target
stringlengths 20
113k
| src_fm
stringlengths 11
86.3k
| src_fm_fc
stringlengths 21
86.4k
| src_fm_fc_co
stringlengths 30
86.4k
| src_fm_fc_ms
stringlengths 42
86.8k
| src_fm_fc_ms_ff
stringlengths 43
86.8k
|
---|---|---|---|---|---|
@Test public void parcelRoutingUsingCypherReduceRespectsIntervals() throws Exception { DateTime startDtm = interval3.getStart().plusDays( 2 ); Interval queryInterval = new Interval( startDtm, startDtm.plusDays( 1 ) ); ExecutionResult result = queries.findShortestPathWithCypherReduce( "DeliveryArea-1", "DeliverySegment-3", queryInterval ); Iterator<Iterable<Node>> rows = result.columnAs( "n" ); Iterator<Node> nodes = rows.next().iterator(); assertEquals( "DeliveryArea-1", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryBase-1", nodes.next().getProperty( "name" ) ); assertEquals( "ParcelCentre-1", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryBase-3", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryArea-3", nodes.next().getProperty( "name" ) ); assertEquals( "DeliverySegment-3", nodes.next().getProperty( "name" ) ); assertFalse( nodes.hasNext() ); } | public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); Iterable<Node> findShortestPathWithParcelRouteCalculator( String start, String end, Interval interval ); Iterable<Node> findShortestPathWithSimpleParcelRouteCalculator( String start, String end, Interval interval ); ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); Iterable<Node> findShortestPathWithParcelRouteCalculator( String start, String end, Interval interval ); Iterable<Node> findShortestPathWithSimpleParcelRouteCalculator( String start, String end, Interval interval ); ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ); } |
@Test public void withinScopeOfSingleParcelCentreCypher() throws Exception { DateTime startDtm = interval2.getStart().plusDays( 2 ); Interval queryInterval = new Interval( startDtm, startDtm.plusDays( 1 ) ); ExecutionResult result = queries.findShortestPathWithCypherReduce( "DeliveryArea-1", "DeliverySegment-8", queryInterval ); Iterator<Iterable<Node>> rows = result.columnAs( "n" ); Iterator<Node> nodes = rows.next().iterator(); assertEquals( "DeliveryArea-1", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryBase-1", nodes.next().getProperty( "name" ) ); assertEquals( "ParcelCentre-1", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryBase-2", nodes.next().getProperty( "name" ) ); assertEquals( "DeliveryArea-4", nodes.next().getProperty( "name" ) ); assertEquals( "DeliverySegment-8", nodes.next().getProperty( "name" ) ); assertFalse( nodes.hasNext() ); } | public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); Iterable<Node> findShortestPathWithParcelRouteCalculator( String start, String end, Interval interval ); Iterable<Node> findShortestPathWithSimpleParcelRouteCalculator( String start, String end, Interval interval ); ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ); } | LogisticsQueries { public ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ) { String query = "MATCH (s:Location {name:{startLocation}}),\n" + " (e:Location {name:{endLocation}})\n" + "MATCH upLeg = (s)<-[:DELIVERY_ROUTE*1..2]-(db1)\n" + "WHERE all(r in relationships(upLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH e, upLeg, db1\n" + "MATCH downLeg = (db2)-[:DELIVERY_ROUTE*1..2]->(e)\n" + "WHERE all(r in relationships(downLeg)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH db1, db2, upLeg, downLeg\n" + "MATCH topRoute = (db1)<-[:CONNECTED_TO]-()-[:CONNECTED_TO*1..3]-(db2)\n" + "WHERE all(r in relationships(topRoute)\n" + " WHERE r.start_date <= {intervalStart}\n" + " AND r.end_date >= {intervalEnd})\n" + "WITH upLeg, downLeg, topRoute,\n" + " reduce(weight=0, r in relationships(topRoute) | weight+r.cost) AS score\n" + " ORDER BY score ASC\n" + " LIMIT 1\n" + "RETURN (nodes(upLeg) + tail(nodes(topRoute)) + tail(nodes(downLeg))) AS n"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "startLocation", start ); params.put( "endLocation", end ); params.put( "intervalStart", interval.getStartMillis() ); params.put( "intervalEnd", interval.getEndMillis() ); return executionEngineWrapper.execute( query, params ); } LogisticsQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); Iterable<Node> findShortestPathWithParcelRouteCalculator( String start, String end, Interval interval ); Iterable<Node> findShortestPathWithSimpleParcelRouteCalculator( String start, String end, Interval interval ); ExecutionResult findShortestPathWithCypherReduce( String start, String end, Interval interval ); } |
@Test @Ignore("Doesn't work like that, the code used to index multiple children under one parent, not possible with the new indexes") public void shouldIndexNodesByOtherNodes() throws Exception { String cypher = "CREATE (a:Parent {name:'a'}), \n" + "(b:Child {name:'b'}), \n" + "(c:Child {name:'c'}), \n" + "(d:Child {name:'d'}), \n" + "(e:Child {name:'e'}), \n" + "(f:Child {name:'f'}),\n" + "(g:Child {name:'g'}),\n" + "(h:Child {name:'h'}),\n" + "a-[:CONNECTED_TO]->b,\n" + "a-[:CONNECTED_TO]->c,\n" + "a-[:CONNECTED_TO]->g,\n" + "d-[:CONNECTED_TO]->e,\n" + "d-[:CONNECTED_TO]->f,\n" + "d-[:CONNECTED_TO]->h"; final GraphDatabaseService db = createFromCypher( "Example", cypher, IndexParam.indexParam( "Parent", "name" ) ); ExecutionEngine executionEngine = new ExecutionEngine(db); IndexNodeByOtherNodeIndexer.GraphTraversal traversal1 = new IndexNodeByOtherNodeIndexer.GraphTraversal(){ @Override public Iterable<Node> execute( Node startNode ) { return GlobalGraphOperations.at(db).getAllNodesWithLabel(DynamicLabel.label("Parent")); } }; IndexNodeByOtherNodeIndexer.GraphTraversal traversal2 = new IndexNodeByOtherNodeIndexer.GraphTraversal(){ @Override public Iterable<Node> execute( Node startNode ) { TraversalDescription traversalDescription = db.traversalDescription().breadthFirst().relationships( withName( "CONNECTED_TO" ), Direction.OUTGOING ).evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.endNode().equals( path.startNode() ) ) { return Evaluation.EXCLUDE_AND_CONTINUE; } return Evaluation.INCLUDE_AND_CONTINUE; } } ); return traversalDescription.traverse( startNode ).nodes(); } }; IndexNodeByOtherNodeIndexer indexer = new IndexNodeByOtherNodeIndexer( traversal1, traversal2, "Parent", "child", "name" ); indexer.execute( db, null, 2 ); Map<String, String> indexValueToResult = new HashMap<>( ); indexValueToResult.put( "b", "a" ); indexValueToResult.put( "c", "a" ); indexValueToResult.put( "g", "a" ); indexValueToResult.put( "e", "d" ); indexValueToResult.put( "f", "d" ); indexValueToResult.put( "h", "d" ); for ( String indexValue : indexValueToResult.keySet() ) { String query = "MATCH (n:Parent {child:'"+indexValue+"'}) RETURN n.name AS parent"; ExecutionResult result = executionEngine.execute(query); assertEquals(indexValueToResult.get( indexValue ), result.iterator().next().get( "parent" )); } } | public void execute( GraphDatabaseService db, Node startNode, int batchSize ) { Transaction tx = db.beginTx(); Label label = DynamicLabel.label(indexName); Iterable<Node> indexableNodes = findIndexableNodes.execute( startNode ); int currentBatchSize = 0; try { for ( Node indexableNode : indexableNodes ) { Iterable<Node> nodesToIndexBy = findOtherNodesForIndexableNode.execute( indexableNode ); for ( Node node : nodesToIndexBy ) { indexableNode.addLabel(label); indexableNode.setProperty(indexKey, node.getProperty( nodeToIndexByPropertyName ) ); if ( currentBatchSize++ > batchSize ) { tx.success(); tx.close(); tx = db.beginTx(); currentBatchSize = 0; } } } tx.success(); } finally { tx.close(); } } | IndexNodeByOtherNodeIndexer { public void execute( GraphDatabaseService db, Node startNode, int batchSize ) { Transaction tx = db.beginTx(); Label label = DynamicLabel.label(indexName); Iterable<Node> indexableNodes = findIndexableNodes.execute( startNode ); int currentBatchSize = 0; try { for ( Node indexableNode : indexableNodes ) { Iterable<Node> nodesToIndexBy = findOtherNodesForIndexableNode.execute( indexableNode ); for ( Node node : nodesToIndexBy ) { indexableNode.addLabel(label); indexableNode.setProperty(indexKey, node.getProperty( nodeToIndexByPropertyName ) ); if ( currentBatchSize++ > batchSize ) { tx.success(); tx.close(); tx = db.beginTx(); currentBatchSize = 0; } } } tx.success(); } finally { tx.close(); } } } | IndexNodeByOtherNodeIndexer { public void execute( GraphDatabaseService db, Node startNode, int batchSize ) { Transaction tx = db.beginTx(); Label label = DynamicLabel.label(indexName); Iterable<Node> indexableNodes = findIndexableNodes.execute( startNode ); int currentBatchSize = 0; try { for ( Node indexableNode : indexableNodes ) { Iterable<Node> nodesToIndexBy = findOtherNodesForIndexableNode.execute( indexableNode ); for ( Node node : nodesToIndexBy ) { indexableNode.addLabel(label); indexableNode.setProperty(indexKey, node.getProperty( nodeToIndexByPropertyName ) ); if ( currentBatchSize++ > batchSize ) { tx.success(); tx.close(); tx = db.beginTx(); currentBatchSize = 0; } } } tx.success(); } finally { tx.close(); } } IndexNodeByOtherNodeIndexer( GraphTraversal findIndexableNodes, GraphTraversal
findOtherNodesForIndexableNode,
String indexName, String indexKey, String nodeToIndexByPropertyName ); } | IndexNodeByOtherNodeIndexer { public void execute( GraphDatabaseService db, Node startNode, int batchSize ) { Transaction tx = db.beginTx(); Label label = DynamicLabel.label(indexName); Iterable<Node> indexableNodes = findIndexableNodes.execute( startNode ); int currentBatchSize = 0; try { for ( Node indexableNode : indexableNodes ) { Iterable<Node> nodesToIndexBy = findOtherNodesForIndexableNode.execute( indexableNode ); for ( Node node : nodesToIndexBy ) { indexableNode.addLabel(label); indexableNode.setProperty(indexKey, node.getProperty( nodeToIndexByPropertyName ) ); if ( currentBatchSize++ > batchSize ) { tx.success(); tx.close(); tx = db.beginTx(); currentBatchSize = 0; } } } tx.success(); } finally { tx.close(); } } IndexNodeByOtherNodeIndexer( GraphTraversal findIndexableNodes, GraphTraversal
findOtherNodesForIndexableNode,
String indexName, String indexKey, String nodeToIndexByPropertyName ); void execute( GraphDatabaseService db, Node startNode, int batchSize ); } | IndexNodeByOtherNodeIndexer { public void execute( GraphDatabaseService db, Node startNode, int batchSize ) { Transaction tx = db.beginTx(); Label label = DynamicLabel.label(indexName); Iterable<Node> indexableNodes = findIndexableNodes.execute( startNode ); int currentBatchSize = 0; try { for ( Node indexableNode : indexableNodes ) { Iterable<Node> nodesToIndexBy = findOtherNodesForIndexableNode.execute( indexableNode ); for ( Node node : nodesToIndexBy ) { indexableNode.addLabel(label); indexableNode.setProperty(indexKey, node.getProperty( nodeToIndexByPropertyName ) ); if ( currentBatchSize++ > batchSize ) { tx.success(); tx.close(); tx = db.beginTx(); currentBatchSize = 0; } } } tx.success(); } finally { tx.close(); } } IndexNodeByOtherNodeIndexer( GraphTraversal findIndexableNodes, GraphTraversal
findOtherNodesForIndexableNode,
String indexName, String indexKey, String nodeToIndexByPropertyName ); void execute( GraphDatabaseService db, Node startNode, int batchSize ); } |
@Test public void shouldAllowIteratingSingleResult() throws Exception { String query = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldAllowIteratingMultipleResults() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query1, query2 ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "d", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "e", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldReturnCorrectResultsWhenFirstQueryReturnsEmptyResults() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:COLLEAGUE]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query1, query2 ).iterator(); assertEquals( "d", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "e", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldReturnCorrectResultsWhenLastQueryReturnsEmptyResults() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:COLLEAGUE]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query1, query2 ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldReturnCorrectResultsWhenMiddleQueryReturnsEmptyResults() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:COLLEAGUE]->(person)\n" + "RETURN person"; String query3 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query1, query2, query3 ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "d", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "e", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldReturnCorrectResultsWhenAllQueriesReturnEmptyResults() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:COLLEAGUE]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:COLLEAGUE]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( query1, query2 ).iterator(); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void sharedInterestsSameCompany() throws Exception { ExecutionResult results = queries.sharedInterestsSameCompany( "Sarah" ); Iterator<Map<String, Object>> iterator = results.iterator(); Map<String, Object> result = iterator.next(); assertEquals( "Ben", result.get( "name" ) ); assertEquals( 2l, result.get( "score" ) ); assertEquals( asList( "Graphs", "REST" ), result.get( "interests" ) ); result = iterator.next(); assertEquals( "Charlie", result.get( "name" ) ); assertEquals( 1l, result.get( "score" ) ); assertEquals( asList( "Graphs" ), result.get( "interests" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult sharedInterestsSameCompany( String userName ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:WORKS_FOR]->(company)<-[:WORKS_FOR]-(person),\n" + " (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person)\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); return executionEngineWrapper.execute( query, params ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsSameCompany( String userName ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:WORKS_FOR]->(company)<-[:WORKS_FOR]-(person),\n" + " (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person)\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); return