25 Commits

Author SHA1 Message Date
9634e06fbf Update hashi vault token 2025-09-02 20:13:53 -06:00
0affc6ebf4 feat: dockerized version 2025-09-02 14:00:24 -06:00
21f5945272 Fix documentation and add deletes for all collections 2025-09-02 08:59:56 -06:00
8b0a0c6bc8 Fix Add tenant id property to user 2025-08-31 18:01:35 -06:00
95e64b8431 Point thalos vault 2025-08-30 21:19:07 -06:00
Oscar Morales
574d0fb5ba Uncomment Authorization 2025-08-29 16:00:44 -06:00
5434f292c6 Update hashi corp vault configuration 2025-08-29 15:30:58 -06:00
c4f6972aa2 update app settings 2025-08-29 15:16:57 -06:00
4a3fb91ffe Merge pull request 'Update the Thalos.BuildingBlocks library to retrieve the idToken instead of accessToken from google authentication' (#6) from feature/use-id-token into development
Reviewed-on: #6
Reviewed-by: efrain_marin <efrain.marin@agilewebs.com>
Reviewed-by: Sergio Matías <sergio.matias@agilewebs.com>
2025-08-28 17:40:06 +00:00
Oscar Morales
3673febe93 Update the Thalos.BuildingBlocks library to retrieve the idToken instead of accessToken from google authentication 2025-08-27 23:26:04 -06:00
263bcc7649 Disable temporary authorization 2025-08-26 15:11:53 -06:00
3e935aa006 Fixed: google settings 2025-08-22 21:30:20 -06:00
ee01415ebe Merge pull request 'Add tenant property' (#5) from feature/add-tenantproperty-touser into development
Reviewed-on: #5
Reviewed-by: OscarMmtz <oscar.morales@agilewebs.com>
2025-08-22 21:41:47 +00:00
69f0590e8d Add tenant property 2025-08-09 00:06:59 -06:00
42f213e09d Merge pull request 'Add tenant services and delete services' (#4) from feature/tenant-services into development
Reviewed-on: #4
Reviewed-by: OscarMmtz <oscar.morales@agilewebs.com>
Reviewed-by: efrain_marin <efrain.marin@agilewebs.com>
2025-08-08 18:06:11 +00:00
69e21e276c Add tenant services and delete services 2025-08-07 18:37:26 -06:00
6a055bc3db Revise CBB and remove unnecessary code 2025-07-27 19:32:34 -06:00
4e620e92f6 Merge pull request 'Configura authentication and authorization' (#3) from feature/configure-authentication into development
Reviewed-on: #3
Reviewed-by: efrain_marin <efrain.marin@agilewebs.com>
Reviewed-by: Sergio Matías <sergio.matias@agilewebs.com>
2025-07-18 00:59:09 +00:00
Oscar Morales
482a330a39 Configura authentication and authorization 2025-07-15 14:04:07 -06:00
0429704cac fix 2025-06-23 00:32:26 -06:00
3b0c31c38e Merge pull request #2 from SergioMatias94/feature/adapt-endpoints
Adapt endpoints and configuration
2025-06-17 15:51:37 -06:00
Oscar Morales
cfd6b16e24 Adapt endpoints and configuration 2025-06-17 15:50:06 -06:00
Sergio Matias Urquin
bb87b0e148 reeplace cerberos by thalos 2025-05-18 19:31:25 -06:00
Sergio Matias Urquin
2519e1b4fb Remove old references and refactor base controller 2025-05-17 21:48:00 -06:00
Sergio Matias Urquin
714e18bb65 Exclude modules from token 2025-05-12 21:58:18 -06:00
83 changed files with 925 additions and 530 deletions

17
.dockerignore Normal file
View File

@@ -0,0 +1,17 @@
**/bin/
**/obj/
**/.vs/
**/.idea/
**/.vscode/
**/*.user
**/*.suo
**/*.swp
**/*.csproj.user
**/*.log
**/Properties/launchSettings.json
**/appsettings.Local.json
**/appsettings.*.Development.json
.git/
.gitignore
Dockerfile
docker-compose*.yml

View File

@@ -1,30 +0,0 @@
using Microsoft.AspNetCore.Mvc;
using Newtonsoft.Json;
using Refit;
namespace Core.Cerberos.BFF.Api.Controllers
{
[Route("api/[controller]")]
[ApiController]
public class BaseController(ILogger<BaseController> logger) : ControllerBase
{
private readonly ILogger<BaseController> _logger = logger;
protected Guid TrackingId => (Guid)(HttpContext.Items["TrackingId"] ?? Guid.NewGuid());
protected async Task<IActionResult> Handle<T>(Func<Task<ApiResponse<T>>> apiCall) where T : class
{
var response = await apiCall().ConfigureAwait(false);
_logger.LogInformation($"{TrackingId} - {response.RequestMessage?.Method} {response.RequestMessage?.RequestUri} - Status: {response.StatusCode}");
return FromAPIResponse(response);
}
private IActionResult FromAPIResponse<T>(ApiResponse<T> response) where T : class
{
var errorContent = JsonConvert.DeserializeObject<string>(response.Error?.Content ?? string.Empty) ?? string.Empty;
return StatusCode((int)response.StatusCode, (response.Content is not null) ? response.Content : errorContent);
}
}
}

View File

@@ -1,6 +0,0 @@
@Core.Cerberos.BFF.Api_HostAddress = http://localhost:5219
GET {{Core.Cerberos.BFF.Api_HostAddress}}/weatherforecast/
Accept: application/json
###

View File

@@ -1,12 +0,0 @@
{
"Logging": {
"LogLevel": {
"Default": "Information",
"Microsoft.AspNetCore": "Warning"
}
},
"AllowedHosts": "*",
"Endpoints": {
"AppConfigurationURI": "https://sandbox-hci-usc-appcg.azconfig.io"
}
}

View File

@@ -1,10 +0,0 @@
using Core.Cerberos.Adapters.Common.Enums;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class ChangeModuleStatusRequest
{
public string Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +0,0 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class GetAllModulesRequest
{
}
}

View File

@@ -1,7 +0,0 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class GetModuleRequest
{
public string Id { get; set; }
}
}

View File

@@ -1,10 +0,0 @@
using Core.Cerberos.Adapters.Common.Enums;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class ChangePermissionStatusRequest
{
public string Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +0,0 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class GetAllPermissionsRequest
{
}
}

View File

@@ -1,7 +0,0 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
{
public class GetPermissionRequest
{
public string Id { get; set; }
}
}

View File

@@ -1,11 +0,0 @@
using Core.Cerberos.Adapters.Common.Enums;
namespace Core.Cerberos.Application.UseCases.Roles.Input
{
public class ChangeRoleStatusRequest
{
public string Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Roles.Input
{
public class GetAllRolesRequest
{
}
}

View File

@@ -1,7 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Roles.Input
{
public class GetRoleRequest
{
public string Id { get; set; }
}
}

View File

@@ -1,8 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class AddCompanyToUserRequest
{
public string UserId { get; set; }
public string CompanyId { get; set; }
}
}

View File

@@ -1,8 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class AddProjectToUserRequest
{
public string UserId { get; set; }
public string ProjectId { get; set; }
}
}

View File

@@ -1,10 +0,0 @@
using Core.Cerberos.Adapters.Common.Enums;
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class ChangeUserStatusRequest
{
public string Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class GetAllUsersRequest
{
}
}

View File

@@ -1,7 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class GetUserRequest
{
public string Id { get; set; }
}
}

View File

@@ -1,8 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class RemoveCompanyFromUserRequest
{
public string UserId { get; set; }
public string CompanyId { get; set; }
}
}

View File

@@ -1,8 +0,0 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
{
public class RemoveProjectFromUserRequest
{
public string UserId { get; set; }
public string ProjectId { get; set; }
}
}

