1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/*******************************************************************************
* ============LICENSE_START====================================================
* * org.onap.aai
* * ===========================================================================
* * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
* * Copyright © 2017 Amdocs
* * ===========================================================================
* * Licensed under the Apache License, Version 2.0 (the "License");
* * you may not use this file except in compliance with the License.
* * You may obtain a copy of the License at
* *
* * http://www.apache.org/licenses/LICENSE-2.0
* *
* * Unless required by applicable law or agreed to in writing, software
* * distributed under the License is distributed on an "AS IS" BASIS,
* * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* * See the License for the specific language governing permissions and
* * limitations under the License.
* * ============LICENSE_END====================================================
* *
* * ECOMP is a trademark and service mark of AT&T Intellectual Property.
* *
******************************************************************************/
package com.att.authz.service.mapper;
import java.util.Collection;
import java.util.List;
import com.att.authz.env.AuthzTrans;
import com.att.authz.layer.Result;
import com.att.authz.service.MayChange;
import com.att.dao.Bytification;
import com.att.dao.aaf.cass.ApprovalDAO;
import com.att.dao.aaf.cass.CertDAO;
import com.att.dao.aaf.cass.CredDAO;
import com.att.dao.aaf.cass.DelegateDAO;
import com.att.dao.aaf.cass.FutureDAO;
import com.att.dao.aaf.cass.HistoryDAO;
import com.att.dao.aaf.cass.Namespace;
import com.att.dao.aaf.cass.PermDAO;
import com.att.dao.aaf.cass.RoleDAO;
import com.att.dao.aaf.cass.UserRoleDAO;
import com.att.rosetta.Marshal;
public interface Mapper<
NSS,
PERMS,
PERMKEY,
ROLES,
USERS,
USERROLES,
DELGS,
CERTS,
KEYS,
REQUEST,
HISTORY,
ERROR,
APPROVALS>
{
enum API{NSS,NS_REQ,
PERMS,PERM_KEY,PERM_REQ,
ROLES,ROLE,ROLE_REQ,ROLE_PERM_REQ,
USERS,USER_ROLE_REQ,USER_ROLES,
CRED_REQ,CERTS,
APPROVALS,
DELGS,DELG_REQ,
KEYS,
HISTORY,
ERROR,
API,
VOID};
public Class<?> getClass(API api);
public<A> Marshal<A> getMarshal(API api);
public<A> A newInstance(API api);
public Result<PermDAO.Data> permkey(AuthzTrans trans, PERMKEY from);
public Result<PermDAO.Data> perm(AuthzTrans trans, REQUEST from);
public Result<RoleDAO.Data> role(AuthzTrans trans, REQUEST from);
public Result<Namespace> ns(AuthzTrans trans, REQUEST from);
public Result<CredDAO.Data> cred(AuthzTrans trans, REQUEST from, boolean requiresPass);
public Result<USERS> cred(List<CredDAO.Data> lcred, USERS to);
public Result<CERTS> cert(List<CertDAO.Data> lcert, CERTS to);
public Result<DelegateDAO.Data> delegate(AuthzTrans trans, REQUEST from);
public Result<DELGS> delegate(List<DelegateDAO.Data> lDelg);
public Result<APPROVALS> approvals(List<ApprovalDAO.Data> lAppr);
public Result<List<ApprovalDAO.Data>> approvals(APPROVALS apprs);
public Result<List<PermDAO.Data>> perms(AuthzTrans trans, PERMS perms);
public Result<UserRoleDAO.Data> userRole(AuthzTrans trans, REQUEST from);
public Result<PermDAO.Data> permFromRPRequest(AuthzTrans trans, REQUEST from);
public Result<RoleDAO.Data> roleFromRPRequest(AuthzTrans trans, REQUEST from);
/*
* Check Requests of varying sorts for Future fields set
*/
public Result<FutureDAO.Data> future(AuthzTrans trans, String table, REQUEST from, Bytification content, boolean enableApproval, Memo memo, MayChange mc);
public Result<NSS> nss(AuthzTrans trans, Namespace from, NSS to);
// Note: Prevalidate if NS given is allowed to be seen before calling
public Result<NSS> nss(AuthzTrans trans, Collection<Namespace> from, NSS to);
// public Result<NSS> ns_attrib(AuthzTrans trans, Set<String> from, NSS to);
public Result<PERMS> perms(AuthzTrans trans, List<PermDAO.Data> from, PERMS to, boolean filter);
public Result<ROLES> roles(AuthzTrans trans, List<RoleDAO.Data> from, ROLES roles, boolean filter);
// Note: Prevalidate if NS given is allowed to be seen before calling
public Result<USERS> users(AuthzTrans trans, Collection<UserRoleDAO.Data> from, USERS to);
public Result<USERROLES> userRoles(AuthzTrans trans, Collection<UserRoleDAO.Data> from, USERROLES to);
public Result<KEYS> keys(Collection<String> from);
public Result<HISTORY> history(AuthzTrans trans, List<HistoryDAO.Data> history, final int sort);
public ERROR errorFromMessage(StringBuilder holder, String msgID, String text, String... detail);
/*
* A Memo Creator... Use to avoid creating superfluous Strings until needed.
*/
public static interface Memo {
public String get();
}
}
|