mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-06-30 18:15:39 +00:00
24662: 3.4.1 bug fix branch 24718: Merged V3.3 to V3.4-BUG-FIX 24717: Fix ALF-5555: It is impossible to edit review date from record's details page 24719: Fix for ALF-6106: Error on Check In operation with % symbol (SPP) 24733: Better fix for ALF-6106: Error on Check In operation with % symbol 24734: Fix for ALF-6089: Incorrect order of fields at 'Create Series', 'Create Category' and 'Create Folder' forms The name, title and description fields are now placed in their own group on the server, all other non custom rm fields are put in an 'other' group, the client side config then declares a set for each group and orders them appropriately. 24752: Merged V3.4 to V3.4-BUG-FIX 24751: Merged V3.3-BUG-FIX to V3.4 (RECORD ONLY) Restored V3.3-BUG-FIX mergeinfo, somehow truncated in revision 24274 24753: Merged V3.3-BUG-FIX to V3.4-BUG-FIX 23870: Merge Dev to V3.3_BUG_FIX ALF-4243: F5 load-balancer sending regular HTTP requests to Alfresco server causing Faces Servlet to throw java.lang.NullPointerException (MyFaces upgrade to from 1.1.5 to 1.1.7) 23897: Additional fixes and tweaks since introduction of MyFaces 1.1.7 library. 23919: More JSF component id related fixes. 23945: More MyFaces1.1.7 JSF page fix ups 23959: Another MyFaces 1.1.7 dup id issue fixed. 24008: ALF-4243 - Upgraded MyFaces from 1.1.7 to 1.1.8 to fix a bug seen in 1.1.7 - Added handling for the fact that valuebound properties that result in null now cause an exception where-as they were perfectly valid in 1.1.5. 24419: Merge from V3.3 to V3.3-BUG-FIX r.24418 Fix for ALF-6075. Running out of /tmp space on the server is causing uploads to fail. 24768: Fixes ALF-6295: Allows MySQL to not be installed via unattended installer invocation 24771: Merged BRANCHES/V3.4 to BRANCHES/DEV/V3.4-BUG-FIX: 24767: Merged BRANCHES/V3.3 to BRANCHES/V3.4: 24765: ALF-6547: fix intermittent test failure (AssetServiceImplTest renameFile/renameFolder) - fallout from ALF-1948 24779: Merge V3.3 to V3.4-BUG-FIX 24497 : ALF-3092 - deployment service - catch Throwable from Begin. 24684 : Merge DEV/BELARUS/V3.3-BUG-FIX-2010_10_04 to V3.3 23498 : ALF-5498 In Windows XP, placing a Folder with a Name that already Exists Removes all Content of the Existing Folder 24749 : ALF-6174 - Transfer Service fails with double peer assoc custom content type 24766 : ALF-5603 - It is impossible to assign workflow from workflow console to non-admin user 24802: Merged BRANCHES/V3.4 to BRANCHES/DEV/V3.4-BUG-FIX: 24801: Fix for ALF-3055: "SecurityTestSuite hangs when run in DOD5015 context - failed authentication audit hangs on DB connection" - do failed audits in a separate thread (from a thread pool) 24812: Fix ALF-6316: A new "spoof" multivalue text property (cm:tagScopeSummary) is now made available for TagScope nodes when accessed via the getProperty or getProperties operations on the standard node service. The values of this property take the form "<tagname>=<tagcount>". A new interceptor has been added to the node service to do this (TagScopePropertyMethodInterceptor). WQS has been tweaked to make use of this new property, and the now defunct behaviour has been removed. 24820: Work in progress refactoring transaction handling of transfer unit tests. 24822: Merged BRANCHES/V3.4 to BRANCHES/DEV/V3.4-BUG-FIX: 24821: Fix for ALF-3055: "SecurityTestSuite hangs when run in DOD5015 context - failed authentication audit hangs on DB connection" - fix up unit tests 24834: ALF-6468 - Update the scheduled actions folder bootstrap to use localisable names and descriptions, following the normal pattern 24836: Added system property 'system.cache.disableImmutableSharedCaches' (false by default) - Equivalent to disabling Hibernate L2 cache for *immutable* entities - Allows distinction between mutable and immutable cache entries 24850: Fix ALF-6562: Moved property that is used to label the WQS dashlet on the "configure site dashboard" page out of the Slingshot project and into the WQS Share Module project. Corrected its value to "Web Quick Start" rather than "WCM Quick Start". 24857: Merged V3.4 to V3.4-BUG-FIX 24853: Merged V3.3 to V3.4 24852: Fixed ALF-6573 "Incorrect name of subgroups on "Groups" page" 24870: Removed svn:mergeinfo from root 24873: Merged V3.3 to V3.4-BUG-FIX (RECORD ONLY) 21789: ALF-4333: Fix - Updated RepoPrimaryManifestProcessorImpl so it can handle deletions that are reported by either pre-delete noderef or archived noderef (previously only handled the latter). - Updated TransferManifestNodeFactory so that it handles the case where the status of the node to transfer is "deleted". - Updated UnitTestTransferManifestNodeFactory so that it handles the change to TransferManifestNodeFactory above. - Added new tests for deletion cases. 23259: Merged HEAD to V3.3 23256: Fix ALF-4573: Start Workflow action is absent for edited document and working copy in Share 23346: Brought WebQS module in (including build process but not installer elements yet) 23371: "Simply" added wcmqs to installer 23391: ALF-5367: Copy dlls into tomcat/bin as appropriate. 23485: Merged V3.4 to V3.3 (fix backported for V3.3.x lines) 23472: Fixed ALF-5408: SQL Server missing ON DELETE CASCADE declarations 23515: Merged PATCHES/V3.2.0 to V3.3 23514: ALF-5554: Merged HEAD to V3.2.0 23153: When updating tag scopes following system shutdown/restore, be smarter about quickly skipping tag scopes that another (new) thread is currently working on 23283: More debugging level logging for tagging updates, to help identify the problem with periodic multi-threaded test failures on bamboo 23535: Merged V3.4 to V3.3 (complements 23517: ALF-5552) 23508: Fixed ALF-5559: Permission interceptors can fail if Lucene returns invalid NodeRefs 23564: ALF-5600: Merged V3.4 to V3.3 23424: Fixes: ALF-2989 - Incorrect sideId reference in URL for event in Site Calendar Dashlet Adds support for displaying events that start in the past but finish in the future (previously only events that start in the future were shown) 23586: MERGED V3.4 to V3.3 22864: Fix for ALF-5005: "Create and edit functions on AWE become "confused"" 23042: Fix ALF-5127: Impossible to create an article/blog (WCMQS) [Must clear panel hideEvent handler if manually hiding a YUI panel] 23561: Fixes: ALF-4569 - Removes universal override of input width box and switches the editor form panel to adjust it's width based on content rather than window size. Fixes: ALF-4570 - Adds an override for the CSS 'top' property of the form dialogue to ensure it's always below the ribbon. (Was being set automatically by the YUI widget.panel call) 23569: Fixes: ALF-5606 - Ribbon wasn't resizing correctly after the form events. 23630: Backport of installer 23631: Added 64-bit & deployment installers 23664: Fixes ALF-5691: TransferService: Multi-byte characters are not encoded correctly 23681: Fixes ALF-5699: TransferService: Snapshot file from source repo never contains complete MLText properties 23695: Fixed bug exposed after fixing ALF-5699. Parsing of MLText properties out of the transfer snapshot file was incorrect, and that was causing multi-lingual property values to be duplicated 23709: ALF-5699: Fix NPE in ManifestIntegrationTest 23734: Merged V3.4 to V3.3 23731: Fixes for ALF-3098 and ALF-3097 - Share - Security check on Personal Dashboard - only the owning user can view a user dashboard page - Share - Security issue on Customize Site Dashboard - private and moderated site dashboard pages no longer visible to non-members, customise site and dashboard pages only accessible to SiteManager 23747: ALF-5696: Merged V3.4 to V3.3 23585: Fixed ALF-5372 "JavaScript error on Groups management dialog with IE8 : document.getElementById is null" 23790: Fixed ALF-3823 "Share: RSS feed can't be read: http://cds-srv.sun.com:8700/rss/update/public/sunalert_update.xml - ok with other RSS client." 23883: Fixes ALF-5759: WQS: Attempt to copy a website section fails 23907: Merged DEV/BELARUS/V3.3-BUG-FIX-2010_09_20 to V33 22750: ALF-4846: Update rules are firing on inbound actions 23931: Undid rev 23907 (Reverse-merged /alfresco/BRANCHES/DEV/BELARUS/V3.3-BUG-FIX-2010_09_20:r22750) 23961: Fixed ALF-5686 "Incorrect behaviour of "All" filter in "My Tasks" dashlet" - Variables assigned in a <#macro> shall always be assigned using <#local> (using <#assign> makes them globally available which might cause naming collisions) 24132: Disable intermittent failing unit test 24148: ALF-6007: Merged HEAD to V3.3 23049: Fixed ALF-5099: Error when trying to go back in Create Web Content Wizard (only with certain XSDs) 24263: Merged from V3.3-BUG-FIX to V3.3 24264: V3.3-BUG-FIX to V3.3 24262: Stress test code for ALF-5025: Support background processing of archiving 24287: Added missing import 24336: Merged V3.4 to V3.3 23205: Fix for ALF-2111 - Download URLS are different on different pages, authentication fails when URL sent 24353: Merged V3.4 to V3.3 24352: Fix SQL fallout from ALF-6078 24510: Merged V3.4 to V3.3 21960: First round of date refactoring: Document Library pages now expect XML dates (ISO8601) from Share data webscripts 21961: Share client-side I18N utility now emulates sever-side handling of doubled-up single quotes. 24526: Merged V3.4 to V3.3 24402: Fix for performance degredation related to ALF-3823. RSS feed processing in JavaScript relies on Rhino impl of regex - this is extreemly slow as Rhino regex is by far the slowest component of the library. Switched code to use the Java Regex libraries to improve performance and reduce memory usage. 