mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
Merged V3.2 to HEAD
17002: Merged V3.2 to V3.2 14187: (record-only) Fix for ETHREEOH-2023: LDAP import must lower case the local name of the association to person. 14941: Merged V2.2 to V3.1 14830: Fix for ETWOTWO-389: Alfresco will not fix up all the permissions if the UID is changed 14849: Build Fix: Remove the constraint to avoid the creation of duplicate users (it stops permission assignment before user creation) 14867: Build Fix: Disable tests for concurrent creation of groups and people (it leaves an odd group around and is not currently used) 14880: More for ETWOTWO-389: restrict fix ups for uid/gid to case changes only. Other changes are rejected. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@17013 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -325,6 +325,12 @@
|
|||||||
<property name="permissionsManager">
|
<property name="permissionsManager">
|
||||||
<ref bean="personServicePermissionsManager" />
|
<ref bean="personServicePermissionsManager" />
|
||||||
</property>
|
</property>
|
||||||
|
<property name="aclDao">
|
||||||
|
<ref bean="aclDaoComponent" />
|
||||||
|
</property>
|
||||||
|
<property name="homeFolderManager">
|
||||||
|
<ref bean="homeFolderManager" />
|
||||||
|
</property>
|
||||||
<!-- Configurable properties. -->
|
<!-- Configurable properties. -->
|
||||||
<!-- -->
|
<!-- -->
|
||||||
<!-- TODO: -->
|
<!-- TODO: -->
|
||||||
@@ -363,9 +369,6 @@
|
|||||||
<property name="includeAutoCreated">
|
<property name="includeAutoCreated">
|
||||||
<value>false</value>
|
<value>false</value>
|
||||||
</property>
|
</property>
|
||||||
<property name="homeFolderManager">
|
|
||||||
<ref bean="homeFolderManager" />
|
|
||||||
</property>
|
|
||||||
</bean>
|
</bean>
|
||||||
|
|
||||||
<bean name="personServicePermissionsManager" class="org.alfresco.repo.security.person.PermissionsManagerImpl" >
|
<bean name="personServicePermissionsManager" class="org.alfresco.repo.security.person.PermissionsManagerImpl" >
|
||||||
|
@@ -53,7 +53,8 @@
|
|||||||
<!-- -->
|
<!-- -->
|
||||||
<!-- This bean uses the userToAuthorityCache configured in cache-context.xml -->
|
<!-- This bean uses the userToAuthorityCache configured in cache-context.xml -->
|
||||||
<!-- -->
|
<!-- -->
|
||||||
<bean id="authorityDAO" class="org.alfresco.repo.security.authority.AuthorityDAOImpl">
|
|
||||||
|
<bean id="authorityDAO" class="org.alfresco.repo.security.authority.AuthorityDAOImpl" init-method="init">
|
||||||
<property name="storeUrl">
|
<property name="storeUrl">
|
||||||
<value>${spaces.store}</value>
|
<value>${spaces.store}</value>
|
||||||
</property>
|
</property>
|
||||||
@@ -75,6 +76,13 @@
|
|||||||
<property name="userToAuthorityCache">
|
<property name="userToAuthorityCache">
|
||||||
<ref bean="userToAuthorityCache" />
|
<ref bean="userToAuthorityCache" />
|
||||||
</property>
|
</property>
|
||||||
|
<property name="policyComponent">
|
||||||
|
<ref bean="policyComponent"/>
|
||||||
|
</property>
|
||||||
|
<property name="aclDao">
|
||||||
|
<ref bean="aclDaoComponent" />
|
||||||
|
</property>
|
||||||
|
|
||||||
</bean>
|
</bean>
|
||||||
|
|
||||||
|
|
||||||
|
@@ -890,23 +890,10 @@ public class AclDaoComponentImpl extends HibernateDaoSupport implements AclDaoCo
|
|||||||
|
|
||||||
|
|
||||||
// remove authority
|
// remove authority
|
||||||
|
DbAuthority toRemove = getAuthority(authority, false);
|
||||||
callback = new HibernateCallback()
|
if(toRemove != null)
|
||||||
{
|
{
|
||||||
public Object doInHibernate(Session session)
|
getHibernateTemplate().delete(toRemove);
|
||||||
{
|
|
||||||
Query query = session.getNamedQuery(QUERY_GET_AUTHORITY);
|
|
||||||
query.setParameter("authority", authority);
|
|
||||||
return query.list();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
List<DbAuthority> authorities = (List<DbAuthority>) getHibernateTemplate().execute(callback);
|
|
||||||
for (DbAuthority found : authorities)
|
|
||||||
{
|
|
||||||
if (found.getAuthority().equals(authority))
|
|
||||||
{
|
|
||||||
getHibernateTemplate().delete(found);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Remove affected ACLs from the cache
|
// TODO: Remove affected ACLs from the cache
|
||||||
@@ -1378,34 +1365,8 @@ public class AclDaoComponentImpl extends HibernateDaoSupport implements AclDaoCo
|
|||||||
throw new IllegalArgumentException("Invalid position");
|
throw new IllegalArgumentException("Invalid position");
|
||||||
}
|
}
|
||||||
|
|
||||||
// Find auth
|
// Find authority
|
||||||
HibernateCallback callback = new HibernateCallback()
|
DbAuthority authority = getAuthority(ace.getAuthority(), true);
|
||||||
{
|
|
||||||
public Object doInHibernate(Session session)
|
|
||||||
{
|
|
||||||
Query query = session.getNamedQuery(QUERY_GET_AUTHORITY);
|
|
||||||
query.setParameter("authority", ace.getAuthority());
|
|
||||||
return query.list();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
DbAuthority authority = null;
|
|
||||||
List<DbAuthority> authorities = (List<DbAuthority>) getHibernateTemplate().execute(callback);
|
|
||||||
for (DbAuthority found : authorities)
|
|
||||||
{
|
|
||||||
if (found.getAuthority().equals(ace.getAuthority()))
|
|
||||||
{
|
|
||||||
authority = found;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (authority == null)
|
|
||||||
{
|
|
||||||
DbAuthorityImpl newAuthority = new DbAuthorityImpl();
|
|
||||||
newAuthority.setAuthority(ace.getAuthority());
|
|
||||||
newAuthority.setCrc(getCrc(ace.getAuthority()));
|
|
||||||
authority = newAuthority;
|
|
||||||
getHibernateTemplate().save(newAuthority);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Find permission
|
// Find permission
|
||||||
|
|
||||||
@@ -1413,7 +1374,7 @@ public class AclDaoComponentImpl extends HibernateDaoSupport implements AclDaoCo
|
|||||||
final String permissionName = ace.getPermission().getName();
|
final String permissionName = ace.getPermission().getName();
