
Doc https://docs.google.com/document/d/1gOAceevwutF3QHYWD0_6aESQMZEiIz3YVBVXlyUuRy8 * Summit Registration External Feed https://docs.google.com/document/d/1_2QZUK--A350jxh2USKBtVtisKrrcUcVjdKnbcZ7-4M/edit# * Multi Stripe Config * Added stripe payment configuration per summit * Added webhook automatic creation * Added CRUD endpoints for payment profiles per summit GET api/v1/summits/{id}/payment-gateway-profiles filters active ['=='] application_type ['=@', '=='] scopes summits/read/all summits/payment-gateway-profiles/read POST api/v1/summits/{id}/payment-gateway-profiles payload 'active' => 'sometimes|boolean', 'application_type' => 'sometimes|string|in:Registration,BookableRooms' 'provider' => 'required|string|in:Stripe', 'test_mode_enabled' => 'required|boolean', 'live_secret_key' => 'sometimes|string', 'live_publishable_key' => 'required_with:live_secret_key|string', 'test_secret_key' => 'sometimes|string', 'test_publishable_key' => 'required_with:test_secret_key|string' scopes summits/write summits/payment-gateway-profiles/write GET api/v1/summits/{id}/payment-gateway-profiles/{payment_profile_id} scopes summits/read/all summits/payment-gateway-profiles/read PUT api/v1/summits/{id}/payment-gateway-profiles/{payment_profile_id} payload 'active' => 'sometimes|boolean', 'application_type' => 'sometimes|string|in:Registration,BookableRooms' 'provider' => 'required|string|in:Stripe', 'test_mode_enabled' => 'required|boolean', 'live_secret_key' => 'sometimes|string', 'live_publishable_key' => 'required_with:live_secret_key|string', 'test_secret_key' => 'sometimes|string', 'test_publishable_key' => 'required_with:test_secret_key|string' scopes summits/payment-gateway-profiles/write summits/write DELETE api/v1/summits/{id}/payment-gateway-profiles/{payment_profile_id} scopes summits/payment-gateway-profiles/write summits/write Stripe Webhooks default webhook (SECRET set per application under .env, should be created previously on stripe default account) POST api/public/v1/summits/all/payments/{application_name}/confirm where application_name could be Registration or BookableRooms otherwise if a stripe account is set per summit, when the profile gets activated a webhook will be automatically be created using following url POST api/public/v1/summits/{id}/payments/{application_name}/confirm * Email API Integration * moved all blade templates to mail api ( DB Seeding) * defined email events flows per summmit * created endpoint to set up templates per email events on each flow PUT /api/v1/summits/{id}/email-flows-events/{event_id} payload email_template_identifier: string * added endpoint to get all email events per summit GET /api/v1/summits/{id}/email-flows-events * added endpoint to get email event per summit/id GET /api/v1/summits/{id}/email-flows-events/{event_id} Summit Documents endpoints add summit document POST /api/v1/summits/{id}/summit-documents payload file (mandatory|file stream) label ( mandatory|string) name ( mandatory|string) description (optional|string) get all summit documents GET /api/v1/summits/{id}/summit-documents get by id GET /api/v1/summits/{id}/summit-documents/{document_id} update PUT GET /api/v1/summits/{id}/summit-documents/{document_id} file (optional|file stream) label (optional|string) name (optional|string) description (optional|string) delete DELETE GET /api/v1/summits/{id}/summit-documents/{document_id} add event type to doc PUT /api/v1/summits/{id}/summit-documents/{document_id}/event-types/{event_type_id} delete event type from doc DELETE /api/v1/summits/{id}/summit-documents/{document_id}/event-types/{event_type_id} add document to event type PUT /api/v1/summits/{id}/event-types/{event_type_id}/summit-documents/{document_id} delete document from event type DELETE /api/v1/summits/{id}/event-types/{event_type_id}/summit-documents/{document_id} Updated Summit events to support streaming