Compare commits
15 Commits
feature/bl
...
5922a53b93
| Author | SHA1 | Date | |
|---|---|---|---|
| 5922a53b93 | |||
| 13774093b4 | |||
| 7cd08411b9 | |||
| 1d52ee424d | |||
| 4a26ecc83a | |||
| c85897fd1a | |||
| 3511043209 | |||
|
|
99964d14b8 | ||
| 1ae0b600ae | |||
|
|
6cb0aea1a0 | ||
|
|
8207048c25 | ||
|
|
f5b5f7d0f0 | ||
| ffc1afa8c9 | |||
|
|
1c38008e97 | ||
| c18c85959c |
@@ -9,8 +9,6 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "Application", "Application"
|
||||
EndProject
|
||||
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Thalos.Domain", "Core.Thalos.Domain\Core.Thalos.Domain.csproj", "{BE8E05D6-05B2-4317-B619-21853B7D21DB}"
|
||||
EndProject
|
||||
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Thalos.Infrastructure", "Core.Thalos.Infraestructure\Core.Thalos.Infrastructure.csproj", "{43BD5F47-132F-4E78-83F1-A1FEED01A502}"
|
||||
EndProject
|
||||
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Core.Thalos.Provider", "Core.Thalos.Provider\Core.Thalos.Provider.csproj", "{8CAE8380-475F-46B8-AF90-C495AAC58606}"
|
||||
EndProject
|
||||
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "Presentation", "Presentation", "{36839283-6407-476A-BB33-F0EE90383E2B}"
|
||||
@@ -29,10 +27,6 @@ Global
|
||||
{BE8E05D6-05B2-4317-B619-21853B7D21DB}.Debug|Any CPU.Build.0 = Debug|Any CPU
|
||||
{BE8E05D6-05B2-4317-B619-21853B7D21DB}.Release|Any CPU.ActiveCfg = Release|Any CPU
|
||||
{BE8E05D6-05B2-4317-B619-21853B7D21DB}.Release|Any CPU.Build.0 = Release|Any CPU
|
||||
{43BD5F47-132F-4E78-83F1-A1FEED01A502}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
|
||||
{43BD5F47-132F-4E78-83F1-A1FEED01A502}.Debug|Any CPU.Build.0 = Debug|Any CPU
|
||||
{43BD5F47-132F-4E78-83F1-A1FEED01A502}.Release|Any CPU.ActiveCfg = Release|Any CPU
|
||||
{43BD5F47-132F-4E78-83F1-A1FEED01A502}.Release|Any CPU.Build.0 = Release|Any CPU
|
||||
{8CAE8380-475F-46B8-AF90-C495AAC58606}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
|
||||
{8CAE8380-475F-46B8-AF90-C495AAC58606}.Debug|Any CPU.Build.0 = Debug|Any CPU
|
||||
{8CAE8380-475F-46B8-AF90-C495AAC58606}.Release|Any CPU.ActiveCfg = Release|Any CPU
|
||||
@@ -44,7 +38,6 @@ Global
|
||||
GlobalSection(NestedProjects) = preSolution
|
||||
{F00B4683-03B3-487A-9608-4B30675AA278} = {36839283-6407-476A-BB33-F0EE90383E2B}
|
||||
{BE8E05D6-05B2-4317-B619-21853B7D21DB} = {2E7D918E-AB9F-44BF-A334-FD675C9B626E}
|
||||
{43BD5F47-132F-4E78-83F1-A1FEED01A502} = {2E7D918E-AB9F-44BF-A334-FD675C9B626E}
|
||||
{8CAE8380-475F-46B8-AF90-C495AAC58606} = {2E7D918E-AB9F-44BF-A334-FD675C9B626E}
|
||||
EndGlobalSection
|
||||
GlobalSection(ExtensibilityGlobals) = postSolution
|
||||
|
||||
@@ -15,7 +15,7 @@ using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.Graph;
|
||||
using ModuleRequest = Core.Thalos.Domain.Contexts.Onboarding.Request.ModuleRequest;
|
||||
|
||||
namespace LSA.Core.Kerberos.API.Controllers
|
||||
namespace LSA.Core.Thalos.API.Controllers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all requests for module authentication.
|
||||
@@ -25,6 +25,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[ApiController]
|
||||
[AllowAnonymous]
|
||||
public class ModuleController(IModuleProvider service) : ControllerBase
|
||||
{
|
||||
/// <summary>
|
||||
@@ -38,8 +39,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(IEnumerable<ModuleAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Read, RoleManagement.Read")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Read, RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllModulesAsync(CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.GetAllModules(cancellationToken).ConfigureAwait(false);
|
||||
@@ -59,8 +60,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(IEnumerable<ModuleAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Read")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllModulesByList([FromBody] string[] modules, CancellationToken cancellationToken)
|
||||
{
|
||||
if (modules == null || !modules.Any())
|
||||
@@ -86,11 +87,11 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Read")]
|
||||
public async Task<IActionResult> GetModuleByIdAsync([FromRoute] string _id, CancellationToken cancellationToken)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Read")]
|
||||
public async Task<IActionResult> GetModuleByIdAsync([FromRoute] string id, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.GetModuleById(_id, cancellationToken).ConfigureAwait(false);
|
||||
var result = await service.GetModuleById(id, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
if (result == null)
|
||||
{
|
||||
@@ -110,8 +111,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal e|ror.</response>
|
||||
[HttpPost]
|
||||
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status201Created)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Write")]
|
||||
public async Task<IActionResult> CreateModuleAsync([FromBody] ModuleRequest newModule, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.CreateModule(newModule, cancellationToken).ConfigureAwait(false);
|
||||
@@ -133,13 +134,13 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Write")]
|
||||
public async Task<IActionResult> UpdateModuleAsync([FromRoute] string _id, ModuleAdapter entity, CancellationToken cancellationToken)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Write")]
|
||||
public async Task<IActionResult> UpdateModuleAsync([FromRoute] string id, ModuleAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
if (_id != entity._Id?.ToString())
|
||||
if (id != entity.Id?.ToString())
|
||||
{
|
||||
return BadRequest("User ID mismatch");
|
||||
return BadRequest("Module ID mismatch");
|
||||
}
|
||||
|
||||
var result = await service.UpdateModule(entity, cancellationToken).ConfigureAwait(false);
|
||||
@@ -162,8 +163,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(ModuleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("ModuleManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("ModuleManagement.Write")]
|
||||
public async Task<IActionResult> ChangeModuleStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.ChangeModuleStatus(id, newStatus, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
@@ -5,16 +5,17 @@
|
||||
// ***********************************************************************
|
||||
|
||||
using Asp.Versioning;
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Attributes;
|
||||
using Core.Thalos.Adapters.Common.Constants;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.Graph;
|
||||
using PermissionRequest = Core.Thalos.Domain.Contexts.Onboarding.Request.PermissionRequest;
|
||||
|
||||
namespace LSA.Core.Kerberos.API.Controllers
|
||||
namespace LSA.Core.Thalos.API.Controllers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all requests for permission authentication.
|
||||
@@ -24,7 +25,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[ApiController]
|
||||
public class PermissionController(IPermissionService service, ILogger<PermissionController> logger) : ControllerBase
|
||||
public class PermissionController(IPermissionProvider service) : ControllerBase
|
||||
{
|
||||
/// <summary>
|
||||
/// Gets all the permissions.
|
||||
@@ -37,21 +38,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(IEnumerable<PermissionAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Read, RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllPermissionsAsync()
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Read, RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllPermissionsAsync(CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.GetAllPermissionsService();
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in GetAllPermissionsAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.GetAllPermissions(cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -67,31 +59,17 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(IEnumerable<PermissionAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Read")]
|
||||
public async Task<IActionResult> GetAllPermissionsByList([FromBody] string[] permissions)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Read")]
|
||||
public async Task<IActionResult> GetAllPermissionsByList([FromBody] string[] permissions, CancellationToken cancellationToken)
|
||||
{
|
||||
if (permissions == null || !permissions.Any())
|
||||
{
|
||||
return BadRequest("Permission identifiers are required.");
|
||||
return BadRequest("Permissions identifiers are required.");
|
||||
}
|
||||
|
||||
try
|
||||
{
|
||||
var result = await service.GetAllPermissionsByListService(permissions);
|
||||
|
||||
if (result == null || !result.Any())
|
||||
{
|
||||
return NotFound("No permissions found for the given identifiers.");
|
||||
}
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in GetAllPermissionsByList");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.GetAllPermissionsByList(permissions, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -107,23 +85,18 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Read")]
|
||||
public async Task<IActionResult> GetPermissionByIdAsync([FromRoute] string id)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Read")]
|
||||
public async Task<IActionResult> GetPermissionByIdAsync([FromRoute] string id, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.GetPermissionByIdService(id);
|
||||
var result = await service.GetPermissionById(id, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
if (result is null) return NotFound($"permission with id: '{id}' not found");
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
if (result == null)
|
||||
{
|
||||
logger.LogError(ex, "Error in GetPermissionByIdAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
return NotFound("Entity not found");
|
||||
}
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -136,20 +109,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal e|ror.</response>
|
||||
[HttpPost]
|
||||
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status201Created)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> CreatePermissionAsync([FromBody] PermissionRequest newPermission)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> CreatePermissionAsync([FromBody] PermissionRequest newPermission, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.CreatePermissionService(newPermission).ConfigureAwait(false);
|
||||
return Created("CreatedWithIdService", result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in CreatePermissionAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.CreatePermission(newPermission, cancellationToken).ConfigureAwait(false);
|
||||
return Created("CreatedWithIdAsync", result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -167,21 +132,18 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> UpdatePermissionAsync(PermissionAdapter entity, string id)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> UpdatePermissionAsync([FromRoute] string id, PermissionAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
if (id != entity.Id?.ToString())
|
||||
{
|
||||
var result = await service.UpdatePermissionService(entity, id);
|
||||
return BadRequest("Permission ID mismatch");
|
||||
}
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in UpdatePermissionAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.UpdatePermission(entity, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -199,21 +161,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[ProducesResponseType(typeof(PermissionAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> ChangePermissionStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("PermissionManagement.Write")]
|
||||
public async Task<IActionResult> ChangePermissionStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.ChangePermissionStatusService(id, newStatus);
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in ChangePermissionStatus");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.ChangePermissionStatus(id, newStatus, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -12,8 +12,9 @@ using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using StatusEnum = Core.Blueprint.Mongo.StatusEnum;
|
||||
|
||||
namespace LSA.Core.Kerberos.API.Controllers
|
||||
namespace LSA.Core.Thalos.API.Controllers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all requests for role authentication.
|
||||
@@ -23,7 +24,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[Produces(MimeTypes.ApplicationJson)]
|
||||
[Consumes(MimeTypes.ApplicationJson)]
|
||||
[ApiController]
|
||||
public class RoleController(IRoleService service, ILogger<RoleController> logger) : ControllerBase
|
||||
public class RoleController(IRoleProvider service) : ControllerBase
|
||||
{
|
||||
/// <summary>
|
||||
/// Gets all the roles.
|
||||
@@ -34,21 +35,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpGet]
|
||||
[ProducesResponseType(typeof(IEnumerable<RoleAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllRolesAsync()
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetAllRolesAsync(CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.GetAllRolesService();
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in GetAllRolesAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.GetAllRoles(cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -62,23 +54,18 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpGet]
|
||||
[Route(Routes.Id)]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetRoleByIdAsync([FromRoute] string id)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Read")]
|
||||
public async Task<IActionResult> GetRoleByIdAsync([FromRoute] string id, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.GetRoleByIdService(id);
|
||||
var result = await service.GetRoleById(id, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
if (result is null) return NotFound($"role with id: '{id}' not found");
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
if (result == null)
|
||||
{
|
||||
logger.LogError(ex, "Error in GetRoleByIdAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
return NotFound("Entity not found");
|
||||
}
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -91,21 +78,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpPost]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status201Created)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> CreateRoleAsync([FromBody] RoleRequest newRole)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> CreateRoleAsync([FromBody] RoleRequest newRole, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.CreateRoleService(newRole).ConfigureAwait(false);
|
||||
|
||||
return Created("CreatedWithIdService", result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in CreateRoleAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.CreateRole(newRole, cancellationToken).ConfigureAwait(false);
|
||||
return Created("CreatedWithIdAsync", result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -121,21 +99,18 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPut]
|
||||
[Route(Routes.Id)]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> UpdateRoleAsync([FromBody] RoleAdapter entity, [FromRoute] string id)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> UpdateRoleAsync([FromRoute] string id, [FromBody] RoleAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
if (id != entity.Id?.ToString())
|
||||
{
|
||||
var result = await service.UpdateRoleService(entity, id);
|
||||
return BadRequest("Role ID mismatch");
|
||||
}
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in UpdateRoleAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.UpdateRole(entity, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -151,22 +126,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPatch]
|
||||
[Route(Routes.ChangeStatus)]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> ChangeRoleStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> ChangeRoleStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var result = await service.ChangeRoleStatusService(id, newStatus);
|
||||
|
||||
return Ok(result);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in ChangeRoleStatus");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
|
||||
var result = await service.ChangeRoleStatus(id, newStatus, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -181,22 +146,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpPost(Routes.AddApplication)]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> AddApplicationToRoleAsync([FromRoute] string roleId,
|
||||
[FromRoute] ApplicationsEnum application)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> AddApplicationToRoleAsync([FromRoute] string roleId, [FromRoute] ApplicationsEnum application, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var updatedRole = await service.AddApplicationToRoleService(roleId, application);
|
||||
|
||||
return Ok(updatedRole);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in AddApplicationToRoleAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.AddApplicationToRole(roleId, application, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -211,21 +166,12 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpDelete(Routes.RemoveApplication)]
|
||||
[ProducesResponseType(typeof(RoleAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> RemoveApplicationFromRoleAsync([FromRoute] string roleId,
|
||||
[FromRoute] ApplicationsEnum application)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("RoleManagement.Write")]
|
||||
public async Task<IActionResult> RemoveApplicationFromRoleAsync([FromRoute] string roleId, [FromRoute] ApplicationsEnum application, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
var updatedRole = await service.RemoveApplicationFromRoleService(roleId, application);
|
||||
return Ok(updatedRole);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, "Error in RemoveApplicationFromRoleAsync");
|
||||
return StatusCode(500, $"Internal server error, ErrorMessage: {ex.Message}");
|
||||
}
|
||||
var result = await service.RemoveApplicationFromRole(roleId, application, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -14,7 +14,7 @@ using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.Graph;
|
||||
using UserRequest = Core.Thalos.Domain.Contexts.Onboarding.Request.UserRequest;
|
||||
|
||||
namespace LSA.Core.Kerberos.API.Controllers
|
||||
namespace LSA.Core.Thalos.API.Controllers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all requests for user authentication.
