mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
39199: Fixed ALF-13252 "Share - Added aspects are not shown in folder properties" 39235: Merged BRANCHES/DEV/BELARUS/V4.1-BUG-FIX-2012_07_09 to BRANCHES/DEV/V4.1-BUG-FIX: 38994: ALF-14983 : Upgrade scripts to increase column sizes for Activiti 39052: ALF-14983 : Upgrade scripts to increase column sizes for Activiti (note: reviewed and merged, including required merge ghanges to .sql, .properties, .xml for schema number update 5111 -> 5112) 39239: ALF-14111 CLONE - 60k sites: Groups are not displayed in all supported browsers when 60k sites and 60 groups in the system - Code works on 3.4 as it includes a fix for ALF-7604 (3.4.2). - V4.1 should also have this fix (but did not) as there was a clone ALF-7734 (of ALF-7604) applied to Team that was merged to HEAD (and hence 4.x). The merge to HEAD failed to include this fix. - Putting this code back into 4.1.1 - this should correct this issue (ALF-14111) as the code will no longer have to sort 240,000 groups when there are 60,000 user created groups. 39257: ALF-10730: Fall back on parentType for icons if necessary 39307: Fix for ALF-14799 - jsonUtils.toJSONString() outputs long values as floating-point numbers - Updated to latest Surf libs rev 1101 which fixes this issue 39310: Merged BRANCHES/DEV/BELARUS/V4.1-BUG-FIX-2012_07_09 to BRANCHES/DEV/V4.1-BUG-FIX 39071: ALF-13767: User error messages in org.alfresco.repo.web.scripts are all hardcoded and cannot be localised Modify Java backed webscripts to return localised messages to model. 39345: Impl from Shane Frensley to fix ALF-3484 - Alfresco should show meaningful error message when deleted item recovery fails. 39362: RECORD ONLY MERGE from V3.4-BUG-FIX to V4.1-BUG-FIX 39360: <<DO NOT MERGE TO V4.1-BUG-FIX>> Remove the creation of OSX installers - we will never need them any more since they are neither distributed not trialled 39416: Fix for ALF-14466 Share Document Library breaks for obscure control character in document title 39594: Minor formatting tweak for coding standards consistency. 39622: ALF-9254: Merged V3.4-BUG-FIX (3.4.11) to V4.1-BUG-FIX (4.1.1) 39605: ALF-15227 3.4 CLONE - Alfresco incapable of previewing text files including non Western European characters without custom configuration - transformer.PdfBox.TextToPdf no longer does txt to pdf transform as OOo/JOD handles non western chars better and are not that much slower even for western encodings - It still does csv and xml to pdf - transformer.complex.Text.Pdf2swf now has a wild card first transformer for text to pdf (rather than transformer.PdfBox.TextToPdf) The 2nd transform is still transformer.Pdf2swf. As a result transformer.PdfBox.TextToPdf or the OOo/JOD transformers may be used. - transformer.complex.Archive.Pdf2swf now has a wild card first transformer for the same reason. - transformer.complex.Text.Image now has a wild card first transformer for the same reason. - Allow transformer config element supportedTransformations to wild card source or target mimetype 39692: ALF-9254: Merged V3.4-BUG-FIX (3.4.11) to V4.1-BUG-FIX (4.1.1) 39679: ALF-15227 3.4 CLONE - Alfresco incapable of previewing text files including non Western European characters without custom configuration - Fix build failures (not sure about RecordsManagementAuditServiceImplTest) - Reset some of the text to pdf / swf limits now OOo or JOD is used rather than PDFBox 39719: ALF-13037: Ensure that doclist is refreshed when on edit properties triggered folder rule that causes documents to be moved 39734: Improvements to reduce need to index Surf component XML files - parent config folders already dealt with, but this removes the burden of indexing the XML content. (ALF-10826) 39740: Merged BRANCHES/V4.1 to BRANCHES/DEV/V4.1-BUG-FIX: (record-only - already present) 39734: Improvements to reduce need to index Surf component XML files - parent config folders already dealt with, but this removes the burden of indexing the XML content. 39779: Merged V3.4-BUG-FIX to V4.1-BUG-FIX (RECORD ONLY) 39774: ALF-15262: Merged V4.0-BUG-FIX to V3.4-BUG-FIX 35738: Merged HEAD to BRANCHES/DEV/V4.0-BUG-FIX: 35737: Fix for ALF-11923. Linked rules can't be deleted if source folder was deleted. 