mirror of
https://github.com/openimsdk/open-im-server.git
synced 2025-04-06 04:15:46 +08:00
* add callback before join group * fix bug * fix deployments/templates/alertmanager.yml * fix bug * update callback after join group * merge callback after join group * update callback setrgoup info * test * test * test * update three functions in friend category * test friend and blacklist * test * test * test * Update openim.yaml * merge callback after join group * merge callback after join group * merge callback after join group * fix callbackbeforesetgroupinfo * fix eventtime * update api request required * update api request required * update api request required * delete unused code * delete unused code * fix * Update .env * Update .env * Update callback.go * Update callback.go * Update .env * Update .env * fix: merge * update * fix: merge * fix: fix bugs * update callback enable * update callback enable * update callback enable * update callback enable * update callback enable * update callback enable * Update openim.yaml * Update environment.sh * Update environment.md * Update environment.md * Update environment.sh --------- Co-authored-by: Gordon <1432970085@qq.com>
106 lines
3.3 KiB
Go
106 lines
3.3 KiB
Go
// Copyright © 2023 OpenIM. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package friend
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/openimsdk/open-im-server/v3/pkg/authverify"
|
|
|
|
pbfriend "github.com/OpenIMSDK/protocol/friend"
|
|
"github.com/OpenIMSDK/tools/mcontext"
|
|
|
|
"github.com/openimsdk/open-im-server/v3/pkg/common/convert"
|
|
"github.com/openimsdk/open-im-server/v3/pkg/common/db/table/relation"
|
|
)
|
|
|
|
func (s *friendServer) GetPaginationBlacks(
|
|
ctx context.Context,
|
|
req *pbfriend.GetPaginationBlacksReq,
|
|
) (resp *pbfriend.GetPaginationBlacksResp, err error) {
|
|
if err := s.userRpcClient.Access(ctx, req.UserID); err != nil {
|
|
return nil, err
|
|
}
|
|
var pageNumber, showNumber int32
|
|
if req.Pagination != nil {
|
|
pageNumber = req.Pagination.PageNumber
|
|
showNumber = req.Pagination.ShowNumber
|
|
}
|
|
blacks, total, err := s.blackDatabase.FindOwnerBlacks(ctx, req.UserID, pageNumber, showNumber)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp = &pbfriend.GetPaginationBlacksResp{}
|
|
resp.Blacks, err = convert.BlackDB2Pb(ctx, blacks, s.userRpcClient.GetUsersInfoMap)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp.Total = int32(total)
|
|
return resp, nil
|
|
}
|
|
|
|
func (s *friendServer) IsBlack(ctx context.Context, req *pbfriend.IsBlackReq) (*pbfriend.IsBlackResp, error) {
|
|
in1, in2, err := s.blackDatabase.CheckIn(ctx, req.UserID1, req.UserID2)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp := &pbfriend.IsBlackResp{}
|
|
resp.InUser1Blacks = in1
|
|
resp.InUser2Blacks = in2
|
|
return resp, nil
|
|
}
|
|
|
|
func (s *friendServer) RemoveBlack(
|
|
ctx context.Context,
|
|
req *pbfriend.RemoveBlackReq,
|
|
) (*pbfriend.RemoveBlackResp, error) {
|
|
if err := s.userRpcClient.Access(ctx, req.OwnerUserID); err != nil {
|
|
return nil, err
|
|
}
|
|
if err := s.blackDatabase.Delete(ctx, []*relation.BlackModel{{OwnerUserID: req.OwnerUserID, BlockUserID: req.BlackUserID}}); err != nil {
|
|
return nil, err
|
|
}
|
|
s.notificationSender.BlackDeletedNotification(ctx, req)
|
|
if err := CallbackAfterRemoveBlack(ctx, req); err != nil {
|
|
return nil, err
|
|
}
|
|
return &pbfriend.RemoveBlackResp{}, nil
|
|
}
|
|
|
|
func (s *friendServer) AddBlack(ctx context.Context, req *pbfriend.AddBlackReq) (*pbfriend.AddBlackResp, error) {
|
|
if err := authverify.CheckAccessV3(ctx, req.OwnerUserID); err != nil {
|
|
return nil, err
|
|
}
|
|
_, err := s.userRpcClient.GetUsersInfo(ctx, []string{req.OwnerUserID, req.BlackUserID})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := CallbackBeforeAddBlack(ctx, req); err != nil {
|
|
return nil, err
|
|
}
|
|
black := relation.BlackModel{
|
|
OwnerUserID: req.OwnerUserID,
|
|
BlockUserID: req.BlackUserID,
|
|
OperatorUserID: mcontext.GetOpUserID(ctx),
|
|
CreateTime: time.Now(),
|
|
}
|
|
if err := s.blackDatabase.Create(ctx, []*relation.BlackModel{&black}); err != nil {
|
|
return nil, err
|
|
}
|
|
s.notificationSender.BlackAddedNotification(ctx, req)
|
|
return &pbfriend.AddBlackResp{}, nil
|
|
}
|