mirror of
				https://github.com/Alfresco/alfresco-community-repo.git
				synced 2025-10-29 15:21:53 +00:00 
			
		
		
		
	30342: Dev branch for Site performance issues (including rework of AuthorityService.getAuthorities() to use a 'lazy' set and DM indexing rework)
   ALF-9899 Huge share site migration, add group to site and user access site related performance issue.
   ALF-9208 Performance issue, during load tests /share/page/user/user-sites is showing to be the most expensive.
   ALF-9692 Performance: General performance of Alfresco degrades when there are 1000s of sites present
   - ancestor-preloading
   - hasAuthority
   - huge site test
   30370: - Save changed to do with adding childAuthorityCache to AuthorityDAOImpl
   - Increase aspectsTransactionalCache size as it blows up
   30387: Experimental solution to 'cascading reindex' performance problem
   - Now only Lucene container documents for a single subtree are reprocessed on addition / removal of a secondary child association
   - No need to delete and re-evaluate ALL the paths to all the nodes in the subtree - just the paths within the subtree
   - Lucene deltas now store the IDs of ANCESTORs to mask out as well as documents to reindex
   - Merge handles deletion of these efficiently
   - Node service cycle checks changed from getPaths to recursive cycleCheck method
   - Adding a group to 60,000 sites might not require all paths to all sites to be re-evaluated on every change!
   30389: Missed files from last checkin
   30390: Optimizations / fixes to Alan's test!
   30393: Bug fix - wasn't adding new documents into the index!
   30397: Fixed a problem with bulk loading trying to bulk load zero parent associations
   Also tweaked reindex calls
   30399: Correction - don't cascade below containers during path cascading
   30400: Another optimization - no need to trigger node bulk loading during path cascading - pass false for the preload flag
   30404: Further optimizations
   - On creation of a secondary child association, make a decision on whether it is cheaper to cascade reindex the parent or the child, based on the number of parent associations to the child
     - Assumes that if there are more than 5 parent associations, it's cheaper to cascade reindex the parent
     - Add a new authority to a zone (containing 60,000 authorities) - cascade reindex the authority, not the zone
     - Add a group (in 60,000 sites) to a site - cascade reindex the site, not the group
   - Caching of child associations already traversed during cascade reindexing
   - Site creation time much reduced!
   30407: Logic fix: Use 'delete only nodes' behaviour on DM index filtering and merging, now we are managing container deletions separately
   30408: Small correction related to last change.
   30409: Correction to deletion reindex behaviour (no need to regenerate masked out containers)
   - Site CRUD operations now all sub-second with 60,000 sites!
   30410: Stop the heartbeat from trying to load and count all site groups
   - Too expensive, as we might have 60,000 sites, each with 4 groups
   - Now just counts the groups in the default zone (the UI visible ones)
   30411: Increased lucene parameters to allow for 'path explosion'
   - 9 million lucene documents in my index after creating 60,000 Share sites (most of them probably paths) resulting in sluggish index write performance
   - Set lucene.indexer.mergerTargetIndexCount=8 (142 documents in smallest index)
   - Increased lucene.indexer.maxDocsForInMemoryMerge, lucene.indexer.maxDocsForInMemoryIndex
   30412: Test fixes
   30413: Revert 'parent association batch loading' changes (as it was a bad idea and is no longer necessary!)
   - Retain a few caching bug fixes however
   30416: Moved UserAuthoritySet (lazy load authority set) from PermissionServiceImpl to AuthorityServiceImpl
   30418: - Remove 'new' hasAuthority from authorityService so it is back to where we started.
   - SiteServiceHugeTest minor changes
   30421: Prevent creation of a duplicate root node on updating the root
   - Use the ANCESTOR field rather than ISCONTAINER to detect a node document, as the root node is both a container and a node!
   30447: Pulled new indexing behaviour into ADMLuceneIndexerImpl and restored old behaviour to AVMLuceneIndexerImpl to restore normal AVM behaviour
   30448: - Cache in PermissionServiceImpl cleared if an authority container has an association added or removed
     Supports the generateKey method which includes the username
     Supports changes in group structures
   - Moved logic to do with ROLE_GUEST from PermissionServiceImpl to AuthorityServiceImpl 
   30465: - Tidy up tests in SiteServiceTestHuge 
   30532: - Added getContainingAuthoritiesInZone to AuthorityService
     - Dave Changed PeopleService.getContainerGroups to only return groups in the DEFAULT zone
   - Fixed RM code to use getAuthoritiesForUser method with just the username again.
   30558: Build fixes
   - Fixed cycleCheck to throw a CyclicChildRelationshipException
   - More tidy up of AVM / ADM indexer split
   - Properly control when path generation is cascaded (not required on a full reindex or a tracker transaction)
   - Support indexing of a 'fake root' parent. Ouch my head hurts!
   30588: Build fixes
   - StringIndexOutOfBoundsException in NodeMonitor
   - Corrections to 'node only' delete behaviour
   - Use the PATH field to detect non-leaf nodes (it's the only stored field with which we can recognize the root)
   - Moved DOD5015Test.testVitalRecords() to the end - the only way I could work out how to get the full TestCase to run
   30600: More build fixes
   - Broadcast ALL node deletions to indexer (even those from cascade deletion of primary associations)
     - Allows indexer to wipe out all affected documents from the delta even if some have already been flushed under different parents by an intricate DOD unit test!
   - Pause FTS in DOD5015Test to prevent intermittent test failures (FTS can temporarily leave deleted documents in the index until it catches up)
   - More tidy up of ADMLuceneIndexerImpl
     - flushPending optimized and some unnecessary member variables removed
     - correction to cascade deletion behaviour (leave behind containers of unaffected secondary references)
     - unused MOVE action removed
     - further legacy logic moved into AVMLuceneIndexerImpl
   30620: More build fixes
   - Cope with a node morphing from a 'leaf' to a container during its lifetime
   - Container documents now created lazily in index as and when necessary
   - Blank out 'nth sibling' field of synthesized paths
   - ADMLuceneTest now passes!
   - TaggingServiceImplTest also passes - more special treatment for categories
   30627: Multi tenancy fixes
   30629: Possible build fix - retrying transaction in ReplicationServiceIntegrationTest.tearDown()
   30632: Build fix - lazy container generation after a move
   30636: Build fix: authority comparisons are case sensitive, even when that authority corresponds to a user (PermissionServiceTest.testPermissionCase())
   30638: Run SiteServiceTestHuge form a cmd line
      set SITE_CPATH=%TOMCAT_HOME%/lib/*;%TOMCAT_HOME%/endorsed/*;%TOMCAT_HOME%/webapps/alfresco/WEB-INF/lib/*;\
                     %TOMCAT_HOME%/webapps/alfresco/WEB-INF/classes;%TOMCAT_HOME%/shared/classes;
      java -Xmx2048m -XX:MaxPermSize=512M -classpath %SITE_CPATH% org.alfresco.repo.site.SiteServiceTestHuge ...
   