35751: Addendum to fix for ALF-11923. Fixing failing test case by tightening up delete behaviour. I also fixed the @since annotations from Odin to 3.4.11 39777: ALF-15262: Fixed compilation error by re-introducing typo in method name! 39784: Merged BRANCHES/V4.1 to BRANCHES/DEV/V4.1-BUG-FIX (RECORD ONLY) 39775: ALF-15271: "Site Content" dashlet shows all documents from all the sites in Alfresco Share 39831: Merged V3.4-BUG-FIX to V4.1-BUG-FIX (4.1.1) 39015: Merged in upgrade of truezip to 7.5.5 see ALF-14247 39361: Added truezip-swing jar. It seems that Truezip needs Swing :( git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@40265 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
541 lines
20 KiB
Java
541 lines
20 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.repo.node.archive;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.Collection;
|
|
import java.util.Collections;
|
|
import java.util.List;
|
|
|
|
import org.alfresco.error.AlfrescoRuntimeException;
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.batch.BatchProcessWorkProvider;
|
|
import org.alfresco.repo.batch.BatchProcessor;
|
|
import org.alfresco.repo.batch.BatchProcessor.BatchProcessWorker;
|
|
import org.alfresco.repo.lock.JobLockService;
|
|
import org.alfresco.repo.lock.LockAcquisitionException;
|
|
import org.alfresco.repo.node.archive.RestoreNodeReport.RestoreStatus;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
|
|
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper.RetryingTransactionCallback;
|
|
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
|
import org.alfresco.service.cmr.repository.DuplicateChildNodeNameException;
|
|
import org.alfresco.service.cmr.repository.InvalidNodeRefException;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.repository.StoreRef;
|
|
import org.alfresco.service.cmr.security.AccessStatus;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.namespace.NamespaceService;
|
|
import org.alfresco.service.namespace.QName;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.alfresco.util.EqualsHelper;
|
|
import org.alfresco.util.VmShutdownListener;
|
|
import org.apache.commons.logging.Log;
|
|
import org.apache.commons.logging.LogFactory;
|
|
|
|
/**
|
|
* Implementation of the node archive abstraction.
|
|
*
|
|
* @author Derek Hulley
|
|
*/
|
|
public class NodeArchiveServiceImpl implements NodeArchiveService
|
|
{
|
|
private static final QName LOCK_QNAME = QName.createQName(NamespaceService.ALFRESCO_URI, "NodeArchive");
|
|
private static final long LOCK_TTL = 60000;
|
|
|
|
private static final String MSG_BUSY = "node.archive.msg.busy";
|
|
|
|
private static Log logger = LogFactory.getLog(NodeArchiveServiceImpl.class);
|
|
|
|
private NodeService nodeService;
|
|
private PermissionService permissionService;
|
|
private TransactionService transactionService;
|
|
private JobLockService jobLockService;
|
|
|
|
public void setNodeService(NodeService nodeService)
|
|
{
|
|
this.nodeService = nodeService;
|
|
}
|
|
|
|
public void setPermissionService(PermissionService permissionService)
|
|
{
|
|
this.permissionService = permissionService;
|
|
}
|
|
|
|
public void setTransactionService(TransactionService transactionService)
|
|
{
|
|
this.transactionService = transactionService;
|
|
}
|
|
|
|
public NodeRef getStoreArchiveNode(StoreRef originalStoreRef)
|
|
{
|
|
return nodeService.getStoreArchiveNode(originalStoreRef);
|
|
}
|
|
|
|
public void setJobLockService(JobLockService jobLockService)
|
|
{
|
|
this.jobLockService = jobLockService;
|
|
}
|
|
|
|
public NodeRef getArchivedNode(NodeRef originalNodeRef)
|
|
{
|
|
StoreRef orginalStoreRef = originalNodeRef.getStoreRef();
|
|
NodeRef archiveRootNodeRef = nodeService.getStoreArchiveNode(orginalStoreRef);
|
|
// create the likely location of the archived node
|
|
NodeRef archivedNodeRef = new NodeRef(
|
|
archiveRootNodeRef.getStoreRef(),
|
|
originalNodeRef.getId());
|
|
return archivedNodeRef;
|
|
}
|
|
|
|
/**
|
|
* Get all the nodes that were archived <b>from</b> the given store.
