code format
This commit is contained in:
parent
ae67b28d16
commit
866c9b2d9a
|
@ -15,11 +15,11 @@
|
|||
<param-value>org.gcube.service.idm.rest</param-value>
|
||||
</init-param>
|
||||
<init-param>
|
||||
<param-name>jersey.config.server.provider.packages</param-name>
|
||||
<param-value>
|
||||
<param-name>jersey.config.server.provider.packages</param-name>
|
||||
<param-value>
|
||||
org.gcube.service.idm.mappers
|
||||
</param-value>
|
||||
</init-param>
|
||||
</init-param>
|
||||
</servlet>
|
||||
<servlet-mapping>
|
||||
<servlet-name>idm</servlet-name>
|
||||
|
|
2
pom.xml
2
pom.xml
|
@ -281,7 +281,7 @@ java.lang.NoClassDefFoundError: org/apache/http/ssl/TrustStrategy
|
|||
|
||||
</exclusions>
|
||||
</dependency>
|
||||
<!--
|
||||
<!--
|
||||
<dependency>
|
||||
<groupId>org.gcube.resources.discovery</groupId>
|
||||
<artifactId>ic-client</artifactId>
|
||||
|
|
|
@ -24,7 +24,8 @@ import jakarta.ws.rs.WebApplicationException;
|
|||
public class AdminKeycloakController {
|
||||
private static final org.slf4j.Logger logger = LoggerFactory.getLogger(AdminKeycloakController.class);
|
||||
|
||||
// TODO: Using Keycloak Admin Client to create user with roles (Realm and Client level)
|
||||
// TODO: Using Keycloak Admin Client to create user with roles (Realm and Client
|
||||
// level)
|
||||
// https://gist.github.com/thomasdarimont/c4e739c5a319cf78a4cff3b87173a84b
|
||||
public static UserRepresentation createUser(String username, String email, String password, String firstName,
|
||||
String lastName, Map<String, List<String>> attributes, List<String> roles) throws WebApplicationException {
|
||||
|
|
|
@ -8,8 +8,6 @@ import org.gcube.common.security.Owner;
|
|||
import org.gcube.common.security.providers.SecretManagerProvider;
|
||||
import org.gcube.common.security.secrets.Secret;
|
||||
|
||||
|
||||
|
||||
public class AuthController {
|
||||
public final static String IDM_SERVICE_READ = "idm-service-read";
|
||||
public final static String IDM_SERVICE_ADMIN = "idm-service-admin";
|
||||
|
@ -61,9 +59,8 @@ public class AuthController {
|
|||
String access_token = getAccessToken();
|
||||
Owner owner = getOwner();
|
||||
|
||||
|
||||
for (String role : roles){
|
||||
if ( checkContextRole(role, owner) || checkRealmRole(role, access_token)){
|
||||
for (String role : roles) {
|
||||
if (checkContextRole(role, owner) || checkRealmRole(role, access_token)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -16,30 +16,30 @@ public class KCRolesController {
|
|||
private static final org.slf4j.Logger logger = LoggerFactory.getLogger(KCRolesController.class);
|
||||
|
||||
public enum REPRESENTATION {
|
||||
full, compact, name, id
|
||||
}
|
||||
full, compact, name, id
|
||||
}
|
||||
|
||||
public static Object formatListRoles(List<RoleRepresentation> roles, KCRolesController.REPRESENTATION format) {
|
||||
public static Object formatListRoles(List<RoleRepresentation> roles, KCRolesController.REPRESENTATION format) {
|
||||
|
||||
if (format.equals(KCRolesController.REPRESENTATION.id)) {
|
||||
List<String> ids = new ArrayList<String>();
|
||||
if (roles != null) {
|
||||
for (RoleRepresentation role : roles) {
|
||||
ids.add(role.getId());
|
||||
}
|
||||
}
|
||||
return ids;
|
||||
} else if (format.equals(KCRolesController.REPRESENTATION.name)) {
|
||||
List<String> names = new ArrayList<String>();
|
||||
if (roles != null) {
|
||||
for (RoleRepresentation role : roles) {
|
||||
names.add(role.getName());
|
||||
}
|
||||
}
|
||||
return names;
|
||||
} else
|
||||
return roles;
|
||||
}
|
||||
if (format.equals(KCRolesController.REPRESENTATION.id)) {
|
||||
List<String> ids = new ArrayList<String>();
|
||||
if (roles != null) {
|
||||
for (RoleRepresentation role : roles) {
|
||||
ids.add(role.getId());