24587: Merged V3.4 to V3.3 24564: Fix for ALF-3727: Custom permissions aren't visible in Explorer UI 24604: Merged V3.4 to V3.3 24602: Build fix for RM permission model loading - collateral damage for R 24564 24774: Merged BRANCHES/V3.4 to BRANCHES/V3.3: 23492: Fixed ALF-5550: DB2: Unable to insert values into alf_string_value 24813: Merged BRANCHES/V3.4 to BRANCHES/V3.3: 24750: Limit installer builds to 2 threads 24874: Merged V3.4 to V3.4-BUG-FIX 24667: Resolve ALF-6202 - MT: fix offline edit (Share) 24672: Fixes from Gloria for: ALF-6339 and ALF-6337 24673: Merge V3.3 to V3.4 24668 : Upgrade of large repository to latest 3.3 fails on excession of mysql table lock size 24674: Fixes ALF-6294: Remove illegal CLI option 24675: Fix ALF-6099: CLONE - IE6: Sometimes errors occur on almost actions in Office Add-ins. Removed linebreaks from JSON response template & prevented "undefined" entries in URL. 24680: ALF-6120 : Version notes are lost for versioned items migrated from 2.2 to 3.4.0 24681: Merged BRANCHES/DEV/BELARUS/V3.4-2010_12_14 to BRANCHES/V3.4: 24609: MT - ALF-3563 24640: MT - ALF-3563 (merged w/ minor improvement) 24685: Fixes ALF-6403: Change installer window height on Linux 24688: Fix ALF-6029 (part II) - MT: cannot "Show Folders" for "Data Dictionary" in Afresco Share - part II adds patch and removes workaround 24689: Fixes: ALF-6219 - Incorrectly formatted variable in translation 24691: MT: ALF-3263 - Explorer login now fails with consistent error message ("Unable to login - unknown username/password.") if tenant does not exist or is disabled 24692: Fixes: ALF-6370 and ALF-6225 among others - sweep of FR and DE resource bundles for quote escaping. 24694: Fixes ALF-6424. Erased erroneous equals sign 24695: Fixes: ALF-6320 - removed the country specific portion of the language pack suffixes for French, German and Spanish. This enables speakers of those languages outside of those countries to benefit from the language packs. 24696: Fix for ALF-6299: XSS attack on editing blog post with XSS data in IE6&IE7 24700: Swaps _it_IT for _it to make Italian language pack available to Italian speakers outside of Italy. 24703: Avoid DB2 query failure if someone passes in a made-up UUID - Test RunningActionRestApiTest was making up a long node UUID - DB2 fails to set the parameter with SQLSTATE=22001 24706: Merged V3.4-BUG-FIX to V3.4 24705: Fix for ALF-6365, ALF-6335 24708: Fix ALF-6386: View Details and Edit Metadata icons are incorrect for folder 24709: Missing first/last name handling. 24711: Merged V3.3 to V3.4 24710: ALF-5535 - Fix to correctly format json number values (not as numeric human readable strings) 24713: Fix ALF-5404: It is now possible to configure who receives notifications of "Contact Us" requests by setting a configuration property on the WQS website node, such as "feedbackAssignee.Contact Request=brian" Also added missing Spring MVC source to 3rd Party. 24715: Fix for ALF-6412. OOoDirect always tries to connect to port 8100. Formerly the ooo.port property did not exist for the OOoDirect connector. It was added in r.23182 for the soffice process, but not for the connector bean. Now added for the connector too. 24721: Fix for ALF-6351 - Simple search breaks if override config is used and does not contain new 'repository-search' element 24728: Fixes: ALF-5685 - Incorrect encoding of Japanese Characters 24732: Fixes ALF-6381 and others - calendar strings appearing incorrectly. Problem was an unicode encoded comma preventing the property string being broken up into different days of the weeks or months. 24739: Fix ALF-6545: DB2: SQLCODE=-302, SQLSTATE=22001 (testCreateMultiLingualCategoryRoots) - Shortened Japanese name to 14 characters 24740: Fixes: ALF-6413 (with some translations still pending). 24742: Update readmes. 24744: Merged HEAD to BRANCHES/V3.4: 24137: Fixes: ALF-5642, ALF-3892, ALF-5043 & Brings Add Event dialog in line with other forms in share by disabling the popup validation error box. 24746: Build/test fix: PostgreSQL -AssetServiceImplTest.renameFolder 24755: Merged V3.3 to V3.4 (RECORD ONLY) 21789: ALF-4333: Fix - Updated RepoPrimaryManifestProcessorImpl so it can handle deletions that are reported by either pre-delete noderef or archived noderef (previously only handled the latter). - Updated TransferManifestNodeFactory so that it handles the case where the status of the node to transfer is "deleted". - Updated UnitTestTransferManifestNodeFactory so that it handles the change to TransferManifestNodeFactory above. - Added new tests for deletion cases. 23259: Merged HEAD to V3.3 23256: Fix ALF-4573: Start Workflow action is absent for edited document and working copy in Share 23346: Brought WebQS module in (including build process but not installer elements yet) 23371: "Simply" added wcmqs to installer 23391: ALF-5367: Copy dlls into tomcat/bin as appropriate. 23485: Merged V3.4 to V3.3 (fix backported for V3.3.x lines) 23472: Fixed ALF-5408: SQL Server missing ON DELETE CASCADE declarations 23515: Merged PATCHES/V3.2.0 to V3.3 23514: ALF-5554: Merged HEAD to V3.2.0 23153: When updating tag scopes following system shutdown/restore, be smarter about quickly skipping tag scopes that another (new) thread is currently working on 23283: More debugging level logging for tagging updates, to help identify the problem with periodic multi-threaded test failures on bamboo 23535: Merged V3.4 to V3.3 (complements 23517: ALF-5552) 23508: Fixed ALF-5559: Permission interceptors can fail if Lucene returns invalid NodeRefs 23564: ALF-5600: Merged V3.4 to V3.3 23424: Fixes: ALF-2989 - Incorrect sideId reference in URL for event in Site Calendar Dashlet Adds support for displaying events that start in the past but finish in the future (previously only events that start in the future were shown) 23586: MERGED V3.4 to V3.3 22864: Fix for ALF-5005: "Create and edit functions on AWE become "confused"" 23042: Fix ALF-5127: Impossible to create an article/blog (WCMQS) [Must clear panel hideEvent handler if manually hiding a YUI panel] 23561: Fixes: ALF-4569 - Removes universal override of input width box and switches the editor form panel to adjust it's width based on content rather than window size. Fixes: ALF-4570 - Adds an override for the CSS 'top' property of the form dialogue to ensure it's always below the ribbon. (Was being set automatically by the YUI widget.panel call) 23569: Fixes: ALF-5606 - Ribbon wasn't resizing correctly after the form events. 23630: Backport of installer 23631: Added 64-bit & deployment installers 23664: Fixes ALF-5691: TransferService: Multi-byte characters are not encoded correctly 23681: Fixes ALF-5699: TransferService: Snapshot file from source repo never contains complete MLText properties 23695: Fixed bug exposed after fixing ALF-5699. Parsing of MLText properties out of the transfer snapshot file was incorrect, and that was causing multi-lingual property values to be duplicated 23709: ALF-5699: Fix NPE in ManifestIntegrationTest 23734: Merged V3.4 to V3.3 23731: Fixes for ALF-3098 and ALF-3097 - Share - Security check on Personal Dashboard - only the owning user can view a user dashboard page - Share - Security issue on Customize Site Dashboard - private and moderated site dashboard pages no longer visible to non-members, customise site and dashboard pages only accessible to SiteManager 23747: ALF-5696: Merged V3.4 to V3.3 23585: Fixed ALF-5372 "JavaScript error on Groups management dialog with IE8 : document.getElementById is null" 23790: Fixed ALF-3823 "Share: RSS feed can't be read: http://cds-srv.sun.com:8700/rss/update/public/sunalert_update.xml - ok with other RSS client." 23883: Fixes ALF-5759: WQS: Attempt to copy a website section fails 23907: Merged DEV/BELARUS/V3.3-BUG-FIX-2010_09_20 to V33 - 22750: ALF-4846: Update rules are firing on inbound actions 23931: Undid rev 23907 (Reverse-merged /alfresco/BRANCHES/DEV/BELARUS/V3.3-BUG-FIX-2010_09_20:r22750) 23961: Fixed ALF-5686 "Incorrect behaviour of "All" filter in "My Tasks" dashlet" - Variables assigned in a <#macro> shall always be assigned using <#local> (using <#assign> makes them globally available which might cause naming collisions) 24132: Disable intermittent failing unit test 24148: ALF-6007: Merged HEAD to V3.3 23049: Fixed ALF-5099: Error when trying to go back in Create Web Content Wizard (only with certain XSDs) 24263: Merged from V3.3-BUG-FIX to V3.3 24264: Merged V3.3-BUG-FIX to V3.3 24262: Stress test code for ALF-5025: Support background processing of archiving 24287: Added missing import 24336: Merged V3.4 to V3.3 23205: Fix for ALF-2111 - Download URLS are different on different pages, authentication fails when URL sent 24353: Merged V3.4 to V3.3 24352: Fix SQL fallout from ALF-6078 24510: Merged V3.4 to V3.3 21960: First round of date refactoring: Document Library pages now expect XML dates (ISO8601) from Share data webscripts 21961: Share client-side I18N utility now emulates sever-side handling of doubled-up single quotes. 24526: Merged V3.4 to V3.3 24402: Fix for performance degredation related to ALF-3823. RSS feed processing in JavaScript relies on Rhino impl of regex - this is extreemly slow as Rhino regex is by far the slowest component of the library. Switched code to use the Java Regex libraries to improve performance and reduce memory usage. 