feat(epic1): implement core infrastructure (stories 1.1-1.5)
Implemented Epic 1 core kernel and infrastructure stories: Story 1.1: Enhanced DI Container - Added providers for database, health, metrics, and error bus - Extended CoreModule to include all core services Story 1.2: Database Layer with Ent ORM - Created Ent schema for User, Role, Permission, AuditLog entities - Implemented many-to-many relationships (User-Role, Role-Permission) - Created database client wrapper with connection pooling - Added database provider to DI container with migration support Story 1.3: Health Monitoring and Metrics System - Implemented health check registry and interface - Added database health checker - Created Prometheus metrics system with HTTP instrumentation - Added health and metrics providers to DI container Story 1.4: Error Handling and Error Bus - Implemented channel-based error bus - Created ErrorPublisher interface - Added error bus provider with lifecycle management Story 1.5: HTTP Server Foundation - Created HTTP server with Gin framework - Implemented comprehensive middleware stack: - Request ID generation - Structured logging - Panic recovery with error bus integration - Prometheus metrics collection - CORS support - Registered core routes: /healthz, /ready, /metrics - Integrated with FX lifecycle for graceful shutdown All components are integrated via DI container and ready for use.
This commit is contained in:
114
internal/ent/rolepermission/rolepermission.go
Normal file
114
internal/ent/rolepermission/rolepermission.go
Normal file
@@ -0,0 +1,114 @@
|
||||
// Code generated by ent, DO NOT EDIT.
|
||||
|
||||
package rolepermission
|
||||
|
||||
import (
|
||||
"entgo.io/ent/dialect/sql"
|
||||
"entgo.io/ent/dialect/sql/sqlgraph"
|
||||
)
|
||||
|
||||
const (
|
||||
// Label holds the string label denoting the rolepermission type in the database.
|
||||
Label = "role_permission"
|
||||
// FieldID holds the string denoting the id field in the database.
|
||||
FieldID = "id"
|
||||
// FieldRoleID holds the string denoting the role_id field in the database.
|
||||
FieldRoleID = "role_id"
|
||||
// FieldPermissionID holds the string denoting the permission_id field in the database.
|
||||
FieldPermissionID = "permission_id"
|
||||
// EdgeRole holds the string denoting the role edge name in mutations.
|
||||
EdgeRole = "role"
|
||||
// EdgePermission holds the string denoting the permission edge name in mutations.
|
||||
EdgePermission = "permission"
|
||||
// Table holds the table name of the rolepermission in the database.
|
||||
Table = "role_permissions"
|
||||
// RoleTable is the table that holds the role relation/edge.
|
||||
RoleTable = "role_permissions"
|
||||
// RoleInverseTable is the table name for the Role entity.
|
||||
// It exists in this package in order to avoid circular dependency with the "role" package.
|
||||
RoleInverseTable = "roles"
|
||||
// RoleColumn is the table column denoting the role relation/edge.
|
||||
RoleColumn = "role_id"
|
||||
// PermissionTable is the table that holds the permission relation/edge.
|
||||
PermissionTable = "role_permissions"
|
||||
// PermissionInverseTable is the table name for the Permission entity.
|
||||
// It exists in this package in order to avoid circular dependency with the "permission" package.
|
||||
PermissionInverseTable = "permissions"
|
||||
// PermissionColumn is the table column denoting the permission relation/edge.
|
||||
PermissionColumn = "permission_id"
|
||||
)
|
||||
|
||||
// Columns holds all SQL columns for rolepermission fields.
|
||||
var Columns = []string{
|
||||
FieldID,
|
||||
FieldRoleID,
|
||||
FieldPermissionID,
|
||||
}
|
||||
|
||||
// ForeignKeys holds the SQL foreign-keys that are owned by the "role_permissions"
|
||||
// table and are not defined as standalone fields in the schema.
|
||||
var ForeignKeys = []string{
|
||||
"permission_role_permissions",
|
||||
"role_role_permissions",
|
||||
}
|
||||
|
||||
// ValidColumn reports if the column name is valid (part of the table columns).
|
||||
func ValidColumn(column string) bool {
|
||||
for i := range Columns {
|
||||
if column == Columns[i] {
|
||||
return true
|
||||
}
|
||||
}
|
||||
for i := range ForeignKeys {
|
||||
if column == ForeignKeys[i] {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// OrderOption defines the ordering options for the RolePermission queries.
|
||||
type OrderOption func(*sql.Selector)
|
||||
|
||||
// ByID orders the results by the id field.
|
||||
func ByID(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldID, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByRoleID orders the results by the role_id field.
|
||||
func ByRoleID(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldRoleID, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByPermissionID orders the results by the permission_id field.