|
||||
}
|
||||
}
|
||||
return ids;
|
||||
} else if (format.equals(KCRolesController.REPRESENTATION.name)) {
|
||||
List<String> names = new ArrayList<String>();
|
||||
if (roles != null) {
|
||||
for (RoleRepresentation role : roles) {
|
||||
names.add(role.getName());
|
||||
}
|
||||
}
|
||||
return names;
|
||||
} else
|
||||
return roles;
|
||||
}
|
||||
|
||||
public static List<RoleRepresentation> getRoles() {
|
||||
logger.info("Searching users for context");
|
||||
|
|
|
@ -23,8 +23,8 @@ public class KCUserController {
|
|||
private static final org.slf4j.Logger logger = LoggerFactory.getLogger(KCUserController.class);
|
||||
|
||||
public enum REPRESENTATION {
|
||||
full, compact, username, email, id, email_username, fullname
|
||||
}
|
||||
full, compact, username, email, id, email_username, fullname
|
||||
}
|
||||
|
||||
public static UsersResource users() {
|
||||
RealmResource realm = KkClientFactory.getSingleton().getKKRealm();
|
||||
|
@ -32,50 +32,49 @@ public class KCUserController {
|
|||
return users;
|
||||
}
|
||||
|
||||
public static Object formatListUsers(List<UserRepresentation> users, KCUserController.REPRESENTATION format) {
|
||||
|
||||
public static Object formatListUsers(List<UserRepresentation> users, KCUserController.REPRESENTATION format){
|
||||
if (format.equals(KCUserController.REPRESENTATION.username)) {
|
||||
List<String> usernames = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
usernames.add(user.getUsername());
|
||||
}
|
||||
}
|
||||
return usernames;
|
||||
|
||||
if (format.equals(KCUserController.REPRESENTATION.username)) {
|
||||
List<String> usernames = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
usernames.add(user.getUsername());
|
||||
}
|
||||
}
|
||||
return usernames;
|
||||
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.email)) {
|
||||
List<String> emails = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
emails.add(user.getEmail());
|
||||
}
|
||||
}
|
||||
return emails;
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.id)) {
|
||||
List<String> ids = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
ids.add(user.getId());
|
||||
}
|
||||
}
|
||||
return ids;
|
||||
}else if (format.equals(KCUserController.REPRESENTATION.email_username)) {
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.email)) {
|
||||
List<String> emails = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
emails.add(user.getEmail());
|
||||
}
|
||||
}
|
||||
return emails;
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.id)) {
|
||||
List<String> ids = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
ids.add(user.getId());
|
||||
}
|
||||
}
|
||||
return ids;
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.email_username)) {
|
||||
Map<String, String> usernamesAndFullnames = new HashMap<String, String>();
|
||||
users.forEach(user -> usernamesAndFullnames.put(user.getUsername(), user.getEmail()));
|
||||
return usernamesAndFullnames;
|
||||
}else if (format.equals(KCUserController.REPRESENTATION.fullname)) {
|
||||
List<String> fullnames = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
fullnames.add(user.getFirstName() + " " + user.getLastName());
|
||||
}
|
||||
}
|
||||
return fullnames;
|
||||
} else
|
||||
return users;
|
||||
return usernamesAndFullnames;
|
||||
} else if (format.equals(KCUserController.REPRESENTATION.fullname)) {
|
||||
List<String> fullnames = new ArrayList<String>();
|
||||
if (users != null) {
|
||||
for (UserRepresentation user : users) {
|
||||
fullnames.add(user.getFirstName() + " " + user.getLastName());
|
||||
}
|
||||
}
|
||||
return fullnames;
|
||||
} else
|
||||
return users;
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Search for users based on the given filters.
