1- package com.saveourtool.save.backend .controllers.vulnerability
1+ package com.saveourtool.save.cosv .controllers
22
33import com.saveourtool.save.authservice.utils.username
4- import com.saveourtool.save.backend.security.VulnerabilityPermissionEvaluator
5- import com.saveourtool.save.backend.service.LnkUserOrganizationService
6- import com.saveourtool.save.backend.service.vulnerability.VulnerabilityService
7- import com.saveourtool.save.backend.utils.hasRole
4+ import com.saveourtool.save.backend.service.IBackendService
85import com.saveourtool.save.configs.ApiSwaggerSupport
96import com.saveourtool.save.configs.RequiresAuthorizationSourceHeader
7+ import com.saveourtool.save.cosv.security.VulnerabilityPermissionEvaluator
108import com.saveourtool.save.cosv.service.CosvService
9+ import com.saveourtool.save.cosv.service.VulnerabilityMetadataDtoList
10+ import com.saveourtool.save.cosv.service.VulnerabilityService
11+ import com.saveourtool.save.cosv.utils.hasRole
1112import com.saveourtool.save.domain.Role
1213import com.saveourtool.save.entities.cosv.VulnerabilityExt
1314import com.saveourtool.save.entities.cosv.VulnerabilityMetadataDto
14- import com.saveourtool.save.entities.vulnerability.*
15+ import com.saveourtool.save.entities.vulnerability.VulnerabilityDateDto
16+ import com.saveourtool.save.entities.vulnerability.VulnerabilityProjectDto
17+ import com.saveourtool.save.entities.vulnerability.VulnerabilityStatus
1518import com.saveourtool.save.filters.VulnerabilityFilter
1619import com.saveourtool.save.info.UserInfo
1720import com.saveourtool.save.permission.Permission
@@ -33,8 +36,6 @@ import reactor.core.publisher.Flux
3336import reactor.core.publisher.Mono
3437import reactor.kotlin.core.publisher.toMono
3538
36- typealias VulnerabilityMetadataDtoList = List <VulnerabilityMetadataDto >
37-
3839/* *
3940 * Controller for working with vulnerabilities.
4041 */
@@ -48,7 +49,7 @@ class VulnerabilityController(
4849 private val vulnerabilityService : VulnerabilityService ,
4950 private val vulnerabilityPermissionEvaluator : VulnerabilityPermissionEvaluator ,
5051 private val cosvService : CosvService ,
51- private val lnkUserOrganizationService : LnkUserOrganizationService ,
52+ private val backendService : IBackendService ,
5253) {
5354 @PostMapping(" /by-filter" )
5455 @Operation(
@@ -96,7 +97,7 @@ class VulnerabilityController(
9697 if (! isPublicVulnerabilities && authentication != null ) {
9798 val isSuperAdmin = authentication.hasRole(Role .SUPER_ADMIN )
9899 val isOwner = filter.authorName?.let { it == authentication.username() } ? : false
99- val roleInOrganization = filter.organizationName?.let { lnkUserOrganizationService .getGlobalRoleOrOrganizationRole(authentication, it) }
100+ val roleInOrganization = filter.organizationName?.let { backendService .getGlobalRoleOrOrganizationRole(authentication, it) }
100101 val isAdminInOrganization = roleInOrganization?.isHigherOrEqualThan(Role .ADMIN ) ? : false
101102
102103 val isHasAdditionalRights = isSuperAdmin || isOwner || isAdminInOrganization
@@ -386,5 +387,5 @@ class VulnerabilityController(
386387 .switchIfEmptyToResponseException(HttpStatus .FORBIDDEN ) { " Permissions required for comment deletion were not granted." }
387388 .flatMap { blockingToMono { vulnerabilityService.deleteUser(userName, it) } }
388389 .switchIfEmptyToNotFound { " Could not find user." }
389- .map { StringResponse .ok(" Successfully deleted user from vulnerability." ) }
390+ .map { ResponseEntity .ok(" Successfully deleted user from vulnerability." ) }
390391}
0 commit comments