|
||||||
final Pair<Long, QName> permissionQNamePair = qnameDAO.getOrCreateQName(permissionQName);
|
final Pair<Long, QName> permissionQNamePair = qnameDAO.getOrCreateQName(permissionQName);
|
||||||
|
|
||||||
callback = new HibernateCallback()
|
HibernateCallback callback = new HibernateCallback()
|
||||||
{
|
{
|
||||||
public Object doInHibernate(Session session)
|
public Object doInHibernate(Session session)
|
||||||
{
|
{
|
||||||
@@ -2221,4 +2182,62 @@ public class AclDaoComponentImpl extends HibernateDaoSupport implements AclDaoCo
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void updateAuthority(String before, String after)
|
||||||
|
{
|
||||||
|
DbAuthority dbAuthority = getAuthority(before, false);
|
||||||
|
// If there is no entry and alias is not required - there is nothing it would match
|
||||||
|
if(dbAuthority != null)
|
||||||
|
{
|
||||||
|
dbAuthority.setAuthority(after);
|
||||||
|
dbAuthority.setCrc(getCrc(after));
|
||||||
|
aclCache.clear();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
private DbAuthority getAuthority(final String authority, boolean create)
|
||||||
|
{
|
||||||
|
// Find auth
|
||||||
|
HibernateCallback callback = new HibernateCallback()
|
||||||
|
{
|
||||||
|
public Object doInHibernate(Session session)
|
||||||
|
{
|
||||||
|
Query query = session.getNamedQuery(QUERY_GET_AUTHORITY);
|
||||||
|
query.setParameter("authority", authority);
|
||||||
|
return query.list();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
DbAuthority dbAuthority = null;
|
||||||
|
List<DbAuthority> authorities = (List<DbAuthority>) getHibernateTemplate().execute(callback);
|
||||||
|
for (DbAuthority found : authorities)
|
||||||
|
{
|
||||||
|
if (found.getAuthority().equals(authority))
|
||||||
|
{
|
||||||
|
dbAuthority = found;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (create && (dbAuthority == null))
|
||||||
|
{
|
||||||
|
dbAuthority = createDbAuthority(authority);
|
||||||
|
}
|
||||||
|
return dbAuthority;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void createAuthority(String authority)
|
||||||
|
{
|
||||||
|
createDbAuthority(authority);
|
||||||
|
}
|
||||||
|
|
||||||
|
public DbAuthority createDbAuthority(String authority)
|
||||||
|
{
|
||||||
|
DbAuthority dbAuthority = new DbAuthorityImpl();
|
||||||
|
dbAuthority.setAuthority(authority);
|
||||||
|
dbAuthority.setCrc(getCrc(authority));
|
||||||
|
getHibernateTemplate().save(dbAuthority);
|
||||||
|
return dbAuthority;
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -270,6 +270,12 @@ public abstract class AbstractAuthenticationComponent implements AuthenticationC
|
|||||||
logger.debug("Setting the current user to \"" + userName + '"');
|
logger.debug("Setting the current user to \"" + userName + '"');
|
||||||
}
|
}
|
||||||
ud = getUserDetails(userName);
|
ud = getUserDetails(userName);
|
||||||
|
if(!userName.equals(ud.getUsername()))
|
||||||
|
{
|
||||||
|
ud = new User(userName, ud.getPassword(), ud.isEnabled(), ud.isAccountNonExpired(),
|
||||||
|
ud.isCredentialsNonExpired(), ud.isAccountNonLocked(), ud.getAuthorities());
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
return setUserDetails(ud);
|
return setUserDetails(ud);
|
||||||
}
|
}
|
||||||
|
@@ -39,6 +39,10 @@ import java.util.regex.Pattern;
|
|||||||
import org.alfresco.error.AlfrescoRuntimeException;
|
import org.alfresco.error.AlfrescoRuntimeException;
|
||||||
import org.alfresco.model.ContentModel;
|
import org.alfresco.model.ContentModel;
|
||||||
import org.alfresco.repo.cache.SimpleCache;
|
import org.alfresco.repo.cache.SimpleCache;
|
||||||
|
import org.alfresco.repo.node.NodeServicePolicies;
|
||||||
|
import org.alfresco.repo.policy.JavaBehaviour;
|
||||||
|
import org.alfresco.repo.policy.PolicyComponent;
|
||||||
|
import org.alfresco.repo.security.permissions.impl.AclDaoComponent;
|
||||||
import org.alfresco.repo.tenant.TenantService;
|
import org.alfresco.repo.tenant.TenantService;
|
||||||
import org.alfresco.service.cmr.dictionary.DictionaryService;
|
import org.alfresco.service.cmr.dictionary.DictionaryService;
|
||||||
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
||||||
@@ -50,11 +54,14 @@ import org.alfresco.service.cmr.security.AuthorityType;
|
|||||||
import org.alfresco.service.cmr.security.NoSuchPersonException;
|
import org.alfresco.service.cmr.security.NoSuchPersonException;
|
||||||
import org.alfresco.service.cmr.security.PersonService;
|
import org.alfresco.service.cmr.security.PersonService;
|
||||||
import org.alfresco.service.namespace.NamespacePrefixResolver;
|
import org.alfresco.service.namespace.NamespacePrefixResolver;
|
||||||
|
import org.alfresco.service.namespace.NamespaceService;
|
||||||
import org.alfresco.service.namespace.QName;
|
import org.alfresco.service.namespace.QName;
|
||||||
import org.alfresco.service.namespace.RegexQNamePattern;
|
import org.alfresco.service.namespace.RegexQNamePattern;
|
||||||
|
import org.alfresco.util.EqualsHelper;
|
||||||
import org.alfresco.util.SearchLanguageConversion;
|
import org.alfresco.util.SearchLanguageConversion;
|
||||||
|
|
||||||
public class AuthorityDAOImpl implements AuthorityDAO
|
public class AuthorityDAOImpl implements AuthorityDAO, NodeServicePolicies.OnCreateNodePolicy, NodeServicePolicies.BeforeDeleteNodePolicy,
|
||||||
|
NodeServicePolicies.OnUpdatePropertiesPolicy
|
||||||
{
|
{
|
||||||
private StoreRef storeRef;
|
private StoreRef storeRef;
|
||||||
|
|
||||||
@@ -80,6 +87,10 @@ public class AuthorityDAOImpl implements AuthorityDAO
|
|||||||
private Map<String, NodeRef> systemContainerRefs = new ConcurrentHashMap<String, NodeRef>(4);
|
private Map<String, NodeRef> systemContainerRefs = new ConcurrentHashMap<String, NodeRef>(4);
|
||||||
|
|
||||||
|
|
||||||
|
private AclDaoComponent aclDao;
|
||||||
|
|
||||||
|
private PolicyComponent policyComponent;
|
||||||
|
|
||||||
public AuthorityDAOImpl()
|
