20#ifndef ORES_REFDATA_CORE_MESSAGING_PARTY_ID_SCHEME_HANDLER_HPP
21#define ORES_REFDATA_CORE_MESSAGING_PARTY_ID_SCHEME_HANDLER_HPP
24#include "ores.logging/make_logger.hpp"
25#include "ores.nats/domain/message.hpp"
26#include "ores.nats/service/client.hpp"
27#include "ores.database/domain/context.hpp"
28#include "ores.security/jwt/jwt_authenticator.hpp"
29#include "ores.service/messaging/handler_helpers.hpp"
30#include "ores.service/service/request_context.hpp"
31#include "ores.refdata.api/messaging/party_id_scheme_protocol.hpp"
32#include "ores.refdata.core/service/party_id_scheme_service.hpp"
34namespace ores::refdata::messaging {
37inline auto& party_id_scheme_handler_lg() {
38 static auto instance = ores::logging::make_logger(
39 "ores.refdata.messaging.party_id_scheme_handler");
44using ores::service::messaging::reply;
45using ores::service::messaging::decode;
46using ores::service::messaging::error_reply;
47using ores::service::messaging::has_permission;
50class party_id_scheme_handler {
54 std::optional<ores::security::jwt::jwt_authenticator> verifier)
55 : nats_(nats), ctx_(
std::move(ctx)), verifier_(
std::move(verifier)) {}
58 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
60 auto ctx_expected = ores::service::service::make_request_context(
61 ctx_, msg, verifier_);
63 error_reply(nats_, msg, ctx_expected.error());
66 const auto& ctx = *ctx_expected;
67 service::party_id_scheme_service svc(ctx);
68 get_party_id_schemes_response resp;
70 resp.party_id_schemes = svc.list_schemes();
71 resp.total_available_count =
72 static_cast<int>(resp.party_id_schemes.size());
73 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
75 }
catch (
const std::exception& e) {
76 BOOST_LOG_SEV(party_id_scheme_handler_lg(), error)
77 << msg.
subject <<
" failed: " << e.what();
79 reply(nats_, msg, resp);
83 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
85 auto ctx_expected = ores::service::service::make_request_context(
86 ctx_, msg, verifier_);
88 error_reply(nats_, msg, ctx_expected.error());
91 const auto& ctx = *ctx_expected;
92 if (!has_permission(ctx,
"refdata::party_id_schemes:write")) {
96 service::party_id_scheme_service svc(ctx);
97 auto req = decode<save_party_id_scheme_request>(msg);
99 BOOST_LOG_SEV(party_id_scheme_handler_lg(), warn)
100 <<
"Failed to decode: " << msg.
subject;
104 svc.save_scheme(req->data);
105 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
106 <<
"Completed " << msg.
subject;
108 save_party_id_scheme_response{.success =
true});
109 }
catch (
const std::exception& e) {
110 BOOST_LOG_SEV(party_id_scheme_handler_lg(), error)
111 << msg.
subject <<
" failed: " << e.what();
112 reply(nats_, msg, save_party_id_scheme_response{
113 .success =
false, .message = e.what()});
118 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
120 auto ctx_expected = ores::service::service::make_request_context(
121 ctx_, msg, verifier_);
123 error_reply(nats_, msg, ctx_expected.error());
126 const auto& ctx = *ctx_expected;
127 if (!has_permission(ctx,
"refdata::party_id_schemes:delete")) {
131 service::party_id_scheme_service svc(ctx);
132 auto req = decode<delete_party_id_scheme_request>(msg);
134 BOOST_LOG_SEV(party_id_scheme_handler_lg(), warn)
135 <<
"Failed to decode: " << msg.
subject;
139 svc.remove_scheme(req->scheme);
140 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
141 <<
"Completed " << msg.
subject;
143 delete_party_id_scheme_response{.success =
true});
144 }
catch (
const std::exception& e) {
145 BOOST_LOG_SEV(party_id_scheme_handler_lg(), error)
146 << msg.
subject <<
" failed: " << e.what();
147 reply(nats_, msg, delete_party_id_scheme_response{
148 .success =
false, .message = e.what()});
153 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
155 auto ctx_expected = ores::service::service::make_request_context(
156 ctx_, msg, verifier_);
158 error_reply(nats_, msg, ctx_expected.error());
161 const auto& ctx = *ctx_expected;
162 service::party_id_scheme_service svc(ctx);
163 auto req = decode<get_party_id_scheme_history_request>(msg);
165 BOOST_LOG_SEV(party_id_scheme_handler_lg(), warn)
166 <<
"Failed to decode: " << msg.
subject;
170 auto h = svc.get_scheme_history(req->scheme);
171 BOOST_LOG_SEV(party_id_scheme_handler_lg(), debug)
172 <<
"Completed " << msg.
subject;
173 reply(nats_, msg, get_party_id_scheme_history_response{
174 .success =
true, .history = std::move(h)});
175 }
catch (
const std::exception& e) {
176 BOOST_LOG_SEV(party_id_scheme_handler_lg(), error)
177 << msg.
subject <<
" failed: " << e.what();
178 reply(nats_, msg, get_party_id_scheme_history_response{
179 .success =
false, .message = e.what()});
186 std::optional<ores::security::jwt::jwt_authenticator> verifier_;
Implements logging infrastructure for ORE Studio.
Definition boost_severity.hpp:28
@ forbidden
The caller is authenticated but lacks the required permission.
Context for the operations on a postgres database.
Definition context.hpp:47
A received NATS message.
Definition message.hpp:40
std::string subject
The subject the message was published to.
Definition message.hpp:44
NATS client: connection, pub/sub, request/reply, and JetStream.
Definition client.hpp:73