mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-07 18:25:23 +00:00
17717: This check-in contains changes in Java and .NET TCK tests related to CMIS-43 and CMIS-44 JIRA tasks. Also some bugs were faced out and fixed in 17727: CMIS-69: Alfresco to CMIS ACL mapping: Part 1: API 17732: Merge HEAD to DEV/CMIS10 17756: MOB-563: SQL Tests - Lexer 17764: CMIS-69: Alfresco to CMIS ACL mapping: get ACL support 17802: More for CMIS-69: Alfresco to CMIS ACL mapping. Implementation for applyAcl. 17830: Fixes for CMIS lexer and parser tests 17838: Access fix ups for access by the WS/Rest layers 17869: 1) remote-api: 17874: SAIL-146: Alfresco to CMIS ACL mapping: Support to group ACEs by principal id 17883: Adjust version properties for dev/cmis10 branch. 17885: Update OASIS CMIS TC status. 17889: Fix issue where objectid is not rendered correctly for CMIS private working copies. 17890: SAIL-146: Alfresco to CMIS ACL mapping: Fixes for ACL merging when reporting and ordering of ACEs. Report full permissions and not unique short names. 17902: Fix issue where CMIS queries via GET used incorrect defaults for paging. 17909: Fix CMIS link relations for folder tree. 17912: Fix CMIS type descendants atompub link 17922: Update AtomPub binding to CMIS 1.0 CD05 XSDs. 17924: SAIL-146: Alfresco to CMIS ACL mapping: Test set using full permissions (as opposed to short unique names) 17927: Fix content stream create/update status to comply with CMIS 1.0 CD05. 17934: Resolve encoding issues in CMIS AtomPub binding. 17973: SAIL-171: CMIS Renditions REST binding 17975: SAIL-146: Alfresco to CMIS ACL mapping: Completed AllowedAction and Permissions mapping. Added missing canDeleteTree. 17990: Update CMIS AtomPub to CD06 17996: Updates for cmis.alfresco.com for CD06 in prep for public review 2. 18007: WS-Bindings were updated with CMIS 1.0 cd06 changes. 18016: CMIS web services: Add missing generated files from WSDL 18018: CMIS index page updates for cmis.alfresco.com 18041: Merged HEAD to DEV/CMIS_10 18059: SAIL-227: 18067: SAIL-157: Strict vs Non-Strict Query Language: Enforce restrictions on the use of SCORE() and CONTAINS() 18080: Fix for SAIL-213:Bug: Query engine does not check that select list properties are valid for selectors 18131: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\'. 18132: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\': Fix underlying lucene impl for prefix and fuzzy queries to match wildcard/like 18143: SAIL-156: Query Language Compliance: Fix and check qualifiers in IN_TREE and IN_FOLDER. Improved scoring for CONTAINS() 18173: SAIL-245: Exclude thumbnails from normal query results 18179: SAIL 214: Query Language Compliance: Check for valid object ids in IN_FOLDER and IN_TREE 18210: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18211: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18215: SAIL 156: Query Language Compliance: Fix CMIS type info to reflect the underlying settings of the Alfresco type for includeInSuperTypeQuery 18244: SAIL 156: Query Language Compliance: includeInSuperTypeQuery -> includedInSuperTypeQuery: First cut of cmis query test model. Fixed modelSchema.xml to validate 18255: SAIL 156: Query Language Compliance: First set of tests for predicates using properties mapped to CMIS Strings. 18261: CMIS-49 SAIL-163: Alfresco to CMIS Change Log mapping - New CMIS Audit mapping is implemented. ChangeLogDataExtractor was added. 18263: Build Fix 18285: SAIL 156: Query Language Compliance: Restrictions on predicates that may be used by single-valued and multi-valued properties 18287: SAIL-186: Changes to make CMIS Rendition REST bindings pass new TCK tests 18291: Fix Eclipse classpath problems 18323: CMIS-44 SAIL-187: Change Log tests (WS) – Java and .NET tests for change log were implemented. 18325: SAIL 156: Query Language Compliance: Fixes and tests for d:mltext mappings 18329: Updated Chemistry TCK jar including Dave W's rendition tests. 18333: Fix compile error - spurious imports. 18334: Fix issue where absurl web script method failed when deployed to root context. 18339: Update CMIS index page for start of public review 2. 18387: SAIL-147: CMIS ACL REST bindings + framework fixes 18392: Fix typo 18394: SAIL 156: Query Language Compliance: Fixes and tests for d:<numeric> 18406: SAIL 156: Query Language Compliance: Remaining type/predicate combinations. Restriction of In/Comparisons for ID/Boolean 18408: CMIS Query language - remove (pointless) multi-valued column from language definition 18409: Formatting change for CMIS.g 18410: Formatting change for FTS.g 18411: CMIS TCK tests were updated to CMIS 1.0 cd06 schemas. 