mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
20678: DAO5 branch: Preparation for merge back to HEAD 20689: Merged DAO4 to DAO5 - Removed all 'dbscripts/create/3.x/SomeDialect' and replaced with 'dbscripts/create/SomeDialect' DB create scripts are taken from latest DAO4 - TODO: FixAuthoritiesCrcValuesPatch needs query implementation in PatchDAO Merged DAO3 to DAO4 - Reapplied fixes for ALF-713 (race condition on Usages) 19350: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-2 to BRANCHES/DEV/V3.3-DAO-REFACTOR-3: 18939: SAIL-4 :2nd stage branch for DAO refactor off HEAD rev 18898 18948: Merged V3.3-DAO-REFACTOR to V3.3-DAO-REFACTOR-2 18202: Dev branch for DAO refactor 18252: SAIL-233: QName.hbm.xml 18295: Added missing CREATE TABLE statements for QName-related code 18324: SAIL-234: Node.hbm.xml: Node aspects initial integration 18355: Added 'setValue' method to manually update the cached value 18356: MV property stressing lowered to speed test up 18357: SAIL-234: Node.hbm.xml 18376: Pulled all Alfresco-related create SQL into script 18389: SAIL-234: Permissions DAO refactor - initial checkpoint 18390: Formatting only (line-endings) 18400: SAIL-234: Node.hbm.xml 18418: SAIL-234: Node.hbm.xml: 'alf_node_assoc' CRUD 18429: SAIL-234: Node.hbm.xml: Cleaned out all Hibernate references to NodeAssocImpl 18457: SAIL-234: Permissions DAO refactor 18959: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18479: SAIL-234: Node.hbm.xml - fix updateNode (missing id when saving oldDummyNode) 18482: SAIL-235: remove Permissions.hbm.xml 18517: SAIL-235: Permissions DAO refactor 18523: SAIL-234: Node.hbm.xml 18524: SAIL-235: Permissions DAO refactor 18960: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18533: Flipped back to Windows line endings 18535: Formatting-only (eol) 18540: Formatting-only (eol) 18541: SAIL-235: Permissions DAO refactor 18543: SAIL-234: Node.hbm.xml: Start alf_store changes 18567: SAIL-235: Permissions DAO refactor 18596: SAIL-305: Alfresco DDL - formatted/rationalized and added missing indexes & fk constraints 18603: SAIL-311: Minor cleanup for schema upgrade scripts (V3.3) 18604: SAIL-311: Remove empty dirs 18619: SAIL-274: Locale.hbm.xml 18621: Added method to create default ACL 18622: SAIL-234: Node.hbm.xml: Store, Transaction, Server and some node 18624: Formatting only (eol) 18631: SAIL-235: Permissions DAO refactor 18633: SAIL-235: Permissions DAO refactor - do not expose CRUD for AceContext (or AuthorityAlias) since currently unused 18639: getLocale(Locale) should return null if it doesn't exist 18640: SAIL-234 NodeDAO: More replacement of node queries and updates 18648: SAIL-310: Create SQL script for core repo tables (All DB ports) 18651: SAIL-234 NodeDAO: Moves across stores handle presence of target deleted nodes 18961: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18658: SAIL-274 Locale DAO: Missing getValueKey() method 18662: SAIL-235: Permissions DAO refactor - further cleanup (of DbAccessControlList usage, including copyACLs) 18664: DB scripts porting for PostgreSQL finished. 18668: SAIL-234 Node DAO: Note in case Transaction Change ID is dropped from indexes 18669: SAIL-234 Node DAO: deleteNode and archive (store move) fixes 18672: DB scripts porting for Oracle finished. 18675: SAIL-235: Permissions DAO refactor 18677: DB scripts porting for DB2 finished. 18964: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18687: Execute a callback with retries 18688: SAIL-234 Node DAO: Child association creation 18690: SAIL-234 Node DAO: Comment out raw creation of stores as it breaks subsequent bootstrap checks 18691: SAIL-234 Node DAO: More replacement of alf_child_assoc handling 18713: Commented about needing a more efficient removeChildAssociation method 18714: SAIL-234 Node DAO: Replaced queries on alf_child_assoc 18715: SAIL-234 Node DAO: More alf_child_assoc query replacement 18727: SAIL-234 Node DAO: alf_child_assoc queries complete 18737: SAIL-234 Node DAO: Tweaks to newNode and implemented prependPaths 18741: SAIL-234 and SAIL-334: Moved UsageDelta Hibernate code and queries over to UsageDeltaDAO 18748: SAIL-234 Node DAO: fix NPE (EditionServiceImplTest) 18769: SAIL-234 Node DAO: alf_node_properties ground work 18786: SAIL-234 Node DAO: alf_node_properties and cm:auditable properties 18810: Added EqualsHelper.getMapComparison 18813: TransactionalCache propagates cache clears and removals during rollback 18826: SAIL-234 Node DAO: Moved over sundry references to NodeDaoService to NodeDAO 18849: SAIL-237: UsageDelta.hbm.xml - eol formatting only (including removal of unwanted svn:eol-style=native property) 18869: SAIL-234 NodeDAO: Fixed more references to 'nodeDaoService' 18895: SAIL-234 NodeDAO: Queries for alf_transaction 18899: SAIL-234 Node DAO: Fixed bean fetching for 'nodeDAO' 18909: SAIL-234 NodeDAO: Fixes to getNodeRefStatus and various txn queries 18916: SAIL-234 NodeDAO: Fixed moveNode alf_child_assoc updates 18922: SAIL-235: DAO refactoring: Permission.hbm.xml 18930: SAIL-235: DAO refactoring: Permission.hbm.xml 18932: SAIL-234 NodeDAO: Fixing up gotchas, javadocs and some naming 18933: SAIL-234 NodeDAO: Minor neatening 18935: SAIL-234 Node DAO: Caches for ID to NodeRef and StoreRef 18936: EHCache config files line endings 18938: SAIL-237: Usage DAO refactor - initial checkpoint 18945: SAIL-235: DAO refactoring: Permission.hbm.xml. Move Node. 18975: Fix for move-node ACL jiggery-pokery 19067: SAIL-4: fix VersionHistoryImpl.getSuccessors (causing VersionServiceImplTest.testGetVersionHistorySameWorkspace failure) 19068: SAIL-234: fix VersionMigratorTest.testMigrateOneVersion 19074: SAIL-237: Usage DAO - update to common iBatis mapping pattern(s) to ease DB porting 19076: SAIL-231: Activities DAO - update to common iBatis mapping pattern(s) 19077: SAIL-232: AppliedPatch DAO - minor cleanup (comments & formatting only) 19092: Merging HEAD to DEV/V3.3-DAO-REFACTOR-2 18973: Temporarily comment out AVMTestSuite and run AVM tests individually 19056: AVM unit test improvements 19097: SAIL-235: DAO refactoring: Permission.hbm.xml: Additional index to support queries to find the id and acl id for the primary children of a node. 19185: SAIL-238: Permissions DAO - (minor) update to common iBatis mapping pattern 19289: SAIL-234 NodeDAO: Node cache replaces NodeRef cache 19302: SAIL-234 Node DAO: Added cache for node properties 19318: SAIL-4: AVM DAO - (minor) update to common iBatis mapping pattern 20690: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: 20063: (RECORD ONLY) DAO refactor branch V4 20146: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19401: SAIL-234 Node DAO: Fix permission service tests (setPrimaryChildrenSharedAclId needs to invalidate nodesCache) 19428: Fixed TransactionalCache issue with null and NullValueMarker 19429: Took empty cm:content creation out of FileFolderService#createImpl 19430: SAIL-234 Node DAO: Tweaks around caching and cm:auditable 19431: SAIL-4 DAO Refactor: Exception thrown when attempting writes in read-only txn have changed 19436: SAIL-234 Node DAO: Fix NPE during cm:auditable update 19475: Allow debugging of code without