mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
22215: Fix compilation error 22240: ALF-4207: Download servlets show error page with permissions error rather than login page when non-guest user has insufficient permissions 22241: ALF-4469: External Access Servlet should also show status 403 errors to non-guest users, as in ALF-4207 22244: ALF-4599: CIFS access to alfresco with Kerberos authentication creates wrong users with domain suffix ALF-4395: recognize Kerberos machine accounts with lower case names 22247: ALF-4397: Properly handle null values in SortableSelectItem.compareTo() 22248: Merged DEV/TEMPORARY to V3.3-BUG-FIX 21963: ALF-4390: ModuleManagementTool is not returning error code in case of failure Error code constants and appropriate System.exit(code) invokations were added. 22260: ALF-4597: InviteContentUsersWizard was caching permissions in a non-type-specific cache - removed the cache - didn't allow for dynamic model updates either 22269: Merged V3.3 to V3.3-BUG-FIX (RECORD ONLY) 22268: Merged V3.3-BUG-FIX to V3.3 - Merged across all differences from V3.3-BUG-FIX 22270: Incremented revision number 22467: Merge from V3.3 to V3.3BUG-FIX. Fix for ALF-4741. V3.3: 22466 Merge from V3.2 to V3.3. Fix for ALF-4741. V3.2: 22465 Fix for ALF-4741. Repository Web Scripts can produce a corrupted response after a transaction collision/retry. 22667: Merged DEV/TEMPORARY to V3.3-BUG-FIX 22665: ALF-4825: Unlocking checked out content cause both original & working copy un-usable. Do not include unlock in the actions list when a node has a working copy. 22691: Add missing "logAbandoned" (= false) prop to config - follow on to r15133 (related to ALF-4020 / ETWOTWO-562) 22710: ALF-3948 - from time to time we have exception "Failed to init dictionaryRegistry" 22718: Merge from V3.3 to V3.3-BUG-FIX r 22715 Merge from V3.2 to V3.3 r 22713 Fix for ALF-4946 Possible NullPointerException during creation of thumbnails whose names are null-valued. 22722: Merged V3.3 to V3.3-BUG-FIX 22271: ALF-3712: Merged HEAD to V3.3 22249: Bin contents were not being packaged. 22272: Merged DEV/TEMPORARY to V3.3 22067: ALF-4479: when using webdav inline edit on webdav + MS Word 2003 +IE6, one gets: Unable to check in Content Node due to system error. Access Denied. You do not have the appropriate permissions to perform this operation. - Do not unlock a working copy. 22273: Merged DEV/TEMPORARY to V3.3 21729: ALF-3112: Property parameterTemplates not resolved correctly for SimpleTemplateActionDefinition The temporary fix for unconfigurable valueSeparator property. https://jira.springframework.org/browse/SPR-7429 22274: Merged DEV/TEMPORARY to V3.3 21993: ALF-4396: webdav "supportedlock" propfind request returns malformed response WebDAV supported lock elements were wrapped by “lockentry” elements according to the WebDAV specification. 22276: ALF-3890: FTP Change Working Directory (CWD) command works with root-relative paths with more than one component 22277: Merged DEV/TEMPORARY to V3.3 22076: ALF-3579: Open the Details Page URL removes the header, navigation bar etc The identifiers for modify action tag and details' actions tag should be different in the details pages. For documents: in the filelink-details.jsp and document-details.jsp. For spaces: in the space-details.jsp and spacelink-details.jsp. 22285: Merged HEAD to V3.3 22284: Fix for ALF-3063 "Incorrect behaviour on filtering by tag in Repository". Labels updated to more accurately reflect behaviour. 22299: Fix for ALF-3893: lucene.indexer.mergerTargetIndexCount is redundant - this property is now used to control the merging of indexes as was intended 22309: Merged DEV/TEMPORARY to V3.3 (Approved by Roy) 21035: ALF-2588: RM: Export and import of file plan causes disposition errors When content is imported from acp the actionId that points to the action NodeRef is old in the imported content and NullPointerExcepption appears. To avoid this we changed DispositionScheduleImpl. Now it stores the action that has different name and ID (when action is create it name equals id) in a separate map. And when getDispositionActionDefinition(String id) method is called it tries to retrieve the action from this map, if it hasn’t been found earlier. 22325: Fix for ALF-4428: Incorrect behaviour of Consumer and Contributor permissions with Quickr - unit test pass 22334: Merged HEAD to V3.3 22331: Fixes: ALF-3558: Input and variable encoding issues in Share Calendar & API JSON data. 22355: ALF-4489: Special Characters Create Stack Overflow Exception in the Group Admin Console for Share in Internet Explorer. Fixed missing encoding and also added guard code to prevent stack overflow problem in case of future error. 22356: Fix for ALF-4384 - missing JSP page directive 22360: Fix for ALF-4428: Incorrect behaviour of Consumer and Contributor permissions with Quickr - unit test pass - no abstain allowed 22365: Merged DEV/TEMPORARY to V3.3 21874: ALF-2641: WebDav Permission Issues - MAC OSX Finder The createExclusive field was introduced instead of m_scope. New algorithm of lockscope determination was added. Also ALF-4008 compliant fix provided with this. 21812: ALF-4008: save a MS Word change over webdav after a 2-3 minutes delay causes the error 'XXX.doc is currently in use. Please try again later.' Modified LOCK method, it gets a scope from NodeRef property if m_scope field is not defined. 22367: Merged DEV/TEMPORARY to V3.3 21442: ALF-2587: WEBDAV error in Windows 7 - variant generateLockDiscoveryXML methods were factored into a single one capable of generating a namespaced LOCK response compatible with Windows 7 when its user agent header is detected. 22368: Merged DEV/TEMPORARY to V3.3 20919: ALF-2834: All day events created in Outlook not appearing in Meeting Workspace Different date format is used by Outlook when creating all day meeting request and meeting request specifying date and time. The code was changed to handle both situations accordingly. 