|
|
package resolvers
// This file will be automatically regenerated based on the schema, any resolver implementations
// will be copied through when generating and any unknown code will be moved to the end.
import ( "context" "errors"
"git.aiterp.net/stufflog/server/graph/graphcore" "git.aiterp.net/stufflog/server/internal/slerrors" "git.aiterp.net/stufflog/server/models" )
func (r *queryResolver) Issue(ctx context.Context, id string) (*models.Issue, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
issue, err := r.Database.Issues().Find(ctx, id) if err != nil { return nil, err } _, err = r.Auth.IssuePermission(ctx, *issue) if err != nil { return nil, err }
return issue, nil }
func (r *queryResolver) Issues(ctx context.Context, filter *models.IssueFilter) ([]*models.Issue, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
if filter == nil { filter = &models.IssueFilter{} } issues, err := r.Database.Issues().List(ctx, *filter) if err != nil { return nil, err }
deleteList := make([]int, 0, len(issues)) for i, issue := range issues { _, err := r.Auth.IssuePermission(ctx, *issue) if err != nil { deleteList = append(deleteList, i-len(deleteList)) } } for _, index := range deleteList { issues = append(issues[:index], issues[index+1:]...) }
return issues, nil }
func (r *queryResolver) Item(ctx context.Context, id string) (*models.Item, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
return r.Database.Items().Find(ctx, id) }
func (r *queryResolver) Items(ctx context.Context, filter *models.ItemFilter) ([]*models.Item, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
if filter == nil { filter = &models.ItemFilter{} }
return r.Database.Items().List(ctx, *filter) }
func (r *queryResolver) ItemTags(ctx context.Context) ([]string, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
return r.Database.Items().GetTags(ctx) }
func (r *queryResolver) Project(ctx context.Context, id string) (*models.Project, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
project, err := r.Database.Projects().Find(ctx, id) if err != nil { return nil, err } _, err = r.Auth.ProjectPermission(ctx, *project) if err != nil { return nil, err }
return project, nil }
func (r *queryResolver) Projects(ctx context.Context, filter *models.ProjectFilter) ([]*models.Project, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, slerrors.PermissionDenied }
skipCheck := false if filter == nil { filter = &models.ProjectFilter{} } if filter.Permission == nil { skipCheck = true filter.Permission = &models.ProjectFilterPermission{ UserID: user.ID, MinLevel: models.ProjectPermissionLevelObserver, } }
projects, err := r.Database.Projects().List(ctx, *filter) if err != nil { return nil, err }
if !skipCheck && len(projects) > 0 { deleteList := make([]int, 0, 4) for i, project := range projects { if _, err := r.Auth.ProjectPermission(ctx, *project); err != nil { deleteList = append(deleteList, i-len(deleteList)) } } for _, di := range deleteList { projects = append(projects[:di], projects[di:]...) } }
return projects, nil }
func (r *queryResolver) Session(ctx context.Context) (*models.User, error) { user := r.Auth.UserFromContext(ctx) if user == nil { return nil, errors.New("not logged in") }
return user, nil }
// Query returns graphcore.QueryResolver implementation.
func (r *Resolver) Query() graphcore.QueryResolver { return &queryResolver{r} }
type queryResolver struct{ *Resolver }
|