-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40
-
41
-
42
-
43
-
44
-
45
-
46
-
47
-
48
-
49
-
50
-
51
-
52
-
53
-
54
-
55
-
56
-
57
-
58
-
59
-
60
-
61
-
62
-
63
-
64
-
65
-
66
-
67
-
68
-
69
-
70
-
71
-
72
-
73
-
74
-
75
-
76
-
77
-
78
-
79
-
80
-
81
-
82
-
83
-
84
-
85
-
86
-
87
-
88
-
89
-
90
-
91
-
92
-
93
-
94
-
95
-
96
-
97
-
98
-
99
-
100
-
101
-
102
-
103
-
104
-
105
-
106
-
107
-
108
-
109
-
110
-
111
-
112
-
113
-
114
-
115
-
116
-
117
-
118
-
119
-
120
-
121
-
122
-
123
-
124
-
125
-
126
-
127
-
128
-
129
-
130
-
131
-
132
-
133
-
134
-
135
-
136
-
137
-
138
-
139
-
140
-
141
-
142
-
143
-
144
-
145
-
146
-
147
-
148
-
149
-
150
-
151
-
152
-
153
-
154
-
155
-
156
-
157
-
158
-
159
-
160
-
161
-
162
-
163
-
164
-
165
-
166
-
167
// SPDX-FileCopyrightText: 2025 Shota FUJI <pockawoooh@gmail.com>
// SPDX-License-Identifier: AGPL-3.0-only
package projection
import (
"database/sql"
"slices"
"google.golang.org/protobuf/proto"
"pocka.jp/x/yamori/backend/core/event"
"pocka.jp/x/yamori/backend/core/snapshot"
workspaceEventsv1 "pocka.jp/x/yamori/proto/go/backend/events/workspace/v1"
workspace "pocka.jp/x/yamori/proto/go/backend/projections/workspace/v1"
"pocka.jp/x/yamori/proto/go/backend/workspace/v1/types"
)
type Users struct {
hasSnapshot bool
eventSeq *uint64
Projection *workspace.Users
permissions map[string]map[types.Permission]struct{}
}
func NewUsers() *Users {
return &Users{
hasSnapshot: false,
eventSeq: nil,
Projection: &workspace.Users{
Users: []*workspace.Users_User{},
},
permissions: make(map[string]map[types.Permission]struct{}),
}
}
func GetUsers(tx *sql.Tx) (*Users, error) {
payload, seq, err := snapshot.GetLatest[workspace.Users](tx)
if err != nil {
return nil, err
}
if payload == nil {
return NewUsers(), nil
}
permissions := make(map[string]map[types.Permission]struct{})
for _, u := range payload.Users {
perms := make(map[types.Permission]struct{})
for _, p := range u.Permissions {
perms[p] = struct{}{}
}
permissions[u.GetId()] = perms
}
return &Users{
hasSnapshot: true,
eventSeq: &seq,
Projection: payload,
permissions: permissions,
}, nil
}
func (p *Users) EventSeq() *uint64 {
return p.eventSeq
}
func (p *Users) Update(events []event.Event) {
if len(events) == 0 || p.Projection == nil {
return
}
for _, container := range events {
if p.eventSeq != nil && container.Seq <= *p.eventSeq {
continue
}
ev := container.Payload.GetWorkspaceEvent()
if ev == nil {
continue
}
p.hasSnapshot = false
switch ev := ev.Event.(type) {
case *workspaceEventsv1.Event_UserCreated:
p.Projection.Users = append(p.Projection.Users, &workspace.Users_User{
Id: ev.UserCreated.Id,
Name: ev.UserCreated.Name,
DisplayName: ev.UserCreated.DisplayName,
KeyId: ev.UserCreated.KeyId,
IsAdmin: proto.Bool(false),
PasswordLogin: nil,
})
p.permissions[ev.UserCreated.GetId()] = make(map[types.Permission]struct{})
case *workspaceEventsv1.Event_AdminAccessGranted:
id := ev.AdminAccessGranted.GetUserId()
for _, u := range p.Projection.Users {
if u.GetId() == id {
u.IsAdmin = proto.Bool(true)
}
}
case *workspaceEventsv1.Event_AdminAccessRevoked:
id := ev.AdminAccessRevoked.GetUserId()
for _, u := range p.Projection.Users {
if u.GetId() == id {
u.IsAdmin = proto.Bool(false)
}
}
case *workspaceEventsv1.Event_PasswordLoginConfigured:
id := ev.PasswordLoginConfigured.GetUserId()
for _, u := range p.Projection.Users {
if u.GetId() == id {
u.PasswordLogin = &workspace.Users_PasswordLogin{
Hash: ev.PasswordLoginConfigured.PasswordHash,
Salt: ev.PasswordLoginConfigured.PasswordSalt,
}
}
}
case *workspaceEventsv1.Event_UserPermissionsGranted:
id := ev.UserPermissionsGranted.GetUserId()
if p.permissions[id] != nil {
for _, perm := range ev.UserPermissionsGranted.Permissions {
p.permissions[id][perm] = struct{}{}
}
}
case *workspaceEventsv1.Event_UserPermissionsRevoked:
id := ev.UserPermissionsRevoked.GetUserId()
if p.permissions[id] != nil {
for _, perm := range ev.UserPermissionsRevoked.Permissions {
delete(p.permissions[id], perm)
}
}
}
for _, user := range p.Projection.Users {
permissions := p.permissions[user.GetId()]
s := make([]types.Permission, 0, len(permissions))
for perm := range permissions {
s = append(s, perm)
}
slices.Sort(s)
user.Permissions = slices.Compact(s)
}
p.eventSeq = &container.Seq
}
}
func (p *Users) SaveSnapshot(tx *sql.Tx) error {
if p.hasSnapshot || p.eventSeq == nil {
return nil
}
return snapshot.Save(tx, p.Projection, *p.eventSeq)
}