RM-4163: added integration test for scenario provided by Roy and got the

fix from master
This commit is contained in:
Silviu Dinuta
2017-03-09 16:27:50 +02:00
parent cc0c2d477f
commit fab6cdfe9b
3 changed files with 322 additions and 105 deletions

View File

@@ -230,7 +230,7 @@ public class RecordComponentIdentifierAspect extends BaseBehaviourBean
// Do a blanket removal in case this is a contextual nodes // Do a blanket removal in case this is a contextual nodes
attributeService.removeAttributes(CONTEXT_VALUE, nodeRef); attributeService.removeAttributes(CONTEXT_VALUE, nodeRef);
} }
else else if(!beforeId.equals(afterId))
{ {
// This is a full update // This is a full update
attributeService.updateOrCreateAttribute( attributeService.updateOrCreateAttribute(

View File

@@ -46,6 +46,7 @@ import org.alfresco.query.PagingResults;
import org.alfresco.repo.security.authority.RMAuthority; import org.alfresco.repo.security.authority.RMAuthority;
import org.alfresco.repo.transaction.RetryingTransactionHelper; import org.alfresco.repo.transaction.RetryingTransactionHelper;
import org.alfresco.service.cmr.repository.ChildAssociationRef; import org.alfresco.service.cmr.repository.ChildAssociationRef;
import org.alfresco.service.cmr.repository.DuplicateChildNodeNameException;
import org.alfresco.service.cmr.repository.NodeRef; import org.alfresco.service.cmr.repository.NodeRef;
import org.alfresco.service.cmr.security.AccessPermission; import org.alfresco.service.cmr.security.AccessPermission;
import org.alfresco.service.cmr.security.AuthorityService; import org.alfresco.service.cmr.security.AuthorityService;
@@ -83,13 +84,13 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
/** File plan role service */ /** File plan role service */
private FilePlanRoleService filePlanRoleService; private FilePlanRoleService filePlanRoleService;
/** authority service */ /** authority service */
private AuthorityService authorityService; private AuthorityService authorityService;
/** permission service */ /** permission service */
private PermissionService permissionService; private PermissionService permissionService;
/** transaction service */ /** transaction service */
private TransactionService transactionService; private TransactionService transactionService;
@@ -108,7 +109,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
this.filePlanRoleService = filePlanRoleService; this.filePlanRoleService = filePlanRoleService;
} }
/** /**
* @param authorityService authority service * @param authorityService authority service
*/ */
@@ -116,7 +117,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
this.authorityService = authorityService; this.authorityService = authorityService;
} }
/** /**
* @param permissionService permission service * @param permissionService permission service
*/ */
@@ -124,7 +125,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
this.permissionService = permissionService; this.permissionService = permissionService;
} }
/** /**
* @param transactionService transaction service * @param transactionService transaction service
*/ */
@@ -132,7 +133,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
this.transactionService = transactionService; this.transactionService = transactionService;
} }
/** /**
* Application context refresh event handler * Application context refresh event handler
*/ */
@@ -148,12 +149,12 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
authorityService.createAuthority(AuthorityType.GROUP, ROOT_IPR_GROUP, ROOT_IPR_GROUP, Collections.singleton(RMAuthority.ZONE_APP_RM)); authorityService.createAuthority(AuthorityType.GROUP, ROOT_IPR_GROUP, ROOT_IPR_GROUP, Collections.singleton(RMAuthority.ZONE_APP_RM));
} }
return null; return null;
} }
}); });
} }
/** /**
* Get root IPR group name * Get root IPR group name
*/ */
@@ -179,15 +180,15 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
public Set<String> getReaders(NodeRef nodeRef) public Set<String> getReaders(NodeRef nodeRef)
{ {
ParameterCheck.mandatory("nodeRef", nodeRef); ParameterCheck.mandatory("nodeRef", nodeRef);
Set<String> result = Collections.EMPTY_SET; Set<String> result = Collections.EMPTY_SET;
