@@ -51,13 +51,13 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
51
51
case None =>
52
52
Logger .error(" Get: login() not completed successfully: sending user to logout to be safe." )
53
53
Redirect (sys.env.get(" OOREP_URL_LOGOUT" ).getOrElse(" " ))
54
- case Some (uid ) =>
55
- memberDao.increaseLoginCounter(uid )
56
- memberDao.setLastSeen(uid , new MyDate ())
57
- Logger .debug(s " Get: login() completed for user ${uid .toString}. " )
54
+ case Some (member ) =>
55
+ memberDao.increaseLoginCounter(member.member_id )
56
+ memberDao.setLastSeen(member.member_id , new MyDate ())
57
+ Logger .debug(s " Get: login() completed for user ${member.member_id .toString}. " )
58
58
Redirect (serverUrl(request))
59
59
.withCookies(
60
- Cookie (CookieFields .id.toString, uid .toString, secure = true , httpOnly = false ),
60
+ Cookie (CookieFields .id.toString, member.member_id .toString, secure = true , httpOnly = false ),
61
61
Cookie (CookieFields .cookiePopupAccepted.toString, " 1" , secure = true , httpOnly = false )
62
62
)
63
63
}
@@ -99,13 +99,13 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
99
99
def serve_static_html (page : String ) = Action { implicit request : Request [AnyContent ] =>
100
100
page match {
101
101
case " index" => Ok (views.html.index_landing(request))
102
- case " cookies" => Ok (views.html.index_static_content(request, views.html.partial.cookies.render, " OOREP - Privacy policy" ))
103
- case " contact" => Ok (views.html.index_static_content(request, views.html.partial.contact.render, " OOREP - Contact" ))
104
- case " datenschutz" => Ok (views.html.index_static_content(request, views.html.partial.datenschutz.render, " OOREP - Datenschutzerklärung" ))
105
- case " faq" => Ok (views.html.index_static_content(request, views.html.partial.faq.render, " OOREP - Frequently asked questions and answers" ))
106
- case " forgot_password" => Ok (views.html.index_static_content(request, views.html.partial.forgot_password.render, s " OOREP ${xml.Utility .escape(" —" )} open online homeopathic repertory " ))
107
- case " impressum" => Ok (views.html.index_static_content(request, views.html.partial.impressum.render, " OOREP - Impressum" , " de" ))
108
- case " register" => Ok (views.html.index_static_content(request, views.html.partial.register.render, " OOREP - Registration" ))
102
+ case " cookies" => Ok (views.html.index_static_content(request, views.html.partial.cookies.render() , " OOREP - Privacy policy" ))
103
+ case " contact" => Ok (views.html.index_static_content(request, views.html.partial.contact.render() , " OOREP - Contact" ))
104
+ case " datenschutz" => Ok (views.html.index_static_content(request, views.html.partial.datenschutz.render() , " OOREP - Datenschutzerklärung" ))
105
+ case " faq" => Ok (views.html.index_static_content(request, views.html.partial.faq.render() , " OOREP - Frequently asked questions and answers" ))
106
+ case " forgot_password" => Ok (views.html.index_static_content(request, views.html.partial.forgot_password.render() , s " OOREP ${xml.Utility .escape(" —" )} open online homeopathic repertory " ))
107
+ case " impressum" => Ok (views.html.index_static_content(request, views.html.partial.impressum.render() , " OOREP - Impressum" , " de" ))
108
+ case " register" => Ok (views.html.index_static_content(request, views.html.partial.register.render() , " OOREP - Registration" ))
109
109
case _ => NotFound (views.html.defaultpages.notFound(" GET" , page))
110
110
}
111
111
}
@@ -150,8 +150,8 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
150
150
151
151
def apiAuthenticate () = Action { request : Request [AnyContent ] =>
