package graphqlapp import ( context "context" "database/sql" "time" "github.com/target/goalert/assignment" "github.com/target/goalert/graphql2" "github.com/target/goalert/keyring" "github.com/target/goalert/permission" "github.com/target/goalert/retry" "github.com/target/goalert/schedule" "github.com/target/goalert/user" "github.com/target/goalert/util/sqlutil" "github.com/target/goalert/validation" "github.com/pkg/errors" ) type Mutation App func (a *App) Mutation() graphql2.MutationResolver { return (*Mutation)(a) } func (a *Mutation) ReEncryptKeyringsAndConfig(ctx context.Context) (bool, error) { err := permission.LimitCheckAny(ctx, permission.Admin) if err != nil { return false, err } err = keyring.ReEncryptAll(ctx, a.DB, a.EncryptionKeys) if err != nil { return false, err } return true, nil } func (a *Mutation) SetFavorite(ctx context.Context, input graphql2.SetFavoriteInput) (bool, error) { var err error if input.Favorite { err = a.FavoriteStore.Set(ctx, a.DB, permission.UserID(ctx), input.Target) } else { err = a.FavoriteStore.Unset(ctx, a.DB, permission.UserID(ctx), input.Target) } if err != nil { return false, err } return true, nil } func (a *Mutation) LinkAccount(ctx context.Context, token string) (bool, error) { err := a.AuthLinkStore.LinkAccount(ctx, token) return err == nil, err } func (a *Mutation) SetScheduleOnCallNotificationRules(ctx context.Context, input graphql2.SetScheduleOnCallNotificationRulesInput) (bool, error) { schedID, err := parseUUID("ScheduleID", input.ScheduleID) if err != nil { return false, err } err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error { rules := make([]schedule.OnCallNotificationRule, 0, len(input.Rules)) for _, r := range input.Rules { info, err := a.DestReg.TypeInfo(ctx, r.Dest.Type) if err != nil { return err } if !info.IsSchedOnCallNotify() { return validation.NewFieldError("Rules[%d].Dest.Type", "unsupported destination type") } // MapDestToID handles the appropriate validation checks, outside of the IsSchedOnCallNotify check done above. chID, err := a.NCStore.MapDestToID(ctx, tx, r.Dest) if err != nil { return err } r.ChannelID = chID rules = append(rules, r.OnCallNotificationRule) } return a.ScheduleStore.SetOnCallNotificationRules(ctx, tx, schedID, rules) }) return err == nil, err } func (a *Mutation) SetTemporarySchedule(ctx context.Context, input graphql2.SetTemporaryScheduleInput) (bool, error) { schedID, err := parseUUID("ScheduleID", input.ScheduleID) if err != nil { return false, err } tmp := schedule.TemporarySchedule{ Start: input.Start, End: input.End, Shifts: input.Shifts, } var clearSet bool if input.ClearStart != nil || input.ClearEnd != nil { if input.ClearStart == nil { return false, validation.NewFieldError("ClearStart", "must be set if ClearEnd is set") } if input.ClearEnd == nil { return false, validation.NewFieldError("ClearEnd", "must be set if ClearStart is set") } clearSet = true } err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error { if clearSet { return a.ScheduleStore.SetClearTemporarySchedule(ctx, tx, schedID, tmp, *input.ClearStart, *input.ClearEnd) } return a.ScheduleStore.SetTemporarySchedule(ctx, tx, schedID, tmp) }) return err == nil, err } func (a *Mutation) ClearTemporarySchedules(ctx context.Context, input graphql2.ClearTemporarySchedulesInput) (bool, error) { schedID, err := parseUUID("ScheduleID", input.ScheduleID) if err != nil { return false, err } err = withContextTx(ctx, a.DB, func(ctx context.Context, tx *sql.Tx) error { return a.ScheduleStore.ClearTemporarySchedules(ctx, tx, schedID, input.Start, input.End) }) return err == nil, err } func (a *Mutation) TestContactMethod(ctx context.Context, id