mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
20678: DAO5 branch: Preparation for merge back to HEAD 20689: Merged DAO4 to DAO5 - Removed all 'dbscripts/create/3.x/SomeDialect' and replaced with 'dbscripts/create/SomeDialect' DB create scripts are taken from latest DAO4 - TODO: FixAuthoritiesCrcValuesPatch needs query implementation in PatchDAO Merged DAO3 to DAO4 - Reapplied fixes for ALF-713 (race condition on Usages) 19350: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-2 to BRANCHES/DEV/V3.3-DAO-REFACTOR-3: 18939: SAIL-4 :2nd stage branch for DAO refactor off HEAD rev 18898 18948: Merged V3.3-DAO-REFACTOR to V3.3-DAO-REFACTOR-2 18202: Dev branch for DAO refactor 18252: SAIL-233: QName.hbm.xml 18295: Added missing CREATE TABLE statements for QName-related code 18324: SAIL-234: Node.hbm.xml: Node aspects initial integration 18355: Added 'setValue' method to manually update the cached value 18356: MV property stressing lowered to speed test up 18357: SAIL-234: Node.hbm.xml 18376: Pulled all Alfresco-related create SQL into script 18389: SAIL-234: Permissions DAO refactor - initial checkpoint 18390: Formatting only (line-endings) 18400: SAIL-234: Node.hbm.xml 18418: SAIL-234: Node.hbm.xml: 'alf_node_assoc' CRUD 18429: SAIL-234: Node.hbm.xml: Cleaned out all Hibernate references to NodeAssocImpl 18457: SAIL-234: Permissions DAO refactor 18959: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18479: SAIL-234: Node.hbm.xml - fix updateNode (missing id when saving oldDummyNode) 18482: SAIL-235: remove Permissions.hbm.xml 18517: SAIL-235: Permissions DAO refactor 18523: SAIL-234: Node.hbm.xml 18524: SAIL-235: Permissions DAO refactor 18960: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18533: Flipped back to Windows line endings 18535: Formatting-only (eol) 18540: Formatting-only (eol) 18541: SAIL-235: Permissions DAO refactor 18543: SAIL-234: Node.hbm.xml: Start alf_store changes 18567: SAIL-235: Permissions DAO refactor 18596: SAIL-305: Alfresco DDL - formatted/rationalized and added missing indexes & fk constraints 18603: SAIL-311: Minor cleanup for schema upgrade scripts (V3.3) 18604: SAIL-311: Remove empty dirs 18619: SAIL-274: Locale.hbm.xml 18621: Added method to create default ACL 18622: SAIL-234: Node.hbm.xml: Store, Transaction, Server and some node 18624: Formatting only (eol) 18631: SAIL-235: Permissions DAO refactor 18633: SAIL-235: Permissions DAO refactor - do not expose CRUD for AceContext (or AuthorityAlias) since currently unused 18639: getLocale(Locale) should return null if it doesn't exist 18640: SAIL-234 NodeDAO: More replacement of node queries and updates 18648: SAIL-310: Create SQL script for core repo tables (All DB ports) 18651: SAIL-234 NodeDAO: Moves across stores handle presence of target deleted nodes 18961: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18658: SAIL-274 Locale DAO: Missing getValueKey() method 18662: SAIL-235: Permissions DAO refactor - further cleanup (of DbAccessControlList usage, including copyACLs) 18664: DB scripts porting for PostgreSQL finished. 18668: SAIL-234 Node DAO: Note in case Transaction Change ID is dropped from indexes 18669: SAIL-234 Node DAO: deleteNode and archive (store move) fixes 18672: DB scripts porting for Oracle finished. 18675: SAIL-235: Permissions DAO refactor 18677: DB scripts porting for DB2 finished. 18964: Merged DEV/V3.3-DAO-REFACTOR to DEV/V3.3-DAO-REFACTOR-2 18687: Execute a callback with retries 18688: SAIL-234 Node DAO: Child association creation 18690: SAIL-234 Node DAO: Comment out raw creation of stores as it breaks subsequent bootstrap checks 18691: SAIL-234 Node DAO: More replacement of alf_child_assoc handling 18713: Commented about needing a more efficient removeChildAssociation method 18714: SAIL-234 Node DAO: Replaced queries on alf_child_assoc 18715: SAIL-234 Node DAO: More alf_child_assoc query replacement 18727: SAIL-234 Node DAO: alf_child_assoc queries complete 18737: SAIL-234 Node DAO: Tweaks to newNode and implemented prependPaths 18741: SAIL-234 and SAIL-334: Moved UsageDelta Hibernate code and queries over to UsageDeltaDAO 18748: SAIL-234 Node DAO: fix NPE (EditionServiceImplTest) 18769: SAIL-234 Node DAO: alf_node_properties ground work 18786: SAIL-234 Node DAO: alf_node_properties and cm:auditable properties 18810: Added EqualsHelper.getMapComparison 18813: TransactionalCache propagates cache clears and removals during rollback 18826: SAIL-234 Node DAO: Moved over sundry references to NodeDaoService to NodeDAO 18849: SAIL-237: UsageDelta.hbm.xml - eol formatting only (including removal of unwanted svn:eol-style=native property) 18869: SAIL-234 NodeDAO: Fixed more references to 'nodeDaoService' 18895: SAIL-234 NodeDAO: Queries for alf_transaction 18899: SAIL-234 Node DAO: Fixed bean fetching for 'nodeDAO' 18909: SAIL-234 NodeDAO: Fixes to getNodeRefStatus and various txn queries 18916: SAIL-234 NodeDAO: Fixed moveNode alf_child_assoc updates 18922: SAIL-235: DAO refactoring: Permission.hbm.xml 18930: SAIL-235: DAO refactoring: Permission.hbm.xml 18932: SAIL-234 NodeDAO: Fixing up gotchas, javadocs and some naming 18933: SAIL-234 NodeDAO: Minor neatening 18935: SAIL-234 Node DAO: Caches for ID to NodeRef and StoreRef 18936: EHCache config files line endings 18938: SAIL-237: Usage DAO refactor - initial checkpoint 18945: SAIL-235: DAO refactoring: Permission.hbm.xml. Move Node. 18975: Fix for move-node ACL jiggery-pokery 19067: SAIL-4: fix VersionHistoryImpl.getSuccessors (causing VersionServiceImplTest.testGetVersionHistorySameWorkspace failure) 19068: SAIL-234: fix VersionMigratorTest.testMigrateOneVersion 19074: SAIL-237: Usage DAO - update to common iBatis mapping pattern(s) to ease DB porting 19076: SAIL-231: Activities DAO - update to common iBatis mapping pattern(s) 19077: SAIL-232: AppliedPatch DAO - minor cleanup (comments & formatting only) 19092: Merging HEAD to DEV/V3.3-DAO-REFACTOR-2 18973: Temporarily comment out AVMTestSuite and run AVM tests individually 19056: AVM unit test improvements 19097: SAIL-235: DAO refactoring: Permission.hbm.xml: Additional index to support queries to find the id and acl id for the primary children of a node. 19185: SAIL-238: Permissions DAO - (minor) update to common iBatis mapping pattern 19289: SAIL-234 NodeDAO: Node cache replaces NodeRef cache 19302: SAIL-234 Node DAO: Added cache for node properties 19318: SAIL-4: AVM DAO - (minor) update to common iBatis mapping pattern 20690: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: 20063: (RECORD ONLY) DAO refactor branch V4 20146: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19401: SAIL-234 Node DAO: Fix permission service tests (setPrimaryChildrenSharedAclId needs to invalidate nodesCache) 19428: Fixed TransactionalCache issue with null and NullValueMarker 19429: Took empty cm:content creation out of FileFolderService#createImpl 19430: SAIL-234 Node DAO: Tweaks around caching and cm:auditable 19431: SAIL-4 DAO Refactor: Exception thrown when attempting