1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16 package org.kuali.rice.krad.service;
17
18 import org.apache.commons.lang.StringUtils;
19 import org.junit.Test;
20 import org.kuali.rice.core.api.criteria.QueryByCriteria;
21 import org.kuali.rice.kew.api.exception.WorkflowException;
22 import org.kuali.rice.kim.api.KimConstants.PermissionNames;
23 import org.kuali.rice.kim.api.identity.Person;
24 import org.kuali.rice.kim.api.services.KimApiServiceLocator;
25 import org.kuali.rice.kns.authorization.AuthorizationConstants;
26 import org.kuali.rice.krad.UserSession;
27 import org.kuali.rice.krad.document.Document;
28 import org.kuali.rice.krad.document.authorization.PessimisticLock;
29 import org.kuali.rice.krad.exception.AuthorizationException;
30 import org.kuali.rice.krad.service.impl.PessimisticLockServiceImpl;
31 import org.kuali.rice.krad.test.KRADTestCase;
32 import org.kuali.rice.krad.test.document.AccountRequestDocument;
33 import org.kuali.rice.krad.test.document.AccountRequestDocument2;
34 import org.kuali.rice.krad.util.GlobalVariables;
35 import org.kuali.rice.krad.util.KRADConstants;
36 import org.kuali.rice.test.BaselineTestCase;
37 import org.kuali.rice.test.data.UnitTestData;
38 import org.kuali.rice.test.data.UnitTestSql;
39
40 import java.io.Serializable;
41 import java.util.ArrayList;
42 import java.util.Arrays;
43 import java.util.Collections;
44 import java.util.HashMap;
45 import java.util.HashSet;
46 import java.util.List;
47 import java.util.Map;
48 import java.util.Set;
49
50 import static org.junit.Assert.*;
51 import static org.junit.Assert.assertEquals;
52
53
54
55
56
57
58 @BaselineTestCase.BaselineMode(BaselineTestCase.Mode.NONE)
59 public class PessimisticLockServiceTest extends KRADTestCase {
60
61 String sessionId = "ad4d6c83-4d0f-4309-a528-c2f81ec00396";
62
63 @Override
64 public void setUp() throws Exception {
65 super.setUp();
66 GlobalVariables.setUserSession(new UserSession("quickstart"));
67 GlobalVariables.getUserSession().setKualiSessionId(sessionId);
68 }
69
70
71
72
73
74
75
76 @UnitTestData(
77 sqlStatements = {
78 @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
79 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '4f6bc9e2-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'employee', 'aa5d6c83-4d0f-4309-a528-c2f81ec00396')"),
80 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '5add9cba-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'frank', 'dd4d6c83-4d0f-4309-a528-c2f81ec00396')"),
81 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '69e42b8e-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-08-01'}, 'fred', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
82 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '76504650-7df8-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')")
83 }
84 )
85 @Test
86 public void testDeleteLocks() throws Exception {
87
88 List<PessimisticLock> locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
89 assertEquals("Should be 4 locks in DB", 4, locks.size());
90
91 String userId = "employee";
92 String[] lockIdsToVerify = new String[]{"1112", "1113"};
93 assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING,
94 Collections.<String, String>emptyMap() ) );
95 verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
96 userId = "frank";
97 lockIdsToVerify = new String[]{"1111", "1113"};
98 assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
99 verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
100 userId = "fred";
101 lockIdsToVerify = new String[]{"1111", "1112"};
102 assertFalse("User " + userId + " should not be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
103 verifyDelete(userId, Arrays.asList(lockIdsToVerify), AuthorizationException.class, true);
104
105 verifyDelete("employee", Arrays.asList(new String[]{"1111"}), null, false);
106 verifyDelete("frank", Arrays.asList(new String[]{"1112"}), null, false);
107 verifyDelete("fred", Arrays.asList(new String[]{"1113"}), null, false);
108 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
109 assertEquals("Should be 1 lock left in DB", 1, locks.size());
110
111
112 userId = "fran";
113 assertTrue("User " + userId + " should be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
114 userId = "admin";