url, meeting_url and etherpad link * Summit Registration - Invite only Summit Administrator Permission Groups GET /api/v1/summit-administrator-groups filter * title * member_first_name * member_last_name * member_full_name * member_email * summit_id * member_id ordering id title scopes %s/summit-administrator-groups/read /api/v1/summit-administrator-groups/{group_id} scopes %s/summit-administrator-groups/read POST /api/v1/summit-administrator-groups title summits members scopes %s/summit-administrator-groups/write PUT /api/v1/summit-administrator-groups/{group_id} title summits members scopes %s/summit-administrator-groups/write DELETE /api/v1/summit-administrator-groups/{group_id} scopes %s/summit-administrator-groups/write PUT /api/v1/summit-administrator-groups/{group_id}/members/{member_id} DELETE /api/v1/summit-administrator-groups/{group_id}/members/{member_id} PUT /api/v1/summit-administrator-groups/{group_id}/summits/{summit_id} DELETE /api/v1/summit-administrator-groups/{group_id}/summits/{summit_id} Room Metrics PUT /api/v1/summits/{id}/members/{member_id}/schedule/{event_id}/enter Scopes %s/me/summits/events/enter PUT /api/v1/summits/{id}/members/{member_id}/schedule/{event_id}/leave %s/me/summits/events/leave update summit_event serializer new fields total_attendance_count current_attendance_count attendance current_attendance Added new Speakers Endpoints GET /api/v1/summits/{id}/speakers/on-schedule retrieves all speakers on summit schedule filters 'first_name' => ['=@', '=='], 'last_name' => ['=@', '=='], 'email' => ['=@', '=='], 'id' => ['=='], 'full_name' => ['=@', '=='], 'start_date' => ['>', '<', '<=', '>=', '=='], 'end_date' => ['>', '<', '<=', '>=', '=='], Summit Events Image POST /api/v1/summits/{id}/events/{event_id}/image DELETE /api/v1/summits/{id}/events/{event_id}/image Speakers Image Big Pic POST /api/v1/speakers/{speaker_id}/big-photo DELETE /api/v1/speakers/{speaker_id}/big-photo CFP - multiple summits Presentation Materials - Media Uploads New Endpoints GET api/v1/summit-media-file-types filter 'name' => ['=@', '=='] order id, name POST api/v1/summit-media-file-types payload 'name' => 'required|string|max:255', 'description' => 'sometimes|string|max:255', 'allowed_extensions' => 'required|string_array', GET api/v1/summit-media-file-types/{id} PUT api/v1/summit-media-file-types/{id} payload 'name' => 'sometimes|string|max:255', 'description' => 'sometimes|string|max:255', 'allowed_extensions' => 'required|string_array', DELETE api/v1/summit-media-file-types/{id} GET api/v1/summits/{id}/media-upload-types POST payload 'name' => 'required|string|max:255', 'description' => 'sometimes|string|max:255', 'is_mandatory' => 'required|boolean', 'max_size' => 'required|int|megabyte_aligned', 'private_storage_type' => 'required|string|in:None,DropBox,Swift,Local', 'public_storage_type' => 'required|string|in:None,DropBox,Swift,Local' 'type_id' => 'required|int', 'presentation_types' => 'sometimes|int_array', GET api/v1/summits/{id}/media-upload-types/{media_upload_type_id} PUT api/v1/summits/{id}/media-upload-types/{media_upload_type_id} payload 'name' => 'sometimes|string|max:255', 'description' => 'sometimes|string|max:255', 'is_mandatory' => 'sometimes|boolean', 'max_size' => 'sometimes|int|megabyte_aligned', 'private_storage_type' => 'sometimes|string|in:None,DropBox,Swift,Local', 'public_storage_type' => 'sometimes|string|in:None,DropBox,Swift,Local' 'type_id' => 'sometimes|int', 'presentation_types' => 'sometimes|int_array', DELETE api/v1/summits/{id}/media-upload-types/{media_upload_type_id} PUT api/v1/summits/{id}/media-upload-types/{media_upload_type_id}/presentation-types/{event_type_id} DELETE api/v1/summits/{id}/media-upload-types/{media_upload_type_id}/presentation-types/{event_type_id} GET api/v1/summits/{id}/presentations/{presentation_id}/media-uploads POST