mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-10-08 14:51:49 +00:00
SHA-1629 : Creating a link to file in a different location
- Added support for multiple files in doclink.post webscript - Added unit test for api/node/doclink api - Added marker aspect app:linked for nodes that have links attached git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/BRANCHES/DEV/5.2.N/root@131857 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -23,314 +23,317 @@
|
||||
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
||||
* #L%
|
||||
*/
|
||||
package org.alfresco.repo.doclink;
|
||||
|
||||
import java.io.Serializable;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
|
||||
import javax.transaction.Status;
|
||||
import javax.transaction.UserTransaction;
|
||||
|
||||
import junit.framework.TestCase;
|
||||
|
||||
import org.alfresco.error.AlfrescoRuntimeException;
|
||||
import org.alfresco.model.ApplicationModel;
|
||||
import org.alfresco.model.ContentModel;
|
||||
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
||||
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
|
||||
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
||||
import org.alfresco.service.ServiceRegistry;
|
||||
import org.alfresco.service.cmr.model.FileFolderService;
|
||||
import org.alfresco.service.cmr.repository.DeleteLinksStatusReport;
|
||||
import org.alfresco.service.cmr.repository.DocumentLinkService;
|
||||
import org.alfresco.service.cmr.repository.NodeRef;
|
||||
import org.alfresco.service.cmr.repository.NodeService;
|
||||
import org.alfresco.service.cmr.security.PermissionService;
|
||||
import org.alfresco.service.cmr.security.PersonService;
|
||||
import org.alfresco.service.cmr.site.SiteService;
|
||||
import org.alfresco.service.cmr.site.SiteVisibility;
|
||||
import org.alfresco.service.namespace.QName;
|
||||
import org.alfresco.service.transaction.TransactionService;
|
||||
import org.alfresco.util.ApplicationContextHelper;
|
||||
import org.alfresco.util.GUID;
|
||||
import org.springframework.context.ApplicationContext;
|
||||
|
||||
/**
|
||||
* Test cases for {@link DocumentLinkServiceImpl}.
|
||||
*
|
||||
* @author Ana Bozianu
|
||||
* @since 5.1
|
||||
*/
|
||||
|
||||
public class DocumentLinkServiceImplTest extends TestCase
|
||||
{
|
||||
|
||||
private static final ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
||||
private static final String TEST_USER = DocumentLinkServiceImplTest.class.getSimpleName() + "_testuser";
|
||||
|
||||
private UserTransaction txn;
|
||||
|
||||
private TransactionService transactionService;
|
||||
private DocumentLinkService documentLinkService;
|
||||
private PermissionService permissionService;
|
||||
private PersonService personService;
|
||||
private SiteService siteService;
|
||||
private FileFolderService fileFolderService;
|
||||
private NodeService nodeService;
|
||||
|
||||
// nodes the test user has read/write permission to
|
||||
private NodeRef site1File1;
|
||||
private NodeRef site1File2; // do not create links of this file
|
||||
private NodeRef site1Folder1;
|
||||
private NodeRef site1Folder2;
|
||||
private NodeRef site1Folder3;
|
||||
|
||||
// nodes the test user has no permission to
|
||||
private NodeRef site2File;
|
||||
private NodeRef site2Folder1;
|
||||
private NodeRef site2Folder2;
|
||||
private NodeRef linkOfFile1Site2;
|
||||
|
||||
private String site1File1Name = GUID.generate();
|
||||
private String site1Folder1Name = GUID.generate();;
|
||||
|
||||
@Override
|
||||
public void setUp() throws Exception
|
||||
{
|
||||
// Set up the services
|
||||
ServiceRegistry serviceRegistry = (ServiceRegistry) ctx.getBean("ServiceRegistry");
|
||||
transactionService = serviceRegistry.getTransactionService();
|
||||
documentLinkService = serviceRegistry.getDocumentLinkService();
|
||||
permissionService = serviceRegistry.getPermissionService();
|
||||
personService = serviceRegistry.getPersonService();
|
||||