writes in read-only txn have changed 19436: SAIL-234 Node DAO: Fix NPE during cm:auditable update 19475: Allow debugging of code without stepping into trivial stuff 19476: Follow-up on 19429 by ensuring CIFS/FTP set a mimetype on the ContentWriter 19477: SAIL-234 Node DAO: Leverage DAO better for NodeService.addProperties 19478: SAIL-234 NodeDAO: Added toString() for ParentAssocsInfo (cache value for parent assocs) 19479: SAIL-234 Node DAO: Fixed for parent association and property caches 19480: Made TransactionAwareSingleton bind-key a GUID 19481: SAIL-234 Node DAO: Reinstated 100K collection property tests 19482: SAIL-234 Node DAO: Node and property cache fixes highlighted by unit tests 19483: SAIL-234 Node DAO: Start on NodeBulkLoader implementation 19595: SAIL-234 Node DAO: Fix moveNode to detect cyclic relationship prior to updating ACLs for moved tree FileFolderServiceImplTest.testETHREEOH_3088_MoveIntoSelf) 20147: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19602: (RECORD ONLY) Reintegrated with HEAD up to rev 19433 19621: (RECORD ONLY) SAIL-347 19683: (RECORD ONLY) Reverse-merged 19621 for SAIL-347 19722: (RECORD ONLY) Merged /alfresco/HEAD:r19434-19721 20150: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19741: Merged DEV\V3.3-DAO-REFACTOR-2 to DEV\V3.3-DAO-REFACTOR-3 19739: Extended "move" tests 19743: Fix AuditableAspectTest.testAddAspect (to allow for node modified date tolerance) 19748: Remaining part of merge from HEAD to V3.3-DAO-REFACTOR-3 19367: Merged BRANCHES/V3.2 to HEAD: 19286: Fix for ALF-626 "Using 'null' as an authority argument in clearPermissions() cause a java.lang.NullPointerException" 19755: SAIL-234 Node DAO: Fix RepoAdminServiceImplTest.testConcurrentDynamicModelDelete (handle InvalidNodeRefException after getChildAssocs) 20692: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-4 to BRANCHES/DEV/V3.3-DAO-REFACTOR-5: - Retired all 1.3 and 1.4 upgrade scripts ... R.I.P. - Fixed CRC patch for Authorities (only tested on MySQL) - Fixed SQL patch revision numbers and bumped version schema number up 20158: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 19773: SQL mappings and scripts: SAIL-310, SAIL-304, SAIL-303 and SAIL-347 19774: Futher fix for SAIL-310: Sequence patch must take into account sequences created for 3.3 19851: SAIL-371 (SAIL-294) NodeDAO fallout: Fix QName and Namespace read/write handling and bean name in unit test 20183: Merged DAO3 to DAO4 19852: SAIL-370: Remove LinkValidation 19853: SAIL-239 (SAIL-294) Attributes.hbm.xml: Added ability to attach arbitrary property to unique context 19857: SAIL-373 Fallout from Permissions DAO refactor (SAIL-235) 19864: SAIL-239 (SAIL-294): Removed AttributeService RMI API 19865: More SAIL-239 (SAIL-294): Removed AttributeService RMI API 20208: DAO-refactor implementation of ALF-2712 query improvements 20209: Merged BRANCHES/DEV/V3.3-DAO-REFACTOR-3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20060: Removal of AttributeService for SAIL-239 (SAIL-294) 20348: SAIL-371 (SAIL-294): Protect collection properties during map insert and retrieval 20547: SAIL-371 (SAIL-294) Attributes.hbm.xml: implement getAttributes + fixes 20573: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests and other fallout 20597: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) 20598: SAIL-239 Attributes.hbm.xml: WCM/AVM locking test fixes (wip) - fix AssetServiceImplTest.testSimpleLockFile NPE 20600: Fix PropertyValueDAOTest.testPropertyValue_Enum (follow-on to r20060 for SAIL-239 - which introduces ENUM prop vals) 20601: Fix UsageDAOTest.testCreateAndDeleteUsageDeltas NPE (would also affect ContentStoreCleanerScalabilityRunner) 20603: Fix CMISPropertyServiceTest.* (fallout from r20146 <- r19429 <- Took empty cm:content creation out of FileFolderService#createImpl) 20604: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - TransferServiceImplTest.* 20618: SAIL-371 (SAIL-294): NodeDAO: AuditableAspectTest (fix testCreateNodeWithAuditableProperties_ALF_2565 + add remove aspect test) 20624: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - UserUsageTest.* 20626: Fixed random keys for RuleTrigger NodeRef tracking 20635: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - PersonTest.testSplitDuplicates 20642: SAIL-371 (SAIL-294) DAO: Fixed CacheTest 20643: Removed must of the 'distribute' target's dependencies. Not for HEAD 20645: Follow-on to r20643 (Removed most of the 'distribute' target's dependencies. Not for HEAD) 20654: SAIL-371 (SAIL-294): NodeDAO: DMDeploymentTargetTest.* (do not try to remove mandatory aspects) 20655: SAIL-371 (SAIL-294): NodeDAO: Initial fix for TaggingServiceImplTest.testTagScopeUpdateViaNodePolicies (+ minor test cleanup) 20657: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - VersionMigratorTest.testMigrateOneVersion (cm:accessed not returned if null) 20658: Merged (back merge only - no merge info) BRANCHES/V3.3 to BRANCHES/DEV/V3.3-DAO-REFACTOR-4: 20090: Dynamic models: minor improvements to DictionaryModelType 20554: Improvement to model delete validation (investigating intermittent failure of RepoAdminServiceImplTest.testSimpleDynamicModelViaNodeService) 20662: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - RecordsManagementAuditServiceImplTest.* (we now ignore attempt to update 'cm:modifier' prop so update 'cm:title' prop instead) 20666: SAIL-371 (SAIL-294): NodeDAO: Fix unit tests - ADMLuceneTest.* 20668: SAIL-239 (SAIL-294) - delete WCM locks + tests (follow-on to r20060) 20674: SAIL-371 (SAIL-294) NodeDAO fallout: Cleaner and additional checks for ContentStoreCleaner 20675: SAIL-371 (SAIL-294) NodeDAO fallout: Fixed handling of ContentData git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@20693 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
1265 lines
43 KiB
Java
1265 lines
43 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
package org.alfresco.repo.avm;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.HashMap;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.SortedMap;
|
|
import java.util.TreeMap;
|
|
|
|
import org.alfresco.repo.domain.DbAccessControlList;
|
|
import org.alfresco.repo.security.permissions.ACLCopyMode;
|
|
import org.alfresco.repo.security.permissions.ACLType;
|
|
import org.alfresco.service.cmr.avm.AVMBadArgumentException;
|
|
import org.alfresco.service.cmr.avm.AVMException;
|
|
import org.alfresco.service.cmr.avm.AVMExistsException;
|
|
import org.alfresco.service.cmr.avm.AVMNodeDescriptor;
|
|
import org.alfresco.service.cmr.avm.AVMNotFoundException;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.util.Pair;
|
|
|
|
/**
|
|
* A layered directory node. A layered directory node points at an underlying directory, which may or may not exist. The
|
|
* visible contents of a layered directory node is the contents of the underlying node pointed at plus those nodes added
|
|
* to or modified in the layered directory node minus those nodes which have been deleted in the layered directory node.
