mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
20678: DAO5 branch: Preparation for merge back to HEAD 20689: Merged DAO4 to DAO5 - Removed all 'dbscripts/create/3.x/SomeDialect' and replaced with 'dbscripts/create/SomeDialect' DB create scripts are taken from latest DAO4 - TODO: FixAuthoritiesCrcValuesPatch needs query implementation in PatchDAO Merged DAO3 to DAO4 - Reapplied fixes for ALF-713 (race condition on Usages) 19350: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-2 to BRANCHES/DEV/V3.3-DAO-REFACTOR-3: 18939: SAIL-4 :2nd stage branch for DAO refactor off HEAD rev 18898 18948: Merged V3.3-DAO-REFACTOR to V3.3-DAO-REFACTOR-2 18202: Dev branch for DAO refactor 18252: SAIL-233: QName.hbm.xml 18295: Added missing CREATE TABLE statements for QName-related code 18324: SAIL-234: Node.hbm.xml: Node aspects initial integration 18355: Added 'setValue' method to manually update the cached value 18356: MV property stressing lowered to speed test up 18357: SAIL-234: Node.hbm.xml 18376: Pulled all Alfresco-related create SQL into script 18389: SAIL-234: Permissions DAO refactor - initial checkpoint 18390: Formatting only (line-endings) 18400: SAIL-234: Node.hbm.xml 18418: SAIL-234: Node.hbm.xml: 'alf_node_assoc' CRUD 18429: SAIL-234: Node.hbm.xml: Cleaned out all Hibernate references to NodeAssocImpl 18457: SAIL-234: Permissions DAO refactor 18959: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18479: SAIL-234: Node.hbm.xml - fix updateNode (missing id when saving oldDummyNode) 18482: SAIL-235: remove Permissions.hbm.xml 18517: SAIL-235: Permissions DAO refactor 18523: SAIL-234: Node.hbm.xml 18524: SAIL-235: Permissions DAO refactor 18960: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18533: Flipped back to Windows line endings 18535: Formatting-only (eol) 18540: Formatting-only (eol) 18541: SAIL-235: Permissions DAO refactor 18543: SAIL-234: Node.hbm.xml: Start alf_store changes 18567: SAIL-235: Permissions DAO refactor 18596: SAIL-305: Alfresco DDL - formatted/rationalized and added missing indexes & fk constraints 18603: SAIL-311: Minor cleanup for schema upgrade scripts (V3.3) 18604: SAIL-311: Remove empty dirs 18619: SAIL-274: Locale.hbm.xml 18621: Added method to create default ACL 18622: SAIL-234: Node.hbm.xml: Store, Transaction, Server and some node 18624: Formatting only (eol) 18631: SAIL-235: Permissions DAO refactor 18633: SAIL-235: Permissions DAO refactor - do not expose CRUD for AceContext (or AuthorityAlias) since currently unused 18639: getLocale(Locale) should return null if it doesn't exist 18640: SAIL-234 NodeDAO: More replacement of node queries and updates 18648: SAIL-310: Create SQL script for core repo tables (All DB ports) 18651: SAIL-234 NodeDAO: Moves across stores handle presence of target deleted nodes 18961: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18658: SAIL-274 Locale DAO: Missing getValueKey() method 18662: SAIL-235: Permissions DAO refactor - further cleanup (of DbAccessControlList usage, including copyACLs) 18664: DB scripts porting for PostgreSQL finished. 18668: SAIL-234 Node DAO: Note in case Transaction Change ID is dropped from indexes 18669: SAIL-234 Node DAO: deleteNode and archive (store move) fixes 18672: DB scripts porting for Oracle finished. 18675: SAIL-235: Permissions DAO refactor 18677: DB scripts porting for DB2 finished. 