|
| 1 | +use crate as seaography; |
| 2 | +use async_graphql::{dynamic::ResolverContext, Result as GqlResult}; |
| 3 | +pub use sea_orm::rbac::entity::{permission, resource, role}; |
| 4 | +use sea_orm::DatabaseConnection; |
| 5 | +use seaography::{ |
| 6 | + macros::{CustomOperation, CustomOutput}, |
| 7 | + BuilderContext, DatabaseContext, UserContext, |
| 8 | +}; |
| 9 | + |
| 10 | +// Users can't customize this context |
| 11 | +lazy_static::lazy_static! { static ref CONTEXT: BuilderContext = BuilderContext::default(); } |
| 12 | + |
| 13 | +#[derive(Clone, CustomOutput)] |
| 14 | +#[seaography(prefix = "SeaOrm", suffix = "")] |
| 15 | +pub struct UserRolePermissions { |
| 16 | + pub role: role::Model, |
| 17 | + pub permissions: Vec<ResourcePermission>, |
| 18 | +} |
| 19 | + |
| 20 | +#[derive(Clone, CustomOutput)] |
| 21 | +#[seaography(prefix = "SeaOrm", suffix = "")] |
| 22 | +pub struct ResourcePermission { |
| 23 | + pub resource: resource::Model, |
| 24 | + pub permission: permission::Model, |
| 25 | +} |
| 26 | + |
| 27 | +#[allow(dead_code)] |
| 28 | +#[derive(CustomOperation)] |
| 29 | +pub struct Queries { |
| 30 | + _seaography_current_user_role_permission: fn() -> UserRolePermissions, |
| 31 | +} |
| 32 | + |
| 33 | +impl Queries { |
| 34 | + async fn _seaography_current_user_role_permission( |
| 35 | + ctx: &ResolverContext<'_>, |
| 36 | + ) -> GqlResult<UserRolePermissions> { |
| 37 | + let db = &ctx |
| 38 | + .data::<DatabaseConnection>()? |
| 39 | + .restricted(ctx.data_opt::<UserContext>())?; |
| 40 | + |
| 41 | + let role = db.user_role_permissions()?; |
| 42 | + |
| 43 | + Ok(UserRolePermissions { |
| 44 | + role: role.role, |
| 45 | + permissions: role |
| 46 | + .permissions |
| 47 | + .into_iter() |
| 48 | + .map(|(resource, permission)| ResourcePermission { |
| 49 | + resource, |
| 50 | + permission, |
| 51 | + }) |
| 52 | + .collect(), |
| 53 | + }) |
| 54 | + } |
| 55 | +} |
0 commit comments