scinote-web/app/controllers/access_permissions/forms_controller.rb

186 lines
6.8 KiB
Ruby

# frozen_string_literal: true
module AccessPermissions
class FormsController < ApplicationController
include InputSanitizeHelper
before_action :set_form
before_action :check_read_permissions, only: %i(show)
before_action :check_manage_permissions, except: %i(show)
before_action :available_users, only: %i(new create)
def show
render json: @form.user_assignments.includes(:user_role, :user).order('users.full_name ASC'),
each_serializer: UserAssignmentSerializer, user: current_user
end
def new
render json: @available_users, each_serializer: UserSerializer, user: current_user
end
def edit; end
def create
ActiveRecord::Base.transaction do
created_count = 0
if permitted_create_params[:user_id] == 'all'
@form.update!(visibility: :visible, default_public_user_role_id: permitted_create_params[:user_role_id])
log_activity(:form_access_granted_all_team_members,
{ team: @form.team.id, role: @form.default_public_user_role&.name })
else
user_assignment = UserAssignment.find_or_initialize_by(
assignable: @form,
user_id: permitted_create_params[:user_id],
team: current_team
)
user_assignment.update!(
user_role_id: permitted_create_params[:user_role_id],
assigned_by: current_user,
assigned: :manually
)
log_activity(:form_access_granted, { user_target: user_assignment.user.id,
role: user_assignment.user_role.name })
created_count += 1
end
@message = if created_count.zero?
t('access_permissions.create.success', member_name: t('access_permissions.all_team'))
else
t('access_permissions.create.success', member_name: escape_input(user_assignment.user.name))
end
render json: { message: @message }
rescue ActiveRecord::RecordInvalid => e
Rails.logger.error e.message
errors = @form.errors.present? ? @form.errors&.map(&:message)&.join(',') : e.message
render json: { flash: errors }, status: :unprocessable_entity
raise ActiveRecord::Rollback
end
end
def update
@user_assignment = @form.user_assignments.find_by(
user_id: permitted_update_params[:user_id],
team: current_team
)
# prevent role change if it would result in no manually assigned users having the user management permission
new_user_role = UserRole.find(permitted_update_params[:user_role_id])
if !new_user_role.has_permission?(FormPermissions::USERS_MANAGE) &&
@user_assignment.last_with_permission?(FormPermissions::USERS_MANAGE, assigned: :manually)
raise ActiveRecord::RecordInvalid
end
@user_assignment.update!(permitted_update_params)
log_activity(:form_access_changed, { user_target: @user_assignment.user.id,
role: @user_assignment.user_role.name })
render :form_member
rescue ActiveRecord::RecordInvalid
render json: { flash: t('access_permissions.update.failure') }, status: :unprocessable_entity
end
def destroy
user = @form.assigned_users.find(params[:user_id])
user_assignment = @form.user_assignments.find_by(user: user, team: current_team)
# prevent deletion of last manually assigned user that can manage users
raise ActiveRecord::RecordInvalid if user_assignment.last_with_permission?(FormPermissions::USERS_MANAGE, assigned: :manually)
Protocol.transaction do
if @form.visible?
user_assignment.update!(
user_role: @form.default_public_user_role,
assigned: :automatically
)
else
user_assignment.destroy!
end
log_activity(:form_access_revoked, { user_target: user_assignment.user.id,
role: user_assignment.user_role.name })
end
render json: { message: t('access_permissions.destroy.success', member_name: user.full_name) }
rescue ActiveRecord::RecordInvalid => e
Rails.logger.error e.message
render json: { message: t('access_permissions.destroy.failure') }, status: :unprocessable_entity
raise ActiveRecord::Rollback
end
def update_default_public_user_role
ActiveRecord::Base.transaction do
current_role = @form.default_public_user_role.name
@form.update!(permitted_default_public_user_role_params)
# revoke all team members access
if permitted_default_public_user_role_params[:default_public_user_role_id].blank?
log_activity(:form_access_revoked_all_team_members,
{ team: @form.team.id, role: current_role })
render json: { flash: t('access_permissions.update.revoke_all_team_members') }, status: :ok
else
# update all team members access
log_activity(:form_access_changed_all_team_members,
{ team: @form.team.id, role: @form.default_public_user_role&.name })
end
rescue ActiveRecord::RecordInvalid => e
Rails.logger.error e.message
render json: { flash: @form.errors&.map(&:message)&.join(',') }, status: :unprocessable_entity
raise ActiveRecord::Rollback
end
end
private
def permitted_default_public_user_role_params
params.require(:object).permit(:default_public_user_role_id)
end
def permitted_update_params
params.require(:user_assignment)
.permit(%i(user_role_id user_id))
end
def permitted_create_params
params.require(:user_assignment)
.permit(%i(user_id user_role_id))
end
def available_users
# automatically assigned or not assigned to project
@available_users = current_team.users.where(
id: @form.user_assignments.automatically_assigned.select(:user_id)
).or(
current_team.users.where.not(id: @form.users.select(:id))
).order('users.full_name ASC')
end
def set_form
@form = current_team.forms.includes(user_assignments: %i(user user_role)).find_by(id: params[:id])
return render_404 unless @form
@form = @form.parent if @form.parent_id
end
def check_manage_permissions
render_403 unless can_manage_form_users?(@form)
end
def check_read_permissions
render_403 unless can_read_form?(@form)
end
def log_activity(type_of, message_items = {})
message_items = { form: @form.id }.merge(message_items)
Activities::CreateActivityService
.call(activity_type: type_of,
owner: current_user,
subject: @form,
team: @form.team,
project: nil,
message_items: message_items)
end
end
end