Pair<String, String> iprGroups = getIPRGroups(nodeRef); Pair<String, String> iprGroups = getIPRGroups(nodeRef);
if (iprGroups != null) if (iprGroups != null)
{ {
result = getAuthorities(iprGroups.getFirst()); result = getAuthorities(iprGroups.getFirst());
} }
return result; return result;
} }
/** /**
@@ -198,20 +199,20 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
public Set<String> getWriters(NodeRef nodeRef) public Set<String> getWriters(NodeRef nodeRef)
{ {
ParameterCheck.mandatory("nodeRef", nodeRef); ParameterCheck.mandatory("nodeRef", nodeRef);
Set<String> result = Collections.EMPTY_SET; Set<String> result = Collections.EMPTY_SET;
Pair<String, String> iprGroups = getIPRGroups(nodeRef); Pair<String, String> iprGroups = getIPRGroups(nodeRef);
if (iprGroups != null) if (iprGroups != null)
{ {
result = getAuthorities(iprGroups.getSecond()); result = getAuthorities(iprGroups.getSecond());
} }
return result; return result;
} }
/** /**
* Helper to get authorities for a given group * Helper to get authorities for a given group
* *
* @param group group name * @param group group name
* @return Set<String> immediate authorities * @return Set<String> immediate authorities
*/ */
@@ -221,7 +222,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
result.addAll(authorityService.getContainedAuthorities(null, group, true)); result.addAll(authorityService.getContainedAuthorities(null, group, true));
return result; return result;
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#set(org.alfresco.service.cmr.repository.NodeRef, org.alfresco.util.Pair) * @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#set(org.alfresco.service.cmr.repository.NodeRef, org.alfresco.util.Pair)
*/ */
@@ -231,7 +232,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
ParameterCheck.mandatory("nodeRef", nodeRef); ParameterCheck.mandatory("nodeRef", nodeRef);
set(nodeRef, readersAndWriters.getFirst(), readersAndWriters.getSecond()); set(nodeRef, readersAndWriters.getFirst(), readersAndWriters.getSecond());
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#set(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set) * @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#set(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set)
*/ */
@@ -239,21 +240,21 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
public void set(NodeRef nodeRef, Set<String> readers, Set<String> writers) public void set(NodeRef nodeRef, Set<String> readers, Set<String> writers)
{ {
ParameterCheck.mandatory("nodeRef", nodeRef); ParameterCheck.mandatory("nodeRef", nodeRef);
// remove existing extended security, assuming there is any // remove existing extended security, assuming there is any
remove(nodeRef); remove(nodeRef);
// find groups // find groups
Pair<String, String> iprGroups = createOrFindIPRGroups(readers, writers); Pair<String, String> iprGroups = createOrFindIPRGroups(readers, writers);
// assign groups to correct fileplan roles // assign groups to correct fileplan roles
NodeRef filePlan = filePlanService.getFilePlan(nodeRef); NodeRef filePlan = filePlanService.getFilePlan(nodeRef);
filePlanRoleService.assignRoleToAuthority(filePlan, FilePlanRoleService.ROLE_EXTENDED_READERS, iprGroups.getFirst()); filePlanRoleService.assignRoleToAuthority(filePlan, FilePlanRoleService.ROLE_EXTENDED_READERS, iprGroups.getFirst());
filePlanRoleService.assignRoleToAuthority(filePlan, FilePlanRoleService.ROLE_EXTENDED_WRITERS, iprGroups.getSecond()); filePlanRoleService.assignRoleToAuthority(filePlan, FilePlanRoleService.ROLE_EXTENDED_WRITERS, iprGroups.getSecond());
// assign groups to node // assign groups to node
assignIPRGroupsToNode(iprGroups, nodeRef); assignIPRGroupsToNode(iprGroups, nodeRef);
// apply the readers to any renditions of the content // apply the readers to any renditions of the content
if (isRecord(nodeRef)) if (isRecord(nodeRef))
{ {
@@ -263,14 +264,14 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
NodeRef child = assoc.getChildRef(); NodeRef child = assoc.getChildRef();
assignIPRGroupsToNode(iprGroups, child); assignIPRGroupsToNode(iprGroups, child);
} }
} }
} }
/** /**
* Get the IPR groups associated with a given node reference. * Get the IPR groups associated with a given node reference.
