mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
20678: DAO5 branch: Preparation for merge back to HEAD 20689: Merged DAO4 to DAO5 - Removed all 'dbscripts/create/3.x/SomeDialect' and replaced with 'dbscripts/create/SomeDialect' DB create scripts are taken from latest DAO4 - TODO: FixAuthoritiesCrcValuesPatch needs query implementation in PatchDAO Merged DAO3 to DAO4 - Reapplied fixes for ALF-713 (race condition on Usages) 19350: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-2 to BRANCHES/DEV/V3.3-DAO-REFACTOR-3: 18939: SAIL-4 :2nd stage branch for DAO refactor off HEAD rev 18898 18948: Merged V3.3-DAO-REFACTOR to V3.3-DAO-REFACTOR-2 18202: Dev branch for DAO refactor 18252: SAIL-233: QName.hbm.xml 18295: Added missing CREATE TABLE statements for QName-related code 18324: SAIL-234: Node.hbm.xml: Node aspects initial integration 18355: Added 'setValue' method to manually update the cached value 18356: MV property stressing lowered to speed test up 18357: SAIL-234: Node.hbm.xml 18376: Pulled all Alfresco-related create SQL into script 18389: SAIL-234: Permissions DAO refactor - initial checkpoint 18390: Formatting only (line-endings) 18400: SAIL-234: Node.hbm.xml 18418: SAIL-234: Node.hbm.xml: 'alf_node_assoc' CRUD 18429: SAIL-234: Node.hbm.xml: Cleaned out all Hibernate references to NodeAssocImpl 18457: SAIL-234: Permissions DAO refactor 18959: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18479: SAIL-234: Node.hbm.xml - fix updateNode (missing id when saving oldDummyNode) 18482: SAIL-235: remove Permissions.hbm.xml 18517: SAIL-235: Permissions DAO refactor 18523: SAIL-234: Node.hbm.xml 18524: SAIL-235: Permissions DAO refactor 18960: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18533: Flipped back to Windows line endings 18535: Formatting-only (eol) 18540: Formatting-only (eol) 18541: SAIL-235: Permissions DAO refactor 18543: SAIL-234: Node.hbm.xml: Start alf_store changes 18567: SAIL-235: Permissions DAO refactor 18596: SAIL-305: Alfresco DDL - formatted/rationalized and added missing indexes & fk constraints 18603: SAIL-311: Minor cleanup for schema upgrade scripts (V3.3) 18604: SAIL-311: Remove empty dirs 18619: SAIL-274: Locale.hbm.xml 18621: Added method to create default ACL 18622: SAIL-234: Node.hbm.xml: Store, Transaction, Server and some node 18624: Formatting only (eol) 18631: SAIL-235: Permissions DAO refactor 18633: SAIL-235: Permissions DAO refactor - do not expose CRUD for AceContext (or AuthorityAlias) since currently unused 18639: getLocale(Locale) should return null if it doesn't exist 18640: SAIL-234 NodeDAO: More replacement of node queries and updates 18648: SAIL-310: Create SQL script for core repo tables (All DB ports) 18651: SAIL-234 NodeDAO: Moves across stores handle presence of target deleted nodes 18961: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18658: SAIL-274 Locale DAO: Missing getValueKey() method 18662: SAIL-235: Permissions DAO refactor - further cleanup (of DbAccessControlList usage, including copyACLs) 18664: DB scripts porting for PostgreSQL finished. 18668: SAIL-234 Node DAO: Note in case Transaction Change ID is dropped from indexes 18669: SAIL-234 Node DAO: deleteNode and archive (store move) fixes 18672: DB scripts porting for Oracle finished. 18675: SAIL-235: Permissions DAO refactor 18677: DB scripts porting for DB2 finished. 18964: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18687: Execute a callback with retries 18688: SAIL-234 Node DAO: Child association creation 18690: SAIL-234 Node DAO: Comment out raw creation of stores as it breaks subsequent bootstrap checks 18691: SAIL-234 Node DAO: More replacement of alf_child_assoc handling 18713: Commented about needing a more efficient removeChildAssociation method 18714: SAIL-234 Node DAO: Replaced queries on alf_child_assoc 18715: SAIL-234 Node DAO: More alf_child_assoc query replacement 18727: SAIL-234 Node DAO: alf_child_assoc queries complete 18737: SAIL-234 Node DAO: Tweaks to newNode and implemented prependPaths 18741: SAIL-234 and SAIL-334: Moved UsageDelta Hibernate code and queries over to UsageDeltaDAO 18748: SAIL-234 Node DAO: fix NPE (EditionServiceImplTest) 18769: SAIL-234 Node DAO: alf_node_properties ground work 18786: SAIL-234 Node DAO: alf_node_properties and cm:auditable properties 18810: Added EqualsHelper.getMapComparison 18813: TransactionalCache propagates cache clears and removals during rollback 18826: SAIL-234 Node DAO: Moved over sundry references to NodeDaoService to NodeDAO 18849: SAIL-237: UsageDelta.hbm.xml - eol formatting only (including removal of unwanted svn:eol-style=native property) 18869: SAIL-234 NodeDAO: Fixed more references to 'nodeDaoService' 18895: SAIL-234 NodeDAO: Queries for alf_transaction 18899: SAIL-234 Node DAO: Fixed bean fetching for 'nodeDAO' 18909: SAIL-234 NodeDAO: Fixes to getNodeRefStatus and various txn queries 18916: SAIL-234 NodeDAO: Fixed moveNode alf_child_assoc updates 18922: SAIL-235: DAO refactoring: Permission.hbm.xml 18930: SAIL-235: DAO refactoring: Permission.hbm.xml 18932: SAIL-234 NodeDAO: Fixing up gotchas, javadocs and some naming 18933: SAIL-234 NodeDAO: Minor neatening 18935: SAIL-234 Node DAO: Caches for ID to NodeRef and StoreRef 18936: EHCache config files line endings 18938: SAIL-237: Usage DAO refactor - initial checkpoint 18945: SAIL-235: DAO refactoring: Permission.hbm.xml. Move Node. 18975: Fix for move-node ACL jiggery-pokery 19067: SAIL-4: fix VersionHistoryImpl.getSuccessors (causing VersionServiceImplTest.testGetVersionHistorySameWorkspace failure) 19068: SAIL-234: fix VersionMigratorTest.testMigrateOneVersion 19074: SAIL-237: Usage DAO - update to common iBatis mapping pattern(s) to ease DB porting 19076: SAIL-231: Activities DAO - update to common iBatis mapping pattern(s) 19077: SAIL-232: AppliedPatch DAO - minor cleanup (comments & formatting only) 19092: Merging HEAD to DEV/V3.3-DAO-REFACTOR-2 18973: Temporarily comment out AVMTestSuite and run AVM tests individually 19056: AVM unit test improvements 19097: SAIL-235: DAO refactoring: Permission.hbm.xml: Additional index to support queries to find the id and acl id for the primary children of a node. 19185: SAIL-238: Permissions DAO - (minor) update to common iBatis mapping pattern 19289: SAIL-234 NodeDAO: Node cache replaces NodeRef cache 19302: SAIL-234 Node DAO: Added cache for node properties 19318: SAIL-4: AVM DAO - (minor) update to common iBatis mapping pattern 20690: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: 20063: (RECORD ONLY) DAO refactor branch V4 20146: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19401: SAIL-234 Node DAO: Fix permission service tests (setPrimaryChildrenSharedAclId needs to invalidate nodesCache) 19428: Fixed TransactionalCache issue with null and NullValueMarker 19429: Took