18964: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18687: Execute a callback with retries 18688: SAIL-234 Node DAO: Child association creation 18690: SAIL-234 Node DAO: Comment out raw creation of stores as it breaks subsequent bootstrap checks 18691: SAIL-234 Node DAO: More replacement of alf_child_assoc handling 18713: Commented about needing a more efficient removeChildAssociation method 18714: SAIL-234 Node DAO: Replaced queries on alf_child_assoc 18715: SAIL-234 Node DAO: More alf_child_assoc query replacement 18727: SAIL-234 Node DAO: alf_child_assoc queries complete 18737: SAIL-234 Node DAO: Tweaks to newNode and implemented prependPaths 18741: SAIL-234 and SAIL-334: Moved UsageDelta Hibernate code and queries over to UsageDeltaDAO 18748: SAIL-234 Node DAO: fix NPE (EditionServiceImplTest) 18769: SAIL-234 Node DAO: alf_node_properties ground work 18786: SAIL-234 Node DAO: alf_node_properties and cm:auditable properties 18810: Added EqualsHelper.getMapComparison 18813: TransactionalCache propagates cache clears and removals during rollback 18826: SAIL-234 Node DAO: Moved over sundry references to NodeDaoService to NodeDAO 18849: SAIL-237: UsageDelta.hbm.xml - eol formatting only (including removal of unwanted svn:eol-style=native property) 18869: SAIL-234 NodeDAO: Fixed more references to 'nodeDaoService' 18895: SAIL-234 NodeDAO: Queries for alf_transaction 18899: SAIL-234 Node DAO: Fixed bean fetching for 'nodeDAO' 18909: SAIL-234 NodeDAO: Fixes to getNodeRefStatus and various txn queries 18916: SAIL-234 NodeDAO: Fixed moveNode alf_child_assoc updates 18922: SAIL-235: DAO refactoring: Permission.hbm.xml 18930: SAIL-235: DAO refactoring: Permission.hbm.xml 18932: SAIL-234 NodeDAO: Fixing up gotchas, javadocs and some naming 18933: SAIL-234 NodeDAO: Minor neatening 18935: SAIL-234 Node DAO: Caches for ID to NodeRef and StoreRef 18936: EHCache config files line endings 18938: SAIL-237: Usage DAO refactor - initial checkpoint 18945: SAIL-235: DAO refactoring: Permission.hbm.xml. Move Node. 18975: Fix for move-node ACL jiggery-pokery 19067: SAIL-4: fix VersionHistoryImpl.getSuccessors (causing VersionServiceImplTest.testGetVersionHistorySameWorkspace failure) 19068: SAIL-234: fix VersionMigratorTest.testMigrateOneVersion 19074: SAIL-237: Usage DAO - update to common iBatis mapping pattern(s) to ease DB porting 19076: SAIL-231: Activities DAO - update to common iBatis mapping pattern(s) 19077: SAIL-232: AppliedPatch DAO - minor cleanup (comments & formatting only) 19092: Merging HEAD to DEV/V3.3-DAO-REFACTOR-2 18973: Temporarily comment out AVMTestSuite and run AVM tests individually 19056: AVM unit test improvements 19097: SAIL-235: DAO refactoring: Permission.hbm.xml: Additional index to support queries to find the id and acl id for the primary children of a node. 19185: SAIL-238: Permissions DAO - (minor) update to common iBatis mapping pattern 19289: SAIL-234 NodeDAO: Node cache replaces NodeRef cache 19302: SAIL-234 Node DAO: Added cache for node properties 19318: SAIL-4: AVM DAO - (minor) update to common iBatis mapping pattern 20690: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: 20063: (RECORD ONLY) DAO refactor branch V4 20146: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19401: SAIL-234 Node DAO: Fix permission service tests (setPrimaryChildrenSharedAclId needs to invalidate nodesCache) 19428: Fixed TransactionalCache issue with null and NullValueMarker 19429: Took empty cm:content creation out of FileFolderService#createImpl 19430: SAIL-234 Node DAO: Tweaks around caching and cm:auditable 19431: SAIL-4 DAO Refactor: Exception thrown when attempting writes in read-only txn have changed 19436: SAIL-234 Node DAO: Fix NPE during cm:auditable update 19475: Allow debugging of code without stepping into trivial stuff 19476: Follow-up on 19429 by ensuring CIFS/FTP set a mimetype on the ContentWriter 19477: SAIL-234 Node DAO: Leverage DAO better