# frozen_string_literal: true module AccessPermissions class FormsController < ApplicationController include InputSanitizeHelper before_action :set_form before_action :check_read_permissions, only: %i(show) before_action :check_manage_permissions, except: %i(show) before_action :available_users, only: %i(new create) def show render json: @form.user_assignments.includes(:user_role, :user).order('users.full_name ASC'), each_serializer: UserAssignmentSerializer, user: current_user end def new render json: @available_users, each_serializer: UserSerializer, user: current_user end def edit; end def create ActiveRecord::Base.transaction do created_count = 0 if permitted_create_params[:user_id] == 'all' @form.update!(visibility: :visible, default_public_user_role_id: permitted_create_params[:user_role_id]) log_activity(:form_access_granted_all_team_members, { team: @form.team.id, role: @form.default_public_user_role&.name }) else user_assignment = UserAssignment.find_or_initialize_by( assignable: @form, user_id: permitted_create_params[:user_id], team: current_team ) user_assignment.update!( user_role_id: permitted_create_params[:user_role_id], assigned_by: current_user, assigned: :manually ) log_activity(:form_access_granted, { user_target: user_assignment.user.id, role: user_assignment.user_role.name }) created_count += 1 end @message = if created_count.zero? t('access_permissions.create.success', member_name: t('access_permissions.all_team')) else t('access_permissions.create.success', member_name: escape_input(user_assignment.user.name)) end render json: { message: @message } rescue ActiveRecord::RecordInvalid => e Rails.logger.error e.message errors = @form.errors.present? ? @form.errors&.map(&:message)&.join(',') : e.message render json: { flash: errors }, status: :unprocessable_entity raise ActiveRecord::Rollback end end def update @user_assignment = @form.user_assignments.find_by( user_id: permitted_update_params[:user_id], team: current_team ) # prevent role change if it would result in no manually assigned users having the user management permission new_user_role = UserRole.find(permitted_update_params[:user_role_id]) if !new_user_role.has_permission?(FormPermissions::USERS_MANAGE) && @user_assignment.last_with_permission?(FormPermissions::USERS_MANAGE, assigned: :manually) raise ActiveRecord::RecordInvalid end @user_assignment.update!(permitted_update_params) log_activity(:form_access_changed, { user_target: @user_assignment.user.id, role: @user_assignment.user_role.name }) render :form_member rescue ActiveRecord::RecordInvalid render json: { flash: t('access_permissions.update.failure') }, status: :unprocessable_entity end def destroy user = @form.assigned_users.find(params[:user_id]) user_assignment = @form.user_assignments.find_by(user: user, team: current_team) # prevent deletion of last manually assigned user that can manage users raise ActiveRecord::RecordInvalid if user_assignment.last_with_permission?(FormPermissions::USERS_MANAGE, assigned: :manually) Protocol.transaction do if @form.visible? user_assignment.update!( user_role: @form.default_public_user_role, assigned: :automatically ) else user_assignment.destroy! end log_activity(:form_access_revoked, { user_target: user_assignment.user.id, role: user_assignment.user_role.name }) end render json: { message: t('access_permissions.destroy.success', member_name: user.full_name) } rescue ActiveRecord::RecordInvalid => e Rails.logger.error e.message render json: { message: t('access_permissions.destroy.failure') }, status: :unprocessable_entity raise ActiveRecord::Rollback end def update_default_public_user_role ActiveRecord::Base.transaction do current_role = @form.default_public_user_role.name @form.update!(permitted_default_public_user_role_params) # revoke all team members access if permitted_default_public_user_role_params[:default_public_user_role_id].blank? log_activity(:form_access_revoked_all_team_members, { team: @form.team.id, role: current_role }) render json: { flash: t('access_permissions.update.revoke_all_team_members') }, status: :ok else # update all team members access log_activity(:form_access_changed_all_team_members, { team: @form.team.id, role: @form.default_public_user_role&.name }) end rescue ActiveRecord::RecordInvalid => e Rails.logger.error e.message render json: { flash: @form.errors&.map(&:message)&.join(',') }, status: :unprocessable_entity raise ActiveRecord::Rollback end end private def permitted_default_public_user_role_params params.require(:object).permit(:default_public_user_role_id) end def permitted_update_params params.require(:user_assignment) .permit(%i(user_role_id user_id)) end def permitted_create_params params.require(:user_assignment) .permit(%i(user_id user_role_id)) end def available_users # automatically assigned or not assigned to project @available_users = current_team.users.where( id: @form.user_assignments.automatically_assigned.select(:user_id) ).or( current_team.users.where.not(id: @form.users.select(:id)) ).order('users.full_name ASC') end def set_form @form = current_team.forms.includes(user_assignments: %i(user user_role)).find_by(id: params[:id]) return render_404 unless @form @form = @form.parent if @form.parent_id end def check_manage_permissions render_403 unless can_manage_form_users?(@form) end def check_read_permissions render_403 unless can_read_form?(@form) || can_manage_team?(@form.team) end def log_activity(type_of, message_items = {}) message_items = { form: @form.id }.merge(message_items) Activities::CreateActivityService .call(activity_type: type_of, owner: current_user, subject: @form, team: @form.team, project: nil, message_items: message_items) end end end