diff --git a/app/src/main/java/io/apicurio/registry/rest/v3/AdminResourceImpl.java b/app/src/main/java/io/apicurio/registry/rest/v3/AdminResourceImpl.java index eb412ce507..237acd1771 100644 --- a/app/src/main/java/io/apicurio/registry/rest/v3/AdminResourceImpl.java +++ b/app/src/main/java/io/apicurio/registry/rest/v3/AdminResourceImpl.java @@ -1,6 +1,36 @@ package io.apicurio.registry.rest.v3; -import io.apicurio.common.apps.config.*; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_FOR_BROWSER; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_NAME; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_PRINCIPAL_ID; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_ROLE_MAPPING; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_RULE; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_RULE_TYPE; +import static io.apicurio.common.apps.logging.audit.AuditingConstants.KEY_UPDATE_ROLE; +import static io.apicurio.registry.util.DtoUtil.appAuthPropertyToRegistry; +import static io.apicurio.registry.util.DtoUtil.registryAuthPropertyToApp; + +import java.io.IOException; +import java.io.InputStream; +import java.math.BigInteger; +import java.nio.charset.StandardCharsets; +import java.util.HashMap; +import java.util.List; +import java.util.Map; +import java.util.function.Supplier; +import java.util.stream.Collectors; +import java.util.stream.Stream; +import java.util.zip.ZipInputStream; + +import org.eclipse.microprofile.config.Config; +import org.eclipse.microprofile.config.inject.ConfigProperty; +import org.slf4j.Logger; + +import io.apicurio.common.apps.config.Dynamic; +import io.apicurio.common.apps.config.DynamicConfigPropertyDef; +import io.apicurio.common.apps.config.DynamicConfigPropertyDto; +import io.apicurio.common.apps.config.DynamicConfigPropertyIndex; +import io.apicurio.common.apps.config.Info; import io.apicurio.common.apps.logging.Logged; import io.apicurio.common.apps.logging.audit.Audited; import io.apicurio.registry.auth.Authorized; @@ -10,7 +40,14 @@ import io.apicurio.registry.metrics.health.liveness.ResponseErrorLivenessCheck; import io.apicurio.registry.metrics.health.readiness.ResponseTimeoutReadinessCheck; import io.apicurio.registry.rest.MissingRequiredParameterException; -import io.apicurio.registry.rest.v3.beans.*; +import io.apicurio.registry.rest.v3.beans.ArtifactTypeInfo; +import io.apicurio.registry.rest.v3.beans.ConfigurationProperty; +import io.apicurio.registry.rest.v3.beans.DownloadRef; +import io.apicurio.registry.rest.v3.beans.RoleMapping; +import io.apicurio.registry.rest.v3.beans.RoleMappingSearchResults; +import io.apicurio.registry.rest.v3.beans.Rule; +import io.apicurio.registry.rest.v3.beans.UpdateConfigurationProperty; +import io.apicurio.registry.rest.v3.beans.UpdateRole; import io.apicurio.registry.rest.v3.shared.DataExporter; import io.apicurio.registry.rules.DefaultRuleDeletionException; import io.apicurio.registry.rules.RulesProperties; @@ -18,13 +55,13 @@ import io.apicurio.registry.storage.dto.DownloadContextDto; import io.apicurio.registry.storage.dto.DownloadContextType; import io.apicurio.registry.storage.dto.RoleMappingDto; +import io.apicurio.registry.storage.dto.RoleMappingSearchResultsDto; import io.apicurio.registry.storage.dto.RuleConfigurationDto; import io.apicurio.registry.storage.error.ConfigPropertyNotFoundException; import io.apicurio.registry.storage.error.InvalidPropertyValueException; import io.apicurio.registry.storage.error.RuleNotFoundException; import io.apicurio.registry.storage.impexp.EntityInputStream; import io.apicurio.registry.types.Current; -import io.apicurio.registry.types.RoleType; import io.apicurio.registry.types.RuleType; import io.apicurio.registry.types.provider.ArtifactTypeUtilProviderFactory; import io.apicurio.registry.utils.impexp.Entity; @@ -36,24 +73,6 @@ import jakarta.ws.rs.core.Context; import jakarta.ws.rs.core.MediaType; import jakarta.ws.rs.core.Response; -import org.eclipse.microprofile.config.Config; -import org.eclipse.microprofile.config.inject.ConfigProperty; -import org.slf4j.Logger; - -import java.io.IOException; -import java.io.InputStream; -import java.nio.charset.StandardCharsets; -import java.util.HashMap; -import java.util.List; -import java.util.Map; -import java.util.function.Supplier; -import java.util.stream.Collectors; -import java.util.stream.Stream; -import java.util.zip.ZipInputStream; - -import static io.apicurio.common.apps.logging.audit.AuditingConstants.*; -import static io.apicurio.registry.util.DtoUtil.appAuthPropertyToRegistry; -import static io.apicurio.registry.util.DtoUtil.registryAuthPropertyToApp; @ApplicationScoped @Interceptors({ResponseErrorLivenessCheck.class, ResponseTimeoutReadinessCheck.class}) @@ -287,16 +306,21 @@ public void createRoleMapping(RoleMapping data) { } /** - * @see io.apicurio.registry.rest.v3.AdminResource#listRoleMappings() + * @see io.apicurio.registry.rest.v3.AdminResource#listRoleMappings(java.math.BigInteger, java.math.BigInteger) */ @Override @Authorized(style=AuthorizedStyle.None, level=AuthorizedLevel.Admin) @RoleBasedAccessApiOperation - public List listRoleMappings() { - List mappings = storage.getRoleMappings(); - return mappings.stream().map(dto -> { - return dtoToRoleMapping(dto); - }).collect(Collectors.toList()); + public RoleMappingSearchResults listRoleMappings(BigInteger limit, BigInteger offset) { + if (offset == null) { + offset = BigInteger.valueOf(0); + } + if (limit == null) { + limit = BigInteger.valueOf(20); + } + + RoleMappingSearchResultsDto dto = storage.searchRoleMappings(offset.intValue(), limit.intValue()); + return V3ApiUtil.dtoToRoleMappingSearchResults(dto); } /** @@ -307,7 +331,7 @@ public List listRoleMappings() { @RoleBasedAccessApiOperation public RoleMapping getRoleMapping(String principalId) { RoleMappingDto dto = storage.getRoleMapping(principalId); - return dtoToRoleMapping(dto); + return V3ApiUtil.dtoToRoleMapping(dto); } /** @@ -352,7 +376,7 @@ public List listConfigProperties() { // on whether the value is actually configured and stored in the DB or not). return dynamicPropertyIndex.getAcceptedPropertyNames().stream() .sorted((pname1, pname2) -> pname1.compareTo(pname2)) - .map(pname -> propsI.containsKey(pname) ? dtoToConfigurationProperty(dynamicPropertyIndex.getProperty(pname), propsI.get(pname)) : defToConfigurationProperty(dynamicPropertyIndex.getProperty(pname))) + .map(pname -> propsI.containsKey(pname) ? V3ApiUtil.dtoToConfigurationProperty(dynamicPropertyIndex.getProperty(pname), propsI.get(pname)) : defToConfigurationProperty(dynamicPropertyIndex.getProperty(pname))) .collect(Collectors.toList()); } @@ -369,7 +393,7 @@ public ConfigurationProperty getConfigProperty(String propertyName) { if (dto == null) { return defToConfigurationProperty(def); } else { - return dtoToConfigurationProperty(def, dto); + return V3ApiUtil.dtoToConfigurationProperty(def, dto); } } @@ -401,14 +425,6 @@ public void resetConfigProperty(String propertyName) { storage.deleteConfigProperty(propertyName); } - private static RoleMapping dtoToRoleMapping(RoleMappingDto dto) { - RoleMapping mapping = new