2018-10-10 20:40:39 +02:00
|
|
|
use serde_json::Value;
|
2018-02-17 22:30:19 +01:00
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
use super::{Organization, UserOrgStatus, UserOrgType, UserOrganization, User, Cipher};
|
|
|
|
|
|
|
|
db_object! {
|
|
|
|
#[derive(Debug, Identifiable, Queryable, Insertable, Associations, AsChangeset)]
|
|
|
|
#[table_name = "collections"]
|
|
|
|
#[belongs_to(Organization, foreign_key = "org_uuid")]
|
|
|
|
#[primary_key(uuid)]
|
|
|
|
pub struct Collection {
|
|
|
|
pub uuid: String,
|
|
|
|
pub org_uuid: String,
|
|
|
|
pub name: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Identifiable, Queryable, Insertable, Associations)]
|
|
|
|
#[table_name = "users_collections"]
|
|
|
|
#[belongs_to(User, foreign_key = "user_uuid")]
|
|
|
|
#[belongs_to(Collection, foreign_key = "collection_uuid")]
|
|
|
|
#[primary_key(user_uuid, collection_uuid)]
|
|
|
|
pub struct CollectionUser {
|
|
|
|
pub user_uuid: String,
|
|
|
|
pub collection_uuid: String,
|
|
|
|
pub read_only: bool,
|
|
|
|
pub hide_passwords: bool,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Identifiable, Queryable, Insertable, Associations)]
|
|
|
|
#[table_name = "ciphers_collections"]
|
|
|
|
#[belongs_to(Cipher, foreign_key = "cipher_uuid")]
|
|
|
|
#[belongs_to(Collection, foreign_key = "collection_uuid")]
|
|
|
|
#[primary_key(cipher_uuid, collection_uuid)]
|
|
|
|
pub struct CollectionCipher {
|
|
|
|
pub cipher_uuid: String,
|
|
|
|
pub collection_uuid: String,
|
|
|
|
}
|
2018-02-17 22:30:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Local methods
|
|
|
|
impl Collection {
|
|
|
|
pub fn new(org_uuid: String, name: String) -> Self {
|
|
|
|
Self {
|
2018-12-07 14:32:40 +01:00
|
|
|
uuid: crate::util::get_uuid(),
|
2018-02-17 22:30:19 +01:00
|
|
|
|
|
|
|
org_uuid,
|
|
|
|
name,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-10 20:40:39 +02:00
|
|
|
pub fn to_json(&self) -> Value {
|
2018-02-17 22:30:19 +01:00
|
|
|
json!({
|
|
|
|
"Id": self.uuid,
|
|
|
|
"OrganizationId": self.org_uuid,
|
|
|
|
"Name": self.name,
|
|
|
|
"Object": "collection",
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-30 23:34:31 +01:00
|
|
|
use crate::db::DbConn;
|
2018-02-17 22:30:19 +01:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
use crate::api::EmptyResult;
|
|
|
|
use crate::error::MapResult;
|
|
|
|
|
2018-02-17 22:30:19 +01:00
|
|
|
/// Database methods
|
|
|
|
impl Collection {
|
2019-09-12 22:12:22 +02:00
|
|
|
pub fn save(&self, conn: &DbConn) -> EmptyResult {
|
|
|
|
self.update_users_revision(conn);
|
|
|
|
|
2020-09-22 12:13:02 +02:00
|
|
|
db_run! { conn:
|
2020-08-18 17:15:44 +02:00
|
|
|
sqlite, mysql {
|
2020-09-22 12:13:02 +02:00
|
|
|
match diesel::replace_into(collections::table)
|
2020-08-18 17:15:44 +02:00
|
|
|
.values(CollectionDb::to_db(self))
|
|
|
|
.execute(conn)
|
2020-09-22 12:13:02 +02:00
|
|
|
{
|
|
|
|
Ok(_) => Ok(()),
|
|
|
|
// Record already exists and causes a Foreign Key Violation because replace_into() wants to delete the record first.
|
|
|
|
Err(diesel::result::Error::DatabaseError(diesel::result::DatabaseErrorKind::ForeignKeyViolation, _)) => {
|
|
|
|
diesel::update(collections::table)
|
|
|
|
.filter(collections::uuid.eq(&self.uuid))
|
|
|
|
.set(CollectionDb::to_db(self))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error saving collection")
|
|
|
|
}
|
|
|
|
Err(e) => Err(e.into()),
|
|
|
|
}.map_res("Error saving collection")
|
2020-08-18 17:15:44 +02:00
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
let value = CollectionDb::to_db(self);
|
|
|
|
diesel::insert_into(collections::table)
|
|
|
|
.values(&value)
|
|
|
|
.on_conflict(collections::uuid)
|
|
|
|
.do_update()
|
|
|
|
.set(&value)
|
|
|
|
.execute(conn)
|
2020-09-22 12:13:02 +02:00
|
|
|
.map_res("Error saving collection")
|
2020-08-18 17:15:44 +02:00
|
|
|
}
|
|
|
|
}
|
2018-02-17 22:30:19 +01:00
|
|
|
}
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete(self, conn: &DbConn) -> EmptyResult {
|
2019-02-06 14:39:32 +01:00
|
|
|
self.update_users_revision(conn);
|
2018-05-17 00:05:50 +02:00
|
|
|
CollectionCipher::delete_all_by_collection(&self.uuid, &conn)?;
|
|
|
|
CollectionUser::delete_all_by_collection(&self.uuid, &conn)?;
|
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(collections::table.filter(collections::uuid.eq(self.uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting collection")
|
|
|
|
}}
|
2018-02-17 22:30:19 +01:00
|
|
|
}
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete_all_by_organization(org_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2018-05-18 17:52:51 +02:00
|
|
|
for collection in Self::find_by_organization(org_uuid, &conn) {
|
|
|
|
collection.delete(&conn)?;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-02-06 14:39:32 +01:00
|
|
|
pub fn update_users_revision(&self, conn: &DbConn) {
|
|
|
|
UserOrganization::find_by_collection_and_org(&self.uuid, &self.org_uuid, conn)
|
|
|
|
.iter()
|
|
|
|
.for_each(|user_org| {
|
|
|
|
User::update_uuid_revision(&user_org.user_uuid, conn);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2018-02-17 22:30:19 +01:00
|
|
|
pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
collections::table
|
|
|
|
.filter(collections::uuid.eq(uuid))
|
|
|
|
.first::<CollectionDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-02-17 22:30:19 +01:00
|
|
|
}
|
2018-04-20 18:35:11 +02:00
|
|
|
|
2018-05-04 19:25:50 +02:00
|
|
|
pub fn find_by_user_uuid(user_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
collections::table
|
|
|
|
.left_join(users_collections::table.on(
|
|
|
|
users_collections::collection_uuid.eq(collections::uuid).and(
|
|
|
|
users_collections::user_uuid.eq(user_uuid)
|
|
|
|
)
|
|
|
|
))
|
|
|
|
.left_join(users_organizations::table.on(
|
|
|
|
collections::org_uuid.eq(users_organizations::org_uuid).and(
|
|
|
|
users_organizations::user_uuid.eq(user_uuid)
|
|
|
|
)
|
|
|
|
))
|
|
|
|
.filter(
|
|
|
|
users_organizations::status.eq(UserOrgStatus::Confirmed as i32)
|
2018-12-27 18:56:01 +01:00
|
|
|
)
|
2020-08-18 17:15:44 +02:00
|
|
|
.filter(
|
|
|
|
users_collections::user_uuid.eq(user_uuid).or( // Directly accessed collection
|
|
|
|
users_organizations::access_all.eq(true) // access_all in Organization
|
|
|
|
)
|
|
|
|
).select(collections::all_columns)
|
|
|
|
.load::<CollectionDb>(conn).expect("Error loading collections").from_db()
|
|
|
|
}}
|
2018-05-04 19:25:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_organization_and_user_uuid(org_uuid: &str, user_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2018-12-30 23:34:31 +01:00
|
|
|
Self::find_by_user_uuid(user_uuid, conn)
|
|
|
|
.into_iter()
|
|
|
|
.filter(|c| c.org_uuid == org_uuid)
|
|
|
|
.collect()
|
2018-04-20 18:35:11 +02:00
|
|
|
}
|
|
|
|
|
2018-05-11 20:08:02 +02:00
|
|
|
pub fn find_by_organization(org_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
collections::table
|
|
|
|
.filter(collections::org_uuid.eq(org_uuid))
|
|
|
|
.load::<CollectionDb>(conn)
|
|
|
|
.expect("Error loading collections")
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-05-11 20:08:02 +02:00