115 assertTrue("User " + userId + " should be member of pessimistic lock admin permission", KimApiServiceLocator.getPermissionService().isAuthorized(new UserSession(userId).getPerson().getPrincipalId(), KRADConstants.KNS_NAMESPACE, PermissionNames.ADMIN_PESSIMISTIC_LOCKING, Collections.<String, String>emptyMap() ) );
116 verifyDelete(userId, Arrays.asList(new String[]{"1114"}), null, false);
117 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
118 assertEquals("Should be 0 locks left in DB", 0, locks.size());
119 }
120
121
122
123
124
125
126
127
128
129
130
131 private void verifyDelete(String userId, List<String> lockIds, Class expectedException, boolean expectException) throws WorkflowException {
132 GlobalVariables.setUserSession(new UserSession(userId));
133 for (String lockId : lockIds) {
134 try {
135 KRADServiceLocatorWeb.getPessimisticLockService().delete(lockId);
136 if (expectException) {
137 fail("Expected exception when deleting lock with id '" + lockId + "' for user '" + userId + "'");
138 }
139 } catch (Exception e) {
140 if (!expectException) {
141 fail("Did not expect exception when deleting lock with id '" + lockId + "' for user '" + userId + "' but got exception of type '" + e.getClass().getName() + "'");
142 }
143 if (expectedException != null) {
144
145 if (!expectedException.isAssignableFrom(e.getClass())) {
146 fail("Expected exception of type '" + expectedException.getName() + "' when deleting lock with id '" + lockId + "' for user '" + userId + "' but got exception of type '" + e.getClass().getName() + "'");
147 }
148 }
149 }
150 }
151 }
152
153
154
155
156
157
158 @Test
159 public void testGenerateNewLocks() throws Exception {
160 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
161
162
163 String documentNumber = "1243";
164 PessimisticLock lock = lockService.generateNewLock(documentNumber);
165 assertNotNull("Generated lock should have id", lock.getId());
166 assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
167 assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
168 assertEquals("Generated lock should have default lock descriptor", PessimisticLock.DEFAULT_LOCK_DESCRIPTOR,
169 lock.getLockDescriptor());
170 assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
171 lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, lock.getId());
172 assertNotNull("Generated lock should be available from BO Service", lock);
173 assertNotNull("Generated lock should have id", lock.getId());
174 assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
175 assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
176 assertEquals("Generated lock should have default lock descriptor", PessimisticLock.DEFAULT_LOCK_DESCRIPTOR, lock.getLockDescriptor());
177 assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
178
179
180 documentNumber = "4321";
181 String lockDescriptor = "this is a test lock descriptor";
182 lock = lockService.generateNewLock(documentNumber, lockDescriptor);
183 assertNotNull("Generated lock should have id", lock.getId());
184 assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
185 assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
186 assertEquals("Generated lock should have lock descriptor set", lockDescriptor, lock.getLockDescriptor());
187 assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
188 lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, lock.getId());
189 assertNotNull("Generated lock should be available from BO Service", lock);
190 assertNotNull("Generated lock should have id", lock.getId());
191 assertEquals("Document Number should match", documentNumber, lock.getDocumentNumber());
192 assertNotNull("Generated lock should have a generated timestamp ", lock.getGeneratedTimestamp());
193 assertEquals("Generated lock should have lock descriptor set", lockDescriptor, lock.getLockDescriptor());
194 assertEquals("Generated lock should be owned by current user", GlobalVariables.getUserSession().getPerson().getPrincipalName(), lock.getOwnedByUser().getPrincipalName());
195 }
196
197
198
199
200
201
202 @UnitTestData(
203 sqlStatements = {
204 @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
205 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, 'fbcb0362-7dfb-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'aa5d6c83-4d0f-4309-a528-c2f81ec00396')"),
