cloudfoundry/cloud_controller_ng

View on GitHub
app/controllers/v3/service_plan_visibility_controller.rb

Summary

Maintainability
A
2 hrs
Test Coverage
require 'presenters/v3/service_plan_visibility_presenter'
require 'fetchers/service_plan_visibility_fetcher'
require 'fetchers/service_plan_fetcher'
require 'controllers/v3/mixins/service_permissions'
require 'messages/service_plan_visibility_update_message'
require 'actions/v3/service_plan_visibility_update'
require 'actions/v3/service_plan_visibility_delete'

class ServicePlanVisibilityController < ApplicationController
  include ServicePermissions

  def show
    service_plan = ServicePlanFetcher.fetch(hashed_params[:guid])

    service_plan_not_found! unless service_plan.present? && visible_to_current_user?(plan: service_plan)

    visible_in_orgs = ServicePlanVisibilityFetcher.new(permission_queryer).fetch_orgs(
      service_plan_guids: [service_plan.guid]
    )
    presenter = Presenters::V3::ServicePlanVisibilityPresenter.new(service_plan, visible_in_orgs)
    render status: :ok, json: presenter.to_json
  end

  def update
    updated_service_plan = update_visibility
    visible_in_orgs = ServicePlanVisibilityFetcher.new(permission_queryer).fetch_orgs(
      service_plan_guids: [updated_service_plan.guid]
    )
    presenter = Presenters::V3::ServicePlanVisibilityPresenter.new(updated_service_plan, visible_in_orgs)
    render status: :ok, json: presenter.to_json
  end

  def apply
    updated_service_plan = update_visibility(append_organizations: true)
    presenter = Presenters::V3::ServicePlanVisibilityPresenter.new(updated_service_plan, nil)
    render status: :ok, json: presenter.to_json
  end

  def destroy
    service_plan = ServicePlanFetcher.fetch(hashed_params[:guid])
    service_plan_not_found! unless service_plan.present? && visible_to_current_user?(plan: service_plan)
    unauthorized! unless current_user_can_write?(service_plan)
    unprocessable!('Cannot delete visibilities from non-org-restricted plans') unless service_plan.visibility_type == ServicePlanVisibilityTypes::ORGANIZATION

    org = Organization.where(guid: hashed_params[:org_guid]).first
    resource_not_found!(:organization) if org.blank?

    to_delete = ServicePlanVisibility.where(service_plan: service_plan, organization: org).first
    resource_not_found!(:service_plan_visibility) if to_delete.blank?

    ServicePlanVisibilityDelete.delete(to_delete)
    event_repository.record_service_plan_delete_visibility_event(service_plan, org)
    head :no_content
  end

  private

  def event_repository
    VCAP::CloudController::Repositories::ServiceEventRepository::WithUserActor.new(user_audit_info)
  end

  def update_visibility(opts={})
    service_plan = ServicePlanFetcher.fetch(hashed_params[:guid])
    service_plan_not_found! unless service_plan.present? && visible_to_current_user?(plan: service_plan)
    unauthorized! unless current_user_can_write?(service_plan)

    message = ServicePlanVisibilityUpdateMessage.new(hashed_params[:body])
    bad_request!(message.errors.full_messages) unless message.valid?

    updated_service_plan = V3::ServicePlanVisibilityUpdate.new.update(service_plan, message, **opts)
    event_repository.record_service_plan_update_visibility_event(service_plan, message.audit_hash)
    updated_service_plan
  rescue V3::ServicePlanVisibilityUpdate::UnprocessableRequest => e
    unprocessable!(e.message)
  end

  def service_plan_not_found!
    resource_not_found!(:service_plan)
  end
end