X-Git-Url: http://wamblee.org/gitweb/?a=blobdiff_plain;ds=sidebyside;f=security%2Fsrc%2Ftest%2Fjava%2Forg%2Fwamblee%2Fsecurity%2Fauthorization%2Fhibernate%2FPersistentAuthorizationServiceTest.java;h=b4d6f6b974a5490b336fd3037100c2a1685a788e;hb=8de36ff0206c996baf3ee4adc3e2293b12ff5f39;hp=11b9da50aaff2ee6335c15e1aae66f8c1138af80;hpb=89c06d4d52b46c154128c97d6e758fa1f4fc7a6e;p=utils diff --git a/security/src/test/java/org/wamblee/security/authorization/hibernate/PersistentAuthorizationServiceTest.java b/security/src/test/java/org/wamblee/security/authorization/hibernate/PersistentAuthorizationServiceTest.java index 11b9da50..b4d6f6b9 100644 --- a/security/src/test/java/org/wamblee/security/authorization/hibernate/PersistentAuthorizationServiceTest.java +++ b/security/src/test/java/org/wamblee/security/authorization/hibernate/PersistentAuthorizationServiceTest.java @@ -48,102 +48,63 @@ import org.wamblee.usermgt.hibernate.UserAdministrationComponent; import java.sql.SQLException; - /** * Unit test for the persistent authorization service. - * + * * @author Erik Brakkee */ -public class PersistentAuthorizationServiceTest extends AuthorizationServiceTest { - /** - * DOCUMENT ME! - */ - private static final Logger LOGGER = Logger.getLogger(PersistentAuthorizationServiceTest.class); +public class PersistentAuthorizationServiceTest extends + AuthorizationServiceTest { + private static final Logger LOGGER = Logger + .getLogger(PersistentAuthorizationServiceTest.class); - /** - * DOCUMENT ME! - */ private static final String SERVICE_TABLE = "AUTHORIZATION_SERVICE"; - /** - * DOCUMENT ME! - */ private static final String RULES_TABLE = "AUTHORIZATION_RULES"; - /** - * DOCUMENT ME! - */ private static final String SERVICE_RULES_TABLE = "AUTHORIZATION_SERVICE_RULES"; - /** - * DOCUMENT ME! - */ private static final String OPERATIONCOND_TABLE = "OPERATION_CONDITIONS"; - /** - * DOCUMENT ME! - */ private static final String PATHCOND_TABLE = "PATH_CONDITIONS"; - /** - * DOCUMENT ME! - */ private static final String USERCOND_TABLE = "USER_CONDITIONS"; - /** - * DOCUMENT ME! - */ private DefaultContainer container; - /** - * DOCUMENT ME! - */ private Scope scope; - /** - * DOCUMENT ME! - */ private DatabaseTesterComponent databaseTester; - /** - * DOCUMENT ME! - */ private UserAccessor userAccessor; - /** - * DOCUMENT ME! - */ private HibernateTemplate hibernateTemplate; - /** - * DOCUMENT ME! - */ private AuthorizationService authorizationService; - /** - * DOCUMENT ME! - * - * @throws Exception DOCUMENT ME! - */ @Override protected void setUp() throws Exception { container = new DefaultContainer("top"); DatabaseComponentFactory.addDatabaseConfig(container); container.addComponent(new DatasourceComponent("datasource")); - ClassConfiguration useraccessorConfig = new ClassConfiguration(TestUserAccessor.class); + ClassConfiguration useraccessorConfig = new ClassConfiguration( + TestUserAccessor.class); useraccessorConfig.getObjectConfig().getSetterConfig().initAllSetters(); container.addComponent("userAccessor", useraccessorConfig); - container.addComponent(new AuthorizationComponent("authorization", true)); + container + .addComponent(new AuthorizationComponent("authorization", true)); - ClassConfiguration dbtesterConfig = new ClassConfiguration(DatabaseTesterComponent.class); + ClassConfiguration dbtesterConfig = new ClassConfiguration( + DatabaseTesterComponent.class); dbtesterConfig.getObjectConfig().getSetterConfig().initAllSetters(); container.addComponent("databaseTester", dbtesterConfig); - ObjectConfiguration config = new ObjectConfiguration(PersistentAuthorizationServiceTest.class); - config.getSetterConfig().clear().add("setUserAccessor") - .add("setDatabaseTester").add("setHibernateTemplate") - .add("setAuthorizationService"); + ObjectConfiguration config = new