refactor(api): extract system role config support

This commit is contained in:
2026-03-31 14:00:26 +02:00
parent 6aa0625c8c
commit c839b18d4e
3 changed files with 63 additions and 17 deletions
@@ -0,0 +1,34 @@
import { describe, expect, it } from "vitest";
import {
buildSystemRoleConfigUpdateData,
systemRoleConfigUpdateInputSchema,
} from "../router/system-role-config-support.js";
describe("system role config support", () => {
it("validates the update input schema", () => {
expect(systemRoleConfigUpdateInputSchema.parse({
role: "ADMIN",
label: "Administrators",
description: null,
color: "#000000",
defaultPermissions: ["users.read"],
})).toEqual({
role: "ADMIN",
label: "Administrators",
description: null,
color: "#000000",
defaultPermissions: ["users.read"],
});
});
it("builds sparse update payloads", () => {
expect(buildSystemRoleConfigUpdateData({
role: "MANAGER",
description: null,
defaultPermissions: ["projects.write"],
})).toEqual({
description: null,
defaultPermissions: ["projects.write"],
});
});
});
@@ -0,0 +1,23 @@
import type { Prisma } from "@capakraken/db";
import { z } from "zod";
export const systemRoleConfigUpdateInputSchema = z.object({
role: z.string(),
label: z.string().min(1).optional(),
description: z.string().nullable().optional(),
color: z.string().nullable().optional(),
defaultPermissions: z.array(z.string()).optional(),
});
export type SystemRoleConfigUpdateInput = z.infer<typeof systemRoleConfigUpdateInputSchema>;
export function buildSystemRoleConfigUpdateData(
input: SystemRoleConfigUpdateInput,
): Prisma.SystemRoleConfigUpdateInput {
return {
...(input.label !== undefined ? { label: input.label } : {}),
...(input.description !== undefined ? { description: input.description } : {}),
...(input.color !== undefined ? { color: input.color } : {}),
...(input.defaultPermissions !== undefined ? { defaultPermissions: input.defaultPermissions } : {}),
};
}
+6 -17
View File
@@ -1,6 +1,9 @@
import { z } from "zod";
import { adminProcedure, createTRPCRouter, invalidateRoleDefaultsCache } from "../trpc.js";
import { createAuditEntry } from "../lib/audit.js";
import {
buildSystemRoleConfigUpdateData,
systemRoleConfigUpdateInputSchema,
} from "./system-role-config-support.js";
export const systemRoleConfigRouter = createTRPCRouter({
/** List all role configs (sorted by sortOrder) */
@@ -12,29 +15,15 @@ export const systemRoleConfigRouter = createTRPCRouter({
/** Update a role's default permissions, label, description, and color */
update: adminProcedure
.input(
z.object({
role: z.string(),
label: z.string().min(1).optional(),
description: z.string().nullable().optional(),
color: z.string().nullable().optional(),
defaultPermissions: z.array(z.string()).optional(),
}),
)
.input(systemRoleConfigUpdateInputSchema)
.mutation(async ({ ctx, input }) => {
const existing = await ctx.db.systemRoleConfig.findUnique({
where: { role: input.role as never },
});
const data: Record<string, unknown> = {};
if (input.label !== undefined) data.label = input.label;
if (input.description !== undefined) data.description = input.description;
if (input.color !== undefined) data.color = input.color;
if (input.defaultPermissions !== undefined) data.defaultPermissions = input.defaultPermissions;
const result = await ctx.db.systemRoleConfig.update({
where: { role: input.role as never },
data,
data: buildSystemRoleConfigUpdateData(input),
});
// Invalidate cached role defaults so changes take effect immediately