Compare commits
40 Commits
b2139b046e
...
mai/ritchi
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
c5c3f41e08 | ||
|
|
b49992b9c0 | ||
|
|
f81a2492c6 | ||
|
|
8bb8d7fed8 | ||
|
|
b4f3b26cbe | ||
|
|
6e9345fcfe | ||
|
|
785df2ced4 | ||
|
|
749273fba7 | ||
|
|
0ab2e8b383 | ||
|
|
2cf01073a3 | ||
|
|
ed83d23d06 | ||
|
|
97ebeafcf7 | ||
|
|
26887248e1 | ||
|
|
1fa7d90050 | ||
|
|
3a56d4cf11 | ||
|
|
45188ff5cb | ||
|
|
65b70975eb | ||
|
|
0fac764211 | ||
|
|
78c511bd1f | ||
|
|
ca572d3289 | ||
|
|
b2b3e04d05 | ||
|
|
5758e2c37f | ||
|
|
9bd8cc9e07 | ||
|
|
bf225284d8 | ||
|
|
e53e1389f9 | ||
|
|
2c16f26448 | ||
|
|
f0ee5921cf | ||
|
|
ba29fc75c7 | ||
|
|
8350a7e7fb | ||
|
|
42a62d45bf | ||
|
|
0b6bab8512 | ||
|
|
f11c411147 | ||
|
|
bd15b4eb38 | ||
|
|
8049ea3c63 | ||
|
|
1fc0874893 | ||
|
|
193a4cd567 | ||
|
|
792d084b4f | ||
|
|
ff9a6f3866 | ||
|
|
83a18a0a85 | ||
|
|
b797b349e7 |
14
.claude/agents/coder.md
Normal file
14
.claude/agents/coder.md
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# Coder Agent
|
||||||
|
|
||||||
|
Implementation-focused agent for writing and refactoring code.
|
||||||
|
|
||||||
|
## Instructions
|
||||||
|
|
||||||
|
- Follow existing patterns in the codebase
|
||||||
|
- Write minimal, focused code
|
||||||
|
- Run tests after changes
|
||||||
|
- Commit incrementally with descriptive messages
|
||||||
|
|
||||||
|
## Tools
|
||||||
|
|
||||||
|
All tools available.
|
||||||
14
.claude/agents/researcher.md
Normal file
14
.claude/agents/researcher.md
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# Researcher Agent
|
||||||
|
|
||||||
|
Exploration and information gathering agent.
|
||||||
|
|
||||||
|
## Instructions
|
||||||
|
|
||||||
|
- Search broadly, then narrow down
|
||||||
|
- Document findings in structured format
|
||||||
|
- Cite sources and file paths
|
||||||
|
- Summarize key insights, don't dump raw data
|
||||||
|
|
||||||
|
## Tools
|
||||||
|
|
||||||
|
Read-only tools preferred. Use Bash only for non-destructive commands.
|
||||||
14
.claude/agents/reviewer.md
Normal file
14
.claude/agents/reviewer.md
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# Reviewer Agent
|
||||||
|
|
||||||
|
Code review agent for checking quality and correctness.
|
||||||
|
|
||||||
|
## Instructions
|
||||||
|
|
||||||
|
- Check for bugs, security issues, and style violations
|
||||||
|
- Verify test coverage for changes
|
||||||
|
- Suggest improvements concisely
|
||||||
|
- Focus on correctness over style preferences
|
||||||
|
|
||||||
|
## Tools
|
||||||
|
|
||||||
|
Read-only tools. No file modifications.
|
||||||
1
.claude/skills/mai-clone
Symbolic link
1
.claude/skills/mai-clone
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-clone
|
||||||
1
.claude/skills/mai-coder
Symbolic link
1
.claude/skills/mai-coder
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-coder
|
||||||
1
.claude/skills/mai-commit
Symbolic link
1
.claude/skills/mai-commit
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-commit
|
||||||
1
.claude/skills/mai-consultant
Symbolic link
1
.claude/skills/mai-consultant
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-consultant
|
||||||
1
.claude/skills/mai-daily
Symbolic link
1
.claude/skills/mai-daily
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-daily
|
||||||
1
.claude/skills/mai-debrief
Symbolic link
1
.claude/skills/mai-debrief
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-debrief
|
||||||
1
.claude/skills/mai-enemy
Symbolic link
1
.claude/skills/mai-enemy
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-enemy
|
||||||
1
.claude/skills/mai-excalidraw
Symbolic link
1
.claude/skills/mai-excalidraw
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-excalidraw
|
||||||
1
.claude/skills/mai-fixer
Symbolic link
1
.claude/skills/mai-fixer
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-fixer
|
||||||
1
.claude/skills/mai-gitster
Symbolic link
1
.claude/skills/mai-gitster
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-gitster
|
||||||
1
.claude/skills/mai-head
Symbolic link
1
.claude/skills/mai-head
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-head
|
||||||
1
.claude/skills/mai-init
Symbolic link
1
.claude/skills/mai-init
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-init
|
||||||
1
.claude/skills/mai-inventor
Symbolic link
1
.claude/skills/mai-inventor
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-inventor
|
||||||
1
.claude/skills/mai-lead
Symbolic link
1
.claude/skills/mai-lead
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-lead
|
||||||
1
.claude/skills/mai-maister
Symbolic link
1
.claude/skills/mai-maister
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-maister
|
||||||
1
.claude/skills/mai-member
Symbolic link
1
.claude/skills/mai-member
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-member
|
||||||
1
.claude/skills/mai-researcher
Symbolic link
1
.claude/skills/mai-researcher
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-researcher
|
||||||
1
.claude/skills/mai-think
Symbolic link
1
.claude/skills/mai-think
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-think
|
||||||
1
.claude/skills/mai-web
Symbolic link
1
.claude/skills/mai-web
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/home/m/.mai/skills/mai-web
|
||||||
18
.env.example
Normal file
18
.env.example
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
# KanzlAI Environment Variables
|
||||||
|
# Copy to .env and fill in values: cp .env.example .env
|
||||||
|
|
||||||
|
# Backend
|
||||||
|
PORT=8080
|
||||||
|
DATABASE_URL=postgresql://user:pass@host:5432/dbname
|
||||||
|
|
||||||
|
# Supabase (required for database + auth)
|
||||||
|
SUPABASE_URL=https://your-project.supabase.co
|
||||||
|
SUPABASE_ANON_KEY=
|
||||||
|
SUPABASE_SERVICE_KEY=
|
||||||
|
SUPABASE_JWT_SECRET=
|
||||||
|
|
||||||
|
# Claude API (required for AI features)
|
||||||
|
ANTHROPIC_API_KEY=
|
||||||
|
|
||||||
|
# CalDAV (configured per-tenant in tenant settings, not env vars)
|
||||||
|
# See tenant.settings.caldav JSON field
|
||||||
1
.gitignore
vendored
1
.gitignore
vendored
@@ -45,3 +45,4 @@ tmp/
|
|||||||
|
|
||||||
# TypeScript
|
# TypeScript
|
||||||
*.tsbuildinfo
|
*.tsbuildinfo
|
||||||
|
.worktrees/
|
||||||
|
|||||||
4
.m/.gitignore
vendored
Normal file
4
.m/.gitignore
vendored
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
workers.json
|
||||||
|
spawn.lock
|
||||||
|
session.yaml
|
||||||
|
config.reference.yaml
|
||||||
168
.m/config.yaml
Normal file
168
.m/config.yaml
Normal file
@@ -0,0 +1,168 @@
|
|||||||
|
provider: claude
|
||||||
|
providers:
|
||||||
|
claude:
|
||||||
|
api_key: ""
|
||||||
|
model: claude-sonnet-4-20250514
|
||||||
|
base_url: https://api.anthropic.com/v1
|
||||||
|
ollama:
|
||||||
|
host: http://localhost:11434
|
||||||
|
model: llama3.2
|
||||||
|
memory:
|
||||||
|
enabled: true
|
||||||
|
backend: ""
|
||||||
|
path: ""
|
||||||
|
url: postgres://mai_memory.your-tenant-id:maiMem6034supa@100.99.98.201:6543/postgres?sslmode=disable
|
||||||
|
group_id: ""
|
||||||
|
cache_ttl: 5m0s
|
||||||
|
auto_load: true
|
||||||
|
embedding_url: ""
|
||||||
|
embedding_model: ""
|
||||||
|
gitea:
|
||||||
|
url: https://mgit.msbls.de
|
||||||
|
repo: m/KanzlAI
|
||||||
|
token: ""
|
||||||
|
sync:
|
||||||
|
enabled: false
|
||||||
|
interval: 0s
|
||||||
|
repos: []
|
||||||
|
auto_queue: false
|
||||||
|
api:
|
||||||
|
api_key: ""
|
||||||
|
basic_auth:
|
||||||
|
username: ""
|
||||||
|
password: ""
|
||||||
|
public_endpoints:
|
||||||
|
- /api/health
|
||||||
|
ui:
|
||||||
|
theme: default
|
||||||
|
show_sidebar: true
|
||||||
|
animation: true
|
||||||
|
persona: true
|
||||||
|
avatar_pack: ""
|
||||||
|
worker:
|
||||||
|
names: []
|
||||||
|
name_scheme: role
|
||||||
|
default_level: standard
|
||||||
|
auto_discard: false
|
||||||
|
max_workers: 5
|
||||||
|
persistent: true
|
||||||
|
head:
|
||||||
|
name: ingeborg
|
||||||
|
max_loops: 50
|
||||||
|
infinity_mode: false
|
||||||
|
capacity:
|
||||||
|
global:
|
||||||
|
max_workers: 5
|
||||||
|
max_heads: 3
|
||||||
|
per_worker:
|
||||||
|
max_tasks_lifetime: 0
|
||||||
|
max_concurrent: 1
|
||||||
|
max_context_tokens: 0
|
||||||
|
per_head:
|
||||||
|
max_workers: 10
|
||||||
|
resources:
|
||||||
|
max_memory_mb: 0
|
||||||
|
max_cpu_percent: 0
|
||||||
|
queue:
|
||||||
|
max_pending: 100
|
||||||
|
stale_task_days: 30
|
||||||
|
workforce:
|
||||||
|
timeouts:
|
||||||
|
task_default: 0s
|
||||||
|
task_max: 0s
|
||||||
|
idle_before_warn: 10m0s
|
||||||
|
idle_before_kill: 30m0s
|
||||||
|
quality_check: 2m0s
|
||||||
|
context:
|
||||||
|
max_tokens_per_worker: 0
|
||||||
|
max_tokens_global: 0
|
||||||
|
warn_threshold: 0.8
|
||||||
|
truncate_strategy: oldest
|
||||||
|
delegation:
|
||||||
|
strategy: skill_match
|
||||||
|
preferred_role: coder
|
||||||
|
auto_delegate: false
|
||||||
|
max_depth: 3
|
||||||
|
allowed_roles:
|
||||||
|
- coder
|
||||||
|
- researcher
|
||||||
|
- fixer
|
||||||
|
peppy:
|
||||||
|
enabled: false
|
||||||
|
style: calm
|
||||||
|
interval: 5m0s
|
||||||
|
emoji: false
|
||||||
|
nudges: true
|
||||||
|
nudge_main: false
|
||||||
|
custom_prompt: ""
|
||||||
|
stall_threshold: 0s
|
||||||
|
restart_enabled: false
|
||||||
|
max_shifts: 0
|
||||||
|
quality_gates:
|
||||||
|
enabled: true
|
||||||
|
checks: []
|
||||||
|
preflight:
|
||||||
|
enabled: false
|
||||||
|
type: ""
|
||||||
|
root: ""
|
||||||
|
checks: []
|
||||||
|
guardrails:
|
||||||
|
enabled: false
|
||||||
|
use_defaults: true
|
||||||
|
output:
|
||||||
|
coder_checks: []
|
||||||
|
researcher_checks: []
|
||||||
|
fixer_checks: []
|
||||||
|
custom_checks: {}
|
||||||
|
global_checks: []
|
||||||
|
tools:
|
||||||
|
role_rules: {}
|
||||||
|
deny_patterns: []
|
||||||
|
allow_patterns: []
|
||||||
|
schemas:
|
||||||
|
report_schemas: {}
|
||||||
|
deliverable_schemas: {}
|
||||||
|
modes:
|
||||||
|
yolo: false
|
||||||
|
self_improvement: false
|
||||||
|
autonomous: false
|
||||||
|
verbose: false
|
||||||
|
improve_interval: 0s
|
||||||
|
predict_interval: 0s
|
||||||
|
layouts:
|
||||||
|
head: ""
|
||||||
|
worker: ""
|
||||||
|
roles: {}
|
||||||
|
dog:
|
||||||
|
name: buddy
|
||||||
|
supabase:
|
||||||
|
url: ""
|
||||||
|
role_key: ""
|
||||||
|
anon_key: ""
|
||||||
|
schema: mai
|
||||||
|
storage:
|
||||||
|
backend: ""
|
||||||
|
postgres:
|
||||||
|
url: ""
|
||||||
|
max_conns: 0
|
||||||
|
min_conns: 0
|
||||||
|
max_conn_lifetime: 0s
|
||||||
|
idle:
|
||||||
|
behavior: wait
|
||||||
|
auto_hire: false
|
||||||
|
prompt: ""
|
||||||
|
git:
|
||||||
|
worktrees:
|
||||||
|
enabled: true
|
||||||
|
delete_branch: false
|
||||||
|
dir: .worktrees
|
||||||
|
phase:
|
||||||
|
enabled: false
|
||||||
|
current: ""
|
||||||
|
allowed_roles: {}
|
||||||
|
goal: ""
|
||||||
|
skills: {}
|
||||||
|
editor: nvim
|
||||||
|
log_level: info
|
||||||
|
project_detection: true
|
||||||
|
tone: professional
|
||||||
22
.mcp.json
Normal file
22
.mcp.json
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
{
|
||||||
|
"mcpServers": {
|
||||||
|
"mai": {
|
||||||
|
"type": "http",
|
||||||
|
"url": "http://100.99.98.201:8000/mcp",
|
||||||
|
"headers": {
|
||||||
|
"Authorization": "Basic ${SUPABASE_AUTH}"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"mai-memory": {
|
||||||
|
"command": "mai",
|
||||||
|
"args": [
|
||||||
|
"mcp",
|
||||||
|
"memory"
|
||||||
|
],
|
||||||
|
"env": {
|
||||||
|
"MAI_MEMORY_EMBEDDING_MODEL": "nomic-embed-text",
|
||||||
|
"MAI_MEMORY_EMBEDDING_URL": "https://llm.x.msbls.de"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
# KanzlAI
|
# KanzlAI-mGMT
|
||||||
|
|
||||||
AI-powered toolkit for patent litigation — UPC case law search, analysis, and AI-assisted legal research.
|
Kanzleimanagement online — law firm management for deadlines (Fristen), appointments (Termine), and case tracking.
|
||||||
|
|
||||||
**Memory group_id:** `kanzlai`
|
**Memory group_id:** `kanzlai`
|
||||||
|
|
||||||
@@ -18,9 +18,8 @@ frontend/ Next.js 15 (TypeScript, Tailwind CSS, App Router)
|
|||||||
|
|
||||||
- **Frontend:** Next.js 15 with TypeScript, Tailwind CSS v4, App Router, Bun
|
- **Frontend:** Next.js 15 with TypeScript, Tailwind CSS v4, App Router, Bun
|
||||||
- **Backend:** Go (standard library HTTP server)
|
- **Backend:** Go (standard library HTTP server)
|
||||||
- **Database:** Supabase (PostgreSQL) — shared instance with other m projects
|
- **Database:** Supabase (PostgreSQL) — `kanzlai` schema in flexsiebels instance
|
||||||
- **AI:** Claude API
|
- **Deploy:** Dokploy on mLake, domain: kanzlai.msbls.de
|
||||||
- **Deploy:** mRiver with Caddy reverse proxy
|
|
||||||
|
|
||||||
## Development
|
## Development
|
||||||
|
|
||||||
|
|||||||
28
README.md
28
README.md
@@ -1,6 +1,6 @@
|
|||||||
# KanzlAI
|
# KanzlAI-mGMT
|
||||||
|
|
||||||
AI-powered toolkit for patent litigation — starting with UPC case law search and analysis.
|
Kanzleimanagement online — law firm management for deadlines, appointments, and case tracking.
|
||||||
|
|
||||||
## Structure
|
## Structure
|
||||||
|
|
||||||
@@ -12,26 +12,16 @@ frontend/ Next.js 15 (TypeScript, Tailwind CSS)
|
|||||||
## Development
|
## Development
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# Backend
|
make dev-backend # Go server on :8080
|
||||||
make dev-backend
|
make dev-frontend # Next.js dev server
|
||||||
|
make build # Build both
|
||||||
# Frontend
|
make lint # Lint both
|
||||||
make dev-frontend
|
make test # Test both
|
||||||
|
|
||||||
# Build all
|
|
||||||
make build
|
|
||||||
|
|
||||||
# Lint all
|
|
||||||
make lint
|
|
||||||
|
|
||||||
# Test all
|
|
||||||
make test
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Tech Stack
|
## Tech Stack
|
||||||
|
|
||||||
- **Frontend:** Next.js 15, TypeScript, Tailwind CSS
|
- **Frontend:** Next.js 15, TypeScript, Tailwind CSS
|
||||||
- **Backend:** Go
|
- **Backend:** Go
|
||||||
- **Database:** Supabase (PostgreSQL)
|
- **Database:** Supabase (PostgreSQL) — `kanzlai` schema
|
||||||
- **AI:** Claude API
|
- **Deploy:** Dokploy on mLake (kanzlai.msbls.de)
|
||||||
- **Deploy:** mRiver + Caddy
|
|
||||||
|
|||||||
6
backend/.dockerignore
Normal file
6
backend/.dockerignore
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
bin/
|
||||||
|
*.exe
|
||||||
|
.git
|
||||||
|
.gitignore
|
||||||
|
Dockerfile
|
||||||
|
.dockerignore
|
||||||
15
backend/Dockerfile
Normal file
15
backend/Dockerfile
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
# Build
|
||||||
|
FROM golang:1.25-alpine AS builder
|
||||||
|
WORKDIR /app
|
||||||
|
COPY go.mod ./
|
||||||
|
RUN go mod download
|
||||||
|
COPY . .
|
||||||
|
RUN CGO_ENABLED=0 GOOS=linux go build -o server ./cmd/server
|
||||||
|
|
||||||
|
# Run
|
||||||
|
FROM alpine:3
|
||||||
|
RUN apk --no-cache add ca-certificates
|
||||||
|
WORKDIR /app
|
||||||
|
COPY --from=builder /app/server .
|
||||||
|
EXPOSE 8080
|
||||||
|
CMD ["./server"]
|
||||||
@@ -1,25 +1,46 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"log/slog"
|
||||||
"log"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/config"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/db"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/logging"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/router"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
port := os.Getenv("PORT")
|
logging.Setup()
|
||||||
if port == "" {
|
|
||||||
port = "8080"
|
cfg, err := config.Load()
|
||||||
|
if err != nil {
|
||||||
|
slog.Error("failed to load config", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
http.HandleFunc("/health", func(w http.ResponseWriter, r *http.Request) {
|
database, err := db.Connect(cfg.DatabaseURL)
|
||||||
w.WriteHeader(http.StatusOK)
|
if err != nil {
|
||||||
fmt.Fprintf(w, "ok")
|
slog.Error("failed to connect to database", "error", err)
|
||||||
})
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
defer database.Close()
|
||||||
|
|
||||||
log.Printf("Starting KanzlAI API server on :%s", port)
|
authMW := auth.NewMiddleware(cfg.SupabaseJWTSecret, database)
|
||||||
if err := http.ListenAndServe(":"+port, nil); err != nil {
|
|
||||||
log.Fatal(err)
|
// Start CalDAV sync service
|
||||||
|
calDAVSvc := services.NewCalDAVService(database)
|
||||||
|
calDAVSvc.Start()
|
||||||
|
defer calDAVSvc.Stop()
|
||||||
|
|
||||||
|
handler := router.New(database, authMW, cfg, calDAVSvc)
|
||||||
|
|
||||||
|
slog.Info("starting KanzlAI API server", "port", cfg.Port)
|
||||||
|
if err := http.ListenAndServe(":"+cfg.Port, handler); err != nil {
|
||||||
|
slog.Error("server failed", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,3 +1,22 @@
|
|||||||
module mgit.msbls.de/m/KanzlAI
|
module mgit.msbls.de/m/KanzlAI-mGMT
|
||||||
|
|
||||||
go 1.25.5
|
go 1.25.5
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/anthropics/anthropic-sdk-go v1.27.1
|
||||||
|
github.com/emersion/go-ical v0.0.0-20250609112844-439c63cef608
|
||||||
|
github.com/emersion/go-webdav v0.7.0
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.1
|
||||||
|
github.com/google/uuid v1.6.0
|
||||||
|
github.com/jmoiron/sqlx v1.4.0
|
||||||
|
github.com/lib/pq v1.12.0
|
||||||
|
)
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/teambition/rrule-go v1.8.2 // indirect
|
||||||
|
github.com/tidwall/gjson v1.18.0 // indirect
|
||||||
|
github.com/tidwall/match v1.1.1 // indirect
|
||||||
|
github.com/tidwall/pretty v1.2.1 // indirect
|
||||||
|
github.com/tidwall/sjson v1.2.5 // indirect
|
||||||
|
golang.org/x/sync v0.16.0 // indirect
|
||||||
|
)
|
||||||
|
|||||||
49
backend/go.sum
Normal file
49
backend/go.sum
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
filippo.io/edwards25519 v1.1.0 h1:FNf4tywRC1HmFuKW5xopWpigGjJKiJSV0Cqo0cJWDaA=
|
||||||
|
filippo.io/edwards25519 v1.1.0/go.mod h1:BxyFTGdWcka3PhytdK4V28tE5sGfRvvvRV7EaN4VDT4=
|
||||||
|
github.com/anthropics/anthropic-sdk-go v1.27.1 h1:7DgMZ2Ng3C2mPzJGHA30NXQTZolcF07mHd0tGaLwfzk=
|
||||||
|
github.com/anthropics/anthropic-sdk-go v1.27.1/go.mod h1:qUKmaW+uuPB64iy1l+4kOSvaLqPXnHTTBKH6RVZ7q5Q=
|
||||||
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI=
|
||||||
|
github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ=
|
||||||
|
github.com/emersion/go-ical v0.0.0-20240127095438-fc1c9d8fb2b6/go.mod h1:BEksegNspIkjCQfmzWgsgbu6KdeJ/4LwUZs7DMBzjzw=
|
||||||
|
github.com/emersion/go-ical v0.0.0-20250609112844-439c63cef608 h1:5XWaET4YAcppq3l1/Yh2ay5VmQjUdq6qhJuucdGbmOY=
|
||||||
|
github.com/emersion/go-ical v0.0.0-20250609112844-439c63cef608/go.mod h1:BEksegNspIkjCQfmzWgsgbu6KdeJ/4LwUZs7DMBzjzw=
|
||||||
|
github.com/emersion/go-vcard v0.0.0-20230815062825-8fda7d206ec9/go.mod h1:HMJKR5wlh/ziNp+sHEDV2ltblO4JD2+IdDOWtGcQBTM=
|
||||||
|
github.com/emersion/go-webdav v0.7.0 h1:cp6aBWXBf8Sjzguka9VJarr4XTkGc2IHxXI1Gq3TKpA=
|
||||||
|
github.com/emersion/go-webdav v0.7.0/go.mod h1:mI8iBx3RAODwX7PJJ7qzsKAKs/vY429YfS2/9wKnDbQ=
|
||||||
|
github.com/go-sql-driver/mysql v1.8.1 h1:LedoTUt/eveggdHS9qUFC1EFSa8bU2+1pZjSRpvNJ1Y=
|
||||||
|
github.com/go-sql-driver/mysql v1.8.1/go.mod h1:wEBSXgmK//2ZFJyE+qWnIsVGmvmEKlqwuVSjsCm7DZg=
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.1 h1:kYf81DTWFe7t+1VvL7eS+jKFVWaUnK9cB1qbwn63YCY=
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.1/go.mod h1:fxCRLWMO43lRc8nhHWY6LGqRcf+1gQWArsqaEUEa5bE=
|
||||||
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
|
github.com/jmoiron/sqlx v1.4.0 h1:1PLqN7S1UYp5t4SrVVnt4nUVNemrDAtxlulVe+Qgm3o=
|
||||||
|
github.com/jmoiron/sqlx v1.4.0/go.mod h1:ZrZ7UsYB/weZdl2Bxg6jCRO9c3YHl8r3ahlKmRT4JLY=
|
||||||
|
github.com/lib/pq v1.10.9/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o=
|
||||||
|
github.com/lib/pq v1.12.0 h1:mC1zeiNamwKBecjHarAr26c/+d8V5w/u4J0I/yASbJo=
|
||||||
|
github.com/lib/pq v1.12.0/go.mod h1:/p+8NSbOcwzAEI7wiMXFlgydTwcgTr3OSKMsD2BitpA=
|
||||||
|
github.com/mattn/go-sqlite3 v1.14.22 h1:2gZY6PC6kBnID23Tichd1K+Z0oS6nE/XwU+Vz/5o4kU=
|
||||||
|
github.com/mattn/go-sqlite3 v1.14.22/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
|
||||||
|
github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
||||||
|
github.com/teambition/rrule-go v1.8.2 h1:lIjpjvWTj9fFUZCmuoVDrKVOtdiyzbzc93qTmRVe/J8=
|
||||||
|
github.com/teambition/rrule-go v1.8.2/go.mod h1:Ieq5AbrKGciP1V//Wq8ktsTXwSwJHDD5mD/wLBGl3p4=
|
||||||
|
github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=
|
||||||
|
github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=
|
||||||
|
github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=
|
||||||
|
github.com/tidwall/match v1.1.1 h1:+Ho715JplO36QYgwN9PGYNhgZvoUSc9X2c80KVTi+GA=
|
||||||
|
github.com/tidwall/match v1.1.1/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
|
||||||
|
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
|
||||||
|
github.com/tidwall/pretty v1.2.1 h1:qjsOFOWWQl+N3RsoF5/ssm1pHmJJwhjlSbZ51I6wMl4=
|
||||||
|
github.com/tidwall/pretty v1.2.1/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
|
||||||
|
github.com/tidwall/sjson v1.2.5 h1:kLy8mja+1c9jlljvWTlSazM7cKDRfJuR/bOJhcY5NcY=
|
||||||
|
github.com/tidwall/sjson v1.2.5/go.mod h1:Fvgq9kS/6ociJEDnK0Fk1cpYF4FIW6ZF7LAe+6jwd28=
|
||||||
|
golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw=
|
||||||
|
golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
|
||||||
|
gopkg.in/yaml.v2 v2.2.8 h1:obN1ZagJSUGI0Ek/LBmuj4SNLPfIny3KsKFopxRdj10=
|
||||||
|
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
32
backend/internal/auth/context.go
Normal file
32
backend/internal/auth/context.go
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type contextKey string
|
||||||
|
|
||||||
|
const (
|
||||||
|
userIDKey contextKey = "user_id"
|
||||||
|
tenantIDKey contextKey = "tenant_id"
|
||||||
|
)
|
||||||
|
|
||||||
|
func ContextWithUserID(ctx context.Context, userID uuid.UUID) context.Context {
|
||||||
|
return context.WithValue(ctx, userIDKey, userID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func ContextWithTenantID(ctx context.Context, tenantID uuid.UUID) context.Context {
|
||||||
|
return context.WithValue(ctx, tenantIDKey, tenantID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func UserFromContext(ctx context.Context) (uuid.UUID, bool) {
|
||||||
|
id, ok := ctx.Value(userIDKey).(uuid.UUID)
|
||||||
|
return id, ok
|
||||||
|
}
|
||||||
|
|
||||||
|
func TenantFromContext(ctx context.Context) (uuid.UUID, bool) {
|
||||||
|
id, ok := ctx.Value(tenantIDKey).(uuid.UUID)
|
||||||
|
return id, ok
|
||||||
|
}
|
||||||
102
backend/internal/auth/middleware.go
Normal file
102
backend/internal/auth/middleware.go
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/golang-jwt/jwt/v5"
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Middleware struct {
|
||||||
|
jwtSecret []byte
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMiddleware(jwtSecret string, db *sqlx.DB) *Middleware {
|
||||||
|
return &Middleware{jwtSecret: []byte(jwtSecret), db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *Middleware) RequireAuth(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
token := extractBearerToken(r)
|
||||||
|
if token == "" {
|
||||||
|
http.Error(w, "missing authorization token", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
userID, err := m.verifyJWT(token)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := ContextWithUserID(r.Context(), userID)
|
||||||
|
|
||||||
|
// Resolve tenant from user_tenants
|
||||||
|
var tenantID uuid.UUID
|
||||||
|
err = m.db.GetContext(r.Context(), &tenantID,
|
||||||
|
"SELECT tenant_id FROM user_tenants WHERE user_id = $1 LIMIT 1", userID)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, "no tenant found for user", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ctx = ContextWithTenantID(ctx, tenantID)
|
||||||
|
|
||||||
|
next.ServeHTTP(w, r.WithContext(ctx))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *Middleware) verifyJWT(tokenStr string) (uuid.UUID, error) {
|
||||||
|
parsedToken, err := jwt.Parse(tokenStr, func(t *jwt.Token) (interface{}, error) {
|
||||||
|
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
||||||
|
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
|
||||||
|
}
|
||||||
|
return m.jwtSecret, nil
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return uuid.Nil, fmt.Errorf("parsing JWT: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !parsedToken.Valid {
|
||||||
|
return uuid.Nil, fmt.Errorf("invalid JWT token")
|
||||||
|
}
|
||||||
|
|
||||||
|
claims, ok := parsedToken.Claims.(jwt.MapClaims)
|
||||||
|
if !ok {
|
||||||
|
return uuid.Nil, fmt.Errorf("extracting JWT claims")
|
||||||
|
}
|
||||||
|
|
||||||
|
if exp, ok := claims["exp"].(float64); ok {
|
||||||
|
if time.Now().Unix() > int64(exp) {
|
||||||
|
return uuid.Nil, fmt.Errorf("JWT token has expired")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
sub, ok := claims["sub"].(string)
|
||||||
|
if !ok {
|
||||||
|
return uuid.Nil, fmt.Errorf("missing sub claim in JWT")
|
||||||
|
}
|
||||||
|
|
||||||
|
userID, err := uuid.Parse(sub)
|
||||||
|
if err != nil {
|
||||||
|
return uuid.Nil, fmt.Errorf("invalid user ID format: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return userID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func extractBearerToken(r *http.Request) string {
|
||||||
|
auth := r.Header.Get("Authorization")
|
||||||
|
if auth == "" {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
parts := strings.SplitN(auth, " ", 2)
|
||||||
|
if len(parts) != 2 || !strings.EqualFold(parts[0], "bearer") {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return parts[1]
|
||||||
|
}
|
||||||
61
backend/internal/auth/tenant_resolver.go
Normal file
61
backend/internal/auth/tenant_resolver.go
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TenantLookup resolves the default tenant for a user.
