mirror of https://gitee.com/answerdev/answer.git
187 lines
8.3 KiB
Go
187 lines
8.3 KiB
Go
|
package migrations
|
||
|
|
||
|
import (
|
||
|
"github.com/answerdev/answer/internal/entity"
|
||
|
"github.com/answerdev/answer/internal/service/permission"
|
||
|
"xorm.io/xorm"
|
||
|
)
|
||
|
|
||
|
func addRoleFeatures(x *xorm.Engine) error {
|
||
|
err := x.Sync(new(entity.Role), new(entity.RolePowerRel), new(entity.Power), new(entity.UserRoleRel))
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
roles := []*entity.Role{
|
||
|
{ID: 1, Name: "User", Description: "Default with no special access."},
|
||
|
{ID: 2, Name: "Admin", Description: "Have the full power to access the site."},
|
||
|
{ID: 3, Name: "Moderator", Description: "Has access to all posts except admin settings."},
|
||
|
}
|
||
|
|
||
|
// insert default roles
|
||
|
for _, role := range roles {
|
||
|
exist, err := x.Get(&entity.Role{ID: role.ID, Name: role.Name})
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
if exist {
|
||
|
continue
|
||
|
}
|
||
|
_, err = x.Insert(role)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
powers := []*entity.Power{
|
||
|
{ID: 1, Name: "admin access", PowerType: permission.AdminAccess, Description: "admin access"},
|
||
|
{ID: 2, Name: "question add", PowerType: permission.QuestionAdd, Description: "question add"},
|
||
|
{ID: 3, Name: "question edit", PowerType: permission.QuestionEdit, Description: "question edit"},
|
||
|
{ID: 4, Name: "question edit without review", PowerType: permission.QuestionEditWithoutReview, Description: "question edit without review"},
|
||
|
{ID: 5, Name: "question delete", PowerType: permission.QuestionDelete, Description: "question delete"},
|
||
|
{ID: 6, Name: "question close", PowerType: permission.QuestionClose, Description: "question close"},
|
||
|
{ID: 7, Name: "question open", PowerType: permission.QuestionOpen, Description: "question open"},
|
||
|
{ID: 8, Name: "question vote up", PowerType: permission.QuestionVoteUp, Description: "question vote up"},
|
||
|
{ID: 9, Name: "question vote down", PowerType: permission.QuestionVoteDown, Description: "question vote down"},
|
||
|
{ID: 10, Name: "answer add", PowerType: permission.AnswerAdd, Description: "answer add"},
|
||
|
{ID: 11, Name: "answer edit", PowerType: permission.AnswerEdit, Description: "answer edit"},
|
||
|
{ID: 12, Name: "answer edit without review", PowerType: permission.AnswerEditWithoutReview, Description: "answer edit without review"},
|
||
|
{ID: 13, Name: "answer delete", PowerType: permission.AnswerDelete, Description: "answer delete"},
|
||
|
{ID: 14, Name: "answer accept", PowerType: permission.AnswerAccept, Description: "answer accept"},
|
||
|
{ID: 15, Name: "answer vote up", PowerType: permission.AnswerVoteUp, Description: "answer vote up"},
|
||
|
{ID: 16, Name: "answer vote down", PowerType: permission.AnswerVoteDown, Description: "answer vote down"},
|
||
|
{ID: 17, Name: "comment add", PowerType: permission.CommentAdd, Description: "comment add"},
|
||
|
{ID: 18, Name: "comment edit", PowerType: permission.CommentEdit, Description: "comment edit"},
|
||
