- Implement Audit Service (2.5) - gRPC server with Record and Query operations - Database persistence with audit schema - Service registry integration - Entry point: cmd/audit-service - Implement Identity Service (2.2) - User CRUD operations - Password hashing with argon2id - Email verification and password reset flows - Entry point: cmd/identity-service - Fix package naming conflicts in user_service.go - Implement Auth Service (2.1) - JWT token generation and validation - Login, RefreshToken, ValidateToken, Logout RPCs - Integration with Identity Service - Entry point: cmd/auth-service - Note: RefreshToken entity needs Ent generation - Implement Authz Service (2.3, 2.4) - Permission checking and authorization - User roles and permissions retrieval - RBAC-based authorization - Entry point: cmd/authz-service - Implement gRPC clients for all services - Auth, Identity, Authz, and Audit clients - Service discovery integration - Full gRPC communication - Add service configurations to config/default.yaml - Create SUMMARY.md with implementation details and testing instructions - Fix compilation errors in Identity Service (password package conflicts) - All services build successfully and tests pass
62 lines
1.7 KiB
Go
62 lines
1.7 KiB
Go
// Code generated by ent, DO NOT EDIT.
|
|
|
|
package migrate
|
|
|
|
import (
|
|
"entgo.io/ent/dialect/sql/schema"
|
|
"entgo.io/ent/schema/field"
|
|
)
|
|
|
|
var (
|
|
// AuditLogsColumns holds the columns for the "audit_logs" table.
|
|
AuditLogsColumns = []*schema.Column{
|
|
{Name: "id", Type: field.TypeInt, Increment: true},
|
|
}
|
|
// AuditLogsTable holds the schema information for the "audit_logs" table.
|
|
AuditLogsTable = &schema.Table{
|
|
Name: "audit_logs",
|
|
Columns: AuditLogsColumns,
|
|
PrimaryKey: []*schema.Column{AuditLogsColumns[0]},
|
|
}
|
|
// PermissionsColumns holds the columns for the "permissions" table.
|
|
PermissionsColumns = []*schema.Column{
|
|
{Name: "id", Type: field.TypeInt, Increment: true},
|
|
}
|
|
// PermissionsTable holds the schema information for the "permissions" table.
|
|
PermissionsTable = &schema.Table{
|
|
Name: "permissions",
|
|
Columns: PermissionsColumns,
|
|
PrimaryKey: []*schema.Column{PermissionsColumns[0]},
|
|
}
|
|
// RolesColumns holds the columns for the "roles" table.
|
|
RolesColumns = []*schema.Column{
|
|
{Name: "id", Type: field.TypeInt, Increment: true},
|
|
}
|
|
// RolesTable holds the schema information for the "roles" table.
|
|
RolesTable = &schema.Table{
|
|
Name: "roles",
|
|
Columns: RolesColumns,
|
|
PrimaryKey: []*schema.Column{RolesColumns[0]},
|
|
}
|
|
// UsersColumns holds the columns for the "users" table.
|
|
UsersColumns = []*schema.Column{
|
|
{Name: "id", Type: field.TypeInt, Increment: true},
|
|
}
|
|
// UsersTable holds the schema information for the "users" table.
|
|
UsersTable = &schema.Table{
|
|
Name: "users",
|
|
Columns: UsersColumns,
|
|
PrimaryKey: []*schema.Column{UsersColumns[0]},
|
|
}
|
|
// Tables holds all the tables in the schema.
|
|
Tables = []*schema.Table{
|
|
AuditLogsTable,
|
|
PermissionsTable,
|
|
RolesTable,
|
|
UsersTable,
|
|
}
|
|
)
|
|
|
|
func init() {
|
|
}
|