152
152
getAuthenticatedUser(request) match {
153
- case Some (uid ) =>
154
- Ok (uid .toString)
153
+ case Some (member ) =>
154
+ Ok (member.member_id .toString)
155
155
case None =>
156
156
val errStr = s " Get: apiAuthenticate(): User cannot be authenticated. "
157
157
Logger .error(errStr)
@@ -164,11 +164,11 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
164
164
}
165
165
166
166
def apiAvailableRepertoriesAndRemedies () = Action { request : Request [AnyContent ] =>
167
- Ok ((repertoryDao.getRepsAndRemedies(getAuthenticatedUser(request) != None ).asJson.toString))
167
+ Ok ((repertoryDao.getRepsAndRemedies(getAuthenticatedUser(request)).asJson.toString))
168
168
}
169
169
170
170
def apiAvailableMateriaMedicasAndRemedies () = Action { request : Request [AnyContent ] =>
171
- Ok (mmDao.getMMsAndRemedies(getAuthenticatedUser(request) != None ).asJson.toString())
171
+ Ok (mmDao.getMMsAndRemedies(getAuthenticatedUser(request)).asJson.toString())
172
172
}
173
173
174
174
/**
@@ -180,7 +180,7 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
180
180
val errStr = " Get: apiSecAvailableFiles() failed: not authenticated"
181
181
Logger .error(errStr)
182
182
Unauthorized (errStr)
183
- case Some (uid ) =>
183
+ case Some (_ ) =>
184
184
if (! isUserAuthorized(request, memberId)) {
185
185
val err = s " Get: apiSecAvailableFiles() failed: not authorised "
186
186
Logger .error(err)
@@ -218,9 +218,9 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
218
218
219
219
def apiSecGetCase (caseId : String ) = Action { request : Request [AnyContent ] =>
220
220
getAuthenticatedUser(request) match {
221
- case Some (uid ) if (caseId.forall(_.isDigit)) => {
221
+ case Some (member ) if (caseId.forall(_.isDigit)) => {
222
222
cazeDao.get(caseId.toInt) match {
223
- case Right (caze) if (caze.member_id == uid ) =>
223
+ case Right (caze) if (caze.member_id == member.member_id ) =>
224
224
if (! isUserAuthorized(request, caze.member_id)) {
225
225
val err = s " Get: apiSecGetCase() failed: not authorised. "
226
226
Logger .error(err)
@@ -291,7 +291,7 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
291
291
val cleanedUpAbbrev = repertoryAbbrev.replaceAll(" [^0-9A-Za-z\\ -]" , " " )
292
292
293
293
// Check if user is allowed to access the resource at all (might be Private or Protected and user not logged in)
294
- if (repertoryDao.getRepsAndRemedies(getAuthenticatedUser(request) != None ).find(_.info.abbrev == cleanedUpAbbrev) == None ) {
294
+ if (repertoryDao.getRepsAndRemedies(getAuthenticatedUser(request)).find(_.info.abbrev == cleanedUpAbbrev) == None ) {
295
295
Logger .info(s " Get: apiLookupRep(abbrev: ${repertoryAbbrev}, symptom: ${symptom}, page: ${page}, remedy: ${remedyString}, weight: ${minWeight}): user not allowed to access ressource. " )
296
296
NoContent
297
297
}
@@ -317,7 +317,7 @@ class Get @Inject()(cc: ControllerComponents, dbContext: DBContext) extends Abst
317
317
val cleanedUpAbbrev = mmAbbrev.replaceAll(" [^0-9A-Za-z\\ -]" , " " )
318
318
319
319
// Check if user is allowed to access the resource at all (might be Private or Protected and user not logged in)
320
- if (mmDao.getMMsAndRemedies(getAuthenticatedUser(request) != None ).find(_.mminfo.abbrev == cleanedUpAbbrev) == None ) {
320
+ if (mmDao.getMMsAndRemedies(getAuthenticatedUser(request)).find(_.mminfo.abbrev == cleanedUpAbbrev) == None ) {
321
321
Logger .info(s " Get: apiLookupMM(abbrev: ${mmAbbrev}, symptom: ${symptom}, page: ${page}, remedy: ${remedyString}): user not allowed to access ressource. " )
322
322
NoContent
323
323
}
0 commit comments