mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-31 17:39:05 +00:00
RM-4907: added unit tests for csv acceptance criteria and made
processNode method protected
This commit is contained in:
@@ -464,7 +464,7 @@ public class DynamicAuthoritiesGet extends AbstractWebScript implements RecordsM
|
|||||||
* @param nodeRef
|
* @param nodeRef
|
||||||
*/
|
*/
|
||||||
@SuppressWarnings({ "unchecked"})
|
@SuppressWarnings({ "unchecked"})
|
||||||
private void processNode(NodeRef nodeRef)
|
protected void processNode(NodeRef nodeRef)
|
||||||
{
|
{
|
||||||
// get the reader/writer data
|
// get the reader/writer data
|
||||||
Map<String, Integer> readers = (Map<String, Integer>)nodeService.getProperty(nodeRef, PROP_READERS);
|
Map<String, Integer> readers = (Map<String, Integer>)nodeService.getProperty(nodeRef, PROP_READERS);
|
||||||
|
@@ -1,420 +1,214 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (C) 2005-2014 Alfresco Software Limited.
|
* Copyright (C) 2005-2014 Alfresco Software Limited.
|
||||||
*
|
*
|
||||||
* This file is part of Alfresco
|
* This file is part of Alfresco
|
||||||
*
|
*
|
||||||
* Alfresco is free software: you can redistribute it and/or modify
|
* Alfresco is free software: you can redistribute it and/or modify
|
||||||
* it under the terms of the GNU Lesser General Public License as published by
|
* it under the terms of the GNU Lesser General Public License as published by
|
||||||
* the Free Software Foundation, either version 3 of the License, or
|
* the Free Software Foundation, either version 3 of the License, or
|
||||||
* (at your option) any later version.
|
* (at your option) any later version.
|
||||||
*
|
*
|
||||||
* Alfresco is distributed in the hope that it will be useful,
|
* Alfresco is distributed in the hope that it will be useful,
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
* GNU Lesser General Public License for more details.
|
* GNU Lesser General Public License for more details.
|
||||||
*
|
*
|
||||||
* You should have received a copy of the GNU Lesser General Public License
|
* You should have received a copy of the GNU Lesser General Public License
|
||||||
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package org.alfresco.repo.web.scripts.roles;
|
package org.alfresco.repo.web.scripts.roles;
|
||||||
|
|
||||||
import static java.util.Collections.emptyMap;
|
import static java.util.Collections.emptyMap;
|
||||||
|
|
||||||
import static org.junit.Assert.assertEquals;
|
import static org.junit.Assert.assertEquals;
|
||||||
import static org.junit.Assert.assertNotNull;
|
import static org.junit.Assert.assertNotNull;
|
||||||
import static org.junit.Assert.fail;
|
import static org.junit.Assert.fail;
|
||||||
import static org.mockito.Matchers.any;
|
import static org.mockito.Matchers.any;
|
||||||
import static org.mockito.Matchers.anyBoolean;
|
import static org.mockito.Matchers.anyBoolean;
|
||||||
import static org.mockito.Matchers.anyLong;
|
import static org.mockito.Matchers.anyLong;
|
||||||
import static org.mockito.Matchers.eq;
|
import static org.mockito.Matchers.eq;
|
||||||
import static org.mockito.Mockito.doAnswer;
|
import static org.mockito.Mockito.doAnswer;
|
||||||
import static org.mockito.Mockito.never;
|
import static org.mockito.Mockito.never;
|
||||||
import static org.mockito.Mockito.times;
|
import static org.mockito.Mockito.times;
|
||||||
import static org.mockito.Mockito.verify;
|
import static org.mockito.Mockito.verify;
|
||||||
import static org.mockito.Mockito.when;
|
import static org.mockito.Mockito.when;
|
||||||
|
|
||||||
import java.io.Serializable;
|
import java.io.File;
|
||||||
import java.util.Collections;
|
import java.io.Serializable;
|
||||||
import java.util.List;
|
import java.util.Collections;
|
||||||
import java.util.Map;
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Map;
|
||||||
import java.util.stream.Collectors;
|
import java.util.Set;
|
||||||
import java.util.stream.Stream;
|
import java.util.stream.Collectors;
|
||||||
|
import java.util.stream.Stream;
|
||||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
|
||||||
import com.google.common.collect.ImmutableMap;
|
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||||
|
import com.google.common.collect.ImmutableMap;
|
||||||
import org.alfresco.module.org_alfresco_module_rm.model.RecordsManagementModel;
|
|
||||||
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedReaderDynamicAuthority;
|
import org.alfresco.model.ContentModel;
|
||||||
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService;
|
import org.alfresco.module.org_alfresco_module_rm.model.RecordsManagementModel;
|
||||||
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedWriterDynamicAuthority;
|
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedReaderDynamicAuthority;
|
||||||
import org.alfresco.module.org_alfresco_module_rm.test.util.AlfMock;
|
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService;
|
||||||
import org.alfresco.module.org_alfresco_module_rm.test.util.BaseWebScriptUnitTest;
|
import org.alfresco.module.org_alfresco_module_rm.security.ExtendedWriterDynamicAuthority;
|
||||||
import org.alfresco.repo.domain.node.NodeDAO;
|
import org.alfresco.module.org_alfresco_module_rm.test.util.AlfMock;
|
||||||
import org.alfresco.repo.domain.patch.PatchDAO;
|
import org.alfresco.module.org_alfresco_module_rm.test.util.BaseWebScriptUnitTest;
|
||||||
import org.alfresco.repo.domain.qname.QNameDAO;
|
import org.alfresco.repo.domain.node.NodeDAO;
|
||||||
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
import org.alfresco.repo.domain.patch.PatchDAO;
|
||||||
import org.alfresco.repo.transaction.RetryingTransactionHelper.RetryingTransactionCallback;
|
import org.alfresco.repo.domain.qname.QNameDAO;
|
||||||
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
||||||
|
import org.alfresco.repo.transaction.RetryingTransactionHelper.RetryingTransactionCallback;
|
||||||
import org.alfresco.repo.web.scripts.content.ContentStreamer;
|
import org.alfresco.repo.web.scripts.content.ContentStreamer;
|
||||||
import org.alfresco.service.cmr.repository.NodeRef;
|
import org.alfresco.service.cmr.repository.NodeRef;
|
||||||
import org.alfresco.service.cmr.repository.NodeService;
|
import org.alfresco.service.cmr.repository.NodeService;
|
||||||
import org.alfresco.service.cmr.security.PermissionService;
|
import org.alfresco.service.cmr.security.PermissionService;
|
||||||
import org.alfresco.service.namespace.QName;
|
import org.alfresco.service.namespace.QName;
|
||||||
import org.alfresco.service.transaction.TransactionService;
|
import org.alfresco.service.transaction.TransactionService;
|
||||||
import org.alfresco.util.Pair;
|
import org.alfresco.util.Pair;
|
||||||
import org.json.JSONObject;
|
import org.json.JSONObject;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.mockito.InjectMocks;
|
import org.mockito.ArgumentCaptor;
|
||||||
import org.mockito.Mock;
|
import org.mockito.InjectMocks;
|
||||||
import org.mockito.MockitoAnnotations;
|
import org.mockito.Mock;
|
||||||
import org.mockito.invocation.InvocationOnMock;
|
import org.mockito.MockitoAnnotations;
|
||||||
import org.mockito.stubbing.Answer;
|
import org.mockito.invocation.InvocationOnMock;
|
||||||
|
import org.mockito.stubbing.Answer;
|
||||||
import org.springframework.extensions.webscripts.AbstractWebScript;
|
import org.springframework.extensions.webscripts.AbstractWebScript;
|
||||||
import org.springframework.extensions.webscripts.Status;
|
import org.springframework.extensions.webscripts.Status;
|
||||||
import org.springframework.extensions.webscripts.WebScriptException;
|
import org.springframework.extensions.webscripts.WebScriptException;
|
||||||
|
import org.springframework.extensions.webscripts.WebScriptRequest;
|
||||||
/**
|
import org.springframework.extensions.webscripts.WebScriptResponse;
|
||||||
* DynamicAuthoritiesGet Unit Test
|
|
||||||
*
|
/**
|
||||||
* @author Silviu Dinuta
|
* DynamicAuthoritiesGet Unit Test
|
||||||
*/
|
*
|
||||||
@SuppressWarnings("deprecation")
|
* @author Silviu Dinuta
|
||||||
public class DynamicAuthoritiesGetUnitTest extends BaseWebScriptUnitTest implements RecordsManagementModel
|
*/
|
||||||
{
|
@SuppressWarnings("deprecation")
