mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-07 18:25:23 +00:00
40170: Fix compile error following merge from 4.1.0 to 4.1.1 40175: ALF-14002 (5108), ALF-14220 (5109), ALF-15419 (5110) patch versions for 4.1.1 that came from commits made to V4.0-BUG-FIX after 4.0.2 was released. 40203: Fix 4.1 -> 4.1.1 merge error that was stopping start up of Share. Required change to extra config in 4.1.1 added for ALF-12524. There are other differences in the file for ALF-14812 and ALF-14813 but were not impacted. 40206: ALF-15281 - FTP/FTPS: With preserve timestamps turned off, the modification date does not change. 40208: ALF-12831: Upgrade to swftools 0.9.2 40210: ALF-13933: First attempt at installing LibreOffice 3.5 - Installed to a subdirectory called libreoffice - OpenOffice, Openoffice and OpenOffice.org replaced in all display strings 40229: ALF-7278: Merged V3.4-BUG-FIX (3.4.11) to V4.1-BUG-FIX (4.1.1) 40227: ALF-15436 CLONE Alfresco 3.4c + Share + TIFF preview only shows the first page 40237: Fix for ALF-14663 from Vadim Danilchenko - the 'edit online' button in Share fails but we do not send any error message 40258: Merged BRANCHES/DEV/BELARUS/V4.1-BUG-FIX-2012_07_09 to BRANCHES/DEV/V4.1-BUG-FIX: 39668: ALF-15214 patch.fixBpmPackages performs unnecessary work 40261: Merged V3.4-BUG-FIX to V4.1-BUG-FIX 38592: Fixed ALF-14929: NodeDAO might not be last node write to the database - Regression introduced when Hibernate was removed - Fix validated by unit test 38596: Merged DEV to V3.4-BUG-FIX 38594: ALF-14744: Documents uploaded via WebDAV mount from Windows 7, and copied by a jscript rule are zero-length Change CreateNodeRuleTrigger.onCreateNode() method: Search for property of "d:content" type in node TypeDefinition, AspectDefinitions of node aspects and don't fire rules if found. 38781: Fixed ALF-14979: Long running AVM XPath queries on startup - Basic XPath was always fetching all siblings 38896: ALF-14744: Fix rule-firing regressions plus unit test - CreateNodeRuleTrigger must remember new nodes, regardless of whether it fires to avoid an update being fired on a node created in the same transaction - Tests should not assume that inbound rule will be fired on a content-less node (when the node's type or aspects have content properties) 38909: Merged DEV to V3.4-BUG-FIX (3.4.11) << Fix for issued identified by QA on 20/6/12 after verification of customer issues >> 38849: ALF-11956: WCM accessibility Navigation between the fields with erroneous data has been modified to allow navigation between elements of composite widgets such as Date/Time pickers etc... - the fix for ALF-10804 is backported (required for the current fix); - ability of cancelling and reactivating the strict navigation sequence has been added (pressing the Escape key for cancelling and focusing the alert link for reactivating); - generation of duplicate ids for comboboxes of the 'MonthDayPicker' widget has been fixed 38544: ALF-11956: WCM accessibility Draft implementation of 'FocusResolver' which introduces functionality of strict sequence for navigation between fields of the XForms widgets with erroneous data detected during validation 38934: Fix for ALF-13658/ALF-14849 38990: ALF-13048 Configuration of temp directories for converters (Openoffice and JOD) More general approach taken for JOD : - Allow an OpenOffice user template profile to be used by the JOD started OpenOffice process via the alfresco global property jodconverter.templateProfileDir - Among other settings, the profile contains values set in Tools|Options via the UI This includes the temporary directory: Tools|Options|openOffice.org|Temporary Files - If blank, a default profile is created. The user profile is recreated on each restart from the template. May be set to an existing user's profile such as: C:\Users\<username>\AppData\Roaming\OpenOffice.org\3 39115: Merged V3.4 to V3.4-BUG-FIX 38593: Merged DEV to V3.4 38572: ALF-13578: CIFS: AlfJLANWorker threads (concurrency) - server not responding Add nodeServices.exists(nodeRef) check to errorHandler in ContentDiskDriver.closeFile() to hide InvalidNodeRefException here. 38591: ALF-13578: CIFS: AlfJLANWorker threads (concurrency) - server not responding Replace "catch (AlfrescoRuntimeException e)" with "catch (RuntimeException e)" in ContentDiskDriver. Add "catch (InvalidNodeRefException ex)" to ContentDiskDriver.renameFile() method and throw java.io.FileNotFoundException here. 39063: Process the async packet queue at the end of CIFS NIO socket processing, before re-enabling socket events. ALF-13578. 