|
|
*
|
|
* @param originalStoreRef the original store to process
|
|
*/
|
|
private List<NodeRef> getArchivedNodes(StoreRef originalStoreRef)
|
|
{
|
|
// Get the archive location
|
|
final NodeRef archiveParentNodeRef = nodeService.getStoreArchiveNode(originalStoreRef);
|
|
RunAsWork<List<ChildAssociationRef>> runAsWork = new RunAsWork<List<ChildAssociationRef>>()
|
|
{
|
|
@Override
|
|
public List<ChildAssociationRef> doWork() throws Exception
|
|
{
|
|
String currentUser = AuthenticationUtil.getFullyAuthenticatedUser();
|
|
if (currentUser == null)
|
|
{
|
|
throw new AccessDeniedException("No authenticated user; cannot get archived nodes.");
|
|
}
|
|
return nodeService.getChildAssocs(
|
|
archiveParentNodeRef,
|
|
ContentModel.ASSOC_CHILDREN,
|
|
NodeArchiveService.QNAME_ARCHIVED_ITEM);
|
|
}
|
|
};
|
|
// Fetch all children as 'system' user to bypass permission checks
|
|
List<ChildAssociationRef> archivedAssocs = AuthenticationUtil.runAs(runAsWork, AuthenticationUtil.getSystemUserName());
|
|
// Iterate and pull out NodeRefs with a permission check
|
|
List<NodeRef> nodeRefs = new ArrayList<NodeRef>(archivedAssocs.size());
|
|
for (ChildAssociationRef childAssociationRef : archivedAssocs)
|
|
{
|
|
NodeRef nodeRef = childAssociationRef.getChildRef();
|
|
// Eliminate if the current user doesn't have permission to delete
|
|
if (permissionService.hasPermission(nodeRef, PermissionService.DELETE) == AccessStatus.ALLOWED)
|
|
{
|
|
nodeRefs.add(nodeRef);
|
|
}
|
|
}
|
|
return nodeRefs;
|
|
}
|
|
|
|
/**
|
|
* @return Returns a work provider for batch processing
|
|
*
|
|
* @since 3.3.4
|
|
*/
|
|
private BatchProcessWorkProvider<NodeRef> getArchivedNodesWorkProvider(final StoreRef originalStoreRef, final String lockToken)
|
|
{
|
|
return new BatchProcessWorkProvider<NodeRef>()
|
|
{
|
|
private VmShutdownListener vmShutdownLister = new VmShutdownListener("getArchivedNodesWorkProvider");
|
|
private List<NodeRef> nodeRefs;
|
|
private boolean done;
|
|
private synchronized List<NodeRef> getNodeRefs()
|
|
{
|
|
if (nodeRefs == null)
|
|
{
|
|
nodeRefs = getArchivedNodes(originalStoreRef);
|
|
}
|
|
return nodeRefs;
|
|
}
|
|
/**
|
|
* @return Returns 0, always
|
|
*/
|
|
public synchronized int getTotalEstimatedWorkSize()
|
|
{
|
|
return 0;
|
|
}
|
|
public synchronized Collection<NodeRef> getNextWork()
|
|
{
|
|
if (vmShutdownLister.isVmShuttingDown())
|
|
{
|
|
return Collections.emptyList();
|
|
}
|
|
// Make sure we still have the lock
|
|
try
|
|
{
|
|
// TODO: Replace with joblock callback mechanism that provides shutdown hints
|
|
jobLockService.refreshLock(lockToken, LOCK_QNAME, LOCK_TTL);
|
|
}
|
|
catch (LockAcquisitionException e)
|
|
{
|
|
// This is OK. We don't have the lock so just quit
|
|
return Collections.emptyList();
|
|
}
|
|
|
|
if (done)
|
|
{
|
|
return Collections.emptyList();
|
|
}
|
|
else
|
|
{
|
|
done = true;
|
|
return getNodeRefs();
|
|
}
|
|
}
|
|
};
|
|
}
|
|
|
|
/**
|
|
* This is the primary restore method that all <code>restore</code> methods fall back on.
