View Javadoc
1   /**
2    * Copyright 2005-2014 The Kuali Foundation
3    *
4    * Licensed under the Educational Community License, Version 2.0 (the "License");
5    * you may not use this file except in compliance with the License.
6    * You may obtain a copy of the License at
7    *
8    * http://www.opensource.org/licenses/ecl2.php
9    *
10   * Unless required by applicable law or agreed to in writing, software
11   * distributed under the License is distributed on an "AS IS" BASIS,
12   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13   * See the License for the specific language governing permissions and
14   * limitations under the License.
15   */
16  package org.kuali.rice.krad.service;
17  
18  import org.apache.commons.lang.StringUtils;
19  import org.junit.Test;
20  import org.kuali.rice.core.api.criteria.QueryByCriteria;
21  import org.kuali.rice.kew.api.exception.WorkflowException;
22  import org.kuali.rice.kim.api.KimConstants.PermissionNames;
23  import org.kuali.rice.kim.api.identity.Person;
24  import org.kuali.rice.kim.api.services.KimApiServiceLocator;
25  import org.kuali.rice.kns.authorization.AuthorizationConstants;
26  import org.kuali.rice.krad.UserSession;
27  import org.kuali.rice.krad.document.Document;
28  import org.kuali.rice.krad.document.authorization.PessimisticLock;
29  import org.kuali.rice.krad.exception.AuthorizationException;
30  import org.kuali.rice.krad.service.impl.PessimisticLockServiceImpl;
31  import org.kuali.rice.krad.test.KRADTestCase;
32  import org.kuali.rice.krad.test.document.AccountRequestDocument;
33  import org.kuali.rice.krad.test.document.AccountRequestDocument2;
34  import org.kuali.rice.krad.util.GlobalVariables;
35  import org.kuali.rice.krad.util.KRADConstants;
36  import org.kuali.rice.test.BaselineTestCase;
37  import org.kuali.rice.test.data.UnitTestData;
38  import org.kuali.rice.test.data.UnitTestSql;
39  
40  import java.io.Serializable;
41  import java.util.ArrayList;
42  import java.util.Arrays;
43  import java.util.Collections;
44  import java.util.HashMap;
45  import java.util.HashSet;
46  import java.util.List;
47  import java.util.Map;
48  import java.util.Set;
49  
50  import static org.junit.Assert.*;
51  import static org.junit.Assert.assertEquals;
52  
53  /**
54   * PessimisticLockServiceTest tests {@link PessimisticLockServiceImpl}
55   *
56   * @author Kuali Rice Team (rice.collab@kuali.org)
57   */
58  @BaselineTestCase.BaselineMode(BaselineTestCase.Mode.NONE)
59  public class PessimisticLockServiceTest extends KRADTestCase {
60  
61      String sessionId = "ad4d6c83-4d0f-4309-a528-c2f81ec00396";
62  
63      @Override
64      public void setUp() throws Exception {
65          super.setUp();
66          GlobalVariables.setUserSession(new UserSession("quickstart"));
67          GlobalVariables.getUserSession().setKualiSessionId(sessionId);
68      }
69  
70      /**
71       * tests deleting {@link PessimisticLock} objects. Tests that invalid deletes throw exceptions and valid
72       * deletes by owner users as well as lock admin users do work as expected
73       *
74       * @throws Exception
75       */
76      @UnitTestData(
77              sqlStatements = {
78                      @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
79                      @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '4f6bc9e2-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'employee', 'aa5d6c83-4d0f-4309-a528-c2f81ec00396')"),
80                      @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '5add9cba-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'frank', 'dd4d6c83-4d0f-4309-a528-c2f81ec00396')"),
81                      @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '69e42b8e-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-08-01'}, 'fred', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
82                      @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '76504650-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')")
83                      }
84              )
85      @Test
86      public void testDeleteLocks() throws Exception {
87      	
88          List<PessimisticLock> locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
89          assertEquals("Should be 4 locks in DB", 4, locks.size());
90  
91          String userId = "employee";
92          String[] lockIdsToVerify = new String[]{"1112", "1113"};
93          assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING,
94                  Collections.<String, String>emptyMap() ) );
95          verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
96          userId = "frank";
97          lockIdsToVerify = new String[]{"1111", "1113"};
98          assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
99          verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
100         userId = "fred";
101         lockIdsToVerify = new String[]{"1111", "1112"};
102         assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
103         verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
104 
105         verifyDelete("employee", Arrays.asList(new String[]{"1111"}), null, false);
106         verifyDelete("frank", Arrays.asList(new String[]{"1112"}), null, false);
107         verifyDelete("fred", Arrays.asList(new String[]{"1113"}), null, false);
108         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
109         assertEquals("Should be 1 lock left in DB", 1, locks.size());
110 
111         // test admin user can delete any lock
112         userId = "fran";
113         assertTrue("User " + userId + " should be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
114         userId = "admin";
115         assertTrue("User " + userId + " should be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
116         verifyDelete(userId, Arrays.asList(new String[]{"1114"}), null, false);
117         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
118         assertEquals("Should be 0 locks left in DB", 0, locks.size());
119     }
120 
121     /**
122      *  deletes the provided locks while checking for error conditions
123      *
124      * @param userId - the user id to use in creating a session
125      * @param lockIds - a list lock ids to delete
126      * @param expectedException - the expected exception's class
127      * @param expectException - true if an exception is expected on delete
128      * @see PessimisticLockService#delete(String)
