All Downloads are FREE. Search and download functionalities are using the official Maven repository.

pro.taskana.common.rest.AccessIdController Maven / Gradle / Ivy

The newest version!
package pro.taskana.common.rest;

import io.swagger.v3.oas.annotations.Operation;
import io.swagger.v3.oas.annotations.Parameter;
import io.swagger.v3.oas.annotations.media.Content;
import io.swagger.v3.oas.annotations.media.Schema;
import io.swagger.v3.oas.annotations.responses.ApiResponse;
import java.util.List;
import javax.naming.InvalidNameException;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.hateoas.MediaTypes;
import org.springframework.hateoas.config.EnableHypermediaSupport;
import org.springframework.hateoas.config.EnableHypermediaSupport.HypermediaType;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.GetMapping;
import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.RestController;
import pro.taskana.common.api.TaskanaEngine;
import pro.taskana.common.api.TaskanaRole;
import pro.taskana.common.api.exceptions.InvalidArgumentException;
import pro.taskana.common.api.exceptions.NotAuthorizedException;
import pro.taskana.common.rest.ldap.LdapClient;
import pro.taskana.common.rest.models.AccessIdRepresentationModel;

/** Controller for Access Id validation. */
@RestController
@EnableHypermediaSupport(type = HypermediaType.HAL)
public class AccessIdController {

  private final LdapClient ldapClient;
  private final TaskanaEngine taskanaEngine;

  @Autowired
  public AccessIdController(LdapClient ldapClient, TaskanaEngine taskanaEngine) {
    this.ldapClient = ldapClient;
    this.taskanaEngine = taskanaEngine;
  }

  /**
   * This endpoint searches a provided access Id in the configured ldap.
   *
   * @param searchFor the Access Id which should be searched for.
   * @return a list of all found Access Ids
   * @throws InvalidArgumentException if the provided search for Access Id is shorter than the
   *     configured one.
   * @throws NotAuthorizedException if the current user is not ADMIN or BUSINESS_ADMIN.
   * @throws InvalidNameException if name is not a valid dn.
   * @title Search for Access Id (users and groups and permissions)
   */
  @Operation(
      summary = "Search for Access Id (users and groups)",
      description = "This endpoint searches a provided access Id in the configured ldap.",
      parameters = {
        @Parameter(
            name = "search-for",
            description = "the Access Id which should be searched for.",
            example = "max",
            required = true)
      },
      responses = {
        @ApiResponse(
            responseCode = "200",
            description = "a list of all found Access Ids",
            content =
                @Content(
                    mediaType = MediaTypes.HAL_JSON_VALUE,
                    schema = @Schema(implementation = AccessIdRepresentationModel[].class)))
      })
  @GetMapping(path = RestEndpoints.URL_ACCESS_ID)
  public ResponseEntity> searchUsersAndGroupsAndPermissions(
      @RequestParam("search-for") String searchFor)
      throws InvalidArgumentException, NotAuthorizedException, InvalidNameException {
    taskanaEngine.checkRoleMembership(TaskanaRole.ADMIN, TaskanaRole.BUSINESS_ADMIN);

    List accessIdUsers =
        ldapClient.searchUsersAndGroupsAndPermissions(searchFor);
    return ResponseEntity.ok(accessIdUsers);
  }

