diff --git a/application/src/main/java/org/thingsboard/server/controller/TelemetryController.java b/application/src/main/java/org/thingsboard/server/controller/TelemetryController.java
index dcc4a5c..1944fa2 100644
--- a/application/src/main/java/org/thingsboard/server/controller/TelemetryController.java
+++ b/application/src/main/java/org/thingsboard/server/controller/TelemetryController.java
@@ -9,33 +9,49 @@ import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.HttpStatus;
import org.springframework.http.ResponseEntity;
import org.springframework.security.access.prepost.PreAuthorize;
+import org.springframework.util.StringUtils;
import org.springframework.web.bind.annotation.PathVariable;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
+import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.ResponseStatus;
import org.springframework.web.bind.annotation.RestController;
import org.springframework.web.context.request.async.DeferredResult;
import org.thingsboard.server.actors.plugin.ValidationResult;
+import org.thingsboard.server.common.data.Customer;
import org.thingsboard.server.common.data.DataConstants;
import org.thingsboard.server.common.data.Device;
+import org.thingsboard.server.common.data.Tenant;
+import org.thingsboard.server.common.data.asset.Asset;
+import org.thingsboard.server.common.data.audit.ActionType;
+import org.thingsboard.server.common.data.id.AssetId;
+import org.thingsboard.server.common.data.id.CustomerId;
import org.thingsboard.server.common.data.id.DeviceId;
import org.thingsboard.server.common.data.id.EntityId;
import org.thingsboard.server.common.data.id.EntityIdFactory;
+import org.thingsboard.server.common.data.id.RuleChainId;
+import org.thingsboard.server.common.data.id.TenantId;
+import org.thingsboard.server.common.data.id.UUIDBased;
import org.thingsboard.server.common.data.kv.AttributeKvEntry;
import org.thingsboard.server.common.data.kv.KvEntry;
+import org.thingsboard.server.common.data.kv.TsKvEntry;
+import org.thingsboard.server.common.data.rule.RuleChain;
import org.thingsboard.server.dao.attributes.AttributesService;
import org.thingsboard.server.dao.timeseries.TimeseriesService;
import org.thingsboard.server.exception.ThingsboardException;
import org.thingsboard.server.extensions.api.exception.ToErrorResponseEntity;
import org.thingsboard.server.extensions.api.plugins.PluginConstants;
+import org.thingsboard.server.extensions.core.plugin.telemetry.AttributeData;
import org.thingsboard.server.service.security.model.SecurityUser;
import javax.annotation.Nullable;
import javax.annotation.PreDestroy;
import java.util.ArrayList;
+import java.util.Arrays;
import java.util.List;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
+import java.util.function.BiConsumer;
import java.util.stream.Collectors;
/**
@@ -74,61 +90,169 @@ public class TelemetryController extends BaseController {
@ResponseStatus(value = HttpStatus.OK)
public DeferredResult<ResponseEntity> getAttributeKeys(
@PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr) throws ThingsboardException {
- DeferredResult<ResponseEntity> response = new DeferredResult<ResponseEntity>();
+ return validateEntityAndCallback(entityType, entityIdStr,
+ this::getAttributeKeysCallback,
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/keys/ATTRIBUTES/{scope}", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getAttributeKeysByScope(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr
+ , @PathVariable("scope") String scope) throws ThingsboardException {
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> getAttributeKeysCallback(result, entityId, scope),
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/values/ATTRIBUTES", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getAttributes(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr,
+ @RequestParam(name = "keys", required = false) String keysStr) throws ThingsboardException {
+ SecurityUser user = getCurrentUser();