public AuthorityDAOImpl()
|
||||||
{
|
{
|
||||||
super();
|
super();
|
||||||
@@ -123,6 +134,16 @@ public class AuthorityDAOImpl implements AuthorityDAO
|
|||||||
this.tenantService = tenantService;
|
this.tenantService = tenantService;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void setAclDao(AclDaoComponent aclDao)
|
||||||
|
{
|
||||||
|
this.aclDao = aclDao;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setPolicyComponent(PolicyComponent policyComponent)
|
||||||
|
{
|
||||||
|
this.policyComponent = policyComponent;
|
||||||
|
}
|
||||||
|
|
||||||
public boolean authorityExists(String name)
|
public boolean authorityExists(String name)
|
||||||
{
|
{
|
||||||
NodeRef ref = getAuthorityOrNull(name);
|
NodeRef ref = getAuthorityOrNull(name);
|
||||||
@@ -719,4 +740,56 @@ public class AuthorityDAOImpl implements AuthorityDAO
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void onCreateNode(ChildAssociationRef childAssocRef)
|
||||||
|
{
|
||||||
|
NodeRef authRef = childAssocRef.getChildRef();
|
||||||
|
String authority = (String) this.nodeService.getProperty(authRef, ContentModel.PROP_AUTHORITY_NAME);
|
||||||
|
|
||||||
|
// Make sure there is an authority entry - with a DB constraint for uniqueness
|
||||||
|
// aclDao.createAuthority(authority);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public void beforeDeleteNode(NodeRef nodeRef)
|
||||||
|
{
|
||||||
|
authorityLookupCache.clear();
|
||||||
|
}
|
||||||
|
|
||||||
|
public void onUpdateProperties(NodeRef nodeRef, Map<QName, Serializable> before, Map<QName, Serializable> after)
|
||||||
|
{
|
||||||
|
String authBefore = DefaultTypeConverter.INSTANCE.convert(String.class, before.get(ContentModel.PROP_AUTHORITY_NAME));
|
||||||
|
String authAfter = DefaultTypeConverter.INSTANCE.convert(String.class, after.get(ContentModel.PROP_AUTHORITY_NAME));
|
||||||
|
if (!EqualsHelper.nullSafeEquals(authBefore, authAfter))
|
||||||
|
{
|
||||||
|
if ((authBefore == null) || authBefore.equalsIgnoreCase(authAfter))
|
||||||
|
{
|
||||||
|
// Fix any ACLs
|
||||||
|
aclDao.updateAuthority(authBefore, authAfter);
|
||||||
|
// Fix primary association local name
|
||||||
|
// This will need to lower case in 3.2+
|
||||||
|
QName newAssocQName = QName.createQName("cm", authAfter, namespacePrefixResolver);
|
||||||
|
ChildAssociationRef assoc = nodeService.getPrimaryParent(nodeRef);
|
||||||
|
nodeService.moveNode(nodeRef, assoc.getParentRef(), assoc.getTypeQName(), newAssocQName);
|
||||||
|
// Cache is out of date
|
||||||
|
authorityLookupCache.clear();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
throw new UnsupportedOperationException("The name of an authority can not be changed");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public void init()
|
||||||
|
{
|
||||||
|
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "onCreateNode"), ContentModel.TYPE_AUTHORITY_CONTAINER, new JavaBehaviour(this,
|
||||||
|
"onCreateNode"));
|
||||||
|
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "beforeDeleteNode"), ContentModel.TYPE_AUTHORITY_CONTAINER, new JavaBehaviour(
|
||||||
|
this, "beforeDeleteNode"));
|
||||||
|
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "onUpdateProperties"), ContentModel.TYPE_AUTHORITY_CONTAINER, new JavaBehaviour(
|
||||||
|
this, "onUpdateProperties"));
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -0,0 +1,435 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2005-2007 Alfresco Software Limited.
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License
|
||||||
|
* as published by the Free Software Foundation; either version 2
|
||||||
|
* of the License, or (at your option) any later version.
|
||||||
|
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||||||
|
|
||||||
|
* As a special exception to the terms and conditions of version 2.0 of
|
||||||
|
* the GPL, you may redistribute this Program in connection with Free/Libre
|
||||||
|
* and Open Source Software ("FLOSS") applications as described in Alfresco's
|
||||||
|
* FLOSS exception. You should have recieved a copy of the text describing
|
||||||
|
* the FLOSS exception, and it is also available here:
|
||||||
|
* http://www.alfresco.com/legal/licensing"
|
||||||
|
*/
|
||||||
|
package org.alfresco.repo.security.authority;
|
||||||
|
|
||||||
|
import java.io.Serializable;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.concurrent.CountDownLatch;
|
||||||
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
|
import junit.framework.TestCase;
|
||||||
|
|
||||||
|
import org.alfresco.model.ContentModel;
|
||||||
|
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
||||||
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
||||||
|
import org.alfresco.repo.transaction.RetryingTransactionHelper.RetryingTransactionCallback;
|
||||||
|
import org.alfresco.service.ServiceRegistry;
|
||||||
|
import org.alfresco.service.cmr.model.FileExistsException;
|
||||||
|
import org.alfresco.service.cmr.model.FileFolderService;
|
||||||
|
import org.alfresco.service.cmr.model.FileInfo;
|
||||||
|
import org.alfresco.service.cmr.repository.NodeRef;
|
||||||
|
import org.alfresco.service.cmr.repository.NodeService;
|
||||||
|
import org.alfresco.service.cmr.repository.StoreRef;
|
||||||
|
import org.alfresco.service.cmr.security.AuthorityService;
|
||||||
|
import org.alfresco.service.cmr.security.AuthorityType;
|
||||||
|
import org.alfresco.service.cmr.security.PersonService;
|
||||||
|
import org.alfresco.service.namespace.NamespaceService;
|
||||||
|
import org.alfresco.service.namespace.QName;
|
||||||
|
import org.alfresco.service.transaction.TransactionService;
|
||||||
|
import org.alfresco.util.ApplicationContextHelper;
|
||||||
|
import org.springframework.context.ApplicationContext;
|
||||||
|
import org.springframework.dao.DataIntegrityViolationException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks that the duplicate child handling is done correctly.