|
{ID: 19, Name: "comment delete", PowerType: permission.CommentDelete, Description: "comment delete"},
|
||
|
{ID: 20, Name: "comment vote up", PowerType: permission.CommentVoteUp, Description: "comment vote up"},
|
||
|
{ID: 21, Name: "comment vote down", PowerType: permission.CommentVoteDown, Description: "comment vote down"},
|
||
|
{ID: 22, Name: "report add", PowerType: permission.ReportAdd, Description: "report add"},
|
||
|
{ID: 23, Name: "tag add", PowerType: permission.TagAdd, Description: "tag add"},
|
||
|
{ID: 24, Name: "tag edit", PowerType: permission.TagEdit, Description: "tag edit"},
|
||
|
{ID: 25, Name: "tag edit without review", PowerType: permission.TagEditWithoutReview, Description: "tag edit without review"},
|
||
|
{ID: 26, Name: "tag edit slug name", PowerType: permission.TagEditSlugName, Description: "tag edit slug name"},
|
||
|
{ID: 27, Name: "tag delete", PowerType: permission.TagDelete, Description: "tag delete"},
|
||
|
{ID: 28, Name: "tag synonym", PowerType: permission.TagSynonym, Description: "tag synonym"},
|
||
|
{ID: 29, Name: "link url limit", PowerType: permission.LinkUrlLimit, Description: "link url limit"},
|
||
|
{ID: 30, Name: "vote detail", PowerType: permission.VoteDetail, Description: "vote detail"},
|
||
|
{ID: 31, Name: "answer audit", PowerType: permission.AnswerAudit, Description: "answer audit"},
|
||
|
{ID: 32, Name: "question audit", PowerType: permission.QuestionAudit, Description: "question audit"},
|
||
|
{ID: 33, Name: "tag audit", PowerType: permission.TagAudit, Description: "tag audit"},
|
||
|
}
|
||
|
// insert default powers
|
||
|
for _, power := range powers {
|
||
|
exist, err := x.Get(&entity.Power{Name: power.Name})
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
if exist {
|
||
|
continue
|
||
|
}
|
||
|
_, err = x.Insert(power)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
rolePowerRels := []*entity.RolePowerRel{
|
||
|
{RoleID: 2, PowerType: permission.AdminAccess},
|
||
|
{RoleID: 2, PowerType: permission.QuestionAdd},
|
||
|
{RoleID: 2, PowerType: permission.QuestionEdit},
|
||
|
{RoleID: 2, PowerType: permission.QuestionEditWithoutReview},
|
||
|
{RoleID: 2, PowerType: permission.QuestionDelete},
|
||
|
{RoleID: 2, PowerType: permission.QuestionClose},
|
||
|
{RoleID: 2, PowerType: permission.QuestionOpen},
|
||
|
{RoleID: 2, PowerType: permission.QuestionVoteUp},
|
||
|
{RoleID: 2, PowerType: permission.QuestionVoteDown},
|
||
|
{RoleID: 2, PowerType: permission.AnswerAdd},
|
||
|
{RoleID: 2, PowerType: permission.AnswerEdit},
|
||
|
{RoleID: 2, PowerType: permission.AnswerEditWithoutReview},
|
||
|
{RoleID: 2, PowerType: permission.AnswerDelete},
|
||
|
{RoleID: 2, PowerType: permission.AnswerAccept},
|
||
|
{RoleID: 2, PowerType: permission.AnswerVoteUp},
|
||
|
{RoleID: 2, PowerType: permission.AnswerVoteDown},
|
||
|
{RoleID: 2, PowerType: permission.CommentAdd},
|
||
|
{RoleID: 2, PowerType: permission.CommentEdit},
|
||
|
{RoleID: 2, PowerType: permission.CommentDelete},
|
||
|
{RoleID: 2, PowerType: permission.CommentVoteUp},
|
||
|
{RoleID: 2, PowerType: permission.CommentVoteDown},
|
||
|