empty cm:content creation out of FileFolderService#createImpl 19430: SAIL-234 Node DAO: Tweaks around caching and cm:auditable 19431: SAIL-4 DAO Refactor: Exception thrown when attempting writes in read-only txn have changed 19436: SAIL-234 Node DAO: Fix NPE during cm:auditable update 19475: Allow debugging of code without stepping into trivial stuff 19476: Follow-up on 19429 by ensuring CIFS/FTP set a mimetype on the ContentWriter 19477: SAIL-234 Node DAO: Leverage DAO better for NodeService.addProperties 19478: SAIL-234 NodeDAO: Added toString() for ParentAssocsInfo (cache value for parent assocs) 19479: SAIL-234 Node DAO: Fixed for parent association and property caches 19480: Made TransactionAwareSingleton bind-key a GUID 19481: SAIL-234 Node DAO: Reinstated 100K collection property tests 19482: SAIL-234 Node DAO: Node and property cache fixes highlighted by unit tests 19483: SAIL-234 Node DAO: Start on NodeBulkLoader implementation 19595: SAIL-234 Node DAO: Fix moveNode to detect cyclic relationship prior to updating ACLs for moved tree FileFolderServiceImplTest.testETHREEOH_3088_MoveIntoSelf) 20147: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19602: (RECORD ONLY) Reintegrated with HEAD up to rev 19433 19621: (RECORD ONLY) SAIL-347 19683: (RECORD ONLY) Reverse-merged 19621 for SAIL-347 19722: (RECORD ONLY) Merged /alfresco/HEAD:r19434-19721 20150: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19741: Merged DEV\V3.3-DAO-REFACTOR-2 to DEV\V3.3-DAO-REFACTOR-3 19739: Extended "move" tests 19743: Fix AuditableAspectTest.testAddAspect (to allow for node modified date tolerance) 19748: Remaining part of merge from HEAD to V3.3-DAO-REFACTOR-3 19367: Merged BRANCHES/V3.2 to HEAD: 19286: Fix for ALF-626 "Using 'null' as an authority argument in clearPermissions() cause a java.lang.NullPointerException" 19755: SAIL-234 Node DAO: Fix RepoAdminServiceImplTest.testConcurrentDynamicModelDelete (handle InvalidNodeRefException after getChildAssocs) 20692: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: - Retired all 1.3 and 1.4 upgrade scripts ... R.I.P. - Fixed CRC patch for Authorities (only tested on MySQL) - Fixed SQL patch revision numbers and bumped version schema number up 20158: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19773: SQL mappings and scripts: SAIL-310, SAIL-304, SAIL-303 and SAIL-347 19774: Futher fix for SAIL-310: Sequence patch must take into account sequences created for 3.3 19851: SAIL-371 (SAIL-294) NodeDAO fallout: Fix QName and Namespace read/write handling and bean name in unit test 20183: Merged DAO3 to DAO4 19852: SAIL-370: Remove LinkValidation 19853: SAIL-239 (SAIL-294) Attributes.hbm.xml: Added ability to attach arbitrary property to unique context 19857: SAIL-373 Fallout from Permissions DAO refactor (SAIL-235) 19864: SAIL-239 (SAIL-294): Removed AttributeService RMI API 19865: More SAIL-239 (SAIL-294): Removed AttributeService RMI API 20208: DAO-refactor implementation of ALF-2712 query improvements 20209: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20060: Removal of AttributeService for SAIL-239 (SAIL-294) 20348: SAIL-371 (SAIL-294): Protect collection properties during map insert and retrieval 20547: SAIL-371 (SAIL-294) Attributes.hbm.xml: implement getAttributes + fixes 20573: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests and other fallout 20597: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) 20598: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) - fix AssetServiceImplTest.testSimpleLockFile NPE 20600: Fix PropertyValueDAOTest.testPropertyValue_Enum (follow-on to r20060 for SAIL-239 - which introduces ENUM prop vals) 20601: Fix UsageDAOTest.testCreateAndDeleteUsageDeltas NPE (would also affect ContentStoreCleanerScalabilityRunner) 20603: Fix CMISPropertyServiceTest.* (fallout from r20146 <- r19429 <- Took empty cm:content creation out of FileFolderService#createImpl) 20604: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - TransferServiceImplTest.* 20618: SAIL-371 (SAIL-294): NodeDAO: AuditableAspectTest (fix testCreateNodeWithAuditableProperties_ALF_2565 + add remove aspect test) 20624: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - UserUsageTest.* 20626: Fixed random keys for RuleTrigger NodeRef tracking 20635: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - PersonTest.testSplitDuplicates 20642: SAIL-371 (SAIL-294) DAO: Fixed CacheTest 20643: Removed must of the 'distribute' target's dependencies. Not for HEAD 20645: Follow-on to r20643 (Removed most of the 'distribute' target's dependencies. Not for HEAD) 20654: SAIL-371 (SAIL-294): NodeDAO: DMDeploymentTargetTest.* (do not try to remove mandatory aspects) 20655: SAIL-371 (SAIL-294): NodeDAO: Initial fix for TaggingServiceImplTest.testTagScopeUpdateViaNodePolicies (+ minor test cleanup) 20657: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - VersionMigratorTest.testMigrateOneVersion (cm:accessed not returned if null) 20658: Merged (back merge only - no merge info) BRANCHES/V3.3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20090: Dynamic models: minor improvements to DictionaryModelType 20554: Improvement to model delete validation (investigating intermittent failure of RepoAdminServiceImplTest.testSimpleDynamicModelViaNodeService) 20662: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - RecordsManagementAuditServiceImplTest.* (we now ignore attempt to update 'cm:modifier' prop so update 'cm:title' prop instead) 20666: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - ADMLuceneTest.* 20668: SAIL-239 (SAIL-294) - delete WCM locks + tests (follow-on to r20060) 20674: SAIL-371 (SAIL-294) NodeDAO fallout: Cleaner and additional checks for ContentStoreCleaner 20675: SAIL-371 (SAIL-294) NodeDAO fallout: Fixed handling of ContentData git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@20693 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
1210 lines
54 KiB
Java
1210 lines
54 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.wcm.webproject;
|
|
|
|
import java.util.HashMap;
|
|
import java.util.HashSet;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Set;
|
|
|
|
import org.alfresco.error.AlfrescoRuntimeException;
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
|
import org.alfresco.service.cmr.avm.AVMExistsException;
|
|
import org.alfresco.service.cmr.avm.AVMNotFoundException;
|
|
import org.alfresco.service.cmr.avm.AVMService;
|
|
import org.alfresco.service.cmr.avm.AVMStoreDescriptor;
|
|
import org.alfresco.service.cmr.model.FileFolderService;
|
|
import org.alfresco.service.cmr.repository.DuplicateChildNodeNameException;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.security.AuthorityService;
|
|
import org.alfresco.service.cmr.security.AuthorityType;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.wcm.AbstractWCMServiceImplTest;