39117: Merged V3.4 to V3.4-BUG-FIX (RECORD ONLY) 39116: ALF-13578: Reversed r39063 due to QA time constraints. Fix will be made limited availability and in next service pack. 39179: Merged DEV to V3.4-BUG-FIX (3.4.11) 38911: ALF-14827: Cannot see metrics data to Alfresco Enterprise Content Store in Hyperic HQ The attribute "TotalSize" is no longer exists in the Alfresco 3.4.x SpaceFree and SpaceTotal are added to the alfresco enterprise plugin. 38910: ALF-15016: Cannot see services to FTP, NFS Server in Hyperic HQ Alfresco enterrprise plugin fixed so that FTP and NFS Server resources now available in resources tab. 39230: ALF-15048 - Create Rule 'Execute Script'- 'Append Copyright to file' - Script that added the copyright was hidden in a .acp file (a zip file). .acp is normally used by wireshark so was not found in searches. 39294: Merged V3.4 to V3.4-BUG-FIX 39293: ALF-14698: Merged PATCHES/V3.4.6 to V3.4 38786: Merged V4.0-BUG-FIX to PATCHES/V3.4.6 (partial rework) 34279: NodeDAO: re-parent "lost & found" orphan child nodes (see ALF-12358 & ALF-13066 / SYS-301) - if orphaned nodes are identified (eg. via getPath(s)) then attempt partial recovery by placing them in (temp) lost_found - ... ALF-12358 ('child' node has deleted parent(s)) - ... ALF-13066 (non-root 'child' node has no parent(s)) - for internal use only - allows index tracking (eg. Solr) to continue - precursor to fixing underlying root causes 34338: NodeDAO: re-parent "lost & found" orphan child nodes (see ALF-12358 & ALF-13066 / SYS-301) - test fix (follow-on to r34279) 34341: NodeDAO: re-parent "lost & found" orphan child nodes (see ALF-12358 & ALF-13066 / SYS-301) - ano test fix (once more with feeling) 34434: ALF-13066: Fix for intermittent failure (testConcurrentLinkToDeletedNode) 38959: ALF-15136: Merged HEAD to PATCHES/V3.4.6 32659: Fixed ALF-11946: Lucene index recovery startup can cause full table scans and file sorts - Made the backward timestepping work in bounded segments, whereas previously there was no lower bound causing the database to creak under load and the whole process to take a long time. - Seen during benchmark testing as well 39211: ALF-15109: 'Touch' nodes in every case where we add / remove secondary parent associations. Causing group membership fallout at SAP. 39218: ALF-15109: Improved fix - must fire cascaded secondary association deletions at DbNodeServiceImpl level to ensure appropriate index events are fired and prevent out of sync indexes! 39240: ALF-15109: Another attempt. Now we are firing all the right events on cascade removal of secondary associations a lot of things are coming out in the wash! - Cascade delete secondary associations in a first recursive pass - Use a List of Pairs rather than a Map to avoid missing multiple associations to the same child 39295: Fixed merge issue 39381: ALF-12781 - Unable to set email contributors authority 39595: Fix for ALF-12506 - utils.setLocale() override the value to a lower case. 39932: ALF-9540: copy from drive to CIFS is slower than direct drive to drive copy by a factor of ~ 15 39935: ALF-9606: JSF, WebDav + Kerberos - Browser goes to a previous visited page when done/cancel edit online document - User is now redirected to logon when session expires. 39961: ALF-9540: Fix some broken unit tests caused by missing policies. 40026: Return success status for CIFS set security descriptor call even when the SecurityDescriptorInterface is not implemented. ALF-15357 Attempt to fix slow MS Office docx file save, unable to reproduce locally. 40090: ALF-15388: Merged V4.1-BUG-FIX to V3.4-BUG-FIX 40022: Fix for ALF-15144 - Slow Share doclib high-level folder browsing due to version history retrieval Revision: 40159 Author: taksoy Date: Tuesday, August 07, 2012 1:44:29 PM Message: ALF-13636: ReferenceError: "containerId" is not defined - Exception thrown during folder rule creation ---- Modified : /alfresco/BRANCHES/DEV/V3.4-BUG-FIX/root/projects/slingshot/source/web/modules/documentlibrary/global-folder.js 40231: ALF-13575: Merged DEV to V3.4-BUG-FIX 39879: Use of NetBIOS name versus DNS name in links accessed through CIFS - hostname is now determined from the path used to mount the drive on the client 40251: Merged DEV to V3.4-BUG-FIX 39667: ALF-4832: Incorrect behaviour of user's activities information in Moderated sites Introduce new method to ActivityPostService that accept userName. Post activity using new method when user is joined to site. 40252: Merged PATCHES/V3.4.6 to V3.4-BUG-FIX 39437: ALF-15458 / ALF-15184: ADMLuceneIndexerImpl debug can cause indexing to fail - Don't try to print the path of a deleted node! 39520: Merged DEV to PATCHES/V3.4.6 38728: ALF-15459 / ALF-14714 : A user can overwrite a "WRITE_LOCK" on a document created by a different user -The document owner is not considered to be the lock owner now. -ALF-12081 was backported. 