|
|
*
|
|
* @author britt
|
|
*/
|
|
public class LayeredDirectoryNodeImpl extends DirectoryNodeImpl implements LayeredDirectoryNode
|
|
{
|
|
static final long serialVersionUID = 4623043057918181724L;
|
|
|
|
/**
|
|
* The layer id.
|
|
*/
|
|
private long fLayerID;
|
|
|
|
/**
|
|
* The pointer to the underlying directory.
|
|
*/
|
|
private String fIndirection;
|
|
|
|
/**
|
|
* Whether this is a primary indirection node.
|
|
*/
|
|
private boolean fPrimaryIndirection;
|
|
|
|
/**
|
|
* Whether this is opaque.
|
|
*/
|
|
private boolean fOpacity;
|
|
|
|
/**
|
|
* The indirection version.
|
|
*/
|
|
private int fIndirectionVersion;
|
|
|
|
/**
|
|
* Default constructor.
|
|
*/
|
|
public LayeredDirectoryNodeImpl()
|
|
{
|
|
}
|
|
|
|
/**
|
|
* Make a new one from a specified indirection path.
|
|
*
|
|
* @param indirection
|
|
* The indirection path to set.
|
|
* @param store
|
|
* The store that owns this node.
|
|
*/
|
|
public LayeredDirectoryNodeImpl(String indirection, AVMStore store, AVMNode toCopy, Long parentAcl, ACLCopyMode mode)
|
|
{
|
|
super(store);
|
|
|
|
setLayerID(-1);
|
|
setIndirection(indirection);
|
|
setIndirectionVersion(-1);
|
|
setPrimaryIndirection(true);
|
|
setOpacity(false);
|
|
|
|
if (toCopy != null)
|
|
{
|
|
setVersionID(toCopy.getVersionID() + 1);
|
|
|
|
copyACLs(toCopy, parentAcl, mode);
|
|
copyCreationAndOwnerBasicAttributes(toCopy);
|
|
}
|
|
else
|
|
{
|
|
setVersionID(1);
|
|
|
|
if (indirection != null)
|
|
{
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(-1, indirection);
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dir = (DirectoryNode) lookup.getCurrentNode();
|
|
if (dir.getAcl() != null)
|
|
{
|
|
setAcl(AVMDAOs.Instance().fAclDAO.createLayeredAcl(dir.getAcl().getId()));
|
|
}
|
|
else
|
|
{
|
|
// TODO: Will not pick up changes if we start with no permission on the target node - may need
|
|
// to add
|
|
setAcl(AVMDAOs.Instance().fAclDAO.createLayeredAcl(null));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
setAcl(AVMDAOs.Instance().fAclDAO.createLayeredAcl(null));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
setAcl(AVMDAOs.Instance().fAclDAO.createLayeredAcl(null));
|
|
}
|
|
}
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.save(this);
|
|
|
|
if (toCopy != null)
|
|
{
|
|
copyProperties(toCopy);
|
|
copyAspects(toCopy);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Kind of copy constructor, sort of.
|
|
*
|
|
* @param other
|
|
* The LayeredDirectoryNode we are copied from.
|
|
* @param repos
|
|
* The AVMStore object we use.
|
|
*/
|
|
public LayeredDirectoryNodeImpl(LayeredDirectoryNode other, AVMStore repos, Lookup lookup, boolean copyAll, Long parentAcl, ACLCopyMode mode)
|
|
{
|
|
super(repos);
|
|
|
|
setLayerID(-1);
|
|
setIndirection(other.getIndirection());
|
|
setIndirectionVersion(-1);
|
|
setPrimaryIndirection(other.getPrimaryIndirection());
|
|
setOpacity(other.getOpacity());
|
|
|
|
setVersionID(other.getVersionID() + 1);
|
|
|
|
copyACLs(other, parentAcl, mode);
|
|
copyCreationAndOwnerBasicAttributes(other);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.save(this);
|
|
|
|
copyProperties(other);
|
|
copyAspects(other);
|
|
|
|
Map<String, AVMNode> children = null;
|
|
if (copyAll)
|
|
{
|
|
children = other.getListing(lookup, true);
|
|
}
|
|
else
|
|
{
|
|
children = other.getListingDirect(lookup, true);
|
|
}
|
|
for (Map.Entry<String, AVMNode> child : children.entrySet())
|
|
{
|
|
ChildKey key = new ChildKey(this, child.getKey());
|
|
ChildEntry entry = new ChildEntryImpl(key, child.getValue());
|
|
AVMDAOs.Instance().fChildEntryDAO.save(entry);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Construct one from a PlainDirectoryNode. Called when a COW is performed in a layered context.
|
|
*
|
|
* @param other
|
|
* The PlainDirectoryNode.
|
|
* @param store
|
|
* The AVMStore we should belong to.
|
|
* @param lPath
|
|
* The Lookup object.
|
|
*/
|
|
public LayeredDirectoryNodeImpl(PlainDirectoryNode other, AVMStore store, Lookup lPath, boolean copyContents, Long parentAcl, ACLCopyMode mode)
|
|
{
|
|
super(store);
|
|
|
|
setLayerID(-1);
|
|
setIndirection(null);
|
|
setIndirectionVersion(-1);
|
|
setPrimaryIndirection(false);
|
|
setOpacity(false);
|
|
|
|
setVersionID(other.getVersionID() + 1);
|
|
|
|
copyACLs(other, parentAcl, mode);
|
|
copyCreationAndOwnerBasicAttributes(other);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.save(this);
|
|
|
|
copyProperties(other);
|
|
copyAspects(other);
|
|
|
|
if (copyContents)
|
|
{
|
|
for (ChildEntry child : AVMDAOs.Instance().fChildEntryDAO.getByParent(other, null))
|
|
{
|
|
ChildKey key = new ChildKey(this, child.getKey().getName());
|
|
ChildEntryImpl newChild = new ChildEntryImpl(key, child.getChild());
|
|
AVMDAOs.Instance().fChildEntryDAO.save(newChild);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Create a new layered directory based on a directory we are being named from that is in not in the layer of the
|
|
* source lookup.
|
|
*
|
|
* @param dir
|
|
* The directory
|
|
* @param store
|
|
* The store
|
|
* @param srcLookup
|
|
* The source lookup.
|
|
* @param name
|
|
* The name of the target.
|
|
*/
|
|
public LayeredDirectoryNodeImpl(DirectoryNode dir, AVMStore store, Lookup srcLookup, String name, Long inheritedAcl, ACLCopyMode mode)
|
|
{
|
|
super(store);
|
|
|
|
setLayerID(-1);
|
|
setIndirection(srcLookup.getIndirectionPath() + "/" + name);
|
|
setIndirectionVersion(-1);
|
|
setPrimaryIndirection(true);
|
|
setOpacity(false);
|
|
|
|
setVersionID(dir.getVersionID() + 1);
|
|
|
|
copyACLs(dir, inheritedAcl, mode);
|
|
copyCreationAndOwnerBasicAttributes(dir);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.save(this);
|
|
|
|
copyProperties(dir);
|
|
copyAspects(dir);
|
|
|
|
Map<String, AVMNode> children = dir.getListing(srcLookup, true);
|
|
for (Map.Entry<String, AVMNode> child : children.entrySet())
|
|
{
|
|
ChildKey key = new ChildKey(this, child.getKey());
|
|
ChildEntry entry = new ChildEntryImpl(key, child.getValue());
|
|
AVMDAOs.Instance().fChildEntryDAO.save(entry);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Is this a primary indirection node.
|
|
*
|
|
* @return Whether this is a primary indirection.
|
|
*/
|
|
public boolean getPrimaryIndirection()
|
|
{
|
|
return fPrimaryIndirection;
|
|
}
|
|
|
|
/**
|
|
* Set the primary indirection state of this.
|
|
*
|
|
* @param has
|
|
* Whether this is a primary indirection node.
|
|
*/
|
|
public void setPrimaryIndirection(boolean has)
|
|
{
|
|
fPrimaryIndirection = has;
|
|
}
|
|
|
|
/**
|
|
* Get the indirection path.
|
|
*
|
|
* @return The indirection path.
|
|
*/
|
|
public String getIndirection()
|
|
{
|
|
return fIndirection;
|
|
}
|
|
|
|
/**
|
|
* Get the underlying path in the Lookup's context.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return The underlying path.
|
|
*/
|
|
public String getUnderlying(Lookup lPath)
|
|
{
|
|
if (getPrimaryIndirection())
|
|
{
|
|
return getIndirection();
|
|
}
|
|
return lPath.getCurrentIndirection();
|
|
}
|
|
|
|
/**
|
|
* Get the underlying version in the lookup path context.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return The effective underlying version.
|
|
*/
|
|
public int getUnderlyingVersion(Lookup lPath)
|
|
{
|
|
if (lPath.getVersion() == -1)
|
|
{
|
|
return -1;
|
|
}
|
|
if (getPrimaryIndirection())
|
|
{
|
|
return getIndirectionVersion();
|
|
}
|
|
return lPath.getCurrentIndirectionVersion();
|
|
}
|
|
|
|
/**
|
|
* Get the layer id.
|
|
*
|
|
* @return The layer id.
|
|
*/
|
|
public long getLayerID()
|
|
{
|
|
return fLayerID;
|
|
}
|
|
|
|
/**
|
|
* Set the layer id.
|
|
*
|
|
* @param id
|
|
* The id to set.
|
|
*/
|
|
public void setLayerID(long id)
|
|
{
|
|
fLayerID = id;
|
|
}
|
|
|
|
/**
|
|
* Copy on write logic.
|
|
*
|
|
* @param lPath
|
|
* @return The copy or null.
|
|
*/
|
|
public AVMNode copy(Lookup lPath)
|
|
{
|
|
DirectoryNode dir = lPath.getCurrentNodeDirectory();
|
|
Long parentAclId = null;
|
|
if ((dir != null) && (dir.getAcl() != null))
|
|
{
|
|
parentAclId = dir.getAcl().getId();
|
|
}
|
|
// Capture the store.
|
|
AVMStore store = lPath.getAVMStore();
|
|
LayeredDirectoryNodeImpl newMe = null;
|
|
if (!lPath.isInThisLayer())
|
|
{
|
|
// This means that this is being seen indirectly through the topmost
|
|
// layer. The following creates a node that will inherit its
|
|
// indirection from its parent.
|
|
newMe = new LayeredDirectoryNodeImpl((String) null, store, this, parentAclId, ACLCopyMode.COW);
|
|
newMe.setPrimaryIndirection(false);
|
|
newMe.setLayerID(lPath.getTopLayer().getLayerID());
|
|
}
|
|
else
|
|
{
|
|
// A simple copy is made.
|
|
newMe = new LayeredDirectoryNodeImpl(this, store, lPath, false, parentAclId, ACLCopyMode.COW);
|
|
newMe.setLayerID(getLayerID());
|
|
}
|
|
newMe.setAncestor(this);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.update(newMe);
|
|
|
|
return newMe;
|
|
}
|
|
|
|
/**
|
|
* Insert a child node without COW.
|
|
*
|
|
* @param name
|
|
* The name to give the child.
|
|
*/
|
|
public void putChild(String name, AVMNode node)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry existing = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
if (existing != null)
|
|
{
|
|
AVMDAOs.Instance().fChildEntryDAO.delete(existing);
|
|
}
|
|
ChildEntry entry = new ChildEntryImpl(key, node);
|
|
AVMDAOs.Instance().fChildEntryDAO.save(entry);
|
|
}
|
|
|
|
/**
|
|
* Get a listing of the virtual contents of this directory.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return A Map from names to nodes. This is a sorted Map.
|
|
*/
|
|
public Map<String, AVMNode> getListing(Lookup lPath, boolean includeDeleted)
|
|
{
|
|
return getListing(lPath, null, includeDeleted);
|
|
}
|
|
|
|
/**
|
|
* Get a listing of the virtual contents of this directory.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return A Map from names to nodes. This is a sorted Map.