|
|
* It executes the restore for the node in a separate transaction and attempts to catch
|
|
* the known conditions that can be reported back to the client.
|
|
*/
|
|
public RestoreNodeReport restoreArchivedNode(
|
|
final NodeRef archivedNodeRef,
|
|
final NodeRef destinationNodeRef,
|
|
final QName assocTypeQName,
|
|
final QName assocQName)
|
|
{
|
|
RestoreNodeReport report = new RestoreNodeReport(archivedNodeRef);
|
|
report.setTargetParentNodeRef(destinationNodeRef);
|
|
try
|
|
{
|
|
// Transactional wrapper to attempt the restore
|
|
RetryingTransactionHelper txnHelper = transactionService.getRetryingTransactionHelper();
|
|
RetryingTransactionCallback<NodeRef> restoreCallback = new RetryingTransactionCallback<NodeRef>()
|
|
{
|
|
public NodeRef execute() throws Exception
|
|
{
|
|
return nodeService.restoreNode(archivedNodeRef, destinationNodeRef, assocTypeQName, assocQName);
|
|
}
|
|
};
|
|
NodeRef newNodeRef = txnHelper.doInTransaction(restoreCallback, false, true);
|
|
// success
|
|
report.setRestoredNodeRef(newNodeRef);
|
|
report.setStatus(RestoreStatus.SUCCESS);
|
|
}
|
|
catch (InvalidNodeRefException e)
|
|
{
|
|
report.setCause(e);
|
|
NodeRef invalidNodeRef = e.getNodeRef();
|
|
if (archivedNodeRef.equals(invalidNodeRef))
|
|
{
|
|
// not too serious, but the node to archive is missing
|
|
report.setStatus(RestoreStatus.FAILURE_INVALID_ARCHIVE_NODE);
|
|
}
|
|
else if (EqualsHelper.nullSafeEquals(destinationNodeRef, invalidNodeRef))
|
|
{
|
|
report.setStatus(RestoreStatus.FAILURE_INVALID_PARENT);
|
|
}
|
|
else if (destinationNodeRef == null)
|
|
{
|
|
// get the original parent of the archived node
|
|
ChildAssociationRef originalParentAssocRef = (ChildAssociationRef) nodeService.getProperty(
|
|
archivedNodeRef,
|
|
ContentModel.PROP_ARCHIVED_ORIGINAL_PARENT_ASSOC);
|
|
NodeRef originalParentNodeRef = originalParentAssocRef.getParentRef();
|
|
if (EqualsHelper.nullSafeEquals(originalParentNodeRef, invalidNodeRef))
|
|
{
|
|
report.setStatus(RestoreStatus.FAILURE_INVALID_PARENT);
|
|
}
|
|
else
|
|
{
|
|
// some other invalid node was detected
|
|
report.setStatus(RestoreStatus.FAILURE_OTHER);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// some other invalid node was detected
|
|
report.setStatus(RestoreStatus.FAILURE_OTHER);
|
|
}
|
|
}
|
|
catch (DuplicateChildNodeNameException e)
|
|
{
|
|
report.setCause(e);
|
|
report.setStatus(RestoreStatus.FAILURE_DUPLICATE_CHILD_NODE_NAME);
|
|
logger.error(e);
|
|
}
|
|
catch (AccessDeniedException e)
|
|
{
|
|
report.setCause(e);
|
|
report.setStatus(RestoreStatus.FAILURE_PERMISSION);
|
|
}
|
|
catch (Throwable e)
|
|
{
|
|
report.setCause(e);
|
|
report.setStatus(RestoreStatus.FAILURE_OTHER);
|
|
logger.error("An unhandled exception stopped the restore", e);
|
|
}
|
|
// done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Attempted node restore: "+ report);
|
|
}
|
|
return report;
|
|
}
|
|
|
|
/**
|
|
* @see #restoreArchivedNode(NodeRef, NodeRef, QName, QName)
|
|
*/
|
|
public RestoreNodeReport restoreArchivedNode(NodeRef archivedNodeRef)
|
|
{
|
|
return restoreArchivedNode(archivedNodeRef, null, null, null);
|
|
}
|
|
|
|
/**
|
|
* @see #restoreArchivedNodes(List, NodeRef, QName, QName)
|
|
*/
|
|
public List<RestoreNodeReport> restoreArchivedNodes(List<NodeRef> archivedNodeRefs)
|
|
{
|
|
return restoreArchivedNodes(archivedNodeRefs, null, null, null);
|
|
}
|
|
|
|
/**
|
|
* @see #restoreArchivedNode(NodeRef, NodeRef, QName, QName)
|
|
*/
|
|