39581: ALF-15460 / ALF-15216: Need predefined JGroups configuration for FILE_PING - Now FILE_PING can be selected using alfresco.jgroups.defaultProtocol=TCP-FPING - New parameter alfresco.fping.shared.dir specifies its shared directory and defaults to ${dir.contentstore} 39662: ALF-15461 / ALF-15243: "Failed to initialise config service" after a node comes back into the cluster - Nested writable transaction in a read only transaction - Removed old school transaction management 39768: ALF-15462 / ALF-10725: Account for local index impact of reparenting orphaned nodes - Unfortunately this means AbstractNodeDAOImpl now must talk to NodeIndexer but this may be revisited 39770: ALF-15462 / ALF-10725: Fix test failure - an orphaned node WITH the root aspect must still have parents or it is unindexable! 39816: ALF-15462 / ALF-10725: Revisit orphans once more - delete_ChildAssocsToAndFrom removed because it's evil and could orphan a node that's just shown up (read committed) from another transaction - Now only parent assocs of the deleted node are removed automatically and children are handled through normal cascading operations - The foreign keys will now block the deletion of a node with a new child created mid-transaction 39846: ALF-15461 / ALF-15243: Fix unit test failures 40253: Merged PATCHES/V3.4.9 to V3.4.-BUG-FIX 39703: ALF-15463: More synchronization, TRACE logging and test for ALF-15215: Missing synchronization in RepositoryContainer.getRegistry() 39885: ALF-15464 / ALF-15311: JGroups resends incorrect message for XMIT_REQ - Added new configuration files for heartbeat channel that removes NAKACK protocol as guaranteed delivery is not necessary for heartbeat. 40262: Merged V3.4-BUG-FIX to V4.1-BUG-FIX (RECORD ONLY) 36853: Merge DEV to V3.4-BUG-FIX 31272 : ALF-8588 - IMAP Cannot attach two attachments with the same name. 38923: Merged HEAD to BRANCHES/DEV/V3.4-BUG-FIX 32757: Fix for ALF-9365 Merged BRANCHES/DEV/V4.0-BUG-FIX to BRANCHES/DEV/V3.4-BUG-FIX 35693: Fix for ALF-13806 - Get content webscript incorrectly returns text/plain mimetype for HTML files, not text/html Merged BRANCHES/V4.0 to BRANCHES/DEV/V3.4-BUG-FIX 36560: Correctly size content length header after HTML stripping process (ALF-9365) 39015: Merged in upgrade of truezip to 7.5.5 see ALF-14247 39056: Merged V4.1-BUG-FIX to V3.4-BUG-FIX: ALF-15053: Ensure that sub-folders of "res" can be accessed in the DocLib 39361: Added truezip-swing jar. It seems that Truezip needs Swing :( git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@40274 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
980 lines
50 KiB
Java
980 lines
50 KiB
Java
/*
|
|
* Copyright (C) 2005-2011 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.repo.remotecredentials;
|
|
|
|
import static org.junit.Assert.assertEquals;
|
|
import static org.junit.Assert.assertNotNull;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.Collections;
|
|
import java.util.List;
|
|
import java.util.Map.Entry;
|
|
import java.util.Set;
|
|
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.query.PagingRequest;
|
|
import org.alfresco.query.PagingResults;
|
|
import org.alfresco.repo.model.Repository;
|
|
import org.alfresco.repo.policy.BehaviourFilter;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
|
import org.alfresco.service.cmr.dictionary.DictionaryService;
|
|
import org.alfresco.service.cmr.remotecredentials.BaseCredentialsInfo;
|
|
import org.alfresco.service.cmr.remotecredentials.PasswordCredentialsInfo;
|
|
import org.alfresco.service.cmr.remotecredentials.RemoteCredentialsService;
|
|
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.security.MutableAuthenticationService;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.cmr.security.PersonService;
|
|
import org.alfresco.service.namespace.NamespaceService;
|
|
import org.alfresco.service.namespace.QName;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.alfresco.util.PropertyMap;
|
|
import org.alfresco.util.test.junitrules.ApplicationContextInit;
|
|
import org.alfresco.util.test.junitrules.TemporaryNodes;
|
|
import org.alfresco.util.test.junitrules.WellKnownNodes;
|
|
import org.junit.After;
|
|
import org.junit.AfterClass;
|
|
import org.junit.Before;
|
|
import org.junit.BeforeClass;
|
|
import org.junit.ClassRule;
|
|
import org.junit.Rule;
|
|
import org.junit.Test;
|
|
import org.springframework.context.ApplicationContext;
|
|
|
|
/**
|
|
* Test cases for {@link RemoteCredentialsServiceImpl} and friends.