129      * @throws WorkflowException
130      */
131     private void verifyDelete(String userId, List<String> lockIds, Class expectedException, boolean expectException) throws WorkflowException {
132         GlobalVariables.setUserSession(new UserSession(userId));
133         for (String lockId : lockIds) {
134             try {
135                 KRADServiceLocatorWeb.getPessimisticLockService().delete(lockId);
136                 if (expectException) {
137                     fail("Expected exception when deleting lock with id '" + lockId + "' for user '" + userId + "'");
138                 }
139             } catch (Exception e) {
140                 if (!expectException) {
141                     fail("Did not expect exception when deleting lock with id '" + lockId + "' for user '" + userId + "' but got exception of type '" + e.getClass().getName() + "'");
142                 }
143                 if (expectedException != null) {
144                     // if we have an expected exception
145                     if (!expectedException.isAssignableFrom(e.getClass())) {
146                         fail("Expected exception of type '" + expectedException.getName() + "' when deleting lock with id '" + lockId + "' for user '" + userId + "' but got exception of type '" + e.getClass().getName() + "'");
147                     }
148                 }
149             }
150         }
151     }
152 
153     /**
154      * tests the generation of new {@link PessimisticLock} objects
155      *
156      * @throws Exception
157      */
158     @Test
159     public void testGenerateNewLocks() throws Exception {
160         PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
161 
162         // test generating lock with no given lock descriptor
163         String documentNumber = "1243";
164         PessimisticLock lock = lockService.generateNewLock(documentNumber);
165         assertNotNull("Generated lock should have id", lock.getId());
166         assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
167         assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
168         assertEquals("Generated lock should have default lock descriptor", PessimisticLock.DEFAULT_LOCK_DESCRIPTOR,
169                 lock.getLockDescriptor());
170         assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
171         lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, lock.getId());
172         assertNotNull("Generated lock should be available from BO Service", lock);
173         assertNotNull("Generated lock should have id", lock.getId());
174         assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
175         assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
176         assertEquals("Generated lock should have default lock descriptor", PessimisticLock.DEFAULT_LOCK_DESCRIPTOR, lock.getLockDescriptor());
177         assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
178 
179         // test generating lock with given lock descriptor
180         documentNumber = "4321";
181         String lockDescriptor = "this is a test lock descriptor";
182         lock = lockService.generateNewLock(documentNumber, lockDescriptor);
183         assertNotNull("Generated lock should have id", lock.getId());
184         assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
185         assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
186         assertEquals("Generated lock should have lock descriptor set", lockDescriptor, lock.getLockDescriptor());
187         assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
188         lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, lock.getId());
189         assertNotNull("Generated lock should be available from BO Service", lock);
190         assertNotNull("Generated lock should have id", lock.getId());
191         assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
192         assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
193         assertEquals("Generated lock should have lock descriptor set", lockDescriptor, lock.getLockDescriptor());
194         assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
195     }
196 
197     /**
198      * tests retrieving {@link PessimisticLock} objects by document number
199      *
200      * @throws Exception
201      */
202     @UnitTestData(
203             sqlStatements = {
204                     @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
205                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, 'fbcb0362-7dfb-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'aa5d6c83-4d0f-4309-a528-c2f81ec00396')"),
206                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '055bef4a-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-10-01'}, 'frank', 'dd5d6c83-4d0f-4309-a528-c2f81ec00396')"),
207                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '0e0144ec-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'frank', 'dd5d6c83-4d0f-4309-a528-c2f81ec00396')"),
208                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '1891526c-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'ab4d6c83-4d0f-4309-a528-c2f81ec00396')")
209                     }
210             )
211     @Test
212     public void testGetPessimisticLocksForDocument() throws Exception {
213         PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
214         String docId = "1234";
215         assertEquals("Document " + docId + " expected lock count incorrect", 1, lockService.getPessimisticLocksForDocument(docId).size());
216         docId = "1237";
217         assertEquals("Document " + docId + " expected lock count incorrect", 2, lockService.getPessimisticLocksForDocument(docId).size());
218         docId = "1236";
219         assertEquals("Document " + docId + " expected lock count incorrect", 1, lockService.getPessimisticLocksForDocument(docId).size());
220         docId = "3948";
221         assertEquals("Document " + docId + " expected lock count incorrect", 0, lockService.getPessimisticLocksForDocument(docId).size());
222     }
223 
224     /**
225      * This method tests retrieving {@link PessimisticLock} objects by session id
226      *
227      * @throws Exception
228      */
229     @UnitTestData(
230             sqlStatements = {
231                     @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
232                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '24c40cd2-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