View File

@@ -1,14 +1,12 @@
using Asp.Versioning;
using Core.Cerberos.Adapters;
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.Adapters.Contracts;
using Core.Cerberos.Application.UseCases.Users.Input;
using Core.Cerberos.External.Clients.Cerberos.Requests.Users;
using Core.Thalos.Application.UseCases.Users.Input;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Users;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
namespace Core.Cerberos.BFF.Api.Controllers
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for Authentication.
@@ -18,7 +16,10 @@ namespace Core.Cerberos.BFF.Api.Controllers
[Produces(MimeTypes.ApplicationJson)]
[Consumes(MimeTypes.ApplicationJson)]
[ApiController]
public class AuthenticationController(ICerberosServiceClient cerberosServiceClient, ILogger<AuthenticationController> logger, ITokenService tokenService) : BaseController(logger)
public class AuthenticationController(
IThalosServiceClient thalosServiceClient,
ILogger<AuthenticationController> logger,
ITokenService tokenService) : BaseController(logger)
{
/// <summary>
/// Get token for user.
@@ -30,7 +31,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
[HttpGet]
[Route(Routes.GenerateToken)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[Authorize(AuthenticationSchemes = Schemes.AzureScheme)]
[Authorize(AuthenticationSchemes = Schemes.GoogleScheme)]
public async Task<IActionResult> GenerateTokenService(CancellationToken cancellationToken)
{
try
@@ -43,7 +44,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(email)) return BadRequest("An error ocurred while desearializing the token");
var tokenResult = await Handle(() => cerberosServiceClient.GetTokenAdapterService(new GetTokenAdapterRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
var tokenResult = await Handle(() => thalosServiceClient.GetTokenAdapterService(new GetTokenAdapterRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
if (tokenResult is ObjectResult tokenOkResult && tokenOkResult.StatusCode == 200)
tokenAdapter = tokenOkResult.Value as TokenAdapter;
@@ -52,11 +53,11 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (tokenAdapter is not null && tokenAdapter.User is not null)
{
tokenAdapter.User.Token = tokenService.GenerateAccessToken(tokenAdapter);
var (token, modules) = tokenService.GenerateAccessToken(tokenAdapter);
await Handle(() => cerberosServiceClient.LoginUserService(new LoginUserRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
await Handle(() => thalosServiceClient.LoginUserService(new LoginUserRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
return Ok(tokenAdapter.User);
return Ok(new { token, modules });
}
else
{
@@ -81,13 +82,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
[HttpGet]
[Route(Routes.RefreshToken)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
public async Task<IActionResult> RefreshCustomTokenAsync(CancellationToken cancellationToken)
{
var tokenAdapter = new TokenAdapter();
var email = tokenService.GetEmailClaim(this.HttpContext);
var tokenResult = await Handle(() => cerberosServiceClient.GetTokenAdapterService(new GetTokenAdapterRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
var tokenResult = await Handle(() => thalosServiceClient.GetTokenAdapterService(new GetTokenAdapterRequest { Email = email }, cancellationToken)).ConfigureAwait(false);
if (tokenResult is ObjectResult tokenOkResult && tokenOkResult.StatusCode == 200)
{

View File

@@ -0,0 +1,48 @@
using Lib.Architecture.BuildingBlocks;
using Microsoft.AspNetCore.Mvc;
using Newtonsoft.Json;
using Refit;
namespace Core.Thalos.BFF.Api.Controllers
{
[Route("api/[controller]")]
[ApiController]
public class BaseController(ILogger<BaseController> logger) : ControllerBase
{
private readonly ILogger<BaseController> _logger = logger;
protected Guid TrackingId => (Guid)(HttpContext.Items["TrackingId"] ?? Guid.NewGuid());
protected async Task<IActionResult> Handle<T>(Func<Task<ApiResponse<T>>> apiCall) where T : class
{
var response = await apiCall().ConfigureAwait(false);
_logger.LogInformation($"{TrackingId} - {response.RequestMessage?.Method} {response.RequestMessage?.RequestUri} - Status: {response.StatusCode}");
return FromAPIResponse(response);
}
private IActionResult FromAPIResponse<T>(ApiResponse<T> response) where T : class
{
if (response.IsSuccessful)
return StatusCode((int)response.StatusCode, response.Content);
else
{
dynamic errorContent = string.Empty;
try
{
errorContent = JsonConvert.DeserializeObject<string>(response.Error?.Content ?? string.Empty) ?? string.Empty;
}
catch (Exception)
{
errorContent = JsonConvert.DeserializeObject<HttpError>(response.Error?.Content);
if (errorContent?.Error?.ErrorCode is null && errorContent?.Error?.Message is null && errorContent?.Error?.Target is null)
errorContent = JsonConvert.DeserializeObject<GenericErrorResponse>(response.Error?.Content);
}
return StatusCode((int)response.StatusCode, errorContent);
}
}
}
}

View File

@@ -1,15 +1,13 @@
using Asp.Versioning;
using Core.Cerberos.Adapters;
using Core.Cerberos.Adapters.Attributes;
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.External.Clients.Cerberos.Requests.Permissions;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Permissions;
using Lib.Architecture.BuildingBlocks;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using System.Text.Json;
namespace Core.Cerberos.BFF.Api.Controllers
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for module authentication.
@@ -19,14 +17,14 @@ namespace Core.Cerberos.BFF.Api.Controllers
[Consumes("application/json")]
[Produces("application/json")]
[ApiController]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
public class ModuleController(ICerberosServiceClient cerberosServiceClient, ILogger<ModuleController> logger) : BaseController(logger)
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
public class ModuleController(IThalosServiceClient thalosServiceClient, ILogger<ModuleController> logger) : BaseController(logger)
{
/// <summary>
/// Gets all the modules.
/// Gets all modules.
/// </summary>
[HttpGet("GetAll")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(IEnumerable<ModuleAdapter>), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -39,7 +37,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetAllModulesService)} - Request received - Payload: ");
return await Handle(() => cerberosServiceClient.GetAllModulesService(new GetAllModulesRequest { }, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllModulesService(new GetAllModulesRequest { }, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -49,7 +47,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
}
/// <summary>
/// Gets all the modules by module identifiers.
/// Gets all modules by module identifiers.
/// </summary>
/// <param name="request">The request containing the list of module identifiers.</param>
/// <param name="cancellationToken">Cancellation token for the asynchronous operation.</param>
@@ -77,7 +75,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
return BadRequest("Module identifiers are required.");
}
return await Handle(() => cerberosServiceClient.GetAllModulesByListService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllModulesByListService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
@@ -92,7 +90,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Creates a new module.
/// </summary>
[HttpPost("Create")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -113,7 +111,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(newModule.Route)) return BadRequest("Invalid module route");
return await Handle(() => cerberosServiceClient.CreateModuleService(newModule, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.CreateModuleService(newModule, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -126,7 +124,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Gets the module by identifier.
/// </summary>
[HttpPost("GetById")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -139,9 +137,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetModuleByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) return BadRequest("Invalid module identifier");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid module identifier");
return await Handle(() => cerberosServiceClient.GetModuleByIdService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetModuleByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -154,7 +152,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Updates a full module by identifier.
/// </summary>
[HttpPut("Update")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -175,7 +173,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(newModule.Route)) return BadRequest("Invalid module route");
return await Handle(() => cerberosServiceClient.UpdateModuleService(newModule, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.UpdateModuleService(newModule, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -189,7 +187,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpPatch]
[Route("ChangeStatus")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
@@ -203,9 +201,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(ChangeModuleStatusService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) { return BadRequest("Invalid module identifier"); }
if (string.IsNullOrEmpty(request._Id)) { return BadRequest("Invalid module identifier"); }
return await Handle(() => cerberosServiceClient.ChangeModuleStatusService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.ChangeModuleStatusService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -214,6 +212,32 @@ namespace Core.Cerberos.BFF.Api.Controllers
}
}
/// <summary>
/// Deletes the Module by identifier.
/// </summary>
[HttpDelete("Delete")]
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("ModuleManagement.Write")]
public async Task<IActionResult> DeleteModuleByIdService(DeleteModuleRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(DeleteModuleByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid Module identifier");
return await Handle(() => thalosServiceClient.DeleteModuleByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(DeleteModuleByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
}
}