22369: Merged DEV/TEMPORARY to V3.3 (With simplifications) 21470: ALF-3796: Locale is not always set/reset on every request thread - A GlobalLocalizationFilter sits in front of ALL requests and sets a default fallback locale on I18NUtil - Moved BaseServlet.setLanguageFromRequestHeader into this filter and made sure it always falls back to a default locale - Subsequent filters / servlets in faces chain may override this with user preferred locale after authentication 22370: ALF-3868: Fix for compatibility with Sun Directory Server 22371: Merged DEV/TEMPORARY to V3.3 21811: ALF-4067: Display Value for Action Constraint breaking a java eval in Share When a node doesn't have a ContentModel.PROP_TITLE property it is added to AllowableValues with PROP_NAME value. 21795: ALF-4067: Display Value for Action Constraint breaking a java eval in Share The fix introduces the code which doesn't add a node to AllowableValues if it doesn't have a ContentModel.PROP_TITLE property. 22378: ALF-3796: Fixed compilation error - BaseServlet.setLanguageFromRequestHeader replaced by global filter 22380: ALF-3761: War bundles + extension samples now include alfresco-global.properties in correct position in hierarchy 22386: ALF-3887: Two versions of geronimo-activation are shipped - Removed the older version 22402: WCM - add more debug logging only 22405: Change notification handler not enabled by the server configuration bean. ALF-4715. 22407: Merged DEV/TEMPORARY to V3.3 22231: ALF-4096: Share point module is causing file descriptor leaks. The following changes were added to VtiIfHeaderAction and GetDocumentMethod: - code that copies data between streams was replaced by org.apache.commons.io.IOUtils.copy() - correct stream closing was added for all cases including exceptions while copying 22411: Merged DEV/TEMPORARY to V3.3 21864: ALF-4371: Error occurs if user try to find event from meeting place Replaced incorrect NamespaceService.CONTENT_MODEL_PREFIX with NamespaceService.CONTENT_MODEL_1_0_URI in QName creation. 22412: Merged DEV/TEMPORARY to V3.3 22018: ALF-4403: Search on users in JSF client and SHARE do not specify "cm:person" type clause in the query leading to incorrect results in user searching. People searches in Alfresco and share are restricted by “cm:person” type. 21988: ALF-4403: Search on users in JSF client and SHARE do not specify "cm:person" type clause in the query leading to incorrect results in user searching. People searches in Alfresco and share are restricted by “cm:person” type. 22418: ALF-4578: Avoid ConcurrentModificationException in AVMDeploymentTarget 22420: Fixed ALF-958: Target associations aren't copied - Added CopyBehaviourCallback. getAssociationCopyAction - Default behaviour: - Remove existing associations of same type when copying OVER an existing node (e.g. check-in) - Copy the association using a new target if the target is copied in the same call - Copy the association to the original target if the target is not copied in the same call - Abstract behaviour (for those that have implemented a CopyBehaviourCallback): - Remove existing associations of same type when copying OVER an existing node (e.g. check-in) - Only copy the association to a new target if the original target is copied 22421: ALF-4641: Strip ticket parameter on login page redirect to avoid endless redirect loop 22422: Merged DEV/TEMPORARY to V3.3 21201: ALF-1804: Passthru server check gets confused when a server goes offline 22423: Merged DEV/TEMPORARY to V3.3 21891: ALF-3356: Error changing own user role from coordinator to consumer When a user changes the Roles, all Permissions are immediately deleted and new selected permissions are created. If all permissions are deleted then the user doesn't have access for permissions creation. If the user currently has permission change permission the currently set of permissions is cleared and new permissions are added from a System User authority. 22424: Merged DEV/TEMPORARY to V3.3 21182: ALF-1786: Remote Opensearch request mimetype missing SearchProxy was changed to provide original User-Agent header. HTTPProxy was extended to set request headers. New overridable method setRequestHeaders was added to provide ability of setting headers. 22425: Merged DEV/TEMPORARY to V3.3 22165: ALF-197: When returning to the first step of Advanced Workflow creation from second or third steps it's always Adhoc Task chosen there The selectedWorkflow variable was reseting every time on "Choose Workflow" step 22426:Merged DEV/TEMPORARY to V3.3 21323: ALF-687: Error when invoking webservices via SSL repository location url. Add a new overload of ContentUtils.putContent() method with the isSSL argument at the end. If this parameter value is true then SSLSocket is used and Socket otherwise. 22428: ALF-3490: Unfriendly error messages from WebDAV when content doesn't exist - Generalized ALF-4207 solution so that the error page instead displays a status 404 message 22429: Merged DEV/TEMPORARY to V3.3 21325: ALF-3502: Logging in FacesHelper.getManagedBean on failure to create bean Detailed logging of the EvaluationException for ValueBinding was added. 22430: Merged DEV/TEMPORARY to V3.3 20974: ALF-2695: mimetypes-extension-context.xml.sample does not use the correct classes Changed the type of the bean id="mimetypeConfigService" from “"org.alfresco.config.xml.XMLConfigService” to “org.springframework.extensions.config.xml.XMLConfigService” Renamed mimetypes-extension-context.xml.sample file to file mimetypes-extension.xml.sample. The file mimetypes-extension-context.xml.sample was interpreted like spring context file. It wasn’t correct. 22431: Merged DEV/TEMPORARY to V3.3 21099: ALF-3046: UI - Import feature not available to contributor user The fix also covers related bug ALF-2802. Permission ‘Write’ was replaced by ‘CreateChildren’ for import action because contributor has ‘AddChildren’ (not ‘Write’) permission. 22432: Merged DEV/TEMPORARY to V3.3 20973: ALF-3244: alfresco-sample-website.war does not deploy to bundled Tomcat The cause of the corrupted alfresco-sample-website.war deployment is the usage of the SSIFilter in the application. Only Contexts which are marked as privileged may use SSI features. For this reason, the context has been marked as privileged in META-INF/context.xml 22433: Merged DEV/TEMPORARY to V3.3 21190: ALF-3751: Unintentional copy/remove of 'Web Forms' space removes form associations in Web Projects Parent validation before deleting was added. Now deleted web form is removed from Web Project only if this form is located in original Web Form folder. 22434: Merged DEV/TEMPORARY to V3.3 21490: ALF-4099: Customer concern about String comparison operators == vs equals Comparison operator was replaced by equals/EqualsHelper.nullSafeEquals in the ContentFilterLanguagesMap DocumentNavigator UIAjaxTagPicker Presence classes. DocumentNavigator.getAttributeName() method was changed because the previous method's logic always returned escapedLocalName in any case. 22436: Merged DEV/TEMPORARY to V3.3 22063: ALF-4494 : Share show error if versionable document has no version history. 1. evaluator.lib.js was modified to prevent NPE if no version history exists for document. 2. Result was manually tested. 22437: ALF-2796: java.naming.referral is set to "follow" in the LDAP contexts to avoid PartialResultExceptions on LDAP sync 22466: Merge from V3.2 to V3.3. Fix for ALF-4741. V3.2: 22465 Fix for ALF-4741. Repository Web Scripts can produce a corrupted response after a transaction collision/retry. 22469: Fix for CIFS long directory path results in duplicate folder displays. ALF-3938. Removed (hopefully) last of the hardcoded buffer length limits. 22472: Fixed ALF-4670: XAM retainUntil value does not propagate down the space hierarchy 22473: Fixed ALF-4656: Deleted Content Backup should ignore unrecognised URLs - Also fixes ALF-4657: Content stored on XAM is not cleaned up correctly - Errors in the listeners are logged only - ContentStoreCleanerListener checks and warns if the URL is unsupported 22474: Fix to web.xml to correctly validate and therefore deploy on JBoss5.1.0 22485: Fix for NFS losing contents during edit or copy. ALF-4737. 22492: ALF-4652 XAM bug fixes and improvements: Respect 0 'retentionPeriodDays' 22501: Fixed ALF-4763 XAM-enabled nodes must not go to the archive://SpacesStore 22504: Fix for MS Word mimetype is changed when editing via CIFS. ALF-3772. 22520: ALF-4768: WCM (w/ virt svr) - submit (no need to virtualize direct submit workflows) 22526: Externalised setting of BINARIES, plus added bin with jars and dlls 22561: ALF-4792: WCM virt svr - add experimental option for lazy deployment (defer startup of dependent webapps until accessed) 22611: Fixed ALF-1893: Windows 7 SSP Read-only. Note: Relies on the patched Excel and PowerPoint mimetypes, but also falls back to file exension. 22612: Merged HEAD to BRANCHES/V3.3: 22609: Resolve ALF4822, ALF4818 22628: ALF-3239: Added encoding elements to mysql db url 22656: Fix for Solaris/Gedit problem, keep a mapping for the original file handle to the new path after a rename. ALF-4843. 22673: ALF-4845: Person and Group member deletion performance fix - Don't batch load all a group's members when trying to delete one of them! - Can result in infeasibly large hibernate sessions when trying to delete a person / LDAP sync in a repository with very large groups - Switched off batch loading in NodeService.removeChild() - Avoided unnecessary use of removeAuthority in PersonService.deletePerson() 22674: Merged DEV/TEMPORARY to V3.3 22653: ALF-661: There is no way to determine the protocol, hostname and port from a javascript kicked off by JBPM These variables are now available for use in workflow and action javascript and they are wired to the corresponding parameters that already exist in the sysAdmin subsystem. urls.alfresco.protocol urls.alfresco.host urls.alfresco.port urls.alfresco.context urls.share.protocol urls.share.host urls.share.port urls.share.context See bug for example usage 22676: Merged HEAD to V3.3: 20306: Google Doc integration fixes: - Fixed up inconsistancies in powerpoint and excel mimetypes set throughout the code - Unit tests failures for excel sheets fixed - Able to now create and checkout docs, sheets and presentations successfullly - Docs, sheets and presentations downloadable and viewable - Fixed ALF-2700 (See ALF-4827) 22715: Merge from V3.2 to V3.3. r. 22713. Fix for ALF-4946 Possible NullPointerException during creation of thumbnails whose names are null-valued. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@22725 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
951 lines
32 KiB
Java
951 lines
32 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.web.bean.users;
|
|
|
|
import java.io.Serializable;
|
|
import java.text.MessageFormat;
|
|
import java.util.ArrayList;
|
|
import java.util.Collections;
|
|
import java.util.HashMap;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Set;
|
|
|
|
import javax.faces.application.FacesMessage;
|
|
import javax.faces.component.UISelectOne;
|
|
import javax.faces.context.FacesContext;
|
|
import javax.faces.event.ActionEvent;
|
|
import javax.faces.event.ValueChangeEvent;
|
|
import javax.faces.model.DataModel;
|
|
import javax.faces.model.ListDataModel;
|
|
import javax.transaction.UserTransaction;
|
|
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.service.cmr.repository.InvalidNodeRefException;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.search.SearchService;
|
|
import org.alfresco.service.cmr.security.AccessPermission;
|
|
import org.alfresco.service.cmr.security.AccessStatus;
|
|
import org.alfresco.service.cmr.security.AuthorityService;
|
|
import org.alfresco.service.cmr.security.AuthorityType;
|
|
import org.alfresco.service.cmr.security.OwnableService;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.cmr.security.PersonService;
|
|
import org.alfresco.web.app.Application;
|
|
import org.alfresco.web.app.context.IContextListener;
|
|
import org.alfresco.web.app.context.UIContextService;
|
|
import org.alfresco.web.app.servlet.FacesHelper;
|
|
import org.alfresco.web.bean.BrowseBean;
|
|
import org.alfresco.web.bean.NavigationBean;
|
|
import org.alfresco.web.bean.dialog.BaseDialogBean;
|
|
import org.alfresco.web.bean.dialog.FilterViewSupport;
|
|
import org.alfresco.web.bean.repository.MapNode;
|
|
import org.alfresco.web.bean.repository.Node;
|
|
import org.alfresco.web.bean.repository.Repository;
|
|
import org.alfresco.web.ui.common.Utils;
|
|
import org.alfresco.web.ui.common.component.UIActionLink;
|
|
import org.alfresco.web.ui.common.component.UIListItem;
|
|
import org.alfresco.web.ui.common.component.UIModeList;
|
|
import org.alfresco.web.ui.common.component.data.UIRichList;
|
|
import org.alfresco.web.ui.repo.WebResources;
|
|
|
|
/**
|
|
* Bean backing the Manage Space/Content Permission pages.