  /**
   * This endpoint searches AccessIds for a provided name or Access Id. It will only search and
   * return users and members of groups which are configured with the requested TASKANA role. This
   * search will only work if the users in the configured LDAP have an attribute that shows their
   * group memberships, e.g. "memberOf"
   *
   * @param nameOrAccessId the name or Access Id which should be searched for.
   * @param role the role for which all users should be searched for
   * @return a list of all found Access Ids (users)
   * @throws InvalidArgumentException if the provided search for Access Id is shorter than the
   *     configured one.
   * @throws NotAuthorizedException if the current user is not member of role USER, BUSINESS_ADMIN
   *     or ADMIN
   * @title Search for Access Id (users) in TASKANA user role
   */
  @Operation(
      summary = "Search for Access Id (users) in TASKANA user role",
      description =
          "This endpoint searches AccessIds for a provided name or Access Id. It will only search "
              + "and return users and members of groups which are configured with the requested "
              + "TASKANA role. This search will only work if the users in the configured LDAP have"
              + " an attribute that shows their group memberships, e.g. \"memberOf\"",
      parameters = {
        @Parameter(
            name = "search-for",
            description = "the name or Access Id which should be searched for.",
            example = "user-1",
            required = true),
        @Parameter(
            name = "role",
            description = "the role for which all users should be searched for",
            example = "user",
            required = true)
      },
      responses = {
        @ApiResponse(
            responseCode = "200",
            description = "a list of all found Access Ids (users)",
            content =
                @Content(
                    mediaType = MediaTypes.HAL_JSON_VALUE,
                    schema = @Schema(implementation = AccessIdRepresentationModel[].class)))
      })
  @GetMapping(path = RestEndpoints.URL_ACCESS_ID_WITH_NAME)
  public ResponseEntity> searchUsersByNameOrAccessIdForRole(
      @RequestParam("search-for") String nameOrAccessId, @RequestParam("role") String role)
      throws InvalidArgumentException, NotAuthorizedException {
    taskanaEngine.checkRoleMembership(
        TaskanaRole.USER, TaskanaRole.BUSINESS_ADMIN, TaskanaRole.ADMIN);

    if (!role.equals("user")) {
      throw new InvalidArgumentException(
          String.format(
              "Requested users for not supported role %s.  Only role 'user' is supported'", role));
    }
    List accessIdUsers =
        ldapClient.searchUsersByNameOrAccessIdInUserRole(nameOrAccessId);
    return ResponseEntity.ok(accessIdUsers);
  }

  /**
   * This endpoint retrieves all groups a given Access Id belongs to.
   *
   * @param accessId the Access Id whose groups should be determined.
   * @return a list of the group Access Ids the requested Access Id belongs to
   * @throws InvalidArgumentException if the requested Access Id does not exist or is not unique.
   * @throws NotAuthorizedException if the current user is not ADMIN or BUSINESS_ADMIN.
   * @throws InvalidNameException if name is not a valid dn.
   * @title Get groups for Access Id
   */
  @Operation(
      summary = "Get groups for Access Id",
      description = "This endpoint retrieves all groups a given Access Id belongs to.",
      parameters = {
        @Parameter(
            name = "access-id",
            description = "the Access Id whose groups should be determined.",
            example = "teamlead-1",
            required = true)
      },
      responses = {
        @ApiResponse(
            responseCode = "200",
            description = "a list of the group Access Ids the requested Access Id belongs to",
            content =
                @Content(
                    mediaType = MediaTypes.HAL_JSON_VALUE,
                    schema = @Schema(implementation = AccessIdRepresentationModel[].class)))
      })
  @GetMapping(path = RestEndpoints.URL_ACCESS_ID_GROUPS)
  public ResponseEntity> getGroupsByAccessId(
      @RequestParam("access-id") String accessId)
      throws InvalidArgumentException, NotAuthorizedException, InvalidNameException {
    taskanaEngine.checkRoleMembership(TaskanaRole.ADMIN, TaskanaRole.BUSINESS_ADMIN);

    List accessIds =
        ldapClient.searchGroupsAccessIdIsMemberOf(accessId);

    return ResponseEntity.ok(accessIds);
  }

  /**
   * This endpoint retrieves all permissions a given Access Id belongs to.
   *
   * @param accessId the Access Id whose permissions should be determined.
   * @return a list of the permission Access Ids the requested Access Id belongs to
   * @throws InvalidArgumentException if the requested Access Id does not exist or is not unique.
   * @throws NotAuthorizedException if the current user is not ADMIN or BUSINESS_ADMIN.
   * @throws InvalidNameException if name is not a valid dn.
   * @title Get permissions for Access Id
   */
  @GetMapping(path = RestEndpoints.URL_ACCESS_ID_PERMISSIONS)
  public ResponseEntity> getPermissionsByAccessId(
      @RequestParam("access-id") String accessId)
      throws InvalidArgumentException, NotAuthorizedException, InvalidNameException {
    taskanaEngine.checkRoleMembership(TaskanaRole.ADMIN, TaskanaRole.BUSINESS_ADMIN);

    List accessIds =
        ldapClient.searchPermissionsAccessIdHas(accessId);

    return ResponseEntity.ok(accessIds);
  }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy