summaryrefslogtreecommitdiffstats
path: root/authz-batch/src/main/java/com/att/authz/actions/URFutureApprove.java
blob: 3401080c72889e462f6fa3e7ba178dc04de58841 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
/*******************************************************************************
 * Copyright (c) 2016 AT&T Intellectual Property. All rights reserved.
 *******************************************************************************/
package com.att.authz.actions;

import java.io.IOException;
import java.util.Date;
import java.util.GregorianCalendar;
import java.util.List;

import com.att.authz.env.AuthzTrans;
import com.att.authz.helpers.UserRole;
import com.att.authz.layer.Result;
import com.att.authz.org.Organization.Expiration;
import com.att.authz.org.Organization.Identity;
import com.att.dao.aaf.cass.FutureDAO;
import com.att.dao.aaf.cass.NsDAO;
import com.att.dao.aaf.hl.Function;
import com.att.dao.aaf.hl.Question;
import com.att.inno.env.APIException;
import com.att.inno.env.util.Chrono;
import com.datastax.driver.core.Cluster;

public class URFutureApprove extends ActionDAO<UserRole, List<Identity>> implements Action<UserRole,List<Identity>>, Key<UserRole> {
	private final Date start, expires;

	public URFutureApprove(AuthzTrans trans, Cluster cluster) throws APIException, IOException {
		super(trans,cluster);
		GregorianCalendar gc = new GregorianCalendar();
		start = gc.getTime();
		expires = trans.org().expiration(gc, Expiration.Future).getTime();
	}
	
	public URFutureApprove(AuthzTrans trans, ActionDAO<?,?> adao) {
		super(trans, adao);
		GregorianCalendar gc = new GregorianCalendar();
		start = gc.getTime();
		expires = trans.org().expiration(gc, Expiration.Future).getTime();
	}

	@Override
	public Result<List<Identity>> exec(AuthzTrans trans, UserRole ur) {
		Result<NsDAO.Data> rns = q.deriveNs(trans, ur.ns);
		if(rns.isOK()) {
			
			FutureDAO.Data data = new FutureDAO.Data();
			data.id=null; // let Create function assign UUID
			data.target=Function.FOP_USER_ROLE;
			
			data.memo = key(ur);
			data.start = start;
			data.expires = expires;
			try {
				data.construct = ur.to().bytify();
			} catch (IOException e) {
				return Result.err(e);
			}
			Result<List<Identity>> rapprovers = f.createFuture(trans, data, Function.FOP_USER_ROLE, ur.user, rns.value, "U");
			return rapprovers;
		} else {
			return Result.err(rns);
		}
	}
	
	@Override
	public String key(UserRole ur) {
		String expire;
		if(expires.before(start)) {
			expire = "' - EXPIRED ";
		} else {
			expire = "' - expiring ";
		}
		
		if(Question.OWNER.equals(ur.rname)) {
			return "Re-Validate Ownership for AAF Namespace '" + ur.ns + expire + Chrono.dateOnlyStamp(ur.expires);
		} else if(Question.ADMIN.equals(ur.rname)) {
			return "Re-Validate as Administrator for AAF Namespace '" + ur.ns + expire + Chrono.dateOnlyStamp(ur.expires);
		} else {
			return "Re-Approval in Role '" + ur.role + expire + Chrono.dateOnlyStamp(ur.expires);
		}
	}

}