diff options
author | talasila <talasila@research.att.com> | 2017-02-07 11:47:55 -0500 |
---|---|---|
committer | talasila <talasila@research.att.com> | 2017-02-07 12:51:32 -0500 |
commit | 1faf201e8608dfa4d7af3460fd3d1fc7ebec398b (patch) | |
tree | 2208f76271cc6b1a81dbfb9143cd7118b071a909 /ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java | |
parent | ca23569858b8cc9f60010e193b7041feb2d3227b (diff) |
Initial OpenECOMP Portal SDK commit
Change-Id: I66a3491600a4b9ea241128dc29267eed6a78ed76
Signed-off-by: talasila <talasila@research.att.com>
Diffstat (limited to 'ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java')
-rw-r--r-- | ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java | 134 |
1 files changed, 134 insertions, 0 deletions
diff --git a/ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java b/ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java new file mode 100644 index 00000000..8a1f1d2c --- /dev/null +++ b/ecomp-sdk/quantum/src/main/java/org/openecomp/portalsdk/core/controller/AdminAuthGenericController.java @@ -0,0 +1,134 @@ +/*- + * ================================================================================ + * eCOMP Portal SDK + * ================================================================================ + * Copyright (C) 2017 AT&T Intellectual Property + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ================================================================================ + */ +package org.openecomp.portalsdk.core.controller; +/*package org.openecomp.portalsdk.core.controller; + +import java.io.IOException; +import java.util.List; + +import javax.servlet.http.HttpServletResponse; + +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.http.HttpStatus; +import org.springframework.web.bind.annotation.ExceptionHandler; +import org.springframework.web.bind.annotation.PathVariable; +import org.springframework.web.bind.annotation.RequestBody; +import org.springframework.web.bind.annotation.RequestMapping; +import org.springframework.web.bind.annotation.RequestMethod; +import org.springframework.web.bind.annotation.RestController; + +import org.openecomp.portalsdk.core.domain.Role; +import org.openecomp.portalsdk.core.onboarding.crossapi.IGenericRolesService; +import org.openecomp.portalsdk.core.onboarding.crossapi.IGenericUsersService; +import com.fasterxml.jackson.core.JsonProcessingException; + + +@RestController +@RequestMapping("/api") +public class AdminAuthGenericController extends RestrictedRESTfulBaseController { + protected final Log logger = LogFactory.getLog(getClass()); + @Autowired + IGenericUsersService genericUserService; + + @Autowired + IGenericRolesService genericRolesService; + + *//** + * RESTful service method to fetch available roles + * @return + *//* + @RequestMapping(value={"/roles"}, method = RequestMethod.GET, produces = "application/json") + public String getAvailableRoles() throws Exception{ + return genericRolesService.getAvailableRoles(); + } + + *//** + * RESTful service method to save user - expects user details in json string + * @param userJson + *//* + @RequestMapping(value={"/user"}, method = RequestMethod.POST) + public String pushUser(@RequestBody String userJson) throws Exception{ + return genericUserService.pushUser(userJson); + } + + *//** + * RESTful service method to edit user - expects user details in json string + * @param userJson + *//* + @RequestMapping(value={"/user/{loginId}"}, method = RequestMethod.POST) + public String editUser(@PathVariable("loginId") String loginId, @RequestBody String userJson) throws Exception{ + return genericUserService.editUser(loginId, userJson); + } + + *//** + * RESTful service method to save user role using user's login Id and details in role Json string + * @param loginId + * @param roleJson + * @throws JsonProcessingException + *//* + @RequestMapping(value={"/user/{loginId}/roles"}, method = RequestMethod.POST) + public String pushUserRole(@PathVariable("loginId") String loginId, @RequestBody String rolesJson) throws Exception{ + return genericRolesService.pushUserRole(loginId, rolesJson); + } + + + *//** + * Below method is to retrieve user - TODO @Talasila - Created to test the fn_app relation to fn_user_role. If not needed, please remove this method. + * @param id + * @return + * @throws Exception + *//* + @RequestMapping(value={"/user/{loginId}"}, method = RequestMethod.GET, produces = "application/json") + public String getUser(@PathVariable("loginId") String loginId) throws Exception{ + return genericUserService.getUser(loginId); + } + + @RequestMapping(value={"/users"}, method = RequestMethod.GET, produces = "application/json") + public String getUsers() throws Exception{ + return genericUserService.getUsers(); + } + + *//** + * RESTful service method to fetch individual user's roles using user's loginId + * @param loginId + * @return + *//* + @RequestMapping(value={"/user/{loginId}/roles"}, method = RequestMethod.GET, produces = "application/json") + public String getUserRoles(@PathVariable("loginId") String loginId) throws Exception{ + return genericRolesService.getUserRoles(loginId); + } + + *//** + * RESTful service method to fetch available roles + * @return + *//* + + //Commenting this out as it depends on Role API - Ikram + @RequestMapping(value={"/rolesFull"}, method = RequestMethod.GET, produces = "application/json") + public List<Role> getAvailableFullRoles(){ + return genericRolesService.getAvailableFullRoles(); + } + + @ExceptionHandler(Exception.class) + void handleBadRequests(Exception e, HttpServletResponse response) throws IOException { + response.sendError(HttpStatus.BAD_REQUEST.value(),e.getMessage()); + } +} +*/ |