1
|
package eu.dnetlib.organizations.controller;
|
2
|
|
3
|
import java.util.ArrayList;
|
4
|
import java.util.Arrays;
|
5
|
import java.util.Collection;
|
6
|
import java.util.List;
|
7
|
import java.util.Map;
|
8
|
import java.util.Optional;
|
9
|
import java.util.Set;
|
10
|
import java.util.TreeMap;
|
11
|
import java.util.TreeSet;
|
12
|
import java.util.stream.Collectors;
|
13
|
import java.util.stream.Stream;
|
14
|
|
15
|
import org.apache.commons.lang3.StringUtils;
|
16
|
import org.springframework.beans.factory.annotation.Autowired;
|
17
|
import org.springframework.data.domain.Page;
|
18
|
import org.springframework.data.domain.PageRequest;
|
19
|
import org.springframework.security.core.Authentication;
|
20
|
import org.springframework.web.bind.annotation.PathVariable;
|
21
|
import org.springframework.web.bind.annotation.RequestBody;
|
22
|
import org.springframework.web.bind.annotation.RequestMapping;
|
23
|
import org.springframework.web.bind.annotation.RequestMethod;
|
24
|
import org.springframework.web.bind.annotation.RequestParam;
|
25
|
import org.springframework.web.bind.annotation.RestController;
|
26
|
|
27
|
import eu.dnetlib.organizations.model.OpenaireDuplicate;
|
28
|
import eu.dnetlib.organizations.model.Relationship;
|
29
|
import eu.dnetlib.organizations.model.utils.BrowseEntry;
|
30
|
import eu.dnetlib.organizations.model.utils.OrganizationConflict;
|
31
|
import eu.dnetlib.organizations.model.utils.OrganizationConflictImpl;
|
32
|
import eu.dnetlib.organizations.model.view.ConflictGroupView;
|
33
|
import eu.dnetlib.organizations.model.view.DuplicateGroupView;
|
34
|
import eu.dnetlib.organizations.model.view.OrganizationInfoView;
|
35
|
import eu.dnetlib.organizations.model.view.OrganizationSimpleView;
|
36
|
import eu.dnetlib.organizations.model.view.OrganizationView;
|
37
|
import eu.dnetlib.organizations.repository.OpenaireConflictRepository;
|
38
|
import eu.dnetlib.organizations.repository.OpenaireDuplicateRepository;
|
39
|
import eu.dnetlib.organizations.repository.UserCountryRepository;
|
40
|
import eu.dnetlib.organizations.repository.readonly.ConflictGroupViewRepository;
|
41
|
import eu.dnetlib.organizations.repository.readonly.DuplicateGroupViewRepository;
|
42
|
import eu.dnetlib.organizations.repository.readonly.OrganizationInfoViewRepository;
|
43
|
import eu.dnetlib.organizations.repository.readonly.OrganizationSimpleViewRepository;
|
44
|
import eu.dnetlib.organizations.repository.readonly.OrganizationViewRepository;
|
45
|
import eu.dnetlib.organizations.repository.readonly.SuggestionInfoViewByCountryRepository;
|
46
|
import eu.dnetlib.organizations.utils.DatabaseUtils;
|
47
|
import eu.dnetlib.organizations.utils.RelationType;
|
48
|
|
49
|
@RestController
|
50
|
@RequestMapping("/api/organizations")
|
51
|
public class OrganizationController {
|
52
|
|
53
|
@Autowired
|
54
|
private OrganizationViewRepository organizationViewRepository;
|
55
|
@Autowired
|
56
|
private OrganizationInfoViewRepository organizationInfoViewRepository;
|
57
|
@Autowired
|
58
|
private OrganizationSimpleViewRepository organizationSimpleViewRepository;
|
59
|
@Autowired
|
60
|
private OpenaireDuplicateRepository openaireDuplicateRepository;
|
61
|
@Autowired
|
62
|
private OpenaireConflictRepository openaireConflictRepository;
|
63
|
@Autowired
|
64
|
private ConflictGroupViewRepository conflictGroupViewRepository;
|
65
|
@Autowired
|
66
|