|
|
*
|
|
* @author Kevin Roast
|
|
*/
|
|
public abstract class UserMembersBean extends BaseDialogBean implements IContextListener, FilterViewSupport
|
|
{
|
|
private static final String MSG_SUCCESS_INHERIT_NOT = "success_not_inherit_permissions";
|
|
private static final String MSG_SUCCESS_INHERIT = "success_inherit_permissions";
|
|
|
|
private static final String ERROR_DELETE = "error_remove_user";
|
|
|
|
private static final String OUTCOME_FINISH = "finish";
|
|
|
|
private static final String LOCAL = "local";
|
|
private static final String INHERITED = "inherited";
|
|
|
|
private final static String MSG_CLOSE = "close";
|
|
|
|
private String filterMode = LOCAL;
|
|
|
|
/** NodeService bean reference */
|
|
transient private NodeService nodeService;
|
|
|
|
/** SearchService bean reference */
|
|
transient private SearchService searchService;
|
|
|
|
/** PermissionService bean reference */
|
|
transient private PermissionService permissionService;
|
|
|
|
/** AuthorityService bean reference */
|
|
transient private AuthorityService authorityService;
|
|
|
|
/** PersonService bean reference */
|
|
transient private PersonService personService;
|
|
|
|
/** BrowseBean bean refernce */
|
|
protected BrowseBean browseBean;
|
|
|
|
/** OwnableService bean reference */
|
|
transient private OwnableService ownableService;
|
|
|
|
/** Component reference for Users RichList control */
|
|
private UIRichList usersRichList;
|
|
|
|
/** action context */
|
|
private String personAuthority = null;
|
|
|
|
/** action context */
|
|
private String personName = null;
|
|
|
|
/** datamodel for table of roles for current person */
|
|
private transient DataModel personRolesDataModel = null;
|
|
|
|
/** roles for current person */
|
|
private List<PermissionWrapper> personRoles = null;
|
|
|
|
|
|
/**
|
|
* Default constructor
|
|
*/
|
|
public UserMembersBean()
|
|
{
|
|
UIContextService.getInstance(FacesContext.getCurrentInstance()).registerBean(this);
|
|
}
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// Abstract methods
|
|
|
|
/**
|
|
* Returns the node that is being acted upon
|
|
*
|
|
* @return The node to manage permissions for
|
|
*/
|
|
public abstract Node getNode();
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// Bean property getters and setters
|
|
|
|
/**
|
|
* @param nodeService The NodeService to set.
|
|
*/
|
|
public void setNodeService(NodeService nodeService)
|
|
{
|
|
this.nodeService = nodeService;
|
|
}
|
|
|
|
protected NodeService getNodeService()
|
|
{
|
|
if (nodeService == null)
|
|
{
|
|
nodeService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getNodeService();
|
|
}
|
|
return nodeService;
|
|
}
|
|
|
|
/**
|
|
* @param searchService The search service
|
|
*/
|
|
public void setSearchService(SearchService searchService)
|
|
{
|
|
this.searchService = searchService;
|
|
}
|
|
|
|
protected SearchService getSearchService()
|
|
{
|
|
if (searchService == null)
|
|
{
|
|
searchService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getSearchService();
|
|
}
|
|
return searchService;
|
|
}
|
|
|
|
/**
|
|
* @param permissionService The PermissionService to set.
|
|
*/
|
|
public void setPermissionService(PermissionService permissionService)
|
|
{
|
|
this.permissionService = permissionService;
|
|
}
|
|
|
|
protected PermissionService getPermissionService()
|
|
{
|
|
if (permissionService == null)
|
|
{
|
|
permissionService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getPermissionService();
|
|
}
|
|
return permissionService;
|
|
}
|
|
|
|
/**
|
|
* @param authorityService The AuthorityService to set.
|
|
*/
|
|
public void setAuthorityService(AuthorityService authorityService)
|
|
{
|
|
this.authorityService = authorityService;
|
|
}
|
|
|
|
protected AuthorityService getAuthorityService()
|
|
{
|
|
if (authorityService == null)
|
|
{
|
|
authorityService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getAuthorityService();
|
|
}
|
|
return authorityService;
|
|
}
|
|
|
|
/**
|
|
* @param ownableService The ownableService to set.
|
|
*/
|
|
public void setOwnableService(OwnableService ownableService)
|
|
{
|
|
this.ownableService = ownableService;
|
|
}
|
|
|
|
protected OwnableService getOwnableService()
|
|
{
|
|
if (ownableService == null)
|
|
{
|
|
ownableService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getOwnableService();
|
|
}
|
|
return ownableService;
|
|
}
|
|
|
|
/**
|
|
* @param personService The personService to set.
|
|
*/
|
|
public void setPersonService(PersonService personService)
|
|
{
|
|
this.personService = personService;
|
|
}
|
|
|
|
protected PersonService getPersonService()
|
|
{
|
|
if (personService == null)
|
|
{
|
|
personService = Repository.getServiceRegistry(FacesContext.getCurrentInstance()).getPersonService();
|
|
}
|
|
return personService;
|
|
}
|
|
|
|
/**
|
|
* @param browseBean The BrowseBean to set.
|
|
*/
|
|
public void setBrowseBean(BrowseBean browseBean)
|
|
{
|
|
this.browseBean = browseBean;
|
|
}
|
|
|
|
/**
|
|
* @return Returns the usersRichList.
|
|
*/
|
|
public UIRichList getUsersRichList()
|
|
{
|
|
return this.usersRichList;
|
|
}
|
|
|
|
/**
|
|
* @param usersRichList The usersRichList to set.
|
|
*/
|
|
public void setUsersRichList(UIRichList usersRichList)
|
|
{
|
|
this.usersRichList = usersRichList;
|
|
}
|
|
|
|
/**
|
|
* Returns the properties for current Person roles JSF DataModel
|
|
*
|
|
* @return JSF DataModel representing the current Person roles
|
|
*/
|
|
public DataModel getPersonRolesDataModel()
|
|
{
|
|
if (this.personRolesDataModel == null)
|
|
{
|
|
this.personRolesDataModel = new ListDataModel();
|
|
}
|
|
|
|
if (this.personRolesDataModel.getWrappedData() == null)
|
|
{
|
|
this.personRolesDataModel.setWrappedData(this.personRoles);
|
|
}
|
|
|
|
return this.personRolesDataModel;
|
|
}
|
|
|
|
/**
|
|
* @return Returns the current person authority.
|
|
*/
|
|
public String getPersonAuthority()
|
|
{
|
|
return this.personAuthority;
|
|
}
|
|
|
|
/**
|
|
* @param person The person person authority to set.
|
|
*/
|
|
public void setPersonAuthority(String person)
|
|
{
|
|
this.personAuthority = person;
|
|
}
|
|
|
|
/**
|
|
* @return Returns the personName.
|
|
*/
|
|
public String getPersonName()
|
|
{
|
|
return this.personName;
|
|
}
|
|
|
|
/**
|
|
* @param personName The personName to set.
|
|
*/
|
|
public void setPersonName(String personName)
|
|
{
|
|
this.personName = personName;
|
|
}
|
|
|
|
/**
|
|
* @return true if the current user can change permissions on this Space
|
|
*/
|
|
public boolean getHasChangePermissions()
|
|
{
|
|
return getNode().hasPermission(PermissionService.CHANGE_PERMISSIONS);
|
|
}
|
|
|
|
/**
|
|
* @return Returns the inherit parent permissions flag set for the current space.
|
|
*/
|
|
public boolean isInheritPermissions()
|
|
{
|
|
return this.getPermissionService().getInheritParentPermissions(getNode().getNodeRef());
|
|
}
|
|
|
|
/**
|
|
* @param inheritPermissions The inheritPermissions to set.
|
|
*/
|
|
public void setInheritPermissions(boolean inheritPermissions)
|
|
{
|
|
// stub - no impl as changes are made immediately using a ValueChanged listener
|
|
}
|
|
|
|
/**
|
|
* Return the owner username
|
|
*/
|
|
public String getOwner()
|
|
{
|
|
return this.getOwnableService().getOwner(getNode().getNodeRef());
|
|
}
|
|
|
|
/**
|
|
* @return the list of user nodes for list data binding
|
|
*/
|
|
public List<Map> getUsers()
|
|
{
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
|
|
boolean includeInherited = (this.filterMode.equals(INHERITED));
|
|
|
|
List<Map> personNodes = null;
|
|
|
|
UserTransaction tx = null;
|
|
try
|
|
{
|
|
tx = Repository.getUserTransaction(context, true);
|
|
tx.begin();
|
|
|
|
// Return all the permissions set against the current node
|
|
// for any authentication instance (user/group).
|
|
// Then combine them into a single list for each authentication found.
|
|
Map<String, List<String>> permissionMap = new HashMap<String, List<String>>(8, 1.0f);
|
|
Set<AccessPermission> permissions = getPermissionService().getAllSetPermissions(getNode().getNodeRef());
|
|
for (AccessPermission permission : permissions)
|
|
{
|
|
// we are only interested in Allow and not groups/owner etc.
