···6161 /// User has invalid Uuid format
6262 InvalidUuid(String)
6363 /// Authentication / Authorization failed
6464- AccessError(user.AccessControlError)
6464+ AccessControl(user.AccessControlError)
6565 /// User not found in the DataBase
6666 UserNotFound(uuid.Uuid)
6767}
···7272 err: AdminUpdateUserError,
7373) -> wisp.Response {
7474 case err {
7575- AccessError(err) -> user.handle_access_control_error(req, err)
7575+ AccessControl(err) -> user.handle_access_control_error(req, err)
76767777 InvalidUuid(id) -> wisp.bad_request("Usuário possui Uuid inválido: " <> id)
78787979- UserNotFound(id) ->
8080- wisp.Text("Usuário não encontrado: " <> uuid.to_string(id))
7979+ UserNotFound(id) -> {
8080+ let body = "Usuário não encontrado: " <> uuid.to_string(id)
8181+8282+ body
8383+ |> wisp.Text
8184 |> wisp.set_body(wisp.not_found(), _)
8585+ }
82868387 DataBase(err) -> {
8488 case err {
8585- pog.ConstraintViolated(_, _, constraint: "user_account_email_key") ->
8686- wisp.Text("Email já está sendo utilizado: " <> body.email)
8989+ pog.ConstraintViolated(_, _, constraint: "user_account_email_key") -> {
9090+ let body = "Email já está sendo utilizado: " <> body.email
9191+9292+ body
9393+ |> wisp.Text
8794 |> wisp.set_body(wisp.response(409), _)
9595+ }
88968997 pog.ConstraintViolated(
9098 _,
9199 _,
92100 constraint: "user_account_registration_key",
93101 ) -> {
9494- wisp.Text("Matrícula já está sendo utilizada: " <> body.registration)
102102+ let body = "Matrícula já está sendo utilizada: " <> body.registration
103103+104104+ body
105105+ |> wisp.Text
95106 |> wisp.set_body(wisp.response(409), _)
96107 }
97108···114125 cookie_name: user.uuid_cookie_name,
115126 authorized_roles: [role.Admin, role.Developer],
116127 )
117117- |> result.map_error(AccessError),
128128+ |> result.map_error(AccessControl),
118129 )
119130120131 use user_uuid <- result.try(
+3-3
src/app/domain/brigade/register_new_brigade.gleam
···7070 /// Brigade not found in the Database
7171 BrigadeNotFound
7272 /// Error related to Authentication / Authorization
7373- AccessError(user.AccessControlError)
7373+ AccessControl(user.AccessControlError)
7474}
75757676fn body_decoder() {
···125125 cookie_name: user.uuid_cookie_name,
126126 authorized_roles: [role.Admin, role.Developer],
127127 )
128128- |> result.map_error(AccessError),
128128+ |> result.map_error(AccessControl),
129129 )
130130131131 use returned <- result.try(
···195195 InvalidUuid(user_id) ->
196196 wisp.bad_request("Usuário possui UUID inválido: " <> user_id)
197197 DataBase(err) -> web.handle_database_error(err)
198198- AccessError(err) -> user.handle_access_control_error(request, err)
198198+ AccessControl(err) -> user.handle_access_control_error(request, err)
199199 BrigadeNotFound ->
200200 "O Banco de Dados não retornou informações sobre a nova equipe após a inserção"
201201 |> wisp.Text
+3-3
src/app/domain/user/delete_user.gleam
···3939 /// Target user has invalid Uuid
4040 InvalidUserUuid(String)
4141 /// Errors related to authentication and authorization
4242- AccessError(user.AccessControlError)
4242+ AccessControl(user.AccessControlError)
4343 /// User was not found in the Database
4444 UserNotFound(uuid.Uuid)
4545 /// An user should not be able to delete theirself
···5252 wisp.bad_request("Usuário possui Uuid Inválido: " <> invalid_uuid)
5353 UserNotFound(user_uuid) ->
5454 wisp.bad_request("Usuário não encontrado: " <> uuid.to_string(user_uuid))
5555- AccessError(err) -> user.handle_access_control_error(req, err)
5555+ AccessControl(err) -> user.handle_access_control_error(req, err)
5656 DataBase(err) -> web.handle_database_error(err)
5757 CantDeleteSelf -> wisp.bad_request("Um usuário não deve remover a si mesmo")
5858 }
···7676 cookie_name: user.uuid_cookie_name,
7777 authorized_roles: [role.Admin, role.Developer],
7878 )
7979- |> result.map_error(AccessError),
7979+ |> result.map_error(AccessControl),
8080 )
81818282 // Check if the authenticated user is trying to delete theirself
+3-3
src/app/domain/user/get_all_user_profiles.gleam
···5050/// Gathering the user list can fail
5151type GetAllUsersError {
5252 /// Errors related to user authentication / authorization
5353- AccessError(user.AccessControlError)
5353+ AccessControl(user.AccessControlError)
5454 /// An error occurred while querying the DataBase
5555 DataBase(pog.QueryError)
5656}