|
||||
func ByPermissionID(opts ...sql.OrderTermOption) OrderOption {
|
||||
return sql.OrderByField(FieldPermissionID, opts...).ToFunc()
|
||||
}
|
||||
|
||||
// ByRoleField orders the results by role field.
|
||||
func ByRoleField(field string, opts ...sql.OrderTermOption) OrderOption {
|
||||
return func(s *sql.Selector) {
|
||||
sqlgraph.OrderByNeighborTerms(s, newRoleStep(), sql.OrderByField(field, opts...))
|
||||
}
|
||||
}
|
||||
|
||||
// ByPermissionField orders the results by permission field.
|
||||
func ByPermissionField(field string, opts ...sql.OrderTermOption) OrderOption {
|
||||
return func(s *sql.Selector) {
|
||||
sqlgraph.OrderByNeighborTerms(s, newPermissionStep(), sql.OrderByField(field, opts...))
|
||||
}
|
||||
}
|
||||
func newRoleStep() *sqlgraph.Step {
|
||||
return sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.To(RoleInverseTable, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.M2O, false, RoleTable, RoleColumn),
|
||||
)
|
||||
}
|
||||
func newPermissionStep() *sqlgraph.Step {
|
||||
return sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.To(PermissionInverseTable, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.M2O, false, PermissionTable, PermissionColumn),
|
||||
)
|
||||
}
|
||||
255
internal/ent/rolepermission/where.go
Normal file
255
internal/ent/rolepermission/where.go
Normal file
@@ -0,0 +1,255 @@
|
||||
// Code generated by ent, DO NOT EDIT.
|
||||
|
||||
package rolepermission
|
||||
|
||||
import (
|
||||
"entgo.io/ent/dialect/sql"
|
||||
"entgo.io/ent/dialect/sql/sqlgraph"
|
||||
"git.dcentral.systems/toolz/goplt/internal/ent/predicate"
|
||||
)
|
||||
|
||||
// ID filters vertices based on their ID field.
|
||||
func ID(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDEQ applies the EQ predicate on the ID field.
|
||||
func IDEQ(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDNEQ applies the NEQ predicate on the ID field.
|
||||
func IDNEQ(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNEQ(FieldID, id))
|
||||
}
|
||||
|
||||
// IDIn applies the In predicate on the ID field.
|
||||
func IDIn(ids ...int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldIn(FieldID, ids...))
|
||||
}
|
||||
|
||||
// IDNotIn applies the NotIn predicate on the ID field.
|
||||
func IDNotIn(ids ...int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNotIn(FieldID, ids...))
|
||||
}
|
||||
|
||||
// IDGT applies the GT predicate on the ID field.
|
||||
func IDGT(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGT(FieldID, id))
|
||||
}
|
||||
|
||||
// IDGTE applies the GTE predicate on the ID field.
|
||||
func IDGTE(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGTE(FieldID, id))
|
||||
}
|
||||
|
||||
// IDLT applies the LT predicate on the ID field.
|
||||
func IDLT(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLT(FieldID, id))
|
||||
}
|
||||
|
||||
// IDLTE applies the LTE predicate on the ID field.
|
||||
func IDLTE(id int) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLTE(FieldID, id))
|
||||
}
|
||||
|
||||
// RoleID applies equality check predicate on the "role_id" field. It's identical to RoleIDEQ.
|
||||
func RoleID(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// PermissionID applies equality check predicate on the "permission_id" field. It's identical to PermissionIDEQ.
|
||||
func PermissionID(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// RoleIDEQ applies the EQ predicate on the "role_id" field.
|
||||
func RoleIDEQ(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDNEQ applies the NEQ predicate on the "role_id" field.
|
||||
func RoleIDNEQ(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNEQ(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDIn applies the In predicate on the "role_id" field.
|
||||
func RoleIDIn(vs ...string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldIn(FieldRoleID, vs...))
|
||||
}
|
||||
|
||||
// RoleIDNotIn applies the NotIn predicate on the "role_id" field.
|
||||
func RoleIDNotIn(vs ...string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNotIn(FieldRoleID, vs...))
|
||||
}
|
||||
|
||||
// RoleIDGT applies the GT predicate on the "role_id" field.
|
||||
func RoleIDGT(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGT(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDGTE applies the GTE predicate on the "role_id" field.
|
||||
func RoleIDGTE(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGTE(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDLT applies the LT predicate on the "role_id" field.
|
||||
func RoleIDLT(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLT(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDLTE applies the LTE predicate on the "role_id" field.
|
||||
func RoleIDLTE(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLTE(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDContains applies the Contains predicate on the "role_id" field.
|
||||
func RoleIDContains(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldContains(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDHasPrefix applies the HasPrefix predicate on the "role_id" field.
|
||||
func RoleIDHasPrefix(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldHasPrefix(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDHasSuffix applies the HasSuffix predicate on the "role_id" field.