executionEngineWrapper.execute( query, params ); } } | SocialNetworkQueries { public ExecutionResult sharedInterestsSameCompany( String userName ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:WORKS_FOR]->(company)<-[:WORKS_FOR]-(person),\n" + " (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person)\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsSameCompany( String userName ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:WORKS_FOR]->(company)<-[:WORKS_FOR]-(person),\n" + " (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person)\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public ExecutionResult sharedInterestsSameCompany( String userName ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:WORKS_FOR]->(company)<-[:WORKS_FOR]-(person),\n" + " (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person)\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void shouldAllowSameParametersToBePassedToAllQueries() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", "a" ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( params, query1, query2 ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "d", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "e", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldAllowDifferentParametersToBePassedToDifferentQueries() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person"; String query2 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", "a" ); params.put( "user", "a" ); Iterator<Map<String, Object>> results = queryUnionExecutionEngine.execute( params, query1, query2 ).iterator(); assertEquals( "b", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "c", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "d", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertEquals( "e", ((Node) results.next().get( "person" )).getProperty( "name" ) ); assertFalse( results.hasNext() ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldThrowExceptionIfNoQueriesSupplied() throws Exception { QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); try { queryUnionExecutionEngine.execute(); fail( "Expected IllegalArgumentException" ); } catch ( IllegalArgumentException ex ) { assertEquals( "Must supply one or more queries.", ex.getMessage() ); } } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void shouldReturnAllResultsAsString() throws Exception { String query1 = "MATCH (a:User {name:'a'})-[:FRIEND]->(person)\n" + "RETURN person.name"; String query2 = "MATCH (a:User {name:'a'})-[:ENEMY]->(person)\n" + "RETURN person.name"; QueryUnionExecutionEngine queryUnionExecutionEngine = new QueryUnionExecutionEngine( executionEngine ); QueryUnionExecutionResult results = (QueryUnionExecutionResult) queryUnionExecutionEngine.execute( query1, query2 ); String resultsString = results.toString(); assertTrue( resultsString.startsWith( "+-------------+\n" + "| person.name |\n" + "+-------------+\n" + "| \"b\" |\n" + "| \"c\" |\n" + "+-------------+\n" + "2 rows\n" ) ); assertTrue( resultsString.contains( "+-------------+\n" + "| person.name |\n" + "+-------------+\n" + "| \"d\" |\n" + "| \"e\" |\n" + "+-------------+\n" + "2 rows\n" ) ); } | public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } | QueryUnionExecutionEngine { public QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ) { if ( queries.length == 0 ) { throw new IllegalArgumentException( "Must supply one or more queries." ); } return new QueryUnionExecutionResult( asList( queries ), executionEngine, params ); } QueryUnionExecutionEngine( ExecutionEngineWrapper executionEngine ); QueryUnionExecutionResult execute( final Map<String, Object> params, final String... queries ); Iterable<Map<String, Object>> execute( final String... queries ); } |
@Test public void extensionShouldReturnDistance() throws Exception { SimpleSocialNetworkExtension extension = new SimpleSocialNetworkExtension( db ); String distance = extension.getDistance( "Ben", "Mike" ); assertEquals( "4", distance ); } | @GET @Path("/{name1}/{name2}") public String getDistance ( @PathParam("name1") String name1, @PathParam("name2") String name2 ) { ExecutionResult result = queries.pathBetweenTwoFriends( name1, name2 ); return String.valueOf( result.columnAs( "depth" ).next() ); } | SimpleSocialNetworkExtension { @GET @Path("/{name1}/{name2}") public String getDistance ( @PathParam("name1") String name1, @PathParam("name2") String name2 ) { ExecutionResult result = queries.pathBetweenTwoFriends( name1, name2 ); return String.valueOf( result.columnAs( "depth" ).next() ); } } | SimpleSocialNetworkExtension { @GET @Path("/{name1}/{name2}") public String getDistance ( @PathParam("name1") String name1, @PathParam("name2") String name2 ) { ExecutionResult result = queries.pathBetweenTwoFriends( name1, name2 ); return String.valueOf( result.columnAs( "depth" ).next() ); } SimpleSocialNetworkExtension( @Context GraphDatabaseService db ); } | SimpleSocialNetworkExtension { @GET @Path("/{name1}/{name2}") public String getDistance ( @PathParam("name1") String name1, @PathParam("name2") String name2 ) { ExecutionResult result = queries.pathBetweenTwoFriends( name1, name2 ); return String.valueOf( result.columnAs( "depth" ).next() ); } SimpleSocialNetworkExtension( @Context GraphDatabaseService db ); @GET @Path("/{name1}/{name2}") String getDistance( @PathParam("name1") String name1, @PathParam("name2") String name2 ); } | SimpleSocialNetworkExtension { @GET @Path("/{name1}/{name2}") public String getDistance ( @PathParam("name1") String name1, @PathParam("name2") String name2 ) { ExecutionResult result = queries.pathBetweenTwoFriends( name1, name2 ); return String.valueOf( result.columnAs( "depth" ).next() ); } SimpleSocialNetworkExtension( @Context GraphDatabaseService db ); @GET @Path("/{name1}/{name2}") String getDistance( @PathParam("name1") String name1, @PathParam("name2") String name2 ); } |
@Test public void allowedWithInheritTrueGivesAccessToSubcompaniesAndAccounts() throws Exception { ExecutionResult results = queries.findAccessibleResources( "Ben" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-1", iterator.next().get( "account" ) ); assertEquals( "Account-2", iterator.next().get( "account" ) ); assertEquals( "Account-3", iterator.next().get( "account" ) ); assertEquals( "Account-6", iterator.next().get( "account" ) ); assertEquals( "Account-4", iterator.next().get( "account" ) ); assertEquals( "Account-5", iterator.next().get( "account" ) ); assertEquals( "Account-7", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void deniedExcludesCompanyFromPermissionsTree() throws Exception { ExecutionResult results = queries.findAccessibleResources( "Sarah" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-4", iterator.next().get( "account" ) ); assertEquals( "Account-5", iterator.next().get( "account" ) ); assertEquals( "Account-1", iterator.next().get( "account" ) ); assertEquals( "Account-2", iterator.next().get( "account" ) ); assertEquals( "Account-3", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void deniedExcludesCompanyFromPermissionsTree2() throws Exception { ExecutionResult results = queries.findAccessibleResources( "Liz" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-8", iterator.next().get( "account" ) ); assertEquals( "Account-10", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleResources( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()\n" + " <-[:CHILD_OF*0..3]-(company)<-[:WORKS_FOR]-(employee)\n" + " -[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN employee.name AS employee, account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH paths=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->()\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN employee.name AS employee, account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldGetAccessibleCompaniesForAdmin() throws Exception { ExecutionResult results = queries.findAccessibleCompanies( "Sarah" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Startup", iterator.next().get( "company" ) ); assertEquals( "Acme", iterator.next().get( "company" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldGetAccessibleCompaniesForAdminWhereNoAllowedInheritFalse() throws Exception { ExecutionResult results = queries.findAccessibleCompanies( "Ben" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Acme", iterator.next().get( "company" ) ); assertEquals( "Spinoff", iterator.next().get( "company" ) ); assertEquals( "Startup", iterator.next().get( "company" ) ); assertEquals( "Skunkworkz", iterator.next().get( "company" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void sharedInterestsAllCompanies() throws Exception { ExecutionResult results = queries.sharedInterestsAllCompanies( "Sarah", 10 ); Iterator<Map<String, Object>> iterator = results.iterator(); Map<String, Object> result; result = iterator.next(); assertEquals( "Arnold", result.get( "name" ) ); assertEquals( "Startup, Ltd", result.get( "company" ) ); assertEquals( 3l, result.get( "score" ) ); assertEquals( asList( "Java", "Graphs", "REST" ), result.get( "interests" ) ); result = iterator.next(); assertEquals( "Ben", result.get( "name" ) ); assertEquals( "Acme, Inc", result.get( "company" ) ); assertEquals( 2l, result.get( "score" ) ); assertEquals( asList( "Graphs", "REST" ), result.get( "interests" ) ); result = iterator.next(); assertEquals( "Gordon", result.get( "name" ) ); assertEquals( "Startup, Ltd", result.get( "company" ) ); assertEquals( 1l, result.get( "score" ) ); assertEquals( asList( "Graphs" ), result.get( "interests" ) ); result = iterator.next(); assertEquals( "Charlie", result.get( "name" ) ); assertEquals( "Acme, Inc", result.get( "company" ) ); assertEquals( 1l, result.get( "score" ) ); assertEquals( asList( "Graphs" ), result.get( "interests" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult sharedInterestsAllCompanies( String userName, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person),\n" + " (person)-[:WORKS_FOR]->(company)\n" + "RETURN person.name AS name,\n" + " company.name AS company,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAllCompanies( String userName, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person),\n" + " (person)-[:WORKS_FOR]->(company)\n" + "RETURN person.name AS name,\n" + " company.name AS company,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } } | SocialNetworkQueries { public ExecutionResult sharedInterestsAllCompanies( String userName, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person),\n" + " (person)-[:WORKS_FOR]->(company)\n" + "RETURN person.name AS name,\n" + " company.name AS company,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAllCompanies( String userName, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person),\n" + " (person)-[:WORKS_FOR]->(company)\n" + "RETURN person.name AS name,\n" + " company.name AS company,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAllCompanies( String userName, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH (subject)-[:INTERESTED_IN]->(interest)<-[:INTERESTED_IN]-(person),\n" + " (person)-[:WORKS_FOR]->(company)\n" + "RETURN person.name AS name,\n" + " company.name AS company,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests\n" + "ORDER BY score DESC"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void moreComplexShouldGetAccessibleCompaniesForAdmin() throws Exception { ExecutionResult results = queries.findAccessibleCompanies( "Liz" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "BigCompany", iterator.next().get( "company" ) ); assertEquals( "One-ManShop", iterator.next().get( "company" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleCompanies( String adminName ) { String query = "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0..3]-(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN company.name AS company\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}})\n" + "MATCH (admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN company.name AS company"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAccessibleAccountsForAdminAndCompany() throws Exception { ExecutionResult results = queries.findAccessibleAccountsForCompany( "Sarah", "Startup" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-4", iterator.next().get( "account" ) ); assertEquals( "Account-5", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void moreComplexShouldFindAccessibleAccountsForAdminAndCompany() throws Exception { ExecutionResult results = queries.findAccessibleAccountsForCompany( "Liz", "BigCompany" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-8", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAccessibleAccountsForAdminAndCompanyWhenNoAllowedWithInheritFalse() throws Exception { ExecutionResult results = queries.findAccessibleAccountsForCompany( "Ben", "Startup" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Account-4", iterator.next().get( "account" ) ); assertEquals( "Account-5", iterator.next().get( "account" ) ); assertEquals( "Account-7", iterator.next().get( "account" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_INHERIT]->(company)\n" + " <-[:CHILD_OF*0..3]-(subcompany)<-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(subcompany))\n" + "RETURN account.name AS account\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (company:Company {name:{companyName}})\n" + "MATCH (admin)-[:MEMBER_OF]->(group)-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + " <-[:WORKS_FOR]-(employee)-[:HAS_ACCOUNT]->(account)\n" + "RETURN account.name AS account"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForAccountResourceWhereAllowedInheritAndAllowedNotInherit() throws Exception { ExecutionResult results = queries.findAdminForResource( "Account-10" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Phil", iterator.next().get( "admin" ) ); assertEquals( "Liz", iterator.next().get( "admin" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForEmployeeResourceWhereAllowedInheritAndDenied() throws Exception { ExecutionResult results = queries.findAdminForResource( "Kate" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Ben", iterator.next().get( "admin" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForResource( String resourceName ) { String query = "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " -[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (resource:Resource {name:{resourceName}})\n" + "MATCH p=(resource)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(company)\n" + " <-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForCompanyWithAllowedInherit() throws Exception { ExecutionResult results = queries.findAdminForCompany( "BigCompany" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Liz", iterator.next().get( "admin" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForCompanyWithDenied() throws Exception { ExecutionResult results = queries.findAdminForCompany( "AcquiredLtd" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForCompanyWithAllowedInheritAndAllowedDoNotInheritTooLowInTree() throws Exception { ExecutionResult results = queries.findAdminForCompany( "Subsidiary" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Phil", iterator.next().get( "admin" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldFindAdminForCompanyWithAllowedInheritAndAllowedAllowedDoNotInherit() throws Exception { ExecutionResult results = queries.findAdminForCompany( "One-ManShop" ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( "Phil", iterator.next().get( "admin" ) ); assertEquals( "Liz", iterator.next().get( "admin" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult findAdminForCompany( String companyName ) { String query = "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)-[:CHILD_OF*0..3]->()<-[:ALLOWED_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN admin.name AS admin\n" + "UNION\n" + "MATCH (company:Company {name:{companyName}})\n" + "MATCH (company)<-[:ALLOWED_DO_NOT_INHERIT]-()<-[:MEMBER_OF]-(admin)\n" + "RETURN admin.name AS admin"; Map<String, Object> params = new HashMap<>(); params.put( "companyName", companyName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void sharedInterestsAlsoInterestedInTopic() throws Exception { ExecutionResult results = queries.sharedInterestsAlsoInterestedInTopic( "Ben", "Travel" ); Iterator<Map<String, Object>> iterator = results.iterator(); Map<String, Object> result = iterator.next(); assertEquals( "Arnold", result.get( "name" ) ); assertEquals( asList( "Graphs", "Java", "REST", "Travel" ), result.get( "topics" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ) { String query = "MATCH (person:User {name:{name}})\n" + "MATCH (person)-[:INTERESTED_IN]->()<-[:INTERESTED_IN]-(colleague)-[:INTERESTED_IN]->(topic)\n" + "WHERE topic.name={topic}\n" + "WITH colleague\n" + "MATCH (colleague)-[:INTERESTED_IN]->(allTopics)\n" + "RETURN colleague.name AS name, collect(distinct(allTopics.name)) AS topics"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); return executionEngineWrapper.execute( query, params ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ) { String query = "MATCH (person:User {name:{name}})\n" + "MATCH (person)-[:INTERESTED_IN]->()<-[:INTERESTED_IN]-(colleague)-[:INTERESTED_IN]->(topic)\n" + "WHERE topic.name={topic}\n" + "WITH colleague\n" + "MATCH (colleague)-[:INTERESTED_IN]->(allTopics)\n" + "RETURN colleague.name AS name, collect(distinct(allTopics.name)) AS topics"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); return executionEngineWrapper.execute( query, params ); } } | SocialNetworkQueries { public ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ) { String query = "MATCH (person:User {name:{name}})\n" + "MATCH (person)-[:INTERESTED_IN]->()<-[:INTERESTED_IN]-(colleague)-[:INTERESTED_IN]->(topic)\n" + "WHERE topic.name={topic}\n" + "WITH colleague\n" + "MATCH (colleague)-[:INTERESTED_IN]->(allTopics)\n" + "RETURN colleague.name AS name, collect(distinct(allTopics.name)) AS topics"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ) { String query = "MATCH (person:User {name:{name}})\n" + "MATCH (person)-[:INTERESTED_IN]->()<-[:INTERESTED_IN]-(colleague)-[:INTERESTED_IN]->(topic)\n" + "WHERE topic.name={topic}\n" + "WITH colleague\n" + "MATCH (colleague)-[:INTERESTED_IN]->(allTopics)\n" + "RETURN colleague.name AS name, collect(distinct(allTopics.name)) AS topics"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ) { String query = "MATCH (person:User {name:{name}})\n" + "MATCH (person)-[:INTERESTED_IN]->()<-[:INTERESTED_IN]-(colleague)-[:INTERESTED_IN]->(topic)\n" + "WHERE topic.name={topic}\n" + "WITH colleague\n" + "MATCH (colleague)-[:INTERESTED_IN]->(allTopics)\n" + "RETURN colleague.name AS name, collect(distinct(allTopics.name)) AS topics"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void shouldDetermineWhetherAdminHasAccessToResource() throws Exception { Map<String, List<Long>> testData = new LinkedHashMap<>(); testData.put( "Alistair", asList( 1L, 0L ) ); testData.put( "Account-8", asList( 1L, 0L ) ); testData.put( "Eve", asList( 0L ) ); testData.put( "Account-9", asList( 0L ) ); testData.put( "Mary", asList( 0L ) ); testData.put( "Account-12", asList( 0L ) ); testData.put( "Gary", asList( 0L ) ); testData.put( "Account-11", asList( 0L ) ); testData.put( "Bill", asList( 0L, 1L ) ); testData.put( "Account-10", asList( 0L, 1L ) ); for ( String resourceName : testData.keySet() ) { List<Long> expectedResults = testData.get( resourceName ); Iterator<Long> expectedResultsIterator = expectedResults.iterator(); ExecutionResult results = queries.hasAccessToResource( "Liz", resourceName ); Iterator<Map<String, Object>> iterator = results.iterator(); assertTrue( iterator.hasNext() ); assertEquals( expectedResultsIterator.next(), iterator.next().get( "accessCount" ) ); if ( expectedResultsIterator.hasNext() ) { assertEquals( expectedResultsIterator.next(), iterator.next().get( "accessCount" ) ); } assertFalse( iterator.hasNext() ); } } | public ExecutionResult hasAccessToResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0." + ".3]-(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "RETURN count(p) AS accessCount"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult hasAccessToResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0." + ".3]-(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "RETURN count(p) AS accessCount"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult hasAccessToResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0." + ".3]-(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "RETURN count(p) AS accessCount"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult hasAccessToResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0." + ".3]-(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "RETURN count(p) AS accessCount"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult hasAccessToResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->()<-[:CHILD_OF*0." + ".3]-(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->()<-[:CHILD_OF*0..3]-(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " (resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource)\n" + "RETURN count(p) AS accessCount"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test @Ignore("does conceptually not work") public void shouldDetermineWhetherAdminHasAccessToIndexedResource() throws Exception { Map<String, Boolean> testData = new LinkedHashMap<>(); testData.put( "Alistair", true ); testData.put( "Account-8", true ); testData.put( "Eve", false ); testData.put( "Account-9", false ); testData.put( "Mary", false ); testData.put( "Account-12", false ); testData.put( "Gary", false ); testData.put( "Account-11", false ); testData.put( "Bill", true ); testData.put( "Account-10", true ); for ( Map.Entry<String, Boolean> entry : testData.entrySet() ) { ExecutionResult results = queries.hasAccessToIndexedResource( "Liz", entry.getKey() ); assertEquals( entry.getKey(), entry.getValue(), isAuthorized( results ) ); } } | public ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company)<-[:CHILD_OF*0..3]-(:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN count(p) AS accessCount\n"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } | AccessControlQueries { public ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company)<-[:CHILD_OF*0..3]-(:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN count(p) AS accessCount\n"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } } | AccessControlQueries { public ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company)<-[:CHILD_OF*0..3]-(:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN count(p) AS accessCount\n"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); } | AccessControlQueries { public ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company)<-[:CHILD_OF*0..3]-(:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN count(p) AS accessCount\n"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } | AccessControlQueries { public ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ) { String query = "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company)<-[:CHILD_OF*0..3]-(:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_INHERIT]->(company)\n" + "WHERE NOT ((admin)-[:MEMBER_OF]->()-[:DENIED]->(company))\n" + "RETURN count(p) AS accessCount\n" + "UNION\n" + "MATCH (admin:Administrator {name:{adminName}}),\n" + " c1=(company:Company)-[:WORKS_FOR|HAS_ACCOUNT*1..2]-(resource:Resource {name:{resourceName}})\n" + "MATCH p=(admin)-[:MEMBER_OF]->()-[:ALLOWED_DO_NOT_INHERIT]->(company)\n" + "RETURN count(p) AS accessCount\n"; Map<String, Object> params = new HashMap<>(); params.put( "adminName", adminName ); params.put( "resourceName", resourceName ); return executionEngine.execute( query, params ); } AccessControlQueries( ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult findAccessibleResources( String adminName ); ExecutionResult findAccessibleCompanies( String adminName ); ExecutionResult findAccessibleAccountsForCompany( String adminName, String companyName ); ExecutionResult findAdminForResource( String resourceName ); ExecutionResult findAdminForCompany( String companyName ); ExecutionResult hasAccessToResource( String adminName, String resourceName ); ExecutionResult hasAccessToIndexedResource( String adminName, String resourceName ); } |
@Test public void shouldReturnShortestPathBetweenTwoFriends() throws Exception { ExecutionResult results = queries.pathBetweenTwoFriends( "Ben", "Mike" ); assertTrue( results.iterator().hasNext() ); assertEquals( 4, results.iterator().next().get( "depth" ) ); } | public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } |
@Test public void friendOfAFriendToDepth4() throws Exception { ExecutionResult results = queries.friendOfAFriendToDepth4( "Ben" ); assertTrue( results.iterator().hasNext() ); assertEquals( "Mike", results.iterator().next().get( "name" ) ); assertFalse( results.iterator().hasNext() ); } | public ExecutionResult friendOfAFriendToDepth4(String name) { String query = "MATCH (person:User {name:{name}})-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-(friend)\n" + "RETURN friend.name AS name"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", name ); return executionEngine.execute( query, params ); } | SimpleSocialNetworkQueries { public ExecutionResult friendOfAFriendToDepth4(String name) { String query = "MATCH (person:User {name:{name}})-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-(friend)\n" + "RETURN friend.name AS name"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", name ); return executionEngine.execute( query, params ); } } | SimpleSocialNetworkQueries { public ExecutionResult friendOfAFriendToDepth4(String name) { String query = "MATCH (person:User {name:{name}})-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-(friend)\n" + "RETURN friend.name AS name"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", name ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); } | SimpleSocialNetworkQueries { public ExecutionResult friendOfAFriendToDepth4(String name) { String query = "MATCH (person:User {name:{name}})-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-(friend)\n" + "RETURN friend.name AS name"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", name ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } | SimpleSocialNetworkQueries { public ExecutionResult friendOfAFriendToDepth4(String name) { String query = "MATCH (person:User {name:{name}})-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-()-[:FRIEND]-(friend)\n" + "RETURN friend.name AS name"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", name ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } |
@Test public void shouldReturnNoResultsWhenThereIsNotAPathBetweenTwoFriends() throws Exception { ExecutionResult results = queries.pathBetweenTwoFriends( "Ben", "Arnold" ); assertFalse( results.iterator().hasNext() ); } | public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } | SimpleSocialNetworkQueries { public ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ) { String query = "MATCH (first:User{name:{firstUser}}),\n" + " (second:User{name:{secondUser}})\n" + "MATCH p=shortestPath(first-[*..4]-second)\n" + "RETURN length(p) AS depth"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "firstUser", firstUser ); params.put( "secondUser", secondUser ); return executionEngine.execute( query, params ); } SimpleSocialNetworkQueries( GraphDatabaseService db ); ExecutionResult pathBetweenTwoFriends( String firstUser, String secondUser ); ExecutionResult friendOfAFriendToDepth4(String name); } |