|
||||||
/** test data */
|
public class DynamicAuthoritiesGetUnitTest extends BaseWebScriptUnitTest implements RecordsManagementModel
|
||||||
private static final Long ASPECT_ID = 123l;
|
{
|
||||||
private static final QName ASPECT = AlfMock.generateQName();
|
/** test data */
|
||||||
|
private static final Long ASPECT_ID = 123l;
|
||||||
/** mocks */
|
private static final QName ASPECT = AlfMock.generateQName();
|
||||||
@Mock
|
|
||||||
private PatchDAO mockedPatchDAO;
|
/** mocks */
|
||||||
@Mock
|
@Mock
|
||||||
private NodeDAO mockedNodeDAO;
|
private PatchDAO mockedPatchDAO;
|
||||||
@Mock
|
@Mock
|
||||||
private QNameDAO mockedQnameDAO;
|
private NodeDAO mockedNodeDAO;
|
||||||
@Mock
|
@Mock
|
||||||
private NodeService mockedNodeService;
|
private QNameDAO mockedQnameDAO;
|
||||||
@Mock
|
@Mock
|
||||||
private PermissionService mockedPermissionService;
|
private NodeService mockedNodeService;
|
||||||
@Mock
|
@Mock
|
||||||
private ExtendedSecurityService mockedExtendedSecurityService;
|
private PermissionService mockedPermissionService;
|
||||||
@Mock
|
@Mock
|
||||||
private TransactionService mockedTransactionService;
|
private ExtendedSecurityService mockedExtendedSecurityService;
|
||||||
@Mock
|
@Mock
|
||||||
private RetryingTransactionHelper mockedRetryingTransactionHelper;
|
private TransactionService mockedTransactionService;
|
||||||
|
@Mock
|
||||||
|
private RetryingTransactionHelper mockedRetryingTransactionHelper;
|
||||||
@Mock
|
@Mock
|
||||||
private ContentStreamer contentStreamer;
|
private ContentStreamer contentStreamer;
|
||||||
|
|
||||||
/** test component */
|
|
||||||
@InjectMocks
|
|
||||||
private DynamicAuthoritiesGet webScript;
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected AbstractWebScript getWebScript()
|
|
||||||
{
|
|
||||||
return webScript;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected String getWebScriptTemplate()
|
|
||||||
{
|
|
||||||
return "alfresco/templates/webscripts/org/alfresco/repository/roles/rm-dynamicauthorities.get.json.ftl";
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Before test
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
@Before
|
|
||||||
public void before()
|
|
||||||
{
|
|
||||||
MockitoAnnotations.initMocks(this);
|
|
||||||
webScript.setNodeService(mockedNodeService);
|
|
||||||
webScript.setPermissionService(mockedPermissionService);
|
|
||||||
webScript.setExtendedSecurityService(mockedExtendedSecurityService);
|
|
||||||
// setup retrying transaction helper
|
|
||||||
Answer<Object> doInTransactionAnswer = new Answer<Object>()
|
|
||||||
{
|
|
||||||
@SuppressWarnings("rawtypes")
|
|
||||||
@Override
|
|
||||||
public Object answer(InvocationOnMock invocation) throws Throwable
|
|
||||||
{
|
|
||||||
RetryingTransactionCallback callback = (RetryingTransactionCallback) invocation.getArguments()[0];
|
|
||||||
return callback.execute();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
doAnswer(doInTransactionAnswer).when(mockedRetryingTransactionHelper)
|
|
||||||
.<Object> doInTransaction(any(RetryingTransactionCallback.class), anyBoolean(), anyBoolean());
|
|
||||||
|
|
||||||
when(mockedTransactionService.getRetryingTransactionHelper()).thenReturn(mockedRetryingTransactionHelper);
|
|
||||||
|
|
||||||
// max node id
|
|
||||||
when(mockedPatchDAO.getMaxAdmNodeID()).thenReturn(500000L);
|
|
||||||
|
|
||||||
// aspect
|
|
||||||
when(mockedQnameDAO.getQName(ASPECT_EXTENDED_SECURITY)).thenReturn(new Pair<Long, QName>(ASPECT_ID, ASPECT));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given that there are no nodes with the extended security aspect When the action is executed Nothing happens
|
|
||||||
* @throws Exception
|
|
||||||
*/
|
|
||||||
@SuppressWarnings({ "unchecked" })
|
|
||||||
@Test
|
|
||||||
public void noNodesWithExtendedSecurity() throws Exception
|
|
||||||
{
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
|
||||||
.thenReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "3");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
|
|
||||||
// Check the JSON result using Jackson to allow easy equality testing.