|
|
import org.alfresco.wcm.asset.AssetInfo;
|
|
import org.alfresco.wcm.sandbox.SandboxInfo;
|
|
import org.alfresco.wcm.util.WCMUtil;
|
|
|
|
/**
|
|
* Web Project Service implementation unit test
|
|
*
|
|
* @author janv
|
|
*/
|
|
public class WebProjectServiceImplTest extends AbstractWCMServiceImplTest
|
|
{
|
|
// web app names
|
|
private static final String TEST_WEBAPP = "myWebApp";
|
|
|
|
private static final String TEST_WEBAPP1 = TEST_WEBAPP+"-AppOne";
|
|
private static final String TEST_WEBAPP2 = TEST_WEBAPP+"-AppTwo";
|
|
private static final String TEST_WEBAPP3 = TEST_WEBAPP+"-AppThree";
|
|
|
|
// groups and additional users
|
|
private static final String TEST_GROUP = "testWebGroup-"+TEST_RUN;
|
|
|
|
private static final String USER_FIVE = TEST_USER+"-Five";
|
|
private static final String USER_SIX = TEST_USER+"-Six";
|
|
|
|
private static final String GROUP_ONE = TEST_GROUP+"-One";
|
|
|
|
private static final int SCALE_USERS = 5;
|
|
private static final int SCALE_WEBPROJECTS = 5;
|
|
private static final int SCALE_WEBAPPS = 5;
|
|
|
|
//
|
|
// services
|
|
//
|
|
|
|
private FileFolderService fileFolderService;
|
|
private AuthorityService authorityService;
|
|
private PermissionService permissionService;
|
|
private AVMService avmService;
|
|
private NodeService nodeService;
|
|
|
|
@Override
|
|
protected void setUp() throws Exception
|
|
{
|
|
super.setUp();
|
|
|
|
// Get the required services
|
|
fileFolderService = (FileFolderService)ctx.getBean("FileFolderService");
|
|
authorityService = (AuthorityService)ctx.getBean("AuthorityService");
|
|
permissionService = (PermissionService)ctx.getBean("PermissionService");
|
|
avmService = (AVMService)ctx.getBean("AVMService");
|
|
nodeService = (NodeService)ctx.getBean("NodeService");
|
|
|
|
createUser(USER_FIVE);
|
|
createUser(USER_SIX);
|
|
|
|
Set<String> userNames = new HashSet<String>(2);
|
|
userNames.add(USER_ONE);
|
|
userNames.add(USER_TWO);
|
|
|
|
createSimpleGroup(GROUP_ONE, userNames);
|
|
}
|
|
|
|
@Override
|
|
protected void tearDown() throws Exception
|
|
{
|
|
if (CLEAN)
|
|
{
|
|
// Switch back to Admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
deleteGroup(GROUP_ONE);
|
|
|
|
deleteUser(USER_FIVE);
|
|
deleteUser(USER_SIX);
|
|
}
|
|
|
|
super.tearDown();
|
|
}
|
|
|
|
private void createSimpleGroup(String shortName, Set<String> userNames)
|
|
{
|
|
String groupName = authorityService.getName(AuthorityType.GROUP, shortName);
|
|
if (authorityService.authorityExists(groupName) == false)
|
|
{
|
|
authorityService.createAuthority(AuthorityType.GROUP, shortName);
|
|
|
|
for (String userName : userNames)
|
|
{
|
|
authorityService.addAuthority(groupName, userName);
|
|
}
|
|
}
|
|
}
|
|
|
|
private void deleteGroup(String shortName)
|
|
{
|
|
String groupName = authorityService.getName(AuthorityType.GROUP, shortName);
|
|
if (authorityService.authorityExists(groupName) == true)
|
|
{
|
|
authorityService.deleteAuthority(groupName);
|
|
}
|
|
}
|
|
|
|
public void testCreateWebProjectSimple()
|
|
{
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-webProjSimple", TEST_WEBPROJ_NAME+"-webProjSimple", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
assertNotNull(wpInfo);
|
|
}
|
|
|
|
public void testCreateWebProject()
|
|
{
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-create", TEST_WEBPROJ_NAME+"-create", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-create", TEST_WEBPROJ_NAME+"-create", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
// Duplicate web project dns/store name
|
|
try
|
|
{
|
|
// Try to create duplicate web project dns/store (-ve test)
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-create", TEST_WEBPROJ_NAME+"-x", TEST_WEBPROJ_TITLE+"x", TEST_WEBPROJ_DESCRIPTION+"x", TEST_WEBPROJ_DEFAULT_WEBAPP+"x", TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't allow duplicate web project dns/store name");
|
|
}
|
|
catch (AlfrescoRuntimeException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Duplicate web project folder/name
|
|
try
|
|
{
|
|
// Try to create duplicate web project folder/name (-ve test)
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"x", TEST_WEBPROJ_NAME+"-create", TEST_WEBPROJ_TITLE+"x", TEST_WEBPROJ_DESCRIPTION+"x", TEST_WEBPROJ_DEFAULT_WEBAPP+"x", TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't allow duplicate web project folder/name");
|
|
}
|
|
catch (DuplicateChildNodeNameException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Mangled case
|
|
String dnsName = TEST_WEBPROJ_DNS+"some.unexpected.chars";
|
|
String name = dnsName + " name";
|
|
String mangledDnsName = TEST_WEBPROJ_DNS+"some-unexpected-chars";
|
|
|
|
wpInfo = wpService.createWebProject(dnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
checkWebProjectInfo(wpInfo, mangledDnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
wpInfo = wpService.getWebProject(mangledDnsName);
|
|
checkWebProjectInfo(wpInfo, mangledDnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
// Another mangled case
|
|
dnsName = TEST_WEBPROJ_DNS+"some.moreé1í2ó3ú4Á5É6Í7Ó8Ú9";
|
|
mangledDnsName = TEST_WEBPROJ_DNS+"some-more-1-2-3-4-5-6-7-8-9";
|
|
|
|
name = dnsName + " name";
|
|
|
|
wpInfo = wpService.createWebProject(dnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
checkWebProjectInfo(wpInfo, mangledDnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
wpInfo = wpService.getWebProject(mangledDnsName);
|
|
checkWebProjectInfo(wpInfo, mangledDnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
// Invalid dns name (with '--')
|
|
dnsName = "my--dns";
|
|
name = dnsName + " name";
|
|
try
|
|
{
|
|
// Try to create invalid web project with invalid dns name (-ve test)
|
|
wpInfo = wpService.createWebProject(dnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't be able to create web project with '--'");
|
|
}
|
|
catch (IllegalArgumentException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Invalid mangled case
|
|
dnsName = "!£$%^&*()_+=-[]{}"; // generates mangled dns name = x---------------x
|
|
name = dnsName + " name";
|
|
try
|
|
{
|
|
// Try to create invalid web project (-ve test)
|
|
wpInfo = wpService.createWebProject(dnsName, name, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't be able to create web project with '--'");
|
|
}
|
|
catch (IllegalArgumentException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
// note: requires "add_children" rights on "Web Projects" root space
|
|
// eg. DM coordinator, collaborator or contributor (not editor or consumer)
|
|
public void testCreateWebProjectAsNonAdmin()
|
|
{
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
try
|
|
{
|
|
// Try to create web project (-ve test)
