mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-31 17:39:05 +00:00
99377: BENCH-369: BM-0004: API and internals for Alfresco server - Move commons Math3 to 'core' project for general reuse - Clone NormalDistributionHelper class from Benchmark projects to Alfresco 'core' - API added: http://localhost:8080/alfresco/s/api/model/filefolder/load JSON: { "folderPath":"/Sites/t2/documentLibrary", "fileCount":"1", "minFileSize":"1024", "maxFileSize":"2048", "maxUniqueDocuments":"10000" } - Above JSON will create 1 file in the 't2' site document library with spoofed plain text - Change away from deprecated API for TransactionListenerAdapter - Fix imports and neatness - Improve FileNotFoundException details - Disable timestamp propagation on the parent folder to reduce CPU overhead - Document changes relating to the addition of cm:description properties - Add options to control generation of MLText cm:description fields - descriptionCount: number of cm:description translations to include - descriptionSize: size in bytes of each cm:description translation - Use released 'alfresco-text-gen' V1.1 - Use fixed text-gen component to prevent ArrayIndexOutOfBOunds - Tighten up error message when errors occur on reading content strings - Fix random seed generation bug git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@99503 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
516 lines
20 KiB
Java
516 lines
20 KiB
Java
/*
|
|
* Copyright (C) 2005-2015 Alfresco Software Limited.
|
|
*
|
|
* This file is part of Alfresco
|
|
*
|
|
* Alfresco is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Alfresco is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
package org.alfresco.repo.model.filefolder;
|
|
|
|
import java.util.List;
|
|
import java.util.Locale;
|
|
|
|
import junit.framework.TestCase;
|
|
import net.sf.acegisecurity.AuthenticationCredentialsNotFoundException;
|
|
|
|
import org.alfresco.error.AlfrescoRuntimeException;
|
|
import org.alfresco.model.ContentModel;
|
|
import org.alfresco.repo.content.MimetypeMap;
|
|
import org.alfresco.repo.node.MLPropertyInterceptor;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
|
|
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
|
import org.alfresco.repo.transaction.RetryingTransactionHelper.RetryingTransactionCallback;
|
|
import org.alfresco.service.cmr.model.FileFolderService;
|
|
import org.alfresco.service.cmr.model.FileInfo;
|
|
import org.alfresco.service.cmr.model.FileNotFoundException;
|
|
import org.alfresco.service.cmr.repository.ChildAssociationRef;
|
|
import org.alfresco.service.cmr.repository.ContentReader;
|
|
import org.alfresco.service.cmr.repository.MLText;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.transaction.TransactionService;
|
|
import org.alfresco.test_category.OwnJVMTestsCategory;
|
|
import org.alfresco.util.ApplicationContextHelper;
|
|
import org.junit.Test;
|
|
import org.junit.experimental.categories.Category;
|
|
import org.springframework.context.ApplicationContext;
|
|
|
|
import static org.junit.Assert.assertNotEquals;
|
|
|
|
/**
|
|
* @see org.alfresco.repo.model.filefolder.FileFolderLoader
|
|
* @author Derek Hulley
|
|
* @since 5.1
|
|
*/
|
|
@Category(OwnJVMTestsCategory.class)
|
|
public class FileFolderLoaderTest extends TestCase
|
|
{
|
|
private static final ApplicationContext ctx = ApplicationContextHelper.getApplicationContext();
|
|
|
|
private FileFolderLoader fileFolderLoader;
|
|
private FileFolderService fileFolderService;
|
|
private PermissionService permissionService;
|
|
private TransactionService transactionService;
|
|
private NodeService nodeService;
|
|
private String sharedHomePath;
|
|
private NodeRef hiddenFolderNodeRef;
|
|
private String hiddenFolderPath;
|
|
private NodeRef readOnlyFolderNodeRef;
|
|
private String readOnlyFolderPath;
|
|
private NodeRef writeFolderNodeRef;
|
|
private String writeFolderPath;
|
|
|
|
@Override
|
|
public void setUp() throws Exception
