Skip to content

Commit 6ff6d00

Browse files
authored
Revert "update models to allow creating service user"
1 parent b903f95 commit 6ff6d00

39 files changed

+89
-1287
lines changed

.jhipster/Token.json

-4
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,6 @@
3636
"fieldName": "renewable",
3737
"fieldType": "Boolean",
3838
"fieldValidateRules": ["required"]
39-
},
40-
{
41-
"fieldName": "name",
42-
"fieldType": "String"
4339
}
4440
],
4541
"changelogDate": "20190823204705",

screenshot-test/App.screenshot.js

-8
Original file line numberDiff line numberDiff line change
@@ -221,14 +221,6 @@ function getMockResponse(url) {
221221
body: companyDetails,
222222
};
223223
break;
224-
case `${SERVER_URL}api/companies/service-account/token`:
225-
case `${SERVER_URL}api/companies/1/service-account/token`:
226-
res = {
227-
status: 200,
228-
contentType: 'application/json',
229-
body: companyUserToken,
230-
};
231-
break;
232224
case `${SERVER_URL}api/users/non-company-emails`:
233225
res = {
234226
status: 200,
Loading
Loading
Loading
Loading

screenshot-test/data/api-account.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,5 +20,5 @@
2020
"createdDate" : null,
2121
"lastModifiedBy" : "admin",
2222
"lastModifiedDate" : "2019-11-14T11:30:46Z",
23-
"authorities" : [ "ROLE_USER", "ROLE_PREMIUM_USER", "ROLE_ADMIN", "ROLE_API", "ROLE_COMPANY_ADMIN" ]
23+
"authorities" : [ "ROLE_USER", "ROLE_PREMIUM_USER", "ROLE_ADMIN", "ROLE_API" ]
2424
}

screenshot-test/data/api-company-user-tokens.json

-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
"usageLimit": null,
88
"currentUsage": 0,
99
"renewable": true,
10-
"name": "Token",
1110
"user": {
1211
"id": 4,
1312
"login": "user",

src/main/java/org/mskcc/cbio/oncokb/config/Constants.java

-2
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,6 @@ public final class Constants {
4545

4646
public static final String ONCOKB_S3_BUCKET = "oncokb-v2";
4747

48-
public static final int MAX_SERVICE_ACCOUNT_TOKENS = 10;
49-
5048
private Constants() {
5149
}
5250

src/main/java/org/mskcc/cbio/oncokb/config/SecurityConfiguration.java

+1-2
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ public void configure(HttpSecurity http) throws Exception {
9696
.antMatchers("/api/v1/v2/api-docs").permitAll()
9797
.antMatchers("/api/private/utils/data/**").hasAnyAuthority(AuthoritiesConstants.DATA_DOWNLOAD)
9898

99-
.antMatchers("/api/v1/annotate/**").hasAnyAuthority(AuthoritiesConstants.API, AuthoritiesConstants.ROLE_SERVICE_ACCOUNT)
99+
.antMatchers("/api/v1/annotate/**").hasAnyAuthority(AuthoritiesConstants.API)
100100

101101
.antMatchers("/api/v1/genes/lookup").hasAnyAuthority(AuthoritiesConstants.PUBLIC_WEBSITE, AuthoritiesConstants.USER, AuthoritiesConstants.ADMIN)
102102
.antMatchers("/api/v1/variants/lookup").hasAnyAuthority(AuthoritiesConstants.PUBLIC_WEBSITE, AuthoritiesConstants.USER, AuthoritiesConstants.ADMIN)
@@ -135,7 +135,6 @@ public void configure(HttpSecurity http) throws Exception {
135135
.antMatchers("/api/tokens/**").hasAnyAuthority(AuthoritiesConstants.ADMIN)
136136
.antMatchers("/api/token-stats/**").hasAnyAuthority(AuthoritiesConstants.ADMIN)
137137

138-
.antMatchers("/api/companies/service-account/token").hasAnyAuthority(AuthoritiesConstants.ROLE_COMPANY_ADMIN)
139138
.antMatchers("/api/companies/**").hasAnyAuthority(AuthoritiesConstants.ADMIN)
140139
.antMatchers("/api/company-domains/**").hasAnyAuthority(AuthoritiesConstants.ADMIN)
141140

src/main/java/org/mskcc/cbio/oncokb/domain/Token.java

-17
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,6 @@ public class Token implements Serializable {
4444
@Column(name = "renewable", nullable = false)
4545
private Boolean renewable = true;
4646