|
||||||
|
// Defined as an interface to avoid circular dependency with services.
|
||||||
|
type TenantLookup interface {
|
||||||
|
FirstTenantForUser(ctx context.Context, userID uuid.UUID) (*uuid.UUID, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// TenantResolver is middleware that resolves the tenant from X-Tenant-ID header
|
||||||
|
// or defaults to the user's first tenant.
|
||||||
|
type TenantResolver struct {
|
||||||
|
lookup TenantLookup
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTenantResolver(lookup TenantLookup) *TenantResolver {
|
||||||
|
return &TenantResolver{lookup: lookup}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (tr *TenantResolver) Resolve(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var tenantID uuid.UUID
|
||||||
|
|
||||||
|
if header := r.Header.Get("X-Tenant-ID"); header != "" {
|
||||||
|
parsed, err := uuid.Parse(header)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, fmt.Sprintf("invalid X-Tenant-ID: %v", err), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
tenantID = parsed
|
||||||
|
} else {
|
||||||
|
// Default to user's first tenant
|
||||||
|
first, err := tr.lookup.FirstTenantForUser(r.Context(), userID)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, fmt.Sprintf("resolving tenant: %v", err), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if first == nil {
|
||||||
|
http.Error(w, "no tenant found for user", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
tenantID = *first
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := ContextWithTenantID(r.Context(), tenantID)
|
||||||
|
next.ServeHTTP(w, r.WithContext(ctx))
|
||||||
|
})
|
||||||
|
}
|
||||||
124
backend/internal/auth/tenant_resolver_test.go
Normal file
124
backend/internal/auth/tenant_resolver_test.go
Normal file
@@ -0,0 +1,124 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type mockTenantLookup struct {
|
||||||
|
tenantID *uuid.UUID
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *mockTenantLookup) FirstTenantForUser(ctx context.Context, userID uuid.UUID) (*uuid.UUID, error) {
|
||||||
|
return m.tenantID, m.err
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTenantResolver_FromHeader(t *testing.T) {
|
||||||
|
tenantID := uuid.New()
|
||||||
|
tr := NewTenantResolver(&mockTenantLookup{})
|
||||||
|
|
||||||
|
var gotTenantID uuid.UUID
|
||||||
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
id, ok := TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("tenant ID not in context")
|
||||||
|
}
|
||||||
|
gotTenantID = id
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
})
|
||||||
|
|
||||||
|
r := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
r.Header.Set("X-Tenant-ID", tenantID.String())
|
||||||
|
r = r.WithContext(ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
tr.Resolve(next).ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("expected 200, got %d", w.Code)
|
||||||
|
}
|
||||||
|
if gotTenantID != tenantID {
|
||||||
|
t.Errorf("expected tenant %s, got %s", tenantID, gotTenantID)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTenantResolver_DefaultsToFirst(t *testing.T) {
|
||||||
|
tenantID := uuid.New()
|
||||||
|
tr := NewTenantResolver(&mockTenantLookup{tenantID: &tenantID})
|
||||||
|
|
||||||
|
var gotTenantID uuid.UUID
|
||||||
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
id, _ := TenantFromContext(r.Context())
|
||||||
|
gotTenantID = id
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
})
|
||||||
|
|
||||||
|
r := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
r = r.WithContext(ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
tr.Resolve(next).ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("expected 200, got %d", w.Code)
|
||||||
|
}
|
||||||
|
if gotTenantID != tenantID {
|
||||||
|
t.Errorf("expected tenant %s, got %s", tenantID, gotTenantID)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTenantResolver_NoUser(t *testing.T) {
|
||||||
|
tr := NewTenantResolver(&mockTenantLookup{})
|
||||||
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
t.Fatal("next should not be called")
|
||||||
|
})
|
||||||
|
|
||||||
|
r := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
tr.Resolve(next).ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusUnauthorized {
|
||||||
|
t.Errorf("expected 401, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTenantResolver_InvalidHeader(t *testing.T) {
|
||||||
|
tr := NewTenantResolver(&mockTenantLookup{})
|
||||||
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
t.Fatal("next should not be called")
|
||||||
|
})
|
||||||
|
|
||||||
|
r := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
r.Header.Set("X-Tenant-ID", "not-a-uuid")
|
||||||
|
r = r.WithContext(ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
tr.Resolve(next).ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTenantResolver_NoTenantForUser(t *testing.T) {
|
||||||
|
tr := NewTenantResolver(&mockTenantLookup{tenantID: nil})
|
||||||
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
t.Fatal("next should not be called")
|
||||||
|
})
|
||||||
|
|
||||||
|
r := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
r = r.WithContext(ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
tr.Resolve(next).ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
44
backend/internal/config/config.go
Normal file
44
backend/internal/config/config.go
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Config struct {
|
||||||
|
Port string
|
||||||
|
DatabaseURL string
|
||||||
|
SupabaseURL string
|
||||||
|
SupabaseAnonKey string
|
||||||
|
SupabaseServiceKey string
|
||||||
|
SupabaseJWTSecret string
|
||||||
|
AnthropicAPIKey string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Load() (*Config, error) {
|
||||||
|
cfg := &Config{
|
||||||
|
Port: getEnv("PORT", "8080"),
|
||||||
|
DatabaseURL: os.Getenv("DATABASE_URL"),
|
||||||
|
SupabaseURL: os.Getenv("SUPABASE_URL"),
|
||||||
|
SupabaseAnonKey: os.Getenv("SUPABASE_ANON_KEY"),
|
||||||
|
SupabaseServiceKey: os.Getenv("SUPABASE_SERVICE_KEY"),
|
||||||
|
SupabaseJWTSecret: os.Getenv("SUPABASE_JWT_SECRET"),
|
||||||
|
AnthropicAPIKey: os.Getenv("ANTHROPIC_API_KEY"),
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.DatabaseURL == "" {
|
||||||
|
return nil, fmt.Errorf("DATABASE_URL is required")
|
||||||
|
}
|
||||||
|
if cfg.SupabaseJWTSecret == "" {
|
||||||
|
return nil, fmt.Errorf("SUPABASE_JWT_SECRET is required")
|
||||||
|
}
|
||||||
|
|
||||||
|
return cfg, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getEnv(key, fallback string) string {
|
||||||
|
if v := os.Getenv(key); v != "" {
|
||||||
|
return v
|
||||||
|
}
|
||||||
|
return fallback
|
||||||
|
}
|
||||||
26
backend/internal/db/connection.go
Normal file
26
backend/internal/db/connection.go
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
package db
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
_ "github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Connect(databaseURL string) (*sqlx.DB, error) {
|
||||||
|
db, err := sqlx.Connect("postgres", databaseURL)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("connecting to database: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set search_path so queries use kanzlai schema by default
|
||||||
|
if _, err := db.Exec("SET search_path TO kanzlai, public"); err != nil {
|
||||||
|
db.Close()
|
||||||
|
return nil, fmt.Errorf("setting search_path: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
db.SetMaxOpenConns(25)
|
||||||
|
db.SetMaxIdleConns(5)
|
||||||
|
|
||||||
|
return db, nil
|
||||||
|
}
|
||||||
115
backend/internal/handlers/ai.go
Normal file
115
backend/internal/handlers/ai.go
Normal file
@@ -0,0 +1,115 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AIHandler struct {
|
||||||
|
ai *services.AIService
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAIHandler(ai *services.AIService, db *sqlx.DB) *AIHandler {
|
||||||
|
return &AIHandler{ai: ai, db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ExtractDeadlines handles POST /api/ai/extract-deadlines
|
||||||
|
// Accepts either multipart/form-data with a "file" PDF field, or JSON {"text": "..."}.
|
||||||
|
func (h *AIHandler) ExtractDeadlines(w http.ResponseWriter, r *http.Request) {
|
||||||
|
contentType := r.Header.Get("Content-Type")
|
||||||
|
|
||||||
|
var pdfData []byte
|
||||||
|
var text string
|
||||||
|
|
||||||
|
// Check if multipart (PDF upload)
|
||||||
|
if len(contentType) >= 9 && contentType[:9] == "multipart" {
|
||||||
|
if err := r.ParseMultipartForm(32 << 20); err != nil { // 32MB max
|
||||||
|
writeError(w, http.StatusBadRequest, "failed to parse multipart form")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
file, _, err := r.FormFile("file")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "missing 'file' field in multipart form")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer file.Close()
|
||||||
|
|
||||||
|
pdfData, err = io.ReadAll(file)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "failed to read uploaded file")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Assume JSON body
|
||||||
|
var body struct {
|
||||||
|
Text string `json:"text"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
text = body.Text
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(pdfData) == 0 && text == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "provide either a PDF file or text")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlines, err := h.ai.ExtractDeadlines(r.Context(), pdfData, text)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "AI extraction failed: "+err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"deadlines": deadlines,
|
||||||
|
"count": len(deadlines),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// SummarizeCase handles POST /api/ai/summarize-case
|
||||||
|
// Accepts JSON {"case_id": "uuid"}.
|
||||||
|
func (h *AIHandler) SummarizeCase(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var body struct {
|
||||||
|
CaseID string `json:"case_id"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if body.CaseID == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "case_id is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := parseUUID(body.CaseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case_id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
summary, err := h.ai.SummarizeCase(r.Context(), tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "AI summarization failed: "+err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]string{
|
||||||
|
"case_id": caseID.String(),
|
||||||
|
"summary": summary,
|
||||||
|
})
|
||||||
|
}
|
||||||
205
backend/internal/handlers/appointments.go
Normal file
205
backend/internal/handlers/appointments.go
Normal file
@@ -0,0 +1,205 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AppointmentHandler struct {
|
||||||
|
svc *services.AppointmentService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAppointmentHandler(svc *services.AppointmentService) *AppointmentHandler {
|
||||||
|
return &AppointmentHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *AppointmentHandler) List(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
filter := services.AppointmentFilter{}
|
||||||
|
|
||||||
|
if v := r.URL.Query().Get("case_id"); v != "" {
|
||||||
|
id, err := uuid.Parse(v)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case_id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
filter.CaseID = &id
|
||||||
|
}
|
||||||
|
if v := r.URL.Query().Get("type"); v != "" {
|
||||||
|
filter.Type = &v
|
||||||
|
}
|
||||||
|
if v := r.URL.Query().Get("start_from"); v != "" {
|
||||||
|
t, err := time.Parse(time.RFC3339, v)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid start_from (use RFC3339)")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
filter.StartFrom = &t
|
||||||
|
}
|
||||||
|
if v := r.URL.Query().Get("start_to"); v != "" {
|
||||||
|
t, err := time.Parse(time.RFC3339, v)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid start_to (use RFC3339)")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
filter.StartTo = &t
|
||||||
|
}
|
||||||
|
|
||||||
|
appointments, err := h.svc.List(r.Context(), tenantID, filter)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to list appointments")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, appointments)
|
||||||
|
}
|
||||||
|
|
||||||
|
type createAppointmentRequest struct {
|
||||||
|
CaseID *uuid.UUID `json:"case_id"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
Description *string `json:"description"`
|
||||||
|
StartAt time.Time `json:"start_at"`
|
||||||
|
EndAt *time.Time `json:"end_at"`
|
||||||
|
Location *string `json:"location"`
|
||||||
|
AppointmentType *string `json:"appointment_type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *AppointmentHandler) Create(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req createAppointmentRequest
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.Title == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "title is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.StartAt.IsZero() {
|
||||||
|
writeError(w, http.StatusBadRequest, "start_at is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
appt := &models.Appointment{
|
||||||
|
TenantID: tenantID,
|
||||||
|
CaseID: req.CaseID,
|
||||||
|
Title: req.Title,
|
||||||
|
Description: req.Description,
|
||||||
|
StartAt: req.StartAt,
|
||||||
|
EndAt: req.EndAt,
|
||||||
|
Location: req.Location,
|
||||||
|
AppointmentType: req.AppointmentType,
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Create(r.Context(), appt); err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to create appointment")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, appt)
|
||||||
|
}
|
||||||
|
|
||||||
|
type updateAppointmentRequest struct {
|
||||||
|
CaseID *uuid.UUID `json:"case_id"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
Description *string `json:"description"`
|
||||||
|
StartAt time.Time `json:"start_at"`
|
||||||
|
EndAt *time.Time `json:"end_at"`
|
||||||
|
Location *string `json:"location"`
|
||||||
|
AppointmentType *string `json:"appointment_type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *AppointmentHandler) Update(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
id, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid appointment id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fetch existing to verify ownership
|
||||||
|
existing, err := h.svc.GetByID(r.Context(), tenantID, id)
|
||||||
|
if err != nil {
|
||||||
|
if errors.Is(err, sql.ErrNoRows) {
|
||||||
|
writeError(w, http.StatusNotFound, "appointment not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to fetch appointment")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req updateAppointmentRequest
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.Title == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "title is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.StartAt.IsZero() {
|
||||||
|
writeError(w, http.StatusBadRequest, "start_at is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
existing.CaseID = req.CaseID
|
||||||
|
existing.Title = req.Title
|
||||||
|
existing.Description = req.Description
|
||||||
|
existing.StartAt = req.StartAt
|
||||||
|
existing.EndAt = req.EndAt
|
||||||
|
existing.Location = req.Location
|
||||||
|
existing.AppointmentType = req.AppointmentType
|
||||||
|
|
||||||
|
if err := h.svc.Update(r.Context(), existing); err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to update appointment")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, existing)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *AppointmentHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
id, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid appointment id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Delete(r.Context(), tenantID, id); err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, "appointment not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
w.WriteHeader(http.StatusNoContent)
|
||||||
|
}
|
||||||
|
|
||||||
89
backend/internal/handlers/calculate.go
Normal file
89
backend/internal/handlers/calculate.go
Normal file
@@ -0,0 +1,89 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CalculateHandlers holds handlers for deadline calculation endpoints
|
||||||
|
type CalculateHandlers struct {
|
||||||
|
calculator *services.DeadlineCalculator
|
||||||
|
rules *services.DeadlineRuleService
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCalculateHandlers creates calculate handlers
|
||||||
|
func NewCalculateHandlers(calc *services.DeadlineCalculator, rules *services.DeadlineRuleService) *CalculateHandlers {
|
||||||
|
return &CalculateHandlers{calculator: calc, rules: rules}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalculateRequest is the input for POST /api/deadlines/calculate
|
||||||
|
type CalculateRequest struct {
|
||||||
|
ProceedingType string `json:"proceeding_type"`
|
||||||
|
TriggerEventDate string `json:"trigger_event_date"`
|
||||||
|
SelectedRuleIDs []string `json:"selected_rule_ids,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Calculate handles POST /api/deadlines/calculate
|
||||||
|
func (h *CalculateHandlers) Calculate(w http.ResponseWriter, r *http.Request) {
|
||||||
|
var req CalculateRequest
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.ProceedingType == "" || req.TriggerEventDate == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "proceeding_type and trigger_event_date are required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
eventDate, err := time.Parse("2006-01-02", req.TriggerEventDate)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid trigger_event_date format, expected YYYY-MM-DD")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var results []services.CalculatedDeadline
|
||||||
|
|
||||||
|
if len(req.SelectedRuleIDs) > 0 {
|
||||||
|
ruleModels, err := h.rules.GetByIDs(req.SelectedRuleIDs)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to fetch selected rules")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
results = h.calculator.CalculateFromRules(eventDate, ruleModels)
|
||||||
|
} else {
|
||||||
|
tree, err := h.rules.GetRuleTree(req.ProceedingType)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "unknown proceeding type")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// Flatten tree to get all rule models
|
||||||
|
var flatNodes []services.RuleTreeNode
|
||||||
|
flattenTree(tree, &flatNodes)
|
||||||
|
|
||||||
|
ruleModels := make([]models.DeadlineRule, 0, len(flatNodes))
|
||||||
|
for _, node := range flatNodes {
|
||||||
|
ruleModels = append(ruleModels, node.DeadlineRule)
|
||||||
|
}
|
||||||
|
results = h.calculator.CalculateFromRules(eventDate, ruleModels)
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"proceeding_type": req.ProceedingType,
|
||||||
|
"trigger_event_date": req.TriggerEventDate,
|
||||||
|
"deadlines": results,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func flattenTree(nodes []services.RuleTreeNode, result *[]services.RuleTreeNode) {
|
||||||
|
for _, n := range nodes {
|
||||||
|
*result = append(*result, n)
|
||||||
|
if len(n.Children) > 0 {
|
||||||
|
flattenTree(n.Children, result)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
68
backend/internal/handlers/caldav.go
Normal file
68
backend/internal/handlers/caldav.go
Normal file
@@ -0,0 +1,68 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CalDAVHandler handles CalDAV sync HTTP endpoints.
|
||||||
|
type CalDAVHandler struct {
|
||||||
|
svc *services.CalDAVService
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCalDAVHandler creates a new CalDAV handler.
|
||||||
|
func NewCalDAVHandler(svc *services.CalDAVService) *CalDAVHandler {
|
||||||
|
return &CalDAVHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
// TriggerSync handles POST /api/caldav/sync — triggers a full sync for the current tenant.
|
||||||
|
func (h *CalDAVHandler) TriggerSync(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "no tenant context")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg, err := h.svc.LoadTenantConfig(tenantID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
status, err := h.svc.SyncTenant(r.Context(), tenantID, *cfg)
|
||||||
|
if err != nil {
|
||||||
|
// Still return the status — it contains partial results + error info
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"status": "completed_with_errors",
|
||||||
|
"sync": status,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"status": "ok",
|
||||||
|
"sync": status,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetStatus handles GET /api/caldav/status — returns last sync status.
|
||||||
|
func (h *CalDAVHandler) GetStatus(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusUnauthorized, "no tenant context")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
status := h.svc.GetStatus(tenantID)
|
||||||
|
if status == nil {
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"status": "no_sync_yet",
|
||||||
|
"last_sync_at": nil,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, status)
|
||||||
|
}
|
||||||
158
backend/internal/handlers/cases.go
Normal file
158
backend/internal/handlers/cases.go
Normal file
@@ -0,0 +1,158 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseHandler struct {
|
||||||
|
svc *services.CaseService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCaseHandler(svc *services.CaseService) *CaseHandler {
|
||||||
|
return &CaseHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *CaseHandler) List(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
limit, _ := strconv.Atoi(r.URL.Query().Get("limit"))
|
||||||
|
offset, _ := strconv.Atoi(r.URL.Query().Get("offset"))
|
||||||
|
|
||||||
|
filter := services.CaseFilter{
|
||||||
|
Status: r.URL.Query().Get("status"),
|
||||||
|
Type: r.URL.Query().Get("type"),
|
||||||
|
Search: r.URL.Query().Get("search"),
|
||||||
|
Limit: limit,
|
||||||
|
Offset: offset,
|
||||||
|
}
|
||||||
|
|
||||||
|
cases, total, err := h.svc.List(r.Context(), tenantID, filter)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]interface{}{
|
||||||
|
"cases": cases,
|
||||||
|
"total": total,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *CaseHandler) Create(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
var input services.CreateCaseInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid JSON body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if input.CaseNumber == "" || input.Title == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "case_number and title are required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
c, err := h.svc.Create(r.Context(), tenantID, userID, input)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, c)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *CaseHandler) Get(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
detail, err := h.svc.GetByID(r.Context(), tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if detail == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "case not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, detail)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *CaseHandler) Update(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var input services.UpdateCaseInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid JSON body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
updated, err := h.svc.Update(r.Context(), tenantID, caseID, userID, input)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if updated == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "case not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, updated)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *CaseHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Delete(r.Context(), tenantID, caseID, userID); err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, "case not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]string{"status": "archived"})
|
||||||
|
}
|
||||||
32
backend/internal/handlers/dashboard.go
Normal file
32
backend/internal/handlers/dashboard.go
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DashboardHandler struct {
|
||||||
|
svc *services.DashboardService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDashboardHandler(svc *services.DashboardService) *DashboardHandler {
|
||||||
|
return &DashboardHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DashboardHandler) Get(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
data, err := h.svc.Get(r.Context(), tenantID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, data)
|
||||||
|
}
|
||||||
69
backend/internal/handlers/deadline_rules.go
Normal file
69
backend/internal/handlers/deadline_rules.go
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeadlineRuleHandlers holds handlers for deadline rule endpoints
|
||||||
|
type DeadlineRuleHandlers struct {
|
||||||
|
rules *services.DeadlineRuleService
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDeadlineRuleHandlers creates deadline rule handlers
|
||||||
|
func NewDeadlineRuleHandlers(rs *services.DeadlineRuleService) *DeadlineRuleHandlers {
|
||||||
|
return &DeadlineRuleHandlers{rules: rs}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List handles GET /api/deadline-rules
|
||||||
|
// Query params: proceeding_type_id (optional int filter)
|
||||||
|
func (h *DeadlineRuleHandlers) List(w http.ResponseWriter, r *http.Request) {
|
||||||
|
var proceedingTypeID *int
|
||||||
|
if v := r.URL.Query().Get("proceeding_type_id"); v != "" {
|
||||||
|
id, err := strconv.Atoi(v)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid proceeding_type_id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
proceedingTypeID = &id
|
||||||
|
}
|
||||||
|
|
||||||
|
rules, err := h.rules.List(proceedingTypeID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to list deadline rules")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, rules)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListProceedingTypes handles GET /api/proceeding-types
|
||||||
|
func (h *DeadlineRuleHandlers) ListProceedingTypes(w http.ResponseWriter, r *http.Request) {
|
||||||
|
types, err := h.rules.ListProceedingTypes()
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to list proceeding types")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, types)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRuleTree handles GET /api/deadline-rules/{type}
|
||||||
|
// {type} is the proceeding type code (e.g., "INF", "REV")
|
||||||
|
func (h *DeadlineRuleHandlers) GetRuleTree(w http.ResponseWriter, r *http.Request) {
|
||||||
|
typeCode := r.PathValue("type")
|
||||||
|
if typeCode == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "proceeding type code required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tree, err := h.rules.GetRuleTree(typeCode)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, "proceeding type not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, tree)
|
||||||
|
}
|
||||||
179
backend/internal/handlers/deadlines.go
Normal file
179
backend/internal/handlers/deadlines.go
Normal file
@@ -0,0 +1,179 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeadlineHandlers holds handlers for deadline CRUD endpoints
|
||||||
|
type DeadlineHandlers struct {
|
||||||
|
deadlines *services.DeadlineService
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDeadlineHandlers creates deadline handlers
|
||||||
|
func NewDeadlineHandlers(ds *services.DeadlineService, db *sqlx.DB) *DeadlineHandlers {
|
||||||
|
return &DeadlineHandlers{deadlines: ds, db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListAll handles GET /api/deadlines
|
||||||
|
func (h *DeadlineHandlers) ListAll(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlines, err := h.deadlines.ListAll(tenantID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to list deadlines")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, deadlines)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListForCase handles GET /api/cases/{caseID}/deadlines
|
||||||
|
func (h *DeadlineHandlers) ListForCase(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := parsePathUUID(r, "caseID")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlines, err := h.deadlines.ListForCase(tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to list deadlines")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, deadlines)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create handles POST /api/cases/{caseID}/deadlines
|
||||||
|
func (h *DeadlineHandlers) Create(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := parsePathUUID(r, "caseID")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var input services.CreateDeadlineInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
input.CaseID = caseID
|
||||||
|
|
||||||
|
if input.Title == "" || input.DueDate == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "title and due_date are required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadline, err := h.deadlines.Create(tenantID, input)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to create deadline")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, deadline)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update handles PUT /api/deadlines/{deadlineID}
|
||||||
|
func (h *DeadlineHandlers) Update(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlineID, err := parsePathUUID(r, "deadlineID")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid deadline ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var input services.UpdateDeadlineInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadline, err := h.deadlines.Update(tenantID, deadlineID, input)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to update deadline")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if deadline == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "deadline not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, deadline)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Complete handles PATCH /api/deadlines/{deadlineID}/complete
|
||||||
|
func (h *DeadlineHandlers) Complete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlineID, err := parsePathUUID(r, "deadlineID")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid deadline ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadline, err := h.deadlines.Complete(tenantID, deadlineID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, "failed to complete deadline")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if deadline == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "deadline not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, deadline)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete handles DELETE /api/deadlines/{deadlineID}
|
||||||
|
func (h *DeadlineHandlers) Delete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, err := resolveTenant(r, h.db)
|
||||||
|
if err != nil {
|
||||||
|
handleTenantError(w, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlineID, err := parsePathUUID(r, "deadlineID")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid deadline ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
err = h.deadlines.Delete(tenantID, deadlineID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]string{"status": "deleted"})
|
||||||
|
}
|
||||||
183
backend/internal/handlers/documents.go
Normal file
183
backend/internal/handlers/documents.go
Normal file
@@ -0,0 +1,183 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
const maxUploadSize = 50 << 20 // 50 MB
|
||||||
|
|
||||||
|
type DocumentHandler struct {
|
||||||
|
svc *services.DocumentService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDocumentHandler(svc *services.DocumentService) *DocumentHandler {
|
||||||
|
return &DocumentHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DocumentHandler) ListByCase(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
docs, err := h.svc.ListByCase(r.Context(), tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"documents": docs,
|
||||||
|
"total": len(docs),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DocumentHandler) Upload(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
r.Body = http.MaxBytesReader(w, r.Body, maxUploadSize)
|
||||||
|
if err := r.ParseMultipartForm(maxUploadSize); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "file too large or invalid multipart form")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
file, header, err := r.FormFile("file")
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "missing file field")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer file.Close()
|
||||||
|
|
||||||
|
title := r.FormValue("title")
|
||||||
|
if title == "" {
|
||||||
|
title = header.Filename
|
||||||
|
}
|
||||||
|
|
||||||
|
contentType := header.Header.Get("Content-Type")
|
||||||
|
if contentType == "" {
|
||||||
|
contentType = "application/octet-stream"
|
||||||
|
}
|
||||||
|
|
||||||
|
input := services.CreateDocumentInput{
|
||||||
|
Title: title,
|
||||||
|
DocType: r.FormValue("doc_type"),
|
||||||
|
Filename: header.Filename,
|
||||||
|
ContentType: contentType,
|
||||||
|
Size: int(header.Size),
|
||||||
|
Data: file,
|
||||||
|
}
|
||||||
|
|
||||||
|
doc, err := h.svc.Create(r.Context(), tenantID, caseID, userID, input)
|
||||||
|
if err != nil {
|
||||||
|
if err.Error() == "case not found" {
|
||||||
|
writeError(w, http.StatusNotFound, "case not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, doc)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DocumentHandler) Download(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
docID, err := uuid.Parse(r.PathValue("docId"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid document ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
body, contentType, title, err := h.svc.Download(r.Context(), tenantID, docID)
|
||||||
|
if err != nil {
|
||||||
|
if err.Error() == "document not found" || err.Error() == "document has no file" {
|
||||||
|
writeError(w, http.StatusNotFound, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer body.Close()
|
||||||
|
|
||||||
|
w.Header().Set("Content-Type", contentType)
|
||||||
|
w.Header().Set("Content-Disposition", fmt.Sprintf(`attachment; filename="%s"`, title))
|
||||||
|
io.Copy(w, body)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DocumentHandler) GetMeta(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
docID, err := uuid.Parse(r.PathValue("docId"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid document ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
doc, err := h.svc.GetByID(r.Context(), tenantID, docID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if doc == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "document not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, doc)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *DocumentHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
docID, err := uuid.Parse(r.PathValue("docId"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid document ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Delete(r.Context(), tenantID, docID, userID); err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, "document not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]string{"status": "deleted"})
|
||||||
|
}
|
||||||
90
backend/internal/handlers/helpers.go
Normal file
90
backend/internal/handlers/helpers.go
Normal file
@@ -0,0 +1,90 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
)
|
||||||
|
|
||||||
|
func writeJSON(w http.ResponseWriter, status int, v any) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(status)
|
||||||
|
json.NewEncoder(w).Encode(v)
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeError(w http.ResponseWriter, status int, msg string) {
|
||||||
|
writeJSON(w, status, map[string]string{"error": msg})
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolveTenant gets the tenant ID for the authenticated user.