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> getAttributeValuesCallback(result, user, entityId, null, keysStr),
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/values/ATTRIBUTES/{scope}", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getAttributesByScope(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr,
+ @PathVariable("scope") String scope,
+ @RequestParam(name = "keys", required = false) String keysStr) throws ThingsboardException {
+ SecurityUser user = getCurrentUser();
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> getAttributeValuesCallback(result, user, entityId, scope, keysStr),
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/keys/TIMESERIES", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getTimeseriesKeys(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr) throws ThingsboardException {
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> {
+ Futures.addCallback(tsService.findAllLatest(entityId), getTsKeysToResponseCallback(result));
+ },
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/values/TIMESERIES", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getLatestTimeseries(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr,
+ @PathVariable("scope") String scope,
+ @RequestParam(name = "keys", required = false) String keysStr) throws ThingsboardException {
+ SecurityUser user = getCurrentUser();
+
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> getAttributeValuesCallback(result, user, entityId, scope, keysStr),
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+
+ @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
+ @RequestMapping(value = "/{entityType}/{entityId}/values/TIMESERIES", method = RequestMethod.GET)
+ @ResponseStatus(value = HttpStatus.OK)
+ public DeferredResult<ResponseEntity> getLatestTimeseries(
+ @PathVariable("entityType") String entityType, @PathVariable("entityId") String entityIdStr,
+ @PathVariable("scope") String scope,
+ @RequestParam(name = "keys", required = false) String keysStr) throws ThingsboardException {
+ SecurityUser user = getCurrentUser();
+
+ return validateEntityAndCallback(entityType, entityIdStr,
+ (result, entityId) -> getAttributeValuesCallback(result, user, entityId, scope, keysStr),
+ (result, t) -> handleError(t, result, HttpStatus.INTERNAL_SERVER_ERROR));
+ }
+
+ private DeferredResult<ResponseEntity> validateEntityAndCallback(String entityType, String entityIdStr,
+ BiConsumer<DeferredResult<ResponseEntity>, EntityId> onSuccess, BiConsumer<DeferredResult<ResponseEntity>, Throwable> onFailure) throws ThingsboardException {
+ final DeferredResult<ResponseEntity> response = new DeferredResult<>();
EntityId entityId = EntityIdFactory.getByTypeAndId(entityType, entityIdStr);
validate(getCurrentUser(), entityId, new ValidationCallback(response,
new FutureCallback<DeferredResult<ResponseEntity>>() {
@Override
public void onSuccess(@Nullable DeferredResult<ResponseEntity> result) {
- List<ListenableFuture<List<AttributeKvEntry>>> futures = new ArrayList<>();
- for (String scope : DataConstants.allScopes()) {
- futures.add(attributesService.findAll(entityId, scope));
- }
-
- ListenableFuture<List<AttributeKvEntry>> future = Futures.transform(Futures.successfulAsList(futures),
- (Function<? super List<List<AttributeKvEntry>>, ? extends List<AttributeKvEntry>>) input -> {
- List<AttributeKvEntry> tmp = new ArrayList<>();
- if (input != null) {
- input.forEach(tmp::addAll);
- }
- return tmp;
- }, executor);
-
- Futures.addCallback(future, getAttributeKeysPluginCallback(result));
+ onSuccess.accept(response, entityId);
}
@Override
public void onFailure(Throwable t) {
- handleError(t, response, HttpStatus.INTERNAL_SERVER_ERROR);
+ onFailure.accept(response, t);
}
}));
return response;
}
- @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
- @RequestMapping(value = "/{entityType}/{entityId}/keys/ATTRIBUTES/{scope}", method = RequestMethod.GET)
- @ResponseStatus(value = HttpStatus.OK)
- public DeferredResult<ResponseEntity> getAttributeKeysByScope() {
