mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
20954: Calendar Dashlet updates. Fixes: ALF-2907 (meeting workspace issue) 20968: Minor VersionableAspect fix to onDeleteNode policy firing (follow-on for r19507) 20981: Removed Install Jammer installers from V3.3.3 20982: AVMTestSuite - run PurgeTestP after AVMServiceTest (investigating ALF-3611) 20997: Fix for ALF-2605 - updated share-config-custom.xml.sample and removed obsolete extension files 21030: Pulled XAMConnector AMP into main 3.3SP3 codeline. Apart from build changes (incl. EOL), there are no repo changes. 21032: StoreSelector passes through NodeContentContext allowing stores access to node information 21036: Fix ALF-245: Can't delete space that contains "translation without content" - Delete triggers 'unmakeTranslation' - Empty translations are marked with sys:temporary before being deleted 21051: More on fix ALF-245. Reduced complexity by not deleting empty translations twice 21064: Merged V3.3 to V3.3-BUG_FIX 20898: Merged HEAD to V3.3 20724: AVMTestSuite - temporarily comment out PurgeTestP - TODO: investigate intermittent test failure 20903: Incremented version revision 20921: AVM - fix purge store so that vr nodes are actually orphaned (ALF-3627) 20952: Fix for ALF-3704: Module conflict - Alfresco web client config property page missing metadata. This is application of a fix made to the config service in a hotfix. The change provides a deterministic load order for config files loaded via the ConfigBootstrap spring bean. More importantly it means that config files loaded by modules on different machines in a cluster load in the same order. The forms client and AWE config files have been updated to take advantage of the new loading order. 21061: Merged PATCHES/V3.1.2 to V3.3 (RECORD ONLY) 20890: ALF-3687: Apply LUCENE-1383 patch to Lucene 2.1.0 to reduce memory leaks from ThreadLocals 20891: ALF-3687: Build classpath fix 20892: Incremented version label 21062: Merged PATCHES/V3.2.1 to V3.3 20897: (RECORD ONLY) Incremented version label 20901: (RECORD ONLY) ALF-3740: Merged V3.3 to PATCHES/V3.2.1 20524: VersionMigrator - option to run as scheduled job (ALF-1000) 20904: (RECORD ONLY) ALF-3732: Merged PATCHES/V3.2.r to PATCHES/V3.2.1 19803: ALF-558: File servers (CIFS / FTP / NFS) can now handle concurrent write operations on Alfresco repository - ContentDiskDriver / AVMDiskDriver now use retrying transactions for write operations - Disable EagerContentStoreCleaner on ContentDiskDriver / AVMDiskDriver closeFile() operations so that they may be retried after rollback (Sony zero byte problem) - Allow manual association of AVM ContentData with nodes so that closeFile() may be retried - Propagation of new argument through AVM interfaces 20905: (RECORD ONLY) ALF-3732: Rolled back the now unnecessary reference()/dereference() stuff from ALF-558 20906: (RECORD ONLY) ALF-3732: Merged DEV/V3.3-BUG-FIX to PATCHES/V3.2.1 20623: Fix for ALF-3188 : Access Denied when updating doc via CIFS 20907: (RECORD ONLY) ALF-3732: Merged V3.3 to PATCHES/V3.2.1 20173: Propagate IOExceptions from retryable write transactions in AlfrescoDiskDriver 20950: ALF-3779: Upgrades on large repositories from v2.1 and v2.2 were failing on MySQL due to "The total number of locks exceeds the lock table size" errors - Solution was to add support for new --BEGIN TXN and --END TXN comments and execute LOCK TABLES statements in the same transaction as large INSERT - SELECT statements. 