24587: Merged V3.4 to V3.3 24564: Fix for ALF-3727: Custom permissions aren't visible in Explorer UI 24604: Merged V3.4 to V3.3 24602: Build fix for RM permission model loading - collateral damage for R 24564 24775: Merged BRANCHES/V3.3 to BRANCHES/V3.4: (RECORD-ONLY) - already in V3.4 24774: (RECORD-ONLY) Merged BRANCHES/V3.4 to BRANCHES/V3.3: 23492: Fixed ALF-5550: DB2: Unable to insert values into alf_string_value 24788: Add evaluation use message for OSX installer 24790: Removed svn:mergeinfo on root 24791: Fixed ALF-6560: MIME type not detected (set to application/octet-stream) when content written via FileFolderService - First access of content on a new file (FileFolderService.getWriter) guesses a mimetype - The initial mimetype guess *was* done during create, but that was expensive. - Added unit test to cover regression 24803: Merged BRANCHES/DEV/dwebster/ to BRANCHES/V3.4: 24773: DE bug fixes received from translators 10th Jan. 24776: ES files received from translators 10th Jan 24793: FR files received from translators 10th Jan 24792: IT files received from translators 10th Jan 24804: Temporarily removing Japanese language bundle 24856: Merged BRANCHES/DEV/dwebster/ to BRANCHES/V3.4: 24848: Latest Language updates from Translators 24863: ALF-6029 (MT Share - repo' view after upg) 24880: Merged V3.3 to V3.4-BUG-FIX 24463: Fixed ALF-4398 "Path to rule set is not displayed" ($html alias was missing from a merge) 24465: Merge V3.3 to V3.4 (RECORD ONLY) 24463: Fixed ALF-4398 "Path to rule set is not displayed" ($html alias was missing from a merge) 24493: Fix for Mac OS X CIFS logon problem, change UID to start at one as zero has special meaning, plus other minor fixes. JLAN-112. 24569: Fix for ALF-5333: Webdav - Online editing of files in a folder with German umlauts does not report correct characters 24611: Fix broken build due to merge #fail (r24460 / ALF-4015) 24668: ALF-4557 - Upgrade of large repository to latest 3.3 fails on excession of mysql table lock size 24707: Fix for handling of null first/last name in wiki page list 24710: ALF-5535 - Fix to correctly format json number values (not as numeric human readable strings) 24794: Fix for ALF-4984 - Outdated custom-slingshot-application-context.xml.sample file for share 24798: Fix for ALF-5806: Lucene query does not return expected result. - Alfresco FTS now supports the prefixes ~ and = for phrase queries 24814: Build fix after r24798: Fix for ALF-5806: Lucene query does not return expected result. 24823: Synchronization improvements to RemoteClient and http proxy hosts 24825: Fixed #3 of ALF-6308 "Share data issues" - Share falls back to use "html uploader" (in all browsers except IE) when "JSESSIONID" cookie is unreachable from javascript (like when "HttpOnly cookies" is activated on the server. 24835: Fixed ALF-5484: Check-in does not update association - Copy code when copying over an existing target node was NOT processing associations - Fallout from refactor and subsequent fixes related to ALF-958 (Target associations aren't copied) - Some commented-out unit tests reintroduced 24842: Fix for ALF-6308 item #4 - validate the redirect URL to ensure it is a relative url 24845: Merged DEV/DAVEW/SAP to V3.3 23874: ALF-5822: Correct Lucene throttling mechanism to prevent build up of excessive committed deltas - Also correct BatchProcessor's mechanism for single-threading batches with cross dependencies - Single-threaded batches must be sequenced in order 23876: ALF-5822: Default lucene.indexer.mergerTargetOverlaysBlockingFactor to 2 for better write performance under load 24022: ALF-5822: Refinement of fix - Don't block a thread that has already entered the prepare phase with another indexer (e.g. a cross-store commit). Otherwise it could block indefinitely and never enter the commit phase - Also added extra debug diagnostics and handle all Throwables on failure 24023: ALF-5822: Minor correction to debug log message 24421: ALF-6134: Do not export org.hibernate.jmx.StatisticsService through JMX to avoid excessive blocking under load 24422: ALF-6135: Remove lock contention from concurrent Lucene searches - Added a RW Lock and Thread local-based solution to org.apache.lucene.store.FSDirectory.FSIndexInput.readInternal() to avoid contention during multiple parallel Lucene searches. This is already recognized as a bottleneck by the Lucene developers, who offer NIOFSDirectory as an alternative, which unfortunately doesn't work on Windows. - Added RW lock to org.apache.lucene.index.TermInfosReader.ensureIndexIsRead() - Threads no longer hanging in lucene searches during load tests. Woohoo! 24423: ALF-6136: Don't call through to org.apache.log4j.NDC unless debug is enabled as it's heavily synchronized. Also avoid dynamic method invocation by using a delegate. 24426: ALF-6138 (SURF - PARTIAL): 'Warm' the java.beans.Introspector cache for key Freemarker accessible bean classes on loading in static initializers 24428: ALF-6139 (SURF - PARTIAL): First log in to Share is expensive due to 'lazy' dashboard creation and excessive synchronization - Added AVMRemoteStore.createDocuments() for creating multiple XML documents at once, all embedded within the same master XML document in the request body - Added corresponding saveDocuments() methods to Store, RemoteStore, Model, ModelObjectManager and ModelObjectPersister on the Surf side - Used this in PresetsManager - Removed excessive synchronization from StoreModelObjectPersister 24429: ALF-6140 (SURF - PARTIAL): Surf tweaks to allow concurrent execution of web scripts - Use StrongCacheStorage instead of MruCacheStorage in RepositoryTemplateProcessor to avoid use of a synchronized cache - Tweak cache sizes in FreeMarkerProcessor - Use thread local object wrapper delegates in QNameAwareObjectWrapper and PresentationTemplateProcessor to work around synchronization in DefaultObjectWrapper - Swap in the same object wrapper to WrappingTemplateModel - Use a concurrent HashMap in ModelObjectCache and ModelHelper and remove excessive synchronization - Use RW locks rather than synchronized blocks in AbstractWebScript 24431: ALF-6141: Improvements to IBatis DAO performance under load - Use lazyLoadingEnabled="false", enhancementEnabled="false" to avoid unnecessary blocking and generation of CGI proxies in IBATIS DAOs - Use useTransactionAwareDataSource="false" to prevent Spring from agressively unwrapping DBCP connections and bypassing the prepared statement cache 24432: ALF-6142: Remove dependency between RepositoryAuthenticationDAO and Lucene - Reworked RepositoryAuthenticationDAO to use a node service lookup by child association QName - This required adding a patch to 'upgrade' the qnames of existing authentication nodes, which previously all had the same QName 24433: ALF-6143: Remove net.sf.ehcache.use.classic.lru setting from EhCacheManagerFactoryBean and InternalEhCacheManagerFactoryBean to prevent serialization of accesses to shared caches by multiple executing threads 24434: ALF-6144: DirtySessionMethodInterceptor was causing contention between multiple threads calling the same DAO. - Unfortunately method.getAnnotation() is a synchronized call, and thus causes concurrent calls to the same method to contended with each other. - Added a non-blocking cache so that DAOs can be accessed in multiple threads without contending. 24435: ALF-6145: Use RW Locks in Subsystem Framework - The operations relied on by the dynamic proxies wrapping subsystems were synchronized and thus caused contention when multiple threads were calling in to the same subsystem - Replaced synchronized blocks with use of read write locks, thus allowing multiple concurrent readers 24436: ALF-6146: Regulate PermissionModel accesses with RW locks, rather than synchronized blocks and an excessive number of concurrent hashmaps. 24438: ALF-6136: Fix build classpath 24439: ALF-6142: Fixed seeding of admin user password 24444: ALF-6142: Fix unit test fallout - InviteServiceTest needs a transaction - RepositoryAuthenticationDao must listen for Person username changes and update authentication node qname accordingly - Correction to MT handling in RepositoryAuthenticationDao - Repository Authentication Component must 'normalize' the username before passing it through the DAO 24445: ALF-6145: Correction to lock handling when propagating destroy() events 24446: ALF-6142: Add new dependencies to unit test 24448: ALF-6142: Further fix ups 24461: ALF-6142: Fix unit test 24664: ALF-6408: Prevent possible deadlock during reindexing - waitForHeadOfQueue() now only called in beforeCommit() phase rather than afterCommit() to prevent deadlocking with Lucene throttler - indexes are also flushed beforehand in beforeCommit() so that indexing work can still be parallelized - also prevent potential deadlock caused by clearing of IndexInfo.thisThreadPreparing in a nested transaction 24810: ALF-6653: Use read write lock in Hibernate ReadWriteCache to avoid needless contention on L2 cache reads 24817: ALF-4725: Avoid excessive lock contention in dbcp by upgrading to 1.4 - also upgraded commons pool 24818: ALF-6658: Remove synchronization from LockService - transaction local collections used anyway 24844: ALF-6681: Don't let the PostLookup job stack up in multiple threads - Now only executes in one thread at a time and skips scheduled slots where it is already running 24864: Fix for ALF-5904: Explorer - Space model rights not duplicated when creating a space based on a template - copy service no longer uses hasPermission - added tests for permission copy scenarios with assorted rights - this fix assumed there is nothing special about templates - ie that they should always carry permissions and is the "default" copy behaviour to copy permissions if possible 24865: ALF-6145: Fix failing unit test 24878: ALF-6146: Correction to write lock around requiredPermissionsCache 24881: Increment version revision git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@26792 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
