Documentation
¶
Index ¶
- func Create(c *gin.Context)
- func CreateRole(c *gin.Context)
- func Delete(c *gin.Context)
- func DeleteRoles(c *gin.Context)
- func Get(c *gin.Context)
- func Reload(c *gin.Context)
- func Search(c *gin.Context)
- func SearchRoles(c *gin.Context)
- func Update(c *gin.Context)
- func UpdateRole(c *gin.Context)
- type HttpApiData
- type PermissionCreateData
- type PermissionCreateRequest
- type PermissionData
- type PermissionDeleteRequest
- type PermissionGetData
- type PermissionSearchData
- type PermissionSearchRequest
- type PermissionUpdateData
- type PermissionUpdateRequest
- type RoleCreateRequest
- type RoleData
- type RoleDeleteRequest
- type RoleSearchData
- type RoleSearchRequest
- type RoleUpdateRequest
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func Create ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param request body permission.PermissionCreateRequest true "create permission" @success 200 {object} response.Response{data=permission.PermissionCreateData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission [post]
func CreateRole ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param request body permission.RoleCreateRequest true "create role" @success 200 {object} response.Response{data=permission.RoleData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/role [post]
func Delete ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param id path string true "id" @param request body permission.PermissionDeleteRequest true "delete permissions" @success 204 "no content" @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission [delete]
func DeleteRoles ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param id path string true "id" @param request body permission.RoleDeleteRequest true "delete roles" @success 204 "no content" @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/role [delete]
func Get ¶
@tags admin-permission @accept json @produce json @param Authorization header string true "bearer token" @param id path string true "id" @success 200 {object} response.Response{data=permission.PermissionGetData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission/{id} [get]
func Reload ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @success 204 "no content" @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission/reload [post]
func Search ¶
@tags admin-permission @accept json @produce json @param Authorization header string true "bearer token" @param request body permission.PermissionSearchRequest true "search permissions" @success 200 {object} response.Response{data=permission.PermissionSearchData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission [get]
func SearchRoles ¶
@tags admin-permission @accept json @produce json @param Authorization header string true "bearer token" @param request body permission.RoleSearchRequest true "search roles" @success 200 {object} response.Response{data=permission.RoleSearchData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/role [get]
func Update ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param id path string true "id" @param request body permission.PermissionUpdateRequest true "update permission" @success 200 {object} response.Response{data=permission.PermissionUpdateData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/permission/{id} [put]
func UpdateRole ¶
@tags admin-permission @accept json @produce json @param X-XSRF-TOKEN header string true "csrf token" @param Authorization header string true "bearer token" @param id path string true "id" @param request body permission.RoleUpdateRequest true "update role" @success 200 {object} response.Response{data=permission.RoleData} @failure 400 {object} response.ErrorResponse "code: 400-001(Bad Request), 400-002(request validation failed)" @failure 401 {object} response.ErrorResponse "code: 401-001(Unauthorized)" @failure 403 {object} response.ErrorResponse "code: 403-001(Forbidden)" @failure 500 {object} response.ErrorResponse "code: 500-001(Internal Server Error)" @router /api/admin/role/{id} [put]
Types ¶
type HttpApiData ¶
type HttpApiData struct {
Path string `json:"path" mapstructure:"path" validate:"required"`
Method string `json:"method" mapstructure:"method" validate:"required"`
}
func (*HttpApiData) Fill ¶
func (data *HttpApiData) Fill(casbinRule gormadapter.CasbinRule)
type PermissionCreateData ¶
type PermissionCreateData struct {
PermissionData `mapstructure:",squash"`
HttpApis []HttpApiData `json:"http_apis" mapstructure:"http_apis" validate:"required"`
}
type PermissionCreateRequest ¶
type PermissionData ¶
type PermissionData struct {
Id uint `json:"id" mapstructure:"id" validate:"required"`
Name string `json:"name" mapstructure:"name" validate:"required"`
CreatedAt time.Time `json:"created_at" mapstructure:"created_at" validate:"required" format:"date-time"`
UpdatedAt time.Time `json:"updated_at" mapstructure:"updated_at" validate:"required" format:"date-time"`
}
func (*PermissionData) Fill ¶
func (data *PermissionData) Fill(m *model.Permission)
type PermissionDeleteRequest ¶
type PermissionDeleteRequest struct {
Ids []uint `json:"ids" binding:"required"`
}
type PermissionGetData ¶
type PermissionGetData struct {
PermissionData `mapstructure:",squash"`
HttpApis []HttpApiData `json:"http_apis" mapstructure:"http_apis" validate:"required"`
}
type PermissionSearchData ¶
type PermissionSearchData struct {
Permissions []PermissionData `json:"permissions" mapstructure:"permissions" validate:"required"`
pagination.PaginationResponse `mapstructure:",squash"`
}
type PermissionSearchRequest ¶
type PermissionSearchRequest struct {
Name string `form:"name" structs:"name,omitempty" schema:"name,omitempty"`
pagination.PaginationRequest
}
type PermissionUpdateData ¶
type PermissionUpdateData struct {
PermissionData `mapstructure:",squash"`
HttpApis []HttpApiData `json:"http_apis" mapstructure:"http_apis" validate:"required"`
}
type PermissionUpdateRequest ¶
type RoleCreateRequest ¶
type RoleData ¶
type RoleData struct {
Id uint `json:"id" mapstructure:"id" validate:"required"`
Name string `json:"name" mapstructure:"name" validate:"required"`
IsPublic bool `json:"is_public" mapstructure:"is_public" validate:"required"`
CreatedAt time.Time `json:"created_at" mapstructure:"created_at" validate:"required" format:"date-time"`
UpdatedAt time.Time `json:"updated_at" mapstructure:"updated_at" validate:"required" format:"date-time"`
Permissions []PermissionData `json:"permissions" mapstructure:"permissions" validate:"required"`
}
type RoleDeleteRequest ¶
type RoleDeleteRequest struct {
Ids []uint `json:"ids" binding:"required"`
}
type RoleSearchData ¶
type RoleSearchData struct {
Roles []RoleData `json:"roles" mapstructure:"roles" validate:"required"`
pagination.PaginationResponse `mapstructure:",squash"`
}
type RoleSearchRequest ¶
type RoleSearchRequest struct {
Name string `form:"name" structs:"name,omitempty" schema:"name,omitempty"`
IsPublic bool `form:"is_public" structs:"is_public1,omitempty" schema:"is_public,omitempty"`
pagination.PaginationRequest
}