20990: ALF-3789: Concurrency issues with InMemoryTicketComponentImpl - Previous ETHREEOH-1842 method of caching web session 'ref counts' against tickets could cause tickets to unpredictably fall out of the transactional cache - Rolled back original ETHREEOH-1842 fix. Would be too much overhead to keep these ref counts consistent across a cluster. - Instead, avoid invalidating tickets on web session timeout and only do it on explicit log out. - Now tickets maintained in non-transactional shared cache so they can't drop out unpredictably - Logic for ticket inactivity timeout caching improved so that it should work across a cluster 20991: (RECORD ONLY) Incremented version label 20993: ALF-3789: Fixed Spring configuration backward compatibily issue with previous fix - Ticket cache bean name restored to ticketsCache. This is actually now a non-transactional cache. - Also externalized parameters so that they can now be controlled by alfresco-global.properties without any bean overrides authentication.ticket.ticketsExpire=false authentication.ticket.expiryMode=AFTER_FIXED_TIME authentication.ticket.validDuration=PT1H 20994: Eclipse classpath fixes for unit testing after ant build 21057: ALF-3592: PassthruCifsAuthenticator now auto-creates / imports users who do not already exist in Alfresco - At least one of the following properties must be true for this to happen synchronization.autoCreatePeopleOnLogin synchronization.syncWhenMissingPeopleLogIn - Also improved debug logging of unknown passthru domains 21063: Merged PATCHES/V3.2.r to V3.3 21037: ALF-3793: Final attempt at realigning saved XForm data with a modified Schema - removeRemovedNodes / insertUpdatedNodes / insertPrototypeNodes replaced by a one stop recursive process that builds a new instance tree from scratch - Nodes copied over in correct order - Missing nodes added in and extra nodes discarded - Prototype nodes appended at appropriate points 21038: (RECORD ONLY) Incremented version label git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@21065 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
367 lines
15 KiB
Java
367 lines
15 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.web.app.servlet;
|
|
|
|
import java.io.IOException;
|
|
import java.text.MessageFormat;
|
|
import java.util.Stack;
|
|
import java.util.StringTokenizer;
|
|
|
|
import javax.faces.application.NavigationHandler;
|
|
import javax.faces.context.FacesContext;
|
|
import javax.servlet.ServletException;
|
|
import javax.servlet.http.HttpServletRequest;
|
|
import javax.servlet.http.HttpServletResponse;
|
|
|
|
import org.alfresco.repo.webdav.WebDAVServlet;
|
|
import org.alfresco.service.ServiceRegistry;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.StoreRef;
|
|
import org.alfresco.service.cmr.security.AccessStatus;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.web.app.AlfrescoNavigationHandler;
|
|
import org.alfresco.web.app.Application;
|
|
import org.alfresco.web.bean.BrowseBean;
|
|
import org.alfresco.web.bean.NavigationBean;
|
|
import org.alfresco.web.bean.dashboard.DashboardManager;
|
|
import org.apache.commons.logging.Log;
|
|
import org.apache.commons.logging.LogFactory;
|
|
import org.apache.myfaces.shared_impl.renderkit.ViewSequenceUtils;
|
|
|
|
/**
|
|
* Servlet allowing external URL access to various global JSF views in the Web Client.
|
|
* <p>
|
|
* The servlet accepts a well formed URL that can easily be generated from a Content or Space NodeRef.
|
|
* The URL also specifies the JSF "outcome" to be executed which provides the correct JSF View to be
|
|
* displayed. The JSF "outcome" must equate to a global navigation rule or it will not be displayed.
|
|
* Servlet URL is of the form:
|
|
* <p>
|
|
* <code>http://<server>/alfresco/navigate/<outcome>[/<workspace>/<store>/<nodeId>]</code> or <br/>
|
|
* <code>http://<server>/alfresco/navigate/<outcome>[/webdav/<path/to/node>]</code>
|
|
* <p>
|
|
* Like most Alfresco servlets, the URL may be followed by a valid 'ticket' argument for authentication:
|
|
* ?ticket=1234567890
|
|
* <p>
|
|
* And/or also followed by the "?guest=true" argument to force guest access login for the URL.