|
||||
func RoleIDHasSuffix(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldHasSuffix(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDEqualFold applies the EqualFold predicate on the "role_id" field.
|
||||
func RoleIDEqualFold(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEqualFold(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// RoleIDContainsFold applies the ContainsFold predicate on the "role_id" field.
|
||||
func RoleIDContainsFold(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldContainsFold(FieldRoleID, v))
|
||||
}
|
||||
|
||||
// PermissionIDEQ applies the EQ predicate on the "permission_id" field.
|
||||
func PermissionIDEQ(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEQ(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDNEQ applies the NEQ predicate on the "permission_id" field.
|
||||
func PermissionIDNEQ(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNEQ(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDIn applies the In predicate on the "permission_id" field.
|
||||
func PermissionIDIn(vs ...string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldIn(FieldPermissionID, vs...))
|
||||
}
|
||||
|
||||
// PermissionIDNotIn applies the NotIn predicate on the "permission_id" field.
|
||||
func PermissionIDNotIn(vs ...string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldNotIn(FieldPermissionID, vs...))
|
||||
}
|
||||
|
||||
// PermissionIDGT applies the GT predicate on the "permission_id" field.
|
||||
func PermissionIDGT(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGT(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDGTE applies the GTE predicate on the "permission_id" field.
|
||||
func PermissionIDGTE(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldGTE(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDLT applies the LT predicate on the "permission_id" field.
|
||||
func PermissionIDLT(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLT(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDLTE applies the LTE predicate on the "permission_id" field.
|
||||
func PermissionIDLTE(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldLTE(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDContains applies the Contains predicate on the "permission_id" field.
|
||||
func PermissionIDContains(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldContains(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDHasPrefix applies the HasPrefix predicate on the "permission_id" field.
|
||||
func PermissionIDHasPrefix(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldHasPrefix(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDHasSuffix applies the HasSuffix predicate on the "permission_id" field.
|
||||
func PermissionIDHasSuffix(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldHasSuffix(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDEqualFold applies the EqualFold predicate on the "permission_id" field.
|
||||
func PermissionIDEqualFold(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldEqualFold(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// PermissionIDContainsFold applies the ContainsFold predicate on the "permission_id" field.
|
||||
func PermissionIDContainsFold(v string) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.FieldContainsFold(FieldPermissionID, v))
|
||||
}
|
||||
|
||||
// HasRole applies the HasEdge predicate on the "role" edge.
|
||||
func HasRole() predicate.RolePermission {
|
||||
return predicate.RolePermission(func(s *sql.Selector) {
|
||||
step := sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.M2O, false, RoleTable, RoleColumn),
|
||||
)
|
||||
sqlgraph.HasNeighbors(s, step)
|
||||
})
|
||||
}
|
||||
|
||||
// HasRoleWith applies the HasEdge predicate on the "role" edge with a given conditions (other predicates).
|
||||
func HasRoleWith(preds ...predicate.Role) predicate.RolePermission {
|
||||
return predicate.RolePermission(func(s *sql.Selector) {
|
||||
step := newRoleStep()
|
||||
sqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {
|
||||
for _, p := range preds {
|
||||
p(s)
|
||||
}
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
// HasPermission applies the HasEdge predicate on the "permission" edge.
|
||||
func HasPermission() predicate.RolePermission {
|
||||
return predicate.RolePermission(func(s *sql.Selector) {
|
||||
step := sqlgraph.NewStep(
|
||||
sqlgraph.From(Table, FieldID),
|
||||
sqlgraph.Edge(sqlgraph.M2O, false, PermissionTable, PermissionColumn),
|
||||
)
|
||||
sqlgraph.HasNeighbors(s, step)
|
||||
})
|
||||
}
|
||||
|
||||
// HasPermissionWith applies the HasEdge predicate on the "permission" edge with a given conditions (other predicates).
|
||||
func HasPermissionWith(preds ...predicate.Permission) predicate.RolePermission {
|
||||
return predicate.RolePermission(func(s *sql.Selector) {
|
||||
step := newPermissionStep()
|
||||
sqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {
|
||||
for _, p := range preds {
|
||||
p(s)
|
||||
}
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
// And groups predicates with the AND operator between them.
|
||||
func And(predicates ...predicate.RolePermission) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.AndPredicates(predicates...))
|
||||
}
|
||||
|
||||
// Or groups predicates with the OR operator between them.
|
||||
func Or(predicates ...predicate.RolePermission) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.OrPredicates(predicates...))
|
||||
}
|
||||
|
||||
// Not applies the not operator on the given predicate.
|
||||
func Not(p predicate.RolePermission) predicate.RolePermission {
|
||||
return predicate.RolePermission(sql.NotPredicates(p))
|
||||
}
|
||||
Reference in New Issue
Block a user