RoleMapping(); - mapping.setPrincipalId(dto.getPrincipalId()); - mapping.setRole(RoleType.valueOf(dto.getRole())); - mapping.setPrincipalName(dto.getPrincipalName()); - return mapping; - } - private static boolean isNullOrTrue(Boolean value) { return value == null || value; @@ -418,16 +434,6 @@ private String createDownloadHref(String downloadId) { return "/apis/registry/v3/downloads/" + downloadId; } - private static ConfigurationProperty dtoToConfigurationProperty(DynamicConfigPropertyDef def, DynamicConfigPropertyDto dto) { - ConfigurationProperty rval = new ConfigurationProperty(); - rval.setName(def.getName()); - rval.setValue(dto.getValue()); - rval.setType(def.getType().getName()); - rval.setLabel(def.getLabel()); - rval.setDescription(def.getDescription()); - return rval; - } - private ConfigurationProperty defToConfigurationProperty(DynamicConfigPropertyDef def) { String propertyValue = config.getOptionalValue(def.getName(), String.class).orElse(def.getDefaultValue()); diff --git a/app/src/main/java/io/apicurio/registry/rest/v3/GroupsResourceImpl.java b/app/src/main/java/io/apicurio/registry/rest/v3/GroupsResourceImpl.java index 3a2b9c2757..e133ee21a4 100644 --- a/app/src/main/java/io/apicurio/registry/rest/v3/GroupsResourceImpl.java +++ b/app/src/main/java/io/apicurio/registry/rest/v3/GroupsResourceImpl.java @@ -271,6 +271,7 @@ public void deleteGroupById(String groupId) { * @see io.apicurio.registry.rest.v3.GroupsResource#updateGroupById(java.lang.String, io.apicurio.registry.rest.v3.beans.EditableGroupMetaData) */ @Override + @Authorized(style = AuthorizedStyle.GroupOnly, level = AuthorizedLevel.Write) public void updateGroupById(String groupId, EditableGroupMetaData data) { requireParameter("groupId", groupId); diff --git a/app/src/main/java/io/apicurio/registry/rest/v3/V3ApiUtil.java b/app/src/main/java/io/apicurio/registry/rest/v3/V3ApiUtil.java index eaea003f95..4c481f38d5 100644 --- a/app/src/main/java/io/apicurio/registry/rest/v3/V3ApiUtil.java +++ b/app/src/main/java/io/apicurio/registry/rest/v3/V3ApiUtil.java @@ -1,14 +1,41 @@ package io.apicurio.registry.rest.v3; -import io.apicurio.registry.rest.v3.beans.*; -import io.apicurio.registry.storage.dto.*; - import java.util.ArrayList; import java.util.Comparator; import java.util.Date; import java.util.Optional; import java.util.stream.Collectors; +import io.apicurio.common.apps.config.DynamicConfigPropertyDef; +import io.apicurio.common.apps.config.DynamicConfigPropertyDto; +import io.apicurio.registry.rest.v3.beans.ArtifactMetaData; +import io.apicurio.registry.rest.v3.beans.ArtifactReference; +import io.apicurio.registry.rest.v3.beans.ArtifactSearchResults; +import io.apicurio.registry.rest.v3.beans.Comment; +import io.apicurio.registry.rest.v3.beans.ConfigurationProperty; +import io.apicurio.registry.rest.v3.beans.GroupMetaData; +import io.apicurio.registry.rest.v3.beans.GroupSearchResults; +import io.apicurio.registry.rest.v3.beans.RoleMapping; +import io.apicurio.registry.rest.v3.beans.RoleMappingSearchResults; +import io.apicurio.registry.rest.v3.beans.SearchedArtifact; +import io.apicurio.registry.rest.v3.beans.SearchedGroup; +import io.apicurio.registry.rest.v3.beans.SearchedVersion; +import io.apicurio.registry.rest.v3.beans.SortOrder; +import io.apicurio.registry.rest.v3.beans.VersionMetaData; +import io.apicurio.registry.rest.v3.beans.VersionSearchResults; +import io.apicurio.registry.storage.dto.ArtifactMetaDataDto; +import io.apicurio.registry.storage.dto.ArtifactReferenceDto; +import io.apicurio.registry.storage.dto.ArtifactSearchResultsDto; +import io.apicurio.registry.storage.dto.ArtifactVersionMetaDataDto; +import io.apicurio.registry.storage.dto.CommentDto; +import io.apicurio.registry.storage.dto.EditableArtifactMetaDataDto; +import io.apicurio.registry.storage.dto.GroupMetaDataDto; +import io.apicurio.registry.storage.dto.GroupSearchResultsDto; +import io.apicurio.registry.storage.dto.RoleMappingDto; +import io.apicurio.registry.storage.dto.RoleMappingSearchResultsDto; +import io.apicurio.registry.storage.dto.VersionSearchResultsDto; +import io.apicurio.registry.types.RoleType; + public final class V3ApiUtil { private V3ApiUtil() { @@ -296,4 +323,32 @@ public static Comment commentDtoToComment(CommentDto dto) { .value(dto.getValue()) .build(); } + + public static RoleMapping dtoToRoleMapping(RoleMappingDto dto) { + RoleMapping mapping = new RoleMapping(); + mapping.setPrincipalId(dto.getPrincipalId()); + mapping.setRole(RoleType.valueOf(dto.getRole())); + mapping.setPrincipalName(dto.getPrincipalName()); + return mapping; + } + + public static RoleMappingSearchResults dtoToRoleMappingSearchResults(RoleMappingSearchResultsDto dto) { + RoleMappingSearchResults results = new RoleMappingSearchResults(); + results.setCount((int) dto.getCount()); + results.setRoleMappings(dto.getRoleMappings().stream().map(rm -> { + return dtoToRoleMapping(rm); + }).collect(Collectors.toList())); + return results; + } + + public static ConfigurationProperty dtoToConfigurationProperty(DynamicConfigPropertyDef def, DynamicConfigPropertyDto dto) { + ConfigurationProperty rval = new ConfigurationProperty(); + rval.setName(def.getName()); + rval.setValue(dto.getValue()); + rval.setType(def.getType().getName()); + rval.setLabel(def.getLabel()); + rval.setDescription(def.getDescription()); + return rval; + } + } diff --git a/app/src/main/java/io/apicurio/registry/storage/RegistryStorage.java b/app/src/main/java/io/apicurio/registry/storage/RegistryStorage.java index 3f5bf6feaf..3f5a5999ad 100644 --- a/app/src/main/java/io/apicurio/registry/storage/RegistryStorage.java +++ b/app/src/main/java/io/apicurio/registry/storage/RegistryStorage.java @@ -649,6 +649,13 @@ void updateArtifactRule(String groupId, String artifactId, RuleType rule, RuleCo */ List getRoleMappings() throws RegistryStorageException; + /** + * Search for role mappings. + * @param offset the number of artifacts to skip + * @param limit the result size limit + */ + RoleMappingSearchResultsDto searchRoleMappings(int offset, int limit) throws RegistryStorageException; + /** * Gets the details of a single role mapping. * diff --git a/app/src/main/java/io/apicurio/registry/storage/decorator/RegistryStorageDecoratorReadOnlyBase.java b/app/src/main/java/io/apicurio/registry/storage/decorator/RegistryStorageDecoratorReadOnlyBase.java index 7667d73f38..ee928a1dcc 100644 --- a/app/src/main/java/io/apicurio/registry/storage/decorator/RegistryStorageDecoratorReadOnlyBase.java +++ b/app/src/main/java/io/apicurio/registry/storage/decorator/RegistryStorageDecoratorReadOnlyBase.java @@ -263,6 +263,11 @@ public String getRoleForPrincipal(String principalId) throws RegistryStorageExce public List getRoleMappings() throws RegistryStorageException { return delegate.getRoleMappings(); } + + @Override + public RoleMappingSearchResultsDto searchRoleMappings(int offset, int limit) throws RegistryStorageException { + return delegate.searchRoleMappings(offset, limit); + } @Override diff --git a/app/src/main/java/io/apicurio/registry/storage/dto/ArtifactSearchResultsDto.java b/app/src/main/java/io/apicurio/registry/storage/dto/ArtifactSearchResultsDto.java index 9cf5efa02b..4974787bb1 100644 --- a/app/src/main/java/io/apicurio/registry/storage/dto/ArtifactSearchResultsDto.java +++ b/app/src/main/java/io/apicurio/registry/storage/dto/ArtifactSearchResultsDto.java @@ -14,6 +14,7 @@ @ToString public class ArtifactSearchResultsDto { + @Builder.Default private List artifacts = new ArrayList<>(); private long count; } diff --git a/app/src/main/java/io/apicurio/registry/storage/dto/GroupSearchResultsDto.java b/app/src/main/java/io/apicurio/registry/storage/dto/GroupSearchResultsDto.java index e017924642..85ccc31093 100644 --- a/app/src/main/java/io/apicurio/registry/storage/dto/GroupSearchResultsDto.java +++ b/app/src/main/java/io/apicurio/registry/storage/dto/GroupSearchResultsDto.java @@ -15,6 +15,7 @@ @ToString public class GroupSearchResultsDto { + @Builder.Default private List groups = new ArrayList(); private Integer count; diff --git a/app/src/main/java/io/apicurio/registry/storage/dto/RoleMappingSearchResultsDto.java b/app/src/main/java/io/apicurio/registry/storage/dto/RoleMappingSearchResultsDto.java new file mode 100644 index 0000000000..e72f9726b5 --- /dev/null +++ b/app/src/main/java/io/apicurio/registry/storage/dto/RoleMappingSearchResultsDto.java @@ -0,0 +1,29 @@ +package io.apicurio.registry.storage.dto; + +import java.util.ArrayList; +import java.util.List; + +import io.quarkus.runtime.annotations.RegisterForReflection; +import lombok.AllArgsConstructor; +import lombok.Builder; +import lombok.EqualsAndHashCode; +import lombok.Getter; +import lombok.NoArgsConstructor; +import lombok.Setter; +import lombok.ToString; + +@NoArgsConstructor +@AllArgsConstructor +@Builder +@Getter +@Setter +@EqualsAndHashCode +@ToString +@RegisterForReflection +public class RoleMappingSearchResultsDto { + + @Builder.Default + private List roleMappings = new ArrayList<>(); + private long count; + +} diff --git a/app/src/main/java/io/apicurio/registry/storage/dto/VersionSearchResultsDto.java b/app/src/main/java/io/apicurio/registry/storage/dto/VersionSearchResultsDto.java index 5ff9761558..33ce10cd5d 100644 --- a/app/src/main/java/io/apicurio/registry/storage/dto/VersionSearchResultsDto.java +++ b/app/src/main/java/io/apicurio/registry/storage/dto/VersionSearchResultsDto.java @@ -14,6 +14,7 @@ @ToString public class VersionSearchResultsDto { - private long count; + @Builder.Default private List versions = new ArrayList<>(); + private long count; } diff --git a/app/src/main/java/io/apicurio/registry/storage/impl/gitops/GitOpsRegistryStorage.java b/app/src/main/java/io/apicurio/registry/storage/impl/gitops/GitOpsRegistryStorage.java index 6439b433ef..6f451eb745 100644 --- a/app/src/main/java/io/apicurio/registry/storage/impl/gitops/GitOpsRegistryStorage.java +++ b/app/src/main/java/io/apicurio/registry/storage/impl/gitops/GitOpsRegistryStorage.java @@ -374,6 +374,11 @@ public long countTotalArtifactVersions() { public List getRoleMappings() { return proxy(RegistryStorage::getRoleMappings); } + + @Override + public RoleMappingSearchResultsDto searchRoleMappings(int offset, int limit) throws RegistryStorageException { + return proxy(storage -> storage.searchRoleMappings(offset, limit)); + } @Override diff --git a/app/src/main/java/io/apicurio/registry/storage/impl/sql/AbstractSqlRegistryStorage.java b/app/src/main/java/io/apicurio/registry/storage/impl/sql/AbstractSqlRegistryStorage.java index 2bc0b2a3f0..d0cec7c3b7 100644 --- a/app/src/main/java/io/apicurio/registry/storage/impl/sql/AbstractSqlRegistryStorage.java +++ b/app/src/main/java/io/apicurio/registry/storage/impl/sql/AbstractSqlRegistryStorage.java @@ -68,6 +68,7 @@ import io.apicurio.registry.storage.dto.OrderBy; import io.apicurio.registry.storage.dto.OrderDirection; import io.apicurio.registry.storage.dto.RoleMappingDto; +import io.apicurio.registry.storage.dto.RoleMappingSearchResultsDto; import io.apicurio.registry.storage.dto.RuleConfigurationDto; import io.apicurio.registry.storage.dto.SearchFilter; import io.apicurio.registry.storage.dto.SearchFilterType; @@ -2419,6 +2420,27 @@ public List getRoleMappings() throws RegistryStorageException { }); } + @Override + @Transactional + public RoleMappingSearchResultsDto searchRoleMappings(int offset, int limit) throws RegistryStorageException { + log.debug("Searching role mappings."); + return handles.withHandleNoException(handle -> { + String query = sqlStatements.selectRoleMappings() + " LIMIT ? OFFSET ?"; + String countQuery = sqlStatements.countRoleMappings(); + List mappings = handle.createQuery(query) + .bind(0, limit) + .bind(1, offset) + .map(RoleMappingDtoMapper.instance) + .list(); + Integer count = handle.createQuery(countQuery) + .mapTo(Integer.class) + .one(); + return RoleMappingSearchResultsDto.builder() + .count(count) + .roleMappings(mappings) + .build(); + }); + } @Override @Transactional diff --git a/app/src/main/java/io/apicurio/registry/storage/impl/sql/CommonSqlStatements.java b/app/src/main/java/io/apicurio/registry/storage/impl/sql/CommonSqlStatements.java index a99c3af42d..a3d4c7f0fe 100644 --- a/app/src/main/java/io/apicurio/registry/storage/impl/sql/CommonSqlStatements.java +++ b/app/src/main/java/io/apicurio/registry/storage/impl/sql/CommonSqlStatements.java @@ -793,6 +793,14 @@ public String selectRoleByPrincipalId() { public String selectRoleMappings() { return "SELECT a.* FROM acls a "; } + + /** + * @see io.apicurio.registry.storage.impl.sql.SqlStatements#countRoleMappings() + */ + @Override + public String countRoleMappings() { + return "SELECT count(a.principalId) FROM acls a "; + } /** * @see io.apicurio.registry.storage.impl.sql.SqlStatements#updateRoleMapping() diff --git a/app/src/main/java/io/apicurio/registry/storage/impl/sql/SqlStatements.java b/app/src/main/java/io/apicurio/registry/storage/impl/sql/SqlStatements.java index 7acc00e95f..7ef5c91bfe 100644 --- a/app/src/main/java/io/apicurio/registry/storage/impl/sql/SqlStatements.java +++ b/app/src/main/java/io/apicurio/registry/storage/impl/sql/SqlStatements.java @@ -482,6 +482,8 @@ public interface SqlStatements { public String selectRoleMappings(); + public String countRoleMappings(); + public String updateRoleMapping(); public String selectRoleMappingCountByPrincipal(); diff --git a/app/src/test/java/io/apicurio/registry/auth/AuthTestLocalRoles.java b/app/src/test/java/io/apicurio/registry/auth/AuthTestLocalRoles.java index e1f4fb619b..838cd790cc 100644 --- a/app/src/test/java/io/apicurio/registry/auth/AuthTestLocalRoles.java +++ b/app/src/test/java/io/apicurio/registry/auth/AuthTestLocalRoles.java @@ -162,5 +162,14 @@ public void testLocalRoles() throws Exception { config.headers.add("X-Registry-ArtifactId", getClass().getSimpleName()); }); client.admin().rules().post(rule); + + // Now delete the role mapping + clientAdmin + .admin() + .roleMappings() + .byPrincipalId(JWKSMockServer.NO_ROLE_CLIENT_ID) + .delete() + ; + } } diff --git a/app/src/test/java/io/apicurio/registry/rbac/AdminClientTest.java b/app/src/test/java/io/apicurio/registry/rbac/AdminClientTest.java index 57d79e0a17..dbff658341 100644 --- a/app/src/test/java/io/apicurio/registry/rbac/AdminClientTest.java +++ b/app/src/test/java/io/apicurio/registry/rbac/AdminClientTest.java @@ -114,7 +114,7 @@ public void listArtifactTypes() throws Exception { @Test public void