mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-10-08 14:51:49 +00:00
115426 adavis: ACE-4520: Merged 5.1.N (5.1.1) to 5.1-MNT1 (5.1.0) << All the MNT-13871 commits at the end of phase 2 testing of 4.2.5 >> 111899: Merged 5.0.N (5.0.3) to 5.1.N (5.1.0) (PARTIAL MERGE) 111834: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 111589: Merged V4.1-BUG-FIX (4.1.11) to V4.2-BUG-FIX (4.2.6) 111531: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Added small changes required for compilation of authorization module., 111901: Merged 5.0.N (5.0.3) to 5.1.N (5.1.0) (PARTIAL MERGE) 111836: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 111765: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 111600: Merged V4.1-BUG-FIX (4.1.11) to PATCHES/V4.2.5 (4.2.5) MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Extra changes that are required to make authorization module build green., 112553: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 112540: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 112447: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Added configuration required to compile authorised-users module., 113101: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 112930: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 112707 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 112677 dvaserin: MNT-14780 (MNT-13871): Licence Error message when in overage - Place overage buffer information into License MBean and use it in admin license ftl. 112634 adavis: MNT-13871: Merged DEV (V4.2.5-MNT-13871-LATEST) to V4.2.5 (4.2.5) 111550: Merged DEV (4.1.11) to DEV (4.2.5) MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Merged all made changes in core alfresco projects as single commit to fresh dev branch forked from V4.1-BUG-FIX. MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - added try/finally approach to reset show delete users flag to default value., 111574: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Added V4.2.5 specific changes., 111582: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Updated the jar to correspond with the latest changes in authorised-users/4.2, 111751: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Removed unnecessary configuration., 111752: Merged DEV (V4.1.11) to DEV (V4.2.5) 111632: MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Fixed unit tests for build plan: https://bamboo.alfresco.com/bamboo/browse/DEV-ENT414-1, 111753: Merged DEV (4.1.11) to DEV (V4.2.5) 111719: MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Updated authorization related icons with ones provided by Mark Howarth. - Information message in Deauthorize Dialog was changed to the on provided by Mark Howarth., 111754: MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Updated to the latest authorised-users lib., 111761: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Fix for the SchemaReferenceFileTest., 111800: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Modified the test to create a tenant in a retrying transaction to solve the DataIntegrityViolationException., 111801: Megred DEV (4.1.11) to DEV (4.2.5) 111795: MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Updated Deleted column to display text instead of tick icon. - Added name for actions column., 111813: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Updated to the latest authorisation jar to fix the Scema Reference test., 112020: MNT-14775: De-authorisation pop-up has similar title to first line of text - Remove the duplicated text from the pop-up body - Updated link to point the 4.2 documentation, 112134: MNT-14763: [UserAuth] New entries are added in the authorization table for each different username case - Update authorization jar, 112144: MNT-13871: Optimized strings in users.get.properties, 112184: MNT-14762 : [UserAuth]Users from the ALFRESCO_ADMINISTRATORS LDAP group are not pre-authorized - Updated authorized-users jar with fix for ldap administrators pre-authorization., 112196: MNT-14729 : [UserAuth] The column header for the Deauthorize and Reauthorize button should have a name - Updated name for re/de-authorize actions column., 112202: MNT-14763: [UserAuth] New entries are added in the authorization table for each different username case - Add new authorization jar to fix null errors, 112203: MNT-14779: System behaviour when system set read only due to licence exception - Force read-write transaction for LoginPost script., 112225: MNT-14763: [UserAuth] New entries are added in the authorization table for each different username case - Add new authorization jar after unit test fixing., 112226: MNT-14740 : [UserAuth] The message for the failed re authorization is not displayed onIE - Code for reloading page was wrapped with YAHOO.lang.later() function., 112247: MNT-14747 : [UserAuth]The Autorization State isn't change when the user logs via FTP. - Updated authorization jar with fix for kerberos unit test., 112259: MNT-14776: Heading banner text when using all allowed authorised users. - Changed the message. - Updated the authorised-users jar., 112269: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Wrap methods that uses 'authenticationComponent.setCurrentUser' into RetryingTransaction for retrying on DataIntegrityViolationException., 112285: MNT-14747 : [UserAuth]The Autorization State isn't change when the user logs via FTP. - Updated version for authorized-users jar., 112388: MNT-14809: [UserAuth] On a cluster setup after running the hourly job only one node goes into R/O mode - Updated