|
||||||
|
// Checks X-Tenant-ID header first, then falls back to user's first tenant.
|
||||||
|
func resolveTenant(r *http.Request, db *sqlx.DB) (uuid.UUID, error) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
return uuid.Nil, errUnauthorized
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check header first
|
||||||
|
if headerVal := r.Header.Get("X-Tenant-ID"); headerVal != "" {
|
||||||
|
tenantID, err := uuid.Parse(headerVal)
|
||||||
|
if err != nil {
|
||||||
|
return uuid.Nil, errInvalidTenant
|
||||||
|
}
|
||||||
|
// Verify user has access to this tenant
|
||||||
|
var count int
|
||||||
|
err = db.Get(&count,
|
||||||
|
`SELECT COUNT(*) FROM user_tenants WHERE user_id = $1 AND tenant_id = $2`,
|
||||||
|
userID, tenantID)
|
||||||
|
if err != nil || count == 0 {
|
||||||
|
return uuid.Nil, errTenantAccess
|
||||||
|
}
|
||||||
|
return tenantID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fall back to user's first tenant
|
||||||
|
var tenantID uuid.UUID
|
||||||
|
err := db.Get(&tenantID,
|
||||||
|
`SELECT tenant_id FROM user_tenants WHERE user_id = $1 ORDER BY created_at LIMIT 1`,
|
||||||
|
userID)
|
||||||
|
if err != nil {
|
||||||
|
return uuid.Nil, errNoTenant
|
||||||
|
}
|
||||||
|
return tenantID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type apiError struct {
|
||||||
|
msg string
|
||||||
|
status int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *apiError) Error() string { return e.msg }
|
||||||
|
|
||||||
|
var (
|
||||||
|
errUnauthorized = &apiError{msg: "unauthorized", status: http.StatusUnauthorized}
|
||||||
|
errInvalidTenant = &apiError{msg: "invalid tenant ID", status: http.StatusBadRequest}
|
||||||
|
errTenantAccess = &apiError{msg: "no access to tenant", status: http.StatusForbidden}
|
||||||
|
errNoTenant = &apiError{msg: "no tenant found for user", status: http.StatusBadRequest}
|
||||||
|
)
|
||||||
|
|
||||||
|
// handleTenantError writes the appropriate error response for tenant resolution errors
|
||||||
|
func handleTenantError(w http.ResponseWriter, err error) {
|
||||||
|
if ae, ok := err.(*apiError); ok {
|
||||||
|
writeError(w, ae.status, ae.msg)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeError(w, http.StatusInternalServerError, "internal error")
|
||||||
|
}
|
||||||
|
|
||||||
|
// parsePathUUID extracts a UUID from the URL path using PathValue
|
||||||
|
func parsePathUUID(r *http.Request, key string) (uuid.UUID, error) {
|
||||||
|
return uuid.Parse(r.PathValue(key))
|
||||||
|
}
|
||||||
|
|
||||||
|
// parseUUID parses a UUID string
|
||||||
|
func parseUUID(s string) (uuid.UUID, error) {
|
||||||
|
return uuid.Parse(s)
|
||||||
|
}
|
||||||
134
backend/internal/handlers/parties.go
Normal file
134
backend/internal/handlers/parties.go
Normal file
@@ -0,0 +1,134 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type PartyHandler struct {
|
||||||
|
svc *services.PartyService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewPartyHandler(svc *services.PartyService) *PartyHandler {
|
||||||
|
return &PartyHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *PartyHandler) List(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
parties, err := h.svc.ListByCase(r.Context(), tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]interface{}{
|
||||||
|
"parties": parties,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *PartyHandler) Create(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var input services.CreatePartyInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid JSON body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if input.Name == "" {
|
||||||
|
writeError(w, http.StatusBadRequest, "name is required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
party, err := h.svc.Create(r.Context(), tenantID, caseID, userID, input)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
writeError(w, http.StatusNotFound, "case not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, party)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *PartyHandler) Update(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
partyID, err := uuid.Parse(r.PathValue("partyId"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid party ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var input services.UpdatePartyInput
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid JSON body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
updated, err := h.svc.Update(r.Context(), tenantID, partyID, input)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if updated == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "party not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, updated)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *PartyHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
partyID, err := uuid.Parse(r.PathValue("partyId"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid party ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Delete(r.Context(), tenantID, partyID); err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, "party not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
w.WriteHeader(http.StatusNoContent)
|
||||||
|
}
|
||||||
243
backend/internal/handlers/tenant_handler.go
Normal file
243
backend/internal/handlers/tenant_handler.go
Normal file
@@ -0,0 +1,243 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
type TenantHandler struct {
|
||||||
|
svc *services.TenantService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTenantHandler(svc *services.TenantService) *TenantHandler {
|
||||||
|
return &TenantHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateTenant handles POST /api/tenants
|
||||||
|
func (h *TenantHandler) CreateTenant(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req struct {
|
||||||
|
Name string `json:"name"`
|
||||||
|
Slug string `json:"slug"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
jsonError(w, "invalid request body", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.Name == "" || req.Slug == "" {
|
||||||
|
jsonError(w, "name and slug are required", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenant, err := h.svc.Create(r.Context(), userID, req.Name, req.Slug)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, tenant, http.StatusCreated)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListTenants handles GET /api/tenants
|
||||||
|
func (h *TenantHandler) ListTenants(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenants, err := h.svc.ListForUser(r.Context(), userID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, tenants, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetTenant handles GET /api/tenants/{id}
|
||||||
|
func (h *TenantHandler) GetTenant(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenantID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid tenant ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify user has access to this tenant
|
||||||
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role == "" {
|
||||||
|
jsonError(w, "not found", http.StatusNotFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenant, err := h.svc.GetByID(r.Context(), tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if tenant == nil {
|
||||||
|
jsonError(w, "not found", http.StatusNotFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, tenant, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
// InviteUser handles POST /api/tenants/{id}/invite
|
||||||
|
func (h *TenantHandler) InviteUser(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenantID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid tenant ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only owners and admins can invite
|
||||||
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role != "owner" && role != "admin" {
|
||||||
|
jsonError(w, "only owners and admins can invite users", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req struct {
|
||||||
|
Email string `json:"email"`
|
||||||
|
Role string `json:"role"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
jsonError(w, "invalid request body", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.Email == "" {
|
||||||
|
jsonError(w, "email is required", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if req.Role == "" {
|
||||||
|
req.Role = "member"
|
||||||
|
}
|
||||||
|
if req.Role != "member" && req.Role != "admin" {
|
||||||
|
jsonError(w, "role must be member or admin", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ut, err := h.svc.InviteByEmail(r.Context(), tenantID, req.Email, req.Role)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, ut, http.StatusCreated)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoveMember handles DELETE /api/tenants/{id}/members/{uid}
|
||||||
|
func (h *TenantHandler) RemoveMember(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenantID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid tenant ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
memberID, err := uuid.Parse(r.PathValue("uid"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid member ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only owners and admins can remove members (or user removing themselves)
|
||||||
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role != "owner" && role != "admin" && userID != memberID {
|
||||||
|
jsonError(w, "insufficient permissions", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.RemoveMember(r.Context(), tenantID, memberID); err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, map[string]string{"status": "removed"}, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListMembers handles GET /api/tenants/{id}/members
|
||||||
|
func (h *TenantHandler) ListMembers(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenantID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid tenant ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify user has access
|
||||||
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role == "" {
|
||||||
|
jsonError(w, "not found", http.StatusNotFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
members, err := h.svc.ListMembers(r.Context(), tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, members, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
func jsonResponse(w http.ResponseWriter, data interface{}, status int) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(status)
|
||||||
|
json.NewEncoder(w).Encode(data)
|
||||||
|
}
|
||||||
|
|
||||||
|
func jsonError(w http.ResponseWriter, msg string, status int) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(status)
|
||||||
|
json.NewEncoder(w).Encode(map[string]string{"error": msg})
|
||||||
|
}
|
||||||
132
backend/internal/handlers/tenant_handler_test.go
Normal file
132
backend/internal/handlers/tenant_handler_test.go
Normal file
@@ -0,0 +1,132 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCreateTenant_MissingFields(t *testing.T) {
|
||||||
|
h := &TenantHandler{} // no service needed for validation
|
||||||
|
|
||||||
|
// Build request with auth context
|
||||||
|
body := `{"name":"","slug":""}`
|
||||||
|
r := httptest.NewRequest("POST", "/api/tenants", bytes.NewBufferString(body))
|
||||||
|
r = r.WithContext(auth.ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.CreateTenant(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
|
||||||
|
var resp map[string]string
|
||||||
|
json.NewDecoder(w.Body).Decode(&resp)
|
||||||
|
if resp["error"] != "name and slug are required" {
|
||||||
|
t.Errorf("unexpected error: %s", resp["error"])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateTenant_NoAuth(t *testing.T) {
|
||||||
|
h := &TenantHandler{}
|
||||||
|
r := httptest.NewRequest("POST", "/api/tenants", bytes.NewBufferString(`{}`))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.CreateTenant(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusUnauthorized {
|
||||||
|
t.Errorf("expected 401, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetTenant_InvalidID(t *testing.T) {
|
||||||
|
h := &TenantHandler{}
|
||||||
|
r := httptest.NewRequest("GET", "/api/tenants/not-a-uuid", nil)
|
||||||
|
r.SetPathValue("id", "not-a-uuid")
|
||||||
|
r = r.WithContext(auth.ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.GetTenant(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestInviteUser_InvalidTenantID(t *testing.T) {
|
||||||
|
h := &TenantHandler{}
|
||||||
|
body := `{"email":"test@example.com","role":"member"}`
|
||||||
|
r := httptest.NewRequest("POST", "/api/tenants/bad/invite", bytes.NewBufferString(body))
|
||||||
|
r.SetPathValue("id", "bad")
|
||||||
|
r = r.WithContext(auth.ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.InviteUser(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestInviteUser_NoAuth(t *testing.T) {
|
||||||
|
h := &TenantHandler{}
|
||||||
|
body := `{"email":"test@example.com"}`
|
||||||
|
r := httptest.NewRequest("POST", "/api/tenants/"+uuid.New().String()+"/invite", bytes.NewBufferString(body))
|
||||||
|
r.SetPathValue("id", uuid.New().String())
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.InviteUser(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusUnauthorized {
|
||||||
|
t.Errorf("expected 401, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRemoveMember_InvalidIDs(t *testing.T) {
|
||||||
|
h := &TenantHandler{}
|
||||||
|
r := httptest.NewRequest("DELETE", "/api/tenants/bad/members/bad", nil)
|
||||||
|
r.SetPathValue("id", "bad")
|
||||||
|
r.SetPathValue("uid", "bad")
|
||||||
|
r = r.WithContext(auth.ContextWithUserID(r.Context(), uuid.New()))
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
h.RemoveMember(w, r)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestJsonResponse(t *testing.T) {
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
jsonResponse(w, map[string]string{"key": "value"}, http.StatusOK)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Errorf("expected 200, got %d", w.Code)
|
||||||
|
}
|
||||||
|
if ct := w.Header().Get("Content-Type"); ct != "application/json" {
|
||||||
|
t.Errorf("expected application/json, got %s", ct)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestJsonError(t *testing.T) {
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
jsonError(w, "something went wrong", http.StatusBadRequest)
|
||||||
|
|
||||||
|
if w.Code != http.StatusBadRequest {
|
||||||
|
t.Errorf("expected 400, got %d", w.Code)
|
||||||
|
}
|
||||||
|
|
||||||
|
var resp map[string]string
|
||||||
|
json.NewDecoder(w.Body).Decode(&resp)
|
||||||
|
if resp["error"] != "something went wrong" {
|
||||||
|
t.Errorf("unexpected error: %s", resp["error"])
|
||||||
|
}
|
||||||
|
}
|
||||||
273
backend/internal/integration_test.go
Normal file
273
backend/internal/integration_test.go
Normal file
@@ -0,0 +1,273 @@
|
|||||||
|
package internal_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/config"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/db"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/router"
|
||||||
|
|
||||||
|
"github.com/golang-jwt/jwt/v5"
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
// testServer sets up the full router with a real DB connection.
|
||||||
|
// Requires DATABASE_URL and SUPABASE_JWT_SECRET env vars.
|
||||||
|
func testServer(t *testing.T) (http.Handler, func()) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
dbURL := os.Getenv("DATABASE_URL")
|
||||||
|
if dbURL == "" {
|
||||||
|
t.Skip("DATABASE_URL not set, skipping integration test")
|
||||||
|
}
|
||||||
|
jwtSecret := os.Getenv("SUPABASE_JWT_SECRET")
|
||||||
|
if jwtSecret == "" {
|
||||||
|
jwtSecret = "test-jwt-secret-for-integration-tests"
|
||||||
|
os.Setenv("SUPABASE_JWT_SECRET", jwtSecret)
|
||||||
|
}
|
||||||
|
|
||||||
|
database, err := db.Connect(dbURL)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("connecting to database: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := &config.Config{
|
||||||
|
Port: "0",
|
||||||
|
DatabaseURL: dbURL,
|
||||||
|
SupabaseJWTSecret: jwtSecret,
|
||||||
|
}
|
||||||
|
|
||||||
|
authMW := auth.NewMiddleware(jwtSecret, database)
|
||||||
|
handler := router.New(database, authMW, cfg, nil)
|
||||||
|
|
||||||
|
return handler, func() { database.Close() }
|
||||||
|
}
|
||||||
|
|
||||||
|
// createTestJWT creates a JWT for the given user ID, signed with the test secret.
|
||||||
|
func createTestJWT(t *testing.T, userID uuid.UUID) string {
|
||||||
|
t.Helper()
|
||||||
|
secret := os.Getenv("SUPABASE_JWT_SECRET")
|
||||||
|
if secret == "" {
|
||||||
|
secret = "test-jwt-secret-for-integration-tests"
|
||||||
|
}
|
||||||
|
|
||||||
|
claims := jwt.MapClaims{
|
||||||
|
"sub": userID.String(),
|
||||||
|
"aud": "authenticated",
|
||||||
|
"exp": time.Now().Add(1 * time.Hour).Unix(),
|
||||||
|
"iat": time.Now().Unix(),
|
||||||
|
}
|
||||||
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||||
|
signed, err := token.SignedString([]byte(secret))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("signing JWT: %v", err)
|
||||||
|
}
|
||||||
|
return signed
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupTestTenant creates a temporary tenant and user_tenant for testing.
|
||||||
|
// Returns tenantID and userID. Cleans up on test completion.
|
||||||
|
func setupTestTenant(t *testing.T, handler http.Handler) (tenantID, userID uuid.UUID) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
dbURL := os.Getenv("DATABASE_URL")
|
||||||
|
database, err := db.Connect(dbURL)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("connecting to database for setup: %v", err)
|
||||||
|
}
|
||||||
|
defer database.Close()
|
||||||
|
|
||||||
|
tenantID = uuid.New()
|
||||||
|
userID = uuid.New()
|
||||||
|
|
||||||
|
_, err = database.Exec(`INSERT INTO tenants (id, name, slug) VALUES ($1, $2, $3)`,
|
||||||
|
tenantID, "Integration Test Kanzlei "+tenantID.String()[:8], "test-"+tenantID.String()[:8])
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("creating test tenant: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create a user in auth.users so JWT auth works
|
||||||
|
_, err = database.Exec(`INSERT INTO auth.users (id, instance_id, role, aud, email, encrypted_password, email_confirmed_at, created_at, updated_at, confirmation_token, recovery_token)
|
||||||
|
VALUES ($1, '00000000-0000-0000-0000-000000000000', 'authenticated', 'authenticated', $2, '', NOW(), NOW(), NOW(), '', '')`,
|
||||||
|
userID, fmt.Sprintf("test-%s@kanzlai.test", userID.String()[:8]))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("creating test user: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = database.Exec(`INSERT INTO user_tenants (user_id, tenant_id, role) VALUES ($1, $2, 'owner')`,
|
||||||
|
userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("creating user_tenant: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Cleanup(func() {
|
||||||
|
cleanupDB, _ := db.Connect(dbURL)
|
||||||
|
if cleanupDB != nil {
|
||||||
|
cleanupDB.Exec(`DELETE FROM case_events WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM deadlines WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM appointments WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM parties WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM documents WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM cases WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM user_tenants WHERE tenant_id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM tenants WHERE id = $1`, tenantID)
|
||||||
|
cleanupDB.Exec(`DELETE FROM auth.users WHERE id = $1`, userID)
|
||||||
|
cleanupDB.Close()
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
return tenantID, userID
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestHealthEndpoint(t *testing.T) {
|
||||||
|
handler, cleanup := testServer(t)
|
||||||
|
defer cleanup()
|
||||||
|
|
||||||
|
req := httptest.NewRequest("GET", "/health", nil)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("expected 200, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var resp map[string]string
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
||||||
|
if resp["status"] != "ok" {
|
||||||
|
t.Fatalf("expected status ok, got %v", resp)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCriticalPath_CreateCase_AddDeadline_Dashboard(t *testing.T) {
|
||||||
|
handler, cleanup := testServer(t)
|
||||||
|
defer cleanup()
|
||||||
|
|
||||||
|
_, userID := setupTestTenant(t, handler)
|
||||||
|
token := createTestJWT(t, userID)
|
||||||
|
|
||||||
|
// Step 1: Create a case
|
||||||
|
caseBody := `{"case_number":"TEST/001","title":"Integration Test — Patentverletzung","case_type":"patent","court":"UPC München"}`
|
||||||
|
req := httptest.NewRequest("POST", "/api/cases", bytes.NewBufferString(caseBody))
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
req.Header.Set("Authorization", "Bearer "+token)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusCreated {
|
||||||
|
t.Fatalf("create case: expected 201, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var createdCase map[string]interface{}
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &createdCase)
|
||||||
|
caseID, ok := createdCase["id"].(string)
|
||||||
|
if !ok || caseID == "" {
|
||||||
|
t.Fatalf("create case: missing ID in response: %v", createdCase)
|
||||||
|
}
|
||||||
|
t.Logf("Created case: %s", caseID)
|
||||||
|
|
||||||
|
// Step 2: List cases — verify our case is there
|
||||||
|
req = httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
req.Header.Set("Authorization", "Bearer "+token)
|
||||||
|
w = httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("list cases: expected 200, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var caseList map[string]interface{}
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &caseList)
|
||||||
|
total := caseList["total"].(float64)
|
||||||
|
if total < 1 {
|
||||||
|
t.Fatalf("list cases: expected at least 1 case, got %.0f", total)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 3: Add a deadline to the case
|
||||||
|
dueDate := time.Now().AddDate(0, 0, 14).Format("2006-01-02")
|
||||||
|
warnDate := time.Now().AddDate(0, 0, 10).Format("2006-01-02")
|
||||||
|
deadlineBody := fmt.Sprintf(`{"title":"Klageerwiderung einreichen","due_date":"%s","warning_date":"%s","source":"manual"}`, dueDate, warnDate)
|
||||||
|
req = httptest.NewRequest("POST", "/api/cases/"+caseID+"/deadlines", bytes.NewBufferString(deadlineBody))
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
req.Header.Set("Authorization", "Bearer "+token)
|
||||||
|
w = httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusCreated {
|
||||||
|
t.Fatalf("create deadline: expected 201, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var createdDeadline map[string]interface{}
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &createdDeadline)
|
||||||
|
deadlineID, ok := createdDeadline["id"].(string)
|
||||||
|
if !ok || deadlineID == "" {
|
||||||
|
t.Fatalf("create deadline: missing ID in response: %v", createdDeadline)
|
||||||
|
}
|
||||||
|
t.Logf("Created deadline: %s", deadlineID)
|
||||||
|
|
||||||
|
// Step 4: Verify deadline appears in case deadlines
|
||||||
|
req = httptest.NewRequest("GET", "/api/cases/"+caseID+"/deadlines", nil)
|
||||||
|
req.Header.Set("Authorization", "Bearer "+token)
|
||||||
|
w = httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("list deadlines: expected 200, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var deadlines []interface{}
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &deadlines)
|
||||||
|
if len(deadlines) < 1 {
|
||||||
|
t.Fatalf("list deadlines: expected at least 1, got %d", len(deadlines))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 5: Fetch dashboard — should include our case and deadline
|
||||||
|
req = httptest.NewRequest("GET", "/api/dashboard", nil)
|
||||||
|
req.Header.Set("Authorization", "Bearer "+token)
|
||||||
|
w = httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("dashboard: expected 200, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
var dashboard map[string]interface{}
|
||||||
|
json.Unmarshal(w.Body.Bytes(), &dashboard)
|
||||||
|
|
||||||
|
// Verify dashboard has expected sections
|
||||||
|
for _, key := range []string{"deadline_summary", "case_summary", "upcoming_deadlines"} {
|
||||||
|
if _, exists := dashboard[key]; !exists {
|
||||||
|
t.Errorf("dashboard: missing key %q in response", key)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify case_summary shows at least 1 active case
|
||||||
|
if cs, ok := dashboard["case_summary"].(map[string]interface{}); ok {
|
||||||
|
if active, ok := cs["active"].(float64); ok && active < 1 {
|
||||||
|
t.Errorf("dashboard: expected at least 1 active case, got %.0f", active)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Logf("Full critical path passed: auth -> create case -> add deadline -> dashboard")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUnauthenticatedAccess(t *testing.T) {
|
||||||
|
handler, cleanup := testServer(t)
|
||||||
|
defer cleanup()
|
||||||
|
|
||||||
|
// Accessing API without token should return 401
|
||||||
|
req := httptest.NewRequest("GET", "/api/cases", nil)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
|
||||||
|
if w.Code != http.StatusUnauthorized {
|
||||||
|
t.Fatalf("expected 401, got %d: %s", w.Code, w.Body.String())
|
||||||
|
}
|
||||||
|
}
|
||||||
14
backend/internal/logging/logging.go
Normal file
14
backend/internal/logging/logging.go
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
package logging
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log/slog"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Setup initializes the global slog logger with JSON output for production.
|
||||||
|
func Setup() {
|
||||||
|
handler := slog.NewJSONHandler(os.Stdout, &slog.HandlerOptions{
|
||||||
|
Level: slog.LevelInfo,
|
||||||
|
})
|
||||||
|
slog.SetDefault(slog.New(handler))
|
||||||
|
}
|
||||||
98
backend/internal/middleware/ratelimit.go
Normal file
98
backend/internal/middleware/ratelimit.go
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
package middleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log/slog"
|
||||||
|
"net/http"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TokenBucket implements a simple per-IP token bucket rate limiter.
|
||||||
|
type TokenBucket struct {
|
||||||
|
mu sync.Mutex
|
||||||
|
buckets map[string]*bucket
|
||||||
|
rate float64 // tokens per second
|
||||||
|
burst int // max tokens
|
||||||
|
}
|
||||||
|
|
||||||
|
type bucket struct {
|
||||||
|
tokens float64
|
||||||
|
lastTime time.Time
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewTokenBucket creates a rate limiter allowing rate requests per second with burst capacity.
|
||||||
|
func NewTokenBucket(rate float64, burst int) *TokenBucket {
|
||||||
|
tb := &TokenBucket{
|
||||||
|
buckets: make(map[string]*bucket),
|
||||||
|
rate: rate,
|
||||||
|
burst: burst,
|
||||||
|
}
|
||||||
|
// Periodically clean up stale buckets
|
||||||
|
go tb.cleanup()
|
||||||
|
return tb
|
||||||
|
}
|
||||||
|
|
||||||
|
func (tb *TokenBucket) allow(key string) bool {
|
||||||
|
tb.mu.Lock()
|
||||||
|
defer tb.mu.Unlock()
|
||||||
|
|
||||||
|
b, ok := tb.buckets[key]
|
||||||
|
if !ok {
|
||||||
|
b = &bucket{tokens: float64(tb.burst), lastTime: time.Now()}
|
||||||
|
tb.buckets[key] = b
|
||||||
|
}
|
||||||
|
|
||||||
|
now := time.Now()
|
||||||
|
elapsed := now.Sub(b.lastTime).Seconds()
|
||||||
|
b.tokens += elapsed * tb.rate
|
||||||
|
if b.tokens > float64(tb.burst) {
|
||||||
|
b.tokens = float64(tb.burst)
|
||||||
|
}
|
||||||
|
b.lastTime = now
|
||||||
|
|
||||||
|
if b.tokens < 1 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
b.tokens--
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func (tb *TokenBucket) cleanup() {
|
||||||
|
ticker := time.NewTicker(5 * time.Minute)
|
||||||
|
defer ticker.Stop()
|
||||||
|
for range ticker.C {
|
||||||
|
tb.mu.Lock()
|
||||||
|
cutoff := time.Now().Add(-10 * time.Minute)
|
||||||
|
for key, b := range tb.buckets {
|
||||||
|
if b.lastTime.Before(cutoff) {
|
||||||
|
delete(tb.buckets, key)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
tb.mu.Unlock()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Limit wraps an http.Handler with rate limiting.
|
||||||
|
func (tb *TokenBucket) Limit(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
ip := r.Header.Get("X-Forwarded-For")
|
||||||
|
if ip == "" {
|
||||||
|
ip = r.RemoteAddr
|
||||||
|
}
|
||||||
|
if !tb.allow(ip) {
|
||||||
|
slog.Warn("rate limit exceeded", "ip", ip, "path", r.URL.Path)
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.Header().Set("Retry-After", "10")
|
||||||
|
w.WriteHeader(http.StatusTooManyRequests)
|
||||||
|
w.Write([]byte(`{"error":"rate limit exceeded, try again later"}`))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// LimitFunc wraps an http.HandlerFunc with rate limiting.
|
||||||
|
func (tb *TokenBucket) LimitFunc(next http.HandlerFunc) http.HandlerFunc {
|
||||||
|
limited := tb.Limit(http.HandlerFunc(next))
|
||||||
|
return limited.ServeHTTP
|
||||||
|
}
|
||||||
70
backend/internal/middleware/ratelimit_test.go
Normal file
70
backend/internal/middleware/ratelimit_test.go
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
package middleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestTokenBucket_AllowsBurst(t *testing.T) {
|
||||||
|
tb := NewTokenBucket(1.0, 5) // 1/sec, burst 5
|
||||||
|
|
||||||
|
handler := tb.LimitFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Should allow burst of 5 requests
|
||||||
|
for i := 0; i < 5; i++ {
|
||||||
|
req := httptest.NewRequest("GET", "/test", nil)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("request %d: expected 200, got %d", i+1, w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// 6th request should be rate limited
|
||||||
|
req := httptest.NewRequest("GET", "/test", nil)
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
if w.Code != http.StatusTooManyRequests {
|
||||||
|
t.Fatalf("request 6: expected 429, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTokenBucket_DifferentIPs(t *testing.T) {
|
||||||
|
tb := NewTokenBucket(1.0, 2) // 1/sec, burst 2
|
||||||
|
|
||||||
|
handler := tb.LimitFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Exhaust IP1's bucket
|
||||||
|
for i := 0; i < 2; i++ {
|
||||||
|
req := httptest.NewRequest("GET", "/test", nil)
|
||||||
|
req.Header.Set("X-Forwarded-For", "1.2.3.4")
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("ip1 request %d: expected 200, got %d", i+1, w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// IP1 should now be limited
|
||||||
|
req := httptest.NewRequest("GET", "/test", nil)
|
||||||
|
req.Header.Set("X-Forwarded-For", "1.2.3.4")
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
if w.Code != http.StatusTooManyRequests {
|
||||||
|
t.Fatalf("ip1 request 3: expected 429, got %d", w.Code)
|
||||||
|
}
|
||||||
|
|
||||||
|
// IP2 should still work
|
||||||
|
req = httptest.NewRequest("GET", "/test", nil)
|
||||||
|
req.Header.Set("X-Forwarded-For", "5.6.7.8")
|
||||||
|
w = httptest.NewRecorder()
|
||||||
|
handler.ServeHTTP(w, req)
|
||||||
|
if w.Code != http.StatusOK {
|
||||||
|
t.Fatalf("ip2 request 1: expected 200, got %d", w.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
23
backend/internal/models/appointment.go
Normal file
23
backend/internal/models/appointment.go
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Appointment struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseID *uuid.UUID `db:"case_id" json:"case_id,omitempty"`
|
||||||
|
Title string `db:"title" json:"title"`
|
||||||
|
Description *string `db:"description" json:"description,omitempty"`
|
||||||
|
StartAt time.Time `db:"start_at" json:"start_at"`
|
||||||
|
EndAt *time.Time `db:"end_at" json:"end_at,omitempty"`
|
||||||
|
Location *string `db:"location" json:"location,omitempty"`
|
||||||
|
AppointmentType *string `db:"appointment_type" json:"appointment_type,omitempty"`
|
||||||
|
CalDAVUID *string `db:"caldav_uid" json:"caldav_uid,omitempty"`
|
||||||
|
CalDAVEtag *string `db:"caldav_etag" json:"caldav_etag,omitempty"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
23
backend/internal/models/case.go
Normal file
23
backend/internal/models/case.go
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Case struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseNumber string `db:"case_number" json:"case_number"`
|
||||||
|
Title string `db:"title" json:"title"`
|
||||||
|
CaseType *string `db:"case_type" json:"case_type,omitempty"`
|
||||||
|
Court *string `db:"court" json:"court,omitempty"`
|
||||||
|
CourtRef *string `db:"court_ref" json:"court_ref,omitempty"`
|
||||||
|
Status string `db:"status" json:"status"`
|
||||||
|
AISummary *string `db:"ai_summary" json:"ai_summary,omitempty"`
|
||||||
|
Metadata json.RawMessage `db:"metadata" json:"metadata"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
22
backend/internal/models/case_event.go
Normal file
22
backend/internal/models/case_event.go
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseEvent struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseID uuid.UUID `db:"case_id" json:"case_id"`
|
||||||
|
EventType *string `db:"event_type" json:"event_type,omitempty"`
|
||||||
|
Title string `db:"title" json:"title"`
|
||||||
|
Description *string `db:"description" json:"description,omitempty"`
|
||||||
|
EventDate *time.Time `db:"event_date" json:"event_date,omitempty"`
|
||||||
|
CreatedBy *uuid.UUID `db:"created_by" json:"created_by,omitempty"`
|
||||||
|
Metadata json.RawMessage `db:"metadata" json:"metadata"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
27
backend/internal/models/deadline.go
Normal file
27
backend/internal/models/deadline.go
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Deadline struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseID uuid.UUID `db:"case_id" json:"case_id"`
|
||||||
|
Title string `db:"title" json:"title"`
|
||||||
|
Description *string `db:"description" json:"description,omitempty"`
|
||||||
|
DueDate string `db:"due_date" json:"due_date"`
|
||||||
|
OriginalDueDate *string `db:"original_due_date" json:"original_due_date,omitempty"`
|
||||||
|
WarningDate *string `db:"warning_date" json:"warning_date,omitempty"`
|
||||||
|
Source string `db:"source" json:"source"`
|
||||||
|
RuleID *uuid.UUID `db:"rule_id" json:"rule_id,omitempty"`
|
||||||
|
Status string `db:"status" json:"status"`
|
||||||
|
CompletedAt *time.Time `db:"completed_at" json:"completed_at,omitempty"`
|
||||||
|
CalDAVUID *string `db:"caldav_uid" json:"caldav_uid,omitempty"`
|
||||||
|
CalDAVEtag *string `db:"caldav_etag" json:"caldav_etag,omitempty"`
|
||||||
|
Notes *string `db:"notes" json:"notes,omitempty"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
43
backend/internal/models/deadline_rule.go
Normal file
43
backend/internal/models/deadline_rule.go
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DeadlineRule struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
ProceedingTypeID *int `db:"proceeding_type_id" json:"proceeding_type_id,omitempty"`
|
||||||
|
ParentID *uuid.UUID `db:"parent_id" json:"parent_id,omitempty"`
|
||||||
|
Code *string `db:"code" json:"code,omitempty"`
|
||||||
|
Name string `db:"name" json:"name"`
|
||||||
|
Description *string `db:"description" json:"description,omitempty"`
|
||||||
|
PrimaryParty *string `db:"primary_party" json:"primary_party,omitempty"`
|
||||||
|
EventType *string `db:"event_type" json:"event_type,omitempty"`
|
||||||
|
IsMandatory bool `db:"is_mandatory" json:"is_mandatory"`
|
||||||
|
DurationValue int `db:"duration_value" json:"duration_value"`
|
||||||
|
DurationUnit string `db:"duration_unit" json:"duration_unit"`
|
||||||
|
Timing *string `db:"timing" json:"timing,omitempty"`
|
||||||
|
RuleCode *string `db:"rule_code" json:"rule_code,omitempty"`
|
||||||
|
DeadlineNotes *string `db:"deadline_notes" json:"deadline_notes,omitempty"`
|
||||||
|
SequenceOrder int `db:"sequence_order" json:"sequence_order"`
|
||||||
|
ConditionRuleID *uuid.UUID `db:"condition_rule_id" json:"condition_rule_id,omitempty"`
|
||||||
|
AltDurationValue *int `db:"alt_duration_value" json:"alt_duration_value,omitempty"`
|
||||||
|
AltDurationUnit *string `db:"alt_duration_unit" json:"alt_duration_unit,omitempty"`
|
||||||
|
AltRuleCode *string `db:"alt_rule_code" json:"alt_rule_code,omitempty"`
|
||||||
|
IsActive bool `db:"is_active" json:"is_active"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ProceedingType struct {
|
||||||
|
ID int `db:"id" json:"id"`
|
||||||
|
Code string `db:"code" json:"code"`
|
||||||
|
Name string `db:"name" json:"name"`
|
||||||
|
Description *string `db:"description" json:"description,omitempty"`
|
||||||
|
Jurisdiction *string `db:"jurisdiction" json:"jurisdiction,omitempty"`
|
||||||
|
DefaultColor string `db:"default_color" json:"default_color"`
|
||||||
|
SortOrder int `db:"sort_order" json:"sort_order"`
|
||||||
|
IsActive bool `db:"is_active" json:"is_active"`
|
||||||
|
}
|
||||||
23
backend/internal/models/document.go
Normal file
23
backend/internal/models/document.go
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Document struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseID uuid.UUID `db:"case_id" json:"case_id"`
|
||||||
|
Title string `db:"title" json:"title"`
|
||||||
|
DocType *string `db:"doc_type" json:"doc_type,omitempty"`
|
||||||
|
FilePath *string `db:"file_path" json:"file_path,omitempty"`
|
||||||
|
FileSize *int `db:"file_size" json:"file_size,omitempty"`
|
||||||
|
MimeType *string `db:"mime_type" json:"mime_type,omitempty"`
|
||||||
|
AIExtracted *json.RawMessage `db:"ai_extracted" json:"ai_extracted,omitempty"`
|
||||||
|
UploadedBy *uuid.UUID `db:"uploaded_by" json:"uploaded_by,omitempty"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
17
backend/internal/models/party.go
Normal file
17
backend/internal/models/party.go
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Party struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
CaseID uuid.UUID `db:"case_id" json:"case_id"`
|
||||||
|
Name string `db:"name" json:"name"`
|
||||||
|
Role *string `db:"role" json:"role,omitempty"`
|
||||||
|
Representative *string `db:"representative" json:"representative,omitempty"`
|
||||||
|
ContactInfo json.RawMessage `db:"contact_info" json:"contact_info"`
|
||||||
|
}
|
||||||
30
backend/internal/models/tenant.go
Normal file
30
backend/internal/models/tenant.go
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Tenant struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
Name string `db:"name" json:"name"`
|
||||||
|
Slug string `db:"slug" json:"slug"`
|
||||||
|
Settings json.RawMessage `db:"settings" json:"settings"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type UserTenant struct {
|
||||||
|
UserID uuid.UUID `db:"user_id" json:"user_id"`
|
||||||
|
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
||||||
|
Role string `db:"role" json:"role"`
|
||||||
|
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// TenantWithRole is a Tenant joined with the user's role in that tenant.
|
||||||
|
type TenantWithRole struct {
|
||||||
|
Tenant
|
||||||
|
Role string `db:"role" json:"role"`
|
||||||
|
}
|
||||||
182
backend/internal/router/router.go
Normal file
182
backend/internal/router/router.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
package router
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"log/slog"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/config"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/handlers"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/middleware"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *services.CalDAVService) http.Handler {
|
||||||
|
mux := http.NewServeMux()
|
||||||
|
|
||||||
|
// Services
|
||||||
|
tenantSvc := services.NewTenantService(db)
|
||||||
|
caseSvc := services.NewCaseService(db)
|
||||||
|
partySvc := services.NewPartyService(db)
|
||||||
|
appointmentSvc := services.NewAppointmentService(db)
|
||||||
|
holidaySvc := services.NewHolidayService(db)
|
||||||
|
deadlineSvc := services.NewDeadlineService(db)
|
||||||
|
deadlineRuleSvc := services.NewDeadlineRuleService(db)
|
||||||
|
calculator := services.NewDeadlineCalculator(holidaySvc)
|
||||||
|
storageCli := services.NewStorageClient(cfg.SupabaseURL, cfg.SupabaseServiceKey)
|
||||||
|
documentSvc := services.NewDocumentService(db, storageCli)
|
||||||
|
|
||||||
|
// AI service (optional — only if API key is configured)
|
||||||
|
var aiH *handlers.AIHandler
|
||||||
|
if cfg.AnthropicAPIKey != "" {
|
||||||
|
aiSvc := services.NewAIService(cfg.AnthropicAPIKey, db)
|
||||||
|
aiH = handlers.NewAIHandler(aiSvc, db)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Middleware
|
||||||
|
tenantResolver := auth.NewTenantResolver(tenantSvc)
|
||||||
|
|
||||||
|
dashboardSvc := services.NewDashboardService(db)
|
||||||
|
|
||||||
|
// Handlers
|
||||||
|
tenantH := handlers.NewTenantHandler(tenantSvc)
|
||||||
|
caseH := handlers.NewCaseHandler(caseSvc)
|
||||||
|
partyH := handlers.NewPartyHandler(partySvc)
|
||||||
|
apptH := handlers.NewAppointmentHandler(appointmentSvc)
|
||||||
|
deadlineH := handlers.NewDeadlineHandlers(deadlineSvc, db)
|
||||||
|
ruleH := handlers.NewDeadlineRuleHandlers(deadlineRuleSvc)
|
||||||
|
calcH := handlers.NewCalculateHandlers(calculator, deadlineRuleSvc)
|
||||||
|
dashboardH := handlers.NewDashboardHandler(dashboardSvc)
|
||||||
|
docH := handlers.NewDocumentHandler(documentSvc)
|
||||||
|
|
||||||
|
// Public routes
|
||||||
|
mux.HandleFunc("GET /health", handleHealth(db))
|
||||||
|
|
||||||
|
// Authenticated API routes
|
||||||
|
api := http.NewServeMux()
|
||||||
|
|
||||||
|
// Tenant management (no tenant resolver — these operate across tenants)
|
||||||
|
api.HandleFunc("POST /api/tenants", tenantH.CreateTenant)
|
||||||
|
api.HandleFunc("GET /api/tenants", tenantH.ListTenants)
|
||||||
|
api.HandleFunc("GET /api/tenants/{id}", tenantH.GetTenant)
|
||||||
|
api.HandleFunc("POST /api/tenants/{id}/invite", tenantH.InviteUser)
|
||||||
|
api.HandleFunc("DELETE /api/tenants/{id}/members/{uid}", tenantH.RemoveMember)
|
||||||
|
api.HandleFunc("GET /api/tenants/{id}/members", tenantH.ListMembers)
|
||||||
|
|
||||||
|
// Tenant-scoped routes (require tenant context)
|
||||||
|
scoped := http.NewServeMux()
|
||||||
|
|
||||||
|
// Cases
|
||||||
|
scoped.HandleFunc("GET /api/cases", caseH.List)
|
||||||
|
scoped.HandleFunc("POST /api/cases", caseH.Create)
|
||||||
|
scoped.HandleFunc("GET /api/cases/{id}", caseH.Get)
|
||||||
|
scoped.HandleFunc("PUT /api/cases/{id}", caseH.Update)
|
||||||
|
scoped.HandleFunc("DELETE /api/cases/{id}", caseH.Delete)
|
||||||
|
|
||||||
|
// Parties
|
||||||
|
scoped.HandleFunc("GET /api/cases/{id}/parties", partyH.List)
|
||||||
|
scoped.HandleFunc("POST /api/cases/{id}/parties", partyH.Create)
|
||||||
|
scoped.HandleFunc("PUT /api/parties/{partyId}", partyH.Update)
|
||||||
|
scoped.HandleFunc("DELETE /api/parties/{partyId}", partyH.Delete)
|
||||||
|
|
||||||
|
// Deadlines
|
||||||
|
scoped.HandleFunc("GET /api/deadlines", deadlineH.ListAll)
|
||||||
|
scoped.HandleFunc("GET /api/cases/{caseID}/deadlines", deadlineH.ListForCase)
|
||||||
|
scoped.HandleFunc("POST /api/cases/{caseID}/deadlines", deadlineH.Create)
|
||||||
|
scoped.HandleFunc("PUT /api/deadlines/{deadlineID}", deadlineH.Update)
|
||||||
|
scoped.HandleFunc("PATCH /api/deadlines/{deadlineID}/complete", deadlineH.Complete)
|
||||||
|
scoped.HandleFunc("DELETE /api/deadlines/{deadlineID}", deadlineH.Delete)
|
||||||
|
|
||||||
|
// Deadline rules (reference data)
|
||||||
|
scoped.HandleFunc("GET /api/deadline-rules", ruleH.List)
|
||||||
|
scoped.HandleFunc("GET /api/deadline-rules/{type}", ruleH.GetRuleTree)
|
||||||
|
scoped.HandleFunc("GET /api/proceeding-types", ruleH.ListProceedingTypes)
|
||||||
|
|
||||||
|
// Deadline calculator
|
||||||
|
scoped.HandleFunc("POST /api/deadlines/calculate", calcH.Calculate)
|
||||||
|
|
||||||
|
// Appointments
|
||||||
|
scoped.HandleFunc("GET /api/appointments", apptH.List)
|
||||||
|
scoped.HandleFunc("POST /api/appointments", apptH.Create)
|
||||||
|
scoped.HandleFunc("PUT /api/appointments/{id}", apptH.Update)
|
||||||
|
scoped.HandleFunc("DELETE /api/appointments/{id}", apptH.Delete)
|
||||||
|
|
||||||
|
// Dashboard
|
||||||
|
scoped.HandleFunc("GET /api/dashboard", dashboardH.Get)
|
||||||
|
|
||||||
|
// Documents
|
||||||
|
scoped.HandleFunc("GET /api/cases/{id}/documents", docH.ListByCase)
|
||||||
|
scoped.HandleFunc("POST /api/cases/{id}/documents", docH.Upload)
|
||||||
|
scoped.HandleFunc("GET /api/documents/{docId}", docH.Download)
|
||||||
|
scoped.HandleFunc("GET /api/documents/{docId}/meta", docH.GetMeta)
|
||||||
|
scoped.HandleFunc("DELETE /api/documents/{docId}", docH.Delete)
|
||||||
|
|
||||||
|
// AI endpoints (rate limited: 5 req/min burst 10 per IP)
|
||||||
|
if aiH != nil {
|
||||||
|
aiLimiter := middleware.NewTokenBucket(5.0/60.0, 10)
|
||||||
|
scoped.HandleFunc("POST /api/ai/extract-deadlines", aiLimiter.LimitFunc(aiH.ExtractDeadlines))
|
||||||
|
scoped.HandleFunc("POST /api/ai/summarize-case", aiLimiter.LimitFunc(aiH.SummarizeCase))
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalDAV sync endpoints
|
||||||
|
if calDAVSvc != nil {
|
||||||
|
calDAVH := handlers.NewCalDAVHandler(calDAVSvc)
|
||||||
|
scoped.HandleFunc("POST /api/caldav/sync", calDAVH.TriggerSync)
|
||||||
|
scoped.HandleFunc("GET /api/caldav/status", calDAVH.GetStatus)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wire: auth -> tenant routes go directly, scoped routes get tenant resolver
|
||||||
|
api.Handle("/api/", tenantResolver.Resolve(scoped))
|
||||||
|
|
||||||
|
mux.Handle("/api/", authMW.RequireAuth(api))
|
||||||
|
|
||||||
|
return requestLogger(mux)
|
||||||
|
}
|
||||||
|
|
||||||
|
func handleHealth(db *sqlx.DB) http.HandlerFunc {
|
||||||
|
return func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if err := db.Ping(); err != nil {
|
||||||
|
w.WriteHeader(http.StatusServiceUnavailable)
|
||||||
|
json.NewEncoder(w).Encode(map[string]string{"status": "error", "error": err.Error()})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
json.NewEncoder(w).Encode(map[string]string{"status": "ok"})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type statusWriter struct {
|
||||||
|
http.ResponseWriter
|
||||||
|
status int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *statusWriter) WriteHeader(code int) {
|
||||||
|
w.status = code
|
||||||
|
w.ResponseWriter.WriteHeader(code)
|
||||||
|
}
|
||||||
|
|
||||||
|
func requestLogger(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
// Skip health checks to reduce noise
|
||||||
|
if r.URL.Path == "/health" {
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
sw := &statusWriter{ResponseWriter: w, status: http.StatusOK}
|
||||||
|
start := time.Now()
|
||||||
|
next.ServeHTTP(sw, r)
|
||||||
|
|
||||||
|
slog.Info("request",
|
||||||
|
"method", r.Method,
|
||||||
|
"path", r.URL.Path,
|
||||||
|
"status", sw.status,
|
||||||
|
"duration_ms", time.Since(start).Milliseconds(),
|
||||||
|
)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
283
backend/internal/services/ai_service.go
Normal file
283
backend/internal/services/ai_service.go
Normal file
@@ -0,0 +1,283 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/base64"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/anthropics/anthropic-sdk-go"
|
||||||
|
"github.com/anthropics/anthropic-sdk-go/option"
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AIService struct {
|
||||||
|
client anthropic.Client
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAIService(apiKey string, db *sqlx.DB) *AIService {
|
||||||
|
client := anthropic.NewClient(option.WithAPIKey(apiKey))
|
||||||
|
return &AIService{client: client, db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ExtractedDeadline represents a deadline extracted by AI from a document.
|
||||||
|
type ExtractedDeadline struct {
|
||||||
|
Title string `json:"title"`
|
||||||
|
DueDate *string `json:"due_date"`
|
||||||
|
DurationValue int `json:"duration_value"`
|
||||||
|
DurationUnit string `json:"duration_unit"`
|
||||||
|
Timing string `json:"timing"`
|
||||||
|
TriggerEvent string `json:"trigger_event"`
|
||||||
|
RuleReference string `json:"rule_reference"`
|
||||||
|
Confidence float64 `json:"confidence"`
|
||||||
|
SourceQuote string `json:"source_quote"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type extractDeadlinesToolInput struct {
|
||||||
|
Deadlines []ExtractedDeadline `json:"deadlines"`
|
||||||
|
}
|
||||||
|
|
||||||
|
var deadlineExtractionTool = anthropic.ToolParam{
|
||||||
|
Name: "extract_deadlines",
|
||||||
|
Description: anthropic.String("Extract all legal deadlines found in the document. Return each deadline with its details."),
|
||||||
|
InputSchema: anthropic.ToolInputSchemaParam{
|
||||||
|
Properties: map[string]any{
|
||||||
|
"deadlines": map[string]any{
|
||||||
|
"type": "array",
|
||||||
|
"description": "List of extracted deadlines",
|
||||||
|
"items": map[string]any{
|
||||||
|
"type": "object",
|
||||||
|
"properties": map[string]any{
|
||||||
|
"title": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"description": "Short title describing the deadline (e.g. 'Statement of Defence', 'Reply to Counterclaim')",
|
||||||
|
},
|
||||||
|
"due_date": map[string]any{
|
||||||
|
"type": []string{"string", "null"},
|
||||||
|
"description": "Absolute due date in YYYY-MM-DD format if determinable, null otherwise",
|
||||||
|
},
|
||||||
|
"duration_value": map[string]any{
|
||||||
|
"type": "integer",
|
||||||
|
"description": "Numeric duration value (e.g. 3 for '3 months')",
|
||||||
|
},
|
||||||
|
"duration_unit": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"enum": []string{"days", "weeks", "months"},
|
||||||
|
"description": "Unit of the duration period",
|
||||||
|
},
|
||||||
|
"timing": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"enum": []string{"after", "before"},
|
||||||
|
"description": "Whether the deadline is before or after the trigger event",
|
||||||
|
},
|
||||||
|
"trigger_event": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"description": "The event that triggers this deadline (e.g. 'service of the Statement of Claim')",
|
||||||
|
},
|
||||||
|
"rule_reference": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"description": "Legal rule reference (e.g. 'Rule 23 RoP', 'Rule 222 RoP', '§ 276 ZPO')",
|
||||||
|
},
|
||||||
|
"confidence": map[string]any{
|
||||||
|
"type": "number",
|
||||||
|
"minimum": 0,
|
||||||
|
"maximum": 1,
|
||||||
|
"description": "Confidence score from 0.0 to 1.0",
|
||||||
|
},
|
||||||
|
"source_quote": map[string]any{
|
||||||
|
"type": "string",
|
||||||
|
"description": "The exact quote from the document where this deadline was found",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"required": []string{"title", "duration_value", "duration_unit", "timing", "trigger_event", "rule_reference", "confidence", "source_quote"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Required: []string{"deadlines"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
const extractionSystemPrompt = `You are a legal deadline extraction assistant for German and UPC (Unified Patent Court) patent litigation.
|
||||||
|
|
||||||
|
Your task is to extract all legal deadlines, time limits, and procedural time periods from the provided document.
|
||||||
|
|
||||||
|
For each deadline found, extract:
|
||||||
|
- A clear title describing the deadline
|
||||||
|
- The absolute due date if it can be determined from the document
|
||||||
|
- The duration (value + unit: days/weeks/months)
|
||||||
|
- Whether it runs before or after a trigger event
|
||||||
|
- The trigger event that starts the deadline
|
||||||
|
- The legal rule reference (e.g. Rule 23 RoP, § 276 ZPO)
|
||||||
|
- Your confidence level (0.0-1.0) in the extraction
|
||||||
|
- The exact source quote from the document
|
||||||
|
|
||||||
|
Be thorough: extract every deadline mentioned, including conditional ones. If a deadline references another deadline (e.g. "within 2 months of the defence"), capture that relationship in the trigger_event field.
|
||||||
|
|
||||||
|
If the document contains no deadlines, return an empty list.`
|
||||||
|
|
||||||
|
// ExtractDeadlines sends a document (PDF or text) to Claude for deadline extraction.
|
||||||
|
func (s *AIService) ExtractDeadlines(ctx context.Context, pdfData []byte, text string) ([]ExtractedDeadline, error) {
|
||||||
|
var contentBlocks []anthropic.ContentBlockParamUnion
|
||||||
|
|
||||||
|
if len(pdfData) > 0 {
|
||||||
|
encoded := base64.StdEncoding.EncodeToString(pdfData)
|
||||||
|
contentBlocks = append(contentBlocks, anthropic.ContentBlockParamUnion{
|
||||||
|
OfDocument: &anthropic.DocumentBlockParam{
|
||||||
|
Source: anthropic.DocumentBlockParamSourceUnion{
|
||||||
|
OfBase64: &anthropic.Base64PDFSourceParam{
|
||||||
|
Data: encoded,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
contentBlocks = append(contentBlocks, anthropic.NewTextBlock("Extract all legal deadlines from this document."))
|
||||||
|
} else if text != "" {
|
||||||
|
contentBlocks = append(contentBlocks, anthropic.NewTextBlock("Extract all legal deadlines from the following text:\n\n"+text))
|
||||||
|
} else {
|
||||||
|
return nil, fmt.Errorf("either pdf_data or text must be provided")
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err := s.client.Messages.New(ctx, anthropic.MessageNewParams{
|
||||||
|
Model: anthropic.ModelClaudeSonnet4_5,
|
||||||
|
MaxTokens: 4096,
|
||||||
|
System: []anthropic.TextBlockParam{
|
||||||
|
{Text: extractionSystemPrompt},
|
||||||
|
},
|
||||||
|
Messages: []anthropic.MessageParam{
|
||||||
|
anthropic.NewUserMessage(contentBlocks...),
|
||||||
|
},
|
||||||
|
Tools: []anthropic.ToolUnionParam{
|
||||||
|
{OfTool: &deadlineExtractionTool},
|
||||||
|
},
|
||||||
|
ToolChoice: anthropic.ToolChoiceParamOfTool("extract_deadlines"),
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("claude API call: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Find the tool_use block in the response
|
||||||
|
for _, block := range msg.Content {
|
||||||
|
if block.Type == "tool_use" && block.Name == "extract_deadlines" {
|
||||||
|
var input extractDeadlinesToolInput
|
||||||
|
if err := json.Unmarshal(block.Input, &input); err != nil {
|
||||||
|
return nil, fmt.Errorf("parsing tool output: %w", err)
|
||||||
|
}
|
||||||
|
return input.Deadlines, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, fmt.Errorf("no tool_use block in response")
|
||||||
|
}
|
||||||
|
|
||||||
|
const summarizeSystemPrompt = `You are a legal case summary assistant for German and UPC patent litigation case management.
|
||||||
|
|
||||||
|
Given a case's details, recent events, and deadlines, produce a concise 2-3 sentence summary of what matters right now. Focus on:
|
||||||
|
- The most urgent upcoming deadline
|
||||||
|
- Recent significant events
|
||||||
|
- The current procedural stage
|
||||||
|
|
||||||
|
Write in clear, professional language suitable for a lawyer reviewing their case list. Be specific about dates and deadlines.`
|
||||||
|
|
||||||
|
// SummarizeCase generates an AI summary for a case and caches it in the database.
|
||||||
|
func (s *AIService) SummarizeCase(ctx context.Context, tenantID, caseID uuid.UUID) (string, error) {
|
||||||
|
// Load case
|
||||||
|
var c models.Case
|
||||||
|
err := s.db.GetContext(ctx, &c,
|
||||||
|
"SELECT * FROM cases WHERE id = $1 AND tenant_id = $2", caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("loading case: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load recent events
|
||||||
|
var events []models.CaseEvent
|
||||||
|
if err := s.db.SelectContext(ctx, &events,
|
||||||
|
"SELECT * FROM case_events WHERE case_id = $1 AND tenant_id = $2 ORDER BY created_at DESC LIMIT 10",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return "", fmt.Errorf("loading events: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load active deadlines
|
||||||
|
var deadlines []models.Deadline
|
||||||
|
if err := s.db.SelectContext(ctx, &deadlines,
|
||||||
|
"SELECT * FROM deadlines WHERE case_id = $1 AND tenant_id = $2 AND status = 'active' ORDER BY due_date ASC LIMIT 10",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return "", fmt.Errorf("loading deadlines: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build context text
|
||||||
|
caseInfo := fmt.Sprintf("Case: %s — %s\nStatus: %s", c.CaseNumber, c.Title, c.Status)
|
||||||
|
if c.Court != nil {
|
||||||
|
caseInfo += fmt.Sprintf("\nCourt: %s", *c.Court)
|
||||||
|
}
|
||||||
|
if c.CourtRef != nil {
|
||||||
|
caseInfo += fmt.Sprintf("\nCourt Reference: %s", *c.CourtRef)
|
||||||
|
}
|
||||||
|
if c.CaseType != nil {
|
||||||
|
caseInfo += fmt.Sprintf("\nType: %s", *c.CaseType)
|
||||||
|
}
|
||||||
|
|
||||||
|
eventText := "\n\nRecent Events:"
|
||||||
|
if len(events) == 0 {
|
||||||
|
eventText += "\nNo events recorded."