|
|
|
}
|
|
|
|
|
2018-05-28 18:26:02 +02:00
|
|
|
pub fn find_by_uuid_and_org(uuid: &str, org_uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
collections::table
|
|
|
|
.filter(collections::uuid.eq(uuid))
|
|
|
|
.filter(collections::org_uuid.eq(org_uuid))
|
|
|
|
.select(collections::all_columns)
|
|
|
|
.first::<CollectionDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-05-28 18:26:02 +02:00
|
|
|
}
|
|
|
|
|
2018-04-20 18:35:11 +02:00
|
|
|
pub fn find_by_uuid_and_user(uuid: &str, user_uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
collections::table
|
|
|
|
.left_join(users_collections::table.on(
|
|
|
|
users_collections::collection_uuid.eq(collections::uuid).and(
|
|
|
|
users_collections::user_uuid.eq(user_uuid)
|
2018-05-21 18:31:46 +02:00
|
|
|
)
|
2020-08-18 17:15:44 +02:00
|
|
|
))
|
|
|
|
.left_join(users_organizations::table.on(
|
|
|
|
collections::org_uuid.eq(users_organizations::org_uuid).and(
|
|
|
|
users_organizations::user_uuid.eq(user_uuid)
|
|
|
|
)
|
|
|
|
))
|
|
|
|
.filter(collections::uuid.eq(uuid))
|
|
|
|
.filter(
|
|
|
|
users_collections::collection_uuid.eq(uuid).or( // Directly accessed collection
|
|
|
|
users_organizations::access_all.eq(true).or( // access_all in Organization
|
|
|
|
users_organizations::atype.le(UserOrgType::Admin as i32) // Org admin or owner
|
|
|
|
)
|
|
|
|
)
|
|
|
|
).select(collections::all_columns)
|
|
|
|
.first::<CollectionDb>(conn).ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-04-20 18:35:11 +02:00
|
|
|
}
|
2018-05-09 12:55:05 +02:00
|
|
|
|
|
|
|
pub fn is_writable_by_user(&self, user_uuid: &str, conn: &DbConn) -> bool {
|
|
|
|
match UserOrganization::find_by_user_and_org(&user_uuid, &self.org_uuid, &conn) {
|
|
|
|
None => false, // Not in Org
|
|
|
|
Some(user_org) => {
|
2020-09-01 09:49:48 +02:00
|
|
|
if user_org.has_full_access() {
|
|
|
|
return true;
|
2018-12-30 23:34:31 +01:00
|
|
|
}
|
2020-09-01 09:49:48 +02:00
|
|
|
|
|
|
|
db_run! { conn: {
|
|
|
|
users_collections::table
|
|
|
|
.filter(users_collections::collection_uuid.eq(&self.uuid))
|
|
|
|
.filter(users_collections::user_uuid.eq(user_uuid))
|
|
|
|
.filter(users_collections::read_only.eq(false))
|
|
|
|
.count()
|
|
|
|
.first::<i64>(conn)
|
|
|
|
.ok()
|
|
|
|
.unwrap_or(0) != 0
|
|
|
|
}}
|
2018-05-09 12:55:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-04-20 18:35:11 +02:00
|
|
|
}
|
|
|
|
|
2018-05-04 19:25:50 +02:00
|
|
|
/// Database methods
|
2018-05-17 00:05:50 +02:00
|
|
|
impl CollectionUser {
|
2018-05-11 20:08:02 +02:00
|
|
|
pub fn find_by_organization_and_user_uuid(org_uuid: &str, user_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
users_collections::table
|
|
|
|
.filter(users_collections::user_uuid.eq(user_uuid))
|
|
|
|
.inner_join(collections::table.on(collections::uuid.eq(users_collections::collection_uuid)))
|
|
|
|
.filter(collections::org_uuid.eq(org_uuid))
|
|
|
|
.select(users_collections::all_columns)
|
|
|
|
.load::<CollectionUserDb>(conn)
|
|
|
|
.expect("Error loading users_collections")
|
|
|
|
.from_db()
|
|
|
|
}}
|
2019-09-12 22:12:22 +02:00
|
|
|
}
|
|
|
|
|
2020-07-03 06:51:20 +02:00
|
|
|
pub fn save(user_uuid: &str, collection_uuid: &str, read_only: bool, hide_passwords: bool, conn: &DbConn) -> EmptyResult {
|
2018-08-21 13:20:55 +02:00
|
|
|
User::update_uuid_revision(&user_uuid, conn);
|
|
|
|
|
2020-09-22 12:13:02 +02:00
|
|
|
db_run! { conn:
|
2020-08-18 17:15:44 +02:00
|
|
|
sqlite, mysql {
|
2020-09-22 12:13:02 +02:00
|
|
|
match diesel::replace_into(users_collections::table)
|
2020-08-18 17:15:44 +02:00
|
|
|
.values((
|
|
|
|
users_collections::user_uuid.eq(user_uuid),
|
|
|
|
users_collections::collection_uuid.eq(collection_uuid),
|
|
|
|
users_collections::read_only.eq(read_only),
|
|
|
|
users_collections::hide_passwords.eq(hide_passwords),
|
|
|
|
))
|
|
|
|
.execute(conn)
|
2020-09-22 12:13:02 +02:00
|
|
|
{
|
|
|
|
Ok(_) => Ok(()),
|
|
|
|
// Record already exists and causes a Foreign Key Violation because replace_into() wants to delete the record first.