18412: SAIL 156: Query Language Compliance: Tests and fixes for aliases for all data types in simple predicates (they behave as the direct column reference) 18417: Update Chemistry TCK which now incorporates Dave W's ACL tests. 18419: Update CMIS index page to include public review end date. 18427: SAIL 156: Query Language Compliance: Expose multi-valued properties in queries. Tests for all accessors. Fix content length to be long. 18435: SAIL 156: Query Language Compliance: Use queryable correctly and fix up model mappings. Add tests for baseTypeId, contentStreamId and path. 18472: SAIL 156: Query Language Compliance: Tests and fixes for FTS/Contains expressions. Adhere strictly to the spec - no extensions available by default. Improved FTS error reporting (and stop any recovery). 18477: SAIL-164: CMIS change log REST bindings 18495: SAIL 156: Query Language Compliance: Tests and fixes for escaping in string literals, LIKE and FTS expressions. 18537: SAIL 156: Query Language Compliance: Sorting support. Basic sort test for all orderable/indexed CMIS properties. 18538: SAIL-164: CMIS change log fixes for TCK compliance 18547: SAIL 156: Query Language Compliance: Ordering tests for all datatypes, including null values. 18582: Incorporate latest Chemistry TCK 18583: Update list of supported CMIS capabilities in index page. 18606: SAIL-156, SAIL-157, SAIL-158: Query Language Compliance: Respect all query options including locale. Fixes and tests for MLText cross language support. 18608: SAIL-159: Java / Javascript API access to CMIS Query Language 18617: SAIL-158: Query Tests: Check policy and relationship types are not queryable. 18636: SAIL-184: ACL tests (WS) 18663: ACL tests were updated in accordance with last requirements by David Caruana. 18680: Update to CMIS CD07 18681: Fix CMIS ContentStreamId property when document has no content. 18700: CMIS: Head merge problem resolution. Phase 1: Merge up to and including revision 18700, as this the point where both AtomPub and Web Services TCK tests succeed completely on dev branch. Note: includes CMIS rendition support ready for integration and testing with DM renditions. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@18790 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
485 lines
18 KiB
Java
485 lines
18 KiB
Java
/*
|
|
* Copyright (C) 2005-2009 Alfresco Software Limited.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
* As a special exception to the terms and conditions of version 2.0 of
|
|
* the GPL, you may redistribute this Program in connection with Free/Libre
|
|
* and Open Source Software ("FLOSS") applications as described in Alfresco's
|
|
* FLOSS exception. You should have recieved a copy of the text describing
|
|
* the FLOSS exception, and it is also available here:
|
|
* http://www.alfresco.com/legal/licensing"
|
|
*/
|
|
package org.alfresco.repo.domain.audit;
|
|
|
|
import java.io.IOException;
|
|
import java.io.InputStream;
|
|
import java.io.Serializable;
|
|
import java.net.URL;
|
|
import java.util.Date;
|
|
import java.util.HashSet;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Set;
|
|
import java.util.zip.CRC32;
|
|
|
|
import org.alfresco.error.AlfrescoRuntimeException;
|
|
import org.alfresco.repo.audit.AuditState;
|
|
import org.alfresco.repo.audit.hibernate.HibernateAuditDAO;
|
|
import org.alfresco.repo.content.MimetypeMap;
|
|
import org.alfresco.repo.domain.contentdata.ContentDataDAO;
|
|
import org.alfresco.repo.domain.propval.PropertyIdSearchRow;
|
|
import org.alfresco.repo.domain.propval.PropertyValueDAO;
|
|
import org.alfresco.service.cmr.audit.AuditInfo;
|
|
import org.alfresco.service.cmr.audit.AuditService.AuditQueryCallback;
|
|
import org.alfresco.service.cmr.repository.ContentData;
|
|
import org.alfresco.service.cmr.repository.ContentService;
|
|
import org.alfresco.service.cmr.repository.ContentWriter;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.springframework.extensions.surf.util.Pair;
|
|
import org.apache.commons.logging.Log;
|
|
import org.apache.commons.logging.LogFactory;
|
|
import org.springframework.dao.DataIntegrityViolationException;
|
|
|
|
/**
|
|
* Abstract helper DAO for <b>alf_audit_XXX</b> tables.
