@Mapping(from = Job.class, to = org.ovirt.engine.core.common.job.Job.class) public static org.ovirt.engine.core.common.job.Job map(Job job, org.ovirt.engine.core.common.job.Job entity) { org.ovirt.engine.core.common.job.Job target = entity != null ? entity : new org.ovirt.engine.core.common.job.Job(); target.setId(GuidUtils.asGuid(job.getId())); if (job.isSetDescription()) { target.setDescription(job.getDescription()); } if (job.isSetStatus()) { target.setStatus(mapJobStatus(job.getStatus())); } if (job.isSetOwner()) { target.setOwnerId(GuidUtils.asGuid(job.getOwner().getId())); } target.setStartTime(job.isSetStartTime() ? job.getStartTime().toGregorianCalendar().getTime() : new Date(Calendar.getInstance().getTimeInMillis())); target.setEndTime(job.isSetEndTime() ? job.getEndTime().toGregorianCalendar().getTime() : new Date(Calendar.getInstance().getTimeInMillis())); target.setLastUpdateTime(job.isSetLastUpdated() ? job.getLastUpdated().toGregorianCalendar().getTime() : new Date(Calendar.getInstance().getTimeInMillis())); target.setExternal(job.isSetExternal() ? job.isExternal() : true); target.setAutoCleared(job.isSetAutoCleared() ? job.isAutoCleared() : true); return target; }
private void addLinkToUser(Session session) { ServiceTreeNode node = ServiceTree.getNode(UsersResource.class); String href = CurrentManager.get().getAbsolutePath(node.getPath(), session.getUser().getId()); session.getUser().setHref(href); }
protected void verifyModel(User model, int index) { assertEquals(GUIDS[index].toString(), model.getId()); assertEquals(NAMES[index], model.getName()); assertNotNull(model.getDomain()); assertTrue(model.isSetGroups()); assertEquals(PARSED_GROUPS.length, model.getGroups().getGroups().size()); Set<String> groupNames = model.getGroups().getGroups().stream().map(Group::getName).collect(Collectors.toSet()); assertEquals(new HashSet<>(Arrays.asList(PARSED_GROUPS)), groupNames); verifyLinks(model); } }
@Override public Permission addParents(Permission permission) { // REVISIT for entity-level permissions we need an isUser // flag on the permissions entity in order to distinguish // between the user and group cases if (isGroupSubCollection() && permission.isSetUser() && permission.getUser().isSetId()) { permission.setGroup(new Group()); permission.getGroup().setId(permission.getUser().getId()); permission.setUser(null); } return permission; }
@Override protected void verifyModel(User model, int index) { assertEquals(GUIDS[index].toString(), model.getId()); assertEquals(NAMES[index] + "@" + DOMAIN, model.getUserName()); assertNotNull(model.getDomain()); assertEquals(DirectoryEntryIdUtils.encode(DOMAIN), model.getDomain().getId()); assertTrue(model.isSetGroups()); assertEquals(PARSED_GROUPS.length, model.getGroups().getGroups().size()); Set<String> groupNames = model.getGroups().getGroups().stream().map(Group::getName).collect(Collectors.toSet()); assertEquals(new HashSet<>(Arrays.asList(PARSED_GROUPS)), groupNames); verifyLinks(model); }
&& permission.getUser()!=null && permission.getUser().getId()!=null ) { return AssignedPermissionsResource.class.getMethod("addUserLevel", Permission.class);
@Override protected void verifyModel(Role model, int index) { super.verifyModel(model, index); assertTrue(model.isSetUser()); assertTrue(model.getUser().isSetId()); assertEquals(GUIDS[1].toString(), model.getUser().getId()); } }
/** * Find the directory user that corresponds to the given model. * * @param directoryName the name of the directory where to perform the search * @param user the user model * @return the requested directory group or {@code null} if no such group exists */ private DirectoryUser findDirectoryUser(String directoryName, User user) { DirectoryUser result = null; String namespace = user.getNamespace(); if (user.isSetDomainEntryId()) { result = getUserById(directoryName, namespace, user.getDomainEntryId()); } else if (user.isSetId()) { result = getUserById(directoryName, namespace, user.getId()); } else if (user.isSetPrincipal()) { result = getEntity(DirectoryUser.class, QueryType.GetDirectoryUserByPrincipal, new GetDirectoryUserByPrincipalParameters(directoryName, user.getPrincipal()), user.getPrincipal()); } else if (user.isSetUserName()) { result = getEntity( DirectoryUser.class, SearchType.DirectoryUser, getDirectoryUserSearchPattern( AuthzUtils.getEntityNameWithoutAuthz(user.getUserName(), directoryName), user.getNamespace(), directoryName) ); } return result; }
@Override protected void verifyModel(Permission model, int index) { super.verifyModel(model, index); if (index == 0) { assertTrue(model.isSetUser()); assertEquals(GUIDS[1].toString(), model.getUser().getId()); } else { assertTrue(model.isSetGroup()); assertEquals(GUIDS[1].toString(), model.getGroup().getId()); } } }
@Override protected void verifyModel(Permission model, int index) { super.verifyModel(model, index); if (index == 0) { assertTrue(model.isSetUser()); assertEquals(GUIDS[1].toString(), model.getUser().getId()); } else { assertTrue(model.isSetGroup()); assertEquals(GUIDS[1].toString(), model.getGroup().getId()); } } }
@Override protected void verifyModel(Permission model, int index) { assertEquals(GUIDS[index].toString(), model.getId()); assertTrue(model.isSetUser()); assertEquals(GUIDS[1].toString(), model.getUser().getId()); assertTrue(model.isSetRole()); assertEquals(GUIDS[2].toString(), model.getRole().getId()); }
@Mapping(from = User.class, to = DbUser.class) public static DbUser map(User model, DbUser template) { DbUser entity = template != null? template: new DbUser(); if (model.isSetPrincipal()) { entity.setLoginName(model.getPrincipal()); } else if (model.isSetName()) { entity.setLoginName(model.getName()); } if (model.isSetId()) { String id = model.getId(); entity.setId(GuidUtils.asGuid(id)); } if (model.isSetDomain()) { Domain domain = model.getDomain(); if (domain.isSetName()) { entity.setDomain(domain.getName()); } } if (model.isSetDomainEntryId()) { entity.setExternalId(DirectoryEntryIdUtils.decode(model.getDomainEntryId())); } if (model.isSetNamespace()) { entity.setNamespace(model.getNamespace()); } return entity; }
auditLog.setMessage(event.getDescription()); if (event.isSetUser() && event.getUser().isSetId()) { Guid guid = GuidUtils.asGuid(event.getUser().getId()); if (!Guid.isNullOrEmpty(guid)) { auditLog.setUserId(guid);
session.getUser().setId(user.getId()); session.getUser().setHref(user.getHref()); session.getUser().getDomain().setId(user.getDomain().getId());
to.setId(from.getId());