siteService = serviceRegistry.getSiteService();
|
||||
fileFolderService = serviceRegistry.getFileFolderService();
|
||||
nodeService = serviceRegistry.getNodeService();
|
||||
|
||||
// Start the transaction
|
||||
txn = transactionService.getUserTransaction();
|
||||
txn.begin();
|
||||
|
||||
// Authenticate
|
||||
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
||||
|
||||
/* Create the test user */
|
||||
Map<QName, Serializable> props = new HashMap<QName, Serializable>();
|
||||
props.put(ContentModel.PROP_USERNAME, TEST_USER);
|
||||
personService.createPerson(props);
|
||||
|
||||
/*
|
||||
* Create the working test root 1 to which the user has read/write
|
||||
* permission
|
||||
*/
|
||||
NodeRef site1 = siteService.createSite("site1", GUID.generate(), "myTitle", "myDescription", SiteVisibility.PUBLIC).getNodeRef();
|
||||
permissionService.setPermission(site1, TEST_USER, PermissionService.ALL_PERMISSIONS, true);
|
||||
site1Folder1 = fileFolderService.create(site1, site1Folder1Name, ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site1File1 = fileFolderService.create(site1Folder1, site1File1Name, ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site1File2 = fileFolderService.create(site1Folder1, GUID.generate(), ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site1Folder2 = fileFolderService.create(site1, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site1Folder3 = fileFolderService.create(site1, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
// create a link of site1File1 in site1Folder3 to test regular deletion
|
||||
documentLinkService.createDocumentLink(site1File2, site1Folder3);
|
||||
|
||||
/* Create the working test root 2 to which the user has no permission */
|
||||
NodeRef site2 = siteService.createSite("site2", GUID.generate(), "myTitle", "myDescription", SiteVisibility.PRIVATE).getNodeRef();
|
||||
permissionService.setPermission(site2, TEST_USER, PermissionService.ALL_PERMISSIONS, false);
|
||||
site2File = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site2Folder1 = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site2Folder2 = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
// Create a link of site1File1 in site2Folder2 to test the deletion
|
||||
// without permission
|
||||
linkOfFile1Site2 = documentLinkService.createDocumentLink(site1File2, site2Folder2);
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void tearDown() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
if (txn.getStatus() != Status.STATUS_ROLLEDBACK && txn.getStatus() != Status.STATUS_COMMITTED)
|
||||
{
|
||||
txn.rollback();
|
||||
}
|
||||
}
|
||||
catch (Throwable e)
|
||||
{
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a file link
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateFileLink() throws Exception
|
||||
{
|
||||
// create a link of file site1File1_1 in folder site1Folder2
|
||||
NodeRef linkNodeRef = documentLinkService.createDocumentLink(site1File1, site1Folder2);
|
||||
assertNotNull(linkNodeRef);
|
||||
|
||||
// test if the link node is listed as a child of site1Folder2
|
||||
NodeRef linkNodeRef2 = fileFolderService.searchSimple(site1Folder2, site1File1Name);
|
||||
assertNotNull(linkNodeRef2);
|
||||
assertEquals(linkNodeRef, linkNodeRef2);
|
||||
|
||||
// check the type of the link
|
||||
assertEquals(nodeService.getType(linkNodeRef), ApplicationModel.TYPE_FILELINK);
|
||||
|
||||
// check if the link destination is site1File1_1
|
||||
NodeRef linkDestination = documentLinkService.getLinkDestination(linkNodeRef);
|
||||
assertNotNull(linkDestination);
|
||||
assertEquals(linkDestination, site1File1);
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a folder link
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateFolderLink() throws Exception
|
||||
{
|
||||
// create a link of file site1File1_1 in folder site1Folder2
|
||||
NodeRef linkNodeRef = documentLinkService.createDocumentLink(site1Folder1, site1Folder2);
