feat(epic1): implement core infrastructure (stories 1.1-1.5)

Implemented Epic 1 core kernel and infrastructure stories:

Story 1.1: Enhanced DI Container
- Added providers for database, health, metrics, and error bus
- Extended CoreModule to include all core services

Story 1.2: Database Layer with Ent ORM
- Created Ent schema for User, Role, Permission, AuditLog entities
- Implemented many-to-many relationships (User-Role, Role-Permission)
- Created database client wrapper with connection pooling
- Added database provider to DI container with migration support

Story 1.3: Health Monitoring and Metrics System
- Implemented health check registry and interface
- Added database health checker
- Created Prometheus metrics system with HTTP instrumentation
- Added health and metrics providers to DI container

Story 1.4: Error Handling and Error Bus
- Implemented channel-based error bus
- Created ErrorPublisher interface
- Added error bus provider with lifecycle management

Story 1.5: HTTP Server Foundation
- Created HTTP server with Gin framework
- Implemented comprehensive middleware stack:
  - Request ID generation
  - Structured logging
  - Panic recovery with error bus integration
  - Prometheus metrics collection
  - CORS support
- Registered core routes: /healthz, /ready, /metrics
- Integrated with FX lifecycle for graceful shutdown

All components are integrated via DI container and ready for use.
This commit is contained in:
2025-11-05 18:11:11 +01:00
parent a38a08ca17
commit 30320304f6
77 changed files with 19409 additions and 30 deletions

View File

@@ -0,0 +1,114 @@
// Code generated by ent, DO NOT EDIT.
package rolepermission
import (
"entgo.io/ent/dialect/sql"
"entgo.io/ent/dialect/sql/sqlgraph"
)
const (
// Label holds the string label denoting the rolepermission type in the database.
Label = "role_permission"
// FieldID holds the string denoting the id field in the database.
FieldID = "id"
// FieldRoleID holds the string denoting the role_id field in the database.
FieldRoleID = "role_id"
// FieldPermissionID holds the string denoting the permission_id field in the database.
FieldPermissionID = "permission_id"
// EdgeRole holds the string denoting the role edge name in mutations.
EdgeRole = "role"
// EdgePermission holds the string denoting the permission edge name in mutations.
EdgePermission = "permission"
// Table holds the table name of the rolepermission in the database.
Table = "role_permissions"
// RoleTable is the table that holds the role relation/edge.
RoleTable = "role_permissions"
// RoleInverseTable is the table name for the Role entity.
// It exists in this package in order to avoid circular dependency with the "role" package.
RoleInverseTable = "roles"
// RoleColumn is the table column denoting the role relation/edge.
RoleColumn = "role_id"
// PermissionTable is the table that holds the permission relation/edge.
PermissionTable = "role_permissions"
// PermissionInverseTable is the table name for the Permission entity.
// It exists in this package in order to avoid circular dependency with the "permission" package.
PermissionInverseTable = "permissions"
// PermissionColumn is the table column denoting the permission relation/edge.
PermissionColumn = "permission_id"
)
// Columns holds all SQL columns for rolepermission fields.
var Columns = []string{
FieldID,
FieldRoleID,
FieldPermissionID,
}
// ForeignKeys holds the SQL foreign-keys that are owned by the "role_permissions"
// table and are not defined as standalone fields in the schema.
var ForeignKeys = []string{
"permission_role_permissions",
"role_role_permissions",
}
// ValidColumn reports if the column name is valid (part of the table columns).
func ValidColumn(column string) bool {
for i := range Columns {
if column == Columns[i] {
return true
}
}
for i := range ForeignKeys {
if column == ForeignKeys[i] {
return true
}
}
return false
}
// OrderOption defines the ordering options for the RolePermission queries.
type OrderOption func(*sql.Selector)
// ByID orders the results by the id field.
func ByID(opts ...sql.OrderTermOption) OrderOption {
return sql.OrderByField(FieldID, opts...).ToFunc()
}
// ByRoleID orders the results by the role_id field.
func ByRoleID(opts ...sql.OrderTermOption) OrderOption {
return sql.OrderByField(FieldRoleID, opts...).ToFunc()
}
// ByPermissionID orders the results by the permission_id field.
func ByPermissionID(opts ...sql.OrderTermOption) OrderOption {
return sql.OrderByField(FieldPermissionID, opts...).ToFunc()
}
// ByRoleField orders the results by role field.
func ByRoleField(field string, opts ...sql.OrderTermOption) OrderOption {
return func(s *sql.Selector) {
sqlgraph.OrderByNeighborTerms(s, newRoleStep(), sql.OrderByField(field, opts...))
}
}
// ByPermissionField orders the results by permission field.
func ByPermissionField(field string, opts ...sql.OrderTermOption) OrderOption {
return func(s *sql.Selector) {
sqlgraph.OrderByNeighborTerms(s, newPermissionStep(), sql.OrderByField(field, opts...))
}
}
func newRoleStep() *sqlgraph.Step {
return sqlgraph.NewStep(
sqlgraph.From(Table, FieldID),
sqlgraph.To(RoleInverseTable, FieldID),
sqlgraph.Edge(sqlgraph.M2O, false, RoleTable, RoleColumn),
)
}
func newPermissionStep() *sqlgraph.Step {
return sqlgraph.NewStep(
sqlgraph.From(Table, FieldID),
sqlgraph.To(PermissionInverseTable, FieldID),
sqlgraph.Edge(sqlgraph.M2O, false, PermissionTable, PermissionColumn),
)
}

