Some checks failed
Tests / Go Tests (push) Has been cancelled
Tests / Python Tests (push) Has been cancelled
Tests / Integration Tests (push) Has been cancelled
Tests / Go Lint (push) Has been cancelled
Tests / Python Lint (push) Has been cancelled
Tests / Security Scan (push) Has been cancelled
Tests / All Checks Passed (push) Has been cancelled
Security Scanning / Secret Scanning (push) Has been cancelled
Security Scanning / Dependency Vulnerability Scan (push) Has been cancelled
Security Scanning / Go Security Scan (push) Has been cancelled
Security Scanning / Python Security Scan (push) Has been cancelled
Security Scanning / Node.js Security Scan (push) Has been cancelled
Security Scanning / Docker Image Security (push) Has been cancelled
Security Scanning / Security Summary (push) Has been cancelled
CI/CD Pipeline / Go Tests (push) Has been cancelled
CI/CD Pipeline / Python Tests (push) Has been cancelled
CI/CD Pipeline / Website Tests (push) Has been cancelled
CI/CD Pipeline / Linting (push) Has been cancelled
CI/CD Pipeline / Security Scan (push) Has been cancelled
CI/CD Pipeline / Docker Build & Push (push) Has been cancelled
CI/CD Pipeline / Integration Tests (push) Has been cancelled
CI/CD Pipeline / Deploy to Staging (push) Has been cancelled
CI/CD Pipeline / Deploy to Production (push) Has been cancelled
CI/CD Pipeline / CI Summary (push) Has been cancelled
ci/woodpecker/manual/build-ci-image Pipeline was successful
ci/woodpecker/manual/main Pipeline failed
All services: admin-v2, studio-v2, website, ai-compliance-sdk, consent-service, klausur-service, voice-service, and infrastructure. Large PDFs and compiled binaries excluded via .gitignore.
93 lines
2.6 KiB
Go
93 lines
2.6 KiB
Go
package handlers
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/breakpilot/consent-service/internal/middleware"
|
|
"github.com/breakpilot/consent-service/internal/services"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/google/uuid"
|
|
)
|
|
|
|
// DeadlineHandler handles deadline-related requests
|
|
type DeadlineHandler struct {
|
|
deadlineService *services.DeadlineService
|
|
}
|
|
|
|
// NewDeadlineHandler creates a new deadline handler
|
|
func NewDeadlineHandler(deadlineService *services.DeadlineService) *DeadlineHandler {
|
|
return &DeadlineHandler{
|
|
deadlineService: deadlineService,
|
|
}
|
|
}
|
|
|
|
// GetPendingDeadlines returns all pending consent deadlines for the current user
|
|
func (h *DeadlineHandler) GetPendingDeadlines(c *gin.Context) {
|
|
userID, err := middleware.GetUserID(c)
|
|
if err != nil || userID == uuid.Nil {
|
|
c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid user"})
|
|
return
|
|
}
|
|
|
|
deadlines, err := h.deadlineService.GetPendingDeadlines(c.Request.Context(), userID)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to fetch deadlines"})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"deadlines": deadlines,
|
|
"count": len(deadlines),
|
|
})
|
|
}
|
|
|
|
// GetSuspensionStatus returns the current suspension status for a user
|
|
func (h *DeadlineHandler) GetSuspensionStatus(c *gin.Context) {
|
|
userID, err := middleware.GetUserID(c)
|
|
if err != nil || userID == uuid.Nil {
|
|
c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid user"})
|
|
return
|
|
}
|
|
|
|
suspended, err := h.deadlineService.IsUserSuspended(c.Request.Context(), userID)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to check suspension status"})
|
|
return
|
|
}
|
|
|
|
response := gin.H{
|
|
"suspended": suspended,
|
|
}
|
|
|
|
if suspended {
|
|
suspension, err := h.deadlineService.GetAccountSuspension(c.Request.Context(), userID)
|
|
if err == nil && suspension != nil {
|
|
response["reason"] = suspension.Reason
|
|
response["suspended_at"] = suspension.SuspendedAt
|
|
response["details"] = suspension.Details
|
|
}
|
|
|
|
deadlines, err := h.deadlineService.GetPendingDeadlines(c.Request.Context(), userID)
|
|
if err == nil {
|
|
response["pending_deadlines"] = deadlines
|
|
}
|
|
}
|
|
|
|
c.JSON(http.StatusOK, response)
|
|
}
|
|
|
|
// TriggerDeadlineProcessing manually triggers deadline processing (admin only)
|
|
func (h *DeadlineHandler) TriggerDeadlineProcessing(c *gin.Context) {
|
|
if !middleware.IsAdmin(c) {
|
|
c.JSON(http.StatusForbidden, gin.H{"error": "Admin access required"})
|
|
return
|
|
}
|
|
|
|
if err := h.deadlineService.ProcessDailyDeadlines(c.Request.Context()); err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to process deadlines"})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Deadline processing completed"})
|
|
}
|