|
||||||
|
}
|
||||||
|
for _, e := range events {
|
||||||
|
eventText += fmt.Sprintf("\n- [%s] %s", e.CreatedAt.Format("2006-01-02"), e.Title)
|
||||||
|
if e.Description != nil {
|
||||||
|
eventText += fmt.Sprintf(": %s", *e.Description)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlineText := "\n\nUpcoming Deadlines:"
|
||||||
|
if len(deadlines) == 0 {
|
||||||
|
deadlineText += "\nNo active deadlines."
|
||||||
|
}
|
||||||
|
for _, d := range deadlines {
|
||||||
|
deadlineText += fmt.Sprintf("\n- %s: due %s (status: %s)", d.Title, d.DueDate, d.Status)
|
||||||
|
if d.Description != nil {
|
||||||
|
deadlineText += fmt.Sprintf(" — %s", *d.Description)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
prompt := caseInfo + eventText + deadlineText
|
||||||
|
|
||||||
|
msg, err := s.client.Messages.New(ctx, anthropic.MessageNewParams{
|
||||||
|
Model: anthropic.ModelClaudeSonnet4_5,
|
||||||
|
MaxTokens: 512,
|
||||||
|
System: []anthropic.TextBlockParam{
|
||||||
|
{Text: summarizeSystemPrompt},
|
||||||
|
},
|
||||||
|
Messages: []anthropic.MessageParam{
|
||||||
|
anthropic.NewUserMessage(anthropic.NewTextBlock("Summarize the current state of this case:\n\n" + prompt)),
|
||||||
|
},
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("claude API call: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Extract text from response
|
||||||
|
var summary string
|
||||||
|
for _, block := range msg.Content {
|
||||||
|
if block.Type == "text" {
|
||||||
|
summary += block.Text
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if summary == "" {
|
||||||
|
return "", fmt.Errorf("empty response from Claude")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cache summary in database
|
||||||
|
_, err = s.db.ExecContext(ctx,
|
||||||
|
"UPDATE cases SET ai_summary = $1, updated_at = $2 WHERE id = $3 AND tenant_id = $4",
|
||||||
|
summary, time.Now(), caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("caching summary: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return summary, nil
|
||||||
|
}
|
||||||
109
backend/internal/services/ai_service_test.go
Normal file
109
backend/internal/services/ai_service_test.go
Normal file
@@ -0,0 +1,109 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDeadlineExtractionToolSchema(t *testing.T) {
|
||||||
|
// Verify the tool schema serializes correctly
|
||||||
|
data, err := json.Marshal(deadlineExtractionTool)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("failed to marshal tool: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var parsed map[string]any
|
||||||
|
if err := json.Unmarshal(data, &parsed); err != nil {
|
||||||
|
t.Fatalf("failed to unmarshal tool JSON: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if parsed["name"] != "extract_deadlines" {
|
||||||
|
t.Errorf("expected name 'extract_deadlines', got %v", parsed["name"])
|
||||||
|
}
|
||||||
|
|
||||||
|
schema, ok := parsed["input_schema"].(map[string]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("input_schema is not a map")
|
||||||
|
}
|
||||||
|
|
||||||
|
if schema["type"] != "object" {
|
||||||
|
t.Errorf("expected schema type 'object', got %v", schema["type"])
|
||||||
|
}
|
||||||
|
|
||||||
|
props, ok := schema["properties"].(map[string]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("properties is not a map")
|
||||||
|
}
|
||||||
|
|
||||||
|
deadlines, ok := props["deadlines"].(map[string]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("deadlines property is not a map")
|
||||||
|
}
|
||||||
|
|
||||||
|
if deadlines["type"] != "array" {
|
||||||
|
t.Errorf("expected deadlines type 'array', got %v", deadlines["type"])
|
||||||
|
}
|
||||||
|
|
||||||
|
items, ok := deadlines["items"].(map[string]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("items is not a map")
|
||||||
|
}
|
||||||
|
|
||||||
|
itemProps, ok := items["properties"].(map[string]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("item properties is not a map")
|
||||||
|
}
|
||||||
|
|
||||||
|
expectedFields := []string{"title", "due_date", "duration_value", "duration_unit", "timing", "trigger_event", "rule_reference", "confidence", "source_quote"}
|
||||||
|
for _, field := range expectedFields {
|
||||||
|
if _, ok := itemProps[field]; !ok {
|
||||||
|
t.Errorf("missing expected field %q in item properties", field)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
required, ok := items["required"].([]any)
|
||||||
|
if !ok {
|
||||||
|
t.Fatal("required is not a list")
|
||||||
|
}
|
||||||
|
if len(required) != 8 {
|
||||||
|
t.Errorf("expected 8 required fields, got %d", len(required))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestExtractedDeadlineJSON(t *testing.T) {
|
||||||
|
dueDate := "2026-04-15"
|
||||||
|
d := ExtractedDeadline{
|
||||||
|
Title: "Statement of Defence",
|
||||||
|
DueDate: &dueDate,
|
||||||
|
DurationValue: 3,
|
||||||
|
DurationUnit: "months",
|
||||||
|
Timing: "after",
|
||||||
|
TriggerEvent: "service of the Statement of Claim",
|
||||||
|
RuleReference: "Rule 23 RoP",
|
||||||
|
Confidence: 0.95,
|
||||||
|
SourceQuote: "The defendant shall file a defence within 3 months",
|
||||||
|
}
|
||||||
|
|
||||||
|
data, err := json.Marshal(d)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("failed to marshal: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var parsed ExtractedDeadline
|
||||||
|
if err := json.Unmarshal(data, &parsed); err != nil {
|
||||||
|
t.Fatalf("failed to unmarshal: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if parsed.Title != d.Title {
|
||||||
|
t.Errorf("title mismatch: %q != %q", parsed.Title, d.Title)
|
||||||
|
}
|
||||||
|
if *parsed.DueDate != *d.DueDate {
|
||||||
|
t.Errorf("due_date mismatch: %q != %q", *parsed.DueDate, *d.DueDate)
|
||||||
|
}
|
||||||
|
if parsed.DurationValue != d.DurationValue {
|
||||||
|
t.Errorf("duration_value mismatch: %d != %d", parsed.DurationValue, d.DurationValue)
|
||||||
|
}
|
||||||
|
if parsed.Confidence != d.Confidence {
|
||||||
|
t.Errorf("confidence mismatch: %f != %f", parsed.Confidence, d.Confidence)
|
||||||
|
}
|
||||||
|
}
|
||||||
135
backend/internal/services/appointment_service.go
Normal file
135
backend/internal/services/appointment_service.go
Normal file
@@ -0,0 +1,135 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AppointmentService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAppointmentService(db *sqlx.DB) *AppointmentService {
|
||||||
|
return &AppointmentService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
type AppointmentFilter struct {
|
||||||
|
CaseID *uuid.UUID
|
||||||
|
Type *string
|
||||||
|
StartFrom *time.Time
|
||||||
|
StartTo *time.Time
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *AppointmentService) List(ctx context.Context, tenantID uuid.UUID, filter AppointmentFilter) ([]models.Appointment, error) {
|
||||||
|
query := "SELECT * FROM appointments WHERE tenant_id = $1"
|
||||||
|
args := []any{tenantID}
|
||||||
|
argN := 2
|
||||||
|
|
||||||
|
if filter.CaseID != nil {
|
||||||
|
query += fmt.Sprintf(" AND case_id = $%d", argN)
|
||||||
|
args = append(args, *filter.CaseID)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
if filter.Type != nil {
|
||||||
|
query += fmt.Sprintf(" AND appointment_type = $%d", argN)
|
||||||
|
args = append(args, *filter.Type)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
if filter.StartFrom != nil {
|
||||||
|
query += fmt.Sprintf(" AND start_at >= $%d", argN)
|
||||||
|
args = append(args, *filter.StartFrom)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
if filter.StartTo != nil {
|
||||||
|
query += fmt.Sprintf(" AND start_at <= $%d", argN)
|
||||||
|
args = append(args, *filter.StartTo)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
|
||||||
|
query += " ORDER BY start_at ASC"
|
||||||
|
|
||||||
|
var appointments []models.Appointment
|
||||||
|
if err := s.db.SelectContext(ctx, &appointments, query, args...); err != nil {
|
||||||
|
return nil, fmt.Errorf("listing appointments: %w", err)
|
||||||
|
}
|
||||||
|
if appointments == nil {
|
||||||
|
appointments = []models.Appointment{}
|
||||||
|
}
|
||||||
|
return appointments, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *AppointmentService) GetByID(ctx context.Context, tenantID, id uuid.UUID) (*models.Appointment, error) {
|
||||||
|
var a models.Appointment
|
||||||
|
err := s.db.GetContext(ctx, &a, "SELECT * FROM appointments WHERE id = $1 AND tenant_id = $2", id, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("getting appointment: %w", err)
|
||||||
|
}
|
||||||
|
return &a, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *AppointmentService) Create(ctx context.Context, a *models.Appointment) error {
|
||||||
|
a.ID = uuid.New()
|
||||||
|
now := time.Now().UTC()
|
||||||
|
a.CreatedAt = now
|
||||||
|
a.UpdatedAt = now
|
||||||
|
|
||||||
|
_, err := s.db.NamedExecContext(ctx, `
|
||||||
|
INSERT INTO appointments (id, tenant_id, case_id, title, description, start_at, end_at, location, appointment_type, caldav_uid, caldav_etag, created_at, updated_at)
|
||||||
|
VALUES (:id, :tenant_id, :case_id, :title, :description, :start_at, :end_at, :location, :appointment_type, :caldav_uid, :caldav_etag, :created_at, :updated_at)
|
||||||
|
`, a)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating appointment: %w", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *AppointmentService) Update(ctx context.Context, a *models.Appointment) error {
|
||||||
|
a.UpdatedAt = time.Now().UTC()
|
||||||
|
|
||||||
|
result, err := s.db.NamedExecContext(ctx, `
|
||||||
|
UPDATE appointments SET
|
||||||
|
case_id = :case_id,
|
||||||
|
title = :title,
|
||||||
|
description = :description,
|
||||||
|
start_at = :start_at,
|
||||||
|
end_at = :end_at,
|
||||||
|
location = :location,
|
||||||
|
appointment_type = :appointment_type,
|
||||||
|
caldav_uid = :caldav_uid,
|
||||||
|
caldav_etag = :caldav_etag,
|
||||||
|
updated_at = :updated_at
|
||||||
|
WHERE id = :id AND tenant_id = :tenant_id
|
||||||
|
`, a)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("updating appointment: %w", err)
|
||||||
|
}
|
||||||
|
rows, err := result.RowsAffected()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checking rows affected: %w", err)
|
||||||
|
}
|
||||||
|
if rows == 0 {
|
||||||
|
return fmt.Errorf("appointment not found")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *AppointmentService) Delete(ctx context.Context, tenantID, id uuid.UUID) error {
|
||||||
|
result, err := s.db.ExecContext(ctx, "DELETE FROM appointments WHERE id = $1 AND tenant_id = $2", id, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("deleting appointment: %w", err)
|
||||||
|
}
|
||||||
|
rows, err := result.RowsAffected()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checking rows affected: %w", err)
|
||||||
|
}
|
||||||
|
if rows == 0 {
|
||||||
|
return fmt.Errorf("appointment not found")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
687
backend/internal/services/caldav_service.go
Normal file
687
backend/internal/services/caldav_service.go
Normal file
@@ -0,0 +1,687 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"log/slog"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/emersion/go-ical"
|
||||||
|
"github.com/emersion/go-webdav"
|
||||||
|
"github.com/emersion/go-webdav/caldav"
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
calDAVDomain = "kanzlai.msbls.de"
|
||||||
|
calDAVProdID = "-//KanzlAI//KanzlAI-mGMT//EN"
|
||||||
|
defaultSyncMin = 15
|
||||||
|
)
|
||||||
|
|
||||||
|
// CalDAVConfig holds per-tenant CalDAV configuration from tenants.settings.
|
||||||
|
type CalDAVConfig struct {
|
||||||
|
URL string `json:"url"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
CalendarPath string `json:"calendar_path"`
|
||||||
|
SyncEnabled bool `json:"sync_enabled"`
|
||||||
|
SyncIntervalMinutes int `json:"sync_interval_minutes"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// SyncStatus holds the last sync result for a tenant.
|
||||||
|
type SyncStatus struct {
|
||||||
|
TenantID uuid.UUID `json:"tenant_id"`
|
||||||
|
LastSyncAt time.Time `json:"last_sync_at"`
|
||||||
|
ItemsPushed int `json:"items_pushed"`
|
||||||
|
ItemsPulled int `json:"items_pulled"`
|
||||||
|
Errors []string `json:"errors,omitempty"`
|
||||||
|
SyncDuration string `json:"sync_duration"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalDAVService handles bidirectional CalDAV synchronization.
|
||||||
|
type CalDAVService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
|
||||||
|
mu sync.RWMutex
|
||||||
|
statuses map[uuid.UUID]*SyncStatus // per-tenant sync status
|
||||||
|
|
||||||
|
stopCh chan struct{}
|
||||||
|
wg sync.WaitGroup
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCalDAVService creates a new CalDAV sync service.
|
||||||
|
func NewCalDAVService(db *sqlx.DB) *CalDAVService {
|
||||||
|
return &CalDAVService{
|
||||||
|
db: db,
|
||||||
|
statuses: make(map[uuid.UUID]*SyncStatus),
|
||||||
|
stopCh: make(chan struct{}),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetStatus returns the last sync status for a tenant.
|
||||||
|
func (s *CalDAVService) GetStatus(tenantID uuid.UUID) *SyncStatus {
|
||||||
|
s.mu.RLock()
|
||||||
|
defer s.mu.RUnlock()
|
||||||
|
return s.statuses[tenantID]
|
||||||
|
}
|
||||||
|
|
||||||
|
// setStatus stores the sync status for a tenant.
|
||||||
|
func (s *CalDAVService) setStatus(status *SyncStatus) {
|
||||||
|
s.mu.Lock()
|
||||||
|
defer s.mu.Unlock()
|
||||||
|
s.statuses[status.TenantID] = status
|
||||||
|
}
|
||||||
|
|
||||||
|
// Start begins the background sync goroutine that polls per-tenant.
|
||||||
|
func (s *CalDAVService) Start() {
|
||||||
|
s.wg.Go(func() {
|
||||||
|
s.backgroundLoop()
|
||||||
|
})
|
||||||
|
slog.Info("CalDAV sync service started")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Stop gracefully stops the background sync.
|
||||||
|
func (s *CalDAVService) Stop() {
|
||||||
|
close(s.stopCh)
|
||||||
|
s.wg.Wait()
|
||||||
|
slog.Info("CalDAV sync service stopped")
|
||||||
|
}
|
||||||
|
|
||||||
|
// backgroundLoop polls tenants at their configured interval.
|
||||||
|
func (s *CalDAVService) backgroundLoop() {
|
||||||
|
// Check every minute, but only sync tenants whose interval has elapsed.
|
||||||
|
ticker := time.NewTicker(1 * time.Minute)
|
||||||
|
defer ticker.Stop()
|
||||||
|
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-s.stopCh:
|
||||||
|
return
|
||||||
|
case <-ticker.C:
|
||||||
|
s.syncAllTenants()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// syncAllTenants checks all tenants and syncs those due for a sync.
|
||||||
|
func (s *CalDAVService) syncAllTenants() {
|
||||||
|
configs, err := s.loadAllTenantConfigs()
|
||||||
|
if err != nil {
|
||||||
|
slog.Error("CalDAV: failed to load tenant configs", "error", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for tenantID, cfg := range configs {
|
||||||
|
if !cfg.SyncEnabled {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
interval := cfg.SyncIntervalMinutes
|
||||||
|
if interval <= 0 {
|
||||||
|
interval = defaultSyncMin
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if enough time has passed since last sync
|
||||||
|
status := s.GetStatus(tenantID)
|
||||||
|
if status != nil && time.Since(status.LastSyncAt) < time.Duration(interval)*time.Minute {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
go func(tid uuid.UUID, c CalDAVConfig) {
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Minute)
|
||||||
|
defer cancel()
|
||||||
|
if _, err := s.SyncTenant(ctx, tid, c); err != nil {
|
||||||
|
slog.Error("CalDAV: sync failed", "tenant_id", tid, "error", err)
|
||||||
|
}
|
||||||
|
}(tenantID, cfg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// loadAllTenantConfigs reads CalDAV configs from all tenants.
|
||||||
|
func (s *CalDAVService) loadAllTenantConfigs() (map[uuid.UUID]CalDAVConfig, error) {
|
||||||
|
type row struct {
|
||||||
|
ID uuid.UUID `db:"id"`
|
||||||
|
Settings json.RawMessage `db:"settings"`
|
||||||
|
}
|
||||||
|
var rows []row
|
||||||
|
if err := s.db.Select(&rows, "SELECT id, settings FROM tenants"); err != nil {
|
||||||
|
return nil, fmt.Errorf("querying tenants: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
result := make(map[uuid.UUID]CalDAVConfig)
|
||||||
|
for _, r := range rows {
|
||||||
|
cfg, err := parseCalDAVConfig(r.Settings)
|
||||||
|
if err != nil || cfg.URL == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
result[r.ID] = cfg
|
||||||
|
}
|
||||||
|
return result, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadTenantConfig reads CalDAV config for a single tenant.
|
||||||
|
func (s *CalDAVService) LoadTenantConfig(tenantID uuid.UUID) (*CalDAVConfig, error) {
|
||||||
|
var settings json.RawMessage
|
||||||
|
if err := s.db.Get(&settings, "SELECT settings FROM tenants WHERE id = $1", tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("loading tenant settings: %w", err)
|
||||||
|
}
|
||||||
|
cfg, err := parseCalDAVConfig(settings)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if cfg.URL == "" {
|
||||||
|
return nil, fmt.Errorf("no CalDAV configuration for tenant")
|
||||||
|
}
|
||||||
|
return &cfg, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseCalDAVConfig(settings json.RawMessage) (CalDAVConfig, error) {
|
||||||
|
if len(settings) == 0 {
|
||||||
|
return CalDAVConfig{}, nil
|
||||||
|
}
|
||||||
|
var wrapper struct {
|
||||||
|
CalDAV CalDAVConfig `json:"caldav"`
|
||||||
|
}
|
||||||
|
if err := json.Unmarshal(settings, &wrapper); err != nil {
|
||||||
|
return CalDAVConfig{}, fmt.Errorf("parsing CalDAV settings: %w", err)
|
||||||
|
}
|
||||||
|
return wrapper.CalDAV, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// newCalDAVClient creates a caldav.Client from config.
|
||||||
|
func newCalDAVClient(cfg CalDAVConfig) (*caldav.Client, error) {
|
||||||
|
httpClient := webdav.HTTPClientWithBasicAuth(nil, cfg.Username, cfg.Password)
|
||||||
|
return caldav.NewClient(httpClient, cfg.URL)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SyncTenant performs a full bidirectional sync for a tenant.
|
||||||
|
func (s *CalDAVService) SyncTenant(ctx context.Context, tenantID uuid.UUID, cfg CalDAVConfig) (*SyncStatus, error) {
|
||||||
|
start := time.Now()
|
||||||
|
status := &SyncStatus{
|
||||||
|
TenantID: tenantID,
|
||||||
|
}
|
||||||
|
|
||||||
|
client, err := newCalDAVClient(cfg)
|
||||||
|
if err != nil {
|
||||||
|
status.Errors = append(status.Errors, fmt.Sprintf("creating client: %v", err))
|
||||||
|
status.LastSyncAt = time.Now()
|
||||||
|
s.setStatus(status)
|
||||||
|
return status, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Push local changes to CalDAV
|
||||||
|
pushed, pushErrs := s.pushAll(ctx, client, tenantID, cfg)
|
||||||
|
status.ItemsPushed = pushed
|
||||||
|
status.Errors = append(status.Errors, pushErrs...)
|
||||||
|
|
||||||
|
// Pull remote changes from CalDAV
|
||||||
|
pulled, pullErrs := s.pullAll(ctx, client, tenantID, cfg)
|
||||||
|
status.ItemsPulled = pulled
|
||||||
|
status.Errors = append(status.Errors, pullErrs...)
|
||||||
|
|
||||||
|
status.LastSyncAt = time.Now()
|
||||||
|
status.SyncDuration = time.Since(start).String()
|
||||||
|
s.setStatus(status)
|
||||||
|
|
||||||
|
if len(status.Errors) > 0 {
|
||||||
|
return status, fmt.Errorf("sync completed with %d errors", len(status.Errors))
|
||||||
|
}
|
||||||
|
return status, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Push: Local -> CalDAV ---
|
||||||
|
|
||||||
|
// pushAll pushes all deadlines and appointments to CalDAV.
|
||||||
|
func (s *CalDAVService) pushAll(ctx context.Context, client *caldav.Client, tenantID uuid.UUID, cfg CalDAVConfig) (int, []string) {
|
||||||
|
var pushed int
|
||||||
|
var errs []string
|
||||||
|
|
||||||
|
// Push deadlines as VTODO
|
||||||
|
deadlines, err := s.loadDeadlines(tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return 0, []string{fmt.Sprintf("loading deadlines: %v", err)}
|
||||||
|
}
|
||||||
|
for _, d := range deadlines {
|
||||||
|
if err := s.pushDeadline(ctx, client, cfg, &d); err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("push deadline %s: %v", d.ID, err))
|
||||||
|
} else {
|
||||||
|
pushed++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Push appointments as VEVENT
|
||||||
|
appointments, err := s.loadAppointments(ctx, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("loading appointments: %v", err))
|
||||||
|
return pushed, errs
|
||||||
|
}
|
||||||
|
for _, a := range appointments {
|
||||||
|
if err := s.pushAppointment(ctx, client, cfg, &a); err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("push appointment %s: %v", a.ID, err))
|
||||||
|
} else {
|
||||||
|
pushed++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return pushed, errs
|
||||||
|
}
|
||||||
|
|
||||||
|
// PushDeadline pushes a single deadline to CalDAV (called on create/update).
|
||||||
|
func (s *CalDAVService) PushDeadline(ctx context.Context, tenantID uuid.UUID, deadline *models.Deadline) error {
|
||||||
|
cfg, err := s.LoadTenantConfig(tenantID)
|
||||||
|
if err != nil || !cfg.SyncEnabled {
|
||||||
|
return nil // CalDAV not configured or disabled — silently skip
|
||||||
|
}
|
||||||
|
client, err := newCalDAVClient(*cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating CalDAV client: %w", err)
|
||||||
|
}
|
||||||
|
return s.pushDeadline(ctx, client, *cfg, deadline)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) pushDeadline(ctx context.Context, client *caldav.Client, cfg CalDAVConfig, d *models.Deadline) error {
|
||||||
|
uid := deadlineUID(d.ID)
|
||||||
|
|
||||||
|
cal := ical.NewCalendar()
|
||||||
|
cal.Props.SetText(ical.PropProductID, calDAVProdID)
|
||||||
|
cal.Props.SetText(ical.PropVersion, "2.0")
|
||||||
|
|
||||||
|
todo := ical.NewComponent(ical.CompToDo)
|
||||||
|
todo.Props.SetText(ical.PropUID, uid)
|
||||||
|
todo.Props.SetText(ical.PropSummary, d.Title)
|
||||||
|
todo.Props.SetDateTime(ical.PropDateTimeStamp, time.Now().UTC())
|
||||||
|
|
||||||
|
if d.Description != nil {
|
||||||
|
todo.Props.SetText(ical.PropDescription, *d.Description)
|
||||||
|
}
|
||||||
|
if d.Notes != nil {
|
||||||
|
desc := ""
|
||||||
|
if d.Description != nil {
|
||||||
|
desc = *d.Description + "\n\n"
|
||||||
|
}
|
||||||
|
todo.Props.SetText(ical.PropDescription, desc+*d.Notes)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse due_date (stored as string "YYYY-MM-DD")
|
||||||
|
if due, err := time.Parse("2006-01-02", d.DueDate); err == nil {
|
||||||
|
todo.Props.SetDate(ical.PropDue, due)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Map status
|
||||||
|
switch d.Status {
|
||||||
|
case "completed":
|
||||||
|
todo.Props.SetText(ical.PropStatus, "COMPLETED")
|
||||||
|
if d.CompletedAt != nil {
|
||||||
|
todo.Props.SetDateTime(ical.PropCompleted, d.CompletedAt.UTC())
|
||||||
|
}
|
||||||
|
case "pending":
|
||||||
|
todo.Props.SetText(ical.PropStatus, "NEEDS-ACTION")
|
||||||
|
default:
|
||||||
|
todo.Props.SetText(ical.PropStatus, "IN-PROCESS")
|
||||||
|
}
|
||||||
|
|
||||||
|
cal.Children = append(cal.Children, todo)
|
||||||
|
|
||||||
|
path := calendarObjectPath(cfg.CalendarPath, uid)
|
||||||
|
obj, err := client.PutCalendarObject(ctx, path, cal)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("putting VTODO: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update caldav_uid and etag in DB
|
||||||
|
return s.updateDeadlineCalDAV(d.ID, uid, obj.ETag)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PushAppointment pushes a single appointment to CalDAV (called on create/update).
|
||||||
|
func (s *CalDAVService) PushAppointment(ctx context.Context, tenantID uuid.UUID, appointment *models.Appointment) error {
|
||||||
|
cfg, err := s.LoadTenantConfig(tenantID)
|
||||||
|
if err != nil || !cfg.SyncEnabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
client, err := newCalDAVClient(*cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating CalDAV client: %w", err)
|
||||||
|
}
|
||||||
|
return s.pushAppointment(ctx, client, *cfg, appointment)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) pushAppointment(ctx context.Context, client *caldav.Client, cfg CalDAVConfig, a *models.Appointment) error {
|
||||||
|
uid := appointmentUID(a.ID)
|
||||||
|
|
||||||
|
cal := ical.NewCalendar()
|
||||||
|
cal.Props.SetText(ical.PropProductID, calDAVProdID)
|
||||||
|
cal.Props.SetText(ical.PropVersion, "2.0")
|
||||||
|
|
||||||
|
event := ical.NewEvent()
|
||||||
|
event.Props.SetText(ical.PropUID, uid)
|
||||||
|
event.Props.SetText(ical.PropSummary, a.Title)
|
||||||
|
event.Props.SetDateTime(ical.PropDateTimeStamp, time.Now().UTC())
|
||||||
|
event.Props.SetDateTime(ical.PropDateTimeStart, a.StartAt.UTC())
|
||||||
|
|
||||||
|
if a.EndAt != nil {
|
||||||
|
event.Props.SetDateTime(ical.PropDateTimeEnd, a.EndAt.UTC())
|
||||||
|
}
|
||||||
|
if a.Description != nil {
|
||||||
|
event.Props.SetText(ical.PropDescription, *a.Description)
|
||||||
|
}
|
||||||
|
if a.Location != nil {
|
||||||
|
event.Props.SetText(ical.PropLocation, *a.Location)
|
||||||
|
}
|
||||||
|
|
||||||
|
cal.Children = append(cal.Children, event.Component)
|
||||||
|
|
||||||
|
path := calendarObjectPath(cfg.CalendarPath, uid)
|
||||||
|
obj, err := client.PutCalendarObject(ctx, path, cal)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("putting VEVENT: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return s.updateAppointmentCalDAV(a.ID, uid, obj.ETag)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteDeadlineCalDAV removes a deadline's VTODO from CalDAV.