206 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '055bef4a-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-10-01'}, 'frank', 'dd5d6c83-4d0f-4309-a528-c2f81ec00396')"),
207 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '0e0144ec-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'frank', 'dd5d6c83-4d0f-4309-a528-c2f81ec00396')"),
208 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '1891526c-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'ab4d6c83-4d0f-4309-a528-c2f81ec00396')")
209 }
210 )
211 @Test
212 public void testGetPessimisticLocksForDocument() throws Exception {
213 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
214 String docId = "1234";
215 assertEquals("Document " + docId + " expected lock count incorrect", 1, lockService.getPessimisticLocksForDocument(docId).size());
216 docId = "1237";
217 assertEquals("Document " + docId + " expected lock count incorrect", 2, lockService.getPessimisticLocksForDocument(docId).size());
218 docId = "1236";
219 assertEquals("Document " + docId + " expected lock count incorrect", 1, lockService.getPessimisticLocksForDocument(docId).size());
220 docId = "3948";
221 assertEquals("Document " + docId + " expected lock count incorrect", 0, lockService.getPessimisticLocksForDocument(docId).size());
222 }
223
224
225
226
227
228
229 @UnitTestData(
230 sqlStatements = {
231 @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
232 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '24c40cd2-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
233 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '32602e8e-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'fran', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
234 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '3acfc1ce-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
235 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '463cc642-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fran', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')")
236 }
237 )
238 @Test
239 public void testGetPessimisticLocksForSession() throws Exception {
240 List<PessimisticLock> locks = KRADServiceLocatorWeb.getPessimisticLockService().getPessimisticLocksForSession(sessionId);
241 assertEquals("Should return 2 locks for session " + sessionId, 2, locks.size());
242
243 ArrayList<String> documentNumbers = new ArrayList<String>();
244 for (PessimisticLock lock : locks) {
245 documentNumbers.add(lock.getDocumentNumber());
246 }
247 assertTrue("Locks should contain a lock for document number 1234 but contained " + documentNumbers, documentNumbers.contains("1234"));
248 assertTrue("Locks should contain a lock for document number 1236 but contained " + documentNumbers, documentNumbers.contains("1236"));
249 }
250
251
252
253
254
255
256 @UnitTestData(
257 sqlStatements = {
258 @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
259 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '24c40cd2-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
260 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1112, '32602e8e-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1235', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
261 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1113, '3acfc1ce-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1236', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
262 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1114, '463cc642-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1237', {d '2007-08-01'}, 'fred', 'dd5d6c66-4d0f-4309-a528-c2f81ec00396')"),
263 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1115, '4e66c4b2-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')"),
264 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1116, '55d99b02-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1235', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
265 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1117, '5e47fb26-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1236', {d '2007-10-01'}, 'frank', 'bc5d6c66-4d0f-4309-a528-c2f81ec00396')"),
266 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1118, '65c366d8-7dfc-102c-97b6-ed716fdaf540', 0, 'Temporary Lock', '1237', {d '2007-08-01'}, 'fred', 'dd5d6c66-4d0f-4309-a528-c2f81ec00396')")
267 }
268 )
269 @Test
270 public void testReleaseAllLocksForUser() throws Exception {