|
||||
assertNotNull(linkNodeRef);
|
||||
|
||||
// test if the link node is listed as a child of site1Folder2
|
||||
NodeRef linkNodeRef2 = fileFolderService.searchSimple(site1Folder2, site1Folder1Name);
|
||||
assertNotNull(linkNodeRef2);
|
||||
assertEquals(linkNodeRef, linkNodeRef2);
|
||||
|
||||
// check the type of the link
|
||||
assertEquals(nodeService.getType(linkNodeRef), ApplicationModel.TYPE_FOLDERLINK);
|
||||
|
||||
// check if the link destination is site1File1_1
|
||||
NodeRef linkDestination = documentLinkService.getLinkDestination(linkNodeRef);
|
||||
assertNotNull(linkDestination);
|
||||
assertEquals(linkDestination, site1Folder1);
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the behavior of createDocumentLink when providing null arguments
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocumentWithNullArguments() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
documentLinkService.createDocumentLink(null, null);
|
||||
fail("null arguments must generate AlfrescoRuntimeException.");
|
||||
}
|
||||
catch (AlfrescoRuntimeException e)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Test the behavior of createDocumentLink when provided a file as a
|
||||
* destination
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testInvalidDestination() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
documentLinkService.createDocumentLink(site1Folder2, site1File1);
|
||||
fail("invalid destination argument must generate IllegalArgumentException.");
|
||||
}
|
||||
catch (IllegalArgumentException e)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a document link when the user doesn't have read
|
||||
* permission on the source node
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocLinkWithoutReadPermissionOnSource() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
AuthenticationUtil.runAs(new RunAsWork<Void>()
|
||||
{
|
||||
@Override
|
||||
public Void doWork() throws Exception
|
||||
{
|
||||
documentLinkService.createDocumentLink(site2File, site1Folder2);
|
||||
return null;
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
fail("no read permission on the source node must generate AccessDeniedException.");
|
||||
}
|
||||
catch (AccessDeniedException ex)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a document link when the user doesn't have write
|
||||
* permission on the destination node
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocLinkWithoutWritePermissionOnDestination() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
AuthenticationUtil.runAs(new RunAsWork<Void>()
|
||||
{
|
||||
@Override
|
||||
public Void doWork() throws Exception
|
||||
{
|
||||
documentLinkService.createDocumentLink(site1File1, site2Folder1);
|
||||
return null;
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
fail("no write permission on the destination node must generate AccessDeniedException.");
|
||||
}
|
||||
catch (AccessDeniedException ex)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the deletion of a document's links, with and without write
|
||||
* permissions
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testDeleteLinks() throws Exception
|
||||
{
|
||||
DeleteLinksStatusReport report = AuthenticationUtil.runAs(new RunAsWork<DeleteLinksStatusReport>()
|
||||
{
|
||||
@Override
|
||||
public DeleteLinksStatusReport doWork() throws Exception
|
||||
{
|
||||
return documentLinkService.deleteLinksToDocument(site1File2);
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
// check if the service found 2 links of the document
|
||||
assertEquals(report.getTotalLinksFoundCount(), 2);
|
||||
|
||||
// check if the service successfully deleted one
|
||||
assertEquals(report.getDeletedLinksCount(), 1);
|
||||
|
||||
// check if the second one failed with access denied
|
||||
Throwable ex = report.getErrorDetails().get(linkOfFile1Site2);
|
||||
assertNotNull(ex);
|
||||
assertEquals(ex.getClass(), AccessDeniedException.class);