* <p> * <p>
* Return null if none found. * Return null if none found.
* *
* @param nodeRef node reference * @param nodeRef node reference
* @return Pair<String, String> where first is the read group and second if the write group, null if none found * @return Pair<String, String> where first is the read group and second if the write group, null if none found
*/ */
@@ -279,7 +280,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
Pair<String, String> result = null; Pair<String, String> result = null;
String iprReaderGroup = null; String iprReaderGroup = null;
String iprWriterGroup = null; String iprWriterGroup = null;
// get all the set permissions // get all the set permissions
Set<AccessPermission> permissions = permissionService.getAllSetPermissions(nodeRef); Set<AccessPermission> permissions = permissionService.getAllSetPermissions(nodeRef);
for (AccessPermission permission : permissions) for (AccessPermission permission : permissions)
@@ -288,36 +289,36 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
if (permission.getAuthority().startsWith(GROUP_PREFIX + READER_GROUP_PREFIX)) if (permission.getAuthority().startsWith(GROUP_PREFIX + READER_GROUP_PREFIX))
{ {
iprReaderGroup = permission.getAuthority(); iprReaderGroup = permission.getAuthority();
} }
// look for the presence of the writer group // look for the presence of the writer group
else if (permission.getAuthority().startsWith(GROUP_PREFIX + WRITER_GROUP_PREFIX)) else if (permission.getAuthority().startsWith(GROUP_PREFIX + WRITER_GROUP_PREFIX))
{ {
iprWriterGroup = permission.getAuthority(); iprWriterGroup = permission.getAuthority();
} }
} }
// assuming the are both present then return // assuming the are both present then return
if (iprReaderGroup != null && iprWriterGroup != null) if (iprReaderGroup != null && iprWriterGroup != null)
{ {
result = new Pair<String, String>(iprReaderGroup, iprWriterGroup); result = new Pair<String, String>(iprReaderGroup, iprWriterGroup);
} }
return result; return result;
} }
/** /**
* Given a set of readers and writers find or create the appropriate IPR groups. * Given a set of readers and writers find or create the appropriate IPR groups.
* <p> * <p>
* The IPR groups are named with hashes of the authority lists in order to reduce * The IPR groups are named with hashes of the authority lists in order to reduce
* the set of groups that require exact match. A further index is used to handle * the set of groups that require exact match. A further index is used to handle
* a situation where there is a hash clash, but a difference in the authority lists. * a situation where there is a hash clash, but a difference in the authority lists.
* <p> * <p>
* When no match is found the groups are created. Once created * When no match is found the groups are created. Once created
* *
* @param filePlan file plan * @param filePlan file plan
* @param readers authorities with read * @param readers authorities with read
* @param writers authorities with write * @param writers authorities with write
* @return Pair<String, String> where first is the full name of the read group and * @return Pair<String, String> where first is the full name of the read group and
* second is the full name of the write group * second is the full name of the write group
*/ */
private Pair<String, String> createOrFindIPRGroups(Set<String> readers, Set<String> writers) private Pair<String, String> createOrFindIPRGroups(Set<String> readers, Set<String> writers)
@@ -326,10 +327,10 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
createOrFindIPRGroup(READER_GROUP_PREFIX, readers), createOrFindIPRGroup(READER_GROUP_PREFIX, readers),
createOrFindIPRGroup(WRITER_GROUP_PREFIX, writers)); createOrFindIPRGroup(WRITER_GROUP_PREFIX, writers));
} }
/** /**
* Create or find an IPR group based on the provided prefix and authorities. * Create or find an IPR group based on the provided prefix and authorities.