private SuggestionInfoViewByCountryRepository suggestionInfoViewByCountryRepository;
|
67
|
@Autowired
|
68
|
private UserCountryRepository userCountryRepository;
|
69
|
@Autowired
|
70
|
private DuplicateGroupViewRepository duplicateGroupViewRepository;
|
71
|
@Autowired
|
72
|
private DatabaseUtils databaseUtils;
|
73
|
|
74
|
@RequestMapping(value = "/save", method = RequestMethod.POST)
|
75
|
public List<String> save(@RequestBody final OrganizationView org, final Authentication authentication) {
|
76
|
if (StringUtils.isBlank(org.getName())) {
|
77
|
throw new RuntimeException("Missing field: name");
|
78
|
} else if (StringUtils.isBlank(org.getCountry())) {
|
79
|
throw new RuntimeException("Missing field: country");
|
80
|
} else if (StringUtils.isBlank(org.getType())) {
|
81
|
throw new RuntimeException("Missing field: type");
|
82
|
} else if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForCountry(org.getCountry(), authentication.getName())) {
|
83
|
final String orgId = databaseUtils.insertOrUpdateOrganization(org, authentication.getName(), StringUtils.isNotBlank(org.getId()));
|
84
|
return Arrays.asList(orgId);
|
85
|
} else {
|
86
|
throw new RuntimeException("User not authorized");
|
87
|
}
|
88
|
}
|
89
|
|
90
|
@RequestMapping(value = "/info", method = RequestMethod.GET)
|
91
|
public OrganizationInfoView infoById(@RequestParam final String id, final Authentication authentication) {
|
92
|
return organizationInfoViewRepository.findById(id).get();
|
93
|
}
|
94
|
|
95
|
@RequestMapping(value = "/suggestionsInfo", method = RequestMethod.GET)
|
96
|
public SuggestionInfo suggestionsInfo(final Authentication authentication) {
|
97
|
final SuggestionInfo info = new SuggestionInfo();
|
98
|
|
99
|
if (UserInfo.isSuperAdmin(authentication)) {
|
100
|
suggestionInfoViewByCountryRepository.findAll().forEach(info::add);
|
101
|
} else if (UserInfo.isSimpleUser(authentication) || UserInfo.isNationalAdmin(authentication)) {
|
102
|
userCountryRepository.getCountriesForUser(authentication.getName())
|
103
|
.stream()
|
104
|
.map(suggestionInfoViewByCountryRepository::findById)
|
105
|
.filter(Optional::isPresent)
|
106
|
.map(Optional::get)
|
107
|
.forEach(info::add);
|
108
|
}
|
109
|
return info;
|
110
|
}
|
111
|
|
112
|
@RequestMapping(value = "/get", method = RequestMethod.GET)
|
113
|
public OrganizationView findById(@RequestParam final String id, final Authentication authentication) {
|
114
|
final OrganizationView org = organizationViewRepository.findById(id).get();
|
115
|
|
116
|
if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForCountry(org.getCountry(), authentication.getName())) {
|
117
|
return org;
|
118
|
} else {
|
119
|
throw new RuntimeException("User not authorized");
|
120
|
}
|
121
|
}
|
122
|
|
123
|
@RequestMapping(value = "/conflicts", method = RequestMethod.GET)
|
124
|
public List<OrganizationConflict> conflicts(@RequestParam final String id, final Authentication authentication) {
|
125
|
if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForId(id, authentication.getName())) {
|
126
|
return openaireConflictRepository.getConflictsForId(id);
|
127
|
} else {
|
128
|
throw new RuntimeException("User not authorized");
|
129
|
}
|
130
|
}
|
131
|
|
132
|
@RequestMapping(value = "/duplicates", method = RequestMethod.GET)
|
133
|
public List<OpenaireDuplicate> duplicates(@RequestParam final String id, final Authentication authentication) {
|
134
|
if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForId(id, authentication.getName())) {
|
135
|
return openaireDuplicateRepository.findByLocalId(id);
|
136
|
} else {
|
137
|
throw new RuntimeException("User not authorized");
|
138
|
}
|
139
|
}
|
140
|
|
141
|
@RequestMapping(value = "/conflicts/byCountry/{country}", method = RequestMethod.GET)
|
142
|
public Collection<Set<OrganizationConflictImpl>> findConflictsByCountry(@PathVariable final String country, final Authentication authentication) {
|
143
|
|
144
|
databaseUtils.verifyConflictGroups(false);
|
145
|
|
146
|
if (UserInfo.isSuperAdmin(authentication)) {
|
147
|
return groupConflicts(conflictGroupViewRepository.findByCountry1OrCountry2(country, country).stream());
|
148
|
} else if (UserInfo.isSimpleUser(authentication) || UserInfo.isNationalAdmin(authentication)) {
|
149
|
final Stream<ConflictGroupView> list = userCountryRepository.getCountriesForUser(authentication.getName())
|
150
|
.stream()
|
151
|
.filter(country::equalsIgnoreCase)
|
152
|
.map(c -> conflictGroupViewRepository.findByCountry1OrCountry2(c, c).stream())
|
153
|
.findFirst()
|
154
|
.orElse(Stream.empty());
|
155
|
return groupConflicts(list);
|
156
|
} else {
|
157
|
throw new RuntimeException("User not authorized");
|
158
|
}
|
159
|
|
160
|
}
|
161
|
|
162
|
@RequestMapping(value = "/duplicates/byCountry/{country}", method = RequestMethod.GET)
|
163
|
public Iterable<DuplicateGroupView> findDuplicatesByCountry(@PathVariable final String country, final Authentication authentication) {
|
164
|
|
165
|
if (UserInfo.isSuperAdmin(authentication)) {
|
166
|
return duplicateGroupViewRepository.findByCountry(country);
|
167
|
} else if (UserInfo.isSimpleUser(authentication) || UserInfo.isNationalAdmin(authentication)) {
|
168
|
return userCountryRepository.getCountriesForUser(authentication.getName())
|
169
|
.stream()
|
170
|
.filter(country::equalsIgnoreCase)
|
171
|
.map(duplicateGroupViewRepository::findByCountry)
|
172
|
.findFirst()
|
173
|
.orElse(new ArrayList<DuplicateGroupView>());
|
174
|
} else {
|
175
|
throw new RuntimeException("User not authorized");
|
176
|
}
|
177
|
|
178
|
}
|
179
|
|
180
|
private Collection<Set<OrganizationConflictImpl>> groupConflicts(final Stream<ConflictGroupView> stream) {
|
181
|
final Map<String, Set<OrganizationConflictImpl>> map = new TreeMap<>();
|
182
|
stream.forEach(c -> {
|
183
|
if (!map.containsKey(c.getGroup())) {
|
184
|
map.put(c.getGroup(), new TreeSet<>());
|
185
|
}
|
186
|
map.get(c.getGroup()).add(new OrganizationConflictImpl(c.getId1(), c.getName1(), c.getType1(), c.getCity1(), c.getCountry1()));
|
187
|
map.get(c.getGroup()).add(new OrganizationConflictImpl(c.getId2(), c.getName2(), c.getType2(), c.getCity2(), c.getCountry2()));
|
188
|
});
|
189
|
return map.values();
|
190
|
}
|
191
|
|
192
|
@RequestMapping(value = "/duplicates", method = RequestMethod.POST)
|
193
|
public List<OpenaireDuplicate> duplicates(@RequestBody final List<OpenaireDuplicate> simrels, final Authentication authentication) {
|
194
|
|
195
|
final boolean b = UserInfo.isSuperAdmin(authentication)
|
196
|
|| simrels.stream()
|
197
|
.map(OpenaireDuplicate::getLocalId)
|
198
|
.distinct()
|
199
|
.allMatch(id -> userCountryRepository.verifyAuthorizationForId(id, authentication.getName()));
|
200
|
|
201
|
if (b) {
|
202
|
return openaireDuplicateRepository.saveAll(simrels);
|
203
|
} else {
|
204
|