|
|
*/
|
|
public Map<String, AVMNode> getListing(Lookup lPath, String childNamePattern, boolean includeDeleted)
|
|
{
|
|
Map<String, AVMNode> listing = new HashMap<String, AVMNode>();
|
|
Map<String, String> baseLowerKeyName = new HashMap<String, String>();
|
|
|
|
if (!getOpacity())
|
|
{
|
|
// If we are not opaque, get the underlying base listing (from the thing we indirect to)
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(getUnderlyingVersion(lPath), getUnderlying(lPath));
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dir = (DirectoryNode) lookup.getCurrentNode();
|
|
Map<String, AVMNode> underListing = dir.getListing(lookup, childNamePattern, includeDeleted);
|
|
for (Map.Entry<String, AVMNode> entry : underListing.entrySet())
|
|
{
|
|
if (entry.getValue().getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
entry.getValue().getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(lookup.getAVMStore(), entry.getValue(), PermissionService.READ_CHILDREN, false))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
listing.put(entry.getKey(), entry.getValue());
|
|
baseLowerKeyName.put(entry.getKey().toLowerCase(), entry.getKey());
|
|
}
|
|
}
|
|
}
|
|
for (ChildEntry entry : AVMDAOs.Instance().fChildEntryDAO.getByParent(this, childNamePattern))
|
|
{
|
|
if (entry.getChild().getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
entry.getChild().getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(lPath.getAVMStore(), entry.getChild(), PermissionService.READ_CHILDREN, lPath.getDirectlyContained()))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
if (!includeDeleted && entry.getChild().getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
listing.remove(entry.getKey().getName());
|
|
}
|
|
else
|
|
{
|
|
String keyName = baseLowerKeyName.get(entry.getKey().getName().toLowerCase());
|
|
if (keyName != null)
|
|
{
|
|
// specific rename 'case' only
|
|
listing.remove(keyName);
|
|
}
|
|
|
|
listing.put(entry.getKey().getName(), entry.getChild());
|
|
}
|
|
}
|
|
return listing;
|
|
}
|
|
|
|
/**
|
|
* Get a listing of the nodes directly contained by a directory.
|
|
*
|
|
* @param lPath
|
|
* The Lookup to this directory.
|
|
* @return A Map of names to nodes.
|
|
*/
|
|
public Map<String, AVMNode> getListingDirect(Lookup lPath, boolean includeDeleted)
|
|
{
|
|
Map<String, AVMNode> listing = new HashMap<String, AVMNode>();
|
|
for (ChildEntry entry : AVMDAOs.Instance().fChildEntryDAO.getByParent(this, null))
|
|
{
|
|
if (entry.getChild().getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
entry.getChild().getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(lPath != null ? lPath.getAVMStore() : null,
|
|
entry.getChild(), PermissionService.READ_CHILDREN,
|
|
lPath != null ? lPath.getDirectlyContained() : false))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
if (includeDeleted || entry.getChild().getType() != AVMNodeType.DELETED_NODE)
|
|
{
|
|
listing.put(entry.getKey().getName(), entry.getChild());
|
|
}
|
|
}
|
|
return listing;
|
|
}
|
|
|
|
/**
|
|
* Get the direct contents of this directory.
|
|
*
|
|
* @param dir
|
|
* The descriptor that describes us.
|
|
* @param includeDeleted
|
|
* Whether to inlude deleted nodes.
|
|
* @return A Map of Strings to descriptors.
|
|
*/
|
|
public SortedMap<String, AVMNodeDescriptor> getListingDirect(AVMNodeDescriptor dir, boolean includeDeleted)
|
|
{
|
|
List<ChildEntry> children = AVMDAOs.Instance().fChildEntryDAO.getByParent(this, null);
|
|
SortedMap<String, AVMNodeDescriptor> listing = new TreeMap<String, AVMNodeDescriptor>(String.CASE_INSENSITIVE_ORDER);
|
|
for (ChildEntry child : children)
|
|
{
|
|
AVMNode childNode = child.getChild();
|
|
if (childNode.getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
childNode.getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(null, childNode, PermissionService.READ_CHILDREN, false))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
if (!includeDeleted && childNode.getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
continue;
|
|
}
|
|
AVMNodeDescriptor childDesc = childNode.getDescriptor(dir.getPath(), child.getKey().getName(), dir.getIndirection(), dir.getIndirectionVersion());
|
|
listing.put(child.getKey().getName(), childDesc);
|
|
}
|
|
return listing;
|
|
}
|
|
|
|
/**
|
|
* Get a listing from a directory node descriptor.
|
|
*
|
|
* @param dir
|
|
* The directory node descriptor.
|
|
* @param includeDeleted
|
|
* Should DeletedNodes be shown.
|
|
* @return A Map of names to node descriptors.
|
|
*/
|
|
public SortedMap<String, AVMNodeDescriptor> getListing(AVMNodeDescriptor dir, boolean includeDeleted)
|
|
{
|
|
return getListing(dir, null, includeDeleted);
|
|
}
|
|
|
|
/**
|
|
* Get a listing from a directory node descriptor.
|
|
*
|
|
* @param dir
|
|
* The directory node descriptor.
|
|
* @param childNamePattern
|
|
* Pattern to match for child names - may be null
|
|
* @param includeDeleted
|
|
* Should DeletedNodes be shown.
|
|
* @return A Map of names to node descriptors.
