mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
17717: This check-in contains changes in Java and .NET TCK tests related to CMIS-43 and CMIS-44 JIRA tasks. Also some bugs were faced out and fixed in 17727: CMIS-69: Alfresco to CMIS ACL mapping: Part 1: API 17732: Merge HEAD to DEV/CMIS10 17756: MOB-563: SQL Tests - Lexer 17764: CMIS-69: Alfresco to CMIS ACL mapping: get ACL support 17802: More for CMIS-69: Alfresco to CMIS ACL mapping. Implementation for applyAcl. 17830: Fixes for CMIS lexer and parser tests 17838: Access fix ups for access by the WS/Rest layers 17869: 1) remote-api: 17874: SAIL-146: Alfresco to CMIS ACL mapping: Support to group ACEs by principal id 17883: Adjust version properties for dev/cmis10 branch. 17885: Update OASIS CMIS TC status. 17889: Fix issue where objectid is not rendered correctly for CMIS private working copies. 17890: SAIL-146: Alfresco to CMIS ACL mapping: Fixes for ACL merging when reporting and ordering of ACEs. Report full permissions and not unique short names. 17902: Fix issue where CMIS queries via GET used incorrect defaults for paging. 17909: Fix CMIS link relations for folder tree. 17912: Fix CMIS type descendants atompub link 17922: Update AtomPub binding to CMIS 1.0 CD05 XSDs. 17924: SAIL-146: Alfresco to CMIS ACL mapping: Test set using full permissions (as opposed to short unique names) 17927: Fix content stream create/update status to comply with CMIS 1.0 CD05. 17934: Resolve encoding issues in CMIS AtomPub binding. 17973: SAIL-171: CMIS Renditions REST binding 17975: SAIL-146: Alfresco to CMIS ACL mapping: Completed AllowedAction and Permissions mapping. Added missing canDeleteTree. 17990: Update CMIS AtomPub to CD06 17996: Updates for cmis.alfresco.com for CD06 in prep for public review 2. 18007: WS-Bindings were updated with CMIS 1.0 cd06 changes. 18016: CMIS web services: Add missing generated files from WSDL 18018: CMIS index page updates for cmis.alfresco.com 18041: Merged HEAD to DEV/CMIS_10 18059: SAIL-227: 18067: SAIL-157: Strict vs Non-Strict Query Language: Enforce restrictions on the use of SCORE() and CONTAINS() 18080: Fix for SAIL-213:Bug: Query engine does not check that select list properties are valid for selectors 18131: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\'. 18132: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\': Fix underlying lucene impl for prefix and fuzzy queries to match wildcard/like 18143: SAIL-156: Query Language Compliance: Fix and check qualifiers in IN_TREE and IN_FOLDER. Improved scoring for CONTAINS() 18173: SAIL-245: Exclude thumbnails from normal query results 18179: SAIL 214: Query Language Compliance: Check for valid object ids in IN_FOLDER and IN_TREE 18210: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18211: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18215: SAIL 156: Query Language Compliance: Fix CMIS type info to reflect the underlying settings of the Alfresco type for includeInSuperTypeQuery 18244: SAIL 156: Query Language Compliance: includeInSuperTypeQuery -> includedInSuperTypeQuery: First cut of cmis query test model. Fixed modelSchema.xml to validate 18255: SAIL 156: Query Language Compliance: First set of tests for predicates using properties mapped to CMIS Strings. 18261: CMIS-49 SAIL-163: Alfresco to CMIS Change Log mapping - New CMIS Audit mapping is implemented. ChangeLogDataExtractor was added. 18263: Build Fix 18285: SAIL 156: Query Language Compliance: Restrictions on predicates that may be used by single-valued and multi-valued properties 18287: SAIL-186: Changes to make CMIS Rendition REST bindings pass new TCK tests 18291: Fix Eclipse classpath problems 18323: CMIS-44 SAIL-187: Change Log tests (WS) – Java and .NET tests for change log were implemented. 18325: SAIL 156: Query Language Compliance: Fixes and tests for d:mltext mappings 18329: Updated Chemistry TCK jar including Dave W's rendition tests. 18333: Fix compile error - spurious imports. 18334: Fix issue where absurl web script method failed when deployed to root context. 18339: Update CMIS index page for start of public review 2. 18387: SAIL-147: CMIS ACL REST bindings + framework fixes 18392: Fix typo 18394: SAIL 156: Query Language Compliance: Fixes and tests for d:<numeric> 18406: SAIL 156: Query Language Compliance: Remaining type/predicate combinations. Restriction of In/Comparisons for ID/Boolean 18408: CMIS Query language - remove (pointless) multi-valued column from language definition 18409: Formatting change for CMIS.g 18410: Formatting change for FTS.g 18411: CMIS TCK tests were updated to CMIS 1.0 cd06 schemas. 