View File

@@ -1,16 +1,13 @@
using Asp.Versioning;
using Core.Cerberos.Adapters;
using Core.Cerberos.Adapters.Attributes;
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.External.Clients.Cerberos.Requests.Permissions;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Permissions;
using Lib.Architecture.BuildingBlocks;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Microsoft.Graph;
using System.Text.Json;
namespace Core.Cerberos.BFF.Api.Controllers
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for permission authentication.
@@ -20,14 +17,14 @@ namespace Core.Cerberos.BFF.Api.Controllers
[Consumes("application/json")]
[Produces("application/json")]
[ApiController]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
public class PermissionController(ICerberosServiceClient cerberosServiceClient, ILogger<PermissionController> logger) : BaseController(logger)
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
public class PermissionController(IThalosServiceClient thalosServiceClient, ILogger<PermissionController> logger) : BaseController(logger)
{
/// <summary>
/// Gets all the permissions.
/// Gets all permissions.
/// </summary>
[HttpGet("GetAll")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(IEnumerable<PermissionAdapter>), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -40,7 +37,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetAllPermissionsService)} - Request received - Payload: ");
return await Handle(() => cerberosServiceClient.GetAllPermissionsService(new GetAllPermissionsRequest { }, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllPermissionsService(new GetAllPermissionsRequest { }, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -50,7 +47,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
}
/// <summary>
/// Gets all the permissions by permission identifiers.
/// Gets all permissions by permission identifiers.
/// </summary>
/// <param name="request">The request containing the list of permission identifiers.</param>
/// <param name="cancellationToken">Cancellation token for the asynchronous operation.</param>
@@ -78,7 +75,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
return BadRequest("Permission identifiers are required.");
}
return await Handle(() => cerberosServiceClient.GetAllPermissionsByListService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllPermissionsByListService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
@@ -93,7 +90,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Creates a new permission.
/// </summary>
[HttpPost("Create")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -112,7 +109,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(newPermission.Description)) return BadRequest("Invalid permission description");
return await Handle(() => cerberosServiceClient.CreatePermissionService(newPermission, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.CreatePermissionService(newPermission, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -125,7 +122,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Gets the permission by identifier.
/// </summary>
[HttpPost("GetById")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -138,9 +135,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetPermissionByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) return BadRequest("Invalid permission identifier");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid permission identifier");
return await Handle(() => cerberosServiceClient.GetPermissionByIdService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetPermissionByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -153,7 +150,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Updates a full permission by identifier.
/// </summary>
[HttpPut("Update")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -172,7 +169,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(newPermission.Description)) return BadRequest("Invalid permission description");
return await Handle(() => cerberosServiceClient.UpdatePermissionService(newPermission, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.UpdatePermissionService(newPermission, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -186,7 +183,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpPatch]
[Route("ChangeStatus")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
@@ -200,9 +197,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(ChangePermissionStatusService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) { return BadRequest("Invalid permission identifier"); }
if (string.IsNullOrEmpty(request._Id)) { return BadRequest("Invalid permission identifier"); }
return await Handle(() => cerberosServiceClient.ChangePermissionStatusService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.ChangePermissionStatusService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -211,6 +208,32 @@ namespace Core.Cerberos.BFF.Api.Controllers
}
}
/// <summary>
/// Deletes the Permission by identifier.
/// </summary>
[HttpDelete("Delete")]
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("PermissionManagement.Write")]
public async Task<IActionResult> DeletePermissionByIdService(DeletePermissionRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(DeletePermissionByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid Permission identifier");
return await Handle(() => thalosServiceClient.DeletePermissionByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(DeletePermissionByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
}
}

View File

@@ -1,14 +1,13 @@
using Asp.Versioning;
using Core.Cerberos.Adapters.Attributes;
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.Application.UseCases.Roles.Input;
using Core.Thalos.Application.UseCases.Roles.Input;
using Core.Thalos.BuildingBlocks;
using Lib.Architecture.BuildingBlocks;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using System.Text.Json;
namespace Core.Cerberos.BFF.Api.Controllers
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for role authentication.
@@ -18,14 +17,14 @@ namespace Core.Cerberos.BFF.Api.Controllers
[Consumes("application/json")]
[Produces("application/json")]
[ApiController]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
public class RoleController(ICerberosServiceClient cerberosServiceClient, ILogger<RoleController> logger) : BaseController(logger)
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
public class RoleController(IThalosServiceClient thalosServiceClient, ILogger<RoleController> logger) : BaseController(logger)
{
/// <summary>
/// Gets all the roles.
/// Gets all roles.
/// </summary>
[HttpGet("GetAll")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(IEnumerable<RoleAdapter>), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -38,7 +37,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetAllRolesService)} - Request received - Payload: ");
return await Handle(() => cerberosServiceClient.GetAllRolesService(new GetAllRolesRequest { }, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllRolesService(new GetAllRolesRequest { }, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -51,7 +50,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Creates a new role.
/// </summary>
[HttpPost("Create")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -76,7 +75,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (request.Permissions?.Length <= 0) return BadRequest("Role must have at least one permission");
return await Handle(() => cerberosServiceClient.CreateRoleService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.CreateRoleService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -89,7 +88,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Gets the role by identifier.
/// </summary>
[HttpPost("GetById")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -102,9 +101,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetRoleByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) return BadRequest("Invalid role identifier");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid role identifier");
return await Handle(() => cerberosServiceClient.GetRoleByIdService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetRoleByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -117,7 +116,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Updates a full role by identifier.
/// </summary>
[HttpPut("Update")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -134,7 +133,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.Name)) return BadRequest("Invalid role name");
if (string.IsNullOrEmpty(request.Id)) return BadRequest("Invalid role identifier");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid role identifier");
if (string.IsNullOrEmpty(request.Description)) return BadRequest("Invalid role description");
@@ -145,7 +144,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (request.Permissions?.Length <= 0) return BadRequest("Role must have at least one permission");
return await Handle(() => cerberosServiceClient.UpdateRoleService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.UpdateRoleService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -159,7 +158,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpPatch]
[Route("ChangeStatus")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
@@ -173,9 +172,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(ChangeRoleStatusService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) { return BadRequest("Invalid role identifier"); }
if (string.IsNullOrEmpty(request._Id)) { return BadRequest("Invalid role identifier"); }
return await Handle(() => cerberosServiceClient.ChangeRoleStatusService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.ChangeRoleStatusService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -189,7 +188,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpPost]
[Route("AddApplication")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
@@ -205,7 +204,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.RoleId)) { return BadRequest("Invalid role identifier"); }
return await Handle(() => cerberosServiceClient.AddApplicationToRoleService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.AddApplicationToRoleService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -219,7 +218,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpDelete]
[Route("RemoveApplication")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
@@ -235,7 +234,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.RoleId)) { return BadRequest("Invalid role identifier"); }
return await Handle(() => cerberosServiceClient.RemoveApplicationFromRoleService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.RemoveApplicationFromRoleService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -243,5 +242,33 @@ namespace Core.Cerberos.BFF.Api.Controllers
throw;
}
}
/// <summary>
/// Deletes the Role by identifier.
/// </summary>
[HttpDelete("Delete")]
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("RoleManagement.Write")]
public async Task<IActionResult> DeleteRoleByIdService(DeleteRoleRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(DeleteRoleByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid Role identifier");
return await Handle(() => thalosServiceClient.DeleteRoleByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(DeleteRoleByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
}
}

View File

@@ -0,0 +1,196 @@
using Asp.Versioning;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Tenants;
using Lib.Architecture.BuildingBlocks;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using System.Text.Json;
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for Tenant authentication.
/// </summary>
[ApiVersion("1.0")]
[Route("api/v{version:apiVersion}/[controller]")]
[Consumes("application/json")]
[Produces("application/json")]
[ApiController]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
public class TenantController(IThalosServiceClient thalosServiceClient, ILogger<TenantController> logger) : BaseController(logger)
{
/// <summary>
/// Gets all Tenants.
/// </summary>
[HttpGet("GetAll")]
[ProducesResponseType(typeof(IEnumerable<TenantAdapter>), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Read, RoleManagement.Read")]
public async Task<IActionResult> GetAllTenantsService(CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(GetAllTenantsService)} - Request received - Payload: ");
return await Handle(() => thalosServiceClient.GetAllTenantsService(new GetAllTenantsRequest { }, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(GetAllTenantsService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload");
throw;
}
}
/// <summary>
/// Creates a new Tenant.
/// </summary>
[HttpPost("Create")]
[ProducesResponseType(typeof(TenantAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Write")]
public async Task<IActionResult> CreateTenantService(CreateTenantRequest newTenant, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(CreateTenantService)} - Request received - Payload: {JsonSerializer.Serialize(newTenant)}");
if (newTenant == null) return BadRequest("Invalid Tenant object");
if (string.IsNullOrEmpty(newTenant.Name)) return BadRequest("Invalid Tenant name");
return await Handle(() => thalosServiceClient.CreateTenantService(newTenant, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(CreateTenantService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(newTenant)}");
throw;
}
}
/// <summary>
/// Gets the Tenant by identifier.
/// </summary>
[HttpPost("GetById")]
[ProducesResponseType(typeof(TenantAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Read")]
public async Task<IActionResult> GetTenantByIdService(GetTenantRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(GetTenantByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid Tenant identifier");
return await Handle(() => thalosServiceClient.GetTenantByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(GetTenantByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Updates a full Tenant by identifier.
/// </summary>
[HttpPut("Update")]
[ProducesResponseType(typeof(TenantAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Write")]
public async Task<IActionResult> UpdateTenantService(UpdateTenantRequest newTenant, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(UpdateTenantService)} - Request received - Payload: {JsonSerializer.Serialize(newTenant)}");
if (newTenant == null) return BadRequest("Invalid Tenant object");
if (string.IsNullOrEmpty(newTenant.Name)) return BadRequest("Invalid Tenant name");
return await Handle(() => thalosServiceClient.UpdateTenantService(newTenant, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(UpdateTenantService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(newTenant)}");
throw;
}
}
/// <summary>
/// Changes the status of the Tenant.
/// </summary>
[HttpPatch]
[Route("ChangeStatus")]
[ProducesResponseType(typeof(TenantAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Write")]
public async Task<IActionResult> ChangeTenantStatusService([FromBody] ChangeTenantStatusRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(ChangeTenantStatusService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) { return BadRequest("Invalid Tenant identifier"); }
return await Handle(() => thalosServiceClient.ChangeTenantStatusService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(ChangeTenantStatusService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Deletes the Tenant by identifier.
/// </summary>
[HttpDelete("Delete")]
[ProducesResponseType(typeof(TenantAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("TenantManagement.Write")]
public async Task<IActionResult> DeleteTenantByIdService(DeleteTenantRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(DeleteTenantByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid Tenant identifier");
return await Handle(() => thalosServiceClient.DeleteTenantByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(DeleteTenantByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
}
}

View File

@@ -1,15 +1,14 @@
using Asp.Versioning;
using Core.Cerberos.Adapters.Attributes;
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.Application.UseCases.Users.Input;
using Core.Cerberos.External.Clients.Cerberos.Requests.Users;
using Core.Thalos.Application.UseCases.Users.Input;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Users;
using Lib.Architecture.BuildingBlocks;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using System.Text.Json;
namespace Core.Cerberos.BFF.Api.Controllers
namespace Core.Thalos.BFF.Api.Controllers
{
/// <summary>
/// Handles all requests for user authentication.
@@ -19,19 +18,19 @@ namespace Core.Cerberos.BFF.Api.Controllers
[Consumes("application/json")]
[Produces("application/json")]
[ApiController]
public class UserController(ICerberosServiceClient cerberosServiceClient, ILogger<UserController> logger) : BaseController(logger)
public class UserController(IThalosServiceClient thalosServiceClient, ILogger<UserController> logger) : BaseController(logger)
{
/// <summary>
/// Gets all the users.
/// Gets all users.
/// </summary>
[HttpGet("GetAll")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(IEnumerable<UserAdapter>), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Read")]
public async Task<IActionResult> GetAllUsersService(CancellationToken cancellationToken)
{
@@ -39,7 +38,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetAllUsersService)} - Request received - Payload: ");
return await Handle(() => cerberosServiceClient.GetAllUsersService(new GetAllUsersRequest { }, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetAllUsersService(new GetAllUsersRequest { }, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -52,13 +51,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Creates a new user.
/// </summary>
[HttpPost("Create")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> CreateUserService(CreateUserRequest newUser, CancellationToken cancellationToken)
{
@@ -76,9 +75,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(newUser.RoleId)) return BadRequest("Invalid role id");
if (!newUser.Companies.Any()) return BadRequest("The user must contain at least one company");
if (string.IsNullOrEmpty(newUser.TenantId)) return BadRequest("Invalid tenant id");
return await Handle(() => cerberosServiceClient.CreateUserService(newUser, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.CreateUserService(newUser, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -91,13 +90,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Gets the user by identifier.
/// </summary>
[HttpPost("GetById")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Read")]
public async Task<IActionResult> GetUserByIdService(GetUserRequest request, CancellationToken cancellationToken)
{
@@ -105,9 +104,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(GetUserByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) return BadRequest("Invalid user identifier");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid user identifier");
return await Handle(() => cerberosServiceClient.GetUserByIdService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetUserByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -120,13 +119,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Gets the user by email.
/// </summary>
[HttpPost("GetByEmail")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Read")]
public async Task<IActionResult> GetUserByEmailService(GetUserByEmailRequest request, CancellationToken cancellationToken)
{
@@ -136,7 +135,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.Email)) return BadRequest("Invalid user email");
return await Handle(() => cerberosServiceClient.GetUserByEmailService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.GetUserByEmailService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -149,13 +148,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Updates a full user by identifier.
/// </summary>
[HttpPut("Update")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> UpdateUserService(UpdateUserRequest request, CancellationToken cancellationToken)
{
@@ -173,9 +172,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.RoleId)) return BadRequest("Invalid role id");
if (!request.Companies.Any()) return BadRequest("The user must contain at least one company");
return await Handle(() => cerberosServiceClient.UpdateUserService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.UpdateUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -188,13 +185,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Logs in the user.
/// </summary>
[HttpPatch("LoginUser")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = $"{Schemes.AzureScheme}, {Schemes.HeathScheme}")]
[Authorize(AuthenticationSchemes = $"{Schemes.GoogleScheme}, {Schemes.DefaultScheme}")]
public async Task<IActionResult> LoginUserService([FromBody] LoginUserRequest request, CancellationToken cancellationToken)
{
try
@@ -203,7 +200,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.Email)) return BadRequest("Invalid user email");
return await Handle(() => cerberosServiceClient.LoginUserService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.LoginUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -216,13 +213,13 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// Logs out the user.
/// </summary>
[HttpPatch("LogoutUser")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = $"{Schemes.AzureScheme}, {Schemes.HeathScheme}")]
[Authorize(AuthenticationSchemes = $"{Schemes.GoogleScheme}, {Schemes.DefaultScheme}")]
public async Task<IActionResult> LogoutUserService([FromBody] LogoutUserRequest request, CancellationToken cancellationToken)
{
try
@@ -231,7 +228,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.Email)) return BadRequest("Invalid user email");
return await Handle(() => cerberosServiceClient.LogoutUserService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.LogoutUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -245,14 +242,14 @@ namespace Core.Cerberos.BFF.Api.Controllers
/// </summary>
[HttpPatch]
[Route("ChangeStatus")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> ChangeUserStatusService([FromBody] ChangeUserStatusRequest request, CancellationToken cancellationToken)
{
@@ -260,9 +257,9 @@ namespace Core.Cerberos.BFF.Api.Controllers
{
logger.LogInformation($"{nameof(ChangeUserStatusService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.Id)) { return BadRequest("Invalid user identifier"); }
if (string.IsNullOrEmpty(request._Id)) { return BadRequest("Invalid user identifier"); }
return await Handle(() => cerberosServiceClient.ChangeUserStatusService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.ChangeUserStatusService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -271,140 +268,11 @@ namespace Core.Cerberos.BFF.Api.Controllers
}
}
/// <summary>
/// Adds a company to the user's list of companies.
/// </summary>
[HttpPost]
[Route("AddCompany")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> AddCompanyToUserService([FromBody] AddCompanyToUserRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(AddCompanyToUserService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.UserId)) { return BadRequest("Invalid user identifier"); }
if (string.IsNullOrEmpty(request.CompanyId)) { return BadRequest("Invalid company identifier"); }
return await Handle(() => cerberosServiceClient.AddCompanyToUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(AddCompanyToUserService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Removes a company from the user's list of companies.
/// </summary>
[HttpDelete]
[Route("RemoveCompany")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> RemoveCompanyFromUserService([FromBody] RemoveCompanyFromUserRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(RemoveCompanyFromUserService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.UserId)) { return BadRequest("Invalid user identifier"); }
if (string.IsNullOrEmpty(request.CompanyId)) { return BadRequest("Invalid company identifier"); }
return await Handle(() => cerberosServiceClient.RemoveCompanyFromUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(RemoveCompanyFromUserService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Adds a project to the user's list of companies.
/// </summary>
[HttpPost]
[Route("AddProject")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> AddProjectToUserService([FromBody] AddProjectToUserRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(AddProjectToUserService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.UserId)) { return BadRequest("Invalid user identifier"); }
if (string.IsNullOrEmpty(request.ProjectId)) { return BadRequest("Invalid project identifier"); }
return await Handle(() => cerberosServiceClient.AddProjectToUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(AddProjectToUserService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Removes a project from the user's list of companies.
/// </summary>
[HttpDelete]
[Route("RemoveProject")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Authorize(AuthenticationSchemes = Schemes.HeathScheme)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> RemoveProjectFromUserService([FromBody] RemoveProjectFromUserRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(RemoveProjectFromUserService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request.UserId)) { return BadRequest("Invalid user identifier"); }
if (string.IsNullOrEmpty(request.ProjectId)) { return BadRequest("Invalid project identifier"); }
return await Handle(() => cerberosServiceClient.RemoveProjectFromUserService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(RemoveProjectFromUserService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
/// <summary>
/// Gets the user by email.
/// </summary>
[HttpPost("ValidateExistence")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
@@ -419,7 +287,7 @@ namespace Core.Cerberos.BFF.Api.Controllers
if (string.IsNullOrEmpty(request.Email)) return BadRequest("Invalid user email");
return await Handle(() => cerberosServiceClient.ValidateUserExistenceService(request, cancellationToken)).ConfigureAwait(false);
return await Handle(() => thalosServiceClient.ValidateUserExistenceService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
@@ -427,5 +295,33 @@ namespace Core.Cerberos.BFF.Api.Controllers
throw;
}
}
/// <summary>
/// Deletes the User by identifier.
/// </summary>
[HttpDelete("Delete")]
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status412PreconditionFailed)]
[ProducesResponseType(typeof(Notification), StatusCodes.Status422UnprocessableEntity)]
[ProducesResponseType(StatusCodes.Status500InternalServerError)]
[Permission("UserManagement.Write")]
public async Task<IActionResult> DeleteUserByIdService(DeleteUserRequest request, CancellationToken cancellationToken)
{
try
{
logger.LogInformation($"{nameof(DeleteUserByIdService)} - Request received - Payload: {JsonSerializer.Serialize(request)}");
if (string.IsNullOrEmpty(request._Id)) return BadRequest("Invalid User identifier");
return await Handle(() => thalosServiceClient.DeleteUserByIdService(request, cancellationToken)).ConfigureAwait(false);
}
catch (Exception ex)
{
logger.LogError($"{nameof(DeleteUserByIdService)} - An Error Occurred- {ex.Message} - {ex.InnerException} - {ex.StackTrace} - with payload {JsonSerializer.Serialize(request)}");
throw;
}
}
}
}

View File

@@ -8,11 +8,12 @@
</PropertyGroup>
<ItemGroup>
<PackageReference Include="Core.Cerberos.Adapters" Version="0.3.0-alpha0042" />
<PackageReference Include="Asp.Versioning.Mvc" Version="8.1.0" />
<PackageReference Include="Core.Blueprint.Logging" Version="1.0.0" />
</ItemGroup>
<ItemGroup>
<ProjectReference Include="..\Core.Cerberos.External\Core.Cerberos.External.csproj" />
<ProjectReference Include="..\Core.Thalos.External\Core.Thalos.External.csproj" />
</ItemGroup>
<ItemGroup>

View File

@@ -0,0 +1,6 @@
@Core.Thalos.BFF.Api_HostAddress = http://localhost:5219
GET {{Core.Thalos.BFF.Api_HostAddress}}/weatherforecast/
Accept: application/json
###

View File

@@ -1,6 +1,9 @@
using Core.Cerberos.Adapters.Extensions;
using Core.Cerberos.Adapters.Helpers;
using Core.Cerberos.External.ClientConfiguration;
using Core.Blueprint.KeyVault.Configuration;
using Core.Blueprint.Logging.Configuration;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.BuildingBlocks.Configuration;
using Core.Thalos.BuildingBlocks.Extensions;
using Core.Thalos.External.ClientConfiguration;
using Microsoft.AspNetCore.ResponseCompression;
using OpenTelemetry.Logs;
using OpenTelemetry.Resources;
@@ -9,23 +12,28 @@ using System.Reflection;
var builder = WebApplication.CreateBuilder(args);
var authSettings = AuthHelper.GetAuthSettings(builder, "cerberos_bff");
builder.Services.ConfigureAuthentication(builder.Configuration, authSettings);
builder.Services.AddEndpointsApiExplorer();
builder.Configuration
.AddUserSecrets(Assembly.GetExecutingAssembly())
.AddEnvironmentVariables();
var services = builder.Services.AddKeyVault(builder.Configuration);
var authSettings = await AuthHelper.GetAuthSettings(builder.Services, builder, "thalos_common");
builder.Services.ConfigureAuthentication(builder.Configuration, authSettings);
builder.Services.AddEndpointsApiExplorer();
builder.Services.AddResponseCompression();
builder.Services.AddProblemDetails();
builder.Services.AddLogs(builder);
builder.Services.AddMemoryCache();
builder.Services.AddResponseCaching(configureOptions => { configureOptions.UseCaseSensitivePaths = true; });
builder.Logging.AddOpenTelemetry(options =>
{
options.IncludeScopes = true;
options.SetResourceBuilder(ResourceBuilder.CreateDefault().AddService("core.cerberos.bff.api")).AddConsoleExporter();
options.SetResourceBuilder(ResourceBuilder.CreateDefault().AddService("core.thalos.bff.api")).AddConsoleExporter();
});
builder.Host.ConfigureServices((context, services) =>
@@ -79,15 +87,13 @@ builder.Host.ConfigureServices((context, services) =>
});
services.AddResponseCaching();
services.AddControllers();
services.AddEndpointsApiExplorer();
services.AddSwaggerGen(builder.Configuration, "Core.Thalos.BFF.Api.xml", authSettings);
services.AddVersioning(builder.Configuration);
services.AddSwagger(builder.Configuration, "Core.Cerberos.BFF.API.xml", authSettings);
services.AddLogging();
services.AddProblemDetails();
services.AddHttpContextAccessor();
services.AddTransient<TrackingMechanismExtension>(); // Register the TrackingIdHandler
services.RegisterExternalLayer(builder.Configuration);
services.AddTelemetry();
});
builder.Services.AddCors(options =>
@@ -101,23 +107,37 @@ builder.Services.AddCors(options =>
});
});
builder.Services.AddScoped<ITokenService, TokenService>();
builder.Services.AddOutputCache(options =>
{
options.AddBasePolicy(builder =>
builder.Expire(TimeSpan.FromSeconds(10)));
options.AddPolicy("Expire20", builder =>
builder.Expire(TimeSpan.FromSeconds(20)));
options.AddPolicy("Expire30", builder =>
builder.Expire(TimeSpan.FromSeconds(30)));
});
//*************************************************************************//
var app = builder.Build();
app.UseCors(options => options.AllowAnyHeader().AllowAnyMethod().AllowAnyOrigin());
app.UseSwagger();
app.UseLogging(builder.Configuration);
app.UseSwaggerUI(builder.Configuration, authSettings);
app.ConfigureSwagger(builder.Configuration);
app.UseResponseCompression();
app.UseResponseCaching();
app.UseRouting();
app.UseCors();
app.UseHttpsRedirection();
app.UseStaticFiles();
app.UseResponseCompression();
app.UseOutputCache();
app.UseResponseCaching();
app.UseAuthentication();
app.UseAuthorization();
app.MapControllers();
app.UseHsts();
app.UseAntiforgery();
app.UseHttpLogging();
//app.MapHealthChecks("/health");
app.Run();

View File

@@ -24,7 +24,7 @@
"dotnetRunMessages": true,
"launchBrowser": true,
"launchUrl": "swagger",
"applicationUrl": "https://localhost:7239;http://localhost:5219",
"applicationUrl": "https://localhost:44320;http://localhost:5219",
"environmentVariables": {
"ASPNETCORE_ENVIRONMENT": "Local"
}

View File

@@ -0,0 +1,25 @@
{
"Logging": {
"LogLevel": {
"Default": "Information",
"Microsoft.AspNetCore": "Warning"
}
},
"LocalGateways": {
"ThalosService": "https://localhost:44312/api"
},
"ServiceSettings": {
"ApplicationName": "thalos",
"LayerName": "bff"
},
"Vault": {
"Address": "https://vault.dream-views.com/",
"Token": "hvs.TGz6P3AsKpYuODMrs11Msiza",
"SecretMount": "thalos"
},
"IdentityProviders": {
"Google": true,
"Azure": false
}
}

View File

@@ -5,8 +5,5 @@
"Microsoft.AspNetCore": "Warning"
}
},
"LocalGateways": {
"CerberosService": "https://localhost:7253/api"
}
"AllowedHosts": "*"
}

View File

@@ -1,6 +1,6 @@
{
"Gateways": {
"CerberosService": "" // Service endpoint for Cerberos
"ThalosService": "" // Service endpoint for Thalos
},
"ConnectionStrings": {
"KeyVault": "" //KeyVault Uri
@@ -17,7 +17,7 @@
"CallbackPath": "", // Path for redirect after authentication
"Scopes": "" // Access scopes for user permissions
},
"HeathCerberosApp": {
"ThalosApp": {
"AuthorizationUrl": "", // URL for authorization endpoint(STORED IN KEY VAULT)
"TokenUrl": "", // URL for token endpoint(STORED IN KEY VAULT)
"Scope": "", // Scope for application permissions (STORED IN KEY VAULT)

View File

@@ -3,9 +3,9 @@ Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio Version 17
VisualStudioVersion = 17.10.35027.167
MinimumVisualStudioVersion = 10.0.40219.1
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Cerberos.BFF.Api", "Core.Cerberos.BFF.Api\Core.Cerberos.BFF.Api.csproj", "{3272E8EA-B46B-49DF-9D29-B5BE758E87C4}"
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Thalos.BFF.Api", "Core.Thalos.BFF.Api\Core.Thalos.BFF.Api.csproj", "{3272E8EA-B46B-49DF-9D29-B5BE758E87C4}"
EndProject
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Cerberos.External", "Core.Cerberos.External\Core.Cerberos.External.csproj", "{3111115C-A391-4A4C-A886-016A92BAC20E}"
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Thalos.External", "Core.Thalos.External\Core.Thalos.External.csproj", "{3111115C-A391-4A4C-A886-016A92BAC20E}"
EndProject
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "Application", "Application", "{CBFF88ED-B50D-4A71-BB2A-C0B2BBA489CA}"
EndProject

View File

@@ -1,14 +1,12 @@
using Core.Cerberos.Adapters.Contracts;
using Core.Cerberos.Adapters.Handlers;
using Core.Cerberos.Adapters.TokenProvider;
using Core.Cerberos.External.GatewayConfigurations;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.GatewayConfigurations;
using LSA.Dashboard.External.Clients.Dashboard;
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Refit;
namespace Core.Cerberos.External.ClientConfiguration
namespace Core.Thalos.External.ClientConfiguration
{
public static class RegisterClientConfiguration
{
@@ -43,7 +41,7 @@ namespace Core.Cerberos.External.ClientConfiguration
return handler;
});
var cerberosServiceApiUrl = GatewaySettingsConfigurations.GetCerberosServiceAPIEndpoint().Endpoint.Url;
var thalosServiceApiUrl = GatewaySettingsConfigurations.GetThalosServiceAPIEndpoint().Endpoint.Url;
// Register IDashBoardServiceClient with the manually created HttpClient
services.AddScoped(provider =>
@@ -55,10 +53,10 @@ namespace Core.Cerberos.External.ClientConfiguration
var httpClient = new HttpClient(handlerTrackingId)
{
BaseAddress = new Uri(cerberosServiceApiUrl),
BaseAddress = new Uri(thalosServiceApiUrl),
Timeout = TimeSpan.FromMinutes(1)
};
return RestService.For<ICerberosServiceClient>(httpClient);
return RestService.For<IThalosServiceClient>(httpClient);
});
return services;

View File

@@ -1,14 +1,15 @@
using Core.Cerberos.Adapters;
using Core.Cerberos.Application.UseCases.Roles.Input;
using Core.Cerberos.Application.UseCases.Users.Input;
using Core.Cerberos.External.Clients.Cerberos.Requests.Permissions;
using Core.Cerberos.External.Clients.Cerberos.Requests.Users;
using Core.Thalos.Application.UseCases.Roles.Input;
using Core.Thalos.Application.UseCases.Users.Input;
using Core.Thalos.BuildingBlocks;
using Core.Thalos.External.Clients.Thalos.Requests.Permissions;
using Core.Thalos.External.Clients.Thalos.Requests.Tenants;
using Core.Thalos.External.Clients.Thalos.Requests.Users;
using Microsoft.AspNetCore.Mvc;
using Refit;
namespace LSA.Dashboard.External.Clients.Dashboard
{
public interface ICerberosServiceClient
public interface IThalosServiceClient
{
[Post("/v1/User/Create")]
Task<ApiResponse<UserAdapter>> CreateUserService([Header("TrackingId")][Body] CreateUserRequest request, CancellationToken cancellationToken = default);
@@ -31,6 +32,9 @@ namespace LSA.Dashboard.External.Clients.Dashboard
[Put("/v1/User/Update")]
Task<ApiResponse<UserAdapter>> UpdateUserService([Header("TrackingId")][Body] UpdateUserRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/User/Delete")]
Task<ApiResponse<UserAdapter>> DeleteUserByIdService([Header("TrackingId")][Body] DeleteUserRequest request, CancellationToken cancellationToken = default);
[Patch("/v1/User/LoginUser")]
Task<ApiResponse<UserAdapter>> LoginUserService([Header("TrackingId")][Body] LoginUserRequest request, CancellationToken cancellationToken = default);
@@ -40,18 +44,6 @@ namespace LSA.Dashboard.External.Clients.Dashboard
[Patch("/v1/User/ChangeStatus")]
Task<ApiResponse<UserAdapter>> ChangeUserStatusService([Header("TrackingId")][Body] ChangeUserStatusRequest request, CancellationToken cancellationToken = default);
[Post("/v1/User/AddCompany")]
Task<ApiResponse<UserAdapter>> AddCompanyToUserService([Header("TrackingId")][Body] AddCompanyToUserRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/User/RemoveCompany")]
Task<ApiResponse<UserAdapter>> RemoveCompanyFromUserService([Header("TrackingId")][Body] RemoveCompanyFromUserRequest request, CancellationToken cancellationToken = default);
[Post("/v1/User/AddProject")]
Task<ApiResponse<UserAdapter>> AddProjectToUserService([Header("TrackingId")][Body] AddProjectToUserRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/User/RemoveProject")]
Task<ApiResponse<UserAdapter>> RemoveProjectFromUserService([Header("TrackingId")][Body] RemoveProjectFromUserRequest request, CancellationToken cancellationToken = default);
[Post("/v1/User/GetTokenAdapter")]
Task<ApiResponse<TokenAdapter>> GetTokenAdapterService([Header("TrackingId")][Body] GetTokenAdapterRequest request, CancellationToken cancellationToken = default);
@@ -73,6 +65,9 @@ namespace LSA.Dashboard.External.Clients.Dashboard
[Patch("/v1/Role/ChangeStatus")]
Task<ApiResponse<RoleAdapter>> ChangeRoleStatusService([Header("TrackingId")][Body] ChangeRoleStatusRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/Role/Delete")]
Task<ApiResponse<RoleAdapter>> DeleteRoleByIdService([Header("TrackingId")][Body] DeleteRoleRequest request, CancellationToken cancellationToken = default);
[Post("/v1/Role/AddApplication")]
Task<ApiResponse<RoleAdapter>> AddApplicationToRoleService([Header("TrackingId")][Body] AddApplicationToRoleRequest request, CancellationToken cancellationToken = default);
@@ -97,6 +92,9 @@ namespace LSA.Dashboard.External.Clients.Dashboard
[Patch("/v1/Permission/ChangeStatus")]
Task<ApiResponse<PermissionAdapter>> ChangePermissionStatusService([Header("TrackingId")][Body] ChangePermissionStatusRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/Permission/Delete")]
Task<ApiResponse<PermissionAdapter>> DeletePermissionByIdService([Header("TrackingId")][Body] DeletePermissionRequest request, CancellationToken cancellationToken = default);
[Post("/v1/Module/Create")]
Task<ApiResponse<ModuleAdapter>> CreateModuleService([Header("TrackingId")][Body] CreateModuleRequest request, CancellationToken cancellationToken = default);
@@ -114,5 +112,27 @@ namespace LSA.Dashboard.External.Clients.Dashboard
[Patch("/v1/Module/ChangeStatus")]
Task<ApiResponse<ModuleAdapter>> ChangeModuleStatusService([Header("TrackingId")][Body] ChangeModuleStatusRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/Module/Delete")]
Task<ApiResponse<ModuleAdapter>> DeleteModuleByIdService([Header("TrackingId")][Body] DeleteModuleRequest request, CancellationToken cancellationToken = default);
[Post("/v1/Tenant/Create")]
Task<ApiResponse<TenantAdapter>> CreateTenantService([Header("TrackingId")][Body] CreateTenantRequest request, CancellationToken cancellationToken = default);
[Post("/v1/Tenant/GetById")]
Task<ApiResponse<TenantAdapter>> GetTenantByIdService([Header("TrackingId")][Body] GetTenantRequest request, CancellationToken cancellationToken = default);
[Get("/v1/Tenant/GetAll")]
Task<ApiResponse<IEnumerable<TenantAdapter>>> GetAllTenantsService([Header("TrackingId")][Body] GetAllTenantsRequest request, CancellationToken cancellationToken = default);
[Put("/v1/Tenant/Update")]
Task<ApiResponse<TenantAdapter>> UpdateTenantService([Header("TrackingId")][Body] UpdateTenantRequest request, CancellationToken cancellationToken = default);
[Patch("/v1/Tenant/ChangeStatus")]
Task<ApiResponse<TenantAdapter>> ChangeTenantStatusService([Header("TrackingId")][Body] ChangeTenantStatusRequest request, CancellationToken cancellationToken = default);
[Delete("/v1/Tenant/Delete")]
Task<ApiResponse<UserAdapter>> DeleteTenantByIdService([Header("TrackingId")][Body] DeleteTenantRequest request, CancellationToken cancellationToken = default);
}
}

View File

@@ -0,0 +1,10 @@
using Core.Blueprint.Mongo;
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class ChangeModuleStatusRequest
{
public string _Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +1,6 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class CreateModuleRequest
{

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class DeleteModuleRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetAllModulesByListRequest
{

View File

@@ -0,0 +1,6 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetAllModulesRequest
{
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetModuleRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,10 +1,11 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
using StatusEnum = Core.Blueprint.Mongo.StatusEnum;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class UpdateModuleRequest
{
public string Id { get; set; } = null!;
public string _Id { get; set; } = null!;
public string Name { get; set; } = null!;
public string? Description { get; set; }
public string? Icon { get; set; }

View File

@@ -0,0 +1,10 @@
using Core.Blueprint.Mongo;
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class ChangePermissionStatusRequest
{
public string _Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,6 +1,6 @@
using Core.Cerberos.Adapters.Common.Constants;
using Core.Thalos.BuildingBlocks;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class CreatePermissionRequest
{

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class DeletePermissionRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetAllPermissionsByListRequest
{

View File

@@ -0,0 +1,6 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetAllPermissionsRequest
{
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class GetPermissionRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,11 +1,11 @@
using Core.Cerberos.Adapters.Common.Constants;
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
using StatusEnum = Core.Blueprint.Mongo.StatusEnum;
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Permissions
namespace Core.Thalos.External.Clients.Thalos.Requests.Permissions
{
public class UpdatePermissionRequest
{
public string Id { get; set; } = null!;
public string _Id { get; set; } = null!;
public string Name { get; set; } = null!;
public string? Description { get; set; }
public AccessLevelEnum? AccessLevel { get; set; } = null!;

View File

@@ -1,6 +1,6 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
namespace Core.Cerberos.Application.UseCases.Roles.Input
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class AddApplicationToRoleRequest
{

View File

@@ -0,0 +1,11 @@
using Core.Blueprint.Mongo;
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class ChangeRoleStatusRequest
{
public string _Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,7 +1,7 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
using System.Text.Json.Serialization;
namespace Core.Cerberos.Application.UseCases.Roles.Input
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class CreateRoleRequest
{

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class DeleteRoleRequest
{
public string _Id { get; set; }
}
}

View File

@@ -0,0 +1,6 @@
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class GetAllRolesRequest
{
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class GetRoleRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,6 +1,6 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
namespace Core.Cerberos.Application.UseCases.Roles.Input
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class RemoveApplicationFromRoleRequest
{

View File

@@ -1,11 +1,12 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Thalos.BuildingBlocks;
using System.Text.Json.Serialization;
using StatusEnum = Core.Blueprint.Mongo.StatusEnum;
namespace Core.Cerberos.Application.UseCases.Roles.Input
namespace Core.Thalos.Application.UseCases.Roles.Input
{
public class UpdateRoleRequest
{
public string Id { get; set; } = null!;
public string _Id { get; set; } = null!;
public string Name { get; set; } = null!;
public string? Description { get; set; }
[JsonConverter(typeof(EnumArrayJsonConverter<ApplicationsEnum>))]

View File

@@ -0,0 +1,10 @@
using Core.Blueprint.Mongo;
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class ChangeTenantStatusRequest
{
public string _Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -0,0 +1,31 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class CreateTenantRequest
{
public string Name { get; set; } = null!;
public string TaxIdentifier { get; set; } = null!;
public string AddressLine1 { get; set; } = null!;
public string? AddressLine2 { get; set; }
public string City { get; set; } = null!;
public string State { get; set; } = null!;
public string Country { get; set; } = null!;
public string PostalCode { get; set; } = null!;
public string ContactEmail { get; set; } = null!;
public string ContactPhone { get; set; } = null!;
public string? Website { get; set; }
public string? ConnectionString { get; set; }
public bool Isolated { get; set; }
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class DeleteTenantRequest
{
public string _Id { get; set; }
}
}

View File

@@ -0,0 +1,6 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class GetAllTenantsRequest
{
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class GetTenantRequest
{
public string _Id { get; set; }
}
}

