use std::{collections::HashMap, io::ErrorKind}; use action_system::{action::ActionContext, macros::action_gen}; use serde::{Deserialize, Serialize}; use tcp_connection::error::TcpTargetError; use vcs_data::data::{ local::{ file_status::{FromRelativePathBuf, ToRelativePathBuf}, vault_modified::sign_vault_modified, }, sheet::SheetName, }; use crate::{ actions::{ auth_member, check_connection_instance, get_current_sheet_name, try_get_local_workspace, try_get_vault, }, write_and_return, }; #[derive(Default, Serialize, Deserialize)] pub enum MakeSheetActionResult { Success, SuccessRestore, // Fail AuthorizeFailed(String), SheetAlreadyExists, SheetCreationFailed(String), #[default] Unknown, } /// Build a sheet with context #[action_gen] pub async fn make_sheet_action( ctx: ActionContext, sheet_name: SheetName, ) -> Result { let instance = check_connection_instance(&ctx)?; // Auth Member let member_id = match auth_member(&ctx, instance).await { Ok(id) => id, Err(e) => return Ok(MakeSheetActionResult::AuthorizeFailed(e.to_string())), }; if ctx.is_proc_on_remote() { let vault = try_get_vault(&ctx)?; // Check if the sheet already exists if let Ok(mut sheet) = vault.sheet(&sheet_name).await { // If the sheet has no holder, assign it to the current member (restore operation) if sheet.holder().is_none() { sheet.set_holder(member_id); match sheet.persist().await { Ok(_) => { write_and_return!(instance, MakeSheetActionResult::SuccessRestore); } Err(e) => { write_and_return!( instance, MakeSheetActionResult::SheetCreationFailed(e.to_string()) ); } } } else { write_and_return!(instance, MakeSheetActionResult::SheetAlreadyExists); } } else { // Create the sheet match vault.create_sheet(&sheet_name, &member_id).await { Ok(_) => { write_and_return!(instance, MakeSheetActionResult::Success); } Err(e) => { write_and_return!( instance, MakeSheetActionResult::SheetCreationFailed(e.to_string()) ); } } } } if ctx.is_proc_on_local() { let result = instance .lock() .await .read::() .await?; if matches!(result, MakeSheetActionResult::Success) { sign_vault_modified(true).await; } return Ok(result); } Err(TcpTargetError::NoResult("No result.".to_string())) } #[derive(Default, Serialize, Deserialize)] pub enum DropSheetActionResult { Success, // Fail SheetInUse, AuthorizeFailed(String), SheetNotExists, SheetDropFailed(String), NoHolder, NotOwner, #[default] Unknown, } #[action_gen] pub async fn drop_sheet_action( ctx: ActionContext, sheet_name: SheetName, ) -> Result { let instance = check_connection_instance(&ctx)?; // Auth Member let member_id = match auth_member(&ctx, instance).await { Ok(id) => id, Err(e) => { return Ok(DropSheetActionResult::AuthorizeFailed(e.to_string())); } }; // Check sheet in use on local if ctx.is_proc_on_local() { let local_workspace = try_get_local_workspace(&ctx)?; if let Some(sheet) = local_workspace.config().lock().await.sheet_in_use() { if sheet == &sheet_name { instance.lock().await.write(false).await?; return Ok(DropSheetActionResult::SheetInUse); } instance.lock().await.write(true).await?; } else { instance.lock().await.write(true).await?; } } if ctx.is_proc_on_remote() { // Check if client sheet is in use let sheet_in_use = instance.lock().await.read::().await?; if !sheet_in_use { return Ok(DropSheetActionResult::SheetInUse); } let vault = try_get_vault(&ctx)?; // Check if the sheet exists let mut sheet = match vault.sheet(&sheet_name).await { Ok(sheet) => sheet, Err(e) => { if e.kind() == ErrorKind::NotFound { write_and_return!(instance, DropSheetActionResult::SheetNotExists); } else { write_and_return!( instance, DropSheetActionResult::SheetDropFailed(e.to_string()) ); } } }; // Get the sheet's holder let Some(holder) = sheet.holder() else { write_and_return!(instance, DropSheetActionResult::NoHolder); }; // Verify the sheet's holder if holder != &member_id { write_and_return!(instance, DropSheetActionResult::NotOwner); } // Drop the sheet sheet.forget_holder(); match sheet.persist().await { Ok(_) => { write_and_return!(instance, DropSheetActionResult::Success); } Err(e) => { write_and_return!( instance, DropSheetActionResult::SheetDropFailed(e.to_string()) ); } } } if ctx.is_proc_on_local() { let result = instance .lock() .await .read::() .await?; if matches!(result, DropSheetActionResult::Success) { sign_vault_modified(true).await; } return Ok(result); } Err(TcpTargetError::NoResult("No result.".to_string())) } pub type OperationArgument = (EditMappingOperations, Option); #[derive(Serialize, Deserialize, PartialEq, Eq, Clone)] pub enum EditMappingOperations { Move, Erase, } #[derive(Serialize, Deserialize, Default)] pub enum EditMappingActionResult { Success, // Fail AuthorizeFailed(String), MappingNotFound(FromRelativePathBuf), InvalidMove(InvalidMoveReason), #[default] Unknown, } #[derive(Serialize, Deserialize)] pub enum InvalidMoveReason { MoveOperationButNoTarget(FromRelativePathBuf), ContainsDuplicateMapping(ToRelativePathBuf), } #[derive(Serialize, Deserialize, Clone)] pub struct EditMappingActionArguments { pub operations: HashMap, } /// This Action only modifies Sheet Mapping and /// does not interfere with the actual location of local files or Local Mapping #[action_gen] pub async fn edit_mapping_action( ctx: ActionContext, args: EditMappingActionArguments, ) -> Result { let instance = check_connection_instance(&ctx)?; // Auth Member let member_id = match auth_member(&ctx, instance).await { Ok(id) => id, Err(e) => { return Ok(EditMappingActionResult::AuthorizeFailed(e.to_string())); } }; // Check sheet let sheet_name = get_current_sheet_name(&ctx, instance, &member_id).await?; if ctx.is_proc_on_remote() { let vault = try_get_vault(&ctx)?; let mut sheet = vault.sheet(&sheet_name).await?; // Precheck for (from_path, (operation, to_path)) in args.operations.iter() { // Check mapping exists if !sheet.mapping().contains_key(from_path) { write_and_return!( instance, EditMappingActionResult::MappingNotFound(from_path.clone()) ); } // Move check if operation == &EditMappingOperations::Move { // Check if target exists if let Some(to_path) = to_path { // Check if target is duplicate if sheet.mapping().contains_key(to_path) { write_and_return!( instance, EditMappingActionResult::InvalidMove( InvalidMoveReason::ContainsDuplicateMapping(to_path.clone()) ) ); } } else { write_and_return!( instance, EditMappingActionResult::InvalidMove( InvalidMoveReason::MoveOperationButNoTarget(from_path.clone()) ) ); } } } // Process for (from_path, (operation, to_path)) in args.operations { match operation { // During the Precheck phase, it has been ensured that: // 1. The mapping to be edited for the From path indeed exists // 2. The location of the To path is indeed empty // 3. In Move mode, To path can be safely unwrapped // Therefore, the following unwrap() calls are safe to execute EditMappingOperations::Move => { let mapping = sheet.mapping_mut().remove(&from_path).unwrap(); let to_path = to_path.unwrap(); sheet .add_mapping(to_path, mapping.id, mapping.version) .await?; } EditMappingOperations::Erase => { sheet.mapping_mut().remove(&from_path).unwrap(); } } } // Write sheet.persist().await?; write_and_return!(instance, EditMappingActionResult::Success); } if ctx.is_proc_on_local() { let result = instance .lock() .await .read::() .await?; if matches!(result, EditMappingActionResult::Success) { sign_vault_modified(true).await; } return Ok(result); } Ok(EditMappingActionResult::Success) }