271 String lockDescriptor = "Temporary Lock";
272 List<PessimisticLock> locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
273 assertEquals("Should be 8 manually inserted locks", 8, locks.size());
274
275 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fran"), lockDescriptor);
276 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
277 assertEquals("Should be 7 locks left after releasing locks for fran using lock descriptor " + lockDescriptor, 7, locks.size());
278
279 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("frank"), lockDescriptor);
280 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
281 assertEquals("Should be 5 locks left after releasing locks for fran and frank using lock descriptor " + lockDescriptor, 5, locks.size());
282
283 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fred"), lockDescriptor);
284 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
285 assertEquals("Should be 4 locks left after releasing locks for fran, frank, and fred using lock descriptor " + lockDescriptor, 4, locks.size());
286
287 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fran"));
288 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
289 assertEquals("Should be 3 locks left after releasing locks for fran with no lock descriptor", 3, locks.size());
290
291 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("frank"));
292 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
293 assertEquals("Should be 1 lock left after releasing locks for fran and frank with no lock descriptor", 1, locks.size());
294
295 KRADServiceLocatorWeb.getPessimisticLockService().releaseAllLocksForUser(locks, KimApiServiceLocator.getPersonService().getPerson("fred"));
296 locks = KRADServiceLocator.getDataObjectService().findMatching(PessimisticLock.class, QueryByCriteria.Builder.create().build()).getResults();
297 assertEquals("Should be no locks left after releasing locks for fran, frank, and fred with no lock descriptor", 0, locks.size());
298 }
299
300
301
302
303
304
305 @UnitTestData(
306 sqlStatements = {
307 @UnitTestSql("DELETE FROM KRNS_PESSIMISTIC_LOCK_T"),
308 @UnitTestSql("INSERT INTO KRNS_PESSIMISTIC_LOCK_T (PESSIMISTIC_LOCK_ID,OBJ_ID,VER_NBR,LOCK_DESC_TXT,DOC_HDR_ID,GNRT_DT,PRNCPL_ID,SESN_ID) VALUES (1111, '73f340de-7dfc-102c-97b6-ed716fdaf540', 0, NULL, '1234', {d '2007-07-01'}, 'fran', 'ad4d6c83-4d0f-4309-a528-c2f81ec00396')")
309 }
310 )
311 @Test
312 public void testSaveLock() throws Exception {
313 String lockDescriptor = "new test lock descriptor";
314
315 PessimisticLock lock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, 1111L);
316 lock.setLockDescriptor(lockDescriptor);
317 KRADServiceLocatorWeb.getPessimisticLockService().save(lock);
318
319
320 PessimisticLock savedLock = KRADServiceLocator.getDataObjectService().find(PessimisticLock.class, 1111L);
321 assertEquals("Lock descriptor is not correct from lock that was saved", lockDescriptor, savedLock.getLockDescriptor());
322 }
323
324
325
326
327
328
329 @Test
330 public void testEstablishPessimisticLocks() throws Exception {
331 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
332 AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
333
334 assertTrue("The AccountRequestDocument should be using pessimistic locking",
335 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
336
337
338 UserSession quickstartSession = new UserSession("quickstart");
339 boolean canEdit = lockService.establishPessimisticLocks(accountDoc, quickstartSession.getPerson(), true);
340
341
342 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
343 PessimisticLock quickstartPessimisticLock = accountDoc.getPessimisticLocks().get(0);
344 assertTrue("quickstart pessimistic lock was not established", quickstartPessimisticLock.isOwnedByUser(quickstartSession.getPerson()));
345
346
347 assertTrue("quickstart cannot edit", canEdit);
348
349
350 UserSession adminSession = new UserSession("admin");
351 canEdit = lockService.establishPessimisticLocks(accountDoc, adminSession.getPerson(), true);
352
353
354 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
355 PessimisticLock adminPessimisticLock = accountDoc.getPessimisticLocks().get(0);
356 assertFalse("admin pessimistic lock was established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
357
358
359 assertFalse("admin can edit", canEdit);
360
361