|
||||||
|
func (s *CalDAVService) DeleteDeadlineCalDAV(ctx context.Context, tenantID uuid.UUID, deadline *models.Deadline) error {
|
||||||
|
if deadline.CalDAVUID == nil || *deadline.CalDAVUID == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
cfg, err := s.LoadTenantConfig(tenantID)
|
||||||
|
if err != nil || !cfg.SyncEnabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
client, err := newCalDAVClient(*cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating CalDAV client: %w", err)
|
||||||
|
}
|
||||||
|
path := calendarObjectPath(cfg.CalendarPath, *deadline.CalDAVUID)
|
||||||
|
return client.RemoveAll(ctx, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteAppointmentCalDAV removes an appointment's VEVENT from CalDAV.
|
||||||
|
func (s *CalDAVService) DeleteAppointmentCalDAV(ctx context.Context, tenantID uuid.UUID, appointment *models.Appointment) error {
|
||||||
|
if appointment.CalDAVUID == nil || *appointment.CalDAVUID == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
cfg, err := s.LoadTenantConfig(tenantID)
|
||||||
|
if err != nil || !cfg.SyncEnabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
client, err := newCalDAVClient(*cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating CalDAV client: %w", err)
|
||||||
|
}
|
||||||
|
path := calendarObjectPath(cfg.CalendarPath, *appointment.CalDAVUID)
|
||||||
|
return client.RemoveAll(ctx, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Pull: CalDAV -> Local ---
|
||||||
|
|
||||||
|
// pullAll fetches all calendar objects from CalDAV and reconciles with local DB.
|
||||||
|
func (s *CalDAVService) pullAll(ctx context.Context, client *caldav.Client, tenantID uuid.UUID, cfg CalDAVConfig) (int, []string) {
|
||||||
|
var pulled int
|
||||||
|
var errs []string
|
||||||
|
|
||||||
|
query := &caldav.CalendarQuery{
|
||||||
|
CompFilter: caldav.CompFilter{
|
||||||
|
Name: ical.CompCalendar,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
objects, err := client.QueryCalendar(ctx, cfg.CalendarPath, query)
|
||||||
|
if err != nil {
|
||||||
|
return 0, []string{fmt.Sprintf("querying calendar: %v", err)}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, obj := range objects {
|
||||||
|
if obj.Data == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, child := range obj.Data.Children {
|
||||||
|
switch child.Name {
|
||||||
|
case ical.CompToDo:
|
||||||
|
uid, _ := child.Props.Text(ical.PropUID)
|
||||||
|
if uid == "" || !isKanzlAIUID(uid, "deadline") {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := s.reconcileDeadline(ctx, tenantID, child, obj.ETag); err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("reconcile deadline %s: %v", uid, err))
|
||||||
|
} else {
|
||||||
|
pulled++
|
||||||
|
}
|
||||||
|
case ical.CompEvent:
|
||||||
|
uid, _ := child.Props.Text(ical.PropUID)
|
||||||
|
if uid == "" || !isKanzlAIUID(uid, "appointment") {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := s.reconcileAppointment(ctx, tenantID, child, obj.ETag); err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("reconcile appointment %s: %v", uid, err))
|
||||||
|
} else {
|
||||||
|
pulled++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return pulled, errs
|
||||||
|
}
|
||||||
|
|
||||||
|
// reconcileDeadline handles conflict resolution for a pulled VTODO.
|
||||||
|
// KanzlAI wins for dates/status, CalDAV wins for notes/description.
|
||||||
|
func (s *CalDAVService) reconcileDeadline(ctx context.Context, tenantID uuid.UUID, comp *ical.Component, remoteEtag string) error {
|
||||||
|
uid, _ := comp.Props.Text(ical.PropUID)
|
||||||
|
deadlineID := extractIDFromUID(uid, "deadline")
|
||||||
|
if deadlineID == uuid.Nil {
|
||||||
|
return fmt.Errorf("invalid UID: %s", uid)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load existing deadline
|
||||||
|
var d models.Deadline
|
||||||
|
err := s.db.Get(&d, `SELECT id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at
|
||||||
|
FROM deadlines WHERE id = $1 AND tenant_id = $2`, deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("loading deadline: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if remote changed (etag mismatch)
|
||||||
|
if d.CalDAVEtag != nil && *d.CalDAVEtag == remoteEtag {
|
||||||
|
return nil // No change
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalDAV wins for description/notes
|
||||||
|
description, _ := comp.Props.Text(ical.PropDescription)
|
||||||
|
hasConflict := false
|
||||||
|
|
||||||
|
if description != "" {
|
||||||
|
existingDesc := ""
|
||||||
|
if d.Description != nil {
|
||||||
|
existingDesc = *d.Description
|
||||||
|
}
|
||||||
|
existingNotes := ""
|
||||||
|
if d.Notes != nil {
|
||||||
|
existingNotes = *d.Notes
|
||||||
|
}
|
||||||
|
// CalDAV wins for notes/description
|
||||||
|
if description != existingDesc && description != existingNotes {
|
||||||
|
hasConflict = true
|
||||||
|
_, err = s.db.Exec(`UPDATE deadlines SET notes = $1, caldav_etag = $2, updated_at = NOW()
|
||||||
|
WHERE id = $3 AND tenant_id = $4`, description, remoteEtag, deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("updating deadline notes: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !hasConflict {
|
||||||
|
// Just update etag
|
||||||
|
_, err = s.db.Exec(`UPDATE deadlines SET caldav_etag = $1, updated_at = NOW()
|
||||||
|
WHERE id = $2 AND tenant_id = $3`, remoteEtag, deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("updating deadline etag: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log conflict in case_events if detected
|
||||||
|
if hasConflict {
|
||||||
|
s.logConflictEvent(ctx, tenantID, d.CaseID, "deadline", deadlineID, "CalDAV description updated from remote")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// reconcileAppointment handles conflict resolution for a pulled VEVENT.
|
||||||
|
func (s *CalDAVService) reconcileAppointment(ctx context.Context, tenantID uuid.UUID, comp *ical.Component, remoteEtag string) error {
|
||||||
|
uid, _ := comp.Props.Text(ical.PropUID)
|
||||||
|
appointmentID := extractIDFromUID(uid, "appointment")
|
||||||
|
if appointmentID == uuid.Nil {
|
||||||
|
return fmt.Errorf("invalid UID: %s", uid)
|
||||||
|
}
|
||||||
|
|
||||||
|
var a models.Appointment
|
||||||
|
err := s.db.GetContext(ctx, &a, `SELECT * FROM appointments WHERE id = $1 AND tenant_id = $2`, appointmentID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("loading appointment: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if a.CalDAVEtag != nil && *a.CalDAVEtag == remoteEtag {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalDAV wins for description
|
||||||
|
description, _ := comp.Props.Text(ical.PropDescription)
|
||||||
|
location, _ := comp.Props.Text(ical.PropLocation)
|
||||||
|
hasConflict := false
|
||||||
|
|
||||||
|
updates := []string{"caldav_etag = $1", "updated_at = NOW()"}
|
||||||
|
args := []any{remoteEtag}
|
||||||
|
argN := 2
|
||||||
|
|
||||||
|
if description != "" {
|
||||||
|
existingDesc := ""
|
||||||
|
if a.Description != nil {
|
||||||
|
existingDesc = *a.Description
|
||||||
|
}
|
||||||
|
if description != existingDesc {
|
||||||
|
hasConflict = true
|
||||||
|
updates = append(updates, fmt.Sprintf("description = $%d", argN))
|
||||||
|
args = append(args, description)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if location != "" {
|
||||||
|
existingLoc := ""
|
||||||
|
if a.Location != nil {
|
||||||
|
existingLoc = *a.Location
|
||||||
|
}
|
||||||
|
if location != existingLoc {
|
||||||
|
hasConflict = true
|
||||||
|
updates = append(updates, fmt.Sprintf("location = $%d", argN))
|
||||||
|
args = append(args, location)
|
||||||
|
argN++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
args = append(args, appointmentID, tenantID)
|
||||||
|
query := fmt.Sprintf("UPDATE appointments SET %s WHERE id = $%d AND tenant_id = $%d",
|
||||||
|
strings.Join(updates, ", "), argN, argN+1)
|
||||||
|
|
||||||
|
if _, err := s.db.ExecContext(ctx, query, args...); err != nil {
|
||||||
|
return fmt.Errorf("updating appointment: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if hasConflict {
|
||||||
|
caseID := uuid.Nil
|
||||||
|
if a.CaseID != nil {
|
||||||
|
caseID = *a.CaseID
|
||||||
|
}
|
||||||
|
s.logConflictEvent(ctx, tenantID, caseID, "appointment", appointmentID, "CalDAV description/location updated from remote")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- DB helpers ---
|
||||||
|
|
||||||
|
func (s *CalDAVService) loadDeadlines(tenantID uuid.UUID) ([]models.Deadline, error) {
|
||||||
|
var deadlines []models.Deadline
|
||||||
|
err := s.db.Select(&deadlines, `SELECT id, tenant_id, case_id, title, description, due_date,
|
||||||
|
original_due_date, warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at
|
||||||
|
FROM deadlines WHERE tenant_id = $1`, tenantID)
|
||||||
|
return deadlines, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) loadAppointments(ctx context.Context, tenantID uuid.UUID) ([]models.Appointment, error) {
|
||||||
|
var appointments []models.Appointment
|
||||||
|
err := s.db.SelectContext(ctx, &appointments, "SELECT * FROM appointments WHERE tenant_id = $1", tenantID)
|
||||||
|
return appointments, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) updateDeadlineCalDAV(id uuid.UUID, calDAVUID, etag string) error {
|
||||||
|
_, err := s.db.Exec(`UPDATE deadlines SET caldav_uid = $1, caldav_etag = $2, updated_at = NOW()
|
||||||
|
WHERE id = $3`, calDAVUID, etag, id)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) updateAppointmentCalDAV(id uuid.UUID, calDAVUID, etag string) error {
|
||||||
|
_, err := s.db.Exec(`UPDATE appointments SET caldav_uid = $1, caldav_etag = $2, updated_at = NOW()
|
||||||
|
WHERE id = $3`, calDAVUID, etag, id)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CalDAVService) logConflictEvent(ctx context.Context, tenantID, caseID uuid.UUID, objectType string, objectID uuid.UUID, msg string) {
|
||||||
|
if caseID == uuid.Nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
metadata, _ := json.Marshal(map[string]string{
|
||||||
|
"object_type": objectType,
|
||||||
|
"object_id": objectID.String(),
|
||||||
|
"source": "caldav_sync",
|
||||||
|
})
|
||||||
|
_, err := s.db.ExecContext(ctx, `INSERT INTO case_events (id, tenant_id, case_id, event_type, title, description, metadata, created_at, updated_at)
|
||||||
|
VALUES ($1, $2, $3, 'caldav_conflict', $4, $5, $6, NOW(), NOW())`,
|
||||||
|
uuid.New(), tenantID, caseID, "CalDAV sync conflict", msg, metadata)
|
||||||
|
if err != nil {
|
||||||
|
slog.Error("CalDAV: failed to log conflict event", "error", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- UID helpers ---
|
||||||
|
|
||||||
|
func deadlineUID(id uuid.UUID) string {
|
||||||
|
return fmt.Sprintf("kanzlai-deadline-%s@%s", id, calDAVDomain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func appointmentUID(id uuid.UUID) string {
|
||||||
|
return fmt.Sprintf("kanzlai-appointment-%s@%s", id, calDAVDomain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func isKanzlAIUID(uid, objectType string) bool {
|
||||||
|
return strings.HasPrefix(uid, "kanzlai-"+objectType+"-") && strings.HasSuffix(uid, "@"+calDAVDomain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func extractIDFromUID(uid, objectType string) uuid.UUID {
|
||||||
|
prefix := "kanzlai-" + objectType + "-"
|
||||||
|
suffix := "@" + calDAVDomain
|
||||||
|
if !strings.HasPrefix(uid, prefix) || !strings.HasSuffix(uid, suffix) {
|
||||||
|
return uuid.Nil
|
||||||
|
}
|
||||||
|
idStr := uid[len(prefix) : len(uid)-len(suffix)]
|
||||||
|
id, err := uuid.Parse(idStr)
|
||||||
|
if err != nil {
|
||||||
|
return uuid.Nil
|
||||||
|
}
|
||||||
|
return id
|
||||||
|
}
|
||||||
|
|
||||||
|
func calendarObjectPath(calendarPath, uid string) string {
|
||||||
|
path := strings.TrimSuffix(calendarPath, "/")
|
||||||
|
return path + "/" + uid + ".ics"
|
||||||
|
}
|
||||||
124
backend/internal/services/caldav_service_test.go
Normal file
124
backend/internal/services/caldav_service_test.go
Normal file
@@ -0,0 +1,124 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDeadlineUID(t *testing.T) {
|
||||||
|
id := uuid.MustParse("550e8400-e29b-41d4-a716-446655440000")
|
||||||
|
uid := deadlineUID(id)
|
||||||
|
want := "kanzlai-deadline-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de"
|
||||||
|
if uid != want {
|
||||||
|
t.Errorf("deadlineUID = %q, want %q", uid, want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAppointmentUID(t *testing.T) {
|
||||||
|
id := uuid.MustParse("550e8400-e29b-41d4-a716-446655440000")
|
||||||
|
uid := appointmentUID(id)
|
||||||
|
want := "kanzlai-appointment-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de"
|
||||||
|
if uid != want {
|
||||||
|
t.Errorf("appointmentUID = %q, want %q", uid, want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsKanzlAIUID(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
uid string
|
||||||
|
objectType string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{"kanzlai-deadline-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de", "deadline", true},
|
||||||
|
{"kanzlai-appointment-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de", "appointment", true},
|
||||||
|
{"kanzlai-deadline-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de", "appointment", false},
|
||||||
|
{"random-uid@other.com", "deadline", false},
|
||||||
|
{"", "deadline", false},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
got := isKanzlAIUID(tt.uid, tt.objectType)
|
||||||
|
if got != tt.want {
|
||||||
|
t.Errorf("isKanzlAIUID(%q, %q) = %v, want %v", tt.uid, tt.objectType, got, tt.want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestExtractIDFromUID(t *testing.T) {
|
||||||
|
id := uuid.MustParse("550e8400-e29b-41d4-a716-446655440000")
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
uid string
|
||||||
|
objectType string
|
||||||
|
want uuid.UUID
|
||||||
|
}{
|
||||||
|
{"kanzlai-deadline-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de", "deadline", id},
|
||||||
|
{"kanzlai-appointment-550e8400-e29b-41d4-a716-446655440000@kanzlai.msbls.de", "appointment", id},
|
||||||
|
{"invalid-uid", "deadline", uuid.Nil},
|
||||||
|
{"kanzlai-deadline-not-a-uuid@kanzlai.msbls.de", "deadline", uuid.Nil},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
got := extractIDFromUID(tt.uid, tt.objectType)
|
||||||
|
if got != tt.want {
|
||||||
|
t.Errorf("extractIDFromUID(%q, %q) = %v, want %v", tt.uid, tt.objectType, got, tt.want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCalendarObjectPath(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
calendarPath string
|
||||||
|
uid string
|
||||||
|
want string
|
||||||
|
}{
|
||||||
|
{"/dav/calendars/user/cal", "kanzlai-deadline-abc@kanzlai.msbls.de", "/dav/calendars/user/cal/kanzlai-deadline-abc@kanzlai.msbls.de.ics"},
|
||||||
|
{"/dav/calendars/user/cal/", "kanzlai-deadline-abc@kanzlai.msbls.de", "/dav/calendars/user/cal/kanzlai-deadline-abc@kanzlai.msbls.de.ics"},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
got := calendarObjectPath(tt.calendarPath, tt.uid)
|
||||||
|
if got != tt.want {
|
||||||
|
t.Errorf("calendarObjectPath(%q, %q) = %q, want %q", tt.calendarPath, tt.uid, got, tt.want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestParseCalDAVConfig(t *testing.T) {
|
||||||
|
settings := []byte(`{"caldav": {"url": "https://dav.example.com", "username": "user", "password": "pass", "calendar_path": "/cal", "sync_enabled": true, "sync_interval_minutes": 30}}`)
|
||||||
|
cfg, err := parseCalDAVConfig(settings)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("parseCalDAVConfig: %v", err)
|
||||||
|
}
|
||||||
|
if cfg.URL != "https://dav.example.com" {
|
||||||
|
t.Errorf("URL = %q, want %q", cfg.URL, "https://dav.example.com")
|
||||||
|
}
|
||||||
|
if cfg.Username != "user" {
|
||||||
|
t.Errorf("Username = %q, want %q", cfg.Username, "user")
|
||||||
|
}
|
||||||
|
if cfg.SyncIntervalMinutes != 30 {
|
||||||
|
t.Errorf("SyncIntervalMinutes = %d, want 30", cfg.SyncIntervalMinutes)
|
||||||
|
}
|
||||||
|
if !cfg.SyncEnabled {
|
||||||
|
t.Error("SyncEnabled = false, want true")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestParseCalDAVConfig_Empty(t *testing.T) {
|
||||||
|
cfg, err := parseCalDAVConfig(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("parseCalDAVConfig(nil): %v", err)
|
||||||
|
}
|
||||||
|
if cfg.URL != "" {
|
||||||
|
t.Errorf("expected empty config, got URL=%q", cfg.URL)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestParseCalDAVConfig_NoCalDAV(t *testing.T) {
|
||||||
|
settings := []byte(`{"other_setting": true}`)
|
||||||
|
cfg, err := parseCalDAVConfig(settings)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("parseCalDAVConfig: %v", err)
|
||||||
|
}
|
||||||
|
if cfg.URL != "" {
|
||||||
|
t.Errorf("expected empty caldav config, got URL=%q", cfg.URL)
|
||||||
|
}
|
||||||
|
}
|
||||||
277
backend/internal/services/case_service.go
Normal file
277
backend/internal/services/case_service.go
Normal file
@@ -0,0 +1,277 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCaseService(db *sqlx.DB) *CaseService {
|
||||||
|
return &CaseService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
type CaseFilter struct {
|
||||||
|
Status string
|
||||||
|
Type string
|
||||||
|
Search string
|
||||||
|
Limit int
|
||||||
|
Offset int
|
||||||
|
}
|
||||||
|
|
||||||
|
type CaseDetail struct {
|
||||||
|
models.Case
|
||||||
|
Parties []models.Party `json:"parties"`
|
||||||
|
RecentEvents []models.CaseEvent `json:"recent_events"`
|
||||||
|
DeadlinesCount int `json:"deadlines_count"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type CreateCaseInput struct {
|
||||||
|
CaseNumber string `json:"case_number"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
CaseType *string `json:"case_type,omitempty"`
|
||||||
|
Court *string `json:"court,omitempty"`
|
||||||
|
CourtRef *string `json:"court_ref,omitempty"`
|
||||||
|
Status string `json:"status"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type UpdateCaseInput struct {
|
||||||
|
CaseNumber *string `json:"case_number,omitempty"`
|
||||||
|
Title *string `json:"title,omitempty"`
|
||||||
|
CaseType *string `json:"case_type,omitempty"`
|
||||||
|
Court *string `json:"court,omitempty"`
|
||||||
|
CourtRef *string `json:"court_ref,omitempty"`
|
||||||
|
Status *string `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CaseService) List(ctx context.Context, tenantID uuid.UUID, filter CaseFilter) ([]models.Case, int, error) {
|
||||||
|
if filter.Limit <= 0 {
|
||||||
|
filter.Limit = 20
|
||||||
|
}
|
||||||
|
if filter.Limit > 100 {
|
||||||
|
filter.Limit = 100
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build WHERE clause
|
||||||
|
where := "WHERE tenant_id = $1"
|
||||||
|
args := []interface{}{tenantID}
|
||||||
|
argIdx := 2
|
||||||
|
|
||||||
|
if filter.Status != "" {
|
||||||
|
where += fmt.Sprintf(" AND status = $%d", argIdx)
|
||||||
|
args = append(args, filter.Status)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if filter.Type != "" {
|
||||||
|
where += fmt.Sprintf(" AND case_type = $%d", argIdx)
|
||||||
|
args = append(args, filter.Type)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if filter.Search != "" {
|
||||||
|
where += fmt.Sprintf(" AND (title ILIKE $%d OR case_number ILIKE $%d)", argIdx, argIdx)
|
||||||
|
args = append(args, "%"+filter.Search+"%")
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
|
||||||
|
// Count total
|
||||||
|
var total int
|
||||||
|
countQuery := "SELECT COUNT(*) FROM cases " + where
|
||||||
|
if err := s.db.GetContext(ctx, &total, countQuery, args...); err != nil {
|
||||||
|
return nil, 0, fmt.Errorf("counting cases: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fetch page
|
||||||
|
query := fmt.Sprintf("SELECT * FROM cases %s ORDER BY updated_at DESC LIMIT $%d OFFSET $%d",
|
||||||
|
where, argIdx, argIdx+1)
|
||||||
|
args = append(args, filter.Limit, filter.Offset)
|
||||||
|
|
||||||
|
var cases []models.Case
|
||||||
|
if err := s.db.SelectContext(ctx, &cases, query, args...); err != nil {
|
||||||
|
return nil, 0, fmt.Errorf("listing cases: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return cases, total, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CaseService) GetByID(ctx context.Context, tenantID, caseID uuid.UUID) (*CaseDetail, error) {
|
||||||
|
var c models.Case
|
||||||
|
err := s.db.GetContext(ctx, &c,
|
||||||
|
"SELECT * FROM cases WHERE id = $1 AND tenant_id = $2", caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("getting case: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
detail := &CaseDetail{Case: c}
|
||||||
|
|
||||||
|
// Parties
|
||||||
|
if err := s.db.SelectContext(ctx, &detail.Parties,
|
||||||
|
"SELECT * FROM parties WHERE case_id = $1 AND tenant_id = $2 ORDER BY name",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("getting parties: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Recent events (last 20)
|
||||||
|
if err := s.db.SelectContext(ctx, &detail.RecentEvents,
|
||||||
|
"SELECT * FROM case_events WHERE case_id = $1 AND tenant_id = $2 ORDER BY created_at DESC LIMIT 20",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("getting events: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deadlines count
|
||||||
|
if err := s.db.GetContext(ctx, &detail.DeadlinesCount,
|
||||||
|
"SELECT COUNT(*) FROM deadlines WHERE case_id = $1 AND tenant_id = $2",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("counting deadlines: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return detail, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CaseService) Create(ctx context.Context, tenantID uuid.UUID, userID uuid.UUID, input CreateCaseInput) (*models.Case, error) {
|
||||||
|
if input.Status == "" {
|
||||||
|
input.Status = "active"
|
||||||
|
}
|
||||||
|
|
||||||
|
id := uuid.New()
|
||||||
|
now := time.Now()
|
||||||
|
|
||||||
|
_, err := s.db.ExecContext(ctx,
|
||||||
|
`INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status, metadata, created_at, updated_at)
|
||||||
|
VALUES ($1, $2, $3, $4, $5, $6, $7, $8, '{}', $9, $9)`,
|
||||||
|
id, tenantID, input.CaseNumber, input.Title, input.CaseType, input.Court, input.CourtRef, input.Status, now)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("creating case: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create case_created event
|
||||||
|
createEvent(ctx, s.db, tenantID, id, userID, "case_created", "Case created", nil)
|
||||||
|
|
||||||
|
var c models.Case
|
||||||
|
if err := s.db.GetContext(ctx, &c, "SELECT * FROM cases WHERE id = $1", id); err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching created case: %w", err)
|
||||||
|
}
|
||||||
|
return &c, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CaseService) Update(ctx context.Context, tenantID, caseID uuid.UUID, userID uuid.UUID, input UpdateCaseInput) (*models.Case, error) {
|
||||||
|
// Fetch current to detect status change
|
||||||
|
var current models.Case
|
||||||
|
err := s.db.GetContext(ctx, ¤t,
|
||||||
|
"SELECT * FROM cases WHERE id = $1 AND tenant_id = $2", caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("fetching case for update: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build SET clause dynamically
|
||||||
|
sets := []string{}
|
||||||
|
args := []interface{}{}
|
||||||
|
argIdx := 1
|
||||||
|
|
||||||
|
if input.CaseNumber != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("case_number = $%d", argIdx))
|
||||||
|
args = append(args, *input.CaseNumber)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.Title != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("title = $%d", argIdx))
|
||||||
|
args = append(args, *input.Title)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.CaseType != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("case_type = $%d", argIdx))
|
||||||
|
args = append(args, *input.CaseType)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.Court != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("court = $%d", argIdx))
|
||||||
|
args = append(args, *input.Court)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.CourtRef != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("court_ref = $%d", argIdx))
|
||||||
|
args = append(args, *input.CourtRef)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.Status != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("status = $%d", argIdx))
|
||||||
|
args = append(args, *input.Status)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(sets) == 0 {
|
||||||
|
return ¤t, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
sets = append(sets, fmt.Sprintf("updated_at = $%d", argIdx))
|
||||||
|
args = append(args, time.Now())
|
||||||
|
argIdx++
|
||||||
|
|
||||||
|
query := fmt.Sprintf("UPDATE cases SET %s WHERE id = $%d AND tenant_id = $%d",
|
||||||
|
joinStrings(sets, ", "), argIdx, argIdx+1)
|
||||||
|
args = append(args, caseID, tenantID)
|
||||||
|
|
||||||
|
if _, err := s.db.ExecContext(ctx, query, args...); err != nil {
|
||||||
|
return nil, fmt.Errorf("updating case: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log status change event
|
||||||
|
if input.Status != nil && *input.Status != current.Status {
|
||||||
|
desc := fmt.Sprintf("Status changed from %s to %s", current.Status, *input.Status)
|
||||||
|
createEvent(ctx, s.db, tenantID, caseID, userID, "status_changed", desc, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
var updated models.Case
|
||||||
|
if err := s.db.GetContext(ctx, &updated, "SELECT * FROM cases WHERE id = $1", caseID); err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching updated case: %w", err)
|
||||||
|
}
|
||||||
|
return &updated, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *CaseService) Delete(ctx context.Context, tenantID, caseID uuid.UUID, userID uuid.UUID) error {
|
||||||
|
result, err := s.db.ExecContext(ctx,
|
||||||
|
"UPDATE cases SET status = 'archived', updated_at = $1 WHERE id = $2 AND tenant_id = $3 AND status != 'archived'",
|
||||||
|
time.Now(), caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("archiving case: %w", err)
|
||||||
|
}
|
||||||
|
rows, _ := result.RowsAffected()
|
||||||
|
if rows == 0 {
|
||||||
|
return sql.ErrNoRows
|
||||||
|
}
|
||||||
|
createEvent(ctx, s.db, tenantID, caseID, userID, "case_archived", "Case archived", nil)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func createEvent(ctx context.Context, db *sqlx.DB, tenantID, caseID uuid.UUID, userID uuid.UUID, eventType, title string, description *string) {
|
||||||
|
now := time.Now()
|
||||||
|
db.ExecContext(ctx,
|
||||||
|
`INSERT INTO case_events (id, tenant_id, case_id, event_type, title, description, event_date, created_by, metadata, created_at, updated_at)