the authorised-users.jar, 112439: MNT-14815 : Wrong documentation link used in the deauthorize message window - Corrected link to documentation., 112445: MNT-14818 : [UserAuth] Missing quotation mark in the user reauthorization window message - Corrected message for reauthorization dialog., 112450: MNT-14802: [UserAuth] License warning message displayed for all the users - Updated the authorised-users jar., 112454: MNT-14780: Licence Error message when in overage - Make license warn messages on admin console the same as banner warn messages., 112471: MNT-14773 : Sort state not persisted after authorisation action - Sorting/paging state is now persists in sessionStorage., 112478: MNT-14773 : Sort state not persisted after authorisation action - Corrected previous fix., 112483: MNT-14814: [UserAuth] System goes into R/O mode after running the hourly job - Updated the authorised-users jar to the latest version., 112512: MNT-14833: [UserAuth] User cannot login on both nodes (cluster env.) - Update authorization jar., 112556: MNT-14787: [UserAuth] Login via NFS works when the license limit exceed - Modified the exception handling of setCurrentUser method. Now all the exceptions are rethrown., 112570: MNT-14838: Correct the Max Users string in the Admin Console License Screen - Corrected the string, remove the incorrect translations from the bundle., 112572: REVERSE MERGED <<code is not worth to implement>> 112471 : MNT-14773 : Sort state not persisted after authorisation action - Sorting/paging state is now persists in sessionStorage. 112478 : MNT-14773 : Sort state not persisted after authorisation action - Corrected previous fix. , 112610: MNT-14837 : Report license overage to the log files on authorization/deauthorization of users - Updated users authorization jar file., 112627: MNT-14839: [UserAuth]Alfresco goes in read -only after reauthorize a user from LDAP ALFESCO_ADMINISTRATORS group - Updated the authorised-users jar to the latest version. Merged DEV (V5.0.2-MNT-13871) to 5.0.N (5.0.3) 111954: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Removed context reference to authorization., 112003: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Added copying of sources and configuration from authorised-users to the output directory during build., 112014: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Modified the build configuration to unpack the resources to the test folders., 112027: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Added unpacking of authorisation resources to repoitory-crypto project., 112067: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Removed unpacking of resources, changed the context imports to point to authorization., 112952: Merged DEV (V5.0.2-MNT-13871) to 5.0.N (5.0.3) 111887: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Corrected the authorised-users version to correspond to 5.0., 113060: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113059 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113058 adavis: MNT-13871: Count authorised users as those who've logged in, not total # of person objects - Version dependency for alfresco-authorised-users moved to top level pom, 113103: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 113036 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113030 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113019 amukha: MNT-14862 MNT-13871: [UserAuth] Login via FTP works when the license limit exceed - Corrected the AlfrescoFtpAuthenticator to rollback teh transaction if an exception was thrown., 113215: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 113213 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) (PARTIAL MERGE) 113209 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113124: MNT-13871: MNT-14875: The table creation code for authorised-user (MNT-13871) need to be moved back into the main Alfresco code base - Added the scripts to the main code base. - Updated the authorised-users.jar, 113203: MNT-13871: MNT-14875: The table creation code for authorised-user (MNT-13871) need to be moved back into the main Alfresco code base - Moved the patch to the main code. - Updated the authorised-users.jar 113128: MNT-14867 (MNT-13871) : [UserAuth] License user limit exceeded by adding users to ALFRESCO_ADMINISTRATORS LDAP group - Updated auhtorised-users jar.,, 113246: MNT-13871 : Count authorised users as those who've logged in, not total # of person objects - Try to fix one of the two build errors on 5.1.N as a result of r113101, 113578: MNT-14901 MNT-13871: 4.2.5 User Auth code merged to 5.1.N caused 2 build failures - Fixed the test SiteServiceImplTest.testGroupMembership , 113647: MNT-14901 MNT-13871: 4.2.5 User Auth code merged to 5.1.N caused 2 build failures - Fixed the test SiteServiceImplTest.testListSiteMemberships that failed after testGroupMembership was fixed, but didn't delete the created site., 113935: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113924 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113914 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113903 gbroadbent: GERMAN: Updated bundle based on EN-rev112938, 113936: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113925 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113915 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113904 gbroadbent: SPANISH: Updated bundle based on EN-rev112938, 113937: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113926 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113916 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113905 gbroadbent: FRENCH: Updated bundle based on EN-rev112938, 113939: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113927 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113917 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113906 gbroadbent: ITALIAN: Updated bundle based on EN-rev112938, 113940: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113928 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113918 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113907 gbroadbent: JAPANESE: Updated bundle based on EN-rev112938, 113941: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113929 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113919 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113908 gbroadbent: NORWEGIAN Bokmal: Updated bundle based on EN-rev112938, 113942: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113930 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113920 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113909 gbroadbent: DUCTH: Updated bundle based on EN-rev112938, 113943: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113931 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113921 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113910 gbroadbent: BRAZILIAN PORTUGUESE: Updated bundle based on EN-rev112938, 113944: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113932 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113922 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113911 gbroadbent: SIMPLIFIED Chinese: Updated bundle based on EN-rev112938, 113945: MNT-13871: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) (PARTIAL MERGE) 113933 adavis: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 113923 adavis: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 113912 gbroadbent: RUSSIAN: Updated bundle based on EN-rev112938, 114046: MNT-14901 MNT-13871: 4.2.5 User Auth code merged to 5.1.N caused 2 build failures - Removed the hardcoded value in the test., 114589: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114485 amorarasu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114335 amukha: Merged V4.1-BUG-FIX (4.1.11) to V4.2-BUG-FIX (4.2.6) 114334 amukha: MNT-14984 MNT-13871: Modification to the User Authentication Warning wording. - Changed the warning message., 114828: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114749 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114703 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114574 gbroadbent: GERMAN: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114829: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114750 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114704 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114575 gbroadbent: SPANISH: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114830: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114751 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114705 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114576 gbroadbent: FRENCH: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114831: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114752 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114706 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114577 gbroadbent: ITALIAN: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114832: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114753 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114708 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114578 gbroadbent: JAPANESE: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114833: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114754 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114709 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114579 gbroadbent: DUTCH: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114834: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114755 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114710 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114580 gbroadbent: RUSSIAN: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114835: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114756 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114711 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114593 gbroadbent: SIMP CHINESE: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871, 114836: Merged 5.0.N (5.0.3) to 5.1.N (5.1.1) 114757 rmunteanu: Merged V4.2-BUG-FIX (4.2.6) to 5.0.N (5.0.3) 114712 amorarasu: Merged V4.2.5 (4.2.5) to V4.2-BUG-FIX (4.2.6) 114594 gbroadbent: NORWEGIAN Bokmal: Updated file based on EN-rev114472. Fix for MNT-14984 MNT-13871 git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@115664 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
915 lines
37 KiB
Java
915 lines
37 KiB
Java
/*
|
|
* Copyright (C) 2005-2014 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.repo.tenant;
|
|
|
|
import static org.junit.Assert.*;
|
|
|
|
import java.io.Serializable;
|
|
import java.util.HashMap;
|
|
import java.util.Map;
|
|
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.policy.BehaviourFilter;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
|
|
import org.alfresco.repo.tenant.TenantUtil.TenantRunAsWork;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
|
import org.alfresco.service.cmr.repository.AssociationRef;
|
|
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.repository.StoreRef;
|
|
import org.alfresco.service.cmr.search.SearchService;