|
||||
@@ -35,8 +35,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpGet]
|
||||
[ProducesResponseType(typeof(IEnumerable<UserAdapter>), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Read")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Read")]
|
||||
public async Task<IActionResult> GetAllUsers(CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.GetAllUsers(cancellationToken).ConfigureAwait(false);
|
||||
@@ -54,11 +54,11 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpGet]
|
||||
[Route(Routes.Id)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Read")]
|
||||
public async Task<IActionResult> GetUserById([FromRoute] string _id, CancellationToken cancellationToken)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Read")]
|
||||
public async Task<IActionResult> GetUserById([FromRoute] string id, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.GetUserById(_id, cancellationToken).ConfigureAwait(false);
|
||||
var result = await service.GetUserById(id, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
if (result == null)
|
||||
{
|
||||
@@ -79,7 +79,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpGet]
|
||||
[Route(Routes.Email)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
//[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
public async Task<IActionResult> GetUserByEmail([FromRoute] string email, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.GetUserByEmail(email, cancellationToken).ConfigureAwait(false);
|
||||
@@ -127,8 +127,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpPost(Routes.Register)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status201Created)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> CreateUserAsync([FromBody] UserRequest newUser, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.CreateUser(newUser, cancellationToken).ConfigureAwait(false);
|
||||
@@ -148,11 +148,11 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPut]
|
||||
[Route(Routes.Id)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> UpdateUserAsync([FromRoute] string _id, [FromBody] UserAdapter entity, CancellationToken cancellationToken)
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> UpdateUserAsync([FromRoute] string id, [FromBody] UserAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
if (_id != entity._Id?.ToString())
|
||||
if (id != entity.Id?.ToString())
|
||||
{
|
||||
return BadRequest("User ID mismatch");
|
||||
}
|
||||
@@ -173,7 +173,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpPatch(Routes.LogIn)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
//[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
public async Task<IActionResult> LoginUserAsync([FromRoute] string email, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.LogInUser(email, cancellationToken).ConfigureAwait(false);
|
||||
@@ -194,7 +194,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
/// <response code="500">The service internal error.</response>
|
||||
[HttpPatch(Routes.LogOut)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
//[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
public async Task<IActionResult> LogOutUserSessionAsync([FromRoute] string email, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.LogOutUserSession(email, cancellationToken).ConfigureAwait(false);
|
||||
@@ -216,8 +216,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPatch]
|
||||
[Route(Routes.ChangeStatus)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> ChangeUserStatus([FromRoute] string id, [FromRoute] StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.ChangeUserStatus(id, newStatus, cancellationToken).ConfigureAwait(false);
|
||||
@@ -236,8 +236,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPost]
|
||||
[Route(Routes.AddCompany)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> AddCompanyToUserAsync([FromRoute] string userId, [FromRoute] string companyId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.AddCompanyToUser(userId, companyId, cancellationToken).ConfigureAwait(false);
|
||||
@@ -256,8 +256,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpDelete]
|
||||
[Route(Routes.RemoveCompany)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> RemoveCompanyFromUserAsync([FromRoute] string userId, [FromRoute] string companyId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.RemoveCompanyFromUser(userId, companyId, cancellationToken).ConfigureAwait(false); ;
|
||||
@@ -276,8 +276,8 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpPost]
|
||||
[Route(Routes.AddProject)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> AddProjectToUserAsync([FromRoute] string userId, [FromRoute] string projectId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.AddProjectToUser(userId, projectId, cancellationToken).ConfigureAwait(false);
|
||||
@@ -296,11 +296,11 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpDelete]
|
||||
[Route(Routes.RemoveProject)]
|
||||
[ProducesResponseType(typeof(UserAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
[Permission("UserManagement.Write")]
|
||||
//[Authorize(AuthenticationSchemes = Schemes.DefaultScheme)]
|
||||
//[Permission("UserManagement.Write")]
|
||||
public async Task<IActionResult> RemoveProjectFromUserAsync([FromRoute] string userId, [FromRoute] string projectId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await service.RemoveCompanyFromUser(userId, projectId, cancellationToken).ConfigureAwait(false);
|
||||
var result = await service.RemoveProjectFromUser(userId, projectId, cancellationToken).ConfigureAwait(false);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
@@ -315,7 +315,7 @@ namespace LSA.Core.Kerberos.API.Controllers
|
||||
[HttpGet]
|
||||
[Route("{email}/GetTokenAdapter")]
|
||||
[ProducesResponseType(typeof(TokenAdapter), StatusCodes.Status200OK)]
|
||||
[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
//[Authorize(AuthenticationSchemes = $"{Schemes.DefaultScheme}, {Schemes.AzureScheme}")]
|
||||
public async Task<IActionResult> GetTokenAdapter([FromRoute] string email, CancellationToken cancellationToken)
|
||||
{
|
||||
var tokenAdapter = await service.GetToken(email, cancellationToken).ConfigureAwait(false);
|
||||
|
||||
@@ -15,7 +15,7 @@
|
||||
</ItemGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<PackageReference Include="Blueprint.Logging" Version="0.0.1" />
|
||||
<PackageReference Include="Core.Blueprint.Logging" Version="1.0.1" />
|
||||
</ItemGroup>
|
||||
|
||||
<ItemGroup>
|
||||
|
||||
71
Core.Thalos.DAL.API/Extensions/SwaggerExtensions.cs
Normal file
71
Core.Thalos.DAL.API/Extensions/SwaggerExtensions.cs
Normal file
@@ -0,0 +1,71 @@
|
||||
using Asp.Versioning.ApiExplorer;
|
||||
using Microsoft.Extensions.Options;
|
||||
using Microsoft.OpenApi.Any;
|
||||
using Swashbuckle.AspNetCore.SwaggerGen;
|
||||
using Swashbuckle.AspNetCore.SwaggerUI;
|
||||
|
||||
namespace Core.Thalos.DAL.API.Extensions
|
||||
{
|
||||
public static class SwaggerExtensions
|
||||
{
|
||||
public static void AddSwagger(this IServiceCollection services)
|
||||
{
|
||||
services.AddEndpointsApiExplorer();
|
||||
services.AddSwaggerGen();
|
||||
services.AddTransient<IConfigureOptions<SwaggerGenOptions>, ConfigureSwaggerOptions>();
|
||||
}
|
||||
|
||||
public static void ConfigureSwagger(this WebApplication app)
|
||||
{
|
||||
app.UseSwagger();
|
||||
app.UseSwaggerUI(options =>
|
||||
{
|
||||
foreach (var version in app.DescribeApiVersions().Select(version => version.GroupName))
|
||||
options.SwaggerEndpoint($"/swagger/{version}/swagger.json", version);
|
||||
|
||||
options.DisplayRequestDuration();
|
||||
options.EnableTryItOutByDefault();
|
||||
options.DocExpansion(DocExpansion.None);
|
||||
});
|
||||
}
|
||||
public static IServiceCollection AddVersioning(this IServiceCollection services)
|
||||
{
|
||||
services.AddApiVersioning(options => options.ReportApiVersions = true)
|
||||
.AddApiExplorer(options =>
|
||||
{
|
||||
options.GroupNameFormat = "'v'VVV";
|
||||
options.SubstituteApiVersionInUrl = true;
|
||||
});
|
||||
|
||||
return services;
|
||||
}
|
||||
}
|
||||
public class ConfigureSwaggerOptions : IConfigureOptions<SwaggerGenOptions>
|
||||
{
|
||||
private readonly IApiVersionDescriptionProvider _provider;
|
||||
|
||||
public ConfigureSwaggerOptions(IApiVersionDescriptionProvider provider)
|
||||
{
|
||||
_provider = provider;
|
||||
}
|
||||
|
||||
public void Configure(SwaggerGenOptions options)
|
||||
{
|
||||
foreach (var description in _provider.ApiVersionDescriptions)
|
||||
options.SwaggerDoc(description.GroupName, new()
|
||||
{
|
||||
Title = AppDomain.CurrentDomain.FriendlyName,
|
||||
Version = description.ApiVersion.ToString()
|
||||
});
|
||||
|
||||
//Map ALL Values Format TODO
|
||||
options.MapType<DateOnly>(() => new()
|
||||
{
|
||||
Format = "date",
|
||||
Example = new OpenApiString(DateOnly.MinValue.ToString())
|
||||
});
|
||||
|
||||
options.CustomSchemaIds(type => type.ToString().Replace("+", "."));
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,90 +1,82 @@
|
||||
using Core.Blueprint.DAL.Mongo.Configuration;
|
||||
using Core.Blueprint.Logging.Configuration;
|
||||
using Core.Blueprint.Redis.Configuration;
|
||||
using Core.Thalos.Adapters.Extensions;
|
||||
using Core.Thalos.Adapters.Helpers;
|
||||
using Core.Thalos.DAL.API.Extensions;
|
||||
using Core.Thalos.Provider;
|
||||
using Microsoft.AspNetCore.RateLimiting;
|
||||
using Microsoft.AspNetCore.ResponseCompression;
|
||||
using System.IO.Compression;
|
||||
using Microsoft.AspNetCore.HttpLogging;
|
||||
using System.Reflection;
|
||||
using System.Threading.RateLimiting;
|
||||
using System.Text.Json.Serialization;
|
||||
|
||||
var builder = WebApplication.CreateBuilder(args);
|
||||
|
||||
var authSettings = AuthHelper.GetAuthSettings(builder, "thalos_dal");
|
||||
|
||||
builder.Services.ConfigureAuthentication(builder.Configuration, authSettings);
|
||||
|
||||
builder.Configuration.AddUserSecrets(Assembly.GetExecutingAssembly()).AddEnvironmentVariables();
|
||||
|
||||
// Add services to the container.
