Devendra174's picture
Upload folder using huggingface_hub
1e92f2d verified
package graphqlapp
import (
context "context"
"database/sql"
"time"
"github.com/target/goalert/assignment"
"github.com/target/goalert/graphql2"
"github.com/target/goalert/keyring"
"github.com/target/goalert/permission"
"github.com/target/goalert/retry"
"github.com/target/goalert/schedule"
"github.com/target/goalert/user"
"github.com/target/goalert/util/sqlutil"
"github.com/target/goalert/validation"
"github.com/pkg/errors"
)
type Mutation App
func (a *App) Mutation() graphql2.MutationResolver { return (*Mutation)(a) }
func (a *Mutation) ReEncryptKeyringsAndConfig(ctx context.Context) (bool, error) {
err := permission.LimitCheckAny(ctx, permission.Admin)
if err != nil {
return false, err
}
err = keyring.ReEncryptAll(ctx, a.DB, a.EncryptionKeys)
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) SetFavorite(ctx context.Context, input graphql2.SetFavoriteInput) (bool, error) {
var err error
if input.Favorite {
err = a.FavoriteStore.Set(ctx, a.DB, permission.UserID(ctx), input.Target)
} else {
err = a.FavoriteStore.Unset(ctx, a.DB, permission.UserID(ctx), input.Target)
}
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) LinkAccount(ctx context.Context, token string) (bool, error) {
err := a.AuthLinkStore.LinkAccount(ctx, token)
return err == nil, err
}
func (a *Mutation) SetScheduleOnCallNotificationRules(ctx context.Context, input graphql2.SetScheduleOnCallNotificationRulesInput) (bool, error) {
schedID, err := parseUUID("ScheduleID", input.ScheduleID)
if err != nil {
return false, err
}
err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error {
rules := make([]schedule.OnCallNotificationRule, 0, len(input.Rules))
for _, r := range input.Rules {
info, err := a.DestReg.TypeInfo(ctx, r.Dest.Type)
if err != nil {
return err
}
if !info.IsSchedOnCallNotify() {
return validation.NewFieldError("Rules[%d].Dest.Type", "unsupported destination type")
}
// MapDestToID handles the appropriate validation checks, outside of the IsSchedOnCallNotify check done above.
chID, err := a.NCStore.MapDestToID(ctx, tx, r.Dest)
if err != nil {
return err
}
r.ChannelID = chID
rules = append(rules, r.OnCallNotificationRule)
}
return a.ScheduleStore.SetOnCallNotificationRules(ctx, tx, schedID, rules)
})
return err == nil, err
}
func (a *Mutation) SetTemporarySchedule(ctx context.Context, input graphql2.SetTemporaryScheduleInput) (bool, error) {
schedID, err := parseUUID("ScheduleID", input.ScheduleID)
if err != nil {
return false, err
}
tmp := schedule.TemporarySchedule{
Start: input.Start,
End: input.End,
Shifts: input.Shifts,
}
var clearSet bool
if input.ClearStart != nil || input.ClearEnd != nil {
if input.ClearStart == nil {
return false, validation.NewFieldError("ClearStart", "must be set if ClearEnd is set")
}
if input.ClearEnd == nil {
return false, validation.NewFieldError("ClearEnd", "must be set if ClearStart is set")
}
clearSet = true
}
err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error {
if clearSet {
return a.ScheduleStore.SetClearTemporarySchedule(ctx, tx, schedID, tmp, *input.ClearStart, *input.ClearEnd)
}
return a.ScheduleStore.SetTemporarySchedule(ctx, tx, schedID, tmp)
})
return err == nil, err
}
func (a *Mutation) ClearTemporarySchedules(ctx context.Context, input graphql2.ClearTemporarySchedulesInput) (bool, error) {
schedID, err := parseUUID("ScheduleID", input.ScheduleID)
if err != nil {
return false, err
}
err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error {
return a.ScheduleStore.ClearTemporarySchedules(ctx, tx, schedID, input.Start, input.End)
})
return err == nil, err
}
func (a *Mutation) TestContactMethod(ctx context.Context, id string) (bool, error) {
err := a.NotificationStore.SendContactMethodTest(ctx, id)
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) AddAuthSubject(ctx context.Context, input user.AuthSubject) (bool, error) {
err := a.UserStore.AddAuthSubjectTx(ctx, nil, &input)
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) DeleteAuthSubject(ctx context.Context, input user.AuthSubject) (bool, error) {
err := a.UserStore.DeleteAuthSubjectTx(ctx, nil, &input)
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) EndAllAuthSessionsByCurrentUser(ctx context.Context) (bool, error) {
err := a.AuthHandler.EndAllUserSessionsTx(ctx, nil)
if err != nil {
return false, err
}
return true, nil
}
func (a *Mutation) DeleteAll(ctx context.Context, input []assignment.RawTarget) (bool, error) {
// Retry because deleting frequently can cause a deadlock
// under heavy load.