|
|
*
|
|
* @author Kevin Roast
|
|
*/
|
|
public class ExternalAccessServlet extends BaseServlet
|
|
{
|
|
private static final long serialVersionUID = -4118907921337237802L;
|
|
|
|
private static Log logger = LogFactory.getLog(ExternalAccessServlet.class);
|
|
|
|
public final static String OUTCOME_DOCDETAILS = "showDocDetails";
|
|
public final static String OUTCOME_SPACEDETAILS = "showSpaceDetails";
|
|
public final static String OUTCOME_BROWSE = "browse";
|
|
public final static String OUTCOME_MYALFRESCO = "myalfresco";
|
|
public final static String OUTCOME_LOGOUT = "logout";
|
|
public final static String OUTCOME_DIALOG = "dialog";
|
|
public final static String OUTCOME_WIZARD = "wizard";
|
|
|
|
private static final String ARG_TEMPLATE = "template";
|
|
private static final String ARG_PAGE = "page";
|
|
|
|
/**
|
|
* @see javax.servlet.http.HttpServlet#service(javax.servlet.http.HttpServletRequest, javax.servlet.http.HttpServletResponse)
|
|
*/
|
|
protected void service(HttpServletRequest req, HttpServletResponse res)
|
|
throws ServletException, IOException
|
|
{
|
|
String uri = req.getRequestURI();
|
|
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("Processing URL: " + uri + (req.getQueryString() != null ? ("?" + req.getQueryString()) : ""));
|
|
|
|
AuthenticationStatus status = servletAuthenticate(req, res);
|
|
if (status == AuthenticationStatus.Failure)
|
|
{
|
|
return;
|
|
}
|
|
|
|
setNoCacheHeaders(res);
|
|
|
|
uri = uri.substring(req.getContextPath().length());
|
|
StringTokenizer t = new StringTokenizer(uri, "/");
|
|
int tokenCount = t.countTokens();
|
|
if (tokenCount < 2)
|
|
{
|
|
throw new IllegalArgumentException("Externally addressable URL did not contain all required args: " + uri);
|
|
}
|
|
|
|
t.nextToken(); // skip servlet name
|
|
|
|
String outcome = t.nextToken();
|
|
|
|
// get rest of the tokens arguments
|
|
String[] args = new String[tokenCount - 2];
|
|
for (int i=0; i<tokenCount - 2; i++)
|
|
{
|
|
args[i] = t.nextToken();
|
|
}
|
|
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("External outcome found: " + outcome);
|
|
|
|
// we almost always need this bean reference
|
|
FacesContext fc = FacesHelper.getFacesContext(req, res, getServletContext());
|
|
BrowseBean browseBean = (BrowseBean)FacesHelper.getManagedBean(fc, "BrowseBean");
|
|
|
|
// get services we need
|
|
ServiceRegistry serviceRegistry = getServiceRegistry(getServletContext());
|
|
PermissionService permissionService = serviceRegistry.getPermissionService();
|
|
|
|
// as we are potentially coming in from an external app reset the view stack
|
|
Stack viewStack = (Stack)fc.getExternalContext().getSessionMap().get("_alfViewStack");
|
|
if (viewStack != null)
|
|
{
|
|
viewStack.clear();
|
|
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("Cleared view stack");
|
|
}
|
|
|
|
// setup is required for certain outcome requests
|
|
if (OUTCOME_DOCDETAILS.equals(outcome))
|
|
{
|
|
NodeRef nodeRef = null;
|
|
|
|
if (args[0].equals(WebDAVServlet.WEBDAV_PREFIX))
|
|
{
|
|
nodeRef = resolveWebDAVPath(fc, args);
|
|
}
|
|
else if (args.length == 3)
|
|
{
|
|
StoreRef storeRef = new StoreRef(args[0], args[1]);
|
|
nodeRef = new NodeRef(storeRef, args[2]);
|
|
}
|
|
|
|
if (nodeRef != null)
|
|
{
|
|
// check that the user has at least READ access - else redirect to the login page
|
|
if (permissionService.hasPermission(nodeRef, PermissionService.READ) == AccessStatus.DENIED)
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("User does not have permissions to READ NodeRef: " + nodeRef.toString());
