Kibana and import normative API fix 39/26439/3
authorYuli Shlosberg <ys9693@att.com>
Mon, 18 Dec 2017 13:06:12 +0000 (15:06 +0200)
committerYuli Shlosberg <ys9693@att.com>
Mon, 25 Dec 2017 15:46:32 +0000 (15:46 +0000)
Change-Id: Ic365ed2122dc16f35b54a064166f4774650c9029
Issue-ID: SDC-265
Signed-off-by: Yuli Shlosberg <ys9693@att.com>
catalog-be/src/main/java/org/openecomp/sdc/be/servlets/AbstractValidationsServlet.java
sdc-os-chef/sdc-elasticsearch/chef-repo/cookbooks/sdc-elasticsearch/recipes/ES_3_create_audit_template.rb
sdc-os-chef/sdc-kibana/chef-repo/cookbooks/sdc-kibana/recipes/setup_kibana.rb
sdc-os-chef/sdc-kibana/chef-repo/cookbooks/sdc-kibana/templates/default/kibana.yml.erb
sdc-os-chef/sdc-sanity/chef-repo/cookbooks/sdc-sanity/templates/default/sdc-sanity.yaml.erb

index f1dd153..1625b50 100644 (file)
@@ -590,17 +590,26 @@ public abstract class AbstractValidationsServlet extends BeGenericServlet {
                        validateToscaTemplatePayloadName(responseWrapper, uploadResourceInfoWrapper.getInnerElement(), userWrapper.getInnerElement());
                }
                if (responseWrapper.isEmpty()) {
-                       validateResourceType(responseWrapper, uploadResourceInfoWrapper.getInnerElement(), userWrapper.getInnerElement());
+                       validateResourceType(responseWrapper, uploadResourceInfoWrapper.getInnerElement(), userWrapper.getInnerElement(), resourceAuthorityEnum);
                }
 
        }
 
-       private void validateResourceType(Wrapper<Response> responseWrapper, UploadResourceInfo uploadResourceInfo, User user) {
+       private void validateResourceType(Wrapper<Response> responseWrapper, UploadResourceInfo uploadResourceInfo, User user, ResourceAuthorityTypeEnum resourceAuthorityEnum) {
                String resourceType = uploadResourceInfo.getResourceType();
                if (resourceType == null || !ResourceTypeEnum.containsName(resourceType)) {
                        ResponseFormat responseFormat = getComponentsUtils().getResponseFormat(ActionStatus.INVALID_CONTENT);
                        Response errorResponse = buildErrorResponse(responseFormat);
-                       EnumMap<AuditingFieldsKeysEnum, Object> additionalParam = new EnumMap<AuditingFieldsKeysEnum, Object>(AuditingFieldsKeysEnum.class);
+                       EnumMap additionalParam = new EnumMap(AuditingFieldsKeysEnum.class);
+                       additionalParam.put(AuditingFieldsKeysEnum.AUDIT_RESOURCE_NAME, uploadResourceInfo.getName());
+                       getComponentsUtils().auditResource(responseFormat, user, null, "", "", AuditingActionEnum.IMPORT_RESOURCE, additionalParam);
+                       responseWrapper.setInnerElement(errorResponse);
+               }
+               if (resourceType.equals(ResourceTypeEnum.getTypeByName("VF").getValue()) && resourceAuthorityEnum == ResourceAuthorityTypeEnum.NORMATIVE_TYPE_BE){
+                       log.debug("Import of VF resource type is forbidden - VF resource import can be done using onboarding flow only");
+                       ResponseFormat responseFormat = getComponentsUtils().getResponseFormat(ActionStatus.INVALID_RESOURCE_TYPE);
+                       Response errorResponse = buildErrorResponse(responseFormat);
+                       EnumMap additionalParam = new EnumMap(AuditingFieldsKeysEnum.class);
                        additionalParam.put(AuditingFieldsKeysEnum.AUDIT_RESOURCE_NAME, uploadResourceInfo.getName());
                        getComponentsUtils().auditResource(responseFormat, user, null, "", "", AuditingActionEnum.IMPORT_RESOURCE, additionalParam);
                        responseWrapper.setInnerElement(errorResponse);
index 2d88263..4e8136c 100644 (file)
@@ -236,3 +236,10 @@ bash "create audit mapping" do
         "aliases": { "last_3_months": {}}}' http://localhost:9200/_template/audit_template
        EOH
 end
+
+bash "set default index for Kibana" do
+       code <<-EOH
+        curl -XPUT http://localhost:9200/.kibana/index-pattern/auditingevents-* -d '{"title" : "events-*",  "timeFieldName": "TIMESTAMP"}'
+        curl -XPUT http://localhost:9200/.kibana/config/4.3.3 -d '{"defaultIndex" : "auditingevents-*"}'
+    EOH
+end
index 7179a96..d2c9e7d 100644 (file)
@@ -21,7 +21,7 @@ elasticsearch.url: "http://<%= @catalog_host %>:<%= @catalog_port %>/sdc2/esGate
 # kibana.index: ".kibana"
 
 # The default application to load.
-# kibana.defaultAppId: "discover"
+kibana.defaultAppId: "dashboard/BI-Dashboard"
 
 # If your Elasticsearch is protected with basic auth, these are the user credentials
 # used by the Kibana server to perform maintenance on the kibana_index at startup. Your Kibana
index 91c09db..c57269c 100644 (file)
@@ -18,6 +18,7 @@ errorConfigurationFile: <%= @errorConfigurationFile %>
 configurationFile: <%= @ConfigurationFile %>
 importTypesConfigDir: <%= @importTypesDir %>
 titanPropertiesFile: <%= @titan_file %>
+systemUnderDebug: false
 
 cassandraHost: <%= @CASSANDRA_IP %>
 cassandraAuthenticate: true