1
0

schema.resolvers.go 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794
  1. package graph
  2. // This file will be automatically regenerated based on the schema, any resolver
  3. // implementations
  4. // will be copied through when generating and any unknown code will be moved to the end.
  5. // Code generated by github.com/99designs/gqlgen version v0.17.87
  6. import (
  7. "context"
  8. "errors"
  9. "fmt"
  10. "time"
  11. "gogs.dmsc.dev/arp/auth"
  12. "gogs.dmsc.dev/arp/graph/model"
  13. "gogs.dmsc.dev/arp/logging"
  14. "gogs.dmsc.dev/arp/models"
  15. "gogs.dmsc.dev/arp/workflow"
  16. )
  17. // Login is the resolver for the login field.
  18. func (r *mutationResolver) Login(ctx context.Context, email string, password string) (*model.AuthPayload, error) {
  19. var user models.User
  20. if err := r.DB.Preload("Roles.Permissions").Where("email = ?", email).First(&user).Error; err != nil {
  21. return nil, errors.New("invalid credentials")
  22. }
  23. // Check password
  24. if !auth.CheckPassword(password, user.Password) {
  25. return nil, errors.New("invalid credentials")
  26. }
  27. token, err := auth.GenerateToken(user)
  28. if err != nil {
  29. return nil, fmt.Errorf("failed to generate token: %w", err)
  30. }
  31. return &model.AuthPayload{
  32. Token: token,
  33. User: convertUser(user),
  34. }, nil
  35. }
  36. // CreateUser is the resolver for the createUser field.
  37. func (r *mutationResolver) CreateUser(ctx context.Context, input model.NewUser) (*model.User, error) {
  38. // Auth check
  39. if !auth.IsAuthenticated(ctx) {
  40. return nil, errors.New("unauthorized: authentication required")
  41. }
  42. roles := make([]models.Role, len(input.Roles))
  43. for i, roleIDStr := range input.Roles {
  44. roleID, err := toID(roleIDStr)
  45. if err != nil {
  46. return nil, fmt.Errorf("invalid role ID: %w", err)
  47. }
  48. var role models.Role
  49. if err := r.DB.First(&role, roleID).Error; err != nil {
  50. return nil, fmt.Errorf("role not found: %w", err)
  51. }
  52. roles[i] = role
  53. }
  54. // Hash the password before storing
  55. hashedPassword, err := auth.HashPassword(input.Password)
  56. if err != nil {
  57. return nil, fmt.Errorf("failed to hash password: %w", err)
  58. }
  59. user := models.User{
  60. Email: input.Email,
  61. Password: hashedPassword,
  62. Roles: roles,
  63. }
  64. if err := r.DB.Create(&user).Error; err != nil {
  65. return nil, fmt.Errorf("failed to create user: %w", err)
  66. }
  67. logging.LogMutation(ctx, "CREATE", "USER", user.Email)
  68. return convertUser(user), nil
  69. }
  70. // UpdateUser is the resolver for the updateUser field.
  71. func (r *mutationResolver) UpdateUser(ctx context.Context, id string, input model.UpdateUserInput) (*model.User, error) {
  72. // Auth check
  73. if !auth.IsAuthenticated(ctx) {
  74. return nil, errors.New("unauthorized: authentication required")
  75. }
  76. if !auth.HasPermission(ctx, "user:update") {
  77. return nil, errors.New("unauthorized: missing user:update permission")
  78. }
  79. userID, err := toID(id)
  80. if err != nil {
  81. return nil, fmt.Errorf("invalid user ID: %w", err)
  82. }
  83. var existing models.User
  84. if err := r.DB.First(&existing, userID).Error; err != nil {
  85. return nil, fmt.Errorf("user not found: %w", err)
  86. }
  87. if input.Email != nil {
  88. existing.Email = *input.Email
  89. }
  90. if input.Password != nil {
  91. // Hash the new password
  92. hashedPassword, err := auth.HashPassword(*input.Password)
  93. if err != nil {
  94. return nil, fmt.Errorf("failed to hash password: %w", err)
  95. }
  96. existing.Password = hashedPassword
  97. }
  98. if len(input.Roles) > 0 {
  99. roles := make([]models.Role, len(input.Roles))
  100. for i, roleIDStr := range input.Roles {
  101. roleID, err := toID(roleIDStr)
  102. if err != nil {
  103. return nil, fmt.Errorf("invalid role ID: %w", err)
  104. }
  105. var role models.Role
  106. if err := r.DB.First(&role, roleID).Error; err != nil {
  107. return nil, fmt.Errorf("role not found: %w", err)
  108. }
  109. roles[i] = role
  110. }
  111. existing.Roles = roles
  112. }
  113. if err := r.DB.Save(&existing).Error; err != nil {
  114. return nil, fmt.Errorf("failed to update user: %w", err)
  115. }
  116. logging.LogMutation(ctx, "UPDATE", "USER", existing.Email)
  117. return convertUser(existing), nil
  118. }
  119. // DeleteUser is the resolver for the deleteUser field.
  120. func (r *mutationResolver) DeleteUser(ctx context.Context, id string) (bool, error) {
  121. // Auth check
  122. if !auth.IsAuthenticated(ctx) {
  123. return false, errors.New("unauthorized: authentication required")
  124. }
  125. if !auth.HasPermission(ctx, "user:delete") {
  126. return false, errors.New("unauthorized: missing user:delete permission")
  127. }
  128. userID, err := toID(id)
  129. if err != nil {
  130. return false, fmt.Errorf("invalid user ID: %w", err)
  131. }
  132. result := r.DB.Delete(&models.User{}, userID)
  133. if result.Error != nil {
  134. return false, fmt.Errorf("failed to delete user: %w", result.Error)
  135. }
  136. logging.LogMutation(ctx, "DELETE", "USER", id)
  137. return result.RowsAffected > 0, nil
  138. }
  139. // CreateNote is the resolver for the createNote field.
  140. func (r *mutationResolver) CreateNote(ctx context.Context, input model.NewNote) (*model.Note, error) {
  141. // Auth check
  142. if !auth.IsAuthenticated(ctx) {
  143. return nil, errors.New("unauthorized: authentication required")
  144. }
  145. userID, err := toID(input.UserID)
  146. if err != nil {
  147. return nil, fmt.Errorf("invalid user ID: %w", err)
  148. }
  149. serviceID, err := toID(input.ServiceID)
  150. if err != nil {
  151. return nil, fmt.Errorf("invalid service ID: %w", err)
  152. }
  153. note := models.Note{
  154. Title: input.Title,
  155. Content: input.Content,
  156. UserID: userID,
  157. ServiceID: serviceID,
  158. }
  159. if err := r.DB.Create(&note).Error; err != nil {
  160. return nil, fmt.Errorf("failed to create note: %w", err)
  161. }
  162. logging.LogMutation(ctx, "CREATE", "NOTE", note.Title)
  163. return convertNote(note), nil
  164. }
  165. // UpdateNote is the resolver for the updateNote field.
  166. func (r *mutationResolver) UpdateNote(ctx context.Context, id string, input model.UpdateNoteInput) (*model.Note, error) {
  167. // Auth check
  168. if !auth.IsAuthenticated(ctx) {
  169. return nil, errors.New("unauthorized: authentication required")
  170. }
  171. if !auth.HasPermission(ctx, "note:update") {
  172. return nil, errors.New("unauthorized: missing note:update permission")
  173. }
  174. noteID, err := toID(id)
  175. if err != nil {
  176. return nil, fmt.Errorf("invalid note ID: %w", err)
  177. }
  178. var existing models.Note
  179. if err := r.DB.First(&existing, noteID).Error; err != nil {
  180. return nil, fmt.Errorf("note not found: %w", err)
  181. }
  182. if input.Title != nil {
  183. existing.Title = *input.Title
  184. }
  185. if input.Content != nil {
  186. existing.Content = *input.Content
  187. }
  188. if input.UserID != nil {
  189. userID, err := toID(*input.UserID)
  190. if err != nil {
  191. return nil, fmt.Errorf("invalid user ID: %w", err)
  192. }
  193. existing.UserID = userID
  194. }
  195. if input.ServiceID != nil {
  196. serviceID, err := toID(*input.ServiceID)
  197. if err != nil {
  198. return nil, fmt.Errorf("invalid service ID: %w", err)
  199. }
  200. existing.ServiceID = serviceID
  201. }
  202. if err := r.DB.Save(&existing).Error; err != nil {
  203. return nil, fmt.Errorf("failed to update note: %w", err)
  204. }
  205. logging.LogMutation(ctx, "UPDATE", "NOTE", existing.Title)
  206. return convertNote(existing), nil
  207. }
  208. // DeleteNote is the resolver for the deleteNote field.