stepping into trivial stuff 19476: Follow-up on 19429 by ensuring CIFS/FTP set a mimetype on the ContentWriter 19477: SAIL-234 Node DAO: Leverage DAO better for NodeService.addProperties 19478: SAIL-234 NodeDAO: Added toString() for ParentAssocsInfo (cache value for parent assocs) 19479: SAIL-234 Node DAO: Fixed for parent association and property caches 19480: Made TransactionAwareSingleton bind-key a GUID 19481: SAIL-234 Node DAO: Reinstated 100K collection property tests 19482: SAIL-234 Node DAO: Node and property cache fixes highlighted by unit tests 19483: SAIL-234 Node DAO: Start on NodeBulkLoader implementation 19595: SAIL-234 Node DAO: Fix moveNode to detect cyclic relationship prior to updating ACLs for moved tree FileFolderServiceImplTest.testETHREEOH_3088_MoveIntoSelf) 20147: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19602: (RECORD ONLY) Reintegrated with HEAD up to rev 19433 19621: (RECORD ONLY) SAIL-347 19683: (RECORD ONLY) Reverse-merged 19621 for SAIL-347 19722: (RECORD ONLY) Merged /alfresco/HEAD:r19434-19721 20150: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19741: Merged DEV\V3.3-DAO-REFACTOR-2 to DEV\V3.3-DAO-REFACTOR-3 19739: Extended "move" tests 19743: Fix AuditableAspectTest.testAddAspect (to allow for node modified date tolerance) 19748: Remaining part of merge from HEAD to V3.3-DAO-REFACTOR-3 19367: Merged BRANCHES/V3.2 to HEAD: 19286: Fix for ALF-626 "Using 'null' as an authority argument in clearPermissions() cause a java.lang.NullPointerException" 19755: SAIL-234 Node DAO: Fix RepoAdminServiceImplTest.testConcurrentDynamicModelDelete (handle InvalidNodeRefException after getChildAssocs) 20692: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: - Retired all 1.3 and 1.4 upgrade scripts ... R.I.P. - Fixed CRC patch for Authorities (only tested on MySQL) - Fixed SQL patch revision numbers and bumped version schema number up 20158: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19773: SQL mappings and scripts: SAIL-310, SAIL-304, SAIL-303 and SAIL-347 19774: Futher fix for SAIL-310: Sequence patch must take into account sequences created for 3.3 19851: SAIL-371 (SAIL-294) NodeDAO fallout: Fix QName and Namespace read/write handling and bean name in unit test 20183: Merged DAO3 to DAO4 19852: SAIL-370: Remove LinkValidation 19853: SAIL-239 (SAIL-294) Attributes.hbm.xml: Added ability to attach arbitrary property to unique context 19857: SAIL-373 Fallout from Permissions DAO refactor (SAIL-235) 19864: SAIL-239 (SAIL-294): Removed AttributeService RMI API 19865: More SAIL-239 (SAIL-294): Removed AttributeService RMI API 20208: DAO-refactor implementation of ALF-2712 query improvements 20209: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20060: Removal of AttributeService for SAIL-239 (SAIL-294) 20348: SAIL-371 (SAIL-294): Protect collection properties during map insert and retrieval 20547: SAIL-371 (SAIL-294) Attributes.hbm.xml: implement getAttributes + fixes 20573: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests and other fallout 20597: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) 20598: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) - fix AssetServiceImplTest.testSimpleLockFile NPE 20600: Fix PropertyValueDAOTest.testPropertyValue_Enum (follow-on to r20060 for SAIL-239 - which introduces ENUM prop vals) 20601: Fix UsageDAOTest.testCreateAndDeleteUsageDeltas NPE (would also affect ContentStoreCleanerScalabilityRunner) 20603: Fix CMISPropertyServiceTest.* (fallout from r20146 <- r19429 <- Took empty cm:content creation out of FileFolderService#createImpl) 20604: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - TransferServiceImplTest.* 20618: SAIL-371 (SAIL-294): NodeDAO: AuditableAspectTest (fix testCreateNodeWithAuditableProperties_ALF_2565 + add remove aspect test) 20624: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - UserUsageTest.* 20626: Fixed random keys for RuleTrigger NodeRef tracking 20635: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - PersonTest.testSplitDuplicates 20642: SAIL-371 (SAIL-294) DAO: Fixed CacheTest 20643: Removed must of the 'distribute' target's dependencies. Not for HEAD 20645: Follow-on to r20643 (Removed most of the 'distribute' target's dependencies. Not for HEAD) 20654: SAIL-371 (SAIL-294): NodeDAO: DMDeploymentTargetTest.* (do not try to remove mandatory aspects) 20655: SAIL-371 (SAIL-294): NodeDAO: Initial fix for TaggingServiceImplTest.testTagScopeUpdateViaNodePolicies (+ minor test cleanup) 20657: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - VersionMigratorTest.testMigrateOneVersion (cm:accessed not returned if null) 20658: Merged (back merge only - no merge info) BRANCHES/V3.3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20090: Dynamic models: minor improvements to DictionaryModelType 20554: Improvement to model delete validation (investigating intermittent failure of RepoAdminServiceImplTest.testSimpleDynamicModelViaNodeService) 20662: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - RecordsManagementAuditServiceImplTest.* (we now ignore attempt to update 'cm:modifier' prop so update 'cm:title' prop instead) 20666: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - ADMLuceneTest.* 20668: SAIL-239 (SAIL-294) - delete WCM locks + tests (follow-on to r20060) 20674: SAIL-371 (SAIL-294) NodeDAO fallout: Cleaner and additional checks for ContentStoreCleaner 20675: SAIL-371 (SAIL-294) NodeDAO fallout: Fixed handling of ContentData git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@20693 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
1403 lines
53 KiB
Java
1403 lines
53 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
package org.alfresco.repo.avm;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.HashMap;
|
|
import java.util.HashSet;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Set;
|
|
import java.util.TreeMap;
|
|
|
|
import org.alfresco.repo.avm.util.AVMUtil;
|
|
import org.alfresco.repo.domain.DbAccessControlList;
|
|
import org.alfresco.repo.domain.PropertyValue;
|
|
import org.alfresco.repo.security.permissions.ACLCopyMode;
|
|
import org.alfresco.repo.security.permissions.ACLType;
|
|
import org.alfresco.repo.security.permissions.impl.AccessPermissionImpl;
|
|
import org.alfresco.service.cmr.avm.AVMBadArgumentException;
|
|
import org.alfresco.service.cmr.avm.AVMNodeDescriptor;
|
|
import org.alfresco.service.cmr.avm.AVMNotFoundException;
|
|
import org.alfresco.service.cmr.avm.AVMService;
|
|
import org.alfresco.service.cmr.avmsync.AVMDifference;
|
|
import org.alfresco.service.cmr.avmsync.AVMSyncException;
|
|
import org.alfresco.service.cmr.avmsync.AVMSyncService;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.security.AccessPermission;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.namespace.QName;
|
|
import org.alfresco.util.NameMatcher;
|
|
import org.apache.commons.logging.Log;
|
|
import org.apache.commons.logging.LogFactory;
|
|
|
|
/**
|
|
* This implements APIs that allow comparison and synchronization
|
|
* of node trees as well as cumulative operations on layers to
|
|
* support various content production models.
|
|
* @author britt
|
|
*/
|
|
public class AVMSyncServiceImpl implements AVMSyncService
|
|
{
|
|
private static Log logger = LogFactory.getLog(AVMSyncServiceImpl.class);
|
|
|
|
/**
|
|
* The AVMService.
|
|
*/
|
|
private AVMService fAVMService;
|
|
|
|
/**
|
|
* The AVMRepository.
|
|
*/
|
|
private AVMRepository fAVMRepository;
|
|
|
|
/**
|
|
* The PermissionService
|
|
*/
|
|
private PermissionService fPermissionService;
|
|
|
|
/**
|
|
* Do nothing constructor.
|
|
*/
|
|
public AVMSyncServiceImpl()
|
|
{
|
|
}
|
|
|
|
/**
|
|
* Set the AVM Service. For Spring.
|
|
* @param avmService The AVMService reference.
|
|
*/
|
|
public void setAvmService(AVMService avmService)
|
|
{
|
|
fAVMService = avmService;
|
|
}
|
|
|
|
public void setAvmRepository(AVMRepository avmRepository)
|
|
{
|
|
fAVMRepository = avmRepository;
|
|
}
|
|
|
|
public void setPermissionService(PermissionService service)
|
|
{
|
|
fPermissionService = service;
|
|
}
|
|
|
|
/**
|
|
* Get a difference list between two corresponding node trees.
|
|
* @param srcVersion The version id for the source tree.
|
|
* @param srcPath The avm path to the source tree.
|
|
* @param dstVersion The version id for the destination tree.
|
|
* @param dstPath The avm path to the destination tree.
|
|
* @param excluder A NameMatcher used to exclude files from consideration.
|
|
* @return A List of AVMDifference structs which can be used for
|
|
* the update operation.
|
|
*/
|
|
public List<AVMDifference> compare(int srcVersion, String srcPath,
|
|
int dstVersion, String dstPath,
|
|
NameMatcher excluder)
|
|
{
|
|
long start = System.currentTimeMillis();
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(srcPath + " : " + dstPath);
|
|
}
|
|
if (srcPath == null || dstPath == null)
|
|
{
|
|
throw new AVMBadArgumentException("Illegal null path.");
|
|
}
|
|
List<AVMDifference> result = new ArrayList<AVMDifference>();
|
|
AVMNodeDescriptor srcDesc = fAVMService.lookup(srcVersion, srcPath, true);
|
|
if (srcDesc == null)
|
|
{
|
|
throw new AVMSyncException("Source not found: " + srcPath);
|
|
}
|
|
AVMNodeDescriptor dstDesc = fAVMService.lookup(dstVersion, dstPath, true);
|
|
if (dstDesc == null)
|
|
{
|
|
// Special case: no pre-existing version in the destination.
|
|
result.add(new AVMDifference(srcVersion, srcPath,
|
|
dstVersion, dstPath,
|
|
AVMDifference.NEWER));
|
|
}
|
|
else
|
|
{
|
|
// Invoke the recursive implementation.
|
|
compare(srcVersion, srcDesc, dstVersion, dstDesc, result, excluder, true);
|
|
}
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Raw compare: ["+srcVersion+","+srcPath+"]["+dstVersion+","+dstPath+"]["+result.size()+"] in "+(System.currentTimeMillis()-start)+" msecs");
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Internal recursive implementation of compare.
|
|
* @param srcVersion The version of the source tree.
|
|
* @param srcDesc The current source descriptor.
|
|
* @param dstVersion The version of the destination tree.
|
|
* @param dstDesc The current dstDesc
|
|
*/
|
|
private void compare(int srcVersion, AVMNodeDescriptor srcDesc,
|
|
int dstVersion, AVMNodeDescriptor dstDesc,
|
|
List<AVMDifference> result, NameMatcher excluder, boolean firstLevel)
|
|
{
|
|
String srcPath = srcDesc.getPath();
|
|
String dstPath = dstDesc.getPath();
|
|
|
|
String srcParts[] = AVMUtil.splitBase(srcPath);
|
|
String srcChildName = srcParts[1];
|
|
|
|
String dstParts[] = AVMUtil.splitBase(dstPath);
|
|
String dstChildName = dstParts[1];
|
|
|
|
if ((dstChildName.equalsIgnoreCase(srcChildName)) && (! dstChildName.equals(srcChildName)))
|
|
{
|
|
// specific rename 'case'
|
|
String dstParentPath = dstParts[0];
|
|
if (dstParentPath == null)
|
|
{
|
|
dstParentPath = AVMUtil.buildAVMPath(AVMUtil.getStoreName(dstPath), "");
|
|
}
|
|
dstPath = AVMUtil.extendAVMPath(dstParentPath, srcChildName);
|
|
}
|
|
|
|
// Determine how the source and destination nodes differ.
|
|
if (excluder != null && (excluder.matches(srcPath) ||
|
|
excluder.matches(dstPath)))
|
|
{
|
|
return;
|
|
}
|
|
int diffCode = compareOne(srcDesc, dstDesc, false);
|
|
switch (diffCode)
|
|
{
|
|
case AVMDifference.SAME :
|
|
{
|
|
// A big short circuit.
|
|
return;
|
|
}
|
|
// The trivial to handle cases.
|
|
case AVMDifference.NEWER :
|
|
case AVMDifference.OLDER :
|
|
case AVMDifference.CONFLICT :
|
|
{
|
|
result.add(new AVMDifference(srcVersion, srcPath,
|
|
dstVersion, dstPath,
|
|
diffCode));
|
|
return;
|
|
}
|
|
case AVMDifference.DIRECTORY :
|
|
{
|
|
// First special case: source is a layered directory which points to
|
|
// the destinations path, and we are comparing 'head' versions.
|
|
if (srcDesc.isLayeredDirectory() &&
|
|
srcDesc.getIndirection().equalsIgnoreCase(dstPath) && srcVersion < 0 && dstVersion < 0)
|
|
{
|
|
// skip firstLevel (root)
|
|
if (! firstLevel)
|
|
{
|
|
// compare directory itself - eg. for an ACL change
|
|
int dirDiffCode = compareOne(srcDesc, dstDesc, true);
|
|
switch (dirDiffCode)
|
|
{
|
|
case AVMDifference.OLDER :
|
|
case AVMDifference.NEWER :
|
|
case AVMDifference.CONFLICT :
|
|
{
|
|
result.add(new AVMDifference(srcVersion, srcPath,
|
|
dstVersion, dstPath,
|
|
dirDiffCode));
|
|
return; // short circuit
|
|
}
|
|
case AVMDifference.SAME :
|
|
{
|
|
break;
|
|
}
|
|
default :
|
|
{
|
|
throw new AVMSyncException("Invalid Difference Code " + dirDiffCode + " - Internal Error.");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Get only a direct listing, since that's all that can be different.
|
|
Map<String, AVMNodeDescriptor> srcList =
|
|
fAVMService.getDirectoryListingDirect(srcDesc, true);
|
|
// The biggest shortcut: if the source directory is directly empty
|
|
// then we're done.
|
|
if (srcList.size() == 0)
|
|
{
|
|
return;
|
|
}
|
|
// We grab a complete listing of the destination.
|
|
Map<String, AVMNodeDescriptor> dstList =
|
|
fAVMService.getDirectoryListing(dstDesc, true);
|
|
for (String name : srcList.keySet())
|
|
{
|
|
AVMNodeDescriptor srcChild = srcList.get(name);
|
|
AVMNodeDescriptor dstChild = dstList.get(name);
|
|
|
|
String srcChildPath = srcChild.getPath();
|
|
String dstChildPath = AVMNodeConverter.ExtendAVMPath(dstPath, name);
|
|
|
|
if (excluder != null && (excluder.matches(srcChildPath) ||
|
|
excluder.matches(dstChildPath)))
|
|
{
|
|
continue;
|
|
}
|
|
if (dstChild == null)
|
|
{
|
|
// A missing destination child means the source is NEWER.