18412: SAIL 156: Query Language Compliance: Tests and fixes for aliases for all data types in simple predicates (they behave as the direct column reference) 18417: Update Chemistry TCK which now incorporates Dave W's ACL tests. 18419: Update CMIS index page to include public review end date. 18427: SAIL 156: Query Language Compliance: Expose multi-valued properties in queries. Tests for all accessors. Fix content length to be long. 18435: SAIL 156: Query Language Compliance: Use queryable correctly and fix up model mappings. Add tests for baseTypeId, contentStreamId and path. 18472: SAIL 156: Query Language Compliance: Tests and fixes for FTS/Contains expressions. Adhere strictly to the spec - no extensions available by default. Improved FTS error reporting (and stop any recovery). 18477: SAIL-164: CMIS change log REST bindings 18495: SAIL 156: Query Language Compliance: Tests and fixes for escaping in string literals, LIKE and FTS expressions. 18537: SAIL 156: Query Language Compliance: Sorting support. Basic sort test for all orderable/indexed CMIS properties. 18538: SAIL-164: CMIS change log fixes for TCK compliance 18547: SAIL 156: Query Language Compliance: Ordering tests for all datatypes, including null values. 18582: Incorporate latest Chemistry TCK 18583: Update list of supported CMIS capabilities in index page. 18606: SAIL-156, SAIL-157, SAIL-158: Query Language Compliance: Respect all query options including locale. Fixes and tests for MLText cross language support. 18608: SAIL-159: Java / Javascript API access to CMIS Query Language 18617: SAIL-158: Query Tests: Check policy and relationship types are not queryable. 18636: SAIL-184: ACL tests (WS) 18663: ACL tests were updated in accordance with last requirements by David Caruana. 18680: Update to CMIS CD07 18681: Fix CMIS ContentStreamId property when document has no content. 18700: CMIS: Head merge problem resolution. Phase 1: Merge up to and including revision 18700, as this the point where both AtomPub and Web Services TCK tests succeed completely on dev branch. Note: includes CMIS rendition support ready for integration and testing with DM renditions. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@18790 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
214 lines
9.1 KiB
Java
214 lines
9.1 KiB
Java
/*
|
|
* Copyright (C) 2005-2007 Alfresco Software Limited.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
* As a special exception to the terms and conditions of version 2.0 of
|
|
* the GPL, you may redistribute this Program in connection with Free/Libre
|
|
* and Open Source Software ("FLOSS") applications as described in Alfresco's
|
|
* FLOSS exception. You should have recieved a copy of the text describing
|
|
* the FLOSS exception, and it is also available here:
|
|
* http://www.alfresco.com/legal/licensing"
|
|
*/
|
|
package org.alfresco.repo.audit;
|
|
|
|
import java.io.Serializable;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
|
|
import org.alfresco.repo.audit.model.AuditApplication;
|
|
import org.alfresco.repo.audit.model.AuditModelRegistry;
|
|
import org.alfresco.repo.audit.model._3.AuditPath;
|
|
import org.alfresco.service.cmr.audit.AuditInfo;
|
|
import org.alfresco.service.cmr.audit.AuditQueryParameters;
|
|
import org.alfresco.service.cmr.audit.AuditService.AuditQueryCallback;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.aopalliance.intercept.MethodInvocation;
|
|
|
|
/**
|
|
* The audit component. Used by the AuditService and AuditMethodInterceptor to insert audit entries.
|
|
* <p/>
|
|
* The V3.2 audit functionality is contained within the same component. When the newer audit
|
|
* implementation has been tested and approved, then older ones will be deprecated as necessary.
|
|
*
|
|
* @author Andy Hind
|
|
* @author Derek Hulley
|
|
*/
|
|
public interface AuditComponent
|
|
{
|
|
/**
|
|
* Audit entry point for method interceptors.
|
|
*
|
|
* @return - the return onbject from the normal invocation of the audited method.
|
|
*
|
|
* @since 2.1
|
|
*/
|
|
public Object audit(MethodInvocation methodInvocation) throws Throwable;
|
|
|
|
/**
|
|
* @param source -
|
|
* a string that represents the application
|
|
* @param description -
|
|
* the audit entry *
|
|
* @param key -
|
|
* a node ref to use as the key for filtering etc
|
|
* @param args -
|
|
* an arbitrary list of parameters
|
|
*
|
|
* @since 2.1
|
|
*/
|
|
public void audit(String source, String description, NodeRef key, Object... args);
|
|
|
|
/**
|
|
* Add an audit entry - without invoking the method invocation.
|
|
* Only the method arguments can be audited.