  209. func (r *mutationResolver) DeleteNote(ctx context.Context, id string) (bool, error) {
  210. // Auth check
  211. if !auth.IsAuthenticated(ctx) {
  212. return false, errors.New("unauthorized: authentication required")
  213. }
  214. if !auth.HasPermission(ctx, "note:delete") {
  215. return false, errors.New("unauthorized: missing note:delete permission")
  216. }
  217. noteID, err := toID(id)
  218. if err != nil {
  219. return false, fmt.Errorf("invalid note ID: %w", err)
  220. }
  221. result := r.DB.Delete(&models.Note{}, noteID)
  222. if result.Error != nil {
  223. return false, fmt.Errorf("failed to delete note: %w", result.Error)
  224. }
  225. logging.LogMutation(ctx, "DELETE", "NOTE", id)
  226. return result.RowsAffected > 0, nil
  227. }
  228. // CreateRole is the resolver for the createRole field.
  229. func (r *mutationResolver) CreateRole(ctx context.Context, input model.NewRole) (*model.Role, error) {
  230. // Auth check
  231. if !auth.IsAuthenticated(ctx) {
  232. return nil, errors.New("unauthorized: authentication required")
  233. }
  234. permissions := make([]models.Permission, len(input.Permissions))
  235. for i, permIDStr := range input.Permissions {
  236. permID, err := toID(permIDStr)
  237. if err != nil {
  238. return nil, fmt.Errorf("invalid permission ID: %w", err)
  239. }
  240. var perm models.Permission
  241. if err := r.DB.First(&perm, permID).Error; err != nil {
  242. return nil, fmt.Errorf("permission not found: %w", err)
  243. }
  244. permissions[i] = perm
  245. }
  246. role := models.Role{
  247. Name: input.Name,
  248. Description: input.Description,
  249. Permissions: permissions,
  250. }
  251. if err := r.DB.Create(&role).Error; err != nil {
  252. return nil, fmt.Errorf("failed to create role: %w", err)
  253. }
  254. logging.LogMutation(ctx, "CREATE", "ROLE", role.Name)
  255. return convertRole(role), nil
  256. }
  257. // UpdateRole is the resolver for the updateRole field.
  258. func (r *mutationResolver) UpdateRole(ctx context.Context, id string, input model.UpdateRoleInput) (*model.Role, error) {
  259. // Auth check
  260. if !auth.IsAuthenticated(ctx) {
  261. return nil, errors.New("unauthorized: authentication required")
  262. }
  263. if !auth.HasPermission(ctx, "role:update") {
  264. return nil, errors.New("unauthorized: missing role:update permission")
  265. }
  266. roleID, err := toID(id)
  267. if err != nil {
  268. return nil, fmt.Errorf("invalid role ID: %w", err)
  269. }
  270. var existing models.Role
  271. if err := r.DB.First(&existing, roleID).Error; err != nil {
  272. return nil, fmt.Errorf("role not found: %w", err)
  273. }
  274. if input.Name != nil {
  275. existing.Name = *input.Name
  276. }
  277. if input.Description != nil {
  278. existing.Description = *input.Description
  279. }
  280. if len(input.Permissions) > 0 {
  281. permissions := make([]models.Permission, len(input.Permissions))
  282. for i, permIDStr := range input.Permissions {
  283. permID, err := toID(permIDStr)
  284. if err != nil {
  285. return nil, fmt.Errorf("invalid permission ID: %w", err)
  286. }
  287. var perm models.Permission
  288. if err := r.DB.First(&perm, permID).Error; err != nil {
  289. return nil, fmt.Errorf("permission not found: %w", err)
  290. }
  291. permissions[i] = perm
  292. }
  293. existing.Permissions = permissions
  294. }
  295. if err := r.DB.Save(&existing).Error; err != nil {
  296. return nil, fmt.Errorf("failed to update role: %w", err)
  297. }
  298. logging.LogMutation(ctx, "UPDATE", "ROLE", existing.Name)
  299. return convertRole(existing), nil
  300. }
  301. // DeleteRole is the resolver for the deleteRole field.
  302. func (r *mutationResolver) DeleteRole(ctx context.Context, id string) (bool, error) {
  303. // Auth check
  304. if !auth.IsAuthenticated(ctx) {
  305. return false, errors.New("unauthorized: authentication required")
  306. }
  307. if !auth.HasPermission(ctx, "role:delete") {
  308. return false, errors.New("unauthorized: missing role:delete permission")
  309. }
  310. roleID, err := toID(id)
  311. if err != nil {
  312. return false, fmt.Errorf("invalid role ID: %w", err)
  313. }
  314. result := r.DB.Delete(&models.Role{}, roleID)
  315. if result.Error != nil {
  316. return false, fmt.Errorf("failed to delete role: %w", result.Error)
  317. }
  318. logging.LogMutation(ctx, "DELETE", "ROLE", id)
  319. return result.RowsAffected > 0, nil
  320. }
  321. // CreatePermission is the resolver for the createPermission field.
  322. func (r *mutationResolver) CreatePermission(ctx context.Context, input model.NewPermission) (*model.Permission, error) {
  323. // Auth check
  324. if !auth.IsAuthenticated(ctx) {
  325. return nil, errors.New("unauthorized: authentication required")
  326. }
  327. permission := models.Permission{
  328. Code: input.Code,
  329. Description: input.Description,
  330. }
  331. if err := r.DB.Create(&permission).Error; err != nil {
  332. return nil, fmt.Errorf("failed to create permission: %w", err)
  333. }
  334. logging.LogMutation(ctx, "CREATE", "PERMISSION", permission.Code)
  335. return convertPermission(permission), nil
  336. }
  337. // UpdatePermission is the resolver for the updatePermission field.
  338. func (r *mutationResolver) UpdatePermission(ctx context.Context, id string, input model.UpdatePermissionInput) (*model.Permission, error) {
  339. // Auth check
  340. if !auth.IsAuthenticated(ctx) {
  341. return nil, errors.New("unauthorized: authentication required")
  342. }
  343. if !auth.HasPermission(ctx, "permission:update") {
  344. return nil, errors.New("unauthorized: missing permission:update permission")
  345. }
  346. permID, err := toID(id)
  347. if err != nil {
  348. return nil, fmt.Errorf("invalid permission ID: %w", err)
  349. }
  350. var existing models.Permission
  351. if err := r.DB.First(&existing, permID).Error; err != nil {
  352. return nil, fmt.Errorf("permission not found: %w", err)
  353. }
  354. if input.Code != nil {
  355. existing.Code = *input.Code
  356. }
  357. if input.Description != nil {
  358. existing.Description = *input.Description
  359. }
  360. if err := r.DB.Save(&existing).Error; err != nil {
  361. return nil, fmt.Errorf("failed to update permission: %w", err)
  362. }
  363. logging.LogMutation(ctx, "UPDATE", "PERMISSION", existing.Code)
  364. return convertPermission(existing), nil
  365. }
  366. // DeletePermission is the resolver for the deletePermission field.
  367. func (r *mutationResolver) DeletePermission(ctx context.Context, id string) (bool, error) {
  368. // Auth check
  369. if !auth.IsAuthenticated(ctx) {
  370. return false, errors.New("unauthorized: authentication required")
  371. }
  372. if !auth.HasPermission(ctx, "permission:delete") {
  373. return false, errors.New("unauthorized: missing permission:delete permission")
  374. }
  375. permID, err := toID(id)
  376. if err != nil {
  377. return false, fmt.Errorf("invalid permission ID: %w", err)
  378. }
  379. result := r.DB.Delete(&models.Permission{}, permID)
  380. if result.Error != nil {
  381. return false, fmt.Errorf("failed to delete permission: %w", result.Error)
  382. }
  383. logging.LogMutation(ctx, "DELETE", "PERMISSION", id)
  384. return result.RowsAffected > 0, nil
  385. }
  386. // CreateService is the resolver for the createService field.