api/v1/summits/{id}/presentations/{presentation_id}/media-uploads payload multiform file media_upload_type_id GET api/v1/summits/{id}/presentations/{presentation_id}/media-uploads/{media_upload_id} PUT api/v1/summits/{id}/presentations/{presentation_id}/media-uploads/{media_upload_id} payload multiform file DELETE api/v1/summits/{id}/presentations/{presentation_id}/media-uploads/{media_upload_id} POST /api/v1/summits/{id}/media-upload-types/all/clone/{to_summit_id} Summit Invitation Only endpoints V2 CRUD invitations Change-Id: Ia23c247a59c3810f2a738265efdd890fe6f59dfb Signed-off-by: smarcet <smarcet@gmail.com>
718 lines
27 KiB
PHP
718 lines
27 KiB
PHP
<?php namespace App\Http\Controllers;
|
|
/**
|
|
* Copyright 2016 OpenStack Foundation
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
**/
|
|
|
|
use App\Http\Exceptions\HTTP403ForbiddenException;
|
|
use App\Models\Foundation\Main\IGroup;
|
|
use App\Models\Foundation\Summit\Registration\IBuildDefaultPaymentGatewayProfileStrategy;
|
|
use Exception;
|
|
use Illuminate\Support\Facades\Input;
|
|
use Illuminate\Support\Facades\Log;
|
|
use Illuminate\Support\Facades\Request;
|
|
use Illuminate\Support\Facades\Validator;
|
|
use models\exceptions\EntityNotFoundException;
|
|
use models\exceptions\ValidationException;
|
|
use models\main\SummitAdministratorPermissionGroup;
|
|
use models\oauth2\IResourceServerContext;
|
|
use models\summit\ConfirmationExternalOrderRequest;
|
|
use models\summit\IEventFeedbackRepository;
|
|
use models\summit\ISpeakerRepository;
|
|
use models\summit\ISummitEventRepository;
|
|
use models\summit\ISummitRepository;
|
|
use ModelSerializers\ISerializerTypeSelector;
|
|
use ModelSerializers\SerializerRegistry;
|
|
use services\model\ISummitService;
|
|
use utils\Filter;
|
|
use utils\FilterElement;
|
|
use utils\Order;
|
|
use utils\OrderElement;
|
|
use Illuminate\Http\Request as LaravelRequest;
|
|
|
|
|
|
/**
|
|
* Class OAuth2SummitApiController
|
|
* @package App\Http\Controllers
|
|
*/
|
|
final class OAuth2SummitApiController extends OAuth2ProtectedController
|
|
{
|
|
|
|
/**
|
|
* @var IBuildDefaultPaymentGatewayProfileStrategy
|
|
*/
|
|
private $build_default_payment_gateway_profile_strategy;
|
|
|
|
/**
|
|
* @var ISummitService
|
|
*/
|
|
private $summit_service;
|
|
|
|
/**
|
|
* @var ISpeakerRepository
|
|
*/
|
|
private $speaker_repository;
|
|
|
|
/**
|
|
* @var ISummitEventRepository
|
|
*/
|
|
private $event_repository;
|
|
|
|
/**
|
|
* @var IEventFeedbackRepository
|
|
*/
|
|
private $event_feedback_repository;
|
|
|
|
/**
|
|
* @var ISerializerTypeSelector
|
|
*/
|
|
private $serializer_type_selector;
|
|
|
|
/**
|
|
* OAuth2SummitApiController constructor.
|
|
* @param ISummitRepository $summit_repository
|
|
* @param ISummitEventRepository $event_repository
|
|
* @param ISpeakerRepository $speaker_repository
|
|
* @param IEventFeedbackRepository $event_feedback_repository
|
|
* @param ISummitService $summit_service
|
|
* @param ISerializerTypeSelector $serializer_type_selector
|
|
* @param IBuildDefaultPaymentGatewayProfileStrategy $build_default_payment_gateway_profile_strategy
|
|
* @param IResourceServerContext $resource_server_context
|
|
*/
|
|
public function __construct
|
|
(
|
|
ISummitRepository $summit_repository,
|
|
ISummitEventRepository $event_repository,
|
|
ISpeakerRepository $speaker_repository,
|
|
IEventFeedbackRepository $event_feedback_repository,
|
|
ISummitService $summit_service,
|
|
ISerializerTypeSelector $serializer_type_selector,
|
|
IBuildDefaultPaymentGatewayProfileStrategy $build_default_payment_gateway_profile_strategy,
|
|
IResourceServerContext $resource_server_context
|
|
)
|
|
{
|
|
parent::__construct($resource_server_context);
|
|
|
|
$this->repository = $summit_repository;
|
|
$this->speaker_repository = $speaker_repository;
|
|
$this->event_repository = $event_repository;
|
|