|
|
import org.alfresco.service.cmr.security.MutableAuthenticationService;
|
|
import org.alfresco.service.cmr.security.PersonService;
|
|
import org.alfresco.service.namespace.NamespaceService;
|
|
import org.alfresco.service.namespace.QName;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.alfresco.util.ApplicationContextHelper;
|
|
import org.alfresco.util.GUID;
|
|
import org.junit.After;
|
|
import org.junit.Before;
|
|
import org.junit.Test;
|
|
import org.springframework.context.ApplicationContext;
|
|
|
|
/**
|
|
* A test for MultiTServiceImpl class.
|
|
*
|
|
* @author alex.mukha
|
|
* @since 4.2.3
|
|
*/
|
|
public class MultiTServiceImplTest
|
|
{
|
|
private static ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
|
private MultiTServiceImpl multiTServiceImpl;
|
|
private TenantAdminService tenantAdminService;
|
|
private PersonService personService;
|
|
private TenantService tenantService;
|
|
private MutableAuthenticationService authenticationService;
|
|
private TransactionService transactionService;
|
|
private NodeService nodeService;
|
|
private SearchService searchService;
|
|
private NamespaceService namespaceService;
|
|
|
|
private boolean mtEnabled;
|
|
|
|
// Test variables
|
|
private static final String DEFAULT_ADMIN_PW = "admin";
|
|
private static final String PASS = "password";
|
|
private static final String PROTOCOL = "testprotocol";
|
|
private static final String IDENTIFIER = "testidentifier";
|
|
private static final String ID = "id";
|
|
private static final String ROOT_PATH = "/";
|
|
private static final StoreRef DEFAULT_STORE = StoreRef.STORE_REF_WORKSPACE_SPACESSTORE;
|
|
private static final NodeRef NODE_REF = new NodeRef(PROTOCOL, IDENTIFIER, ID);
|
|
private static final StoreRef STORE_REF = new StoreRef(PROTOCOL, IDENTIFIER);
|
|
private static final String NAMESPACE_URI = "testassoctypenamespace";
|
|
private static final String LOCAL_NAME = "testassoctypelocalname";
|
|
private static final QName QNAME = QName.createQName(NAMESPACE_URI, LOCAL_NAME);
|
|
private static final AssociationRef assocRef = new AssociationRef(NODE_REF, QNAME, NODE_REF);
|
|
|
|
private static String DOMAIN = null;
|
|
private static String USER1 = null;
|
|
private static String USER2 = null;
|
|
private static String USER3 = null;
|
|
private static String USER2_WITH_DOMAIN = null;
|
|
private static String STRING = null;
|
|
private static String TENANT_STRING = null;
|
|
private static String STRING_WITH_EXISTENT_DOMAIN = null;
|
|
private static String STRING_WITH_NONEXITENT_DOMAIN = null;
|
|
private static StoreRef TENANT_STORE = null;
|
|
private static NodeRef TENANT_NODE_REF = null;
|
|
private static StoreRef TENANT_STORE_REF = null;
|
|
private static QName TENANT_QNAME = null;
|
|
private static AssociationRef tenantAssocRef = null;
|
|
private static ChildAssociationRef childAssocRef = null;
|
|
private static ChildAssociationRef tenantChildAssocRef = null;
|
|
|
|
@Before
|
|
public void setUp() throws Exception
|
|
{
|
|
multiTServiceImpl = ctx.getBean("tenantService", MultiTServiceImpl.class);
|
|
tenantAdminService = ctx.getBean("tenantAdminService", TenantAdminService.class);
|
|
personService = ctx.getBean("PersonService", PersonService.class);
|
|
tenantService = ctx.getBean("tenantService", TenantService.class);
|
|
authenticationService = ctx.getBean("AuthenticationService", MutableAuthenticationService.class);
|
|
transactionService = ctx.getBean("TransactionService", TransactionService.class);
|
|
nodeService = ctx.getBean("NodeService", NodeService.class);
|
|
searchService = ctx.getBean("SearchService", SearchService.class);
|
|
namespaceService = ctx.getBean("NamespaceService", NamespaceService.class);
|
|
|
|
DOMAIN = GUID.generate();
|
|
USER1 = GUID.generate();
|
|
USER2 = GUID.generate();
|
|
USER3 = GUID.generate();
|
|
USER2_WITH_DOMAIN = USER2 + TenantService.SEPARATOR + DOMAIN;
|
|
STRING = GUID.generate();
|
|
TENANT_STRING = addDomainToId(STRING, DOMAIN);
|
|
STRING_WITH_EXISTENT_DOMAIN = TenantService.SEPARATOR + DOMAIN + TenantService.SEPARATOR;
|
|
STRING_WITH_NONEXITENT_DOMAIN = TenantService.SEPARATOR + STRING + TenantService.SEPARATOR;
|
|
TENANT_STORE = new StoreRef(StoreRef.PROTOCOL_WORKSPACE, addDomainToId("SpacesStore", DOMAIN));
|
|
TENANT_NODE_REF = new NodeRef(PROTOCOL, addDomainToId(IDENTIFIER, DOMAIN), ID);
|
|
TENANT_STORE_REF = new StoreRef(PROTOCOL, addDomainToId(IDENTIFIER, DOMAIN));
|
|
TENANT_QNAME = QName.createQName(addDomainToId(NAMESPACE_URI, DOMAIN), LOCAL_NAME);
|
|
tenantAssocRef = new AssociationRef(TENANT_NODE_REF, QNAME, TENANT_NODE_REF);
|
|
childAssocRef = new ChildAssociationRef(QNAME, NODE_REF, QNAME, NODE_REF);
|
|
tenantChildAssocRef = new ChildAssociationRef(QNAME, TENANT_NODE_REF, QNAME, TENANT_NODE_REF);
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
|
|
|
mtEnabled = AuthenticationUtil.isMtEnabled();
|
|
AuthenticationUtil.setMtEnabled(false);
|
|
}
|
|
|
|
@After
|
|
public void tearDown() throws Exception
|
|
{
|
|
deleteTenant(DOMAIN);
|
|
AuthenticationUtil.setMtEnabled(mtEnabled);
|
|
AuthenticationUtil.clearCurrentSecurityContext();
|
|
}
|
|
|
|
@Test
|
|
public void testIsTenantUser()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
|
|
// Create a user with a plain user name without a domain
|
|
NodeRef userNodeRef = createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
assertFalse("The user is not from a tenant, but was reported otherwise.", multiTServiceImpl.isTenantUser(USER1));
|
|
|
|
