
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
eu.xenit.apix:apix-impl-70-amp
Advanced tools
Alfred API abstracts away past and future changes to the Alfresco, across major and minor versions, providing a stable interface to Alfresco on which client-side applications can be built.
It also provides functional grouping of related operations from the Alfresco Public API, and additional endpoints that are not supported by the Alfresco Public API.
Alfred API is a part of the Xenit Open Source Tooling around Alfresco. Xenit is company with a deep expertise and strong team centered around Alfresco. If you'd like to learn more about our tools, services and products, please visit our website.
Full documentation can be found at the project's documentation.
Alfred API requires Dynamic Extensions For Alfresco, version 2.0.1 or later. This module should be installed first. Acquisition and installation instructions can be found here.
this. prefix for consistency (unless the scope is ambiguous).The following command starts up all docker containers required for an Alfresco running Alfred API.
./gradlew :apix-docker:docker-${VERSION}:composeUp --info
Where VERSION is e.g. 70.
./gradlew :apix-integrationtests:test-${VERSION}:integrationTest
Again, where VERSION is e.g. 70.
However, this starts (and afterwards stops) docker containers. This includes starting an Alfresco container, adding a startup time of several minutes. To circumvent this you also run the test on already running containers with for example:
./gradlew -x composeUp -x composeDown :apix-integrationtests:test-61:integrationTest -Pprotocol=http -Phost=localhost -Pport=8061
apix-docker/${VERSION}/debug-extension.docker-compose.yml, including a
portmapping 8000:8000. This file does not get loaded when running in Jenkins.Again, where VERSION is e.g. 70.
In a development scenario, it is possible to upload code changes to a running alfresco through dynamic extensions.
This requires the running alfresco to already have an older or equal version of alfred-api installed, and
the use of the jar artifact instead of the amp to do the new install.
The JAR has the format apix-impl-{ALFRESCO-VERSION}-{APIX-VERSION}.jar and can be found under
apix-impl/{ALFRESCO-VERSION}/build/libs/, where ALFRESCO-VERSION is one of (62|70|71|72|73).
The new installation can be done either through the DE web interface, or with the following gradle task.
./gradlew :apix-impl:apix-impl-{ALFRESCO-VERSION}:installBundle -Phost={ALFRESCO-HOST} -Pport={ALFRESCO-PORT}
Where VERSION is e.g. 70 and here PORT is the port mapping of the alfresco-core container e.g. 32774.
Protip: If you get tired of changing the port after every docker-compose up, you can temporarily put a
fixed port in the docker-compose.yml of the version you are working with. (The rationale behind using
variable ephemeral ports is that during parallel builds on Jenkins port clashes must be avoided.)
For example for version 7.0, change in apix-docker/70/docker-compose.yml the ports line from:
services:
alfresco-core:
ports:
- ${DOCKER_IP}:8080
to:
services:
alfresco-core:
ports:
- ${DOCKER_IP}:9070:8080
and then restart the containers with:
./gradlew :apix-docker:docker-70:composeUp --info
FAQs
Xenit API-X implementation Alfresco 7.0
We found that eu.xenit.apix:apix-impl-70-amp demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.