perm2.@[THE_USER].p.A myInstance *
434com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
435com.test.TC_Perm2.@[THE_USER].p.access * *
436com.test.TC_Perm2.@[THE_USER].p.access * read
437com.test.TC_Perm2.@[THE_USER].p.phoneCalls * spy
438
439
440# TC_Perm2.42.20.NEG Don't List Roles from NS when not allowed to see NS
441as testunused@aaf.att.com
442perm list ns com.test.TC_Perm2.@[user.name].p
443** Expect 403 **
444Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read in NS [com.test.TC_Perm2.@[THE_USER].p]
445
446# TC_Perm2.43.10.POS List perms when allowed to see Role
447as testid@aaf.att.com
448perm list role com.test.TC_Perm2.@[user.name].p.superUser
449** Expect 200 **
450
451List Perms by Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
452--------------------------------------------------------------------------------
453PERM Type Instance Action
454--------------------------------------------------------------------------------
455com.test.TC_Perm2.@[THE_USER].p.A myInstance *
456com.test.TC_Perm2.@[THE_USER].p.A myInstance myAction
457
458
459perm list role com.test.TC_Perm2.@[user.name].p.watcher
460** Expect 200 **
461
462List Perms by Role [com.test.TC_Perm2.@[THE_USER].p.watcher]
463--------------------------------------------------------------------------------
464PERM Type Instance Action
465--------------------------------------------------------------------------------
466
467
468perm list role com.test.TC_Perm2.@[user.name].p.secret
469** Expect 200 **
470
471List Perms by Role [com.test.TC_Perm2.@[THE_USER].p.secret]
472--------------------------------------------------------------------------------
473PERM Type Instance Action
474--------------------------------------------------------------------------------
475com.test.TC_Perm2.@[THE_USER].p.phoneCalls * spy
476
477
478# TC_Perm2.43.20.NEG Don't List perms when not allowed to see Role
479as testunused@aaf.att.com
480perm list role com.test.TC_Perm2.@[user.name].p.superUser
481** Expect 403 **
482Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read Role [com.test.TC_Perm2.@[THE_USER].p.superUser]
483
484perm list role com.test.TC_Perm2.@[user.name].p.watcher
485** Expect 403 **
486Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read Role [com.test.TC_Perm2.@[THE_USER].p.watcher]
487
488perm list role com.test.TC_Perm2.@[user.name].p.secret
489** Expect 403 **
490Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read Role [com.test.TC_Perm2.@[THE_USER].p.secret]
491
492as testid@aaf.att.com
493# TC_Perm2.99.1.POS Namespace Admin can delete Namepace defined Roles
494force perm delete com.test.TC_Perm2.@[user.name].p.A myInstance myAction
495** Expect 200,404 **
496Deleted Permission
497
498force perm delete com.test.TC_Perm2.@[user.name].p.A myInstance *
499** Expect 200,404 **
500Deleted Permission
501
502force perm delete com.test.TC_Perm2.@[user.name].p.A * *
503** Expect 200,404 **
504Deleted Permission
505
506force perm delete com.test.TC_Perm2.@[user.name].p.phoneCalls * spy
507** Expect 200,404 **
508Deleted Permission
509
510force role delete com.test.TC_Perm2.@[user.name].p.watcher
511** Expect 200,404 **
512Deleted Role
513
514force role delete com.test.TC_Perm2.@[user.name].p.superUser
515** Expect 200,404 **
516Deleted Role
517
518force role delete com.test.TC_Perm2.@[user.name].p.secret
519** Expect 200,404 **
520Deleted Role
521
522as XX@NS
523force perm delete com.att.aaf.perm :com.test.TC_Perm2.@[user.name].p.A:*:* view
524** Expect 200,404 **
525Deleted Permission
526
527force perm delete com.att.aaf.perm :com.test.TC_Perm2.@[user.name].p.A:myInstance:myAction view
528** Expect 200,404 **
529Deleted Permission
530
531# TC_Perm2.99.2.POS Namespace Admin can delete Namespace
532force ns delete com.test.TC_Perm2.@[user.name].p
533** Expect 200,404 **
534Deleted Namespace
535
536force ns delete com.test.TC_Perm2.@[user.name]
537** Expect 200,404 **
538Deleted Namespace
539
540# TC_Perm2.99.3.POS Print Namespaces
541ns list name com.test.TC_Perm2.@[user.name].p
542** Expect 200,404 **
543
544List Namespaces by Name[com.test.TC_Perm2.@[THE_USER].p]
545--------------------------------------------------------------------------------
546 *** Namespace Not Found ***
547
548ns list name com.test.TC_Perm2.@[user.name]
549** Expect 200,404 **
550
551List Namespaces by Name[com.test.TC_Perm2.@[THE_USER]]
552--------------------------------------------------------------------------------
553 *** Namespace Not Found ***
554