// Create a user with a name as an email, but not from tenant
|
|
userNodeRef = createUser(USER2_WITH_DOMAIN, TenantService.DEFAULT_DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
assertFalse("The user is not from a tenant, but was reported otherwise.", multiTServiceImpl.isTenantUser(USER2_WITH_DOMAIN));
|
|
|
|
// Create a tenant and a user in it
|
|
createTenant(DOMAIN);
|
|
userNodeRef = createUser(USER3, DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
assertTrue("The user is from a tenant, but was reported otherwise.", multiTServiceImpl.isTenantUser(USER3 + MultiTServiceImpl.SEPARATOR + DOMAIN));
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetCurrentUserDomain()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
// Test a tenant user
|
|
createTenant(DOMAIN);
|
|
NodeRef userNodeRef = createUser(USER1, DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
|
|
TenantRunAsWork<String> work = new TenantRunAsWork<String>()
|
|
{
|
|
@Override
|
|
public String doWork() throws Exception
|
|
{
|
|
return tenantService.getCurrentUserDomain();
|
|
}
|
|
};
|
|
|
|
String result = TenantUtil.runAsUserTenant(work, USER1, DOMAIN);
|
|
assertEquals("The domains do not match.", DOMAIN, result);
|
|
|
|
// Test a default user
|
|
userNodeRef = createUser(USER2, TenantService.DEFAULT_DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
|
|
work = new TenantRunAsWork<String>()
|
|
{
|
|
@Override
|
|
public String doWork() throws Exception
|
|
{
|
|
return tenantService.getCurrentUserDomain();
|
|
}
|
|
};
|
|
|
|
result = TenantUtil.runAsUserTenant(work, USER2, TenantService.DEFAULT_DOMAIN);
|
|
assertEquals("The domains do not match.", TenantService.DEFAULT_DOMAIN, result);
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetName()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
NodeRef userNodeRef = createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
TenantRunAsWork<NodeRef> work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(NODE_REF);
|
|
}
|
|
};
|
|
NodeRef result = TenantUtil.runAsUserTenant(work1, USER1, TenantService.DEFAULT_DOMAIN);
|
|
assertEquals("The NodeRef should contain domain.", NODE_REF, result);
|
|
|
|
createTenant(DOMAIN);
|
|
userNodeRef = createUser(USER2, DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(NODE_REF);
|
|
}
|
|
};
|
|
result = TenantUtil.runAsUserTenant(work1, USER2, DOMAIN);
|
|
assertEquals("The NodeRef should contain domain.", TENANT_NODE_REF, result);
|
|
|
|
work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(TENANT_NODE_REF, NODE_REF);
|
|
}
|
|
};
|
|
result = TenantUtil.runAsUserTenant(work1, USER2, DOMAIN);
|
|
assertEquals("The NodeRef should contain domain.", TENANT_NODE_REF, result);
|
|
|
|
TenantRunAsWork<StoreRef> work2 = new TenantRunAsWork<StoreRef>()
|
|
{
|
|
@Override
|
|
public StoreRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(STORE_REF);
|
|
}
|
|
};
|
|
StoreRef result2 = TenantUtil.runAsUserTenant(work2, USER2, DOMAIN);
|
|
assertEquals("The StoreRef should contain domain.", TENANT_STORE_REF, result2);
|
|
|
|
TenantRunAsWork<ChildAssociationRef> work3 = new TenantRunAsWork<ChildAssociationRef>()
|
|
{
|
|
@Override
|
|
public ChildAssociationRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(childAssocRef);
|
|
}
|
|
};
|
|
ChildAssociationRef result3 = TenantUtil.runAsUserTenant(work3, USER2, DOMAIN);
|
|
assertEquals("The ChildAssociationRef should contain domain.", tenantChildAssocRef, result3);
|
|
|
|
TenantRunAsWork<AssociationRef> work4 = new TenantRunAsWork<AssociationRef>()
|
|
{
|
|
@Override
|
|
public AssociationRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(assocRef);
|
|
}
|
|
};
|
|
AssociationRef result4 = TenantUtil.runAsUserTenant(work4, USER2, DOMAIN);
|
|
assertEquals("The AssociationRef should contain domain.", tenantAssocRef, result4);
|
|
|
|
TenantRunAsWork<StoreRef> work5 = new TenantRunAsWork<StoreRef>()
|
|
{
|
|
@Override
|
|
public StoreRef doWork() throws Exception
|
|
{
|
|
return tenantService.getName(USER2_WITH_DOMAIN, STORE_REF);
|
|
}
|
|
};
|
|
StoreRef result5 = TenantUtil.runAsUserTenant(work5, USER2, DOMAIN);
|
|
assertEquals("The StoreRef should contain domain.", TENANT_STORE_REF, result5);
|
|
|
|
TenantRunAsWork<QName> work6 = new TenantRunAsWork<QName>()
|
|
{
|
|
@Override
|
|
public QName doWork() throws Exception
|
|
{
|
|
return tenantService.getName(QNAME);
|
|
}
|
|
};
|
|
QName result6 = TenantUtil.runAsUserTenant(work6, USER2, DOMAIN);
|
|
assertEquals("The QName should contain domain.", TENANT_QNAME, result6);
|
|
|
|
TenantRunAsWork<QName> work7 = new TenantRunAsWork<QName>()
|
|
{
|
|
@Override
|
|
public QName doWork() throws Exception
|
|
{
|
|
return tenantService.getName(TENANT_NODE_REF, QNAME);
|
|
}
|
|
};
|
|
QName result7 = TenantUtil.runAsUserTenant(work7, USER2, DOMAIN);
|
|
assertEquals("The QName should contain domain.", TENANT_QNAME, result7);
|
|
|
|
TenantRunAsWork<String> work8 = new TenantRunAsWork<String>()
|
|
{
|
|
@Override
|
|
public String doWork() throws Exception
|
|
{
|
|
return tenantService.getName(STRING);
|
|
}
|
|
};
|
|
String result8 = TenantUtil.runAsUserTenant(work8, USER2, DOMAIN);
|
|
assertEquals("The String should contain domain.", TENANT_STRING, result8);
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetBaseName()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
NodeRef userNodeRef = createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
TenantRunAsWork<NodeRef> work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(NODE_REF);