$this->event_feedback_repository = $event_feedback_repository;
|
|
$this->serializer_type_selector = $serializer_type_selector;
|
|
$this->build_default_payment_gateway_profile_strategy = $build_default_payment_gateway_profile_strategy;
|
|
$this->summit_service = $summit_service;
|
|
}
|
|
|
|
use ParametrizedGetAll;
|
|
|
|
|
|
/**
|
|
* @return mixed
|
|
*/
|
|
public function getSummits()
|
|
{
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && $current_member->isSummitAdmin() && !$current_member->hasAllowedSummits()) {
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for any Summit", $current_member->getId())]);
|
|
}
|
|
|
|
return $this->_getAll(
|
|
function () {
|
|
return [
|
|
'name' => ['=@', '=='],
|
|
'start_date' => ['==', '<', '>', '<=', '>='],
|
|
'end_date' => ['==', '<', '>', '<=', '>='],
|
|
'registration_begin_date' => ['==', '<', '>', '<=', '>='],
|
|
'registration_end_date' => ['==', '<', '>', '<=', '>='],
|
|
'ticket_types_count' => ['==', '<', '>', '<=', '>=', '<>'],
|
|
];
|
|
},
|
|
function () {
|
|
return [
|
|
'name' => 'sometimes|required|string',
|
|
'start_date' => 'sometimes|required|date_format:U',
|
|
'end_date' => 'sometimes|required_with:start_date|date_format:U|after:start_date',
|
|
'registration_begin_date' => 'sometimes|required|date_format:U',
|
|
'registration_end_date' => 'sometimes|required_with:start_date|date_format:U|after:registration_begin_date',
|
|
'ticket_types_count' => 'sometimes|required|integer'
|
|
];
|
|
},
|
|
function () {
|
|
return [
|
|
'id',
|
|
'name',
|
|
'begin_date',
|
|
'registration_begin_date'
|
|
];
|
|
},
|
|
function ($filter) use ($current_member) {
|
|
if ($filter instanceof Filter) {
|
|
$filter->addFilterCondition(FilterElement::makeEqual('available_on_api', '1'));
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && $current_member->isSummitAdmin()) {
|
|
// filter only the ones that we are allowed to see
|
|
$filter->addFilterCondition
|
|
(
|
|
FilterElement::makeEqual
|
|
(
|
|
'summit_id',
|
|
$current_member->getAllAllowedSummitsIds(),
|
|
"OR"
|
|
|
|
)
|
|
);
|
|
|
|
}
|
|
}
|
|
return $filter;
|
|
},
|
|
function () {
|
|
return $this->serializer_type_selector->getSerializerType();
|
|
},
|
|
function () {
|
|
return new Order([
|
|
OrderElement::buildAscFor("begin_date"),
|
|
]);
|
|
},
|
|
function () {
|
|
return PHP_INT_MAX;
|
|
},
|
|
null,
|
|
[
|
|
'build_default_payment_gateway_profile_strategy' => $this->build_default_payment_gateway_profile_strategy
|
|
]
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @return mixed
|
|
*/
|
|
public function getAllSummits()
|
|
{
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && $current_member->isSummitAdmin() && !$current_member->hasAllowedSummits()) {
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for any Summit", $current_member->getId())]);
|
|
}
|
|
|
|
return $this->_getAll(
|
|
function () {
|
|
return [
|
|
'name' => ['=@', '=='],
|
|
'start_date' => ['==', '<', '>', '=>', '>='],
|
|
'end_date' => ['==', '<', '>', '=>', '>='],
|
|
'registration_begin_date' => ['==', '<', '>', '=>', '>='],
|
|
'registration_end_date' => ['==', '<', '>', '=>', '>='],
|
|
'ticket_types_count' => ['==', '<', '>', '=>', '>=', '<>'],
|
|
'submission_begin_date' => ['==', '<', '>', '=>', '>='],
|
|
'submission_end_date' => ['==', '<', '>', '=>', '>='],
|
|
'selection_plan_enabled' => ['=='],
|
|
];
|
|
},
|
|
function () {
|
|
return [
|
|
'name' => 'sometimes|required|string',
|
|
'start_date' => 'sometimes|required|date_format:U',
|
|
'end_date' => 'sometimes|required_with:start_date|date_format:U|after:start_date',
|
|
'registration_begin_date' => 'sometimes|required|date_format:U',
|
|
'registration_end_date' => 'sometimes|required_with:start_date|date_format:U|after:registration_begin_date',
|
|
'ticket_types_count' => 'sometimes|required|integer',
|
|
'submission_begin_date' => 'sometimes|required|date_format:U',