View File

@@ -0,0 +1,39 @@
namespace Core.Thalos.External.Clients.Thalos.Requests.Tenants
{
public class UpdateTenantRequest
{
public string Name { get; set; } = null!;
public string TaxIdentifier { get; set; } = null!;
public string AddressLine1 { get; set; } = null!;
public string? AddressLine2 { get; set; }
public string City { get; set; } = null!;
public string State { get; set; } = null!;
public string Country { get; set; } = null!;
public string PostalCode { get; set; } = null!;
public string ContactEmail { get; set; } = null!;
public string ContactPhone { get; set; } = null!;
public string? Website { get; set; }
public string? ConnectionString { get; set; }
public bool Isolated { get; set; }
public string _Id { get; set; } = null!;
public string Id { get; init; } = null!;
public DateTime CreatedAt { get; set; }
public string? CreatedBy { get; set; }
public DateTime? UpdatedAt { get; set; }
public string? UpdatedBy { get; set; }
public Blueprint.Mongo.StatusEnum Status { get; set; }
}
}

View File

@@ -0,0 +1,10 @@
using Core.Blueprint.Mongo;
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class ChangeUserStatusRequest
{
public string _Id { get; set; }
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class CreateUserRequest
{
@@ -7,8 +7,7 @@
public string? MiddleName { get; set; }
public string LastName { get; set; } = null!;
public string RoleId { get; set; } = null!;
public string[] Companies { get; set; } = null!;
public string[]? Projects { get; set; }
public string TenantId { get; set; } = null!;
public bool SendInvitation { get; set; }
}
}

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class DeleteUserRequest
{
public string _Id { get; set; }
}
}

View File

@@ -0,0 +1,6 @@
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class GetAllUsersRequest
{
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class GetUserByEmailRequest
{

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class GetTokenAdapterRequest
{

View File

@@ -0,0 +1,7 @@
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class GetUserRequest
{
public string _Id { get; set; }
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Users
namespace Core.Thalos.External.Clients.Thalos.Requests.Users
{
public class LoginUserRequest
{

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.External.Clients.Cerberos.Requests.Users
namespace Core.Thalos.External.Clients.Thalos.Requests.Users
{
public class LogoutUserRequest
{

View File

@@ -1,17 +1,17 @@
using Core.Cerberos.Adapters.Common.Enums;
using Core.Blueprint.Mongo;
namespace Core.Cerberos.Application.UseCases.Users.Input
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class UpdateUserRequest
{
public string Id { get; set; } = null!;
public string _Id { get; set; } = null!;
public string Email { get; set; } = null!;
public string Name { get; set; } = null!;
public string? MiddleName { get; set; }
public string LastName { get; set; } = null!;
public string RoleId { get; set; } = null!;
public string[] Companies { get; set; } = null!;
public string[]? Projects { get; set; }
public string TenantId { get; set; } = null!;
public StatusEnum Status { get; set; }
}
}

View File

@@ -1,4 +1,4 @@
namespace Core.Cerberos.Application.UseCases.Users.Input
namespace Core.Thalos.Application.UseCases.Users.Input
{
public class ValidateUserExistenceRequest
{

View File

@@ -7,8 +7,8 @@
</PropertyGroup>
<ItemGroup>
<PackageReference Include="Core.Cerberos.Adapters" Version="0.3.0-alpha0042" />
<PackageReference Include="Lib.Architecture.BuildingBlocks" Version="0.9.0-alpha0001" />
<PackageReference Include="Core.Thalos.BuildingBlocks" Version="1.0.5" />
<PackageReference Include="Lib.Architecture.BuildingBlocks" Version="1.0.0" />
<PackageReference Include="Refit" Version="8.0.0" />
</ItemGroup>

View File

@@ -1,17 +1,17 @@
using Core.Blueprint.External;
namespace Core.Cerberos.External.GatewayConfigurations
namespace Core.Thalos.External.GatewayConfigurations
{
public record GatewayConfiguration
{
public GatewayConfiguration()
{
CerberosService = new CerberosServiceAPI();
ThalosService = new ThalosServiceAPI();
}
public CerberosServiceAPI CerberosService { get; set; }
public ThalosServiceAPI ThalosService { get; set; }
}
public record CerberosServiceAPI
public record ThalosServiceAPI
{
public string Channel { get; set; }
public BaseEndpoint Endpoint { get; set; }

View File

@@ -1,7 +1,7 @@
using Core.Blueprint.External;
using Microsoft.Extensions.Configuration;
namespace Core.Cerberos.External.GatewayConfigurations
namespace Core.Thalos.External.GatewayConfigurations
{
public class GatewaySettingsConfigurations
{
@@ -13,9 +13,9 @@ namespace Core.Cerberos.External.GatewayConfigurations
_configuration = configuration;
SetDashboardServiceAPIEndpoint();
}
public static CerberosServiceAPI GetCerberosServiceAPIEndpoint()
public static ThalosServiceAPI GetThalosServiceAPIEndpoint()
{
return GatewayConfigurations.CerberosService;
return GatewayConfigurations.ThalosService;
}
private GatewayConfiguration SetDashboardServiceAPIEndpoint()
{
@@ -27,18 +27,18 @@ namespace Core.Cerberos.External.GatewayConfigurations
else
source = _configuration.GetSection("Gateways");
var endpoint = source["CerberosService"] ?? string.Empty;
var endpoint = source["ThalosService"] ?? string.Empty;
if (string.IsNullOrEmpty(endpoint)) throw new Exception("Cerberos Service endpoint is empty or null");
if (string.IsNullOrEmpty(endpoint)) throw new Exception("Thalos Service endpoint is empty or null");
GatewayConfigurations.CerberosService = new CerberosServiceAPI()
GatewayConfigurations.ThalosService = new ThalosServiceAPI()
{
Endpoint = new BaseEndpoint()
{
Uri = new Uri(endpoint),
Url = endpoint,
Token = string.Empty,
APIName = "Cerberos Service"
APIName = "Thalos Service"
}
};

View File

@@ -1,6 +1,6 @@
using Microsoft.AspNetCore.Http;
namespace Core.Cerberos.External
namespace Core.Thalos.External
{
public sealed class TrackingMechanismExtension(IHttpContextAccessor httpContextAccessor) : DelegatingHandler
{

38
Dockerfile Normal file
View File

@@ -0,0 +1,38 @@
# ============ Build ============
FROM mcr.microsoft.com/dotnet/sdk:8.0 AS build
WORKDIR /src
# (opcional) si tienes nuget.config
COPY nuget.config* ./
# Cache de restore por proyecto
COPY Core.Thalos.External/Core.Thalos.External.csproj Core.Thalos.External/
COPY Core.Thalos.BFF.Api/Core.Thalos.BFF.Api.csproj Core.Thalos.BFF.Api/
RUN dotnet restore Core.Thalos.BFF.Api/Core.Thalos.BFF.Api.csproj
# Copia del resto + build
COPY . .
RUN dotnet build Core.Thalos.BFF.Api/Core.Thalos.BFF.Api.csproj -c Release -o /app/build
# ============ Publish ============
FROM build AS publish
RUN dotnet publish Core.Thalos.BFF.Api/Core.Thalos.BFF.Api.csproj -c Release -o /app/publish --no-restore
# ============ Runtime ============
FROM mcr.microsoft.com/dotnet/aspnet:8.0 AS final
# curl (opcional) si luego cambias a healthcheck HTTP
RUN apt-get update && apt-get install -y --no-install-recommends curl && rm -rf /var/lib/apt/lists/*
WORKDIR /app
EXPOSE 8080
# Usuario no-root
RUN useradd -m appuser
USER appuser
ENV ASPNETCORE_URLS=http://+:8080
# La app agrega UserSecrets/ENV/KeyVault/Auth en runtime (no hornear secretos). :contentReference[oaicite:9]{index=9}
COPY --from=publish /app/publish ./
ENTRYPOINT ["dotnet", "Core.Thalos.BFF.Api.dll"]

9
nuget.config Normal file
View File

@@ -0,0 +1,9 @@
<?xml version="1.0" encoding="utf-8"?>
<configuration>
<packageSources>
<!-- Tu BaGet primero -->
<add key="BaGet" value="https://nuget.dream-views.com/v3/index.json" protocolVersion="3" />
<!-- NuGet oficial como fallback (si quieres) -->
<add key="nuget.org" value="https://api.nuget.org/v3/index.json" protocolVersion="3" />
</packageSources>
</configuration>