|
||||
|
@ -161,9 +160,9 @@ public class KCUserController {
|
|||
UserRepresentation user = realm.users()
|
||||
.search(username, true).stream().findFirst().orElse(null);
|
||||
|
||||
if (user == null) {
|
||||
throw new NotFoundException("cannot retrieve user " + username);
|
||||
}
|
||||
if (user == null) {
|
||||
throw new NotFoundException("cannot retrieve user " + username);
|
||||
}
|
||||
|
||||
UserResource userRes = realm.users().get(user.getId());
|
||||
|
||||
|
|
|
@ -19,8 +19,7 @@ public class IsServerConfig {
|
|||
|
||||
private String grantType = OAuth2Constants.CLIENT_CREDENTIALS;
|
||||
|
||||
|
||||
public Map<String, String> getProperties(){
|
||||
public Map<String, String> getProperties() {
|
||||
return this.properties;
|
||||
}
|
||||
|
||||
|
|
|
@ -62,28 +62,30 @@ public class KkClientFactory {
|
|||
logger.info("KeycloakAPICredentials object built {} - {}", config.getServerUrl(), config.getName());
|
||||
}
|
||||
|
||||
// public IsServerConfig configFromINI() throws NotFoundException, ServerException{
|
||||
// public IsServerConfig configFromINI() throws NotFoundException,
|
||||
// ServerException{
|
||||
|
||||
// ApplicationContext appContext = ContextProvider.get();
|
||||
// SimpleCredentials credentials =
|
||||
// (SimpleCredentials)appContext.authorizationProvider().getCredentials();
|
||||
|
||||
// ApplicationContext appContext = ContextProvider.get();
|
||||
// SimpleCredentials credentials = (SimpleCredentials)appContext.authorizationProvider().getCredentials();
|
||||
// IsServerConfig cfg = fetchIsConfig();
|
||||
// IsServerConfig newConfig = new IsServerConfig(
|
||||
// cfg.getServerUrl(),
|
||||
// cfg.getName(),
|
||||
// credentials.getClientID(), // cfg.getClientId(),
|
||||
// credentials.getSecret(), // cfg.getClientSecrxet(),
|
||||
// cfg.getProperties()
|
||||
// );
|
||||
|
||||
// IsServerConfig cfg = fetchIsConfig();
|
||||
// IsServerConfig newConfig = new IsServerConfig(
|
||||
// cfg.getServerUrl(),
|
||||
// cfg.getName(),
|
||||
// credentials.getClientID(), // cfg.getClientId(),
|
||||
// credentials.getSecret(), // cfg.getClientSecrxet(),
|
||||
// cfg.getProperties()
|
||||
// );
|
||||
|
||||
// return newConfig;s
|
||||
// return newConfig;s
|
||||
|
||||
// }
|
||||
|
||||
public IsServerConfig fetchIsConfig() throws NotFoundException, ServerException {
|
||||
public IsServerConfig fetchIsConfig() throws NotFoundException, ServerException {
|
||||
|
||||
IsServerConfig cfg = InfrastrctureServiceClient.serviceConfigFromIS(RUNTIME_RESOURCE_NAME, CATEGORY, END_POINT_NAME, IS_ROOT_SERVICE);
|
||||
IsServerConfig cfg = InfrastrctureServiceClient.serviceConfigFromIS(RUNTIME_RESOURCE_NAME, CATEGORY,
|
||||
END_POINT_NAME, IS_ROOT_SERVICE);
|
||||
return cfg;
|
||||
|
||||
}
|
||||
|
@ -142,12 +144,12 @@ public class KkClientFactory {
|
|||
|
||||
// TODO: REMOVE
|
||||
// static IsServerConfig getTestConfig() {
|
||||
// String serverUrl = "https://accounts.dev.d4science.org/auth";
|
||||
// String realm = "d4science";
|
||||
// String clientId = "id.d4science.org";
|
||||
// String clientSecret = "";
|
||||
// String serverUrl = "https://accounts.dev.d4science.org/auth";
|
||||
// String realm = "d4science";
|
||||
// String clientId = "id.d4science.org";
|
||||