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void beforeMethodCallManualAudit(Class<?> clazz, Object target, String method, Object ... args);
|
|
|
|
/**
|
|
* Get the audit trail for a node.
|
|
*
|
|
* @param nodeRef -
|
|
* the node ref for which we want the audit trail
|
|
* @return - a list of AuditInfo objects that represent the audit trail for the given node reference.
|
|
*
|
|
* @since 2.1
|
|
*/
|
|
public List<AuditInfo> getAuditTrail(NodeRef nodeRef);
|
|
|
|
/*
|
|
* V3.2 from here on. Put all fixes to the older audit code before this point, please.
|
|
*/
|
|
|
|
/**
|
|
* Determines whether the given source path is mapped to any audit applications. Allows optimizations to be made in
|
|
* calling components.
|
|
*
|
|
* @return <code>true</code> if the given source path is mapped to one or more audit applications
|
|
* @since 3.3
|
|
*/
|
|
public boolean isSourcePathMapped(String sourcePath);
|
|
|
|
/**
|
|
* Delete audit entries for the given application and time range
|
|
*
|
|
* @param applicationName the name of the application being logged to
|
|
* @param fromTime the start time of entries to remove (inclusive and optional)
|
|
* @param toTime the end time of entries to remove (exclusive and optional)
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void deleteAuditEntries(String applicationName, Long fromTime, Long toTime);
|
|
|
|
/**
|
|
* Check if an audit path is enabled. The path will be disabled if it or any higher
|
|
* path has been explicitly disabled. Any disabled path will not be processed when
|
|
* data is audited.
|
|
*
|
|
* @param applicationName the name of the application being logged to
|
|
* @param path the audit path to check
|
|
* @return Returns <tt>true</tt> if the audit path has been disabled
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
boolean isAuditPathEnabled(String applicationName, String path);
|
|
|
|
/**
|
|
* Enable auditing (if it is not already enabled) for all paths that contain the given path.
|
|
* The path is the path as originally logged (see {@link #audit(String, String, Map)}) and
|
|
* not the path that the generated data may contain - although this would be similarly
|
|
* enabled.
|
|
* <p>
|
|
* If the enabled
|
|
*
|
|
* @param applicationName the name of the application being logged to
|
|
* @param path the audit path to enable auditing on
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void enableAudit(String applicationName, String path);
|
|
|
|
/**
|
|
* Disable auditing (if it is not already disabled) for all paths that contain the given path.
|
|
* The path is the path as originally logged (see {@link #audit(String, String, Map)}) and
|
|
* not the path that the generated data may contain - although this would be similarly
|
|
* disabled.
|
|
* <p>
|
|
* If the path is <b>/x/y</b> then any data paths that start with <b>/x/y</b> will be stripped
|
|
* out <u>before</u> data generators and data recorders are applied. If the path represents
|
|
* the root path of the application, then auditing for that application is effectively disabled.
|
|
*
|
|
* @param applicationName the name of the application being logged to
|
|
* @param path the audit path to enable auditing on
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void disableAudit(String applicationName, String path);
|
|
|
|
/**
|
|
* Remove all disabled paths i.e. enable all per-path based auditing. Auditing may still be
|
|
* disabled globally. This is primarily for test purposes; applications should know which
|
|
* paths need {@link #enableAudit(String, String) enabling} or
|
|
* {@link #disableAudit(String, String) disabling}.
|
|
*
|
|
* @param applicationName the name of the application
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void resetDisabledPaths(String applicationName);
|
|
|
|
/**
|
|
* Create an audit entry for the given map of values. The map key is a path - starting with '/'
|
|
* ({@link AuditApplication#AUDIT_PATH_SEPARATOR}) - relative to the root path provided.
|
|
*
|
|
* The root path and value keys are combined to produce a map of data keyed by full path. This
|
|
* fully-pathed map is then passed through the
|
|
* {@link AuditModelRegistry#getAuditPathMapper() audit path mapper}. The result may yield data
|
|
* destined for several different
|
|
* {@link AuditModelRegistry#getAuditApplicationByKey(String) audit applications}. depending on
|
|
* the data extraction and generation defined in the applications, values (or derived values) may
|
|
* be recorded against several audit entries (one per application represented).
|
|
* <p/>
|
|
* The return values reflect what was actually persisted and is controlled by the data extractors
|
|
* defined in the audit configuration.
|
|
* <p/>
|
|
* A new read-write transaction is started if there are values to write that there is not a viable
|
|
* transaction present.
|
|
*
|
|
* @param rootPath a base path of {@link AuditPath} key entries concatenated with the path separator
|
|
* '/' ({@link AuditApplication#AUDIT_PATH_SEPARATOR})
|
|
* @param values the values to audit mapped by {@link AuditPath} key relative to root path
|
|
* (may be <tt>null</tt>)
|
|
* @return Returns the values that were actually persisted, keyed by their full path.
|
|
* @throws IllegalStateException if there is not a writable transaction present
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
Map<String, Serializable> recordAuditValues(String rootPath, Map<String, Serializable> values);
|
|
|
|
/**
|
|
* Find audit entries using the given parameters
|
|
*
|
|
* @param callback the data callback per entry
|
|
* @param parameters the parameters for the query (may not be <tt>null</tt>)
|
|
* @param maxResults the maximum number of results to retrieve (zero or negative to ignore)
|
|
*
|
|
* @since 3.2
|
|
*/
|
|
void auditQuery(AuditQueryCallback callback, AuditQueryParameters parameters, int maxResults);
|
|
}
|