Files
CapaKraken/packages/api/src/router/role-procedure-support.ts
T
Hartmut 1a8ea11331 feat(db): add deletedAt audit timestamp to soft-deletable models
Add deletedAt DateTime? to User, Client, Role, Resource, and Blueprint
models for GDPR-compliant deactivation audit trail. Soft-delete mutations
now stamp deletedAt: new Date() on deactivation and clear it on
reactivation. Migration and test assertions updated accordingly.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-09 20:03:38 +02:00

270 lines
6.7 KiB
TypeScript

import { CreateRoleSchema, PermissionKey, UpdateRoleSchema } from "@capakraken/shared";
import { TRPCError } from "@trpc/server";
import { z } from "zod";
import { findUniqueOrThrow } from "../db/helpers.js";
import { RESOURCE_BRIEF_SELECT } from "../db/selects.js";
import { emitRoleCreated, emitRoleDeleted, emitRoleUpdated } from "../sse/event-bus.js";
import type { TRPCContext } from "../trpc.js";
import { requirePermission } from "../trpc.js";
import {
appendZeroAllocationCount,
assertRoleNameAvailable,
attachRolePlanningEntryCounts,
attachSingleRolePlanningEntryCount,
buildRoleCreateData,
buildRoleUpdateData,
buildRoleListWhere,
findRoleByIdentifier,
} from "./role-support.js";
export const RoleListInputSchema = z.object({
isActive: z.boolean().optional(),
search: z.string().optional(),
});
export const RoleIdentifierInputSchema = z.object({
identifier: z.string(),
});
export const ResolveRoleIdentifierInputSchema = z.object({
identifier: z.string().trim().min(1),
});
export const RoleIdInputSchema = z.object({
id: z.string(),
});
export const UpdateRoleProcedureInputSchema = z.object({
id: z.string(),
data: UpdateRoleSchema,
});
type RoleMutationContext = Pick<TRPCContext, "db" | "dbUser"> & {
permissions: Set<PermissionKey>;
};
type RoleReadContext = Pick<TRPCContext, "db">;
export async function listRoles(
ctx: RoleReadContext,
input: z.infer<typeof RoleListInputSchema>,
) {
const roles = await ctx.db.role.findMany({
where: buildRoleListWhere(input),
include: {
_count: {
select: { resourceRoles: true },
},
},
orderBy: { name: "asc" },
});
return attachRolePlanningEntryCounts(ctx.db, roles);
}
export async function resolveRoleByIdentifier(
ctx: RoleReadContext,
input: z.infer<typeof ResolveRoleIdentifierInputSchema>,
) {
const select = {
id: true,
name: true,
color: true,
isActive: true,
} as const;
return findRoleByIdentifier<{
id: string;
name: string;
color: string | null;
isActive: boolean;
}>(ctx.db, input.identifier, select);
}
export async function getRoleByIdentifier(
ctx: RoleReadContext,
input: z.infer<typeof RoleIdentifierInputSchema>,
) {
const select = {
id: true,
name: true,
description: true,
color: true,
isActive: true,
_count: { select: { resourceRoles: true } },
} as const;
const role = await findRoleByIdentifier<{
id: string;
name: string;
description: string | null;
color: string | null;
isActive: boolean;
_count: { resourceRoles: number };
}>(ctx.db, input.identifier, select);
return attachSingleRolePlanningEntryCount(ctx.db, role);
}
export async function getRoleById(
ctx: RoleReadContext,
input: z.infer<typeof RoleIdInputSchema>,
) {
const role = await findUniqueOrThrow(
ctx.db.role.findUnique({
where: { id: input.id },
include: {
_count: { select: { resourceRoles: true } },
resourceRoles: {
include: {
resource: { select: RESOURCE_BRIEF_SELECT },
},
},
},
}),
"Role",
);
return attachSingleRolePlanningEntryCount(ctx.db, role);
}
export async function createRole(
ctx: RoleMutationContext,
input: z.infer<typeof CreateRoleSchema>,
) {
requirePermission(ctx, PermissionKey.MANAGE_ROLES);
await assertRoleNameAvailable(ctx.db, input.name);
const role = await ctx.db.$transaction(async (tx) => {
const created = await tx.role.create({
data: buildRoleCreateData(input),
include: { _count: { select: { resourceRoles: true } } },
});
await tx.auditLog.create({
data: {
entityType: "Role",
entityId: created.id,
action: "CREATE",
changes: { after: created },
},
});
return created;
});
emitRoleCreated({ id: role.id, name: role.name });
return appendZeroAllocationCount(role);
}
export async function updateRole(
ctx: RoleMutationContext,
input: z.infer<typeof UpdateRoleProcedureInputSchema>,
) {
requirePermission(ctx, PermissionKey.MANAGE_ROLES);
const existing = await findUniqueOrThrow(
ctx.db.role.findUnique({ where: { id: input.id } }),
"Role",
);
if (input.data.name && input.data.name !== existing.name) {
await assertRoleNameAvailable(ctx.db, input.data.name, input.id);
}
const updated = await ctx.db.$transaction(async (tx) => {
const result = await tx.role.update({
where: { id: input.id },
data: buildRoleUpdateData(input.data),
include: { _count: { select: { resourceRoles: true } } },
});
await tx.auditLog.create({
data: {
entityType: "Role",
entityId: input.id,
action: "UPDATE",
changes: { before: existing, after: result },
},
});
return result;
});
emitRoleUpdated({ id: updated.id, name: updated.name });
return attachSingleRolePlanningEntryCount(ctx.db, updated);
}
export async function deleteRole(
ctx: RoleMutationContext,
input: z.infer<typeof RoleIdInputSchema>,
) {
requirePermission(ctx, PermissionKey.MANAGE_ROLES);
const role = await findUniqueOrThrow(
ctx.db.role.findUnique({
where: { id: input.id },
include: { _count: { select: { resourceRoles: true } } },
}),
"Role",
);
const roleWithCounts = await attachSingleRolePlanningEntryCount(ctx.db, role);
if (
roleWithCounts._count.resourceRoles > 0 ||
roleWithCounts._count.allocations > 0
) {
throw new TRPCError({
code: "PRECONDITION_FAILED",
message: `Cannot delete role assigned to ${roleWithCounts._count.resourceRoles} resource(s) and ${roleWithCounts._count.allocations} allocation(s). Deactivate it instead.`,
});
}
await ctx.db.$transaction(async (tx) => {
await tx.role.delete({ where: { id: input.id } });
await tx.auditLog.create({
data: {
entityType: "Role",
entityId: input.id,
action: "DELETE",
changes: { before: role },
},
});
});
emitRoleDeleted(input.id);
return { success: true };
}
export async function deactivateRole(
ctx: RoleMutationContext,
input: z.infer<typeof RoleIdInputSchema>,
) {
requirePermission(ctx, PermissionKey.MANAGE_ROLES);
const role = await ctx.db.$transaction(async (tx) => {
const result = await tx.role.update({
where: { id: input.id },
data: { isActive: false, deletedAt: new Date() },
include: { _count: { select: { resourceRoles: true } } },
});
await tx.auditLog.create({
data: {
entityType: "Role",
entityId: input.id,
action: "UPDATE",
changes: { after: { isActive: false } },
},
});
return result;
});
emitRoleUpdated({ id: role.id, isActive: false });
return attachSingleRolePlanningEntryCount(ctx.db, role);
}