|
|
*/
|
|
public SortedMap<String, AVMNodeDescriptor> getListing(AVMNodeDescriptor dir, String childNamePattern, boolean includeDeleted)
|
|
{
|
|
if (dir.getPath() == null || dir.getIndirection() == null)
|
|
{
|
|
throw new AVMBadArgumentException("Illegal null argument.");
|
|
}
|
|
SortedMap<String, AVMNodeDescriptor> listing = new TreeMap<String, AVMNodeDescriptor>(String.CASE_INSENSITIVE_ORDER);
|
|
Map<String, String> baseLowerKeyName = new HashMap<String, String>();
|
|
|
|
if (!getOpacity())
|
|
{
|
|
// If we are not opaque, get the underlying base listing (from the thing we indirect to)
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(dir.getIndirectionVersion(), dir.getIndirection());
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dirNode = (DirectoryNode) lookup.getCurrentNode();
|
|
Map<String, AVMNode> underListing = dirNode.getListing(lookup, childNamePattern, includeDeleted);
|
|
for (Map.Entry<String, AVMNode> entry : underListing.entrySet())
|
|
{
|
|
if (entry.getValue().getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
entry.getValue().getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(null, entry.getValue(), PermissionService.READ_CHILDREN, false))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
listing.put(entry.getKey(),
|
|
entry.getValue().getDescriptor(dir.getPath(), entry.getKey(),
|
|
lookup.getCurrentIndirection(),
|
|
lookup.getCurrentIndirectionVersion()));
|
|
|
|
baseLowerKeyName.put(entry.getKey().toLowerCase(), entry.getKey());
|
|
}
|
|
}
|
|
}
|
|
for (ChildEntry entry : AVMDAOs.Instance().fChildEntryDAO.getByParent(this, childNamePattern))
|
|
{
|
|
if (entry.getChild().getType() == AVMNodeType.LAYERED_DIRECTORY ||
|
|
entry.getChild().getType() == AVMNodeType.PLAIN_DIRECTORY)
|
|
{
|
|
if (!AVMRepository.GetInstance().can(null, entry.getChild(), PermissionService.READ_CHILDREN, false))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
if (!includeDeleted && entry.getChild().getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
listing.remove(entry.getKey().getName());
|
|
}
|
|
else
|
|
{
|
|
String keyName = baseLowerKeyName.get(entry.getKey().getName().toLowerCase());
|
|
if (keyName != null)
|
|
{
|
|
// specific rename 'case' only
|
|
listing.remove(keyName);
|
|
}
|
|
|
|
listing.put(entry.getKey().getName(), entry.getChild()
|
|
.getDescriptor(dir.getPath(), entry.getKey().getName(), dir.getIndirection(), dir.getIndirectionVersion()));
|
|
}
|
|
}
|
|
return listing;
|
|
}
|
|
|
|
/**
|
|
* Get the names of nodes deleted in this directory.
|
|
*
|
|
* @return A List of names.
|
|
*/
|
|
public List<String> getDeletedNames()
|
|
{
|
|
List<ChildEntry> children = AVMDAOs.Instance().fChildEntryDAO.getByParent(this, null);
|
|
List<String> listing = new ArrayList<String>();
|
|
for (ChildEntry entry : children)
|
|
{
|
|
if (entry.getChild().getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
listing.add(entry.getKey().getName());
|
|
}
|
|
}
|
|
return listing;
|
|
}
|
|
|
|
/**
|
|
* Lookup a child entry by name.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @param name
|
|
* The name we are looking.
|
|
* @param version
|
|
* The version in which we are looking.
|
|
* @param write
|
|
* Whether this lookup is occurring in a write context.
|
|
* @return The child entry or null if not found.
|
|
*/
|
|
public Pair<ChildEntry, Boolean> lookupChildEntry(Lookup lPath, String name, boolean includeDeleted)
|
|
{
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
if (entry != null)
|
|
{
|
|
if (!includeDeleted && entry.getChild().getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
return null;
|
|
}
|
|
Pair<ChildEntry, Boolean> result = new Pair<ChildEntry, Boolean>(entry, true);
|
|
return result;
|
|
}
|
|
// Don't check our underlying directory if we are opaque.
|
|
if (getOpacity())
|
|
{
|
|
return null;
|
|
}
|
|
// Not here so check our indirection.
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(getUnderlyingVersion(lPath), getUnderlying(lPath));
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dir = (DirectoryNode) lookup.getCurrentNode();
|
|
Pair<ChildEntry, Boolean> retVal = dir.lookupChildEntry(lookup, name, includeDeleted);
|
|
if (retVal != null)
|
|
{
|
|
retVal.setSecond(false);
|
|
}
|
|
lPath.setFinalStore(lookup.getFinalStore());
|
|
return retVal;
|
|
}
|
|
else
|
|
{
|
|
return null;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Lookup a child using a node descriptor as context.
|
|
*
|
|
* @param mine
|
|
* The node descriptor for this,
|
|
* @param name
|
|
* The name to lookup,
|
|
* @return The node descriptor.
|
|
*/
|
|
public AVMNodeDescriptor lookupChild(AVMNodeDescriptor mine, String name, boolean includeDeleted)
|
|
{
|
|
if (mine.getPath() == null || mine.getIndirection() == null)
|
|
{
|
|
throw new AVMBadArgumentException("Illegal null argument.");
|
|
}
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
if (entry != null)
|
|
{
|
|
if (!includeDeleted && entry.getChild().getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
return null;
|
|
}
|
|
AVMNodeDescriptor desc = entry.getChild().getDescriptor(mine.getPath(), name, mine.getIndirection(), mine.getIndirectionVersion());
|
|
return desc;
|
|
}
|
|
// Don't check our underlying directory if we are opaque.
|
|
if (getOpacity())
|
|
{
|
|
return null;
|
|
}
|
|
// Not here so check our indirection.
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(mine.getIndirectionVersion(), mine.getIndirection());
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dir = (DirectoryNode) lookup.getCurrentNode();
|
|
Pair<AVMNode, Boolean> child = dir.lookupChild(lookup, name, includeDeleted);
|
|
if (child == null)
|
|
{
|
|
return null;
|
|
}
|
|
AVMNodeDescriptor desc = child.getFirst().getDescriptor(lookup);
|
|
return desc;
|
|
}
|
|
else
|
|
{
|
|
return null;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Directly remove a child. Do not COW. Do not pass go etc.
|
|
*
|
|
* @param lPath
|
|
* The lookup that arrived at this.
|
|
* @param name
|
|
* The name of the child to remove.
|
|
*/
|
|
public void removeChild(Lookup lPath, String name)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
AVMNode child = null;
|
|
boolean indirect = false;
|
|
if (entry != null)
|
|
{
|
|
child = entry.getChild();
|
|
if (child.getType() == AVMNodeType.DELETED_NODE)
|
|
{
|
|
return;
|
|
}
|
|
AVMDAOs.Instance().fChildEntryDAO.delete(entry);
|
|
}
|
|
else
|
|
{
|
|
Pair<AVMNode, Boolean> temp = lookupChild(lPath, name, false);
|
|
if (temp == null)
|
|
{
|
|
child = null;
|
|
}
|
|
else
|
|
{
|
|
child = temp.getFirst();
|
|
}
|
|
indirect = true;
|
|
}
|
|
if (child != null && (indirect || child.getStoreNew() == null || child.getAncestor() != null))
|
|
{
|
|
DeletedNodeImpl ghost = new DeletedNodeImpl(lPath.getAVMStore(), child.getAcl());
|
|
AVMDAOs.Instance().fAVMNodeDAO.save(ghost);
|
|
|
|
ghost.setAncestor(child);
|
|
ghost.setDeletedType(child.getType());
|
|
ghost.copyCreationAndOwnerBasicAttributes(child);
|
|
ghost.copyAspects(child);
|
|
ghost.copyProperties(child);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.update(ghost);
|
|
|
|
this.putChild(name, ghost);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the type of this node.
|
|
*
|
|
* @return The type of this node.