|
|
if (permission.getAccessStatus() == AccessStatus.ALLOWED &&
|
|
(permission.getAuthorityType() == AuthorityType.USER ||
|
|
permission.getAuthorityType() == AuthorityType.GROUP ||
|
|
permission.getAuthorityType() == AuthorityType.GUEST ||
|
|
permission.getAuthorityType() == AuthorityType.EVERYONE))
|
|
{
|
|
if (includeInherited || permission.isSetDirectly())
|
|
{
|
|
String authority = permission.getAuthority();
|
|
|
|
List<String> userPermissions = permissionMap.get(authority);
|
|
if (userPermissions == null)
|
|
{
|
|
// create for first time
|
|
userPermissions = new ArrayList<String>(4);
|
|
permissionMap.put(authority, userPermissions);
|
|
}
|
|
// add the permission name for this authority
|
|
userPermissions.add(permission.getPermission());
|
|
}
|
|
}
|
|
}
|
|
|
|
// for each authentication (username/group key) found we get the Person
|
|
// node represented by it and use that for our list databinding object
|
|
personNodes = new ArrayList<Map>(permissionMap.size());
|
|
for (String authority : permissionMap.keySet())
|
|
{
|
|
// check if we are dealing with a person (User Authority)
|
|
if (AuthorityType.getAuthorityType(authority) == AuthorityType.GUEST ||
|
|
getPersonService().personExists(authority))
|
|
{
|
|
NodeRef nodeRef = getPersonService().getPerson(authority);
|
|
if (nodeRef != null)
|
|
{
|
|
// create our Node representation
|
|
MapNode node = new MapNode(nodeRef);
|
|
|
|
// set data binding properties
|
|
// this will also force initialisation of the props now during the UserTransaction
|
|
// it is much better for performance to do this now rather than during page bind
|
|
Map<String, Object> props = node.getProperties();
|
|
String lastName = (String)props.get("lastName");
|
|
props.put("fullName", ((String)props.get("firstName")) + ' ' + (lastName != null ? lastName : ""));
|
|
props.put("userNameLabel", props.get("userName"));
|
|
props.put("roles", roleListToString(context, permissionMap.get(authority)));
|
|
props.put("icon", WebResources.IMAGE_PERSON);
|
|
props.put("isGroup", Boolean.FALSE);
|
|
props.put("inherited", includeInherited);
|
|
|
|
personNodes.add(node);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// need a map (dummy node) to represent props for this Group Authority
|
|
Map<String, Object> node = new HashMap<String, Object>(8, 1.0f);
|
|
|
|
String groupDisplayName = getAuthorityService().getAuthorityDisplayName(authority);
|
|
if (groupDisplayName == null || groupDisplayName.length() == 0)
|
|
{
|
|
if (authority.startsWith(PermissionService.GROUP_PREFIX) == true)
|
|
{
|
|
groupDisplayName = authority.substring(PermissionService.GROUP_PREFIX.length());
|
|
}
|
|
else
|
|
{
|
|
groupDisplayName = authority;
|
|
}
|
|
}
|
|
|
|
node.put("fullName", groupDisplayName);
|
|
node.put("userNameLabel", groupDisplayName);
|
|
node.put("userName", authority);
|
|
node.put("id", authority);
|
|
node.put("roles", roleListToString(context, permissionMap.get(authority)));
|
|
node.put("icon", WebResources.IMAGE_GROUP);
|
|
node.put("isGroup", Boolean.TRUE);
|
|
node.put("inherited", includeInherited);
|
|
|
|
personNodes.add(node);
|
|
}
|
|
}
|
|
|
|
// commit the transaction
|
|
tx.commit();
|
|
}
|
|
catch (InvalidNodeRefException refErr)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
context, Repository.ERROR_NODEREF), new Object[] {refErr.getNodeRef()}) );
|
|
personNodes = Collections.<Map>emptyList();
|
|
try { if (tx != null) {tx.rollback();} } catch (Exception tex) {}
|
|
}
|
|
catch (Throwable err)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
context, Repository.ERROR_GENERIC), err.getMessage()), err );
|
|
personNodes = Collections.<Map>emptyList();
|
|
try { if (tx != null) {tx.rollback();} } catch (Exception tex) {}
|
|
}
|
|
|
|
return personNodes;
|
|
}
|
|
|
|
/**
|
|
* Convert a list of user Roles to a comma separated string list. Each individual role
|
|
* will be looked up in message bundle to convert to a human readable string value.
|
|
*
|
|
* @param context FacesContext
|
|
* @param list List of Role names
|
|
*
|
|
* @return Comma separated string of human readable roles
|
|
*/
|
|
public static String roleListToString(FacesContext context, List<String> list)
|
|
{
|
|
StringBuilder buf = new StringBuilder();
|
|
|
|
if (list != null)
|
|
{
|
|
for (int i=0; i<list.size(); i++)
|
|
{
|
|
if (buf.length() != 0)
|
|
{
|
|
buf.append(", ");
|
|
}
|
|
buf.append(Application.getMessage(context, list.get(i)));
|
|
}
|
|
}
|
|
|
|
return buf.toString();
|
|
}
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// IContextListener implementation
|
|
|
|
/**
|
|
* @see org.alfresco.web.app.context.IContextListener#contextUpdated()
|
|
*/
|
|
public void contextUpdated()
|
|
{
|
|
if (this.usersRichList != null)
|
|
{
|
|
this.usersRichList.setValue(null);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @see org.alfresco.web.app.context.IContextListener#areaChanged()
|
|
*/
|
|
public void areaChanged()
|
|
{
|
|
// nothing to do
|
|
}
|
|
|
|
/**
|
|
* @see org.alfresco.web.app.context.IContextListener#spaceChanged()
|
|
*/
|
|
public void spaceChanged()
|
|
{
|
|
// nothing to do
|
|
}
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// FilterViewSupport implementation
|
|
|
|
/**
|
|
* @see org.alfresco.web.bean.dialog.FilterViewSupport#filterModeChanged(javax.faces.event.ActionEvent)
|
|
*/
|
|
public void filterModeChanged(ActionEvent event)
|
|
{
|
|
UIModeList viewList = (UIModeList) event.getComponent();
|
|
setFilterMode(viewList.getValue().toString());
|
|
// force the list to be re-queried when the page is refreshed
|
|
if (this.usersRichList != null)
|
|
{
|
|
this.usersRichList.setValue(null);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @see org.alfresco.web.bean.dialog.FilterViewSupport#getFilterItems()
|
|
*/
|
|
public List<UIListItem> getFilterItems()
|
|
{
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
List<UIListItem> items = new ArrayList<UIListItem>(2);
|
|
|
|
UIListItem item1 = new UIListItem();
|
|
item1.setValue(INHERITED);
|
|
item1.setLabel(Application.getMessage(context, INHERITED));
|
|
items.add(item1);
|
|
|
|
UIListItem item2 = new UIListItem();
|
|
item2.setValue(LOCAL);
|
|
item2.setLabel(Application.getMessage(context, LOCAL));
|
|
items.add(item2);
|
|
|
|
return items;
|
|
}
|
|
|
|
/**
|
|
* @see org.alfresco.web.bean.dialog.FilterViewSupport#getFilterMode()
|
|
*/
|
|
public String getFilterMode()
|
|
{
|
|
return filterMode;
|
|
}
|
|
|
|
/**
|
|
* @see org.alfresco.web.bean.dialog.FilterViewSupport#setFilterMode(java.lang.String)
|
|
*/
|
|
public void setFilterMode(final String filterMode)
|
|
{
|
|
this.filterMode = filterMode;
|
|
|
|
// clear datalist cache ready to change results based on filter setting
|
|
contextUpdated();
|
|
}
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// Action event handlers
|
|
|
|
/**
|
|
* Action called to Close the dialog
|
|
*/
|
|
public String cancel()
|
|
{
|
|
UIContextService.getInstance(FacesContext.getCurrentInstance()).notifyBeans();
|
|
return super.cancel();
|
|
}
|
|
|
|
/**
|
|
* Action event called by all actions that need to setup a Person context on
|
|
* the UserMembers bean before an action page is called. The context will be a
|
|
* Authority in setPersonAuthority() which can be retrieved on the action page from
|
|
* UserMembersBean.setPersonAuthority().