|
||||
|
||||
builder.Services.AddControllers();
|
||||
// Learn more about configuring Swagger/OpenAPI at https://aka.ms/aspnetcore/swashbuckle
|
||||
builder.Services.AddEndpointsApiExplorer();
|
||||
builder.Services.AddSwaggerGen();
|
||||
builder.Configuration
|
||||
.AddUserSecrets(Assembly.GetExecutingAssembly())
|
||||
.AddEnvironmentVariables();
|
||||
|
||||
builder.Services.AddLogs(builder);
|
||||
|
||||
builder.Services.AddCors(options =>
|
||||
{
|
||||
options.AddPolicy("AllowAll", policyBuilder =>
|
||||
policyBuilder.AllowAnyOrigin().AllowAnyHeader().AllowAnyMethod());
|
||||
});
|
||||
builder.Services.AddMvc().AddJsonOptions(options =>
|
||||
{
|
||||
options.JsonSerializerOptions.WriteIndented = true;
|
||||
options.JsonSerializerOptions.MaxDepth = 20;
|
||||
options.JsonSerializerOptions.NumberHandling = System.Text.Json.Serialization.JsonNumberHandling.AllowNamedFloatingPointLiterals;
|
||||
});
|
||||
builder.Services.Configure<BrotliCompressionProviderOptions>(options =>
|
||||
{
|
||||
options.Level = CompressionLevel.Fastest;
|
||||
});
|
||||
builder.Services.Configure<GzipCompressionProviderOptions>(options =>
|
||||
{
|
||||
options.Level = CompressionLevel.SmallestSize;
|
||||
});
|
||||
builder.Services.AddResponseCompression(options =>
|
||||
{
|
||||
options.EnableForHttps = true;
|
||||
options.Providers.Add<BrotliCompressionProvider>();
|
||||
options.Providers.Add<GzipCompressionProvider>();
|
||||
});
|
||||
|
||||
builder.Services.AddRateLimiter(_ => _
|
||||
.AddFixedWindowLimiter("fixed", options =>
|
||||
{
|
||||
options.PermitLimit = 5;
|
||||
options.Window = TimeSpan.FromSeconds(10);
|
||||
options.QueueProcessingOrder = QueueProcessingOrder.OldestFirst;
|
||||
options.QueueLimit = 2;
|
||||
})
|
||||
.AddSlidingWindowLimiter("sliding", options =>
|
||||
{
|
||||
options.PermitLimit = 5;
|
||||
options.Window = TimeSpan.FromSeconds(10);
|
||||
options.SegmentsPerWindow = 5;
|
||||
options.QueueProcessingOrder = QueueProcessingOrder.OldestFirst;
|
||||
options.QueueLimit = 2;
|
||||
}));
|
||||
|
||||
builder.Services.AddResponseCaching();
|
||||
builder.Services.AddControllers();
|
||||
builder.Services.AddEndpointsApiExplorer();
|
||||
builder.Services.AddSwagger(builder.Configuration, "Core.Thalos.DAL.API.xml", authSettings);
|
||||
builder.Services.AddVersioning(builder.Configuration);
|
||||
builder.Services.AddLogging();
|
||||
builder.Services.AddResponseCompression();
|
||||
builder.Services.AddProblemDetails();
|
||||
builder.Services.AddMemoryCache();
|
||||
builder.Services.AddLogs(builder);
|
||||
builder.Services.AddRedis(builder.Configuration);
|
||||
builder.Services.AddMongoLayer(builder.Configuration);
|
||||
builder.Services.AddDALLayerServices(builder.Configuration);
|
||||
|
||||
builder.Host.ConfigureServices((context, services) =>
|
||||
{
|
||||
|
||||
builder.Services.AddDALLayer(builder.Configuration);
|
||||
services.AddLogging();
|
||||
services.AddControllers();
|
||||
services.AddProblemDetails();
|
||||
services.AddCors(options
|
||||
=> options.AddDefaultPolicy(policyBuilder
|
||||
=> policyBuilder
|
||||
.AllowAnyOrigin()
|
||||
.AllowAnyHeader()
|
||||
.AllowAnyMethod()));
|
||||
|
||||
builder.Services.Configure<Microsoft.AspNetCore.Http.Json.JsonOptions>(options =>
|
||||
{
|
||||
options.SerializerOptions.Converters.Add(new JsonStringEnumConverter());
|
||||
});
|
||||
|
||||
services
|
||||
.AddEndpointsApiExplorer()
|
||||
.AddVersioning()
|
||||
.AddSwagger();
|
||||
|
||||
services.AddHealthChecks();
|
||||
services.AddHttpLogging(options => options.LoggingFields = HttpLoggingFields.All);
|
||||
|
||||
builder.Services.AddOutputCache(options =>
|
||||
{
|
||||
options.AddBasePolicy(builder =>
|
||||
builder.Expire(TimeSpan.FromSeconds(10)));
|
||||
options.AddPolicy("Expire20", builder =>
|
||||
builder.Expire(TimeSpan.FromSeconds(20)));
|
||||
options.AddPolicy("Expire30", builder =>
|
||||
builder.Expire(TimeSpan.FromSeconds(30)));
|
||||
});
|
||||
});
|
||||
|
||||
var app = builder.Build();
|
||||
|
||||
app.UseSwaggerUI(builder.Configuration, authSettings);
|
||||
app.ConfigureSwagger(builder.Configuration);
|
||||
app.UseLogging(builder.Configuration);
|
||||
app.UseHttpsRedirection();
|
||||
app.UseSwagger();
|
||||
app.UseSwaggerUI();
|
||||
app.UseAuthentication();
|
||||
app.UseAuthorization();
|
||||
app.MapControllers();
|
||||
app.UseCors();
|
||||
app.ConfigureSwagger();
|
||||
app.UseHttpsRedirection();
|
||||
app.UseStaticFiles();
|
||||
app.UseRouting();
|
||||
app.UseResponseCompression();
|
||||
app.UseOutputCache();
|
||||
app.UseResponseCaching();
|
||||
app.UseLogging(builder.Configuration);
|
||||
app.MapHealthChecks("/health");
|
||||
|
||||
app.Run();
|
||||
@@ -5,4 +5,18 @@
|
||||
"Microsoft.AspNetCore": "Warning"
|
||||
}
|
||||
},
|
||||
"AllowedHosts": "*",
|
||||
"ConnectionStrings": {
|
||||
"MongoDB": "mongodb://localhost:27017",
|
||||
"Redis": "localhost:6379"
|
||||
},
|
||||
"MongoDb": {
|
||||
"DatabaseName": "Thalos",
|
||||
"LocalAudience": ""
|
||||
},
|
||||
"DetailedErrors": true,
|
||||
"UseRedisCache": true,
|
||||
"CacheSettings": {
|
||||
"DefaultCacheDurationInMinutes": 3
|
||||
}
|
||||
}
|
||||
|
||||
26
Core.Thalos.DAL.API/appsettings.Local.json
Normal file
26
Core.Thalos.DAL.API/appsettings.Local.json
Normal file
@@ -0,0 +1,26 @@
|
||||
{
|
||||
"Logging": {
|
||||
"LogLevel": {
|
||||
"Default": "Information",
|
||||
"Microsoft.AspNetCore": "Warning"
|
||||
}
|
||||
},
|
||||
"AllowedHosts": "*",
|
||||
"ConnectionStrings": {
|
||||
"MongoDB": "mongodb://admin_agile:Admin%40agileWebs@portainer.white-enciso.pro:27017/?authMechanism=SCRAM-SHA-256",
|
||||
"Redis": "100.123.31.103:6379"
|
||||
},
|
||||
"MongoDb": {
|
||||
"DatabaseName": "Thalos",
|
||||
"LocalAudience": ""
|
||||
},
|
||||
"DetailedErrors": true,
|
||||
"UseRedisCache": true,
|
||||
"CacheSettings": {
|
||||
"DefaultCacheDurationInMinutes": 3
|
||||
},
|
||||
"ServiceSettings": {
|
||||
"ApplicationName": "thalos",
|
||||
"LayerName": "dal"
|
||||
}
|
||||
}
|
||||
@@ -6,7 +6,17 @@
|
||||
}
|
||||
},
|
||||
"AllowedHosts": "*",
|
||||
"Endpoints": {
|
||||
"AppConfigurationURI": "https://sandbox-hci-usc-appcg.azconfig.io"
|
||||
"ConnectionStrings": {
|
||||
"MongoDB": "mongodb://admin_agile:Admin%40agileWebs@portainer.white-enciso.pro:27017/?authMechanism=SCRAM-SHA-256",
|
||||
"Redis": "localhost:6379"
|
||||
},
|
||||
"MongoDb": {
|
||||
"DatabaseName": "Thalos",
|
||||
"LocalAudience": ""
|
||||
},
|
||||
"DetailedErrors": true,
|
||||
"UseRedisCache": true,
|
||||
"CacheSettings": {
|
||||
"DefaultCacheDurationInMinutes": 3
|
||||
}
|
||||
}
|
||||
|
||||
@@ -26,7 +26,7 @@
|
||||
"AuthorizationUrl": "", // URL for authorization endpoint (STORED IN KEY VAULT)
|
||||
"TokenUrl": "", // URL for token endpoint (STORED IN KEY VAULT)
|
||||
"Scope": "", // Scope for application permissions (STORED IN KEY VAULT)
|
||||
"ClientId": "" // Client ID for Kerberos application (STORED IN KEY VAULT)
|
||||
"ClientId": "" // Client ID for Thalos application (STORED IN KEY VAULT)
|
||||
},
|
||||
"MicrosoftGraph": {
|
||||
"Scopes": "", // Scopes for Microsoft Graph API access
|
||||
|
||||
@@ -1,42 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="ModuleMapper.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using MongoDB.Bson;
|
||||
using System.Security.Claims;
|
||||
namespace Core.Thalos.Domain.Contexts.Onboarding.Mappers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles mappings between
|
||||
/// <see cref="ModuleRequest"/>,
|
||||
/// and <see cref="ModuleAdapter"/>
|
||||
/// </summary>
|
||||
public static class ModuleMapper
|
||||
{
|
||||
/// <summary>
|
||||
/// Maps the permissionRequest to ModuleAdapter.
|
||||
/// </summary>
|
||||
/// <param name="newModule">The Module to be mapped.</param>
|
||||
/// <returns>A <see cref="ModuleAdapter"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public static ModuleAdapter ToAdapter(this ModuleRequest newModule, IHttpContextAccessor httpContextAccessor)
|
||||
{
|
||||
return new ModuleAdapter
|
||||
{
|
||||
Id = ObjectId.GenerateNewId().ToString(),
|
||||
Name = newModule.Name,
|
||||
Description = newModule.Description,
|
||||
Icon = newModule.Icon,
|
||||
Route = newModule.Route,
|
||||
Order = newModule.Order,
|
||||
Application = newModule.Application,
|
||||
CreatedAt = DateTime.UtcNow,
|
||||
CreatedBy = httpContextAccessor.HttpContext?.User?.FindFirst(ClaimTypes.Email)?.Value ?? string.Empty,
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,39 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="PermissionMapper.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using MongoDB.Bson;
|
||||
using System.Security.Claims;
|
||||
namespace Core.Thalos.Domain.Contexts.Onboarding.Mappers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles mappings between
|
||||
/// <see cref="PermissionRequest"/>,
|
||||
/// and <see cref="PermissionAdapter"/>
|
||||
/// </summary>
|
||||
public static class PermissionMapper
|
||||
{
|
||||
/// <summary>
|
||||
/// Maps the permissionRequest to PermissionAdapter.
|
||||
/// </summary>
|
||||
/// <param name="newPermission">The Permission to be mapped.</param>
|
||||
/// <returns>A <see cref="PermissionAdapter"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public static PermissionAdapter ToAdapter(this PermissionRequest newPermission, IHttpContextAccessor httpContextAccessor)
|
||||
{
|
||||
return new PermissionAdapter
|
||||
{
|
||||
Id = ObjectId.GenerateNewId().ToString(),
|
||||
Name = newPermission.Name,
|
||||
Description = newPermission.Description,
|
||||
CreatedAt = DateTime.UtcNow,
|
||||
CreatedBy = httpContextAccessor.HttpContext?.User?.FindFirst(ClaimTypes.Email)?.Value ?? string.Empty,
|
||||
AccessLevel = newPermission.AccessLevel
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,42 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="RoleMapper.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using MongoDB.Bson;
|
||||
using System.Security.Claims;
|
||||
namespace Core.Thalos.Domain.Contexts.Onboarding.Mappers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles mappings between
|
||||
/// <see cref="RoleRequest"/>,
|
||||
/// and <see cref="RoleAdapter"/>
|
||||
/// </summary>
|
||||
public static class RoleMapper
|
||||
{
|
||||
/// <summary>
|
||||
/// Maps the RoleRequest to RoleAdapter.
|
||||
/// </summary>
|
||||
/// <param name="newRole">The Role to be mapped.</param>
|
||||
/// <returns>A <see cref="RoleAdapter"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public static RoleAdapter ToAdapter(this RoleRequest newRole, IHttpContextAccessor httpContextAccessor)
|
||||
{
|
||||
return new RoleAdapter
|
||||
{
|
||||
Id = ObjectId.GenerateNewId().ToString(),
|
||||
Name = newRole.Name,
|
||||
Description = newRole.Description,
|
||||
Applications = newRole.Applications,
|
||||
Modules = newRole.Modules,
|
||||
Permissions = newRole.Permissions,
|
||||
CreatedAt = DateTime.UtcNow,
|
||||
CreatedBy = httpContextAccessor.HttpContext?.User?.FindFirst(ClaimTypes.Email)?.Value ?? string.Empty
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,46 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="UserMapper.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using MongoDB.Bson;
|
||||
using System.Security.Claims;
|
||||
|
||||
namespace Core.Thalos.Domain.Contexts.Onboarding.Mappers
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles mappings between
|
||||
/// <see cref="UserRequest"/>,
|
||||
/// and <see cref="UserAdapter"/>
|
||||
/// </summary>
|
||||
public static class UserMapper
|
||||
{
|
||||
/// <summary>
|
||||
/// Maps the UserRequest to UserAdapter.
