diff options
Diffstat (limited to 'vid-app-common/src')
-rw-r--r-- | vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java | 2 | ||||
-rw-r--r-- | vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java | 1 |
2 files changed, 3 insertions, 0 deletions
diff --git a/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java b/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java index 1fe9df18..1bdf9534 100644 --- a/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java +++ b/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java @@ -22,6 +22,7 @@ package org.onap.vid.asdc.rest; import com.fasterxml.jackson.jaxrs.json.JacksonJsonProvider; import org.onap.portalsdk.core.logging.logic.EELFLoggerDelegate; +import org.onap.portalsdk.core.util.SystemProperties; import org.onap.vid.asdc.AsdcCatalogException; import org.onap.vid.asdc.AsdcClient; import org.onap.vid.asdc.beans.Artifact; @@ -160,6 +161,7 @@ public class RestfulAsdcClient implements AsdcClient { commonHeaders = new MultivaluedHashMap<String, Object>(); commonHeaders.put("Authorization", Collections.singletonList((Object) (auth))); + commonHeaders.put("X-ECOMP-InstanceID", Collections.singletonList((Object) (SystemProperties.getProperty(SystemProperties.APP_DISPLAY_NAME)))); } private Path createTmpFile(InputStream csarInputStream) throws AsdcCatalogException { diff --git a/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java b/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java index 84ba587b..da27cd99 100644 --- a/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java +++ b/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java @@ -107,6 +107,7 @@ public class VidController extends RestrictedBaseController { secureServices.setServices(aaiService.getServicesByDistributionStatus()); //Disable roles until AAF integration finishes //secureServices.setReadOnly(roleProvider.userPermissionIsReadOnly(roles)); + secureServices.setReadOnly(false); return secureServices; } catch (Exception t) { |