  387. func (r *mutationResolver) CreateService(ctx context.Context, input model.NewService) (*model.Service, error) {
  388. // Auth check
  389. if !auth.IsAuthenticated(ctx) {
  390. return nil, errors.New("unauthorized: authentication required")
  391. }
  392. createdByID, err := toID(input.CreatedByID)
  393. if err != nil {
  394. return nil, fmt.Errorf("invalid created by ID: %w", err)
  395. }
  396. service := models.Service{
  397. Name: input.Name,
  398. CreatedByID: createdByID,
  399. }
  400. if input.Description != nil {
  401. service.Description = *input.Description
  402. }
  403. // Add participants
  404. for _, participantIDStr := range input.Participants {
  405. participantID, err := toID(participantIDStr)
  406. if err != nil {
  407. return nil, fmt.Errorf("invalid participant ID: %w", err)
  408. }
  409. var user models.User
  410. if err := r.DB.First(&user, participantID).Error; err != nil {
  411. return nil, fmt.Errorf("participant not found: %w", err)
  412. }
  413. service.Participants = append(service.Participants, user)
  414. }
  415. if err := r.DB.Create(&service).Error; err != nil {
  416. return nil, fmt.Errorf("failed to create service: %w", err)
  417. }
  418. // Reload with associations
  419. r.DB.Preload("CreatedBy").Preload("Participants").Preload("Tasks").First(&service, service.ID)
  420. logging.LogMutation(ctx, "CREATE", "SERVICE", service.Name)
  421. return convertService(service), nil
  422. }
  423. // UpdateService is the resolver for the updateService field.
  424. func (r *mutationResolver) UpdateService(ctx context.Context, id string, input model.UpdateServiceInput) (*model.Service, error) {
  425. // Auth check
  426. if !auth.IsAuthenticated(ctx) {
  427. return nil, errors.New("unauthorized: authentication required")
  428. }
  429. if !auth.HasPermission(ctx, "service:update") {
  430. return nil, errors.New("unauthorized: missing service:update permission")
  431. }
  432. serviceID, err := toID(id)
  433. if err != nil {
  434. return nil, fmt.Errorf("invalid service ID: %w", err)
  435. }
  436. var existing models.Service
  437. if err := r.DB.Preload("Participants").First(&existing, serviceID).Error; err != nil {
  438. return nil, fmt.Errorf("service not found: %w", err)
  439. }
  440. if input.Name != nil {
  441. existing.Name = *input.Name
  442. }
  443. if input.Description != nil {
  444. existing.Description = *input.Description
  445. }
  446. if len(input.Participants) > 0 {
  447. participants := []models.User{}
  448. for _, participantIDStr := range input.Participants {
  449. participantID, err := toID(participantIDStr)
  450. if err != nil {
  451. return nil, fmt.Errorf("invalid participant ID: %w", err)
  452. }
  453. var user models.User
  454. if err := r.DB.First(&user, participantID).Error; err != nil {
  455. return nil, fmt.Errorf("participant not found: %w", err)
  456. }
  457. participants = append(participants, user)
  458. }
  459. existing.Participants = participants
  460. }
  461. if err := r.DB.Save(&existing).Error; err != nil {
  462. return nil, fmt.Errorf("failed to update service: %w", err)
  463. }
  464. // Reload with associations for response
  465. r.DB.Preload("CreatedBy").Preload("Participants").Preload("Tasks").First(&existing, existing.ID)
  466. logging.LogMutation(ctx, "UPDATE", "SERVICE", existing.Name)
  467. return convertService(existing), nil
  468. }
  469. // DeleteService is the resolver for the deleteService field.
  470. func (r *mutationResolver) DeleteService(ctx context.Context, id string) (bool, error) {
  471. // Auth check
  472. if !auth.IsAuthenticated(ctx) {
  473. return false, errors.New("unauthorized: authentication required")
  474. }
  475. if !auth.HasPermission(ctx, "service:delete") {
  476. return false, errors.New("unauthorized: missing service:delete permission")
  477. }
  478. serviceID, err := toID(id)
  479. if err != nil {
  480. return false, fmt.Errorf("invalid service ID: %w", err)
  481. }
  482. result := r.DB.Delete(&models.Service{}, serviceID)
  483. if result.Error != nil {
  484. return false, fmt.Errorf("failed to delete service: %w", result.Error)
  485. }
  486. logging.LogMutation(ctx, "DELETE", "SERVICE", id)
  487. return result.RowsAffected > 0, nil
  488. }
  489. // CreateTask is the resolver for the createTask field.
  490. func (r *mutationResolver) CreateTask(ctx context.Context, input model.NewTask) (*model.Task, error) {
  491. // Auth check
  492. if !auth.IsAuthenticated(ctx) {
  493. return nil, errors.New("unauthorized: authentication required")
  494. }
  495. createdByID, err := toID(input.CreatedByID)
  496. if err != nil {
  497. return nil, fmt.Errorf("invalid created by ID: %w", err)
  498. }
  499. task := models.Task{
  500. Title: input.Title,
  501. Content: input.Content,
  502. CreatedByID: createdByID,
  503. Priority: input.Priority,
  504. }
  505. if input.AssigneeID != nil {
  506. assigneeID, err := toID(*input.AssigneeID)
  507. if err != nil {
  508. return nil, fmt.Errorf("invalid assignee ID: %w", err)
  509. }
  510. task.AssigneeID = &assigneeID
  511. }
  512. if input.StatusID != nil {
  513. statusID, err := toID(*input.StatusID)
  514. if err != nil {
  515. return nil, fmt.Errorf("invalid status ID: %w", err)
  516. }
  517. task.StatusID = statusID
  518. }
  519. if input.DueDate != nil {
  520. parsedTime, parseErr := time.Parse(time.RFC3339, *input.DueDate)
  521. if parseErr != nil {
  522. return nil, fmt.Errorf("invalid due date format: %w", parseErr)
  523. }
  524. task.DueDate = &parsedTime
  525. }
  526. if err := r.DB.Create(&task).Error; err != nil {
  527. return nil, fmt.Errorf("failed to create task: %w", err)
  528. }
  529. // Reload with associations
  530. r.DB.Preload("CreatedBy").Preload("Assignee").Preload("Status").First(&task, task.ID)
  531. // Publish task created event to assignee
  532. graphqlTask := convertTask(task)
  533. r.PublishTaskEvent(graphqlTask, task.AssigneeID, "created")
  534. logging.LogMutation(ctx, "CREATE", "TASK", task.Title)
  535. return graphqlTask, nil
  536. }
  537. // UpdateTask is the resolver for the updateTask field.
  538. func (r *mutationResolver) UpdateTask(ctx context.Context, id string, input model.UpdateTaskInput) (*model.Task, error) {
  539. // Auth check
  540. if !auth.IsAuthenticated(ctx) {
  541. return nil, errors.New("unauthorized: authentication required")
  542. }
  543. if !auth.HasPermission(ctx, "task:update") {
  544. return nil, errors.New("unauthorized: missing task:update permission")
  545. }
  546. // Get current user for UpdatedBy
  547. currentUser, err := auth.CurrentUser(ctx)
  548. if err != nil {
  549. return nil, fmt.Errorf("failed to get current user: %w", err)
  550. }
  551. taskID, err := toID(id)
  552. if err != nil {
  553. return nil, fmt.Errorf("invalid task ID: %w", err)
  554. }
  555. var existing models.Task
  556. if err := r.DB.Preload("CreatedBy").Preload("Assignee").Preload("Status").First(&existing, taskID).Error; err != nil {
  557. return nil, fmt.Errorf("task not found: %w", err)
  558. }
  559. if input.Title != nil {
  560. existing.Title = *input.Title
  561. }
  562. if input.Content != nil {
  563. existing.Content = *input.Content
  564. }
  565. if input.AssigneeID != nil {
  566. if *input.AssigneeID == "" {
  567. existing.AssigneeID = nil
  568. } else {
  569. assigneeID, err := toID(*input.AssigneeID)
  570. if err != nil {
  571. return nil, fmt.Errorf("invalid assignee ID: %w", err)
  572. }
  573. existing.AssigneeID = &assigneeID
  574. }
  575. }
  576. if input.StatusID != nil {
  577. if *input.StatusID == "" {
  578. existing.StatusID = 0
  579. } else {
  580. statusID, err := toID(*input.StatusID)
  581. if err != nil {
  582. return nil, fmt.Errorf("invalid status ID: %w", err)
  583. }
  584. existing.StatusID = statusID
  585. }
  586. }
  587. if input.DueDate != nil {
  588. if *input.DueDate == "" {
  589. existing.DueDate = nil
  590. } else {
  591. parsedTime, parseErr := time.Parse(time.RFC3339, *input.DueDate)
  592. if parseErr != nil {
  593. return nil, fmt.Errorf("invalid due date format: %w", parseErr)
  594. }
  595. existing.DueDate = &parsedTime
  596. }
  597. }
  598. if input.Priority != nil {
  599. existing.Priority = *input.Priority
  600. }
  601. // Set UpdatedByID to current user
  602. existing.UpdatedByID = currentUser.ID
  603. if err := r.DB.Save(&existing).Error; err != nil {
  604. return nil, fmt.Errorf("failed to update task: %w", err)
  605. }
  606. // Reload with associations for response
  607. r.DB.Preload("CreatedBy").Preload("UpdatedBy").Preload("Assignee").Preload("Status").First(&existing, existing.ID)
  608. // Publish task updated event to assignee
  609. graphqlTask := convertTask(existing)
  610. r.PublishTaskEvent(graphqlTask, existing.AssigneeID, "updated")
  611. // Workflow integration: Check if task is associated with a workflow node
  612. // Look up the workflow node by task ID
  613. var workflowNode models.WorkflowNode
  614. if err := r.DB.Where("task_id = ?", existing.ID).First(&workflowNode).Error; err == nil && workflowNode.ID > 0 {
  615. // Get the workflow engine
  616. workflowEngine := workflow.NewEngine(r.DB)
  617. // Check if status changed to "done" (status code "done")
  618. if input.StatusID != nil && *input.StatusID != "" {
  619. var newStatus models.TaskStatus
  620. if err := r.DB.First(&newStatus, existing.StatusID).Error; err == nil && newStatus.Code == "done" {
  621. // Mark node as completed
  622. if err := workflowEngine.MarkNodeCompleted(workflowNode.ID); err != nil {
  623. fmt.Printf("ERROR: workflow_node_complete node_id=%d error=%v\n", workflowNode.ID, err)
  624. }
  625. } else if input.StatusID != nil && *input.StatusID != "" {
  626. // Check for cancelled/failed status
  627. if err := r.DB.First(&newStatus, existing.StatusID).Error; err == nil {
  628. if newStatus.Code == "cancelled" || newStatus.Code == "failed" {
  629. // Mark node as failed
  630. if err := workflowEngine.MarkNodeFailed(workflowNode.ID, fmt.Sprintf("task status changed to %s", newStatus.Code)); err != nil {
  631. fmt.Printf("ERROR: workflow_node_fail node_id=%d error=%v\n", workflowNode.ID, err)
  632. }
  633. }
  634. }
  635. }
  636. }
  637. }
  638. logging.LogMutation(ctx, "UPDATE", "TASK", existing.Title)
  639. return graphqlTask, nil
  640. }
  641. // DeleteTask is the resolver for the deleteTask field.