233                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '32602e8e-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'fran', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
234                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '3acfc1ce-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
235                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '463cc642-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fran', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')")
236             }
237     )
238     @Test
239     public void testGetPessimisticLocksForSession() throws Exception {
240         List<PessimisticLock> locks = KRADServiceLocatorWeb.getPessimisticLockService().getPessimisticLocksForSession(sessionId);
241         assertEquals("Should return 2 locks for session " + sessionId, 2, locks.size());
242 
243         ArrayList<String> documentNumbers = new ArrayList<String>();
244         for (PessimisticLock lock : locks) {
245             documentNumbers.add(lock.getDocumentNumber());
246         }
247         assertTrue("Locks should contain a lock for document number 1234 but contained " + documentNumbers, documentNumbers.contains("1234"));
248         assertTrue("Locks should contain a lock for document number 1236 but contained " + documentNumbers, documentNumbers.contains("1236"));
249     }
250 
251     /**
252      * This method tests releasing {@link PessimisticLock} objects for a specific user
253      *
254      * @throws Exception
255      */
256     @UnitTestData(
257             sqlStatements = {
258                     @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
259                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '24c40cd2-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
260                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '32602e8e-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
261                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '3acfc1ce-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
262                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '463cc642-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'dd5d6c66-4d0f-4309-a528-c2f81ec00396')"),
263                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1115, '4e66c4b2-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
264                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1116, '55d99b02-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1235', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
265                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1117, '5e47fb26-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1236', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
266                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1118, '65c366d8-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1237', {d '2007-08-01'}, 'fred', 'dd5d6c66-4d0f-4309-a528-c2f81ec00396')")
267                     }
268             )
269     @Test
270     public void testReleaseAllLocksForUser() throws Exception {
271         String lockDescriptor = "Temporary Lock";
272         List<PessimisticLock> locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
273         assertEquals("Should be 8 manually inserted locks", 8, locks.size());
274 
275         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fran"), lockDescriptor);
276         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
277         assertEquals("Should be 7 locks left after releasing locks for fran using lock descriptor " + lockDescriptor, 7, locks.size());
278 
279         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("frank"), lockDescriptor);
280         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
281         assertEquals("Should be 5 locks left after releasing locks for fran and frank using lock descriptor " + lockDescriptor, 5, locks.size());
282 
283         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fred"), lockDescriptor);
284         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
285         assertEquals("Should be 4 locks left after releasing locks for fran, frank, and fred using lock descriptor " + lockDescriptor, 4, locks.size());
286 
287         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fran"));
288         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
289         assertEquals("Should be 3 locks left after releasing locks for fran with no lock descriptor", 3, locks.size());
290 
291         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("frank"));
292         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
293         assertEquals("Should be 1 lock left after releasing locks for fran and frank with no lock descriptor", 1, locks.size());
294 
295         KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fred"));
296         locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
297         assertEquals("Should be no locks left after releasing locks for fran, frank, and fred with no lock descriptor", 0, locks.size());
298     }
299 
300     /**
301      * tests saving {@link PessimisticLock} objects
302      *
303      * @throws Exception
304      */
305     @UnitTestData(
306             sqlStatements = {
307                     @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
308                     @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '73f340de-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')")
309                     }
310             )
311     @Test
312     public void testSaveLock() throws Exception {
313         String lockDescriptor = "new test lock descriptor";
314         // get existing lock and update lock descriptor and save
315         PessimisticLock lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, 1111L);
316         lock.setLockDescriptor(lockDescriptor);
317         KRADServiceLocatorWeb.getPessimisticLockService().save(lock);
318 
319         // verify retrieved lock has lock descriptor set previously
320         PessimisticLock savedLock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, 1111L);
321         assertEquals("Lock descriptor is not correct from lock that was saved", lockDescriptor, savedLock.getLockDescriptor());
322     }
323 
324     /**
325      * Tests the {@link org.kuali.rice.krad.service.PessimisticLockService.establishPessimisticLocks} method.