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 0 records.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
|
|
||||||
|
|
||||||
verify(mockedNodeService, never()).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
|
||||||
verify(mockedNodeService, never()).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
|
||||||
verify(mockedNodeService, never()).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
|
||||||
verify(mockedPermissionService, never()).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
|
||||||
verify(mockedPermissionService, never()).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
|
||||||
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given that there are records with the extended security aspect When the action is executed Then the aspect is
|
|
||||||
* removed And the dynamic authorities permissions are cleared And extended security is set via the updated API
|
|
||||||
* @throws Exception
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
@Test
|
|
||||||
public void recordsWithExtendedSecurityAspect() throws Exception
|
|
||||||
{
|
|
||||||
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
|
||||||
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
|
||||||
.thenReturn(ids)
|
|
||||||
.thenReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
ids.stream().forEach((i) -> {
|
|
||||||
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
|
||||||
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
|
||||||
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
|
|
||||||
|
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
|
||||||
verify(mockedNodeService, times(3)).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
|
||||||
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
|
||||||
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
|
||||||
verify(mockedExtendedSecurityService, times(3)).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given that there are non-records with the extended security aspect When the web script is executed Then the aspect is
|
|
||||||
* removed And the dynamic authorities permissions are cleared
|
|
||||||
* @throws Exception
|
|
||||||
*/
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
@Test
|
|
||||||
public void nonRecordsWithExtendedSecurityAspect() throws Exception
|
|
||||||
{
|
|
||||||
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
|
||||||
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
|
||||||
.thenReturn(ids)
|
|
||||||
.thenReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
ids.stream().forEach((i) -> {
|
|
||||||
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
|
||||||
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
|
||||||
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
|
|
||||||
|
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
|
||||||
verify(mockedNodeService, times(3)).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
|
||||||
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
|
||||||
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
|
||||||
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
|
||||||
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void missingBatchSizeParameter() throws Exception
|
|
||||||
{
|
|
||||||
try
|
|
||||||
{
|
|
||||||
executeJSONWebScript(emptyMap());
|
|
||||||
fail("Expected exception as parameter batchsize is mandatory.");
|
|
||||||
}
|
|
||||||
catch (WebScriptException e)
|
|
||||||
{
|
|
||||||
assertEquals("If parameter batchsize is not provided then 'Bad request' should be returned.",
|
|
||||||
Status.STATUS_BAD_REQUEST, e.getStatus());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void invalidBatchSizeParameter() throws Exception
|
|
||||||
{
|
|
||||||
try
|
|
||||||
{
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "dd");
|
|
||||||
executeJSONWebScript(parameters);
|
|
||||||
fail("Expected exception as parameter batchsize is invalid.");
|
|
||||||
}
|
|
||||||
catch (WebScriptException e)
|
|
||||||
{
|
|
||||||
assertEquals("If parameter batchsize is invalid then 'Bad request' should be returned.",
|
|
||||||
Status.STATUS_BAD_REQUEST, e.getStatus());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void batchSizeShouldBeGraterThanZero() throws Exception
|
|
||||||
{
|
|
||||||
try
|
|
||||||
{
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "0");
|
|
||||||
executeJSONWebScript(parameters);
|
|
||||||
fail("Expected exception as parameter batchsize is not a number greater than 0.");
|
|
||||||
}
|
|
||||||
catch (WebScriptException e)
|
|
||||||
{
|
|
||||||
assertEquals("If parameter batchsize is not a number greater than 0 then 'Bad request' should be returned.",
|
|
||||||
Status.STATUS_BAD_REQUEST, e.getStatus());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void extendedSecurityAspectNotCreated() throws Exception
|
|
||||||
{
|
|
||||||
when(mockedQnameDAO.getQName(ASPECT_EXTENDED_SECURITY)).thenReturn(null);
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "3");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"There where no records to be processed.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void processAllRecordsWhenMaxProcessedRecordsIsZero() throws Exception
|
|
||||||
{
|
|
||||||
List<Long> ids = Stream.of(1l, 2l, 3l,4l).collect(Collectors.toList());
|
|
||||||
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
|
||||||
.thenReturn(ids)
|
|
||||||
.thenReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
ids.stream().forEach((i) -> {
|
|
||||||
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
|
||||||
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
|
||||||
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "0");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 4 records.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void whenMaxProcessedRecordsIsMissingItDefaultsToBatchSize() throws Exception
|
|
||||||
{
|
|
||||||
List<Long> ids = Stream.of(1l, 2l, 3l, 4l, 5l).collect(Collectors.toList());
|
|
||||||
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
|
||||||
.thenReturn(ids)
|
|
||||||
.thenReturn(Collections.emptyList());
|
|
||||||
|
|
||||||
ids.stream().forEach((i) -> {
|
|
||||||
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
|
||||||
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
|
||||||
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
|
||||||
.thenReturn((Serializable) Collections.emptyMap());
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
// Set up parameters.
|
|
||||||
Map<String, String> parameters = ImmutableMap.of("batchsize", "4");
|
|
||||||
JSONObject json = executeJSONWebScript(parameters);
|
|
||||||
assertNotNull(json);
|
|
||||||
String actualJSONString = json.toString();
|
|
||||||
ObjectMapper mapper = new ObjectMapper();
|
|
||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed first 4 records.\"}";
|
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
/** test component */
|
||||||
|
@InjectMocks
|
||||||
|
private DynamicAuthoritiesGet webScript;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected AbstractWebScript getWebScript()
|
||||||
|
{
|
||||||
|
return webScript;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected String getWebScriptTemplate()
|
||||||
|
{
|
||||||
|
return "alfresco/templates/webscripts/org/alfresco/repository/roles/rm-dynamicauthorities.get.json.ftl";
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Before test
|
||||||
|
*/
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
@Before
|
||||||
|
public void before()
|
||||||
|
{
|
||||||
|
MockitoAnnotations.initMocks(this);
|
||||||
|
webScript.setNodeService(mockedNodeService);
|
||||||
|
webScript.setPermissionService(mockedPermissionService);
|
||||||
|
webScript.setExtendedSecurityService(mockedExtendedSecurityService);
|
||||||
|
// setup retrying transaction helper
|
||||||
|
Answer<Object> doInTransactionAnswer = new Answer<Object>()
|
||||||
|
{
|
||||||
|
@SuppressWarnings("rawtypes")
|
||||||
|
@Override
|
||||||
|
public Object answer(InvocationOnMock invocation) throws Throwable
|
||||||
|
{
|
||||||
|
RetryingTransactionCallback callback = (RetryingTransactionCallback) invocation.getArguments()[0];
|
||||||
|
return callback.execute();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
doAnswer(doInTransactionAnswer).when(mockedRetryingTransactionHelper)
|
||||||
|
.<Object> doInTransaction(any(RetryingTransactionCallback.class), anyBoolean(), anyBoolean());
|
||||||
|
|
||||||
|
when(mockedTransactionService.getRetryingTransactionHelper()).thenReturn(mockedRetryingTransactionHelper);
|
||||||
|
|
||||||
|
// max node id
|
||||||
|
when(mockedPatchDAO.getMaxAdmNodeID()).thenReturn(500000L);
|
||||||
|
|
||||||
|
// aspect
|
||||||
|
when(mockedQnameDAO.getQName(ASPECT_EXTENDED_SECURITY)).thenReturn(new Pair<Long, QName>(ASPECT_ID, ASPECT));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given that there are no nodes with the extended security aspect When the action is executed Nothing happens
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@SuppressWarnings({ "unchecked" })
|
||||||
|
@Test
|
||||||
|
public void noNodesWithExtendedSecurity() throws Exception
|
||||||
|
{
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "3");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
|
||||||
|
// Check the JSON result using Jackson to allow easy equality testing.