|
|
result.add(new AVMDifference(srcVersion, srcChildPath,
|
|
dstVersion, dstChildPath,
|
|
AVMDifference.NEWER));
|
|
continue;
|
|
}
|
|
// Otherwise recursively invoke.
|
|
compare(srcVersion, srcChild,
|
|
dstVersion, dstChild,
|
|
result, excluder, false);
|
|
}
|
|
return;
|
|
}
|
|
// Second special case. Just as above but reversed.
|
|
if (dstDesc.isLayeredDirectory() &&
|
|
dstDesc.getIndirection().equalsIgnoreCase(srcPath) && srcVersion < 0 && dstVersion < 0)
|
|
{
|
|
// skip firstLevel (root)
|
|
if (! firstLevel)
|
|
{
|
|
// compare directory itself - eg. for an ACL change
|
|
int dirDiffCode = compareOne(srcDesc, dstDesc, true);
|
|
switch (dirDiffCode)
|
|
{
|
|
case AVMDifference.OLDER :
|
|
case AVMDifference.NEWER :
|
|
case AVMDifference.CONFLICT :
|
|
{
|
|
result.add(new AVMDifference(srcVersion, srcPath,
|
|
dstVersion, dstPath,
|
|
dirDiffCode));
|
|
return; // short circuit
|
|
}
|
|
case AVMDifference.SAME :
|
|
{
|
|
break;
|
|
}
|
|
default :
|
|
{
|
|
throw new AVMSyncException("Invalid Difference Code " + dirDiffCode + " - Internal Error.");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Get direct content of destination.
|
|
Map<String, AVMNodeDescriptor> dstList =
|
|
fAVMService.getDirectoryListingDirect(dstDesc, true);
|
|
// Big short circuit.
|
|
if (dstList.size() == 0)
|
|
{
|
|
return;
|
|
}
|
|
// Get the source listing.
|
|
Map<String, AVMNodeDescriptor> srcList =
|
|
fAVMService.getDirectoryListing(srcDesc, true);
|
|
for (String name : dstList.keySet())
|
|
{
|
|
AVMNodeDescriptor dstChild = dstList.get(name);
|
|
AVMNodeDescriptor srcChild = srcList.get(name);
|
|
|
|
String srcChildPath = AVMNodeConverter.ExtendAVMPath(srcPath, name);
|
|
String dstChildPath = dstChild.getPath();
|
|
|
|
if (excluder != null && (excluder.matches(srcChildPath) ||
|
|
excluder.matches(dstChildPath)))
|
|
{
|
|
continue;
|
|
}
|
|
if (srcChild == null)
|
|
{
|
|
// Missing means the source is older.
|
|
result.add(new AVMDifference(srcVersion, srcChildPath,
|
|
dstVersion, dstChildPath,
|
|
AVMDifference.OLDER));
|
|
continue;
|
|
}
|
|
// Otherwise, recursively invoke.
|
|
compare(srcVersion, srcChild,
|
|
dstVersion, dstChild,
|
|
result, excluder, false);
|
|
}
|
|
return;
|
|
}
|
|
// Neither of the special cases apply, so brute force is the only answer.
|
|
Map<String, AVMNodeDescriptor> srcList =
|
|
fAVMService.getDirectoryListing(srcDesc, true);
|
|
Map<String, AVMNodeDescriptor> dstList =
|
|
fAVMService.getDirectoryListing(dstDesc, true);
|
|
// Iterate over the source.
|
|
for (String name : srcList.keySet())
|
|
{
|
|
AVMNodeDescriptor srcChild = srcList.get(name);
|
|
AVMNodeDescriptor dstChild = dstList.get(name);
|
|
|
|
String srcChildPath = srcChild.getPath();
|
|
String dstChildPath = AVMNodeConverter.ExtendAVMPath(dstPath, name);
|
|
|
|
if (excluder != null && (excluder.matches(srcChildPath) ||
|
|
excluder.matches(dstChildPath)))
|
|
{
|
|
continue;
|
|
}
|
|
if (dstChild == null)
|
|
{
|
|
// Not found in the destination means NEWER.
|
|
result.add(new AVMDifference(srcVersion, srcChildPath,
|
|
dstVersion, dstChildPath,
|
|
AVMDifference.NEWER));
|
|
continue;
|
|
}
|
|
// Otherwise recursive invocation.
|
|
compare(srcVersion, srcChild,
|
|
dstVersion, dstChild,
|
|
result, excluder, false);
|
|
}
|
|
// Iterate over the destination.
|
|
for (String name : dstList.keySet())
|
|
{
|
|
if (srcList.containsKey(name))
|
|
{
|
|
continue;
|
|
}
|
|
|
|
AVMNodeDescriptor dstChild = dstList.get(name);
|
|
|
|
String srcChildPath = AVMNodeConverter.ExtendAVMPath(srcPath, name);
|
|
String dstChildPath = dstChild.getPath();
|
|
|
|
if (excluder != null && (excluder.matches(srcChildPath) ||
|
|
excluder.matches(dstChildPath)))
|
|
{
|
|
continue;
|
|
}
|
|
// An entry not found in the source is OLDER.
|
|
result.add(new AVMDifference(srcVersion, srcChildPath,
|
|
dstVersion, dstChildPath,
|
|
AVMDifference.OLDER));
|
|
}
|
|
break;
|
|
}
|
|
default :
|
|
{
|
|
throw new AVMSyncException("Invalid Difference Code " + diffCode + " - Internal Error.");
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Updates the destination nodes in the AVMDifferences
|
|
* with the source nodes. Normally any conflicts or cases in
|
|
* which the source of an AVMDifference is older than the destination
|
|
* will cause the transaction to roll back.
|
|
* @param diffList A List of AVMDifference structs.
|
|
* @param excluder A possibly null name matcher to exclude unwanted updates.
|
|
* @param ignoreConflicts If this is true the update will skip those
|
|
* AVMDifferences which are in conflict with
|
|
* the destination.
|
|
* @param ignoreOlder If this is true the update will skip those
|
|
* AVMDifferences which have the source older than the destination.
|
|
* @param overrideConflicts If this is true the update will override conflicting
|
|
* AVMDifferences and replace the destination with the conflicting source.
|
|
* @param overrideOlder If this is true the update will override AVMDifferences
|
|
* @param tag Short update blurb.
|
|
* @param description Full update blurb.
|
|
* in which the source is older than the destination and overwrite the destination.
|
|
*/
|
|
public void update(List<AVMDifference> diffList,
|
|
NameMatcher excluder, boolean ignoreConflicts, boolean ignoreOlder,
|
|
boolean overrideConflicts, boolean overrideOlder, String tag, String description)
|
|
{
|
|
long start = System.currentTimeMillis();
|
|
|
|
Map<String, Integer> storeVersions = new HashMap<String, Integer>();
|
|
Set<String> destStores = new HashSet<String>();
|
|
|
|
Map<String, AVMDifference> diffsToUpdate = new TreeMap<String, AVMDifference>();
|
|
|
|
for (AVMDifference diff : diffList)
|
|
{
|
|
if (excluder != null && (excluder.matches(diff.getSourcePath()) ||
|
|
excluder.matches(diff.getDestinationPath())))
|
|
{
|
|
continue;
|
|
}
|
|
|
|
if (!diff.isValid())
|
|
{
|
|
throw new AVMSyncException("Malformed AVMDifference.");
|
|
}
|
|
|
|
diffsToUpdate.put(diff.getSourcePath(), diff);
|
|
}
|
|
|
|
for (AVMDifference diff : diffsToUpdate.values())
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("update: " + diff);
|
|
}
|
|
// Snapshot the source if needed.