for NodeService.addProperties 19478: SAIL-234 NodeDAO: Added toString() for ParentAssocsInfo (cache value for parent assocs) 19479: SAIL-234 Node DAO: Fixed for parent association and property caches 19480: Made TransactionAwareSingleton bind-key a GUID 19481: SAIL-234 Node DAO: Reinstated 100K collection property tests 19482: SAIL-234 Node DAO: Node and property cache fixes highlighted by unit tests 19483: SAIL-234 Node DAO: Start on NodeBulkLoader implementation 19595: SAIL-234 Node DAO: Fix moveNode to detect cyclic relationship prior to updating ACLs for moved tree FileFolderServiceImplTest.testETHREEOH_3088_MoveIntoSelf) 20147: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19602: (RECORD ONLY) Reintegrated with HEAD up to rev 19433 19621: (RECORD ONLY) SAIL-347 19683: (RECORD ONLY) Reverse-merged 19621 for SAIL-347 19722: (RECORD ONLY) Merged /alfresco/HEAD:r19434-19721 20150: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19741: Merged DEV\V3.3-DAO-REFACTOR-2 to DEV\V3.3-DAO-REFACTOR-3 19739: Extended "move" tests 19743: Fix AuditableAspectTest.testAddAspect (to allow for node modified date tolerance) 19748: Remaining part of merge from HEAD to V3.3-DAO-REFACTOR-3 19367: Merged BRANCHES/V3.2 to HEAD: 19286: Fix for ALF-626 "Using 'null' as an authority argument in clearPermissions() cause a java.lang.NullPointerException" 19755: SAIL-234 Node DAO: Fix RepoAdminServiceImplTest.testConcurrentDynamicModelDelete (handle InvalidNodeRefException after getChildAssocs) 20692: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: - Retired all 1.3 and 1.4 upgrade scripts ... R.I.P. - Fixed CRC patch for Authorities (only tested on MySQL) - Fixed SQL patch revision numbers and bumped version schema number up 20158: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19773: SQL mappings and scripts: SAIL-310, SAIL-304, SAIL-303 and SAIL-347 19774: Futher fix for SAIL-310: Sequence patch must take into account sequences created for 3.3 19851: SAIL-371 (SAIL-294) NodeDAO fallout: Fix QName and Namespace read/write handling and bean name in unit test 20183: Merged DAO3 to DAO4 19852: SAIL-370: Remove LinkValidation 19853: SAIL-239 (SAIL-294) Attributes.hbm.xml: Added ability to attach arbitrary property to unique context 19857: SAIL-373 Fallout from Permissions DAO refactor (SAIL-235) 19864: SAIL-239 (SAIL-294): Removed AttributeService RMI API 19865: More SAIL-239 (SAIL-294): Removed AttributeService RMI API 20208: DAO-refactor implementation of ALF-2712 query improvements 20209: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20060: Removal of AttributeService for SAIL-239 (SAIL-294) 20348: SAIL-371 (SAIL-294): Protect collection properties during map insert and retrieval 20547: SAIL-371 (SAIL-294) Attributes.hbm.xml: implement getAttributes + fixes 20573: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests and other fallout 20597: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) 20598: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) - fix AssetServiceImplTest.testSimpleLockFile NPE 20600: Fix PropertyValueDAOTest.testPropertyValue_Enum (follow-on to r20060 for SAIL-239 - which introduces ENUM prop vals) 20601: Fix UsageDAOTest.testCreateAndDeleteUsageDeltas NPE (would also affect ContentStoreCleanerScalabilityRunner) 20603: Fix CMISPropertyServiceTest.* (fallout from r20146 <- r19429 <- Took empty cm:content creation out of FileFolderService#createImpl) 20604: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - TransferServiceImplTest.* 20618: SAIL-371 (SAIL-294): NodeDAO: AuditableAspectTest (fix testCreateNodeWithAuditableProperties_ALF_2565 + add remove aspect test) 20624: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - UserUsageTest.