  642. func (r *mutationResolver) DeleteTask(ctx context.Context, id string) (bool, error) {
  643. // Auth check
  644. if !auth.IsAuthenticated(ctx) {
  645. return false, errors.New("unauthorized: authentication required")
  646. }
  647. if !auth.HasPermission(ctx, "task:delete") {
  648. return false, errors.New("unauthorized: missing task:delete permission")
  649. }
  650. taskID, err := toID(id)
  651. if err != nil {
  652. return false, fmt.Errorf("invalid task ID: %w", err)
  653. }
  654. result := r.DB.Delete(&models.Task{}, taskID)
  655. if result.Error != nil {
  656. return false, fmt.Errorf("failed to delete task: %w", result.Error)
  657. }
  658. logging.LogMutation(ctx, "DELETE", "TASK", id)
  659. return result.RowsAffected > 0, nil
  660. }
  661. // CreateTaskStatus is the resolver for the createTaskStatus field.
  662. func (r *mutationResolver) CreateTaskStatus(ctx context.Context, input model.NewTaskStatus) (*model.TaskStatus, error) {
  663. // Auth check
  664. if !auth.IsAuthenticated(ctx) {
  665. return nil, errors.New("unauthorized: authentication required")
  666. }
  667. taskStatus := models.TaskStatus{
  668. Code: input.Code,
  669. Label: input.Label,
  670. }
  671. if err := r.DB.Create(&taskStatus).Error; err != nil {
  672. return nil, fmt.Errorf("failed to create task status: %w", err)
  673. }
  674. logging.LogMutation(ctx, "CREATE", "TASKSTATUS", taskStatus.Code)
  675. return convertTaskStatus(taskStatus), nil
  676. }
  677. // UpdateTaskStatus is the resolver for the updateTaskStatus field.
  678. func (r *mutationResolver) UpdateTaskStatus(ctx context.Context, id string, input model.UpdateTaskStatusInput) (*model.TaskStatus, error) {
  679. // Auth check
  680. if !auth.IsAuthenticated(ctx) {
  681. return nil, errors.New("unauthorized: authentication required")
  682. }
  683. if !auth.HasPermission(ctx, "taskstatus:update") {
  684. return nil, errors.New("unauthorized: missing taskstatus:update permission")
  685. }
  686. statusID, err := toID(id)
  687. if err != nil {
  688. return nil, fmt.Errorf("invalid task status ID: %w", err)
  689. }
  690. var existing models.TaskStatus
  691. if err := r.DB.First(&existing, statusID).Error; err != nil {
  692. return nil, fmt.Errorf("task status not found: %w", err)
  693. }
  694. if input.Code != nil {
  695. existing.Code = *input.Code
  696. }
  697. if input.Label != nil {
  698. existing.Label = *input.Label
  699. }
  700. if err := r.DB.Save(&existing).Error; err != nil {
  701. return nil, fmt.Errorf("failed to update task status: %w", err)
  702. }
  703. // Reload with tasks for response
  704. r.DB.Preload("Tasks").First(&existing, existing.ID)
  705. logging.LogMutation(ctx, "UPDATE", "TASKSTATUS", existing.Code)
  706. return convertTaskStatus(existing), nil
  707. }
  708. // DeleteTaskStatus is the resolver for the deleteTaskStatus field.
  709. func (r *mutationResolver) DeleteTaskStatus(ctx context.Context, id string) (bool, error) {
  710. // Auth check
  711. if !auth.IsAuthenticated(ctx) {
  712. return false, errors.New("unauthorized: authentication required")
  713. }
  714. if !auth.HasPermission(ctx, "taskstatus:delete") {
  715. return false, errors.New("unauthorized: missing taskstatus:delete permission")
  716. }
  717. statusID, err := toID(id)
  718. if err != nil {
  719. return false, fmt.Errorf("invalid task status ID: %w", err)
  720. }
  721. result := r.DB.Delete(&models.TaskStatus{}, statusID)
  722. if result.Error != nil {
  723. return false, fmt.Errorf("failed to delete task status: %w", result.Error)
  724. }
  725. logging.LogMutation(ctx, "DELETE", "TASKSTATUS", id)
  726. return result.RowsAffected > 0, nil
  727. }
  728. // CreateMessage is the resolver for the createMessage field.
  729. func (r *mutationResolver) CreateMessage(ctx context.Context, input model.NewMessage) (*model.Message, error) {
  730. // Auth check
  731. if !auth.IsAuthenticated(ctx) {
  732. return nil, errors.New("unauthorized: authentication required")
  733. }
  734. // Get sender from authenticated user
  735. currentUser, err := auth.CurrentUser(ctx)
  736. if err != nil {
  737. return nil, fmt.Errorf("failed to get current user: %w", err)
  738. }
  739. // Build receivers list
  740. receivers := make([]models.User, 0, len(input.Receivers))
  741. receiverIDs := make([]uint, 0, len(input.Receivers))
  742. for _, receiverIDStr := range input.Receivers {
  743. receiverID, err := toID(receiverIDStr)
  744. if err != nil {
  745. return nil, fmt.Errorf("invalid receiver ID: %w", err)
  746. }
  747. var user models.User
  748. if err := r.DB.First(&user, receiverID).Error; err != nil {
  749. return nil, fmt.Errorf("receiver not found: %w", err)
  750. }
  751. receivers = append(receivers, user)
  752. receiverIDs = append(receiverIDs, receiverID)
  753. }
  754. message := models.Message{
  755. SenderID: currentUser.ID,
  756. Content: input.Content,
  757. Receivers: receivers,
  758. }
  759. if err := r.DB.Create(&message).Error; err != nil {
  760. return nil, fmt.Errorf("failed to create message: %w", err)
  761. }
  762. // Reload with associations
  763. r.DB.Preload("Sender").Preload("Receivers").First(&message, message.ID)
  764. // Publish message event to receivers (excluding the sender to prevent notification loops)
  765. notifyReceiverIDs := make([]uint, 0, len(receiverIDs))
  766. for _, receiverID := range receiverIDs {
  767. if receiverID != currentUser.ID {
  768. notifyReceiverIDs = append(notifyReceiverIDs, receiverID)
  769. }
  770. }
  771. graphqlMessage := convertMessage(message)
  772. r.PublishMessageEvent(graphqlMessage, notifyReceiverIDs)
  773. logging.LogMutation(ctx, "CREATE", "MESSAGE", fmt.Sprintf("id=%d content=%s", message.ID, message.Content))
  774. return graphqlMessage, nil
  775. }
  776. // UpdateMessage is the resolver for the updateMessage field.