57575858fn handle_error(req: wisp.Request, err: GetAllUsersError) -> wisp.Response {
5959 case err {
6060- AccessError(err) -> user.handle_access_control_error(req, err)
6060+ AccessControl(err) -> user.handle_access_control_error(req, err)
6161 DataBase(err) -> web.handle_database_error(err)
6262 }
6363}
···7373 cookie_name: user.uuid_cookie_name,
7474 authorized_roles: [role.Admin, role.Developer],
7575 )
7676- |> result.map_error(AccessError),
7676+ |> result.map_error(AccessControl),
7777 )
78787979 use returned <- result.try(
+3-3
src/app/domain/user/signup.gleam
···6969 cookie_name: user.uuid_cookie_name,
7070 authorized_roles: [role.Admin, role.Developer],
7171 )
7272- |> result.map_error(AccessError),
7272+ |> result.map_error(AccessControl),
7373 )
74747575 use hashed_password <- result.try(
···205205 DataBase(err) -> handle_database_error(err)
206206 InvalidRole(unknown) ->
207207 wisp.bad_request("O novo usuário possui um cargo inválido: " <> unknown)
208208- AccessError(err) -> user.handle_access_control_error(req, err)
208208+ AccessControl(err) -> user.handle_access_control_error(req, err)
209209 MissingSignupConfirmation ->
210210 wisp.internal_server_error()
211211 |> wisp.set_body(wisp.Text(
···223223 /// Unknown user role
224224 InvalidRole(String)
225225 /// User / Role related issues
226226- AccessError(user.AccessControlError)
226226+ AccessControl(user.AccessControlError)
227227 /// Database didnt return information about the new user
228228 MissingSignupConfirmation
229229}
+3-3
src/app/domain/user/update_user_password.gleam
···61616262fn handle_error(err: UpdatePasswordError) -> wisp.Response {
6363 case err {
6464- AccessError(err) -> user.handle_authentication_error(err)
6464+ AccessControl(err) -> user.handle_authentication_error(err)
6565 UserNotFound(id) -> {
6666 let body = "Usuário não encontrado: " <> uuid.to_string(id)
6767···9292) -> Result(Nil, UpdatePasswordError) {
9393 use user_uuid <- result.try(
9494 user.extract_uuid(request:, cookie_name: user.uuid_cookie_name)
9595- |> result.map_error(AccessError),
9595+ |> result.map_error(AccessControl),
9696 )
97979898 // Fetch the password hash from the DataBase
···189189/// Updating an user's password can fail
190190type UpdatePasswordError {
191191 /// Authentication failed
192192- AccessError(user.AuthenticationError)
192192+ AccessControl(user.AuthenticationError)
193193 /// User was not found in the database
194194 UserNotFound(uuid.Uuid)
195195 /// Failed to access the DataBase
+3-3
src/app/domain/user/update_user_profile.gleam
···49495050fn handle_error(err: UpdateProfileError) -> wisp.Response {
5151 case err {
5252- AccessError(err) -> user.handle_authentication_error(err)
5252+ AccessControl(err) -> user.handle_authentication_error(err)
5353 UserNotFound(user_uuid) -> {
5454 let resp = wisp.not_found()
5555 let body =
···9191) -> Result(String, UpdateProfileError) {
9292 use maybe_id <- result.try(
9393 user.extract_uuid(req, user.uuid_cookie_name)
9494- |> result.map_error(AccessError),
9494+ |> result.map_error(AccessControl),
9595 )
96969797 use returned <- result.try(
···122122/// Updating an user profile can fail
123123type UpdateProfileError {
124124 /// Authentication failed
125125- AccessError(user.AuthenticationError)
125125+ AccessControl(user.AuthenticationError)
126126 /// An error occurred when accessing the DataBase
127127 DatabaseError(pog.QueryError)
128128 /// User was not found in the DataBase
+3-3
src/app/domain/user/update_user_status.gleam
···4444/// Updating an user status can fail
4545type UpdateUserStatusError {
4646 /// Error related to authentication / authorization
4747- AccessError(user.AccessControlError)
4747+ AccessControl(user.AccessControlError)
4848 /// User not found in the DataBase
4949 UserNotFound(String)
5050 /// UUID is not valid
···6666 cookie_name: user.uuid_cookie_name,
6767 authorized_roles: [role.Admin, role.Developer],
6868 )
6969- |> result.map_error(AccessError),
6969+ |> result.map_error(AccessControl),
7070 )
71717272 use user_uuid <- result.try(
···93939494fn handle_error(req: wisp.Request, err: UpdateUserStatusError) -> wisp.Response {
9595 case err {
9696- AccessError(err) -> user.handle_access_control_error(req, err)
9696+ AccessControl(err) -> user.handle_access_control_error(req, err)
9797 DataBase(err) -> web.handle_database_error(err)
9898 InvalidUuid(user_id) ->
9999 wisp.response(401)