@@ -55,35 +55,13 @@ func NewUserAttributesRestHandlerImpl(logger *zap.SugaredLogger, enforcer casbin
55
55
}
56
56
57
57
func (handler * UserAttributesRestHandlerImpl ) AddUserAttributes (w http.ResponseWriter , r * http.Request ) {
58
- userId , err := handler .userService .GetLoggedInUser (r )
59
- if userId == 0 || err != nil {
60
- common .WriteJsonResp (w , err , "Unauthorized User" , http .StatusUnauthorized )
61
- return
62
- }
63
- decoder := json .NewDecoder (r .Body )
64
- var dto attributes.UserAttributesDto
65
- err = decoder .Decode (& dto )
66
- if err != nil {
67
- handler .logger .Errorw ("request err, AddUserAttributes" , "err" , err , "payload" , dto )
68
- common .WriteJsonResp (w , err , nil , http .StatusBadRequest )
69
- return
70
- }
71
-
72
- dto .UserId = userId
73
- //if ok := handler.enforcer.Enforce(token, casbin.ResourceGlobal, casbin.ActionCreate, "*"); !ok {
74
- // common.WriteJsonResp(w, errors.New("unauthorized"), nil, http.StatusForbidden)
75
- // return
76
- //}
77
- emailId , err := handler .userService .GetActiveEmailById (userId )
78
- if err != nil {
79
- handler .logger .Errorw ("request err, UpdateUserAttributes" , "err" , err , "payload" , dto )
80
- common .WriteJsonResp (w , errors .New ("unauthorized" ), nil , http .StatusForbidden )
58
+ dto , success := handler .validateUserAttributesRequest (w , r , "PatchUserAttributes" )
59
+ if ! success {
81
60
return
82
61
}
83
- dto .EmailId = emailId
84
62
85
63
handler .logger .Infow ("request payload, AddUserAttributes" , "payload" , dto )
86
- resp , err := handler .userAttributesService .AddUserAttributes (& dto )
64
+ resp , err := handler .userAttributesService .AddUserAttributes (dto )
87
65
if err != nil {
88
66
handler .logger .Errorw ("service err, AddUserAttributes" , "err" , err , "payload" , dto )
89
67
common .WriteJsonResp (w , err , nil , http .StatusInternalServerError )
@@ -99,79 +77,64 @@ func (handler *UserAttributesRestHandlerImpl) AddUserAttributes(w http.ResponseW
99
77
// @Success 200 {object} attributes.UserAttributesDto
100
78
// @Router /orchestrator/attributes/user/update [POST]
101
79
func (handler * UserAttributesRestHandlerImpl ) UpdateUserAttributes (w http.ResponseWriter , r * http.Request ) {
102
- userId , err := handler .userService .GetLoggedInUser (r )
103
- if userId == 0 || err != nil {
104
- common .WriteJsonResp (w , err , "Unauthorized User" , http .StatusUnauthorized )
80
+ dto , success := handler .validateUserAttributesRequest (w , r , "PatchUserAttributes" )
81
+ if ! success {
105
82
return
106
83
}
107
84
108
- decoder := json .NewDecoder (r .Body )
109
- var dto attributes.UserAttributesDto
110
- err = decoder .Decode (& dto )
85
+ handler .logger .Infow ("request payload, UpdateUserAttributes" , "payload" , dto )
86
+ resp , err := handler .userAttributesService .UpdateUserAttributes (dto )
111
87
if err != nil {
112
- handler .logger .Errorw ("request err, UpdateUserAttributes" , "err" , err , "payload" , dto )
113
- common .WriteJsonResp (w , err , nil , http .StatusBadRequest )
88
+ handler .logger .Errorw ("service err, UpdateUserAttributes" , "err" , err , "payload" , dto )
89
+ common .WriteJsonResp (w , err , nil , http .StatusInternalServerError )
114
90
return
115
91
}
92
+ common .WriteJsonResp (w , nil , resp , http .StatusOK )
93
+ }
116
94
117
- dto .UserId = userId
118
- //if ok := handler.enforcer.Enforce(token, casbin.ResourceGlobal, casbin.ActionUpdate, "*"); !ok {
119
- // common.WriteJsonResp(w, errors.New("unauthorized"), nil, http.StatusForbidden)
120
- // return
121
- //}
122
-
123
- emailId , err := handler .userService .GetActiveEmailById (userId )
124
- if err != nil {
125
- handler .logger .Errorw ("request err, UpdateUserAttributes" , "err" , err , "payload" , dto )