326      *
327      * @throws Exception
328      */
329     @Test
330     public void testEstablishPessimisticLocks() throws Exception {
331         PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
332         AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
333 
334         assertTrue("The AccountRequestDocument should be using pessimistic locking",
335                 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
336 
337         // Have "quickstart" establish a pessimistic lock on the account request document.
338         UserSession quickstartSession = new UserSession("quickstart");
339         boolean canEdit = lockService.establishPessimisticLocks(accountDoc, quickstartSession.getPerson(), true);
340 
341         // Check that "quickstart" has the only pessimistic lock
342         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
343         PessimisticLock quickstartPessimisticLock = accountDoc.getPessimisticLocks().get(0);
344         assertTrue("quickstart pessimistic lock was not established", quickstartPessimisticLock.isOwnedByUser(quickstartSession.getPerson()));
345 
346         // Check that "quickstart" has edit permissions
347         assertTrue("quickstart cannot edit", canEdit);
348 
349         // Have "admin" attempt to erroneously establish a pessimistic lock on the account request document.
350         UserSession adminSession = new UserSession("admin");
351         canEdit = lockService.establishPessimisticLocks(accountDoc, adminSession.getPerson(), true);
352 
353         // Check that "admin" cannot establish a lock when one is already in place.
354         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
355         PessimisticLock adminPessimisticLock = accountDoc.getPessimisticLocks().get(0);
356         assertFalse("admin pessimistic lock was established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
357 
358         // Check that "admin" does not have edit permissions
359         assertFalse("admin can edit", canEdit);
360 
361         // Have "quickstart" attempt to erroneously establish a second pessimistic lock on the account request document.
362         canEdit = lockService.establishPessimisticLocks(accountDoc, quickstartSession.getPerson(), true);
363 
364         // Check that there is still only one pessimistic lock established
365         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
366 
367         // Check that "quickstart" has edit permissions
368         assertTrue("quickstart cannot edit", canEdit);
369     }
370 
371     @Test
372     public void testCustomLockDescriptors() throws Exception {
373         PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
374         AccountRequestDocument2 accountDoc2 = (AccountRequestDocument2) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest2");
375 
376         assertTrue("The AccountRequestDocument2 should be using pessimistic locking",
377                 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc2.getClass().getName()).getUsePessimisticLocking());
378         assertTrue("The AccountRequestDocument2 should be using custom lock descriptors", accountDoc2.useCustomLockDescriptors());
379 
380         String LOCK_KEY = AccountRequestDocument2.ACCT_REQ_DOC_2_EDITABLE_FIELDS;
381 
382         // Have "quickstart" establish a pessimistic lock on the document by using a custom lock descriptor that only locks part of the document.
383         UserSession quickstartSession = new UserSession("quickstart");
384         GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_ALL_BUT_REASONS);
385         String quickstartLockDescriptor = accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
386         assertNotNull("The document should have generated a custom lock descriptor", quickstartLockDescriptor);
387         boolean canQuickstartEdit = lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
388 
389         // Check that "quickstart" has the only pessimistic lock
390         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc2.getPessimisticLocks().size());
391         PessimisticLock quickstartPessimisticLock = accountDoc2.getPessimisticLocks().get(0);
392         assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, quickstartPessimisticLock.getLockDescriptor());
393 
394         // Check that "quickstart" has edit permissions
395         assertTrue("quickstart cannot edit", canQuickstartEdit);
396 
397         // Have "admin" erroneously try to establish a lock using the same lock descriptor.