{RoleID: 2, PowerType: permission.ReportAdd},
|
||
|
{RoleID: 2, PowerType: permission.TagAdd},
|
||
|
{RoleID: 2, PowerType: permission.TagEdit},
|
||
|
{RoleID: 2, PowerType: permission.TagEditSlugName},
|
||
|
{RoleID: 2, PowerType: permission.TagEditWithoutReview},
|
||
|
{RoleID: 2, PowerType: permission.TagDelete},
|
||
|
{RoleID: 2, PowerType: permission.TagSynonym},
|
||
|
{RoleID: 2, PowerType: permission.LinkUrlLimit},
|
||
|
{RoleID: 2, PowerType: permission.VoteDetail},
|
||
|
{RoleID: 2, PowerType: permission.AnswerAudit},
|
||
|
{RoleID: 2, PowerType: permission.QuestionAudit},
|
||
|
{RoleID: 2, PowerType: permission.TagAudit},
|
||
|
|
||
|
{RoleID: 3, PowerType: permission.QuestionAdd},
|
||
|
{RoleID: 3, PowerType: permission.QuestionEdit},
|
||
|
{RoleID: 3, PowerType: permission.QuestionEditWithoutReview},
|
||
|
{RoleID: 3, PowerType: permission.QuestionDelete},
|
||
|
{RoleID: 3, PowerType: permission.QuestionClose},
|
||
|
{RoleID: 3, PowerType: permission.QuestionOpen},
|
||
|
{RoleID: 3, PowerType: permission.QuestionVoteUp},
|
||
|
{RoleID: 3, PowerType: permission.QuestionVoteDown},
|
||
|
{RoleID: 3, PowerType: permission.AnswerAdd},
|
||
|
{RoleID: 3, PowerType: permission.AnswerEdit},
|
||
|
{RoleID: 3, PowerType: permission.AnswerEditWithoutReview},
|
||
|
{RoleID: 3, PowerType: permission.AnswerDelete},
|
||
|
{RoleID: 3, PowerType: permission.AnswerAccept},
|
||
|
{RoleID: 3, PowerType: permission.AnswerVoteUp},
|
||
|
{RoleID: 3, PowerType: permission.AnswerVoteDown},
|
||
|
{RoleID: 3, PowerType: permission.CommentAdd},
|
||
|
{RoleID: 3, PowerType: permission.CommentEdit},
|
||
|
{RoleID: 3, PowerType: permission.CommentDelete},
|
||
|
{RoleID: 3, PowerType: permission.CommentVoteUp},
|
||
|
{RoleID: 3, PowerType: permission.CommentVoteDown},
|
||
|
{RoleID: 3, PowerType: permission.ReportAdd},
|
||
|
{RoleID: 3, PowerType: permission.TagAdd},
|
||
|
{RoleID: 3, PowerType: permission.TagEdit},
|
||
|
{RoleID: 3, PowerType: permission.TagEditSlugName},
|
||
|
{RoleID: 3, PowerType: permission.TagEditWithoutReview},
|
||
|
{RoleID: 3, PowerType: permission.TagDelete},
|
||
|
{RoleID: 3, PowerType: permission.TagSynonym},
|
||
|
{RoleID: 3, PowerType: permission.LinkUrlLimit},
|
||
|
{RoleID: 3, PowerType: permission.VoteDetail},
|
||
|
{RoleID: 3, PowerType: permission.AnswerAudit},
|
||
|
{RoleID: 3, PowerType: permission.QuestionAudit},
|
||
|
{RoleID: 3, PowerType: permission.TagAudit},
|
||
|
}
|
||
|
|
||
|
// insert default powers
|
||
|
for _, rel := range rolePowerRels {
|
||
|
exist, err := x.Get(&entity.RolePowerRel{RoleID: rel.RoleID, PowerType: rel.PowerType})
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
if exist {
|
||
|
continue
|
||
|
}
|
||
|
_, err = x.Insert(rel)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
adminUserRoleRel := &entity.UserRoleRel{
|
||
|
UserID: "1",
|
||
|
RoleID: 2,
|
||
|
}
|
||
|
|
||
|
exist, err := x.Get(adminUserRoleRel)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
if !exist {
|
||
|
_, err = x.Insert(adminUserRoleRel)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
return nil
|
||
|
}
|