|
|
}
|
|
};
|
|
NodeRef result = TenantUtil.runAsUserTenant(work1, USER1, TenantService.DEFAULT_DOMAIN);
|
|
assertEquals("The NodeRef should not contain domain.", NODE_REF, result);
|
|
|
|
createTenant(DOMAIN);
|
|
userNodeRef = createUser(USER2, DOMAIN, PASS);
|
|
assertNotNull("The user was not created.", userNodeRef);
|
|
work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_NODE_REF);
|
|
}
|
|
};
|
|
result = TenantUtil.runAsUserTenant(work1, USER2, DOMAIN);
|
|
assertEquals("The NodeRef should not contain domain.", NODE_REF, result);
|
|
|
|
work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_NODE_REF, true);
|
|
}
|
|
};
|
|
result = TenantUtil.runAsUserTenant(work1, USER1, TenantService.DEFAULT_DOMAIN);
|
|
assertEquals("The NodeRef should not contain domain.", NODE_REF, result);
|
|
|
|
work1 = new TenantRunAsWork<NodeRef>()
|
|
{
|
|
@Override
|
|
public NodeRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_NODE_REF, false);
|
|
}
|
|
};
|
|
result = TenantUtil.runAsUserTenant(work1, USER1, TenantService.DEFAULT_DOMAIN);
|
|
assertEquals("The NodeRef should contain domain.", TENANT_NODE_REF, result);
|
|
|
|
TenantRunAsWork<StoreRef> work2 = new TenantRunAsWork<StoreRef>()
|
|
{
|
|
@Override
|
|
public StoreRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_STORE_REF);
|
|
}
|
|
};
|
|
StoreRef result2 = TenantUtil.runAsUserTenant(work2, USER2, DOMAIN);
|
|
assertEquals("The StoreRef should not contain domain.", STORE_REF, result2);
|
|
|
|
TenantRunAsWork<ChildAssociationRef> work3 = new TenantRunAsWork<ChildAssociationRef>()
|
|
{
|
|
@Override
|
|
public ChildAssociationRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(tenantChildAssocRef);
|
|
}
|
|
};
|
|
ChildAssociationRef result3 = TenantUtil.runAsUserTenant(work3, USER2, DOMAIN);
|
|
assertEquals("The ChildAssociationRef not should contain domain.", childAssocRef, result3);
|
|
|
|
TenantRunAsWork<AssociationRef> work4 = new TenantRunAsWork<AssociationRef>()
|
|
{
|
|
@Override
|
|
public AssociationRef doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(tenantAssocRef);
|
|
}
|
|
};
|
|
AssociationRef result4 = TenantUtil.runAsUserTenant(work4, USER2, DOMAIN);
|
|
assertEquals("The AssociationRef should not contain domain.", assocRef, result4);
|
|
|
|
TenantRunAsWork<QName> work5 = new TenantRunAsWork<QName>()
|
|
{
|
|
@Override
|
|
public QName doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_QNAME, false);
|
|
}
|
|
};
|
|
QName result5 = TenantUtil.runAsUserTenant(work5, USER2, DOMAIN);
|
|
assertEquals("The QName should not contain domain.", QNAME, result5);
|
|
|
|
TenantRunAsWork<String> work6 = new TenantRunAsWork<String>()
|
|
{
|
|
@Override
|
|
public String doWork() throws Exception
|
|
{
|
|
return tenantService.getBaseName(TENANT_STRING);
|
|
}
|
|
};
|
|
String result6 = TenantUtil.runAsUserTenant(work6, USER2, DOMAIN);
|
|
assertEquals("The String should not contain domain.", STRING, result6);
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testCheckDomainUser()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
String nonExistentDomain = "nonExistentDomain";
|
|
createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
createTenant(DOMAIN);
|
|
createUser(USER2, DOMAIN, PASS);
|
|
try
|
|
{
|
|
createUser(USER3, nonExistentDomain, PASS);
|
|
fail("The string has a domain, but there is no such tenant");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
String username3WithDomain = USER3 + TenantService.SEPARATOR + nonExistentDomain;
|
|
try
|
|
{
|
|
checkDomainUserWork(USER1, TenantService.DEFAULT_DOMAIN, USER1);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
fail("The user is not from domain and is not a tenant.");
|
|
}
|
|
|
|
try
|
|
{
|
|
checkDomainUserWork(USER2_WITH_DOMAIN, DOMAIN, USER2);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
fail("The user is from domain and is a tenant.");
|
|
}
|
|
|
|
try
|
|
{
|
|
checkDomainUserWork(username3WithDomain, DOMAIN, USER2);
|
|
fail("The user is not from this domain.");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testCheckDomain()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
createTenant(DOMAIN);
|
|
createUser(USER2, DOMAIN, PASS);
|
|
try
|
|
{
|
|
createUser(USER3, STRING, PASS);
|
|
fail("The string has a domain, but there is no such tenant");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
try
|
|
{
|
|
checkDomainWork(STRING_WITH_EXISTENT_DOMAIN, TenantService.DEFAULT_DOMAIN, USER1);
|
|
fail("The string has a domain, which should not match the default one.");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
|
|
try
|
|
{
|
|
checkDomainWork(STRING_WITH_EXISTENT_DOMAIN, DOMAIN, USER2);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
fail("The string has a tenant domain and should match the execution context tenant.");
|
|
}
|
|
|
|
try
|
|
{
|
|
checkDomainWork(STRING_WITH_NONEXITENT_DOMAIN, DOMAIN, USER2);
|
|
fail("The string has a domain, which should not match the execution context tenant.");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetRootNode()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
NodeRef rootNodeRefDefault = nodeService.getRootNode(DEFAULT_STORE);
|
|
NodeRef rootNodeRef = new NodeRef(DEFAULT_STORE, IDENTIFIER);
|
|
NodeRef nodeRef = tenantService.getRootNode(nodeService, searchService, namespaceService, ROOT_PATH, rootNodeRef);
|
|
assertEquals("The reported rootNodeRef for the default domain is not correct.", rootNodeRefDefault, nodeRef);
|
|
|
|
createTenant(DOMAIN);
|
|
rootNodeRefDefault = nodeService.getRootNode(TENANT_STORE);
|
|
rootNodeRef = new NodeRef(TENANT_STORE, IDENTIFIER);
|
|
nodeRef = tenantService.getRootNode(nodeService, searchService, namespaceService, ROOT_PATH, rootNodeRef);
|
|
assertEquals("The reported rootNodeRef for the tenant domain is not correct.", rootNodeRefDefault, nodeRef);
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
/**
|
|
* Format of a valid domain string is "@domain@"
|
|
*/
|
|
@Test
|
|
public void testIsTenantName()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
boolean result = tenantService.isTenantName(STRING);
|
|
assertFalse("The string was reported as domain, but it is not", result);
|
|
|
|
result = tenantService.isTenantName(STRING_WITH_EXISTENT_DOMAIN);
|
|
assertTrue("The string was not reported as domain.", result);
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetPrimaryDomain()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
String result = tenantService.getPrimaryDomain(USER1);
|
|
assertNull("The primary domain should be null for a non tenant user without a tenant in name.", result);
|
|
|
|
result = tenantService.getPrimaryDomain(USER2_WITH_DOMAIN);
|
|
assertNull("The primary domain should be null for a tenant user if multi tenancy is not enabled.", result);
|
|
|
|
createTenant(DOMAIN);
|
|
result = tenantService.getPrimaryDomain(USER2_WITH_DOMAIN);
|
|
assertEquals("The primary domain of the USER2 should be " + DOMAIN + ", but was reported as " + result, DOMAIN, result);
|
|
|
|
result = tenantService.getPrimaryDomain(USER1);
|
|
assertTrue("The primary domain should be the default one (empty string) for a non tenant user without a tenant in name.", result.equals(TenantService.DEFAULT_DOMAIN));
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetDomain() throws Exception
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
createUser(USER1, TenantService.DEFAULT_DOMAIN, PASS);
|
|
String result = getDomainWork(STRING, TenantService.DEFAULT_DOMAIN, USER1, false);
|
|
assertEquals("The domain should be reported as default.", TenantService.DEFAULT_DOMAIN, result);
|
|
|
|
createUser(USER2, DOMAIN, PASS);
|
|
result = getDomainWork(STRING, TenantService.DEFAULT_DOMAIN, USER2, false);
|
|
assertEquals("The domain should be reported as default as the tenant was not created yet.", TenantService.DEFAULT_DOMAIN, result);
|
|
|
|
createTenant(DOMAIN);
|
|
result = getDomainWork(STRING_WITH_EXISTENT_DOMAIN, DOMAIN, USER2, false);
|
|
assertEquals("The USER2 domain should be reported as " + DOMAIN, DOMAIN, result);
|
|
|
|
try
|
|
{
|
|
result = getDomainWork(STRING_WITH_EXISTENT_DOMAIN, TenantService.DEFAULT_DOMAIN, USER1, true);
|
|
assertEquals("The domain should be reported as " + DOMAIN, DOMAIN, result);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
fail("An exception should not be thrown.");
|
|
}
|
|
|
|
try
|
|
{
|
|
result = getDomainWork(STRING_WITH_NONEXITENT_DOMAIN, DOMAIN, USER2, true);
|
|
fail("An exception should be thrown as the domains do not match.");
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// Expected
|
|
}
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetTenant()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
Tenant tenant = tenantService.getTenant(DOMAIN);
|
|
assertNull("The tenant should not exist.", tenant);
|
|
|
|
createTenant(DOMAIN);
|
|
tenant = tenantService.getTenant(DOMAIN);
|
|
assertNotNull("The tenant should exist.", tenant);
|
|
assertTrue("The tenant should have the correct domain.", DOMAIN.equals(tenant.getTenantDomain()));
|
|
assertTrue("The tenant should be enabled.", tenant.isEnabled());
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
@Test
|
|
public void testGetUserDomain()
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
|
|
String result = tenantService.getUserDomain(USER1);
|
|
assertEquals("The user domain should be the default one for a non tenant user without a tenant in name.", TenantService.DEFAULT_DOMAIN, result);
|
|
|
|
result = tenantService.getUserDomain(USER2_WITH_DOMAIN);
|
|
assertEquals("The user domain should be the default one for a user with email like name if multi tenancy is not enabled.", TenantService.DEFAULT_DOMAIN, result);
|
|
|
|
createTenant(DOMAIN);
|
|
result = tenantService.getUserDomain(USER2_WITH_DOMAIN);
|
|
assertEquals("The user domain should be of the USER2 is " + DOMAIN + ", but was reported as " + result, DOMAIN, result);
|
|
|
|
result = tenantService.getUserDomain(USER1);
|
|
assertTrue("The user domain should be the default one (empty string) for a non tenant user without a tenant in name.", result.equals(TenantService.DEFAULT_DOMAIN));
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
}
|
|
|
|
/**
|
|
* Runs {@link TenantService#getDomain(String)} as a specified tenant.
|
|
* @param user The input parameter to the {@link TenantService#getDomain(String)}
|
|
* @param domain String
|
|
* @param runAsUsername String
|
|
* @param checkCurrentDomain boolean
|
|
* @return domain
|
|
* @throws Exception
|
|
*/
|
|
private String getDomainWork(final String user, String domain, String runAsUsername, final boolean checkCurrentDomain) throws Exception
|
|
{
|
|
TenantRunAsWork<String> work = new TenantRunAsWork<String>()
|
|
{
|
|
@Override
|
|
public String doWork() throws Exception
|
|
{
|
|
return tenantService.getDomain(user, checkCurrentDomain);
|
|
}
|
|
};
|
|
return TenantUtil.runAsUserTenant(work, runAsUsername, domain);
|
|
}
|
|
|
|
/**
|
|
* Runs {@link TenantService#checkDomain(String)} as a specified tenant.