|
||||
/// </summary>
|
||||
/// <param name="newUser">The User to be mapped.</param>
|
||||
/// <returns>A <see cref="UserAdapter"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public static UserAdapter ToAdapter(this UserRequest newUser, IHttpContextAccessor httpContextAccessor)
|
||||
{
|
||||
return new UserAdapter
|
||||
{
|
||||
Id = ObjectId.GenerateNewId().ToString(),
|
||||
Guid = Guid.NewGuid().ToString(),
|
||||
Email = newUser.Email,
|
||||
Name = newUser.Name,
|
||||
MiddleName = newUser.MiddleName,
|
||||
LastName = newUser.LastName,
|
||||
DisplayName = $"{newUser.Name} {newUser.MiddleName} {newUser.LastName}",
|
||||
RoleId = newUser.RoleId,
|
||||
Companies = newUser.Companies,
|
||||
Projects = newUser.Projects,
|
||||
CreatedAt = DateTime.UtcNow,
|
||||
CreatedBy = httpContextAccessor.HttpContext?.User?.FindFirst(ClaimTypes.Email)?.Value ?? string.Empty
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -7,7 +7,7 @@
|
||||
</PropertyGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<PackageReference Include="Thalos.Building.Blocks" Version="0.0.2" />
|
||||
<PackageReference Include="Core.Thalos.BuildingBlocks" Version="1.0.3" />
|
||||
</ItemGroup>
|
||||
|
||||
</Project>
|
||||
|
||||
@@ -1,30 +0,0 @@
|
||||
using Core.Thalos.Infraestructure.Caching.Configs;
|
||||
|
||||
namespace LSA.Core.Dapper.Service.Caching
|
||||
{
|
||||
public static class CacheHelper
|
||||
{
|
||||
/// <summary>
|
||||
/// Determines the cache duration based on specific duration, settings, or a default value.
|
||||
/// </summary>
|
||||
/// <param name="specificCacheDuration">Specific cache duration in minutes, if provided.</param>
|
||||
/// <param name="cacheSettings">General cache settings containing default duration values.</param>
|
||||
/// <returns>The cache duration as a TimeSpan.</returns>
|
||||
public static TimeSpan GetCacheDuration(CacheSettings cacheSettings, int? specificCacheDuration = 0)
|
||||
{
|
||||
var defaultCacheDuration = TimeSpan.FromMinutes(.5);
|
||||
|
||||
if (specificCacheDuration.HasValue && specificCacheDuration.Value > 0)
|
||||
{
|
||||
return TimeSpan.FromMinutes(specificCacheDuration.Value);
|
||||
}
|
||||
|
||||
if (cacheSettings.DefaultCacheDurationInMinutes > 0)
|
||||
{
|
||||
return TimeSpan.FromMinutes(cacheSettings.DefaultCacheDurationInMinutes);
|
||||
}
|
||||
|
||||
return defaultCacheDuration;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,47 +0,0 @@
|
||||
using System.Reflection;
|
||||
using System.Text;
|
||||
using System.Text.RegularExpressions;
|
||||
|
||||
namespace LSA.Core.Dapper.Service.Caching
|
||||
{
|
||||
public static class CacheKeyHelper
|
||||
{
|
||||
public static string GenerateCacheKey(object instance, string methodName, params object[] parameters)
|
||||
{
|
||||
var className = instance.GetType().Name;
|
||||
var keyBuilder = new StringBuilder($"{className}.{methodName}");
|
||||
|
||||
foreach (var param in parameters)
|
||||
{
|
||||
string normalizedParam = NormalizeParameter(param);
|
||||
keyBuilder.Append($".{normalizedParam}");
|
||||
}
|
||||
|
||||
return keyBuilder.ToString();
|
||||
}
|
||||
|
||||
private static string NormalizeParameter(object param)
|
||||
{
|
||||
if (param == null)
|
||||
{
|
||||
return "null";
|
||||
}
|
||||
|
||||
string paramString;
|
||||
|
||||
if (param is DateTime dateTime)
|
||||
{
|
||||
paramString = dateTime.ToString("yyyyMMdd");
|
||||
}
|
||||
else
|
||||
{
|
||||
paramString = param.ToString();
|
||||
}
|
||||
|
||||
// Replace special characters with an underscore
|
||||
string normalizedParam = Regex.Replace(paramString, @"[^a-zA-Z0-9]", "_");
|
||||
|
||||
return normalizedParam;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,133 +0,0 @@
|
||||
using Azure.Identity;
|
||||
using Core.Thalos.Infraestructure.Caching.Contracts;
|
||||
using Microsoft.Extensions.Logging;
|
||||
using StackExchange.Redis;
|
||||
using System.Text.Json;
|
||||
|
||||
namespace LSA.Core.Dapper.Service.Caching
|
||||
{
|
||||
public class CacheService : ICacheService
|
||||
{
|
||||
private IDatabase _cacheDatabase = null!;
|
||||
private readonly ILogger<CacheService> _logger;
|
||||
|
||||
|
||||
public CacheService(string connectionString, ILogger<CacheService> logger)
|
||||
{
|
||||
_logger = logger;
|
||||
Task.Run(async () =>
|
||||
{
|
||||
_cacheDatabase = await GetRedisDatabase(connectionString);
|
||||
}).Wait();
|
||||
}
|
||||
|
||||
private async Task<IDatabase> GetRedisDatabase(string connectionString)
|
||||
{
|
||||
try
|
||||
{
|
||||
var configurationOptions = await ConfigurationOptions.Parse($"{connectionString}")
|
||||
.ConfigureForAzureWithTokenCredentialAsync(new DefaultAzureCredential());
|
||||
|
||||
configurationOptions.AbortOnConnectFail = false;
|
||||
var connectionMultiplexer = await ConnectionMultiplexer.ConnectAsync(configurationOptions);
|
||||
|
||||
_logger.LogInformation("Successfully connected to Redis.");
|
||||
|
||||
return connectionMultiplexer.GetDatabase();
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, "Error establishing Redis connection.");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
public async Task<T> GetAsync<T>(string key)
|
||||
{
|
||||
try
|
||||
{
|
||||
var value = await _cacheDatabase.StringGetAsync(key);
|
||||
if (value.IsNullOrEmpty)
|
||||
{
|
||||
_logger.LogInformation($"Cache miss for key: {key}");
|
||||
return default;
|
||||
}
|
||||
|
||||
_logger.LogInformation($"Cache hit for key: {key}");
|
||||
return JsonSerializer.Deserialize<T>(value);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, $"Error getting cache item with key {key}");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
public async Task SetAsync<T>(string key, T value, TimeSpan? expiry = null)
|
||||
{
|
||||
try
|
||||
{
|
||||
var json = JsonSerializer.Serialize(value);
|
||||
await _cacheDatabase.StringSetAsync(key, json, expiry);
|
||||
_logger.LogInformation($"Cache item set with key: {key}");
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, $"Error setting cache item with key {key}");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
public async Task RemoveAsync(string key)
|
||||
{
|
||||
try
|
||||
{
|
||||
await _cacheDatabase.KeyDeleteAsync(key);
|
||||
_logger.LogInformation($"Cache item removed with key: {key}");
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, $"Error removing cache item with key {key}");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
public async Task<bool> ExistsAsync(string key)
|
||||
{
|
||||
try
|
||||
{
|
||||
var exists = await _cacheDatabase.KeyExistsAsync(key);
|
||||
_logger.LogInformation($"Cache item exists check for key: {key} - {exists}");
|
||||
return exists;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, $"Error checking existence of cache item with key {key}");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
public async Task RefreshAsync(string key, TimeSpan? expiry = null)
|
||||
{
|
||||
try
|
||||
{
|
||||
var value = await _cacheDatabase.StringGetAsync(key);
|
||||
if (!value.IsNullOrEmpty)
|
||||
{
|
||||
await _cacheDatabase.StringSetAsync(key, value, expiry);
|
||||
_logger.LogInformation($"Cache item refreshed with key: {key}");
|
||||
}
|
||||
else
|
||||
{
|
||||
_logger.LogWarning($"Cache item with key: {key} does not exist, cannot refresh");
|
||||
}
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
_logger.LogError(ex, $"Error refreshing cache item with key {key}");
|
||||
throw;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
namespace Core.Thalos.Infraestructure.Caching.Configs
|
||||
{
|
||||
public class CacheSettings
|
||||
{
|
||||
public int DefaultCacheDurationInMinutes { get; set; }
|
||||
}
|
||||
}
|
||||
@@ -1,11 +0,0 @@
|
||||
namespace Core.Thalos.Infraestructure.Caching.Contracts
|
||||
{
|
||||
public interface ICacheService
|
||||
{
|
||||
Task<T> GetAsync<T>(string key);
|
||||
Task SetAsync<T>(string key, T value, TimeSpan? expiry = null);
|
||||
Task RemoveAsync(string key);
|
||||
Task<bool> ExistsAsync(string key);
|
||||
Task RefreshAsync(string key, TimeSpan? expiry = null);
|
||||
}
|
||||
}
|
||||
@@ -1,33 +0,0 @@
|
||||
using Microsoft.Extensions.Configuration;
|
||||
|
||||
namespace Core.Thalos.Infraestructure.Contexts.Mongo
|
||||
{
|
||||
public class ConnectionStringProvider(IConfiguration configuration) : IConnectionStringProvider
|
||||
{
|
||||
public string ConnectionString { get; set; } = string.Empty;
|
||||
public string Databasename { get; set; } = string.Empty;
|
||||
public string Audience { get; set; } = string.Empty;
|
||||
|
||||
public string GetConnectionString()
|
||||
{
|
||||
return configuration?.GetConnectionString("DefaultConnection")?.ToString() ?? string.Empty;
|
||||
}
|
||||
public string GetDatabasename()
|
||||
{
|
||||
return configuration.GetSection("MongoDb:DatabaseName").Value ?? string.Empty;
|
||||
}
|
||||
|
||||
public string GetAudience()
|
||||
{
|
||||
return configuration.GetSection("MongoDb:Audience").Value ?? string.Empty;
|
||||
}
|
||||
}
|
||||
public interface IConnectionStringProvider
|
||||
{
|
||||
string GetConnectionString();
|
||||
string GetDatabasename();
|
||||
string ConnectionString { get; set; }
|
||||
string Databasename { get; set; }
|
||||
string Audience { get; set; }
|
||||
}
|
||||
}
|
||||
@@ -1,14 +0,0 @@
|
||||
namespace Core.Thalos.Infraestructure.Contexts.Mongo;
|
||||
|
||||
public interface IMongoConnSettings
|
||||
{
|
||||
string ConnectionString { get; set; }
|
||||
string Databasename { get; set; }
|
||||
string Audience { get; set; }
|
||||
}
|
||||
public class MongoConnSettings : IMongoConnSettings
|
||||
{
|
||||
public string ConnectionString { get; set; }
|
||||
public string Databasename { get; set; }
|
||||
public string Audience { get; set; }
|
||||
}
|
||||
@@ -1,15 +0,0 @@
|
||||
namespace Core.Thalos.Infraestructure.PerformanceCacheService
|
||||
{
|
||||
[AttributeUsage(AttributeTargets.Method, Inherited = true, AllowMultiple = false)]
|
||||
public class CacheAttribute : Attribute
|
||||
{
|
||||
public int CacheDurationInMinutes { get; set; }
|
||||
public bool EnableCaching { get; set; }
|
||||
|
||||
public CacheAttribute(int cacheDurationInMinutes, bool enableCaching = true)
|
||||
{
|
||||
CacheDurationInMinutes = cacheDurationInMinutes;
|
||||
EnableCaching = enableCaching;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -3,13 +3,13 @@
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
|
||||
namespace Core.Thalos.Provider.Contracts
|
||||
{
|
||||
public interface IPermissionService
|
||||
public interface IPermissionProvider
|
||||
{
|
||||
/// <summary>
|
||||
/// Creates a new Permission.
|
||||
@@ -17,7 +17,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="entity">The Permission to be created.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<PermissionAdapter> CreatePermissionService(PermissionRequest newPermission);
|
||||
ValueTask<PermissionAdapter> CreatePermission(PermissionRequest newPermission, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Permission by identifier.
|
||||
@@ -25,14 +25,14 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<PermissionAdapter> GetPermissionByIdService(string id);
|
||||
ValueTask<PermissionAdapter> GetPermissionById(string _id, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the roles.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{PermissionAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<IEnumerable<PermissionAdapter>> GetAllPermissionsService();
|
||||
ValueTask<IEnumerable<PermissionAdapter>> GetAllPermissions(CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the permissions by permissions identifier list.
|
||||
@@ -40,7 +40,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="permissions">The list of permissions identifiers.</param>
|
||||
/// <returns>A <see cref="Task{IEnumerable{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<IEnumerable<PermissionAdapter>> GetAllPermissionsByListService(string[] permissions);
|
||||
ValueTask<IEnumerable<PermissionAdapter>> GetAllPermissionsByList(string[] permissions, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the permission.
|
||||
@@ -50,7 +50,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <returns>The <see cref="PermissionAdapter"/> updated entity.</returns>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<PermissionAdapter> ChangePermissionStatusService(string id, StatusEnum newStatus);
|
||||
ValueTask<PermissionAdapter> ChangePermissionStatus(string id, StatusEnum newStatus, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Permission by id.