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
|
|
RunAsWork<Void> setUpWork = new RunAsWork<Void>()
|
|
{
|
|
@Override
|
|
public Void doWork() throws Exception
|
|
{
|
|
fileFolderLoader = (FileFolderLoader) ctx.getBean("FileFolderLoader");
|
|
fileFolderService = (FileFolderService) ctx.getBean("FileFolderService");
|
|
permissionService = (PermissionService) ctx.getBean("PermissionService");
|
|
transactionService = (TransactionService) ctx.getBean("TransactionService");
|
|
nodeService = (NodeService) ctx.getBean("nodeService");
|
|
NodeRef companyHomeNodeRef = fileFolderLoader.getRepository().getCompanyHome();
|
|
NodeRef sharedHomeNodeRef = fileFolderLoader.getRepository().getSharedHome();
|
|
List<FileInfo> sharedHomeFileInfos = fileFolderService.getNamePath(companyHomeNodeRef, sharedHomeNodeRef);
|
|
sharedHomePath = "/" + sharedHomeFileInfos.get(0).getName();
|
|
|
|
// Create a folder that will be invisible to all normal users
|
|
FileInfo hiddenFolderInfo = fileFolderService.create(sharedHomeNodeRef, "HideThis", ContentModel.TYPE_FOLDER);
|
|
hiddenFolderNodeRef = hiddenFolderInfo.getNodeRef();
|
|
hiddenFolderPath = sharedHomePath + "/HideThis";
|
|
permissionService.setInheritParentPermissions(hiddenFolderNodeRef, false);
|
|
|
|
// Create a folder that will be read-only
|
|
FileInfo readOnlyFolderInfo = fileFolderService.create(sharedHomeNodeRef, "ReadOnlyThis", ContentModel.TYPE_FOLDER);
|
|
readOnlyFolderNodeRef = readOnlyFolderInfo.getNodeRef();
|
|
readOnlyFolderPath = sharedHomePath + "/ReadOnlyThis";
|
|
permissionService.setInheritParentPermissions(readOnlyFolderNodeRef, false);
|
|
permissionService.setPermission(readOnlyFolderNodeRef, PermissionService.ALL_AUTHORITIES, PermissionService.READ, true);
|
|
|
|
// Create a folder to write to
|
|
FileInfo writeFolderInfo = fileFolderService.create(sharedHomeNodeRef, "WriteThis", ContentModel.TYPE_FOLDER);
|
|
writeFolderNodeRef = writeFolderInfo.getNodeRef();
|
|
writeFolderPath = sharedHomePath + "/WriteThis";
|
|
|
|
// Done
|
|
return null;
|
|
}
|
|
};
|
|
AuthenticationUtil.runAsSystem(setUpWork);
|
|
}
|
|
|
|
@Override
|
|
public void tearDown() throws Exception
|
|
{
|
|
RunAsWork<Void> setUpWork = new RunAsWork<Void>()
|
|
{
|
|
@Override
|
|
public Void doWork() throws Exception
|
|
{
|
|
fileFolderService.delete(hiddenFolderNodeRef);
|
|
fileFolderService.delete(readOnlyFolderNodeRef);
|
|
fileFolderService.delete(writeFolderNodeRef);
|
|
// Done
|
|
return null;
|
|
}
|
|
};
|
|
AuthenticationUtil.runAsSystem(setUpWork);
|
|
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
|
|
@Test
|
|
public void testBasic()
|
|
{
|
|
assertNotNull(fileFolderLoader);
|
|
assertNotNull(sharedHomePath);
|
|
}
|
|
|
|
@Test
|
|
public void testIllegalArgs_MinMax() throws Exception
|
|
{
|
|
try
|
|
{
|
|
fileFolderLoader.createFiles(
|
|
sharedHomePath,
|
|
1, 256, 100L, 10L, Long.MAX_VALUE, false,
|
|
10, 256);
|
|
fail("Should detect min/max size issue.");
|
|
}
|
|
catch (IllegalArgumentException e)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIllegalArgs_DescriptionCount() throws Exception
|
|
{
|
|
try
|
|
{
|
|
fileFolderLoader.createFiles(
|
|
sharedHomePath,
|
|
1, 256, 1024L, 10L, Long.MAX_VALUE, false,
|
|
Integer.MAX_VALUE, 256);
|
|
fail("Should detect description count issue.");
|
|
}
|
|
catch (IllegalArgumentException e)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIllegalArgs_DescriptionSize() throws Exception
|
|
{
|
|
try
|
|
{
|
|
fileFolderLoader.createFiles(
|
|
sharedHomePath,
|
|
1, 256, 1024L, 10L, Long.MAX_VALUE, false,
|
|
10, Long.MAX_VALUE);
|
|
fail("Should detect description size issue.");
|
|
}
|
|
catch (IllegalArgumentException e)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testNoPermissionsAtAll() throws Exception
|
|
{
|
|
try
|
|
{
|
|
fileFolderLoader.createFiles(
|
|
sharedHomePath,
|
|
0, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