|
|
int version = diff.getSourceVersion();
|
|
if (version < 0)
|
|
{
|
|
String storeName = AVMUtil.getStoreName(diff.getSourcePath());
|
|
if (storeVersions.containsKey(storeName))
|
|
{
|
|
// We've already snapshotted this store.
|
|
version = storeVersions.get(storeName);
|
|
}
|
|
else
|
|
{
|
|
version = fAVMService.createSnapshot(storeName, "Snapshotted for submit.", null).get(storeName);
|
|
storeVersions.put(storeName, version);
|
|
}
|
|
}
|
|
AVMNodeDescriptor srcDesc = fAVMService.lookup(version,
|
|
diff.getSourcePath(), true);
|
|
String [] dstParts = AVMNodeConverter.SplitBase(diff.getDestinationPath());
|
|
if (dstParts[0] == null || diff.getDestinationVersion() >= 0)
|
|
{
|
|
// You can't have a root node as a destination.
|
|
throw new AVMSyncException("Invalid destination node: " + diff.getDestinationPath());
|
|
}
|
|
AVMNodeDescriptor dstDesc = fAVMService.lookup(-1, diff.getDestinationPath(), true);
|
|
// The default is that the source is newer in the case where
|
|
// the destination doesn't exist.
|
|
int diffCode = AVMDifference.NEWER;
|
|
if (dstDesc != null)
|
|
{
|
|
diffCode = compareOne(srcDesc, dstDesc, false);
|
|
}
|
|
// Keep track of stores updated so that they can all be snapshotted
|
|
// at end of update.
|
|
String dstPath = diff.getDestinationPath();
|
|
destStores.add(AVMUtil.getStoreName(dstPath));
|
|
|
|
dispatchUpdate(diffCode, dstParts[0], dstParts[1], excluder, srcDesc, dstDesc,
|
|
ignoreConflicts, ignoreOlder, overrideConflicts, overrideOlder);
|
|
}
|
|
|
|
for (String storeName : destStores)
|
|
{
|
|
fAVMService.createSnapshot(storeName, tag, description);
|
|
}
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Raw update: [" + diffList.size() + "] in " + (System.currentTimeMillis() - start) + " msecs");
|
|
}
|
|
}
|
|
|
|
private void dispatchUpdate(int diffCode, String parentPath, String name, NameMatcher excluder, AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc,
|
|
boolean ignoreConflicts, boolean ignoreOlder, boolean overrideConflicts, boolean overrideOlder)
|
|
{
|
|
// Dispatch.
|
|
switch (diffCode)
|
|
{
|
|
case AVMDifference.SAME :
|
|
{
|
|
// Nada to do.
|
|
return;
|
|
}
|
|
case AVMDifference.NEWER :
|
|
{
|
|
// You can't delete what isn't there.
|
|
linkIn(parentPath, name, srcDesc, excluder, dstDesc != null && !dstDesc.isDeleted(), dstDesc);
|
|
return;
|
|
}
|
|
case AVMDifference.OLDER :
|
|
{
|
|
// You can force it.
|
|
if (overrideOlder)
|
|
{
|
|
linkIn(parentPath, name, srcDesc, excluder, !dstDesc.isDeleted(), dstDesc);
|
|
return;
|
|
}
|
|
// You can ignore it.
|
|
if (ignoreOlder)
|
|
{
|
|
return;
|
|
}
|
|
// Or it's an error.
|
|
throw new AVMSyncException("Older version prevents update.");
|
|
}
|
|
case AVMDifference.CONFLICT :
|
|
{
|
|
// You can force it.
|
|
if (overrideConflicts)
|
|
{
|
|
linkIn(parentPath, name, srcDesc, excluder, true, dstDesc);
|
|
return;
|
|
}
|
|
// You can ignore it.
|
|
if (ignoreConflicts)
|
|
{
|
|
return;
|
|
}
|
|
// Or it's an error.
|
|
throw new AVMSyncException("Conflict prevents update.");
|
|
}
|
|
case AVMDifference.DIRECTORY :
|
|
{
|
|
int dirDiffCode = compareOne(srcDesc, dstDesc, true);
|
|
if (dirDiffCode == AVMDifference.DIRECTORY)
|
|
{
|
|
// error
|
|
throw new AVMSyncException("Unexpected diff code: " + dirDiffCode);
|
|
}
|
|
|
|
dispatchUpdate(dirDiffCode, parentPath, name, excluder, srcDesc, dstDesc,
|
|
ignoreConflicts, ignoreOlder, overrideConflicts, overrideOlder);
|
|
return;
|
|
}
|
|
default :
|
|
{
|
|
throw new AVMSyncException("Invalid Difference Code " + diffCode + " - Internal Error.");
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Do the actual work of connecting nodes to the destination tree.
|
|
* @param parentPath The parent path the node will go in.
|
|
* @param name The name it will have.
|
|
* @param toLink The node descriptor.
|
|
* @param removeFirst Whether to do a removeNode before linking in.
|
|
*/
|
|
private void linkIn(String parentPath, String name, AVMNodeDescriptor toLink, NameMatcher excluder, boolean removeFirst, AVMNodeDescriptor dstDesc)
|
|
{
|
|
// This is a delete.
|
|
if (toLink == null)
|
|
{
|
|
try
|
|
{
|
|
fAVMService.removeNode(parentPath, name);
|
|
}
|
|
catch (AVMNotFoundException nfe)
|
|
{
|
|
// ignore
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("linkIn: Does not exist: "+parentPath+"/"+name);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
mkdirs(parentPath, AVMNodeConverter.SplitBase(toLink.getPath())[0]);
|
|
|
|
if (toLink.isLayeredDirectory() && !toLink.isPrimary())
|
|
{
|
|
// Combining the remove and add into a single update API causes all sorts of potential security issues
|
|
if (removeFirst)
|
|
{
|
|
fAVMService.removeNode(parentPath, name);
|
|
}
|
|
recursiveCopy(parentPath, name, toLink, excluder);
|
|
return;
|
|
}
|
|
|
|
String newPath = AVMNodeConverter.ExtendAVMPath(parentPath, name);
|
|
|
|
if (toLink.isLayeredDirectory() &&
|
|
toLink.isPrimary() &&
|
|
dstDesc == null &&
|
|
toLink.getIndirection().equals(newPath))
|
|
{
|
|
recursiveCopy(parentPath, name, toLink, excluder);
|
|
return;
|
|
}
|
|
|
|
if (removeFirst)
|
|
{
|
|
if (toLink.isDirectory())
|
|
{
|
|
// Combining the remove and add into a single update API causes all sorts of potential security issues
|
|
fAVMService.removeNode(parentPath, name);
|
|
fAVMService.link(parentPath, name, toLink);
|
|
}
|
|
else
|
|
{
|
|
// this API only requires write access to the file
|
|
fAVMService.updateLink(parentPath, name, toLink);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
fAVMService.link(parentPath, name, toLink);
|
|
}
|
|
|
|
setACL(parentPath, toLink.getPath(), newPath);
|
|
}
|
|
|
|
/*
|
|
* Get acl
|
|
*/
|
|
private DbAccessControlList getACL(String path)
|
|
{
|
|
Lookup lookup = AVMRepository.GetInstance().lookup(-1, path, false);
|
|
if (lookup != null)
|
|
{
|
|
AVMNode node = lookup.getCurrentNode();
|
|
return node.getAcl();
|
|
}
|
|
else
|
|
{
|
|
return null;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Set ACL without COW
|
|
*/
|
|
private void setACL(String parentPath, String toCopyPath, String newPath)
|
|
{
|
|
DbAccessControlList parentAcl= getACL(parentPath);
|
|
DbAccessControlList acl = getACL(toCopyPath);
|
|
|
|
Lookup lookup = AVMRepository.GetInstance().lookup(-1, newPath, false);
|
|
if (lookup != null)
|
|
{
|
|
AVMNode newNode = lookup.getCurrentNode();
|
|
newNode.copyACLs(acl, parentAcl, ACLCopyMode.COPY);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.update(newNode);
|
|
}
|
|
else
|
|
{
|
|
return;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Recursively copy a node into the given position.