|
||||
@@ -59,6 +59,6 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<PermissionAdapter> UpdatePermissionService(PermissionAdapter entity, string id);
|
||||
ValueTask<PermissionAdapter> UpdatePermission(PermissionAdapter entity, CancellationToken cancellationToken);
|
||||
}
|
||||
}
|
||||
@@ -9,7 +9,7 @@ using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
|
||||
namespace Core.Thalos.Provider.Contracts
|
||||
{
|
||||
public interface IRoleService
|
||||
public interface IRoleProvider
|
||||
{
|
||||
/// <summary>
|
||||
/// Creates a new Role.
|
||||
@@ -17,7 +17,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="entity">The Role to be created.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<RoleAdapter> CreateRoleService(RoleRequest newRole);
|
||||
ValueTask<RoleAdapter> CreateRole(RoleRequest newRole, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Role by identifier.
|
||||
@@ -25,14 +25,14 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<RoleAdapter> GetRoleByIdService(string id);
|
||||
ValueTask<RoleAdapter> GetRoleById(string _id, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the roles.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{RoleAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<IEnumerable<RoleAdapter>> GetAllRolesService();
|
||||
ValueTask<IEnumerable<RoleAdapter>> GetAllRoles(CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the role.
|
||||
@@ -42,7 +42,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <returns>The <see cref="RoleAdapter"/> updated entity.</returns>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<RoleAdapter> ChangeRoleStatusService(string id, StatusEnum newStatus);
|
||||
ValueTask<RoleAdapter> ChangeRoleStatus(string id, Core.Blueprint.Mongo.StatusEnum newStatus, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Role by id.
|
||||
@@ -51,7 +51,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
Task<RoleAdapter> UpdateRoleService(RoleAdapter entity, string id);
|
||||
ValueTask<RoleAdapter> UpdateRole(RoleAdapter entity, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Adds an application to the role's list of applications.
|
||||
@@ -59,7 +59,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="roleId">The identifier of the role to which the application will be added.</param>
|
||||
/// <param name="application">The application enum value to add.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
Task<RoleAdapter> AddApplicationToRoleService(string roleId, ApplicationsEnum application);
|
||||
ValueTask<RoleAdapter> AddApplicationToRole(string roleId, ApplicationsEnum application, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Removes an application from the role's list of applications.
|
||||
@@ -67,6 +67,6 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="roleId">The identifier of the role from which the application will be removed.</param>
|
||||
/// <param name="application">The application enum value to remove.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
Task<RoleAdapter> RemoveApplicationFromRoleService(string roleId, ApplicationsEnum application);
|
||||
ValueTask<RoleAdapter> RemoveApplicationFromRole(string roleId, ApplicationsEnum application, CancellationToken cancellationToken);
|
||||
}
|
||||
}
|
||||
@@ -49,7 +49,7 @@ namespace Core.Thalos.Provider.Contracts
|
||||
/// <param name="eamil">The User email.</param>
|
||||
/// <returns>A <see cref="{Task{UserAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
ValueTask<UserAdapter> ValidateUserExistence(string? email, CancellationToken cancellationToken);
|
||||
ValueTask<UserExistenceAdapter> ValidateUserExistence(string? email, CancellationToken cancellationToken);
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the user.
|
||||
|
||||
@@ -11,15 +11,13 @@
|
||||
</ItemGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<PackageReference Include="Blueprint.Mongo" Version="0.0.3" />
|
||||
<PackageReference Include="Blueprint.Redis" Version="0.0.1" />
|
||||
<PackageReference Include="BuildingBlocks.Library" Version="0.0.1" />
|
||||
<PackageReference Include="Core.Blueprint.Mongo" Version="1.0.0" />
|
||||
<PackageReference Include="Core.Blueprint.Redis" Version="1.0.2" />
|
||||
<PackageReference Include="Mapster" Version="7.4.2-pre02" />
|
||||
</ItemGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<ProjectReference Include="..\Core.Thalos.Domain\Core.Thalos.Domain.csproj" />
|
||||
<ProjectReference Include="..\Core.Thalos.Infraestructure\Core.Thalos.Infrastructure.csproj" />
|
||||
</ItemGroup>
|
||||
|
||||
</Project>
|
||||
|
||||
@@ -1,16 +0,0 @@
|
||||
using MongoDB.Driver;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers
|
||||
{
|
||||
public class BaseProvider
|
||||
{
|
||||
private readonly IMongoDatabase _database;
|
||||
|
||||
public BaseProvider(IMongoDatabase database)
|
||||
{
|
||||
_database = database ?? throw new ArgumentNullException(nameof(database));
|
||||
}
|
||||
|
||||
protected IMongoDatabase Database => _database;
|
||||
}
|
||||
}
|
||||
@@ -1,99 +0,0 @@
|
||||
using Azure.Core;
|
||||
using Azure.Identity;
|
||||
using Core.Thalos.Adapters.Common.Constants;
|
||||
using MongoDB.Driver.Authentication.Oidc;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers
|
||||
{
|
||||
public class HeathOidcCallback : IOidcCallback
|
||||
{
|
||||
private readonly string _audience;
|
||||
private readonly string _environment;
|
||||
public HeathOidcCallback(string audience)
|
||||
{
|
||||
_audience = audience;
|
||||
_environment = Environment.GetEnvironmentVariable(EnvironmentVariables.Stage) ?? string.Empty;
|
||||
}
|
||||
|
||||
public OidcAccessToken GetOidcAccessToken(OidcCallbackParameters parameters, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
AccessToken token;
|
||||
|
||||
TokenRequestContext tokenRequestContext =
|
||||
new TokenRequestContext(
|
||||
new[] { _audience }
|
||||
);
|
||||
|
||||
if (_environment == "Local")
|
||||
{
|
||||
token =
|
||||
new ChainedTokenCredential(
|
||||
new ManagedIdentityCredential(),
|
||||
new VisualStudioCredential(),
|
||||
new VisualStudioCodeCredential(),
|
||||
new SharedTokenCacheCredential()
|
||||
)
|
||||
.GetToken(
|
||||
tokenRequestContext
|
||||
);
|
||||
}
|
||||
else
|
||||
{
|
||||
token =
|
||||
new ManagedIdentityCredential()
|
||||
.GetToken(
|
||||
tokenRequestContext
|
||||
);
|
||||
}
|
||||
|
||||
return new(token.Token, expiresIn: null);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
|
||||
throw new Exception($"An error ocurred while trying to get the OIDC token to connect to the database, ERROR: {ex.Message}");
|
||||
}
|
||||
}
|
||||
|
||||
public async Task<OidcAccessToken> GetOidcAccessTokenAsync(OidcCallbackParameters parameters, CancellationToken cancellationToken)
|
||||
{
|
||||
try
|
||||
{
|
||||
TokenRequestContext tokenRequestContext =
|
||||
new TokenRequestContext(
|
||||
new[] { _audience }
|
||||
);
|
||||
|
||||
AccessToken token;
|
||||
|
||||
if (_environment == "Local")
|
||||
{
|
||||
token = await new ChainedTokenCredential(
|
||||
new ManagedIdentityCredential(),
|
||||
new VisualStudioCredential(),
|
||||
new VisualStudioCodeCredential(),
|
||||
new SharedTokenCacheCredential()
|
||||
)
|
||||
.GetTokenAsync(
|
||||
tokenRequestContext, cancellationToken
|
||||
).ConfigureAwait(false);
|
||||
}
|
||||
else
|
||||
{
|
||||
token = await new ManagedIdentityCredential()
|
||||
.GetTokenAsync(
|
||||
tokenRequestContext, cancellationToken
|
||||
).ConfigureAwait(false);
|
||||
}
|
||||
|
||||
return new(token.Token, expiresIn: null);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
throw new Exception($"An error ocurred while trying to get the OIDC token to connect to the database, ERROR: {ex.Message}");
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -5,13 +5,13 @@
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Blueprint.Redis;
|
||||
using Core.Blueprint.Redis.Helpers;
|
||||
using Mapster;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Driver;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Blueprint.Redis;
|
||||
using Core.Blueprint.Redis.Helpers;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
@@ -25,7 +25,8 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
private readonly IRedisCacheProvider cacheProvider;
|
||||
|
||||
public ModuleProvider(CollectionRepository<ModuleAdapter> repository,
|
||||
IRedisCacheProvider cacheProvider, IOptions<CacheSettings> cacheSettings)
|
||||
IRedisCacheProvider cacheProvider,
|
||||
IOptions<CacheSettings> cacheSettings)
|
||||
{
|
||||
this.repository = repository;
|
||||
this.repository.CollectionInitialization();
|
||||
@@ -104,9 +105,9 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
var builder = Builders<ModuleAdapter>.Filter;
|
||||
var filters = new List<FilterDefinition<ModuleAdapter>>();
|
||||
|
||||
if (modules == null || !modules.Any())
|
||||
if (modules != null || !modules.Any())
|
||||
{
|
||||
filters.Add(builder.In(x => x.Id, modules));
|
||||
filters.Add(builder.In(x => x._Id, modules));
|
||||
}
|
||||
|
||||
var finalFilter = filters.Any() ? builder.And(filters) : builder.Empty;
|
||||
|
||||
155
Core.Thalos.Provider/Providers/Onboarding/PermissionProvider.cs
Normal file
155
Core.Thalos.Provider/Providers/Onboarding/PermissionProvider.cs
Normal file
@@ -0,0 +1,155 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="PermissionService.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Blueprint.Redis;
|
||||
using Core.Blueprint.Redis.Helpers;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Mapster;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Driver;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all services and business rules related to <see cref="PermissionAdapter"/>.
|
||||
/// </summary>
|
||||
public class PermissionProvider : IPermissionProvider
|
||||
{
|
||||
private readonly CollectionRepository<PermissionAdapter> repository;
|
||||
private readonly CacheSettings cacheSettings;
|
||||
private readonly IRedisCacheProvider cacheProvider;
|
||||
|
||||
public PermissionProvider(CollectionRepository<PermissionAdapter> repository,
|
||||
IRedisCacheProvider cacheProvider,
|
||||
IOptions<CacheSettings> cacheSettings
|
||||
)
|
||||
{
|
||||
this.repository = repository;
|
||||
this.repository.CollectionInitialization();
|
||||
this.cacheSettings = cacheSettings.Value;
|
||||
this.cacheProvider = cacheProvider;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Creates a new Permission.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Permission to be created.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<PermissionAdapter> CreatePermission(PermissionRequest newPermission, CancellationToken cancellationToken)
|
||||
{
|
||||
var permissionCollection = newPermission.Adapt<PermissionAdapter>();
|
||||
|
||||
await repository.InsertOneAsync(permissionCollection);
|
||||
|
||||
return permissionCollection;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Permission by identifier.
|
||||
/// </summary>
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>0
|
||||
public async ValueTask<PermissionAdapter> GetPermissionById(string _id, CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetPermissionById", _id);
|
||||
var cachedData = await cacheProvider.GetAsync<PermissionAdapter>(cacheKey);
|
||||
|
||||
//if (cachedData is not null) { return cachedData; }
|
||||
|
||||
var permission = await repository.FindByIdAsync(_id);
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, permission);
|
||||
|
||||
return permission;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the permissions.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{PermissionAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<IEnumerable<PermissionAdapter>> GetAllPermissions(CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllPermissions");
|
||||
var cachedData = await cacheProvider.GetAsync<IEnumerable<PermissionAdapter>>(cacheKey) ?? [];
|
||||
|
||||
if (cachedData.Any()) return cachedData;
|
||||
|
||||
var permissions = await repository.AsQueryable();
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, permissions);
|
||||
|
||||
return permissions;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the permissions by permissions identifier list.
|
||||
/// </summary>
|
||||
/// <param name="permissions">The list of permissions identifiers.</param>
|
||||
/// <returns>A <see cref="Task{IEnumerable{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<IEnumerable<PermissionAdapter>> GetAllPermissionsByList(string[] permissions, CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllPermissionsByList", permissions);
|
||||
|
||||
var cachedData = await cacheProvider.GetAsync<IEnumerable<PermissionAdapter>>(cacheKey) ?? [];
|
||||
|
||||
if (cachedData.Any()) return cachedData;
|
||||
|
||||
var builder = Builders<PermissionAdapter>.Filter;
|
||||
var filters = new List<FilterDefinition<PermissionAdapter>>();
|
||||
|
||||
if (permissions != null || !permissions.Any())
|
||||
{
|
||||
filters.Add(builder.In(x => x._Id, permissions));
|
||||
}
|
||||
|
||||
var finalFilter = filters.Any() ? builder.And(filters) : builder.Empty;
|
||||
|
||||
var permissionsList = await repository.FilterByMongoFilterAsync(finalFilter);
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, permissionsList);
|
||||
|
||||
return permissionsList;
|
||||
}
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the permission.
