mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-10-08 14:51:49 +00:00
126530 jkaabimofrad: Merged FILE-FOLDER-API (5.2.0) to HEAD (5.2) 123162 jvonka: ACE-5113: Platform - OwnableService - when setting owner check that username currently exists (at time of property update) git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/BRANCHES/DEV/5.2.N/root@126874 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
282 lines
13 KiB
Java
282 lines
13 KiB
Java
/*
|
|
* #%L
|
|
* Alfresco Repository
|
|
* %%
|
|
* Copyright (C) 2005 - 2016 Alfresco Software Limited
|
|
* %%
|
|
* This file is part of the Alfresco software.
|
|
* If the software was purchased under a paid Alfresco license, the terms of
|
|
* the paid license agreement will prevail. Otherwise, the software is
|
|
* provided under the following open source license terms:
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
* #L%
|
|
*/
|
|
package org.alfresco.repo.ownable.impl;
|
|
|
|
import java.io.Serializable;
|
|
import java.util.HashMap;
|
|
|
|
import javax.transaction.UserTransaction;
|
|
|
|
import junit.framework.TestCase;
|
|
|
|
import org.alfresco.error.AlfrescoRuntimeException;
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
|
import org.alfresco.repo.security.authentication.MutableAuthenticationDao;
|
|
import org.alfresco.repo.security.permissions.dynamic.OwnerDynamicAuthority;
|
|
import org.alfresco.repo.transaction.AlfrescoTransactionSupport;
|
|
import org.alfresco.repo.transaction.AlfrescoTransactionSupport.TxnReadState;
|
|
import org.alfresco.service.ServiceRegistry;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.repository.StoreRef;
|
|
import org.alfresco.service.cmr.security.AccessStatus;
|
|
import org.alfresco.service.cmr.security.MutableAuthenticationService;
|
|
import org.alfresco.service.cmr.security.NoSuchPersonException;
|
|
import org.alfresco.service.cmr.security.OwnableService;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.namespace.QName;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.alfresco.test_category.OwnJVMTestsCategory;
|
|
import org.alfresco.util.ApplicationContextHelper;
|
|
import org.junit.experimental.categories.Category;
|
|
import org.springframework.context.ApplicationContext;
|
|
|
|
@Category(OwnJVMTestsCategory.class)
|
|
public class OwnableServiceTest extends TestCase
|
|
{
|
|
private static ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
|
|
|
private static final String USER_ANDY = "andy";
|
|
private static final String USER_WOOF = "woof";
|
|
private static final String USER_MUPPET = "muppet";
|
|
|
|
private NodeService nodeService;
|
|
|
|
private MutableAuthenticationService authenticationService;
|
|
|
|
private AuthenticationComponent authenticationComponent;
|
|
|
|
private MutableAuthenticationDao authenticationDAO;
|
|
|
|
private OwnableService ownableService;
|
|
|
|
private NodeRef rootNodeRef;
|
|
|
|
private UserTransaction txn;
|
|
|
|
private PermissionService permissionService;
|
|
|
|
private OwnerDynamicAuthority dynamicAuthority;
|
|
|
|
public OwnableServiceTest()
|
|
{
|
|
super();
|
|
}
|
|
|
|
public OwnableServiceTest(String arg0)
|
|
{
|
|
super(arg0);
|
|
}
|
|
|
|
public void setUp() throws Exception
|
|
{
|
|
if (AlfrescoTransactionSupport.getTransactionReadState() != TxnReadState.TXN_NONE)
|
|
{
|
|
throw new AlfrescoRuntimeException(
|
|
"A previous tests did not clean up transaction: " +
|
|
AlfrescoTransactionSupport.getTransactionId());
|
|
}
|
|
|
|
nodeService = (NodeService) ctx.getBean("nodeService");
|
|
authenticationService = (MutableAuthenticationService) ctx.getBean("authenticationService");
|
|
authenticationComponent = (AuthenticationComponent) ctx.getBean("authenticationComponent");
|
|
ownableService = (OwnableService) ctx.getBean("ownableService");