362 canEdit = lockService.establishPessimisticLocks(accountDoc, quickstartSession.getPerson(), true);
363
364
365 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
366
367
368 assertTrue("quickstart cannot edit", canEdit);
369 }
370
371 @Test
372 public void testCustomLockDescriptors() throws Exception {
373 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
374 AccountRequestDocument2 accountDoc2 = (AccountRequestDocument2) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest2");
375
376 assertTrue("The AccountRequestDocument2 should be using pessimistic locking",
377 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc2.getClass().getName()).getUsePessimisticLocking());
378 assertTrue("The AccountRequestDocument2 should be using custom lock descriptors", accountDoc2.useCustomLockDescriptors());
379
380 String LOCK_KEY = AccountRequestDocument2.ACCT_REQ_DOC_2_EDITABLE_FIELDS;
381
382
383 UserSession quickstartSession = new UserSession("quickstart");
384 GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_ALL_BUT_REASONS);
385 String quickstartLockDescriptor = accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
386 assertNotNull("The document should have generated a custom lock descriptor", quickstartLockDescriptor);
387 boolean canQuickstartEdit = lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
388
389
390 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc2.getPessimisticLocks().size());
391 PessimisticLock quickstartPessimisticLock = accountDoc2.getPessimisticLocks().get(0);
392 assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, quickstartPessimisticLock.getLockDescriptor());
393
394
395 assertTrue("quickstart cannot edit", canQuickstartEdit);
396
397
398 UserSession adminSession = new UserSession("admin");
399 GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_ALL_BUT_REASONS);
400 String adminLockDescriptor = accountDoc2.getCustomLockDescriptor(adminSession.getPerson());
401 assertNotNull("The document should have generated a custom lock descriptor", adminLockDescriptor);
402 assertEquals("Different lock descriptor generated for admin", quickstartLockDescriptor, adminLockDescriptor);
403 boolean canAdminEdit = lockService.establishPessimisticLocks(accountDoc2, adminSession.getPerson(), true);
404
405
406 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc2.getPessimisticLocks().size());
407 PessimisticLock adminPessimisticLock = accountDoc2.getPessimisticLocks().get(0);
408 assertFalse("admin pessimistic lock was established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
409
410
411 assertFalse("admin can edit", canAdminEdit);
412
413
414 GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
415 adminLockDescriptor = accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
416 assertNotNull("The document should have generated a custom lock descriptor", adminLockDescriptor);
417 assertNotEquals("Same lock descriptor generated for admin", quickstartLockDescriptor, adminLockDescriptor);
418 canAdminEdit = lockService.establishPessimisticLocks(accountDoc2, adminSession.getPerson(), true);
419
420
421 assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
422 for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
423 if (pessimisticLock.isOwnedByUser(quickstartSession.getPerson())) {
424 assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, pessimisticLock.getLockDescriptor());
425 } else if (pessimisticLock.isOwnedByUser(adminSession.getPerson())) {
426 assertEquals("admin pessimistic lock was established with wrong lock descriptor", adminLockDescriptor, pessimisticLock.getLockDescriptor());
427 }
428 }
429
430
431 assertTrue("admin cannot edit", canAdminEdit);
432
433
434 GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
435 lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
436
437
438 assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
439 for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
440 if (pessimisticLock.isOwnedByUser(quickstartSession.getPerson())) {
441 assertEquals("quickstart pessimistic lock was established with wrong lock descriptor", quickstartLockDescriptor, pessimisticLock.getLockDescriptor());
442 } else if (pessimisticLock.isOwnedByUser(adminSession.getPerson())) {
443 assertEquals("admin pessimistic lock was established with wrong lock descriptor", adminLockDescriptor, pessimisticLock.getLockDescriptor());