|
||||
/// </summary>
|
||||
/// <param name="id">The permission identifier.</param>
|
||||
/// <param name="newStatus">The new status of the permission.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<PermissionAdapter> ChangePermissionStatus(string id, StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
var entity = await repository.FindByIdAsync(id);
|
||||
entity.Status = newStatus;
|
||||
|
||||
await repository.ReplaceOneAsync(entity);
|
||||
|
||||
return entity;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Permission by id.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Permission to be updated.</param>
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<PermissionAdapter> UpdatePermission(PermissionAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
await repository.ReplaceOneAsync(entity);
|
||||
|
||||
return entity;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,234 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="PermissionService.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Constants;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Mappers;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Infraestructure.Caching.Configs;
|
||||
using Core.Thalos.Infraestructure.Caching.Contracts;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using LSA.Core.Dapper.Service.Caching;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using Microsoft.Extensions.Logging;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Bson;
|
||||
using MongoDB.Driver;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all services and business rules related to <see cref="PermissionAdapter"/>.
|
||||
/// </summary>
|
||||
public class PermissionService(ILogger<PermissionService> logger, IHttpContextAccessor httpContextAccessor, ICacheService cacheService,
|
||||
IOptions<CacheSettings> cacheSettings, IMongoDatabase database) : IPermissionService
|
||||
{
|
||||
private readonly CacheSettings _cacheSettings = cacheSettings.Value;
|
||||
|
||||
/// <summary>
|
||||
/// Creates a new Permission.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Permission to be created.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<PermissionAdapter> CreatePermissionService(PermissionRequest newPermission)
|
||||
{
|
||||
try
|
||||
{
|
||||
var entity = newPermission.ToAdapter(httpContextAccessor);
|
||||
await database.GetCollection<PermissionAdapter>(CollectionNames.Permission).InsertOneAsync(entity);
|
||||
entity.Id = (entity as dynamic ?? "").Id.ToString();
|
||||
|
||||
return entity;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"CreatePermissionService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Permission by identifier.
|
||||
/// </summary>
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>0
|
||||
public async Task<PermissionAdapter> GetPermissionByIdService(string id)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetPermissionByIdService", id);
|
||||
var cachedData = await cacheService.GetAsync<PermissionAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
|
||||
try
|
||||
{
|
||||
var filter = Builders<PermissionAdapter>.Filter.And(
|
||||
Builders<PermissionAdapter>.Filter.Eq("_id", ObjectId.Parse(id)),
|
||||
Builders<PermissionAdapter>.Filter.Eq("status", StatusEnum.Active.ToString())
|
||||
);
|
||||
|
||||
var permission = await database.GetCollection<PermissionAdapter>(CollectionNames.Permission)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
var cacheDuration = CacheHelper.GetCacheDuration(_cacheSettings);
|
||||
|
||||
await cacheService.SetAsync(cacheKey, permission, cacheDuration);
|
||||
|
||||
return permission;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"GetPermissionByIdService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the permissions.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{PermissionAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<IEnumerable<PermissionAdapter>> GetAllPermissionsService()
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllPermissionsService");
|
||||
var cachedData = await cacheService.GetAsync<IEnumerable<PermissionAdapter>>(cacheKey) ?? [];
|
||||
|
||||
if (cachedData.Any()) return cachedData;
|
||||
|
||||
try
|
||||
{
|
||||
var filter = Builders<PermissionAdapter>.Filter.Eq("status", StatusEnum.Active.ToString());
|
||||
|
||||
var roles = await database.GetCollection<PermissionAdapter>(CollectionNames.Permission)
|
||||
.Find(filter)
|
||||
.ToListAsync();
|
||||
|
||||
var cacheDuration = CacheHelper.GetCacheDuration(_cacheSettings);
|
||||
|
||||
await cacheService.SetAsync(cacheKey, roles, cacheDuration);
|
||||
|
||||
return roles;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"GetAllPermissionsService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the permissions by permissions identifier list.
|
||||
/// </summary>
|
||||
/// <param name="permissions">The list of permissions identifiers.</param>
|
||||
/// <returns>A <see cref="Task{IEnumerable{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<IEnumerable<PermissionAdapter>> GetAllPermissionsByListService(string[] permissions)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllPermissionsByListService", permissions);
|
||||
|
||||
var cachedData = await cacheService.GetAsync<IEnumerable<PermissionAdapter>>(cacheKey);
|
||||
|
||||
if (cachedData != null && cachedData.Any()) return cachedData;
|
||||
|
||||
try
|
||||
{
|
||||
var objectIds = permissions.Select(id => ObjectId.Parse(id)).ToArray();
|
||||
|
||||
var filter = Builders<PermissionAdapter>.Filter.In("_id", objectIds)
|
||||
& Builders<PermissionAdapter>.Filter.Eq("status", StatusEnum.Active.ToString());
|
||||
|
||||
var roles = await database.GetCollection<PermissionAdapter>(CollectionNames.Permission)
|
||||
.Find(filter)
|
||||
.ToListAsync();
|
||||
|
||||
var cacheDuration = CacheHelper.GetCacheDuration(_cacheSettings);
|
||||
|
||||
await cacheService.SetAsync(cacheKey, roles, cacheDuration);
|
||||
|
||||
return roles;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"GetAllPermissionsByListService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the permission.
|
||||
/// </summary>
|
||||
/// <param name="id">The permission identifier.</param>
|
||||
/// <param name="newStatus">The new status of the permission.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<PermissionAdapter> ChangePermissionStatusService(string id, StatusEnum newStatus)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<PermissionAdapter>.Filter
|
||||
.Eq("_id", ObjectId.Parse(id));
|
||||
|
||||
var update = Builders<PermissionAdapter>.Update
|
||||
//.Set(v => v.Status, newStatus)
|
||||
.Set(v => v.UpdatedBy, Helper.GetEmail(httpContextAccessor))
|
||||
.Set(v => v.UpdatedAt, DateTime.UtcNow);
|
||||
|
||||
await database.GetCollection<PermissionAdapter>(CollectionNames.Permission).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedPermission = await database.GetCollection<PermissionAdapter>(CollectionNames.Permission)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
return updatedPermission;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"ChangePermissionStatusService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Permission by id.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Permission to be updated.</param>
|
||||
/// <param name="id">The Permission identifier.</param>
|
||||
/// <returns>A <see cref="{Task{PermissionAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<PermissionAdapter> UpdatePermissionService(PermissionAdapter entity, string id)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<PermissionAdapter>.Filter
|
||||
.Eq("_id", ObjectId.Parse(id));
|
||||
|
||||
var update = Builders<PermissionAdapter>.Update
|
||||
.Set(v => v.Name, entity.Name)
|
||||
.Set(v => v.Description, entity.Description)
|
||||
.Set(v => v.AccessLevel, entity.AccessLevel)
|
||||
.Set(v => v.Status, entity.Status)
|
||||
.Set(v => v.UpdatedBy, Helper.GetEmail(httpContextAccessor))
|
||||
.Set(v => v.UpdatedAt, DateTime.UtcNow);
|
||||
|
||||
await database.GetCollection<PermissionAdapter>(CollectionNames.Permission).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedPermission = await database.GetCollection<PermissionAdapter>(CollectionNames.Permission)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
return updatedPermission;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"UpdatePermissionService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
172
Core.Thalos.Provider/Providers/Onboarding/RoleProvider.cs
Normal file
172
Core.Thalos.Provider/Providers/Onboarding/RoleProvider.cs
Normal file
@@ -0,0 +1,172 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="RoleService.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Blueprint.Redis;
|
||||
using Core.Blueprint.Redis.Helpers;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Mapster;
|
||||
using Microsoft.Extensions.Options;
|
||||
using Microsoft.Graph;
|
||||
using MongoDB.Bson;
|
||||
using MongoDB.Bson.Serialization;
|
||||
using MongoDB.Driver;
|
||||
using System.ComponentModel.Design;
|
||||
using System.Text.RegularExpressions;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all services and business rules related to <see cref="RoleAdapter"/>.
|
||||
/// </summary>
|
||||
public class RoleProvider : IRoleProvider
|
||||
{
|
||||
private readonly CollectionRepository<RoleAdapter> repository;
|
||||
private readonly CacheSettings cacheSettings;
|
||||
private readonly IRedisCacheProvider cacheProvider;
|
||||
|
||||
public RoleProvider(CollectionRepository<RoleAdapter> repository,
|
||||
IRedisCacheProvider cacheProvider,
|
||||
IOptions<CacheSettings> cacheSettings
|
||||
)
|
||||
{
|
||||
this.repository = repository;
|
||||
this.repository.CollectionInitialization();
|
||||
this.cacheSettings = cacheSettings.Value;
|
||||
this.cacheProvider = cacheProvider;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Creates a new Role.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Role to be created.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<RoleAdapter> CreateRole(RoleRequest newRole, CancellationToken cancellationToken)
|
||||
{
|
||||
var roleCollection = newRole.Adapt<RoleAdapter>();
|
||||
|
||||
await repository.InsertOneAsync(roleCollection);
|
||||
|
||||
return roleCollection;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Role by identifier.
|
||||
/// </summary>
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<RoleAdapter> GetRoleById(string _id, CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetRoleById", _id);
|
||||
var cachedData = await cacheProvider.GetAsync<RoleAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
|
||||
var role = await repository.FindByIdAsync(_id);
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, role);
|
||||
|
||||
return role;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the roles.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{RoleAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<IEnumerable<RoleAdapter>> GetAllRoles(CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllRoles");
|
||||
var cachedData = await cacheProvider.GetAsync<IEnumerable<RoleAdapter>>(cacheKey) ?? [];
|
||||
|
||||
if (cachedData.Any()) return cachedData;
|
||||
|
||||
var roles = await repository.AsQueryable();
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, roles);
|
||||
|
||||
return roles;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the role.
|
||||
/// </summary>
|
||||
/// <param name="id">The role identifier.</param>
|
||||
/// <param name="newStatus">The new status of the role.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<RoleAdapter> ChangeRoleStatus(string id, Core.Blueprint.Mongo.StatusEnum newStatus, CancellationToken cancellationToken)
|
||||
{
|
||||
var entity = await repository.FindByIdAsync(id);
|
||||
entity.Status = newStatus;
|
||||
|
||||
await repository.ReplaceOneAsync(entity);
|
||||
|
||||
return entity;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Role by id.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Role to be updated.</param>
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<RoleAdapter> UpdateRole(RoleAdapter entity, CancellationToken cancellationToken)
|
||||
{
|
||||
await repository.ReplaceOneAsync(entity);
|
||||
|
||||
return entity;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Adds an application to the role's list of applications.
|
||||
/// </summary>
|
||||
/// <param name="roleId">The identifier of the role to which the application will be added.</param>
|
||||
/// <param name="application">The application enum value to add.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
public async ValueTask<RoleAdapter> AddApplicationToRole(string roleId, ApplicationsEnum application, CancellationToken cancellationToken)
|
||||
{
|
||||
var role = await repository.FindOneAsync(
|
||||
u => u._Id == roleId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedApplications = role.Applications.Append(application).Distinct().ToArray();
|
||||
role.Applications = updatedApplications;
|
||||
|
||||
await repository.ReplaceOneAsync(role);
|
||||
|
||||
return role;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Removes an application from the role's list of applications.
|
||||
/// </summary>
|
||||
/// <param name="roleId">The identifier of the role from which the application will be removed.</param>
|
||||
/// <param name="application">The application enum value to remove.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
public async ValueTask<RoleAdapter> RemoveApplicationFromRole(string roleId, ApplicationsEnum application, CancellationToken cancellationToken)
|
||||
{
|
||||
var role = await repository.FindOneAsync(
|
||||
u => u._Id == roleId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedApplications = role.Applications
|
||||
?.Where(c => c != application)
|
||||
.ToArray();
|
||||
|
||||
role.Applications = updatedApplications;
|
||||
|
||||
await repository.ReplaceOneAsync(role);
|
||||
|
||||
return role;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,251 +0,0 @@
|
||||
// ***********************************************************************
|
||||
// <copyright file="RoleService.cs">
|
||||
// AgileWebs
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Constants;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Mappers;
|
||||
using Core.Thalos.Domain.Contexts.Onboarding.Request;
|
||||
using Core.Thalos.Infraestructure.Caching.Configs;
|
||||
using Core.Thalos.Infraestructure.Caching.Contracts;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using LSA.Core.Dapper.Service.Caching;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using Microsoft.Extensions.Logging;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Bson;
|
||||
using MongoDB.Driver;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
/// <summary>
|
||||
/// Handles all services and business rules related to <see cref="RoleAdapter"/>.
|
||||
/// </summary>
|
||||
public class RoleService(ILogger<RoleService> logger, IHttpContextAccessor httpContextAccessor, ICacheService cacheService,
|
||||
IOptions<CacheSettings> cacheSettings, IMongoDatabase database) : IRoleService
|
||||
{
|
||||
private readonly CacheSettings _cacheSettings = cacheSettings.Value;
|
||||
|
||||
/// <summary>
|
||||
/// Creates a new Role.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Role to be created.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<RoleAdapter> CreateRoleService(RoleRequest newRole)
|
||||
{
|
||||
try
|
||||
{
|
||||
var entity = newRole.ToAdapter(httpContextAccessor);
|
||||
await database.GetCollection<RoleAdapter>(CollectionNames.Role).InsertOneAsync(entity);
|
||||
entity.Id = (entity as dynamic ?? "").Id.ToString();
|
||||
|
||||
return entity;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"CreateRoleService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets an Role by identifier.
|
||||
/// </summary>
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<RoleAdapter> GetRoleByIdService(string id)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetRoleByIdService", id);
|
||||
var cachedData = await cacheService.GetAsync<RoleAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter.And(
|
||||
Builders<RoleAdapter>.Filter.Eq("_id", ObjectId.Parse(id)),
|
||||
Builders<RoleAdapter>.Filter.Eq("status", StatusEnum.Active.ToString())
|
||||
);
|
||||
|
||||
var role = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
var cacheDuration = CacheHelper.GetCacheDuration(_cacheSettings);
|
||||
|
||||
await cacheService.SetAsync(cacheKey, role, cacheDuration);
|
||||
|
||||
return role;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"GetRoleByIdService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Gets all the roles.
|
||||
/// </summary>
|
||||
/// <returns>A <see cref="{Task{IEnumerbale{RoleAdapter}}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<IEnumerable<RoleAdapter>> GetAllRolesService()
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetAllRolesService");
|
||||
var cachedData = await cacheService.GetAsync<IEnumerable<RoleAdapter>>(cacheKey) ?? [];
|
||||
|
||||
if (cachedData.Any()) return cachedData;
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter.Eq("status", StatusEnum.Active.ToString());
|
||||
|
||||
var roles = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.ToListAsync();
|
||||
|
||||
var cacheDuration = CacheHelper.GetCacheDuration(_cacheSettings);
|
||||
|
||||
await cacheService.SetAsync(cacheKey, roles, cacheDuration);
|
||||
|
||||
return roles;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"GetAllRolesService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Changes the status of the role.
|
||||
/// </summary>
|
||||
/// <param name="id">The role identifier.</param>
|
||||
/// <param name="newStatus">The new status of the role.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<RoleAdapter> ChangeRoleStatusService(string id, StatusEnum newStatus)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter
|
||||
.Eq("_id", ObjectId.Parse(id));
|
||||
|
||||
var update = Builders<RoleAdapter>.Update
|
||||
//.Set(v => v.Status, newStatus)
|
||||
.Set(v => v.UpdatedBy, Helper.GetEmail(httpContextAccessor))
|
||||
.Set(v => v.UpdatedAt, DateTime.UtcNow);
|
||||
|
||||
await database.GetCollection<RoleAdapter>(CollectionNames.Role).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedRole = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
return updatedRole;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"ChangeRoleStatusService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Updates a Role by id.
|
||||
/// </summary>
|
||||
/// <param name="entity">The Role to be updated.</param>
|
||||
/// <param name="id">The Role identifier.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async Task<RoleAdapter> UpdateRoleService(RoleAdapter entity, string id)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter
|
||||
.Eq("_id", ObjectId.Parse(id));
|
||||
|
||||
var update = Builders<RoleAdapter>.Update
|
||||
.Set(v => v.Name, entity.Name)
|
||||
.Set(v => v.Description, entity.Description)
|
||||
.Set(v => v.Applications, entity.Applications)
|
||||
.Set(v => v.Modules, entity.Modules)
|
||||
.Set(v => v.Permissions, entity.Permissions)
|
||||
.Set(v => v.Status, entity.Status)
|
||||
.Set(v => v.UpdatedBy, Helper.GetEmail(httpContextAccessor))
|
||||
.Set(v => v.UpdatedAt, DateTime.UtcNow);
|
||||
|
||||
await database.GetCollection<RoleAdapter>(CollectionNames.Role).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedRole = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
|
||||
return updatedRole;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"UpdateRoleService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Adds an application to the role's list of applications.
|
||||
/// </summary>
|
||||
/// <param name="roleId">The identifier of the role to which the application will be added.</param>
|
||||
/// <param name="application">The application enum value to add.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
public async Task<RoleAdapter> AddApplicationToRoleService(string roleId, ApplicationsEnum application)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter.Eq("_id", ObjectId.Parse(roleId));
|
||||
var update = Builders<RoleAdapter>.Update.AddToSet(r => r.Applications, application);
|
||||
|
||||
await database.GetCollection<RoleAdapter>(CollectionNames.Role).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedRole = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
return updatedRole;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"AddApplicationToRoleService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Removes an application from the role's list of applications.
|
||||
/// </summary>
|
||||
/// <param name="roleId">The identifier of the role from which the application will be removed.</param>
|
||||
/// <param name="application">The application enum value to remove.</param>
|
||||
/// <returns>A <see cref="{Task{RoleAdapter}}"/> representing the asynchronous operation, with the updated role object.</returns>
|
||||
public async Task<RoleAdapter> RemoveApplicationFromRoleService(string roleId, ApplicationsEnum application)
|
||||
{
|
||||
try
|
||||
{
|
||||
var filter = Builders<RoleAdapter>.Filter.Eq("_id", ObjectId.Parse(roleId));
|
||||
var update = Builders<RoleAdapter>.Update.Pull(r => r.Applications, application);
|
||||
|
||||
await database.GetCollection<RoleAdapter>(CollectionNames.Role).UpdateOneAsync(filter, update);
|
||||
|
||||
var updatedRole = await database.GetCollection<RoleAdapter>(CollectionNames.Role)
|
||||
.Find(filter)
|
||||
.FirstOrDefaultAsync();
|
||||
return updatedRole;
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
logger.LogError(ex, $"RemoveApplicationFromRoleService: Error in getting data - {ex.Message}");
|
||||
throw new Exception(ex.Message, ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -4,18 +4,19 @@
|
||||
// </copyright>
|
||||
// ***********************************************************************
|
||||
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Blueprint.Redis;
|
||||
using Core.Blueprint.Redis.Helpers;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Adapters.Common.Enums;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Mapster;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Driver;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using MongoDB.Bson;
|
||||
using System.Text.RegularExpressions;
|
||||
using MongoDB.Bson.Serialization;
|
||||
using MongoDB.Driver;
|
||||
using System.Reflection;
|
||||
using System.Text.RegularExpressions;
|
||||
|
||||
namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
@@ -26,16 +27,18 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
{
|
||||
private readonly CollectionRepository<UserAdapter> repository;
|
||||
private readonly CacheSettings cacheSettings;
|
||||
private readonly IRedisCacheProvider cacheProvider;
|
||||
private readonly IRedisCacheProvider cacheProvider;
|
||||
|
||||
public UserProvider(CollectionRepository<UserAdapter> repository,
|
||||
IRedisCacheProvider cacheProvider, IOptions<CacheSettings> cacheSettings)
|
||||
public UserProvider(CollectionRepository<UserAdapter> repository,
|
||||
IRedisCacheProvider cacheProvider,
|
||||
IOptions<CacheSettings> cacheSettings
|
||||
)
|
||||
{
|
||||
this.repository = repository;
|
||||
this.repository.CollectionInitialization();
|
||||
this.cacheSettings = cacheSettings.Value;
|
||||
this.cacheProvider = cacheProvider;
|
||||
}
|
||||
this.cacheSettings = cacheSettings.Value;
|
||||
this.cacheProvider = cacheProvider;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Creates a new User.
|
||||
@@ -63,7 +66,7 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetUserById", _id);
|
||||
var cachedData = await cacheProvider.GetAsync<UserAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
//if (cachedData is not null) { return cachedData; }
|
||||
|
||||
var user = await repository.FindByIdAsync(_id);
|
||||
|
||||
@@ -102,7 +105,7 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetUserByEmail", email);
|
||||
var cachedData = await cacheProvider.GetAsync<UserAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
//if (cachedData is not null) { return cachedData; }
|
||||
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Email == email &&
|
||||
@@ -119,20 +122,24 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
/// <param name="email">The User email.</param>
|
||||
/// <returns>A <see cref="{Task{UserAdapter}}"/> representing
|
||||
/// the asynchronous execution of the service.</returns>
|
||||
public async ValueTask<UserAdapter> ValidateUserExistence(string? email, CancellationToken cancellationToken)
|
||||
public async ValueTask<UserExistenceAdapter> ValidateUserExistence(string? email, CancellationToken cancellationToken)
|
||||
{
|
||||
var cacheKey = CacheKeyHelper.GenerateCacheKey(this, "GetUserByEmail", email);
|
||||
var cachedData = await cacheProvider.GetAsync<UserAdapter>(cacheKey);
|
||||
|
||||
if (cachedData is not null) { return cachedData; }
|
||||
//if (cachedData is not null) { return cachedData; }
|
||||
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Email == email &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, user);
|
||||
UserExistenceAdapter userExistance = new UserExistenceAdapter();
|
||||
|
||||
return user;
|
||||
userExistance.Existence = (user != null) ? true : false;
|
||||
|
||||
await cacheProvider.SetAsync(cacheKey, userExistance);
|
||||
|
||||
return userExistance;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
@@ -213,7 +220,7 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
public async ValueTask<UserAdapter> AddCompanyToUser(string userId, string companyId, CancellationToken cancellationToken)
|
||||
{
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Id == userId &&
|
||||
u => u._Id == userId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedCompanies = user.Companies.Append(companyId).Distinct().ToArray();
|
||||
@@ -233,7 +240,7 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
public async ValueTask<UserAdapter> RemoveCompanyFromUser(string userId, string companyId, CancellationToken cancellationToken)
|
||||
{
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Id == userId &&
|
||||
u => u._Id == userId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedCompanies = user.Companies
|
||||
@@ -256,11 +263,11 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
public async ValueTask<UserAdapter> AddProjectToUser(string userId, string projectId, CancellationToken cancellationToken)
|
||||
{
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Id == userId &&
|
||||
u => u._Id == userId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedProjects = user.Projects.Append(projectId).Distinct().ToArray();
|
||||
user.Companies = updatedProjects;
|
||||
user.Projects = updatedProjects;
|
||||
|
||||
await repository.ReplaceOneAsync(user);
|
||||
|
||||
@@ -276,14 +283,14 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
public async ValueTask<UserAdapter> RemoveProjectFromUser(string userId, string projectId, CancellationToken cancellationToken)
|
||||
{
|
||||
var user = await repository.FindOneAsync(
|
||||
u => u.Id == userId &&
|
||||
u => u._Id == userId &&
|
||||
u.Status == Core.Blueprint.Mongo.StatusEnum.Active);
|
||||
|
||||
var updatedProjects = user.Projects
|
||||
?.Where(c => c != projectId)
|
||||
.ToArray();
|
||||
|
||||
user.Companies = updatedProjects;
|
||||
user.Projects = updatedProjects;
|
||||
|
||||
await repository.ReplaceOneAsync(user);
|
||||
|
||||
@@ -399,53 +406,106 @@ namespace Core.Thalos.Provider.Providers.Onboarding
|
||||
User = new UserAdapter
|
||||
{
|
||||
Id = result["_id"]?.ToString() ?? "",
|
||||
Guid = result["guid"].AsString,
|
||||
Email = result["email"].AsString,
|
||||
Name = result["name"].AsString,
|
||||
MiddleName = result["middleName"].AsString,
|
||||
LastName = result["lastName"].AsString,
|
||||
DisplayName = result["displayName"].AsString,
|
||||
RoleId = result["roleId"]?.ToString() ?? "",
|
||||
Companies = result["companies"].AsBsonArray
|