|
|
redirectToLoginPage(req, res, getServletContext());
|
|
return;
|
|
}
|
|
|
|
// setup the Document on the browse bean
|
|
browseBean.setupContentAction(nodeRef.getId(), true);
|
|
}
|
|
|
|
fc.getExternalContext().getSessionMap().put(AlfrescoNavigationHandler.EXTERNAL_CONTAINER_SESSION, Boolean.TRUE);
|
|
// perform the appropriate JSF navigation outcome
|
|
NavigationHandler navigationHandler = fc.getApplication().getNavigationHandler();
|
|
navigationHandler.handleNavigation(fc, null, "dialog:" + OUTCOME_DOCDETAILS);
|
|
}
|
|
else if (OUTCOME_SPACEDETAILS.equals(outcome))
|
|
{
|
|
NodeRef nodeRef = null;
|
|
|
|
if (args[0].equals(WebDAVServlet.WEBDAV_PREFIX))
|
|
{
|
|
nodeRef = resolveWebDAVPath(fc, args);
|
|
}
|
|
else if (args.length == 3)
|
|
{
|
|
StoreRef storeRef = new StoreRef(args[0], args[1]);
|
|
nodeRef = new NodeRef(storeRef, args[2]);
|
|
}
|
|
|
|
if (nodeRef != null)
|
|
{
|
|
// check that the user has at least READ access - else redirect to the login page
|
|
if (permissionService.hasPermission(nodeRef, PermissionService.READ) == AccessStatus.DENIED)
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("User does not have permissions to READ NodeRef: " + nodeRef.toString());
|
|
redirectToLoginPage(req, res, getServletContext());
|
|
return;
|
|
}
|
|
|
|
// setup the Space on the browse bean
|
|
browseBean.setupSpaceAction(nodeRef.getId(), true);
|
|
}
|
|
fc.getExternalContext().getSessionMap().put(AlfrescoNavigationHandler.EXTERNAL_CONTAINER_SESSION, Boolean.TRUE);
|
|
// perform the appropriate JSF navigation outcome
|
|
NavigationHandler navigationHandler = fc.getApplication().getNavigationHandler();
|
|
navigationHandler.handleNavigation(fc, null, "dialog:" + OUTCOME_SPACEDETAILS);
|
|
}
|
|
else if (OUTCOME_BROWSE.equals(outcome))
|
|
{
|
|
NodeRef nodeRef = null;
|
|
|
|
if (args.length != 0 && args[0].equals(WebDAVServlet.WEBDAV_PREFIX))
|
|
{
|
|
nodeRef = resolveWebDAVPath(fc, args);
|
|
}
|
|
else if (args.length >= 3)
|
|
{
|
|
int offset = 0;
|
|
|
|
offset = args.length - 3;
|
|
StoreRef storeRef = new StoreRef(args[0+offset], args[1+offset]);
|
|
nodeRef = new NodeRef(storeRef, args[2+offset]);
|
|
}
|
|
|
|
if (nodeRef != null)
|
|
{
|
|
// check that the user has at least READ access - else redirect to the login page
|
|
if (permissionService.hasPermission(nodeRef, PermissionService.READ) == AccessStatus.DENIED)
|
|
{
|
|
if (logger.isDebugEnabled())
|
|
logger.debug("User does not have permissions to READ NodeRef: " + nodeRef.toString());
|
|
redirectToLoginPage(req, res, getServletContext());
|
|
return;
|
|
}
|
|
|
|
// this call sets up the current node Id, and updates or initialises the
|
|
// breadcrumb component with the selected node as appropriate.
|
|
browseBean.updateUILocation(nodeRef);
|
|
|
|
// force a "late" refresh of the BrowseBean to handle external servlet access URL
|
|
browseBean.externalAccessRefresh();
|
|
|
|
// check for view mode first argument
|
|
if (args[0].equals(ARG_TEMPLATE))
|
|
{
|
|
browseBean.setDashboardView(true);
|
|
}
|
|
|
|
// the above calls into BrowseBean setup the NavigationHandler automatically
|
|
}
|
|
else
|
|
{
|
|
// perform the appropriate JSF navigation outcome
|
|
NavigationHandler navigationHandler = fc.getApplication().getNavigationHandler();
|
|
navigationHandler.handleNavigation(fc, null, outcome);
|
|
}
|
|
}
|
|
else if (OUTCOME_MYALFRESCO.equals(outcome))
|
|
{
|
|
// setup the Dashboard Manager ready for the page we want to display
|
|