444 }
445 }
446
447
448 lockService.releaseAllLocksForUser(accountDoc2.getPessimisticLocks(), adminSession.getPerson(), adminLockDescriptor);
449 accountDoc2.refreshPessimisticLocks();
450 GlobalVariables.getUserSession().addObject(LOCK_KEY, AccountRequestDocument2.EDIT_REASONS_ONLY);
451 accountDoc2.getCustomLockDescriptor(quickstartSession.getPerson());
452 lockService.establishPessimisticLocks(accountDoc2, quickstartSession.getPerson(), true);
453
454
455 assertEquals("The wrong number of pessimistic locks are established", 2, accountDoc2.getPessimisticLocks().size());
456 for (PessimisticLock pessimisticLock : accountDoc2.getPessimisticLocks()) {
457 assertTrue("quickstart pessimistic lock was not established", pessimisticLock.isOwnedByUser(quickstartSession.getPerson()));
458 }
459
460
461 GlobalVariables.getUserSession().removeObject(LOCK_KEY);
462 lockService.releaseAllLocksForUser(accountDoc2.getPessimisticLocks(), quickstartSession.getPerson());
463 accountDoc2.refreshPessimisticLocks();
464 assertTrue("There is a pessimistic lock established", accountDoc2.getPessimisticLocks().isEmpty());
465 }
466
467
468
469
470
471
472 @Test
473 @Deprecated
474 public void testEstablishLocks() throws Exception {
475 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
476 AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
477
478 assertTrue("The AccountRequestDocument should be using pessimistic locking",
479 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
480
481
482 UserSession quickstartSession = new UserSession("quickstart");
483 Person[] quickstartPerson = { quickstartSession.getPerson() };
484 Map<String,String> editMode = new HashMap<String,String>();
485 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
486 Map <?,?> finalModes = lockService.establishLocks(accountDoc, editMode, quickstartSession.getPerson());
487
488
489 assertCorrectLocksAreInPlace(true, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
490
491
492 UserSession adminSession = new UserSession("admin");
493 Set<String> documentActions = new HashSet<String>(Arrays.asList(new String[] { KRADConstants.KUALI_ACTION_CAN_CANCEL,
494 KRADConstants.KUALI_ACTION_CAN_SAVE, KRADConstants.KUALI_ACTION_CAN_ROUTE, KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE }));
495 Set<?> finalActions = lockService.getDocumentActions(accountDoc, adminSession.getPerson(), documentActions);
496 assertFalse("'admin' should not be able to cancel the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_CANCEL));
497 assertFalse("'admin' should not be able to save the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_SAVE));
498 assertFalse("'admin' should not be able to route the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_ROUTE));
499 assertFalse("'admin' should not be able to blanket approve the locked document", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE));
500
501
502 documentActions = new HashSet<String>(Arrays.asList(new String[] {
503 KRADConstants.KUALI_ACTION_CAN_CANCEL, KRADConstants.KUALI_ACTION_CAN_SAVE, KRADConstants.KUALI_ACTION_CAN_ROUTE }));
504 finalActions = lockService.getDocumentActions(accountDoc, quickstartSession.getPerson(), documentActions);
505 assertTrue("'quickstart' should have had cancel privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_CANCEL));
506 assertTrue("'quickstart' should have had save privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_SAVE));
507 assertTrue("'quickstart' should have had route privileges", finalActions.contains(KRADConstants.KUALI_ACTION_CAN_ROUTE));
508
509
510 editMode = new HashMap<String,String>();
511 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
512 finalModes = lockService.establishLocks(accountDoc, editMode, adminSession.getPerson());
513 assertCorrectLocksAreInPlace(false, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
514
515
516 editMode = new HashMap<String,String>();
517 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
518 finalModes = lockService.establishLocks(accountDoc, editMode, quickstartSession.getPerson());
519 assertCorrectLocksAreInPlace(true, finalModes, 1, accountDoc.getPessimisticLocks(), quickstartPerson, null);
520
521
522 lockService.releaseAllLocksForUser(accountDoc.getPessimisticLocks(), quickstartSession.getPerson());