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 0 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
|
||||||
|
verify(mockedNodeService, never()).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
||||||
|
verify(mockedNodeService, never()).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
||||||
|
verify(mockedNodeService, never()).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
||||||
|
verify(mockedPermissionService, never()).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
||||||
|
verify(mockedPermissionService, never()).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
||||||
|
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given that there are records with the extended security aspect When the action is executed Then the aspect is
|
||||||
|
* removed And the dynamic authorities permissions are cleared And extended security is set via the updated API
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
@SuppressWarnings("unchecked")
|
@SuppressWarnings("unchecked")
|
||||||
@Test
|
@Test
|
||||||
public void recordsWithExtendedSecurityAspectAndNullWritersAndReaders() throws Exception
|
public void recordsWithExtendedSecurityAspect() throws Exception
|
||||||
{
|
{
|
||||||
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
||||||
|
|
||||||
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong()))
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
.thenReturn(ids)
|
|
||||||
.thenReturn(Collections.emptyList());
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
ids.stream().forEach((i) -> {
|
ids.stream().forEach((i) -> {
|
||||||
@@ -422,9 +216,9 @@ public class DynamicAuthoritiesGetUnitTest extends BaseWebScriptUnitTest impleme
|
|||||||
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
.thenReturn(null);
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
.thenReturn(null);
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
|
||||||
});
|
});
|
||||||
|
|
||||||
@@ -437,6 +231,51 @@ public class DynamicAuthoritiesGetUnitTest extends BaseWebScriptUnitTest impleme
|
|||||||
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
||||||
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
|
||||||
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
||||||
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
||||||
|
verify(mockedNodeService, times(3)).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
||||||
|
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
||||||
|
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
||||||
|
verify(mockedExtendedSecurityService, times(3)).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given that there are non-records with the extended security aspect When the web script is executed Then the
|
||||||
|
* aspect is removed And the dynamic authorities permissions are cleared
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
@Test
|
||||||
|
public void nonRecordsWithExtendedSecurityAspect() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
||||||
|
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
|
||||||
|
});
|
||||||
|
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
||||||
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
||||||
@@ -447,4 +286,240 @@ public class DynamicAuthoritiesGetUnitTest extends BaseWebScriptUnitTest impleme
|
|||||||
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
||||||
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void missingBatchSizeParameter() throws Exception
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
executeJSONWebScript(emptyMap());
|
||||||
|
fail("Expected exception as parameter batchsize is mandatory.");
|
||||||
|
}
|
||||||
|
catch (WebScriptException e)
|
||||||
|
{
|
||||||
|
assertEquals("If parameter batchsize is not provided then 'Bad request' should be returned.",
|
||||||
|
Status.STATUS_BAD_REQUEST, e.getStatus());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void invalidBatchSizeParameter() throws Exception
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "dd");
|
||||||
|
executeJSONWebScript(parameters);
|
||||||
|
fail("Expected exception as parameter batchsize is invalid.");
|
||||||
|
}
|
||||||
|
catch (WebScriptException e)
|
||||||
|
{
|
||||||
|
assertEquals("If parameter batchsize is invalid then 'Bad request' should be returned.",
|
||||||
|
Status.STATUS_BAD_REQUEST, e.getStatus());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void batchSizeShouldBeGraterThanZero() throws Exception
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "0");
|
||||||
|
executeJSONWebScript(parameters);
|
||||||
|
fail("Expected exception as parameter batchsize is not a number greater than 0.");
|
||||||
|
}
|
||||||
|
catch (WebScriptException e)
|
||||||
|
{
|
||||||
|
assertEquals("If parameter batchsize is not a number greater than 0 then 'Bad request' should be returned.",
|
||||||
|
Status.STATUS_BAD_REQUEST, e.getStatus());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void extendedSecurityAspectNotCreated() throws Exception
|
||||||
|
{
|
||||||
|
when(mockedQnameDAO.getQName(ASPECT_EXTENDED_SECURITY)).thenReturn(null);
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "3");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"There where no records to be processed.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void processAllRecordsWhenMaxProcessedRecordsIsZero() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l, 4l).collect(Collectors.toList());
