feat: ✨ routing_permission routing
This commit is contained in:
parent
511e05bd54
commit
498742deb2
8 changed files with 322 additions and 0 deletions
2
migrations/20241224112057_routing_permission.down.sql
Normal file
2
migrations/20241224112057_routing_permission.down.sql
Normal file
|
@ -0,0 +1,2 @@
|
|||
-- Add down migration script here
|
||||
DROP TABLE IF EXISTS "routing_permission";
|
6
migrations/20241224112057_routing_permission.up.sql
Normal file
6
migrations/20241224112057_routing_permission.up.sql
Normal file
|
@ -0,0 +1,6 @@
|
|||
-- Add up migration script here
|
||||
CREATE TABLE IF NOT EXISTS "routing_permission"(
|
||||
routing_id BIGSERIAL NOT NULL REFERENCES "routing"(id),
|
||||
permission_id BIGSERIAL NOT NULL REFERENCES "permission"(id),
|
||||
PRIMARY KEY (routing_id, permission_id)
|
||||
);
|
|
@ -8,6 +8,7 @@ pub mod post_interaction;
|
|||
pub mod role;
|
||||
pub mod role_permission;
|
||||
pub mod routing;
|
||||
pub mod routing_permission;
|
||||
pub mod user;
|
||||
pub mod user_contact;
|
||||
|
||||
|
|
106
src/database/routing_permission.rs
Normal file
106
src/database/routing_permission.rs
Normal file
|
@ -0,0 +1,106 @@
|
|||
use sqlx::{Pool, Postgres};
|
||||
|
||||
use crate::feature::routing_permission::RoutingPermission;
|
||||
|
||||
pub async fn create(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
INSERT INTO "routing_permission"(routing_id, permission_id)
|
||||
VALUES ($1, $2)
|
||||
RETURNING *
|
||||
"#,
|
||||
routing_id,
|
||||
permission_id
|
||||
)
|
||||
.fetch_one(database_connection)
|
||||
.await
|
||||
}
|
||||
|
||||
pub async fn read(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
SELECT * FROM "routing_permission" WHERE "routing_id" = $1 AND "permission_id" = $2
|
||||
"#,
|
||||
routing_id,
|
||||
permission_id,
|
||||
)
|
||||
.fetch_one(database_connection)
|
||||
.await
|
||||
}
|
||||
|
||||
pub async fn update(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
UPDATE "routing_permission" SET "permission_id" = $2 WHERE "routing_id" = $1
|
||||
RETURNING *
|
||||
"#,
|
||||
routing_id,
|
||||
permission_id,
|
||||
)
|
||||
.fetch_one(database_connection)
|
||||
.await
|
||||
}
|
||||
|
||||
pub async fn delete(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
DELETE FROM "routing_permission" WHERE "routing_id" = $1 AND "permission_id" = $2
|
||||
RETURNING *
|
||||
"#,
|
||||
routing_id,
|
||||
permission_id,
|
||||
)
|
||||
.fetch_one(database_connection)
|
||||
.await
|
||||
}
|
||||
|
||||
pub async fn read_all_for_routing(
|
||||
routing_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<Vec<RoutingPermission>, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
SELECT * FROM "routing_permission" WHERE "routing_id" = $1
|
||||
"#,
|
||||
routing_id
|
||||
)
|
||||
.fetch_all(database_connection)
|
||||
.await
|
||||
}
|
||||
|
||||
pub async fn delete_all_for_routing(
|
||||
routing_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<Vec<RoutingPermission>, sqlx::Error> {
|
||||
sqlx::query_as!(
|
||||
RoutingPermission,
|
||||
r#"
|
||||
DELETE FROM "routing_permission" WHERE "routing_id" = $1
|
||||
RETURNING *
|
||||
"#,
|
||||
routing_id,
|
||||
)
|
||||
.fetch_all(database_connection)
|
||||
.await
|
||||
}
|
|
@ -8,5 +8,6 @@ pub mod post_interaction;
|
|||
pub mod role;
|
||||
pub mod role_permission;
|
||||
pub mod routing;
|
||||
pub mod routing_permission;
|
||||
pub mod user;
|
||||
pub mod user_contact;
|
||||
|
|
57
src/feature/routing_permission.rs
Normal file
57
src/feature/routing_permission.rs
Normal file
|
@ -0,0 +1,57 @@
|
|||
use serde::{Deserialize, Serialize};
|
||||
use sqlx::{Pool, Postgres};
|
||||
|
||||
use crate::database::routing_permission;
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
pub struct RoutingPermission {
|
||||
pub routing_id: i64,
|
||||
pub permission_id: i64,
|
||||
}
|
||||
|
||||
impl RoutingPermission {
|
||||
pub async fn create(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
routing_permission::create(routing_id, permission_id, database_connection).await
|
||||
}
|
||||
|
||||
pub async fn read(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
routing_permission::read(routing_id, permission_id, database_connection).await
|
||||
}
|
||||
|
||||
pub async fn update(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
routing_permission::update(routing_id, permission_id, database_connection).await
|
||||
}
|
||||
pub async fn delete(
|
||||
routing_id: &i64,
|
||||
permission_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<RoutingPermission, sqlx::Error> {
|
||||
routing_permission::delete(routing_id, permission_id, database_connection).await
|
||||
}
|
||||
|
||||
pub async fn read_all_for_routing(
|
||||
routing_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<Vec<RoutingPermission>, sqlx::Error> {
|
||||
routing_permission::read_all_for_routing(routing_id, database_connection).await
|
||||
}
|
||||
