Skip to content

Commit

Permalink
scalafmt
Browse files Browse the repository at this point in the history
  • Loading branch information
eletallbetagouv committed Feb 11, 2025
1 parent fd0a16c commit b56e164
Show file tree
Hide file tree
Showing 2 changed files with 29 additions and 30 deletions.
36 changes: 17 additions & 19 deletions app/controllers/ReportBlockedNotificationController.scala
Original file line number Diff line number Diff line change
Expand Up @@ -24,27 +24,25 @@ class ReportBlockedNotificationController(
}

def create() =
Act.secured.pros.forbidImpersonation.async(parse.json) {
implicit request =>
request.body
.validate[ReportBlockedNotificationBody]
.fold(
errors => Future.successful(BadRequest(JsError.toJson(errors))),
body =>
orchestrator
.createIfNotExists(request.identity.id, body.companyIds)
.map(entity => Ok(Json.toJson(entity)))
)
Act.secured.pros.forbidImpersonation.async(parse.json) { implicit request =>
request.body
.validate[ReportBlockedNotificationBody]
.fold(
errors => Future.successful(BadRequest(JsError.toJson(errors))),
body =>
orchestrator
.createIfNotExists(request.identity.id, body.companyIds)
.map(entity => Ok(Json.toJson(entity)))
)
}

def delete() =
Act.secured.pros.forbidImpersonation.async(parse.json) {
implicit request =>
request.body
.validate[ReportBlockedNotificationBody]
.fold(
errors => Future.successful(BadRequest(JsError.toJson(errors))),
body => orchestrator.delete(request.identity.id, body.companyIds).map(_ => Ok)
)
Act.secured.pros.forbidImpersonation.async(parse.json) { implicit request =>
request.body
.validate[ReportBlockedNotificationBody]
.fold(
errors => Future.successful(BadRequest(JsError.toJson(errors))),
body => orchestrator.delete(request.identity.id, body.companyIds).map(_ => Ok)
)
}
}
23 changes: 12 additions & 11 deletions app/controllers/ReportFileController.scala
Original file line number Diff line number Diff line change
Expand Up @@ -68,17 +68,18 @@ class ReportFileController(
)
}

def downloadZip(reportId: UUID, origin: Option[ReportFileOrigin]) = Act.secured.all.allowImpersonation.async { request =>
for {
reportExtra <- visibleReportOrchestrator.getVisibleReportOrThrow(reportId, request.identity)
report = reportExtra.report
stream <- reportFileOrchestrator.downloadReportFilesArchive(report, origin)
} yield Ok
.chunked(stream)
.as("application/zip")
.withHeaders(
"Content-Disposition" -> s"attachment; filename=${frenchFileFormatDate(report.creationDate)}.zip"
)
def downloadZip(reportId: UUID, origin: Option[ReportFileOrigin]) = Act.secured.all.allowImpersonation.async {
request =>
for {
reportExtra <- visibleReportOrchestrator.getVisibleReportOrThrow(reportId, request.identity)
report = reportExtra.report
stream <- reportFileOrchestrator.downloadReportFilesArchive(report, origin)
} yield Ok
.chunked(stream)
.as("application/zip")
.withHeaders(
"Content-Disposition" -> s"attachment; filename=${frenchFileFormatDate(report.creationDate)}.zip"
)

}

Expand Down

0 comments on commit b56e164

Please sign in to comment.