string) (bool, error) { err := a.NotificationStore.SendContactMethodTest(ctx, id) if err != nil { return false, err } return true, nil } func (a *Mutation) AddAuthSubject(ctx context.Context, input user.AuthSubject) (bool, error) { err := a.UserStore.AddAuthSubjectTx(ctx, nil, &input) if err != nil { return false, err } return true, nil } func (a *Mutation) DeleteAuthSubject(ctx context.Context, input user.AuthSubject) (bool, error) { err := a.UserStore.DeleteAuthSubjectTx(ctx, nil, &input) if err != nil { return false, err } return true, nil } func (a *Mutation) EndAllAuthSessionsByCurrentUser(ctx context.Context) (bool, error) { err := a.AuthHandler.EndAllUserSessionsTx(ctx, nil) if err != nil { return false, err } return true, nil } func (a *Mutation) DeleteAll(ctx context.Context, input []assignment.RawTarget) (bool, error) { // Retry because deleting frequently can cause a deadlock // under heavy load. err := retry.DoTemporaryError(func(int) error { return a.tryDeleteAll(ctx, input) }, retry.Log(ctx), retry.Limit(5), retry.FibBackoff(time.Second), ) return err == nil, err } func (a *Mutation) tryDeleteAll(ctx context.Context, input []assignment.RawTarget) error { tx, err := a.DB.BeginTx(ctx, nil) if err != nil { return err } defer sqlutil.Rollback(ctx, "graphql: delete all", tx) m := make(map[assignment.TargetType][]string) for _, tgt := range input { m[tgt.TargetType()] = append(m[tgt.TargetType()], tgt.TargetID()) } order := []assignment.TargetType{ assignment.TargetTypeRotation, assignment.TargetTypeUserOverride, assignment.TargetTypeSchedule, assignment.TargetTypeCalendarSubscription, assignment.TargetTypeUser, assignment.TargetTypeIntegrationKey, assignment.TargetTypeHeartbeatMonitor, assignment.TargetTypeService, assignment.TargetTypeEscalationPolicy, assignment.TargetTypeNotificationRule, assignment.TargetTypeContactMethod, assignment.TargetTypeUserSession, } for _, typ := range order { ids := m[typ] if len(ids) == 0 { continue } switch typ { case assignment.TargetTypeUserOverride: err = errors.Wrap(a.OverrideStore.DeleteUserOverrideTx(ctx, tx, ids...), "delete user overrides") case assignment.TargetTypeUser: err = errors.Wrap(a.UserStore.DeleteManyTx(ctx, tx, ids), "delete users") case assignment.TargetTypeService: err = errors.Wrap(a.ServiceStore.DeleteManyTx(ctx, tx, ids), "delete services") case assignment.TargetTypeEscalationPolicy: err = errors.Wrap(a.PolicyStore.DeleteManyPoliciesTx(ctx, tx, ids), "delete escalation policies") case assignment.TargetTypeIntegrationKey: err = errors.Wrap(a.IntKeyStore.DeleteMany(ctx, tx, ids), "delete integration keys") case assignment.TargetTypeSchedule: err = errors.Wrap(a.ScheduleStore.DeleteManyTx(ctx, tx, ids), "delete schedules") case assignment.TargetTypeCalendarSubscription: err = errors.Wrap(a.CalSubStore.DeleteTx(ctx, tx, permission.UserID(ctx), ids...), "delete calendar subscriptions") case assignment.TargetTypeRotation: err = errors.Wrap(a.RotationStore.DeleteManyTx(ctx, tx, ids), "delete rotations") case assignment.TargetTypeContactMethod: err = errors.Wrap(a.CMStore.Delete(ctx, tx, ids...), "delete contact methods") case assignment.TargetTypeNotificationRule: err = errors.Wrap(a.NRStore.DeleteTx(ctx, tx, ids...), "delete notification rules") case assignment.TargetTypeHeartbeatMonitor: err = errors.Wrap(a.HeartbeatStore.DeleteTx(ctx, tx, ids...), "delete heartbeat monitors") case assignment.TargetTypeUserSession: err = errors.Wrap(a.AuthHandler.EndUserSessionTx(ctx, tx, ids...), "end user sessions") default: return validation.NewFieldError("type", "unsupported type "+typ.String()) } if err != nil { return err } } err = tx.Commit() if err != nil { return err } return nil }