* *
* @param groupPrefix group prefix * @param groupPrefix group prefix
* @param authorities authorities * @param authorities authorities
* @return String full group name * @return String full group name
@@ -337,10 +338,10 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
private String createOrFindIPRGroup(String groupPrefix, Set<String> authorities) private String createOrFindIPRGroup(String groupPrefix, Set<String> authorities)
{ {
String group = null; String group = null;
// find group or determine what the next index is if no group exists or there is a clash // find group or determine what the next index is if no group exists or there is a clash
Pair<String, Integer> groupResult = findIPRGroup(groupPrefix, authorities); Pair<String, Integer> groupResult = findIPRGroup(groupPrefix, authorities);
if (groupResult.getFirst() == null) if (groupResult.getFirst() == null)
{ {
group = createIPRGroup(groupPrefix, authorities, groupResult.getSecond()); group = createIPRGroup(groupPrefix, authorities, groupResult.getSecond());
@@ -349,16 +350,16 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
group = groupResult.getFirst(); group = groupResult.getFirst();
} }
return group; return group;
} }
/** /**
* Given a group name prefix and the authorities, finds the exact match existing group. * Given a group name prefix and the authorities, finds the exact match existing group.
* <p> * <p>
* If the group does not exist then the group returned is null and the index shows the next available * If the group does not exist then the group returned is null and the index shows the next available
* group index for creation. * group index for creation.
* *
* @param groupPrefix group name prefix * @param groupPrefix group name prefix
* @param authorities authorities * @param authorities authorities
* @return Pair<String, Integer> where first is the name of the found group, null if none found and second * @return Pair<String, Integer> where first is the name of the found group, null if none found and second
@@ -370,24 +371,24 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
int nextGroupIndex = 0; int nextGroupIndex = 0;
boolean hasMoreItems = true; boolean hasMoreItems = true;
int pageCount = 0; int pageCount = 0;
// determine the short name prefix // determine the short name prefix
String groupShortNamePrefix = getIPRGroupPrefixShortName(groupPrefix, authorities); String groupShortNamePrefix = getIPRGroupPrefixShortName(groupPrefix, authorities);
// iterate over the authorities to find a match // iterate over the authorities to find a match
while (hasMoreItems == true) while (hasMoreItems == true)
{ {
// get matching authorities // get matching authorities
PagingResults<String> results = authorityService.getAuthorities(AuthorityType.GROUP, PagingResults<String> results = authorityService.getAuthorities(AuthorityType.GROUP,
RMAuthority.ZONE_APP_RM, RMAuthority.ZONE_APP_RM,
groupShortNamePrefix, groupShortNamePrefix,
false, false,
false, false,
new PagingRequest(MAX_ITEMS*pageCount, MAX_ITEMS)); new PagingRequest(MAX_ITEMS*pageCount, MAX_ITEMS));
// record the total count // record the total count
nextGroupIndex = nextGroupIndex + results.getPage().size(); nextGroupIndex = nextGroupIndex + results.getPage().size();
// see if any of the matching groups exactly match // see if any of the matching groups exactly match
for (String group : results.getPage()) for (String group : results.getPage())
{ {
@@ -396,35 +397,35 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
iprGroup = group; iprGroup = group;
break; break;
} }
} }
// determine if there are any more pages to inspect // determine if there are any more pages to inspect
hasMoreItems = results.hasMoreItems(); hasMoreItems = results.hasMoreItems();
pageCount ++; pageCount ++;
} }
return new Pair<String, Integer>(iprGroup, nextGroupIndex); return new Pair<String, Integer>(iprGroup, nextGroupIndex);
} }
/** /**
* Determines whether a group exactly matches a list of authorities. * Determines whether a group exactly matches a list of authorities.
* *
* @param authorities list of authorities * @param authorities list of authorities
* @param group group * @param group group
* @return * @return
*/ */
private boolean isIPRGroupTrueMatch(String group, Set<String> authorities) private boolean isIPRGroupTrueMatch(String group, Set<String> authorities)
{ {
Set<String> contained = authorityService.getContainedAuthorities(null, group, true); Set<String> contained = authorityService.getContainedAuthorities(null, group, true);
return contained.equals(authorities); return contained.equals(authorities);
} }
/** /**
* Get IPR group prefix short name. * Get IPR group prefix short name.
* <p> * <p>
* 'package' scope to help testing. * 'package' scope to help testing.
* *
* @param prefix prefix * @param prefix prefix
* @param authorities authorities * @param authorities authorities
* @return String group prefix short name * @return String group prefix short name
@@ -434,17 +435,17 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
StringBuilder builder = new StringBuilder(128) StringBuilder builder = new StringBuilder(128)
.append(prefix) .append(prefix)
.append(getAuthoritySetHashCode(authorities)); .append(getAuthoritySetHashCode(authorities));
return builder.toString(); return builder.toString();
} }
/** /**
* Get IPR group short name. * Get IPR group short name.
* <p> * <p>
* Note this excludes the "GROUP_" prefix. * Note this excludes the "GROUP_" prefix.
* <p> * <p>
* 'package' scope to help testing. * 'package' scope to help testing.
* *
* @param prefix prefix * @param prefix prefix
* @param readers read authorities * @param readers read authorities
* @param writers write authorities * @param writers write authorities
@@ -455,12 +456,12 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
return getIPRGroupShortName(prefix, authorities, Integer.toString(index)); return getIPRGroupShortName(prefix, authorities, Integer.toString(index));
} }
/** /**
* Get IPR group short name. * Get IPR group short name.
* <p> * <p>
* Note this excludes the "GROUP_" prefix. * Note this excludes the "GROUP_" prefix.
* *
* @param prefix prefix * @param prefix prefix
* @param readers read authorities * @param readers read authorities
* @param writers write authorities * @param writers write authorities
@@ -472,13 +473,13 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
StringBuilder builder = new StringBuilder(128) StringBuilder builder = new StringBuilder(128)
.append(getIPRGroupPrefixShortName(prefix, authorities)) .append(getIPRGroupPrefixShortName(prefix, authorities))
.append(index); .append(index);
return builder.toString(); return builder.toString();
} }
/** /**
* Gets the hashcode value of a set of authorities. * Gets the hashcode value of a set of authorities.
* *
* @param authorities set of authorities * @param authorities set of authorities
* @return int hash code * @return int hash code
*/ */
@@ -487,14 +488,14 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
int result = 0; int result = 0;
if (authorities != null && !authorities.isEmpty()) if (authorities != null && !authorities.isEmpty())
{ {
result = StringUtils.join(authorities.toArray(), "").hashCode(); result = StringUtils.join(authorities.toArray(), "").hashCode();
} }
return result; return result;
} }
/** /**
* Creates a new IPR group. * Creates a new IPR group.
* *
* @param groupNamePrefix group name prefix * @param groupNamePrefix group name prefix
* @param children child authorities * @param children child authorities
* @param index group index * @param index group index
@@ -503,35 +504,44 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
private String createIPRGroup(String groupNamePrefix, Set<String> children, int index) private String createIPRGroup(String groupNamePrefix, Set<String> children, int index)
{ {
ParameterCheck.mandatory("groupNamePrefix", groupNamePrefix); ParameterCheck.mandatory("groupNamePrefix", groupNamePrefix);
// get the group name // get the group name
String groupShortName = getIPRGroupShortName(groupNamePrefix, children, index); String groupShortName = getIPRGroupShortName(groupNamePrefix, children, index);
// create group // create group
String group = authorityService.createAuthority(AuthorityType.GROUP, groupShortName, groupShortName, Collections.singleton(RMAuthority.ZONE_APP_RM)); String group;
try
// add root parent
authorityService.addAuthority(getRootIRPGroup(), group);
// add children if provided
if (children != null)
{ {
for (String child : children) group = authorityService.createAuthority(AuthorityType.GROUP, groupShortName, groupShortName, Collections.singleton(RMAuthority.ZONE_APP_RM));
// add root parent
authorityService.addAuthority(getRootIRPGroup(), group);
// add children if provided
if (children != null)
{ {
if (authorityService.authorityExists(child) && for (String child : children)
!PermissionService.ALL_AUTHORITIES.equals(child))
{ {
authorityService.addAuthority(group, child); if (authorityService.authorityExists(child) &&
!PermissionService.ALL_AUTHORITIES.equals(child))
{
authorityService.addAuthority(group, child);
}
} }
} }
} }
catch(DuplicateChildNodeNameException ex)
{
// the group was concurrently created
group = authorityService.getName(AuthorityType.GROUP, groupShortName);
}
return group; return group;
} }
/** /**
* Assign IPR groups to a node reference with the correct permissions. * Assign IPR groups to a node reference with the correct permissions.
