package service import ( "context" "git.itzana.me/strafesnet/maps-service/pkg/api" "git.itzana.me/strafesnet/maps-service/pkg/datastore" "git.itzana.me/strafesnet/maps-service/pkg/model" ) // CreateScriptPolicy implements createScriptPolicy operation. // // Create a new script policy. // // POST /script-policy func (svc *Service) CreateScriptPolicy(ctx context.Context, req *api.ScriptPolicyCreate) (*api.ID, error) { userInfo, ok := ctx.Value("UserInfo").(UserInfo) if !ok { return nil, ErrUserInfo } if !userInfo.Roles.ScriptWrite { return nil, ErrPermissionDenied } from_script, err := svc.DB.Scripts().Get(ctx, req.FromScriptID) if err != nil { return nil, err } // the existence of ToScriptID does not need to be validated because it's checked by a foreign key constraint. script, err := svc.DB.ScriptPolicy().Create(ctx, model.ScriptPolicy{ ID: 0, FromScriptHash: from_script.Hash, ToScriptID: req.ToScriptID, Policy: model.Policy(req.Policy), }) if err != nil { return nil, err } return &api.ID{ ID: script.ID, }, nil } // ListScriptPolicy implements listScriptPolicy operation. // // Get list of script policies. // // GET /script-policy func (svc *Service) ListScriptPolicy(ctx context.Context, params api.ListScriptPolicyParams) ([]api.ScriptPolicy, error) { filter := datastore.Optional() if params.FromScriptHash.IsSet(){ hash, err := model.HashParse(params.FromScriptHash.Value) if err != nil { return nil, err } filter.AddNotNil("from_script_hash", int64(hash)) // No type safety! } if params.ToScriptID.IsSet(){ filter.AddNotNil("to_script_id", params.ToScriptID.Value) } if params.Policy.IsSet(){ filter.AddNotNil("policy", params.Policy.Value) } items, err := svc.DB.ScriptPolicy().List(ctx, filter, model.Page{ Number: params.Page, Size: params.Limit, }) if err != nil { return nil, err } var resp []api.ScriptPolicy for i := 0; i < len(items); i++ { resp = append(resp, api.ScriptPolicy{ ID: items[i].ID, FromScriptHash: model.HashFormat(uint64(items[i].FromScriptHash)), ToScriptID: items[i].ToScriptID, Policy: int32(items[i].Policy), }) } return resp, nil } // DeleteScriptPolicy implements deleteScriptPolicy operation. // // Delete the specified script policy by ID. // // DELETE /script-policy/{ScriptPolicyID} func (svc *Service) DeleteScriptPolicy(ctx context.Context, params api.DeleteScriptPolicyParams) error { userInfo, ok := ctx.Value("UserInfo").(UserInfo) if !ok { return ErrUserInfo } if !userInfo.Roles.ScriptWrite { return ErrPermissionDenied } return svc.DB.ScriptPolicy().Delete(ctx, params.ScriptPolicyID) } // GetScriptPolicy implements getScriptPolicy operation. // // Get the specified script policy by ID. // // GET /script-policy/{ScriptPolicyID} func (svc *Service) GetScriptPolicy(ctx context.Context, params api.GetScriptPolicyParams) (*api.ScriptPolicy, error) { _, ok := ctx.Value("UserInfo").(UserInfo) if !ok { return nil, ErrUserInfo } // Read permission for script policy only requires you to be logged in policy, err := svc.DB.ScriptPolicy().Get(ctx, params.ScriptPolicyID) if err != nil { return nil, err } return &api.ScriptPolicy{ ID: policy.ID, FromScriptHash: model.HashFormat(uint64(policy.FromScriptHash)), ToScriptID: policy.ToScriptID, Policy: int32(policy.Policy), }, nil } // UpdateScriptPolicy implements updateScriptPolicy operation. // // Update the specified script policy by ID. // // POST /script-policy/{ScriptPolicyID} func (svc *Service) UpdateScriptPolicy(ctx context.Context, req *api.ScriptPolicyUpdate, params api.UpdateScriptPolicyParams) error { userInfo, ok := ctx.Value("UserInfo").(UserInfo) if !ok { return ErrUserInfo } if !userInfo.Roles.ScriptWrite { return ErrPermissionDenied } pmap := datastore.Optional() if from_script_id, ok := req.FromScriptID.Get(); ok { from_script, err := svc.DB.Scripts().Get(ctx, from_script_id) if err != nil { return err } pmap.Add("from_script_hash", from_script.Hash) } if to_script_id, ok := req.ToScriptID.Get(); ok { pmap.Add("to_script_id", to_script_id) } if policy, ok := req.Policy.Get(); ok { pmap.Add("policy", policy) } return svc.DB.ScriptPolicy().Update(ctx, req.ID, pmap) }