|
||||||
|
*
|
||||||
|
* @see org.alfresco.repo.model.filefolder.FileFolderServiceImpl
|
||||||
|
* @author Derek Hulley
|
||||||
|
* @since 2.1.0
|
||||||
|
*/
|
||||||
|
public class DuplicateAuthorityTest extends TestCase
|
||||||
|
{
|
||||||
|
private static final ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
||||||
|
|
||||||
|
private AuthenticationComponent authenticationComponent;
|
||||||
|
|
||||||
|
private TransactionService transactionService;
|
||||||
|
|
||||||
|
private RetryingTransactionHelper retryingTransactionHelper;
|
||||||
|
|
||||||
|
private NodeService nodeService;
|
||||||
|
|
||||||
|
private FileFolderService fileFolderService;
|
||||||
|
|
||||||
|
private NodeRef rootNodeRef;
|
||||||
|
|
||||||
|
private NodeRef workingRootNodeRef;
|
||||||
|
|
||||||
|
private AuthorityService authorityService;
|
||||||
|
|
||||||
|
private PersonService personService;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setUp() throws Exception
|
||||||
|
{
|
||||||
|
ServiceRegistry serviceRegistry = (ServiceRegistry) ctx.getBean("ServiceRegistry");
|
||||||
|
transactionService = serviceRegistry.getTransactionService();
|
||||||
|
retryingTransactionHelper = transactionService.getRetryingTransactionHelper();
|
||||||
|
retryingTransactionHelper.setMaxRetryWaitMs(10);
|
||||||
|
nodeService = serviceRegistry.getNodeService();
|
||||||
|
fileFolderService = serviceRegistry.getFileFolderService();
|
||||||
|
authenticationComponent = (AuthenticationComponent) ctx.getBean("authenticationComponent");
|
||||||
|
authorityService = (AuthorityService) ctx.getBean("authorityService");
|
||||||
|
personService = (PersonService) ctx.getBean("personService");
|
||||||
|
|
||||||
|
RetryingTransactionCallback<NodeRef> callback = new RetryingTransactionCallback<NodeRef>()
|
||||||
|
{
|
||||||
|
public NodeRef execute() throws Throwable
|
||||||
|
{
|
||||||
|
// authenticate
|
||||||
|
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
||||||
|
|
||||||
|
// create a test store
|
||||||
|
StoreRef storeRef = nodeService.createStore(StoreRef.PROTOCOL_WORKSPACE, getName() + System.currentTimeMillis());
|
||||||
|
rootNodeRef = nodeService.getRootNode(storeRef);
|
||||||
|
|
||||||
|
// create a folder to import into
|
||||||
|
NodeRef nodeRef = nodeService.createNode(rootNodeRef, ContentModel.ASSOC_CHILDREN, QName.createQName(NamespaceService.ALFRESCO_URI, "working root"),
|
||||||
|
ContentModel.TYPE_FOLDER).getChildRef();
|
||||||
|
// Done
|
||||||
|
return nodeRef;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
workingRootNodeRef = retryingTransactionHelper.doInTransaction(callback, false, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void tearDown() throws Exception
|
||||||
|
{
|
||||||
|
RetryingTransactionCallback<Void> callback1 = new RetryingTransactionCallback<Void>()
|
||||||
|
{
|
||||||
|
public Void execute()
|
||||||
|
{
|
||||||
|
for (int i = 0; i <= 10+1; i++)
|
||||||
|
{
|
||||||
|
if (authorityService.authorityExists("GROUP_" + i))
|
||||||
|
{
|
||||||
|
authorityService.deleteAuthority("GROUP_" + i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
retryingTransactionHelper.doInTransaction(callback1, false, true);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testDuplicateGroupDetection() throws Exception
|
||||||
|
{
|
||||||
|
// disable for now
|
||||||
|
if(true)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
final int threadCount = 10;
|
||||||
|
RetryingTransactionCallback<Void> callback1 = new RetryingTransactionCallback<Void>()
|
||||||
|
{
|
||||||
|
public Void execute()
|
||||||
|
{
|
||||||
|
for (int i = 0; i <= threadCount+1; i++)
|
||||||
|
{
|
||||||
|
if (authorityService.authorityExists("GROUP_" + i))
|
||||||
|
{
|
||||||
|
authorityService.deleteAuthority("GROUP_" + i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
retryingTransactionHelper.doInTransaction(callback1, false, true);
|
||||||
|
|
||||||
|
// First create a file name F1
|
||||||
|
RetryingTransactionCallback<String> callback = new CreateAuthorityCallback(0);
|
||||||
|
String result = retryingTransactionHelper.doInTransaction(callback, false, true);
|
||||||
|
// Check that the filename is F0
|
||||||
|
assertEquals("GROUP_0", result);
|
||||||
|
|
||||||
|
// Now create a whole lot of threads that attempt file creation
|
||||||
|
|
||||||
|
CountDownLatch endLatch = new CountDownLatch(threadCount);
|
||||||
|
AuthThread[] workers = new AuthThread[threadCount];
|
||||||
|
for (int i = 0; i < threadCount; i++)
|
||||||
|
{
|
||||||
|
workers[i] = new AuthThread(endLatch);
|
||||||
|
workers[i].start();
|
||||||
|
}
|
||||||
|
// Wait at the end gate
|
||||||
|
endLatch.await(300L, TimeUnit.SECONDS);
|
||||||
|
|
||||||
|
// Analyse
|
||||||
|
int failureCount = 0;
|
||||||
|
int didNotCompleteCount = 0;
|
||||||
|
for (int i = 0; i < threadCount; i++)
|
||||||
|
{
|
||||||
|
if (workers[i].error != null)
|
||||||
|
{
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
else if (workers[i].success == null)
|
||||||
|
{
|
||||||
|
didNotCompleteCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
System.out.println("" + failureCount + " of the " + threadCount + " threads failed and " + didNotCompleteCount + " did not finish.");
|
||||||
|
assertEquals("Some failures", 0, failureCount);
|
||||||
|
assertEquals("Some non-finishes", 0, didNotCompleteCount);
|
||||||
|
|
||||||
|
retryingTransactionHelper.doInTransaction(callback1, false, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testDuplicatePersonDetection() throws Exception
|
||||||
|
{
|
||||||
|
// disable for now
|
||||||
|
if(true)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
final int threadCount = 10;
|
||||||
|
RetryingTransactionCallback<Void> callback1 = new RetryingTransactionCallback<Void>()
|