|
||||||
|
VALUES ($1, $2, $3, $4, $5, $6, $7, $8, '{}', $7, $7)`,
|
||||||
|
uuid.New(), tenantID, caseID, eventType, title, description, now, userID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func joinStrings(strs []string, sep string) string {
|
||||||
|
result := ""
|
||||||
|
for i, s := range strs {
|
||||||
|
if i > 0 {
|
||||||
|
result += sep
|
||||||
|
}
|
||||||
|
result += s
|
||||||
|
}
|
||||||
|
return result
|
||||||
|
}
|
||||||
151
backend/internal/services/dashboard_service.go
Normal file
151
backend/internal/services/dashboard_service.go
Normal file
@@ -0,0 +1,151 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DashboardService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDashboardService(db *sqlx.DB) *DashboardService {
|
||||||
|
return &DashboardService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
type DashboardData struct {
|
||||||
|
DeadlineSummary DeadlineSummary `json:"deadline_summary"`
|
||||||
|
CaseSummary CaseSummary `json:"case_summary"`
|
||||||
|
UpcomingDeadlines []UpcomingDeadline `json:"upcoming_deadlines"`
|
||||||
|
UpcomingAppointments []UpcomingAppointment `json:"upcoming_appointments"`
|
||||||
|
RecentActivity []RecentActivity `json:"recent_activity"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type DeadlineSummary struct {
|
||||||
|
OverdueCount int `json:"overdue_count" db:"overdue_count"`
|
||||||
|
DueThisWeek int `json:"due_this_week" db:"due_this_week"`
|
||||||
|
DueNextWeek int `json:"due_next_week" db:"due_next_week"`
|
||||||
|
OKCount int `json:"ok_count" db:"ok_count"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type CaseSummary struct {
|
||||||
|
ActiveCount int `json:"active_count" db:"active_count"`
|
||||||
|
NewThisMonth int `json:"new_this_month" db:"new_this_month"`
|
||||||
|
ClosedCount int `json:"closed_count" db:"closed_count"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type UpcomingDeadline struct {
|
||||||
|
ID uuid.UUID `json:"id" db:"id"`
|
||||||
|
Title string `json:"title" db:"title"`
|
||||||
|
DueDate string `json:"due_date" db:"due_date"`
|
||||||
|
CaseNumber string `json:"case_number" db:"case_number"`
|
||||||
|
CaseTitle string `json:"case_title" db:"case_title"`
|
||||||
|
Status string `json:"status" db:"status"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type UpcomingAppointment struct {
|
||||||
|
ID uuid.UUID `json:"id" db:"id"`
|
||||||
|
Title string `json:"title" db:"title"`
|
||||||
|
StartAt time.Time `json:"start_at" db:"start_at"`
|
||||||
|
CaseNumber *string `json:"case_number" db:"case_number"`
|
||||||
|
Location *string `json:"location" db:"location"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type RecentActivity struct {
|
||||||
|
EventType *string `json:"event_type" db:"event_type"`
|
||||||
|
Title string `json:"title" db:"title"`
|
||||||
|
CaseNumber string `json:"case_number" db:"case_number"`
|
||||||
|
EventDate *time.Time `json:"event_date" db:"event_date"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DashboardService) Get(ctx context.Context, tenantID uuid.UUID) (*DashboardData, error) {
|
||||||
|
now := time.Now()
|
||||||
|
today := now.Format("2006-01-02")
|
||||||
|
endOfWeek := now.AddDate(0, 0, 7-int(now.Weekday())).Format("2006-01-02")
|
||||||
|
endOfNextWeek := now.AddDate(0, 0, 14-int(now.Weekday())).Format("2006-01-02")
|
||||||
|
in7Days := now.AddDate(0, 0, 7).Format("2006-01-02")
|
||||||
|
startOfMonth := time.Date(now.Year(), now.Month(), 1, 0, 0, 0, 0, now.Location()).Format("2006-01-02")
|
||||||
|
|
||||||
|
data := &DashboardData{}
|
||||||
|
|
||||||
|
// Single query with CTEs for deadline + case summaries
|
||||||
|
summaryQuery := `
|
||||||
|
WITH deadline_stats AS (
|
||||||
|
SELECT
|
||||||
|
COUNT(*) FILTER (WHERE due_date < $2 AND status = 'pending') AS overdue_count,
|
||||||
|
COUNT(*) FILTER (WHERE due_date >= $2 AND due_date <= $3 AND status = 'pending') AS due_this_week,
|
||||||
|
COUNT(*) FILTER (WHERE due_date > $3 AND due_date <= $4 AND status = 'pending') AS due_next_week,
|
||||||
|
COUNT(*) FILTER (WHERE due_date > $4 AND status = 'pending') AS ok_count
|
||||||
|
FROM deadlines
|
||||||
|
WHERE tenant_id = $1
|
||||||
|
),
|
||||||
|
case_stats AS (
|
||||||
|
SELECT
|
||||||
|
COUNT(*) FILTER (WHERE status = 'active') AS active_count,
|
||||||
|
COUNT(*) FILTER (WHERE created_at >= $5::date AND status != 'archived') AS new_this_month,
|
||||||
|
COUNT(*) FILTER (WHERE status IN ('closed', 'archived')) AS closed_count
|
||||||
|
FROM cases
|
||||||
|
WHERE tenant_id = $1
|
||||||
|
)
|
||||||
|
SELECT
|
||||||
|
ds.overdue_count, ds.due_this_week, ds.due_next_week, ds.ok_count,
|
||||||
|
cs.active_count, cs.new_this_month, cs.closed_count
|
||||||
|
FROM deadline_stats ds, case_stats cs`
|
||||||
|
|
||||||
|
var summaryRow struct {
|
||||||
|
DeadlineSummary
|
||||||
|
CaseSummary
|
||||||
|
}
|
||||||
|
err := s.db.GetContext(ctx, &summaryRow, summaryQuery, tenantID, today, endOfWeek, endOfNextWeek, startOfMonth)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("dashboard summary: %w", err)
|
||||||
|
}
|
||||||
|
data.DeadlineSummary = summaryRow.DeadlineSummary
|
||||||
|
data.CaseSummary = summaryRow.CaseSummary
|
||||||
|
|
||||||
|
// Upcoming deadlines (next 7 days)
|
||||||
|
deadlineQuery := `
|
||||||
|
SELECT d.id, d.title, d.due_date, c.case_number, c.title AS case_title, d.status
|
||||||
|
FROM deadlines d
|
||||||
|
JOIN cases c ON c.id = d.case_id AND c.tenant_id = d.tenant_id
|
||||||
|
WHERE d.tenant_id = $1 AND d.status = 'pending' AND d.due_date >= $2 AND d.due_date <= $3
|
||||||
|
ORDER BY d.due_date ASC`
|
||||||
|
|
||||||
|
data.UpcomingDeadlines = []UpcomingDeadline{}
|
||||||
|
if err := s.db.SelectContext(ctx, &data.UpcomingDeadlines, deadlineQuery, tenantID, today, in7Days); err != nil {
|
||||||
|
return nil, fmt.Errorf("dashboard upcoming deadlines: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Upcoming appointments (next 7 days)
|
||||||
|
appointmentQuery := `
|
||||||
|
SELECT a.id, a.title, a.start_at, c.case_number, a.location
|
||||||
|
FROM appointments a
|
||||||
|
LEFT JOIN cases c ON c.id = a.case_id AND c.tenant_id = a.tenant_id
|
||||||
|
WHERE a.tenant_id = $1 AND a.start_at >= $2::timestamp AND a.start_at < ($2::date + interval '7 days')
|
||||||
|
ORDER BY a.start_at ASC`
|
||||||
|
|
||||||
|
data.UpcomingAppointments = []UpcomingAppointment{}
|
||||||
|
if err := s.db.SelectContext(ctx, &data.UpcomingAppointments, appointmentQuery, tenantID, now); err != nil {
|
||||||
|
return nil, fmt.Errorf("dashboard upcoming appointments: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Recent activity (last 10 case events)
|
||||||
|
activityQuery := `
|
||||||
|
SELECT ce.event_type, ce.title, c.case_number, ce.event_date
|
||||||
|
FROM case_events ce
|
||||||
|
JOIN cases c ON c.id = ce.case_id AND c.tenant_id = ce.tenant_id
|
||||||
|
WHERE ce.tenant_id = $1
|
||||||
|
ORDER BY COALESCE(ce.event_date, ce.created_at) DESC
|
||||||
|
LIMIT 10`
|
||||||
|
|
||||||
|
data.RecentActivity = []RecentActivity{}
|
||||||
|
if err := s.db.SelectContext(ctx, &data.RecentActivity, activityQuery, tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("dashboard recent activity: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return data, nil
|
||||||
|
}
|
||||||
33
backend/internal/services/dashboard_service_test.go
Normal file
33
backend/internal/services/dashboard_service_test.go
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDashboardDateCalculations(t *testing.T) {
|
||||||
|
// Verify the date range logic used in Get()
|
||||||
|
now := time.Date(2026, 3, 25, 14, 0, 0, 0, time.UTC) // Wednesday
|
||||||
|
|
||||||
|
today := now.Format("2006-01-02")
|
||||||
|
endOfWeek := now.AddDate(0, 0, 7-int(now.Weekday())).Format("2006-01-02")
|
||||||
|
endOfNextWeek := now.AddDate(0, 0, 14-int(now.Weekday())).Format("2006-01-02")
|
||||||
|
in7Days := now.AddDate(0, 0, 7).Format("2006-01-02")
|
||||||
|
startOfMonth := time.Date(now.Year(), now.Month(), 1, 0, 0, 0, 0, now.Location()).Format("2006-01-02")
|
||||||
|
|
||||||
|
if today != "2026-03-25" {
|
||||||
|
t.Errorf("today = %s, want 2026-03-25", today)
|
||||||
|
}
|
||||||
|
if endOfWeek != "2026-03-29" { // Sunday
|
||||||
|
t.Errorf("endOfWeek = %s, want 2026-03-29", endOfWeek)
|
||||||
|
}
|
||||||
|
if endOfNextWeek != "2026-04-05" {
|
||||||
|
t.Errorf("endOfNextWeek = %s, want 2026-04-05", endOfNextWeek)
|
||||||
|
}
|
||||||
|
if in7Days != "2026-04-01" {
|
||||||
|
t.Errorf("in7Days = %s, want 2026-04-01", in7Days)
|
||||||
|
}
|
||||||
|
if startOfMonth != "2026-03-01" {
|
||||||
|
t.Errorf("startOfMonth = %s, want 2026-03-01", startOfMonth)
|
||||||
|
}
|
||||||
|
}
|
||||||
99
backend/internal/services/deadline_calculator.go
Normal file
99
backend/internal/services/deadline_calculator.go
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CalculatedDeadline holds a calculated deadline with adjustment info
|
||||||
|
type CalculatedDeadline struct {
|
||||||
|
RuleCode string `json:"rule_code"`
|
||||||
|
RuleID string `json:"rule_id"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
DueDate string `json:"due_date"`
|
||||||
|
OriginalDueDate string `json:"original_due_date"`
|
||||||
|
WasAdjusted bool `json:"was_adjusted"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeadlineCalculator calculates deadlines from rules and event dates
|
||||||
|
type DeadlineCalculator struct {
|
||||||
|
holidays *HolidayService
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDeadlineCalculator creates a new calculator
|
||||||
|
func NewDeadlineCalculator(holidays *HolidayService) *DeadlineCalculator {
|
||||||
|
return &DeadlineCalculator{holidays: holidays}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalculateEndDate calculates the end date for a single deadline rule based on an event date.
|
||||||
|
// Adapted from youpc.org CalculateDeadlineEndDate.
|
||||||
|
func (c *DeadlineCalculator) CalculateEndDate(eventDate time.Time, rule models.DeadlineRule) (adjusted time.Time, original time.Time, wasAdjusted bool) {
|
||||||
|
endDate := eventDate
|
||||||
|
|
||||||
|
timing := "after"
|
||||||
|
if rule.Timing != nil {
|
||||||
|
timing = *rule.Timing
|
||||||
|
}
|
||||||
|
|
||||||
|
durationValue := rule.DurationValue
|
||||||
|
durationUnit := rule.DurationUnit
|
||||||
|
|
||||||
|
if timing == "before" {
|
||||||
|
switch durationUnit {
|
||||||
|
case "days":
|
||||||
|
endDate = endDate.AddDate(0, 0, -durationValue)
|
||||||
|
case "weeks":
|
||||||
|
endDate = endDate.AddDate(0, 0, -durationValue*7)
|
||||||
|
case "months":
|
||||||
|
endDate = endDate.AddDate(0, -durationValue, 0)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
switch durationUnit {
|
||||||
|
case "days":
|
||||||
|
endDate = endDate.AddDate(0, 0, durationValue)
|
||||||
|
case "weeks":
|
||||||
|
endDate = endDate.AddDate(0, 0, durationValue*7)
|
||||||
|
case "months":
|
||||||
|
endDate = endDate.AddDate(0, durationValue, 0)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
original = endDate
|
||||||
|
adjusted, _, wasAdjusted = c.holidays.AdjustForNonWorkingDays(endDate)
|
||||||
|
return adjusted, original, wasAdjusted
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalculateFromRules calculates deadlines for a set of rules given an event date.
|
||||||
|
// Returns a list of calculated deadlines with due dates.
|
||||||
|
func (c *DeadlineCalculator) CalculateFromRules(eventDate time.Time, rules []models.DeadlineRule) []CalculatedDeadline {
|
||||||
|
results := make([]CalculatedDeadline, 0, len(rules))
|
||||||
|
|
||||||
|
for _, rule := range rules {
|
||||||
|
var adjusted, original time.Time
|
||||||
|
var wasAdjusted bool
|
||||||
|
|
||||||
|
if rule.DurationValue > 0 {
|
||||||
|
adjusted, original, wasAdjusted = c.CalculateEndDate(eventDate, rule)
|
||||||
|
} else {
|
||||||
|
adjusted = eventDate
|
||||||
|
original = eventDate
|
||||||
|
}
|
||||||
|
|
||||||
|
code := ""
|
||||||
|
if rule.Code != nil {
|
||||||
|
code = *rule.Code
|
||||||
|
}
|
||||||
|
|
||||||
|
results = append(results, CalculatedDeadline{
|
||||||
|
RuleCode: code,
|
||||||
|
RuleID: rule.ID.String(),
|
||||||
|
Title: rule.Name,
|
||||||
|
DueDate: adjusted.Format("2006-01-02"),
|
||||||
|
OriginalDueDate: original.Format("2006-01-02"),
|
||||||
|
WasAdjusted: wasAdjusted,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
return results
|
||||||
|
}
|
||||||
141
backend/internal/services/deadline_calculator_test.go
Normal file
141
backend/internal/services/deadline_calculator_test.go
Normal file
@@ -0,0 +1,141 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCalculateEndDateAfterDays(t *testing.T) {
|
||||||
|
holidays := NewHolidayService(nil)
|
||||||
|
calc := NewDeadlineCalculator(holidays)
|
||||||
|
|
||||||
|
eventDate := time.Date(2026, 3, 25, 0, 0, 0, 0, time.UTC) // Wednesday
|
||||||
|
timing := "after"
|
||||||
|
rule := models.DeadlineRule{
|
||||||
|
ID: uuid.New(),
|
||||||
|
Name: "Test 10 days",
|
||||||
|
DurationValue: 10,
|
||||||
|
DurationUnit: "days",
|
||||||
|
Timing: &timing,
|
||||||
|
}
|
||||||
|
|
||||||
|
adjusted, original, wasAdjusted := calc.CalculateEndDate(eventDate, rule)
|
||||||
|
|
||||||
|
// 25 March + 10 days = 4 April 2026 (Saturday)
|
||||||
|
// Apr 5 = Easter Sunday (holiday), Apr 6 = Easter Monday (holiday) -> adjusted to 7 April (Tuesday)
|
||||||
|
expectedOriginal := time.Date(2026, 4, 4, 0, 0, 0, 0, time.UTC)
|
||||||
|
expectedAdjusted := time.Date(2026, 4, 7, 0, 0, 0, 0, time.UTC)
|
||||||
|
|
||||||
|
if original != expectedOriginal {
|
||||||
|
t.Errorf("original should be %s, got %s", expectedOriginal, original)
|
||||||
|
}
|
||||||
|
if adjusted != expectedAdjusted {
|
||||||
|
t.Errorf("adjusted should be %s, got %s", expectedAdjusted, adjusted)
|
||||||
|
}
|
||||||
|
if !wasAdjusted {
|
||||||
|
t.Error("should have been adjusted (Saturday)")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCalculateEndDateBeforeMonths(t *testing.T) {
|
||||||
|
holidays := NewHolidayService(nil)
|
||||||
|
calc := NewDeadlineCalculator(holidays)
|
||||||
|
|
||||||
|
eventDate := time.Date(2026, 6, 15, 0, 0, 0, 0, time.UTC) // Monday
|
||||||
|
timing := "before"
|
||||||
|
rule := models.DeadlineRule{
|
||||||
|
ID: uuid.New(),
|
||||||
|
Name: "Test 2 months before",
|
||||||
|
DurationValue: 2,
|
||||||
|
DurationUnit: "months",
|
||||||
|
Timing: &timing,
|
||||||
|
}
|
||||||
|
|
||||||
|
adjusted, original, wasAdjusted := calc.CalculateEndDate(eventDate, rule)
|
||||||
|
|
||||||
|
// 15 June - 2 months = 15 April 2026 (Wednesday)
|
||||||
|
expected := time.Date(2026, 4, 15, 0, 0, 0, 0, time.UTC)
|
||||||
|
|
||||||
|
if original != expected {
|
||||||
|
t.Errorf("original should be %s, got %s", expected, original)
|
||||||
|
}
|
||||||
|
if adjusted != expected {
|
||||||
|
t.Errorf("adjusted should be %s (not a holiday/weekend), got %s", expected, adjusted)
|
||||||
|
}
|
||||||
|
if wasAdjusted {
|
||||||
|
t.Error("should not have been adjusted (Wednesday)")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCalculateEndDateWeeks(t *testing.T) {
|
||||||
|
holidays := NewHolidayService(nil)
|
||||||
|
calc := NewDeadlineCalculator(holidays)
|
||||||
|
|
||||||
|
eventDate := time.Date(2026, 3, 25, 0, 0, 0, 0, time.UTC) // Wednesday
|
||||||
|
timing := "after"
|
||||||
|
rule := models.DeadlineRule{
|
||||||
|
ID: uuid.New(),
|
||||||
|
Name: "Test 2 weeks",
|
||||||
|
DurationValue: 2,
|
||||||
|
DurationUnit: "weeks",
|
||||||
|
Timing: &timing,
|
||||||
|
}
|
||||||
|
|
||||||
|
adjusted, original, _ := calc.CalculateEndDate(eventDate, rule)
|
||||||
|
|
||||||
|
// 25 March + 14 days = 8 April 2026 (Wednesday)
|
||||||
|
expected := time.Date(2026, 4, 8, 0, 0, 0, 0, time.UTC)
|
||||||
|
if original != expected {
|
||||||
|
t.Errorf("original should be %s, got %s", expected, original)
|
||||||
|
}
|
||||||
|
if adjusted != expected {
|
||||||
|
t.Errorf("adjusted should be %s, got %s", expected, adjusted)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCalculateFromRules(t *testing.T) {
|
||||||
|
holidays := NewHolidayService(nil)
|
||||||
|
calc := NewDeadlineCalculator(holidays)
|
||||||
|
|
||||||
|
eventDate := time.Date(2026, 3, 25, 0, 0, 0, 0, time.UTC)
|
||||||
|
timing := "after"
|
||||||
|
code := "TEST-1"
|
||||||
|
|
||||||
|
rules := []models.DeadlineRule{
|
||||||
|
{
|
||||||
|
ID: uuid.New(),
|
||||||
|
Code: &code,
|
||||||
|
Name: "Rule A",
|
||||||
|
DurationValue: 7,
|
||||||
|
DurationUnit: "days",
|
||||||
|
Timing: &timing,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ID: uuid.New(),
|
||||||
|
Name: "Rule B (zero duration)",
|
||||||
|
DurationValue: 0,
|
||||||
|
DurationUnit: "days",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
results := calc.CalculateFromRules(eventDate, rules)
|
||||||
|
if len(results) != 2 {
|
||||||
|
t.Fatalf("expected 2 results, got %d", len(results))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Rule A: 25 March + 7 = 1 April (Wednesday)
|
||||||
|
if results[0].DueDate != "2026-04-01" {
|
||||||
|
t.Errorf("Rule A due date should be 2026-04-01, got %s", results[0].DueDate)
|
||||||
|
}
|
||||||
|
if results[0].RuleCode != "TEST-1" {
|
||||||
|
t.Errorf("Rule A code should be TEST-1, got %s", results[0].RuleCode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Rule B: zero duration -> event date
|
||||||
|
if results[1].DueDate != "2026-03-25" {
|
||||||
|
t.Errorf("Rule B due date should be 2026-03-25, got %s", results[1].DueDate)
|
||||||
|
}
|
||||||
|
}
|
||||||
175
backend/internal/services/deadline_rule_service.go
Normal file
175
backend/internal/services/deadline_rule_service.go
Normal file
@@ -0,0 +1,175 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeadlineRuleService handles deadline rule queries
|
||||||
|
type DeadlineRuleService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDeadlineRuleService creates a new deadline rule service
|
||||||
|
func NewDeadlineRuleService(db *sqlx.DB) *DeadlineRuleService {
|
||||||
|
return &DeadlineRuleService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List returns deadline rules, optionally filtered by proceeding type
|
||||||
|
func (s *DeadlineRuleService) List(proceedingTypeID *int) ([]models.DeadlineRule, error) {
|
||||||
|
var rules []models.DeadlineRule
|
||||||
|
var err error
|
||||||
|
|
||||||
|
if proceedingTypeID != nil {
|
||||||
|
err = s.db.Select(&rules,
|
||||||
|
`SELECT id, proceeding_type_id, parent_id, code, name, description,
|
||||||
|
primary_party, event_type, is_mandatory, duration_value, duration_unit,
|
||||||
|
timing, rule_code, deadline_notes, sequence_order, condition_rule_id,
|
||||||
|
alt_duration_value, alt_duration_unit, alt_rule_code, is_active,
|
||||||
|
created_at, updated_at
|
||||||
|
FROM deadline_rules
|
||||||
|
WHERE proceeding_type_id = $1 AND is_active = true
|
||||||
|
ORDER BY sequence_order`, *proceedingTypeID)
|
||||||
|
} else {
|
||||||
|
err = s.db.Select(&rules,
|
||||||
|
`SELECT id, proceeding_type_id, parent_id, code, name, description,
|
||||||
|
primary_party, event_type, is_mandatory, duration_value, duration_unit,
|
||||||
|
timing, rule_code, deadline_notes, sequence_order, condition_rule_id,
|
||||||
|
alt_duration_value, alt_duration_unit, alt_rule_code, is_active,
|
||||||
|
created_at, updated_at
|
||||||
|
FROM deadline_rules
|
||||||
|
WHERE is_active = true
|
||||||
|
ORDER BY proceeding_type_id, sequence_order`)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing deadline rules: %w", err)
|
||||||
|
}
|
||||||
|
return rules, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RuleTreeNode represents a deadline rule with its children
|
||||||
|
type RuleTreeNode struct {
|
||||||
|
models.DeadlineRule
|
||||||
|
Children []RuleTreeNode `json:"children,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRuleTree returns a hierarchical tree of rules for a proceeding type
|
||||||
|
func (s *DeadlineRuleService) GetRuleTree(proceedingTypeCode string) ([]RuleTreeNode, error) {
|
||||||
|
// First resolve proceeding type code to ID
|
||||||
|
var pt models.ProceedingType
|
||||||
|
err := s.db.Get(&pt,
|
||||||
|
`SELECT id, code, name, description, jurisdiction, default_color, sort_order, is_active
|
||||||
|
FROM proceeding_types
|
||||||
|
WHERE code = $1 AND is_active = true`, proceedingTypeCode)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("resolving proceeding type %q: %w", proceedingTypeCode, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get all rules for this proceeding type
|
||||||
|
var rules []models.DeadlineRule
|
||||||
|
err = s.db.Select(&rules,
|
||||||
|
`SELECT id, proceeding_type_id, parent_id, code, name, description,
|
||||||
|
primary_party, event_type, is_mandatory, duration_value, duration_unit,
|
||||||
|
timing, rule_code, deadline_notes, sequence_order, condition_rule_id,
|
||||||
|
alt_duration_value, alt_duration_unit, alt_rule_code, is_active,
|
||||||
|
created_at, updated_at
|
||||||
|
FROM deadline_rules
|
||||||
|
WHERE proceeding_type_id = $1 AND is_active = true
|
||||||
|
ORDER BY sequence_order`, pt.ID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing rules for type %q: %w", proceedingTypeCode, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return buildTree(rules), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetByIDs returns deadline rules by their IDs
|
||||||
|
func (s *DeadlineRuleService) GetByIDs(ids []string) ([]models.DeadlineRule, error) {
|
||||||
|
if len(ids) == 0 {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
query, args, err := sqlx.In(
|
||||||
|
`SELECT id, proceeding_type_id, parent_id, code, name, description,
|
||||||
|
primary_party, event_type, is_mandatory, duration_value, duration_unit,
|
||||||
|
timing, rule_code, deadline_notes, sequence_order, condition_rule_id,
|
||||||
|
alt_duration_value, alt_duration_unit, alt_rule_code, is_active,
|
||||||
|
created_at, updated_at
|
||||||
|
FROM deadline_rules
|
||||||
|
WHERE id IN (?) AND is_active = true
|
||||||
|
ORDER BY sequence_order`, ids)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("building IN query: %w", err)
|
||||||
|
}
|
||||||
|
query = s.db.Rebind(query)
|
||||||
|
|
||||||
|
var rules []models.DeadlineRule
|
||||||
|
err = s.db.Select(&rules, query, args...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching rules by IDs: %w", err)
|
||||||
|
}
|
||||||
|
return rules, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRulesForProceedingType returns all active rules for a proceeding type ID
|
||||||
|
func (s *DeadlineRuleService) GetRulesForProceedingType(proceedingTypeID int) ([]models.DeadlineRule, error) {
|
||||||
|
var rules []models.DeadlineRule
|
||||||
|
err := s.db.Select(&rules,
|
||||||
|
`SELECT id, proceeding_type_id, parent_id, code, name, description,
|
||||||
|
primary_party, event_type, is_mandatory, duration_value, duration_unit,
|
||||||
|
timing, rule_code, deadline_notes, sequence_order, condition_rule_id,
|
||||||
|
alt_duration_value, alt_duration_unit, alt_rule_code, is_active,
|
||||||
|
created_at, updated_at
|
||||||
|
FROM deadline_rules
|
||||||
|
WHERE proceeding_type_id = $1 AND is_active = true
|
||||||
|
ORDER BY sequence_order`, proceedingTypeID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing rules for proceeding type %d: %w", proceedingTypeID, err)
|
||||||
|
}
|
||||||
|
return rules, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListProceedingTypes returns all active proceeding types
|
||||||
|
func (s *DeadlineRuleService) ListProceedingTypes() ([]models.ProceedingType, error) {
|
||||||
|
var types []models.ProceedingType
|
||||||
|
err := s.db.Select(&types,
|
||||||
|
`SELECT id, code, name, description, jurisdiction, default_color, sort_order, is_active
|
||||||
|
FROM proceeding_types
|
||||||
|
WHERE is_active = true
|
||||||
|
ORDER BY sort_order`)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing proceeding types: %w", err)
|
||||||
|
}
|
||||||
|
return types, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// buildTree converts a flat list of rules into a hierarchical tree
|
||||||
|
func buildTree(rules []models.DeadlineRule) []RuleTreeNode {
|
||||||
|
nodeMap := make(map[string]*RuleTreeNode, len(rules))
|
||||||
|
var roots []RuleTreeNode
|
||||||
|
|
||||||
|
// Create nodes
|
||||||
|
for _, r := range rules {
|
||||||
|
node := RuleTreeNode{DeadlineRule: r}
|
||||||
|
nodeMap[r.ID.String()] = &node
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build tree
|
||||||
|
for _, r := range rules {
|
||||||
|
node := nodeMap[r.ID.String()]
|
||||||
|
if r.ParentID != nil {
|
||||||
|
parentKey := r.ParentID.String()
|
||||||
|
if parent, ok := nodeMap[parentKey]; ok {
|
||||||
|
parent.Children = append(parent.Children, *node)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
roots = append(roots, *node)
|
||||||
|
}
|
||||||
|
|
||||||
|
return roots
|
||||||
|
}
|
||||||
197
backend/internal/services/deadline_service.go
Normal file
197
backend/internal/services/deadline_service.go
Normal file
@@ -0,0 +1,197 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeadlineService handles CRUD operations for case deadlines
|
||||||
|
type DeadlineService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDeadlineService creates a new deadline service
|
||||||
|
func NewDeadlineService(db *sqlx.DB) *DeadlineService {
|
||||||
|
return &DeadlineService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListAll returns all deadlines for a tenant, ordered by due_date
|
||||||
|
func (s *DeadlineService) ListAll(tenantID uuid.UUID) ([]models.Deadline, error) {
|
||||||
|
query := `SELECT id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at
|
||||||
|
FROM deadlines
|
||||||
|
WHERE tenant_id = $1
|
||||||
|
ORDER BY due_date ASC`
|
||||||
|
|
||||||
|
var deadlines []models.Deadline
|
||||||
|
err := s.db.Select(&deadlines, query, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing all deadlines: %w", err)
|
||||||
|
}
|
||||||
|
return deadlines, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListForCase returns all deadlines for a case, scoped to tenant
|
||||||
|
func (s *DeadlineService) ListForCase(tenantID, caseID uuid.UUID) ([]models.Deadline, error) {
|
||||||
|
query := `SELECT id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at
|
||||||
|
FROM deadlines
|
||||||
|
WHERE tenant_id = $1 AND case_id = $2
|
||||||
|
ORDER BY due_date ASC`
|
||||||
|
|
||||||
|
var deadlines []models.Deadline
|
||||||
|
err := s.db.Select(&deadlines, query, tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing deadlines for case: %w", err)
|
||||||
|
}
|
