134 lines
4.4 KiB
Go
134 lines
4.4 KiB
Go
package logic
|
|
|
|
import (
|
|
"blackforestbytes.com/simplecloudnotifier/api/apierr"
|
|
"blackforestbytes.com/simplecloudnotifier/api/ginresp"
|
|
"blackforestbytes.com/simplecloudnotifier/models"
|
|
"database/sql"
|
|
"errors"
|
|
"gogs.mikescher.com/BlackForestBytes/goext/langext"
|
|
)
|
|
|
|
func (ac *AppContext) CheckPermissionUserRead(userid models.UserID) *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsUserRead(userid) {
|
|
return nil
|
|
}
|
|
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionSelfAllMessagesRead() *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsAllMessagesRead(p.Token.OwnerUserID) {
|
|
return nil
|
|
}
|
|
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionAllMessagesRead(userid models.UserID) *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsAllMessagesRead(userid) {
|
|
return nil
|
|
}
|
|
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionChanMessagesRead(channel models.Channel) *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsChannelMessagesRead(channel.ChannelID) {
|
|
|
|
if channel.OwnerUserID == p.Token.OwnerUserID {
|
|
return nil // owned channel
|
|
} else {
|
|
sub, err := ac.app.Database.Primary.GetSubscriptionBySubscriber(ac, p.Token.OwnerUserID, channel.ChannelID)
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
if err != nil {
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 500, apierr.DATABASE_ERROR, "Failed to query subscription", err))
|
|
}
|
|
if sub == nil {
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action (no subscription)", nil))
|
|
}
|
|
if !sub.Confirmed {
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action (subscription not confirmed)", nil))
|
|
}
|
|
return nil // subscribed channel
|
|
}
|
|
}
|
|
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionUserAdmin(userid models.UserID) *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsAdmin(userid) {
|
|
return nil
|
|
}
|
|
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionSend(channel models.Channel, key string) (*models.KeyToken, *ginresp.HTTPResponse) {
|
|
|
|
keytok, err := ac.app.Database.Primary.GetKeyTokenByToken(ac, key)
|
|
if err != nil {
|
|
return nil, langext.Ptr(ginresp.APIError(ac.ginContext, 500, apierr.DATABASE_ERROR, "Failed to query token", err))
|
|
}
|
|
if keytok == nil {
|
|
return nil, langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
if keytok.IsChannelMessagesSend(channel) {
|
|
return keytok, nil
|
|
}
|
|
|
|
return nil, langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionMessageRead(msg models.Message) bool {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsChannelMessagesRead(msg.ChannelID) {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionMessageDelete(msg models.Message) bool {
|
|
p := ac.permissions
|
|
if p.Token != nil && p.Token.IsAdmin(msg.SenderUserID) {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (ac *AppContext) CheckPermissionAny() *ginresp.HTTPResponse {
|
|
p := ac.permissions
|
|
if p.Token == nil {
|
|
return langext.Ptr(ginresp.APIError(ac.ginContext, 401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ac *AppContext) GetPermissionUserID() *models.UserID {
|
|
if ac.permissions.Token == nil {
|
|
return nil
|
|
} else {
|
|
return langext.Ptr(ac.permissions.Token.OwnerUserID)
|
|
}
|
|
}
|
|
|
|
func (ac *AppContext) GetPermissionKeyTokenID() *models.KeyTokenID {
|
|
if ac.permissions.Token == nil {
|
|
return nil
|
|
} else {
|
|
return langext.Ptr(ac.permissions.Token.KeyTokenID)
|
|
}
|
|
}
|