ObjectConfiguration( + PersistentAuthorizationServiceTest.class); + config.getSetterConfig().clear().add("setUserAccessor").add( + "setDatabaseTester").add("setHibernateTemplate").add( + "setAuthorizationService"); container.addComponent("testcase", this, config); scope = container.start(); @@ -153,38 +114,18 @@ public class PersistentAuthorizationServiceTest extends AuthorizationServiceTest super.setUp(); } - /** - * DOCUMENT ME! - * - * @param aDatabaseTester DOCUMENT ME! - */ public void setDatabaseTester(DatabaseTesterComponent aDatabaseTester) { databaseTester = aDatabaseTester; } - /** - * DOCUMENT ME! - * - * @param aUserAccessor DOCUMENT ME! - */ public void setUserAccessor(UserAccessor aUserAccessor) { userAccessor = aUserAccessor; } - /** - * DOCUMENT ME! - * - * @param aHibernateTemplate DOCUMENT ME! - */ public void setHibernateTemplate(HibernateTemplate aHibernateTemplate) { hibernateTemplate = aHibernateTemplate; } - /** - * DOCUMENT ME! - * - * @param aAuthorizationService DOCUMENT ME! - */ public void setAuthorizationService( AuthorizationService aAuthorizationService) { authorizationService = aAuthorizationService; @@ -192,57 +133,42 @@ public class PersistentAuthorizationServiceTest extends AuthorizationServiceTest /* * (non-Javadoc) - * + * * @see * org.wamblee.security.authorization.AuthorizationServiceTest#createService * () */ - /** - * DOCUMENT ME! - * - * @return DOCUMENT ME! - */ @Override protected AuthorizationService createService() { - PersistentAuthorizationService service = new PersistentAuthorizationService("DEFAULT", - hibernateTemplate, createUserAccessor(), 10000); + PersistentAuthorizationService service = new PersistentAuthorizationService( + "DEFAULT", hibernateTemplate, createUserAccessor(), 10000); return service; } /* * (non-Javadoc) - * + * * @see * org.wamblee.security.authorization.AuthorizationServiceTest#checkRuleCount * (int) */ - /** - * DOCUMENT ME! - * - * @param aCount DOCUMENT ME! - * - * @throws RuntimeException DOCUMENT ME! - */ @Override protected void checkRuleCount(int aCount) { try { assertEquals(1, databaseTester.getTableSize(SERVICE_TABLE)); assertEquals(aCount, databaseTester.getTableSize(RULES_TABLE)); - assertEquals(aCount, - databaseTester.getTableSize(SERVICE_RULES_TABLE)); + assertEquals(aCount, databaseTester + .getTableSize(SERVICE_RULES_TABLE)); assertEquals(aCount, databaseTester.getTableSize(USERCOND_TABLE)); assertEquals(aCount, databaseTester.getTableSize(PATHCOND_TABLE)); - assertEquals(aCount, - databaseTester.getTableSize(OPERATIONCOND_TABLE)); + assertEquals(aCount, databaseTester + .getTableSize(OPERATIONCOND_TABLE)); } catch (SQLException e) { throw new RuntimeException(e); } } - /** - * DOCUMENT ME! - */ public void testSchemaExport() { Configuration config = new Configuration(); @@ -250,22 +176,19 @@ public class PersistentAuthorizationServiceTest extends AuthorizationServiceTest config.addResource(mappingFile); } - config.setProperty("hibernate.dialect", - MySQL5InnoDBDialect.class.getName()); + config.setProperty("hibernate.dialect", MySQL5InnoDBDialect.class + .getName()); SchemaExport exporter = new SchemaExport(config); exporter.setOutputFile("target/mysql5.schema.sql"); exporter.create(true, false); } - /** - * DOCUMENT ME! - */ public void testPerformance() { PersistentAuthorizationService service = (PersistentAuthorizationService) getService(); - int n = 1000; - long time = System.currentTimeMillis(); + int n = 1000; + long time = System.currentTimeMillis(); for (int i = 0; i < n; i++) { testFirstRuleGrants(); @@ -277,8 +200,8 @@ public class PersistentAuthorizationServiceTest extends AuthorizationServiceTest testNoRulesSupportResource(); } - LOGGER.info("Executed " + (4 * n) + " authorization checks in " - + ((float) (System.currentTimeMillis() - time) / (float) 1000) - + " seconds."); + LOGGER.info("Executed " + (4 * n) + " authorization checks in " + + ((float) (System.currentTimeMillis() - time) / (float) 1000) + + " seconds."); } }