  777. func (r *mutationResolver) UpdateMessage(ctx context.Context, id string, input model.UpdateMessageInput) (*model.Message, error) {
  778. // Auth check
  779. if !auth.IsAuthenticated(ctx) {
  780. return nil, errors.New("unauthorized: authentication required")
  781. }
  782. if !auth.HasPermission(ctx, "message:update") {
  783. return nil, errors.New("unauthorized: missing message:update permission")
  784. }
  785. messageID, err := toID(id)
  786. if err != nil {
  787. return nil, fmt.Errorf("invalid message ID: %w", err)
  788. }
  789. var existing models.Message
  790. if err := r.DB.Preload("Sender").Preload("Receivers").First(&existing, messageID).Error; err != nil {
  791. return nil, fmt.Errorf("message not found: %w", err)
  792. }
  793. if input.Content != nil {
  794. existing.Content = *input.Content
  795. }
  796. if len(input.Receivers) > 0 {
  797. receivers := make([]models.User, 0, len(input.Receivers))
  798. for _, receiverIDStr := range input.Receivers {
  799. receiverID, err := toID(receiverIDStr)
  800. if err != nil {
  801. return nil, fmt.Errorf("invalid receiver ID: %w", err)
  802. }
  803. var user models.User
  804. if err := r.DB.First(&user, receiverID).Error; err != nil {
  805. return nil, fmt.Errorf("receiver not found: %w", err)
  806. }
  807. receivers = append(receivers, user)
  808. }
  809. existing.Receivers = receivers
  810. }
  811. if err := r.DB.Save(&existing).Error; err != nil {
  812. return nil, fmt.Errorf("failed to update message: %w", err)
  813. }
  814. // Reload with associations
  815. r.DB.Preload("Sender").Preload("Receivers").First(&existing, existing.ID)
  816. logging.LogMutation(ctx, "UPDATE", "MESSAGE", id)
  817. return convertMessage(existing), nil
  818. }
  819. // DeleteMessage is the resolver for the deleteMessage field.
  820. func (r *mutationResolver) DeleteMessage(ctx context.Context, id string) (bool, error) {
  821. // Auth check
  822. if !auth.IsAuthenticated(ctx) {
  823. return false, errors.New("unauthorized: authentication required")
  824. }
  825. if !auth.HasPermission(ctx, "message:delete") {
  826. return false, errors.New("unauthorized: missing message:delete permission")
  827. }
  828. messageID, err := toID(id)
  829. if err != nil {
  830. return false, fmt.Errorf("invalid message ID: %w", err)
  831. }
  832. result := r.DB.Delete(&models.Message{}, messageID)
  833. if result.Error != nil {
  834. return false, fmt.Errorf("failed to delete message: %w", result.Error)
  835. }
  836. logging.LogMutation(ctx, "DELETE", "MESSAGE", id)
  837. return result.RowsAffected > 0, nil
  838. }
  839. // CreateWorkflowTemplate is the resolver for the createWorkflowTemplate field.
  840. func (r *mutationResolver) CreateWorkflowTemplate(ctx context.Context, input model.NewWorkflowTemplate) (*model.WorkflowTemplate, error) {
  841. // Auth check
  842. if !auth.IsAuthenticated(ctx) {
  843. return nil, errors.New("unauthorized: authentication required")
  844. }
  845. if !auth.HasPermission(ctx, "workflow:create") {
  846. return nil, errors.New("unauthorized: missing workflow:create permission")
  847. }
  848. currentUser, err := auth.CurrentUser(ctx)
  849. if err != nil {
  850. return nil, fmt.Errorf("failed to get current user: %w", err)
  851. }
  852. var isActive bool
  853. if input.IsActive != nil {
  854. isActive = *input.IsActive
  855. } else {
  856. isActive = true
  857. }
  858. workflowTemplate := models.WorkflowTemplate{
  859. Name: input.Name,
  860. Description: func() string {
  861. if input.Description != nil {
  862. return *input.Description
  863. }
  864. return ""
  865. }(),
  866. Definition: input.Definition,
  867. IsActive: isActive,
  868. CreatedByID: currentUser.ID,
  869. }
  870. if err := r.DB.Create(&workflowTemplate).Error; err != nil {
  871. return nil, fmt.Errorf("failed to create workflow template: %w", err)
  872. }
  873. // Reload with associations
  874. r.DB.Preload("CreatedBy").First(&workflowTemplate, workflowTemplate.ID)
  875. logging.LogMutation(ctx, "CREATE", "WORKFLOW_TEMPLATE", workflowTemplate.Name)
  876. return convertWorkflowTemplate(workflowTemplate), nil
  877. }
  878. // UpdateWorkflowTemplate is the resolver for the updateWorkflowTemplate field.
  879. func (r *mutationResolver) UpdateWorkflowTemplate(ctx context.Context, id string, input model.UpdateWorkflowTemplateInput) (*model.WorkflowTemplate, error) {
  880. // Auth check
  881. if !auth.IsAuthenticated(ctx) {
  882. return nil, errors.New("unauthorized: authentication required")
  883. }
  884. if !auth.HasPermission(ctx, "workflow:manage") {
  885. return nil, errors.New("unauthorized: missing workflow:manage permission")
  886. }
  887. templateID, err := toID(id)
  888. if err != nil {
  889. return nil, fmt.Errorf("invalid workflow template ID: %w", err)
  890. }
  891. var existing models.WorkflowTemplate
  892. if err := r.DB.First(&existing, templateID).Error; err != nil {
  893. return nil, fmt.Errorf("workflow template not found: %w", err)
  894. }
  895. if input.Name != nil {
  896. existing.Name = *input.Name
  897. }
  898. if input.Description != nil {
  899. existing.Description = *input.Description
  900. }
  901. if input.Definition != nil {
  902. existing.Definition = *input.Definition
  903. }
  904. if input.IsActive != nil {
  905. existing.IsActive = *input.IsActive
  906. }
  907. if err := r.DB.Save(&existing).Error; err != nil {
  908. return nil, fmt.Errorf("failed to update workflow template: %w", err)
  909. }
  910. // Reload with associations for response
  911. r.DB.Preload("CreatedBy").First(&existing, existing.ID)
  912. logging.LogMutation(ctx, "UPDATE", "WORKFLOW_TEMPLATE", existing.Name)
  913. return convertWorkflowTemplate(existing), nil
  914. }
  915. // DeleteWorkflowTemplate is the resolver for the deleteWorkflowTemplate field.
  916. func (r *mutationResolver) DeleteWorkflowTemplate(ctx context.Context, id string) (bool, error) {
  917. // Auth check
  918. if !auth.IsAuthenticated(ctx) {
  919. return false, errors.New("unauthorized: authentication required")
  920. }
  921. if !auth.HasPermission(ctx, "workflow:manage") {
  922. return false, errors.New("unauthorized: missing workflow:manage permission")
  923. }
  924. templateID, err := toID(id)
  925. if err != nil {
  926. return false, fmt.Errorf("invalid workflow template ID: %w", err)
  927. }
  928. result := r.DB.Delete(&models.WorkflowTemplate{}, templateID)
  929. if result.Error != nil {
  930. return false, fmt.Errorf("failed to delete workflow template: %w", result.Error)
  931. }
  932. logging.LogMutation(ctx, "DELETE", "WORKFLOW_TEMPLATE", id)
  933. return result.RowsAffected > 0, nil
  934. }
  935. // StartWorkflow is the resolver for the startWorkflow field.
  936. func (r *mutationResolver) StartWorkflow(ctx context.Context, templateID string, input model.StartWorkflowInput) (*model.WorkflowInstance, error) {
  937. // Auth check
  938. if !auth.IsAuthenticated(ctx) {
  939. return nil, errors.New("unauthorized: authentication required")
  940. }
  941. if !auth.HasPermission(ctx, "workflow:start") {
  942. return nil, errors.New("unauthorized: missing workflow:start permission")
  943. }
  944. templateIDUint, err := toID(templateID)
  945. if err != nil {
  946. return nil, fmt.Errorf("invalid workflow template ID: %w", err)
  947. }
  948. var template models.WorkflowTemplate
  949. if err := r.DB.First(&template, templateIDUint).Error; err != nil {
  950. return nil, fmt.Errorf("workflow template not found: %w", err)
  951. }
  952. // Parse the workflow definition (JSON DAG)
  953. workflowEngine := workflow.NewEngine(r.DB)
  954. instance, nodes, err := workflowEngine.CreateInstance(template, workflow.StartWorkflowInput{
  955. ServiceID: func() *uint {
  956. if input.ServiceID != nil {
  957. id, _ := toID(*input.ServiceID)
  958. return &id
  959. }
  960. return nil
  961. }(),
  962. Context: func() string {
  963. if input.Context != nil {
  964. return *input.Context
  965. }
  966. return ""
  967. }(),
  968. })
  969. if err != nil {
  970. return nil, fmt.Errorf("failed to create workflow instance: %w", err)
  971. }
  972. // Save the workflow instance
  973. if err := r.DB.Create(&instance).Error; err != nil {
  974. return nil, fmt.Errorf("failed to save workflow instance: %w", err)
  975. }
  976. // Save the workflow nodes
  977. for i := range nodes {
  978. nodes[i].WorkflowInstanceID = instance.ID
  979. if err := r.DB.Create(&nodes[i]).Error; err != nil {
  980. return nil, fmt.Errorf("failed to save workflow node: %w", err)
  981. }
  982. }
  983. // Reload with associations
  984. r.DB.Preload("WorkflowTemplate").Preload("Service").First(&instance, instance.ID)
  985. logging.LogMutation(ctx, "START_WORKFLOW", "WORKFLOW_INSTANCE", fmt.Sprintf("template=%s", template.Name))
  986. return convertWorkflowInstance(instance), nil
  987. }
  988. // CancelWorkflow is the resolver for the cancelWorkflow field.