public List<RestoreNodeReport> restoreArchivedNodes(
|
|
List<NodeRef> archivedNodeRefs,
|
|
NodeRef destinationNodeRef,
|
|
QName assocTypeQName,
|
|
QName assocQName)
|
|
{
|
|
List<RestoreNodeReport> results = new ArrayList<RestoreNodeReport>(archivedNodeRefs.size());
|
|
for (NodeRef nodeRef : archivedNodeRefs)
|
|
{
|
|
RestoreNodeReport result = restoreArchivedNode(nodeRef, destinationNodeRef, assocTypeQName, assocQName);
|
|
results.add(result);
|
|
}
|
|
return results;
|
|
}
|
|
|
|
/**
|
|
* Uses batch processing and job locking to purge all archived nodes
|
|
*
|
|
* @deprecated In 3.4: to be removed
|
|
*/
|
|
public List<RestoreNodeReport> restoreAllArchivedNodes(StoreRef originalStoreRef)
|
|
{
|
|
final String user = AuthenticationUtil.getFullyAuthenticatedUser();
|
|
if (user == null)
|
|
{
|
|
throw new IllegalStateException("Cannot restore as there is no authenticated user.");
|
|
}
|
|
|
|
final List<RestoreNodeReport> results = Collections.synchronizedList(new ArrayList<RestoreNodeReport>(1000));
|
|
/**
|
|
* Worker that restores each node
|
|
*/
|
|
BatchProcessWorker<NodeRef> worker = new BatchProcessor.BatchProcessWorkerAdaptor<NodeRef>()
|
|
{
|
|
@Override
|
|
public void beforeProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
}
|
|
public void process(NodeRef entry) throws Throwable
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(user);
|
|
if (nodeService.exists(entry))
|
|
{
|
|
RestoreNodeReport report = restoreArchivedNode(entry);
|
|
// Append the results (it is synchronized)
|
|
results.add(report);
|
|
}
|
|
}
|
|
@Override
|
|
public void afterProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
};
|
|
doBulkOperation(user, originalStoreRef, worker);
|
|
return results;
|
|
}
|
|
|
|
/**
|
|
* Finds the archive location for nodes that were deleted from the given store
|
|
* and attempt to restore each node.
|
|
*
|
|
* @see NodeService#getStoreArchiveNode(StoreRef)
|
|
* @see #restoreArchivedNode(NodeRef, NodeRef, QName, QName)
|
|
*
|
|
* @deprecated In 3.4: to be removed
|
|
*/
|
|
public List<RestoreNodeReport> restoreAllArchivedNodes(
|
|
final StoreRef originalStoreRef,
|
|
final NodeRef destinationNodeRef,
|
|
final QName assocTypeQName,
|
|
final QName assocQName)
|
|
{
|
|
final String user = AuthenticationUtil.getFullyAuthenticatedUser();
|
|
if (user == null)
|
|
{
|
|
throw new IllegalStateException("Cannot restore as there is no authenticated user.");
|
|
}
|
|
|
|
final List<RestoreNodeReport> results = Collections.synchronizedList(new ArrayList<RestoreNodeReport>(1000));
|
|
/**
|
|
* Worker that restores each node
|
|
*/
|
|
BatchProcessWorker<NodeRef> worker = new BatchProcessor.BatchProcessWorkerAdaptor<NodeRef>()
|
|
{
|
|
@Override
|
|
public void beforeProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
}
|
|
public void process(NodeRef nodeRef) throws Throwable
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(user);
|
|
if (nodeService.exists(nodeRef))
|
|
{
|
|
RestoreNodeReport report = restoreArchivedNode(nodeRef, destinationNodeRef, assocTypeQName, assocQName);
|
|
// Append the results (it is synchronized)
|
|
results.add(report);
|
|
}
|
|
}
|
|
@Override
|
|
public void afterProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
};
|
|
doBulkOperation(user, originalStoreRef, worker);
|
|
return results;
|
|
}
|
|
|
|
/**
|
|
* This is the primary purge methd that all purge methods fall back on. It isolates the delete
|
|
* work in a new transaction.
|
|
*/
|
|
public void purgeArchivedNode(final NodeRef archivedNodeRef)
|
|
{
|
|
RetryingTransactionHelper txnHelper = transactionService.getRetryingTransactionHelper();
|
|
RetryingTransactionCallback<Object> deleteCallback = new RetryingTransactionCallback<Object>()
|
|
{
|
|
public Object execute() throws Exception
|
|
{
|
|
try
|
|
{
|
|
nodeService.deleteNode(archivedNodeRef);
|
|
}
|
|
catch (InvalidNodeRefException e)
|
|
{
|
|
// ignore
|
|
}
|
|
return null;
|
|
}
|
|
};
|
|
txnHelper.doInTransaction(deleteCallback, false, true);
|
|
}
|
|
|
|
/**
|
|
* @see #purgeArchivedNode(NodeRef)
|
|
*/
|
|
public void purgeArchivedNodes(List<NodeRef> archivedNodes)
|
|
{
|
|
for (NodeRef archivedNodeRef : archivedNodes)
|
|
{
|
|
purgeArchivedNode(archivedNodeRef);
|
|
}
|
|
// done
|
|
}
|
|
|
|
/**
|
|
* Uses batch processing and job locking to purge all archived nodes
|
|
*/
|
|
public void purgeAllArchivedNodes(StoreRef originalStoreRef)
|
|
{
|
|
final String user = AuthenticationUtil.getFullyAuthenticatedUser();
|
|
if (user == null)
|
|
{
|
|
throw new IllegalStateException("Cannot purge as there is no authenticated user.");
|
|
}
|
|
|
|
/**
|
|
* Worker that purges each node
|
|
*/
|
|
BatchProcessWorker<NodeRef> worker = new BatchProcessor.BatchProcessWorkerAdaptor<NodeRef>()
|
|
{
|
|
@Override
|
|
public void beforeProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
}
|
|
public void process(NodeRef nodeRef) throws Throwable
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(user);
|
|
if (nodeService.exists(nodeRef))
|
|
{
|
|
nodeService.deleteNode(nodeRef);
|
|
}
|
|
}
|
|
@Override
|
|
public void afterProcess() throws Throwable
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
};
|
|
doBulkOperation(user, originalStoreRef, worker);
|
|
}
|
|
|
|
/**
|
|
* Do batch-controlled work
|
|
*/
|
|
private void doBulkOperation(final String user, StoreRef originalStoreRef, BatchProcessWorker<NodeRef> worker)
|
|
{
|
|
String lockToken = null;
|
|
try
|
|
{
|
|
// Get a lock to keep refreshing
|
|
lockToken = jobLockService.getLock(LOCK_QNAME, LOCK_TTL);
|
|
// TODO: Should merely trigger a background job i.e. perhaps it should not be
|
|
// triggered by a user-based thread
|
|
BatchProcessor<NodeRef> batchProcessor = new BatchProcessor<NodeRef>(
|
|
"ArchiveBulkPurgeOrRestore",
|
|
transactionService.getRetryingTransactionHelper(),
|
|
getArchivedNodesWorkProvider(originalStoreRef, lockToken),
|
|
2, 20,
|
|
null, null, 1000);
|
|
batchProcessor.process(worker, true);
|
|
}
|
|
catch (LockAcquisitionException e)
|
|
{
|
|
throw new AlfrescoRuntimeException(MSG_BUSY);
|
|
}
|
|
finally
|
|
{
|
|
try
|
|
{
|
|
if (lockToken != null ) {jobLockService.releaseLock(lockToken, LOCK_QNAME); }
|
|
}
|
|
catch (LockAcquisitionException e)
|
|
{
|
|
// Ignore
|
|
}
|
|
}
|
|
}
|
|
}
|