|
|
*/
|
|
public int getType()
|
|
{
|
|
return AVMNodeType.LAYERED_DIRECTORY;
|
|
}
|
|
|
|
/**
|
|
* For diagnostics. Get a String representation.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return A String representation.
|
|
*/
|
|
public String toString(Lookup lPath)
|
|
{
|
|
return "[LD:" + getId() + (lPath != null ? ":" + getUnderlying(lPath) : "") + "]";
|
|
}
|
|
|
|
/**
|
|
* Set the primary indirection. No COW. Cascade resetting of acls also does not COW
|
|
*
|
|
* @param path
|
|
* The indirection path.
|
|
*/
|
|
public void rawSetPrimary(Lookup lPath, String path)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
|
|
setIndirection(path);
|
|
setPrimaryIndirection(true);
|
|
|
|
// Need to change the permission we point to ....
|
|
if (getIndirection() != null)
|
|
{
|
|
if ((getAcl() == null) || (getAcl().getAclType() == ACLType.LAYERED))
|
|
{
|
|
DbAccessControlList acl = null;
|
|
Lookup lookup = AVMRepository.GetInstance().lookupDirectory(-1, getIndirection());
|
|
if (lookup != null)
|
|
{
|
|
DirectoryNode dir = (DirectoryNode) lookup.getCurrentNode();
|
|
if (dir.getAcl() != null)
|
|
{
|
|
if (getAcl() == null)
|
|
{
|
|
acl = AVMDAOs.Instance().fAclDAO.createLayeredAcl(dir.getAcl().getId());
|
|
}
|
|
else
|
|
{
|
|
|
|
acl = AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(getAcl().getId(), dir.getAcl().getId(), ACLCopyMode.REDIRECT);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (getAcl() == null)
|
|
{
|
|
acl = AVMDAOs.Instance().fAclDAO.createLayeredAcl(null);
|
|
}
|
|
else
|
|
{
|
|
acl = AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(getAcl().getId(), null, ACLCopyMode.REDIRECT);
|
|
}
|
|
}
|
|
}
|
|
setAclAndInherit(this, acl, null);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (getAcl().getAclType() == ACLType.LAYERED)
|
|
{
|
|
DbAccessControlList acl = null;
|
|
if (getAcl() == null)
|
|
{
|
|
acl = AVMDAOs.Instance().fAclDAO.createLayeredAcl(null);
|
|
}
|
|
else
|
|
{
|
|
acl = AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(getAcl().getId(), null, ACLCopyMode.REDIRECT);
|
|
}
|
|
setAclAndInherit(this, acl, null);
|
|
}
|
|
}
|
|
}
|
|
|
|
public void setAclAndInherit(LayeredDirectoryNode layeredDirectory, DbAccessControlList acl, String name)
|
|
{
|
|
// Note ACLS may COW on next ACL change
|
|
layeredDirectory.setAcl(acl);
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.update(layeredDirectory);
|
|
|
|
Map<String, AVMNode> directChildren = layeredDirectory.getListingDirect((Lookup) null, true);
|
|
for (String key : directChildren.keySet())
|
|
{
|
|
AVMNode node = directChildren.get(key);
|
|
|
|
if (node instanceof LayeredDirectoryNode)
|
|
{
|
|
LayeredDirectoryNode childNode = (LayeredDirectoryNode) node;
|
|
DbAccessControlList currentAcl = node.getAcl();
|
|
if (currentAcl == null)
|
|
{
|
|
if (acl == null)
|
|
{
|
|
childNode.setAclAndInherit(childNode, null, key);
|
|
}
|
|
else
|
|
{
|
|
childNode.setAclAndInherit(childNode, AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(acl.getId(), acl.getId(), ACLCopyMode.REDIRECT), key);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (acl == null)
|
|
{
|
|
childNode.setAclAndInherit(childNode, currentAcl, key);
|
|
}
|
|
else
|
|
{
|
|
childNode.setAclAndInherit(childNode, AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(currentAcl.getId(), acl.getId(), ACLCopyMode.REDIRECT), key);
|
|
}
|
|
}
|
|
}
|
|
else if (node instanceof PlainFileNode)
|
|
{
|
|
PlainFileNode childNode = (PlainFileNode) node;
|
|
DbAccessControlList currentAcl = node.getAcl();
|
|
if (currentAcl == null)
|
|
{
|
|
if (acl == null)
|
|
{
|
|
childNode.setAcl(null);
|
|
}
|
|
else
|
|
{
|
|
childNode.setAcl(AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(acl.getId(), acl.getId(), ACLCopyMode.REDIRECT));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (acl == null)
|
|
{
|
|
childNode.setAcl(currentAcl);
|
|
}
|
|
else
|
|
{
|
|
childNode.setAcl(AVMDAOs.Instance().fAclDAO.getDbAccessControlListCopy(currentAcl.getId(), acl.getId(), ACLCopyMode.REDIRECT));
|
|
}
|
|
}
|
|
|
|
AVMDAOs.Instance().fAVMNodeDAO.update(childNode);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Make this node become a primary indirection. COW.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
*/
|
|
public void turnPrimary(Lookup lPath)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
String path = lPath.getCurrentIndirection();
|
|
rawSetPrimary(lPath, path);
|
|
}
|
|
|
|
/**
|
|
* Make this point at a new target.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
*/
|
|
public void retarget(Lookup lPath, String target)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
rawSetPrimary(lPath, target);
|
|
}
|
|
|
|
/**
|
|
* Let anything behind name in this become visible.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @param name
|
|
* The name to uncover.
|
|
*/
|
|
public void uncover(Lookup lPath, String name)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
if (entry.getChild().getType() != AVMNodeType.DELETED_NODE)
|
|
{
|
|
throw new AVMException("One can only uncover deleted nodes.");
|
|
}
|
|
if (entry != null)
|
|
{
|
|
AVMDAOs.Instance().fChildEntryDAO.delete(entry);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the descriptor for this node.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return A descriptor.
|
|
*/
|
|
public AVMNodeDescriptor getDescriptor(Lookup lPath, String name)
|
|
{
|
|
BasicAttributes attrs = getBasicAttributes();
|
|
String path = lPath.getRepresentedPath();
|
|
path = AVMNodeConverter.ExtendAVMPath(path, name);
|
|
|
|
int indirectionVersion = getUnderlyingVersion(lPath);
|
|
String indirect = null;
|
|
if (getPrimaryIndirection())
|
|
{
|
|
indirect = getIndirection();
|
|
}
|
|
else
|
|
{
|
|
indirect = AVMNodeConverter.ExtendAVMPath(lPath.getCurrentIndirection(), name);
|
|
}
|
|
|
|
return new AVMNodeDescriptor(path, name, AVMNodeType.LAYERED_DIRECTORY, attrs.getCreator(), attrs.getOwner(), attrs.getLastModifier(), attrs.getCreateDate(), attrs
|
|
.getModDate(), attrs.getAccessDate(), getId(), getGuid(), getVersionID(), indirect, indirectionVersion, getPrimaryIndirection(), getLayerID(), getOpacity(), -1, -1);
|
|
}
|
|
|
|
/**
|
|
* Get the descriptor for this node.