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-createAsNonAdmin", TEST_WEBPROJ_NAME+"-createAsNonAdmin", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't allow anyone to create web project by default");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to Admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
NodeRef wpRootNodeRef = wpService.getWebProjectsRoot();
|
|
|
|
// note: implies "coordinator", "collaborator" or "contributor" (not "editor" or "consumer") - see permissionsDefinition.xml
|
|
permissionService.setPermission(wpRootNodeRef, USER_ONE, PermissionService.ADD_CHILDREN, true);
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-createAsNonAdmin", TEST_WEBPROJ_NAME+"-createAsNonAdmin", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-createAsNonAdmin", TEST_WEBPROJ_NAME+"-createAsNonAdmin", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
// test list and invite users
|
|
assertEquals(1, wpService.listWebUsers(wpInfo.getStoreId()).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpInfo.getStoreId()).get(USER_ONE));
|
|
|
|
wpService.inviteWebUser(wpInfo.getStoreId(), USER_TWO, WCMUtil.ROLE_CONTENT_PUBLISHER);
|
|
|
|
assertEquals(2, wpService.listWebUsers(wpInfo.getStoreId()).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpInfo.getStoreId()).get(USER_TWO));
|
|
|
|
// Switch back to Admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
permissionService.setPermission(wpRootNodeRef, USER_TWO, PermissionService.EDITOR, true);
|
|
permissionService.setPermission(wpRootNodeRef, USER_THREE, PermissionService.CONSUMER, true);
|
|
|
|
permissionService.setPermission(wpRootNodeRef, USER_FOUR, PermissionService.COORDINATOR, true);
|
|
permissionService.setPermission(wpRootNodeRef, USER_FIVE, PermissionService.CONTRIBUTOR, true);
|
|
permissionService.setPermission(wpRootNodeRef, USER_SIX, "Collaborator", true);
|
|
|
|
// Switch to USER_TWO
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
|
|
|
try
|
|
{
|
|
// Try to create web project with "editor" rights to web project root (-ve test)
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-ano", TEST_WEBPROJ_NAME+"-ano", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't allow anyone to create web project by default");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch to USER_THREE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_THREE);
|
|
|
|
try
|
|
{
|
|
// Try to create web project with "comsumer" rights to web project root (-ve test)
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-ano", TEST_WEBPROJ_NAME+"-ano", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
fail("Shouldn't allow anyone to create web project by default");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch to USER_FOUR
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_FOUR);
|
|
|
|
// Create a web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-createAsCoordinator", TEST_WEBPROJ_NAME+"-createAsCoordinator", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-createAsCoordinator", TEST_WEBPROJ_NAME+"-createAsCoordinator", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
}
|
|
|
|
private void checkWebProjectInfo(WebProjectInfo wpInfo, String expectedStoreId, String expectedName, String expectedTitle,
|
|
String expectedDescription, String expectedDefaultWebApp, boolean expectedUseAsTemplate)
|
|
{
|
|
assertNotNull(wpInfo);
|
|
assertEquals(expectedStoreId, wpInfo.getStoreId());
|
|
assertEquals(expectedName, wpInfo.getName());
|
|
assertEquals(expectedTitle, wpInfo.getTitle());
|
|
assertEquals(expectedDescription, wpInfo.getDescription());
|
|
assertEquals(expectedDefaultWebApp, wpInfo.getDefaultWebApp());
|
|
assertEquals(expectedUseAsTemplate, wpInfo.isTemplate());
|
|
assertNotNull(wpInfo.getNodeRef());
|
|
}
|
|
|
|
public void testListWebProjects() throws Exception
|
|
{
|
|
// As admin, check for existing projects
|
|
List<WebProjectInfo> webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
int cnt = webProjects.size();
|
|
|
|
// Create some web projects
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-list1", TEST_WEBPROJ_NAME+" list1", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-list2", TEST_WEBPROJ_NAME+" list2", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-list3", TEST_WEBPROJ_NAME+" list3", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-list4", TEST_WEBPROJ_NAME+" list4", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
|
|
// Get all the web projects for the current user
|
|
webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
assertEquals((cnt + 4), webProjects.size());
|
|
|
|
// Do detailed check of the web project info objects
|
|
for (WebProjectInfo wpInfo : webProjects)
|
|
{
|
|
String wpStoreId = wpInfo.getStoreId();
|
|
if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list1") == true)
|
|
{
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-list1", TEST_WEBPROJ_NAME+" list1", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, WCMUtil.DIR_ROOT, false);
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list2") == true)
|
|
{
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-list2", TEST_WEBPROJ_NAME+" list2", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true);
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list3") == true)
|
|
{
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-list3", TEST_WEBPROJ_NAME+" list3", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, WCMUtil.DIR_ROOT, false);
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list4") == true)
|
|
{
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-list4", TEST_WEBPROJ_NAME+" list4", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true);
|
|
}
|
|
else
|
|
{
|
|
//fail("The web project store id " + wpStoreId + " is not recognised");
|
|
System.out.println("The web project store id " + wpStoreId + " is not recognised");
|
|
}
|
|
}
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
// Get all the web projects for the current user
|
|
webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
|
|
if (! webProjects.isEmpty())
|
|
{
|
|
for (WebProjectInfo wpInfo : webProjects)
|
|
{
|
|
String wpStoreId = wpInfo.getStoreId();
|
|
if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list-1") == true)
|
|
{
|
|
fail("User should not see "+TEST_WEBPROJ_DNS+"-list-1");
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list-2") == true)
|
|
{
|
|
fail("User should not see "+TEST_WEBPROJ_DNS+"-list-2");
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list-3") == true)
|
|
{
|
|
fail("User should not see "+TEST_WEBPROJ_DNS+"-list-3");
|
|
}
|
|
else if (wpStoreId.equals(TEST_WEBPROJ_DNS+"-list-4") == true)
|
|
{
|
|
fail("User should not see "+TEST_WEBPROJ_DNS+"-list-4");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
cnt = webProjects.size();
|
|
|
|
NodeRef wpRoot = wpService.getWebProjectsRoot();
|
|
|
|
fileFolderService.create(wpRoot, "a folder "+TEST_RUN, ContentModel.TYPE_FOLDER);
|
|
fileFolderService.create(wpRoot, "some content "+TEST_RUN, ContentModel.TYPE_CONTENT);
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
assertEquals(cnt, webProjects.size());
|
|
}
|
|
|
|
public void testGetWebProject()
|
|
{
|
|
// Get a web project that isn't there
|
|
WebProjectInfo wpInfo = wpService.getWebProject(TEST_WEBPROJ_DNS+"-get");
|
|
assertNull(wpInfo);
|
|
|
|
// Create a web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-get", TEST_WEBPROJ_NAME+"-get", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
|
|
// Get the web project - test using wpStoreId
|
|
wpInfo = wpService.getWebProject(wpInfo.getStoreId());
|
|
assertNotNull(wpInfo);
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-get", TEST_WEBPROJ_NAME+"-get", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
|
|
// Get the web project - test using wpStoreNodeRef
|
|
wpInfo = wpService.getWebProject(wpInfo.getNodeRef());
|
|
assertNotNull(wpInfo);
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-get", TEST_WEBPROJ_NAME+"-get", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_USE_AS_TEMPLATE);
|
|
}
|
|
|
|
public void testUpdateWebProject()
|
|
{
|
|
WebProjectInfo wpInfo = new WebProjectInfoImpl(TEST_WEBPROJ_DNS+"-update", TEST_WEBPROJ_NAME+"-update", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, false, null, null);
|
|
|
|
try
|
|
{
|
|
// Try to update a web project that isn't there (-ve test)
|
|
wpService.updateWebProject(wpInfo);
|
|
fail("Shouldn't be able to update a web project that does not exist");
|
|
}
|
|
catch (AlfrescoRuntimeException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Create a test web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-update", TEST_WEBPROJ_NAME+"-update", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
|
|
wpInfo.setName("changedName"+TEST_RUN);
|
|
wpInfo.setTitle("changedTitle");
|
|
wpInfo.setDescription("changedDescription");
|
|
wpInfo.setIsTemplate(false);
|
|
|
|
// Update the details of the web project
|
|
wpService.updateWebProject(wpInfo);
|
|
wpInfo = wpService.getWebProject(wpInfo.getStoreId());
|
|
checkWebProjectInfo(wpInfo, TEST_WEBPROJ_DNS+"-update", "changedName"+TEST_RUN, "changedTitle", "changedDescription", TEST_WEBPROJ_DEFAULT_WEBAPP, false);
|
|
}
|
|
|
|
public void testDeleteWebProject()
|
|
{
|
|
// Create a test web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-delete", TEST_WEBPROJ_NAME+"-delete", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
String wpStoreId = wpInfo.getStoreId();
|
|
assertNotNull(wpService.getWebProject(wpStoreId));
|
|
|
|
// Create ANOther web project
|
|
WebProjectInfo wpAnoInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-delete ano", TEST_WEBPROJ_NAME+"-delete ano", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
String wpStoreAnoId = wpAnoInfo.getStoreId();
|
|
|
|
assertEquals(2, sbService.listSandboxes(wpStoreId).size());
|
|
assertEquals(2, sbService.listSandboxes(wpStoreAnoId).size());
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
try
|
|
{
|
|
// Try to delete the web project as a non-content-manager (-ve test)
|
|
wpService.deleteWebProject(wpStoreId);
|
|
fail("Shouldn't be able to delete the web project since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch user to System
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getSystemUserName());
|
|
|
|
try
|
|
{
|
|
// Try to delete the web project as a non-content-manager (such as System) (-ve test)
|
|
wpService.deleteWebProject(wpStoreId);
|
|
fail("Shouldn't be able to delete the web project since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to admin
|
|
String adminUser = AuthenticationUtil.getAdminUserName();
|
|
AuthenticationUtil.setFullyAuthenticatedUser(adminUser);
|
|
|
|
String defaultWebApp = wpInfo.getDefaultWebApp();
|
|
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpStoreId);
|
|
String authorSandboxId = sbInfo.getSandboxId();
|
|
String authorSandboxPath = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
|
|
|
for (int i = 1; i <= 10; i++)
|
|
{
|
|
assetService.createFile(authorSandboxId, authorSandboxPath, "myFile-"+i, null);
|
|
|
|
String relPath = authorSandboxPath + "/" + "myFile-"+i;
|
|
assertEquals(adminUser, avmLockingService.getLockOwner(wpStoreId, relPath));
|
|
}
|
|
|
|
// Delete the web project
|
|
wpService.deleteWebProject(wpStoreId);
|
|
assertNull(wpService.getWebProject(wpStoreId));
|
|
|
|
// Check locks have been removed
|
|
for (int i = 1; i <= 10; i++)
|
|
{
|
|
String relPath = authorSandboxPath + "/" + "myFile-"+i;
|
|
assertNull("Lock still exists: "+relPath, avmLockingService.getLockOwner(wpStoreId, relPath));
|
|
}
|
|
|
|
assertEquals(0, sbService.listSandboxes(wpStoreId).size());
|
|
assertEquals(2, sbService.listSandboxes(wpStoreAnoId).size());
|
|
|
|
try
|
|
{
|
|
// Try to delete a web project that isn't there (-ve test)
|
|
wpService.deleteWebProject("someRandomWebProject");
|
|
fail("Shouldn't be able to delete the web project since it does not exist (or is not visible to current user)");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Create another test web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-delete2", TEST_WEBPROJ_NAME+"-delete2", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
assertNotNull(wpService.getWebProject(wpInfo.getStoreId()));
|
|
|
|
wpService.inviteWebUser(wpInfo.getNodeRef(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, false);
|
|
|
|
// Switch to USER_TWO
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
|
|
|
try
|
|
{
|
|
// Try to delete a web project that isn't there (-ve test)
|
|
wpService.deleteWebProject(TEST_WEBPROJ_DNS+"-delete2");
|
|
fail("Shouldn't be able to delete the web project since it does not exist (or is not visible to current user)");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
// Delete the web project
|
|
wpService.deleteWebProject(TEST_WEBPROJ_DNS+"-delete2");
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create another test web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-delete3", TEST_WEBPROJ_NAME+"-delete3", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, true, null);
|
|
wpStoreId = wpInfo.getStoreId();
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
defaultWebApp = wpInfo.getDefaultWebApp();
|
|
|
|
sbInfo = sbService.getAuthorSandbox(wpStoreId);
|
|
authorSandboxId = sbInfo.getSandboxId();
|
|
|
|
// no changes yet
|
|
List<AssetInfo> assets = sbService.listChangedAll(authorSandboxId, true);
|
|
assertEquals(0, assets.size());
|
|
|
|
authorSandboxPath = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
|
|
|
for (int i = 1; i <= 100; i++)
|
|
{
|
|
assetService.createFile(authorSandboxId, authorSandboxPath, "myFile-"+i, null);
|
|
}
|
|
|
|
sbService.submitAll(authorSandboxId, "s1", "s2");
|
|
|
|
// delete immediately - don't wait for async submit to finish - this should leave an in-flight workflow
|
|
|
|
wpService.deleteWebProject(wpStoreId);
|
|
|
|
List<AVMStoreDescriptor> avmStores = avmService.getStores();
|
|
for (AVMStoreDescriptor avmStore : avmStores)
|
|
{
|
|
assertFalse("Unexpected store: "+avmStore.getName(), avmStore.getName().startsWith(wpStoreId));
|
|
}
|
|
|
|
NodeRef wpArchiveNodeRef = new NodeRef(nodeService.getStoreArchiveNode(wpNodeRef.getStoreRef()).getStoreRef(), wpNodeRef.getId());
|
|
assertFalse(nodeService.exists(wpArchiveNodeRef));
|
|
|
|
// TODO add more tests when WCM services explicitly support WCM workflows (eg. submit approval)
|
|
}
|
|
|
|
public void testCreateWebApp()
|
|
{
|
|
// Create a web project with a default webapp
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-createWebApp", TEST_WEBPROJ_NAME+"-createWebApp", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBAPP1, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
|
|
// Switch user to System
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getSystemUserName());
|
|
|
|
try
|
|
{
|
|
// Try to create another webapp as a non-content-manager (such as System) (-ve test)
|
|
wpService.createWebApp(wpInfo.getStoreId(), TEST_WEBAPP2, TEST_WEBPROJ_DESCRIPTION);
|
|
fail("Shouldn't be able to create a webapp since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create another webapp - test using wpStoreId
|
|
wpService.createWebApp(wpInfo.getStoreId(), TEST_WEBAPP2, TEST_WEBPROJ_DESCRIPTION);
|
|
|
|
try
|
|
{
|
|
// Try to create duplicate webapp (-ve test)
|
|
wpService.createWebApp(wpInfo.getStoreId(), TEST_WEBAPP2, TEST_WEBPROJ_DESCRIPTION);
|
|
fail("Shouldn't allow duplicate webapp name");
|
|
}
|
|
catch (AVMExistsException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Create another webapp - test using wpNodeRef
|
|
wpService.createWebApp(wpInfo.getNodeRef(), TEST_WEBAPP3, TEST_WEBPROJ_DESCRIPTION);
|
|
}
|
|
|
|
public void testListWebApps()
|
|
{
|
|
try
|
|
{
|
|
// Try to list webapps (-ve test)
|
|
wpService.listWebApps(new NodeRef("dummy://dummy/dummy"));
|
|
fail("Shouldn't be able to list webapps for a non-existent web project");
|
|
}
|
|
catch (IllegalArgumentException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Create a web project with default ROOT webapp
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-listWebApps", TEST_WEBPROJ_NAME+"-listWebApps", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
// List web apps - test using wpStoreId
|
|
List<String> webAppNames = wpService.listWebApps(wpInfo.getStoreId());
|
|
assertNotNull(webAppNames);
|
|
assertEquals(1, webAppNames.size());
|
|
assertTrue(webAppNames.contains(WCMUtil.DIR_ROOT));
|
|
|
|
// List web apps - test using wpNodeRef
|
|
webAppNames = wpService.listWebApps(wpNodeRef);
|
|
assertNotNull(webAppNames);
|
|
assertEquals(1, webAppNames.size());
|
|
assertTrue(webAppNames.contains(WCMUtil.DIR_ROOT));
|
|
|
|
// Create some more webapps
|
|
wpService.createWebApp(wpNodeRef, TEST_WEBAPP1, TEST_WEBPROJ_DESCRIPTION);
|
|
wpService.createWebApp(wpNodeRef, TEST_WEBAPP2, TEST_WEBPROJ_DESCRIPTION);
|
|
wpService.createWebApp(wpNodeRef, TEST_WEBAPP3, TEST_WEBPROJ_DESCRIPTION);
|
|
|
|
webAppNames = wpService.listWebApps(wpNodeRef);
|
|
assertEquals(4, webAppNames.size());
|
|
assertTrue(webAppNames.contains(WCMUtil.DIR_ROOT));
|
|
assertTrue(webAppNames.contains(TEST_WEBAPP1));
|
|
assertTrue(webAppNames.contains(TEST_WEBAPP2));
|
|
assertTrue(webAppNames.contains(TEST_WEBAPP3));
|
|
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP1);
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP2);
|
|
|
|
webAppNames = wpService.listWebApps(wpNodeRef);
|
|
assertEquals(2, webAppNames.size());
|
|
assertTrue(webAppNames.contains(WCMUtil.DIR_ROOT));
|
|
assertTrue(webAppNames.contains(TEST_WEBAPP3));
|
|
}
|
|
|
|
public void testDeleteWebApp()
|
|
{
|
|
// Create a webapp
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-deleteWebApp", TEST_WEBPROJ_NAME+"-deleteWebApp", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBAPP1, TEST_WEBPROJ_USE_AS_TEMPLATE, null);
|
|
|
|
String wpStoreId = wpInfo.getStoreId();
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
// Create a webapp
|
|
wpService.createWebApp(wpNodeRef, TEST_WEBAPP2, TEST_WEBPROJ_DESCRIPTION);
|
|
|
|
// Create another webapp
|
|
wpService.createWebApp(wpNodeRef, TEST_WEBAPP3, TEST_WEBPROJ_DESCRIPTION);
|
|
|
|
// Switch user to System
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getSystemUserName());
|
|
|
|
try
|
|
{
|
|
// Try to delete the webapp a non-content-manager (such as System) (-ve test)
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP2);
|
|
fail("Shouldn't be able to delete the webapp since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
try
|
|
{
|
|
// Try to delete default webapp (-ve test)
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP1);
|
|
fail("Shouldn't be able to delete the default webapp");
|
|
}
|
|
catch (AlfrescoRuntimeException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Change default webapp
|
|
wpInfo = wpService.getWebProject(wpNodeRef);
|
|
wpInfo.setDefaultWebApp(TEST_WEBAPP3);
|
|
wpService.updateWebProject(wpInfo);
|
|
|
|
// Delete non-default webapp - test using wpStoreId
|
|
wpService.deleteWebApp(wpStoreId, TEST_WEBAPP1);
|
|
|
|
// Delete another webapp - test using wpNodeRef
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP2);
|
|
|
|
try
|
|
{
|
|
// Try to delete last / default webapp (-ve test)
|
|
wpService.deleteWebApp(wpNodeRef, TEST_WEBAPP3);
|
|
fail("Shouldn't be able to delete the default webapp");
|
|
}
|
|
catch (AlfrescoRuntimeException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// TODO - Test delete of non-empty webapp
|
|
|
|
try
|
|
{
|
|
// Try to delete a webapp that does not exist (-ve test)
|
|
wpService.deleteWebApp(wpNodeRef, "someRandomWebApp");
|
|
fail("Shouldn't be able to delete the webapp since it does not exist");
|
|
}
|
|
catch (AVMNotFoundException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Test inviteWebUsers
|
|
*/
|
|
public void testMultiInviteAndListWebUsers()
|
|
{
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
List<WebProjectInfo> webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
int userOneWebProjectCount = webProjects.size();
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-inviteWebUsers", TEST_WEBPROJ_NAME+"-inviteWebUsers", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
|
|
Map<String, String> userGroupRoles = new HashMap<String, String>();
|
|
userGroupRoles.put(USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER);
|
|
userGroupRoles.put(USER_TWO, WCMUtil.ROLE_CONTENT_PUBLISHER);
|
|
|
|
// Invite web users - test using wpStoreId
|
|
wpService.inviteWebUsersGroups(wpInfo.getStoreId(), userGroupRoles);
|
|
|
|
userGroupRoles = new HashMap<String, String>();
|
|
userGroupRoles.put(USER_THREE, WCMUtil.ROLE_CONTENT_REVIEWER);
|
|
|
|
// Invite web users - test using wpNodeRef
|
|
wpService.inviteWebUsersGroups(wpNodeRef, userGroupRoles, false);
|
|
|
|
assertEquals(4, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(USER_ONE));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpNodeRef).get(USER_TWO));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_REVIEWER, wpService.listWebUsers(wpNodeRef).get(USER_THREE));
|
|
|
|
// Switch to USER_ONE (a content manager for this web project)
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
assertEquals(userOneWebProjectCount+1, webProjects.size());
|
|
|
|
// Start: Test fix ETWOTWO-567
|
|
|
|
// Test newly invited content manager can invite other
|
|
userGroupRoles = new HashMap<String, String>();
|
|
userGroupRoles.put(USER_FIVE, WCMUtil.ROLE_CONTENT_CONTRIBUTOR);
|
|
|
|
wpService.inviteWebUsersGroups(wpNodeRef, userGroupRoles, false);
|
|
|
|
// Finish: Test fix ETWOTWO-567
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create a web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-inviteWebUsers2", TEST_WEBPROJ_NAME+"-inviteWebUsers2", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
|
|
userGroupRoles = new HashMap<String, String>();
|
|
|
|
userGroupRoles.put(authorityService.getName(AuthorityType.GROUP, GROUP_ONE), WCMUtil.ROLE_CONTENT_PUBLISHER);
|
|
|
|
// Invite group as a set of (flattened) web users - test using wpStoreId
|
|
wpService.inviteWebUsersGroups(wpInfo.getStoreId(), userGroupRoles);
|
|
|
|
assertEquals(3, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpNodeRef).get(USER_ONE));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpNodeRef).get(USER_TWO));
|
|
}
|
|
|
|
/**
|
|
* Test inviteWebUser - and listWebProjects / listWebUsers / isWebUser
|
|
*/
|
|
public void testInviteAndListWebUsers()
|
|
{
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
List<WebProjectInfo> webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
int userOneWebProjectCount = webProjects.size();
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-inviteWebUser1", TEST_WEBPROJ_NAME+"-inviteWebUser1", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
assertTrue(wpService.isWebUser(wpNodeRef, AuthenticationUtil.getAdminUserName()));
|
|
assertFalse(wpService.isWebUser(wpNodeRef, USER_ONE));
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
|
|
// Invite one web user - test using wpStoreId
|
|
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_PUBLISHER);
|
|
|
|
// Invite one web user - test using wpNodeRef
|
|
wpService.inviteWebUser(wpNodeRef, USER_TWO, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
|
|
|
assertEquals(3, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpNodeRef).get(USER_ONE));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(USER_TWO));
|
|
|
|
assertTrue(wpService.isWebUser(wpInfo.getStoreId(), USER_ONE));
|
|
assertTrue(wpService.isWebUser(wpNodeRef, USER_TWO));
|
|
|
|
// Create another web project
|
|
wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-inviteWebUser2", TEST_WEBPROJ_NAME+"-inviteWebUser2", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
NodeRef wpNodeRef2 = wpInfo.getNodeRef();
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef2).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef2).get(AuthenticationUtil.getAdminUserName()));
|
|
|
|
assertFalse(wpService.isWebUser(wpInfo.getStoreId(), USER_ONE));
|
|
assertFalse(wpService.isWebUser(wpNodeRef2, USER_TWO));
|
|
|
|
wpService.inviteWebUser(wpNodeRef2, USER_TWO, WCMUtil.ROLE_CONTENT_PUBLISHER, false);
|
|
wpService.inviteWebUser(wpNodeRef2, USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, false);
|
|
|
|
assertEquals(3, wpService.listWebUsers(wpNodeRef2).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_PUBLISHER, wpService.listWebUsers(wpNodeRef2).get(USER_TWO));
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef2).get(USER_ONE));
|
|
|
|
assertTrue(wpService.isWebUser(wpInfo.getStoreId(), USER_ONE));
|
|
assertTrue(wpService.isWebUser(wpNodeRef2, USER_TWO));
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
assertEquals(userOneWebProjectCount+2, webProjects.size());
|
|
|
|
// Switch to USER_TWO
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
|
|
|
try
|
|
{
|
|
// Try to invite web user as a non-content-manager (-ve test)
|
|
wpService.inviteWebUser(wpNodeRef2, USER_THREE, WCMUtil.ROLE_CONTENT_REVIEWER, false);
|
|
fail("Shouldn't be able to invite web user since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
/* System can invite due to ALFCOM-2388 - need to review System in general
|
|
// Switch user to System
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getSystemUserName());
|
|
|
|
try
|
|
{
|
|
// Try to invite web user as a non-content-manager (such as System) (-ve test)
|
|
wpService.inviteWebUser(wpNodeRef2, USER_THREE, WCMUtil.ROLE_CONTENT_REVIEWER, false);
|
|
fail("Shouldn't be able to invite web user since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
*/
|
|
|
|
// Test newly invited content manager can invite other
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
assertFalse(wpService.isWebUser(wpNodeRef2, USER_THREE));
|
|
|
|
// Invite web user
|
|
wpService.inviteWebUser(wpNodeRef2, USER_THREE, WCMUtil.ROLE_CONTENT_REVIEWER, false);
|
|
|
|
assertTrue(wpService.isWebUser(wpNodeRef2, USER_THREE));
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
assertEquals(4, wpService.listWebUsers(wpNodeRef2).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_REVIEWER, wpService.listWebUsers(wpNodeRef2).get(USER_THREE));
|
|
}
|
|
|
|
/**
|
|
* Test uninviteWebUser - and listWebProjects / listWebUsers / isWebUser
|
|
*/
|
|
public void testUninviteAndListWebUsers()
|
|
{
|
|
// Switch to USER_FOUR
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_FOUR);
|
|
|
|
List<WebProjectInfo> webProjects = wpService.listWebProjects();
|
|
assertNotNull(webProjects);
|
|
int userFourWebProjectCount = webProjects.size();
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Create a web project
|
|
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-uninviteWebUser", TEST_WEBPROJ_NAME+"-uninviteWebUser", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION);
|
|
NodeRef wpNodeRef = wpInfo.getNodeRef();
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
|
|
assertTrue(wpService.isWebUser(wpNodeRef, AuthenticationUtil.getAdminUserName()));
|
|
assertFalse(wpService.isWebUser(wpNodeRef, USER_FOUR));
|
|
assertFalse(wpService.isWebUser(wpNodeRef, USER_ONE));
|
|
|
|
wpService.inviteWebUser(wpNodeRef, USER_FOUR, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, false);
|
|
|
|
assertEquals(2, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_CONTRIBUTOR, wpService.listWebUsers(wpNodeRef).get(USER_FOUR));
|
|
assertTrue(wpService.isWebUser(wpNodeRef, USER_FOUR));
|
|
|
|
wpService.inviteWebUser(wpNodeRef, USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, false);
|
|
|
|
assertEquals(3, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(USER_ONE));
|
|
assertTrue(wpService.isWebUser(wpNodeRef, USER_ONE));
|
|
|
|
// Switch to USER_FOUR
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_FOUR);
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
assertEquals(userFourWebProjectCount+1, webProjects.size());
|
|
|
|
// Switch to USER_TWO
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
|
|
|
try
|
|
{
|
|
// Try to uninvite web user as a non-content-manager (-ve test)
|
|
wpService.uninviteWebUser(wpNodeRef, USER_FOUR, false);
|
|
fail("Shouldn't be able to uninvite web user since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch user to System
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getSystemUserName());
|
|
|
|
try
|
|
{
|
|
// Try to uninvite web user as a non-content-manager (such as System) (-ve test)
|
|
wpService.uninviteWebUser(wpNodeRef, USER_FOUR, false);
|
|
fail("Shouldn't be able to uninvite web user since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Uninvite web user - test using wpStoreId
|
|
wpService.uninviteWebUser(wpInfo.getStoreId(), USER_FOUR);
|
|
|
|
assertEquals(2, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(null, wpService.listWebUsers(wpNodeRef).get(USER_FOUR));
|
|
assertFalse(wpService.isWebUser(wpNodeRef, USER_FOUR));
|
|
|
|
// Switch to USER_FOUR
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_FOUR);
|
|
|
|
webProjects = wpService.listWebProjects();
|
|
assertEquals(userFourWebProjectCount, webProjects.size());
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Content manager can uninvite themself
|
|
// Uninvite web user - test using wpNodeRef
|
|
wpService.uninviteWebUser(wpNodeRef, AuthenticationUtil.getAdminUserName(), false);
|
|
|
|
// Note: All admin authorities are implicitly a web user and content manager (across all web projects) even if not explicitly invited
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(null, wpService.listWebUsers(wpNodeRef).get(AuthenticationUtil.getAdminUserName()));
|
|
assertTrue(wpService.isWebUser(wpNodeRef, AuthenticationUtil.getAdminUserName()));
|
|
assertTrue(wpService.isContentManager(wpNodeRef, AuthenticationUtil.getAdminUserName()));
|
|
|
|
// Switch to USER_ONE
|
|
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
|
|
|
assertEquals(1, wpService.listWebUsers(wpNodeRef).size());
|
|
assertEquals(WCMUtil.ROLE_CONTENT_MANAGER, wpService.listWebUsers(wpNodeRef).get(USER_ONE));
|
|
|
|
// Delete user (in this case, last invited content manager)
|
|
wpService.uninviteWebUser(wpNodeRef, USER_ONE, false);
|
|
assertFalse(wpService.isWebUser(wpNodeRef, USER_ONE));
|
|
|
|
try
|
|
{
|
|
// Try to delete the web project as a non-content-manager (-ve test)
|
|
wpService.deleteWebProject(wpNodeRef);
|
|
fail("Shouldn't be able to delete the web project since not a content manager");
|
|
}
|
|
catch (AccessDeniedException exception)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
// Switch back to admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
// Note: All admin authorities are implicitly a web user and content manager (across all web projects) even if not explicitly invited
|
|
assertEquals(0, wpService.listWebUsers(wpNodeRef).size());
|
|
assertTrue(wpService.isWebUser(wpNodeRef, AuthenticationUtil.getAdminUserName()));
|
|
assertTrue(wpService.isContentManager(wpInfo.getStoreId(), AuthenticationUtil.getAdminUserName()));
|
|
|
|
// delete web project
|
|
wpService.deleteWebProject(wpNodeRef);
|
|
}
|
|
|
|
public void testPseudoScaleTest()
|
|
{
|
|
long start = System.currentTimeMillis();
|
|
|
|
long split = start;
|
|
|
|
for (int i = 1; i <= SCALE_USERS; i++)
|
|
{
|
|
createUser(TEST_USER+"-"+i);
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: created "+SCALE_USERS+" users in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_WEBPROJECTS; i++)
|
|
{
|
|
wpService.createWebProject(TEST_WEBPROJ_DNS+"-"+i, TEST_WEBPROJ_NAME+"-"+i, TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION); // ignore return
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: created "+SCALE_WEBPROJECTS+" web projects in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_WEBPROJECTS; i++)
|
|
{
|
|
WebProjectInfo wpInfo = wpService.getWebProject(TEST_WEBPROJ_DNS+"-"+i);
|
|
for (int j = 1; j <= SCALE_WEBAPPS; j++)
|
|
{
|
|
wpService.createWebApp(wpInfo.getNodeRef(), TEST_WEBAPP+"-"+j, TEST_WEBAPP+"-"+j);
|
|
}
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: created additional "+SCALE_WEBAPPS+" web apps in each of "+SCALE_WEBPROJECTS+" web projects in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_WEBPROJECTS; i++)
|
|
{
|
|
WebProjectInfo wpInfo = wpService.getWebProject(TEST_WEBPROJ_DNS+"-"+i);
|
|
Map<String, String> userRoles = new HashMap<String, String>(SCALE_USERS);
|
|
for (int j = 1; j <= SCALE_USERS; j++)
|
|
{
|
|
userRoles.put(TEST_USER+"-"+j, WCMUtil.ROLE_CONTENT_MANAGER);
|
|
}
|
|
wpService.inviteWebUsersGroups(wpInfo.getNodeRef(), userRoles, false);
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: invited "+SCALE_USERS+" content managers to each of "+SCALE_WEBPROJECTS+" web projects in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_USERS; i++)
|
|
{
|
|
assertEquals(SCALE_WEBPROJECTS, wpService.listWebProjects(TEST_USER+"-"+i).size());
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: list web projects for "+SCALE_USERS+" content managers in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_WEBPROJECTS; i++)
|
|
{
|
|
WebProjectInfo wpInfo = wpService.getWebProject(TEST_WEBPROJ_DNS+"-"+i);
|
|
wpService.deleteWebProject(wpInfo.getNodeRef());
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: deleted "+SCALE_USERS+" web projects in "+(System.currentTimeMillis()-split)+" msecs");
|
|
|
|
split = System.currentTimeMillis();
|
|
|
|
for (int i = 1; i <= SCALE_USERS; i++)
|
|
{
|
|
deleteUser(TEST_USER+"-"+i);
|
|
}
|
|
|
|
System.out.println("testPseudoScaleTest: deleted "+SCALE_USERS+" users in "+(System.currentTimeMillis()-split)+" msecs");
|
|
}
|
|
|
|
|
|
/*
|
|
// == Test the JavaScript API ==
|
|
|
|
public void testJSAPI() throws Exception
|
|
{
|
|
ScriptLocation location = new ClasspathScriptLocation("org/alfresco/wcm/script/test_webProjectService.js");
|
|
scriptService.executeScript(location, new HashMap<String, Object>(0));
|
|
}
|
|
*/
|
|
}
|