|
|
permissionService = (PermissionService) ctx.getBean("permissionService");
|
|
|
|
authenticationComponent.setCurrentUser(authenticationComponent.getSystemUserName());
|
|
authenticationDAO = (MutableAuthenticationDao) ctx.getBean("authenticationDao");
|
|
|
|
|
|
TransactionService transactionService = (TransactionService) ctx.getBean(ServiceRegistry.TRANSACTION_SERVICE.getLocalName());
|
|
txn = transactionService.getUserTransaction();
|
|
txn.begin();
|
|
|
|
StoreRef storeRef = nodeService.createStore(StoreRef.PROTOCOL_WORKSPACE, "Test_" + System.currentTimeMillis());
|
|
rootNodeRef = nodeService.getRootNode(storeRef);
|
|
permissionService.setPermission(rootNodeRef, PermissionService.ALL_AUTHORITIES, PermissionService.ADD_CHILDREN, true);
|
|
|
|
reCreateUser(USER_ANDY, USER_ANDY);
|
|
reCreateUser(USER_WOOF, USER_WOOF);
|
|
reCreateUser(USER_MUPPET, USER_MUPPET);
|
|
|
|
dynamicAuthority = new OwnerDynamicAuthority();
|
|
dynamicAuthority.setOwnableService(ownableService);
|
|
|
|
authenticationComponent.clearCurrentSecurityContext();
|
|
}
|
|
|
|
private void reCreateUser(String username, String password)
|
|
{
|
|
if(authenticationDAO.userExists(username))
|
|
{
|
|
authenticationService.deleteAuthentication(username);
|
|
}
|
|
authenticationService.createAuthentication(username, password.toCharArray());
|
|
}
|
|
|
|
@Override
|
|
protected void tearDown() throws Exception
|
|
{
|
|
try
|
|
{
|
|
authenticationComponent.clearCurrentSecurityContext();
|
|
txn.rollback();
|
|
}
|
|
catch (Throwable e)
|
|
{
|
|
// don't absorb any exceptions going past
|
|
}
|
|
super.tearDown();
|
|
}
|
|
|
|
public void testSetup()
|
|
{
|
|
assertNotNull(nodeService);
|
|
assertNotNull(authenticationService);
|
|
assertNotNull(ownableService);
|
|
}
|
|
|
|
public void testUnSet()
|
|
{
|
|
assertNull(ownableService.getOwner(rootNodeRef));
|
|
assertFalse(ownableService.hasOwner(rootNodeRef));
|
|
}
|
|
|
|
public void testCMObject()
|
|
{
|
|
authenticationService.authenticate(USER_ANDY, USER_ANDY.toCharArray());
|
|
NodeRef testNode = nodeService.createNode(rootNodeRef, ContentModel.ASSOC_CHILDREN, ContentModel.TYPE_PERSON, ContentModel.TYPE_CMOBJECT, null).getChildRef();
|
|
permissionService.setPermission(rootNodeRef, USER_ANDY, PermissionService.TAKE_OWNERSHIP, true);
|
|
assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
assertTrue(ownableService.hasOwner(testNode));
|
|
assertTrue(nodeService.hasAspect(testNode, ContentModel.ASPECT_AUDITABLE));
|
|
assertFalse(nodeService.hasAspect(testNode, ContentModel.ASPECT_OWNABLE));
|
|
assertTrue(dynamicAuthority.hasAuthority(testNode, USER_ANDY));
|
|
|
|
assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
|
|
// nodeService.setProperty(testNode, ContentModel.PROP_CREATOR, USER_WOOF);
|
|
// assertEquals(USER_WOOF, ownableService.getOwner(testNode));
|
|
//
|
|
// nodeService.setProperty(testNode, ContentModel.PROP_CREATOR, USER_ANDY);
|
|
// assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
//
|
|
permissionService.setInheritParentPermissions(testNode, false);
|
|
|
|
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(rootNodeRef, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(rootNodeRef, PermissionService.SET_OWNER));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.SET_OWNER));
|
|
|
|
permissionService.setPermission(rootNodeRef, USER_ANDY, PermissionService.WRITE_PROPERTIES, true);
|
|
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(rootNodeRef, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(rootNodeRef, PermissionService.SET_OWNER));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.SET_OWNER));
|
|
|
|
|
|
|
|
ownableService.setOwner(testNode, USER_WOOF);
|
|
assertEquals(USER_WOOF, ownableService.getOwner(testNode));
|
|