* 20626: Fixed random keys for RuleTrigger NodeRef tracking 20635: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - PersonTest.testSplitDuplicates 20642: SAIL-371 (SAIL-294) DAO: Fixed CacheTest 20643: Removed must of the 'distribute' target's dependencies. Not for HEAD 20645: Follow-on to r20643 (Removed most of the 'distribute' target's dependencies. Not for HEAD) 20654: SAIL-371 (SAIL-294): NodeDAO: DMDeploymentTargetTest.* (do not try to remove mandatory aspects) 20655: SAIL-371 (SAIL-294): NodeDAO: Initial fix for TaggingServiceImplTest.testTagScopeUpdateViaNodePolicies (+ minor test cleanup) 20657: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - VersionMigratorTest.testMigrateOneVersion (cm:accessed not returned if null) 20658: Merged (back merge only - no merge info) BRANCHES/V3.3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20090: Dynamic models: minor improvements to DictionaryModelType 20554: Improvement to model delete validation (investigating intermittent failure of RepoAdminServiceImplTest.testSimpleDynamicModelViaNodeService) 20662: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - RecordsManagementAuditServiceImplTest.* (we now ignore attempt to update 'cm:modifier' prop so update 'cm:title' prop instead) 20666: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - ADMLuceneTest.* 20668: SAIL-239 (SAIL-294) - delete WCM locks + tests (follow-on to r20060) 20674: SAIL-371 (SAIL-294) NodeDAO fallout: Cleaner and additional checks for ContentStoreCleaner 20675: SAIL-371 (SAIL-294) NodeDAO fallout: Fixed handling of ContentData git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@20693 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
578 lines
22 KiB
Java
578 lines
22 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
package org.alfresco.repo.avm;
|
|
|
|
import java.io.IOException;
|
|
import java.util.Map;
|
|
import java.util.TreeMap;
|
|
|
|
import junit.framework.TestCase;
|
|
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.content.MimetypeMap;
|
|
import org.alfresco.repo.search.AVMSnapShotTriggeredIndexingMethodInterceptor;
|
|
import org.alfresco.repo.search.IndexerAndSearcher;
|
|
import org.alfresco.repo.search.impl.lucene.LuceneQueryParser;
|
|
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper;
|
|
import org.alfresco.service.cmr.avm.AVMNodeDescriptor;
|
|
import org.alfresco.service.cmr.avm.AVMService;
|
|
import org.alfresco.service.cmr.avm.locking.AVMLockingService;
|
|
import org.alfresco.service.cmr.avmsync.AVMSyncService;
|
|
import org.alfresco.service.cmr.repository.ContentWriter;
|
|
import org.alfresco.service.cmr.repository.StoreRef;
|
|
import org.alfresco.service.cmr.search.ResultSet;
|
|
import org.alfresco.service.cmr.search.ResultSetRow;
|
|
import org.alfresco.service.cmr.search.SearchService;
|
|
import org.alfresco.service.cmr.security.AuthenticationService;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.springframework.context.ApplicationContext;
|
|
|
|
/**
|
|
* Base class for AVMService tests.
|
|
* @author britt
|
|
*/
|
|
public class AVMServiceTestBase extends TestCase
|
|
{
|
|
/**
|
|
* The AVMService we are testing.
|
|
*/
|
|
protected static AVMService fService;
|
|
|
|
/**
|
|
* The reaper thread.
|
|
*/
|
|
protected static OrphanReaper fReaper;
|
|
|
|
/**
|
|
* The AVMSyncService.
|
|
*/
|
|
protected static AVMSyncService fSyncService;
|
|
/**
|
|
* The application context.
|
|
*/
|
|
protected static ApplicationContext fContext;
|
|
|
|
/**
|
|
* The start time of actual work for a test.
|
|
*/
|
|
private long fStartTime;
|
|
|
|
protected static RetryingTransactionHelper fRetryingTransactionHelper;
|
|
|
|
protected static AuthenticationComponent fAuthenticationComponent;
|
|
|
|
protected static AVMSnapShotTriggeredIndexingMethodInterceptor fIndexingInterceptor;
|
|
|
|
protected static TransactionService fTransactionService;
|
|
|
|
protected static IndexerAndSearcher fIndexerAndSearcher;
|
|
|
|
protected static AVMLockingService fLockingService;
|
|
|
|
protected static AuthenticationService fAuthService;
|
|
|
|
|
|
public void testSetup() throws Exception
|
|
{
|
|
setupBasicTree();
|
|
}
|
|
|
|
/**
|
|
* Setup for AVM tests. Note that we set the polling
|
|
* interval for the reaper to 4 seconds so that tests will
|
|
* finish reasonably quickly.
|
|
*/
|
|
@Override
|
|
protected void setUp() throws Exception
|
|
{
|
|
if (fContext == null)
|
|
{
|
|
fContext = AVMTestSuite.getContext();
|
|
|
|
fService = (AVMService)fContext.getBean("AVMService");
|
|
fReaper = (OrphanReaper)fContext.getBean("orphanReaper");
|
|
fSyncService = (AVMSyncService)fContext.getBean("AVMSyncService");
|
|
fIndexerAndSearcher = (IndexerAndSearcher)fContext.getBean("indexerAndSearcherFactory");
|
|
fTransactionService = (TransactionService)fContext.getBean("transactionComponent");
|
|
fLockingService = (AVMLockingService)fContext.getBean("AVMLockingService");
|
|
fIndexingInterceptor = (AVMSnapShotTriggeredIndexingMethodInterceptor)fContext.getBean("avmSnapShotTriggeredIndexingMethodInterceptor");
|
|
fAuthService = (AuthenticationService)fContext.getBean("AuthenticationService");
|
|
fAuthenticationComponent = (AuthenticationComponent) fContext.getBean("authenticationComponent");
|
|
fRetryingTransactionHelper = (RetryingTransactionHelper) fContext.getBean("retryingTransactionHelper");
|
|
|
|
CreateStoreTxnListener cstl = (CreateStoreTxnListener)fContext.getBean("createStoreTxnListener");
|
|
cstl.addCallback(
|
|
new CreateStoreCallback()
|
|
{
|
|
public void storeCreated(String name)
|
|
{
|
|
System.err.println("Store created: " + name);
|
|
}
|
|
}
|
|
);
|
|
PurgeStoreTxnListener pstl = (PurgeStoreTxnListener)fContext.getBean("purgeStoreTxnListener");
|
|
pstl.addCallback(
|
|
new PurgeStoreCallback()
|
|
{
|
|
public void storePurged(String name)
|
|
{
|
|
System.err.println("Store purged: " + name);
|
|
}
|
|
}
|
|
);
|
|
CreateVersionTxnListener cvtl = (CreateVersionTxnListener)fContext.getBean("createVersionTxnListener");
|
|
cvtl.addCallback(
|
|
new CreateVersionCallback()
|
|
{
|
|
public void versionCreated(String name, int versionID)
|
|
{
|
|
System.err.println("Version created: " + name + " " + versionID);
|
|
}
|
|
}
|
|
);
|
|
PurgeVersionTxnListener pvtl = (PurgeVersionTxnListener)fContext.getBean("purgeVersionTxnListener");
|
|
pvtl.addCallback(
|
|
new PurgeVersionCallback()
|
|
{
|
|
public void versionPurged(String name, int versionID)
|
|
{
|
|
System.err.println("Version purged: " + name + " " + versionID);
|
|
}
|
|
}
|
|
);
|
|
}
|
|
|
|
fAuthService.authenticate(AuthenticationUtil.getAdminUserName(), "admin".toCharArray());
|
|
|
|
if (fService.getStore("main") != null)
|
|
{
|
|
fService.purgeStore("main");
|
|
}
|
|
fService.createStore("main");
|
|
|
|
if (fService.getStore("layer") != null)
|
|
{
|
|
fService.purgeStore("layer");
|
|
}
|
|
|
|
fStartTime = System.currentTimeMillis();
|
|
}
|
|
|
|
/**
|
|
* Cleanup after a test. Purge main store.
|
|
*/
|
|
@Override
|
|
protected void tearDown() throws Exception
|
|
{
|
|
long now = System.currentTimeMillis();
|
|
System.out.println("Timing: " + (now - fStartTime) + "ms");
|
|
|
|
if (fService.getStore("main") != null) { fService.purgeStore("main"); }
|
|
|
|
// Move alf_data directory aside.
|
|
// fContext.close();
|
|
// File alfData = new File("alf_data");
|
|
// File target = new File("alf_data" + now);
|
|
// alfData.renameTo(target);
|
|
|
|
AuthenticationUtil.clearCurrentSecurityContext();
|
|
}
|
|
|
|
/**
|
|
* Get the recursive contents of the given path and version.
|
|
* @param path
|
|
* @param version
|
|
* @return A string representation of the contents.
|
|
*/
|
|
protected String recursiveContents(String path, int version, boolean followLinks)
|
|
{
|
|
String val = recursiveList(path, version, 0, followLinks);
|
|
return val.substring(val.indexOf('\n'));
|
|
}
|
|
|
|
|
|
/**
|
|
* Helper to write a recursive listing of an AVMStore at a given version.
|
|
* @param repoName The name of the AVMStore.
|
|
* @param version The version to look under.
|
|
*/
|
|
protected String recursiveList(String repoName, int version, boolean followLinks)
|
|
{
|
|
return recursiveList(repoName + ":/", version, 0, followLinks);
|
|
}
|
|
|
|
/**
|
|
* Recursive list the given path.
|
|
* @param path The path.
|
|
* @param version The version.
|
|
* @param indent The current indent level.
|
|
*/
|
|
protected String recursiveList(String path, int version, int indent, boolean followLinks)
|
|
{
|
|
StringBuilder builder = new StringBuilder();
|
|
for (int i = 0; i < indent; i++)
|
|
{
|
|
builder.append(' ');
|
|
}
|
|
builder.append(path.substring(path.lastIndexOf('/') + 1));
|
|
builder.append(' ');
|
|
AVMNodeDescriptor desc = fService.lookup(version, path, true);
|
|
builder.append(desc.toString());
|
|
builder.append('\n');
|
|
if (desc.getType() == AVMNodeType.PLAIN_DIRECTORY ||
|
|
(desc.getType() == AVMNodeType.LAYERED_DIRECTORY && followLinks))
|
|
{
|
|
String basename = path.endsWith("/") ? path : path + "/";
|
|
Map<String, AVMNodeDescriptor> listing = fService.getDirectoryListing(version, path, true);
|
|
for (String name : listing.keySet())
|
|
{
|
|
System.err.println(name);
|
|
builder.append(recursiveList(basename + name, version, indent + 2, followLinks));
|
|
}
|
|
}
|
|
return builder.toString();
|
|
}
|
|
|
|
/**
|
|
* Setup a basic tree.
|
|
*/
|
|
protected void setupBasicTree0()
|
|
throws IOException
|
|
{
|
|
fService.createDirectory("main:/", "a");
|
|
fService.createDirectory("main:/a", "b");
|
|
fService.createDirectory("main:/a/b", "c");
|
|
fService.createDirectory("main:/", "d");
|
|
fService.createDirectory("main:/d", "e");
|
|
fService.createDirectory("main:/d/e", "f");
|
|
|
|
fService.createFile("main:/a/b/c", "foo").close();
|
|
ContentWriter writer = fService.getContentWriter("main:/a/b/c/foo", true);
|
|
writer.setEncoding("UTF-8");
|
|
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
|
writer.putContent("I am main:/a/b/c/foo");
|
|
|
|
fService.createFile("main:/a/b/c", "bar").close();
|
|
writer = fService.getContentWriter("main:/a/b/c/bar", true);
|
|
/*
|
|
// Force a conversion
|
|
writer.setEncoding("UTF-16");
|
|
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
|
writer.putContent(new ByteArrayInputStream("I am main:/a/b/c/bar".getBytes("UTF-16")));
|
|
*/
|
|
writer.setEncoding("UTF-8");
|
|
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
|
writer.putContent("I am main:/a/b/c/bar");
|
|
|
|
fService.createSnapshot("main", null, null);
|
|
}
|
|
|
|
protected void setupBasicTree()
|
|
throws IOException
|
|
{
|
|
setupBasicTree0();
|
|
runQueriesAgainstBasicTree("main");
|
|
}
|
|
|
|
protected void runQueriesAgainstBasicTree(String store)
|
|
{
|
|
StoreRef storeRef = AVMNodeConverter.ToStoreRef(store);
|
|
|
|
// Text index
|
|
SearchService searchService = fIndexerAndSearcher.getSearcher(AVMNodeConverter.ToStoreRef(store), true);
|
|
ResultSet results = searchService.query(storeRef, "lucene", "TEXT:\"I am main\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
// Basic properties
|
|
|
|
// Note "a" is a stop word and therefore not findable ...