err := retry.DoTemporaryError(func(int) error {
return a.tryDeleteAll(ctx, input)
},
retry.Log(ctx),
retry.Limit(5),
retry.FibBackoff(time.Second),
)
return err == nil, err
}
func (a *Mutation) tryDeleteAll(ctx context.Context, input []assignment.RawTarget) error {
tx, err := a.DB.BeginTx(ctx, nil)
if err != nil {
return err
}
defer sqlutil.Rollback(ctx, "graphql: delete all", tx)
m := make(map[assignment.TargetType][]string)
for _, tgt := range input {
m[tgt.TargetType()] = append(m[tgt.TargetType()], tgt.TargetID())
}
order := []assignment.TargetType{
assignment.TargetTypeRotation,
assignment.TargetTypeUserOverride,
assignment.TargetTypeSchedule,
assignment.TargetTypeCalendarSubscription,
assignment.TargetTypeUser,
assignment.TargetTypeIntegrationKey,
assignment.TargetTypeHeartbeatMonitor,
assignment.TargetTypeService,
assignment.TargetTypeEscalationPolicy,
assignment.TargetTypeNotificationRule,
assignment.TargetTypeContactMethod,
assignment.TargetTypeUserSession,
}
for _, typ := range order {
ids := m[typ]
if len(ids) == 0 {
continue
}
switch typ {
case assignment.TargetTypeUserOverride:
err = errors.Wrap(a.OverrideStore.DeleteUserOverrideTx(ctx, tx, ids...), "delete user overrides")
case assignment.TargetTypeUser:
err = errors.Wrap(a.UserStore.DeleteManyTx(ctx, tx, ids), "delete users")
case assignment.TargetTypeService:
err = errors.Wrap(a.ServiceStore.DeleteManyTx(ctx, tx, ids), "delete services")
case assignment.TargetTypeEscalationPolicy:
err = errors.Wrap(a.PolicyStore.DeleteManyPoliciesTx(ctx, tx, ids), "delete escalation policies")
case assignment.TargetTypeIntegrationKey:
err = errors.Wrap(a.IntKeyStore.DeleteMany(ctx, tx, ids), "delete integration keys")
case assignment.TargetTypeSchedule:
err = errors.Wrap(a.ScheduleStore.DeleteManyTx(ctx, tx, ids), "delete schedules")
case assignment.TargetTypeCalendarSubscription:
err = errors.Wrap(a.CalSubStore.DeleteTx(ctx, tx, permission.UserID(ctx), ids...), "delete calendar subscriptions")
case assignment.TargetTypeRotation:
err = errors.Wrap(a.RotationStore.DeleteManyTx(ctx, tx, ids), "delete rotations")
case assignment.TargetTypeContactMethod:
err = errors.Wrap(a.CMStore.Delete(ctx, tx, ids...), "delete contact methods")
case assignment.TargetTypeNotificationRule:
err = errors.Wrap(a.NRStore.DeleteTx(ctx, tx, ids...), "delete notification rules")
case assignment.TargetTypeHeartbeatMonitor:
err = errors.Wrap(a.HeartbeatStore.DeleteTx(ctx, tx, ids...), "delete heartbeat monitors")
case assignment.TargetTypeUserSession:
err = errors.Wrap(a.AuthHandler.EndUserSessionTx(ctx, tx, ids...), "end user sessions")
default:
return validation.NewFieldError("type", "unsupported type "+typ.String())
}
if err != nil {
return err
}
}
err = tx.Commit()
if err != nil {
return err
}
return nil
}