// Update handles PUT func (ctl *EventController) Update(c *models.Context) { _, itemTypeID, itemID, status, err := c.GetItemTypeAndItemID() if err != nil { c.RespondWithErrorDetail(err, status) return } // Validate inputs m, status, err := models.GetEvent(c.Site.ID, itemID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, itemTypeID, itemID), ) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End Authorisation // Populate where applicable from auth and context m.Meta.EditedByNullable = sql.NullInt64{Int64: c.Auth.ProfileID, Valid: true} m.Meta.EditedNullable = pq.NullTime{Time: time.Now(), Valid: true} status, err = m.Update(c.Site.ID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeEvent], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeEvent, m.ID, ), ) }
// Update handles PUT func (ctl *ProfileOptionsController) Update(c *models.Context) { var m = models.ProfileOptionType{} err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Profile ID cannot be changed m.ProfileID = c.Auth.ProfileID status, err := m.Update() if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Update( c.Site.ID, h.ItemTypes[h.ItemTypeProfile], m.ProfileID, c.Auth.ProfileID, time.Now(), c.IP, ) // Respond c.RespondWithSeeOther( fmt.Sprintf("/api/v1/profiles/options"), ) }
// Update handles PUT // Explicitly associates a profile to this role func (ctl *RoleProfileController) Update(c *models.Context) { // Validate inputs var microcosmID int64 if sid, exists := c.RouteVars["microcosm_id"]; exists { id, err := strconv.ParseInt(sid, 10, 64) if err != nil { c.RespondWithErrorMessage("microcosm_id in URL is not a number", http.StatusBadRequest) return } microcosmID = id } roleID, err := strconv.ParseInt(c.RouteVars["role_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("role_id in URL is not a number", http.StatusBadRequest) return } r, status, err := models.GetRole(c.Site.ID, microcosmID, roleID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } profileID, err := strconv.ParseInt(c.RouteVars["profile_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("profile_id in URL is not a number", http.StatusBadRequest) return } m := models.RoleProfileType{} m.ID = profileID // Authorisation perms := models.GetPermission( models.MakeAuthorisationContext(c, microcosmID, h.ItemTypes[h.ItemTypeMicrocosm], microcosmID), ) if microcosmID > 0 { // Related to a Microcosm if !perms.IsModerator && !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } else { // Default role for the site if !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } status, err = m.Update(c.Site.ID, roleID) if err != nil { c.RespondWithErrorDetail(err, status) return } c.RespondWithSeeOther(m.GetLink(r.GetLink())) }
// Update handles PUT func (ctl *ProfileController) Update(c *models.Context) { _, itemTypeID, itemID, status, err := c.GetItemTypeAndItemID() if err != nil { c.RespondWithErrorDetail(err, status) return } m, status, err := models.GetProfile(c.Site.ID, itemID) if err != nil { c.RespondWithErrorDetail(err, status) return } err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, itemTypeID, itemID), ) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End Authorisation // Populate site and user ID from goweb context m.SiteID = c.Site.ID status, err = m.Update() if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeProfile], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeProfile, m.ID, ), ) }
// Create handles POST func (ctl *ProfilesController) Create(c *models.Context) { m := models.ProfileType{} m.Visible = true err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // TODO: Auth rules on creation if m.SiteID != 0 { c.RespondWithErrorMessage( "You cannot supply a site ID when creating a profile", http.StatusBadRequest, ) return } if m.UserID != 0 { c.RespondWithErrorMessage( "You cannot supply a user ID when creating a profile", http.StatusBadRequest, ) return } // Populate site and user ID from goweb context m.SiteID = c.Site.ID m.UserID = c.Auth.UserID status, err := m.Insert() if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeProfile], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeProfile, m.ID, ), ) }
// Update handles PUT func (ctl *AttributeController) Update(c *models.Context) { _, itemTypeID, itemID, status, err := c.GetItemTypeAndItemID() if err != nil { c.RespondWithErrorDetail(err, status) return } key := c.RouteVars["key"] // Exception from normal model is that we don't attempt to fetch before // we update. We will be doing an upsert (update or insert) rather than // a pure update. As such, the item may not exist before we update it and // we allow that to be resolved later. This works in this case as the data // structure is simple and we don't care about extended metadata m := models.AttributeType{} m.Key = key m.Number = sql.NullFloat64{Float64: math.MaxFloat64} err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } perms := models.GetPermission(models.MakeAuthorisationContext(c, 0, itemTypeID, itemID)) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } status, err = m.Update(itemTypeID, itemID) if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeAttribute], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%s", fmt.Sprintf(h.APITypeAttribute, c.RouteVars["type"], itemID), key, ), ) }
// UpdateMany handles PUT for the collection func (ctl *HuddleParticipantsController) UpdateMany(c *models.Context) { // Validate inputs huddleID, err := strconv.ParseInt(c.RouteVars["huddle_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("huddle_id in URL is not a number", http.StatusBadRequest) return } r, status, err := models.GetHuddle(c.Site.ID, c.Auth.ProfileID, huddleID) if err != nil { c.RespondWithErrorDetail(err, status) return } // Start Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeHuddle], huddleID), ) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } if r.IsConfidential == true { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End Authorisation ems := []models.HuddleParticipantType{} err = c.Fill(&ems) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } status, err = models.UpdateManyHuddleParticipants(c.Site.ID, huddleID, ems) if err != nil { c.RespondWithErrorDetail(err, status) return } c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeHuddle, huddleID, ), ) }
// Update handles PUT func (ctl *SiteController) Update(c *models.Context) { _, _, itemID, status, err := c.GetItemTypeAndItemID() if err != nil { c.RespondWithErrorDetail(err, status) return } m, status, err := models.GetSite(itemID) if err != nil { c.RespondWithErrorDetail(err, status) return } // Use the user ID to check, since the current context is a different site (the root site) // than the site the owner profile is associated with. owner, status, err := models.GetProfileSummary(m.ID, m.OwnedByID) if err != nil { c.RespondWithErrorDetail(err, status) return } if owner.UserID != c.Auth.UserID { c.RespondWithErrorMessage( fmt.Sprintf("You must be the owner of the site to update it"), http.StatusForbidden, ) return } err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } status, err = m.Update() if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeSite], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther(fmt.Sprintf("%s/%d", h.APITypeSite, m.ID)) }
// Create handles GET func (ctl *MicrocosmsController) Create(c *models.Context) { // Validate inputs m := models.MicrocosmType{} err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start : Authorisation perms := models.GetPermission( models.MakeAuthorisationContext(c, 0, h.ItemTypes[h.ItemTypeSite], c.Site.ID), ) if !perms.CanCreate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End : Authorisation // Populate where applicable from auth and context m.SiteID = c.Site.ID m.Meta.CreatedByID = c.Auth.ProfileID m.Meta.Created = time.Now() m.OwnedByID = c.Auth.ProfileID status, err := m.Insert() if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeMicrocosm], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeMicrocosm, m.ID, ), ) }
// Update handles PUT func (ctl *UpdateOptionController) Update(c *models.Context) { _, _, itemID, status, err := c.GetItemTypeAndItemID() if err != nil { c.RespondWithErrorDetail(err, status) return } var exists bool m, status, err := models.GetUpdateOptionByUpdateType(c.Auth.ProfileID, itemID) if err != nil && status != http.StatusNotFound { c.RespondWithErrorDetail(err, status) return } if status == http.StatusOK { exists = true } err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Profile ID cannot be changed m.UpdateTypeID = itemID m.ProfileID = c.Auth.ProfileID if exists { // Update status, err = m.Update() } else { // Create status, err = m.Insert() } if err != nil { c.RespondWithErrorDetail(err, status) return } // Respond c.RespondWithSeeOther( fmt.Sprintf( h.APITypeUpdateOptionType, m.UpdateTypeID, ), ) }