||||||
|
{
|
||||||
|
public Void execute()
|
||||||
|
{
|
||||||
|
for (int i = 0; i <= threadCount+1; i++)
|
||||||
|
{
|
||||||
|
if (personService.personExists("Person_" + i))
|
||||||
|
{
|
||||||
|
personService.deletePerson("Person_" + i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
//retryingTransactionHelper.doInTransaction(callback1, false, true);
|
||||||
|
|
||||||
|
// First create a file name F1
|
||||||
|
RetryingTransactionCallback<String> callback = new CreatePersonCallback(0);
|
||||||
|
String result = retryingTransactionHelper.doInTransaction(callback, false, true);
|
||||||
|
// Check that the filename is F0
|
||||||
|
assertEquals("Person_0", result);
|
||||||
|
|
||||||
|
// Now create a whole lot of threads that attempt file creation
|
||||||
|
|
||||||
|
CountDownLatch endLatch = new CountDownLatch(threadCount);
|
||||||
|
PersonThread[] workers = new PersonThread[threadCount];
|
||||||
|
for (int i = 0; i < threadCount; i++)
|
||||||
|
{
|
||||||
|
workers[i] = new PersonThread(endLatch);
|
||||||
|
workers[i].start();
|
||||||
|
}
|
||||||
|
// Wait at the end gate
|
||||||
|
endLatch.await(300L, TimeUnit.SECONDS);
|
||||||
|
|
||||||
|
// Analyse
|
||||||
|
int failureCount = 0;
|
||||||
|
int didNotCompleteCount = 0;
|
||||||
|
for (int i = 0; i < threadCount; i++)
|
||||||
|
{
|
||||||
|
if (workers[i].error != null)
|
||||||
|
{
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
else if (workers[i].success == null)
|
||||||
|
{
|
||||||
|
didNotCompleteCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
System.out.println("" + failureCount + " of the " + threadCount + " threads failed and " + didNotCompleteCount + " did not finish.");
|
||||||
|
assertEquals("Some failures", 0, failureCount);
|
||||||
|
assertEquals("Some non-finishes", 0, didNotCompleteCount);
|
||||||
|
|
||||||
|
retryingTransactionHelper.doInTransaction(callback1, false, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Attempts to create a file "Fn" where n is the number supplied to the constructor.
|
||||||
|
*/
|
||||||
|
private class CreateAuthorityCallback implements RetryingTransactionCallback<String>
|
||||||
|
{
|
||||||
|
private final int number;
|
||||||
|
|
||||||
|
public CreateAuthorityCallback(int number)
|
||||||
|
{
|
||||||
|
this.number = number;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String execute() throws Throwable
|
||||||
|
{
|
||||||
|
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
||||||
|
return authorityService.createAuthority(AuthorityType.GROUP, "" + number);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private class CreatePersonCallback implements RetryingTransactionCallback<String>
|
||||||
|
{
|
||||||
|
private final int number;
|
||||||
|
|
||||||
|
public CreatePersonCallback(int number)
|
||||||
|
{
|
||||||
|
this.number = number;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String execute() throws Throwable
|
||||||
|
{
|
||||||
|
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
||||||
|
|
||||||
|
HashMap<QName, Serializable> properties = new HashMap<QName, Serializable>();
|
||||||
|
properties.put(ContentModel.PROP_USERNAME, "Person_" + number);
|
||||||
|
properties.put(ContentModel.PROP_HOMEFOLDER, rootNodeRef);
|
||||||
|
properties.put(ContentModel.PROP_FIRSTNAME, "Person_" + number);
|
||||||
|
properties.put(ContentModel.PROP_LASTNAME, "Person_" + number);
|
||||||
|
properties.put(ContentModel.PROP_EMAIL, "Person_" + number);
|
||||||
|
properties.put(ContentModel.PROP_ORGID, "Person_" + number);
|
||||||
|
|
||||||
|
personService.createPerson(properties);
|
||||||
|
return "Person_" + number;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private static ThreadGroup threadGroup = new ThreadGroup("DuplicateAuthorityTest");
|
||||||
|
|
||||||
|
private static int threadNumber = -1;
|
||||||
|
|
||||||
|
private class AuthThread extends Thread
|
||||||
|
{
|
||||||
|
private CountDownLatch endLatch;
|
||||||
|
|
||||||
|
private Throwable error;
|
||||||
|
|
||||||
|
private String success;
|
||||||
|
|
||||||
|
public AuthThread(CountDownLatch endLatch)
|
||||||
|
{
|
||||||
|
super(threadGroup, "Worker " + ++threadNumber);
|
||||||
|
this.endLatch = endLatch;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void run()
|
||||||
|
{
|
||||||
|
String result = null;
|
||||||
|
// Start the count with a guaranteed failure
|
||||||
|
int number = 0;
|
||||||
|
while (true)
|
||||||
|
{
|
||||||
|
RetryingTransactionCallback<String> callback = new CreateAuthorityCallback(number);
|
||||||
|
try
|
||||||
|
{
|
||||||
|
System.out.println("Thread " + getName() + " attempting file: " + number);
|
||||||
|
System.out.flush();
|
||||||
|
|
||||||
|
result = retryingTransactionHelper.doInTransaction(callback, false, true);
|
||||||
|
// It worked
|
||||||
|
success = result;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
catch (DataIntegrityViolationException e)
|
||||||
|
{
|
||||||
|
// Try another number
|
||||||
|
number++;
|
||||||
|
}
|
||||||
|
catch (Throwable e)
|
||||||
|
{
|
||||||
|
// Oops
|
||||||
|
error = e;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Done
|
||||||
|
if (error != null)
|
||||||
|
{
|
||||||
|
System.err.println("Thread " + getName() + " failed to create file " + number + ":");
|
||||||
|
System.err.flush();
|
||||||
|
error.printStackTrace();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
System.out.println("\t\t\tThread " + getName() + " created auth: " + success);
|
||||||
|
System.out.flush();
|
||||||
|
}
|
||||||
|
// Tick the latch
|
||||||
|
endLatch.countDown();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private class PersonThread extends Thread
|
||||||
|
{
|
||||||
|
private CountDownLatch endLatch;
|
||||||
|
|
||||||
|
private Throwable error;
|
||||||