|
|
|
|
Err(diesel::result::Error::DatabaseError(diesel::result::DatabaseErrorKind::ForeignKeyViolation, _)) => {
|
|
|
|
diesel::update(users_collections::table)
|
|
|
|
.filter(users_collections::user_uuid.eq(user_uuid))
|
|
|
|
.filter(users_collections::collection_uuid.eq(collection_uuid))
|
|
|
|
.set((
|
|
|
|
users_collections::user_uuid.eq(user_uuid),
|
|
|
|
users_collections::collection_uuid.eq(collection_uuid),
|
|
|
|
users_collections::read_only.eq(read_only),
|
|
|
|
users_collections::hide_passwords.eq(hide_passwords),
|
|
|
|
))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error adding user to collection")
|
|
|
|
}
|
|
|
|
Err(e) => Err(e.into()),
|
|
|
|
}.map_res("Error adding user to collection")
|
2020-08-18 17:15:44 +02:00
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
diesel::insert_into(users_collections::table)
|
|
|
|
.values((
|
|
|
|
users_collections::user_uuid.eq(user_uuid),
|
|
|
|
users_collections::collection_uuid.eq(collection_uuid),
|
|
|
|
users_collections::read_only.eq(read_only),
|
|
|
|
users_collections::hide_passwords.eq(hide_passwords),
|
|
|
|
))
|
|
|
|
.on_conflict((users_collections::user_uuid, users_collections::collection_uuid))
|
|
|
|
.do_update()
|
|
|
|
.set((
|
|
|
|
users_collections::read_only.eq(read_only),
|
|
|
|
users_collections::hide_passwords.eq(hide_passwords),
|
|
|
|
))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error adding user to collection")
|
|
|
|
}
|
|
|
|
}
|
2018-04-20 18:35:11 +02:00
|
|
|
}
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete(self, conn: &DbConn) -> EmptyResult {
|
2018-08-21 13:20:55 +02:00
|
|
|
User::update_uuid_revision(&self.user_uuid, conn);
|
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(
|
|
|
|
users_collections::table
|
|
|
|
.filter(users_collections::user_uuid.eq(&self.user_uuid))
|
|
|
|
.filter(users_collections::collection_uuid.eq(&self.collection_uuid)),
|
|
|
|
)
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error removing user from collection")
|
|
|
|
}}
|
2018-05-29 17:01:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_collection(collection_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
users_collections::table
|
|
|
|
.filter(users_collections::collection_uuid.eq(collection_uuid))
|
|
|
|
.select(users_collections::all_columns)
|
|
|
|
.load::<CollectionUserDb>(conn)
|
|
|
|
.expect("Error loading users_collections")
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-05-29 17:01:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_collection_and_user(collection_uuid: &str, user_uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
users_collections::table
|
|
|
|
.filter(users_collections::collection_uuid.eq(collection_uuid))
|
|
|
|
.filter(users_collections::user_uuid.eq(user_uuid))
|
|
|
|
.select(users_collections::all_columns)
|
|
|
|
.first::<CollectionUserDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-04-20 18:35:11 +02:00
|
|
|
}
|
2018-05-17 00:05:50 +02:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete_all_by_collection(collection_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2018-08-21 13:20:55 +02:00
|
|
|
CollectionUser::find_by_collection(&collection_uuid, conn)
|
2018-12-30 23:34:31 +01:00
|
|
|
.iter()
|
2019-01-28 00:39:14 +01:00
|
|
|
.for_each(|collection| {
|
|
|
|
User::update_uuid_revision(&collection.user_uuid, conn);
|
|
|
|
});
|
2018-08-21 13:20:55 +02:00
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(users_collections::table.filter(users_collections::collection_uuid.eq(collection_uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting users from collection")
|
|
|
|
}}
|
2018-05-17 00:05:50 +02:00
|
|
|
}
|
2018-05-18 17:52:51 +02:00
|
|
|
|
2020-11-07 23:03:02 +01:00
|
|
|
pub fn delete_all_by_user_and_org(user_uuid: &str, org_uuid: &str, conn: &DbConn) -> EmptyResult {
|