|
|
* @param string The input parameter to the {@link TenantService#checkDomain(String)}
|
|
* @param domain String
|
|
* @param runAsUsername String
|
|
* @throws Exception
|
|
*/
|
|
private void checkDomainWork(final String string, String domain, String runAsUsername) throws Exception
|
|
{
|
|
TenantRunAsWork<Void> work = new TenantRunAsWork<Void>()
|
|
{
|
|
@Override
|
|
public Void doWork() throws Exception
|
|
{
|
|
tenantService.checkDomain(string);
|
|
return null;
|
|
}
|
|
};
|
|
TenantUtil.runAsUserTenant(work, runAsUsername, domain);
|
|
}
|
|
|
|
/**
|
|
* Runs {@link TenantService#checkDomainUser(String)} as a specified tenant.
|
|
* @param username The input parameter to the {@link TenantService#checkDomainUser(String)}
|
|
* @param domain String
|
|
* @param runAsUsername String
|
|
* @throws Exception
|
|
*/
|
|
private void checkDomainUserWork(final String username, String domain, String runAsUsername) throws Exception
|
|
{
|
|
TenantRunAsWork<Void> work = new TenantRunAsWork<Void>()
|
|
{
|
|
@Override
|
|
public Void doWork() throws Exception
|
|
{
|
|
tenantService.checkDomainUser(username);
|
|
return null;
|
|
}
|
|
};
|
|
TenantUtil.runAsUserTenant(work, runAsUsername, domain);
|
|
}
|
|
|
|
/**
|
|
* Create a tenant domain, if not already created
|
|
*
|
|
* @param tenantDomain String
|
|
*/
|
|
private void createTenant(final String tenantDomain)
|
|
{
|
|
AuthenticationUtil.runAs(new RunAsWork<Object>()
|
|
{
|
|
public Object doWork() throws Exception
|
|
{
|
|
if (!tenantAdminService.existsTenant(tenantDomain))
|
|
{
|
|
tenantAdminService.createTenant(tenantDomain, (DEFAULT_ADMIN_PW + " " + tenantDomain).toCharArray(), null);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
}, AuthenticationUtil.getSystemUserName());
|
|
}
|
|
|
|
/**
|
|
* Crate a user and authentication
|
|
*
|
|
* @param baseUserName String
|
|
* @param tenantDomain String
|
|
* @param password String
|
|
* @return the new user NodeRef
|
|
*/
|
|
private NodeRef createUser(String baseUserName, String tenantDomain, String password)
|
|
{
|
|
String userName = tenantService.getDomainUser(baseUserName, tenantDomain);
|
|
|
|
NodeRef personNodeRef = null;
|
|
|
|
if (!this.personService.personExists(userName))
|
|
{
|
|
// Create the authentication
|
|
this.authenticationService.createAuthentication(userName, password.toCharArray());
|
|
|
|
// Create the person
|
|
Map<QName, Serializable> personProperties = new HashMap<QName, Serializable>();
|
|
personProperties.put(ContentModel.PROP_USERNAME, userName);
|
|
personProperties.put(ContentModel.PROP_FIRSTNAME, baseUserName);
|
|
personProperties.put(ContentModel.PROP_LASTNAME, baseUserName + "-" + tenantDomain);
|
|
personProperties.put(ContentModel.PROP_EMAIL, userName);
|
|
|
|
personNodeRef = this.personService.createPerson(personProperties);
|
|
}
|
|
else
|
|
{
|
|
personNodeRef = personService.getPerson(userName);
|
|
}
|
|
|
|
return personNodeRef;
|
|
}
|
|
|
|
private void deleteTenant(final String tenantDomain)
|
|
{
|
|
AuthenticationUtil.runAs(new RunAsWork<Object>()
|
|
{
|
|
public Object doWork() throws Exception
|
|
{
|
|
RetryingTransactionHelper.RetryingTransactionCallback<Void> work = new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
public Void execute() throws Throwable
|
|
{
|
|
// delete tenant (if it exists)
|
|
if (tenantAdminService.existsTenant(tenantDomain))
|
|
{
|
|
// TODO: WARNING: HACK for ALF-19155: MT deleteTenant does not work
|
|
// PersonService prevents 'guest' authorities from being deleted
|
|
{
|
|
BehaviourFilter behaviourFilter = (BehaviourFilter) ctx.getBean("policyBehaviourFilter");
|
|
behaviourFilter.disableBehaviour(ContentModel.TYPE_PERSON);
|
|
behaviourFilter.disableBehaviour(ContentModel.ASPECT_UNDELETABLE);
|
|
}
|
|
tenantAdminService.deleteTenant(tenantDomain);
|
|
}
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(work);
|
|
return null;
|
|
}
|
|
}, AuthenticationUtil.getSystemUserName());
|
|
}
|
|
|
|
/**
|
|
* Utility method to add a domain to an string id
|
|
* @param id String
|
|
* @param domain String
|
|
* @return a string in format "@domain@id"
|
|
*/
|
|
private static String addDomainToId(String id, String domain)
|
|
{
|
|
return TenantService.SEPARATOR + domain + TenantService.SEPARATOR + id;
|
|
}
|
|
}
|