Files
go-socket/packages/httpRequest/hubs.go
T
2026-04-25 16:04:53 +02:00

144 lines
3.8 KiB
Go

package httpRequest
import (
"net/http"
"time"
"go-socket/packages/Enums/permission"
"go-socket/packages/cache"
"go-socket/packages/postgresql"
"go-socket/packages/types"
"github.com/google/uuid"
)
func hasHubUserGlobalPermission(user *types.HubUser, hub *types.Hub, perm permission.Global) bool {
for _, roleId := range user.GlobalRoles {
if role, ok := hub.GlobalRoles[roleId]; ok && role.HasPermission(perm) {
return true
}
}
return false
}
func hasHubUserChannelGroupPermission(user *types.HubUser, hub *types.Hub, perm permission.ChannelGroup) bool {
for _, roleId := range user.ChannelGroupRoles {
if role, ok := hub.ChannelGroupRoles[roleId]; ok && role.HasPermission(perm) {
return true
}
}
return false
}
func HandleHubCreate(response http.ResponseWriter, request *http.Request) {
if !validCheckWithResponseOnFail(&response, request, normal) {
return
}
ctx := request.Context()
user, err := getUserByToken(ctx, request.Header.Get("token"))
if err != nil {
http.Error(response, "invalid token", http.StatusUnauthorized)
return
}
hubName := request.Header.Get("hubname")
if hubName == "" {
http.Error(response, "hub name is required", http.StatusBadRequest)
return
}
hub := types.CreateHub()
hub.Name = hubName
hub.Creator = user.Id
hub.Color = types.Rgba{}.GetRandom()
hub.CreatedAt = time.Now()
rootGrp := &types.HubChannelGroup{
Id: uuid.New(),
Name: "root",
Color: types.Rgba{6, 2, 1, 255},
Position: uint8(0),
}
hub.ChannelGroups[rootGrp.Id] = rootGrp
rootRole := &types.HubRole{
Id: 0,
Name: "root",
Color: types.Rgba{255, 0, 0, 255},
Permissions: ^permission.Global(0),
}
hub.GlobalRoles[rootRole.Id] = rootRole
rootUser := &types.HubUser{
Id: user.Id,
Username: user.Name,
GlobalRoles: []uint8{rootRole.Id},
CreatedAt: hub.CreatedAt,
}
hub.Users[rootUser.Id] = rootUser
err = postgresql.HubSave(ctx, hub)
if err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
if err = postgresql.HubGlobalRoleSave(ctx, hub.Id, rootRole); err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
if err = postgresql.HubChannelGroupSave(ctx, hub.Id, rootGrp); err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
if err = postgresql.HubUserAdd(ctx, hub.Id, rootUser); err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
if err = postgresql.HubUserGlobalRoleAdd(ctx, hub.Id, user.Id, rootRole.Id); err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
cache.SaveHub(hub)
response.WriteHeader(http.StatusCreated)
response.Write([]byte(hub.Id.String()))
}
func HandleHubDelete(response http.ResponseWriter, request *http.Request) {
if !validCheckWithResponseOnFail(&response, request, normal) {
return
}
ctx := request.Context()
_, hubUser, hub, err := getHubUserIfValidWithResponseOnFail(ctx, response, request.Header.Get("token"), request.Header.Get("hubid"))
if err != nil {
return
}
if !hasHubUserGlobalPermission(hubUser, hub, permission.GlobalRemoveHub) {
http.Error(response, "forbidden", http.StatusForbidden)
return
}
if err := postgresql.HubDelete(ctx, hub); err != nil {
http.Error(response, "internal server error", http.StatusInternalServerError)
return
}
cache.DeleteHub(hub)
response.WriteHeader(http.StatusOK)
}
func HandleHubGet(response http.ResponseWriter, request *http.Request) {
if !validCheckWithResponseOnFail(&response, request, normal) {
return
}
ctx := request.Context()
_, _, hub, err := getHubUserIfValidWithResponseOnFail(ctx, response, request.Header.Get("token"), request.Header.Get("hubid"))
if err != nil {
return
}
}