testRoleMappings() throws Exception { // Start with no role mappings - List roleMappings = clientV3.admin().roleMappings().get(); + List roleMappings = clientV3.admin().roleMappings().get().getRoleMappings(); Assertions.assertTrue(roleMappings.isEmpty()); // Add @@ -130,7 +130,7 @@ public void testRoleMappings() throws Exception { Assertions.assertEquals(RoleType.DEVELOPER, roleMapping.getRole()); }); TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); + List mappings = clientV3.admin().roleMappings().get().getRoleMappings(); Assertions.assertEquals(1, mappings.size()); Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); Assertions.assertEquals(RoleType.DEVELOPER, mappings.get(0).getRole()); @@ -151,7 +151,7 @@ public void testRoleMappings() throws Exception { // Get the list of mappings (should be 2 of them) TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); + List mappings = clientV3.admin().roleMappings().get().getRoleMappings(); Assertions.assertEquals(2, mappings.size()); }); @@ -193,7 +193,7 @@ public void testRoleMappings() throws Exception { // Get the list of mappings (should be 1 of them) TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); + List mappings = clientV3.admin().roleMappings().get().getRoleMappings(); Assertions.assertEquals(1, mappings.size()); Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); }); diff --git a/app/src/test/java/io/apicurio/registry/rbac/AdminResourceTest.java b/app/src/test/java/io/apicurio/registry/rbac/AdminResourceTest.java index de8ed470df..2a29bfb2ae 100644 --- a/app/src/test/java/io/apicurio/registry/rbac/AdminResourceTest.java +++ b/app/src/test/java/io/apicurio/registry/rbac/AdminResourceTest.java @@ -588,7 +588,7 @@ public void testRoleMappings() throws Exception { .then() .statusCode(200) .contentType(ContentType.JSON) - .body("[0]", nullValue()); + .body("roleMappings[0]", nullValue()); // Add RoleMapping mapping = new RoleMapping(); @@ -604,40 +604,34 @@ public void testRoleMappings() throws Exception { .body(anything()); // Verify the mapping was added. - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings/TestUser") - .then() - .statusCode(200) - .contentType(ContentType.JSON) - .body("principalId", equalTo("TestUser")) - .body("principalName", equalTo("Foo bar")) - .body("role", equalTo("DEVELOPER")); - }); - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings") - .then() - .statusCode(200) - .contentType(ContentType.JSON) - .body("[0].principalId", equalTo("TestUser")) - .body("[0].principalName", equalTo("Foo bar")) - .body("[0].role", equalTo("DEVELOPER")); - }); + given() + .when() + .get("/registry/v3/admin/roleMappings/TestUser") + .then() + .statusCode(200) + .contentType(ContentType.JSON) + .body("principalId", equalTo("TestUser")) + .body("principalName", equalTo("Foo bar")) + .body("role", equalTo("DEVELOPER")); + given() + .when() + .get("/registry/v3/admin/roleMappings") + .then() + .statusCode(200) + .contentType(ContentType.JSON) + .body("roleMappings[0].principalId", equalTo("TestUser")) + .body("roleMappings[0].principalName", equalTo("Foo bar")) + .body("roleMappings[0].role", equalTo("DEVELOPER")); // Try to add the rule again - should get a 409 - TestUtils.retry(() -> { - given() - .when() - .contentType(CT_JSON).body(mapping) - .post("/registry/v3/admin/roleMappings") - .then() - .statusCode(409) - .body("error_code", equalTo(409)) - .body("message", equalTo("A mapping for principal 'TestUser' and role 'DEVELOPER' already exists.")); - }); + given() + .when() + .contentType(CT_JSON).body(mapping) + .post("/registry/v3/admin/roleMappings") + .then() + .statusCode(409) + .body("error_code", equalTo(409)) + .body("message", equalTo("A mapping for principal 'TestUser' and role 'DEVELOPER' already exists.")); // Add another mapping mapping.setPrincipalId("TestUser2"); @@ -652,17 +646,15 @@ public void testRoleMappings() throws Exception { .body(anything()); // Get the list of mappings (should be 2 of them) - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings") - .then() - .statusCode(200) - .contentType(ContentType.JSON) - .body("[0].principalId", anyOf(equalTo("TestUser"), equalTo("TestUser2"))) - .body("[1].principalId", anyOf(equalTo("TestUser"), equalTo("TestUser2"))) - .body("[2]", nullValue()); - }); + given() + .when() + .get("/registry/v3/admin/roleMappings") + .then() + .statusCode(200) + .contentType(ContentType.JSON) + .body("roleMappings[0].principalId", anyOf(equalTo("TestUser"), equalTo("TestUser2"))) + .body("roleMappings[1].principalId", anyOf(equalTo("TestUser"), equalTo("TestUser2"))) + .body("roleMappings[2]", nullValue()); // Get a single mapping by principal given() @@ -686,16 +678,14 @@ public void testRoleMappings() throws Exception { .statusCode(204); // Get a single (updated) mapping - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings/TestUser") - .then() - .statusCode(200) - .contentType(ContentType.JSON) - .body("principalId", equalTo("TestUser")) - .body("role", equalTo("READ_ONLY")); - }); + given() + .when() + .get("/registry/v3/admin/roleMappings/TestUser") + .then() + .statusCode(200) + .contentType(ContentType.JSON) + .body("principalId", equalTo("TestUser")) + .body("role", equalTo("READ_ONLY")); // Try to update a role mapping that doesn't exist given() @@ -728,29 +718,25 @@ public void testRoleMappings() throws Exception { .body(anything()); // Get the (deleted) mapping by name (should fail with a 404) - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings/TestUser2") - .then() - .statusCode(404) - .contentType(ContentType.JSON) - .body("error_code", equalTo(404)) - .body("message", equalTo("No role mapping for principal 'TestUser2' was found.")); - }); + given() + .when() + .get("/registry/v3/admin/roleMappings/TestUser2") + .then() + .statusCode(404) + .contentType(ContentType.JSON) + .body("error_code", equalTo(404)) + .body("message", equalTo("No role mapping for principal 'TestUser2' was found.")); // Get the list of mappings (should be 1 of them) - TestUtils.retry(() -> { - given() - .when() - .get("/registry/v3/admin/roleMappings") - .then() - .log().all() - .statusCode(200) - .contentType(ContentType.JSON) - .body("[0].principalId", equalTo("TestUser")) - .body("[1]", nullValue()); - }); + given() + .when() + .get("/registry/v3/admin/roleMappings") + .then() + .log().all() + .statusCode(200) + .contentType(ContentType.JSON) + .body("roleMappings[0].principalId", equalTo("TestUser")) + .body("roleMappings[1]", nullValue()); // Clean up given() @@ -761,6 +747,45 @@ public void testRoleMappings() throws Exception { .body(anything()); } + + @Test + public void testRoleMappingPaging() throws Exception { + // Start with no role mappings + Assertions.assertEquals(0, clientV3.admin().roleMappings().get().getCount().intValue()); + + // Add some mappings + for (int i = 0; i < 20; i++) { + RoleMapping mapping = new RoleMapping(); + mapping.setPrincipalId("principal-" + i); + mapping.setRole(RoleType.DEVELOPER); + mapping.setPrincipalName("Principal " + i); + clientV3.admin().roleMappings().post(mapping); + } + + // Make sure we created 20 mappings + Assertions.assertEquals(20, clientV3.admin().roleMappings().get().getCount().intValue()); + + // Get