forked from ctreminiom/go-atlassian
/
contentPermission.go
51 lines (41 loc) · 1.5 KB
/
contentPermission.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
package confluence
import (
"context"
"fmt"
model "github.com/ctreminiom/go-atlassian/pkg/infra/models"
"net/http"
)
type ContentPermissionService struct {
client *Client
}
// Check if a user or a group can perform an operation to the specified content.
// The operation to check must be provided.
// The user’s account ID or the ID of the group can be provided in the subject to check permissions
// against a specified user or group.
// The following permission checks are done to make sure that the user or group has the proper access:
// 1. site permissions
// 2. space permissions
// 3. content restrictions
// Docs: https://docs.go-atlassian.io/confluence-cloud/content/permissions#check-content-permissions
func (c *ContentPermissionService) Check(ctx context.Context, contentID string,
payload *model.CheckPermissionScheme) (result *model.PermissionCheckResponseScheme, response *ResponseScheme, err error) {
if len(contentID) == 0 {
return nil, nil, model.ErrNoContentIDError
}
var endpoint = fmt.Sprintf("/rest/api/content/%v/permission/check", contentID)
payloadAsReader, err := transformStructToReader(payload)
if err != nil {
return nil, nil, err
}
request, err := c.client.newRequest(ctx, http.MethodPost, endpoint, payloadAsReader)
if err != nil {
return nil, nil, err
}
request.Header.Set("Accept", "application/json")
request.Header.Set("Content-Type", "application/json")
response, err = c.client.Call(request, &result)
if err != nil {
return nil, response, err
}
return
}