398         UserSession adminSession = new UserSession("admin");
399         GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_ALL_BUT_REASONS);
400         String adminLockDescriptor = accountDoc2.getCustomLockDescriptor(adminSession.getPerson());
401         assertNotNull("The document should have generated a custom lock descriptor", adminLockDescriptor);
402         assertEquals("Different lock descriptor generated for admin", quickstartLockDescriptor, adminLockDescriptor);
403         boolean canAdminEdit = lockService.establishPessimisticLocks(accountDoc2, adminSession.getPerson(), true);
404 
405         // Check that "admin" cannot establish a lock when one is already in place.
406         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc2.getPessimisticLocks().size());
407         PessimisticLock adminPessimisticLock = accountDoc2.getPessimisticLocks().get(0);
408         assertFalse("admin pessimistic lock was established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
409 
410         // Check that "admin" does not have edit permissions
411         assertFalse("admin can edit", canAdminEdit);
412 
413         // Have "admin" establish a lock that has a different lock descriptor.
414         GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
415         adminLockDescriptor = accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
416         assertNotNull("The document should have generated a custom lock descriptor", adminLockDescriptor);
417         assertNotEquals("Same lock descriptor generated for admin", quickstartLockDescriptor, adminLockDescriptor);
418         canAdminEdit = lockService.establishPessimisticLocks(accountDoc2, adminSession.getPerson(), true);
419 
420         // Check that "quickstart" and "admin" have the only pessimistic locks
421         assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
422         for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
423             if (pessimisticLock.isOwnedByUser(quickstartSession.getPerson())) {
424                 assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, pessimisticLock.getLockDescriptor());
425             } else if (pessimisticLock.isOwnedByUser(adminSession.getPerson())) {
426                 assertEquals("admin pessimistic lock was established with wrong lock descriptor", adminLockDescriptor, pessimisticLock.getLockDescriptor());
427             }
428         }
429 
430         // Check that "admin" has edit permissions
431         assertTrue("admin cannot edit", canAdminEdit);
432 
433         // Have "quickstart" erroneously try to acquire the lock owned by "admin"
434         GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
435         lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
436 
437         // Check that "quickstart" and "admin" have the only pessimistic locks
438         assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
439         for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
440             if (pessimisticLock.isOwnedByUser(quickstartSession.getPerson())) {
441                 assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, pessimisticLock.getLockDescriptor());
442             } else if (pessimisticLock.isOwnedByUser(adminSession.getPerson())) {
443                 assertEquals("admin pessimistic lock was established with wrong lock descriptor", adminLockDescriptor, pessimisticLock.getLockDescriptor());
444             }
445         }
446 
447         // Release all locks for "admin" and have "quickstart" obtain it
448         lockService.releaseAllLocksForUser(accountDoc2.getPessimisticLocks(), adminSession.getPerson(), adminLockDescriptor);
449         accountDoc2.refreshPessimisticLocks();
450         GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
451         accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
452         lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
453 
454         // Check that "quickstart" has the only pessimistic locks
455         assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
456         for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
457             assertTrue("quickstart pessimistic lock was not established", pessimisticLock.isOwnedByUser(quickstartSession.getPerson()));
458         }
459 
460         // Release all the locks when done.
461         GlobalVariables.getUserSession().removeObject(LOCK_KEY);
462         lockService.releaseAllLocksForUser(accountDoc2.getPessimisticLocks(), quickstartSession.getPerson());
463         accountDoc2.refreshPessimisticLocks();
464         assertTrue("There is a pessimistic lock established", accountDoc2.getPessimisticLocks().isEmpty());
465     }
466     
467     /**
468      * tests the PessimisticLockService.establishLocks method and the PessimisticLockService.getDocumentActions method
469      * 
470      * @throws Exception
471      */
472     @Test
473     @Deprecated
474     public void testEstablishLocks() throws Exception {
475     	PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
476     	AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
477     	
478     	assertTrue("The AccountRequestDocument should be using pessimistic locking",
479     			KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
480     	
481     	// Have "quickstart" establish a pessimistic lock on the account request document.
482     	UserSession quickstartSession = new UserSession("quickstart");
483     	Person[] quickstartPerson = { quickstartSession.getPerson() };
484     	Map<String,String> editMode = new HashMap<String,String>();
485     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
486     	Map <?,?> finalModes = lockService.establishLocks(accountDoc, editMode, quickstartSession.getPerson());
487     	
488     	// Verify that the lock was actually established.