47-
@Column(name = "name")
48-
private String name;
49-
5047
@ManyToOne
5148
@JsonIgnoreProperties(value = "tokens", allowSetters = true)
5249
private User user;
@@ -138,19 +135,6 @@ public void setRenewable(Boolean renewable) {
138135
this.renewable = renewable;
139136
}
140137

141-
public String getName() {
142-
return name;
143-
}
144-
145-
public Token name(String name) {
146-
this.name = name;
147-
return this;
148-
}
149-
150-
public void setName(String name) {
151-
this.name = name;
152-
}
153-
154138
public User getUser() {
155139
return user;
156140
}
@@ -192,7 +176,6 @@ public String toString() {
192176
", usageLimit=" + getUsageLimit() +
193177
", currentUsage=" + getCurrentUsage() +
194178
", renewable='" + isRenewable() + "'" +
195-
", name='" + getName() + "'" +
196179
"}";
197180
}
198181
}

src/main/java/org/mskcc/cbio/oncokb/repository/UserRepository.java

+1-3
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@
88
import org.springframework.data.jpa.repository.EntityGraph;
99
import org.springframework.data.jpa.repository.JpaRepository;
1010
import org.springframework.data.jpa.repository.Query;
11-
import org.springframework.data.repository.query.Param;
1211
import org.springframework.stereotype.Repository;
1312

1413
import java.util.List;
@@ -43,8 +42,7 @@ public interface UserRepository extends JpaRepository<User, Long> {
4342
@Cacheable(cacheResolver = "userCacheResolver")
4443
Optional<User> findOneWithAuthoritiesByEmailIgnoreCase(String email);
4544

46-
@Query("select user from User user where :authorityName not in (select authority.name FROM user.authorities authority) and user.login != :login")
47-
List<User> findAllUsersWithoutAuthorityAndLoginNot(@Param("authorityName") String authorityName, @Param("login") String login);
45+
Page<User> findAllByLoginNot(Pageable pageable, String login);
4846

4947
@Query("select user, userDetails from User as user left join UserDetails as userDetails on user.id = userDetails.user WHERE user in ?1")
5048
List<Object[]> findAllUsersWithUserDetailsByUsersIn(List<User> users);

src/main/java/org/mskcc/cbio/oncokb/security/AuthoritiesConstants.java

-4
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,6 @@ public final class AuthoritiesConstants {
2121

2222
public static final String API = "ROLE_API";
2323

24-
public static final String ROLE_COMPANY_ADMIN = "ROLE_COMPANY_ADMIN";
25-
26-
public static final String ROLE_SERVICE_ACCOUNT = "ROLE_SERVICE_ACCOUNT";
27-
2824
private AuthoritiesConstants() {
2925
}
3026
}

src/main/java/org/mskcc/cbio/oncokb/security/uuid/TokenProvider.java

+4-7
Original file line numberDiff line numberDiff line change
@@ -80,23 +80,20 @@ private Token getNewToken(Set<Authority> authorities, Optional<Instant> definedE
8080
public Token createTokenForCurrentUserLogin(Optional<Instant> definedExpirationTime, Optional<Boolean> isRenewable) {
8181
Optional<User> userOptional = userRepository.findOneWithAuthoritiesByLogin(SecurityUtils.getCurrentUserLogin().get());
8282
if(userOptional.isPresent()) {
83-
return createToken(userOptional.get(), definedExpirationTime, isRenewable, Optional.empty());
83+
return createToken(userOptional.get(), definedExpirationTime, isRenewable);
8484
}
8585
return null;
8686
}
8787

88-
public Token createToken(User user, Optional<Instant> definedExpirationTime, Optional<Boolean> isRenewable, Optional<String> name) {
88+
public Token createToken(User user, Optional<Instant> definedExpirationTime, Optional<Boolean> isRenewable) {
8989
Token token = getNewToken(user.getAuthorities(), definedExpirationTime, isRenewable);
9090
token.setUser(user);
91-
if (name.isPresent()) {
92-
token.setName(name.get());
93-
}
9491
tokenService.save(token);
9592
return token;
9693
}
9794

98-
public void createToken(Token token, Optional<String> name){
99-
Token newToken = createToken(token.getUser(), Optional.of(token.getExpiration()), Optional.of(token.isRenewable()), name);
95+
public void createToken(Token token){
96+
Token newToken = createToken(token.getUser(), Optional.of(token.getExpiration()), Optional.of(token.isRenewable()));
10097
newToken.setCreation(token.getCreation());
10198
newToken.setCurrentUsage(token.getCurrentUsage());
10299
newToken.setUsageLimit(token.getUsageLimit());

src/main/java/org/mskcc/cbio/oncokb/service/CompanyService.java

-14
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,7 @@
11
package org.mskcc.cbio.oncokb.service;
22