|
|
*
|
|
* @author Derek Hulley
|
|
* @since 3.2
|
|
*/
|
|
public abstract class AbstractAuditDAOImpl implements AuditDAO
|
|
{
|
|
protected final Log logger = LogFactory.getLog(this.getClass());
|
|
|
|
private HibernateAuditDAO oldDAO;
|
|
private ContentService contentService;
|
|
private ContentDataDAO contentDataDAO;
|
|
protected PropertyValueDAO propertyValueDAO;
|
|
|
|
public void setOldDAO(HibernateAuditDAO oldDAO)
|
|
{
|
|
this.oldDAO = oldDAO;
|
|
}
|
|
|
|
public void setContentService(ContentService contentService)
|
|
{
|
|
this.contentService = contentService;
|
|
}
|
|
|
|
public void setContentDataDAO(ContentDataDAO contentDataDAO)
|
|
{
|
|
this.contentDataDAO = contentDataDAO;
|
|
}
|
|
|
|
public void setPropertyValueDAO(PropertyValueDAO propertyValueDAO)
|
|
{
|
|
this.propertyValueDAO = propertyValueDAO;
|
|
}
|
|
|
|
protected PropertyValueDAO getPropertyValueDAO()
|
|
{
|
|
return this.propertyValueDAO;
|
|
}
|
|
|
|
/*
|
|
* Support for older audit DAO
|
|
*/
|
|
|
|
/**
|
|
* Uses {@link HibernateAuditDAO older DAO}
|
|
* @since 3.2
|
|
*/
|
|
public void audit(AuditState auditInfo)
|
|
{
|
|
oldDAO.audit(auditInfo);
|
|
}
|
|
|
|
/**
|
|
* Uses {@link HibernateAuditDAO older DAO}
|
|
* @since 3.2
|
|
*/
|
|
public List<AuditInfo> getAuditTrail(NodeRef nodeRef)
|
|
{
|
|
return oldDAO.getAuditTrail(nodeRef);
|
|
}
|
|
|
|
/*
|
|
* alf_audit_model
|
|
*/
|
|
|
|
/**
|
|
* {@inheritDoc}
|
|
*/
|
|
public Pair<Long, ContentData> getOrCreateAuditModel(URL url)
|
|
{
|
|
InputStream is = null;
|
|
try
|
|
{
|
|
is = url.openStream();
|
|
// Calculate the CRC and find an entry that matches
|
|
CRC32 crcCalc = new CRC32();
|
|
byte[] buffer = new byte[1024];
|
|
int read = -1;
|
|
do
|
|
{
|
|
read = is.read(buffer);
|
|
if (read < 0)
|
|
{
|
|
break;
|
|
}
|
|
crcCalc.update(buffer, 0, read);
|
|
}
|
|
while (true);
|
|
long crc = crcCalc.getValue();
|
|
// Find an existing entry
|
|
AuditModelEntity existingEntity = getAuditModelByCrc(crc);
|
|
if (existingEntity != null)
|
|
{
|
|
Long existingEntityId = existingEntity.getId();
|
|
// Locate the content
|
|
ContentData existingContentData = contentDataDAO.getContentData(
|
|
existingEntity.getContentDataId()
|
|
).getSecond();
|
|
Pair<Long, ContentData> result = new Pair<Long, ContentData>(existingEntityId, existingContentData);
|
|
// Done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(
|
|
"Found existing model with same CRC: \n" +
|
|
" URL: " + url + "\n" +
|
|
" CRC: " + crc + "\n" +
|
|
" Result: " + result);
|
|
}
|
|
return result;
|
|
}
|
|
else
|
|
{
|
|
// Upload the content afresh
|
|
is.close();
|
|
is = url.openStream();
|
|
ContentWriter writer = contentService.getWriter(null, null, false);
|
|
writer.setEncoding("UTF-8");
|
|
writer.setMimetype(MimetypeMap.MIMETYPE_XML);
|
|
writer.putContent(is);
|
|
ContentData newContentData = writer.getContentData();
|
|
Long newContentDataId = contentDataDAO.createContentData(newContentData).getFirst();
|
|
AuditModelEntity newEntity = createAuditModel(newContentDataId, crc);