  989. func (r *mutationResolver) CancelWorkflow(ctx context.Context, id string) (*model.WorkflowInstance, error) {
  990. // Auth check
  991. if !auth.IsAuthenticated(ctx) {
  992. return nil, errors.New("unauthorized: authentication required")
  993. }
  994. if !auth.HasPermission(ctx, "workflow:manage") {
  995. return nil, errors.New("unauthorized: missing workflow:manage permission")
  996. }
  997. instanceID, err := toID(id)
  998. if err != nil {
  999. return nil, fmt.Errorf("invalid workflow instance ID: %w", err)
  1000. }
  1001. var instance models.WorkflowInstance
  1002. if err := r.DB.First(&instance, instanceID).Error; err != nil {
  1003. return nil, fmt.Errorf("workflow instance not found: %w", err)
  1004. }
  1005. instance.Status = "failed"
  1006. now := time.Now()
  1007. instance.CompletedAt = &now
  1008. if err := r.DB.Save(&instance).Error; err != nil {
  1009. return nil, fmt.Errorf("failed to cancel workflow: %w", err)
  1010. }
  1011. // Update all running nodes to failed
  1012. r.DB.Model(&models.WorkflowNode{}).
  1013. Where("workflow_instance_id = ? AND status = ?", instanceID, "running").
  1014. Update("status", "failed")
  1015. // Reload with associations for response
  1016. r.DB.Preload("WorkflowTemplate").Preload("Service").First(&instance, instance.ID)
  1017. logging.LogMutation(ctx, "CANCEL_WORKFLOW", "WORKFLOW_INSTANCE", id)
  1018. return convertWorkflowInstance(instance), nil
  1019. }
  1020. // RetryWorkflowNode is the resolver for the retryWorkflowNode field.
  1021. func (r *mutationResolver) RetryWorkflowNode(ctx context.Context, nodeID string) (*model.WorkflowNode, error) {
  1022. // Auth check
  1023. if !auth.IsAuthenticated(ctx) {
  1024. return nil, errors.New("unauthorized: authentication required")
  1025. }
  1026. if !auth.HasPermission(ctx, "workflow:intervene") {
  1027. return nil, errors.New("unauthorized: missing workflow:intervene permission")
  1028. }
  1029. nodeIDUint, err := toID(nodeID)
  1030. if err != nil {
  1031. return nil, fmt.Errorf("invalid workflow node ID: %w", err)
  1032. }
  1033. var node models.WorkflowNode
  1034. if err := r.DB.Preload("WorkflowInstance").First(&node, nodeIDUint).Error; err != nil {
  1035. return nil, fmt.Errorf("workflow node not found: %w", err)
  1036. }
  1037. // Reset node status to pending and clear task association
  1038. node.Status = "pending"
  1039. node.TaskID = nil
  1040. node.RetryCount++
  1041. node.OutputData = ""
  1042. if err := r.DB.Save(&node).Error; err != nil {
  1043. return nil, fmt.Errorf("failed to retry workflow node: %w", err)
  1044. }
  1045. // Reload with task for response
  1046. r.DB.Preload("Task").First(&node, node.ID)
  1047. logging.LogMutation(ctx, "RETRY_NODE", "WORKFLOW_NODE", nodeID)
  1048. return convertWorkflowNode(node), nil
  1049. }
  1050. // Users is the resolver for the users field.
  1051. func (r *queryResolver) Users(ctx context.Context) ([]*model.User, error) {
  1052. // Auth check
  1053. if !auth.IsAuthenticated(ctx) {
  1054. return nil, errors.New("unauthorized: authentication required")
  1055. }
  1056. var users []models.User
  1057. if err := r.DB.Preload("Roles").Find(&users).Error; err != nil {
  1058. return nil, fmt.Errorf("failed to fetch users: %w", err)
  1059. }
  1060. logging.LogQuery(ctx, "USERS", "all")
  1061. return convertUsers(users), nil
  1062. }
  1063. // User is the resolver for the user field.
  1064. func (r *queryResolver) User(ctx context.Context, id string) (*model.User, error) {
  1065. // Auth check
  1066. if !auth.IsAuthenticated(ctx) {
  1067. return nil, errors.New("unauthorized: authentication required")
  1068. }
  1069. userID, err := toID(id)
  1070. if err != nil {
  1071. return nil, fmt.Errorf("invalid user ID: %w", err)
  1072. }
  1073. var user models.User
  1074. if err := r.DB.Preload("Roles.Permissions").First(&user, userID).Error; err != nil {
  1075. return nil, fmt.Errorf("user not found: %w", err)
  1076. }
  1077. logging.LogQuery(ctx, "USER", id)
  1078. return convertUser(user), nil
  1079. }
  1080. // Notes is the resolver for the notes field.
  1081. func (r *queryResolver) Notes(ctx context.Context) ([]*model.Note, error) {
  1082. // Auth check
  1083. if !auth.IsAuthenticated(ctx) {
  1084. return nil, errors.New("unauthorized: authentication required")
  1085. }
  1086. var notes []models.Note
  1087. if err := r.DB.Preload("User").Preload("Service").Find(&notes).Error; err != nil {
  1088. return nil, fmt.Errorf("failed to fetch notes: %w", err)
  1089. }
  1090. logging.LogQuery(ctx, "NOTES", "all")
  1091. return convertNotes(notes), nil
  1092. }
  1093. // Note is the resolver for the note field.
  1094. func (r *queryResolver) Note(ctx context.Context, id string) (*model.Note, error) {
  1095. // Auth check
  1096. if !auth.IsAuthenticated(ctx) {
  1097. return nil, errors.New("unauthorized: authentication required")
  1098. }
  1099. noteID, err := toID(id)
  1100. if err != nil {
  1101. return nil, fmt.Errorf("invalid note ID: %w", err)
  1102. }
  1103. var note models.Note
  1104. if err := r.DB.Preload("User").Preload("Service").First(&note, noteID).Error; err != nil {
  1105. return nil, fmt.Errorf("note not found: %w", err)
  1106. }
  1107. logging.LogQuery(ctx, "NOTE", id)
  1108. return convertNote(note), nil
  1109. }
  1110. // Roles is the resolver for the roles field.
  1111. func (r *queryResolver) Roles(ctx context.Context) ([]*model.Role, error) {
  1112. // Auth check
  1113. if !auth.IsAuthenticated(ctx) {
  1114. return nil, errors.New("unauthorized: authentication required")
  1115. }
  1116. var roles []models.Role
  1117. if err := r.DB.Preload("Permissions").Find(&roles).Error; err != nil {
  1118. return nil, fmt.Errorf("failed to fetch roles: %w", err)
  1119. }
  1120. logging.LogQuery(ctx, "ROLES", "all")
  1121. return convertRoles(roles), nil
  1122. }
  1123. // Role is the resolver for the role field.
  1124. func (r *queryResolver) Role(ctx context.Context, id string) (*model.Role, error) {
  1125. // Auth check
  1126. if !auth.IsAuthenticated(ctx) {
  1127. return nil, errors.New("unauthorized: authentication required")
  1128. }
  1129. roleID, err := toID(id)
  1130. if err != nil {
  1131. return nil, fmt.Errorf("invalid role ID: %w", err)
  1132. }
  1133. var role models.Role
  1134. if err := r.DB.Preload("Permissions").First(&role, roleID).Error; err != nil {
  1135. return nil, fmt.Errorf("role not found: %w", err)
  1136. }
  1137. logging.LogQuery(ctx, "ROLE", id)
  1138. return convertRole(role), nil
  1139. }
  1140. // Permissions is the resolver for the permissions field.