|
|
*/
|
|
public void setupUserAction(ActionEvent event)
|
|
{
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
|
|
UIActionLink link = (UIActionLink) event.getComponent();
|
|
Map<String, String> params = link.getParameterMap();
|
|
String authority = params.get("userName");
|
|
if (authority != null && authority.length() != 0)
|
|
{
|
|
try
|
|
{
|
|
if (this.getPersonService().personExists(authority))
|
|
{
|
|
// create the node ref, then our node representation
|
|
NodeRef ref = getPersonService().getPerson(authority);
|
|
Node node = new Node(ref);
|
|
|
|
// setup convience function for current user full name
|
|
setPersonName((String)node.getProperties().get(ContentModel.PROP_FIRSTNAME) + ' ' +
|
|
(String)node.getProperties().get(ContentModel.PROP_LASTNAME));
|
|
}
|
|
else
|
|
{
|
|
String label = params.get("userNameLabel");
|
|
if (label == null || label.length() == 0)
|
|
{
|
|
label = authority;
|
|
}
|
|
|
|
setPersonName(label);
|
|
}
|
|
|
|
// setup roles for this Authority
|
|
List<PermissionWrapper> userPermissions = new ArrayList<PermissionWrapper>(4);
|
|
Set<AccessPermission> permissions = getPermissionService().getAllSetPermissions(getNode().getNodeRef());
|
|
if (permissions != null)
|
|
{
|
|
for (AccessPermission permission : permissions)
|
|
{
|
|
// we are only interested in Allow permissions
|
|
if (permission.getAccessStatus() == AccessStatus.ALLOWED)
|
|
{
|
|
if (authority.equals(permission.getAuthority()))
|
|
{
|
|
// found a permission for this user authentiaction
|
|
PermissionWrapper wrapper = new PermissionWrapper(
|
|
permission.getPermission(),
|
|
Application.getMessage(context, permission.getPermission()));
|
|
userPermissions.add(wrapper);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
// action context setup
|
|
this.personRolesDataModel = null;
|
|
this.personRoles = userPermissions;
|
|
setPersonAuthority(authority);
|
|
}
|
|
catch (Exception err)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(FacesContext
|
|
.getCurrentInstance(), Repository.ERROR_GENERIC), new Object[] { err.getMessage() }));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
setPersonAuthority(null);
|
|
}
|
|
|
|
// force refresh on return to this page
|
|
contextUpdated();
|
|
}
|
|
|
|
/**
|
|
* Inherit parent Space permissions value changed by the user
|
|
*/
|
|
public void inheritPermissionsValueChanged(ValueChangeEvent event)
|
|
{
|
|
try
|
|
{
|
|
// change the value to the new selected value
|
|
boolean inheritPermissions = (Boolean)event.getNewValue();
|
|
this.getPermissionService().setInheritParentPermissions(getNode().getNodeRef(), inheritPermissions);
|
|
|
|
// inform the user that the change occured
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
String msg;
|
|
if (inheritPermissions)
|
|
{
|
|
msg = Application.getMessage(context, MSG_SUCCESS_INHERIT);
|
|
}
|
|
else
|
|
{
|
|
msg = Application.getMessage(context, MSG_SUCCESS_INHERIT_NOT);
|
|
}
|
|
|
|
// see if the user still has permissions to the node, if not, we need
|
|
// to go back to the root of the current "area" by simulating the user
|
|
// pressing the top level navigation button i.e. My Home
|
|
if (this.getPermissionService().hasPermission(getNode().getNodeRef(),
|
|
PermissionService.CHANGE_PERMISSIONS) == AccessStatus.ALLOWED)
|
|
{
|
|
FacesMessage facesMsg = new FacesMessage(FacesMessage.SEVERITY_INFO, msg, msg);
|
|
context.addMessage(event.getComponent().getClientId(context), facesMsg);
|
|
}
|
|
else
|
|
{
|
|
NavigationBean nb = (NavigationBean)FacesHelper.getManagedBean(
|
|
context, NavigationBean.BEAN_NAME);
|
|
if (nb != null)
|
|
{
|
|
try
|
|
{
|
|
nb.processToolbarLocation(nb.getToolbarLocation(), true);
|
|
}
|
|
catch (InvalidNodeRefException refErr)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
FacesContext.getCurrentInstance(), Repository.ERROR_NOHOME),
|
|
Application.getCurrentUser(context).getHomeSpaceId()), refErr );
|
|
}
|
|
catch (Exception err)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
FacesContext.getCurrentInstance(), Repository.ERROR_GENERIC),
|
|
err.getMessage()), err);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
catch (Throwable e)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
FacesContext.getCurrentInstance(), Repository.ERROR_GENERIC), e.getMessage()), e);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Action handler called when the Add Role button is pressed to process the current selection
|
|
*/
|
|
public void addRole(ActionEvent event)
|
|
{
|
|
UISelectOne rolePicker = (UISelectOne)event.getComponent().findComponent("roles");
|
|
|
|
String role = (String)rolePicker.getValue();
|
|
if (role != null)
|
|
{
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
PermissionWrapper wrapper = new PermissionWrapper(role, Application.getMessage(context, role));