|
|
Pair<Long, ContentData> result = new Pair<Long, ContentData>(newEntity.getId(), newContentData);
|
|
// Done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(
|
|
"Created new audit model: \n" +
|
|
" URL: " + url + "\n" +
|
|
" CRC: " + crc + "\n" +
|
|
" Result: " + result);
|
|
}
|
|
return result;
|
|
}
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
throw new AlfrescoRuntimeException("Failed to read Audit model: " + url);
|
|
}
|
|
finally
|
|
{
|
|
if (is != null)
|
|
{
|
|
try { is.close(); } catch (Throwable e) {}
|
|
}
|
|
}
|
|
}
|
|
|
|
protected abstract AuditModelEntity getAuditModelByCrc(long crc);
|
|
protected abstract AuditModelEntity createAuditModel(Long contentDataId, long crc);
|
|
|
|
/*
|
|
* alf_audit_application
|
|
*/
|
|
|
|
public AuditApplicationInfo getAuditApplication(String application)
|
|
{
|
|
AuditApplicationEntity entity = getAuditApplicationByName(application);
|
|
if (entity == null)
|
|
{
|
|
return null;
|
|
}
|
|
else
|
|
{
|
|
AuditApplicationInfo appInfo = new AuditApplicationInfo();
|
|
appInfo.setId(entity.getId());
|
|
appInfo.setname(application);
|
|
appInfo.setModelId(entity.getAuditModelId());
|
|
appInfo.setDisabledPathsId(entity.getDisabledPathsId());
|
|
// Done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(
|
|
"Found existing audit application: \n" +
|
|
" " + appInfo);
|
|
}
|
|
return appInfo;
|
|
}
|
|
}
|
|
|
|
public AuditApplicationInfo createAuditApplication(String application, Long modelId)
|
|
{
|
|
// Persist the string
|
|
Long appNameId = propertyValueDAO.getOrCreatePropertyValue(application).getFirst();
|
|
// We need a property to hold any disabled paths
|
|
Set<String> disabledPaths = new HashSet<String>();
|
|
Long disabledPathsId = propertyValueDAO.createProperty((Serializable)disabledPaths);
|
|
// Create the audit app
|
|
AuditApplicationEntity entity = createAuditApplication(appNameId, modelId, disabledPathsId);
|
|
|
|
// Create return value
|
|
AuditApplicationInfo appInfo = new AuditApplicationInfo();
|
|
appInfo.setId(entity.getId());
|
|
appInfo.setname(application);
|
|
appInfo.setModelId(modelId);
|
|
appInfo.setDisabledPathsId(disabledPathsId);
|
|
// Done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(
|
|
"Created new audit application: \n" +
|
|
" Model: " + modelId + "\n" +
|
|
" App: " + application + "\n" +
|
|
" Result: " + entity);
|
|
}
|
|
return appInfo;
|
|
}
|
|
|
|
public void updateAuditApplicationModel(Long id, Long modelId)
|
|
{
|
|
AuditApplicationEntity entity = getAuditApplicationById(id);
|
|
if (entity == null)
|
|
{
|
|
throw new DataIntegrityViolationException("No audit application exists for ID " + id);
|
|
}
|
|
if (entity.getAuditModelId().equals(modelId))
|
|
{
|
|
// There is nothing to update
|
|
return;
|
|
}
|
|
// Update
|
|
entity.setAuditModelId(modelId);
|
|
updateAuditApplication(entity);
|
|
}
|
|
|
|
@SuppressWarnings("unchecked")
|
|
public void updateAuditApplicationDisabledPaths(Long id, Set<String> disabledPaths)
