[x] ./spec/models/admin_set_spec.rb:23 # AdminSet user roles adds a viewer
[x] ./spec/models/admin_set_spec.rb:30 # AdminSet user roles removes a viewer
[x] ./spec/models/admin_set_spec.rb:37 # AdminSet user roles adds an editor
[x] ./spec/models/admin_set_spec.rb:44 # AdminSet user roles removes an editor
[x] ./spec/models/admin_set_spec.rb:51 # AdminSet user roles removes an editor when a viewer is added
[x] ./spec/models/admin_set_spec.rb:59 # AdminSet user roles removes a viewer when an editor is added
[x] ./spec/models/batch_process_create_parent_spec.rb:40 # BatchProcess with the metadata cloud mocked Create Parent Object batch process with a csv can create a parent object from aspace
[x] ./spec/models/batch_process_create_parent_spec.rb:49 # BatchProcess with the metadata cloud mocked Create Parent Object batch process with a csv can create a parent_object
[x] ./spec/models/batch_process_spec.rb:247 # BatchProcess running the background jobs xml file import importing a csv creates batch connections for all parent and child objects in the batch process
[x] ./spec/models/batch_process_spec.rb:310 # BatchProcess running the background jobs xml file import running the background jobs creates a parent object with the expected values and child objects with expected values
[x] ./spec/models/batch_process_spec.rb:373 # BatchProcess running the background jobs with the metadata cloud mocked creating a ParentObject from an import can create a parent_object from an array of oids
[x] ./spec/models/batch_process_spec.rb:383 # BatchProcess running the background jobs with the metadata cloud mocked creating a ParentObject from a Preservica csv can create a parent_object with preservica values
[x] ./spec/models/batch_process_spec.rb:404 # BatchProcess running the background jobs with the metadata cloud mocked creating a ParentObject from a Preservica csv does not create a parent_object with invalid preservica csv values
[x] ./spec/models/batch_process_spec.rb:426 # BatchProcess running the background jobs with the metadata cloud mocked deleting a ParentObject from an import can delete a parent_object from an array of oids
[x] ./spec/models/batch_process_spec.rb:450 # BatchProcess running the background jobs with the metadata cloud mocked deleting a ChildObject from an import can delete a parent_object from an array of oids
[x] ./spec/models/batch_process_spec.rb:489 # BatchProcess running the background jobs with the metadata cloud mocked csv file import can refresh the ParentObjects from the MetadataCloud
[x] ./spec/models/batch_process_spec.rb:51 # BatchProcess not running the background jobs creates a parent object with values only from the METs document
[x] ./spec/models/batch_process_spec.rb:544 # BatchProcess running the background jobs with the metadata cloud mocked csv file import with a parent object that had been previously created and user with editor role does not alter already-existing parent object
[x] ./spec/models/batch_process_spec.rb:591 # BatchProcess running the background jobs with the metadata cloud mocked uploading a csv of oids to create parent objects succeeds if the user is an editor on the admin set of the parent object
[x] ./spec/models/batch_process_spec.rb:598 # BatchProcess running the background jobs with the metadata cloud mocked uploading a csv of oids to create parent objects fails if the user is not an editor on the admin set of the parent object
[x] ./spec/models/concerns/reassociatable_spec.rb:11 # Reassociatable blanks out fields which can be blanked
[x] ./spec/models/concerns/reassociatable_spec.rb:21 # Reassociatable does not blank out order, which can not be blanked
[x] ./spec/models/open_with_permission/permission_set_spec.rb:12 # OpenWithPermission::PermissionSet user permission set roles adds an approver
[x] ./spec/models/open_with_permission/permission_set_spec.rb:19 # OpenWithPermission::PermissionSet user permission set roles removes an approver
[x] ./spec/models/open_with_permission/permission_set_spec.rb:26 # OpenWithPermission::PermissionSet user permission set roles adds an administrator
[x] ./spec/models/open_with_permission/permission_set_spec.rb:33 # OpenWithPermission::PermissionSet user permission set roles removes an administrator
[x] ./spec/models/open_with_permission/permission_set_spec.rb:40 # OpenWithPermission::PermissionSet user permission set roles removes an administrator when a approver is added
[x] ./spec/models/open_with_permission/permission_set_spec.rb:48 # OpenWithPermission::PermissionSet user permission set roles removes an approver when an administrator is added
[x] ./spec/models/parent_object_spec.rb:285 # ParentObject a newly created ParentObject with different visibilities visibility defaults to Private if not a valid visibility
[x] ./spec/models/parent_object_spec.rb:297 # ParentObject a newly created ParentObject with different visibilities open with Permission visibility does not validate without a permission set
[x] ./spec/models/preservica/preservica_child_error_spec.rb:97 # Preservica::PreservicaObject can create child objects
[x] ./spec/requests/admin_sets_spec.rb:108 # /admin_sets when user has permission to Sets PATCH /update with valid parameters updates the requested admin_set
[x] ./spec/requests/admin_sets_spec.rb:115 # /admin_sets when user has permission to Sets PATCH /update with valid parameters redirects to the admin_set
[x] ./spec/requests/admin_sets_spec.rb:124 # /admin_sets when user has permission to Sets PATCH /update with invalid parameters renders a successful response (i.e. to display the 'edit' template)
[x] ./spec/requests/admin_sets_spec.rb:133 # /admin_sets when user has permission to Sets DELETE /destroy destroys the requested admin_set
[x] ./spec/requests/admin_sets_spec.rb:140 # /admin_sets when user has permission to Sets DELETE /destroy redirects to the admin_sets list
[x] ./spec/requests/admin_sets_spec.rb:153 # /admin_sets when user does not permission to Sets GET /index renders an unauthorized message
[x] ./spec/requests/admin_sets_spec.rb:161 # /admin_sets when user does not permission to Sets GET /show renders an unauthorized message
[x] ./spec/requests/admin_sets_spec.rb:44 # /admin_sets when user has permission to Sets GET /index renders a successful response
[x] ./spec/requests/admin_sets_spec.rb:52 # /admin_sets when user has permission to Sets GET /show renders a successful response
[x] ./spec/requests/admin_sets_spec.rb:60 # /admin_sets when user has permission to Sets GET /new renders a successful response
[x] ./spec/requests/admin_sets_spec.rb:67 # /admin_sets when user has permission to Sets GET /edit render a successful response
[x] ./spec/requests/admin_sets_spec.rb:76 # /admin_sets when user has permission to Sets POST /create with valid parameters creates a new AdminSet
[x] ./spec/requests/admin_sets_spec.rb:82 # /admin_sets when user has permission to Sets POST /create with valid parameters redirects to the created admin_set
[x] ./spec/requests/admin_sets_spec.rb:89 # /admin_sets when user has permission to Sets POST /create with invalid parameters does not create a new AdminSet
[x] ./spec/requests/admin_sets_spec.rb:95 # /admin_sets when user has permission to Sets POST /create with invalid parameters renders a successful response (i.e. to display the 'new' template)
Summary
Fix broken specs that are part of the Ruby Upgrade Branch - https://github.com/yalelibrary/yul-dc-management/pull/1299
Checklist: 1 - 50