fail("No permissions to see folder.");
|
|
}
|
|
catch (AuthenticationCredentialsNotFoundException e)
|
|
{
|
|
// Expected
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testNoPermissionsToFindFolder() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setFullyAuthenticatedUser("BOB-1");
|
|
fileFolderLoader.createFiles(
|
|
hiddenFolderPath,
|
|
0, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
fail("No permissions to see folder.");
|
|
}
|
|
catch (AccessDeniedException e)
|
|
{
|
|
// Expected
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testFolderMissing() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
fileFolderLoader.createFiles(
|
|
sharedHomePath + "/Missing",
|
|
0, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
fail("Folder does not exist");
|
|
}
|
|
catch (AlfrescoRuntimeException e)
|
|
{
|
|
// Expected
|
|
assertTrue(e.getCause() instanceof FileNotFoundException);
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testNoPermissionsToWriteToFolder() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setFullyAuthenticatedUser("BOB-1");
|
|
fileFolderLoader.createFiles(
|
|
readOnlyFolderPath,
|
|
1, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
fail("Folder is read only. Should not be able to write to it.");
|
|
}
|
|
catch (AccessDeniedException e)
|
|
{
|
|
// Expected
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Zero files
|
|
*/
|
|
@Test
|
|
public void testLoad_ZeroFiles() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
int created = fileFolderLoader.createFiles(
|
|
writeFolderPath,
|
|
0, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
assertEquals("Incorrect number of files generated.", 0, created);
|
|
// Count
|
|
assertEquals(0, nodeService.countChildAssocs(writeFolderNodeRef, true));
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* One file
|
|
*/
|
|
@Test
|
|
public void testLoad_OneFile() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
int created = fileFolderLoader.createFiles(
|
|
writeFolderPath,
|
|
1, 256, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
assertEquals("Incorrect number of files generated.", 1, created);
|
|
// Check the descriptions
|
|
RetryingTransactionCallback<Void> checkCallback = new RetryingTransactionCallback<Void>()
|
|
{
|
|
@Override
|
|
public Void execute() throws Throwable
|
|
{
|
|
MLPropertyInterceptor.setMLAware(true);
|
|
List<ChildAssociationRef> childAssocs = nodeService.getChildAssocs(writeFolderNodeRef);
|
|
// Count
|
|
assertEquals(1, childAssocs.size());
|
|
NodeRef fileNodeRef = childAssocs.get(0).getChildRef();
|
|
MLText descriptions = (MLText) nodeService.getProperty(fileNodeRef, ContentModel.PROP_DESCRIPTION);
|
|
assertNotNull("No descriptions added", descriptions);
|
|
assertEquals("Incorrect number of unique descriptions added: ", 10, descriptions.size());
|
|
assertTrue("Expect the default language to be present. ",
|
|
descriptions.containsKey(new Locale(Locale.getDefault().getLanguage())));
|
|
return null;
|
|
}
|
|
};
|
|
transactionService.getRetryingTransactionHelper().doInTransaction(checkCallback, true);
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* 100 files; 10 per txn
|
|
*/
|
|
@Test
|
|
public void testLoad_02() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
int created = fileFolderLoader.createFiles(
|
|
writeFolderPath,
|
|
100, 10, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
assertEquals("Incorrect number of files generated.", 100, created);
|
|
// Count
|
|
assertEquals(100, nodeService.countChildAssocs(writeFolderNodeRef, true));
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* 15 files; 10 per txn; spoofed; different
|
|
*/
|
|
@Test
|
|
public void testLoad_03() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
int created = fileFolderLoader.createFiles(
|
|
writeFolderPath,
|
|
15, 10, 1024L, 1024L, Long.MAX_VALUE, false,
|
|
10, 256L);
|
|
assertEquals("Incorrect number of files generated.", 15, created);
