generated from datumforge/go-template
-
Notifications
You must be signed in to change notification settings - Fork 5
/
documentdata.resolvers.go
124 lines (92 loc) · 3.75 KB
/
documentdata.resolvers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
package graphapi
// This file will be automatically regenerated based on the schema, any resolver implementations
// will be copied through when generating and any unknown code will be moved to the end.
// Code generated by github.com/99designs/gqlgen
import (
"context"
"errors"
"github.com/datumforge/datum/internal/ent/generated"
"github.com/datumforge/datum/internal/ent/generated/privacy"
)
// CreateDocumentData is the resolver for the createDocumentData field.
func (r *mutationResolver) CreateDocumentData(ctx context.Context, input generated.CreateDocumentDataInput) (*DocumentDataCreatePayload, error) {
data, err := withTransactionalMutation(ctx).DocumentData.Create().SetInput(input).Save(ctx)
if err != nil {
if generated.IsValidationError(err) {
validationError := err.(*generated.ValidationError)
r.logger.Debugw("validation error", "field", validationError.Name, "error", validationError.Error())
return nil, validationError
}
if generated.IsConstraintError(err) {
constraintError := err.(*generated.ConstraintError)
r.logger.Debugw("constraint error", "error", constraintError.Error())
return nil, constraintError
}
if errors.Is(err, privacy.Deny) {
return nil, newPermissionDeniedError(ActionCreate, "document data")
}
r.logger.Errorw("failed to create document data", "error", err)
return nil, err
}
return &DocumentDataCreatePayload{DocumentData: data}, nil
}
// UpdateDocumentData is the resolver for the updateDocumentData field.
func (r *mutationResolver) UpdateDocumentData(ctx context.Context, id string, input generated.UpdateDocumentDataInput) (*DocumentDataUpdatePayload, error) {
data, err := withTransactionalMutation(ctx).DocumentData.Get(ctx, id)
if err != nil {
if generated.IsNotFound(err) {
return nil, err
}
if errors.Is(err, privacy.Deny) {
r.logger.Errorw("failed to get document data on update", "error", err)
return nil, newPermissionDeniedError(ActionGet, "document data")
}
r.logger.Errorw("failed to get document data", "error", err)
return nil, ErrInternalServerError
}
data, err = data.Update().SetInput(input).Save(ctx)
if err != nil {
if generated.IsValidationError(err) {
return nil, err
}
if errors.Is(err, privacy.Deny) {
r.logger.Errorw("failed to update document data", "error", err)
return nil, newPermissionDeniedError(ActionUpdate, "document data")
}
r.logger.Errorw("failed to update document data", "error", err)
return nil, ErrInternalServerError
}
return &DocumentDataUpdatePayload{DocumentData: data}, nil
}
// DeleteDocumentData is the resolver for the deleteDocumentData field.
func (r *mutationResolver) DeleteDocumentData(ctx context.Context, id string) (*DocumentDataDeletePayload, error) {
if err := withTransactionalMutation(ctx).DocumentData.DeleteOneID(id).Exec(ctx); err != nil {
if generated.IsNotFound(err) {
return nil, err
}
if errors.Is(err, privacy.Deny) {
return nil, newPermissionDeniedError(ActionDelete, "document data")
}
r.logger.Errorw("failed to delete document data", "error", err)
return nil, err
}
if err := generated.DocumentDataEdgeCleanup(ctx, id); err != nil {
return nil, newCascadeDeleteError(err)
}
return &DocumentDataDeletePayload{DeletedID: id}, nil
}
// DocumentData is the resolver for the documentData field.
func (r *queryResolver) DocumentData(ctx context.Context, id string) (*generated.DocumentData, error) {
data, err := withTransactionalMutation(ctx).DocumentData.Get(ctx, id)
if err != nil {
r.logger.Errorw("failed to get document data", "error", err)
if generated.IsNotFound(err) {
return nil, err
}
if errors.Is(err, privacy.Deny) {
return nil, newPermissionDeniedError(ActionGet, "document data")
}
return nil, ErrInternalServerError
}
return data, nil
}