1397 lines
66 KiB
Java
1397 lines
66 KiB
Java
/*
|
||
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
||
*
|
||
* This file is part of Alfresco
|
||
*
|
||
* Alfresco is free software: you can redistribute it and/or modify
|
||
* it under the terms of the GNU Lesser General Public License as published by
|
||
* the Free Software Foundation, either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* Alfresco is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU Lesser General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU Lesser General Public License
|
||
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
||
*/
|
||
package org.alfresco.wcm.asset;
|
||
|
||
import java.io.File;
|
||
import java.io.IOException;
|
||
import java.io.InputStream;
|
||
import java.io.Serializable;
|
||
import java.util.ArrayList;
|
||
import java.util.HashMap;
|
||
import java.util.List;
|
||
import java.util.Map;
|
||
|
||
import org.alfresco.model.ContentModel;
|
||
import org.alfresco.repo.content.MimetypeMap;
|
||
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
||
import org.alfresco.repo.security.permissions.AccessDeniedException;
|
||
import org.alfresco.service.cmr.avm.AVMNotFoundException;
|
||
import org.alfresco.service.cmr.repository.ContentReader;
|
||
import org.alfresco.service.cmr.repository.ContentWriter;
|
||
import org.alfresco.service.namespace.QName;
|
||
import org.alfresco.wcm.AbstractWCMServiceImplTest;
|
||
import org.alfresco.wcm.sandbox.SandboxInfo;
|
||
import org.alfresco.wcm.util.WCMUtil;
|
||
import org.alfresco.wcm.webproject.WebProjectInfo;
|
||
import org.apache.commons.logging.Log;
|
||
import org.apache.commons.logging.LogFactory;
|
||
|
||
/**
|
||
* Asset Service implementation unit test
|
||
*
|
||
* @author janv
|
||
*/
|
||
public class AssetServiceImplTest extends AbstractWCMServiceImplTest
|
||
{
|
||
private static Log logger = LogFactory.getLog(AssetServiceImplTest.class);
|
||
|
||
// test data
|
||
private static final String PREFIX = "created-by-admin-";
|
||
private static final String FILE = "This is file1 - admin";
|
||
|
||
@Override
|
||
protected void setUp() throws Exception
|
||
{
|
||
super.setUp();
|
||
}
|
||
|
||
@Override
|
||
protected void tearDown() throws Exception
|
||
{
|
||
super.tearDown();
|
||
}
|
||
|
||
private void checkAssetInfo(AssetInfo assetInfo, String expectedName, String expectedPath, String expectedCreator, boolean expectedIsFile, boolean expectedIsFolder, boolean expectedIsDeleted, boolean expectedIsLocked, String expectedLockOwner)
|
||
{
|
||
assertNotNull(assetInfo);
|
||
|
||
assertEquals(expectedName, assetInfo.getName());
|
||
assertEquals(expectedPath, assetInfo.getPath());
|
||
assertEquals(expectedCreator, assetInfo.getCreator());
|
||
|
||
assertEquals(expectedIsFile, assetInfo.isFile());
|
||
assertEquals(expectedIsFolder, assetInfo.isFolder());
|
||
assertEquals(expectedIsDeleted, assetInfo.isDeleted());
|
||
|
||
assertNotNull(assetInfo.getCreatedDate());
|
||
|
||
assertEquals(expectedIsLocked, assetInfo.isLocked());
|
||
assertEquals(expectedLockOwner, assetInfo.getLockOwner());
|
||
}
|
||
|
||
public void testSimple()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-assetSimple", TEST_WEBPROJ_NAME+"-assetSimple", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
|
||
// get admin's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + wpInfo.getDefaultWebApp();
|
||
|
||
// create folder
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
|
||
// create (empty) file
|
||
assetService.createFile(sbStoreId, path+"/myFolder1", "myFile1", null); // ignore return
|
||
|
||
// get assets
|
||
|
||
AssetInfo myFolder1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", AuthenticationUtil.getAdminUserName(), false, true, false, false, null);
|
||
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", AuthenticationUtil.getAdminUserName(), true, false, false, true, AuthenticationUtil.getAdminUserName());
|
||
|
||
// delete folder
|
||
assetService.deleteAsset(myFolder1Asset); // also deletes myFile1
|
||
|
||
// try to get assets (including deleted)
|
||
|
||
myFolder1Asset = assetService.getAsset(sbStoreId, -1, path+"/myFolder1", true);
|
||
assertNull(myFolder1Asset);
|
||
|
||
myFile1Asset = assetService.getAsset(sbStoreId, -1, path+"/myFolder1/myFile1", true);
|
||
assertNull(myFile1Asset);
|
||
}
|
||
|
||
/**
|
||
* Test CRUD - create, retrieve (get, list), update and delete
|
||
*/
|
||
public void testCRUD() throws IOException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-crud", TEST_WEBPROJ_NAME+"-crud", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// get non-existent assets
|
||
assertNull(assetService.getAsset(sbStoreId, path+"/myFolder1"));
|
||
assertNull(assetService.getAsset(sbStoreId, path+"/myFile1"));
|
||
assertNull(assetService.getAsset(sbStoreId, path+"/myFolder1/myFile2"));
|
||
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
// create folder
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
|
||
assertEquals(1, assetService.listAssets(sbStoreId, path, false).size());
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
|
||
// create file (and add content)
|
||
final String MYFILE1 = "This is myFile1";
|
||
ContentWriter writer = assetService.createFile(sbStoreId, path, "myFile1", null);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1);
|
||
|
||
assertEquals(2, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
final String MYFILE2 = "This is myFile2";
|
||
writer = assetService.createFile(sbStoreId, path+"/myFolder1", "myFile2", null);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE2);
|
||
|
||
assertEquals(1, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
|
||
// get assets (not including deleted)
|
||
|
||
AssetInfo myFolder1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
// get content
|
||
|
||
ContentReader reader = assetService.getContentReader(myFile1Asset);
|
||
InputStream in = reader.getContentInputStream();
|
||
byte[] buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE1, new String(buff, 0, MYFILE1.length())); // assumes 1byte=1char
|
||
|
||
AssetInfo myFile2Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFile2");
|
||
checkAssetInfo(myFile2Asset, "myFile2", path+"/myFolder1/myFile2", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
reader = assetService.getContentReader(myFile2Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE2, new String(buff, 0, MYFILE2.length())); // assumes 1byte=1char
|
||
|
||
// update content
|
||
|
||
final String MYFILE2_MODIFIED = "This is myFile2 ... modified";
|
||
writer = assetService.getContentWriter(myFile2Asset);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE2_MODIFIED);
|
||
|
||
// get updated content
|
||
|
||
reader = assetService.getContentReader(myFile2Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE2_MODIFIED, new String(buff, 0, MYFILE2_MODIFIED.length())); // assumes 1byte=1char
|
||
|
||
// delete folders and files
|
||
assetService.deleteAsset(myFile1Asset);
|
||
assetService.deleteAsset(myFolder1Asset); // also deletes myFile2
|
||
|
||
// try to get assets (including deleted)
|
||
|
||
myFolder1Asset = assetService.getAsset(sbStoreId, -1, path+"/myFolder1", true);
|
||
assertNull(myFolder1Asset);
|
||
|
||
myFile1Asset = assetService.getAsset(sbStoreId, -1, path+"/myFile1", true);
|
||
assertNull(myFile1Asset);
|
||
|
||
myFile2Asset = assetService.getAsset(sbStoreId, -1, path+"/myFolder1/myFile2", true);
|
||
assertNull(myFile2Asset);
|
||
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
try
|
||
{
|
||
// -ve test
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
fail("Cannot list assets within non-existant folder");
|
||
}
|
||
catch (AVMNotFoundException nfe)
|
||
{
|
||
// expected
|
||
}
|
||
}
|
||
|
||
/**
|
||
* Test CRUD in a webApp - create, retrieve (get, list), update and delete
|
||
*/
|
||
public void testCRUDinWebApp() throws IOException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-crudwebapp", TEST_WEBPROJ_NAME+"-crudwebapp", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
|
||
String myWebApp1 = "myWebApp1";
|
||
wpService.createWebApp(wpInfo.getStoreId(), myWebApp1, null);
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
// get non-existent assets
|
||
assertNull(assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1"));
|
||
assertNull(assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFile1"));
|
||
assertNull(assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1/myFile2"));
|
||
|
||
assertEquals(0, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/", false).size());
|
||
|
||
// create folder
|
||
assetService.createFolderWebApp(sbStoreId, myWebApp1, "/", "myFolder1");
|
||
|
||
assertEquals(1, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/", false).size());
|
||
assertEquals(0, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/myFolder1", false).size());
|
||
|
||
// create file (and add content)
|
||
final String MYFILE1 = "This is myFile1";
|
||
ContentWriter writer = assetService.createFileWebApp(sbStoreId, myWebApp1, "/", "myFile1");
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1);
|
||
|
||
assertEquals(2, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/", false).size());
|
||
|
||
final String MYFILE2 = "This is myFile2";
|
||
writer = assetService.createFileWebApp(sbStoreId, myWebApp1, "/myFolder1", "myFile2");
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE2);
|
||
|
||
assertEquals(1, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/myFolder1", false).size());