|
|
||||||
|
private String success;
|
||||||
|
|
||||||
|
public PersonThread(CountDownLatch endLatch)
|
||||||
|
{
|
||||||
|
super(threadGroup, "Worker " + ++threadNumber);
|
||||||
|
this.endLatch = endLatch;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void run()
|
||||||
|
{
|
||||||
|
String result = null;
|
||||||
|
// Start the count with a guaranteed failure
|
||||||
|
int number = 0;
|
||||||
|
while (true)
|
||||||
|
{
|
||||||
|
RetryingTransactionCallback<String> callback = new CreatePersonCallback(number);
|
||||||
|
try
|
||||||
|
{
|
||||||
|
System.out.println("Thread " + getName() + " attempting file: " + number);
|
||||||
|
System.out.flush();
|
||||||
|
|
||||||
|
result = retryingTransactionHelper.doInTransaction(callback, false, true);
|
||||||
|
// It worked
|
||||||
|
success = result;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
catch (DataIntegrityViolationException e)
|
||||||
|
{
|
||||||
|
// Try another number
|
||||||
|
number++;
|
||||||
|
}
|
||||||
|
catch (Throwable e)
|
||||||
|
{
|
||||||
|
// Oops
|
||||||
|
error = e;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Done
|
||||||
|
if (error != null)
|
||||||
|
{
|
||||||
|
System.err.println("Thread " + getName() + " failed to create file " + number + ":");
|
||||||
|
System.err.flush();
|
||||||
|
error.printStackTrace();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
System.out.println("\t\t\tThread " + getName() + " created auth: " + success);
|
||||||
|
System.out.flush();
|
||||||
|
}
|
||||||
|
// Tick the latch
|
||||||
|
endLatch.countDown();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@@ -33,6 +33,7 @@ import org.alfresco.repo.node.db.NodeDaoService;
|
|||||||
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
||||||
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
||||||
import org.alfresco.repo.security.authentication.MutableAuthenticationDao;
|
import org.alfresco.repo.security.authentication.MutableAuthenticationDao;
|
||||||
|
import org.alfresco.repo.security.authority.AuthorityDAO;
|
||||||
import org.alfresco.repo.security.permissions.PermissionReference;
|
import org.alfresco.repo.security.permissions.PermissionReference;
|
||||||
import org.alfresco.repo.security.permissions.PermissionServiceSPI;
|
import org.alfresco.repo.security.permissions.PermissionServiceSPI;
|
||||||
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
||||||
@@ -83,6 +84,8 @@ public class AbstractPermissionTest extends BaseSpringTest
|
|||||||
|
|
||||||
protected AuthorityService authorityService;
|
protected AuthorityService authorityService;
|
||||||
|
|
||||||
|
protected AuthorityDAO authorityDAO;
|
||||||
|
|
||||||
protected NodeDaoService nodeDaoService;
|
protected NodeDaoService nodeDaoService;
|
||||||
|
|
||||||
protected AclDaoComponent aclDaoComponent;
|
protected AclDaoComponent aclDaoComponent;
|
||||||
@@ -109,6 +112,7 @@ public class AbstractPermissionTest extends BaseSpringTest
|
|||||||
permissionModelDAO = (ModelDAO) applicationContext.getBean("permissionsModelDAO");
|
permissionModelDAO = (ModelDAO) applicationContext.getBean("permissionsModelDAO");
|
||||||
personService = (PersonService) applicationContext.getBean("personService");
|
personService = (PersonService) applicationContext.getBean("personService");
|
||||||
authorityService = (AuthorityService) applicationContext.getBean("authorityService");
|
authorityService = (AuthorityService) applicationContext.getBean("authorityService");
|
||||||
|
authorityDAO = (AuthorityDAO) applicationContext.getBean("authorityDAO");
|
||||||
|
|
||||||
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
||||||
authenticationDAO = (MutableAuthenticationDao) applicationContext.getBean("authenticationDao");
|
authenticationDAO = (MutableAuthenticationDao) applicationContext.getBean("authenticationDao");
|
||||||
|
@@ -25,6 +25,7 @@
|
|||||||
package org.alfresco.repo.security.permissions.impl;
|
package org.alfresco.repo.security.permissions.impl;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
import org.alfresco.repo.domain.DbAccessControlList;
|
import org.alfresco.repo.domain.DbAccessControlList;
|
||||||
import org.alfresco.repo.domain.hibernate.AclDaoComponentImpl.Indirection;
|
import org.alfresco.repo.domain.hibernate.AclDaoComponentImpl.Indirection;
|
||||||
@@ -182,4 +183,8 @@ public interface AclDaoComponent extends TransactionalDao
|
|||||||
* @param id
|
* @param id
|
||||||
*/
|
*/
|
||||||
public void onDeleteAccessControlList(final long id);
|
public void onDeleteAccessControlList(final long id);
|
||||||
|
|
||||||
|
public void updateAuthority(String before, String after);
|
||||||
|
|
||||||
|
public void createAuthority(String authority);
|
||||||
}
|
}
|
||||||
|
@@ -68,6 +68,102 @@ public class PermissionServiceTest extends AbstractPermissionTest
|
|||||||
// TODO Auto-generated constructor stub
|
// TODO Auto-generated constructor stub
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void testChangePersonUid()
|
||||||
|
{
|
||||||
|
runAs("admin");
|
||||||
|
NodeRef one = nodeService.createNode(rootNodeRef, ContentModel.ASSOC_CHILDREN, QName.createQName("{namespace}one"), ContentModel.TYPE_FOLDER).getChildRef();
|
||||||
|
permissionService.setPermission(one, "andy", PermissionService.ALL_PERMISSIONS, true);
|
||||||
|
runAs("andy");
|
||||||
|
assertEquals("andy", authenticationComponent.getCurrentUserName());
|
||||||
|
assertTrue(permissionService.hasPermission(one, PermissionService.EXECUTE_CONTENT) == AccessStatus.ALLOWED);
|
||||||
|
runAs("admin");
|
||||||
|
boolean found = false;
|
||||||
|
Set<AccessPermission> set = permissionService.getAllSetPermissions(one);
|
||||||
|
for (AccessPermission ap : set)
|
||||||
|
{
|
||||||
|
if (ap.getAuthority().equals("Andy"))
|
||||||
|
{
|
||||||
|
found = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
assertFalse(found);
|
||||||
|
NodeRef andy = personService.getPerson("andy");
|
||||||
|
nodeService.setProperty(andy, ContentModel.PROP_USERNAME, "Andy");
|
||||||
|
runAs("andy");
|
||||||
|
assertEquals("Andy", authenticationComponent.getCurrentUserName());
|
||||||
|
assertTrue(permissionService.hasPermission(one, PermissionService.EXECUTE_CONTENT) == AccessStatus.ALLOWED);
|
||||||
|
runAs("admin");
|
||||||
|
found = false;
|
||||||
|
set = permissionService.getAllSetPermissions(one);
|
||||||
|
for (AccessPermission ap : set)
|
||||||
|
{
|
||||||
|
if (ap.getAuthority().equals("Andy"))
|
||||||
|
{
|
||||||
|
found = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
assertTrue(found);
|
||||||
|
|
||||||
|
try
|
||||||
|
{
|
||||||
|
nodeService.setProperty(andy, ContentModel.PROP_USERNAME, "Bob");
|
||||||
|
fail("Chainging uid Andy -> Bob should fail");
|
||||||
|
}
|
||||||
|
catch (UnsupportedOperationException e)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testChangeGroupUid()
|
||||||
|
{
|
||||||
|
personService.getPerson("andy");
|
||||||
|
runAs("admin");
|
||||||
|
NodeRef one = nodeService.createNode(rootNodeRef, ContentModel.ASSOC_CHILDREN, QName.createQName("{namespace}one"), ContentModel.TYPE_FOLDER).getChildRef();
|
||||||
|
authorityService.createAuthority(AuthorityType.GROUP, "ONE");
|
||||||
|
authorityService.addAuthority("GROUP_ONE", "andy");
|
||||||
|
permissionService.setPermission(one, "GROUP_ONE", PermissionService.ALL_PERMISSIONS, true);
|
||||||
|
runAs("andy");
|
||||||
|
assertEquals("andy", authenticationComponent.getCurrentUserName());
|
||||||
|
assertTrue(permissionService.hasPermission(one, PermissionService.EXECUTE_CONTENT) == AccessStatus.ALLOWED);
|
||||||
|
runAs("admin");
|
||||||
|
boolean found = false;
|
||||||
|
Set<AccessPermission> set = permissionService.getAllSetPermissions(one);
|
||||||
|
for (AccessPermission ap : set)
|
||||||
|
{
|
||||||
|
if (ap.getAuthority().equals("GROUP_One"))
|
||||||
|
{
|
||||||
|
found = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
assertFalse(found);
|
||||||
|
NodeRef gONE = authorityDAO.getAuthorityNodeRefOrNull("GROUP_ONE");
|
||||||
|
nodeService.setProperty(gONE, ContentModel.PROP_AUTHORITY_NAME, "GROUP_One");
|
||||||
|
runAs("andy");
|
||||||
|
assertTrue(permissionService.hasPermission(one, PermissionService.EXECUTE_CONTENT) == AccessStatus.ALLOWED);
|
||||||
|
runAs("admin");
|
||||||
|
found = false;
|
||||||
|
set = permissionService.getAllSetPermissions(one);
|
||||||
|
for (AccessPermission ap : set)
|
||||||
|
{
|
||||||
|
if (ap.getAuthority().equals("GROUP_One"))
|
||||||
|
{
|
||||||
|
found = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
assertTrue(found);
|
||||||
|
|
||||||
|
try
|
||||||
|
{
|
||||||
|
nodeService.setProperty(gONE, ContentModel.PROP_AUTHORITY_NAME, "GROUP_TWO");
|
||||||
|
fail("Chainging gid GROUP_One -> GROUP_TWO should fail");
|
||||||
|
}
|
||||||
|
catch (UnsupportedOperationException e)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public void testAuthenticatedRoleIsPresent()
|
public void testAuthenticatedRoleIsPresent()
|
||||||
{
|
{
|
||||||
runAs("andy");
|
runAs("andy");
|
||||||
|
@@ -44,6 +44,7 @@ import org.alfresco.repo.policy.PolicyComponent;
|
|||||||
import org.alfresco.repo.security.authentication.AuthenticationException;
|
import org.alfresco.repo.security.authentication.AuthenticationException;
|
||||||
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
||||||
import org.alfresco.repo.security.permissions.PermissionServiceSPI;
|
import org.alfresco.repo.security.permissions.PermissionServiceSPI;
|
||||||
|
import org.alfresco.repo.security.permissions.impl.AclDaoComponent;
|
||||||
import org.alfresco.repo.tenant.TenantService;
|
import org.alfresco.repo.tenant.TenantService;
|
||||||
import org.alfresco.repo.transaction.AlfrescoTransactionSupport;
|
import org.alfresco.repo.transaction.AlfrescoTransactionSupport;
|
||||||
import org.alfresco.repo.transaction.TransactionListenerAdapter;
|
import org.alfresco.repo.transaction.TransactionListenerAdapter;
|
||||||
@@ -69,12 +70,14 @@ import org.alfresco.service.namespace.NamespaceService;
|
|||||||
import org.alfresco.service.namespace.QName;
|
import org.alfresco.service.namespace.QName;
|
||||||
import org.alfresco.service.namespace.RegexQNamePattern;
|
import org.alfresco.service.namespace.RegexQNamePattern;
|
||||||
import org.alfresco.service.transaction.TransactionService;
|
import org.alfresco.service.transaction.TransactionService;
|
||||||
|
import org.alfresco.util.EqualsHelper;
|
||||||
import org.alfresco.util.GUID;
|
import org.alfresco.util.GUID;
|
||||||
import org.alfresco.util.PropertyCheck;
|
import org.alfresco.util.PropertyCheck;
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
|
||||||
public class PersonServiceImpl extends TransactionListenerAdapter implements PersonService, NodeServicePolicies.OnCreateNodePolicy, NodeServicePolicies.BeforeDeleteNodePolicy
|
public class PersonServiceImpl extends TransactionListenerAdapter implements PersonService, NodeServicePolicies.OnCreateNodePolicy, NodeServicePolicies.BeforeDeleteNodePolicy,
|
||||||
|
NodeServicePolicies.OnUpdatePropertiesPolicy
|
||||||
{
|
{
|
||||||
private static Log s_logger = LogFactory.getLog(PersonServiceImpl.class);
|
private static Log s_logger = LogFactory.getLog(PersonServiceImpl.class);
|
||||||
|
|
||||||
@@ -130,6 +133,8 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
|
|
||||||
private PersonDao personDao;
|
private PersonDao personDao;
|
||||||
|
|
||||||
|
private AclDaoComponent aclDao;
|
||||||
|
|
||||||
private PermissionsManager permissionsManager;
|
private PermissionsManager permissionsManager;
|
||||||
|
|
||||||
