diff options
Diffstat (limited to 'crates/vcs_actions/src/actions')
| -rw-r--r-- | crates/vcs_actions/src/actions/local_actions.rs | 45 | ||||
| -rw-r--r-- | crates/vcs_actions/src/actions/sheet_actions.rs | 79 |
2 files changed, 119 insertions, 5 deletions
diff --git a/crates/vcs_actions/src/actions/local_actions.rs b/crates/vcs_actions/src/actions/local_actions.rs index 87eafb8..59dd972 100644 --- a/crates/vcs_actions/src/actions/local_actions.rs +++ b/crates/vcs_actions/src/actions/local_actions.rs @@ -2,11 +2,14 @@ use std::net::SocketAddr; use action_system::{action::ActionContext, macros::action_gen}; use cfg_file::config::ConfigFile; -use log::{info, warn}; +use log::info; use serde::{Deserialize, Serialize}; use tcp_connection::error::TcpTargetError; use vcs_data::data::{ - local::{config::LocalConfig, latest_info::LatestInfo}, + local::{ + config::LocalConfig, + latest_info::{LatestInfo, SheetInfo}, + }, vault::config::VaultUuid, }; @@ -18,10 +21,15 @@ use crate::actions::{ pub enum SetUpstreamVaultActionResult { // Success DirectedAndStained, + Redirected, // Fail AlreadyStained, AuthorizeFailed(String), + RedirectFailed(String), + SameUpstream, + + Done, } #[action_gen] @@ -44,6 +52,7 @@ pub async fn set_upstream_vault_action( .await .write(*vault.config().vault_uuid()) .await?; + return Ok(SetUpstreamVaultActionResult::Done); } if ctx.is_proc_on_local() { @@ -69,7 +78,27 @@ pub async fn set_upstream_vault_action( info!("Workspace stained!"); return Ok(SetUpstreamVaultActionResult::DirectedAndStained); } else { - warn!("Workspace already stained!"); + // Local workspace is already stained, redirecting + let Some(stained_uuid) = mut_local_config.stained_uuid() else { + return Ok(SetUpstreamVaultActionResult::RedirectFailed( + "Stained uuid not found".to_string(), + )); + }; + let local_upstream = mut_local_config.upstream_addr(); + + // Address changed, but same UUID. + if vault_uuid == stained_uuid { + if local_upstream != upstream { + // Set the upstream address + mut_local_config.set_vault_addr(upstream); + + // Store the updated config + LocalConfig::write(&mut_local_config).await?; + return Ok(SetUpstreamVaultActionResult::Redirected); + } else { + return Ok(SetUpstreamVaultActionResult::SameUpstream); + } + } return Ok(SetUpstreamVaultActionResult::AlreadyStained); } } @@ -108,10 +137,16 @@ pub async fn update_to_latest_info_action( let mut member_visible = Vec::new(); for sheet in vault.sheets().await? { - if sheet.holder() == &member_id { + if sheet.holder().is_some() && sheet.holder().unwrap() == &member_id { member_owned.push(sheet.name().clone()); } else { - member_visible.push(sheet.name().clone()); + member_visible.push(SheetInfo { + sheet_name: sheet.name().clone(), + holder_name: match sheet.holder() { + Some(holder) => Some(holder.clone()), + None => None, + }, + }); } } diff --git a/crates/vcs_actions/src/actions/sheet_actions.rs b/crates/vcs_actions/src/actions/sheet_actions.rs index e69de29..b6ea51d 100644 --- a/crates/vcs_actions/src/actions/sheet_actions.rs +++ b/crates/vcs_actions/src/actions/sheet_actions.rs @@ -0,0 +1,79 @@ +use action_system::{action::ActionContext, macros::action_gen}; +use serde::{Deserialize, Serialize}; +use tcp_connection::error::TcpTargetError; +use vcs_data::data::sheet::SheetName; + +use crate::actions::{auth_member, check_connection_instance, try_get_vault}; + +#[derive(Default, Serialize, Deserialize)] +pub enum MakeSheetActionResult { + Success, + + // Fail + AuthorizeFailed(String), + SheetAlreadyExists, + SheetCreationFailed(String), + + #[default] + Unknown, +} + +/// Build a sheet with context +#[action_gen] +pub async fn make_sheet_action( + ctx: ActionContext, + sheet_name: SheetName, +) -> Result<MakeSheetActionResult, TcpTargetError> { + let instance = check_connection_instance(&ctx)?; + + // Auth Member + let member_id = match auth_member(&ctx, instance).await { + Ok(id) => id, + Err(e) => return Ok(MakeSheetActionResult::AuthorizeFailed(e.to_string())), + }; + + if ctx.is_proc_on_remote() { + let vault = try_get_vault(&ctx)?; + + // Check if the sheet already exists + if vault.sheet(&sheet_name).await.is_ok() { + instance + .lock() + .await + .write(MakeSheetActionResult::SheetAlreadyExists) + .await?; + return Ok(MakeSheetActionResult::SheetAlreadyExists); + } else { + // Create the sheet + match vault.create_sheet(&sheet_name, &member_id).await { + Ok(_) => { + instance + .lock() + .await + .write(MakeSheetActionResult::Success) + .await?; + return Ok(MakeSheetActionResult::Success); + } + Err(e) => { + instance + .lock() + .await + .write(MakeSheetActionResult::SheetCreationFailed(e.to_string())) + .await?; + return Ok(MakeSheetActionResult::SheetCreationFailed(e.to_string())); + } + } + } + } + + if ctx.is_proc_on_local() { + let result = instance + .lock() + .await + .read::<MakeSheetActionResult>() + .await?; + return Ok(result); + } + + Err(TcpTargetError::NoResult("No result.".to_string())) +} |
