Merged HEAD-QA to HEAD (4.2) (including moving test classes into separate folders)

51903 to 54309 


git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@54310 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
Samuel Langlois
2013-08-20 17:17:31 +00:00
parent a91f6e2535
commit 788d3c9c89
777 changed files with 77820 additions and 23746 deletions

View File

@@ -0,0 +1,149 @@
/*
* Copyright (C) 2005-2011 Alfresco Software Limited.
*
* This file is part of Alfresco
*
* Alfresco is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Alfresco is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
*/
package org.alfresco.rest.api.tests;
import java.util.ArrayList;
import java.util.List;
import org.alfresco.repo.security.authentication.AuthenticationUtil;
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
import org.alfresco.repo.tenant.TenantService;
import org.alfresco.repo.transaction.RetryingTransactionHelper;
import org.alfresco.repo.web.scripts.BaseWebScriptTest;
import org.alfresco.service.cmr.security.MutableAuthenticationService;
import org.alfresco.util.ApplicationContextHelper;
import org.springframework.context.ApplicationContext;
import org.springframework.extensions.webscripts.TestWebScriptServer;
/**
* Helper for Cloud Tests
*/
public class PublicApiTestContext
{
private ApplicationContext applicationContext;
private BaseWebScriptTest test;
private List<String> usersToBeTidied = new ArrayList<String>();
private List<String> invalidDomainsToBeTidied = new ArrayList<String>();
private MutableAuthenticationService authenticationService;
private RetryingTransactionHelper transactionHelper;
public PublicApiTestContext()
{
init(ApplicationContextHelper.getApplicationContext());
}
public PublicApiTestContext(ApplicationContext context)
{
init(context);
}
public PublicApiTestContext(BaseWebScriptTest test)
{
this.test = test;
this.test.setCustomContext("cloud-test-context.xml");
init(test.getServer().getApplicationContext());
}
private void init(ApplicationContext context)
{
applicationContext = context;
transactionHelper = (RetryingTransactionHelper)applicationContext.getBean("retryingTransactionHelper");
authenticationService = (MutableAuthenticationService)applicationContext.getBean("authenticationService");
}
public ApplicationContext getApplicationContext()
{
return applicationContext;
}
public TestWebScriptServer getTestServer()
{
return test.getServer();
}
public String createUserName(String alias, String tenant)
{
StringBuilder sb = new StringBuilder();
sb.append(alias);
if(tenant != null && !tenant.equals(TenantService.DEFAULT_DOMAIN))
{
sb.append("@");
sb.append(tenant);
}
return sb.toString();
}
public void addUser(String user)
{
usersToBeTidied.add(user);
}
public void addInvalidDomain(String domain)
{
invalidDomainsToBeTidied.add(domain);
}
public void removeInvalidDomain(String domain)
{
invalidDomainsToBeTidied.remove(domain);
}
public void cleanup()
{
RunAsWork<Void> work = new RunAsWork<Void>()
{
@Override
public Void doWork() throws Exception
{
transactionHelper.doInTransaction(new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
{
@SuppressWarnings("synthetic-access")
public Void execute() throws Throwable
{
return null;
}
});
return null;
}
};
AuthenticationUtil.runAs(work, AuthenticationUtil.getSystemUserName());
for (final String user : this.usersToBeTidied)
{
transactionHelper.doInTransaction(new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
{
@Override
public Void execute() throws Throwable
{
if (authenticationService.authenticationExists(user))
{
authenticationService.deleteAuthentication(user);
}
return null;
}
});
}
usersToBeTidied.clear();
// finally clear authentication
AuthenticationUtil.clearCurrentSecurityContext();
}
}