489     	assertCorrectLocksAreInPlace(true, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
490     	
491     	// Now check to make sure that a different user (such as "admin") cannot save, route, cancel, or blanket approve the document.
492     	UserSession adminSession = new UserSession("admin");
493     	Set<String> documentActions = new HashSet<String>(Arrays.asList(new String[] { KRADConstants.KUALI_ACTION_CAN_CANCEL,
494     			KRADConstants.KUALI_ACTION_CAN_SAVE, KRADConstants.KUALI_ACTION_CAN_ROUTE, KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE }));
495     	Set<?> finalActions = lockService.getDocumentActions(accountDoc, adminSession.getPerson(), documentActions);
496     	assertFalse("'admin' should not be able to cancel the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_CANCEL));
497     	assertFalse("'admin' should not be able to save the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_SAVE));
498     	assertFalse("'admin' should not be able to route the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_ROUTE));
499     	assertFalse("'admin' should not be able to blanket approve the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE));
500     	
501     	// Verify that "quickstart" can save, route, and cancel the document since he is the owner of the lock.
502     	documentActions = new HashSet<String>(Arrays.asList(new String[] {
503     			KRADConstants.KUALI_ACTION_CAN_CANCEL, KRADConstants.KUALI_ACTION_CAN_SAVE, KRADConstants.KUALI_ACTION_CAN_ROUTE }));
504     	finalActions = lockService.getDocumentActions(accountDoc, quickstartSession.getPerson(), documentActions);
505     	assertTrue("'quickstart' should have had cancel privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_CANCEL));
506     	assertTrue("'quickstart' should have had save privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_SAVE));
507     	assertTrue("'quickstart' should have had route privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_ROUTE));
508     	
509     	// Check that "admin" cannot establish a lock when one is already in place.
510     	editMode = new HashMap<String,String>();
511     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
512     	finalModes = lockService.establishLocks(accountDoc, editMode, adminSession.getPerson());
513     	assertCorrectLocksAreInPlace(false, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
514     	
515     	// Make sure that "quickstart" cannot create a second lock if custom lock descriptors are not in use.
516     	editMode = new HashMap<String,String>();
517     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
518     	finalModes = lockService.establishLocks(accountDoc, editMode, quickstartSession.getPerson());
519     	assertCorrectLocksAreInPlace(true, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
520 
521         // Release lock for "quickstart" for additional testing
522         lockService.releaseAllLocksForUser(accountDoc.getPessimisticLocks(), quickstartSession.getPerson());
523         accountDoc.refreshPessimisticLocks();
524 
525         // Have the system user create a workflow pessimistic lock.
526         UserSession systemSession = new UserSession(KRADConstants.SYSTEM_USER);
527         Person[] systemPerson = { systemSession.getPerson() };
528         lockService.establishWorkflowPessimisticLocking(accountDoc);
529         assertCorrectLocksAreInPlace(false, null, 1, accountDoc.getPessimisticLocks(), systemPerson, null);
530 
531         // Make sure that no other users can lock when the workflow lock is in place.
532         editMode = new HashMap<String,String>();
533         editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
534         finalModes = lockService.establishLocks(accountDoc, editMode, adminSession.getPerson());
535         assertCorrectLocksAreInPlace(false, finalModes, 1, accountDoc.getPessimisticLocks(), systemPerson, null);
536 
537         // Ensure that workflow pessimistic locks can also be released.
538         lockService.releaseWorkflowPessimisticLocking(accountDoc);
539         assertTrue("There should not be any pessimistic locks present on the document", accountDoc.getPessimisticLocks().isEmpty());
540     }
541 
542     /**
543      * Tests the {@link org.kuali.rice.krad.service.PessimisticLockService.establishWorkflowPessimisticLocking} method.
544      *
545      * @throws Exception
546      */
547     @Test
548     public void testWorkflowPessimisticLocking() throws Exception {
549     	PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
550     	AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
551     	assertTrue("The AccountRequestDocument should be using pessimistic locking",
552     			KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
553     	
554     	// Have the system user establish a pessimistic lock on the account request document.
555     	UserSession systemSession = new UserSession(KRADConstants.SYSTEM_USER);
556     	lockService.establishWorkflowPessimisticLocking(accountDoc);
557 
558         // Check that the system user has the only pessimistic lock
559         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
560         PessimisticLock krPessimisticLock = accountDoc.getPessimisticLocks().get(0);
561         assertTrue("kr pessimistic lock was not established", krPessimisticLock.isOwnedByUser(systemSession.getPerson()));
562 
563         // Have "admin" attempt to erroneously establish a pessimistic lock on the account request document.
564         UserSession adminSession = new UserSession("admin");
565         lockService.establishPessimisticLocks(accountDoc, adminSession.getPerson(), true);
566 
567         // Check that "admin" cannot establish a lock when one is already in place.
568         assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
569         PessimisticLock adminPessimisticLock = accountDoc.getPessimisticLocks().get(0);
570         assertFalse("admin pessimistic lock was not established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
571        	
572        	// Ensure that workflow pessimistic locks can also be released.
573        	lockService.releaseWorkflowPessimisticLocking(accountDoc);
574        	assertTrue("There is a pessimistic lock established", accountDoc.getPessimisticLocks().isEmpty());
575     }
576     
577     /**
578      * tests the PessimisticLockService's ability to establish pessimistic locks for documents supporting custom lock descriptors
579      * 
580      * @throws Exception
581      */
582     @Test
583     @Deprecated
584     public void testPessimisticLockingWithCustomDocumentLockDescriptors() throws Exception {
585        	AccountRequestDocument2 accountDoc2 = (AccountRequestDocument2) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest2");
586        	assertTrue("The AccountRequestDocument2 should be using pessimistic locking", KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary(
587        			).getDocumentEntry(accountDoc2.getClass().getName()).getUsePessimisticLocking());
588        	assertTrue("The AccountRequestDocument2 should be using custom lock descriptors", accountDoc2.useCustomLockDescriptors());
589        	
590        	// Perform the custom lock descriptor unit testing operations.
591        	assertCustomLockDescriptorsAreWorking(accountDoc2, AccountRequestDocument2.ACCT_REQ_DOC_2_EDITABLE_FIELDS,
592        			AccountRequestDocument2.EDIT_ALL_BUT_REASONS, AccountRequestDocument2.EDIT_REASONS_ONLY);
593     }
594 
595     /**
596      * A convenience method for testing the custom lock descriptors of documents (and on the maintainables of maintenance documents).
597      * 
598      * @param testDoc The document to test pessimistic locking on (or the maintenance document with maintainables to test on).
599      * @param LOCK_KEY The UserSession object key to use for storing the lock descriptor's key.
600      * @param LOCK_VALUE1 One possible object to store in a UserSession for generating lock descriptors on the testDoc.
601      * @param LOCK_VALUE2 Another possible object to store in a UserSession for generating lock descriptors on the testDoc.
602      * 
603      * @throws Exception
604      */
605     private void assertCustomLockDescriptorsAreWorking(Document testDoc, final String LOCK_KEY, final Serializable LOCK_VALUE1,
606     		final Serializable LOCK_VALUE2) throws Exception {
607     	PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
608     	
609     	// Have "quickstart" establish a pessimistic lock on the document by using a custom lock descriptor that only locks part of the document.
610        	UserSession quickstartSession = new UserSession("quickstart");
611        	Person[] allPersons = { quickstartSession.getPerson(), null };
612     	Map<String,String> editMode = new HashMap<String,String>();
613     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
614     	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
615     	String[] allDescriptors = { testDoc.getCustomLockDescriptor(quickstartSession.getPerson()), null };
616    		assertNotNull("The document should have generated a custom lock descriptor", allDescriptors[0]);
617     	Map <?,?> finalModes = lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
618     	
619     	// Verify that the lock was actually established and that the expected custom lock descriptor was used.
620     	assertCorrectLocksAreInPlace(true, finalModes, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
621     	
622     	// Attempt to establish the same lock again, which should change nothing since "quickstart" already has the lock.
623     	editMode = new HashMap<String,String>();
624     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
625     	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
626     	lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
627     	assertCorrectLocksAreInPlace(false, null, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
628     	
629     	// Now check to make sure that a different user (such as "admin") cannot establish a lock using the same lock descriptor.
630     	UserSession adminSession = new UserSession("admin");
631     	editMode = new HashMap<String,String>();
632     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
633        	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
634     	assertEquals("The document should have generated the same lock descriptors for both 'quickstart' and 'admin'",
635     			allDescriptors[0], testDoc.getCustomLockDescriptor(adminSession.getPerson()));
636     	finalModes = lockService.establishLocks(testDoc, editMode, adminSession.getPerson());
637     	assertCorrectLocksAreInPlace(false, finalModes, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
638     	
639     	// Ensure that "admin" can establish a lock that has a different lock descriptor.
640     	allPersons[1] = adminSession.getPerson();
641     	editMode = new HashMap<String,String>();
642     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
643     	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
644     	allDescriptors[1] = testDoc.getCustomLockDescriptor(adminSession.getPerson());
645     	assertNotNull("The document should have generated a custom lock descriptor", allDescriptors[1]);
646     	assertNotSame("'quickstart' and 'admin' should have different custom lock descriptors now", allDescriptors[0], allDescriptors[1]);
647     	finalModes = lockService.establishLocks(testDoc, editMode, adminSession.getPerson());
648     	assertCorrectLocksAreInPlace(true, finalModes, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
649     	
650     	// Verify that "quickstart" cannot acquire the lock owned by "admin".
651     	editMode = new HashMap<String,String>();
652     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
653     	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
654     	lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
655     	assertCorrectLocksAreInPlace(false, null, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
656     	
657     	// After "admin" releases his lock, check to make sure that "quickstart" can now acquire it.
658     	lockService.releaseAllLocksForUser(testDoc.getPessimisticLocks(), allPersons[1], allDescriptors[1]);
659     	testDoc.refreshPessimisticLocks();
660     	assertCorrectLocksAreInPlace(false, null, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
661     	allPersons[1] = allPersons[0];
662     	editMode = new HashMap<String,String>();
663     	editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
664     	GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
665     	finalModes = lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
666     	assertCorrectLocksAreInPlace(true, finalModes, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
667     	
668     	// Release all the locks when done.
669     	GlobalVariables.getUserSession().removeObject(LOCK_KEY);
670     	lockService.releaseAllLocksForUser(testDoc.getPessimisticLocks(), allPersons[0]);
671     	testDoc.refreshPessimisticLocks();
672     	assertTrue("There should not be any pessimistic locks present on the document", testDoc.getPessimisticLocks().isEmpty());
673     }
674     
675     /**
676      * A convenience method for checking to ensure that the proper pessimistic locks are in place.
677      * 
678      * @param latestUserHasFullEntry Indicates if the map returned by PessimisticLockService.establishLocks should have a true "fullEntry" parameter.
679      * @param finalModes The map returned by the call to PessimisticLockService.establishLocks. This parameter can be null if checking it is not needed.
680      * @param expectedLockQuantity The expected number of pessimistic locks.
681      * @param pessimisticLocks The list of pessimistic locks to check for proper quantity and proper state.
682      * @param expectedOwners The users who are expected to own the corresponding locks in the previous list.
683      * @param expectedDescriptors The expected lock descriptors for the corresponding locks in the other list. This parameter can be set to null if
684      * the pessimistic locks are not using custom lock descriptors or if custom lock descriptors are not the concern of the test.
685      * @throws Exception
686      */
687     private void assertCorrectLocksAreInPlace(boolean latestUserHasFullEntry, Map<?,?> finalModes, int expectedLockQuantity,
688     		List<PessimisticLock> pessimisticLocks, Person[] expectedOwners, String[] expectedDescriptors) throws Exception {
689     	// Ensure that the last user to attempt to establish locks has the expected finalModes entry (or lack of it).
690     	if (finalModes != null) {
691     		assertEquals("The last user that tried to establish locks does not have the expected status on their full entry privileges",
692     				latestUserHasFullEntry, StringUtils.equalsIgnoreCase(KRADConstants.KUALI_DEFAULT_TRUE_VALUE, (String)(finalModes.get(
693                     AuthorizationConstants.EditMode.FULL_ENTRY))));
694     	}
695     	// Ensure that the expected number of locks are present.
696     	assertEquals("The wrong number of pessimistic locks are in place", expectedLockQuantity, pessimisticLocks.size());
697     	// Verify that each lock has the expected owners.
698     	for (int i = pessimisticLocks.size() - 1; i > -1; i--) {
699     		assertTrue("The lock at index " + i + " did not have the expected owner of " + expectedOwners[i].getPrincipalName(),
700     			pessimisticLocks.get(i).isOwnedByUser(expectedOwners[i]));
701     		if (expectedDescriptors != null) {
702     			assertTrue("The lock at index " + i + " did not have the expected lock descriptor of " + expectedDescriptors[i],
703     					pessimisticLocks.get(i).getLockDescriptor().equals(expectedDescriptors[i]));
704     		}
705     	}
706     }
707 }