add: forges ui

TODO: forges tickets feed, posts open/closed state
This commit is contained in:
trisua 2025-06-09 16:45:36 -04:00
parent 5b1db42c51
commit a6140f7c8c
40 changed files with 1664 additions and 1270 deletions

View file

@ -11,14 +11,12 @@ use axum_extra::extract::CookieJar;
use serde::Deserialize;
use tera::Context;
use tetratto_core::model::{
auth::User,
communities::{Community, CommunityReadAccess},
communities_permissions::CommunityPermission,
permissions::FinePermission,
Error,
auth::User, communities::Community, communities_permissions::CommunityPermission,
permissions::FinePermission, Error,
};
macro_rules! check_permissions {
#[macro_export]
macro_rules! check_community_permissions {
($community:ident, $jar:ident, $data:ident, $user:ident) => {{
let mut is_member: bool = false;
let mut can_manage_pins: bool = false;
@ -54,7 +52,7 @@ macro_rules! check_permissions {
}
match $community.read_access {
CommunityReadAccess::Joined => {
tetratto_core::model::communities::CommunityReadAccess::Joined => {
if !can_manage_communities {
if !is_member {
(false, can_manage_pins)
@ -70,6 +68,7 @@ macro_rules! check_permissions {
}};
}
#[macro_export]
macro_rules! community_context_bools {
($data:ident, $user:ident, $community:ident) => {{
let membership = if let Some(ref ua) = $user {
@ -98,7 +97,9 @@ macro_rules! community_context_bools {
};
let is_pending = if let Some(ref membership) = membership {
membership.role.check(CommunityPermission::REQUESTED)
membership.role.check(
tetratto_core::model::communities_permissions::CommunityPermission::REQUESTED,
)
} else {
false
};
@ -110,25 +111,27 @@ macro_rules! community_context_bools {
};
let can_manage_posts = if let Some(ref membership) = membership {
membership.role.check(CommunityPermission::MANAGE_POSTS)
membership.role.check(
tetratto_core::model::communities_permissions::CommunityPermission::MANAGE_POSTS,
)
} else {
false
};
let can_manage_community = if let Some(ref membership) = membership {
membership.role.check(CommunityPermission::MANAGE_COMMUNITY)
membership.role.check(tetratto_core::model::communities_permissions::CommunityPermission::MANAGE_COMMUNITY)
} else {
false
};
let can_manage_roles = if let Some(ref membership) = membership {
membership.role.check(CommunityPermission::MANAGE_ROLES)
membership.role.check(tetratto_core::model::communities_permissions::CommunityPermission::MANAGE_ROLES)
} else {
false
};
let can_manage_questions = if let Some(ref membership) = membership {
membership.role.check(CommunityPermission::MANAGE_QUESTIONS)
membership.role.check(tetratto_core::model::communities_permissions::CommunityPermission::MANAGE_QUESTIONS)
} else {
false
};
@ -389,7 +392,7 @@ pub async fn feed_request(
}
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, user);
let (can_read, _) = check_community_permissions!(community, jar, data, user);
// ...
let ignore_users = crate::ignore_users_gen!(user, data);
@ -487,7 +490,7 @@ pub async fn questions_request(
}
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, user);
let (can_read, _) = check_community_permissions!(community, jar, data, user);
// ...
let ignore_users = crate::ignore_users_gen!(user, data);
@ -724,7 +727,7 @@ pub async fn post_request(
};
// check permissions
let (can_read, can_manage_pins) = check_permissions!(community, jar, data, user);
let (can_read, can_manage_pins) = check_community_permissions!(community, jar, data, user);
if !can_read {
return Err(Html(
@ -838,7 +841,7 @@ pub async fn reposts_request(
};
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, user);
let (can_read, _) = check_community_permissions!(community, jar, data, user);
if !can_read {
return Err(Html(
@ -989,7 +992,7 @@ pub async fn likes_request(
};
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, ua);
let (can_read, _) = check_community_permissions!(community, jar, data, ua);
if !can_read {
return Err(Html(
@ -1092,7 +1095,7 @@ pub async fn members_request(
}
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, user);
let (can_read, _) = check_community_permissions!(community, jar, data, user);
// ...
let list = match data
@ -1128,6 +1131,7 @@ pub async fn members_request(
can_manage_questions,
) = community_context_bools!(data, user, community);
context.insert("allow_for_forges", &true);
context.insert("list", &list);
context.insert("page", &props.page);
context.insert("owner", &owner);
@ -1187,7 +1191,7 @@ pub async fn question_request(
};
// check permissions
let (can_read, _) = check_permissions!(community, jar, data, user);
let (can_read, _) = check_community_permissions!(community, jar, data, user);
if !can_read && !is_sender {
return Err(Html(