View File

@@ -0,0 +1,255 @@
// Code generated by ent, DO NOT EDIT.
package rolepermission
import (
"entgo.io/ent/dialect/sql"
"entgo.io/ent/dialect/sql/sqlgraph"
"git.dcentral.systems/toolz/goplt/internal/ent/predicate"
)
// ID filters vertices based on their ID field.
func ID(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldID, id))
}
// IDEQ applies the EQ predicate on the ID field.
func IDEQ(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldID, id))
}
// IDNEQ applies the NEQ predicate on the ID field.
func IDNEQ(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNEQ(FieldID, id))
}
// IDIn applies the In predicate on the ID field.
func IDIn(ids ...int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldIn(FieldID, ids...))
}
// IDNotIn applies the NotIn predicate on the ID field.
func IDNotIn(ids ...int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNotIn(FieldID, ids...))
}
// IDGT applies the GT predicate on the ID field.
func IDGT(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGT(FieldID, id))
}
// IDGTE applies the GTE predicate on the ID field.
func IDGTE(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGTE(FieldID, id))
}
// IDLT applies the LT predicate on the ID field.
func IDLT(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLT(FieldID, id))
}
// IDLTE applies the LTE predicate on the ID field.
func IDLTE(id int) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLTE(FieldID, id))
}
// RoleID applies equality check predicate on the "role_id" field. It's identical to RoleIDEQ.
func RoleID(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldRoleID, v))
}
// PermissionID applies equality check predicate on the "permission_id" field. It's identical to PermissionIDEQ.
func PermissionID(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldPermissionID, v))
}
// RoleIDEQ applies the EQ predicate on the "role_id" field.
func RoleIDEQ(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldRoleID, v))
}
// RoleIDNEQ applies the NEQ predicate on the "role_id" field.
func RoleIDNEQ(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNEQ(FieldRoleID, v))
}
// RoleIDIn applies the In predicate on the "role_id" field.
func RoleIDIn(vs ...string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldIn(FieldRoleID, vs...))
}
// RoleIDNotIn applies the NotIn predicate on the "role_id" field.
func RoleIDNotIn(vs ...string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNotIn(FieldRoleID, vs...))
}
// RoleIDGT applies the GT predicate on the "role_id" field.
func RoleIDGT(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGT(FieldRoleID, v))
}
// RoleIDGTE applies the GTE predicate on the "role_id" field.
func RoleIDGTE(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGTE(FieldRoleID, v))
}
// RoleIDLT applies the LT predicate on the "role_id" field.
func RoleIDLT(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLT(FieldRoleID, v))
}
// RoleIDLTE applies the LTE predicate on the "role_id" field.
func RoleIDLTE(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLTE(FieldRoleID, v))
}
// RoleIDContains applies the Contains predicate on the "role_id" field.
func RoleIDContains(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldContains(FieldRoleID, v))
}
// RoleIDHasPrefix applies the HasPrefix predicate on the "role_id" field.
func RoleIDHasPrefix(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldHasPrefix(FieldRoleID, v))
}
// RoleIDHasSuffix applies the HasSuffix predicate on the "role_id" field.
func RoleIDHasSuffix(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldHasSuffix(FieldRoleID, v))
}
// RoleIDEqualFold applies the EqualFold predicate on the "role_id" field.
func RoleIDEqualFold(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEqualFold(FieldRoleID, v))
}
// RoleIDContainsFold applies the ContainsFold predicate on the "role_id" field.
func RoleIDContainsFold(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldContainsFold(FieldRoleID, v))
}
// PermissionIDEQ applies the EQ predicate on the "permission_id" field.
func PermissionIDEQ(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEQ(FieldPermissionID, v))
}
// PermissionIDNEQ applies the NEQ predicate on the "permission_id" field.