@Test public void friendOfAFriendWithInterest() throws Exception { ExecutionResult results = queries.friendOfAFriendWithInterest( "Sarah", "Java", 3 ); Iterator<Map<String, Object>> iterator = results.iterator(); Map<String, Object> result = iterator.next(); assertEquals( "Arnold", result.get( "name" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_ON]->()-[:WORKED_ON*0..2]-()\n" + " <-[:WORKED_ON]-(person)-[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name={topic}\n" + "WITH DISTINCT person.name AS name,\n" + " min(length(p)) as pathLength\n" + "ORDER BY pathLength ASC\n" + "LIMIT {resultLimit}\n" + "RETURN name, pathLength"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } | SocialNetworkQueries { public ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_ON]->()-[:WORKED_ON*0..2]-()\n" + " <-[:WORKED_ON]-(person)-[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name={topic}\n" + "WITH DISTINCT person.name AS name,\n" + " min(length(p)) as pathLength\n" + "ORDER BY pathLength ASC\n" + "LIMIT {resultLimit}\n" + "RETURN name, pathLength"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } } | SocialNetworkQueries { public ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_ON]->()-[:WORKED_ON*0..2]-()\n" + " <-[:WORKED_ON]-(person)-[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name={topic}\n" + "WITH DISTINCT person.name AS name,\n" + " min(length(p)) as pathLength\n" + "ORDER BY pathLength ASC\n" + "LIMIT {resultLimit}\n" + "RETURN name, pathLength"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_ON]->()-[:WORKED_ON*0..2]-()\n" + " <-[:WORKED_ON]-(person)-[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name={topic}\n" + "WITH DISTINCT person.name AS name,\n" + " min(length(p)) as pathLength\n" + "ORDER BY pathLength ASC\n" + "LIMIT {resultLimit}\n" + "RETURN name, pathLength"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_ON]->()-[:WORKED_ON*0..2]-()\n" + " <-[:WORKED_ON]-(person)-[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name={topic}\n" + "WITH DISTINCT person.name AS name,\n" + " min(length(p)) as pathLength\n" + "ORDER BY pathLength ASC\n" + "LIMIT {resultLimit}\n" + "RETURN name, pathLength"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "topicQuery", "name:" + topicLabel ); params.put( "topic", topicLabel ); params.put( "resultLimit", limit ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void friendOfAFriendWithInterestTraversalFramework() throws Exception { try ( Transaction tx = db.beginTx() ) { Collection<Node> results = queries.friendOfAFriendWithInterestTraversalFramework( "Arnold", "Art", 5 ); Iterator<Node> iterator = results.iterator(); assertEquals( "Emily", iterator.next().getProperty( "name" ) ); assertFalse( iterator.hasNext() ); tx.success(); } } | public Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName, final String topicLabel, int limit ) { Node user = IteratorUtil.single(db.findNodesByLabelAndProperty(USER, "name", userName)); final Node topic = IteratorUtil.single(db.findNodesByLabelAndProperty(TOPIC, "name", topicLabel)); final RelationshipType interested_in = withName( "INTERESTED_IN" ); final RelationshipType worked_on = withName( "WORKED_ON" ); TraversalDescription traversalDescription = db.traversalDescription() .breadthFirst() .uniqueness( Uniqueness.NODE_GLOBAL ) .relationships( worked_on ) .evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.length() == 0 ) { return Evaluation.EXCLUDE_AND_CONTINUE; } Node currentNode = path.endNode(); if ( path.length() % 2 == 0 ) { for ( Relationship rel : currentNode.getRelationships( interested_in, Direction.OUTGOING ) ) { if ( rel.getEndNode().equals( topic ) ) { if ( path.length() % 4 == 0 ) { return Evaluation.INCLUDE_AND_PRUNE; } else { return Evaluation.INCLUDE_AND_CONTINUE; } } } } if ( path.length() % 4 == 0 ) { return Evaluation.EXCLUDE_AND_PRUNE; } else { return Evaluation.EXCLUDE_AND_CONTINUE; } } } ); Iterable<Node> nodes = traversalDescription.traverse( user ).nodes(); Iterator<Node> iterator = nodes.iterator(); int nodeCount = 0; List<Node> results = new ArrayList<Node>(); while ( iterator.hasNext() && nodeCount++ < limit ) { results.add( iterator.next() ); } return results; } | SocialNetworkQueries { public Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName, final String topicLabel, int limit ) { Node user = IteratorUtil.single(db.findNodesByLabelAndProperty(USER, "name", userName)); final Node topic = IteratorUtil.single(db.findNodesByLabelAndProperty(TOPIC, "name", topicLabel)); final RelationshipType interested_in = withName( "INTERESTED_IN" ); final RelationshipType worked_on = withName( "WORKED_ON" ); TraversalDescription traversalDescription = db.traversalDescription() .breadthFirst() .uniqueness( Uniqueness.NODE_GLOBAL ) .relationships( worked_on ) .evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.length() == 0 ) { return Evaluation.EXCLUDE_AND_CONTINUE; } Node currentNode = path.endNode(); if ( path.length() % 2 == 0 ) { for ( Relationship rel : currentNode.getRelationships( interested_in, Direction.OUTGOING ) ) { if ( rel.getEndNode().equals( topic ) ) { if ( path.length() % 4 == 0 ) { return Evaluation.INCLUDE_AND_PRUNE; } else { return Evaluation.INCLUDE_AND_CONTINUE; } } } } if ( path.length() % 4 == 0 ) { return Evaluation.EXCLUDE_AND_PRUNE; } else { return Evaluation.EXCLUDE_AND_CONTINUE; } } } ); Iterable<Node> nodes = traversalDescription.traverse( user ).nodes(); Iterator<Node> iterator = nodes.iterator(); int nodeCount = 0; List<Node> results = new ArrayList<Node>(); while ( iterator.hasNext() && nodeCount++ < limit ) { results.add( iterator.next() ); } return results; } } | SocialNetworkQueries { public Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName, final String topicLabel, int limit ) { Node user = IteratorUtil.single(db.findNodesByLabelAndProperty(USER, "name", userName)); final Node topic = IteratorUtil.single(db.findNodesByLabelAndProperty(TOPIC, "name", topicLabel)); final RelationshipType interested_in = withName( "INTERESTED_IN" ); final RelationshipType worked_on = withName( "WORKED_ON" ); TraversalDescription traversalDescription = db.traversalDescription() .breadthFirst() .uniqueness( Uniqueness.NODE_GLOBAL ) .relationships( worked_on ) .evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.length() == 0 ) { return Evaluation.EXCLUDE_AND_CONTINUE; } Node currentNode = path.endNode(); if ( path.length() % 2 == 0 ) { for ( Relationship rel : currentNode.getRelationships( interested_in, Direction.OUTGOING ) ) { if ( rel.getEndNode().equals( topic ) ) { if ( path.length() % 4 == 0 ) { return Evaluation.INCLUDE_AND_PRUNE; } else { return Evaluation.INCLUDE_AND_CONTINUE; } } } } if ( path.length() % 4 == 0 ) { return Evaluation.EXCLUDE_AND_PRUNE; } else { return Evaluation.EXCLUDE_AND_CONTINUE; } } } ); Iterable<Node> nodes = traversalDescription.traverse( user ).nodes(); Iterator<Node> iterator = nodes.iterator(); int nodeCount = 0; List<Node> results = new ArrayList<Node>(); while ( iterator.hasNext() && nodeCount++ < limit ) { results.add( iterator.next() ); } return results; } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName, final String topicLabel, int limit ) { Node user = IteratorUtil.single(db.findNodesByLabelAndProperty(USER, "name", userName)); final Node topic = IteratorUtil.single(db.findNodesByLabelAndProperty(TOPIC, "name", topicLabel)); final RelationshipType interested_in = withName( "INTERESTED_IN" ); final RelationshipType worked_on = withName( "WORKED_ON" ); TraversalDescription traversalDescription = db.traversalDescription() .breadthFirst() .uniqueness( Uniqueness.NODE_GLOBAL ) .relationships( worked_on ) .evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.length() == 0 ) { return Evaluation.EXCLUDE_AND_CONTINUE; } Node currentNode = path.endNode(); if ( path.length() % 2 == 0 ) { for ( Relationship rel : currentNode.getRelationships( interested_in, Direction.OUTGOING ) ) { if ( rel.getEndNode().equals( topic ) ) { if ( path.length() % 4 == 0 ) { return Evaluation.INCLUDE_AND_PRUNE; } else { return Evaluation.INCLUDE_AND_CONTINUE; } } } } if ( path.length() % 4 == 0 ) { return Evaluation.EXCLUDE_AND_PRUNE; } else { return Evaluation.EXCLUDE_AND_CONTINUE; } } } ); Iterable<Node> nodes = traversalDescription.traverse( user ).nodes(); Iterator<Node> iterator = nodes.iterator(); int nodeCount = 0; List<Node> results = new ArrayList<Node>(); while ( iterator.hasNext() && nodeCount++ < limit ) { results.add( iterator.next() ); } return results; } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName, final String topicLabel, int limit ) { Node user = IteratorUtil.single(db.findNodesByLabelAndProperty(USER, "name", userName)); final Node topic = IteratorUtil.single(db.findNodesByLabelAndProperty(TOPIC, "name", topicLabel)); final RelationshipType interested_in = withName( "INTERESTED_IN" ); final RelationshipType worked_on = withName( "WORKED_ON" ); TraversalDescription traversalDescription = db.traversalDescription() .breadthFirst() .uniqueness( Uniqueness.NODE_GLOBAL ) .relationships( worked_on ) .evaluator( new Evaluator() { @Override public Evaluation evaluate( Path path ) { if ( path.length() == 0 ) { return Evaluation.EXCLUDE_AND_CONTINUE; } Node currentNode = path.endNode(); if ( path.length() % 2 == 0 ) { for ( Relationship rel : currentNode.getRelationships( interested_in, Direction.OUTGOING ) ) { if ( rel.getEndNode().equals( topic ) ) { if ( path.length() % 4 == 0 ) { return Evaluation.INCLUDE_AND_PRUNE; } else { return Evaluation.INCLUDE_AND_CONTINUE; } } } } if ( path.length() % 4 == 0 ) { return Evaluation.EXCLUDE_AND_PRUNE; } else { return Evaluation.EXCLUDE_AND_CONTINUE; } } } ); Iterable<Node> nodes = traversalDescription.traverse( user ).nodes(); Iterator<Node> iterator = nodes.iterator(); int nodeCount = 0; List<Node> results = new ArrayList<Node>(); while ( iterator.hasNext() && nodeCount++ < limit ) { results.add( iterator.next() ); } return results; } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void friendWorkedWithFriendWithInterests() throws Exception { createAllWorkedWithRelationships(); ExecutionResult results = queries.friendWorkedWithFriendWithInterests( "Arnold", 5, "Art", "Design" ); Iterator<Map<String, Object>> iterator = results.iterator(); Map<String, Object> result = iterator.next(); assertEquals( "Emily", result.get( "name" ) ); assertFalse( iterator.hasNext() ); } | public ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_WITH*0..1]-()-[:WORKED_WITH]-(person)\n" + " -[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name IN {interests}\n" + "WITH person, interest, min(length(p)) as pathLength\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests,\n" + " (pathLength - 1) AS distance\n" + "ORDER BY score DESC\n" + "LIMIT {resultLimit}"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "userQuery", "name:" + userName ); params.put( "interests", interestLabels ); params.put( "resultLimit", limit ); StringBuilder builder = new StringBuilder(); builder.append( "[" ); for ( int i = 0; i < interestLabels.length; i++ ) { builder.append( "'" ); builder.append( interestLabels[i] ); builder.append( "'" ); if ( i < interestLabels.length - 1 ) { builder.append( "," ); } } builder.append( "]" ); params.put( "topicQuery", builder.toString() ); return executionEngineWrapper.execute( query, params ); } | SocialNetworkQueries { public ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_WITH*0..1]-()-[:WORKED_WITH]-(person)\n" + " -[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name IN {interests}\n" + "WITH person, interest, min(length(p)) as pathLength\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests,\n" + " (pathLength - 1) AS distance\n" + "ORDER BY score DESC\n" + "LIMIT {resultLimit}"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "userQuery", "name:" + userName ); params.put( "interests", interestLabels ); params.put( "resultLimit", limit ); StringBuilder builder = new StringBuilder(); builder.append( "[" ); for ( int i = 0; i < interestLabels.length; i++ ) { builder.append( "'" ); builder.append( interestLabels[i] ); builder.append( "'" ); if ( i < interestLabels.length - 1 ) { builder.append( "," ); } } builder.append( "]" ); params.put( "topicQuery", builder.toString() ); return executionEngineWrapper.execute( query, params ); } } | SocialNetworkQueries { public ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_WITH*0..1]-()-[:WORKED_WITH]-(person)\n" + " -[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name IN {interests}\n" + "WITH person, interest, min(length(p)) as pathLength\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests,\n" + " (pathLength - 1) AS distance\n" + "ORDER BY score DESC\n" + "LIMIT {resultLimit}"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "userQuery", "name:" + userName ); params.put( "interests", interestLabels ); params.put( "resultLimit", limit ); StringBuilder builder = new StringBuilder(); builder.append( "[" ); for ( int i = 0; i < interestLabels.length; i++ ) { builder.append( "'" ); builder.append( interestLabels[i] ); builder.append( "'" ); if ( i < interestLabels.length - 1 ) { builder.append( "," ); } } builder.append( "]" ); params.put( "topicQuery", builder.toString() ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); } | SocialNetworkQueries { public ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_WITH*0..1]-()-[:WORKED_WITH]-(person)\n" + " -[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name IN {interests}\n" + "WITH person, interest, min(length(p)) as pathLength\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests,\n" + " (pathLength - 1) AS distance\n" + "ORDER BY score DESC\n" + "LIMIT {resultLimit}"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "userQuery", "name:" + userName ); params.put( "interests", interestLabels ); params.put( "resultLimit", limit ); StringBuilder builder = new StringBuilder(); builder.append( "[" ); for ( int i = 0; i < interestLabels.length; i++ ) { builder.append( "'" ); builder.append( interestLabels[i] ); builder.append( "'" ); if ( i < interestLabels.length - 1 ) { builder.append( "," ); } } builder.append( "]" ); params.put( "topicQuery", builder.toString() ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); } | SocialNetworkQueries { public ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ) { String query = "MATCH (subject:User {name:{name}})\n" + "MATCH p=(subject)-[:WORKED_WITH*0..1]-()-[:WORKED_WITH]-(person)\n" + " -[:INTERESTED_IN]->(interest)\n" + "WHERE person<>subject AND interest.name IN {interests}\n" + "WITH person, interest, min(length(p)) as pathLength\n" + "RETURN person.name AS name,\n" + " count(interest) AS score,\n" + " collect(interest.name) AS interests,\n" + " (pathLength - 1) AS distance\n" + "ORDER BY score DESC\n" + "LIMIT {resultLimit}"; Map<String, Object> params = new HashMap<String, Object>(); params.put( "name", userName ); params.put( "userQuery", "name:" + userName ); params.put( "interests", interestLabels ); params.put( "resultLimit", limit ); StringBuilder builder = new StringBuilder(); builder.append( "[" ); for ( int i = 0; i < interestLabels.length; i++ ) { builder.append( "'" ); builder.append( interestLabels[i] ); builder.append( "'" ); if ( i < interestLabels.length - 1 ) { builder.append( "," ); } } builder.append( "]" ); params.put( "topicQuery", builder.toString() ); return executionEngineWrapper.execute( query, params ); } SocialNetworkQueries( GraphDatabaseService db, ExecutionEngineWrapper executionEngineWrapper ); ExecutionResult sharedInterestsSameCompany( String userName ); ExecutionResult sharedInterestsAllCompanies( String userName, int limit ); ExecutionResult sharedInterestsAlsoInterestedInTopic( String userName, String topicLabel ); ExecutionResult friendOfAFriendWithInterest( String userName, String topicLabel, int limit ); Collection<Node> friendOfAFriendWithInterestTraversalFramework( String userName,
