summaryrefslogtreecommitdiffstats
path: root/vid-app-common
diff options
context:
space:
mode:
Diffstat (limited to 'vid-app-common')
-rw-r--r--vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java2
-rw-r--r--vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java1
2 files changed, 3 insertions, 0 deletions
diff --git a/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java b/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java
index 1fe9df18..1bdf9534 100644
--- a/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java
+++ b/vid-app-common/src/main/java/org/onap/vid/asdc/rest/RestfulAsdcClient.java
@@ -22,6 +22,7 @@ package org.onap.vid.asdc.rest;
import com.fasterxml.jackson.jaxrs.json.JacksonJsonProvider;
import org.onap.portalsdk.core.logging.logic.EELFLoggerDelegate;
+import org.onap.portalsdk.core.util.SystemProperties;
import org.onap.vid.asdc.AsdcCatalogException;
import org.onap.vid.asdc.AsdcClient;
import org.onap.vid.asdc.beans.Artifact;
@@ -160,6 +161,7 @@ public class RestfulAsdcClient implements AsdcClient {
commonHeaders = new MultivaluedHashMap<String, Object>();
commonHeaders.put("Authorization", Collections.singletonList((Object) (auth)));
+ commonHeaders.put("X-ECOMP-InstanceID", Collections.singletonList((Object) (SystemProperties.getProperty(SystemProperties.APP_DISPLAY_NAME))));
}
private Path createTmpFile(InputStream csarInputStream) throws AsdcCatalogException {
diff --git a/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java b/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java
index 84ba587b..da27cd99 100644
--- a/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java
+++ b/vid-app-common/src/main/java/org/onap/vid/controllers/VidController.java
@@ -107,6 +107,7 @@ public class VidController extends RestrictedBaseController {
secureServices.setServices(aaiService.getServicesByDistributionStatus());
//Disable roles until AAF integration finishes
//secureServices.setReadOnly(roleProvider.userPermissionIsReadOnly(roles));
+ secureServices.setReadOnly(false);
return secureServices;
}
catch (Exception t) {