// String clientSecret = "";
|
||||
|
||||
// return new IsServerConfig(serverUrl, realm, clientId, clientSecret);
|
||||
// return new IsServerConfig(serverUrl, realm, clientId, clientSecret);
|
||||
// }
|
||||
|
||||
}
|
||||
|
|
|
@ -32,12 +32,8 @@ import jakarta.ws.rs.core.Response;
|
|||
@Path("clients")
|
||||
public class ClientsAPI {
|
||||
|
||||
|
||||
|
||||
private static final org.slf4j.Logger logger = LoggerFactory.getLogger(ClientsAPI.class);
|
||||
|
||||
|
||||
|
||||
@GET
|
||||
@Path("/{name}")
|
||||
@Produces({ "application/json;charset=UTF-8", "application/vnd.api+json" })
|
||||
|
@ -74,58 +70,54 @@ public class ClientsAPI {
|
|||
}
|
||||
}
|
||||
|
||||
|
||||
public class ClientFromTemplateParams {
|
||||
public class ClientFromTemplateParams {
|
||||
String client_name;
|
||||
String client_id;
|
||||
String context;
|
||||
}
|
||||
|
||||
|
||||
@POST
|
||||
@Path("/fromTemplate/{name}")
|
||||
@Produces({ "application/json;charset=UTF-8", "application/vnd.api+json" })
|
||||
public Response createClientFromTemplate(
|
||||
@PathParam("name") String template_name,
|
||||
ClientFromTemplateParams params
|
||||
) {
|
||||
ResponseBeanMap responseBean = new ResponseBeanMap();
|
||||
@PathParam("name") String template_name,
|
||||
ClientFromTemplateParams params) {
|
||||
ResponseBeanMap responseBean = new ResponseBeanMap();
|
||||
|
||||
try {
|
||||
try {
|
||||
|
||||
RealmResource realm = KkClientFactory.getSingleton().getKKRealm();
|
||||
RealmResource realm = KkClientFactory.getSingleton().getKKRealm();
|
||||
|
||||
List<ClientRepresentation> clients = realm.clients().findByClientId(template_name);
|
||||
List<ClientRepresentation> clients = realm.clients().findByClientId(template_name);
|
||||
|
||||
if (clients.size() == 0) {
|
||||
throw new NotFoundException();
|
||||
}
|
||||
String id = clients.get(0).getId();
|
||||
ClientResource clientResource = realm.clients().get(id);
|
||||
ClientRepresentation client = clientResource.toRepresentation();
|
||||
|
||||
UserRepresentation template_account_user = clientResource.getServiceAccountUser();
|
||||
|
||||
client.setId(params.client_id);
|
||||
client.setName(params.client_name);
|
||||
|
||||
responseBean.putResult("client", client);
|
||||
responseBean.putResult("service_account_user", template_account_user);
|
||||
responseBean.setSuccess(true);
|
||||
|
||||
ObjectMapper objectMapper = ContextSerializator.getSerializer();
|
||||
|
||||
String jsonData = objectMapper.writeValueAsString(responseBean);
|
||||
return Response.ok(jsonData).build();
|
||||
|
||||
} catch (JsonProcessingException e) {
|
||||
e.printStackTrace();
|
||||
throw new InternalServerErrorException(e);
|
||||
if (clients.size() == 0) {
|
||||
throw new NotFoundException();
|
||||
}
|
||||
String id = clients.get(0).getId();
|
||||
ClientResource clientResource = realm.clients().get(id);
|
||||
ClientRepresentation client = clientResource.toRepresentation();
|
||||
|
||||
UserRepresentation template_account_user = clientResource.getServiceAccountUser();
|
||||
|
||||
client.setId(params.client_id);
|
||||
client.setName(params.client_name);
|
||||
|
||||
responseBean.putResult("client", client);
|
||||
responseBean.putResult("service_account_user", template_account_user);
|
||||
responseBean.setSuccess(true);
|
||||
|
||||
ObjectMapper objectMapper = ContextSerializator.getSerializer();
|
||||
|
||||
String jsonData = objectMapper.writeValueAsString(responseBean);
|
||||
return Response.ok(jsonData).build();
|
||||
|
||||
} catch (JsonProcessingException e) {
|
||||
e.printStackTrace();
|
||||
throw new InternalServerErrorException(e);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
@POST
|
||||
@Produces({ "application/json;charset=UTF-8", "application/vnd.api+json" })
|
||||
public Response createClientFromTemplate(ClientRepresentation client) {
|
||||
|
@ -154,7 +146,6 @@ public class ClientsAPI {
|
|||
|
||||
}
|
||||
|
||||
|
||||
@POST
|
||||
@Path("/")
|
||||
@Produces({ "application/json;charset=UTF-8", "application/vnd.api+json" })
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
package org.gcube.service.idm.rest;
|
||||
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
|
||||
import org.gcube.service.idm.IdMManager;
|
||||
|
@ -106,8 +105,8 @@ public class RolesAPI {
|
|||
/**
|
||||
* Returns the list of users with role in the context
|
||||
*
|
||||
* @param format users response format
|
||||
* @param role_name the role
|
||||
* @param format users response format
|
||||
* @param role_name the role
|
||||
* @param firstResult pagination offset
|
||||
* @param maxResults maximum results size
|
||||
*/
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
package org.gcube.service.idm.rest;
|
||||
|
||||
import java.util.ArrayList;
|
||||
import java.util.HashMap;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
|
@ -447,7 +446,7 @@ public class UserAPI {
|
|||
* firstName,
|
||||
* if param 'exact' is true
|
||||
* @param firstResult pagination offset
|
||||
* @param maxResults maximum results size
|
||||
* @param maxResults maximum results size
|
||||
* @param enabled Boolean representing if user is enabled or not
|
||||
* @param email A String contained in email, or the complete email, if
|
||||
* param 'exact' is true
|
||||
|
|
|
@ -308,10 +308,10 @@ public class UsersSocialAPI {
|
|||
List<UserRepresentation> users = users_resource.search(emailVerified, firstResult, maxResults, enabled,
|
||||
true);
|
||||
|
||||
Map<String, String> usernamesAndFullnames = new HashMap<String, String>();
|
||||
Map<String, String> usernamesAndFullnames = new HashMap<String, String>();
|
||||
|
||||
users.forEach(user -> usernamesAndFullnames.put(user.getUsername(), user.getEmail()));
|
||||
responseBean.setResult(usernamesAndFullnames);
|
||||
users.forEach(user -> usernamesAndFullnames.put(user.getUsername(), user.getEmail()));
|
||||
responseBean.setResult(usernamesAndFullnames);
|
||||
|
||||
responseBean.setSuccess(true);
|
||||
} catch (Exception e) {
|
||||
|
|
|
@ -1,11 +1,13 @@
|
|||
/**
|
||||
* <h1>Identity Manager (IDM) Service</h1>
|
||||
*
|
||||
* <p>Welcome to Identity Manager Service (aka IDM) API documentation.</p>
|
||||
* <p>
|
||||
* Welcome to Identity Manager Service (aka IDM) API documentation.
|
||||
* </p>
|
||||
*
|
||||
* <p>
|
||||
* To get a complete overview of gCat service take a look at
|
||||
* <a href="../docs/index.html">wiki page</a>.
|
||||
* To get a complete overview of gCat service take a look at
|
||||
* <a href="../docs/index.html">wiki page</a>.