assertTrue(dynamicAuthority.hasAuthority(testNode, USER_WOOF));
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(testNode, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(testNode, PermissionService.SET_OWNER));
|
|
|
|
|
|
ownableService.setOwner(testNode, USER_MUPPET);
|
|
assertEquals(USER_MUPPET, ownableService.getOwner(testNode));
|
|
assertTrue(dynamicAuthority.hasAuthority(testNode, USER_MUPPET));
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(testNode, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.DENIED, permissionService.hasPermission(testNode, PermissionService.SET_OWNER));
|
|
|
|
|
|
ownableService.takeOwnership(testNode);
|
|
assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
assertTrue(dynamicAuthority.hasAuthority(testNode, USER_ANDY));
|
|
assertTrue(nodeService.hasAspect(testNode, ContentModel.ASPECT_AUDITABLE));
|
|
assertTrue(nodeService.hasAspect(testNode, ContentModel.ASPECT_OWNABLE));
|
|
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(rootNodeRef, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(rootNodeRef, PermissionService.SET_OWNER));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.TAKE_OWNERSHIP));
|
|
assertEquals(AccessStatus.ALLOWED, permissionService.hasPermission(testNode, PermissionService.SET_OWNER));
|
|
|
|
nodeService.setProperty(testNode, ContentModel.PROP_OWNER, USER_MUPPET);
|
|
assertEquals(USER_MUPPET, ownableService.getOwner(testNode));
|
|
nodeService.removeAspect(testNode, ContentModel.ASPECT_OWNABLE);
|
|
assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
|
|
HashMap<QName, Serializable> aspectProperties = new HashMap<QName, Serializable>();
|
|
aspectProperties.put(ContentModel.PROP_OWNER, USER_MUPPET);
|
|
nodeService.addAspect(testNode, ContentModel.ASPECT_OWNABLE, aspectProperties);
|
|
assertEquals(USER_MUPPET, ownableService.getOwner(testNode));
|
|
|
|
// -ve test
|
|
try
|
|
{
|
|
ownableService.setOwner(testNode, "unknownuserdoesnotexist");
|
|
fail("Unexpected - should not be able to set owner as a non-existent user");
|
|
}
|
|
catch (NoSuchPersonException nspe)
|
|
{
|
|
// ignore
|
|
}
|
|
}
|
|
|
|
public void testContainer()
|
|
{
|
|
authenticationService.authenticate(USER_ANDY, USER_ANDY.toCharArray());
|
|
NodeRef testNode = nodeService.createNode(rootNodeRef, ContentModel.ASSOC_CHILDREN, ContentModel.TYPE_PERSON, ContentModel.TYPE_CONTAINER, null).getChildRef();
|
|
assertNull(ownableService.getOwner(testNode));
|
|
assertFalse(ownableService.hasOwner(testNode));
|
|
assertFalse(nodeService.hasAspect(testNode, ContentModel.ASPECT_AUDITABLE));
|
|
assertFalse(nodeService.hasAspect(testNode, ContentModel.ASPECT_OWNABLE));
|
|
assertFalse(dynamicAuthority.hasAuthority(testNode, USER_ANDY));
|
|
|
|
assertFalse(permissionService.hasPermission(testNode, PermissionService.READ) == AccessStatus.ALLOWED);
|
|
assertFalse(permissionService.hasPermission(testNode, permissionService.getAllPermission()) == AccessStatus.ALLOWED);
|
|
|
|
permissionService.setPermission(rootNodeRef, permissionService.getOwnerAuthority(), permissionService.getAllPermission(), true);
|
|
|
|
ownableService.setOwner(testNode, USER_MUPPET);
|
|
assertEquals(USER_MUPPET, ownableService.getOwner(testNode));
|
|
ownableService.takeOwnership(testNode);
|
|
assertEquals(USER_ANDY, ownableService.getOwner(testNode));
|
|
assertFalse(nodeService.hasAspect(testNode, ContentModel.ASPECT_AUDITABLE));
|
|
assertTrue(nodeService.hasAspect(testNode, ContentModel.ASPECT_OWNABLE));
|
|
assertTrue(dynamicAuthority.hasAuthority(testNode, USER_ANDY));
|
|
|
|
assertTrue(permissionService.hasPermission(testNode, PermissionService.READ) == AccessStatus.ALLOWED);
|
|
assertTrue(permissionService.hasPermission(testNode, permissionService.getAllPermission())== AccessStatus.ALLOWED);
|
|
|
|
|
|
}
|
|
|
|
}
|