|
|
*
|
|
* Note - this test will largely use a test shared credentials
|
|
* container, but one test puts things into the real credentials folder
|
|
*
|
|
* @author Nick Burch
|
|
* @since Odin
|
|
*/
|
|
public class RemoteCredentialsServicesTest
|
|
{
|
|
private static final String TEST_REMOTE_SYSTEM_ONE = "TestRemoteSystemOne";
|
|
private static final String TEST_REMOTE_SYSTEM_TWO = "TestRemoteSystemTwo";
|
|
private static final String TEST_REMOTE_SYSTEM_THREE = "aAaAaTestRemoteSystemThree";
|
|
|
|
private static final String TEST_REMOTE_USERNAME_ONE = "test@example.com";
|
|
private static final String TEST_REMOTE_USERNAME_TWO = "test2@example.com";
|
|
private static final String TEST_REMOTE_USERNAME_THREE = "test3@example.com";
|
|
|
|
private static final String SHARED_SYSTEM_CONTAINER_NAME = "test-remote-credentials";
|
|
|
|
// Rule to initialise the default Alfresco spring configuration
|
|
@ClassRule public static ApplicationContextInit APP_CONTEXT_INIT = new ApplicationContextInit();
|
|
|
|
// A rule to help find well known nodes in the system
|
|
@ClassRule public static WellKnownNodes knownNodes = new WellKnownNodes(APP_CONTEXT_INIT);
|
|
|
|
// A rule to manage test nodes use in each test method
|
|
@ClassRule public static TemporaryNodes classTestNodes = new TemporaryNodes(APP_CONTEXT_INIT);
|
|
@Rule public TemporaryNodes testNodes = new TemporaryNodes(APP_CONTEXT_INIT);
|
|
|
|
// injected services
|
|
private static MutableAuthenticationService AUTHENTICATION_SERVICE;
|
|
private static BehaviourFilter BEHAVIOUR_FILTER;
|
|
private static RemoteCredentialsService REMOTE_CREDENTIALS_SERVICE;
|
|
private static RemoteCredentialsService PRIVATE_REMOTE_CREDENTIALS_SERVICE;
|
|
private static DictionaryService DICTIONARY_SERVICE;
|
|
private static NodeService NODE_SERVICE;
|
|
private static NodeService PUBLIC_NODE_SERVICE;
|
|
private static NamespaceService NAMESPACE_SERVICE;
|
|
private static Repository REPOSITORY_HELPER;
|
|
private static PersonService PERSON_SERVICE;
|
|
private static RetryingTransactionHelper TRANSACTION_HELPER;
|
|
private static TransactionService TRANSACTION_SERVICE;
|
|
private static PermissionService PERMISSION_SERVICE;
|
|
|
|
private static final String TEST_USER_ONE = RemoteCredentialsServicesTest.class.getSimpleName() + "_testuser1";
|
|
private static final String TEST_USER_TWO = RemoteCredentialsServicesTest.class.getSimpleName() + "_testuser2";
|
|
private static final String TEST_USER_THREE = RemoteCredentialsServicesTest.class.getSimpleName() + "_testuser3";
|
|
private static final String ADMIN_USER = AuthenticationUtil.getAdminUserName();
|
|
|
|
@BeforeClass public static void initTestsContext() throws Exception
|
|
{
|
|
ApplicationContext testContext = APP_CONTEXT_INIT.getApplicationContext();
|
|
|
|
PRIVATE_REMOTE_CREDENTIALS_SERVICE = (RemoteCredentialsService)testContext.getBean("remoteCredentialsService");
|
|
REMOTE_CREDENTIALS_SERVICE = (RemoteCredentialsService)testContext.getBean("RemoteCredentialsService");
|
|
|
|
AUTHENTICATION_SERVICE = (MutableAuthenticationService)testContext.getBean("authenticationService");
|
|
BEHAVIOUR_FILTER = (BehaviourFilter)testContext.getBean("policyBehaviourFilter");
|
|
DICTIONARY_SERVICE = (DictionaryService)testContext.getBean("dictionaryService");
|
|
NAMESPACE_SERVICE = (NamespaceService)testContext.getBean("namespaceService");
|
|
REPOSITORY_HELPER = (Repository)testContext.getBean("repositoryHelper");
|
|
NODE_SERVICE = (NodeService)testContext.getBean("nodeService");
|
|
PUBLIC_NODE_SERVICE = (NodeService)testContext.getBean("NodeService");
|
|
PERSON_SERVICE = (PersonService)testContext.getBean("personService");
|
|
TRANSACTION_HELPER = (RetryingTransactionHelper)testContext.getBean("retryingTransactionHelper");
|
|
TRANSACTION_SERVICE = (TransactionService)testContext.getBean("TransactionService");
|
|
PERMISSION_SERVICE = (PermissionService)testContext.getBean("permissionService");
|
|
|
|
// Switch to a test shared system container
|
|
RemoteCredentialsServiceImpl.setSharedCredentialsSystemContainerName(SHARED_SYSTEM_CONTAINER_NAME);
|
|
}
|
|
|
|
@Before public void setupUsers() throws Exception
|
|
{
|
|
// Do the setup as admin
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
createUser(TEST_USER_ONE);
|
|
createUser(TEST_USER_TWO);
|
|
createUser(TEST_USER_THREE);
|
|
|
|
// We need to create the test site as the test user so that they can contribute content to it in tests below.
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
}
|
|
|
|
/**
|
|
* Tests that read only methods don't create the shared credentials
|
|
* container, but that write ones will do.