|
|
'submission_end_date' => 'sometimes|required_with:submission_begin_date|date_format:U',
|
|
'selection_plan_enabled' => 'sometimes|required|boolean',
|
|
];
|
|
},
|
|
function () {
|
|
return [
|
|
'id',
|
|
'name',
|
|
'start_date',
|
|
'registration_begin_date'
|
|
];
|
|
},
|
|
function ($filter) use ($current_member) {
|
|
if ($filter instanceof Filter) {
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && $current_member->isSummitAdmin()) {
|
|
// filter only the ones that we are allowed to see
|
|
$filter->addFilterCondition
|
|
(
|
|
FilterElement::makeEqual
|
|
(
|
|
'summit_id',
|
|
$current_member->getAllAllowedSummitsIds(),
|
|
"OR"
|
|
|
|
)
|
|
);
|
|
|
|
}
|
|
}
|
|
return $filter;
|
|
},
|
|
function () {
|
|
return $this->serializer_type_selector->getSerializerType();
|
|
}
|
|
,
|
|
function () {
|
|
return new Order([
|
|
OrderElement::buildAscFor("begin_date"),
|
|
]);
|
|
},
|
|
function () {
|
|
return PHP_INT_MAX;
|
|
},
|
|
null,
|
|
[
|
|
'build_default_payment_gateway_profile_strategy' => $this->build_default_payment_gateway_profile_strategy
|
|
]
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @return mixed
|
|
*/
|
|
public function getSummit($summit_id)
|
|
{
|
|
$expand = Request::input('expand', '');
|
|
try {
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
$serializer_type = $this->serializer_type_selector->getSerializerType();
|
|
return $this->ok
|
|
(
|
|
SerializerRegistry::getInstance()
|
|
->getSerializer($summit, $serializer_type)
|
|
->serialize($expand, [], [], [
|
|
'build_default_payment_gateway_profile_strategy' => $this->build_default_payment_gateway_profile_strategy
|
|
])
|
|
);
|
|
} catch (HTTP403ForbiddenException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error403();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @return \Illuminate\Http\JsonResponse|mixed
|
|
*/
|
|
public function getAllCurrentSummit()
|
|
{
|
|
$expand = Request::input('expand', '');
|
|
|
|
try {
|
|
$summit = $this->repository->getCurrent();
|
|
if (is_null($summit)) return $this->error404();
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
$serializer_type = $this->serializer_type_selector->getSerializerType();
|
|
return $this->ok
|
|
(
|
|
SerializerRegistry::getInstance()
|
|
->getSerializer($summit, $serializer_type)
|
|
->serialize($expand, [], [], [
|
|
'build_default_payment_gateway_profile_strategy' => $this->build_default_payment_gateway_profile_strategy
|
|
])
|
|
);
|
|
} catch (HTTP403ForbiddenException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error403();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $id
|
|
* @return \Illuminate\Http\JsonResponse|mixed
|
|
*/
|
|
public function getAllSummitByIdOrSlug($id)
|
|
{
|
|
|
|
$expand = Request::input('expand', '');
|
|
|
|
try {
|
|
$summit = $this->repository->getById(intval($id));
|
|
if (is_null($summit))
|
|
$summit = $this->repository->getBySlug(trim($id));
|
|
|
|
if (is_null($summit)) return $this->error404();
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
|
|
$serializer_type = $this->serializer_type_selector->getSerializerType();
|
|
|
|
return $this->ok
|
|
(
|
|
SerializerRegistry::getInstance()
|
|
->getSerializer($summit, $serializer_type)
|
|
->serialize($expand, [], [],
|
|
[
|
|
'build_default_payment_gateway_profile_strategy' => $this->build_default_payment_gateway_profile_strategy
|
|
])
|
|
);
|
|
} catch (HTTP403ForbiddenException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error403();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @return mixed
|
|
*/
|
|
public function addSummit()
|
|
{
|
|
try {
|
|
|
|
if (!Request::isJson()) return $this->error400();
|
|
$payload = Input::json()->all();
|
|
|
|
$rules = SummitValidationRulesFactory::build($payload);
|
|
// Creates a Validator instance and validates the data.
|
|
$validation = Validator::make($payload, $rules, $messages = [
|
|
'slug.required' => 'A Slug is required.',
|
|
'schedule_start_date.before_or_equal' => 'Show on schedule page needs to be after the start of the Show And Before of the Show End.',
|
|
]);
|
|
|
|
if ($validation->fails()) {
|
|
$messages = $validation->messages()->toArray();
|
|
|
|
return $this->error412
|
|
(
|
|
$messages
|
|
);
|
|
}
|
|
|
|
$summit = $this->summit_service->addSummit($payload);
|
|
$serializer_type = $this->serializer_type_selector->getSerializerType();
|
|
return $this->created(SerializerRegistry::getInstance()->getSerializer($summit, $serializer_type)->serialize());
|
|
} catch (ValidationException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error412([$ex1->getMessage()]);
|
|
} catch (EntityNotFoundException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error404(['message' => $ex2->getMessage()]);
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @return mixed
|
|
*/
|
|
public function updateSummit($summit_id)
|
|
{
|
|
try {
|
|
|
|
if (!Request::isJson()) return $this->error400();
|
|
$payload = Input::json()->all();
|
|
|
|
$rules = SummitValidationRulesFactory::build($payload, true);
|
|
// Creates a Validator instance and validates the data.
|
|
$validation = Validator::make($payload, $rules);
|
|
|
|
if ($validation->fails()) {
|
|
$messages = $validation->messages()->toArray();
|
|
|
|
return $this->error412
|
|
(
|
|
$messages
|
|
);
|
|
}
|
|
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
|
|
$summit = $this->summit_service->updateSummit($summit_id, $payload);
|
|
$serializer_type = $this->serializer_type_selector->getSerializerType();
|
|
return $this->updated(SerializerRegistry::getInstance()->getSerializer($summit, $serializer_type)->serialize());
|
|
} catch (ValidationException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error412([$ex1->getMessage()]);
|
|
} catch (EntityNotFoundException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error404(['message' => $ex2->getMessage()]);
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @return mixed
|
|
*/
|
|
public function deleteSummit($summit_id)
|
|
{
|
|
try {
|
|
|
|
$this->summit_service->deleteSummit($summit_id);
|
|
|
|
return $this->deleted();
|
|
} catch (ValidationException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error412([$ex1->getMessage()]);
|
|
} catch (EntityNotFoundException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error404(['message' => $ex2->getMessage()]);
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @return mixed
|
|
*/
|
|
public function getSummitEntityEvents($summit_id)
|
|
{
|
|
try {
|
|
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
$current_member_id = is_null($current_member) ? null : $current_member->getId();
|
|
|
|
$last_event_id = Request::input('last_event_id', null);
|
|
$from_date = Request::input('from_date', null);
|
|
$limit = Request::input('limit', 25);
|
|
|
|
$rules = [
|
|
'last_event_id' => 'sometimes|required|integer',
|
|
'from_date' => 'sometimes|required|integer',
|
|
'limit' => 'sometimes|required|integer',
|
|
];
|
|
|
|
$data = [];
|
|
|
|
if (!is_null($last_event_id)) {
|
|
$data['last_event_id'] = $last_event_id;
|
|
}
|
|
|
|
if (!is_null($from_date)) {
|
|
$data['from_date'] = $from_date;
|
|
}
|
|
|
|
if (!is_null($limit)) {
|
|
$data['limit'] = $limit;
|
|
}
|
|
|
|
// Creates a Validator instance and validates the data.
|
|
$validation = Validator::make($data, $rules);
|
|
|
|
if ($validation->fails()) {
|
|
$messages = $validation->messages()->toArray();
|
|
|
|
return $this->error412
|
|
(
|
|
$messages
|
|
);
|
|
}
|
|
|
|
if (!is_null($from_date)) {
|
|
$from_date = new \DateTime("@$from_date", new \DateTimeZone("UTC"));
|
|
}
|
|
|
|
list($last_event_id, $last_event_date, $list) = $this->summit_service->getSummitEntityEvents
|
|
(
|
|
$summit,
|
|
$current_member_id,
|
|
$from_date,
|
|
intval($last_event_id),
|
|
intval($limit)
|
|
);
|
|
|
|
return $this->ok
|
|
(
|
|
//todo: send this new response once that testing is done!
|
|
/*array
|
|
(
|
|
'events' => $list,
|
|
'last_event_id' => $last_event_id,
|
|
'last_event_date' => $last_event_date->getTimestamp()
|
|
)*/
|
|
$list
|
|
);
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @param $external_order_id
|
|
* @return mixed
|
|
*/
|
|
public function getExternalOrder($summit_id, $external_order_id)
|
|
{
|
|
try {
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
$order = $this->summit_service->getExternalOrder($summit, $external_order_id);
|
|
return $this->ok($order);
|
|
} catch (EntityNotFoundException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error404(array('message' => $ex1->getMessage()));
|
|
} catch (ValidationException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error412($ex2->getMessages());
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @param $external_order_id
|
|
* @param $external_attendee_id
|
|
* @return mixed
|
|
*/
|
|
public function confirmExternalOrderAttendee($summit_id, $external_order_id, $external_attendee_id)
|
|
{
|
|
try {
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (is_null($current_member)) throw new \HTTP401UnauthorizedException;
|
|
|
|
$attendee = $this->summit_service->confirmExternalOrderAttendee
|
|
(
|
|
new ConfirmationExternalOrderRequest
|
|
(
|
|
$summit,
|
|
$current_member->getId(),
|
|
trim($external_order_id),
|
|
trim($external_attendee_id)
|
|
)
|
|
);
|
|
|
|
return $this->ok(SerializerRegistry::getInstance()->getSerializer($attendee)->serialize());
|
|
} catch (EntityNotFoundException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error404(array('message' => $ex1->getMessage()));
|
|
} catch (ValidationException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error412($ex2->getMessages());
|
|
} catch (\HTTP401UnauthorizedException $ex3) {
|
|
Log::warning($ex3);
|
|
return $this->error401();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @return ISummitRepository
|
|
*/
|
|
protected function getSummitRepository(): ISummitRepository
|
|
{
|
|
return $this->repository;
|
|
}
|
|
|
|
/**
|
|
* @param LaravelRequest $request
|
|
* @param $summit_id
|
|
* @return \Illuminate\Http\JsonResponse|mixed
|
|
*/
|
|
public function addSummitLogo(LaravelRequest $request, $summit_id)
|
|
{
|
|
try {
|
|
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
|
|
$file = $request->file('file');
|
|
if (is_null($file)) {
|
|
return $this->error412(array('file param not set!'));
|
|
}
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
|
|
$photo = $this->summit_service->addSummitLogo($summit_id, $file);
|
|
|
|
return $this->created(SerializerRegistry::getInstance()->getSerializer($photo)->serialize());
|
|
|
|
} catch (EntityNotFoundException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error404();
|
|
} catch (ValidationException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error412(array($ex2->getMessage()));
|
|
} catch (\HTTP401UnauthorizedException $ex3) {
|
|
Log::warning($ex3);
|
|
return $this->error401();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param $summit_id
|
|
* @return \Illuminate\Http\JsonResponse|mixed
|
|
*/
|
|
public function deleteSummitLogo($summit_id)
|
|
{
|
|
try {
|
|
|
|
$summit = SummitFinderStrategyFactory::build($this->repository, $this->resource_server_context)->find($summit_id);
|
|
if (is_null($summit)) return $this->error404();
|
|
|
|
$current_member = $this->resource_server_context->getCurrentUser();
|
|
if (!is_null($current_member) && !$current_member->isAdmin() && !$current_member->hasPermissionForOnGroup($summit, IGroup::SummitAdministrators))
|
|
return $this->error403(['message' => sprintf("Member %s has not permission for this Summit", $current_member->getId())]);
|
|
|
|
$this->summit_service->deleteSummitLogo($summit_id);
|
|
|
|
return $this->deleted();
|
|
|
|
} catch (EntityNotFoundException $ex1) {
|
|
Log::warning($ex1);
|
|
return $this->error404();
|
|
} catch (ValidationException $ex2) {
|
|
Log::warning($ex2);
|
|
return $this->error412(array($ex2->getMessage()));
|
|
} catch (\HTTP401UnauthorizedException $ex3) {
|
|
Log::warning($ex3);
|
|
return $this->error401();
|
|
} catch (Exception $ex) {
|
|
Log::error($ex);
|
|
return $this->error500($ex);
|
|
}
|
|
}
|
|
|
|
} |