the first 5 + RoleMappingSearchResults results = clientV3.admin().roleMappings().get(config -> config.queryParameters.limit = 5); + Assertions.assertEquals(5, results.getRoleMappings().size()); + Assertions.assertEquals(20, results.getCount()); + Assertions.assertEquals("principal-0", results.getRoleMappings().get(0).getPrincipalId()); + Assertions.assertEquals("principal-4", results.getRoleMappings().get(4).getPrincipalId()); + + // Get the second 5 + results = clientV3.admin().roleMappings().get(config -> { config.queryParameters.limit = 5; config.queryParameters.offset = 5; }); + Assertions.assertEquals(5, results.getRoleMappings().size()); + Assertions.assertEquals(20, results.getCount()); + Assertions.assertEquals("principal-5", results.getRoleMappings().get(0).getPrincipalId()); + Assertions.assertEquals("principal-9", results.getRoleMappings().get(4).getPrincipalId()); + + // Cleanup + for (int i = 0; i < 20; i++) { + clientV3.admin().roleMappings().byPrincipalId("principal-" + i).delete(); + } + } + + @Test public void testConfigProperties() throws Exception { String property1Name = "registry.ccompat.legacy-id-mode.enabled"; diff --git a/app/src/test/java/io/apicurio/registry/rbac/RegistryClientTest.java b/app/src/test/java/io/apicurio/registry/rbac/RegistryClientTest.java index e17c20a7cd..bcfbae7b21 100644 --- a/app/src/test/java/io/apicurio/registry/rbac/RegistryClientTest.java +++ b/app/src/test/java/io/apicurio/registry/rbac/RegistryClientTest.java @@ -1444,7 +1444,7 @@ private void prepareRuleTest(String groupId, String artifactId, io.apicurio.regi @Test public void testRoleMappings() throws Exception { // Start with no role mappings - List roleMappings = clientV3.admin().roleMappings().get(); + List roleMappings = clientV3.admin().roleMappings().get().getRoleMappings(); Assertions.assertTrue(roleMappings.isEmpty()); // Add @@ -1454,25 +1454,20 @@ public void testRoleMappings() throws Exception { clientV3.admin().roleMappings().post(mapping); // Verify the mapping was added. - TestUtils.retry(() -> { - RoleMapping roleMapping = clientV3.admin().roleMappings().byPrincipalId("TestUser").get(); - Assertions.assertEquals("TestUser", roleMapping.getPrincipalId()); - Assertions.assertEquals(RoleType.DEVELOPER, roleMapping.getRole()); - }); - TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); - Assertions.assertEquals(1, mappings.size()); - Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); - Assertions.assertEquals(RoleType.DEVELOPER, mappings.get(0).getRole()); - }); + RoleMapping roleMapping = clientV3.admin().roleMappings().byPrincipalId("TestUser").get(); + Assertions.assertEquals("TestUser", roleMapping.getPrincipalId()); + Assertions.assertEquals(RoleType.DEVELOPER, roleMapping.getRole()); + + List mappings = clientV3.admin().roleMappings().get().getRoleMappings(); + Assertions.assertEquals(1, mappings.size()); + Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); + Assertions.assertEquals(RoleType.DEVELOPER, mappings.get(0).getRole()); // Try to add the rule again - should get a 409 - TestUtils.retry(() -> { - var exception = Assertions.assertThrows(ApiException.class, () -> { - clientV3.admin().roleMappings().post(mapping); - }); - Assertions.assertEquals(409, exception.getResponseStatusCode()); + var exception = Assertions.assertThrows(ApiException.class, () -> { + clientV3.admin().roleMappings().post(mapping); }); + Assertions.assertEquals(409, exception.getResponseStatusCode()); // Add another mapping mapping.setPrincipalId("TestUser2"); @@ -1480,10 +1475,8 @@ public void testRoleMappings() throws Exception { clientV3.admin().roleMappings().post(mapping); // Get the list of mappings (should be 2 of them) - TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); - Assertions.assertEquals(2, mappings.size()); - }); + mappings = clientV3.admin().roleMappings().get().getRoleMappings(); + Assertions.assertEquals(2, mappings.size()); // Get a single mapping by principal RoleMapping tu2Mapping = clientV3.admin().roleMappings().byPrincipalId("TestUser2").get(); @@ -1496,42 +1489,36 @@ public void testRoleMappings() throws Exception { clientV3.admin().roleMappings().byPrincipalId("TestUser").put(updated); // Get a single (updated) mapping - TestUtils.retry(() -> { - RoleMapping tum = clientV3.admin().roleMappings().byPrincipalId("TestUser").get(); - Assertions.assertEquals("TestUser", tum.getPrincipalId()); - Assertions.assertEquals(RoleType.READ_ONLY, tum.getRole()); - }); + RoleMapping tum = clientV3.admin().roleMappings().byPrincipalId("TestUser").get(); + Assertions.assertEquals("TestUser", tum.getPrincipalId()); + Assertions.assertEquals(RoleType.READ_ONLY, tum.getRole()); // Try to update a role mapping that doesn't exist - var exception = Assertions.assertThrows(io.apicurio.registry.rest.client.models.Error.class, () -> { + var error = Assertions.assertThrows(io.apicurio.registry.rest.client.models.Error.class, () -> { UpdateRole updated2 = new UpdateRole(); updated2.setRole(RoleType.ADMIN); clientV3.admin().roleMappings().byPrincipalId("UnknownPrincipal").put(updated2); }); // RoleMappingNotFoundException - Assertions.assertEquals(404, exception.getErrorCode()); - Assertions.assertEquals("RoleMappingNotFoundException", exception.getName()); + Assertions.assertEquals(404, error.getErrorCode()); + Assertions.assertEquals("RoleMappingNotFoundException", error.getName()); // Delete a role mapping clientV3.admin().roleMappings().byPrincipalId("TestUser2").delete(); // Get the (deleted) mapping by name (should fail with a 404) - TestUtils.retry(() -> { - var exception2 = Assertions.assertThrows(io.apicurio.registry.rest.client.models.Error.class, () -> { - clientV3.admin().roleMappings().byPrincipalId("TestUser2").get(); - }); - // RoleMappingNotFoundException - Assertions.assertEquals(404, exception2.getErrorCode()); - Assertions.assertEquals("RoleMappingNotFoundException", exception2.getName()); + var exception2 = Assertions.assertThrows(io.apicurio.registry.rest.client.models.Error.class, () -> { + clientV3.admin().roleMappings().byPrincipalId("TestUser2").get(); }); + // RoleMappingNotFoundException + Assertions.assertEquals(404, exception2.getErrorCode()); + Assertions.assertEquals("RoleMappingNotFoundException", exception2.getName()); // Get the list of mappings (should be 1 of them) - TestUtils.retry(() -> { - List mappings = clientV3.admin().roleMappings().get(); - Assertions.assertEquals(1, mappings.size()); - Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); - }); + mappings = clientV3.admin().roleMappings().get().getRoleMappings(); + Assertions.assertEquals(1, mappings.size()); + Assertions.assertEquals("TestUser", mappings.get(0).getPrincipalId()); // Clean up clientV3.admin().roleMappings().byPrincipalId("TestUser").delete(); diff --git a/app/src/test/java/io/apicurio/registry/storage/impl/readonly/ReadOnlyRegistryStorageTest.java b/app/src/test/java/io/apicurio/registry/storage/impl/readonly/ReadOnlyRegistryStorageTest.java index 515cc17173..5788796a2e 100644 --- a/app/src/test/java/io/apicurio/registry/storage/impl/readonly/ReadOnlyRegistryStorageTest.java +++ b/app/src/test/java/io/apicurio/registry/storage/impl/readonly/ReadOnlyRegistryStorageTest.java @@ -105,6 +105,7 @@ public class ReadOnlyRegistryStorageTest { entry("getRoleForPrincipal1", new State(false, s -> s.getRoleForPrincipal(null))), entry("getRoleMapping1", new State(false, s -> s.getRoleMapping(null))), entry("getRoleMappings0", new State(false, RegistryStorage::getRoleMappings)), + entry("searchRoleMappings2", new State(false, s -> s.searchRoleMappings(0, 20))), entry("getStaleConfigProperties1", new State(false, s -> s.getStaleConfigProperties(null))), entry("importArtifactBranch1", new State(true, s -> s.importArtifactBranch(null))), entry("importArtifactRule1", new State(true, s -> s.importArtifactRule(null))), diff --git a/common/src/main/resources/META-INF/openapi.json b/common/src/main/resources/META-INF/openapi.json index a30ee26971..59474c38cb 100644 --- a/common/src/main/resources/META-INF/openapi.json +++ b/common/src/main/resources/META-INF/openapi.json @@ -1231,61 +1231,6 @@ } ] }, - "/admin/roleMappings": { - "summary": "Collection to manage role mappings for authenticated principals", - "get": { - "tags": [ - "Admin" - ], - "responses": { - "200": { - "content": { - "application/json": { - "schema": { - "type": "array", - "items": { - "$ref": "#/components/schemas/RoleMapping" - } - } - } - }, - "description": "A successful response will return the list of role mappings." - }, - "500": { - "$ref": "#/components/responses/ServerError" - } - }, - "operationId": "listRoleMappings", - "summary": "List all role mappings", - "description": "Gets a list of all role mappings configured in the registry (if any).\n\nThis operation can fail for the following reasons:\n\n* A server error occurred (HTTP error `500`)\n" - }, - "post": { - "requestBody": { - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/RoleMapping" - } - } - }, - "required": true - }, - "tags": [ - "Admin" - ], - "responses": { - "204": { - "description": "Returned when the role mapping was successfully created." - }, - "500": { - "$ref": "#/components/responses/ServerError" - } - }, - "operationId": "createRoleMapping", - "summary": "Create a new role mapping", - "description": "Creates a new mapping between a user/principal and a role.\n\nThis operation can fail for the following reasons:\n\n* A server error occurred (HTTP error `500`)\n\n" - } - }, "/users/me": { "summary": "Retrieves information about the current user", "get": { @@ -3426,6 +3371,76 @@ } ] }, + "/admin/roleMappings": { + "summary": "Collection to manage role mappings for authenticated principals", + "get": { + "tags": [ + "Admin" + ], + "parameters": [ + { + "name": "limit", + "description": "The number of role mappings to return. Defaults to 20.", + "schema": { + "type": "integer" + }, + "in": "query" + }, + { + "name": "offset", + "description": "The number of role mappings to skip before starting the result set. Defaults to 0.", + "schema": { + "type": "integer" + }, + "in": "query" + } + ], + "responses": { + "200": { + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RoleMappingSearchResults" + } + } + }, + "description": "A successful response will return the list of role mappings." + }, + "500": { + "$ref": "#/components/responses/ServerError" + } + }, + "operationId": "listRoleMappings", + "summary": "List all role mappings", + "description": "Gets a list of all role mappings configured in the registry (if any).\n\nThis operation can fail for the following reasons:\n\n* A server error occurred (HTTP error `500`)\n" + }, + "post": { + "requestBody": { + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RoleMapping" + } + } + }, + "required": true + }, + "tags": [ + "Admin" + ], + "responses": { + "204": { + "description": "Returned when the role mapping was successfully created." + }, + "500": { + "$ref": "#/components/responses/ServerError" + } + }, + "operationId": "createRoleMapping", + "summary": "Create a new role mapping", + "description": "Creates a new mapping between a user/principal and a role.\n\nThis operation can fail for the following reasons:\n\n* A server error occurred (HTTP error `500`)\n\n" + } + }, "x-codegen-contextRoot": "/apis/registry/v3" }, "components": { @@ -4898,6 +4913,39 @@ "custom-2": "bar" } } + }, + "RoleMappingSearchResults": { + "description": "Describes the response received when searching for artifacts.", + "required": [ + "count", + "roleMappings" + ], + "type": "object", + "properties": { + "roleMappings": { + "description": "The role mappings returned in the result set.", + "type": "array", + "items": { + "$ref": "#/components/schemas/RoleMapping" + } + }, + "count": { + "description": "The total number of role mappings that matched the query that produced the result set (may be \nmore than the number of role mappings in the result set).", + "type": "integer" + } + }, + "example": [ + { + "principalId": "user-1", + "principalName": "user-1", + "role": "ADMIN" + }, + { + "principalId": "svc_account_84874587_123484", + "principalName": "user-svc-account", + "role": "READ_ONLY" + } + ] } }, "responses": { diff --git a/go-sdk/pkg/registryclient-v3/.kiota.log b/go-sdk/pkg/registryclient-v3/.kiota.log index e29655bae4..2a0b8c0994 100644 --- a/go-sdk/pkg/registryclient-v3/.kiota.log +++ b/go-sdk/pkg/registryclient-v3/.kiota.log @@ -6,5 +6,6 @@ Warning: KiotaBuilder OpenAPI warning: #/paths/~1groups~1{groupId}~1artifacts~1{ Warning: KiotaBuilder OpenAPI warning: #/paths/~1groups~1{groupId}~1artifacts~1{artifactId}~1versions/post/requestBody/content/*~1*/examples/OpenAPI Example/value - Data and type mismatch found. Warning: KiotaBuilder OpenAPI warning: #/components/schemas/ArtifactMetaData/example/references/0/version - Data and type mismatch found. Warning: KiotaBuilder OpenAPI warning: #/components/schemas/SearchedVersion/example/references - Data and type mismatch found. +Warning: KiotaBuilder OpenAPI warning: #/components/schemas/RoleMappingSearchResults/example - Data and type mismatch found. Warning: KiotaBuilder OpenAPI warning: #/components/responses/ArtifactContent/content/*~1*/examples/OpenAPI/value - Data and type mismatch found. Warning: KiotaBuilder No server url found in the OpenAPI document. The base url will need to be set when using the client. diff --git a/go-sdk/pkg/registryclient-v3/admin/role_mappings_request_builder.go b/go-sdk/pkg/registryclient-v3/admin/role_mappings_request_builder.go index 93a273fbfb..0dbbbcc525 100644 --- a/go-sdk/pkg/registryclient-v3/admin/role_mappings_request_builder.go +++ b/go-sdk/pkg/registryclient-v3/admin/role_mappings_request_builder.go @@ -11,12 +11,22 @@ type RoleMappingsRequestBuilder struct { i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.BaseRequestBuilder } +// RoleMappingsRequestBuilderGetQueryParameters gets a list of all role mappings configured in the registry (if any).This operation can fail for the following reasons:* A server error occurred (HTTP error `500`) +type RoleMappingsRequestBuilderGetQueryParameters struct { + // The number of role mappings to return. Defaults to 20. + Limit *int32 `uriparametername:"limit"` + // The number of role mappings to skip before starting the result set. Defaults to 0. + Offset *int32 `uriparametername:"offset"` +} + // RoleMappingsRequestBuilderGetRequestConfiguration configuration for the request such as headers, query parameters, and middleware options. type RoleMappingsRequestBuilderGetRequestConfiguration struct { // Request headers Headers *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestHeaders // Request options Options []i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestOption + // Request query parameters + QueryParameters *RoleMappingsRequestBuilderGetQueryParameters } // RoleMappingsRequestBuilderPostRequestConfiguration configuration for the request such as headers, query parameters, and middleware options. @@ -42,7 +52,7 @@ func (m *RoleMappingsRequestBuilder) ByPrincipalId(principalId string) *RoleMapp // NewRoleMappingsRequestBuilderInternal instantiates a new RoleMappingsRequestBuilder and sets the default values. func NewRoleMappingsRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter) *RoleMappingsRequestBuilder { m := &RoleMappingsRequestBuilder{ - BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, "{+baseurl}/admin/roleMappings", pathParameters), + BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, "{+baseurl}/admin/roleMappings{?limit*,offset*}", pathParameters), } return m } @@ -55,7 +65,7 @@ func NewRoleMappingsRequestBuilder(rawUrl string, requestAdapter i2ae4187f7daee2 } // Get gets a list of all role mappings configured in the registry (if any).This operation can fail for the following reasons:* A server error occurred (HTTP error `500`) -func (m *RoleMappingsRequestBuilder) Get(ctx context.Context, requestConfiguration *RoleMappingsRequestBuilderGetRequestConfiguration) ([]i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.RoleMappingable, error) { +func (m *RoleMappingsRequestBuilder) Get(ctx context.Context, requestConfiguration *RoleMappingsRequestBuilderGetRequestConfiguration) (i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.RoleMappingSearchResultsable, error) { requestInfo, err := m.ToGetRequestInformation(ctx, requestConfiguration) if err != nil { return nil, err @@ -63,17 +73,14 @@ func (m *RoleMappingsRequestBuilder) Get(ctx context.Context, requestConfigurati errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings{ "500": i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.CreateErrorFromDiscriminatorValue, } - res, err := m.BaseRequestBuilder.RequestAdapter.SendCollection(ctx, requestInfo, i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.CreateRoleMappingFromDiscriminatorValue, errorMapping) + res, err := m.BaseRequestBuilder.RequestAdapter.Send(ctx, requestInfo, i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.CreateRoleMappingSearchResultsFromDiscriminatorValue, errorMapping) if err != nil { return nil, err } - val := make([]i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.RoleMappingable, len(res)) - for i, v := range res { - if v != nil { - val[i] = v.(i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.RoleMappingable) - } + if res == nil { + return nil, nil } - return val, nil + return res.(i00eb2e63d156923d00d8e86fe16b5d74daf30e363c9f185a8165cb42aa2f2c71.RoleMappingSearchResultsable), nil } // Post creates a new mapping between a user/principal and a role.This operation can fail for the following reasons:* A server error occurred (HTTP error `500`) @@ -96,6 +103,9 @@ func (m *RoleMappingsRequestBuilder) Post(ctx context.Context, body i00eb2e63d15 func (m *RoleMappingsRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *RoleMappingsRequestBuilderGetRequestConfiguration) (*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) { requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformationWithMethodAndUrlTemplateAndPathParameters(i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET, m.BaseRequestBuilder.UrlTemplate, m.BaseRequestBuilder.PathParameters) if requestConfiguration != nil { + if requestConfiguration.QueryParameters != nil { + requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters)) + } requestInfo.Headers.AddAll(requestConfiguration.Headers) requestInfo.AddRequestOptions(requestConfiguration.Options) } diff --git a/go-sdk/pkg/registryclient-v3/kiota-lock.json b/go-sdk/pkg/registryclient-v3/kiota-lock.json index 3516716549..c5c1437468 100644 --- a/go-sdk/pkg/registryclient-v3/kiota-lock.json +++ b/go-sdk/pkg/registryclient-v3/kiota-lock.json @@ -1,5 +1,5 @@ { - "descriptionHash": "56939600DE2087832A8FA7E34BA9DAEC34B8E144309EB838A080FB5F4F2F00C5E494D8628EB8111FED284D083455132478DC840DB99CF21ABA85D9B99672DFE1", + "descriptionHash": "5F6FA9CDAF9D09311FB5811470D2651A34B80334759C4D6AFE4A114AA22223C417B00831965E8AE3DCC4D905721F907EBD6622326AA48ECEEB04D01DB0DEBFAA", "descriptionLocation": "../../v3.json", "lockFileVersion": "1.0.0", "kiotaVersion": "1.10.1", diff --git a/go-sdk/pkg/registryclient-v3/models/role_mapping_search_results.go b/go-sdk/pkg/registryclient-v3/models/role_mapping_search_results.go new file mode 100644 index 0000000000..6197cf2cb5 --- /dev/null +++ b/go-sdk/pkg/registryclient-v3/models/role_mapping_search_results.go @@ -0,0 +1,128 @@ +package models + +import ( + i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91 "github.com/microsoft/kiota-abstractions-go/serialization" +) + +// RoleMappingSearchResults describes the response received when searching for artifacts. +type RoleMappingSearchResults struct { + // Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well. + additionalData map[string]any + // The total number of role mappings that matched the query that produced the result set (may be more than the number of role mappings in the result set). + count *int32 + // The role mappings returned in the result set. + roleMappings []RoleMappingable +} + +// NewRoleMappingSearchResults instantiates a new RoleMappingSearchResults and sets the default values. +func NewRoleMappingSearchResults() *RoleMappingSearchResults { + m := &RoleMappingSearchResults{} + m.SetAdditionalData(make(map[string]any)) + return m +} + +// CreateRoleMappingSearchResultsFromDiscriminatorValue creates a new instance of the appropriate class based on discriminator value +func CreateRoleMappingSearchResultsFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode) (i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) { + return NewRoleMappingSearchResults(), nil +} + +// GetAdditionalData gets the AdditionalData property value. Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well. +func (m *RoleMappingSearchResults) GetAdditionalData() map[string]any { + return m.additionalData +} + +// GetCount gets the count property value. The total number of role mappings that matched the query that produced the result set (may be more than the number of role mappings in the result set). +func (m *RoleMappingSearchResults) GetCount() *int32 { + return m.count +} + +// GetFieldDeserializers the deserialization information for the current model +func (m *RoleMappingSearchResults) GetFieldDeserializers() map[string]func(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode) error { + res := make(map[string]func(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode) error) + res["count"] = func(n i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode) error { + val, err := n.GetInt32Value() + if err != nil { + return err + } + if val != nil { + m.SetCount(val) + } + return nil + } + res["roleMappings"] = func(n i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode) error { + val, err := n.GetCollectionOfObjectValues(CreateRoleMappingFromDiscriminatorValue) + if err != nil { + return err + } + if val != nil { + res := make([]RoleMappingable, len(val)) + for i, v := range val { + if v != nil { + res[i] = v.