
Product
Introducing Webhook Events for Alert Changes
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.
eu.xenit.apix:apix-impl-70-amp
Advanced tools
Alfred API abstracts away past and future changes to the Alfresco, across major and minor versions, providing a stable interface to Alfresco on which client-side applications can be built.
It also provides functional grouping of related operations from the Alfresco Public API, and additional endpoints that are not supported by the Alfresco Public API.
Alfred API is a part of the Xenit Open Source Tooling around Alfresco. Xenit is company with a deep expertise and strong team centered around Alfresco. If you'd like to learn more about our tools, services and products, please visit our website.
Full documentation can be found at the project's documentation.
Alfred API requires Dynamic Extensions For Alfresco, version 2.0.1 or later. This module should be installed first. Acquisition and installation instructions can be found here.
this. prefix for consistency (unless the scope is ambiguous).The following command starts up all docker containers required for an Alfresco running Alfred API.
./gradlew :apix-docker:docker-${VERSION}:composeUp --info
Where VERSION is e.g. 70.
./gradlew :apix-integrationtests:test-${VERSION}:integrationTest
Again, where VERSION is e.g. 70.
However, this starts (and afterwards stops) docker containers. This includes starting an Alfresco container, adding a startup time of several minutes. To circumvent this you also run the test on already running containers with for example:
./gradlew -x composeUp -x composeDown :apix-integrationtests:test-61:integrationTest -Pprotocol=http -Phost=localhost -Pport=8061
apix-docker/${VERSION}/debug-extension.docker-compose.yml, including a
portmapping 8000:8000. This file does not get loaded when running in Jenkins.Again, where VERSION is e.g. 70.
In a development scenario, it is possible to upload code changes to a running alfresco through dynamic extensions.
This requires the running alfresco to already have an older or equal version of alfred-api installed, and
the use of the jar artifact instead of the amp to do the new install.
The JAR has the format apix-impl-{ALFRESCO-VERSION}-{APIX-VERSION}.jar and can be found under
apix-impl/{ALFRESCO-VERSION}/build/libs/, where ALFRESCO-VERSION is one of (62|70|71|72|73).
The new installation can be done either through the DE web interface, or with the following gradle task.
./gradlew :apix-impl:apix-impl-{ALFRESCO-VERSION}:installBundle -Phost={ALFRESCO-HOST} -Pport={ALFRESCO-PORT}
Where VERSION is e.g. 70 and here PORT is the port mapping of the alfresco-core container e.g. 32774.
Protip: If you get tired of changing the port after every docker-compose up, you can temporarily put a
fixed port in the docker-compose.yml of the version you are working with. (The rationale behind using
variable ephemeral ports is that during parallel builds on Jenkins port clashes must be avoided.)
For example for version 7.0, change in apix-docker/70/docker-compose.yml the ports line from:
services:
alfresco-core:
ports:
- ${DOCKER_IP}:8080
to:
services:
alfresco-core:
ports:
- ${DOCKER_IP}:9070:8080
and then restart the containers with:
./gradlew :apix-docker:docker-70:composeUp --info
FAQs
Xenit API-X implementation Alfresco 7.0
We found that eu.xenit.apix:apix-impl-70-amp demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.

Security News
ENISA has become a CVE Program Root, giving the EU a central authority for coordinating vulnerability reporting, disclosure, and cross-border response.

Product
Socket now scans OpenVSX extensions, giving teams early detection of risky behaviors, hidden capabilities, and supply chain threats in developer tools.