      Usage: -Daction=usersOnly
             -Dfrom=<fromSiteId> -Dto=<toSiteId>
             -Dfrom=<fromSiteId> -Dto=<toSiteId> -Daction=sites  -Drestart=<restartAtSiteId>
             -Dfrom=<fromSiteId> -Dto=<toSiteId> -Daction=groups -Drestart=<restartAtSiteId>
   30639: Minor changes to commented out command line code for SiteServiceTestHuge
   30643: Round of improvements to MySites dashlet relating to huge DB testing:
    - 10,000 site database, user is a member of ~2000 sites
    - Improvements to site.lib.ftl and related SiteService methods
    - To return MySites dashlet for the user, order of magnitude improvement from 7562ms to 618ms in the profiler (now ~350ms in the browser)
   30644: Fixed performance regression - too much opening and closing of the delta reader and writer
   30661: More reader opening / closing
   30668: Performance improvements to Site Finder and My Sites in user profile page.
    - faster to bring back lists and site memberships (used by the Site Finder)
    - related further improvements to APIs used by this and My Sites on dashboard
   30713: Configuration for MySites dashlet maximum list size
   30725: Merged V3.4-BUG-FIX to DEV/ALAN/SITE_PERF
      30708: ALF-10040: Added missing ReferenceCountingReadOnlyIndexReaderFactory wrapper to IndexInfo.getMainIndexReferenceCountingReadOnlyIndexReader() to make it consistent with IndexInfo.getMainIndexReferenceCountingReadOnlyIndexReader(String, Set<String>, boolean) and allow SingleFieldSelectors to make it through from LeafScorer to the path caches! Affects ALL Lucene queries that run OUTSIDE of a transaction.
   30729: Use getAuthoritiesForUser rather than getContainingAuthorities if possible.
   SiteServiceTestHuge: command line version
   30733: Performance improves to user dashboard relating to User Calendar 
    - converted web-tier calendar dashlet to Ajax client-side rendering - faster user experience and also less load on the web-tier
    - improvements to query from Andy
    - maximum sites/list size to query now configurable (default 100 instead of previously 1000)
   30743: Restore site CRUD performance from cold caches
   - Introduced NodeService.getAllRootNodes(), returning all nodes in a store with the root aspect, backed by a transactional cache and invalidated at key points
   - Means indexing doesn't have to load all parent nodes just to check for 'fake roots'
   - Site CRUD performance now back to sub-second with 60,000 nodes
   30747: Improvement to previous checkin - prevent cross cluster invalidation of every store root when a single store drops out of the cache
   30748: User dashboard finally loading within seconds with 60,000 sites, 60 groups, 100 users (thanks mostly to Kev's UI changes)
   - post-process IBatis mapped statements with MySQL dialect to apply fetchSize=Integer.MIN_VALUE to all _Limited statements
      - Means we can stream first 10,000 site groups without the MySQL JDBC driver reading all 240,000 into memory
   - New NodeService getChildAssocs method with a maxResults argument (makes use of the above)
   - Perfected getContainingAuthoritiesInZone implementation, adding a cutoff parameter, allowing only the first 1000 site memberships to be returned quickly and caches to be warmed for ACL evaluations
   - New cache of first 10,000 groups in APP.SHARE zone
   - Cache sizes tuned for 60,000 site scenario
   - Site service warms caches on bootstrap
   - PreferencesService applies ASPECT_IGNORE_INHERITED_RULES to person node to prevent the rule service trying to crawl the group hierarchy on a preference save
   - WorkflowServiceImpl.getPooledTasks only looks in APP.DEFAULT zone (thus avoiding site group noise)
   30749: Fix compilation errors
   30761: Minor change to SiteServiceTestHuge
   30762: Derek code review: Reworked fetchSize specification for select_ChildAssocsOfParent_Limited statement for MySQL
   - Now fetchSize stated explicitly in a MySQL specific config file resolved by the HierarchicalResourceLoader
   - No need for any Java-based post processing
   30763: Build fix: don't add a user into its own authorities (until specifically asked to)
   30767: Build fix
   - IBatis / MySQL needs a streaming result statement to be run in an isolation transaction (because it doesn't release PreparedStatements until the end)
   30771: Backed out previous change which was fundamentally flawed
   - Resolved underlying problem which was that the select_ChildAssocsOfParent_Limited SQL string needs to be unique in order to not cause confusion in the prepared statement cache
   30772: Backed out previous change which was fundamentally flawed
   - Resolved underlying problem which was that the select_ChildAssocsOfParent_Limited SQL string needs to be unique in order to not cause confusion in the prepared statement cache
git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@30797 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
		
	
		
			
				
	
	
		
			996 lines
		
	
	
		
			37 KiB
		
	
	
	
		
			Java
		
	
	
	
	
	
			
		
		
	
	
			996 lines
		
	
	
		
			37 KiB
		
	
	
	
		
			Java
		
	
	