  1141. func (r *queryResolver) Permissions(ctx context.Context) ([]*model.Permission, error) {
  1142. // Auth check
  1143. if !auth.IsAuthenticated(ctx) {
  1144. return nil, errors.New("unauthorized: authentication required")
  1145. }
  1146. var perms []models.Permission
  1147. if err := r.DB.Find(&perms).Error; err != nil {
  1148. return nil, fmt.Errorf("failed to fetch permissions: %w", err)
  1149. }
  1150. logging.LogQuery(ctx, "PERMISSIONS", "all")
  1151. return convertPermissions(perms), nil
  1152. }
  1153. // Permission is the resolver for the permission field.
  1154. func (r *queryResolver) Permission(ctx context.Context, id string) (*model.Permission, error) {
  1155. // Auth check
  1156. if !auth.IsAuthenticated(ctx) {
  1157. return nil, errors.New("unauthorized: authentication required")
  1158. }
  1159. permID, err := toID(id)
  1160. if err != nil {
  1161. return nil, fmt.Errorf("invalid permission ID: %w", err)
  1162. }
  1163. var perm models.Permission
  1164. if err := r.DB.First(&perm, permID).Error; err != nil {
  1165. return nil, fmt.Errorf("permission not found: %w", err)
  1166. }
  1167. logging.LogQuery(ctx, "PERMISSION", id)
  1168. return convertPermission(perm), nil
  1169. }
  1170. // Services is the resolver for the services field.
  1171. func (r *queryResolver) Services(ctx context.Context) ([]*model.Service, error) {
  1172. // Auth check
  1173. if !auth.IsAuthenticated(ctx) {
  1174. return nil, errors.New("unauthorized: authentication required")
  1175. }
  1176. var services []models.Service
  1177. if err := r.DB.Preload("CreatedBy").Preload("Participants").Preload("Tasks").Find(&services).Error; err != nil {
  1178. return nil, fmt.Errorf("failed to fetch services: %w", err)
  1179. }
  1180. logging.LogQuery(ctx, "SERVICES", "all")
  1181. return convertServices(services), nil
  1182. }
  1183. // Service is the resolver for the service field.
  1184. func (r *queryResolver) Service(ctx context.Context, id string) (*model.Service, error) {
  1185. // Auth check
  1186. if !auth.IsAuthenticated(ctx) {
  1187. return nil, errors.New("unauthorized: authentication required")
  1188. }
  1189. serviceID, err := toID(id)
  1190. if err != nil {
  1191. return nil, fmt.Errorf("invalid service ID: %w", err)
  1192. }
  1193. var service models.Service
  1194. if err := r.DB.Preload("CreatedBy").Preload("Participants").Preload("Tasks").First(&service, serviceID).Error; err != nil {
  1195. return nil, fmt.Errorf("service not found: %w", err)
  1196. }
  1197. logging.LogQuery(ctx, "SERVICE", id)
  1198. return convertService(service), nil
  1199. }
  1200. // Tasks is the resolver for the tasks field.
  1201. func (r *queryResolver) Tasks(ctx context.Context) ([]*model.Task, error) {
  1202. // Auth check
  1203. if !auth.IsAuthenticated(ctx) {
  1204. return nil, errors.New("unauthorized: authentication required")
  1205. }
  1206. var tasks []models.Task
  1207. if err := r.DB.Preload("CreatedBy").Preload("UpdatedBy").Preload("Assignee").Preload("Status").Find(&tasks).Error; err != nil {
  1208. return nil, fmt.Errorf("failed to fetch tasks: %w", err)
  1209. }
  1210. logging.LogQuery(ctx, "TASKS", "all")
  1211. return convertTasks(tasks), nil
  1212. }
  1213. // Task is the resolver for the task field.
  1214. func (r *queryResolver) Task(ctx context.Context, id string) (*model.Task, error) {
  1215. // Auth check
  1216. if !auth.IsAuthenticated(ctx) {
  1217. return nil, errors.New("unauthorized: authentication required")
  1218. }
  1219. taskID, err := toID(id)
  1220. if err != nil {
  1221. return nil, fmt.Errorf("invalid task ID: %w", err)
  1222. }
  1223. var task models.Task
  1224. if err := r.DB.Preload("CreatedBy").Preload("UpdatedBy").Preload("Assignee").Preload("Status").First(&task, taskID).Error; err != nil {
  1225. return nil, fmt.Errorf("task not found: %w", err)
  1226. }
  1227. logging.LogQuery(ctx, "TASK", id)
  1228. return convertTask(task), nil
  1229. }
  1230. // TaskStatuses is the resolver for the taskStatuses field.
  1231. func (r *queryResolver) TaskStatuses(ctx context.Context) ([]*model.TaskStatus, error) {
  1232. // Auth check
  1233. if !auth.IsAuthenticated(ctx) {
  1234. return nil, errors.New("unauthorized: authentication required")
  1235. }
  1236. var statuses []models.TaskStatus
  1237. if err := r.DB.Preload("Tasks").Find(&statuses).Error; err != nil {
  1238. return nil, fmt.Errorf("failed to fetch task statuses: %w", err)
  1239. }
  1240. logging.LogQuery(ctx, "TASKSTATUSES", "all")
  1241. return convertTaskStatuses(statuses), nil
  1242. }
  1243. // TaskStatus
  1244. func (r *queryResolver) TaskStatus(ctx context.Context, id string) (*model.TaskStatus, error) {
  1245. // Auth check
  1246. if !auth.IsAuthenticated(ctx) {
  1247. return nil, errors.New("unauthorized: authentication required")
  1248. }
  1249. statusID, err := toID(id)
  1250. if err != nil {
  1251. return nil, fmt.Errorf("invalid task status ID: %w", err)
  1252. }
  1253. var status models.TaskStatus
  1254. if err := r.DB.Preload("Tasks").First(&status, statusID).Error; err != nil {
  1255. return nil, fmt.Errorf("task status not found: %w", err)
  1256. }
  1257. logging.LogQuery(ctx, "TASKSTATUS", id)
  1258. return convertTaskStatus(status), nil
  1259. }
  1260. // Messages is the resolver for the messages field.
  1261. func (r *queryResolver) Messages(ctx context.Context) ([]*model.Message, error) {
  1262. // Auth check
  1263. if !auth.IsAuthenticated(ctx) {
  1264. return nil, errors.New("unauthorized: authentication required")
  1265. }
  1266. var messages []models.Message
  1267. if err := r.DB.Preload("Sender").Preload("Receivers").Find(&messages).Error; err != nil {
  1268. return nil, fmt.Errorf("failed to fetch messages: %w", err)
  1269. }
  1270. logging.LogQuery(ctx, "MESSAGES", "all")
  1271. return convertMessages(messages), nil
  1272. }
  1273. // Message is the resolver for the message field.
  1274. func (r *queryResolver) Message(ctx context.Context, id string) (*model.Message, error) {
  1275. // Auth check
  1276. if !auth.IsAuthenticated(ctx) {
  1277. return nil, errors.New("unauthorized: authentication required")
  1278. }
  1279. messageID, err := toID(id)
  1280. if err != nil {
  1281. return nil, fmt.Errorf("invalid message ID: %w", err)
  1282. }
  1283. var message models.Message
  1284. if err := r.DB.Preload("Sender").Preload("Receivers").First(&message, messageID).Error; err != nil {
  1285. return nil, fmt.Errorf("message not found: %w", err)
  1286. }
  1287. logging.LogQuery(ctx, "MESSAGE", id)
  1288. return convertMessage(message), nil
  1289. }
  1290. // WorkflowTemplates is the resolver for the workflowTemplates field.
  1291. func (r *queryResolver) WorkflowTemplates(ctx context.Context) ([]*model.WorkflowTemplate, error) {
  1292. // Auth check
  1293. if !auth.IsAuthenticated(ctx) {
  1294. return nil, errors.New("unauthorized: authentication required")
  1295. }
  1296. if !auth.HasPermission(ctx, "workflow:view") {
  1297. return nil, errors.New("unauthorized: missing workflow:view permission")
  1298. }
  1299. var templates []models.WorkflowTemplate
  1300. if err := r.DB.Preload("CreatedBy").Find(&templates).Error; err != nil {
  1301. return nil, fmt.Errorf("failed to fetch workflow templates: %w", err)
  1302. }
  1303. logging.LogQuery(ctx, "WORKFLOW_TEMPLATES", "all")
  1304. return convertWorkflowTemplates(templates), nil
  1305. }
  1306. // WorkflowTemplate is the resolver for the workflowTemplate field.