- return null;
+ private void getAttributeValuesCallback(@Nullable DeferredResult<ResponseEntity> result, SecurityUser user, EntityId entityId, String scope, String keys) {
+ List<String> keyList = null;
+ if (!StringUtils.isEmpty(keys)) {
+ keyList = Arrays.asList(keys.split(","));
+ }
+ FutureCallback<List<AttributeKvEntry>> callback = getAttributeValuesToResponseCallback(result, user, scope, entityId, keyList);
+ if (!StringUtils.isEmpty(scope)) {
+ if (keyList != null && !keyList.isEmpty()) {
+ Futures.addCallback(attributesService.find(entityId, scope, keyList), callback);
+ } else {
+ Futures.addCallback(attributesService.findAll(entityId, scope), callback);
+ }
+ } else {
+ List<ListenableFuture<List<AttributeKvEntry>>> futures = new ArrayList<>();
+ for (String tmpScope : DataConstants.allScopes()) {
+ if (keyList != null && !keyList.isEmpty()) {
+ futures.add(attributesService.find(entityId, tmpScope, keyList));
+ } else {
+ futures.add(attributesService.findAll(entityId, tmpScope));
+ }
+ }
+
+ ListenableFuture<List<AttributeKvEntry>> future = mergeAllAttributesFutures(futures);
+
+ Futures.addCallback(future, callback);
+ }
}
- @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
- @RequestMapping(value = "/{entityType}/{entityId}/values/ATTRIBUTES", method = RequestMethod.GET)
- @ResponseStatus(value = HttpStatus.OK)
- public DeferredResult<ResponseEntity> getAttributeValues() {
- return null;
+ private void getAttributeKeysCallback(@Nullable DeferredResult<ResponseEntity> result, EntityId entityId, String scope) {
+ Futures.addCallback(attributesService.findAll(entityId, scope), getAttributeKeysToResponseCallback(result));
}
- @PreAuthorize("hasAnyAuthority('SYS_ADMIN', 'TENANT_ADMIN', 'CUSTOMER_USER')")
- @RequestMapping(value = "/{entityType}/{entityId}/values/ATTRIBUTES", method = RequestMethod.GET)
- @ResponseStatus(value = HttpStatus.OK)
- public DeferredResult<ResponseEntity> getAttributeValuesByScope() {
- return null;
+ private void getAttributeKeysCallback(@Nullable DeferredResult<ResponseEntity> result, EntityId entityId) {
+ List<ListenableFuture<List<AttributeKvEntry>>> futures = new ArrayList<>();
+ for (String scope : DataConstants.allScopes()) {
+ futures.add(attributesService.findAll(entityId, scope));
+ }
+
+ ListenableFuture<List<AttributeKvEntry>> future = mergeAllAttributesFutures(futures);
+
+ Futures.addCallback(future, getAttributeKeysToResponseCallback(result));
+ }
+
+ private FutureCallback<List<TsKvEntry>> getTsKeysToResponseCallback(final DeferredResult<ResponseEntity> response) {
+ return new FutureCallback<List<TsKvEntry>>() {
+ @Override
+ public void onSuccess(List<TsKvEntry> values) {
+ List<String> keys = values.stream().map(KvEntry::getKey).collect(Collectors.toList());
+ response.setResult(new ResponseEntity<>(keys, HttpStatus.OK));
+ }
+
+ @Override
+ public void onFailure(Throwable e) {
+ log.error("Failed to fetch attributes", e);
+ handleError(e, response, HttpStatus.INTERNAL_SERVER_ERROR);
+ }
+ };
}
- private FutureCallback<List<AttributeKvEntry>> getAttributeKeysPluginCallback(final DeferredResult<ResponseEntity> response) {
+ private FutureCallback<List<AttributeKvEntry>> getAttributeKeysToResponseCallback(final DeferredResult<ResponseEntity> response) {
return new FutureCallback<List<AttributeKvEntry>>() {
@Override
@@ -145,6 +269,40 @@ public class TelemetryController extends BaseController {
};
}
+ private FutureCallback<List<AttributeKvEntry>> getAttributeValuesToResponseCallback(final DeferredResult<ResponseEntity> response, final SecurityUser user, final String scope,
+ final EntityId entityId, final List<String> keyList) {
+ return new FutureCallback<List<AttributeKvEntry>>() {
+ @Override
+ public void onSuccess(List<AttributeKvEntry> attributes) {
+ List<AttributeData> values = attributes.stream().map(attribute -> new AttributeData(attribute.getLastUpdateTs(),
+ attribute.getKey(), attribute.getValue())).collect(Collectors.toList());
+ logAttributesRead(user, entityId, scope, keyList, null);
+ response.setResult(new ResponseEntity<>(values, HttpStatus.OK));
+ }
+
+ @Override
+ public void onFailure(Throwable e) {
+ log.error("Failed to fetch attributes", e);
+ logAttributesRead(user, entityId, scope, keyList, e);
+ handleError(e, response, HttpStatus.INTERNAL_SERVER_ERROR);
+ }
+ };
+ }
+
+ private void logAttributesRead(SecurityUser user, EntityId entityId, String scope, List<String> keys, Throwable e) {
+ auditLogService.logEntityAction(
+ user.getTenantId(),
+ user.getCustomerId(),
+ user.getId(),
+ user.getName(),
+ (UUIDBased & EntityId) entityId,
+ null,
+ ActionType.ATTRIBUTES_READ,
+ toException(e),
+ scope,
+ keys);
+ }
+
private void handleError(Throwable e, final DeferredResult<ResponseEntity> response, HttpStatus defaultErrorStatus) {
ResponseEntity responseEntity;
if (e != null && e instanceof ToErrorResponseEntity) {
@@ -162,24 +320,18 @@ public class TelemetryController extends BaseController {
case DEVICE:
validateDevice(currentUser, entityId, callback);
return;
-// case ASSET:
-// validateAsset(ctx, entityId, callback);
-// return;
-// case RULE:
-// validateRule(ctx, entityId, callback);
-// return;
-// case RULE_CHAIN:
-// validateRuleChain(ctx, entityId, callback);
-// return;
-// case PLUGIN:
-// validatePlugin(ctx, entityId, callback);
-// return;
-// case CUSTOMER:
-// validateCustomer(ctx, entityId, callback);
-// return;
-// case TENANT:
-// validateTenant(ctx, entityId, callback);
-// return;
+ case ASSET:
+ validateAsset(currentUser, entityId, callback);
+ return;
+ case RULE_CHAIN:
+ validateRuleChain(currentUser, entityId, callback);
+ return;
+ case CUSTOMER:
+ validateCustomer(currentUser, entityId, callback);
+ return;
+ case TENANT:
+ validateTenant(currentUser, entityId, callback);
+ return;
default:
//TODO: add support of other entities
throw new IllegalStateException("Not Implemented!");
@@ -207,6 +359,89 @@ public class TelemetryController extends BaseController {
}
}
+ private void validateAsset(final SecurityUser currentUser, EntityId entityId, ValidationCallback callback) {
+ if (currentUser.isSystemAdmin()) {
+ callback.onSuccess(ValidationResult.accessDenied(SYSTEM_ADMINISTRATOR_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
+ } else {
+ ListenableFuture<Asset> assetFuture = assetService.findAssetByIdAsync(new AssetId(entityId.getId()));
+ Futures.addCallback(assetFuture, getCallback(callback, asset -> {
+ if (asset == null) {
+ return ValidationResult.entityNotFound("Asset with requested id wasn't found!");
+ } else {
+ if (!asset.getTenantId().equals(currentUser.getTenantId())) {
+ return ValidationResult.accessDenied("Asset doesn't belong to the current Tenant!");
+ } else if (currentUser.isCustomerUser() && !asset.getCustomerId().equals(currentUser.getCustomerId())) {
+ return ValidationResult.accessDenied("Asset doesn't belong to the current Customer!");
+ } else {
+ return ValidationResult.ok();
+ }
+ }
+ }));
+ }
+ }
+
+
+ private void validateRuleChain(final SecurityUser currentUser, EntityId entityId, ValidationCallback callback) {
+ if (currentUser.isCustomerUser()) {
+ callback.onSuccess(ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
+ } else {
+ ListenableFuture<RuleChain> ruleChainFuture = ruleChainService.findRuleChainByIdAsync(new RuleChainId(entityId.getId()));
+ Futures.addCallback(ruleChainFuture, getCallback(callback, ruleChain -> {
+ if (ruleChain == null) {
+ return ValidationResult.entityNotFound("Rule chain with requested id wasn't found!");
+ } else {
+ if (currentUser.isTenantAdmin() && !ruleChain.getTenantId().equals(currentUser.getTenantId())) {
+ return ValidationResult.accessDenied("Rule chain doesn't belong to the current Tenant!");
+ } else if (currentUser.isSystemAdmin() && !ruleChain.getTenantId().isNullUid()) {
+ return ValidationResult.accessDenied("Rule chain is not in system scope!");
+ } else {
+ return ValidationResult.ok();
+ }
+ }
+ }));
+ }
+ }
+
+ private void validateCustomer(final SecurityUser currentUser, EntityId entityId, ValidationCallback callback) {
+ if (currentUser.isSystemAdmin()) {
+ callback.onSuccess(ValidationResult.accessDenied(SYSTEM_ADMINISTRATOR_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
+ } else {
+ ListenableFuture<Customer> customerFuture = customerService.findCustomerByIdAsync(new CustomerId(entityId.getId()));
+ Futures.addCallback(customerFuture, getCallback(callback, customer -> {
+ if (customer == null) {
+ return ValidationResult.entityNotFound("Customer with requested id wasn't found!");
+ } else {
+ if (!customer.getTenantId().equals(currentUser.getTenantId())) {
+ return ValidationResult.accessDenied("Customer doesn't belong to the current Tenant!");
+ } else if (currentUser.isCustomerUser() && !customer.getId().equals(currentUser.getCustomerId())) {
+ return ValidationResult.accessDenied("Customer doesn't relate to the currently authorized customer user!");
+ } else {
+ return ValidationResult.ok();
+ }
+ }
+ }));
+ }
+ }
+
+ private void validateTenant(final SecurityUser currentUser, EntityId entityId, ValidationCallback callback) {
+ if (currentUser.isCustomerUser()) {
+ callback.onSuccess(ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
+ } else if (currentUser.isSystemAdmin()) {
+ callback.onSuccess(ValidationResult.ok());
+ } else {
+ ListenableFuture<Tenant> tenantFuture = tenantService.findTenantByIdAsync(new TenantId(entityId.getId()));
+ Futures.addCallback(tenantFuture, getCallback(callback, tenant -> {
+ if (tenant == null) {
+ return ValidationResult.entityNotFound("Tenant with requested id wasn't found!");
+ } else if (!tenant.getId().equals(currentUser.getTenantId())) {
+ return ValidationResult.accessDenied("Tenant doesn't relate to the currently authorized user!");
+ } else {
+ return ValidationResult.ok();
+ }
+ }));
+ }
+ }
+
private <T> FutureCallback<T> getCallback(ValidationCallback callback, Function<T, ValidationResult> transformer) {
return new FutureCallback<T>() {
@Override
@@ -220,131 +455,16 @@ public class TelemetryController extends BaseController {
}
};
}
-//
-// private void validateAsset(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isSystemAdmin()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(SYSTEM_ADMINISTRATOR_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else {
-// ListenableFuture<Asset> assetFuture = pluginCtx.assetService.findAssetByIdAsync(new AssetId(entityId.getId()));
-// Futures.addCallback(assetFuture, getCallback(callback, asset -> {
-// if (asset == null) {
-// return ValidationResult.entityNotFound("Asset with requested id wasn't found!");
-// } else {
-// if (!asset.getTenantId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Asset doesn't belong to the current Tenant!");
-// } else if (ctx.isCustomerUser() && !asset.getCustomerId().equals(ctx.getCustomerId())) {
-// return ValidationResult.accessDenied("Asset doesn't belong to the current Customer!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }
-// }));
-// }
-// }
-//
-// private void validateRule(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isCustomerUser()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else {
-// ListenableFuture<RuleMetaData> ruleFuture = pluginCtx.ruleService.findRuleByIdAsync(new RuleId(entityId.getId()));
-// Futures.addCallback(ruleFuture, getCallback(callback, rule -> {
-// if (rule == null) {
-// return ValidationResult.entityNotFound("Rule with requested id wasn't found!");
-// } else {
-// if (ctx.isTenantAdmin() && !rule.getTenantId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Rule doesn't belong to the current Tenant!");
-// } else if (ctx.isSystemAdmin() && !rule.getTenantId().isNullUid()) {
-// return ValidationResult.accessDenied("Rule is not in system scope!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }
-// }));
-// }
-// }
-//
-// private void validateRuleChain(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isCustomerUser()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else {