* *
* @param iprGroups iprGroups, first read and second write * @param iprGroups iprGroups, first read and second write
* @param nodeRef node reference * @param nodeRef node reference
*/ */
@@ -540,7 +550,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
permissionService.setPermission(nodeRef, iprGroups.getFirst(), RMPermissionModel.READ_RECORDS, true); permissionService.setPermission(nodeRef, iprGroups.getFirst(), RMPermissionModel.READ_RECORDS, true);
permissionService.setPermission(nodeRef, iprGroups.getSecond(), RMPermissionModel.FILING, true); permissionService.setPermission(nodeRef, iprGroups.getSecond(), RMPermissionModel.FILING, true);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#remove(org.alfresco.service.cmr.repository.NodeRef) * @see org.alfresco.module.org_alfresco_module_rm.security.ExtendedSecurityService#remove(org.alfresco.service.cmr.repository.NodeRef)
*/ */
@@ -548,13 +558,13 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
public void remove(NodeRef nodeRef) public void remove(NodeRef nodeRef)
{ {
ParameterCheck.mandatory("nodeRef", nodeRef); ParameterCheck.mandatory("nodeRef", nodeRef);
Pair<String, String> iprGroups = getIPRGroups(nodeRef); Pair<String, String> iprGroups = getIPRGroups(nodeRef);
if (iprGroups != null) if (iprGroups != null)
{ {
// remove any extended security that might be present // remove any extended security that might be present
clearPermissions(nodeRef, iprGroups); clearPermissions(nodeRef, iprGroups);
// remove the readers from any renditions of the content // remove the readers from any renditions of the content
if (isRecord(nodeRef)) if (isRecord(nodeRef))
{ {
@@ -570,16 +580,16 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
/** /**
* Clear the nodes IPR permissions * Clear the nodes IPR permissions
* *
* @param nodeRef node reference * @param nodeRef node reference
*/ */
private void clearPermissions(NodeRef nodeRef, Pair<String, String> iprGroups) private void clearPermissions(NodeRef nodeRef, Pair<String, String> iprGroups)
{ {
// remove group permissions from node // remove group permissions from node
permissionService.clearPermission(nodeRef, iprGroups.getFirst()); permissionService.clearPermission(nodeRef, iprGroups.getFirst());
permissionService.clearPermission(nodeRef, iprGroups.getSecond()); permissionService.clearPermission(nodeRef, iprGroups.getSecond());
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#getExtendedReaders(org.alfresco.service.cmr.repository.NodeRef) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#getExtendedReaders(org.alfresco.service.cmr.repository.NodeRef)
*/ */
@@ -587,7 +597,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
return getReaders(nodeRef); return getReaders(nodeRef);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#getExtendedWriters(org.alfresco.service.cmr.repository.NodeRef) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#getExtendedWriters(org.alfresco.service.cmr.repository.NodeRef)
*/ */
@@ -595,15 +605,15 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
return getWriters(nodeRef); return getWriters(nodeRef);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#addExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#addExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set)
*/ */
@Override @Deprecated public void addExtendedSecurity(NodeRef nodeRef, Set<String> readers, Set<String> writers) @Override @Deprecated public void addExtendedSecurity(NodeRef nodeRef, Set<String> readers, Set<String> writers)
{ {
set(nodeRef, readers, writers); set(nodeRef, readers, writers);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#addExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set, boolean) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#addExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set, boolean)