|
|
|
let collectionusers = Self::find_by_organization_and_user_uuid(org_uuid, user_uuid, conn);
|
2018-08-21 13:20:55 +02:00
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
2020-11-07 23:03:02 +01:00
|
|
|
for user in collectionusers {
|
|
|
|
diesel::delete(users_collections::table.filter(
|
|
|
|
users_collections::user_uuid.eq(user_uuid)
|
|
|
|
.and(users_collections::collection_uuid.eq(user.collection_uuid))
|
|
|
|
|
|
|
|
))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error removing user from collections")?;
|
|
|
|
}
|
|
|
|
Ok(())
|
2020-08-18 17:15:44 +02:00
|
|
|
}}
|
2018-05-18 17:52:51 +02:00
|
|
|
}
|
2018-05-09 12:55:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Database methods
|
|
|
|
impl CollectionCipher {
|
2019-09-12 22:12:22 +02:00
|
|
|
pub fn save(cipher_uuid: &str, collection_uuid: &str, conn: &DbConn) -> EmptyResult {
|
|
|
|
Self::update_users_revision(&collection_uuid, conn);
|
|
|
|
|
2020-09-22 12:13:02 +02:00
|
|
|
db_run! { conn:
|
2020-08-18 17:15:44 +02:00
|
|
|
sqlite, mysql {
|
2020-09-22 12:13:02 +02:00
|
|
|
// Not checking for ForeignKey Constraints here.
|
|
|
|
// Table ciphers_collections does not have ForeignKey Constraints which would cause conflicts.
|
|
|
|
// This table has no constraints pointing to itself, but only to others.
|
2020-08-18 17:15:44 +02:00
|
|
|
diesel::replace_into(ciphers_collections::table)
|
|
|
|
.values((
|
|
|
|
ciphers_collections::cipher_uuid.eq(cipher_uuid),
|
|
|
|
ciphers_collections::collection_uuid.eq(collection_uuid),
|
|
|
|
))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error adding cipher to collection")
|
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
diesel::insert_into(ciphers_collections::table)
|
|
|
|
.values((
|
|
|
|
ciphers_collections::cipher_uuid.eq(cipher_uuid),
|
|
|
|
ciphers_collections::collection_uuid.eq(collection_uuid),
|
|
|
|
))
|
|
|
|
.on_conflict((ciphers_collections::cipher_uuid, ciphers_collections::collection_uuid))
|
|
|
|
.do_nothing()
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error adding cipher to collection")
|
|
|
|
}
|
|
|
|
}
|
2018-05-09 12:55:05 +02:00
|
|
|
}
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete(cipher_uuid: &str, collection_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2019-02-06 15:47:47 +01:00
|
|
|
Self::update_users_revision(&collection_uuid, conn);
|
2020-09-22 12:13:02 +02:00
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(
|
|
|
|
ciphers_collections::table
|
|
|
|
.filter(ciphers_collections::cipher_uuid.eq(cipher_uuid))
|
|
|
|
.filter(ciphers_collections::collection_uuid.eq(collection_uuid)),
|
|
|
|
)
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting cipher from collection")
|
|
|
|
}}
|
2018-05-09 12:55:05 +02:00
|
|
|
}
|
2018-05-15 18:27:53 +02:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete_all_by_cipher(cipher_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(ciphers_collections::table.filter(ciphers_collections::cipher_uuid.eq(cipher_uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error removing cipher from collections")
|
|
|
|
}}
|
2018-05-15 18:27:53 +02:00
|
|
|
}
|
2018-05-17 00:05:50 +02:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
pub fn delete_all_by_collection(collection_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(ciphers_collections::table.filter(ciphers_collections::collection_uuid.eq(collection_uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error removing ciphers from collection")
|
|
|
|
}}
|
2018-05-17 00:05:50 +02:00
|
|
|
}
|
2019-02-06 15:47:47 +01:00
|
|
|
|
|
|
|
pub fn update_users_revision(collection_uuid: &str, conn: &DbConn) {
|
|
|
|
if let Some(collection) = Collection::find_by_uuid(collection_uuid, conn) {
|
|
|
|
collection.update_users_revision(conn);
|
|
|
|
}
|
|
|
|
}
|
2018-12-30 23:34:31 +01:00
|
|
|
}
|