126
- common .WriteJsonResp (w , errors .New ("unauthorized" ), nil , http .StatusForbidden )
95
+ func (handler * UserAttributesRestHandlerImpl ) PatchUserAttributes (w http.ResponseWriter , r * http.Request ) {
96
+ dto , success := handler .validateUserAttributesRequest (w , r , "PatchUserAttributes" )
97
+ if ! success {
127
98
return
128
99
}
129
- dto .EmailId = emailId
130
100
131
- handler .logger .Infow ("request payload, UpdateUserAttributes " , "payload" , dto )
132
- resp , err := handler .userAttributesService .UpdateUserAttributes ( & dto )
101
+ handler .logger .Infow ("request payload, PatchUserAttributes " , "payload" , dto )
102
+ resp , err := handler .userAttributesService .PatchUserAttributes ( dto )
133
103
if err != nil {
134
- handler .logger .Errorw ("service err, UpdateUserAttributes " , "err" , err , "payload" , dto )
104
+ handler .logger .Errorw ("service err, PatchUserAttributes " , "err" , err , "payload" , dto )
135
105
common .WriteJsonResp (w , err , nil , http .StatusInternalServerError )
136
106
return
137
107
}
138
108
common .WriteJsonResp (w , nil , resp , http .StatusOK )
139
109
}
140
110
141
- func (handler * UserAttributesRestHandlerImpl ) PatchUserAttributes (w http.ResponseWriter , r * http.Request ) {
111
+ func (handler * UserAttributesRestHandlerImpl ) validateUserAttributesRequest (w http.ResponseWriter , r * http.Request , operation string ) ( * attributes. UserAttributesDto , bool ) {
142
112
userId , err := handler .userService .GetLoggedInUser (r )
143
113
if userId == 0 || err != nil {
144
114
common .WriteJsonResp (w , err , "Unauthorized User" , http .StatusUnauthorized )
145
- return
115
+ return nil , false
146
116
}
147
117
148
118
decoder := json .NewDecoder (r .Body )
149
119
var dto attributes.UserAttributesDto
150
120
err = decoder .Decode (& dto )
151
121
if err != nil {
152
- handler .logger .Errorw ("request err, PatchUserAttributes" , "err" , err , "payload" , dto )
122
+ handler .logger .Errorw ("request err, " + operation , "err" , err , "payload" , dto )
153
123
common .WriteJsonResp (w , err , nil , http .StatusBadRequest )
154
- return
124
+ return nil , false
155
125
}
156
126
157
127
dto .UserId = userId
158
128
159
129
emailId , err := handler .userService .GetActiveEmailById (userId )
160
130
if err != nil {
161
- handler .logger .Errorw ("request err, PatchUserAttributes" , "err" , err , "payload" , dto )
131
+ handler .logger .Errorw ("request err, " + operation , "err" , err , "payload" , dto )
162
132
common .WriteJsonResp (w , errors .New ("unauthorized" ), nil , http .StatusForbidden )
163
- return
133
+ return nil , false
164
134
}
165
135
dto .EmailId = emailId
166
136
167
- handler .logger .Infow ("request payload, PatchUserAttributes" , "payload" , dto )
168
- resp , err := handler .userAttributesService .PatchUserAttributes (& dto )
169
- if err != nil {
170
- handler .logger .Errorw ("service err, PatchUserAttributes" , "err" , err , "payload" , dto )
171
- common .WriteJsonResp (w , err , nil , http .StatusInternalServerError )
172
- return
173
- }
174
- common .WriteJsonResp (w , nil , resp , http .StatusOK )
137
+ return & dto , true
175
138
}
176
139
177
140
// @Summary get user attributes
@@ -195,11 +158,6 @@ func (handler *UserAttributesRestHandlerImpl) GetUserAttribute(w http.ResponseWr
195
158
return
196
159
}
197
160
198
- //if ok := handler.enforcer.Enforce(token, casbin.ResourceGlobal, casbin.ActionGet, "*"); !ok {
199
- // common.WriteJsonResp(w, errors.New("unauthorized"), nil, http.StatusForbidden)
200
- // return
201
- //}
202
-
203
161
dto := attributes.UserAttributesDto {}
204
162
205
163
emailId , err := handler .userService .GetActiveEmailById (userId )
0 commit comments