Вытащил солюшен на уровень выше, чтобы прощё было дотнетить
Some checks failed
continuous-integration/drone/push Build is failing
Some checks failed
continuous-integration/drone/push Build is failing
This commit is contained in:
126
SchengenVisaApi/Controllers/UsersController.cs
Normal file
126
SchengenVisaApi/Controllers/UsersController.cs
Normal file
@@ -0,0 +1,126 @@
|
||||
using ApplicationLayer.Services.Applicants.Models;
|
||||
using ApplicationLayer.Services.AuthServices.Common;
|
||||
using ApplicationLayer.Services.AuthServices.LoginService;
|
||||
using ApplicationLayer.Services.AuthServices.RegisterService;
|
||||
using ApplicationLayer.Services.AuthServices.Requests;
|
||||
using ApplicationLayer.Services.Users;
|
||||
using ApplicationLayer.Services.Users.Models;
|
||||
using ApplicationLayer.Services.Users.Requests;
|
||||
using FluentValidation;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using SchengenVisaApi.Common;
|
||||
|
||||
namespace SchengenVisaApi.Controllers;
|
||||
|
||||
///<summary> Controller for user-auth and registration </summary>
|
||||
[ApiController]
|
||||
[Route("users")]
|
||||
public class UsersController(
|
||||
IRegisterService registerService,
|
||||
ILoginService loginService,
|
||||
IUsersService usersService,
|
||||
IValidator<RegisterApplicantRequest> registerApplicantRequestValidator,
|
||||
IValidator<ChangeUserAuthDataRequest> changeUserAuthDataRequestValidator,
|
||||
IValidator<RegisterRequest> registerRequestValidator) : ControllerBase
|
||||
{
|
||||
/// <summary> Adds applicant with user account </summary>
|
||||
[HttpPost("register")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
||||
public async Task<IActionResult> Register(RegisterApplicantRequest request, CancellationToken cancellationToken)
|
||||
{
|
||||
await registerApplicantRequestValidator.ValidateAndThrowAsync(request, cancellationToken);
|
||||
|
||||
await registerService.RegisterApplicant(request, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Adds approving authority with user account </summary>
|
||||
///<remarks> Accessible only for admins </remarks>
|
||||
[HttpPost("authorities")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
||||
[Authorize(policy: PolicyConstants.AdminPolicy)]
|
||||
public async Task<IActionResult> RegisterAuthority(RegisterRequest request, CancellationToken cancellationToken)
|
||||
{
|
||||
await registerRequestValidator.ValidateAndThrowAsync(request, cancellationToken);
|
||||
|
||||
await registerService.RegisterAuthority(request, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Returns JWT-token for authentication </summary>
|
||||
[HttpGet("login")]
|
||||
[ProducesResponseType<AuthToken>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
public async Task<IActionResult> Login(string email, string password, CancellationToken cancellationToken)
|
||||
{
|
||||
var loginRequest = new LoginRequest
|
||||
{
|
||||
AuthData = new() { Email = email, Password = password }
|
||||
};
|
||||
|
||||
var result = await loginService.LoginAsync(loginRequest, cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Returns list of authority accounts </summary>
|
||||
/// <remarks> Accessible only for admins </remarks>
|
||||
[HttpGet("authorities")]
|
||||
[ProducesResponseType<List<UserModel>>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[Authorize(policy: PolicyConstants.AdminPolicy)]
|
||||
public async Task<IActionResult> GetAuthorityAccounts(CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await usersService.GetAuthoritiesAccountsAsync(cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Changes authority's account authentication data </summary>
|
||||
/// <remarks> Accessible only for admins </remarks>
|
||||
[HttpPut("authorities")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
||||
[Authorize(policy: PolicyConstants.AdminPolicy)]
|
||||
public async Task<IActionResult> ChangeAuthorityAuthData(ChangeUserAuthDataRequest request, CancellationToken cancellationToken)
|
||||
{
|
||||
await changeUserAuthDataRequestValidator.ValidateAndThrowAsync(request, cancellationToken);
|
||||
|
||||
await usersService.ChangeAuthorityAuthDataAsync(request, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Removes authority's account </summary>
|
||||
/// <remarks> Accessible only for admins </remarks>
|
||||
[HttpDelete("authorities/{authorityAccountId:guid}")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[Authorize(policy: PolicyConstants.AdminPolicy)]
|
||||
public async Task<IActionResult> RemoveAuthorityAccount(Guid authorityAccountId, CancellationToken cancellationToken)
|
||||
{
|
||||
await usersService.RemoveAuthorityAccount(authorityAccountId, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Returns applicant info </summary>
|
||||
[HttpGet("applicant")]
|
||||
[ProducesResponseType<ApplicantModel>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> GetApplicant(CancellationToken cancellationToken)
|
||||
{
|
||||
|
||||
var result = await usersService.GetAuthenticatedApplicant(cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
}
|
||||
138
SchengenVisaApi/Controllers/VisaApplicationController.cs
Normal file
138
SchengenVisaApi/Controllers/VisaApplicationController.cs
Normal file
@@ -0,0 +1,138 @@
|
||||
using ApplicationLayer.Services.VisaApplications.Handlers;
|
||||
using ApplicationLayer.Services.VisaApplications.Models;