	
	
	
| /*
 | |
|  * Copyright (C) 2005-2011 Alfresco Software Limited.
 | |
|  *
 | |
|  * This file is part of Alfresco
 | |
|  *
 | |
|  * Alfresco is free software: you can redistribute it and/or modify
 | |
|  * it under the terms of the GNU Lesser General Public License as published by
 | |
|  * the Free Software Foundation, either version 3 of the License, or
 | |
|  * (at your option) any later version.
 | |
|  *
 | |
|  * Alfresco is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|  * GNU Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public License
 | |
|  * along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
 | |
|  */
 | |
| package org.alfresco.repo.jscript;
 | |
| 
 | |
| import java.util.ArrayList;
 | |
| import java.util.HashMap;
 | |
| import java.util.List;
 | |
| import java.util.Map;
 | |
| import java.util.Set;
 | |
| import java.util.StringTokenizer;
 | |
| 
 | |
| import org.alfresco.model.ContentModel;
 | |
| import org.alfresco.query.PagingRequest;
 | |
| import org.alfresco.repo.security.authentication.AuthenticationException;
 | |
| import org.alfresco.repo.security.authentication.AuthenticationUtil;
 | |
| import org.alfresco.repo.security.authentication.UserNameGenerator;
 | |
| import org.alfresco.repo.security.authority.AuthorityDAO;
 | |
| import org.alfresco.repo.security.person.PersonServiceImpl;
 | |
| import org.alfresco.repo.security.sync.UserRegistrySynchronizer;
 | |
| import org.alfresco.repo.tenant.TenantDomainMismatchException;
 | |
| import org.alfresco.repo.tenant.TenantService;
 | |
| import org.alfresco.service.ServiceRegistry;
 | |
| import org.alfresco.service.cmr.repository.NodeRef;
 | |
| import org.alfresco.service.cmr.repository.StoreRef;
 | |
| import org.alfresco.service.cmr.search.LimitBy;
 | |
| import org.alfresco.service.cmr.search.ResultSet;
 | |
| import org.alfresco.service.cmr.search.SearchParameters;
 | |
| import org.alfresco.service.cmr.search.SearchService;
 | |
| import org.alfresco.service.cmr.security.AuthorityService;
 | |
| import org.alfresco.service.cmr.security.AuthorityType;
 | |
| import org.alfresco.service.cmr.security.MutableAuthenticationService;
 | |
| import org.alfresco.service.cmr.security.PersonService;
 | |
| import org.alfresco.service.cmr.security.PersonService.PersonInfo;
 | |
| import org.alfresco.service.cmr.usage.ContentUsageService;
 | |
| import org.alfresco.service.namespace.NamespaceService;
 | |
| import org.alfresco.service.namespace.QName;
 | |
| import org.alfresco.util.Pair;
 | |
| import org.alfresco.util.PropertyMap;
 | |
| import org.alfresco.util.ValueDerivingMapFactory;
 | |
| import org.alfresco.util.ValueDerivingMapFactory.ValueDeriver;
 | |
| import org.apache.commons.logging.Log;
 | |
| import org.apache.commons.logging.LogFactory;
 | |
| import org.mozilla.javascript.Context;
 | |
| import org.mozilla.javascript.Scriptable;
 | |
| import org.springframework.beans.factory.InitializingBean;
 | |
| import org.springframework.extensions.surf.util.ParameterCheck;
 | |
| 
 | |
| /**
 | |
|  * Scripted People service for describing and executing actions against People & Groups.
 | |
|  * 
 | |
|  * @author davidc
 | |
|  * @author kevinr
 | |
|  */
 | |
| public final class People extends BaseScopableProcessorExtension implements InitializingBean
 | |
| {
 | |
|     private static Log logger = LogFactory.getLog(People.class);
 | |
|     
 | |
|     /** Repository Service Registry */
 | |
|     private ServiceRegistry services;
 | |
|     private AuthorityDAO authorityDAO;
 | |
|     private AuthorityService authorityService;
 | |
|     private PersonService personService;
 | |
|     private NamespaceService namespaceService;
 | |
|     private MutableAuthenticationService authenticationService;
 | |
|     private ContentUsageService contentUsageService;
 | |
|     private TenantService tenantService;
 | |
|     private UserNameGenerator usernameGenerator;
 | |
|     private UserRegistrySynchronizer userRegistrySynchronizer;
 | |
|     private StoreRef storeRef;
 | |
|     private ValueDerivingMapFactory<ScriptNode, String, Boolean> valueDerivingMapFactory;
 | |
|     private int numRetries = 10;
 | |
| 
 | |
|     
 | |
|     public void afterPropertiesSet() throws Exception
 | |
|     {
 | |
|         Map <String, ValueDeriver<ScriptNode, Boolean>> capabilityTesters = new HashMap<String, ValueDeriver<ScriptNode, Boolean>>(5);
 | |
|         capabilityTesters.put("isAdmin", new ValueDeriver<ScriptNode, Boolean>()
 | |
|         {
 | |
|             public Boolean deriveValue(ScriptNode source)
 | |
|             {
 | |
|                 return isAdmin(source);
 | |
|             }
 | |
|         });
 | |
|         capabilityTesters.put("isGuest", new ValueDeriver<ScriptNode, Boolean>()
 | |
|         {
 | |
|             public Boolean deriveValue(ScriptNode source)
 | |
|             {
 | |
|                 return isGuest(source);
 | |
|             }
 | |
|         });
 | |
|         capabilityTesters.put("isMutable", new ValueDeriver<ScriptNode, Boolean>()
 | |
|         {
 | |
|             public Boolean deriveValue(ScriptNode source)
 | |
|             {
 | |
|                 // Check whether the account is mutable according to the authentication service
 | |
|                 String sourceUser = (String) source.getProperties().get(ContentModel.PROP_USERNAME);
 | |
|                 if (!authenticationService.isAuthenticationMutable(sourceUser))
 | |
|                 {
 | |
|                     return false;
 | |
|                 }
 | |
|                 // Only allow non-admin users to mutate their own accounts
 | |
|                 String currentUser = authenticationService.getCurrentUserName();
 | |
|                 if (currentUser.equals(sourceUser) || authorityService.isAdminAuthority(currentUser))
 | |
|                 {
 | |
|                     return true;
 | |
|                 }
 | |
|                 return false;
 | |
|             }
 | |
|         });
 | |
|         this.valueDerivingMapFactory = new ValueDerivingMapFactory<ScriptNode, String, Boolean>(capabilityTesters);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the default store reference
 | |
|      * 
 | |
|      * @param   storeRef the default store reference
 | |
|      */
 | |
|     public void setStoreUrl(String storeRef)
 | |
|     {
 | |
|         // ensure this is not set again by a script instance
 | |
|         if (this.storeRef != null)
 | |
|         {
 | |
|             throw new IllegalStateException("Default store URL can only be set once.");
 | |
|         }
 | |
|         this.storeRef = new StoreRef(storeRef);
 | |
|     }    
 | |
| 
 | |
|     /**
 | |
|      * Sets the authentication service.
 | |
|      * 
 | |
|      * @param authenticationService
 | |
|      *            the authentication service
 | |
|      */
 | |
|     public void setAuthenticationService(MutableAuthenticationService authenticationService)
 | |
|     {
 | |
|         this.authenticationService = authenticationService;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Set the service registry
 | |
|      * 
 | |
|      * @param serviceRegistry	the service registry
 | |
|      */
 | |
|     public void setServiceRegistry(ServiceRegistry serviceRegistry)
 | |
|     {
 | |
|     	this.services = serviceRegistry;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Set the authority DAO