func PermissionIDNEQ(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNEQ(FieldPermissionID, v))
}
// PermissionIDIn applies the In predicate on the "permission_id" field.
func PermissionIDIn(vs ...string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldIn(FieldPermissionID, vs...))
}
// PermissionIDNotIn applies the NotIn predicate on the "permission_id" field.
func PermissionIDNotIn(vs ...string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldNotIn(FieldPermissionID, vs...))
}
// PermissionIDGT applies the GT predicate on the "permission_id" field.
func PermissionIDGT(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGT(FieldPermissionID, v))
}
// PermissionIDGTE applies the GTE predicate on the "permission_id" field.
func PermissionIDGTE(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldGTE(FieldPermissionID, v))
}
// PermissionIDLT applies the LT predicate on the "permission_id" field.
func PermissionIDLT(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLT(FieldPermissionID, v))
}
// PermissionIDLTE applies the LTE predicate on the "permission_id" field.
func PermissionIDLTE(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldLTE(FieldPermissionID, v))
}
// PermissionIDContains applies the Contains predicate on the "permission_id" field.
func PermissionIDContains(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldContains(FieldPermissionID, v))
}
// PermissionIDHasPrefix applies the HasPrefix predicate on the "permission_id" field.
func PermissionIDHasPrefix(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldHasPrefix(FieldPermissionID, v))
}
// PermissionIDHasSuffix applies the HasSuffix predicate on the "permission_id" field.
func PermissionIDHasSuffix(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldHasSuffix(FieldPermissionID, v))
}
// PermissionIDEqualFold applies the EqualFold predicate on the "permission_id" field.
func PermissionIDEqualFold(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldEqualFold(FieldPermissionID, v))
}
// PermissionIDContainsFold applies the ContainsFold predicate on the "permission_id" field.
func PermissionIDContainsFold(v string) predicate.RolePermission {
return predicate.RolePermission(sql.FieldContainsFold(FieldPermissionID, v))
}
// HasRole applies the HasEdge predicate on the "role" edge.
func HasRole() predicate.RolePermission {
return predicate.RolePermission(func(s *sql.Selector) {
step := sqlgraph.NewStep(
sqlgraph.From(Table, FieldID),
sqlgraph.Edge(sqlgraph.M2O, false, RoleTable, RoleColumn),
)
sqlgraph.HasNeighbors(s, step)
})
}
// HasRoleWith applies the HasEdge predicate on the "role" edge with a given conditions (other predicates).
func HasRoleWith(preds ...predicate.Role) predicate.RolePermission {
return predicate.RolePermission(func(s *sql.Selector) {
step := newRoleStep()
sqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {
for _, p := range preds {
p(s)
}
})
})
}
// HasPermission applies the HasEdge predicate on the "permission" edge.
func HasPermission() predicate.RolePermission {
return predicate.RolePermission(func(s *sql.Selector) {
step := sqlgraph.NewStep(
sqlgraph.From(Table, FieldID),
sqlgraph.Edge(sqlgraph.M2O, false, PermissionTable, PermissionColumn),
)
sqlgraph.HasNeighbors(s, step)
})
}
// HasPermissionWith applies the HasEdge predicate on the "permission" edge with a given conditions (other predicates).
func HasPermissionWith(preds ...predicate.Permission) predicate.RolePermission {
return predicate.RolePermission(func(s *sql.Selector) {
step := newPermissionStep()
sqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {
for _, p := range preds {
p(s)
}
})
})
}
// And groups predicates with the AND operator between them.
func And(predicates ...predicate.RolePermission) predicate.RolePermission {
return predicate.RolePermission(sql.AndPredicates(predicates...))
}
// Or groups predicates with the OR operator between them.
func Or(predicates ...predicate.RolePermission) predicate.RolePermission {
return predicate.RolePermission(sql.OrPredicates(predicates...))
}
// Not applies the not operator on the given predicate.
func Not(p predicate.RolePermission) predicate.RolePermission {
return predicate.RolePermission(sql.NotPredicates(p))
}