|
||||
using ApplicationLayer.Services.VisaApplications.Requests;
|
||||
using FluentValidation;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using SchengenVisaApi.Common;
|
||||
|
||||
namespace SchengenVisaApi.Controllers;
|
||||
|
||||
/// <summary> Controller for visa applications </summary>
|
||||
[ApiController]
|
||||
[Route("visaApplications")]
|
||||
public class VisaApplicationController(
|
||||
IVisaApplicationRequestsHandler visaApplicationRequestsHandler,
|
||||
IValidator<VisaApplicationCreateRequest> visaApplicationCreateRequestValidator) : ControllerBase
|
||||
{
|
||||
/// <summary> Returns pending applications </summary>
|
||||
/// <remarks> Accessible only for approving authorities </remarks>
|
||||
[HttpGet("pending")]
|
||||
[ProducesResponseType<List<VisaApplicationPreview>>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[Authorize(policy: PolicyConstants.ApprovingAuthorityPolicy)]
|
||||
public async Task<IActionResult> GetPending(CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await visaApplicationRequestsHandler.GetPendingAsync(cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Returns application </summary>
|
||||
/// <remarks> Accessible only for approving authorities </remarks>
|
||||
[HttpGet("/forAuthority/{applicationId:guid}")]
|
||||
[ProducesResponseType<VisaApplicationModel>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[ProducesResponseType(StatusCodes.Status409Conflict)]
|
||||
[Authorize(policy: PolicyConstants.ApprovingAuthorityPolicy)]
|
||||
public async Task<IActionResult> GetApplicationForAuthority(Guid applicationId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await visaApplicationRequestsHandler.GetApplicationForAuthorityAsync(applicationId, cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Returns application </summary>
|
||||
/// <remarks> Accessible only for applicant </remarks>
|
||||
[HttpGet("/forApplicant/{applicationId:guid}")]
|
||||
[ProducesResponseType<VisaApplicationModel>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> GetApplicationForApplicant(Guid applicationId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await visaApplicationRequestsHandler.GetApplicationForApplicantAsync(applicationId, cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Returns all applications of one applicant </summary>
|
||||
/// <remarks> Returns applications of authorized applicant </remarks>
|
||||
[HttpGet("ofApplicant")]
|
||||
[ProducesResponseType<List<VisaApplicationPreview>>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> GetApplicationsForApplicant(CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await visaApplicationRequestsHandler.GetForApplicantAsync(cancellationToken);
|
||||
return Ok(result);
|
||||
}
|
||||
|
||||
/// <summary> Adds new application </summary>
|
||||
/// <remarks> Adds application for authorized applicant </remarks>
|
||||
[HttpPost]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> CreateApplication(VisaApplicationCreateRequest request, CancellationToken cancellationToken)
|
||||
{
|
||||
await visaApplicationCreateRequestValidator.ValidateAndThrowAsync(request, cancellationToken);
|
||||
|
||||
await visaApplicationRequestsHandler.HandleCreateRequestAsync(request, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Sets application status to closed</summary>
|
||||
/// <remarks> Accessible only for applicant</remarks>
|
||||
[HttpPatch("{applicationId:guid}")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> CloseApplication(Guid applicationId, CancellationToken cancellationToken)
|
||||
{
|
||||
await visaApplicationRequestsHandler.HandleCloseRequestAsync(applicationId, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Approve or reject applications</summary>
|
||||
/// <remarks> Accessible only for authorities</remarks>
|
||||
[HttpPatch("approving/{applicationId:guid}")]
|
||||
[ProducesResponseType(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[ProducesResponseType(StatusCodes.Status409Conflict)]
|
||||
[Authorize(policy: PolicyConstants.ApprovingAuthorityPolicy)]
|
||||
public async Task<IActionResult> SetStatusFromAuthority(Guid applicationId,
|
||||
AuthorityRequestStatuses status,
|
||||
CancellationToken cancellationToken)
|
||||
{
|
||||
await visaApplicationRequestsHandler.SetApplicationStatusFromAuthorityAsync(applicationId, status, cancellationToken);
|
||||
return Ok();
|
||||
}
|
||||
|
||||
/// <summary> Returns application </summary>
|
||||
/// <remarks> Accessible only for applicant </remarks>
|
||||
[HttpGet("/forApplicant/{applicationId:guid}/download")]
|
||||
[Produces("application/octet-stream")]
|
||||
[ProducesResponseType<object>(StatusCodes.Status200OK)]
|
||||
[ProducesResponseType(StatusCodes.Status401Unauthorized)]
|
||||
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
||||
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
||||
[Authorize(policy: PolicyConstants.ApplicantPolicy)]
|
||||
public async Task<IActionResult> DownloadApplicationForApplicant(Guid applicationId, CancellationToken cancellationToken)
|
||||
{
|
||||
var result = await visaApplicationRequestsHandler.ApplicationToStreamAsync(applicationId, cancellationToken);
|
||||
result.Position = 0;
|
||||
return File(result, "application/octet-stream", "Application.xlsx");
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user