 | |
|      *
 | |
|      * @param authorityDAO  authority dao
 | |
|      */
 | |
|     public void setAuthorityDAO(AuthorityDAO authorityDAO)
 | |
|     {
 | |
|         this.authorityDAO = authorityDAO;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the authority service
 | |
|      * 
 | |
|      * @param authorityService The authorityService to set.
 | |
|      */
 | |
|     public void setAuthorityService(AuthorityService authorityService)
 | |
|     {
 | |
|         this.authorityService = authorityService;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the person service
 | |
|      * 
 | |
|      * @param personService The personService to set.
 | |
|      */
 | |
|     public void setPersonService(PersonService personService)
 | |
|     {
 | |
|         this.personService = personService;
 | |
|     }
 | |
|     
 | |
|     public void setNamespaceService(NamespaceService namespaceService)
 | |
|     {
 | |
|         this.namespaceService = namespaceService;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * @param contentUsageService   the ContentUsageService to set
 | |
|      */
 | |
|     public void setContentUsageService(ContentUsageService contentUsageService)
 | |
|     {
 | |
|         this.contentUsageService = contentUsageService;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * @param tenantService   the tenantService to set
 | |
|      */
 | |
|     public void setTenantService(TenantService tenantService)
 | |
|     {
 | |
|         this.tenantService = tenantService;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the user name generator service
 | |
|      * 
 | |
|      * @param userNameGenerator the user name generator 
 | |
|      */
 | |
|     public void setUserNameGenerator(UserNameGenerator userNameGenerator)
 | |
|     {
 | |
|         this.usernameGenerator = userNameGenerator;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the UserRegistrySynchronizer
 | |
|      * 
 | |
|      * @param userRegistrySynchronizer
 | |
|      */
 | |
|     public void setUserRegistrySynchronizer(UserRegistrySynchronizer userRegistrySynchronizer)
 | |
|     {
 | |
|         this.userRegistrySynchronizer = userRegistrySynchronizer;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Delete a Person with the given username
 | |
|      * 
 | |
|      * @param username the username of the person to delete
 | |
|      */
 | |
|     public void deletePerson(String username)
 | |
|     {
 | |
|         personService.deletePerson(username);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Create a Person with an optionally generated user name. 
 | |
|      * This version doesn't notify them.
 | |
|      * 
 | |
|      * @param userName userName or null for a generated user name
 | |
|      * @param firstName firstName
 | |
|      * @param lastName lastName
 | |
|      * @param emailAddress emailAddress
 | |
|      * @param password if not null creates a new authenticator with the given password.
 | |
|      * @param setAccountEnabled
 | |
|      *            set to 'true' to create enabled user account, or 'false' to
 | |
|      *            create disabled user account for created person.
 | |
|      * @return the person node (type cm:person) created or null if the person
 | |
|      *         could not be created
 | |
|      */
 | |
|     public ScriptNode createPerson(String userName, String firstName, String lastName, String emailAddress, String password, boolean setAccountEnabled)
 | |
|     {
 | |
|         return createPerson(userName, firstName, lastName, emailAddress, password, setAccountEnabled, false);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Create a Person with an optionally generated user name
 | |
|      * 
 | |
|      * @param userName userName or null for a generated user name
 | |
|      * @param firstName firstName
 | |
|      * @param lastName lastName
 | |
|      * @param emailAddress emailAddress
 | |
|      * @param password if not null creates a new authenticator with the given password.
 | |
|      * @param setAccountEnabled
 | |
|      *            set to 'true' to create enabled user account, or 'false' to
 | |
|      *            create disabled user account for created person.
 | |
|      * @param notifyByEmail
 | |
|      *            set to 'true' to have the new user emailed to let them know
 | |
|      *            their account details. Only applies if a username and 
 | |
|      *            password were supplied.
 | |
|      * @return the person node (type cm:person) created or null if the person
 | |
|      *         could not be created
 | |
|      */
 | |
|     public ScriptNode createPerson(String userName, String firstName, String lastName, String emailAddress, 
 | |
|             String password, boolean setAccountEnabled, boolean notifyByEmail)
 | |
|     {
 | |
|     	ParameterCheck.mandatory("firstName", firstName);
 | |
|     	ParameterCheck.mandatory("emailAddress", emailAddress);
 | |
|         
 | |
|         ScriptNode person = null;
 | |
|         
 | |
|         // generate user name if not supplied
 | |
|         if (userName == null)
 | |
|         {
 | |
|             for (int i=0; i < numRetries; i++)
 | |
|             {
 | |
|             	userName = usernameGenerator.generateUserName(firstName, lastName, emailAddress, i);
 | |
|             	
 | |
|             	// create person if user name does not already exist
 | |
|             	if (!personService.personExists(userName))
 | |
|             	{
 | |
|             	    break;
 | |
|             	}
 | |
|             }
 | |
|         }
 | |
|         
 | |
|         if (userName != null)
 | |
|         {
 | |
|             try
 | |
|             {
 | |
|                 userName = PersonServiceImpl.updateUsernameForTenancy(userName, tenantService);
 | |
|             }
 | |
|             catch (TenantDomainMismatchException re)
 | |
|             {
 | |
|                 throw new AuthenticationException("User must belong to same domain as admin: " + re.getTenantA());
 | |
|             }
 | |
|             
 | |
|             person = createPerson(userName, firstName, lastName, emailAddress);
 | |
|             
 | |
|     		if (person != null && password != null)
 | |
|     		{   			
 | |
|     			// create account for person with the userName and password
 | |
|     		    authenticationService.createAuthentication(userName, password.toCharArray());
 | |
|     		    authenticationService.setAuthenticationEnabled(userName, setAccountEnabled);
 | |
|     			
 | |
|     			person.save();
 | |
|     			
 | |
|     			if(notifyByEmail)
 | |
|     			{
 | |
|     			    personService.notifyPerson(userName, password);
 | |
|     			}
 | |
|     		}
 | |
|         }
 | |
|         
 | |
|         return person;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Enable user account. Can only be called by an Admin authority.
 | |
|      * 
 | |
|      * @param userName      user name for which to enable user account
 | |
|      */
 | |
|     public void enableAccount(String userName)
 | |
|     {
 | |
|         if (this.authorityService.isAdminAuthority(AuthenticationUtil.getFullyAuthenticatedUser()))
 | |
|         {
 | |
|             this.authenticationService.setAuthenticationEnabled(userName, true);
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Disable user account. Can only be called by an Admin authority.
 | |
|      * 
 | |
|      * @param userName      user name for which to disable user account
 | |
|      */
 | |
|     public void disableAccount(String userName)
 | |
|     {
 | |
|         if (this.authorityService.isAdminAuthority(AuthenticationUtil.getFullyAuthenticatedUser()))
 | |
|         {
 | |
|             this.authenticationService.setAuthenticationEnabled(userName, false);
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Return true if the specified user account is enabled.
 | |
|      *  
 | |
|      * @param userName      user name to test account
 | |
|      * 
 | |
|      * @return true if account enabled, false if disabled
 | |
|      */
 | |
|     public boolean isAccountEnabled(String userName)
 | |
|     {
 | |
|         return this.authenticationService.getAuthenticationEnabled(userName);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Change the password for the currently logged in user.
 | |
|      * Old password must be supplied.
 | |
|      *  
 | |
|      * @param oldPassword       Old user password
 | |
|      * @param newPassword       New user password
 | |
|      */
 | |
|     public void changePassword(String oldPassword, String newPassword)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("oldPassword", oldPassword);
 | |
|         ParameterCheck.mandatoryString("newPassword", newPassword);
 | |
|         
 | |
|         this.services.getAuthenticationService().updateAuthentication(
 | |
|                 AuthenticationUtil.getFullyAuthenticatedUser(), oldPassword.toCharArray(), newPassword.toCharArray());
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set a password for the given user. Note that only an administrator
 | |
|      * can perform this action, otherwise it will be ignored.
 | |
|      * 
 | |
|      * @param userName          Username to change password for
 | |
|      * @param password          Password to set
 | |
|      */
 | |
|     public void setPassword(String userName, String password)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("userName", userName);
 | |
|         ParameterCheck.mandatoryString("password", password);
 | |
|         
 | |
|         MutableAuthenticationService authService = this.services.getAuthenticationService();
 | |
|         if (this.authorityService.hasAdminAuthority() && (userName.equalsIgnoreCase(authService.getCurrentUserName()) == false))
 | |
|         {
 | |
|             authService.setAuthentication(userName, password.toCharArray());
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Create a Person with the given user name
 | |
|      * 
 | |
|      * @param userName the user name of the person to create
 | |
|      * @return the person node (type cm:person) created or null if the user name already exists
 | |
|      */
 | |
|     public ScriptNode createPerson(String userName)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("userName", userName);
 | |
|         
 | |
|         ScriptNode person = null;
 | |
|         
 | |
|         PropertyMap properties = new PropertyMap();
 | |
|         properties.put(ContentModel.PROP_USERNAME, userName);
 | |
|         
 | |
|         if (!personService.personExists(userName))
 | |
|         {
 | |
|             NodeRef personRef = personService.createPerson(properties); 
 | |
|             person = new ScriptNode(personRef, services, getScope()); 
 | |
|         }
 | |
|         
 | |
|         return person;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Create a Person with the given user name, firstName, lastName and emailAddress
 | |
|      * 
 | |
|      * @param userName the user name of the person to create
 | |
|      * @return the person node (type cm:person) created or null if the user name already exists
 | |
|      */
 | |
|     public ScriptNode createPerson(String userName, String firstName, String lastName, String emailAddress)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("userName", userName);
 | |
|         ParameterCheck.mandatoryString("firstName", firstName);
 | |
|         ParameterCheck.mandatoryString("emailAddress", emailAddress);
 | |
|         
 | |
|         ScriptNode person = null;
 | |
|         
 | |
|         PropertyMap properties = new PropertyMap();
 | |
|         properties.put(ContentModel.PROP_USERNAME, userName);
 | |
|         properties.put(ContentModel.PROP_FIRSTNAME, firstName);
 | |
|         properties.put(ContentModel.PROP_LASTNAME, lastName);
 | |
|         properties.put(ContentModel.PROP_EMAIL, emailAddress);
 | |
|         
 | |
|         if (!personService.personExists(userName))
 | |
|         {
 | |
|             NodeRef personRef = personService.createPerson(properties);
 | |
|             person = new ScriptNode(personRef, services, getScope()); 
 | |
|         }
 | |
|         
 | |
|         return person;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Set the content quota in bytes for a person.
 | |
|      * Only the admin authority can set this value.
 | |
|      * 
 | |
|      * @param person    Person to set quota against.
 | |
|      * @param quota     As a string, in bytes, a value of "-1" means no quota is set
 | |
|      */
 | |
|     public void setQuota(ScriptNode person, String quota)
 | |
|     {
 | |
|         if (this.authorityService.isAdminAuthority(AuthenticationUtil.getFullyAuthenticatedUser()))
 | |
|         {
 | |
|             this.contentUsageService.setUserQuota((String)person.getProperties().get(ContentModel.PROP_USERNAME), Long.parseLong(quota));
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Get the collection of people stored in the repository.
 | |
|      * An optional filter query may be provided by which to filter the people collection.
 | |
|      * Space separate the query terms i.e. "john bob" will find all users who's first or
 | |
|      * second names contain the strings "john" or "bob".
 | |
|      * 
 | |
|      * @param filter filter query string by which to filter the collection of people.
 | |
|      *          If <pre>null</pre> then all people stored in the repository are returned
 | |
|      *          
 | |
|      * @deprecate see getPeople(filter, maxResults)
 | |
|      *          
 | |
|      * @return people collection as a JavaScript array
 | |
|      */
 | |
|     public Scriptable getPeople(String filter)
 | |
|     {
 | |
|         return getPeople(filter, 0);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Get the collection of people stored in the repository.
 | |
|      * An optional filter query may be provided by which to filter the people collection.
 | |
|      * Space separate the query terms i.e. "john bob" will find all users who's first or
 | |
|      * second names contain the strings "john" or "bob".
 | |
|      * 
 | |
|      * @param filter filter query string by which to filter the collection of people.
 | |
|      *          If <pre>null</pre> then all people stored in the repository are returned
 | |
|      * @param maxResults maximum results to return or all if <= 0
 | |
|      * 
 | |
|      * @return people collection as a JavaScript array
 | |
|      */
 | |
|     public Scriptable getPeople(String filter, int maxResults)
 | |
|     {
 | |
|         Object[] people = null;
 | |
|         
 | |
|         // TODO - remove open-ended query (eg cutoff at default/configurable max, eg. 5000 people)
 | |
|         if (maxResults <= 0)
 | |
|         {
 | |
