add delete privilege method by privilege id

This commit is contained in:
Pavel 2024-06-04 12:42:40 +03:00
parent bd2e1372f4
commit 70fd6535f7
2 changed files with 60 additions and 14 deletions

@ -48,7 +48,7 @@ func (p *PrivilegeInternal) Create(c *fiber.Ctx) error {
return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "Missing required fields"}) return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "Missing required fields"})
} }
result, err := p.repo.Create(c.Context(), &req) result, err := p.repo.Create(c.Context(), req)
if err != nil { if err != nil {
switch { switch {
case errors.Is(err, our_errors.ErrAlreadyExist): case errors.Is(err, our_errors.ErrAlreadyExist):
@ -72,7 +72,7 @@ func (p *PrivilegeInternal) Update(c *fiber.Ctx) error {
return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "Missing required fields"}) return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "Missing required fields"})
} }
result, err := p.repo.Update(c.Context(), &req) result, err := p.repo.Update(c.Context(), req)
if err != nil { if err != nil {
switch { switch {
case errors.Is(err, our_errors.ErrNotFound): case errors.Is(err, our_errors.ErrNotFound):
@ -87,7 +87,29 @@ func (p *PrivilegeInternal) Update(c *fiber.Ctx) error {
// хаб нода removePrivilege // хаб нода removePrivilege
func (p *PrivilegeInternal) Delete(c *fiber.Ctx) error { func (p *PrivilegeInternal) Delete(c *fiber.Ctx) error {
return c.SendStatus(http.StatusNoContent) var req struct {
ID string `json:"privilegeId"`
}
if err := c.BodyParser(&req); err != nil {
return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "Invalid request payload"})
}
if req.ID == "" {
return c.Status(fiber.StatusBadRequest).JSON(fiber.Map{"error": "PrivilegeID is required"})
}
result, err := p.repo.Delete(c.Context(), req.ID)
if err != nil {
switch {
case errors.Is(err, our_errors.ErrNotFound):
return c.Status(fiber.StatusNotFound).JSON(fiber.Map{"error": "Privilege not found"})
default:
return c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{"error": err.Error()})
}
}
return c.Status(fiber.StatusOK).JSON(result)
} }
// хаб нода getPrivilege // хаб нода getPrivilege

@ -49,17 +49,17 @@ func (p *Privilege) GetAllPrivileges(ctx context.Context) ([]models.Privilege, e
return privileges, nil return privileges, nil
} }
func (p *Privilege) Create(ctx context.Context, req *models.CreateUpdateReq) (*models.Privilege, error) { func (p *Privilege) Create(ctx context.Context, req models.CreateUpdateReq) (models.Privilege, error) {
exist := &models.Privilege{} exist := models.Privilege{}
err := p.mdb.FindOne(ctx, bson.M{"privilegeId": req.PrivilegeId}).Decode(exist) err := p.mdb.FindOne(ctx, bson.M{"privilegeId": req.PrivilegeId}).Decode(exist)
if err == nil { if err == nil {
return nil, errors.ErrAlreadyExist return models.Privilege{}, errors.ErrAlreadyExist
} else if err != mongo.ErrNoDocuments { } else if err != mongo.ErrNoDocuments {
p.logger.Error("Failed to check existing privilege", zap.Error(err)) p.logger.Error("Failed to check existing privilege", zap.Error(err))
return nil, err return models.Privilege{}, err
} }
privilege := &models.Privilege{ privilege := models.Privilege{
ID: primitive.NewObjectID(), ID: primitive.NewObjectID(),
Name: req.Name, Name: req.Name,
PrivilegeID: req.PrivilegeId, PrivilegeID: req.PrivilegeId,
@ -75,20 +75,20 @@ func (p *Privilege) Create(ctx context.Context, req *models.CreateUpdateReq) (*m
_, err = p.mdb.InsertOne(ctx, privilege) _, err = p.mdb.InsertOne(ctx, privilege)
if err != nil { if err != nil {
p.logger.Error("Failed to create privilege", zap.Error(err)) p.logger.Error("Failed to create privilege", zap.Error(err))
return nil, err return models.Privilege{}, err
} }
return privilege, nil return privilege, nil
} }
func (p *Privilege) Update(ctx context.Context, req *models.CreateUpdateReq) (*models.Privilege, error) { func (p *Privilege) Update(ctx context.Context, req models.CreateUpdateReq) (models.Privilege, error) {
exist := &models.Privilege{} exist := models.Privilege{}
err := p.mdb.FindOne(ctx, bson.M{"privilegeId": req.PrivilegeId}).Decode(exist) err := p.mdb.FindOne(ctx, bson.M{"privilegeId": req.PrivilegeId}).Decode(exist)
if err == mongo.ErrNoDocuments { if err == mongo.ErrNoDocuments {
return nil, errors.ErrNotFound return models.Privilege{}, errors.ErrNotFound
} else if err != nil { } else if err != nil {
p.logger.Error("Failed to find privilege", zap.Error(err)) p.logger.Error("Failed to find privilege", zap.Error(err))
return nil, err return models.Privilege{}, err
} }
update := bson.M{ update := bson.M{
@ -106,7 +106,7 @@ func (p *Privilege) Update(ctx context.Context, req *models.CreateUpdateReq) (*m
_, err = p.mdb.UpdateOne(ctx, bson.M{"privilegeId": req.PrivilegeId}, update) _, err = p.mdb.UpdateOne(ctx, bson.M{"privilegeId": req.PrivilegeId}, update)
if err != nil { if err != nil {
p.logger.Error("Failed to update privilege", zap.Error(err)) p.logger.Error("Failed to update privilege", zap.Error(err))
return nil, err return models.Privilege{}, err
} }
exist.Name = req.Name exist.Name = req.Name
@ -119,3 +119,27 @@ func (p *Privilege) Update(ctx context.Context, req *models.CreateUpdateReq) (*m
return exist, nil return exist, nil
} }
func (p *Privilege) Delete(ctx context.Context, id string) (models.Privilege, error) {
var privilege models.Privilege
filter := bson.M{"privilegeId": id}
update := bson.M{
"$set": bson.M{
"isDeleted": true,
"deletedAt": time.Now(),
},
}
opts := options.FindOneAndUpdate().SetReturnDocument(options.After)
err := p.mdb.FindOneAndUpdate(ctx, filter, update, opts).Decode(&privilege)
if err != nil {
if err == mongo.ErrNoDocuments {
return models.Privilege{}, errors.ErrNotFound
}
p.logger.Error("failed to delete privilege", zap.Error(err))
return models.Privilege{}, err
}
return privilege, nil
}