/** a transactionally-safe cache to be injected */
|
/** a transactionally-safe cache to be injected */
|
||||||
@@ -177,12 +182,15 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
PropertyCheck.mandatory(this, "policyComponent", policyComponent);
|
PropertyCheck.mandatory(this, "policyComponent", policyComponent);
|
||||||
PropertyCheck.mandatory(this, "personCache", personCache);
|
PropertyCheck.mandatory(this, "personCache", personCache);
|
||||||
PropertyCheck.mandatory(this, "personDao", personDao);
|
PropertyCheck.mandatory(this, "personDao", personDao);
|
||||||
|
PropertyCheck.mandatory(this, "aclDao", aclDao);
|
||||||
|
PropertyCheck.mandatory(this, "homeFolderManager", homeFolderManager);
|
||||||
|
|
||||||
this.policyComponent
|
this.policyComponent
|
||||||
.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "onCreateNode"), ContentModel.TYPE_PERSON, new JavaBehaviour(this, "onCreateNode"));
|
.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "onCreateNode"), ContentModel.TYPE_PERSON, new JavaBehaviour(this, "onCreateNode"));
|
||||||
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "beforeDeleteNode"), ContentModel.TYPE_PERSON, new JavaBehaviour(this,
|
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "beforeDeleteNode"), ContentModel.TYPE_PERSON, new JavaBehaviour(this,
|
||||||
"beforeDeleteNode"));
|
"beforeDeleteNode"));
|
||||||
|
this.policyComponent.bindClassBehaviour(QName.createQName(NamespaceService.ALFRESCO_URI, "onUpdateProperties"), ContentModel.TYPE_PERSON, new JavaBehaviour(this,
|
||||||
|
"onUpdateProperties"));
|
||||||
}
|
}
|
||||||
|
|
||||||
public UserNameMatcher getUserNameMatcher()
|
public UserNameMatcher getUserNameMatcher()
|
||||||
@@ -230,6 +238,11 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
this.personDao = personDao;
|
this.personDao = personDao;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void setAclDao(AclDaoComponent aclDao)
|
||||||
|
{
|
||||||
|
this.aclDao = aclDao;
|
||||||
|
}
|
||||||
|
|
||||||
public void setPermissionsManager(PermissionsManager permissionsManager)
|
public void setPermissionsManager(PermissionsManager permissionsManager)
|
||||||
{
|
{
|
||||||
this.permissionsManager = permissionsManager;
|
this.permissionsManager = permissionsManager;
|
||||||
@@ -643,6 +656,7 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
nodeService.addChild(authorityService.getOrCreateZone(zone), personRef, ContentModel.ASSOC_IN_ZONE, QName.createQName("cm", userName, namespacePrefixResolver));
|
nodeService.addChild(authorityService.getOrCreateZone(zone), personRef, ContentModel.ASSOC_IN_ZONE, QName.createQName("cm", userName, namespacePrefixResolver));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return personRef;
|
return personRef;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -782,6 +796,12 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
String username = (String) this.nodeService.getProperty(personRef, ContentModel.PROP_USERNAME);
|
String username = (String) this.nodeService.getProperty(personRef, ContentModel.PROP_USERNAME);
|
||||||
this.personCache.put(username, personRef);
|
this.personCache.put(username, personRef);
|
||||||
permissionsManager.setPermissions(personRef, username, username);
|
permissionsManager.setPermissions(personRef, username, username);
|
||||||
|
|
||||||
|
// Make sure there is an authority entry - with a DB constraint for uniqueness
|
||||||
|
// aclDao.createAuthority(username);
|
||||||
|
|
||||||
|
// work around for policy bug ...
|
||||||
|
homeFolderManager.onCreateNode(childAssocRef);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@@ -916,4 +936,37 @@ public class PersonServiceImpl extends TransactionListenerAdapter implements Per
|
|||||||
return userNameMatcher.getUserNamesAreCaseSensitive();
|
return userNameMatcher.getUserNamesAreCaseSensitive();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* When a uid is changed we need to create an alias for the old uid so permissions are not broken. This can happen
|
||||||
|
* when an already existing user is updated via LDAP e.g. migration to LDAP, or when a user is auto created and then
|
||||||
|
* updated by LDAP This is probably less likely after 3.2 and sync on missing person See
|
||||||
|
* https://issues.alfresco.com/jira/browse/ETWOTWO-389 (non-Javadoc)
|
||||||
|
*
|
||||||
|
* @see org.alfresco.repo.node.NodeServicePolicies.OnUpdatePropertiesPolicy#onUpdateProperties(org.alfresco.service.cmr.repository.NodeRef,
|
||||||
|
* java.util.Map, java.util.Map)
|
||||||
|
*/
|
||||||
|
public void onUpdateProperties(NodeRef nodeRef, Map<QName, Serializable> before, Map<QName, Serializable> after)
|
||||||
|
{
|
||||||
|
String uidBefore = DefaultTypeConverter.INSTANCE.convert(String.class, before.get(ContentModel.PROP_USERNAME));
|
||||||
|
String uidAfter = DefaultTypeConverter.INSTANCE.convert(String.class, after.get(ContentModel.PROP_USERNAME));
|
||||||
|
if (!EqualsHelper.nullSafeEquals(uidBefore, uidAfter))
|
||||||
|
{
|
||||||
|
if ((uidBefore == null) || uidBefore.equalsIgnoreCase(uidAfter))
|
||||||
|
{
|
||||||
|
// Fix any ACLs
|
||||||
|
aclDao.updateAuthority(uidBefore, uidAfter);
|
||||||
|
// Fix primary association local name
|
||||||
|
QName newAssocQName = QName.createQName("cm", uidAfter.toLowerCase(), namespacePrefixResolver);
|
||||||
|
ChildAssociationRef assoc = nodeService.getPrimaryParent(nodeRef);
|
||||||
|
nodeService.moveNode(nodeRef, assoc.getParentRef(), assoc.getTypeQName(), newAssocQName);
|
||||||
|
// Fix cache
|
||||||
|
personCache.remove(uidBefore);
|
||||||
|
personCache.put(uidAfter, nodeRef);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
throw new UnsupportedOperationException("The user name on a person can not be changed");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user