|
||||
* </p>
|
||||
*
|
||||
*
|
||||
|
|
|
@ -1,32 +1,37 @@
|
|||
package org.gcube.service.rest;
|
||||
|
||||
public class ErrorMessages
|
||||
{
|
||||
|
||||
public class ErrorMessages {
|
||||
|
||||
public static final String ERROR_IN_API_RESULT = "The error is reported into the 'message' field of the returned object";
|
||||
public static final String INVALID_ATTRIBUTE = "Such an attribute doesn't exist";
|
||||
public static final String NOT_USER_TOKEN_CONTEXT_USED = "User's information can only be retrieved through a user token (not qualified)";
|
||||
public static final String USER_NOT_AUTHORIZED_PRIVATE = "User is not authorized to access private data";
|
||||
public static final String CANNOT_RETRIEVE_PROFILE = "Unable to retrieve user profile";
|
||||
|
||||
|
||||
public static final String NOT_USER_TOKEN_CONTEXT_USED = "User's information can only be retrieved through a user token (not qualified)";
|
||||
public static final String USER_NOT_AUTHORIZED_PRIVATE = "User is not authorized to access private data";
|
||||
public static final String CANNOT_RETRIEVE_PROFILE = "Unable to retrieve user profile";
|
||||
|
||||
//
|
||||
// protected static final String CANNOT_RETRIEVE_SERVICE_ENDPOINT_INFORMATION = "Unable to retrieve such service endpoint information";
|
||||
// protected static final String CANNOT_RETRIEVE_SERVICE_ENDPOINT_INFORMATION =
|
||||
// "Unable to retrieve such service endpoint information";
|
||||
|
||||
// private static final String NO_RUNTIME_RESOURCE_TEMPLATE_NAME_CATEGORY = "There is no Runtime Resource having name %s and Category %s in this scope";
|
||||
// private static final String NO_RUNTIME_RESOURCE_TEMPLATE_NAME_CATEGORY =
|
||||
// "There is no Runtime Resource having name %s and Category %s in this scope";
|
||||
|
||||
// public static final String MISSING_TOKEN = "Missing token.";
|
||||
// public static final String MISSING_PARAMETERS = "Missing request parameters.";
|
||||
// public static final String MISSING_PARAMETERS = "Missing request
|
||||
// parameters.";
|
||||
// public static final String INVALID_TOKEN = "Invalid token.";
|
||||
// public static final String TOKEN_GENERATION_APP_FAILED = "Token generation failed.";
|
||||
// public static final String NOT_APP_TOKEN = "Invalid token: not belonging to an application.";
|
||||
// public static final String NOT_APP_ID = "Invalid application id: it doesn't belong to an application.";
|
||||
// public static final String NO_APP_PROFILE_FOUND = "There is no application profile for this app id/scope.";
|
||||
// public static final String BAD_REQUEST = "Please check the parameter you passed, it seems a bad request";
|
||||
// public static final String POST_OUTSIDE_VRE = "A post cannot be written into a context that is not a VRE";
|
||||
// public static final String DEPRECATED_METHOD = "This method is deprecated, must use version 2";
|
||||
|
||||
// public static final String TOKEN_GENERATION_APP_FAILED = "Token generation
|
||||
// failed.";
|
||||
// public static final String NOT_APP_TOKEN = "Invalid token: not belonging to
|
||||
// an application.";
|
||||
// public static final String NOT_APP_ID = "Invalid application id: it doesn't
|
||||
// belong to an application.";
|
||||
// public static final String NO_APP_PROFILE_FOUND = "There is no application
|
||||
// profile for this app id/scope.";
|
||||
// public static final String BAD_REQUEST = "Please check the parameter you
|
||||
// passed, it seems a bad request";
|
||||
// public static final String POST_OUTSIDE_VRE = "A post cannot be written into
|
||||
// a context that is not a VRE";
|
||||
// public static final String DEPRECATED_METHOD = "This method is deprecated,
|
||||
// must use version 2";
|
||||
|
||||
}
|
||||
|
|
|
@ -22,7 +22,7 @@ public class ResponseBeanMap extends ResponseBean {
|
|||
/**
|
||||
* The result object of the request
|
||||
*/
|
||||
protected Map<String, Object>result = new HashMap<String, Object>();
|
||||
protected Map<String, Object> result = new HashMap<String, Object>();
|
||||
|
||||
public ResponseBeanMap() {
|
||||
super();
|
||||
|
@ -64,7 +64,7 @@ public class ResponseBeanMap extends ResponseBean {
|
|||
this.result = mapResults;
|
||||
}
|
||||
|
||||
public void putResult(String key, Object res){
|
||||
public void putResult(String key, Object res) {
|
||||
this.result.put(key, res);
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue