Files
hexabot/api/src/user/controllers/permission.controller.ts
2024-09-21 12:15:36 +01:00

128 lines
4.3 KiB
TypeScript

/*
* Copyright © 2024 Hexastack. All rights reserved.
*
* Licensed under the GNU Affero General Public License v3.0 (AGPLv3) with the following additional terms:
* 1. The name "Hexabot" is a trademark of Hexastack. You may not use this name in derivative works without express written permission.
* 2. All derivative works must include clear attribution to the original creator and software, Hexastack and Hexabot, in a prominent location (e.g., in the software's "About" section, documentation, and README file).
* 3. SaaS Restriction: This software, or any derivative of it, may not be used to offer a competing product or service (SaaS) without prior written consent from Hexastack. Offering the software as a service or using it in a commercial cloud environment without express permission is strictly prohibited.
*/
import {
Body,
Controller,
Delete,
Get,
HttpCode,
NotFoundException,
Param,
Post,
Query,
UseInterceptors,
} from '@nestjs/common';
import { CsrfCheck } from '@tekuconcept/nestjs-csrf';
import { TFilterQuery } from 'mongoose';
import { CsrfInterceptor } from '@/interceptors/csrf.interceptor';
import { LoggerService } from '@/logger/logger.service';
import { BaseController } from '@/utils/generics/base-controller';
import { PopulatePipe } from '@/utils/pipes/populate.pipe';
import { SearchFilterPipe } from '@/utils/pipes/search-filter.pipe';
import { PermissionCreateDto } from '../dto/permission.dto';
import {
Permission,
PermissionFull,
PermissionPopulate,
PermissionStub,
} from '../schemas/permission.schema';
import { ModelService } from '../services/model.service';
import { PermissionService } from '../services/permission.service';
import { RoleService } from '../services/role.service';
@UseInterceptors(CsrfInterceptor)
@Controller('permission')
export class PermissionController extends BaseController<
Permission,
PermissionStub,
PermissionPopulate,
PermissionFull
> {
constructor(
private readonly permissionService: PermissionService,
private readonly logger: LoggerService,
private readonly roleService: RoleService,
private readonly modelService: ModelService,
) {
super(permissionService);
}
/**
* Retrieves permissions based on optional filters and populates relationships if requested.
*
* @param populate - List of related entities to populate ('model', 'role').
* @param filters - Filter conditions to apply when fetching permissions.
*
* @returns A list of permissions, potentially populated with related entities.
*/
@Get()
async find(
@Query(PopulatePipe)
populate: string[],
@Query(
new SearchFilterPipe<Permission>({
allowedFields: ['model', 'role'],
}),
)
filters: TFilterQuery<Permission>,
) {
return this.canPopulate(populate)
? await this.permissionService.findAndPopulate(filters)
: await this.permissionService.find(filters);
}
/**
* Creates a new permission entity.
*
* Validates the input data and ensures the role and model exist before creation.
* CSRF protection is applied to prevent unauthorized requests.
*
* @param permission - The data transfer object (DTO) containing the details for the new permission.
*
* @returns The created permission.
*/
@CsrfCheck(true)
@Post()
async create(@Body() permission: PermissionCreateDto) {
this.validate({
dto: permission,
allowedIds: {
role: (await this.roleService.findOne(permission.role))?.id,
model: (await this.modelService.findOne(permission.model))?.id,
},
});
return await this.permissionService.create(permission);
}
/**
* Deletes a permission entity by its ID.
*
* Attempts to delete the permission and logs a warning if the permission is not found.
* CSRF protection is applied, and a 204 HTTP response is returned upon successful deletion.
*
* @param id - The ID of the permission to delete.
*
* @returns The result of the deletion operation.
*/
@CsrfCheck(true)
@Delete(':id')
@HttpCode(204)
async deleteOne(@Param('id') id: string) {
const result = await this.permissionService.deleteOne(id);
if (result.deletedCount === 0) {
this.logger.warn(`Unable to delete Permission by id ${id}`);
throw new NotFoundException(`Permission with ID ${id} not found`);
}
return result;
}
}