523 accountDoc.refreshPessimisticLocks();
524
525
526 UserSession systemSession = new UserSession(KRADConstants.SYSTEM_USER);
527 Person[] systemPerson = { systemSession.getPerson() };
528 lockService.establishWorkflowPessimisticLocking(accountDoc);
529 assertCorrectLocksAreInPlace(false, null, 1, accountDoc.getPessimisticLocks(), systemPerson, null);
530
531
532 editMode = new HashMap<String,String>();
533 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
534 finalModes = lockService.establishLocks(accountDoc, editMode, adminSession.getPerson());
535 assertCorrectLocksAreInPlace(false, finalModes, 1, accountDoc.getPessimisticLocks(), systemPerson, null);
536
537
538 lockService.releaseWorkflowPessimisticLocking(accountDoc);
539 assertTrue("There should not be any pessimistic locks present on the document", accountDoc.getPessimisticLocks().isEmpty());
540 }
541
542
543
544
545
546
547 @Test
548 public void testWorkflowPessimisticLocking() throws Exception {
549 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
550 AccountRequestDocument accountDoc = (AccountRequestDocument) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest");
551 assertTrue("The AccountRequestDocument should be using pessimistic locking",
552 KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary().getDocumentEntry(accountDoc.getClass().getName()).getUsePessimisticLocking());
553
554
555 UserSession systemSession = new UserSession(KRADConstants.SYSTEM_USER);
556 lockService.establishWorkflowPessimisticLocking(accountDoc);
557
558
559 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
560 PessimisticLock krPessimisticLock = accountDoc.getPessimisticLocks().get(0);
561 assertTrue("kr pessimistic lock was not established", krPessimisticLock.isOwnedByUser(systemSession.getPerson()));
562
563
564 UserSession adminSession = new UserSession("admin");
565 lockService.establishPessimisticLocks(accountDoc, adminSession.getPerson(), true);
566
567
568 assertEquals("The wrong number of pessimistic locks are established", 1, accountDoc.getPessimisticLocks().size());
569 PessimisticLock adminPessimisticLock = accountDoc.getPessimisticLocks().get(0);
570 assertFalse("admin pessimistic lock was not established", adminPessimisticLock.isOwnedByUser(adminSession.getPerson()));
571
572
573 lockService.releaseWorkflowPessimisticLocking(accountDoc);
574 assertTrue("There is a pessimistic lock established", accountDoc.getPessimisticLocks().isEmpty());
575 }
576
577
578
579
580
581
582 @Test
583 @Deprecated
584 public void testPessimisticLockingWithCustomDocumentLockDescriptors() throws Exception {
585 AccountRequestDocument2 accountDoc2 = (AccountRequestDocument2) KRADServiceLocatorWeb.getDocumentService().getNewDocument("AccountRequest2");
586 assertTrue("The AccountRequestDocument2 should be using pessimistic locking", KRADServiceLocatorWeb.getDataDictionaryService().getDataDictionary(
587 ).getDocumentEntry(accountDoc2.getClass().getName()).getUsePessimisticLocking());
588 assertTrue("The AccountRequestDocument2 should be using custom lock descriptors", accountDoc2.useCustomLockDescriptors());
589
590
591 assertCustomLockDescriptorsAreWorking(accountDoc2, AccountRequestDocument2.ACCT_REQ_DOC_2_EDITABLE_FIELDS,
592 AccountRequestDocument2.EDIT_ALL_BUT_REASONS, AccountRequestDocument2.EDIT_REASONS_ONLY);
593 }
594
595
596
597
598
599
600
601
602
603
604
605 private void assertCustomLockDescriptorsAreWorking(Document testDoc, final String LOCK_KEY, final Serializable LOCK_VALUE1,
606 final Serializable LOCK_VALUE2) throws Exception {
607 PessimisticLockService lockService = KRADServiceLocatorWeb.getPessimisticLockService();
608
609
610 UserSession quickstartSession = new UserSession("quickstart");
611 Person[] allPersons = { quickstartSession.getPerson(), null };
612 Map<String,String> editMode = new HashMap<String,String>();
613 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
614 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
615 String[] allDescriptors = { testDoc.getCustomLockDescriptor(quickstartSession.getPerson()), null };
616 assertNotNull("The document should have generated a custom lock descriptor", allDescriptors[0]);
617 Map <?,?> finalModes = lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
618
619
620 assertCorrectLocksAreInPlace(true, finalModes, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