|
||
|
||
// get assets (not including deleted)
|
||
String path = sbInfo.getSandboxRootPath() + "/" + myWebApp1;
|
||
AssetInfo myFolder1Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
// get content
|
||
|
||
ContentReader reader = assetService.getContentReader(myFile1Asset);
|
||
InputStream in = reader.getContentInputStream();
|
||
byte[] buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE1, new String(buff, 0, MYFILE1.length())); // assumes 1byte=1char
|
||
|
||
AssetInfo myFile2Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1/myFile2");
|
||
checkAssetInfo(myFile2Asset, "myFile2", path+"/myFolder1/myFile2", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
reader = assetService.getContentReader(myFile2Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE2, new String(buff, 0, MYFILE2.length())); // assumes 1byte=1char
|
||
|
||
// update content
|
||
|
||
final String MYFILE2_MODIFIED = "This is myFile2 ... modified";
|
||
writer = assetService.getContentWriter(myFile2Asset);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE2_MODIFIED);
|
||
|
||
// get updated content
|
||
|
||
reader = assetService.getContentReader(myFile2Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE2_MODIFIED, new String(buff, 0, MYFILE2_MODIFIED.length())); // assumes 1byte=1char
|
||
|
||
// delete folders and files
|
||
assetService.deleteAsset(myFile1Asset);
|
||
assetService.deleteAsset(myFolder1Asset); // also deletes myFile2
|
||
|
||
// try to get assets (including deleted)
|
||
|
||
myFolder1Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1", true);
|
||
assertNull(myFolder1Asset);
|
||
|
||
myFile1Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFile1", true);
|
||
assertNull(myFile1Asset);
|
||
|
||
myFile2Asset = assetService.getAssetWebApp(sbStoreId, myWebApp1, "/myFolder1/myFile2", true);
|
||
assertNull(myFile2Asset);
|
||
|
||
assertEquals(0, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/", false).size());
|
||
|
||
try
|
||
{
|
||
// -ve test
|
||
assertEquals(0, assetService.listAssetsWebApp(sbStoreId, myWebApp1, "/myFolder1", false).size());
|
||
fail("Cannot list assets within non-existant folder");
|
||
}
|
||
catch (AVMNotFoundException nfe)
|
||
{
|
||
// expected
|
||
}
|
||
}
|
||
|
||
/**
|
||
* Test CRUD - create, retrieve (get, list), update and delete for each role
|
||
*/
|
||
public void testCRUDforRoles() throws IOException, InterruptedException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-crudroles", TEST_WEBPROJ_NAME+"-crudroles", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
|
||
String wpStoreId = wpInfo.getStoreId();
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
String stagingStoreId = wpInfo.getStagingStoreName();
|
||
|
||
// get admin sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpStoreId);
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
// create some existing folders and files
|
||
String[] users = new String[]{USER_ONE, USER_TWO, USER_THREE, USER_FOUR};
|
||
for (String user : users)
|
||
{
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", PREFIX+user);
|
||
|
||
// create file (and add content)
|
||
ContentWriter writer = assetService.createFileWebApp(sbStoreId, defaultWebApp, "/"+PREFIX+user, "fileA");
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(FILE);
|
||
}
|
||
|
||
sbService.submitWebApp(sbStoreId, defaultWebApp, "some existing folders and files", "some existing folders and files");
|
||
|
||
pollForSnapshotCount(stagingStoreId, 1);
|
||
|
||
runCRUDforRoles(USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, wpStoreId, defaultWebApp, true, true, true);
|
||
|
||
// TODO - pending ETHREEOH-1314 (see below) if updating folder properties
|
||
runCRUDforRoles(USER_TWO, WCMUtil.ROLE_CONTENT_PUBLISHER, wpStoreId, defaultWebApp, true, true, false);
|
||
runCRUDforRoles(USER_THREE, WCMUtil.ROLE_CONTENT_REVIEWER, wpStoreId, defaultWebApp, false, true, false);
|
||
|
||
runCRUDforRoles(USER_FOUR, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, wpStoreId, defaultWebApp, true, false, false);
|
||
}
|
||
|
||
private void runCRUDforRoles(String user, String role, final String wpStoreId, String defaultWebApp, boolean canCreate, boolean canUpdateExisting, boolean canDeleteExisting) throws IOException, InterruptedException
|
||
{
|
||
// switch to user - content manager
|
||
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpStoreId, user, role, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(user);
|
||
|
||
// get staging sandbox
|
||
String stagingStoreId = sbService.getStagingSandbox(wpStoreId).getSandboxId();
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpStoreId);
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp; // for checks only
|
||
|
||
if (canCreate)
|
||
{
|
||
// create folder
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", user);
|
||
|
||
// create file (and add content)
|
||
final String MYFILE1 = "This is myFile1 - "+user;
|
||
ContentWriter writer = assetService.createFileWebApp(sbStoreId, defaultWebApp, "/"+user, "fileA");
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1);
|
||
|
||
// list assets
|
||
assertEquals(1, assetService.listAssetsWebApp(sbStoreId, defaultWebApp, "/"+user, false).size());
|
||
|
||
// get assets
|
||
AssetInfo myFolder1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/"+user);
|
||
checkAssetInfo(myFolder1Asset, user, path+"/"+user, user, false, true, false, false, null);
|
||
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/"+user+"/fileA");
|
||
checkAssetInfo(myFile1Asset, "fileA", path+"/"+user+"/fileA", user, true, false, false, true, user);
|
||
|
||
// get content
|
||
|
||
ContentReader reader = assetService.getContentReader(myFile1Asset);
|
||
InputStream in = reader.getContentInputStream();
|
||
byte[] buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE1, new String(buff, 0, MYFILE1.length())); // assumes 1byte=1char
|
||
|
||
// update content
|
||
|
||
final String MYFILE1_MODIFIED = "This is myFile1 ... modified";
|
||
writer = assetService.getContentWriter(myFile1Asset);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1_MODIFIED);
|
||
|
||
// get updated content
|
||
|
||
reader = assetService.getContentReader(myFile1Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE1_MODIFIED, new String(buff, 0, MYFILE1_MODIFIED.length())); // assumes 1byte=1char
|
||
|
||
// update folder properties - eg. title and description
|
||
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "folder description");
|
||
|
||
assetService.updateAssetProperties(myFolder1Asset, newProps);
|
||
Map<QName, Serializable> props = assetService.getAssetProperties(myFolder1Asset);
|
||
assertEquals("folder title", props.get(ContentModel.PROP_TITLE));
|
||
assertEquals("folder description", props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
// Delete created file and folder
|
||
assetService.deleteAsset(myFile1Asset);
|
||
assetService.deleteAsset(myFolder1Asset);
|
||
}
|
||
else
|
||
{
|
||
try
|
||
{
|
||
// try to create folder (-ve test)
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", user);
|
||
fail("User "+user+" with role "+role+" should not be able to create folder");
|
||
}
|
||
catch (AccessDeniedException ade)
|
||
{
|
||
// expected
|
||
}
|
||
|
||
try
|
||
{
|
||
// try to create file (-ve test)
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/", "file-"+user);
|
||
fail("User "+user+" with role "+role+" should not be able to create file");
|
||
}
|
||
catch (AccessDeniedException ade)
|
||
{
|
||
// expected
|
||
}
|
||
}
|
||
|
||
// list existing assets
|
||
assertEquals(1, assetService.listAssetsWebApp(sbStoreId, defaultWebApp, "/"+PREFIX+user, false).size());
|
||
|
||
// get existing assets
|
||
AssetInfo existingFolder1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/"+PREFIX+user);
|
||
checkAssetInfo(existingFolder1Asset, PREFIX+user, path+"/"+PREFIX+user, AuthenticationUtil.getAdminUserName(), false, true, false, false, null);
|
||
|
||
AssetInfo existingFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/"+PREFIX+user+"/fileA");
|
||
checkAssetInfo(existingFile1Asset, "fileA", path+"/"+PREFIX+user+"/fileA", AuthenticationUtil.getAdminUserName(), true, false, false, false, null);
|
||
|
||
// get existing content
|
||
|
||
ContentReader reader = assetService.getContentReader(existingFile1Asset);
|
||
InputStream in = reader.getContentInputStream();
|
||
byte[] buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(FILE, new String(buff, 0, FILE.length())); // assumes 1byte=1char
|
||
|
||
if (canUpdateExisting)
|
||
{
|
||
// update content
|
||
|
||
final String MYFILE1_MODIFIED = "This is myFile1 ... modified";
|
||
ContentWriter writer = assetService.getContentWriter(existingFile1Asset);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1_MODIFIED);
|
||
|
||
// get updated content
|
||
|
||
reader = assetService.getContentReader(existingFile1Asset);
|
||
in = reader.getContentInputStream();
|
||
buff = new byte[1024];
|
||
in.read(buff);
|
||
in.close();
|
||
assertEquals(MYFILE1_MODIFIED, new String(buff, 0, MYFILE1_MODIFIED.length())); // assumes 1byte=1char
|
||
|
||
// update file properties - eg. title and description
|
||
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "file title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "file description");
|
||
|
||
assetService.updateAssetProperties(existingFile1Asset, newProps);
|
||
Map<QName, Serializable> props = assetService.getAssetProperties(existingFile1Asset);
|
||
assertEquals("file title", props.get(ContentModel.PROP_TITLE));