*/ */
@@ -611,7 +621,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
set(nodeRef, readers, writers); set(nodeRef, readers, writers);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#removeAllExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#removeAllExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef)
*/ */
@@ -619,7 +629,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
{ {
remove(nodeRef); remove(nodeRef);
} }
/** /**
* @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#removeExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set) * @see org.alfresco.module.org_alfresco_module_rm.security.DeprecatedExtendedSecurityService#removeExtendedSecurity(org.alfresco.service.cmr.repository.NodeRef, java.util.Set, java.util.Set)
*/ */
@@ -633,7 +643,7 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
*/ */
@Override @Deprecated public void removeExtendedSecurity(NodeRef nodeRef, Set<String> readers, Set<String>writers, boolean applyToParents) @Override @Deprecated public void removeExtendedSecurity(NodeRef nodeRef, Set<String> readers, Set<String>writers, boolean applyToParents)
{ {
remove(nodeRef); remove(nodeRef);
} }
/** /**
@@ -641,6 +651,6 @@ public class ExtendedSecurityServiceImpl extends ServiceBaseImpl
*/ */
@Override @Deprecated public void removeAllExtendedSecurity(NodeRef nodeRef, boolean applyToParents) @Override @Deprecated public void removeAllExtendedSecurity(NodeRef nodeRef, boolean applyToParents)
{ {
remove(nodeRef); remove(nodeRef);
} }
} }

View File

@@ -0,0 +1,207 @@
/*
* #%L
* Alfresco Records Management Module
* %%
* Copyright (C) 2005 - 2017 Alfresco Software Limited
* %%
* This file is part of the Alfresco software.
* -
* If the software was purchased under a paid Alfresco license, the terms of
* the paid license agreement will prevail. Otherwise, the software is
* provided under the following open source license terms:
* -
* Alfresco is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
* -
* Alfresco is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
* -
* You should have received a copy of the GNU Lesser General Public License
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
* #L%
*/
package org.alfresco.module.org_alfresco_module_rm.test.integration.issue;
import java.io.Serializable;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import org.alfresco.model.ContentModel;
import org.alfresco.module.org_alfresco_module_rm.action.dm.CreateRecordAction;
import org.alfresco.module.org_alfresco_module_rm.action.impl.FileToAction;
import org.alfresco.module.org_alfresco_module_rm.test.util.BaseRMTestCase;
import org.alfresco.repo.security.authentication.AuthenticationUtil;
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
import org.alfresco.service.cmr.action.Action;
import org.alfresco.service.cmr.repository.ChildAssociationRef;
import org.alfresco.service.cmr.repository.NodeRef;
import org.alfresco.service.cmr.rule.Rule;
import org.alfresco.service.cmr.rule.RuleService;
import org.alfresco.service.cmr.rule.RuleType;
import org.alfresco.service.namespace.NamespaceService;
import org.alfresco.service.namespace.QName;
/**
* System test for RM-4163
*
* @author Silviu Dinuta
* @since 2.4.1
*/
public class RM4163Test extends BaseRMTestCase
{
private RuleService ruleService;
private NodeRef ruleFolder;
private NodeRef nodeRefCategory1;
@Override
protected void initServices()
{
super.initServices();
ruleService = (RuleService) applicationContext.getBean("RuleService");
}
@Override
protected boolean isCollaborationSiteTest()
{
return true;
}
@Override
protected boolean isRecordTest()
{
return true;
}
public void testDeclareRecordsConcurently() throws Exception