-// ListenableFuture<RuleChain> ruleChainFuture = pluginCtx.ruleChainService.findRuleChainByIdAsync(new RuleChainId(entityId.getId()));
-// Futures.addCallback(ruleChainFuture, getCallback(callback, ruleChain -> {
-// if (ruleChain == null) {
-// return ValidationResult.entityNotFound("Rule chain with requested id wasn't found!");
-// } else {
-// if (ctx.isTenantAdmin() && !ruleChain.getTenantId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Rule chain doesn't belong to the current Tenant!");
-// } else if (ctx.isSystemAdmin() && !ruleChain.getTenantId().isNullUid()) {
-// return ValidationResult.accessDenied("Rule chain is not in system scope!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }
-// }));
-// }
-// }
-//
-//
-// private void validatePlugin(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isCustomerUser()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else {
-// ListenableFuture<PluginMetaData> pluginFuture = pluginCtx.pluginService.findPluginByIdAsync(new PluginId(entityId.getId()));
-// Futures.addCallback(pluginFuture, getCallback(callback, plugin -> {
-// if (plugin == null) {
-// return ValidationResult.entityNotFound("Plugin with requested id wasn't found!");
-// } else {
-// if (ctx.isTenantAdmin() && !plugin.getTenantId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Plugin doesn't belong to the current Tenant!");
-// } else if (ctx.isSystemAdmin() && !plugin.getTenantId().isNullUid()) {
-// return ValidationResult.accessDenied("Plugin is not in system scope!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }
-// }));
-// }
-// }
-//
-// private void validateCustomer(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isSystemAdmin()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(SYSTEM_ADMINISTRATOR_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else {
-// ListenableFuture<Customer> customerFuture = pluginCtx.customerService.findCustomerByIdAsync(new CustomerId(entityId.getId()));
-// Futures.addCallback(customerFuture, getCallback(callback, customer -> {
-// if (customer == null) {
-// return ValidationResult.entityNotFound("Customer with requested id wasn't found!");
-// } else {
-// if (!customer.getTenantId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Customer doesn't belong to the current Tenant!");
-// } else if (ctx.isCustomerUser() && !customer.getId().equals(ctx.getCustomerId())) {
-// return ValidationResult.accessDenied("Customer doesn't relate to the currently authorized customer user!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }
-// }));
-// }
-// }
-//
-// private void validateTenant(final PluginApiCallSecurityContext ctx, EntityId entityId, ValidationCallback callback) {
-// if (ctx.isCustomerUser()) {
-// callback.onSuccess(this, ValidationResult.accessDenied(CUSTOMER_USER_IS_NOT_ALLOWED_TO_PERFORM_THIS_OPERATION));
-// } else if (ctx.isSystemAdmin()) {
-// callback.onSuccess(this, ValidationResult.ok());
-// } else {
-// ListenableFuture<Tenant> tenantFuture = pluginCtx.tenantService.findTenantByIdAsync(new TenantId(entityId.getId()));
-// Futures.addCallback(tenantFuture, getCallback(callback, tenant -> {
-// if (tenant == null) {
-// return ValidationResult.entityNotFound("Tenant with requested id wasn't found!");
-// } else if (!tenant.getId().equals(ctx.getTenantId())) {
-// return ValidationResult.accessDenied("Tenant doesn't relate to the currently authorized user!");
-// } else {
-// return ValidationResult.ok();
-// }
-// }));
-// }
-// }
+ private ListenableFuture<List<AttributeKvEntry>> mergeAllAttributesFutures(List<ListenableFuture<List<AttributeKvEntry>>> futures) {
+ return Futures.transform(Futures.successfulAsList(futures),
+ (Function<? super List<List<AttributeKvEntry>>, ? extends List<AttributeKvEntry>>) input -> {
+ List<AttributeKvEntry> tmp = new ArrayList<>();
+ if (input != null) {
+ input.forEach(tmp::addAll);
+ }
+ return tmp;
+ }, executor);
+ }
}