summaryrefslogtreecommitdiffstats
path: root/authz-cass/src/main/java/com/att/dao/aaf/cached/CachedRoleDAO.java
blob: b783644991eef6738fce4c70ca80608a6e0294e2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
/*******************************************************************************
 * ============LICENSE_START====================================================
 * * org.onap.aai
 * * ===========================================================================
 * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
 * * Copyright © 2017 Amdocs
 * * ===========================================================================
 * * Licensed under the Apache License, Version 2.0 (the "License");
 * * you may not use this file except in compliance with the License.
 * * You may obtain a copy of the License at
 * * 
 *  *      http://www.apache.org/licenses/LICENSE-2.0
 * * 
 *  * Unless required by applicable law or agreed to in writing, software
 * * distributed under the License is distributed on an "AS IS" BASIS,
 * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * * See the License for the specific language governing permissions and
 * * limitations under the License.
 * * ============LICENSE_END====================================================
 * *
 * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
 * *
 ******************************************************************************/
package com.att.dao.aaf.cached;

import java.util.List;

import com.att.authz.env.AuthzTrans;
import com.att.authz.layer.Result;
import com.att.dao.CIDAO;
import com.att.dao.CachedDAO;
import com.att.dao.aaf.cass.PermDAO;
import com.att.dao.aaf.cass.RoleDAO;
import com.att.dao.aaf.cass.RoleDAO.Data;
import com.att.dao.aaf.cass.Status;

public class CachedRoleDAO extends CachedDAO<AuthzTrans,RoleDAO, RoleDAO.Data> {
	public CachedRoleDAO(RoleDAO dao, CIDAO<AuthzTrans> info) {
		super(dao, info, RoleDAO.CACHE_SEG);
	}

	public Result<List<Data>> readNS(AuthzTrans trans, final String ns) {
		DAOGetter getter = new DAOGetter(trans,dao()) {
			public Result<List<Data>> call() {
				return dao.readNS(trans, ns);
			}
		};
		
		Result<List<Data>> lurd = get(trans, ns, getter);
		if(lurd.isOK() && lurd.isEmpty()) {
			return Result.err(Status.ERR_RoleNotFound,"No Role found");
		}
		return lurd;
	}

	public Result<List<Data>> readName(AuthzTrans trans, final String name) {
		DAOGetter getter = new DAOGetter(trans,dao()) {
			public Result<List<Data>> call() {
				return dao().readName(trans, name);
			}
		};
		
		Result<List<Data>> lurd = get(trans, name, getter);
		if(lurd.isOK() && lurd.isEmpty()) {
			return Result.err(Status.ERR_RoleNotFound,"No Role found");
		}
		return lurd;
	}

	public Result<List<Data>> readChildren(AuthzTrans trans, final String ns, final String name) {
		// At this point, I'm thinking it's better not to try to cache "*" results
		// Data probably won't be accurate, and adding it makes every update invalidate most of the cache
		// 2/4/2014
		return dao().readChildren(trans,ns,name);
	}

	public Result<Void> addPerm(AuthzTrans trans, RoleDAO.Data rd, PermDAO.Data perm) {
		Result<Void> rv = dao().addPerm(trans,rd,perm);
		if(trans.debug().isLoggable())
			trans.debug().log("Adding",perm,"to", rd, "with CachedRoleDAO.addPerm");
		invalidate(trans, rd);
		return rv;
	}

	public Result<Void> delPerm(AuthzTrans trans, RoleDAO.Data rd, PermDAO.Data perm) {
		Result<Void> rv = dao().delPerm(trans,rd,perm);
		if(trans.debug().isLoggable())
			trans.debug().log("Removing",perm,"from", rd, "with CachedRoleDAO.addPerm");
		invalidate(trans, rd);
		return rv;
	}
	
	/**
	 * Add description to this role
	 * 
	 * @param trans
	 * @param ns
	 * @param name
	 * @param description
	 * @return
	 */
	public Result<Void> addDescription(AuthzTrans trans, String ns, String name, String description) {
		//TODO Invalidate?
		return dao().addDescription(trans, ns, name, description);

	}

}