// monorepo/cloud/backend/internal/maplefile/usecase/collection/add_member.go package collection import ( "context" "go.uber.org/zap" "github.com/gocql/gocql" "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/config" dom_collection "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/domain/collection" "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror" ) type AddCollectionMemberUseCase interface { Execute(ctx context.Context, collectionID gocql.UUID, membership *dom_collection.CollectionMembership) error } type addCollectionMemberUseCaseImpl struct { config *config.Configuration logger *zap.Logger repo dom_collection.CollectionRepository } func NewAddCollectionMemberUseCase( config *config.Configuration, logger *zap.Logger, repo dom_collection.CollectionRepository, ) AddCollectionMemberUseCase { logger = logger.Named("AddCollectionMemberUseCase") return &addCollectionMemberUseCaseImpl{config, logger, repo} } func (uc *addCollectionMemberUseCaseImpl) Execute(ctx context.Context, collectionID gocql.UUID, membership *dom_collection.CollectionMembership) error { // // STEP 1: Validation. // e := make(map[string]string) if collectionID.String() == "" { e["collection_id"] = "Collection ID is required" } if membership == nil { e["membership"] = "Membership details are required" } else { // Generate member ID if not provided if membership.ID.String() == "" || membership.ID.String() == "00000000-0000-0000-0000-000000000000" { membership.ID = gocql.TimeUUID() } if membership.RecipientID.String() == "" { e["recipient_id"] = "Recipient ID is required" } if membership.RecipientEmail == "" { e["recipient_email"] = "Recipient email is required" } if membership.GrantedByID.String() == "" { e["granted_by_id"] = "Granted by ID is required" } if len(membership.EncryptedCollectionKey) == 0 { e["encrypted_collection_key"] = "Encrypted collection key is required" } if membership.PermissionLevel == "" { // Default permission level will be set in the repository } else if membership.PermissionLevel != dom_collection.CollectionPermissionReadOnly && membership.PermissionLevel != dom_collection.CollectionPermissionReadWrite && membership.PermissionLevel != dom_collection.CollectionPermissionAdmin { e["permission_level"] = "Invalid permission level" } } if len(e) != 0 { uc.logger.Warn("Failed validating add collection member", zap.Any("error", e)) return httperror.NewForBadRequest(&e) } // // STEP 2: Add member to collection. // return uc.repo.AddMember(ctx, collectionID, membership) }