|
||
assertEquals("file description", props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
/* TODO - pending ETHREEOH-1314 - fails for content contributor / content publisher during submit if updating folder properties
|
||
*/
|
||
// update folder properties - eg. title and description
|
||
|
||
newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "folder description");
|
||
|
||
assetService.updateAssetProperties(existingFolder1Asset, newProps);
|
||
props = assetService.getAssetProperties(existingFolder1Asset);
|
||
assertEquals("folder title", props.get(ContentModel.PROP_TITLE));
|
||
assertEquals("folder description", props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
|
||
}
|
||
else
|
||
{
|
||
try
|
||
{
|
||
// try to update file (-ve test)
|
||
assetService.getContentWriter(existingFile1Asset);
|
||
fail("User "+user+" with role "+role+" should not be able to update existing file");
|
||
}
|
||
catch (AccessDeniedException ade)
|
||
{
|
||
// expected
|
||
}
|
||
|
||
try
|
||
{
|
||
// try to update file properties (-ve test)
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "file title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "file description");
|
||
|
||
assetService.updateAssetProperties(existingFile1Asset, newProps);
|
||
fail("User "+user+" with role "+role+" should not be able to update existing file properties");
|
||
}
|
||
catch (AccessDeniedException ade)
|
||
{
|
||
// expected
|
||
}
|
||
|
||
try
|
||
{
|
||
// try to update folder properties (-ve test)
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "folder description");
|
||
|
||
assetService.updateAssetProperties(existingFolder1Asset, newProps);
|
||
fail("User "+user+" with role "+role+" should not be able to update existing folder properties");
|
||
}
|
||
catch (AccessDeniedException ade)
|
||
{
|
||
// expected
|
||
}
|
||
}
|
||
|
||
if (canDeleteExisting)
|
||
{
|
||
// Delete existing file and folder
|
||
assetService.deleteAsset(existingFile1Asset);
|
||
assetService.deleteAsset(existingFolder1Asset);
|
||
}
|
||
else
|
||
{
|
||
try
|
||
{
|
||
// try to delete file (-ve test)
|
||
assetService.deleteAsset(existingFile1Asset);
|
||
fail("User "+user+" with role "+role+" should not be able to delete existing file");
|
||
}
|
||
catch (AVMNotFoundException nfe)
|
||
{
|
||
// expected
|
||
}
|
||
|
||
try
|
||
{
|
||
// try to delete folder (-ve test)
|
||
assetService.deleteAsset(existingFolder1Asset);
|
||
fail("User "+user+" with role "+role+" should not be able to delete existing folder");
|
||
}
|
||
catch (AVMNotFoundException ade)
|
||
{
|
||
// expected
|
||
}
|
||
}
|
||
|
||
// switch to admin (content manager)
|
||
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
||
|
||
int snapCnt = sbService.listSnapshots(wpStoreId, false).size();
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(user);
|
||
|
||
List<AssetInfo> changedAssets = sbService.listChangedWebApp(sbStoreId, defaultWebApp, true);
|
||
|
||
if (changedAssets.size() > 0)
|
||
{
|
||
// submit the changes
|
||
sbService.submitWebApp(sbStoreId, defaultWebApp, "some updates by "+user, "some updates by "+user);
|
||
|
||
snapCnt += (canUpdateExisting || canDeleteExisting) ? (1):(0);
|
||
pollForSnapshotCount(stagingStoreId, snapCnt);
|
||
|
||
assertEquals(0, sbService.listChangedWebApp(sbStoreId, defaultWebApp, true).size());
|
||
}
|
||
}
|
||
|
||
public void testRenameFile()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-renamefile", TEST_WEBPROJ_NAME+"-renamefile", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
// create file
|
||
assetService.createFile(sbStoreId, path+"/myFolder1/myFolder2", "myFile1", null);
|
||
|
||
// rename file
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
myFile1Asset = assetService.renameAsset(myFile1Asset, "myFile1Renamed");
|
||
checkAssetInfo(myFile1Asset, "myFile1Renamed", path+"/myFolder1/myFolder2/myFile1Renamed", USER_ONE, true, false, false, true, USER_ONE);
|
||
}
|
||
|
||
public void testRenameFolder()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-renamefolder", TEST_WEBPROJ_NAME+"-renamefolder", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
AssetInfo myFolder1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2");
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder1/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
// rename folder 1
|
||
myFolder1Asset = assetService.renameAsset(myFolder1Asset, "myFolder1Renamed");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1Renamed", path+"/myFolder1Renamed", USER_ONE, false, true, false, false, null);
|
||
|
||
// rename folder 2
|
||
myFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder1Renamed/myFolder2");
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder1Renamed/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
myFolder2Asset = assetService.renameAsset(myFolder2Asset, "myFolder2Renamed");
|
||
checkAssetInfo(myFolder2Asset, "myFolder2Renamed", path+"/myFolder1Renamed/myFolder2Renamed", USER_ONE, false, true, false, false, null);
|
||
}
|
||
|
||
|
||
public void testCopyFile()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-copyfile", TEST_WEBPROJ_NAME+"-copyfile", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
// create (non-empty) file
|
||
final String MYFILE1 = "This is myFile1";
|
||
ContentWriter writer = assetService.createFile(sbStoreId, path+"/myFolder1/myFolder2", "myFile1", null);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1);
|
||
|
||
// copy file - note: must have content
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
// TODO review - copied files are not locked ?
|
||
myFile1Asset = assetService.copyAsset(myFile1Asset, path+"/myFolder1");
|
||
//checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, false, null);
|
||
}
|
||
|
||
public void testCopyFolder()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-copyfolder", TEST_WEBPROJ_NAME+"-copyfolder", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
// create (non-empty) file
|
||
final String MYFILE1 = "This is myFile1";
|
||
ContentWriter writer = assetService.createFile(sbStoreId, path+"/myFolder1/myFolder2", "myFile1", null);
|
||
writer.setMimetype(MimetypeMap.MIMETYPE_TEXT_PLAIN);
|
||
writer.setEncoding("UTF-8");
|
||
writer.putContent(MYFILE1);
|
||
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
AssetInfo myFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2");
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder1/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
// recursively copy folder
|
||
myFolder2Asset = assetService.copyAsset(myFolder2Asset, path);
|
||
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myCopiedFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder2");
|
||
checkAssetInfo(myCopiedFolder2Asset, "myFolder2", path+"/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myCopiedFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder2/myFile1");
|
||
|
||
// TODO review - copied files are not locked ?
|
||
//checkAssetInfo(myCopiedFile1Asset, "myFile1", path+"/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
checkAssetInfo(myCopiedFile1Asset, "myFile1", path+"/myFolder2/myFile1", USER_ONE, true, false, false, false, null);
|
||
}
|
||
|
||
public void testMoveFile()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-movefile", TEST_WEBPROJ_NAME+"-movefile", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
// create (empty) file
|
||
assetService.createFile(sbStoreId, path+"/myFolder1/myFolder2", "myFile1", null); // ignore return
|
||
|
||
// move file
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
myFile1Asset = assetService.moveAsset(myFile1Asset, path+"/myFolder1");
|
||
|
||
// TODO review - moved files are not locked ?
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
//checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, false, null);
|
||
}
|
||
|
||
/*
|
||
// TODO lock issue ...
|
||
// org.alfresco.service.cmr.avm.AVMNotFoundException: Lock not found for testAsset-1228830920248-movefolder:/www/avm_webapps/ROOT/myFolder1/myFolder2
|
||
// at org.alfresco.repo.avm.locking.AVMLockingServiceImpl.modifyLock(AVMLockingServiceImpl.java:490)
|
||
// at org.alfresco.repo.avm.AVMLockingAwareService.rename(AVMLockingAwareService.java:712)
|
||
*/
|
||
public void testMoveFolder()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-movefolder", TEST_WEBPROJ_NAME+"-movefolder", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folders
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
assetService.createFolder(sbStoreId, path+"/myFolder1", "myFolder2", null);
|
||
|
||
// create (empty) file
|
||
assetService.createFile(sbStoreId, path+"/myFolder1/myFolder2", "myFile1", null); // ignore return
|
||
|
||
AssetInfo myFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
AssetInfo myFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder1/myFolder2");
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder1/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
// recursively move folder
|
||
myFolder2Asset = assetService.moveAsset(myFolder2Asset, path);
|
||
|
||
checkAssetInfo(myFolder2Asset, "myFolder2", path+"/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myMovedFolder2Asset = assetService.getAsset(sbStoreId, path+"/myFolder2");
|
||
checkAssetInfo(myMovedFolder2Asset, "myFolder2", path+"/myFolder2", USER_ONE, false, true, false, false, null);
|
||
|
||
AssetInfo myMovedFile1Asset = assetService.getAsset(sbStoreId, path+"/myFolder2/myFile1");
|
||
|
||
// TODO review - moved files are not locked ?
|
||
//checkAssetInfo(myMovedFile1Asset, "myFile1", path+"/myFolder2/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
checkAssetInfo(myMovedFile1Asset, "myFile1", path+"/myFolder2/myFile1", USER_ONE, true, false, false, false, null);
|
||
}
|
||
|
||
public void testProperties() throws InterruptedException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-properties", TEST_WEBPROJ_NAME+"-properties", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// get staging sandbox id
|
||
String stagingStoreId = sbService.getStagingSandbox(wpInfo.getStoreId()).getSandboxId();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folder
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", "myFolder1");
|
||
AssetInfo myFolder1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", USER_ONE, false, true, false, false, null);
|
||
|
||
Map<QName, Serializable> props = assetService.getAssetProperties(myFolder1Asset);
|
||
assertNotNull(props);
|
||
int countFolderInbuiltProps = props.size();
|
||
|
||
// create file
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/myFolder1", "myFile1");
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/myFolder1/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
props = assetService.getAssetProperties(myFile1Asset);
|
||
assertNotNull(props);
|
||
int countFileInbuiltProps = props.size();
|
||
|
||
assertEquals(USER_ONE, assetService.getLockOwner(myFile1Asset));
|
||
|
||
sbService.submitWebApp(sbStoreId, defaultWebApp, "submit1 label", "submit1 comment");
|
||
|
||
pollForSnapshotCount(stagingStoreId, 1);
|
||
|
||
assertNull(assetService.getLockOwner(myFile1Asset));
|
||
|
||
// update (or set, if not already set) specific properties - eg. title and description
|
||
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "folder description");
|
||
|
||
assetService.updateAssetProperties(myFolder1Asset, newProps);
|
||
props = assetService.getAssetProperties(myFolder1Asset);
|
||
assertEquals((countFolderInbuiltProps+2), props.size());
|
||
|
||
assertEquals("folder title", props.get(ContentModel.PROP_TITLE));
|
||
assertEquals("folder description", props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
// set all (or replace existing) properties - eg. just title
|
||
|
||
newProps = new HashMap<QName, Serializable>(1);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title2");
|
||
|
||
assetService.setAssetProperties(myFolder1Asset, newProps);
|
||
props = assetService.getAssetProperties(myFolder1Asset);
|
||
assertEquals((countFolderInbuiltProps+1), props.size());
|
||
|
||
assertEquals("folder title2", props.get(ContentModel.PROP_TITLE));
|
||
assertNull(props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
// set all (or replace existing) properties - eg. title and description
|
||
|
||
newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "file title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "file description");
|
||
|
||
assetService.setAssetProperties(myFile1Asset, newProps);
|
||
props = assetService.getAssetProperties(myFile1Asset);
|
||
assertEquals((countFileInbuiltProps+2), props.size());
|
||
|
||
assertEquals("file title", props.get(ContentModel.PROP_TITLE));
|
||
assertEquals("file description", props.get(ContentModel.PROP_DESCRIPTION));
|
||
|
||
assertEquals(USER_ONE, assetService.getLockOwner(myFile1Asset));
|
||
}
|
||
|
||
public void testAspects()
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-aspects", TEST_WEBPROJ_NAME+"-aspects", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, true);
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folder
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", "myFolder1");
|
||
AssetInfo myFolder1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/myFolder1");
|
||
checkAssetInfo(myFolder1Asset, "myFolder1", path+"/myFolder1", USER_ONE, false, true, false, false, null);
|
||
|
||
int folderAspectCnt = assetService.getAspects(myFolder1Asset).size();
|
||
|
||
// create file
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/myFolder1", "myFile1");
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "/myFolder1/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFolder1/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
int fileAspectCnt = assetService.getAspects(myFile1Asset).size();
|
||
|
||
// add/remove aspect to/from folder
|
||
|
||
assertFalse(assetService.hasAspect(myFolder1Asset, ContentModel.ASPECT_TITLED));
|
||
|
||
Map<QName, Serializable> newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "folder title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "folder description");
|
||
|
||
assetService.addAspect(myFolder1Asset, ContentModel.ASPECT_TITLED, newProps);
|
||
|
||
assertEquals(folderAspectCnt+1, assetService.getAspects(myFolder1Asset).size());
|
||
assertTrue(assetService.hasAspect(myFolder1Asset, ContentModel.ASPECT_TITLED));
|
||
|
||
assetService.removeAspect(myFolder1Asset, ContentModel.ASPECT_TITLED);
|
||
|
||
assertEquals(folderAspectCnt, assetService.getAspects(myFolder1Asset).size());
|
||
assertFalse(assetService.hasAspect(myFolder1Asset, ContentModel.ASPECT_TITLED));
|
||
|
||
// add/remove aspect to/from file
|
||
|
||
assertFalse(assetService.hasAspect(myFile1Asset, ContentModel.ASPECT_TITLED));
|
||
|
||
newProps = new HashMap<QName, Serializable>(2);
|
||
newProps.put(ContentModel.PROP_TITLE, "file title");
|
||
newProps.put(ContentModel.PROP_DESCRIPTION, "file description");
|
||
|
||
assetService.addAspect(myFile1Asset, ContentModel.ASPECT_TITLED, newProps);
|
||
|
||
assertEquals(fileAspectCnt+1, assetService.getAspects(myFile1Asset).size());
|
||
assertTrue(assetService.hasAspect(myFile1Asset, ContentModel.ASPECT_TITLED));
|
||
|
||
assetService.removeAspect(myFile1Asset, ContentModel.ASPECT_TITLED);
|
||
|
||
assertEquals(fileAspectCnt, assetService.getAspects(myFile1Asset).size());
|
||
assertFalse(assetService.hasAspect(myFile1Asset, ContentModel.ASPECT_TITLED));
|
||
}
|
||
|
||
|
||
public void testSimpleLockFile() throws InterruptedException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-simpleLock", TEST_WEBPROJ_NAME+"-simpleLock", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// get staging sandbox id
|
||
String stagingStoreId = sbService.getStagingSandbox(wpInfo.getStoreId()).getSandboxId();
|
||
|
||
// invite web users and auto-create their (author) sandboxs
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, true);
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_TWO, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, true);
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_THREE, WCMUtil.ROLE_CONTENT_MANAGER, true);
|
||
|
||
// switch to user one
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create file
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/", "myFile1");
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myFile1", USER_ONE, true, false, false, true, USER_ONE);
|
||
|
||
assertEquals(USER_ONE, assetService.getLockOwner(myFile1Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile1Asset));
|
||
|
||
// switch to user two
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
||
|
||
assertEquals(USER_ONE, assetService.getLockOwner(myFile1Asset));
|
||
assertFalse(assetService.hasLockAccess(myFile1Asset));
|
||
|
||
// switch to user three
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_THREE);
|
||
|
||
assertEquals(USER_ONE, assetService.getLockOwner(myFile1Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile1Asset)); // content manager
|
||
|
||
// switch to user one
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
sbService.submitWebApp(sbStoreId, defaultWebApp, "submit1 label", "submit1 comment");
|
||
|
||
pollForSnapshotCount(stagingStoreId, 1);
|
||
|
||
assertNull(assetService.getLockOwner(myFile1Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile1Asset));
|
||
|
||
// switch to user two
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_TWO);
|
||
|
||
assertNull(assetService.getLockOwner(myFile1Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile1Asset));
|
||
}
|
||
|
||
public void testSimpleLockFile2() throws InterruptedException
|
||
{
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ADMIN);
|
||
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-partialSubmitWithNewFolder", TEST_WEBPROJ_NAME+"-partialSubmitWithNewFolder", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// get staging sandbox id
|
||
String stagingStoreId = sbService.getStagingSandbox(wpInfo.getStoreId()).getSandboxId();
|
||
|
||
// get admin's sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
// create folder
|
||
assetService.createFolderWebApp(sbStoreId, defaultWebApp, "/", "myDir1");
|
||
AssetInfo myDir1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "myDir1");
|
||
checkAssetInfo(myDir1Asset, "myDir1", path+"/myDir1", USER_ADMIN, false, true, false, false, null);
|
||
|
||
// note: folders do not get locked
|
||
assertNull(assetService.getLockOwner(myDir1Asset));
|
||
assertTrue(assetService.hasLockAccess(myDir1Asset));
|
||
|
||
// create two files
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/myDir1", "myFile1");
|
||
assetService.createFileWebApp(sbStoreId, defaultWebApp, "/myDir1", "myFile2");
|
||
|
||
AssetInfo myFile1Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "myDir1/myFile1");
|
||
checkAssetInfo(myFile1Asset, "myFile1", path+"/myDir1/myFile1", USER_ADMIN, true, false, false, true, USER_ADMIN);
|
||
|
||
assertEquals(USER_ADMIN, assetService.getLockOwner(myFile1Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile1Asset));
|
||
|
||
AssetInfo myFile2Asset = assetService.getAssetWebApp(sbStoreId, defaultWebApp, "myDir1/myFile2");
|
||
checkAssetInfo(myFile2Asset, "myFile2", path+"/myDir1/myFile2", USER_ADMIN, true, false, false, true, USER_ADMIN);
|
||
|
||
assertEquals(USER_ADMIN, assetService.getLockOwner(myFile2Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile2Asset));
|
||
|
||
List<AssetInfo> changedAssets = sbService.listChangedWebApp(sbStoreId, defaultWebApp, false);
|
||
assertEquals(1, changedAssets.size());
|
||
myDir1Asset = changedAssets.get(0);
|
||
checkAssetInfo(myDir1Asset, "myDir1", path+"/myDir1", USER_ADMIN, false, true, false, false, null);
|
||
|
||
List<AssetInfo> selectedAssetsToSubmit = new ArrayList<AssetInfo>(1);
|
||
selectedAssetsToSubmit.add(myFile1Asset);
|
||
|
||
// partial submit with new folder
|
||
sbService.submitListAssets(sbStoreId, selectedAssetsToSubmit, "submit1 label", "submit1 comment");
|
||
|
||
pollForSnapshotCount(stagingStoreId, 1);
|
||
|
||
changedAssets = sbService.listChangedWebApp(sbStoreId, defaultWebApp, false);
|
||
assertEquals(1, changedAssets.size());
|
||
myFile2Asset = changedAssets.get(0);
|
||
|
||
// ETWOTWO-1265
|
||
checkAssetInfo(myFile2Asset, "myFile2", path+"/myDir1/myFile2", USER_ADMIN, true, false, false, true, USER_ADMIN);
|
||
assertEquals(USER_ADMIN, assetService.getLockOwner(myFile2Asset));
|
||
assertTrue(assetService.hasLockAccess(myFile2Asset));
|
||
}
|
||
|
||
// bulk import and submit all
|
||
public void testImportAndSubmit1() throws InterruptedException
|
||
{
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-simpleImport", TEST_WEBPROJ_NAME+"-simpleImport", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// get staging sandbox
|
||
SandboxInfo stagingInfo = sbService.getStagingSandbox(wpInfo.getStoreId());
|
||
String stagingStoreId = stagingInfo.getSandboxId();
|
||
|
||
// invite web user and auto-create their (author) sandbox
|
||
wpService.inviteWebUser(wpInfo.getStoreId(), USER_ONE, WCMUtil.ROLE_CONTENT_CONTRIBUTOR, true);
|
||
|
||
assertEquals(0, sbService.listSnapshots(stagingStoreId, false).size());
|
||
|
||
// switch to user
|
||
AuthenticationUtil.setFullyAuthenticatedUser(USER_ONE);
|
||
|
||
// get user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
assertEquals(0, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
assertEquals(0, sbService.listChanged(sbStoreId, path, false).size());
|
||
|
||
// create folder
|
||
assetService.createFolder(sbStoreId, path, "myFolder1", null);
|
||
AssetInfo myFolder1Asset = assetService.getAsset(sbStoreId, path+"/myFolder1");
|
||
|
||
assertEquals(1, sbService.listChanged(sbStoreId, path, false).size());
|
||
|
||
assertEquals(0, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(1, assetService.listAssets(sbStoreId, path, false).size());
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
|
||
// bulk import
|
||
String testFile = System.getProperty("user.dir") + "/source/test-resources/module/test.war";
|
||
|
||
File zipFile = new File(testFile);
|
||
assetService.bulkImport(sbStoreId, myFolder1Asset.getPath(), zipFile, false);
|
||
|
||
assertEquals(0, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(1, assetService.listAssets(sbStoreId, path, false).size());
|
||
assertEquals(9, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
|
||
assertEquals(1, sbService.listChanged(sbStoreId, path, false).size());
|
||
|
||
sbService.submitWebApp(sbStoreId, defaultWebApp, "s1", "s1");
|
||
|
||
pollForSnapshotCount(stagingStoreId, 1);
|
||
|
||
assertEquals(1, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(9, assetService.listAssets(stagingStoreId, path+"/myFolder1", false).size());
|
||
assertEquals(1, assetService.listAssets(sbStoreId, path, false).size());
|
||
assertEquals(9, assetService.listAssets(sbStoreId, path+"/myFolder1", false).size());
|
||
|
||
assertEquals(0, sbService.listChanged(sbStoreId, path, false).size());
|
||
|
||
// switch to admin
|
||
AuthenticationUtil.setFullyAuthenticatedUser(AuthenticationUtil.getAdminUserName());
|
||
|
||
assertEquals(1, sbService.listSnapshots(stagingStoreId, false).size());
|
||
}
|
||
|
||
// bulk import and submit 1-by-1
|
||
public void testImportAndSubmit2() throws InterruptedException
|
||
{
|
||
long start = System.currentTimeMillis();
|
||
|
||
// create web project (also creates staging sandbox and admin's author sandbox)
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS+"-import", TEST_WEBPROJ_NAME+"-import", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION, TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
|
||
logger.debug("create web project in "+(System.currentTimeMillis()-start)+" msecs");
|
||
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
// get staging sandbox
|
||
SandboxInfo stagingInfo = sbService.getStagingSandbox(wpInfo.getStoreId());
|
||
String stagingStoreId = stagingInfo.getSandboxId();
|
||
|
||
// get admin user's author sandbox
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
assertEquals(0, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(0, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
assertEquals(0, sbService.listSnapshots(stagingStoreId, false).size());
|
||
|
||
// bulk import
|
||
//String testFile = System.getProperty("user.dir") + "/source/test-resources/wcm/1001_files.zip";
|
||
String testFile = System.getProperty("user.dir") + "/source/test-resources/module/test.war";
|
||
|
||
start = System.currentTimeMillis();
|
||
|
||
File zipFile = new File(testFile);
|
||
assetService.bulkImport(sbStoreId, path, zipFile, false);
|
||
|
||
logger.debug("bulk import in "+(System.currentTimeMillis()-start)+" msecs");
|
||
|
||
int totalCnt = assetService.listAssets(sbStoreId, path, false).size();
|
||
int expectedChangeCnt = totalCnt;
|
||
int expectedSnapCnt = 0;
|
||
int expectedStageCnt = 0;
|
||
|
||
for (int i = 1; i <= totalCnt; i++)
|
||
{
|
||
assertEquals(expectedStageCnt, assetService.listAssets(stagingStoreId, path, false).size());
|
||
assertEquals(totalCnt, assetService.listAssets(sbStoreId, path, false).size());
|
||
|
||
assertEquals(expectedSnapCnt, sbService.listSnapshots(stagingStoreId, false).size());
|
||
|
||
List<AssetInfo> assets = sbService.listChanged(sbStoreId, path, false);
|
||
assertEquals(expectedChangeCnt, assets.size());
|
||
|
||
List<AssetInfo> submitAssets = new ArrayList<AssetInfo>(1);
|
||
submitAssets.add(assets.get(0));
|
||
|
||
start = System.currentTimeMillis();
|
||
|
||
sbService.submitListAssets(sbStoreId, submitAssets, "s1", "s1");
|
||
|
||
logger.debug("initiated submit of item "+i+" in "+(System.currentTimeMillis()-start)+" msecs");
|
||
|
||
start = System.currentTimeMillis();
|
||
|
||
expectedSnapCnt++;
|
||
|
||
pollForSnapshotCount(stagingStoreId, expectedSnapCnt);
|
||
|
||
expectedChangeCnt--;
|
||
expectedStageCnt++;
|
||
}
|
||
}
|
||
|
||
// ALF-1948
|
||
public void testDeleteFile() throws Exception
|
||
{
|
||
WebProjectInfo wpInfo = wpService.createWebProject(TEST_WEBPROJ_DNS + "-import", TEST_WEBPROJ_NAME + "-import", TEST_WEBPROJ_TITLE, TEST_WEBPROJ_DESCRIPTION,
|
||
TEST_WEBPROJ_DEFAULT_WEBAPP, TEST_WEBPROJ_DONT_USE_AS_TEMPLATE, null);
|
||
|
||
String defaultWebApp = wpInfo.getDefaultWebApp();
|
||
|
||
SandboxInfo stagingInfo = sbService.getStagingSandbox(wpInfo.getStoreId());
|
||
String stagingStoreId = stagingInfo.getSandboxId();
|
||
|
||
SandboxInfo sbInfo = sbService.getAuthorSandbox(wpInfo.getStoreId());
|
||
String sbStoreId = sbInfo.getSandboxId();
|
||
|
||
String path = sbInfo.getSandboxRootPath() + "/" + defaultWebApp;
|
||
|
||
assetService.createFile(sbStoreId, path, "testfile.txt", null);
|
||
assetService.createFolder(sbStoreId, path, "testfolder", null);
|
||
|
||
List<AssetInfo> listAssets = assetService.listAssets(stagingStoreId, path, true);
|
||
assertEquals(0, listAssets.size());
|
||
|
||
listAssets = assetService.listAssets(sbStoreId, path, true);
|
||
assertEquals(2, listAssets.size());
|
||
|
||
int validAmount = listAssets.size() - 1;
|
||
for (AssetInfo asset : listAssets)
|
||
{
|
||
assetService.deleteAsset(asset);
|
||
List<AssetInfo> tempAssetsList = assetService.listAssets(sbStoreId, path, true);
|
||
assertNotNull(tempAssetsList);
|
||
assertEquals(validAmount--, tempAssetsList.size());
|
||
}
|
||
|
||
List<AssetInfo> listChanged = sbService.listChanged(sbStoreId, path, true);
|
||
assertEquals(0, listChanged.size());
|
||
}
|
||
}
|