|
|
// Count
|
|
assertEquals(15, nodeService.countChildAssocs(writeFolderNodeRef, true));
|
|
// Check the files
|
|
List<FileInfo> fileInfos = fileFolderService.listFiles(writeFolderNodeRef);
|
|
String lastText = null;
|
|
String lastDescr = null;
|
|
String lastUrl = null;
|
|
for (FileInfo fileInfo : fileInfos)
|
|
{
|
|
NodeRef fileNodeRef = fileInfo.getNodeRef();
|
|
// The URLs must all be unique as we wrote the physical binaries
|
|
ContentReader reader = fileFolderService.getReader(fileNodeRef);
|
|
assertEquals("UTF-8", reader.getEncoding());
|
|
assertEquals(MimetypeMap.MIMETYPE_TEXT_PLAIN, reader.getMimetype());
|
|
assertEquals(1024L, reader.getSize());
|
|
if (lastUrl == null)
|
|
{
|
|
lastUrl = reader.getContentUrl();
|
|
}
|
|
else
|
|
{
|
|
assertNotEquals("We expect different URLs: ", lastUrl, reader.getContentUrl());
|
|
lastUrl = reader.getContentUrl();
|
|
}
|
|
// Check content
|
|
if (lastText == null)
|
|
{
|
|
lastText = reader.getContentString();
|
|
}
|
|
else
|
|
{
|
|
String currentStr = reader.getContentString();
|
|
assertNotEquals("All text must differ due to varying seed. ", lastText, currentStr);
|
|
lastText = currentStr;
|
|
}
|
|
// Check description
|
|
if (lastDescr == null)
|
|
{
|
|
lastDescr = (String) nodeService.getProperty(fileNodeRef, ContentModel.PROP_DESCRIPTION);
|
|
assertEquals("cm:description length is incorrect. ", 256, lastDescr.getBytes().length);
|
|
}
|
|
else
|
|
{
|
|
String currentDescr = (String) nodeService.getProperty(fileNodeRef, ContentModel.PROP_DESCRIPTION);
|
|
assertNotEquals("All descriptions must differ due to varying seed. ", lastDescr, currentDescr);
|
|
lastDescr = currentDescr;
|
|
}
|
|
}
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* 10 files; 10 per txn; force storage; identical
|
|
*/
|
|
@Test
|
|
public void testLoad_04() throws Exception
|
|
{
|
|
try
|
|
{
|
|
AuthenticationUtil.pushAuthentication();
|
|
AuthenticationUtil.setAdminUserAsFullyAuthenticatedUser();
|
|
int created = fileFolderLoader.createFiles(
|
|
writeFolderPath,
|
|
10, 10, 1024L, 1024L, 1L, true,
|
|
10, 256L);
|
|
assertEquals("Incorrect number of files generated.", 10, created);
|
|
// Count
|
|
assertEquals(10, nodeService.countChildAssocs(writeFolderNodeRef, true));
|
|
// Check the files
|
|
List<FileInfo> fileInfos = fileFolderService.listFiles(writeFolderNodeRef);
|
|
String lastText = null;
|
|
String lastDescr = null;
|
|
String lastUrl = null;
|
|
for (FileInfo fileInfo : fileInfos)
|
|
{
|
|
NodeRef fileNodeRef = fileInfo.getNodeRef();
|
|
// The URLs must all be unique as we wrote the physical binaries
|
|
ContentReader reader = fileFolderService.getReader(fileNodeRef);
|
|
assertEquals("UTF-8", reader.getEncoding());
|
|
assertEquals(MimetypeMap.MIMETYPE_TEXT_PLAIN, reader.getMimetype());
|
|
assertEquals(1024L, reader.getSize());
|
|
if (lastUrl == null)
|
|
{
|
|
lastUrl = reader.getContentUrl();
|
|
}
|
|
else
|
|
{
|
|
assertNotEquals("We expect unique URLs: ", lastUrl, reader.getContentUrl());
|
|
lastUrl = reader.getContentUrl();
|
|
}
|
|
// Check content
|
|
if (lastText == null)
|
|
{
|
|
lastText = reader.getContentString();
|
|
}
|
|
else
|
|
{
|
|
String currentStr = reader.getContentString();
|
|
assertEquals("All text must be identical due to same seed. ", lastText, currentStr);
|
|
lastText = currentStr;
|
|
}
|
|
// Check description
|
|
if (lastDescr == null)
|
|
{
|
|
lastDescr = (String) nodeService.getProperty(fileNodeRef, ContentModel.PROP_DESCRIPTION);
|
|
assertEquals("cm:description length is incorrect. ", 256, lastDescr.getBytes().length);
|
|
}
|
|
else
|
|
{
|
|
String currentDescr = (String) nodeService.getProperty(fileNodeRef, ContentModel.PROP_DESCRIPTION);
|
|
assertEquals("All descriptions must be identical due to varying seed. ", lastDescr, currentDescr);
|
|
lastDescr = currentDescr;
|
|
}
|
|
}
|
|
}
|
|
finally
|
|
{
|
|
AuthenticationUtil.popAuthentication();
|
|
}
|
|
}
|
|
}
|