|
||||
}
|
||||
|
||||
}
|
||||
package org.alfresco.repo.doclink;
|
||||
|
||||
import java.io.Serializable;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
|
||||
import javax.transaction.Status;
|
||||
import javax.transaction.UserTransaction;
|
||||
|
||||
import org.alfresco.error.AlfrescoRuntimeException;
|
||||
import org.alfresco.model.ApplicationModel;
|
||||
import org.alfresco.model.ContentModel;
|
||||
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
||||
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
|
||||
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
||||
import org.alfresco.service.ServiceRegistry;
|
||||
import org.alfresco.service.cmr.model.FileFolderService;
|
||||
import org.alfresco.service.cmr.repository.DeleteLinksStatusReport;
|
||||
import org.alfresco.service.cmr.repository.DocumentLinkService;
|
||||
import org.alfresco.service.cmr.repository.NodeRef;
|
||||
import org.alfresco.service.cmr.repository.NodeService;
|
||||
import org.alfresco.service.cmr.security.PermissionService;
|
||||
import org.alfresco.service.cmr.security.PersonService;
|
||||
import org.alfresco.service.cmr.site.SiteService;
|
||||
import org.alfresco.service.cmr.site.SiteVisibility;
|
||||
import org.alfresco.service.namespace.QName;
|
||||
import org.alfresco.service.transaction.TransactionService;
|
||||
import org.alfresco.util.ApplicationContextHelper;
|
||||
import org.alfresco.util.GUID;
|
||||
import org.springframework.context.ApplicationContext;
|
||||
import org.springframework.extensions.surf.util.I18NUtil;
|
||||
|
||||
import junit.framework.TestCase;
|
||||
|
||||
/**
|
||||
* Test cases for {@link DocumentLinkServiceImpl}.
|
||||
*
|
||||
* @author Ana Bozianu
|
||||
* @since 5.1
|
||||
*/
|
||||
|
||||
public class DocumentLinkServiceImplTest extends TestCase
|
||||
{
|
||||
|
||||
private static final ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
||||
private static final String TEST_USER = DocumentLinkServiceImplTest.class.getSimpleName() + "_testuser";
|
||||
|
||||
private UserTransaction txn;
|
||||
|
||||
private TransactionService transactionService;
|
||||
private DocumentLinkService documentLinkService;
|
||||
private PermissionService permissionService;
|
||||
private PersonService personService;
|
||||
private SiteService siteService;
|
||||
private FileFolderService fileFolderService;
|
||||
private NodeService nodeService;
|
||||
|
||||
// nodes the test user has read/write permission to
|
||||
private NodeRef site1File1;
|
||||
private NodeRef site1File2; // do not create links of this file
|
||||
private NodeRef site1Folder1;
|
||||
private NodeRef site1Folder2;
|
||||
private NodeRef site1Folder3;
|
||||
|
||||
// nodes the test user has no permission to
|
||||
private NodeRef site2File;
|
||||
private NodeRef site2Folder1;
|
||||
private NodeRef site2Folder2;
|
||||
private NodeRef linkOfFile1Site2;
|
||||
|
||||
private String site1File1Name = GUID.generate();
|
||||
private String site1Folder1Name = GUID.generate();;
|
||||
|
||||
@Override
|
||||
public void setUp() throws Exception
|
||||
{
|
||||
// Set up the services
|
||||
ServiceRegistry serviceRegistry = (ServiceRegistry) ctx.getBean("ServiceRegistry");
|
||||
transactionService = serviceRegistry.getTransactionService();
|
||||
documentLinkService = serviceRegistry.getDocumentLinkService();
|
||||
permissionService = serviceRegistry.getPermissionService();
|
||||
personService = serviceRegistry.getPersonService();
|
||||
siteService = serviceRegistry.getSiteService();
|
||||
fileFolderService = serviceRegistry.getFileFolderService();
|
||||
nodeService = serviceRegistry.getNodeService();
|
||||
|
||||
// Start the transaction
|
||||
txn = transactionService.getUserTransaction();
|
||||
txn.begin();
|
||||
|
||||
// Authenticate
|
||||
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
||||
|
||||
/* Create the test user */
|
||||
Map<QName, Serializable> props = new HashMap<QName, Serializable>();