|
|
* @param parentPath The place to put it.
|
|
* @param name The name to give it.
|
|
* @param toCopy The it to put.
|
|
*/
|
|
private void recursiveCopy(String parentPath, String name, AVMNodeDescriptor toCopy, NameMatcher excluder)
|
|
{
|
|
fAVMService.createDirectory(parentPath, name);
|
|
String newParentPath = AVMNodeConverter.ExtendAVMPath(parentPath, name);
|
|
fAVMService.setMetaDataFrom(newParentPath, toCopy);
|
|
AVMNodeDescriptor parentDesc = fAVMService.lookup(-1, newParentPath, true);
|
|
Map<String, AVMNodeDescriptor> children =
|
|
fAVMService.getDirectoryListing(toCopy, true);
|
|
for (Map.Entry<String, AVMNodeDescriptor> entry : children.entrySet())
|
|
{
|
|
recursiveCopy(parentDesc, entry.getKey(), entry.getValue(), excluder);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Shortcutting helper that uses an AVMNodeDescriptor parent.
|
|
* @param parent The parent we are linking into.
|
|
* @param name The name to link in.
|
|
* @param toCopy The node to link in.
|
|
*/
|
|
private void recursiveCopy(AVMNodeDescriptor parent, String name, AVMNodeDescriptor toCopy, NameMatcher excluder)
|
|
{
|
|
String newPath = AVMNodeConverter.ExtendAVMPath(parent.getPath(), name);
|
|
if (excluder != null && (excluder.matches(newPath) ||
|
|
excluder.matches(toCopy.getPath())))
|
|
{
|
|
return;
|
|
}
|
|
// If it's a file or deleted simply link it in.
|
|
if (toCopy.isFile() || toCopy.isDeleted() || toCopy.isPlainDirectory())
|
|
{
|
|
fAVMRepository.link(parent, name, toCopy);
|
|
|
|
// needs to get the acl from the new location
|
|
setACL(parent.getPath(), toCopy.getPath(), newPath);
|
|
return;
|
|
}
|
|
// Otherwise make a directory in the target parent, and recursiveCopy all the source
|
|
// children into it.
|
|
AVMNodeDescriptor newParentDesc = fAVMRepository.createDirectory(parent, name);
|
|
fAVMService.setMetaDataFrom(newParentDesc.getPath(), toCopy);
|
|
Map<String, AVMNodeDescriptor> children =
|
|
fAVMService.getDirectoryListing(toCopy, true);
|
|
for (Map.Entry<String, AVMNodeDescriptor> entry : children.entrySet())
|
|
{
|
|
recursiveCopy(newParentDesc, entry.getKey(), entry.getValue(), excluder);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* The workhorse of comparison and updating. Determine the versioning relationship
|
|
* of two nodes.
|
|
* @param srcDesc Descriptor for the source node.
|
|
* @param dstDesc Descriptor for the destination node.
|
|
* @return One of SAME, OLDER, NEWER, CONFLICT, DIRECTORY
|
|
*/
|
|
private int compareOne(AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc, boolean compareDir)
|
|
{
|
|
if (srcDesc == null)
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (srcDesc.getId() == dstDesc.getId())
|
|
{
|
|
// Identical
|
|
return AVMDifference.SAME;
|
|
}
|
|
|
|
// Check for mismatched fundamental types.
|
|
if ((srcDesc.isDirectory() && dstDesc.isFile()) ||
|
|
(srcDesc.isFile() && dstDesc.isDirectory()))
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
|
|
// A deleted node on either side means uniform handling because
|
|
// a deleted node can be the descendent of any other type of node.
|
|
if (srcDesc.isDeleted() || dstDesc.isDeleted())
|
|
{
|
|
AVMNodeDescriptor common = fAVMService.getCommonAncestor(srcDesc, dstDesc);
|
|
if (common == null)
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
if (common.getId() == srcDesc.getId())
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (common.getId() == dstDesc.getId())
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
|
|
if (common.isLayeredFile())
|
|
{
|
|
Integer diff = compareLayeredCommonAncestor(common, srcDesc, dstDesc);
|
|
if (diff != null)
|
|
{
|
|
return diff;
|
|
}
|
|
}
|
|
|
|
if (srcDesc.isDeleted() && (srcDesc.getDeletedType() == AVMNodeType.LAYERED_DIRECTORY))
|
|
{
|
|
Integer diff = compareLayeredCommonAncestor(common, srcDesc, dstDesc);
|
|
if (diff != null)
|
|
{
|
|
return diff;
|
|
}
|
|
}
|
|
else if (dstDesc.isDeleted() && (dstDesc.getDeletedType() == AVMNodeType.LAYERED_DIRECTORY))
|
|
{
|
|
Integer diff = compareLayeredCommonAncestor(common, dstDesc, srcDesc);
|
|
if (diff != null)
|
|
{
|
|
return diff;
|
|
}
|
|
}
|
|
|
|
// Must be a conflict.
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
|
|
if (srcDesc.isDirectory() && dstDesc.isDirectory())
|
|
{
|
|
// Both source and destination are both some kind of directory.
|
|
if (! compareDir)
|
|
{
|
|
// note: the DIRECTORY difference code never gets returned to external callers of compare.
|
|
return AVMDifference.DIRECTORY;
|
|
}
|
|
else
|
|
{
|
|
// Matched directories that are not identical should be compared (initially) based on ACLs to see if they're newer, older or in conflict
|
|
|
|
if ((srcDesc.isLayeredDirectory() && srcDesc.getIndirection().equals(dstDesc.getPath())) ||
|
|
(dstDesc.isLayeredDirectory() && dstDesc.getIndirection().equals(srcDesc.getPath())))
|
|
{
|
|
// Either: Source is a layered directory and points at the destination plain/layered directory
|
|
// Or: Destination is a layered directory and points at the source plain directory
|
|
|
|
// Check properties (eg. title/description)
|
|
if (compareNodeProps(srcDesc, dstDesc) == AVMDifference.SAME)
|
|
{
|
|
// Check ACLs
|
|
int dirDiffCode = compareACLs(srcDesc, dstDesc);
|
|
if (dirDiffCode != AVMDifference.CONFLICT)
|
|
{
|
|
return dirDiffCode;
|
|
}
|
|
}
|
|
|
|
// drop through to check common ancestor
|
|
}
|
|
|
|
// Check common ancestor
|
|
AVMNodeDescriptor common = fAVMService.getCommonAncestor(srcDesc, dstDesc);
|
|
// Conflict case.
|
|
if (common == null)
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
if (common.getId() == srcDesc.getId())
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (common.getId() == dstDesc.getId())
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
// They must, finally, be in conflict.
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
}
|
|
// At this point both source and destination are both some kind of file.
|
|
if (srcDesc.isLayeredFile())
|
|
{
|
|
// Handle the layered file source case.
|
|
if (dstDesc.isPlainFile())
|
|
{
|
|
// We consider a layered source file that points at the destination
|
|
// file SAME.
|
|
if (srcDesc.getIndirection().equals(dstDesc.getPath()))
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
// We know that they are in conflict since they are of different types.