|
||||||
|
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
|
||||||
|
});
|
||||||
|
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "0");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 4 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void whenMaxProcessedRecordsIsMissingItDefaultsToBatchSize() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l, 4l, 5l).collect(Collectors.toList());
|
||||||
|
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(false);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
|
||||||
|
});
|
||||||
|
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "4");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed first 4 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
}
|
||||||
|
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
@Test
|
||||||
|
public void recordsWithExtendedSecurityAspectAndNullWritersAndReaders() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
||||||
|
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS)).thenReturn(null);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS)).thenReturn(null);
|
||||||
|
|
||||||
|
});
|
||||||
|
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
|
||||||
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_READERS));
|
||||||
|
verify(mockedNodeService, times(3)).getProperty(any(NodeRef.class), eq(PROP_WRITERS));
|
||||||
|
verify(mockedNodeService, times(3)).removeAspect(any(NodeRef.class), eq(ASPECT_EXTENDED_SECURITY));
|
||||||
|
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedReaderDynamicAuthority.EXTENDED_READER));
|
||||||
|
verify(mockedPermissionService, times(3)).clearPermission(any(NodeRef.class),
|
||||||
|
eq(ExtendedWriterDynamicAuthority.EXTENDED_WRITER));
|
||||||
|
verify(mockedExtendedSecurityService, never()).set(any(NodeRef.class), any(Set.class), any(Set.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given I have records that require migration
|
||||||
|
* And I am interested in knowning which records are migrated
|
||||||
|
* When I run the migration tool
|
||||||
|
* Then I will be returned a CSV file containing the name and node reference of the record migrated
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
@Test
|
||||||
|
public void processWithCSVFile() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
String name = "name" + i;
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, ContentModel.PROP_NAME)).thenReturn((Serializable) name);
|
||||||
|
});
|
||||||
|
|
||||||
|
ArgumentCaptor<File> csvFileCaptor = ArgumentCaptor.forClass(File.class);
|
||||||
|
// Set up parameters.
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4", "export",
|
||||||
|
"true");
|
||||||
|
executeWebScript(parameters);
|
||||||
|
|
||||||
|
verify(contentStreamer, times(1)).streamContent(any(WebScriptRequest.class), any(WebScriptResponse.class),
|
||||||
|
csvFileCaptor.capture(), any(Long.class), any(Boolean.class), any(String.class), any(Map.class));
|
||||||
|
|
||||||
|
File fileForDownload = csvFileCaptor.getValue();
|
||||||
|
assertNotNull(fileForDownload);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given that I have record that require migration
|
||||||
|
* And I'm not interested in knowing which records were migrated
|
||||||
|
* When I run the migration tool
|
||||||
|
* And I will not be returned a CSV file of details.
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
@Test
|
||||||
|
public void processedWithouthCSVFile() throws Exception
|
||||||
|
{
|
||||||
|
List<Long> ids = Stream.of(1l, 2l, 3l).collect(Collectors.toList());
|
||||||
|
when(mockedPatchDAO.getNodesByAspectQNameId(eq(ASPECT_ID), anyLong(), anyLong())).thenReturn(ids)
|
||||||
|
.thenReturn(Collections.emptyList());
|
||||||
|
|
||||||
|
ids.stream().forEach((i) -> {
|
||||||
|
NodeRef nodeRef = AlfMock.generateNodeRef(mockedNodeService);
|
||||||
|
when(mockedNodeDAO.getNodePair(i)).thenReturn(new Pair<Long, NodeRef>(i, nodeRef));
|
||||||
|
when(mockedNodeService.hasAspect(nodeRef, ASPECT_RECORD)).thenReturn(true);
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_READERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
when(mockedNodeService.getProperty(nodeRef, PROP_WRITERS))
|
||||||
|
.thenReturn((Serializable) Collections.emptyMap());
|
||||||
|
});
|
||||||
|
|
||||||
|
Map<String, String> parameters = ImmutableMap.of("batchsize", "10", "maxProcessedRecords", "4", "export",
|
||||||
|
"false");
|
||||||
|
JSONObject json = executeJSONWebScript(parameters);
|
||||||
|
assertNotNull(json);
|
||||||
|
String actualJSONString = json.toString();
|
||||||
|
ObjectMapper mapper = new ObjectMapper();
|
||||||
|
String expectedJSONString = "{\"responsestatus\":\"success\",\"message\":\"Processed 3 records.\"}";
|
||||||
|
assertEquals(mapper.readTree(expectedJSONString), mapper.readTree(actualJSONString));
|
||||||
|
|
||||||
|
verify(contentStreamer, never()).streamContent(any(WebScriptRequest.class), any(WebScriptResponse.class),
|
||||||
|
any(File.class), any(Long.class), any(Boolean.class), any(String.class), any(Map.class));
|
||||||
|
}
|
||||||
}
|
}
|
Reference in New Issue
Block a user