  1307. func (r *queryResolver) WorkflowTemplate(ctx context.Context, id string) (*model.WorkflowTemplate, error) {
  1308. // Auth check
  1309. if !auth.IsAuthenticated(ctx) {
  1310. return nil, errors.New("unauthorized: authentication required")
  1311. }
  1312. if !auth.HasPermission(ctx, "workflow:view") {
  1313. return nil, errors.New("unauthorized: missing workflow:view permission")
  1314. }
  1315. templateID, err := toID(id)
  1316. if err != nil {
  1317. return nil, fmt.Errorf("invalid workflow template ID: %w", err)
  1318. }
  1319. var template models.WorkflowTemplate
  1320. if err := r.DB.Preload("CreatedBy").First(&template, templateID).Error; err != nil {
  1321. return nil, fmt.Errorf("workflow template not found: %w", err)
  1322. }
  1323. logging.LogQuery(ctx, "WORKFLOW_TEMPLATE", id)
  1324. return convertWorkflowTemplate(template), nil
  1325. }
  1326. // WorkflowInstances is the resolver for the workflowInstances field.
  1327. func (r *queryResolver) WorkflowInstances(ctx context.Context) ([]*model.WorkflowInstance, error) {
  1328. // Auth check
  1329. if !auth.IsAuthenticated(ctx) {
  1330. return nil, errors.New("unauthorized: authentication required")
  1331. }
  1332. if !auth.HasPermission(ctx, "workflow:view") {
  1333. return nil, errors.New("unauthorized: missing workflow:view permission")
  1334. }
  1335. var instances []models.WorkflowInstance
  1336. if err := r.DB.Preload("WorkflowTemplate").Preload("Service").Find(&instances).Error; err != nil {
  1337. return nil, fmt.Errorf("failed to fetch workflow instances: %w", err)
  1338. }
  1339. logging.LogQuery(ctx, "WORKFLOW_INSTANCES", "all")
  1340. return convertWorkflowInstances(instances), nil
  1341. }
  1342. // WorkflowInstance is the resolver for the workflowInstance field.
  1343. func (r *queryResolver) WorkflowInstance(ctx context.Context, id string) (*model.WorkflowInstance, error) {
  1344. // Auth check
  1345. if !auth.IsAuthenticated(ctx) {
  1346. return nil, errors.New("unauthorized: authentication required")
  1347. }
  1348. if !auth.HasPermission(ctx, "workflow:view") {
  1349. return nil, errors.New("unauthorized: missing workflow:view permission")
  1350. }
  1351. instanceID, err := toID(id)
  1352. if err != nil {
  1353. return nil, fmt.Errorf("invalid workflow instance ID: %w", err)
  1354. }
  1355. var instance models.WorkflowInstance
  1356. if err := r.DB.Preload("WorkflowTemplate").Preload("Service").First(&instance, instanceID).Error; err != nil {
  1357. return nil, fmt.Errorf("workflow instance not found: %w", err)
  1358. }
  1359. logging.LogQuery(ctx, "WORKFLOW_INSTANCE", id)
  1360. return convertWorkflowInstance(instance), nil
  1361. }
  1362. // TaskCreated is the resolver for the taskCreated field.
  1363. // Users only receive events for tasks where they are the assignee.
  1364. func (r *subscriptionResolver) TaskCreated(ctx context.Context) (<-chan *model.Task, error) {
  1365. // Get current user
  1366. user, err := auth.CurrentUser(ctx)
  1367. if err != nil {
  1368. return nil, errors.New("unauthorized: authentication required")
  1369. }
  1370. // Subscribe to task events
  1371. eventChan := r.SubscribeToTasks(user.ID)
  1372. // Create output channel
  1373. outputChan := make(chan *model.Task, 10)
  1374. // Start goroutine to filter and forward events
  1375. go func() {
  1376. defer close(outputChan)
  1377. for {
  1378. select {
  1379. case <-ctx.Done():
  1380. return
  1381. case event, ok := <-eventChan:
  1382. if !ok {
  1383. return
  1384. }
  1385. // Only forward "created" events
  1386. if event.EventType == "created" && event.Task != nil {
  1387. select {
  1388. case outputChan <- event.Task:
  1389. default:
  1390. // Channel full, skip
  1391. }
  1392. }
  1393. }
  1394. }
  1395. }()
  1396. return outputChan, nil
  1397. }
  1398. // TaskUpdated is the resolver for the taskUpdated field.
  1399. // Users only receive events for tasks where they are the assignee.
  1400. func (r *subscriptionResolver) TaskUpdated(ctx context.Context) (<-chan *model.Task, error) {
  1401. // Get current user
  1402. user, err := auth.CurrentUser(ctx)
  1403. if err != nil {
  1404. return nil, errors.New("unauthorized: authentication required")
  1405. }
  1406. // Subscribe to task events
  1407. eventChan := r.SubscribeToTasks(user.ID)
  1408. // Create output channel
  1409. outputChan := make(chan *model.Task, 10)
  1410. // Start goroutine to filter and forward events
  1411. go func() {
  1412. defer close(outputChan)
  1413. for {
  1414. select {
  1415. case <-ctx.Done():
  1416. return
  1417. case event, ok := <-eventChan:
  1418. if !ok {
  1419. return
  1420. }
  1421. // Only forward "updated" events
  1422. if event.EventType == "updated" && event.Task != nil {
  1423. select {
  1424. case outputChan <- event.Task:
  1425. default:
  1426. // Channel full, skip
  1427. }
  1428. }
  1429. }
  1430. }
  1431. }()
  1432. return outputChan, nil
  1433. }
  1434. // TaskDeleted is the resolver for the taskDeleted field.
  1435. // Users only receive events for tasks where they are the assignee.
  1436. func (r *subscriptionResolver) TaskDeleted(ctx context.Context) (<-chan *model.Task, error) {
  1437. // Get current user
  1438. user, err := auth.CurrentUser(ctx)
  1439. if err != nil {
  1440. return nil, errors.New("unauthorized: authentication required")
  1441. }
  1442. // Subscribe to task events
  1443. eventChan := r.SubscribeToTasks(user.ID)
  1444. // Create output channel
  1445. outputChan := make(chan *model.Task, 10)
  1446. // Start goroutine to filter and forward events
  1447. go func() {
  1448. defer close(outputChan)
  1449. for {
  1450. select {
  1451. case <-ctx.Done():
  1452. return
  1453. case event, ok := <-eventChan:
  1454. if !ok {
  1455. return
  1456. }
  1457. // Only forward "deleted" events
  1458. if event.EventType == "deleted" && event.Task != nil {
  1459. select {
  1460. case outputChan <- event.Task:
  1461. default:
  1462. // Channel full, skip
  1463. }
  1464. }
  1465. }
  1466. }
  1467. }()
  1468. return outputChan, nil
  1469. }
  1470. // MessageAdded is the resolver for the messageAdded field.
  1471. // Users only receive events for messages where they are in the receivers list.
  1472. func (r *subscriptionResolver) MessageAdded(ctx context.Context) (<-chan *model.Message, error) {
  1473. // Get current user
  1474. user, err := auth.CurrentUser(ctx)
  1475. if err != nil {
  1476. return nil, errors.New("unauthorized: authentication required")
  1477. }
  1478. // Subscribe to message events
  1479. eventChan := r.SubscribeToMessages(user.ID)
  1480. // Create output channel
  1481. outputChan := make(chan *model.Message, 10)
  1482. // Start goroutine to filter and forward events
  1483. go func() {
  1484. defer close(outputChan)
  1485. for {
  1486. select {
  1487. case <-ctx.Done():
  1488. return
  1489. case event, ok := <-eventChan:
  1490. if !ok {
  1491. return
  1492. }
  1493. // Check if user is in the receiver list
  1494. isReceiver := false
  1495. for _, receiverID := range event.ReceiverIDs {
  1496. if receiverID == user.ID {
  1497. isReceiver = true
  1498. break
  1499. }
  1500. }
  1501. if isReceiver && event.Message != nil {
  1502. select {
  1503. case outputChan <- event.Message:
  1504. default:
  1505. // Channel full, skip
  1506. }
  1507. }
  1508. }
  1509. }
  1510. }()
  1511. return outputChan, nil
  1512. }
  1513. // Mutation returns MutationResolver implementation.
  1514. func (r *Resolver) Mutation() MutationResolver { return &mutationResolver{r} }
  1515. // Query returns QueryResolver implementation.
  1516. func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }
  1517. // Subscription returns SubscriptionResolver implementation.
  1518. func (r *Resolver) Subscription() SubscriptionResolver { return &subscriptionResolver{r} }
  1519. type mutationResolver struct{ *Resolver }
  1520. type queryResolver struct{ *Resolver }
  1521. type subscriptionResolver struct{ *Resolver }