final String topicLabel,
int limit ); ExecutionResult friendOfAFriendWithMultipleInterest( String userName, int limit, String... interestLabels ); ExecutionResult friendWorkedWithFriendWithInterests( String userName, int limit, String... interestLabels ); ExecutionResult createWorkedWithRelationships( String userName ); ExecutionResult getAllUsers(); static final Label USER; static final Label TOPIC; } |
@Test public void findMails() throws Exception { String url = "/mails/2"; MultiValueMap<String,String> params = new LinkedMultiValueMap<>(); params.put("target", Arrays.asList("receiver")); params.put("mail_status",Arrays.asList("all")); MvcResult mvcResult = mvc.perform(MockMvcRequestBuilders.get(url).params(params).accept(MediaType.APPLICATION_JSON)).andReturn(); int status = mvcResult.getResponse().getStatus(); String content = mvcResult.getResponse().getContentAsString(); assertEquals(status,200); PageInfo<MailDO> mails = mailService.findByReceiver(2L, 1, 5, MailStatus.ALL); PageInfo<MailDO> result = mapper.readValue(content, new TypeReference<PageInfo<MailDO>>() { }); log.info("result:{}",result.getList()); assertEquals(result.getList(),mails.getList()); } | @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) public PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId, @RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target, @RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum, @RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize, @RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) { QueryMailTarget queryTarget = QueryMailTarget.valueOf(StringUtils.upperCase(target)); if (queryTarget == QueryMailTarget.RECEIVER) { if (StringUtils.isEmpty(mailStatus)) { throw new MailStatusNotFoundException(targetId); } return mailService.findByReceiver(targetId, pageNum, pageSize, MailStatus.valueOf(mailStatus.toUpperCase())); } else if (queryTarget == QueryMailTarget.SENDER) { return mailService.findBySender(targetId, pageNum, pageSize); } throw new MailTargetNotFoundException(target); } | MailController { @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) public PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId, @RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target, @RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum, @RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize, @RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) { QueryMailTarget queryTarget = QueryMailTarget.valueOf(StringUtils.upperCase(target)); if (queryTarget == QueryMailTarget.RECEIVER) { if (StringUtils.isEmpty(mailStatus)) { throw new MailStatusNotFoundException(targetId); } return mailService.findByReceiver(targetId, pageNum, pageSize, MailStatus.valueOf(mailStatus.toUpperCase())); } else if (queryTarget == QueryMailTarget.SENDER) { return mailService.findBySender(targetId, pageNum, pageSize); } throw new MailTargetNotFoundException(target); } } | MailController { @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) public PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId, @RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target, @RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum, @RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize, @RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) { QueryMailTarget queryTarget = QueryMailTarget.valueOf(StringUtils.upperCase(target)); if (queryTarget == QueryMailTarget.RECEIVER) { if (StringUtils.isEmpty(mailStatus)) { throw new MailStatusNotFoundException(targetId); } return mailService.findByReceiver(targetId, pageNum, pageSize, MailStatus.valueOf(mailStatus.toUpperCase())); } else if (queryTarget == QueryMailTarget.SENDER) { return mailService.findBySender(targetId, pageNum, pageSize); } throw new MailTargetNotFoundException(target); } } | MailController { @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) public PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId, @RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target, @RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum, @RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize, @RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) { QueryMailTarget queryTarget = QueryMailTarget.valueOf(StringUtils.upperCase(target)); if (queryTarget == QueryMailTarget.RECEIVER) { if (StringUtils.isEmpty(mailStatus)) { throw new MailStatusNotFoundException(targetId); } return mailService.findByReceiver(targetId, pageNum, pageSize, MailStatus.valueOf(mailStatus.toUpperCase())); } else if (queryTarget == QueryMailTarget.SENDER) { return mailService.findBySender(targetId, pageNum, pageSize); } throw new MailTargetNotFoundException(target); } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } | MailController { @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) public PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId, @RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target, @RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum, @RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize, @RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) { QueryMailTarget queryTarget = QueryMailTarget.valueOf(StringUtils.upperCase(target)); if (queryTarget == QueryMailTarget.RECEIVER) { if (StringUtils.isEmpty(mailStatus)) { throw new MailStatusNotFoundException(targetId); } return mailService.findByReceiver(targetId, pageNum, pageSize, MailStatus.valueOf(mailStatus.toUpperCase())); } else if (queryTarget == QueryMailTarget.SENDER) { return mailService.findBySender(targetId, pageNum, pageSize); } throw new MailTargetNotFoundException(target); } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } |
@Test public void sendMails() throws Exception { } | @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) public void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) { if (result.hasErrors()) { throw new ValidationException(result.getFieldErrors()); } Long senderId = user.getId(); log.info("senderId:{}",senderId); if (mailDTO.getSendMode() == SendMode.BATCH) { mailService.send(senderId, mailDTO.getReceivers(), mailDTO.getText()); } else if (mailDTO.getSendMode() == SendMode.BROADCAST) { mailService.broadcast(senderId, mailDTO.getText()); } } | MailController { @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) public void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) { if (result.hasErrors()) { throw new ValidationException(result.getFieldErrors()); } Long senderId = user.getId(); log.info("senderId:{}",senderId); if (mailDTO.getSendMode() == SendMode.BATCH) { mailService.send(senderId, mailDTO.getReceivers(), mailDTO.getText()); } else if (mailDTO.getSendMode() == SendMode.BROADCAST) { mailService.broadcast(senderId, mailDTO.getText()); } } } | MailController { @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) public void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) { if (result.hasErrors()) { throw new ValidationException(result.getFieldErrors()); } Long senderId = user.getId(); log.info("senderId:{}",senderId); if (mailDTO.getSendMode() == SendMode.BATCH) { mailService.send(senderId, mailDTO.getReceivers(), mailDTO.getText()); } else if (mailDTO.getSendMode() == SendMode.BROADCAST) { mailService.broadcast(senderId, mailDTO.getText()); } } } | MailController { @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) public void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) { if (result.hasErrors()) { throw new ValidationException(result.getFieldErrors()); } Long senderId = user.getId(); log.info("senderId:{}",senderId); if (mailDTO.getSendMode() == SendMode.BATCH) { mailService.send(senderId, mailDTO.getReceivers(), mailDTO.getText()); } else if (mailDTO.getSendMode() == SendMode.BROADCAST) { mailService.broadcast(senderId, mailDTO.getText()); } } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } | MailController { @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) public void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) { if (result.hasErrors()) { throw new ValidationException(result.getFieldErrors()); } Long senderId = user.getId(); log.info("senderId:{}",senderId); if (mailDTO.getSendMode() == SendMode.BATCH) { mailService.send(senderId, mailDTO.getReceivers(), mailDTO.getText()); } else if (mailDTO.getSendMode() == SendMode.BROADCAST) { mailService.broadcast(senderId, mailDTO.getText()); } } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } |
@Test public void deleteMail() throws Exception { } | @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") public void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) { mailService.deleteMail(id); } | MailController { @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") public void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) { mailService.deleteMail(id); } } | MailController { @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") public void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) { mailService.deleteMail(id); } } | MailController { @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") public void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) { mailService.deleteMail(id); } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } | MailController { @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") public void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) { mailService.deleteMail(id); } @RequestMapping(value = "/{targetId}", method = RequestMethod.GET) @ApiOperation(value = "按照发信人或收信人的id以及发信状态", notes = "target是指定按照收信人还是发信人查询,可选值是sender和receiver;如果是按照收信人查询,那么必须指定mail_status,可选值为ALL、NOT_VIEWED、VIEWED;如果是按照发信人查询,则不需要给出该参数", response = PageInfo.class) @ApiResponses(value = { @ApiResponse(code = 404, message = "按收信人查询时未给出mail_status"), @ApiResponse(code = 404, message = "未指定target") }) PageInfo<MailDO> findMails(@PathVariable("targetId") @ApiParam(value = "发信人或收信人的id", required = true) Long targetId,
@RequestParam("target") @ApiParam(value = "按照收信人还是发信人查询,可选值是sender和receiver", required = true) String target,
@RequestParam(value = "pageNum", required = false, defaultValue = "1") @ApiParam(value = "页码,从1开始,默认为1", required = false) Integer pageNum,
@RequestParam(value = "pageSize", required = false, defaultValue = "5") @ApiParam(value = "页的大小,默认为5") Integer pageSize,
@RequestParam(value = "mail_status", required = false) @ApiParam(value = "递信状态,如果是按照收信人查询,那么必须指定,可选值为ALL、NOT_VIEWED、VIEWED", required = false) String mailStatus) {; @RequestMapping(method = RequestMethod.POST) @PreAuthorize("hasRole('ADMIN') or (hasRole('USER') and #mailDTO.sendMode.toString() != 'BROADCAST' )") @ApiOperation(value = "发送站内信,可以单独发送、批量或广播", notes = "如果是单独发送或批量,那么必须指定receivers,并将sendMode置为BATCH;如果是广播,那么无需指定receivers,并将SendMode置为BROADCAST") @ApiResponses(value = { @ApiResponse(code = 400, message = "mail对象属性校验失败"), @ApiResponse(code = 403, message = "广播功能仅支持管理员"), }) void sendMails(@RequestBody @Valid @ApiParam(value = "站内信对象", required = true) MailDTO mailDTO, BindingResult result, @AuthenticationPrincipal JWTUser user) {; @RequestMapping(value = "/{id}", method = RequestMethod.DELETE) @ApiOperation(value = "删除某条站内信") void deleteMail(@PathVariable("id") @ApiParam(value = "站内信的id", required = true) Long id) {; } |
@Test public void testRegexPattern() { Pattern p = new UrlFactory().getRegexes(null, null).get(0).getPattern(); String url1 = "http: String url2 = "Ein beispiel: https: String wrong_url1 = "khttp: String wrong_url2 = "Das ist keine URL khttp: Assert.assertTrue(p.matcher(url1).find()); Assert.assertTrue(p.matcher(url2).find()); Assert.assertFalse(p.matcher(wrong_url1).find()); Assert.assertFalse(p.matcher(wrong_url2).find()); } | @Override protected List<NamedPattern> getRegexes(SpanCollection spanCollection, String lang) { return Collections.singletonList(new NamedPattern(URL, URL_PATTERN)); } | UrlFactory extends RegexNamedEntityFactory { @Override protected List<NamedPattern> getRegexes(SpanCollection spanCollection, String lang) { return Collections.singletonList(new NamedPattern(URL, URL_PATTERN)); } } | UrlFactory extends RegexNamedEntityFactory { @Override protected List<NamedPattern> getRegexes(SpanCollection spanCollection, String lang) { return Collections.singletonList(new NamedPattern(URL, URL_PATTERN)); } } | UrlFactory extends RegexNamedEntityFactory { @Override protected List<NamedPattern> getRegexes(SpanCollection spanCollection, String lang) { return Collections.singletonList(new NamedPattern(URL, URL_PATTERN)); } } | UrlFactory extends RegexNamedEntityFactory { @Override protected List<NamedPattern> getRegexes(SpanCollection spanCollection, String lang) { return Collections.singletonList(new NamedPattern(URL, URL_PATTERN)); } } |
@Test(expected = NullPointerException.class) public void nonNull() { Util.nonNull(null); } | public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } |
@Test(expected = IllegalStateException.class) public void notInitializedGet() { Denbun msg = DenbunBox.get("id"); } | @CheckResult public static Denbun get(@NonNull String id) { checkInitialized(); DenbunId denbunId = DenbunId.of(id); if (presetAdjuster.containsKey(denbunId)) { return get(denbunId, presetAdjuster.get(denbunId)); } else { return get(denbunId, Denbun.DEFAULT_FREQUENCY_ADJUSTER); } } | DenbunBox { @CheckResult public static Denbun get(@NonNull String id) { checkInitialized(); DenbunId denbunId = DenbunId.of(id); if (presetAdjuster.containsKey(denbunId)) { return get(denbunId, presetAdjuster.get(denbunId)); } else { return get(denbunId, Denbun.DEFAULT_FREQUENCY_ADJUSTER); } } } | DenbunBox { @CheckResult public static Denbun get(@NonNull String id) { checkInitialized(); DenbunId denbunId = DenbunId.of(id); if (presetAdjuster.containsKey(denbunId)) { return get(denbunId, presetAdjuster.get(denbunId)); } else { return get(denbunId, Denbun.DEFAULT_FREQUENCY_ADJUSTER); } } private DenbunBox(); } | DenbunBox { @CheckResult public static Denbun get(@NonNull String id) { checkInitialized(); DenbunId denbunId = DenbunId.of(id); if (presetAdjuster.containsKey(denbunId)) { return get(denbunId, presetAdjuster.get(denbunId)); } else { return get(denbunId, Denbun.DEFAULT_FREQUENCY_ADJUSTER); } } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { @CheckResult public static Denbun get(@NonNull String id) { checkInitialized(); DenbunId denbunId = DenbunId.of(id); if (presetAdjuster.containsKey(denbunId)) { return get(denbunId, presetAdjuster.get(denbunId)); } else { return get(denbunId, Denbun.DEFAULT_FREQUENCY_ADJUSTER); } } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test(expected = IllegalStateException.class) public void notInitializedPresetSingle() { DenbunBox.preset("id", new CountAdjuster(1)); } | public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test(expected = IllegalStateException.class) public void notInitializedPresetMulti() { Map<String, FrequencyAdjuster> map = new HashMap<>(); map.put("id", new CountAdjuster(1)); DenbunBox.preset(map); } | public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { public static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster) { notBlank(id, "Denbun ID can not be blank"); nonNull(adjuster); checkInitialized(); presetAdjuster.put(DenbunId.of(id), adjuster); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test public void initTwice() { DenbunBox.init(config); DenbunBox.init(config); } | public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test public void exist() { SharedPreferences pref = config.preference(); DenbunBox.init(config); assertThat(pref.getAll().isEmpty()).isTrue(); Denbun msg = DenbunBox.get("id"); msg.shown(); assertThat(pref.getAll().isEmpty()).isFalse(); assertThat(DenbunBox.exist("id")).isTrue(); } | public static boolean exist(@NonNull String id) { checkInitialized(); return dao.exist(DenbunId.of(id)); } | DenbunBox { public static boolean exist(@NonNull String id) { checkInitialized(); return dao.exist(DenbunId.of(id)); } } | DenbunBox { public static boolean exist(@NonNull String id) { checkInitialized(); return dao.exist(DenbunId.of(id)); } private DenbunBox(); } | DenbunBox { public static boolean exist(@NonNull String id) { checkInitialized(); return dao.exist(DenbunId.of(id)); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { public static boolean exist(@NonNull String id) { checkInitialized(); return dao.exist(DenbunId.of(id)); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test public void showingAction() { DenbunBox.init(config); Denbun.ShowingAction action = spy(new Denbun.ShowingAction() { @Override public void call() { } }); Denbun msg = DenbunBox.get("id"); msg.shown(action); verify(action, times(1)).call(); } | public Denbun shown() { updateState(new State( state.id, adjuster.increment(state), Time.now(), state.count + 1)); return this; } | Denbun { public Denbun shown() { updateState(new State( state.id, adjuster.increment(state), Time.now(), state.count + 1)); return this; } } | Denbun { public Denbun shown() { updateState(new State( state.id, adjuster.increment(state), Time.now(), state.count + 1)); return this; } private Denbun(@NonNull DenbunId id, @NonNull FrequencyAdjuster adjuster, @NonNull Dao dao); } | Denbun { public Denbun shown() { updateState(new State( state.id, adjuster.increment(state), Time.now(), state.count + 1)); return this; } private Denbun(@NonNull DenbunId id, @NonNull FrequencyAdjuster adjuster, @NonNull Dao dao); @NonNull String id(); boolean isSuppress(); long recent(); int count(); Denbun suppress(boolean suppress); boolean isShowable(); Denbun shown(); Denbun shown(ShowingAction action); } | Denbun { public Denbun shown() { updateState(new State( state.id, adjuster.increment(state), Time.now(), state.count + 1)); return this; } private Denbun(@NonNull DenbunId id, @NonNull FrequencyAdjuster adjuster, @NonNull Dao dao); @NonNull String id(); boolean isSuppress(); long recent(); int count(); Denbun suppress(boolean suppress); boolean isShowable(); Denbun shown(); Denbun shown(ShowingAction action); static FrequencyAdjuster DEFAULT_FREQUENCY_ADJUSTER; } |
@Test public void nonNullArg() { try { Util.nonNull(null, "test"); fail(); } catch (NullPointerException e) { assertThat(e.getMessage()).isEqualTo("test"); } } | public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } | Util { public static <T> T nonNull(T o) { return nonNull(o, "Require Non null object"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } |
@Test(expected = IllegalArgumentException.class) public void notBlank() { Util.notBlank(null); } | public static String notBlank(String s) { return notBlank(s, "Require not blank"); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } |
@Test public void notBlankArg() { try { Util.notBlank(null, "test"); fail(); } catch (IllegalArgumentException e) { assertThat(e.getMessage()).isEqualTo("test"); } } | public static String notBlank(String s) { return notBlank(s, "Require not blank"); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } | Util { public static String notBlank(String s) { return notBlank(s, "Require not blank"); } private Util(); static T nonNull(T o); static T nonNull(T o, String msg); static String notBlank(String s); static String notBlank(String s, String msg); } |
@Test public void toStringTest() { String s = new State(DenbunId.of("id"), Frequency.MIN, 0L, 0).toString(); } | @Override public String toString() { return "State{" + "id=" + id + ", frequency=" + frequency.value + ", recent=" + recent + ", count=" + count + '}'; } | State { @Override public String toString() { return "State{" + "id=" + id + ", frequency=" + frequency.value + ", recent=" + recent + ", count=" + count + '}'; } } | State { @Override public String toString() { return "State{" + "id=" + id + ", frequency=" + frequency.value + ", recent=" + recent + ", count=" + count + '}'; } State(@NonNull DenbunId id, @NonNull Frequency frequency, long recent, int count); } | State { @Override public String toString() { return "State{" + "id=" + id + ", frequency=" + frequency.value + ", recent=" + recent + ", count=" + count + '}'; } State(@NonNull DenbunId id, @NonNull Frequency frequency, long recent, int count); @CheckResult State frequency(Frequency frequency); boolean isSuppress(); boolean isShowable(); @Override String toString(); } | State { @Override public String toString() { return "State{" + "id=" + id + ", frequency=" + frequency.value + ", recent=" + recent + ", count=" + count + '}'; } State(@NonNull DenbunId id, @NonNull Frequency frequency, long recent, int count); @CheckResult State frequency(Frequency frequency); boolean isSuppress(); boolean isShowable(); @Override String toString(); @NonNull final DenbunId id; @NonNull final Frequency frequency; final long recent; final int count; } |
@SuppressWarnings("Range") @Test public void init() { assertThat(Frequency.of(MAX + 1).value).isEqualTo(MAX); assertThat(Frequency.of(MIN - 1).value).isEqualTo(MIN); assertThat(Frequency.of(50).value).isEqualTo(50); } | @CheckResult public static Frequency of(@IntRange(from = LOWER, to = UPPER) int value) { return new Frequency(value); } | Frequency { @CheckResult public static Frequency of(@IntRange(from = LOWER, to = UPPER) int value) { return new Frequency(value); } } | Frequency { @CheckResult public static Frequency of(@IntRange(from = LOWER, to = UPPER) int value) { return new Frequency(value); } private Frequency(int value); } | Frequency { @CheckResult public static Frequency of(@IntRange(from = LOWER, to = UPPER) int value) { return new Frequency(value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); } | Frequency { @CheckResult public static Frequency of(@IntRange(from = LOWER, to = UPPER) int value) { return new Frequency(value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); static final Frequency MAX; static final Frequency MIN; final int value; } |
@Test public void plus() { assertThat(Frequency.of(MIN).plus(5)).isEqualTo(Frequency.of(MIN + 5)); assertThat(Frequency.of(MAX).plus(1)).isEqualTo(Frequency.of(MAX)); assertThat(Frequency.of(MIN).plus(5).value).isEqualTo(MIN + 5); assertThat(Frequency.of(MAX).plus(1).value).isEqualTo(MAX); assertThat(Frequency.of(MIN).plus(Frequency.of(5))).isEqualTo(Frequency.of(MIN + 5)); assertThat(Frequency.of(MAX).plus(Frequency.of(1))).isEqualTo(Frequency.of(MAX)); Frequency freq = Frequency.of(1); assertThat(freq.plus(null)).isEqualTo(freq); } | @CheckResult public Frequency plus(@Nullable Frequency frequency) { if (frequency == null) return this; return plus(frequency.value); } | Frequency { @CheckResult public Frequency plus(@Nullable Frequency frequency) { if (frequency == null) return this; return plus(frequency.value); } } | Frequency { @CheckResult public Frequency plus(@Nullable Frequency frequency) { if (frequency == null) return this; return plus(frequency.value); } private Frequency(int value); } | Frequency { @CheckResult public Frequency plus(@Nullable Frequency frequency) { if (frequency == null) return this; return plus(frequency.value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); } | Frequency { @CheckResult public Frequency plus(@Nullable Frequency frequency) { if (frequency == null) return this; return plus(frequency.value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); static final Frequency MAX; static final Frequency MIN; final int value; } |
@Test public void minus() { assertThat(Frequency.of(MAX).minus(5)).isEqualTo(Frequency.of(MAX - 5)); assertThat(Frequency.of(MIN).minus(5)).isEqualTo(Frequency.of(MIN)); assertThat(Frequency.of(MAX).minus(5).value).isEqualTo(MAX - 5); assertThat(Frequency.of(MIN).minus(5).value).isEqualTo(MIN); assertThat(Frequency.of(MAX).minus(Frequency.of(5))).isEqualTo(Frequency.of(MAX - 5)); assertThat(Frequency.of(MIN).minus(Frequency.of(5))).isEqualTo(Frequency.of(MIN)); Frequency freq = Frequency.of(1); assertThat(freq.minus(null)).isEqualTo(freq); } | @CheckResult public Frequency minus(@Nullable Frequency frequency) { if (frequency == null) return this; return minus(frequency.value); } | Frequency { @CheckResult public Frequency minus(@Nullable Frequency frequency) { if (frequency == null) return this; return minus(frequency.value); } } | Frequency { @CheckResult public Frequency minus(@Nullable Frequency frequency) { if (frequency == null) return this; return minus(frequency.value); } private Frequency(int value); } | Frequency { @CheckResult public Frequency minus(@Nullable Frequency frequency) { if (frequency == null) return this; return minus(frequency.value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); } | Frequency { @CheckResult public Frequency minus(@Nullable Frequency frequency) { if (frequency == null) return this; return minus(frequency.value); } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); static final Frequency MAX; static final Frequency MIN; final int value; } |
@Test public void toStringTest() { String s = Frequency.of(1).toString(); } | @Override public String toString() { return "Frequency{value=" + value + '}'; } | Frequency { @Override public String toString() { return "Frequency{value=" + value + '}'; } } | Frequency { @Override public String toString() { return "Frequency{value=" + value + '}'; } private Frequency(int value); } | Frequency { @Override public String toString() { return "Frequency{value=" + value + '}'; } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); } | Frequency { @Override public String toString() { return "Frequency{value=" + value + '}'; } private Frequency(int value); @CheckResult static Frequency of(@IntRange(from = LOWER, to = UPPER) int value); @CheckResult Frequency plus(@Nullable Frequency frequency); @CheckResult Frequency plus(int value); @CheckResult Frequency minus(@Nullable Frequency frequency); @CheckResult Frequency minus(int value); boolean isLimited(); @Override boolean equals(Object o); @Override int hashCode(); @Override String toString(); static final Frequency MAX; static final Frequency MIN; final int value; } |
@Test(expected = NullPointerException.class) public void initNull() { DenbunBox.init(null); } | public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } | DenbunBox { public static void init(@NonNull DenbunConfig config) { nonNull(config, "DenbunConfig can not be null"); if (initialized()) { Log.w("DenbunBox", "DenbunBox is already initialized."); return; } DenbunBox.config = config; DenbunBox.presetAdjuster = new HashMap<>(); DenbunBox.dao = config.daoProvider().create(config.preference()); } private DenbunBox(); static void init(@NonNull DenbunConfig config); @RestrictTo(TESTS) static void reset(); @CheckResult static Denbun get(@NonNull String id); @CheckResult static Denbun get(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void remove(@NonNull String id); static boolean exist(@NonNull String id); static void preset(@NonNull String id, @NonNull FrequencyAdjuster adjuster); static void preset(@NonNull Map<String, FrequencyAdjuster> adjusters); } |
@Test public void should_execute_all_checks_when_using_RateLimitConditionMatchingStrategy_All() { MockHttpServletRequest request = new MockHttpServletRequest("GET", "/url"); RequestContext context = new RequestContext(); context.setRequest(request); RequestContext.testSetCurrentContext(context); when(rateLimitCheck1.rateLimit(any(), Mockito.anyBoolean())).thenReturn(consumptionProbeHolder); when(rateLimitCheck2.rateLimit(any(), Mockito.anyBoolean())).thenReturn(consumptionProbeHolder); when(rateLimitCheck3.rateLimit(any(), Mockito.anyBoolean())).thenReturn(consumptionProbeHolder); configuration.setStrategy(RateLimitConditionMatchingStrategy.ALL); filter.run(); verify(rateLimitCheck1, times(1)).rateLimit(any(), Mockito.anyBoolean()); verify(rateLimitCheck2, times(1)).rateLimit(any(), Mockito.anyBoolean()); verify(rateLimitCheck3, times(1)).rateLimit(any(), Mockito.anyBoolean()); } | @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); @Override Object run(); @Override boolean shouldFilter(); @Override int filterOrder(); @Override String filterType(); } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); @Override Object run(); @Override boolean shouldFilter(); @Override int filterOrder(); @Override String filterType(); } |
@Test public void should_execute_only_one_check_when_using_RateLimitConditionMatchingStrategy_FIRST() { MockHttpServletRequest request = new MockHttpServletRequest("GET", "/url"); RequestContext context = new RequestContext(); context.setRequest(request); RequestContext.testSetCurrentContext(context); configuration.setStrategy(RateLimitConditionMatchingStrategy.FIRST); when(rateLimitCheck1.rateLimit(any(), Mockito.anyBoolean())).thenReturn(consumptionProbeHolder); filter.run(); verify(rateLimitCheck1, times(1)).rateLimit(any(), Mockito.anyBoolean()); verify(rateLimitCheck2, times(0)).rateLimit(any(), Mockito.anyBoolean()); verify(rateLimitCheck3, times(0)).rateLimit(any(), Mockito.anyBoolean()); } | @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); @Override Object run(); @Override boolean shouldFilter(); @Override int filterOrder(); @Override String filterType(); } | ZuulRateLimitFilter extends ZuulFilter { @Override public Object run() { RequestContext context = getCurrentRequestContext(); HttpServletRequest request = context.getRequest(); Long remainingLimit = null; for (RateLimitCheck<HttpServletRequest> rl : filterConfig.getRateLimitChecks()) { ConsumptionProbeHolder probeHolder = rl.rateLimit(request, false); if (probeHolder != null && probeHolder.getConsumptionProbe() != null) { ConsumptionProbe probe = probeHolder.getConsumptionProbe(); if (probe.isConsumed()) { remainingLimit = getRemainingLimit(remainingLimit, probe); } else { context.setResponseStatusCode(HttpStatus.TOO_MANY_REQUESTS.value()); context.addZuulResponseHeader("X-Rate-Limit-Retry-After-Seconds", "" + TimeUnit.NANOSECONDS.toSeconds(probe.getNanosToWaitForRefill())); context.setResponseBody(filterConfig.getHttpResponseBody()); context.setSendZuulResponse(false); break; } if(filterConfig.getStrategy().equals(RateLimitConditionMatchingStrategy.FIRST)) { break; } } }; return null; } ZuulRateLimitFilter(FilterConfiguration<HttpServletRequest> filterConfig); @Override Object run(); @Override boolean shouldFilter(); @Override int filterOrder(); @Override String filterType(); } |
@Test(expected = APIKeyNotAssignedException.class) public void should_Return_Exception_When_No_API_Key_Is_Supplied() throws APIKeyNotAssignedException { uriBuilder.build(); } | public APIConnection build() throws APIKeyNotAssignedException { buildFinalURLWithCommandString(); buildFinalURLWithTheAPIKey(); buildFinalURLWithParametersToken(); return new APIConnection(finalURL); } | UriBuilder { public APIConnection build() throws APIKeyNotAssignedException { buildFinalURLWithCommandString(); buildFinalURLWithTheAPIKey(); buildFinalURLWithParametersToken(); return new APIConnection(finalURL); } } | UriBuilder { public APIConnection build() throws APIKeyNotAssignedException { buildFinalURLWithCommandString(); buildFinalURLWithTheAPIKey(); buildFinalURLWithParametersToken(); return new APIConnection(finalURL); } UriBuilder(String baseURL); } | UriBuilder { public APIConnection build() throws APIKeyNotAssignedException { buildFinalURLWithCommandString(); buildFinalURLWithTheAPIKey(); buildFinalURLWithParametersToken(); return new APIConnection(finalURL); } UriBuilder(String baseURL); APIConnection build(); String getFinalURL(); UriBuilder setCommand(String commandString); UriBuilder setAPIKey(String apiKey, String apiKeyValue); void addUrlParameter(String key, String value); UriBuilder setParamStart(String paramStart); UriBuilder setApiKeyIsRequired(boolean apiKeyIsRequired); UriBuilder setNoAPIKeyRequired(); } | UriBuilder { public APIConnection build() throws APIKeyNotAssignedException { buildFinalURLWithCommandString(); buildFinalURLWithTheAPIKey(); buildFinalURLWithParametersToken(); return new APIConnection(finalURL); } UriBuilder(String baseURL); APIConnection build(); String getFinalURL(); UriBuilder setCommand(String commandString); UriBuilder setAPIKey(String apiKey, String apiKeyValue); void addUrlParameter(String key, String value); UriBuilder setParamStart(String paramStart); UriBuilder setApiKeyIsRequired(boolean apiKeyIsRequired); UriBuilder setNoAPIKeyRequired(); } |
@Test public void should_Return_Property_Value() throws PropertyNotDefinedException { String propertyValue = readPropertyFrom("src/test/resources/test.properties", "propertyKey"); assertThat("The property value is not the expected one", propertyValue, is("propertyValue")); } | public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test(expected = IllegalStateException.class) public void should_Fail_If_File_Does_Not_Exist() throws PropertyNotDefinedException { readPropertyFrom("non-existing-path", "propertyKey"); } | public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test(expected = PropertyNotDefinedException.class) public void should_Fail_If_Property_Does_Not_Exist() throws PropertyNotDefinedException { readPropertyFrom("src/test/resources/test.properties", "nonExistingPropertyKey"); } | public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String readPropertyFrom(String propertyFilename, String propertyName) throws PropertyNotDefinedException { Properties prop = new Properties(); try { prop.load(new FileReader(new File(propertyFilename))); String propertyValue = prop.getProperty(propertyName); if(propertyValue != null) { return propertyValue; } throw new PropertyNotDefinedException("There is no property " + propertyName + " defined on file " + propertyFilename); } catch (IOException exception) { try { logger.info("Current path: " + new File(".").getCanonicalPath()); } catch (IOException e) { logger.info("Could not determine the current path"); } logger.error(exception.getMessage()); throw new IllegalStateException("IO Exception occurred due to the following: " + exception.getMessage()); } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Send_A_Get_Request() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); apiReader.executeGetUrl(); verify(mockConnection).setRequestMethod(GET_REQUEST_METHOD); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Return_Response_To_Http_Get_Request() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); String response = apiReader.executeGetUrl(); assertThat(response, is("response")); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Return_Response_Without_Delimiters_To_Http_Get_Request() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("[[response]]")); String response = apiReader.executeGetUrl(); assertThat(response, is("response")); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Send_A_Get_Request_With_Request_Properties() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); Map<String, String> properties = createProperties(); apiReader.executeGetUrl(properties); verify(mockConnection).setRequestProperty("propertyKey1", "propertyValue1"); verify(mockConnection).setRequestProperty("propertyKey2", "propertyValue2"); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Send_A_Get_Request_With_No_Request_Properties() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); Map<String, String> properties = new HashMap<>(); apiReader.executeGetUrl(properties); verify(mockConnection, never()).setRequestProperty(anyString(), anyString()); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Disconnect_When_Http_Get_Request_Response_Is_Back() throws IOException { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("")); apiReader.executeGetUrl(); verify(mockConnection).disconnect(); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Disconnect_When_Http_Get_Request_Throws_An_Error() throws IOException { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("")); try { apiReader.executeGetUrl(); } catch (IOException e) { } finally { verify(mockConnection).disconnect(); } } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Verify_Invalid_JSON_Text() { assertThat(isAValidJSONText("{abcde"), is(false)); } | public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test(expected = IOException.class) public void should_Throw_Exception_When_Connection_Error_On_Get_Request() throws Exception { when(mockConnection.getInputStream()).thenThrow(IOException.class); apiReader.executeGetUrl(new HashMap<String, String>()); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Return_Response_To_Http_Post_Request() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); String response = apiReader.executePostUrl(); assertThat(response, is("response")); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Return_Response_Without_Delimiters_To_Http_Post_Request() throws Exception { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("[[response]]")); String response = apiReader.executePostUrl(); assertThat(response, is("response")); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Fire_Http_Post_Request_With_Appropriate_Url_Parameters() throws Exception { String urlParameters = "urlParameters"; when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); APIReader apiReader = createAPIReaderWithMockWriter(); apiReader.executePostUrl(urlParameters); verify(mockWriter).write(urlParameters); verify(mockWriter).flush(); verify(mockWriter).close(); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Fire_Http_Post_Request_With_No_Url_Parameters() throws Exception { String urlParameters = ""; when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response")); APIReader apiReader = createAPIReaderWithMockWriter(); apiReader.executePostUrl(urlParameters); verifyZeroInteractions(mockWriter); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Disconnect_When_Http_Post_Request_Response_Is_Back() throws IOException { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("")); apiReader.executePostUrl(); verify(mockConnection).disconnect(); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test(expected = IOException.class) public void should_Throw_Exception_When_Connection_Error_On_Post_Request() throws Exception { when(mockConnection.getInputStream()).thenThrow(IOException.class); apiReader.executePostUrl(); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Disconnect_When_Http_Post_Request_Throws_An_Error() throws IOException { when(mockConnection.getInputStream()).thenThrow(IOException.class); try { apiReader.executePostUrl(); } catch (IOException exception) { } finally { verify(mockConnection).disconnect(); } } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Only_Return_Response_For_Last_Get_Request() throws IOException { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response 1")); apiReader.executeGetUrl(); when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response 2")); String response = apiReader.executeGetUrl(); assertThat(response, is("response 2")); } | public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executeGetUrl() throws IOException { Map<String, String> requestProperties = new HashMap<String, String>(); requestProperties.put("User-Agent", "RestAPIUnifier"); return executeGetUrl(requestProperties); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Only_Return_Response_For_Last_Post_Request() throws IOException { when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response 1")); apiReader.executePostUrl(); when(mockConnection.getInputStream()).thenReturn(IOUtils.toInputStream("response 2")); String response = apiReader.executePostUrl(); assertThat(response, is("response 2")); } | public String executePostUrl() throws IOException { return executePostUrl(""); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } | APIReader { public String executePostUrl() throws IOException { return executePostUrl(""); } APIReader(UriBuilder uriBuilder); APIReader(String url); APIReader(URL url); APIReader setHeader(String header, String value); String executeGetUrl(); String executePostUrl(); String executePostUrl(String urlParameters); String executeGetUrl(Map<String, String> requestProperties); } |