||||
.Select(c => c.AsString)
|
||||
.ToArray(),
|
||||
Projects = result["projects"].AsBsonArray
|
||||
.Select(c => c.AsString)
|
||||
.ToArray(),
|
||||
LastLogIn = result["lastLogIn"].ToUniversalTime(),
|
||||
LastLogOut = result["lastLogOut"].ToUniversalTime(),
|
||||
CreatedAt = result["createdAt"].ToUniversalTime(),
|
||||
CreatedBy = result["createdBy"].AsString,
|
||||
UpdatedAt = result["updatedAt"].ToUniversalTime(),
|
||||
UpdatedBy = result["updatedBy"].AsString,
|
||||
Status = (Core.Blueprint.Mongo.StatusEnum)Enum.Parse(typeof(Core.Blueprint.Mongo.StatusEnum), result["status"].AsString),
|
||||
Guid = result.Contains("guid") && !result["guid"].IsBsonNull ? result["guid"].AsString : "",
|
||||
Email = result.Contains("email") && !result["email"].IsBsonNull ? result["email"].AsString : "",
|
||||
Name = result.Contains("name") && !result["name"].IsBsonNull ? result["name"].AsString : "",
|
||||
MiddleName = result.Contains("middleName") && !result["middleName"].IsBsonNull ? result["middleName"].AsString : "",
|
||||
LastName = result.Contains("lastName") && !result["lastName"].IsBsonNull ? result["lastName"].AsString : "",
|
||||
DisplayName = result.Contains("displayName") && !result["displayName"].IsBsonNull ? result["displayName"].AsString : "",
|
||||
RoleId = result.Contains("roleId") && !result["roleId"].IsBsonNull ? result["roleId"].ToString() : "",
|
||||
Companies = result.Contains("companies") && result["companies"].IsBsonArray
|
||||
? result["companies"].AsBsonArray
|
||||
.Where(c => c != null && !c.IsBsonNull)
|
||||
.Select(c => c.AsString)
|
||||
.ToArray()
|
||||
: Array.Empty<string>(),
|
||||
Projects = result.Contains("projects") && result["projects"].IsBsonArray
|
||||
? result["projects"].AsBsonArray
|
||||
.Where(p => p != null && !p.IsBsonNull)
|
||||
.Select(p => p.AsString)
|
||||
.ToArray()
|
||||
: Array.Empty<string>(),
|
||||
LastLogIn = result.Contains("lastLogIn") && !result["lastLogIn"].IsBsonNull ? result["lastLogIn"].ToUniversalTime() : DateTime.MinValue,
|
||||
LastLogOut = result.Contains("lastLogOut") && !result["lastLogOut"].IsBsonNull ? result["lastLogOut"].ToUniversalTime() : DateTime.MinValue,
|
||||
CreatedAt = result.Contains("createdAt") && !result["createdAt"].IsBsonNull ? result["createdAt"].ToUniversalTime() : DateTime.MinValue,
|
||||
CreatedBy = result.Contains("createdBy") && !result["createdBy"].IsBsonNull ? result["createdBy"].AsString : "",
|
||||
UpdatedAt = result.Contains("updatedAt") && !result["updatedAt"].IsBsonNull ? result["updatedAt"].ToUniversalTime() : DateTime.MinValue,
|
||||
UpdatedBy = result.Contains("updatedBy") && !result["updatedBy"].IsBsonNull ? result["updatedBy"].AsString : "",
|
||||
Status = result.Contains("status") && !result["status"].IsBsonNull
|
||||
? (Core.Blueprint.Mongo.StatusEnum)Enum.Parse(typeof(Core.Blueprint.Mongo.StatusEnum), result["status"].AsString)
|
||||
: Core.Blueprint.Mongo.StatusEnum.Inactive
|
||||
},
|
||||
Role = new RoleAdapter
|
||||
{
|
||||
Id = result["role"]["_id"]?.ToString() ?? "",
|
||||
Name = result["role"]["name"].AsString,
|
||||
Description = result["role"]["description"].AsString,
|
||||
Applications = result["role"]["applications"].AsBsonArray
|
||||
.Select(c => (ApplicationsEnum)c.AsInt32)
|
||||
.ToArray(),
|
||||
Modules = result["role"]["modules"].AsBsonArray
|
||||
.Select(c => c.ToString() ?? "")
|
||||
.ToArray(),
|
||||
Permissions = result["role"]["permissions"].AsBsonArray
|
||||
.Select(c => c.ToString() ?? "")
|
||||
.ToArray(),
|
||||
Status = (Core.Blueprint.Mongo.StatusEnum)Enum.Parse(typeof(Core.Blueprint.Mongo.StatusEnum), result["role"]["status"].AsString),
|
||||
CreatedAt = result["role"]["createdAt"].ToUniversalTime(),
|
||||
UpdatedAt = result["role"]["updatedAt"].ToUniversalTime(),
|
||||
CreatedBy = result["role"]["createdBy"].AsString,
|
||||
UpdatedBy = result["role"]["updatedBy"].AsString
|
||||
Id = result.Contains("role") && result["role"].IsBsonDocument && result["role"].AsBsonDocument.Contains("_id")
|
||||
? result["role"]["_id"]?.ToString() ?? ""
|
||||
: "",
|
||||
Name = result.Contains("role") && result["role"].IsBsonDocument && result["role"].AsBsonDocument.Contains("name")
|
||||
? result["role"]["name"]?.AsString ?? ""
|
||||
: "",
|
||||
Description = result.Contains("role") && result["role"].IsBsonDocument && result["role"].AsBsonDocument.Contains("description")
|
||||
? result["role"]["description"]?.AsString ?? ""
|
||||
: "",
|
||||
Applications = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("applications") &&
|
||||
result["role"]["applications"].IsBsonArray
|
||||
? result["role"]["applications"].AsBsonArray
|
||||
.Where(app => app != null && app.IsInt32)
|
||||
.Select(app => (ApplicationsEnum)app.AsInt32)
|
||||
.ToArray()
|
||||
: Array.Empty<ApplicationsEnum>(),
|
||||
Modules = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("modules") &&
|
||||
result["role"]["modules"].IsBsonArray
|
||||
? result["role"]["modules"].AsBsonArray
|
||||
.Where(m => m != null)
|
||||
.Select(m => m.ToString() ?? "")
|
||||
.ToArray()
|
||||
: Array.Empty<string>(),
|
||||
Permissions = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("permissions") &&
|
||||
result["role"]["permissions"].IsBsonArray
|
||||
? result["role"]["permissions"].AsBsonArray
|
||||
.Where(p => p != null)
|
||||
.Select(p => p.ToString() ?? "")
|
||||
.ToArray()
|
||||
: Array.Empty<string>(),
|
||||
Status = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("status") &&
|
||||
!result["role"]["status"].IsBsonNull
|
||||
? (Core.Blueprint.Mongo.StatusEnum)Enum.Parse(typeof(Core.Blueprint.Mongo.StatusEnum), result["role"]["status"].AsString)
|
||||
: Core.Blueprint.Mongo.StatusEnum.Inactive,
|
||||
CreatedAt = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("createdAt") &&
|
||||
!result["role"]["createdAt"].IsBsonNull
|
||||
? result["role"]["createdAt"].ToUniversalTime()
|
||||
: DateTime.MinValue,
|
||||
UpdatedAt = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("updatedAt") &&
|
||||
!result["role"]["updatedAt"].IsBsonNull
|
||||
? result["role"]["updatedAt"].ToUniversalTime()
|
||||
: DateTime.MinValue,
|
||||
CreatedBy = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("createdBy") &&
|
||||
!result["role"]["createdBy"].IsBsonNull
|
||||
? result["role"]["createdBy"].AsString
|
||||
: "",
|
||||
UpdatedBy = result.Contains("role") && result["role"].IsBsonDocument &&
|
||||
result["role"].AsBsonDocument.Contains("updatedBy") &&
|
||||
!result["role"]["updatedBy"].IsBsonNull
|
||||
? result["role"]["updatedBy"].AsString
|
||||
: ""
|
||||
},
|
||||
Permissions = result["permissions"].AsBsonArray
|
||||
.Select(permission => BsonSerializer.Deserialize<PermissionAdapter>(permission.AsBsonDocument))
|
||||
.Where(permission => permission.Status == Core.Blueprint.Mongo.StatusEnum.Active)
|
||||
.ToList()
|
||||
Permissions = result.Contains("permissions") && result["permissions"].IsBsonArray
|
||||
? result["permissions"].AsBsonArray
|
||||
.Where(p => p != null && p.IsBsonDocument)
|
||||
.Select(p => BsonSerializer.Deserialize<PermissionAdapter>(p.AsBsonDocument))
|
||||
.Where(p => p.Status == Core.Blueprint.Mongo.StatusEnum.Active)
|
||||
.ToList()
|
||||
: new List<PermissionAdapter>()
|
||||
};
|
||||
|
||||
|
||||
return tokenAdapter;
|
||||
|
||||
}
|
||||
|
||||
@@ -1,100 +1,28 @@
|
||||
using Core.Thalos.Infraestructure.Caching.Contracts;
|
||||
using Core.Thalos.Infraestructure.Contexts.Mongo;
|
||||
using Core.Blueprint.Mongo;
|
||||
using Core.Thalos.Adapters;
|
||||
using Core.Thalos.Provider.Contracts;
|
||||
using Core.Thalos.Provider.Providers;
|
||||
using Core.Thalos.Provider.Providers.Onboarding;
|
||||
using LSA.Core.Dapper.Service.Caching;
|
||||
using Microsoft.Extensions.Configuration;
|
||||
using Microsoft.Extensions.DependencyInjection;
|
||||
using Microsoft.Extensions.Logging;
|
||||
using Microsoft.Extensions.Options;
|
||||
using MongoDB.Driver;
|
||||
|
||||
namespace Core.Thalos.Provider
|
||||
{
|
||||
public static class ServiceCollectionExtensions
|
||||
{
|
||||
public static IServiceCollection AddDALLayer(this IServiceCollection services, IConfiguration configuration)
|
||||
public static IServiceCollection AddDALLayerServices(this IServiceCollection services, IConfiguration configuration)
|
||||
{
|
||||
var environment = Environment.GetEnvironmentVariable("ASPNETCORE_ENVIRONMENT") ?? string.Empty;
|
||||
//Mongo
|
||||
services.AddScoped<IModuleProvider, ModuleProvider>();
|
||||
services.AddScoped<CollectionRepository<ModuleAdapter>>();
|
||||
|
||||
var connectionString = configuration.GetSection("ConnectionStrings:MongoDB").Value ?? string.Empty;
|
||||
var databaseName = configuration.GetSection("MongoDB:DatabaseName").Value ?? string.Empty;
|
||||
var audience = (environment == "Local")
|
||||
? configuration.GetSection("MongoDB:LocalAudience").Value
|
||||
: configuration.GetSection("MongoDB:Audience").Value;
|
||||
services.AddScoped<IPermissionProvider, PermissionProvider>();
|
||||
services.AddScoped<CollectionRepository<PermissionAdapter>>();
|
||||
|
||||
if (string.IsNullOrEmpty(connectionString) || string.IsNullOrEmpty(databaseName) || string.IsNullOrEmpty(audience))
|
||||
{
|
||||
throw new InvalidOperationException("Mongo connection is not configured correctly.");
|
||||
}
|
||||
|
||||
services.Configure<MongoConnSettings>(options =>
|
||||
{
|
||||
options.ConnectionString = connectionString;
|
||||
options.Databasename = databaseName;
|
||||
options.Audience = audience ?? string.Empty;
|
||||
});
|
||||
|
||||
services.AddSingleton<IMongoClient>(serviceProvider =>
|
||||
{
|
||||
var settings = serviceProvider.GetRequiredService<IOptions<MongoConnSettings>>().Value;
|
||||
var mongoClientSettings = MongoClientSettings.FromConnectionString(settings.ConnectionString);
|
||||
mongoClientSettings.Credential = MongoCredential.CreateOidcCredential(new HeathOidcCallback(settings.Audience));
|
||||
return new MongoClient(mongoClientSettings);
|
||||
});
|
||||
|
||||
services.AddSingleton<IMongoDatabase>(serviceProvider =>
|
||||
{
|
||||
var settings = serviceProvider.GetRequiredService<IOptions<MongoConnSettings>>().Value;
|
||||
var client = serviceProvider.GetRequiredService<IMongoClient>();
|
||||
return client.GetDatabase(settings.Databasename);
|
||||
});
|
||||
|
||||
services.AddDALConfigurationLayer();
|
||||
services.AddLogs();
|
||||
services.AddRedisCacheService(configuration);
|
||||
|
||||
return services;
|
||||
}
|
||||
|
||||
|
||||
private static IServiceCollection AddDALConfigurationLayer(this IServiceCollection services)
|
||||
{
|
||||
services.AddHttpContextAccessor();
|
||||
services.AddScoped<IRoleProvider, RoleProvider>();
|
||||
services.AddScoped<CollectionRepository<RoleAdapter>>();
|
||||
|
||||
services.AddScoped<IUserProvider, UserProvider>();
|
||||
services.AddScoped<IRoleService, RoleService>();
|
||||
services.AddScoped<IPermissionService, PermissionService>();
|
||||
services.AddScoped<IPermissionService, PermissionService>();
|
||||
services.AddScoped<IModuleProvider, ModuleProvider>();
|
||||
return services;
|
||||
}
|
||||
|
||||
private static IServiceCollection AddLogs(this IServiceCollection services)
|
||||
{
|
||||
services.AddLogging();
|
||||
var serviceProvider = services.BuildServiceProvider();
|
||||
//var logger = serviceProvider.GetService<ILogger<DashboardDALService>>(); //Add for Markup class later TODO
|
||||
|
||||
//services.AddSingleton(typeof(ILogger), logger);
|
||||
|
||||
return services;
|
||||
}
|
||||
|
||||
private static IServiceCollection AddRedisCacheService(this IServiceCollection services, IConfiguration configuration)
|
||||
{
|
||||
var source = configuration.GetSection("ConnectionStrings");
|
||||
|
||||
var redisConnectionString = source["Redis"]?.ToString();
|
||||
|
||||
if (string.IsNullOrEmpty(redisConnectionString))
|
||||
{
|
||||
throw new InvalidOperationException("Redis connection string is not configured.");
|
||||
}
|
||||
|
||||
services.AddSingleton<ICacheService>(provider =>
|
||||
new CacheService(redisConnectionString, provider.GetRequiredService<ILogger<CacheService>>()));
|
||||
services.AddScoped<CollectionRepository<UserAdapter>>();
|
||||
|
||||
return services;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user