|
|
*
|
|
* @param lPath
|
|
* The Lookup.
|
|
* @return A descriptor.
|
|
*/
|
|
public AVMNodeDescriptor getDescriptor(Lookup lPath)
|
|
{
|
|
BasicAttributes attrs = getBasicAttributes();
|
|
String path = lPath.getRepresentedPath();
|
|
String name = path.substring(path.lastIndexOf("/") + 1);
|
|
return new AVMNodeDescriptor(path, name, AVMNodeType.LAYERED_DIRECTORY, attrs.getCreator(), attrs.getOwner(), attrs.getLastModifier(), attrs.getCreateDate(), attrs
|
|
.getModDate(), attrs.getAccessDate(), getId(), getGuid(), getVersionID(), getUnderlying(lPath), getUnderlyingVersion(lPath), getPrimaryIndirection(), getLayerID(),
|
|
getOpacity(), -1, -1);
|
|
}
|
|
|
|
/**
|
|
* Get a descriptor for this.
|
|
*
|
|
* @param parentPath
|
|
* The parent path.
|
|
* @param name
|
|
* The name this was looked up with.
|
|
* @param parentIndirection
|
|
* The indirection of the parent.
|
|
* @return The descriptor.
|
|
*/
|
|
public AVMNodeDescriptor getDescriptor(String parentPath, String name, String parentIndirection, int parentIndirectionVersion)
|
|
{
|
|
BasicAttributes attrs = getBasicAttributes();
|
|
String path = parentPath.endsWith("/") ? parentPath + name : parentPath + "/" + name;
|
|
String indirection = null;
|
|
int indirectionVersion = -1;
|
|
if (getPrimaryIndirection())
|
|
{
|
|
indirection = getIndirection();
|
|
indirectionVersion = getIndirectionVersion();
|
|
}
|
|
else
|
|
{
|
|
indirection = parentIndirection.endsWith("/") ? parentIndirection + name : parentIndirection + "/" + name;
|
|
indirectionVersion = parentIndirectionVersion;
|
|
}
|
|
return new AVMNodeDescriptor(path, name, AVMNodeType.LAYERED_DIRECTORY, attrs.getCreator(), attrs.getOwner(), attrs.getLastModifier(), attrs.getCreateDate(), attrs
|
|
.getModDate(), attrs.getAccessDate(), getId(), getGuid(), getVersionID(), indirection, indirectionVersion, getPrimaryIndirection(), getLayerID(), getOpacity(), -1, -1);
|
|
}
|
|
|
|
/**
|
|
* Set the indirection.
|
|
*
|
|
* @param indirection
|
|
*/
|
|
public void setIndirection(String indirection)
|
|
{
|
|
fIndirection = indirection;
|
|
}
|
|
|
|
/**
|
|
* Does nothing because LayeredDirectoryNodes can't be roots.
|
|
*
|
|
* @param isRoot
|
|
*/
|
|
public void setIsRoot(boolean isRoot)
|
|
{
|
|
}
|
|
|
|
/**
|
|
* Get the opacity of this.
|
|
*
|
|
* @return The opacity.
|
|
*/
|
|
public boolean getOpacity()
|
|
{
|
|
return fOpacity;
|
|
}
|
|
|
|
/**
|
|
* Set the opacity of this, ie, whether it blocks things normally seen through its indirection.
|
|
*
|
|
* @param opacity
|
|
*/
|
|
public void setOpacity(boolean opacity)
|
|
{
|
|
fOpacity = opacity;
|
|
}
|
|
|
|
/**
|
|
* Link a node with the given id into this directory.
|
|
*
|
|
* @param lPath
|
|
* The Lookup for this.
|
|
* @param name
|
|
* The name to give the node.
|
|
* @param toLink
|
|
* The node to link in.
|
|
*/
|
|
public void link(Lookup lPath, String name, AVMNodeDescriptor toLink)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
AVMNode node = AVMDAOs.Instance().fAVMNodeDAO.getByID(toLink.getId());
|
|
if (node == null)
|
|
{
|
|
throw new AVMNotFoundException("Not Found: " + toLink.getId());
|
|
}
|
|
if (node.getType() == AVMNodeType.LAYERED_DIRECTORY && !((LayeredDirectoryNode) node).getPrimaryIndirection())
|
|
{
|
|
throw new AVMBadArgumentException("Non primary layered directories cannot be linked.");
|
|
}
|
|
// Look for an existing child of that name.
|
|
Pair<AVMNode, Boolean> temp = lookupChild(lPath, name, true);
|
|
AVMNode existing = (temp == null) ? null : temp.getFirst();
|
|
ChildKey key = new ChildKey(this, name);
|
|
if (existing != null)
|
|
{
|
|
if (existing.getType() != AVMNodeType.DELETED_NODE)
|
|
{
|
|
// If the existing child is not a DELETED_NODE it's an error.
|
|
throw new AVMExistsException(name + " exists.");
|
|
}
|
|
// Only if the existing DELETED_NODE child exists directly in this
|
|
// directory do we delete it.
|
|
if (directlyContains(existing))
|
|
{
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
AVMDAOs.Instance().fChildEntryDAO.delete(entry);
|
|
}
|
|
}
|
|
// Make the new ChildEntry and save.
|
|
ChildEntry newChild = new ChildEntryImpl(key, node);
|
|
AVMDAOs.Instance().fChildEntryDAO.save(newChild);
|
|
}
|
|
|
|
/**
|
|
* Remove name without leaving behind a deleted node.
|
|
*
|
|
* @param name
|
|
* The name of the child to flatten.
|
|
*/
|
|
public void flatten(String name)
|
|
{
|
|
if (DEBUG)
|
|
{
|
|
checkReadOnly();
|
|
}
|
|
ChildKey key = new ChildKey(this, name);
|
|
ChildEntry entry = AVMDAOs.Instance().fChildEntryDAO.get(key);
|
|
if (entry != null)
|
|
{
|
|
AVMDAOs.Instance().fChildEntryDAO.delete(entry);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.repo.avm.LayeredDirectoryNode#setIndirectionVersion(int)
|
|
*/
|
|
public void setIndirectionVersion(Integer version)
|
|
{
|
|
if (version == null)
|
|
{
|
|
fIndirectionVersion = -1;
|
|
}
|
|
else
|
|
{
|
|
fIndirectionVersion = version;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the indirection version.
|
|
*
|
|
* @return The indirection version.
|
|
*/
|
|
public Integer getIndirectionVersion()
|
|
{
|
|
return fIndirectionVersion;
|
|
}
|
|
|
|
}
|