From 7d2a02c65f8d40b1240c72b34f9f172d07fb02b3 Mon Sep 17 00:00:00 2001 From: pahmiudahgede Date: Fri, 7 Mar 2025 23:20:38 +0700 Subject: [PATCH] refact: public access get roles --- internal/handler/role_handler.go | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/internal/handler/role_handler.go b/internal/handler/role_handler.go index 623b979..2141ed5 100644 --- a/internal/handler/role_handler.go +++ b/internal/handler/role_handler.go @@ -16,10 +16,10 @@ func NewRoleHandler(roleService services.RoleService) *RoleHandler { func (h *RoleHandler) GetRoles(c *fiber.Ctx) error { - roleID, ok := c.Locals("roleID").(string) - if !ok || roleID != utils.RoleAdministrator { - return utils.GenericResponse(c, fiber.StatusForbidden, "Forbidden: You don't have permission to access this resource") - } + // roleID, ok := c.Locals("roleID").(string) + // if !ok || roleID != utils.RoleAdministrator { + // return utils.GenericResponse(c, fiber.StatusForbidden, "Forbidden: You don't have permission to access this resource") + // } roles, err := h.RoleService.GetRoles() if err != nil { @@ -32,10 +32,10 @@ func (h *RoleHandler) GetRoles(c *fiber.Ctx) error { func (h *RoleHandler) GetRoleByID(c *fiber.Ctx) error { roleID := c.Params("role_id") - roleIDFromSession, ok := c.Locals("roleID").(string) - if !ok || roleIDFromSession != utils.RoleAdministrator { - return utils.GenericResponse(c, fiber.StatusForbidden, "Forbidden: You don't have permission to access this resource") - } + // roleIDFromSession, ok := c.Locals("roleID").(string) + // if !ok || roleIDFromSession != utils.RoleAdministrator { + // return utils.GenericResponse(c, fiber.StatusForbidden, "Forbidden: You don't have permission to access this resource") + // } role, err := h.RoleService.GetRoleByID(roleID) if err != nil {