|             maxResults = Integer.MAX_VALUE;
 | |
|         }
 | |
|         
 | |
|         if (filter == null || filter.length() == 0)
 | |
|         {
 | |
|             PagingRequest pagingRequest = new PagingRequest(maxResults, null);
 | |
|             List<PersonInfo> persons = personService.getPeople(null, true, null, pagingRequest).getPage();
 | |
|             people = new Object[persons.size()];
 | |
|             for (int i=0; i<people.length; i++)
 | |
|             {
 | |
|                 people[i] = persons.get(i).getNodeRef();
 | |
|             }
 | |
|         }
 | |
|         else
 | |
|         {
 | |
|             filter = filter.trim();
 | |
|             if (filter.length() != 0)
 | |
|             {
 | |
|                 String term = filter.replace("\\", "").replace("\"", "");
 | |
|                 StringTokenizer t = new StringTokenizer(term, " ");
 | |
|                 int propIndex = term.indexOf(':');
 | |
|                 
 | |
|                 if ((t.countTokens() == 1) && (propIndex == -1))
 | |
|                 {
 | |
|                     // simple non-FTS filter: firstname or lastname or username starting with term (ignoring case)
 | |
|                     
 | |
|                     String propVal = term;
 | |
|                     
 | |
|                     List<Pair<QName, String>> filterProps = new ArrayList<Pair<QName, String>>(3);
 | |
|                     filterProps.add(new Pair<QName, String>(ContentModel.PROP_FIRSTNAME, propVal));
 | |
|                     filterProps.add(new Pair<QName, String>(ContentModel.PROP_LASTNAME, propVal));
 | |
|                     filterProps.add(new Pair<QName, String>(ContentModel.PROP_USERNAME, propVal));
 | |
|                     
 | |
|                     PagingRequest pagingRequest = new PagingRequest(maxResults, null);
 | |
|                     List<PersonInfo> persons = personService.getPeople(filterProps, true, null, pagingRequest).getPage();
 | |
|                     people = new Object[persons.size()];
 | |
|                     for (int i=0; i<people.length; i++)
 | |
|                     {
 | |
|                         people[i] = persons.get(i).getNodeRef();
 | |
|                     }
 | |
|                  }
 | |
|                  else
 | |
|                  {
 | |
|                      SearchParameters params = new SearchParameters();
 | |
|                      
 | |
|                      StringBuilder query = new StringBuilder(256);
 | |
|                      
 | |
|                      query.append("TYPE:\"").append(ContentModel.TYPE_PERSON).append("\" AND (");
 | |
|                      
 | |
|                      if (t.countTokens() == 1)
 | |
|                      {
 | |
|                         // fts-alfresco property search i.e. location:"maidenhead"
 | |
|                         query.append(term.substring(0, propIndex+1))
 | |
|                              .append('"')
 | |
|                              .append(term.substring(propIndex+1))
 | |
|                              .append('"');
 | |
|                     }
 | |
|                     else
 | |
|                     {
 | |
|                         // scan for non-fts-alfresco property search tokens
 | |
|                         int nonFtsTokens = 0;
 | |
|                         while (t.hasMoreTokens())
 | |
|                         {
 | |
|                             if (t.nextToken().indexOf(':') == -1) nonFtsTokens++;
 | |
|                         }
 | |
|                         t = new StringTokenizer(term, " ");
 | |
|                         
 | |
|                         // multiple terms supplied - look for first and second name etc.
 | |
|                         // assume first term is first name, any more are second i.e. "Fraun van de Wiels"
 | |
|                         // also allow fts-alfresco property search to reduce results
 | |
|                         params.setDefaultOperator(SearchParameters.Operator.AND);
 | |
|                         boolean firstToken = true;
 | |
|                         boolean tokenSurname = false;
 | |
|                         boolean propertySearch = false;
 | |
|                         while (t.hasMoreTokens())
 | |
|                         {
 | |
|                             term = t.nextToken();
 | |
|                             if (!propertySearch && term.indexOf(':') == -1)
 | |
|                             {
 | |
|                                 if (nonFtsTokens == 1)
 | |
|                                 {
 | |
|                                     // simple search: first name, last name and username starting with term
 | |
|                                     query.append("(firstName:\"");
 | |
|                                     query.append(term);
 | |
|                                     query.append("*\" OR lastName:\"");
 | |
|                                     query.append(term);
 | |
|                                     query.append("*\" OR userName:\"");
 | |
|                                     query.append(term);
 | |
|                                     query.append("*\") ");
 | |
|                                 }
 | |
|                                 else
 | |
|                                 {
 | |
|                                     if (firstToken)
 | |
|                                     {
 | |
|                                         query.append("firstName:\"");
 | |
|                                         query.append(term);
 | |
|                                         query.append("*\" ");
 | |
|                                         
 | |
|                                         firstToken = false;
 | |
|                                     }
 | |
|                                     else
 | |
|                                     {
 | |
|                                         if (tokenSurname)
 | |
|                                         {
 | |
|                                             query.append("OR ");
 | |
|                                         }
 | |
|                                         query.append("lastName:\"");
 | |
|                                         query.append(term);
 | |
|                                         query.append("*\" ");
 | |
|                                         
 | |
|                                         tokenSurname = true;
 | |
|                                     }
 | |
|                                 }
 | |
|                             }
 | |
|                             else
 | |
|                             {
 | |
|                                 // fts-alfresco property search i.e. "location:maidenhead"
 | |
|                                 propIndex = term.indexOf(':');
 | |
|                                 query.append(term.substring(0, propIndex+1))
 | |
|                                      .append('"')
 | |
|                                      .append(term.substring(propIndex+1))
 | |
|                                      .append('"');
 | |
|                                 
 | |
|                                 propertySearch = true;
 | |
|                             }
 | |
|                         }
 | |
|                     }
 | |
|                     query.append(")");
 | |
|                     
 | |
|                     // define the search parameters
 | |
|                     params.setLanguage(SearchService.LANGUAGE_FTS_ALFRESCO);
 | |
|                     params.addStore(this.storeRef);
 | |
|                     params.setQuery(query.toString());
 | |
|                     if (maxResults > 0)
 | |
|                     {
 | |
|                         params.setLimitBy(LimitBy.FINAL_SIZE);
 | |
|                         params.setLimit(maxResults);
 | |
|                     }
 | |
|                     
 | |
|                     ResultSet results = null;
 | |
|                     try
 | |
|                     {
 | |
|                         results = services.getSearchService().query(params);
 | |
|                         people = results.getNodeRefs().toArray();
 | |
|                     }
 | |
|                     catch (Throwable err)
 | |
|                     {
 | |
|                         // hide query parse error from users
 | |
|                         if (logger.isDebugEnabled())
 | |
|                             logger.debug("Failed to execute people search: " + query.toString(), err);
 | |
|                     }
 | |
|                     finally
 | |
|                     {
 | |
|                         if (results != null)
 | |
|                         {
 | |
|                             results.close();
 | |
|                         }
 | |
|                     }
 | |
|                  }
 | |
|             }
 | |
|         }
 | |
|         
 | |
|         if (people == null)
 | |
|         {
 | |
|             people = new Object[0];
 | |
|         }
 | |
|         
 | |
|         return Context.getCurrentContext().newArray(getScope(), people);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Gets the Person given the username
 | |
|      * 
 | |
|      * @param username  the username of the person to get
 | |
|      * @return the person node (type cm:person) or null if no such person exists 
 | |
|      */
 | |
|     public ScriptNode getPerson(String username)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("Username", username);
 | |
|         ScriptNode person = null;
 | |
|         if (personService.personExists(username))
 | |
|         {
 | |
|             NodeRef personRef = personService.getPerson(username);
 | |
|             person = new ScriptNode(personRef, services, getScope());
 | |
|         }
 | |
|         return person;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Gets the Group given the group name
 | |
|      * 
 | |
|      * @param groupName  name of group to get
 | |
|      * @return  the group node (type usr:authorityContainer) or null if no such group exists
 | |
|      */
 | |
|     public ScriptNode getGroup(String groupName)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("GroupName", groupName);
 | |
|         ScriptNode group = null;
 | |
|         NodeRef groupRef = authorityDAO.getAuthorityNodeRefOrNull(groupName);
 | |
|         if (groupRef != null)
 | |
|         {
 | |
|             group = new ScriptNode(groupRef, services, getScope());
 | |
|         }
 | |
|         return group;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Deletes a group from the system.
 | |
|      * 
 | |
|      * @param group     The group to delete
 | |
|      */
 | |
|     public void deleteGroup(ScriptNode group)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Group", group);
 | |
|         if (group.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|         {
 | |
|             String groupName = (String)group.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             authorityService.deleteAuthority(groupName);
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Create a new root level group with the specified unique name
 | |
|      * 
 | |
|      * @param groupName     The unique group name to create - NOTE: do not prefix with "GROUP_"
 | |
|      * 
 | |
|      * @return the group reference if successful or null if failed
 | |
|      */
 | |
|     public ScriptNode createGroup(String groupName)
 | |
|     {
 | |
|         return createGroup(null, groupName);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Create a new group with the specified unique name
 | |
|      * 
 | |
|      * @param parentGroup   The parent group node - can be null for a root level group
 | |
|      * @param groupName     The unique group name to create - NOTE: do not prefix with "GROUP_"
 | |
|      * 
 | |
|      * @return the group reference if successful or null if failed
 | |
|      */
 | |
|     public ScriptNode createGroup(ScriptNode parentGroup, String groupName)
 | |
|     {
 | |
|         ParameterCheck.mandatoryString("GroupName", groupName);
 | |
|         
 | |
|         ScriptNode group = null;
 | |
|         
 | |
|         String actualName = services.getAuthorityService().getName(AuthorityType.GROUP, groupName);
 | |
|         if (authorityService.authorityExists(actualName) == false)
 | |
|         {
 | |
|             String result = authorityService.createAuthority(AuthorityType.GROUP, groupName);
 | |
|             if (parentGroup != null)
 | |
|             {
 | |
|                 String parentGroupName = (String)parentGroup.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|                 if (parentGroupName != null)
 | |
|                 {
 | |
|                     authorityService.addAuthority(parentGroupName, actualName);
 | |
|                 }
 | |
|             }
 | |
|             group = getGroup(result);
 | |
|         }
 | |
|         
 | |
|         return group;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Add an authority (a user or group) to a group container as a new child
 | |
|      * 
 | |
|      * @param parentGroup   The parent container group
 | |
|      * @param authority     The authority (user or group) to add
 | |
|      */
 | |
|     public void addAuthority(ScriptNode parentGroup, ScriptNode authority)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Authority", authority);
 | |
|         ParameterCheck.mandatory("ParentGroup", parentGroup);
 | |
|         if (parentGroup.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|         {
 | |
|             String parentGroupName = (String)parentGroup.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             String authorityName;
 | |
|             if (authority.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|             {
 | |
|                 authorityName = (String)authority.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 authorityName = (String)authority.getProperties().get(ContentModel.PROP_USERNAME);
 | |
|             }
 | |
|             authorityService.addAuthority(parentGroupName, authorityName);
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Remove an authority (a user or group) from a group
 | |
|      * 
 | |
|      * @param parentGroup   The parent container group
 | |
|      * @param authority     The authority (user or group) to remove
 | |
|      */
 | |
|     public void removeAuthority(ScriptNode parentGroup, ScriptNode authority)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Authority", authority);
 | |
|         ParameterCheck.mandatory("ParentGroup", parentGroup);
 | |
|         if (parentGroup.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|         {
 | |
|             String parentGroupName = (String)parentGroup.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             String authorityName;
 | |
|             if (authority.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|             {
 | |
|                 authorityName = (String)authority.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             }
 | |
|             else
 | |
|             {
 | |
|                 authorityName = (String)authority.getProperties().get(ContentModel.PROP_USERNAME);
 | |
|             }
 | |
|             authorityService.removeAuthority(parentGroupName, authorityName);
 | |
|         }
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Gets the members (people) of a group (including all sub-groups)
 | |
|      * 
 | |
|      * @param group        the group to retrieve members for
 | |
|      * @param recurse      recurse into sub-groups
 | |
|      * 
 | |
|      * @return members of the group as a JavaScript array
 | |
|      */
 | |
|     public Scriptable getMembers(ScriptNode group)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Group", group);
 | |
|         Object[] members = getContainedAuthorities(group, AuthorityType.USER, true);
 | |
|         return Context.getCurrentContext().newArray(getScope(), members);
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Gets the members (people) of a group
 | |
|      * 
 | |
|      * @param group        the group to retrieve members for
 | |
|      * @param recurse      recurse into sub-groups
 | |
|      * 
 | |
|      * @return the members of the group as a JavaScript array
 | |
|      */
 | |
|     public Scriptable getMembers(ScriptNode group, boolean recurse)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Group", group);
 | |
|         Object[] members = getContainedAuthorities(group, AuthorityType.USER, recurse);
 | |
|         return Context.getCurrentContext().newArray(getScope(), members);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Gets the groups that contain the specified authority
 | |
|      * 
 | |
|      * @param person       the user (cm:person) to get the containing groups for
 | |
|      * 
 | |
|      * @return the containing groups as a JavaScript array
 | |
|      */
 | |
|     public Scriptable getContainerGroups(ScriptNode person)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Person", person);
 | |
|         Object[] parents = null;
 | |
|         Set<String> authorities = this.authorityService.getContainingAuthoritiesInZone(
 | |
|                 AuthorityType.GROUP,
 | |
|                 (String)person.getProperties().get(ContentModel.PROP_USERNAME),
 | |
|                 AuthorityService.ZONE_APP_DEFAULT, null, 1000);
 | |
|         parents = new Object[authorities.size()];
 | |
|         int i = 0;
 | |
|         for (String authority : authorities)
 | |
|         {
 | |
|             ScriptNode group = getGroup(authority);
 | |
|             if (group != null)
 | |
|             {
 | |
|                 parents[i++] = group; 
 | |
|             }
 | |
|         }
 | |
|         return Context.getCurrentContext().newArray(getScope(), parents);
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Return true if the specified user is an Administrator authority.
 | |
|      * 
 | |
|      * @param person to test
 | |
|      * 
 | |
|      * @return true if an admin, false otherwise
 | |
|      */
 | |
|     public boolean isAdmin(ScriptNode person)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Person", person);
 | |
|         return this.authorityService.isAdminAuthority((String)person.getProperties().get(ContentModel.PROP_USERNAME));
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Return true if the specified user is an guest authority.
 | |
|      * 
 | |
|      * @param person to test
 | |
|      * 
 | |
|      * @return true if an admin, false otherwise
 | |
|      */
 | |
|     public boolean isGuest(ScriptNode person)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Person", person);
 | |
|         return this.authorityService.isGuestAuthority((String) person.getProperties().get(ContentModel.PROP_USERNAME));
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Gets a map of capabilities (boolean assertions) for the given person.
 | |
|      * 
 | |
|      * @param person
 | |
|      *            the person
 | |
|      * @return the capability map
 | |
|      */
 | |
|     public Map<String, Boolean> getCapabilities(final ScriptNode person)
 | |
|     {
 | |
|         ParameterCheck.mandatory("Person", person);
 | |
|         Map<String,Boolean> retVal = new ScriptableHashMap<String, Boolean>();
 | |
|         retVal.putAll(this.valueDerivingMapFactory.getMap(person));
 | |
|         return retVal;
 | |
|     }
 | |
|     
 | |
|     /**
 | |
|      * Return a map of the Person properties that are marked as immutable for the given user.
 | |
|      * This enables a script to interogate which properties are dealt with by an external
 | |
|      * system such as LDAP and should not be mutable in any client UI.
 | |
|      * 
 | |
|      * @param username
 | |
|      * 
 | |
|      * @return ScriptableHashMap
 | |
|      */
 | |
|     public ScriptableHashMap getImmutableProperties(String username)
 | |
|     {
 | |
|         Set<QName> props = userRegistrySynchronizer.getPersonMappedProperties(username);
 | |
|         ScriptableHashMap propMap = new ScriptableHashMap();
 | |
|         for (QName prop : props)
 | |
|         {
 | |
|             propMap.put(prop.toString(), Boolean.TRUE);
 | |
|         }
 | |
|         return propMap;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Get Contained Authorities
 | |
|      * 
 | |
|      * @param container  authority containers
 | |
|      * @param type       authority type to filter by
 | |
|      * @param recurse    recurse into sub-containers
 | |
|      * 
 | |
|      * @return contained authorities
 | |
|      */
 | |
|     private Object[] getContainedAuthorities(ScriptNode container, AuthorityType type, boolean recurse)
 | |
|     {
 | |
|         Object[] members = null;
 | |
|         
 | |
|         if (container.getQNameType().equals(ContentModel.TYPE_AUTHORITY_CONTAINER))
 | |
|         {
 | |
|             String groupName = (String)container.getProperties().get(ContentModel.PROP_AUTHORITY_NAME);
 | |
|             Set<String> authorities = authorityService.getContainedAuthorities(type, groupName, !recurse);
 | |
|             members = new Object[authorities.size()];
 | |
|             int i = 0;
 | |
|             for (String authority : authorities)
 | |
|             {
 | |
|                 AuthorityType authorityType = AuthorityType.getAuthorityType(authority);
 | |
|                 if (authorityType.equals(AuthorityType.GROUP))
 | |
|                 {
 | |
|                     ScriptNode group = getGroup(authority);
 | |
|                     if (group != null)
 | |
|                     {
 | |
|                         members[i++] = group; 
 | |
|                     }
 | |
|                 }
 | |
|                 else if (authorityType.equals(AuthorityType.USER))
 | |
|                 {
 | |
|                     ScriptNode person = getPerson(authority);
 | |
|                     if (person != null)
 | |
|                     {
 | |
|                         members[i++] = person; 
 | |
|                     }
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         
 | |
|         return members != null ? members : new Object[0];
 | |
|     }
 | |
| }
 |