|
|
{
|
|
AuditApplicationEntity entity = getAuditApplicationById(id);
|
|
if (entity == null)
|
|
{
|
|
throw new DataIntegrityViolationException("No audit application exists for ID " + id);
|
|
}
|
|
// Resolve the current set
|
|
Long disabledPathsId = entity.getDisabledPathsId();
|
|
Set<String> oldDisabledPaths = (Set<String>) propertyValueDAO.getPropertyById(disabledPathsId);
|
|
if (oldDisabledPaths.equals(disabledPaths))
|
|
{
|
|
// Nothing changed
|
|
return;
|
|
}
|
|
// Update the property
|
|
propertyValueDAO.updateProperty(disabledPathsId, (Serializable) disabledPaths);
|
|
// Do a precautionary update to ensure that the application row is locked appropriately
|
|
updateAuditApplication(entity);
|
|
}
|
|
|
|
protected abstract AuditApplicationEntity getAuditApplicationById(Long id);
|
|
protected abstract AuditApplicationEntity getAuditApplicationByName(String appName);
|
|
protected abstract AuditApplicationEntity createAuditApplication(Long appNameId, Long modelId, Long disabledPathsId);
|
|
protected abstract AuditApplicationEntity updateAuditApplication(AuditApplicationEntity entity);
|
|
|
|
/*
|
|
* alf_audit_entry
|
|
*/
|
|
|
|
public Long createAuditEntry(Long applicationId, long time, String username, Map<String, Serializable> values)
|
|
{
|
|
final Long usernameId;
|
|
if (username != null)
|
|
{
|
|
usernameId = propertyValueDAO.getOrCreatePropertyValue(username).getFirst();
|
|
}
|
|
else
|
|
{
|
|
usernameId = null;
|
|
}
|
|
// Now persist the data values
|
|
Long valuesId = null;
|
|
if (values != null && values.size() > 0)
|
|
{
|
|
valuesId = propertyValueDAO.createProperty((Serializable)values);
|
|
}
|
|
|
|
// Create the audit entry
|
|
AuditEntryEntity entity = createAuditEntry(applicationId, time, usernameId, valuesId);
|
|
|
|
// Done
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug(
|
|
"Created new audit entry: \n" +
|
|
" Application: " + applicationId + "\n" +
|
|
" Time: " + (new Date(time)) + "\n" +
|
|
" User: " + username + "\n" +
|
|
" Result: " + entity);
|
|
}
|
|
return entity.getId();
|
|
}
|
|
|
|
protected abstract AuditEntryEntity createAuditEntry(Long applicationId, long time, Long usernameId, Long valuesId);
|
|
|
|
/*
|
|
* Searches
|
|
*/
|
|
|
|
/**
|
|
* Class that passes results from a result entity into the client callback
|
|
*/
|
|
protected class AuditQueryRowHandler
|
|
{
|
|
private final AuditQueryCallback callback;
|
|
private boolean more;
|
|
private AuditQueryRowHandler(AuditQueryCallback callback)
|
|
{
|
|
this.callback = callback;
|
|
this.more = true;
|
|
}
|
|
|
|
public boolean valuesRequired()
|
|
{
|
|
return callback.valuesRequired();
|
|
}
|
|
|
|
@SuppressWarnings("unchecked")
|
|
public void processResult(AuditQueryResult row)
|
|
{
|
|
if (!more)
|
|
{
|
|
// No more results required
|
|
return;
|
|
}
|
|
// See if the value is available or if it has to be built up
|
|
Map<String, Serializable> auditValues = null;
|
|
if (valuesRequired())
|
|
{
|
|
auditValues = row.getAuditValue();