|
|
*/
|
|
@Test public void testSharedCredentialsContainer() throws Exception
|
|
{
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
|
|
// To start with, the container shouldn't be there
|
|
NodeRef container = ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getSharedContainerNodeRef(false);
|
|
assertEquals(null, container);
|
|
|
|
// Ask for the list of shared remote systems
|
|
REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
|
|
// Won't have been created by a read
|
|
container = ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getSharedContainerNodeRef(false);
|
|
assertEquals(null, container);
|
|
|
|
|
|
// Try to store some credentials
|
|
PasswordCredentialsInfo credentials = new PasswordCredentialsInfoImpl();
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_ONE, credentials);
|
|
|
|
// It will now exist
|
|
container = ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getSharedContainerNodeRef(false);
|
|
assertNotNull(container);
|
|
|
|
// Should have a marker aspect, and the specified name
|
|
Set<QName> cAspects = PUBLIC_NODE_SERVICE.getAspects(container);
|
|
assertEquals("Aspect missing, found " + cAspects, true,
|
|
cAspects.contains(RemoteCredentialsModel.ASPECT_REMOTE_CREDENTIALS_SYSTEM_CONTAINER));
|
|
assertEquals(SHARED_SYSTEM_CONTAINER_NAME, PUBLIC_NODE_SERVICE.getProperty(container, ContentModel.PROP_NAME));
|
|
|
|
// Should have single node in it
|
|
assertEquals(1, PUBLIC_NODE_SERVICE.getChildAssocs(container).size());
|
|
}
|
|
|
|
/**
|
|
* Creating shared and personal credentials, then checking how this
|
|
* affects the listing of Remote Systems
|
|
*/
|
|
@Test public void testCreateCredentialsAndSystemListing() throws Exception
|
|
{
|
|
PagingResults<String> systems = null;
|
|
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
|
|
// Initially both should be empty
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
|
|
// Create one for the person
|
|
PasswordCredentialsInfoImpl credentials = new PasswordCredentialsInfoImpl();
|
|
credentials.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_ONE, credentials);
|
|
|
|
// Check it shows up
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals("Unexpected systems " + systems.getPage(),
|
|
1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals("Unexpected systems " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals("Unexpected systems " + systems.getPage(),
|
|
1, systems.getPage().size());
|
|
|
|
|
|
// Switch to another user, check it doesn't
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
|
|
|
|
// Create both personal and shared ones as the current user
|
|
credentials = new PasswordCredentialsInfoImpl();
|
|
credentials.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_TWO, credentials);
|
|
|
|
credentials = new PasswordCredentialsInfoImpl();
|
|
credentials.setRemoteUsername(TEST_REMOTE_USERNAME_THREE);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_THREE, credentials);
|
|
|
|
credentials = new PasswordCredentialsInfoImpl();
|
|
credentials.setRemoteUsername(TEST_REMOTE_USERNAME_THREE);
|
|
BaseCredentialsInfo cc = REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_THREE, credentials);
|
|
|
|
// Check as the user who created these
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
|
|
// Check as the first user, they should see the shared one
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
|
|
// Change the shared permissions, see it goes away
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
PERMISSION_SERVICE.setInheritParentPermissions(cc.getRemoteSystemContainerNodeRef(), false);
|
|
|
|
|
|
// Check as the owning user, will still see all of them
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
|
|
// Check as the other user, shared will have gone as we lost read permissions
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
|
|
// Finally, check the listings have the correct things in them
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
assertEquals(true, systems.getPage().contains(TEST_REMOTE_SYSTEM_TWO));
|
|
assertEquals(true, systems.getPage().contains(TEST_REMOTE_SYSTEM_THREE));
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
assertEquals(true, systems.getPage().contains(TEST_REMOTE_SYSTEM_THREE));
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
assertEquals(true, systems.getPage().contains(TEST_REMOTE_SYSTEM_TWO));
|
|
assertEquals(true, systems.getPage().contains(TEST_REMOTE_SYSTEM_THREE));
|
|
}
|
|
|
|
/** Test CRUD on person credentials, with listing */
|
|
@Test public void testPersonCredentialsCRUD() throws Exception
|
|
{
|
|
PagingResults<String> systems = null;
|
|
PagingResults<? extends BaseCredentialsInfo> creds = null;
|
|
|
|
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
// Initially both should be empty empty
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
|
|
// Create for a person
|
|
PasswordCredentialsInfoImpl pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
BaseCredentialsInfo credentials = REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_ONE, pwCred);
|
|
|
|
// Check the new object was populated properly
|
|
assertNotNull(credentials);
|
|
assertNotNull(credentials.getNodeRef());
|
|
assertNotNull(credentials.getRemoteSystemContainerNodeRef());
|
|
assertEquals(TEST_REMOTE_SYSTEM_ONE, credentials.getRemoteSystemName());
|
|
assertEquals(TEST_REMOTE_USERNAME_ONE, credentials.getRemoteUsername());
|
|
assertEquals(RemoteCredentialsModel.TYPE_PASSWORD_CREDENTIALS, credentials.getCredentialsType());
|
|
|
|
|
|
// Fetch and re-check
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertNotNull(credentials);
|
|
assertNotNull(credentials.getNodeRef());
|
|
assertNotNull(credentials.getRemoteSystemContainerNodeRef());
|
|
assertEquals(TEST_REMOTE_SYSTEM_ONE, credentials.getRemoteSystemName());
|
|
assertEquals(TEST_REMOTE_USERNAME_ONE, credentials.getRemoteUsername());
|
|
assertEquals(RemoteCredentialsModel.TYPE_PASSWORD_CREDENTIALS, credentials.getCredentialsType());
|
|
|
|
// Won't be there for non-existent systems
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_TWO);
|