{
doTestInTransaction(new Test<Void>()
{
@Override
public Void run()
{
// create the folder
ruleFolder = fileFolderService.create(documentLibrary, "mytestfolder", ContentModel.TYPE_FOLDER)
.getNodeRef();
// create record category
nodeRefCategory1 = filePlanService.createRecordCategory(filePlan, "category1");
//define declare as record rule and apply it to the created folder from documentLibrary
Action action = actionService.createAction(CreateRecordAction.NAME);
action.setParameterValue(CreateRecordAction.PARAM_FILE_PLAN, filePlan);
Rule rule = new Rule();
rule.setRuleType(RuleType.INBOUND);
rule.setTitle("declareAsRecordRule");
rule.setAction(action);
rule.setExecuteAsynchronously(true);
ruleService.saveRule(ruleFolder, rule);
//define filing rule and apply it to unfiled record container
Action fileAction = actionService.createAction(FileToAction.NAME);
fileAction.setParameterValue(FileToAction.PARAM_PATH,
"/category1/{node.cm:description}");
fileAction.setParameterValue(FileToAction.PARAM_CREATE_RECORD_PATH, true);
Rule fileRule = new Rule();
fileRule.setRuleType(RuleType.INBOUND);
fileRule.setTitle("filingRule");
fileRule.setAction(fileAction);
fileRule.setExecuteAsynchronously(true);
ruleService.saveRule(filePlanService.getUnfiledContainer(filePlan), fileRule);
return null;
}
@Override
public void test(Void result) throws Exception
{
assertFalse(ruleService.getRules(ruleFolder).isEmpty());
}
});
//create 4 documents in documentLibrary
List<NodeRef> documents = new ArrayList<NodeRef>(4);
documents.addAll(doTestInTransaction(new Test<List<NodeRef>>()
{
@Override
public List<NodeRef> run() throws Exception
{
List<NodeRef> documents = new ArrayList<NodeRef>(4);
NodeRef document = createFile(documentLibrary, "document1.txt", "desc1", ContentModel.TYPE_CONTENT);
documents.add(document);
document = createFile(documentLibrary, "document2.txt", "desc2", ContentModel.TYPE_CONTENT);
documents.add(document);
document = createFile(documentLibrary, "document3.txt", "desc1", ContentModel.TYPE_CONTENT);
documents.add(document);
document = createFile(documentLibrary, "document4.txt", "desc1", ContentModel.TYPE_CONTENT);
documents.add(document);
return documents;
}
}));
//move created documents in the folder that has Declare as Record rule
final Iterator<NodeRef> temp = documents.iterator();
doTestInTransaction(new Test<Void>()
{
@Override
public Void run() throws Exception
{
while (temp.hasNext())
{
NodeRef document = temp.next();
fileFolderService.move(document, ruleFolder, null);
}
return null;
}
});
//give enough time for filing all records
Thread.sleep(5000);
//check that target category has in created record folders 4 records
Integer numberOfRecords = AuthenticationUtil.runAsSystem(new RunAsWork<Integer>()
{
@Override
public Integer doWork() throws Exception
{
List<NodeRef> containedRecordFolders = filePlanService.getContainedRecordFolders(nodeRefCategory1);
int numberOfRecords = 0;
for(NodeRef recordFolder : containedRecordFolders)
{
numberOfRecords = numberOfRecords + fileFolderService.list(recordFolder).size();
}
return numberOfRecords;
}
});
assertEquals(4, numberOfRecords.intValue());
}
private NodeRef createFile(NodeRef parentNodeRef, String name, String descrption, QName typeQName)
{
Map<QName, Serializable> properties = new HashMap<QName, Serializable>(11);
properties.put(ContentModel.PROP_NAME, (Serializable) name);
properties.put(ContentModel.PROP_DESCRIPTION, (Serializable) descrption);
QName assocQName = QName.createQName(
NamespaceService.CONTENT_MODEL_1_0_URI,
QName.createValidLocalName(name));
ChildAssociationRef assocRef = nodeService.createNode(
parentNodeRef,
ContentModel.ASSOC_CONTAINS,
assocQName,
typeQName,
properties);
NodeRef nodeRef = assocRef.getChildRef();
return nodeRef;
}
}