aethex-forge/api/discord/role-mappings.ts
Builder.io ecd45cc48c Create Discord role-mappings CRUD endpoint
cgen-cbada30223244112b666c9d718557ace
2025-11-08 21:02:47 +00:00

143 lines
3.8 KiB
TypeScript

import type { VercelRequest, VercelResponse } from "@vercel/node";
import { createClient } from "@supabase/supabase-js";
const supabase = createClient(
process.env.SUPABASE_URL || "",
process.env.SUPABASE_SERVICE_ROLE || ""
);
interface RoleMapping {
id: string;
arm: string;
user_type?: string;
discord_role: string;
server_id?: string;
created_at: string;
}
export default async function handler(
req: VercelRequest,
res: VercelResponse
) {
// Set CORS headers
res.setHeader("Access-Control-Allow-Credentials", "true");
res.setHeader("Access-Control-Allow-Origin", "*");
res.setHeader(
"Access-Control-Allow-Methods",
"GET,OPTIONS,PATCH,DELETE,POST,PUT"
);
res.setHeader(
"Access-Control-Allow-Headers",
"X-CSRF-Token, X-Requested-With, Accept, Accept-Version, Content-Length, Content-MD5, Content-Type, Date, X-Api-Version"
);
if (req.method === "OPTIONS") {
res.status(200).end();
return;
}
try {
// GET - Fetch all role mappings
if (req.method === "GET") {
const { data, error } = await supabase
.from("discord_role_mappings")
.select("*")
.order("created_at", { ascending: false });
if (error) {
console.error("Supabase error:", error);
return res
.status(500)
.json({ error: "Failed to fetch role mappings" });
}
return res.status(200).json(data || []);
}
// POST - Create new role mapping
if (req.method === "POST") {
const { arm, discord_role, server_id, user_type } = req.body;
if (!arm || !discord_role) {
return res
.status(400)
.json({ error: "arm and discord_role are required" });
}
const { data, error } = await supabase
.from("discord_role_mappings")
.insert({
arm,
user_type: user_type || "community_member",
discord_role,
server_id: server_id || null,
})
.select()
.single();
if (error) {
console.error("Supabase error:", error);
return res.status(500).json({ error: "Failed to create mapping" });
}
return res.status(201).json(data);
}
// PUT - Update role mapping
if (req.method === "PUT") {
const { id, arm, discord_role, server_id, user_type } = req.body;
if (!id) {
return res.status(400).json({ error: "id is required" });
}
const updateData: any = {};
if (arm) updateData.arm = arm;
if (discord_role) updateData.discord_role = discord_role;
if (server_id !== undefined) updateData.server_id = server_id;
if (user_type) updateData.user_type = user_type;
const { data, error } = await supabase
.from("discord_role_mappings")
.update(updateData)
.eq("id", id)
.select()
.single();
if (error) {
console.error("Supabase error:", error);
return res.status(500).json({ error: "Failed to update mapping" });
}
return res.status(200).json(data);
}
// DELETE - Delete role mapping
if (req.method === "DELETE") {
const { id } = req.query;
if (!id) {
return res.status(400).json({ error: "id query parameter is required" });
}
const { error } = await supabase
.from("discord_role_mappings")
.delete()
.eq("id", id);
if (error) {
console.error("Supabase error:", error);
return res.status(500).json({ error: "Failed to delete mapping" });
}
return res.status(200).json({ success: true });
}
return res.status(405).json({ error: "Method not allowed" });
} catch (error: any) {
console.error("API error:", error);
return res.status(500).json({
error: error?.message || "Internal server error",
});
}
}