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NAME)+":\"foo\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NAME)+":foo");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
// TODO: Fix auth in AVMDiskDriver and more??
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_CREATOR)+":admin");
|
|
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_MODIFIER)+":admin");
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_OWNER)+":admin");
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NODE_UUID)+":unknown");
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_STORE_PROTOCOL)+":avm");
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_STORE_IDENTIFIER)+":"+store);
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
// Basic paths
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c/foo\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c/bar\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d/e\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d/e/f\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//.\"");
|
|
assertEquals(9, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//*\"");
|
|
assertEquals(8, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a//.\"");
|
|
assertEquals(5, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a//*\"");
|
|
assertEquals(4, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/*\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//c/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*/*/*\"");
|
|
assertEquals(0, results.length());
|
|
results.close();
|
|
}
|
|
|
|
protected void runQueriesAgainstBasicTreeWithAOnly(String store)
|
|
{
|
|
StoreRef storeRef = AVMNodeConverter.ToStoreRef(store);
|
|
|
|
// Text index
|
|
SearchService searchService = fIndexerAndSearcher.getSearcher(AVMNodeConverter.ToStoreRef(store), true);
|
|
ResultSet results = searchService.query(storeRef, "lucene", "TEXT:\"I am main\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
// Basic properties
|
|
|
|
// Note "a" is a stop word and therefore not findable ...
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NAME)+":\"foo\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NAME)+":foo");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
// TODO: Fix auth in AVMDiskDriver and more??
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_CREATOR)+":admin");
|
|
if(results.length() == 10)
|
|
{
|
|
for (ResultSetRow row : results)
|
|
{
|
|
System.out.println(row.getNodeRef());
|
|
}
|
|
}
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_MODIFIER)+":admin");
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_OWNER)+":admin");
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_NODE_UUID)+":unknown");
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_STORE_PROTOCOL)+":avm");
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", LuceneQueryParser.escape("@"+ContentModel.PROP_STORE_IDENTIFIER)+":"+store);
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
// Basic paths
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c/foo\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/b/c/bar\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d\"");
|
|
assertEquals(0, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d/e\"");
|
|
assertEquals(0, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/d/e/f\"");
|
|
assertEquals(0, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//.\"");
|
|
assertEquals(6, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//*\"");
|
|
assertEquals(5, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a//.\"");
|
|
assertEquals(5, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a//*\"");
|
|
assertEquals(4, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/a/*\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"//c/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*\"");
|
|
assertEquals(1, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*/*\"");
|
|
assertEquals(2, results.length());
|
|
results.close();
|
|
|
|
results = searchService.query(storeRef, "lucene", "PATH:\"/*/*/*/*/*\"");
|
|
assertEquals(0, results.length());
|
|
results.close();
|
|
}
|
|
|
|
/**
|
|
* Check that history has not been screwed up.
|
|
*/
|
|
protected void checkHistory(TreeMap<Integer, String> history, String repName)
|
|
{
|
|
for (Integer i : history.keySet())
|
|
{
|
|
assertEquals(history.get(i), recursiveList(repName, i, false));
|
|
}
|
|
int latest = fService.getNextVersionID(repName);
|
|
history.put(latest - 1, recursiveList(repName, -1, false));
|
|
}
|
|
}
|