if (req.getParameter(ARG_PAGE) != null)
|
|
{
|
|
DashboardManager manager = (DashboardManager)FacesHelper.getManagedBean(fc, DashboardManager.BEAN_NAME);
|
|
manager.getPageConfig().setCurrentPage(req.getParameter(ARG_PAGE));
|
|
}
|
|
|
|
// perform the appropriate JSF navigation outcome
|
|
NavigationHandler navigationHandler = fc.getApplication().getNavigationHandler();
|
|
navigationHandler.handleNavigation(fc, null, outcome);
|
|
}
|
|
else if (OUTCOME_DIALOG.equals(outcome) || OUTCOME_WIZARD.equals(outcome))
|
|
{
|
|
if (args.length != 0)
|
|
{
|
|
if (args.length > 1)
|
|
{
|
|
String currentNodeId = null;
|
|
|
|
if (args[1].equals(WebDAVServlet.WEBDAV_PREFIX))
|
|
{
|
|
// Drop the first argument
|
|
String[] args2 = new String[ args.length -1 ];
|
|
for (int i=1; i<args.length; i++)
|
|
{
|
|
args2[i-1] = args[i];
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("Added segment " + args2[i-1]);
|
|
}
|
|
}
|
|
|
|
NodeRef nodeRef = resolveWebDAVPath(fc, args2);
|
|
currentNodeId = nodeRef.getId();
|
|
}
|
|
else
|
|
{
|
|
currentNodeId = args[1];
|
|
}
|
|
|
|
if (logger.isDebugEnabled())
|
|
{
|
|
logger.debug("currentNodeId: " + currentNodeId);
|
|
}
|
|
|
|
// if a GUID was passed, use it to init the NavigationBean current context
|
|
NavigationBean navigator = (NavigationBean)FacesHelper.getManagedBean(fc, NavigationBean.BEAN_NAME);
|
|
navigator.setCurrentNodeId(currentNodeId);
|
|
browseBean.setupSpaceAction(currentNodeId, true);
|
|
|
|
// setup the Document on the browse bean
|
|
// avoid java.lang.NullPointerException
|
|
// at org.alfresco.web.bean.content.InviteContentUsersWizard.getPermissionsForType(InviteContentUsersWizard.java:49)
|
|
// at org.alfresco.web.bean.wizard.BaseInviteUsersWizard.getRoles(BaseInviteUsersWizard.java:562)
|
|
browseBean.setupContentAction(currentNodeId, true);
|
|
}
|
|
|
|
// set the external container session flag so that a plain container gets used
|
|
fc.getExternalContext().getSessionMap().put(
|
|
AlfrescoNavigationHandler.EXTERNAL_CONTAINER_SESSION, Boolean.TRUE);
|
|
|
|
NavigationHandler navigationHandler = fc.getApplication().getNavigationHandler();
|
|
navigationHandler.handleNavigation(fc, null, outcome + ':' + args[0]);
|
|
}
|
|
}
|
|
else if (OUTCOME_LOGOUT.equals(outcome))
|
|
{
|
|
// special case for logout
|
|
// invalidate ticket and clear the Security context for this thread
|
|
Application.logOut(fc);
|
|
res.sendRedirect(req.getContextPath() + FACES_SERVLET + Application.getLoginPage(getServletContext()));
|
|
return;
|
|
}
|
|
|
|
// perform the forward to the page processed by the Faces servlet
|
|
String viewId = fc.getViewRoot().getViewId();
|
|
ViewSequenceUtils.nextViewSequence(fc);
|
|
getServletContext().getRequestDispatcher(FACES_SERVLET + viewId).forward(req, res);
|
|
}
|
|
|
|
/**
|
|
* Generate a URL to the External Access Servlet.
|
|
* Allows access to JSF views (via an "outcome" ID) from external URLs.
|
|
*
|
|
* @param outcome
|
|
* @param args
|
|
*
|
|
* @return URL
|
|
*/
|
|
public final static String generateExternalURL(String outcome, String args)
|
|
{
|
|
if (args == null)
|
|
{
|
|
return MessageFormat.format(EXTERNAL_URL, new Object[] {outcome} );
|
|
}
|
|
else
|
|
{
|
|
return MessageFormat.format(EXTERNAL_URL_ARGS, new Object[] {outcome, args} );
|
|
}
|
|
}
|
|
|
|
// example: http://<server>/alfresco/navigate/<outcome>[/<workspace>/<store>/<nodeId>]
|
|
private static final String EXTERNAL_URL = "/n/{0}";
|
|
private static final String EXTERNAL_URL_ARGS = "/n/{0}/{1}";
|
|
}
|