621
622
623 editMode = new HashMap<String,String>();
624 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
625 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
626 lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
627 assertCorrectLocksAreInPlace(false, null, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
628
629
630 UserSession adminSession = new UserSession("admin");
631 editMode = new HashMap<String,String>();
632 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
633 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE1);
634 assertEquals("The document should have generated the same lock descriptors for both 'quickstart' and 'admin'",
635 allDescriptors[0], testDoc.getCustomLockDescriptor(adminSession.getPerson()));
636 finalModes = lockService.establishLocks(testDoc, editMode, adminSession.getPerson());
637 assertCorrectLocksAreInPlace(false, finalModes, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
638
639
640 allPersons[1] = adminSession.getPerson();
641 editMode = new HashMap<String,String>();
642 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
643 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
644 allDescriptors[1] = testDoc.getCustomLockDescriptor(adminSession.getPerson());
645 assertNotNull("The document should have generated a custom lock descriptor", allDescriptors[1]);
646 assertNotSame("'quickstart' and 'admin' should have different custom lock descriptors now", allDescriptors[0], allDescriptors[1]);
647 finalModes = lockService.establishLocks(testDoc, editMode, adminSession.getPerson());
648 assertCorrectLocksAreInPlace(true, finalModes, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
649
650
651 editMode = new HashMap<String,String>();
652 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
653 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
654 lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
655 assertCorrectLocksAreInPlace(false, null, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
656
657
658 lockService.releaseAllLocksForUser(testDoc.getPessimisticLocks(), allPersons[1], allDescriptors[1]);
659 testDoc.refreshPessimisticLocks();
660 assertCorrectLocksAreInPlace(false, null, 1, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
661 allPersons[1] = allPersons[0];
662 editMode = new HashMap<String,String>();
663 editMode.put(AuthorizationConstants.EditMode.FULL_ENTRY, KRADConstants.KUALI_DEFAULT_TRUE_VALUE);
664 GlobalVariables.getUserSession().addObject(LOCK_KEY, LOCK_VALUE2);
665 finalModes = lockService.establishLocks(testDoc, editMode, quickstartSession.getPerson());
666 assertCorrectLocksAreInPlace(true, finalModes, 2, testDoc.getPessimisticLocks(), allPersons, allDescriptors);
667
668
669 GlobalVariables.getUserSession().removeObject(LOCK_KEY);
670 lockService.releaseAllLocksForUser(testDoc.getPessimisticLocks(), allPersons[0]);
671 testDoc.refreshPessimisticLocks();
672 assertTrue("There should not be any pessimistic locks present on the document", testDoc.getPessimisticLocks().isEmpty());
673 }
674
675
676
677
678
679
680
681
682
683
684
685
686
687 private void assertCorrectLocksAreInPlace(boolean latestUserHasFullEntry, Map<?,?> finalModes, int expectedLockQuantity,
688 List<PessimisticLock> pessimisticLocks, Person[] expectedOwners, String[] expectedDescriptors) throws Exception {
689
690 if (finalModes != null) {
691 assertEquals("The last user that tried to establish locks does not have the expected status on their full entry privileges",
692 latestUserHasFullEntry, StringUtils.equalsIgnoreCase(KRADConstants.KUALI_DEFAULT_TRUE_VALUE, (String)(finalModes.get(
693 AuthorizationConstants.EditMode.FULL_ENTRY))));
694 }
695
696 assertEquals("The wrong number of pessimistic locks are in place", expectedLockQuantity, pessimisticLocks.size());
697
698 for (int i = pessimisticLocks.size() - 1; i > -1; i--) {
699 assertTrue("The lock at index " + i + " did not have the expected owner of " + expectedOwners[i].getPrincipalName(),
700 pessimisticLocks.get(i).isOwnedByUser(expectedOwners[i]));
701 if (expectedDescriptors != null) {
702 assertTrue("The lock at index " + i + " did not have the expected lock descriptor of " + expectedDescriptors[i],
703 pessimisticLocks.get(i).getLockDescriptor().equals(expectedDescriptors[i]));
704 }
705 }
706 }
707 }