@Test public void should_Verify_Valid_JSON_Text() { assertThat(isAValidJSONText("{color:'green', status: 'good'}"), is(true)); } | public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static boolean isAValidJSONText(String resultAsString) { try { new JSONObject(resultAsString); return true; } catch (JSONException ex) { return false; } } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Return_A_Plus_When_Space_Is_Passed_To_Encode_Token() { assertThat(urlEncode(" "), is("+")); } | public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test(expected = IllegalArgumentException.class) public void should_Return_IllegalArgumentException_If_Null_Is_Passed_To_Encode_Token() { Utils.urlEncode(null); } | public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String urlEncode(String token) { if (token == null) { throw new IllegalArgumentException(THE_TOKEN_CANNOT_BE_NULL_MSG); } String encodedToken = token; try { encodedToken = URLEncoder.encode(token, UTF_8); } catch (UnsupportedEncodingException uee) { logger.warn(INVALID_TOKEN_WARNING); } return encodedToken; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Remove_Trailing_Separator_From_String_When_A_Single_Separator_Is_Passed_In() { assertThat(dropTrailingSeparator("http: } | public static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator) { return StringUtils.substringBeforeLast(urlParameterTokens, paramSeparator); } | Utils { public static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator) { return StringUtils.substringBeforeLast(urlParameterTokens, paramSeparator); } } | Utils { public static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator) { return StringUtils.substringBeforeLast(urlParameterTokens, paramSeparator); } private Utils(); } | Utils { public static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator) { return StringUtils.substringBeforeLast(urlParameterTokens, paramSeparator); } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator) { return StringUtils.substringBeforeLast(urlParameterTokens, paramSeparator); } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Drop_Begin_And_End_Delimiters_In_An_Empty_String() { String inputString = "[]"; String actualString = dropStartAndEndDelimiters(inputString); String expectedString = ""; assertThat("Begin & End delimiters haven't been dropped", actualString, is(expectedString)); } | public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Drop_Double_Begin_And_End_Delimiters_In_An_Empty_String() { String inputString = "[[]]"; String actualString = dropStartAndEndDelimiters(inputString); actualString = dropStartAndEndDelimiters(actualString); String expectedString = ""; assertThat("Begin & End delimiters haven't been dropped", actualString, is(expectedString)); } | public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Drop_Begin_And_End_Delimiters_In_A_Simple_String() { String inputString = "[{'some': 'value'}]"; String actualString = dropStartAndEndDelimiters(inputString); String expectedString = "{'some': 'value'}"; assertThat("Begin & End delimiters haven't been dropped", actualString, is(expectedString)); } | public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void should_Drop_Double_Begin_And_End_Delimiters_In_A_Simple_String() { String inputString = "[[{'some': 'value'}]]"; String actualString = dropStartAndEndDelimiters(inputString); actualString = dropStartAndEndDelimiters(actualString); String expectedString = "{'some': 'value'}"; assertThat("Begin & End delimiters haven't been dropped", actualString, is(expectedString)); } | public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); } | Utils { public static String dropStartAndEndDelimiters(String inputString) { String result = inputString; if (result.startsWith(OPENING_BOX_BRACKET)) { if (result.length() == 1) { result = ""; } else { result = result.substring(1, result.length()); } } if (result.endsWith(CLOSING_BOX_BRACKET)) { result = result.substring(0, result.length() - 1); } return result; } private Utils(); static String dropTrailingSeparator(String urlParameterTokens, String paramSeparator); static String urlEncode(String token); static boolean isAValidJSONText(String resultAsString); static String readPropertyFrom(String propertyFilename, String propertyName); static String dropStartAndEndDelimiters(String inputString); static final String OPENING_BOX_BRACKET; static final String CLOSING_BOX_BRACKET; } |
@Test public void testPreSendServerSpan() { MessageBuilder<String> messageBuilder = MessageBuilder.withPayload("Hi") .setHeader(TracingChannelInterceptor.SIMP_MESSAGE_TYPE, SimpMessageType.MESSAGE) .setHeader(TracingChannelInterceptor.SIMP_DESTINATION, TEST_DESTINATION); MockSpan parentSpan = mockTracer.buildSpan("parent").start(); mockTracer.inject(parentSpan.context(), Format.Builtin.TEXT_MAP, new TextMapInjectAdapter(messageBuilder)); TracingChannelInterceptor interceptor = new TracingChannelInterceptor(mockTracer, Tags.SPAN_KIND_SERVER); Message<?> processed = interceptor.preSend(messageBuilder.build(), null); assertTrue(processed.getHeaders().containsKey(TracingChannelInterceptor.OPENTRACING_SPAN)); MockSpan childSpan = (MockSpan) processed.getHeaders() .get(TracingChannelInterceptor.OPENTRACING_SPAN); assertEquals(parentSpan.context().spanId(), childSpan.parentId()); assertEquals(parentSpan.context().traceId(), childSpan.context().traceId()); assertEquals(TEST_DESTINATION, childSpan.operationName()); assertEquals(Tags.SPAN_KIND_SERVER, childSpan.tags().get(Tags.SPAN_KIND.getKey())); assertEquals(TracingChannelInterceptor.WEBSOCKET, childSpan.tags().get(Tags.COMPONENT.getKey())); } | private Message<?> preSendServerSpan(Message<?> message) { Span span = tracer.buildSpan((String) message.getHeaders() .getOrDefault(SIMP_DESTINATION, UNKNOWN_DESTINATION)) .asChildOf(tracer .extract(Format.Builtin.TEXT_MAP, new TextMapExtractAdapter(message.getHeaders()))) .withTag(Tags.SPAN_KIND.getKey(), spanKind) .withTag(Tags.COMPONENT.getKey(), WEBSOCKET) .start(); return MessageBuilder.fromMessage(message) .setHeader(OPENTRACING_SPAN, span) .build(); } | TracingChannelInterceptor extends ChannelInterceptorAdapter implements
ExecutorChannelInterceptor { private Message<?> preSendServerSpan(Message<?> message) { Span span = tracer.buildSpan((String) message.getHeaders() .getOrDefault(SIMP_DESTINATION, UNKNOWN_DESTINATION)) .asChildOf(tracer .extract(Format.Builtin.TEXT_MAP, new TextMapExtractAdapter(message.getHeaders()))) .withTag(Tags.SPAN_KIND.getKey(), spanKind) .withTag(Tags.COMPONENT.getKey(), WEBSOCKET) .start(); return MessageBuilder.fromMessage(message) .setHeader(OPENTRACING_SPAN, span) .build(); } } | TracingChannelInterceptor extends ChannelInterceptorAdapter implements
ExecutorChannelInterceptor { private Message<?> preSendServerSpan(Message<?> message) { Span span = tracer.buildSpan((String) message.getHeaders() .getOrDefault(SIMP_DESTINATION, UNKNOWN_DESTINATION)) .asChildOf(tracer .extract(Format.Builtin.TEXT_MAP, new TextMapExtractAdapter(message.getHeaders()))) .withTag(Tags.SPAN_KIND.getKey(), spanKind) .withTag(Tags.COMPONENT.getKey(), WEBSOCKET) .start(); return MessageBuilder.fromMessage(message) .setHeader(OPENTRACING_SPAN, span) .build(); } TracingChannelInterceptor(Tracer tracer, String spanKind); } | TracingChannelInterceptor extends ChannelInterceptorAdapter implements
ExecutorChannelInterceptor { private Message<?> preSendServerSpan(Message<?> message) { Span span = tracer.buildSpan((String) message.getHeaders() .getOrDefault(SIMP_DESTINATION, UNKNOWN_DESTINATION)) .asChildOf(tracer .extract(Format.Builtin.TEXT_MAP, new TextMapExtractAdapter(message.getHeaders()))) .withTag(Tags.SPAN_KIND.getKey(), spanKind) .withTag(Tags.COMPONENT.getKey(), WEBSOCKET) .start(); return MessageBuilder.fromMessage(message) .setHeader(OPENTRACING_SPAN, span) .build(); } TracingChannelInterceptor(Tracer tracer, String spanKind); @Override Message<?> preSend(Message<?> message, MessageChannel channel); @Override void afterMessageHandled(Message<?> message, MessageChannel channel,
MessageHandler handler, Exception arg3); @Override Message<?> beforeHandle(Message<?> message, MessageChannel channel,
MessageHandler handler); } | TracingChannelInterceptor extends ChannelInterceptorAdapter implements
ExecutorChannelInterceptor { private Message<?> preSendServerSpan(Message<?> message) { Span span = tracer.buildSpan((String) message.getHeaders() .getOrDefault(SIMP_DESTINATION, UNKNOWN_DESTINATION)) .asChildOf(tracer .extract(Format.Builtin.TEXT_MAP, new TextMapExtractAdapter(message.getHeaders()))) .withTag(Tags.SPAN_KIND.getKey(), spanKind) .withTag(Tags.COMPONENT.getKey(), WEBSOCKET) .start(); return MessageBuilder.fromMessage(message) .setHeader(OPENTRACING_SPAN, span) .build(); } TracingChannelInterceptor(Tracer tracer, String spanKind); @Override Message<?> preSend(Message<?> message, MessageChannel channel); @Override void afterMessageHandled(Message<?> message, MessageChannel channel,
MessageHandler handler, Exception arg3); @Override Message<?> beforeHandle(Message<?> message, MessageChannel channel,
MessageHandler handler); } |
@Test public void getActiveCount() { scheduler.getActiveCount(); verify(delegate).getActiveCount(); } | @Override public int getActiveCount() { return delegate.getActiveCount(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public int getActiveCount() { return delegate.getActiveCount(); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public int getActiveCount() { return delegate.getActiveCount(); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public int getActiveCount() { return delegate.getActiveCount(); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public int getActiveCount() { return delegate.getActiveCount(); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void execute() { final ArgumentCaptor<TracedRunnable> argumentCaptor = ArgumentCaptor.forClass(TracedRunnable.class); scheduler.execute(mockRunnable); verify(delegate).execute(argumentCaptor.capture()); verifyTracedRunnable(argumentCaptor.getValue(), mockRunnable, mockTracer); } | @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void executeWithTimeout() { final ArgumentCaptor<TracedRunnable> argumentCaptor = ArgumentCaptor.forClass(TracedRunnable.class); scheduler.execute(mockRunnable, 1000L); verify(delegate).execute(argumentCaptor.capture(), eq(1000L)); verifyTracedRunnable(argumentCaptor.getValue(), mockRunnable, mockTracer); } | @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public void execute(Runnable task) { delegate.execute(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void submitRunnable() { final ArgumentCaptor<TracedRunnable> argumentCaptor = ArgumentCaptor.forClass(TracedRunnable.class); scheduler.submit(mockRunnable); verify(delegate).submit(argumentCaptor.capture()); verifyTracedRunnable(argumentCaptor.getValue(), mockRunnable, mockTracer); } | @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void submitCallable() { final ArgumentCaptor<TracedCallable> argumentCaptor = ArgumentCaptor.forClass(TracedCallable.class); scheduler.submit(mockCallable); verify(delegate).submit(argumentCaptor.capture()); verifyTracedCallable(argumentCaptor.getValue(), mockCallable, mockTracer); } | @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public Future<?> submit(Runnable task) { return delegate.submit(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void submitListenableRunnable() { final ArgumentCaptor<TracedRunnable> argumentCaptor = ArgumentCaptor.forClass(TracedRunnable.class); scheduler.submitListenable(mockRunnable); verify(delegate).submitListenable(argumentCaptor.capture()); verifyTracedRunnable(argumentCaptor.getValue(), mockRunnable, mockTracer); } | @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
@Test public void submitListenableCallable() { final ArgumentCaptor<TracedCallable> argumentCaptor = ArgumentCaptor.forClass(TracedCallable.class); scheduler.submitListenable(mockCallable); verify(delegate).submitListenable(argumentCaptor.capture()); verifyTracedCallable(argumentCaptor.getValue(), mockCallable, mockTracer); } | @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } | TracedThreadPoolTaskScheduler extends ThreadPoolTaskScheduler { @Override public ListenableFuture<?> submitListenable(Runnable task) { return delegate.submitListenable(new TracedRunnable(task, tracer)); } TracedThreadPoolTaskScheduler(Tracer tracer, ThreadPoolTaskScheduler delegate); @Override void setPoolSize(int poolSize); @Override void setRemoveOnCancelPolicy(boolean removeOnCancelPolicy); @Override void setErrorHandler(ErrorHandler errorHandler); @Override ScheduledExecutorService getScheduledExecutor(); @Override ScheduledThreadPoolExecutor getScheduledThreadPoolExecutor(); @Override int getPoolSize(); @Override boolean isRemoveOnCancelPolicy(); @Override int getActiveCount(); @Override void execute(Runnable task); @Override void execute(Runnable task, long startTimeout); @Override Future<?> submit(Runnable task); @Override Future<T> submit(Callable<T> task); @Override ListenableFuture<?> submitListenable(Runnable task); @Override ListenableFuture<T> submitListenable(Callable<T> task); @Override @Nullable ScheduledFuture<?> schedule(Runnable task, Trigger trigger); @Override ScheduledFuture<?> schedule(Runnable task, Date startTime); @Override ScheduledFuture<?> schedule(Runnable task, Instant startTime); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Date startTime, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Instant startTime, Duration period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, long period); @Override ScheduledFuture<?> scheduleAtFixedRate(Runnable task, Duration period); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Date startTime, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, long delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Instant startTime,
Duration delay); @Override ScheduledFuture<?> scheduleWithFixedDelay(Runnable task, Duration delay); @Override void setThreadFactory(ThreadFactory threadFactory); @Override void setThreadNamePrefix(String threadNamePrefix); @Override void setRejectedExecutionHandler(RejectedExecutionHandler rejectedExecutionHandler); @Override void setWaitForTasksToCompleteOnShutdown(boolean waitForJobsToCompleteOnShutdown); @Override void setAwaitTerminationSeconds(int awaitTerminationSeconds); @Override void setBeanName(String name); @Override void afterPropertiesSet(); @Override void initialize(); @Override void destroy(); @Override void shutdown(); @Override Thread newThread(Runnable runnable); @Override String getThreadNamePrefix(); @Override void setThreadPriority(int threadPriority); @Override int getThreadPriority(); @Override void setDaemon(boolean daemon); @Override boolean isDaemon(); @Override void setThreadGroupName(String name); @Override void setThreadGroup(ThreadGroup threadGroup); @Override @Nullable ThreadGroup getThreadGroup(); @Override Thread createThread(Runnable runnable); @Override boolean prefersShortLivedTasks(); } |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.