|
|
this.personRoles.add(wrapper);
|
|
}
|
|
|
|
// force refresh on return to this page
|
|
contextUpdated();
|
|
}
|
|
|
|
/**
|
|
* Action handler called when the Remove button is pressed to remove a role from current user
|
|
*/
|
|
public void removeRole(ActionEvent event)
|
|
{
|
|
PermissionWrapper wrapper = (PermissionWrapper)getPersonRolesDataModel().getRowData();
|
|
if (wrapper != null)
|
|
{
|
|
this.personRoles.remove(wrapper);
|
|
}
|
|
|
|
// force refresh on return to this page
|
|
contextUpdated();
|
|
}
|
|
|
|
/**
|
|
* Action handler called when the Finish button is clicked on the Edit User Roles page
|
|
*/
|
|
public String finishOK()
|
|
{
|
|
String outcome = OUTCOME_FINISH;
|
|
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
|
|
// persist new user permissions
|
|
if (this.personRoles != null && getPersonAuthority() != null)
|
|
{
|
|
UserTransaction tx = null;
|
|
try
|
|
{
|
|
tx = Repository.getUserTransaction(context);
|
|
tx.begin();
|
|
|
|
// clear the currently set permissions for this user
|
|
// and add each of the new permissions in turn
|
|
final NodeRef nodeRef = getNode().getNodeRef();
|
|
if (this.getPermissionService().hasPermission(nodeRef, PermissionService.CHANGE_PERMISSIONS) == AccessStatus.ALLOWED)
|
|
{
|
|
AuthenticationUtil.runAs(new AuthenticationUtil.RunAsWork<Object>() {
|
|
public Object doWork() throws Exception
|
|
{
|
|
getPermissionService().clearPermission(nodeRef, getPersonAuthority());
|
|
for (PermissionWrapper wrapper : personRoles)
|
|
{
|
|
getPermissionService().setPermission(
|
|
nodeRef,
|
|
getPersonAuthority(),
|
|
wrapper.getPermission(),
|
|
true);
|
|
}
|
|
return null;
|
|
}
|
|
|
|
}, AuthenticationUtil.getSystemUserName());
|
|
}
|
|
|
|
tx.commit();
|
|
}
|
|
catch (Exception err)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
context, Repository.ERROR_GENERIC), err.getMessage()), err );
|
|
try { if (tx != null) {tx.rollback();} } catch (Exception tex) {}
|
|
|
|
outcome = null;
|
|
}
|
|
}
|
|
|
|
return outcome;
|
|
}
|
|
|
|
/**
|
|
* Action handler called when the OK button is clicked on the Remove User page
|
|
*/
|
|
public String removeOK()
|
|
{
|
|
String outcome = getDefaultFinishOutcome();
|
|
UserTransaction tx = null;
|
|
FacesContext context = FacesContext.getCurrentInstance();
|
|
|
|
try
|
|
{
|
|
tx = Repository.getUserTransaction(context);
|
|
tx.begin();
|
|
|
|
// remove the invited User
|
|
if (getPersonAuthority() != null)
|
|
{
|
|
// clear permissions for the specified Authority
|
|
this.getPermissionService().clearPermission(getNode().getNodeRef(), getPersonAuthority());
|
|
}
|
|
|
|
// commit the transaction
|
|
tx.commit();
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
// rollback the transaction
|
|
try { if (tx != null) {tx.rollback();} } catch (Exception tex) {}
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(FacesContext
|
|
.getCurrentInstance(), ERROR_DELETE), e.getMessage()), e);
|
|
}
|
|
|
|
// see if the user still has permissions to the node, if not, we need
|
|
// to go back to the root of the current "area" by simulating the user
|
|
// pressing the top level navigation button i.e. My Home
|
|
if (this.getPermissionService().hasPermission(getNode().getNodeRef(),
|
|
PermissionService.CHANGE_PERMISSIONS) == AccessStatus.DENIED)
|
|
{
|
|
NavigationBean nb = (NavigationBean)FacesHelper.getManagedBean(
|
|
context, NavigationBean.BEAN_NAME);
|
|
if (nb != null)
|
|
{
|
|
try
|
|
{
|
|
nb.processToolbarLocation(nb.getToolbarLocation(), true);
|
|
outcome = "browse";
|
|
}
|
|
catch (InvalidNodeRefException refErr)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
FacesContext.getCurrentInstance(), Repository.ERROR_NOHOME),
|
|
Application.getCurrentUser(context).getHomeSpaceId()), refErr );
|
|
}
|
|
catch (Exception err)
|
|
{
|
|
Utils.addErrorMessage(MessageFormat.format(Application.getMessage(
|
|
FacesContext.getCurrentInstance(), Repository.ERROR_GENERIC),
|
|
err.getMessage()), err);
|
|
}
|
|
}
|
|
}
|
|
|
|
return outcome;
|
|
}
|
|
|
|
|
|
// ------------------------------------------------------------------------------
|
|
// Inner classes
|
|
|
|
/**
|
|
* Wrapper class for list data model to display current roles for user
|
|
*/
|
|
public static class PermissionWrapper implements Serializable
|
|
{
|
|
private static final long serialVersionUID = 953727068432918977L;
|
|
|
|
public PermissionWrapper(String permission, String label)
|
|
{
|
|
this.permission = permission;
|
|
this.label = label;
|
|
}
|
|
|
|
public String getRole()
|
|
{
|
|
return this.label;
|
|
}
|
|
|
|
public String getPermission()
|
|
{
|
|
return this.permission;
|
|
}
|
|
|
|
private String label;
|
|
private String permission;
|
|
}
|
|
|
|
}
|