|
||||
pub async fn delete_all_for_routing(
|
||||
routing_id: &i64,
|
||||
database_connection: &Pool<Postgres>,
|
||||
) -> Result<Vec<RoutingPermission>, sqlx::Error> {
|
||||
routing_permission::delete_all_for_routing(routing_id, database_connection).await
|
||||
}
|
||||
}
|
|
@ -8,6 +8,7 @@ pub mod post_interaction;
|
|||
pub mod role;
|
||||
pub mod role_permission;
|
||||
pub mod routing;
|
||||
pub mod routing_permission;
|
||||
pub mod user;
|
||||
pub mod user_contact;
|
||||
|
||||
|
@ -63,6 +64,10 @@ pub async fn route(State(app_state): State<AppState>) -> Router {
|
|||
"/routings",
|
||||
routing::route(axum::extract::State(app_state.clone())),
|
||||
)
|
||||
.nest(
|
||||
"/routing_permissions",
|
||||
routing_permission::route(axum::extract::State(app_state.clone())),
|
||||
)
|
||||
.layer(CorsLayer::permissive())
|
||||
.with_state(app_state)
|
||||
}
|
||||
|
|
144
src/routing/routing_permission.rs
Normal file
144
src/routing/routing_permission.rs
Normal file
|
@ -0,0 +1,144 @@
|
|||
use axum::{
|
||||
extract::{Path, State},
|
||||
http::StatusCode,
|
||||
response::IntoResponse,
|
||||
routing::{delete, get, patch, post},
|
||||
Json, Router,
|
||||
};
|
||||
use serde::{Deserialize, Serialize};
|
||||
|
||||
use crate::{feature::routing_permission::RoutingPermission, AppState};
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
struct CreateRoutingPermission {
|
||||
pub routing_id: i64,
|
||||
pub permission_id: i64,
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
struct UpdateRoutingPermission {
|
||||
pub routing_id: i64,
|
||||
pub permission_id: i64,
|
||||
}
|
||||
|
||||
pub fn route(State(app_state): State<AppState>) -> Router<AppState> {
|
||||
Router::new()
|
||||
.route("/", post(create))
|
||||
.route(
|
||||
"/routings/:routing_id/permissions/:permission_id",
|
||||
get(read),
|
||||
)
|
||||
.route("/", patch(update))
|
||||
.route(
|
||||
"/routings/:routing_id/permissions/:permission_id",
|
||||
delete(delete_),
|
||||
)
|
||||
.route("/routings/:routing_id", get(read_all_for_routing))
|
||||
.route("/routings/:routing_id", delete(delete_all_for_routing))
|
||||
.with_state(app_state)
|
||||
}
|
||||
|
||||
async fn create(
|
||||
State(app_state): State<AppState>,
|
||||
Json(create_role_permission): Json<CreateRoutingPermission>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::create(
|
||||
&create_role_permission.routing_id,
|
||||
&create_role_permission.permission_id,
|
||||
&app_state.database_connection,
|
||||
)
|
||||
.await
|
||||
{
|
||||
Ok(role_permission) => (
|
||||
StatusCode::CREATED,
|
||||
Json(serde_json::json!(role_permission)),
|
||||
),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
async fn read(
|
||||
State(app_state): State<AppState>,
|
||||
Path((routing_id, permission_id)): Path<(i64, i64)>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::read(&routing_id, &permission_id, &app_state.database_connection).await
|
||||
{
|
||||
Ok(role_permission) => (StatusCode::OK, Json(serde_json::json!(role_permission))),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
async fn update(
|
||||
State(app_state): State<AppState>,
|
||||
Json(update_role): Json<UpdateRoutingPermission>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::update(
|
||||
&update_role.routing_id,
|
||||
&update_role.permission_id,
|
||||
&app_state.database_connection,
|
||||
)
|
||||
.await
|
||||
{
|
||||
Ok(role_permission) => (
|
||||
StatusCode::ACCEPTED,
|
||||
Json(serde_json::json!(role_permission)),
|
||||
),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
async fn delete_(
|
||||
State(app_state): State<AppState>,
|
||||
Path((routing_id, permission_id)): Path<(i64, i64)>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::delete(&routing_id, &permission_id, &app_state.database_connection)
|
||||
.await
|
||||
{
|
||||
Ok(role_permission) => (
|
||||
StatusCode::NO_CONTENT,
|
||||
Json(serde_json::json!(role_permission)),
|
||||
),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
async fn read_all_for_routing(
|
||||
State(app_state): State<AppState>,
|
||||
Path(routing_id): Path<i64>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::read_all_for_routing(&routing_id, &app_state.database_connection).await
|
||||
{
|
||||
Ok(role_permissions) => (StatusCode::OK, Json(serde_json::json!(role_permissions))),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
async fn delete_all_for_routing(
|
||||
State(app_state): State<AppState>,
|
||||
Path(routing_id): Path<i64>,
|
||||
) -> impl IntoResponse {
|
||||
match RoutingPermission::delete_all_for_routing(&routing_id, &app_state.database_connection)
|
||||
.await
|
||||
{
|
||||
Ok(role_permissions) => (StatusCode::OK, Json(serde_json::json!(role_permissions))),
|
||||
Err(err_val) => (
|
||||
StatusCode::BAD_REQUEST,
|
||||
Json(serde_json::json!(err_val.to_string())),
|
||||
),
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue