package com.thinkbiganalytics.feedmgr.rest.controller; /*- * #%L * thinkbig-feed-manager-controller * %% * Copyright (C) 2017 ThinkBig Analytics * %% * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * #L% */ import com.thinkbiganalytics.datalake.authorization.model.HadoopAuthorizationGroup; import com.thinkbiganalytics.datalake.authorization.service.HadoopAuthorizationService; import com.thinkbiganalytics.rest.model.RestResponseStatus; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.beans.factory.annotation.Qualifier; import java.util.ArrayList; import java.util.List; import java.util.Map; import javax.ws.rs.GET; import javax.ws.rs.Path; import javax.ws.rs.Produces; import javax.ws.rs.core.MediaType; import javax.ws.rs.core.Response; import io.swagger.annotations.Api; import io.swagger.annotations.ApiOperation; import io.swagger.annotations.ApiResponse; import io.swagger.annotations.ApiResponses; @Api(tags = "Security - Groups", produces = "application/json") @Path("/v1/feedmgr/hadoop-authorization") public class HadoopAuthorizationController { private static final Logger log = LoggerFactory.getLogger(HadoopAuthorizationController.class); // I had to use autowired instead of Inject to allow null values. @Autowired(required = false) @Qualifier("hadoopAuthorizationService") private HadoopAuthorizationService hadoopAuthorizationService; @GET @Path("/groups") @Produces(MediaType.APPLICATION_JSON) @ApiOperation("Gets a list of Hadoop security groups.") @ApiResponses({ @ApiResponse(code = 200, message = "Returns the security groups.", response = HadoopAuthorizationGroup.class, responseContainer = "List"), @ApiResponse(code = 500, message = "The security groups are unavailable.", response = RestResponseStatus.class) }) public Response getGroups() { try { List<HadoopAuthorizationGroup> groups = null; if (hadoopAuthorizationService != null) { groups = hadoopAuthorizationService.getAllGroups(); } else { groups = new ArrayList<>(); log.debug("No plugin for hadoop authorization was loaded. Returning empty results"); } return Response.ok(groups).build(); } catch (Exception e) { throw new RuntimeException("Unable to get the external security groups ", e); } } @GET @Path("/enabled") @Produces(MediaType.APPLICATION_JSON) @ApiOperation("Indicates if security groups are enabled.") @ApiResponses( @ApiResponse(code = 200, message = "Returns the enabled status.", response = Map.class, responseContainer = "List") ) public Response groupEnabled() { try { boolean isEnabled = false; if (hadoopAuthorizationService != null) { isEnabled = true; } return Response.ok("[{\"enabled\":" + isEnabled + "}]").build(); } catch (Exception e) { throw new RuntimeException("Unable to get the external security groups ", e); } } }