|
||||
props.put(ContentModel.PROP_USERNAME, TEST_USER);
|
||||
personService.createPerson(props);
|
||||
|
||||
/*
|
||||
* Create the working test root 1 to which the user has read/write
|
||||
* permission
|
||||
*/
|
||||
NodeRef site1 = siteService.createSite("site1", GUID.generate(), "myTitle", "myDescription", SiteVisibility.PUBLIC).getNodeRef();
|
||||
permissionService.setPermission(site1, TEST_USER, PermissionService.ALL_PERMISSIONS, true);
|
||||
site1Folder1 = fileFolderService.create(site1, site1Folder1Name, ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site1File1 = fileFolderService.create(site1Folder1, site1File1Name, ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site1File2 = fileFolderService.create(site1Folder1, GUID.generate(), ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site1Folder2 = fileFolderService.create(site1, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site1Folder3 = fileFolderService.create(site1, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
// create a link of site1File1 in site1Folder3 to test regular deletion
|
||||
documentLinkService.createDocumentLink(site1File2, site1Folder3);
|
||||
|
||||
/* Create the working test root 2 to which the user has no permission */
|
||||
NodeRef site2 = siteService.createSite("site2", GUID.generate(), "myTitle", "myDescription", SiteVisibility.PRIVATE).getNodeRef();
|
||||
permissionService.setPermission(site2, TEST_USER, PermissionService.ALL_PERMISSIONS, false);
|
||||
site2File = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_CONTENT).getNodeRef();
|
||||
site2Folder1 = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
site2Folder2 = fileFolderService.create(site2, GUID.generate(), ContentModel.TYPE_FOLDER).getNodeRef();
|
||||
// Create a link of site1File1 in site2Folder2 to test the deletion
|
||||
// without permission
|
||||
linkOfFile1Site2 = documentLinkService.createDocumentLink(site1File2, site2Folder2);
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void tearDown() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
if (txn.getStatus() != Status.STATUS_ROLLEDBACK && txn.getStatus() != Status.STATUS_COMMITTED)
|
||||
{
|
||||
txn.rollback();
|
||||
}
|
||||
}
|
||||
catch (Throwable e)
|
||||
{
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a file link
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateFileLink() throws Exception
|
||||
{
|
||||
// create a link of file site1File1_1 in folder site1Folder2
|
||||
NodeRef linkNodeRef = documentLinkService.createDocumentLink(site1File1, site1Folder2);
|
||||
assertNotNull(linkNodeRef);
|
||||
|
||||
// test if the link node is listed as a child of site1Folder2
|
||||
String site1File1LinkName = I18NUtil.getMessage("doclink_service.link_to_label", (site1File1Name + ".url"));
|
||||
NodeRef linkNodeRef2 = fileFolderService.searchSimple(site1Folder2, site1File1LinkName);
|
||||
assertNotNull(linkNodeRef2);
|
||||
assertEquals(linkNodeRef, linkNodeRef2);
|
||||
|
||||
// check the type of the link
|
||||
assertEquals(nodeService.getType(linkNodeRef), ApplicationModel.TYPE_FILELINK);
|
||||
|
||||
// check if the link destination is site1File1_1
|
||||
NodeRef linkDestination = documentLinkService.getLinkDestination(linkNodeRef);
|
||||
assertNotNull(linkDestination);
|
||||
assertEquals(linkDestination, site1File1);
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a folder link
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateFolderLink() throws Exception
|
||||
{
|
||||
// create a link of file site1File1_1 in folder site1Folder2
|
||||
NodeRef linkNodeRef = documentLinkService.createDocumentLink(site1Folder1, site1Folder2);
|
||||
assertNotNull(linkNodeRef);
|
||||
|
||||
// test if the link node is listed as a child of site1Folder2
|
||||
String site1Folder1LinkName = I18NUtil.getMessage("doclink_service.link_to_label", (site1Folder1Name + ".url"));
|
||||
NodeRef linkNodeRef2 = fileFolderService.searchSimple(site1Folder2, site1Folder1LinkName);
|
||||
assertNotNull(linkNodeRef2);
|
||||
assertEquals(linkNodeRef, linkNodeRef2);
|
||||
|
||||
// check the type of the link
|
||||
assertEquals(nodeService.getType(linkNodeRef), ApplicationModel.TYPE_FOLDERLINK);
|
||||
|
||||
// check if the link destination is site1File1_1
|
||||
NodeRef linkDestination = documentLinkService.getLinkDestination(linkNodeRef);
|
||||
assertNotNull(linkDestination);
|
||||
assertEquals(linkDestination, site1Folder1);
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the behavior of createDocumentLink when providing null arguments
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocumentWithNullArguments() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
documentLinkService.createDocumentLink(null, null);
|
||||
fail("null arguments must generate AlfrescoRuntimeException.");
|
||||
}
|
||||
catch (AlfrescoRuntimeException e)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Test the behavior of createDocumentLink when provided a file as a
|
||||
* destination
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testInvalidDestination() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
documentLinkService.createDocumentLink(site1Folder2, site1File1);
|
||||
fail("invalid destination argument must generate IllegalArgumentException.");
|
||||
}
|
||||
catch (IllegalArgumentException e)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a document link when the user doesn't have read
|
||||
* permission on the source node
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocLinkWithoutReadPermissionOnSource() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
AuthenticationUtil.runAs(new RunAsWork<Void>()
|
||||
{
|
||||
@Override
|
||||
public Void doWork() throws Exception
|
||||
{
|
||||
documentLinkService.createDocumentLink(site2File, site1Folder2);
|
||||
return null;
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
fail("no read permission on the source node must generate AccessDeniedException.");
|
||||
}
|
||||
catch (AccessDeniedException ex)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the creation of a document link when the user doesn't have write
|
||||
* permission on the destination node
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testCreateDocLinkWithoutWritePermissionOnDestination() throws Exception
|
||||
{
|
||||
try
|
||||
{
|
||||
AuthenticationUtil.runAs(new RunAsWork<Void>()
|
||||
{
|
||||
@Override
|
||||
public Void doWork() throws Exception
|
||||
{
|
||||
documentLinkService.createDocumentLink(site1File1, site2Folder1);
|
||||
return null;
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
fail("no write permission on the destination node must generate AccessDeniedException.");
|
||||
}
|
||||
catch (AccessDeniedException ex)
|
||||
{
|
||||
// Expected
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests the deletion of a document's links, with and without write
|
||||
* permissions
|
||||
*
|
||||
* @throws Exception
|
||||
*/
|
||||
public void testDeleteLinks() throws Exception
|
||||
{
|
||||
DeleteLinksStatusReport report = AuthenticationUtil.runAs(new RunAsWork<DeleteLinksStatusReport>()
|
||||
{
|
||||
@Override
|
||||
public DeleteLinksStatusReport doWork() throws Exception
|
||||
{
|
||||
return documentLinkService.deleteLinksToDocument(site1File2);
|
||||
}
|
||||
}, TEST_USER);
|
||||
|
||||
// check if the service found 2 links of the document
|
||||
assertEquals(report.getTotalLinksFoundCount(), 2);
|
||||
|
||||
// check if the service successfully deleted one
|
||||
assertEquals(report.getDeletedLinksCount(), 1);
|
||||
|
||||
// check if the second one failed with access denied
|
||||
Throwable ex = report.getErrorDetails().get(linkOfFile1Site2);
|
||||
assertNotNull(ex);
|
||||
assertEquals(ex.getClass(), AccessDeniedException.class);
|
||||
}
|
||||
|
||||
}
|
||||
|
Reference in New Issue
Block a user