(RoleMappingable) + } + } + m.SetRoleMappings(res) + } + return nil + } + return res +} + +// GetRoleMappings gets the roleMappings property value. The role mappings returned in the result set. +func (m *RoleMappingSearchResults) GetRoleMappings() []RoleMappingable { + return m.roleMappings +} + +// Serialize serializes information the current object +func (m *RoleMappingSearchResults) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter) error { + { + err := writer.WriteInt32Value("count", m.GetCount()) + if err != nil { + return err + } + } + if m.GetRoleMappings() != nil { + cast := make([]i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, len(m.GetRoleMappings())) + for i, v := range m.GetRoleMappings() { + if v != nil { + cast[i] = v.(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable) + } + } + err := writer.WriteCollectionOfObjectValues("roleMappings", cast) + if err != nil { + return err + } + } + { + err := writer.WriteAdditionalData(m.GetAdditionalData()) + if err != nil { + return err + } + } + return nil +} + +// SetAdditionalData sets the AdditionalData property value. Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well. +func (m *RoleMappingSearchResults) SetAdditionalData(value map[string]any) { + m.additionalData = value +} + +// SetCount sets the count property value. The total number of role mappings that matched the query that produced the result set (may be more than the number of role mappings in the result set). +func (m *RoleMappingSearchResults) SetCount(value *int32) { + m.count = value +} + +// SetRoleMappings sets the roleMappings property value. The role mappings returned in the result set. +func (m *RoleMappingSearchResults) SetRoleMappings(value []RoleMappingable) { + m.roleMappings = value +} + +// RoleMappingSearchResultsable +type RoleMappingSearchResultsable interface { + i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.AdditionalDataHolder + i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable + GetCount() *int32 + GetRoleMappings() []RoleMappingable + SetCount(value *int32) + SetRoleMappings(value []RoleMappingable) +} diff --git a/ui/ui-app/src/app/pages/roles/RolesPage.tsx b/ui/ui-app/src/app/pages/roles/RolesPage.tsx index 4e77fd1356..8b49711912 100644 --- a/ui/ui-app/src/app/pages/roles/RolesPage.tsx +++ b/ui/ui-app/src/app/pages/roles/RolesPage.tsx @@ -17,6 +17,7 @@ import { GrantAccessModal } from "@app/pages/roles/components/modals/GrantAccess import { If, PleaseWaitModal } from "@apicurio/common-ui-components"; import { AdminService, useAdminService } from "@services/useAdminService.ts"; import { Principal } from "@services/useConfigService.ts"; +import { Paging } from "@services/useGroupsService.ts"; export type RolesPageProps = { @@ -42,7 +43,11 @@ export const RolesPage: FunctionComponent = () => { const admin: AdminService = useAdminService(); const createLoaders = (): Promise => { - return admin.getRoleMappings().then(setRoles) + const paging: Paging = { + page: 1, + pageSize: 100 + }; + return admin.getRoleMappings(paging).then(results => setRoles(results.roleMappings)) .catch(error => { setPageError(toPageError(error, "Error loading role mappings.")); }); diff --git a/ui/ui-app/src/models/index.ts b/ui/ui-app/src/models/index.ts index 9a8c386d3e..cb1a153399 100644 --- a/ui/ui-app/src/models/index.ts +++ b/ui/ui-app/src/models/index.ts @@ -8,6 +8,7 @@ export * from "./referenceType"; export * from "./artifactOwner.model"; export * from "./systemInfo.model"; export * from "./roleMapping.model"; +export * from "./roleMappingSearchResults.model"; export * from "./RuleViolationCause.model"; export * from "./contentTypes.model"; export * from "./versionMetaData.model"; diff --git a/ui/ui-app/src/models/roleMappingSearchResults.model.ts b/ui/ui-app/src/models/roleMappingSearchResults.model.ts new file mode 100644 index 0000000000..5092bce75c --- /dev/null +++ b/ui/ui-app/src/models/roleMappingSearchResults.model.ts @@ -0,0 +1,8 @@ +import { RoleMapping } from "@models/roleMapping.model.ts"; + +export interface RoleMappingSearchResults { + + roleMappings: RoleMapping[]; + count: number; + +} diff --git a/ui/ui-app/src/services/useAdminService.ts b/ui/ui-app/src/services/useAdminService.ts index d5dda98c54..6cc9ceb3a7 100644 --- a/ui/ui-app/src/services/useAdminService.ts +++ b/ui/ui-app/src/services/useAdminService.ts @@ -14,6 +14,8 @@ import { httpPostWithReturn, httpPut, httpPutWithReturn } from "@utils/rest.utils.ts"; +import { Paging } from "@services/useGroupsService.ts"; +import { RoleMappingSearchResults } from "@models/roleMappingSearchResults.model.ts"; const getArtifactTypes = async (config: ConfigService, auth: AuthService): Promise => { @@ -85,13 +87,20 @@ const deleteRule = async (config: ConfigService, auth: AuthService, type: string return httpDelete(endpoint, options); }; -const getRoleMappings = async (config: ConfigService, auth: AuthService): Promise => { +const getRoleMappings = async (config: ConfigService, auth: AuthService, paging: Paging): Promise => { console.info("[AdminService] Getting the list of role mappings."); + const start: number = (paging.page - 1) * paging.pageSize; + const end: number = start + paging.pageSize; + const queryParams: any = { + limit: end, + offset: start + }; + const baseHref: string = config.artifactsUrl(); const token: string | undefined = await auth.getToken(); const options = createOptions(createHeaders(token)); - const endpoint: string = createEndpoint(baseHref, "/admin/roleMappings"); - return httpGet(endpoint, options); + const endpoint: string = createEndpoint(baseHref, "/admin/roleMappings", {}, queryParams); + return httpGet(endpoint, options); }; const getRoleMapping = async (config: ConfigService, auth: AuthService, principalId: string): Promise => { @@ -218,7 +227,7 @@ export interface AdminService { createRule(type: string, config: string): Promise; updateRule(type: string, config: string): Promise; deleteRule(type: string): Promise; - getRoleMappings(): Promise; + getRoleMappings(paging: Paging): Promise; getRoleMapping(principalId: string): Promise; createRoleMapping(principalId: string, role: string, principalName: string): Promise; updateRoleMapping(principalId: string, role: string): Promise; @@ -254,8 +263,8 @@ export const useAdminService: () => AdminService = (): AdminService => { deleteRule(type: string): Promise { return deleteRule(config, auth, type); }, - getRoleMappings(): Promise { - return getRoleMappings(config, auth); + getRoleMappings(paging: Paging): Promise { + return getRoleMappings(config, auth, paging); }, getRoleMapping(principalId: string): Promise { return getRoleMapping(config, auth, principalId);