3-
import org.mskcc.cbio.oncokb.domain.Token;
4-
import org.mskcc.cbio.oncokb.domain.User;
53
import org.mskcc.cbio.oncokb.domain.enumeration.LicenseStatus;
64
import org.mskcc.cbio.oncokb.service.dto.CompanyDTO;
7-
import org.mskcc.cbio.oncokb.service.dto.UserDTO;
8-
import org.mskcc.cbio.oncokb.web.rest.errors.TooManyTokensException;
95
import org.mskcc.cbio.oncokb.web.rest.vm.CompanyVM;
106

117
import java.util.List;
@@ -62,14 +58,4 @@ public interface CompanyService {
6258
* @param id the id of the entity.
6359
*/
6460
void delete(Long id);
65-
66-
Optional<User> createServiceAccount(Long id);
67-
68-
void deleteServiceAccount(CompanyDTO companyDTO);
69-
70-
Optional<Token> createServiceAccountToken(Long id, String name) throws TooManyTokensException;
71-
72-
Optional<List<Token>> getServiceAccountTokensForCompany(Long id);
73-
74-
Optional<UserDTO> getServiceUserForCompany(Long companyId);
7561
}

src/main/java/org/mskcc/cbio/oncokb/service/TokenService.java

+1-3
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,11 @@ public interface TokenService {
5858

5959
void expireToken(Token token);
6060

61-
void delete(Long id);
62-
6361
/**
6462
* Delete the token and associates its token stats with a new token.
6563
* @param id id of token
6664
*/
67-
void deleteAndAssociateStats(Long id);
65+
void delete(Long id);
6866

6967
/**
7068
* Delete all tokens related to the user

src/main/java/org/mskcc/cbio/oncokb/service/UserService.java

+3-8
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ public User registerUser(UserDTO userDTO, String password) {
313313
return newUser;
314314
}
315315

316-
public User createUser(UserDTO userDTO, boolean isServiceUser, Optional<Integer> tokenValidDays, Optional<Boolean> tokenIsRenewable) {
316+
public User createUser(UserDTO userDTO, Optional<Integer> tokenValidDays, Optional<Boolean> tokenIsRenewable) {
317317
User user = new User();
318318
user.setLogin(userDTO.getLogin().toLowerCase());
319319
user.setFirstName(userDTO.getFirstName());
@@ -355,10 +355,6 @@ public User createUser(UserDTO userDTO, boolean isServiceUser, Optional<Integer>
355355
userDetails.setCompany(companyMapper.toEntity(userDTO.getCompany()));
356356
userDetailsRepository.save(userDetails);
357357

358-
if (isServiceUser) {
359-
log.debug("Created Information for Service User: {}", user);
360-
return user;
361-
}
362358

363359
// Check if the user is a part of licensed company and then continue with approval procedure
364360
if(userDetails.getCompany() != null){
@@ -538,7 +534,7 @@ public List<UserDTO> findAllUsersWithUserDetailsByUsersIn(List<User> users) {
538534
@Transactional(readOnly = true)
539535
@Cacheable(cacheResolver = "userCacheResolver", key = "#root.methodName")
540536
public Page<UserDTO> getAllManagedUsers(Pageable pageable) {
541-
List<User> users = userRepository.findAllUsersWithoutAuthorityAndLoginNot(AuthoritiesConstants.ROLE_SERVICE_ACCOUNT, Constants.ANONYMOUS_USER);
537+
List<User> users = userRepository.findAllByLoginNot(pageable, Constants.ANONYMOUS_USER).getContent();
542538
List<UserDTO> userDTOs = findAllUsersWithUserDetailsByUsersIn(users);
543539
return new PageImpl<>(userDTOs, pageable, users.size());
544540
}
@@ -646,8 +642,7 @@ private List<Token> generateTokenForUserIfNotExist(UserDTO userDTO, Optional<Int
646642
Token token = tokenProvider.createToken(
647643
userMapper.userDTOToUser(userDTO),
648644
tokenValidDays.isPresent() ? Optional.of(Instant.now().plusSeconds(DAY_IN_SECONDS * (long) tokenValidDays.get())) : Optional.empty(),
649-
tokenIsRenewable,
650-
Optional.empty()
645+
tokenIsRenewable
651646
);
652647
tokens.add(token);
653648
}

0 commit comments

Comments
 (0)