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
// Destination is a layered file also.
|
|
AVMNodeDescriptor common = fAVMService.getCommonAncestor(srcDesc, dstDesc);
|
|
if (common == null)
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
if (common.getId() == srcDesc.getId())
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (common.getId() == dstDesc.getId())
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
// Finally we know they are in conflict.
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
// Source is a plain file.
|
|
if (dstDesc.isLayeredFile())
|
|
{
|
|
// We consider a source file that is the target of a layered destination file to be
|
|
// SAME.
|
|
if (dstDesc.getIndirection().equals(srcDesc.getPath()))
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
|
|
AVMNodeDescriptor common = fAVMService.getCommonAncestor(srcDesc, dstDesc);
|
|
if (common == null)
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
if (common.getId() == srcDesc.getId())
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (common.getId() == dstDesc.getId())
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
|
|
if (common.isLayeredFile())
|
|
{
|
|
Integer diff = compareLayeredCommonAncestor(common, srcDesc, dstDesc);
|
|
if (diff != null)
|
|
{
|
|
return diff;
|
|
}
|
|
}
|
|
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
// Destination is a plain file.
|
|
AVMNodeDescriptor common = fAVMService.getCommonAncestor(srcDesc, dstDesc);
|
|
|
|
// Conflict case.
|
|
if (common == null)
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
if (common.getId() == srcDesc.getId())
|
|
{
|
|
return AVMDifference.OLDER;
|
|
}
|
|
if (common.getId() == dstDesc.getId())
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
|
|
if (common.isLayeredFile())
|
|
{
|
|
Integer diff = compareLayeredCommonAncestor(common, srcDesc, dstDesc);
|
|
if (diff != null)
|
|
{
|
|
return diff;
|
|
}
|
|
}
|
|
|
|
// They must, finally, be in conflict.
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
|
|
private Integer compareLayeredCommonAncestor(AVMNodeDescriptor common, AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc)
|
|
{
|
|
Integer diff = null;
|
|
|
|
// check dst ancestry
|
|
diff = compareLayeredCommonAncestor(common, dstDesc.getId(), AVMDifference.NEWER);
|
|
if (diff == null)
|
|
{
|
|
// check src ancestry
|
|
diff = compareLayeredCommonAncestor(common, srcDesc.getId(), AVMDifference.OLDER);
|
|
}
|
|
|
|
return diff;
|
|
}
|
|
|
|
private Integer compareLayeredCommonAncestor(AVMNodeDescriptor common, long compareNodeId, int diffType)
|
|
{
|
|
Integer diff = null;
|
|
|
|
AVMNode compareAncNode = AVMDAOs.Instance().fAVMNodeDAO.getByID(compareNodeId).getAncestor();
|
|
if (compareAncNode != null)
|
|
{
|
|
if (common.getId() == compareAncNode.getId())
|
|
{
|
|
diff = diffType;
|
|
}
|
|
else if (common.isLayeredFile())
|
|
{
|
|
// TODO review (alongside createSnapshot+COW)
|
|
diff = compareLayeredCommonAncestor(common, compareAncNode.getId(), diffType);
|
|
}
|
|
}
|
|
|
|
return diff;
|
|
}
|
|
|
|
// compare node properties
|
|
private int compareNodeProps(AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc)
|
|
{
|
|
Map<QName, PropertyValue> srcProps = fAVMService.getNodeProperties(srcDesc);
|
|
Map<QName, PropertyValue> dstProps = fAVMService.getNodeProperties(dstDesc);
|
|
|
|
if (srcProps.size() == dstProps.size())
|
|
{
|
|
for (Map.Entry<QName, PropertyValue> srcEntry : srcProps.entrySet())
|
|
{
|
|
PropertyValue srcValue = srcEntry.getValue();
|
|
PropertyValue dstValue = dstProps.get(srcEntry.getKey());
|
|
if ((srcValue == null) && (dstValue == null))
|
|
{
|
|
continue;
|
|
}
|
|
else if ((srcValue != null) && (dstValue != null) &&
|
|
(srcValue.equals(dstValue)))
|
|
{
|
|
continue;
|
|
}
|
|
else
|
|
{
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
}
|
|
|
|
return AVMDifference.SAME;
|
|
}
|
|
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
|
|
// compare ACLs
|
|
private int compareACLs(AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc)
|
|
{
|
|
DbAccessControlList srcAcl = getACL(srcDesc.getPath());
|
|
DbAccessControlList dstAcl = getACL(dstDesc.getPath());
|
|
|
|
if ((srcAcl == null) && (dstAcl == null))
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
else if (srcAcl != null)
|
|
{
|
|
if ((dstAcl != null) && (srcAcl.getAclId() == dstAcl.getAclId()))
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
|
|
if (srcAcl.getAclType().equals(ACLType.LAYERED))
|
|
{
|
|
if ((dstAcl == null) || dstAcl.getAclType().equals(ACLType.SHARED) || dstAcl.getAclType().equals(ACLType.LAYERED) || dstAcl.getAclType().equals(ACLType.DEFINING))
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
else
|
|
{
|
|
// TODO review
|
|
throw new AVMSyncException("srcAcl type: " + srcAcl.getAclType() + ", unexpected dstAcl type: " + dstAcl.getAclType());
|
|
}
|
|
}
|
|
else if (srcAcl.getAclType().equals(ACLType.DEFINING))
|
|
{
|
|
if ((dstAcl == null) || dstAcl.getAclType().equals(ACLType.SHARED) || dstAcl.getAclType().equals(ACLType.LAYERED))
|
|
{
|
|
return AVMDifference.NEWER;
|
|
}
|
|
else if (dstAcl.getAclType().equals(ACLType.DEFINING))
|
|
{
|
|
boolean same = compareACEs(srcDesc, dstDesc);
|
|
if (same)
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// TODO review
|
|
throw new AVMSyncException("srcAcl type: " + srcAcl.getAclType() + ", unexpected dstAcl type: " + dstAcl.getAclType());
|
|
}
|
|
}
|
|
else if (srcAcl.getAclType().equals(ACLType.SHARED))
|
|
{
|
|
if ((dstAcl == null) || dstAcl.getAclType().equals(ACLType.SHARED))
|
|
{
|
|
boolean same = compareACEs(srcDesc, dstDesc);
|
|
if (same)
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// TODO review
|
|
throw new AVMSyncException("srcAcl type: " + srcAcl.getAclType() + ", unexpected dstAcl type: " + dstAcl.getAclType());
|
|
}
|
|
}
|
|
}
|
|
else if (srcAcl == null)
|
|
{
|
|
if (dstAcl != null)
|
|
{
|
|
return AVMDifference.SAME;
|
|
}
|
|
}
|
|
|
|
return AVMDifference.CONFLICT;
|
|
}
|
|
|
|
private boolean compareACEs(AVMNodeDescriptor srcDesc, AVMNodeDescriptor dstDesc)
|
|
{
|
|
boolean same = false;
|
|
|
|
NodeRef srcNodeRef = AVMNodeConverter.ToNodeRef(-1, srcDesc.getPath());
|
|
Set<AccessPermission> srcSet = fPermissionService.getAllSetPermissions(srcNodeRef);
|
|
|
|
NodeRef dstNodeRef = AVMNodeConverter.ToNodeRef(-1, dstDesc.getPath());
|
|
Set<AccessPermission> dstSet = fPermissionService.getAllSetPermissions(dstNodeRef);
|
|
|
|
if (srcSet.size() == dstSet.size())
|
|
{
|
|
same = true;
|
|
for (AccessPermission srcPerm : srcSet)
|
|
{
|
|
boolean found = false;
|
|
for (AccessPermission dstPerm : dstSet)
|
|
{
|
|
if (compareAccessPermission(srcPerm, dstPerm))
|
|
{
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
if (! found)
|
|
{
|
|
same = false;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return same;
|
|
}
|
|
|
|
private boolean compareAccessPermission(AccessPermission srcPerm, AccessPermission dstPerm)
|
|
{
|
|
// TODO: currently ignores position (refer to updated AccessPermissionImpl.equals)
|
|
if (srcPerm == dstPerm)
|
|
{
|
|
return true;
|
|
}
|
|
if (srcPerm == null)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (srcPerm.getAccessStatus() == null)
|
|
{
|
|
if (dstPerm.getAccessStatus() != null)
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
else if (! srcPerm.getAccessStatus().equals(dstPerm.getAccessStatus()))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (srcPerm.getAuthority() == null)
|
|
{
|
|
if (dstPerm.getAuthority() != null)
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
else if (! srcPerm.getAuthority().equals(dstPerm.getAuthority()))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (srcPerm.getPermission() == null)
|
|
{
|
|
if (dstPerm.getPermission() != null)
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
else if (! srcPerm.getPermission().equals(dstPerm.getPermission()))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Flattens a layer so that all all nodes under and including
|
|
* <code>layerPath</code> become translucent to any nodes in the
|
|
* corresponding location under and including <code>underlyingPath</code>
|
|
* that are the same version.
|
|
* @param layerPath The overlying layer path.
|
|
* @param underlyingPath The underlying path.
|
|
*/
|
|
public void flatten(String layerPath, String underlyingPath)
|
|
{
|
|
long start = System.currentTimeMillis();
|
|
|
|
if (layerPath == null || underlyingPath == null)
|
|
{
|
|
throw new AVMBadArgumentException("Illegal null path.");
|
|
}
|
|
AVMNodeDescriptor layerNode = fAVMService.lookup(-1, layerPath, true);
|
|
if (layerNode == null)
|
|
{
|
|
throw new AVMNotFoundException("Not found: " + layerPath);
|
|
}
|
|
AVMNodeDescriptor underlyingNode = fAVMService.lookup(-1, underlyingPath, true);
|
|
if (underlyingNode == null)
|
|
{
|
|
throw new AVMNotFoundException("Not found: " + underlyingPath);
|
|
}
|
|
|
|
flatten(layerNode, underlyingNode);
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Raw flatten: " + layerNode + " " + underlyingNode + " in " + (System.currentTimeMillis() - start) + " msecs");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* This is the implementation of flatten.
|
|
* @param layer The on top node.
|
|
* @param underlying The underlying node.
|
|
*/
|
|
private boolean flatten(AVMNodeDescriptor layer, AVMNodeDescriptor underlying)
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("flatten: " + layer + " " + underlying);
|
|
}
|
|
if (!layer.isLayeredDirectory())
|
|
{
|
|
return false;
|
|
}
|
|
// layer and underlying must match for flattening to be useful.
|
|
if (!layer.getIndirection().equalsIgnoreCase(underlying.getPath()))
|
|
{
|
|
return false;
|
|
}
|
|
// The underlying thing must be a directory.
|
|
if (!underlying.isDirectory())
|
|
{
|
|
return false;
|
|
}
|
|
|
|
Map<String, AVMNodeDescriptor> layerListing =
|
|
fAVMService.getDirectoryListingDirect(-1, layer.getPath(), true);
|
|
// If the layer is empty (directly, that is) we're done.
|
|
if (layerListing.size() == 0)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
// Grab the listing
|
|
Map<String, AVMNodeDescriptor> underListing =
|
|
fAVMService.getDirectoryListing(underlying, true);
|
|
|
|
boolean flattened = true;
|
|
for (String name : layerListing.keySet())
|
|
{
|
|
AVMNodeDescriptor topNode = layerListing.get(name);
|
|
AVMNodeDescriptor bottomNode = underListing.get(name);
|
|
|
|
if (logger.isTraceEnabled())
|
|
{
|
|
logger.trace("Trying to flatten out: " + name);
|
|
}
|
|
|
|
if (bottomNode == null)
|
|
{
|
|
if (logger.isTraceEnabled())
|
|
{
|
|
logger.trace("Can't flatten (no bottomNode): " + name);
|
|
}
|
|
|
|
flattened = false;
|
|
continue;
|
|
}
|
|
// We've found an identity so flatten it.
|
|
if (topNode.getId() == bottomNode.getId())
|
|
{
|
|
fAVMRepository.flatten(layer.getPath(), name);
|
|
|
|
if (logger.isTraceEnabled())
|
|
{
|
|
logger.trace("Identity flattened: " + name);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (bottomNode.isLayeredDirectory())
|
|
{
|
|
AVMNodeDescriptor lookup = fAVMService.lookup(bottomNode.getIndirectionVersion(), bottomNode.getIndirection());
|
|
if (lookup == null)
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Can't flatten (no bottomNode indirection): " + name);
|
|
}
|
|
|
|
flattened = false;
|
|
continue;
|
|
}
|
|
}
|
|
|
|
// Otherwise recursively flatten the children.
|
|
if (flatten(topNode, bottomNode))
|
|
{
|
|
fAVMRepository.flatten(layer.getPath(), name);
|
|
|
|
if (logger.isTraceEnabled())
|
|
{
|
|
logger.trace("Recursively flattened: " + name);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
flattened = false;
|
|
}
|
|
}
|
|
}
|
|
return flattened;
|
|
}
|
|
|
|
/**
|
|
* Takes a layer, deletes it and recreates it pointing at the same underlying
|
|
* node. Any changes in the layer are lost (except to history if the layer has been
|
|
* snapshotted.)
|
|
*
|
|
* NB: fixed to respect permissions and allow reset end preview sandboxes by finding all direct children and flattening
|
|
*
|
|
* @param layerPath
|
|
*/
|
|
public void resetLayer(String layerPath)
|
|
{
|
|
long start = System.currentTimeMillis();
|
|
|
|
AVMNodeDescriptor desc = fAVMService.lookup(-1, layerPath);
|
|
if (desc == null)
|
|
{
|
|
throw new AVMNotFoundException("Not Found: " + layerPath);
|
|
}
|
|
Map<String, AVMNodeDescriptor> layerListing =
|
|
fAVMService.getDirectoryListingDirect(-1, layerPath, true);
|
|
for (String name : layerListing.keySet())
|
|
{
|
|
fAVMRepository.flatten(layerPath, name);
|
|
}
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Raw resetLayer: " + layerPath + " in " + (System.currentTimeMillis() - start) + " msecs");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Make sure this entire directory path exists.
|
|
* @param path
|
|
* @param sourcePath
|
|
*/
|
|
private void mkdirs(String path, String sourcePath)
|
|
{
|
|
if (fAVMService.lookup(-1, path) != null)
|
|
{
|
|
return;
|
|
}
|
|
String [] pathParts = AVMNodeConverter.SplitBase(path);
|
|
if (pathParts[0] == null)
|
|
{
|
|
// This is a root path and as such has to exist.
|
|
// Something else is going on.
|
|
throw new AVMSyncException("No corresponding destination path: " + path);
|
|
}
|
|
mkdirs(pathParts[0], AVMNodeConverter.SplitBase(sourcePath)[0]);
|
|
fAVMService.createDirectory(pathParts[0], pathParts[1]);
|
|
fAVMService.setMetaDataFrom(path, fAVMService.lookup(-1, sourcePath));
|
|
}
|
|
}
|