throw new RuntimeException("User not authorized");
|
205
|
}
|
206
|
}
|
207
|
|
208
|
@RequestMapping(value = "/search/{page}/{size}", method = RequestMethod.GET)
|
209
|
public Page<OrganizationSimpleView> search(@PathVariable final int page,
|
210
|
@PathVariable final int size,
|
211
|
@RequestParam final String q,
|
212
|
final Authentication authentication) {
|
213
|
return UserInfo.isSuperAdmin(authentication)
|
214
|
? organizationSimpleViewRepository.findByNameContainingIgnoreCase(q, PageRequest.of(page, size))
|
215
|
: organizationSimpleViewRepository.findByNameForUser(q, authentication.getName(), PageRequest.of(page, size));
|
216
|
}
|
217
|
|
218
|
@RequestMapping(value = "/byCountry/{code}/{page}/{size}", method = RequestMethod.GET)
|
219
|
public Page<OrganizationSimpleView> findByCountry(@PathVariable final String code,
|
220
|
@PathVariable final int page,
|
221
|
@PathVariable final int size,
|
222
|
final Authentication authentication) {
|
223
|
if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForCountry(code, authentication.getName())) {
|
224
|
return organizationSimpleViewRepository.findByCountry(code, PageRequest.of(page, size));
|
225
|
} else {
|
226
|
throw new RuntimeException("User not authorized");
|
227
|
}
|
228
|
}
|
229
|
|
230
|
@RequestMapping(value = "/byType/{type}/{page}/{size}", method = RequestMethod.GET)
|
231
|
public Page<OrganizationSimpleView> findByType(@PathVariable final String type,
|
232
|
@PathVariable final int page,
|
233
|
@PathVariable final int size,
|
234
|
final Authentication authentication) {
|
235
|
return UserInfo.isSuperAdmin(authentication)
|
236
|
? organizationSimpleViewRepository.findByType(type, PageRequest.of(page, size))
|
237
|
: organizationSimpleViewRepository.findByTypeForUser(type, authentication.getName(), PageRequest.of(page, size));
|
238
|
}
|
239
|
|
240
|
@RequestMapping(value = "/browse/countries", method = RequestMethod.GET)
|
241
|
public List<BrowseEntry> browseCountries(final Authentication authentication) {
|
242
|
return UserInfo.isSuperAdmin(authentication)
|
243
|
? organizationSimpleViewRepository.browseCountries()
|
244
|
: organizationSimpleViewRepository.browseCountriesForUser(authentication.getName());
|
245
|
}
|
246
|
|
247
|
@RequestMapping(value = "/browse/types", method = RequestMethod.GET)
|
248
|
public List<BrowseEntry> browseOrganizationTypes(final Authentication authentication) {
|
249
|
return UserInfo.isSuperAdmin(authentication)
|
250
|
? organizationSimpleViewRepository.browseTypes()
|
251
|
: organizationSimpleViewRepository.browseTypesForUser(authentication.getName());
|
252
|
}
|
253
|
|
254
|
@RequestMapping(value = "/conflicts/fix/{masterId}", method = RequestMethod.POST)
|
255
|
public List<Relationship> fixConflicts(final Authentication authentication, @PathVariable final String masterId, @RequestBody final List<String> otherIds) {
|
256
|
if (UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForId(masterId, authentication.getName())) {
|
257
|
|
258
|
return otherIds.stream()
|
259
|
.filter(id -> UserInfo.isSuperAdmin(authentication) || userCountryRepository.verifyAuthorizationForId(id, authentication.getName()))
|
260
|
.map(id -> databaseUtils.makeRelation(masterId, id, RelationType.Merges))
|
261
|
.flatMap(List::stream)
|
262
|
.collect(Collectors.toList());
|
263
|
|
264
|
} else {
|
265
|
return new ArrayList<>();
|
266
|
}
|
267
|
|
268
|
}
|
269
|
|
270
|
}
|