generated from datumforge/go-template
-
Notifications
You must be signed in to change notification settings - Fork 5
/
user.resolvers.go
108 lines (85 loc) · 3.03 KB
/
user.resolvers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
package graphapi
// This file will be automatically regenerated based on the schema, any resolver implementations
// will be copied through when generating and any unknown code will be moved to the end.
// Code generated by github.com/99designs/gqlgen version v0.17.41
import (
"context"
"errors"
"github.com/datumforge/datum/internal/ent/generated"
"github.com/datumforge/datum/internal/ent/generated/privacy"
_ "github.com/datumforge/datum/internal/ent/generated/runtime"
"github.com/datumforge/datum/internal/httpserve/middleware/auth"
)
// CreateUser is the resolver for the createUser field.
func (r *mutationResolver) CreateUser(ctx context.Context, input generated.CreateUserInput) (*UserCreatePayload, error) {
if r.authDisabled {
ctx = privacy.DecisionContext(ctx, privacy.Allow)
}
user, err := withTransactionalMutation(ctx).User.Create().SetInput(input).Save(ctx)
if err != nil {
if generated.IsValidationError(err) {
return nil, err
}
if generated.IsConstraintError(err) {
return nil, err
}
// the password field is encrypted so we cannot use the
// built in validation function/validation error
if errors.Is(err, auth.ErrPasswordTooWeak) {
return nil, err
}
r.logger.Errorw("failed to create user", "error", err)
return nil, ErrInternalServerError
}
return &UserCreatePayload{User: user}, err
}
// UpdateUser is the resolver for the updateUser field.
func (r *mutationResolver) UpdateUser(ctx context.Context, id string, input generated.UpdateUserInput) (*UserUpdatePayload, error) {
// TODO - add permissions checks
user, err := withTransactionalMutation(ctx).User.Get(ctx, id)
if err != nil {
if generated.IsNotFound(err) {
return nil, err
}
r.logger.Errorw("failed to get user", "error", err)
return nil, ErrInternalServerError
}
user, err = user.Update().SetInput(input).Save(ctx)
if err != nil {
if generated.IsValidationError(err) {
return nil, err
}
// the password field is encrypted so we cannot use the
// built in validation function/validation error
if errors.Is(err, auth.ErrPasswordTooWeak) {
return nil, err
}
r.logger.Errorw("failed to update user", "error", err)
return nil, ErrInternalServerError
}
return &UserUpdatePayload{User: user}, nil
}
// DeleteUser is the resolver for the deleteUser field.
func (r *mutationResolver) DeleteUser(ctx context.Context, id string) (*UserDeletePayload, error) {
// TODO - add permissions checks
if err := withTransactionalMutation(ctx).User.DeleteOneID(id).Exec(ctx); err != nil {
if generated.IsNotFound(err) {
return nil, err
}
r.logger.Errorw("failed to delete user", "error", err)
return nil, err
}
return &UserDeletePayload{DeletedID: id}, nil
}
// User is the resolver for the user field.
func (r *queryResolver) User(ctx context.Context, id string) (*generated.User, error) {
user, err := r.client.User.Get(ctx, id)
if err != nil {
if generated.IsNotFound(err) {
return nil, err
}
r.logger.Errorw("failed to get user", "error", err)
return nil, ErrInternalServerError
}
return user, nil
}