d7b374f8ab
New features: - ActivityController and manager for CW sales activities (CRUD) - ForecastProductController for opportunity forecast/product lines - CW member cache with dual-layer (in-memory + Redis) resolution - Catalog category/subcategory/ecosystem taxonomy module - Quote statuses type definitions with CW mapping - User-defined fields (UDF) module with cache and event refresh - Company sites CW module with serialization - Procurement manager filters (category, ecosystem, manufacturer, price, stock) - Opportunity notes CRUD and product line management via CW API - Opportunity type definitions endpoint Updates: - OpportunityController: CW refresh, company hydration, activities, custom fields - UserController: cwIdentifier field for CW member linking - CatalogItemController: category/subcategory fields from CW - PermissionNodes: sales note/product CRUD nodes, subCategories, collectPermissions - API routes: procurement categories/filters, sales notes/products, opportunity types - Global events: UDF and member refresh intervals on startup Tests (414 passing): - ActivityController, ForecastProductController, OpportunityController unit tests - UserController cwIdentifier tests - catalogCategories, companySites, memberCache, procurement module tests - activityTypes, opportunityTypes, quoteStatuses type tests - permissionNodes subCategories and getAllPermissionNodes tests - Updated test setup with redis mock, API method mocks, and builder helpers
45 lines
1.4 KiB
TypeScript
45 lines
1.4 KiB
TypeScript
import { ContentfulStatusCode } from "hono/utils/http-status";
|
|
import { apiResponse } from "../../modules/api-utils/apiResponse";
|
|
import { createRoute } from "../../modules/api-utils/createRoute";
|
|
import { authMiddleware } from "../middleware/authorization";
|
|
import { users } from "../../managers/users";
|
|
import GenericError from "../../Errors/GenericError";
|
|
import { processObjectValuePerms } from "../../modules/permission-utils/processObjectPermissions";
|
|
|
|
/* GET /v1/user/users/:identifier/roles */
|
|
export default createRoute(
|
|
"get",
|
|
["/users/:identifier/roles"],
|
|
|
|
async (c) => {
|
|
const identifier = c.req.param("identifier");
|
|
|
|
const user = await users.fetchUser({ id: identifier });
|
|
if (!user)
|
|
throw new GenericError({
|
|
name: "UserNotFound",
|
|
message: `User with identifier '${identifier}' was not found.`,
|
|
status: 404,
|
|
});
|
|
|
|
const roles = await user.fetchRoles();
|
|
|
|
const gatedData = await Promise.all(
|
|
roles.map((r) =>
|
|
processObjectValuePerms(
|
|
r.toJson({ viewPermissions: true }),
|
|
"obj.role",
|
|
c.get("user"),
|
|
),
|
|
),
|
|
);
|
|
|
|
const response = apiResponse.successful(
|
|
"User Roles Fetched Successfully!",
|
|
gatedData,
|
|
);
|
|
return c.json(response, response.status as ContentfulStatusCode);
|
|
},
|
|
authMiddleware({ permissions: ["user.read.other", "role.read"] }),
|
|
);
|