// Update handles PUT func (ctl *HuddleParticipantController) Update(c *models.Context) { huddleID, err := strconv.ParseInt(c.RouteVars["huddle_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("huddle_id in URL is not a number", http.StatusBadRequest) return } r, status, err := models.GetHuddle(c.Site.ID, c.Auth.ProfileID, huddleID) if err != nil { c.RespondWithErrorDetail(err, status) return } profileID, err := strconv.ParseInt(c.RouteVars["profile_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("profile_id in URL is not a number", http.StatusBadRequest) return } // Start Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeHuddle], huddleID), ) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } if r.IsConfidential == false { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End Authorisation m := models.HuddleParticipantType{} m.ID = profileID status, err = m.Update(c.Site.ID, huddleID) if err != nil { c.RespondWithErrorDetail(err, status) return } c.RespondWithSeeOther(m.GetLink(r.GetLink())) }
// Update handles PUT func (ctl *AttendeeController) Update(c *models.Context) { // Verify ID is a positive integer eventID, err := strconv.ParseInt(c.RouteVars["event_id"], 10, 64) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The supplied event_id ('%s') is not a number.", c.RouteVars["event_id"]), http.StatusBadRequest, ) return } m := models.AttendeeType{} err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeEvent], eventID), ) if !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } if perms.IsOwner || perms.IsModerator || perms.IsSiteOwner { if m.ProfileID != c.Auth.ProfileID && m.RSVP == "yes" { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } else { if m.ProfileID != c.Auth.ProfileID { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } _, status, err := models.GetProfileSummary(c.Site.ID, m.ProfileID) if err != nil { c.RespondWithErrorMessage(h.NoAuthMessage, status) return } // End Authorisation // Populate where applicable from auth and context t := time.Now() m.EventID = eventID m.Meta.CreatedByID = c.Auth.ProfileID m.Meta.Created = t m.Meta.EditedByNullable = sql.NullInt64{Int64: c.Auth.ProfileID, Valid: true} m.Meta.EditedNullable = pq.NullTime{Time: t, Valid: true} status, err = m.Update(c.Site.ID) if err != nil { c.RespondWithErrorDetail(err, status) return } if m.RSVP == "yes" { go models.SendUpdatesForNewAttendeeInAnEvent(c.Site.ID, m) } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeAttendee], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther( fmt.Sprintf("%s/%d", fmt.Sprintf(h.APITypeAttendee, m.EventID), m.ProfileID), ) }
// Create handles POST func (ctl *AttachmentsController) Create(c *models.Context) { attachment := models.AttachmentType{} err := c.Fill(&attachment) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } if attachment.FileHash == "" { c.RespondWithErrorMessage( "You must supply a file hash", http.StatusBadRequest, ) return } // Check that the file hash has a corresponding attachment_meta record metadata, status, err := models.GetMetadata(attachment.FileHash) if err != nil { if status == http.StatusNotFound { c.RespondWithErrorMessage( fmt.Sprintf("File does not have a metadata record"), http.StatusBadRequest, ) return } c.RespondWithErrorMessage( fmt.Sprintf("Could not retrieve metadata: %v", err.Error()), http.StatusBadRequest, ) return } attachment.AttachmentMetaID = metadata.AttachmentMetaID // Determine whether this is an attachment to a profile or comment, and if the // user is authorised to do so pathPrefix := "" if c.RouteVars["profile_id"] != "" { profileID, err := strconv.ParseInt(c.RouteVars["profile_id"], 10, 64) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The supplied profile ID ('%s') is not a number.", c.RouteVars["profile_id"]), http.StatusBadRequest, ) return } _, status, err := models.GetProfileSummary(c.Site.ID, profileID) if err != nil { if status == http.StatusNotFound { c.RespondWithErrorMessage( fmt.Sprintf("Profile with ID ('%d') does not exist.", profileID), http.StatusBadRequest, ) return } c.RespondWithErrorMessage( fmt.Sprintf("Could not retrieve profile: %v.", err.Error()), http.StatusInternalServerError, ) return } perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeProfile], profileID), ) if !perms.CanCreate && !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } attachment.ItemID = profileID attachment.ItemTypeID = h.ItemTypes[h.ItemTypeProfile] pathPrefix = h.APITypeProfile } else if c.RouteVars["comment_id"] != "" { commentID, err := strconv.ParseInt(c.RouteVars["comment_id"], 10, 64) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The supplied comment ID ('%s') is not a number.", c.RouteVars["comment_id"]), http.StatusBadRequest, ) return } _, status, err := models.GetCommentSummary(c.Site.ID, commentID) if err != nil { if status == http.StatusNotFound { c.RespondWithErrorMessage( fmt.Sprintf("Comment with ID ('%d') does not exist.", commentID), http.StatusBadRequest, ) return } c.RespondWithErrorMessage( fmt.Sprintf("Could not retrieve comment: %v.", err.Error()), http.StatusInternalServerError, ) return } perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeComment], commentID), ) if !perms.CanCreate && !perms.CanUpdate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } if metadata.FileSize > 3145728 { c.RespondWithErrorMessage(fmt.Sprintf("File size must be under 3 megabytes"), http.StatusBadRequest) return } attachment.ItemID = commentID attachment.ItemTypeID = h.ItemTypes[h.ItemTypeComment] pathPrefix = h.APITypeComment } else { c.RespondWithErrorMessage( "You must supply a profile_id or comment_id as a RouteVar", http.StatusBadRequest, ) return } // Check that this file hasn't already been attached to this item oldattachment := models.AttachmentType{} oldattachment, status, err = models.GetAttachment( attachment.ItemTypeID, attachment.ItemID, attachment.FileHash, false, ) if err != nil && status != http.StatusNotFound { c.RespondWithErrorMessage( fmt.Sprintf("An error occurred when checking the attachment: %v", err.Error()), http.StatusInternalServerError, ) return } if status != http.StatusNotFound && attachment.ItemTypeID != h.ItemTypes[h.ItemTypeProfile] { c.RespondWithSeeOther( fmt.Sprintf("%s/%d/%s", pathPrefix, oldattachment.ItemID, h.APITypeAttachment), ) return } if status == http.StatusNotFound { // Update attach count on attachment_meta metadata.AttachCount++ status, err = metadata.Update() if err != nil { c.RespondWithErrorDetail(err, status) return } attachment.ProfileID = c.Auth.ProfileID attachment.Created = time.Now() status, err = attachment.Insert() if err != nil { c.RespondWithErrorDetail(err, status) return } } else { //already exists, need to update it and pull back the attachmentId attachment = oldattachment attachment.Created = time.Now() status, err = attachment.Update() if err != nil { c.RespondWithErrorDetail(err, status) return } } // If attaching to a profile, update the profile with new avatar URL if attachment.ItemTypeID == h.ItemTypes[h.ItemTypeProfile] { profile, _, err := models.GetProfile(c.Site.ID, attachment.ItemID) if err != nil { c.RespondWithErrorDetail(err, status) return } filePath := metadata.FileHash if metadata.FileExt != "" { filePath += `.` + metadata.FileExt } profile.AvatarURLNullable = sql.NullString{ String: fmt.Sprintf("%s/%s", h.APITypeFile, filePath), Valid: true, } profile.AvatarIDNullable = sql.NullInt64{ Int64: attachment.AttachmentID, Valid: true, } status, err = profile.Update() if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("Could not update profile with avatar: %v", err.Error()), status, ) return } } c.RespondWithSeeOther( fmt.Sprintf("%s/%d/%s", pathPrefix, attachment.ItemID, h.APITypeAttachment), ) }
// Create handles POST // If microcosm_id is provided in request args then this is a role on a microcosm // otherwise this is a default role on this site func (ctl *RolesController) Create(c *models.Context) { var microcosmID int64 if sid, exists := c.RouteVars["microcosm_id"]; exists { id, err := strconv.ParseInt(sid, 10, 64) if err != nil { c.RespondWithErrorMessage("microcosm_id in URL is not a number", http.StatusBadRequest) return } microcosmID = id } // Validate inputs m := models.RoleType{} err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start : Authorisation perms := models.GetPermission( models.MakeAuthorisationContext(c, microcosmID, h.ItemTypes[h.ItemTypeMicrocosm], microcosmID), ) if microcosmID > 0 { // Related to a Microcosm if !perms.IsModerator && !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } else { // Default role for the site if !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } // End : Authorisation // Populate where applicable from auth and context m.SiteID = c.Site.ID m.MicrocosmID = microcosmID m.Meta.CreatedByID = c.Auth.ProfileID m.Meta.Created = time.Now() status, err := m.Insert(c.Site.ID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeRole], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther(m.GetLink()) }
// Update handles PUT func (ctl *RoleController) Update(c *models.Context) { // Validate inputs var microcosmID int64 if sid, exists := c.RouteVars["microcosm_id"]; exists { id, err := strconv.ParseInt(sid, 10, 64) if err != nil { c.RespondWithErrorMessage("microcosm_id in URL is not a number", http.StatusBadRequest) return } microcosmID = id } roleID, err := strconv.ParseInt(c.RouteVars["role_id"], 10, 64) if err != nil { c.RespondWithErrorMessage("microcosm_id in URL is not a number", http.StatusBadRequest) return } m, status, err := models.GetRole(c.Site.ID, microcosmID, roleID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } err = c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Authorisation perms := models.GetPermission( models.MakeAuthorisationContext(c, microcosmID, h.ItemTypes[h.ItemTypeMicrocosm], microcosmID), ) if microcosmID > 0 { // Related to a Microcosm if !perms.IsModerator && !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } else { // Default role for the site if !c.Auth.IsSiteOwner { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } } // Populate where applicable from auth and context m.Meta.EditedByNullable = sql.NullInt64{Int64: c.Auth.ProfileID, Valid: true} m.Meta.EditedNullable = pq.NullTime{Time: time.Now(), Valid: true} status, err = m.Update(c.Site.ID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Replace( c.Site.ID, h.ItemTypes[h.ItemTypeRole], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther(m.GetLink()) }
// Create handles POST func (ctl *CommentsController) Create(c *models.Context) { m := models.CommentSummaryType{} err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Populate where applicable from auth and context m.Meta.CreatedByID = c.Auth.ProfileID m.Meta.Created = time.Now() status, err := m.Validate(c.Site.ID, false) if err != nil { c.RespondWithErrorDetail(err, status) return } // Start : Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, m.ItemTypeID, m.ItemID), ) if !perms.CanCreate { c.RespondWithErrorDetail( e.New( c.Site.ID, c.Auth.ProfileID, "comments.go::Create", e.NoCreate, "Not authorized to create comment: CanCreate false", ), http.StatusForbidden, ) return } // End : Authorisation // Create status, err = m.Insert(c.Site.ID) if err != nil { c.RespondWithErrorDetail(err, status) return } go audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeComment], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) // Send updates and register watcher if m.ItemTypeID == h.ItemTypes[h.ItemTypeHuddle] { models.RegisterWatcher( c.Auth.ProfileID, h.UpdateTypes[h.UpdateTypeNewCommentInHuddle], m.ItemID, m.ItemTypeID, c.Site.ID, ) go models.SendUpdatesForNewCommentInHuddle(c.Site.ID, m) models.MarkAsRead(h.ItemTypes[h.ItemTypeHuddle], m.ItemID, c.Auth.ProfileID, time.Now()) models.UpdateUnreadHuddleCount(c.Auth.ProfileID) } else { models.RegisterWatcher( c.Auth.ProfileID, h.UpdateTypes[h.UpdateTypeNewComment], m.ItemID, m.ItemTypeID, c.Site.ID, ) go models.SendUpdatesForNewCommentInItem(c.Site.ID, m) } if m.InReplyTo > 0 { go models.SendUpdatesForNewReplyToYourComment(c.Site.ID, m) } // Respond c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeComment, m.ID, ), ) }
// Create handles POST func (ctl *EventsController) Create(c *models.Context) { m := models.EventType{} m.Meta.Flags.Open = true err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Start : Authorisation perms := models.GetPermission( models.MakeAuthorisationContext( c, 0, h.ItemTypes[h.ItemTypeMicrocosm], m.MicrocosmID), ) if !perms.CanCreate { c.RespondWithErrorMessage(h.NoAuthMessage, http.StatusForbidden) return } // End : Authorisation // Populate where applicable from auth and context m.Meta.CreatedByID = c.Auth.ProfileID m.Meta.Created = time.Now() status, err := m.Insert(c.Site.ID, c.Auth.ProfileID) if err != nil { c.RespondWithErrorDetail(err, status) return } audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeEvent], m.ID, c.Auth.ProfileID, time.Now(), c.IP, ) go models.SendUpdatesForNewItemInAMicrocosm(c.Site.ID, m) go models.RegisterWatcher( c.Auth.ProfileID, h.UpdateTypes[h.UpdateTypeNewComment], m.ID, h.ItemTypes[h.ItemTypeEvent], c.Site.ID, ) c.RespondWithSeeOther( fmt.Sprintf( "%s/%d", h.APITypeEvent, m.ID, ), ) }
// Create handles POST func (ctl *SitesController) Create(c *models.Context) { if c.Auth.ProfileID < 1 { c.RespondWithErrorMessage( fmt.Sprintf("You must be logged in to the root site create a site"), http.StatusForbidden, ) return } if c.Site.ID != 1 { c.RespondWithErrorMessage( fmt.Sprintf("Sites can only be created from the root site"), http.StatusBadRequest, ) return } bytes, _ := httputil.DumpRequest(c.Request, true) glog.Infoln(string(bytes)) m := models.SiteType{} // Default theme m.ThemeID = 1 err := c.Fill(&m) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("The post data is invalid: %v", err.Error()), http.StatusBadRequest, ) return } // Fetch full user info from context user ID user, status, err := models.GetUser(c.Auth.UserID) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("Could not retrieve use associated with ID %d", c.Auth.UserID), status, ) return } site, _, status, err := models.CreateOwnedSite(m, user) if err != nil { c.RespondWithErrorMessage( fmt.Sprintf("Error creating site: %s", err.Error()), http.StatusInternalServerError, ) return } audit.Create( c.Site.ID, h.ItemTypes[h.ItemTypeSite], site.ID, c.Auth.ProfileID, time.Now(), c.IP, ) c.RespondWithSeeOther(fmt.Sprintf("%s/%d", h.APITypeSite, site.ID)) }