|
assertEquals(null, credentials);
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_THREE);
|
|
assertEquals(null, credentials);
|
|
|
|
|
|
// Update
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(PasswordCredentialsInfoImpl.class, credentials.getClass());
|
|
pwCred = (PasswordCredentialsInfoImpl)credentials;
|
|
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
pwCred.setRemotePassword("testing");
|
|
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.updateCredentials(pwCred);
|
|
assertNotNull(credentials);
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, credentials.getRemoteUsername());
|
|
|
|
// Fetch and re-check
|
|
pwCred = (PasswordCredentialsInfoImpl)REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertNotNull(pwCred);
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, pwCred.getRemoteUsername());
|
|
assertEquals("testing", pwCred.getRemotePassword());
|
|
|
|
|
|
// Update the auth worked flag
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(true, credentials.getLastAuthenticationSucceeded());
|
|
|
|
// To the same thing
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.updateCredentialsAuthenticationSucceeded(true, credentials);
|
|
assertEquals(true, credentials.getLastAuthenticationSucceeded());
|
|
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(true, credentials.getLastAuthenticationSucceeded());
|
|
|
|
// To a different things
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.updateCredentialsAuthenticationSucceeded(false, credentials);
|
|
assertEquals(false, credentials.getLastAuthenticationSucceeded());
|
|
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(false, credentials.getLastAuthenticationSucceeded());
|
|
|
|
// And back
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.updateCredentialsAuthenticationSucceeded(true, credentials);
|
|
assertEquals(true, credentials.getLastAuthenticationSucceeded());
|
|
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(true, credentials.getLastAuthenticationSucceeded());
|
|
|
|
|
|
// List remote systems
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
|
|
// List the credentials
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listAllCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
|
|
// Delete
|
|
REMOTE_CREDENTIALS_SERVICE.deleteCredentials(credentials);
|
|
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.getPersonCredentials(TEST_REMOTE_SYSTEM_ONE);
|
|
assertEquals(null, credentials);
|
|
|
|
|
|
// List again - credentials should have gone, but system remains
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listAllCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
|
|
// Create credentials of Password, OAuth1 and OAuth2 types
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_TWO, pwCred);
|
|
|
|
OAuth1CredentialsInfoImpl oa1Cred = new OAuth1CredentialsInfoImpl();
|
|
oa1Cred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
oa1Cred.setOAuthToken("test");
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_TWO, oa1Cred);
|
|
|
|
OAuth2CredentialsInfoImpl oa2Cred = new OAuth2CredentialsInfoImpl();
|
|
oa2Cred.setRemoteUsername(TEST_REMOTE_USERNAME_THREE);
|
|
oa2Cred.setOauthAccessToken("testA");
|
|
oa2Cred.setOauthRefreshToken("testR");
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_TWO, oa2Cred);
|
|
|
|
|
|
// List, should see all three sets of credentials
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(3, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listAllCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(3, creds.getPage().size());
|
|
|
|
// List the systems, still only system one and two
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(2, systems.getPage().size());
|
|
|
|
|
|
// Check we can filter credentials by type
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(3, creds.getPage().size());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, RemoteCredentialsModel.TYPE_PASSWORD_CREDENTIALS, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_ONE, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, RemoteCredentialsModel.TYPE_OAUTH1_CREDENTIALS, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, RemoteCredentialsModel.TYPE_OAUTH2_CREDENTIALS, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_THREE, creds.getPage().get(0).getRemoteUsername());
|
|
}
|
|
|
|
/** Test CRUD on shared credentials, with listing */
|
|
@Test public void testSharedCredentialsCRUD() throws Exception
|
|
{
|
|
PagingResults<String> systems = null;
|
|
PagingResults<? extends BaseCredentialsInfo> creds = null;
|
|
|
|
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
// Initially both should be empty empty
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
|
|
// Create shared
|
|
PasswordCredentialsInfoImpl pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
BaseCredentialsInfo credentials = REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_ONE, pwCred);
|
|
|
|
// Check the new object was populated properly
|
|
assertNotNull(credentials);
|
|
assertNotNull(credentials.getNodeRef());
|
|
assertNotNull(credentials.getRemoteSystemContainerNodeRef());
|
|
assertEquals(TEST_REMOTE_SYSTEM_ONE, credentials.getRemoteSystemName());
|
|
assertEquals(TEST_REMOTE_USERNAME_ONE, credentials.getRemoteUsername());
|
|
assertEquals(RemoteCredentialsModel.TYPE_PASSWORD_CREDENTIALS, credentials.getCredentialsType());
|
|
|
|
|
|
// Update
|
|
pwCred = (PasswordCredentialsInfoImpl)credentials;
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
credentials = REMOTE_CREDENTIALS_SERVICE.updateCredentials(pwCred);
|
|
|
|
assertNotNull(credentials);
|
|
assertNotNull(credentials.getNodeRef());
|
|
assertNotNull(credentials.getRemoteSystemContainerNodeRef());
|
|
assertEquals(TEST_REMOTE_SYSTEM_ONE, credentials.getRemoteSystemName());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, credentials.getRemoteUsername());
|
|
assertEquals(RemoteCredentialsModel.TYPE_PASSWORD_CREDENTIALS, credentials.getCredentialsType());
|
|
|
|
|
|
// List
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listAllCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, creds.getPage().get(0).getRemoteUsername());
|
|
|
|
|
|
// Delete
|
|
REMOTE_CREDENTIALS_SERVICE.deleteCredentials(credentials);
|
|
|
|
|
|
// List, system remains, credentials gone
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listAllRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listAllCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
}
|
|
|
|
/** Dedicated permissions and paging tests */
|
|
@Test public void testListingPermissionsAndPaging() throws Exception
|
|
{
|
|
PagingResults<String> systems = null;
|
|
PagingResults<? extends BaseCredentialsInfo> creds = null;
|
|
|
|
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
// Initially both should be empty empty
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals("No systems should be found, got " + systems.getPage(),
|
|
0, systems.getPage().size());
|
|
|
|
|
|
// Create some credentials as the first user, for systems One and Two
|
|
PasswordCredentialsInfoImpl pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_ONE, pwCred);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_ONE, pwCred);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_TWO, pwCred);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_TWO, pwCred);
|
|
|
|
|
|
// Switch to the second user, create some credentials on Two and Three
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_TWO, pwCred);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_THREE);
|
|
REMOTE_CREDENTIALS_SERVICE.createSharedCredentials(TEST_REMOTE_SYSTEM_THREE, pwCred);
|
|
|
|
pwCred = new PasswordCredentialsInfoImpl();
|
|
pwCred.setRemoteUsername(TEST_REMOTE_USERNAME_THREE);
|
|
REMOTE_CREDENTIALS_SERVICE.createPersonCredentials(TEST_REMOTE_SYSTEM_THREE, pwCred);
|
|
|
|
|
|
// Check the listings of remote systems for each user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
assertEquals(TEST_REMOTE_SYSTEM_TWO, systems.getPage().get(0));
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listPersonRemoteSystems(new PagingRequest(10));
|
|
assertEquals(1, systems.getPage().size());
|
|
assertEquals(TEST_REMOTE_SYSTEM_THREE, systems.getPage().get(0));
|
|
|
|
|
|
// Check the listings of remote systems that are shared - shouldn't matter which user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(3, systems.getPage().size());
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(3, systems.getPage().size());
|
|
|
|
|
|
// Check the listings of the credentials by user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_SYSTEM_TWO, creds.getPage().get(0).getRemoteSystemName());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listPersonCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(TEST_REMOTE_SYSTEM_THREE, creds.getPage().get(0).getRemoteSystemName());
|
|
|
|
|
|
// Check the shared listing of credentials, same for both users
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
|
|
|
|
// Check the paging of remote systems
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(10));
|
|
assertEquals(3, systems.getPage().size());
|
|
assertEquals(false, systems.hasMoreItems());
|
|
assertEquals(3, systems.getTotalResultCount().getFirst().intValue());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(1));
|
|
assertEquals(1, systems.getPage().size());
|
|
assertEquals(true, systems.hasMoreItems());
|
|
assertEquals(3, systems.getTotalResultCount().getFirst().intValue());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(1, 2));
|
|
assertEquals(2, systems.getPage().size());
|
|
assertEquals(false, systems.hasMoreItems());
|
|
assertEquals(3, systems.getTotalResultCount().getFirst().intValue());
|
|
|
|
systems = REMOTE_CREDENTIALS_SERVICE.listSharedRemoteSystems(new PagingRequest(2, 2));
|
|
assertEquals(1, systems.getPage().size());
|
|
assertEquals(false, systems.hasMoreItems());
|
|
assertEquals(3, systems.getTotalResultCount().getFirst().intValue());
|
|
|
|
|
|
// Check the paging of credentials
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
assertEquals(false, creds.hasMoreItems());
|
|
assertEquals(2, creds.getTotalResultCount().getFirst().intValue());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(1));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(true, creds.hasMoreItems());
|
|
assertEquals(2, creds.getTotalResultCount().getFirst().intValue());
|
|
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(1,1));
|
|
assertEquals(1, creds.getPage().size());
|
|
assertEquals(false, creds.hasMoreItems());
|
|
assertEquals(2, creds.getTotalResultCount().getFirst().intValue());
|
|
|
|
|
|
// Tweak shared permissions
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
|
|
// Systems One and Two were created by users one
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(1));
|
|
NodeRef sharedS1 = creds.getPage().get(0).getRemoteSystemContainerNodeRef();
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(1));
|
|
NodeRef sharedS2 = creds.getPage().get(0).getRemoteSystemContainerNodeRef();
|
|
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
PERMISSION_SERVICE.setInheritParentPermissions(sharedS1, false);
|
|
PERMISSION_SERVICE.setInheritParentPermissions(sharedS2, false);
|
|
|
|
|
|
// Should then only be able to see Three, the one they created
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_TWO);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(0, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
|
|
// User One won't be able to see User Two's shared credentials under S2 under the new permissions
|
|
// They can still see their own credentials for S1 and S2, plus all in S3 (permissions unchanged)
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_ONE, null, new PagingRequest(10));
|
|
assertEquals(2, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_TWO, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
creds = REMOTE_CREDENTIALS_SERVICE.listSharedCredentials(TEST_REMOTE_SYSTEM_THREE, null, new PagingRequest(10));
|
|
assertEquals(1, creds.getPage().size());
|
|
}
|
|
|
|
/**
|
|
* Most of the shared credentials container tests work on the test one,
|
|
* so that things are in a known and empty state.
|
|
* We have this one test that uses the real shared container, just to check
|
|
* that it's correctly setup and available
|
|
*/
|
|
@Test public void testRealSharedCredentialsContainer() throws Exception
|
|
{
|
|
// Create a new instance, using the real container
|
|
RemoteCredentialsServiceImpl realService = new RemoteCredentialsServiceImpl();
|
|
realService.setDictionaryService(DICTIONARY_SERVICE);
|
|
realService.setNamespaceService(NAMESPACE_SERVICE);
|
|
realService.setNodeService(PUBLIC_NODE_SERVICE);
|
|
realService.setRepositoryHelper(REPOSITORY_HELPER);
|
|
|
|
for (Entry<QName,RemoteCredentialsInfoFactory> e : ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getCredentialsFactories().entrySet() )
|
|
{
|
|
realService.registerCredentialsFactory(e.getKey(), e.getValue());
|
|
}
|
|
|
|
|
|
// Run as a test user
|
|
AuthenticationUtil.setFullyAuthenticatedUser(TEST_USER_ONE);
|
|
|
|
// Do a create / fetch / delete step
|
|
PasswordCredentialsInfoImpl pwCredI = new PasswordCredentialsInfoImpl();
|
|
pwCredI.setRemoteUsername(TEST_REMOTE_USERNAME_ONE);
|
|
pwCredI.setRemotePassword(TEST_USER_THREE);
|
|
BaseCredentialsInfo credentials = null;
|
|
|
|
try
|
|
{
|
|
// Create
|
|
credentials = realService.createSharedCredentials(TEST_REMOTE_SYSTEM_ONE, pwCredI);
|
|
assertEquals(TEST_REMOTE_USERNAME_ONE, credentials.getRemoteUsername());
|
|
|
|
// Update
|
|
((PasswordCredentialsInfoImpl)credentials).setRemoteUsername(TEST_REMOTE_USERNAME_TWO);
|
|
((PasswordCredentialsInfoImpl)credentials).setRemotePassword(TEST_USER_ONE);
|
|
credentials = realService.updateCredentials(credentials);
|
|
assertEquals(TEST_REMOTE_USERNAME_TWO, credentials.getRemoteUsername());
|
|
|
|
// Delete
|
|
realService.deleteCredentials(credentials);
|
|
|
|
// Tidy, and zap the test parent
|
|
PUBLIC_NODE_SERVICE.deleteNode(credentials.getRemoteSystemContainerNodeRef());
|
|
credentials = null;
|
|
}
|
|
finally
|
|
{
|
|
// Tidy up if needed
|
|
if (credentials != null)
|
|
{
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
|
|
// Zap the credentials themselves
|
|
PUBLIC_NODE_SERVICE.deleteNode(credentials.getNodeRef());
|
|
|
|
// And their test parent
|
|
PUBLIC_NODE_SERVICE.deleteNode(credentials.getRemoteSystemContainerNodeRef());
|
|
}
|
|
}
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
|
|
/**
|
|
* By default, all tests are run as the admin user.
|
|
*/
|
|
@Before public void setAdminUser()
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
}
|
|
|
|
@After public void deleteTestNodes() throws Exception
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
|
|
// Find the shared system container, and zap contents
|
|
NodeRef container = ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getSharedContainerNodeRef(false);
|
|
if (container != null)
|
|
{
|
|
List<NodeRef> children = new ArrayList<NodeRef>();
|
|
for (ChildAssociationRef child : PUBLIC_NODE_SERVICE.getChildAssocs(container))
|
|
{
|
|
children.add(child.getChildRef());
|
|
}
|
|
performDeletionOfNodes(children);
|
|
}
|
|
|
|
// Zap the users, including any credentials stored for them
|
|
deleteUser(TEST_USER_ONE);
|
|
deleteUser(TEST_USER_TWO);
|
|
deleteUser(TEST_USER_THREE);
|
|
}
|
|
|
|
@AfterClass public static void remoteTestSharedCredentialsContainer() throws Exception
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
NodeRef container = ((RemoteCredentialsServiceImpl)PRIVATE_REMOTE_CREDENTIALS_SERVICE).getSharedContainerNodeRef(false);
|
|
if (container != null)
|
|
{
|
|
performDeletionOfNodes(Collections.singletonList(container));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Deletes the specified NodeRefs, if they exist.
|
|
* @param nodesToDelete
|
|
*/
|
|
private static void performDeletionOfNodes(final List<NodeRef> nodesToDelete)
|
|
{
|
|
TRANSACTION_HELPER.doInTransaction(new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
AuthenticationUtil.setFullyAuthenticatedUser(ADMIN_USER);
|
|
|
|
for (NodeRef node : nodesToDelete)
|
|
{
|
|
if (NODE_SERVICE.exists(node))
|
|
{
|
|
NODE_SERVICE.deleteNode(node);
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
});
|
|
}
|
|
|
|
private static void createUser(final String userName)
|
|
{
|
|
TRANSACTION_HELPER.doInTransaction(new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
if (!AUTHENTICATION_SERVICE.authenticationExists(userName))
|
|
{
|
|
AUTHENTICATION_SERVICE.createAuthentication(userName, "PWD".toCharArray());
|
|
}
|
|
|
|
if (!PERSON_SERVICE.personExists(userName))
|
|
{
|
|
PropertyMap ppOne = new PropertyMap();
|
|
ppOne.put(ContentModel.PROP_USERNAME, userName);
|
|
ppOne.put(ContentModel.PROP_FIRSTNAME, "firstName");
|
|
ppOne.put(ContentModel.PROP_LASTNAME, "lastName");
|
|
ppOne.put(ContentModel.PROP_EMAIL, "email@email.com");
|
|
ppOne.put(ContentModel.PROP_JOBTITLE, "jobTitle");
|
|
|
|
PERSON_SERVICE.createPerson(ppOne);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
});
|
|
}
|
|
|
|
private static void deleteUser(final String userName)
|
|
{
|
|
TRANSACTION_HELPER.doInTransaction(new RetryingTransactionHelper.RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
if (PERSON_SERVICE.personExists(userName))
|
|
{
|
|
PERSON_SERVICE.deletePerson(userName);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
});
|
|
}
|
|
}
|