|
|
if (auditValues == null)
|
|
{
|
|
List<PropertyIdSearchRow> propMapRows = row.getAuditValueRows();
|
|
if (propMapRows == null)
|
|
{
|
|
// Use the audit values ID
|
|
Long auditValuesId = row.getAuditValuesId();
|
|
Pair<Long, Serializable> auditValuesPair = propertyValueDAO.getPropertyValueById(auditValuesId);
|
|
if (auditValuesPair == null)
|
|
{
|
|
// Ignore
|
|
more = callback.handleAuditEntryError(row.getAuditEntryId(),
|
|
"Audit entry not joined to audit properties: " + row, null);
|
|
return;
|
|
}
|
|
auditValues = (Map<String, Serializable>) auditValuesPair.getSecond();
|
|
}
|
|
else
|
|
{
|
|
// Resolve the map
|
|
try
|
|
{
|
|
auditValues = (Map<String, Serializable>) propertyValueDAO
|
|
.convertPropertyIdSearchRows(propMapRows);
|
|
}
|
|
catch (ClassCastException e)
|
|
{
|
|
more = callback.handleAuditEntryError(row.getAuditEntryId(),
|
|
"Audit entry not linked to a Map<String, Serializable> value: " + row, e);
|
|
return;
|
|
}
|
|
catch (Throwable e)
|
|
{
|
|
more = callback.handleAuditEntryError(row.getAuditEntryId(),
|
|
"Audit entry unable to extract audited values: " + row, e);
|
|
return;
|
|
}
|
|
if (auditValues == null)
|
|
{
|
|
more = callback.handleAuditEntryError(row.getAuditEntryId(),
|
|
"Audit entry incompletely joined to audit properties: " + row, null);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
// Resolve the application and username
|
|
String auditAppName = (String) propertyValueDAO.getPropertyValueById(row.getAuditAppNameId()).getSecond();
|
|
Long auditUserId = row.getAuditUserId();
|
|
String auditUser = auditUserId == null
|
|
? null
|
|
: (String) propertyValueDAO.getPropertyValueById(auditUserId).getSecond();
|
|
|
|
more = callback.handleAuditEntry(
|
|
row.getAuditEntryId(),
|
|
auditAppName,
|
|
auditUser,
|
|
row.getAuditTime(),
|
|
auditValues);
|
|
}
|
|
}
|
|
|
|
public void findAuditEntries(
|
|
AuditQueryCallback callback,
|
|
org.alfresco.service.cmr.audit.AuditQueryParameters parameters,
|
|
int maxResults)
|
|
{
|
|
String searchKey = null;
|
|
Serializable searchValue = null;
|
|
if (parameters.getSearchKeyValues().size() > 0)
|
|
{
|
|
// Only handle one pair for now
|
|
Pair<String, Serializable> searchKeyValue = parameters.getSearchKeyValues().get(0);
|
|
searchKey = searchKeyValue.getFirst();
|
|
searchValue = searchKeyValue.getSecond();
|
|
}
|
|
|
|
AuditQueryRowHandler rowHandler = new AuditQueryRowHandler(callback);
|
|
findAuditEntries(
|
|
rowHandler,
|
|
parameters.isForward(),
|
|
parameters.getApplicationName(),
|
|
parameters.getUser(),
|
|
parameters.getFromId(),
|
|
parameters.getToId(),
|
|
parameters.getFromTime(),
|
|
parameters.getToTime(),
|
|
maxResults,
|
|
searchKey,
|
|
searchValue);
|
|
}
|
|
|
|
protected abstract void findAuditEntries(
|
|
AuditQueryRowHandler rowHandler,
|
|
boolean forward,
|
|
String applicationName, String user,
|
|
Long fromId, Long toId,
|
|
Long fromTime, Long toTime,
|
|
int maxResults,
|
|
String searchKey, Serializable searchValue);
|
|
}
|