||||||
|
return deadlines, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetByID returns a single deadline by ID, scoped to tenant
|
||||||
|
func (s *DeadlineService) GetByID(tenantID, deadlineID uuid.UUID) (*models.Deadline, error) {
|
||||||
|
query := `SELECT id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at
|
||||||
|
FROM deadlines
|
||||||
|
WHERE tenant_id = $1 AND id = $2`
|
||||||
|
|
||||||
|
var d models.Deadline
|
||||||
|
err := s.db.Get(&d, query, tenantID, deadlineID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("getting deadline: %w", err)
|
||||||
|
}
|
||||||
|
return &d, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateDeadlineInput holds the fields for creating a deadline
|
||||||
|
type CreateDeadlineInput struct {
|
||||||
|
CaseID uuid.UUID `json:"case_id"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
Description *string `json:"description,omitempty"`
|
||||||
|
DueDate string `json:"due_date"`
|
||||||
|
WarningDate *string `json:"warning_date,omitempty"`
|
||||||
|
Source string `json:"source"`
|
||||||
|
RuleID *uuid.UUID `json:"rule_id,omitempty"`
|
||||||
|
Notes *string `json:"notes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create inserts a new deadline
|
||||||
|
func (s *DeadlineService) Create(tenantID uuid.UUID, input CreateDeadlineInput) (*models.Deadline, error) {
|
||||||
|
id := uuid.New()
|
||||||
|
source := input.Source
|
||||||
|
if source == "" {
|
||||||
|
source = "manual"
|
||||||
|
}
|
||||||
|
|
||||||
|
query := `INSERT INTO deadlines (id, tenant_id, case_id, title, description, due_date,
|
||||||
|
warning_date, source, rule_id, status, notes,
|
||||||
|
created_at, updated_at)
|
||||||
|
VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, 'pending', $10, NOW(), NOW())
|
||||||
|
RETURNING id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at`
|
||||||
|
|
||||||
|
var d models.Deadline
|
||||||
|
err := s.db.Get(&d, query, id, tenantID, input.CaseID, input.Title, input.Description,
|
||||||
|
input.DueDate, input.WarningDate, source, input.RuleID, input.Notes)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("creating deadline: %w", err)
|
||||||
|
}
|
||||||
|
return &d, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateDeadlineInput holds the fields for updating a deadline
|
||||||
|
type UpdateDeadlineInput struct {
|
||||||
|
Title *string `json:"title,omitempty"`
|
||||||
|
Description *string `json:"description,omitempty"`
|
||||||
|
DueDate *string `json:"due_date,omitempty"`
|
||||||
|
WarningDate *string `json:"warning_date,omitempty"`
|
||||||
|
Notes *string `json:"notes,omitempty"`
|
||||||
|
Status *string `json:"status,omitempty"`
|
||||||
|
RuleID *uuid.UUID `json:"rule_id,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update modifies an existing deadline
|
||||||
|
func (s *DeadlineService) Update(tenantID, deadlineID uuid.UUID, input UpdateDeadlineInput) (*models.Deadline, error) {
|
||||||
|
// First check it exists and belongs to tenant
|
||||||
|
existing, err := s.GetByID(tenantID, deadlineID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if existing == nil {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
query := `UPDATE deadlines SET
|
||||||
|
title = COALESCE($1, title),
|
||||||
|
description = COALESCE($2, description),
|
||||||
|
due_date = COALESCE($3, due_date),
|
||||||
|
warning_date = COALESCE($4, warning_date),
|
||||||
|
notes = COALESCE($5, notes),
|
||||||
|
status = COALESCE($6, status),
|
||||||
|
rule_id = COALESCE($7, rule_id),
|
||||||
|
updated_at = NOW()
|
||||||
|
WHERE id = $8 AND tenant_id = $9
|
||||||
|
RETURNING id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at`
|
||||||
|
|
||||||
|
var d models.Deadline
|
||||||
|
err = s.db.Get(&d, query, input.Title, input.Description, input.DueDate,
|
||||||
|
input.WarningDate, input.Notes, input.Status, input.RuleID,
|
||||||
|
deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("updating deadline: %w", err)
|
||||||
|
}
|
||||||
|
return &d, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Complete marks a deadline as completed
|
||||||
|
func (s *DeadlineService) Complete(tenantID, deadlineID uuid.UUID) (*models.Deadline, error) {
|
||||||
|
query := `UPDATE deadlines SET
|
||||||
|
status = 'completed',
|
||||||
|
completed_at = $1,
|
||||||
|
updated_at = NOW()
|
||||||
|
WHERE id = $2 AND tenant_id = $3
|
||||||
|
RETURNING id, tenant_id, case_id, title, description, due_date, original_due_date,
|
||||||
|
warning_date, source, rule_id, status, completed_at,
|
||||||
|
caldav_uid, caldav_etag, notes, created_at, updated_at`
|
||||||
|
|
||||||
|
var d models.Deadline
|
||||||
|
err := s.db.Get(&d, query, time.Now(), deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("completing deadline: %w", err)
|
||||||
|
}
|
||||||
|
return &d, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete removes a deadline
|
||||||
|
func (s *DeadlineService) Delete(tenantID, deadlineID uuid.UUID) error {
|
||||||
|
query := `DELETE FROM deadlines WHERE id = $1 AND tenant_id = $2`
|
||||||
|
result, err := s.db.Exec(query, deadlineID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("deleting deadline: %w", err)
|
||||||
|
}
|
||||||
|
rows, err := result.RowsAffected()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checking delete result: %w", err)
|
||||||
|
}
|
||||||
|
if rows == 0 {
|
||||||
|
return fmt.Errorf("deadline not found")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
163
backend/internal/services/document_service.go
Normal file
163
backend/internal/services/document_service.go
Normal file
@@ -0,0 +1,163 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
const documentBucket = "kanzlai-documents"
|
||||||
|
|
||||||
|
type DocumentService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
storage *StorageClient
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDocumentService(db *sqlx.DB, storage *StorageClient) *DocumentService {
|
||||||
|
return &DocumentService{db: db, storage: storage}
|
||||||
|
}
|
||||||
|
|
||||||
|
type CreateDocumentInput struct {
|
||||||
|
Title string `json:"title"`
|
||||||
|
DocType string `json:"doc_type"`
|
||||||
|
Filename string
|
||||||
|
ContentType string
|
||||||
|
Size int
|
||||||
|
Data io.Reader
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DocumentService) ListByCase(ctx context.Context, tenantID, caseID uuid.UUID) ([]models.Document, error) {
|
||||||
|
var docs []models.Document
|
||||||
|
err := s.db.SelectContext(ctx, &docs,
|
||||||
|
"SELECT * FROM documents WHERE tenant_id = $1 AND case_id = $2 ORDER BY created_at DESC",
|
||||||
|
tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing documents: %w", err)
|
||||||
|
}
|
||||||
|
return docs, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DocumentService) GetByID(ctx context.Context, tenantID, docID uuid.UUID) (*models.Document, error) {
|
||||||
|
var doc models.Document
|
||||||
|
err := s.db.GetContext(ctx, &doc,
|
||||||
|
"SELECT * FROM documents WHERE id = $1 AND tenant_id = $2", docID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("getting document: %w", err)
|
||||||
|
}
|
||||||
|
return &doc, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DocumentService) Create(ctx context.Context, tenantID, caseID, userID uuid.UUID, input CreateDocumentInput) (*models.Document, error) {
|
||||||
|
// Verify case belongs to tenant
|
||||||
|
var caseExists int
|
||||||
|
if err := s.db.GetContext(ctx, &caseExists,
|
||||||
|
"SELECT COUNT(*) FROM cases WHERE id = $1 AND tenant_id = $2",
|
||||||
|
caseID, tenantID); err != nil {
|
||||||
|
return nil, fmt.Errorf("verifying case: %w", err)
|
||||||
|
}
|
||||||
|
if caseExists == 0 {
|
||||||
|
return nil, fmt.Errorf("case not found")
|
||||||
|
}
|
||||||
|
|
||||||
|
id := uuid.New()
|
||||||
|
storagePath := fmt.Sprintf("%s/%s/%s_%s", tenantID, caseID, id, input.Filename)
|
||||||
|
|
||||||
|
// Upload to Supabase Storage
|
||||||
|
if err := s.storage.Upload(ctx, documentBucket, storagePath, input.ContentType, input.Data); err != nil {
|
||||||
|
return nil, fmt.Errorf("uploading file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Insert metadata record
|
||||||
|
now := time.Now()
|
||||||
|
_, err := s.db.ExecContext(ctx,
|
||||||
|
`INSERT INTO documents (id, tenant_id, case_id, title, doc_type, file_path, file_size, mime_type, uploaded_by, created_at, updated_at)
|
||||||
|
VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $10)`,
|
||||||
|
id, tenantID, caseID, input.Title, nilIfEmpty(input.DocType), storagePath, input.Size, input.ContentType, userID, now)
|
||||||
|
if err != nil {
|
||||||
|
// Best effort: clean up uploaded file
|
||||||
|
_ = s.storage.Delete(ctx, documentBucket, []string{storagePath})
|
||||||
|
return nil, fmt.Errorf("inserting document record: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log case event
|
||||||
|
createEvent(ctx, s.db, tenantID, caseID, userID, "document_uploaded",
|
||||||
|
fmt.Sprintf("Document uploaded: %s", input.Title), nil)
|
||||||
|
|
||||||
|
var doc models.Document
|
||||||
|
if err := s.db.GetContext(ctx, &doc, "SELECT * FROM documents WHERE id = $1", id); err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching created document: %w", err)
|
||||||
|
}
|
||||||
|
return &doc, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DocumentService) Download(ctx context.Context, tenantID, docID uuid.UUID) (io.ReadCloser, string, string, error) {
|
||||||
|
doc, err := s.GetByID(ctx, tenantID, docID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, "", "", err
|
||||||
|
}
|
||||||
|
if doc == nil {
|
||||||
|
return nil, "", "", fmt.Errorf("document not found")
|
||||||
|
}
|
||||||
|
if doc.FilePath == nil {
|
||||||
|
return nil, "", "", fmt.Errorf("document has no file")
|
||||||
|
}
|
||||||
|
|
||||||
|
body, contentType, err := s.storage.Download(ctx, documentBucket, *doc.FilePath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, "", "", fmt.Errorf("downloading file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use stored mime_type if available, fall back to storage response
|
||||||
|
if doc.MimeType != nil && *doc.MimeType != "" {
|
||||||
|
contentType = *doc.MimeType
|
||||||
|
}
|
||||||
|
|
||||||
|
return body, contentType, doc.Title, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DocumentService) Delete(ctx context.Context, tenantID, docID, userID uuid.UUID) error {
|
||||||
|
doc, err := s.GetByID(ctx, tenantID, docID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if doc == nil {
|
||||||
|
return sql.ErrNoRows
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete from storage
|
||||||
|
if doc.FilePath != nil {
|
||||||
|
if err := s.storage.Delete(ctx, documentBucket, []string{*doc.FilePath}); err != nil {
|
||||||
|
return fmt.Errorf("deleting file from storage: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete database record
|
||||||
|
_, err = s.db.ExecContext(ctx,
|
||||||
|
"DELETE FROM documents WHERE id = $1 AND tenant_id = $2", docID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("deleting document record: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log case event
|
||||||
|
createEvent(ctx, s.db, tenantID, doc.CaseID, userID, "document_deleted",
|
||||||
|
fmt.Sprintf("Document deleted: %s", doc.Title), nil)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func nilIfEmpty(s string) *string {
|
||||||
|
if s == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return &s
|
||||||
|
}
|
||||||
193
backend/internal/services/holidays.go
Normal file
193
backend/internal/services/holidays.go
Normal file
@@ -0,0 +1,193 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Holiday represents a non-working day
|
||||||
|
type Holiday struct {
|
||||||
|
Date time.Time
|
||||||
|
Name string
|
||||||
|
IsVacation bool // Part of court vacation period
|
||||||
|
IsClosure bool // Single-day closure (public holiday)
|
||||||
|
}
|
||||||
|
|
||||||
|
// HolidayService manages holiday data and non-working day checks
|
||||||
|
type HolidayService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
// Cached holidays by year
|
||||||
|
cache map[int][]Holiday
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewHolidayService creates a holiday service
|
||||||
|
func NewHolidayService(db *sqlx.DB) *HolidayService {
|
||||||
|
return &HolidayService{
|
||||||
|
db: db,
|
||||||
|
cache: make(map[int][]Holiday),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// dbHoliday matches the holidays table schema
|
||||||
|
type dbHoliday struct {
|
||||||
|
ID int `db:"id"`
|
||||||
|
Date time.Time `db:"date"`
|
||||||
|
Name string `db:"name"`
|
||||||
|
Country string `db:"country"`
|
||||||
|
State *string `db:"state"`
|
||||||
|
HolidayType string `db:"holiday_type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadHolidaysForYear loads holidays from DB for a given year, merges with
|
||||||
|
// German federal holidays, and caches the result.
|
||||||
|
func (s *HolidayService) LoadHolidaysForYear(year int) ([]Holiday, error) {
|
||||||
|
if cached, ok := s.cache[year]; ok {
|
||||||
|
return cached, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
holidays := make([]Holiday, 0, 30)
|
||||||
|
|
||||||
|
// Load from DB if available
|
||||||
|
if s.db != nil {
|
||||||
|
var dbHolidays []dbHoliday
|
||||||
|
err := s.db.Select(&dbHolidays,
|
||||||
|
`SELECT id, date, name, country, state, holiday_type
|
||||||
|
FROM holidays
|
||||||
|
WHERE EXTRACT(YEAR FROM date) = $1
|
||||||
|
ORDER BY date`, year)
|
||||||
|
if err == nil {
|
||||||
|
for _, h := range dbHolidays {
|
||||||
|
holidays = append(holidays, Holiday{
|
||||||
|
Date: h.Date,
|
||||||
|
Name: h.Name,
|
||||||
|
IsClosure: h.HolidayType == "public_holiday" || h.HolidayType == "closure",
|
||||||
|
IsVacation: h.HolidayType == "vacation",
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// If DB query fails, fall through to hardcoded holidays
|
||||||
|
}
|
||||||
|
|
||||||
|
// Always add German federal holidays (if not already present from DB)
|
||||||
|
federal := germanFederalHolidays(year)
|
||||||
|
existing := make(map[string]bool, len(holidays))
|
||||||
|
for _, h := range holidays {
|
||||||
|
existing[h.Date.Format("2006-01-02")] = true
|
||||||
|
}
|
||||||
|
for _, h := range federal {
|
||||||
|
key := h.Date.Format("2006-01-02")
|
||||||
|
if !existing[key] {
|
||||||
|
holidays = append(holidays, h)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
s.cache[year] = holidays
|
||||||
|
return holidays, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsHoliday checks if a date is a holiday
|
||||||
|
func (s *HolidayService) IsHoliday(date time.Time) *Holiday {
|
||||||
|
year := date.Year()
|
||||||
|
holidays, err := s.LoadHolidaysForYear(year)
|
||||||
|
if err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
dateStr := date.Format("2006-01-02")
|
||||||
|
for i := range holidays {
|
||||||
|
if holidays[i].Date.Format("2006-01-02") == dateStr {
|
||||||
|
return &holidays[i]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsNonWorkingDay returns true if the date is a weekend or holiday
|
||||||
|
func (s *HolidayService) IsNonWorkingDay(date time.Time) bool {
|
||||||
|
wd := date.Weekday()
|
||||||
|
if wd == time.Saturday || wd == time.Sunday {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return s.IsHoliday(date) != nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// AdjustForNonWorkingDays moves the date to the next working day
|
||||||
|
// if it falls on a weekend or holiday.
|
||||||
|
// Returns adjusted date, original date, and whether adjustment was made.
|
||||||
|
func (s *HolidayService) AdjustForNonWorkingDays(date time.Time) (adjusted time.Time, original time.Time, wasAdjusted bool) {
|
||||||
|
original = date
|
||||||
|
adjusted = date
|
||||||
|
|
||||||
|
// Safety limit: max 30 days forward
|
||||||
|
for i := 0; i < 30 && s.IsNonWorkingDay(adjusted); i++ {
|
||||||
|
adjusted = adjusted.AddDate(0, 0, 1)
|
||||||
|
wasAdjusted = true
|
||||||
|
}
|
||||||
|
|
||||||
|
return adjusted, original, wasAdjusted
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClearCache clears the holiday cache (useful after DB updates)
|
||||||
|
func (s *HolidayService) ClearCache() {
|
||||||
|
s.cache = make(map[int][]Holiday)
|
||||||
|
}
|
||||||
|
|
||||||
|
// germanFederalHolidays returns all German federal public holidays for a year.
|
||||||
|
// These are holidays observed in all 16 German states.
|
||||||
|
func germanFederalHolidays(year int) []Holiday {
|
||||||
|
easterMonth, easterDay := CalculateEasterSunday(year)
|
||||||
|
easter := time.Date(year, time.Month(easterMonth), easterDay, 0, 0, 0, 0, time.UTC)
|
||||||
|
|
||||||
|
holidays := []Holiday{
|
||||||
|
{Date: time.Date(year, time.January, 1, 0, 0, 0, 0, time.UTC), Name: "Neujahr", IsClosure: true},
|
||||||
|
{Date: easter.AddDate(0, 0, -2), Name: "Karfreitag", IsClosure: true},
|
||||||
|
{Date: easter, Name: "Ostersonntag", IsClosure: true},
|
||||||
|
{Date: easter.AddDate(0, 0, 1), Name: "Ostermontag", IsClosure: true},
|
||||||
|
{Date: time.Date(year, time.May, 1, 0, 0, 0, 0, time.UTC), Name: "Tag der Arbeit", IsClosure: true},
|
||||||
|
{Date: easter.AddDate(0, 0, 39), Name: "Christi Himmelfahrt", IsClosure: true},
|
||||||
|
{Date: easter.AddDate(0, 0, 49), Name: "Pfingstsonntag", IsClosure: true},
|
||||||
|
{Date: easter.AddDate(0, 0, 50), Name: "Pfingstmontag", IsClosure: true},
|
||||||
|
{Date: time.Date(year, time.October, 3, 0, 0, 0, 0, time.UTC), Name: "Tag der Deutschen Einheit", IsClosure: true},
|
||||||
|
{Date: time.Date(year, time.December, 25, 0, 0, 0, 0, time.UTC), Name: "1. Weihnachtstag", IsClosure: true},
|
||||||
|
{Date: time.Date(year, time.December, 26, 0, 0, 0, 0, time.UTC), Name: "2. Weihnachtstag", IsClosure: true},
|
||||||
|
}
|
||||||
|
|
||||||
|
return holidays
|
||||||
|
}
|
||||||
|
|
||||||
|
// CalculateEasterSunday computes Easter Sunday using the Anonymous Gregorian algorithm.
|
||||||
|
// Returns month (1-12) and day.
|
||||||
|
func CalculateEasterSunday(year int) (int, int) {
|
||||||
|
a := year % 19
|
||||||
|
b := year / 100
|
||||||
|
c := year % 100
|
||||||
|
d := b / 4
|
||||||
|
e := b % 4
|
||||||
|
f := (b + 8) / 25
|
||||||
|
g := (b - f + 1) / 3
|
||||||
|
h := (19*a + b - d - g + 15) % 30
|
||||||
|
i := c / 4
|
||||||
|
k := c % 4
|
||||||
|
l := (32 + 2*e + 2*i - h - k) % 7
|
||||||
|
m := (a + 11*h + 22*l) / 451
|
||||||
|
month := (h + l - 7*m + 114) / 31
|
||||||
|
day := ((h + l - 7*m + 114) % 31) + 1
|
||||||
|
return month, day
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetHolidaysForYear returns all holidays for a year (for API exposure)
|
||||||
|
func (s *HolidayService) GetHolidaysForYear(year int) ([]Holiday, error) {
|
||||||
|
return s.LoadHolidaysForYear(year)
|
||||||
|
}
|
||||||
|
|
||||||
|
// FormatHolidayList returns a simple string representation of holidays for debugging
|
||||||
|
func FormatHolidayList(holidays []Holiday) string {
|
||||||
|
var b strings.Builder
|
||||||
|
for _, h := range holidays {
|
||||||
|
fmt.Fprintf(&b, "%s: %s\n", h.Date.Format("2006-01-02"), h.Name)
|
||||||
|
}
|
||||||
|
return b.String()
|
||||||
|
}
|
||||||
121
backend/internal/services/holidays_test.go
Normal file
121
backend/internal/services/holidays_test.go
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCalculateEasterSunday(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
year int
|
||||||
|
wantMonth int
|
||||||
|
wantDay int
|
||||||
|
}{
|
||||||
|
{2024, 3, 31},
|
||||||
|
{2025, 4, 20},
|
||||||
|
{2026, 4, 5},
|
||||||
|
{2027, 3, 28},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
m, d := CalculateEasterSunday(tt.year)
|
||||||
|
if m != tt.wantMonth || d != tt.wantDay {
|
||||||
|
t.Errorf("CalculateEasterSunday(%d) = %d-%02d, want %d-%02d",
|
||||||
|
tt.year, m, d, tt.wantMonth, tt.wantDay)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGermanFederalHolidays(t *testing.T) {
|
||||||
|
holidays := germanFederalHolidays(2026)
|
||||||
|
|
||||||
|
// Should have 11 federal holidays
|
||||||
|
if len(holidays) != 11 {
|
||||||
|
t.Fatalf("expected 11 federal holidays, got %d", len(holidays))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check Neujahr
|
||||||
|
if holidays[0].Name != "Neujahr" {
|
||||||
|
t.Errorf("first holiday should be Neujahr, got %s", holidays[0].Name)
|
||||||
|
}
|
||||||
|
if holidays[0].Date != time.Date(2026, 1, 1, 0, 0, 0, 0, time.UTC) {
|
||||||
|
t.Errorf("Neujahr should be Jan 1, got %s", holidays[0].Date)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check Karfreitag 2026 (Easter = Apr 5, so Good Friday = Apr 3)
|
||||||
|
found := false
|
||||||
|
for _, h := range holidays {
|
||||||
|
if h.Name == "Karfreitag" {
|
||||||
|
found = true
|
||||||
|
expected := time.Date(2026, 4, 3, 0, 0, 0, 0, time.UTC)
|
||||||
|
if h.Date != expected {
|
||||||
|
t.Errorf("Karfreitag 2026 should be %s, got %s", expected, h.Date)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !found {
|
||||||
|
t.Error("Karfreitag not found in holidays")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestHolidayServiceIsNonWorkingDay(t *testing.T) {
|
||||||
|
svc := NewHolidayService(nil) // no DB, uses hardcoded holidays
|
||||||
|
|
||||||
|
// Saturday
|
||||||
|
sat := time.Date(2026, 3, 28, 0, 0, 0, 0, time.UTC)
|
||||||
|
if !svc.IsNonWorkingDay(sat) {
|
||||||
|
t.Error("Saturday should be non-working day")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sunday
|
||||||
|
sun := time.Date(2026, 3, 29, 0, 0, 0, 0, time.UTC)
|
||||||
|
if !svc.IsNonWorkingDay(sun) {
|
||||||
|
t.Error("Sunday should be non-working day")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Regular Monday
|
||||||
|
mon := time.Date(2026, 3, 23, 0, 0, 0, 0, time.UTC)
|
||||||
|
if svc.IsNonWorkingDay(mon) {
|
||||||
|
t.Error("regular Monday should be a working day")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Christmas (Friday Dec 25, 2026)
|
||||||
|
xmas := time.Date(2026, 12, 25, 0, 0, 0, 0, time.UTC)
|
||||||
|
if !svc.IsNonWorkingDay(xmas) {
|
||||||
|
t.Error("Christmas should be non-working day")
|
||||||
|
}
|
||||||
|
|
||||||
|
// New Year
|
||||||
|
newyear := time.Date(2026, 1, 1, 0, 0, 0, 0, time.UTC)
|
||||||
|
if !svc.IsNonWorkingDay(newyear) {
|
||||||
|
t.Error("New Year should be non-working day")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAdjustForNonWorkingDays(t *testing.T) {
|
||||||
|
svc := NewHolidayService(nil)
|
||||||
|
|
||||||
|
// Saturday -> Monday
|
||||||
|
sat := time.Date(2026, 3, 28, 0, 0, 0, 0, time.UTC)
|
||||||
|
adj, orig, adjusted := svc.AdjustForNonWorkingDays(sat)
|
||||||
|
if !adjusted {
|
||||||
|
t.Error("Saturday should be adjusted")
|
||||||
|
}
|
||||||
|
if orig != sat {
|
||||||
|
t.Error("original should be unchanged")
|
||||||
|
}
|
||||||
|
expected := time.Date(2026, 3, 30, 0, 0, 0, 0, time.UTC)
|
||||||
|
if adj != expected {
|
||||||
|
t.Errorf("Saturday should adjust to Monday %s, got %s", expected, adj)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Regular Wednesday -> no adjustment
|
||||||
|
wed := time.Date(2026, 3, 25, 0, 0, 0, 0, time.UTC)
|
||||||
|
adj, _, adjusted = svc.AdjustForNonWorkingDays(wed)
|
||||||
|
if adjusted {
|
||||||
|
t.Error("Wednesday should not be adjusted")
|
||||||
|
}
|
||||||
|
if adj != wed {
|
||||||
|
t.Error("non-adjusted date should be unchanged")
|
||||||
|
}
|
||||||
|
}
|
||||||
152
backend/internal/services/party_service.go
Normal file
152
backend/internal/services/party_service.go
Normal file
@@ -0,0 +1,152 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
type PartyService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewPartyService(db *sqlx.DB) *PartyService {
|
||||||
|
return &PartyService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
type CreatePartyInput struct {
|
||||||
|
Name string `json:"name"`
|
||||||
|
Role *string `json:"role,omitempty"`
|
||||||
|
Representative *string `json:"representative,omitempty"`
|
||||||
|
ContactInfo json.RawMessage `json:"contact_info,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type UpdatePartyInput struct {
|
||||||
|
Name *string `json:"name,omitempty"`
|
||||||
|
Role *string `json:"role,omitempty"`
|
||||||
|
Representative *string `json:"representative,omitempty"`
|
||||||
|
ContactInfo json.RawMessage `json:"contact_info,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *PartyService) ListByCase(ctx context.Context, tenantID, caseID uuid.UUID) ([]models.Party, error) {
|
||||||
|
var parties []models.Party
|
||||||
|
err := s.db.SelectContext(ctx, &parties,
|
||||||
|
"SELECT * FROM parties WHERE case_id = $1 AND tenant_id = $2 ORDER BY name",
|
||||||
|
caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("listing parties: %w", err)
|
||||||
|
}
|
||||||
|
return parties, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *PartyService) Create(ctx context.Context, tenantID, caseID uuid.UUID, userID uuid.UUID, input CreatePartyInput) (*models.Party, error) {
|
||||||
|
// Verify case exists and belongs to tenant
|
||||||
|
var exists bool
|
||||||
|
err := s.db.GetContext(ctx, &exists,
|
||||||
|
"SELECT EXISTS(SELECT 1 FROM cases WHERE id = $1 AND tenant_id = $2)", caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("checking case: %w", err)
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, sql.ErrNoRows
|
||||||
|
}
|
||||||
|
|
||||||
|
id := uuid.New()
|
||||||
|
contactInfo := input.ContactInfo
|
||||||
|
if contactInfo == nil {
|
||||||
|
contactInfo = json.RawMessage("{}")
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = s.db.ExecContext(ctx,
|
||||||
|
`INSERT INTO parties (id, tenant_id, case_id, name, role, representative, contact_info)
|
||||||
|
VALUES ($1, $2, $3, $4, $5, $6, $7)`,
|
||||||
|
id, tenantID, caseID, input.Name, input.Role, input.Representative, contactInfo)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("creating party: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log event
|
||||||
|
desc := fmt.Sprintf("Party added: %s", input.Name)
|
||||||
|
createEvent(ctx, s.db, tenantID, caseID, userID, "party_added", desc, nil)
|
||||||
|
|
||||||
|
var party models.Party
|
||||||
|
if err := s.db.GetContext(ctx, &party, "SELECT * FROM parties WHERE id = $1", id); err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching created party: %w", err)
|
||||||
|
}
|
||||||
|
return &party, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *PartyService) Update(ctx context.Context, tenantID, partyID uuid.UUID, input UpdatePartyInput) (*models.Party, error) {
|
||||||
|
// Verify party exists and belongs to tenant
|
||||||
|
var current models.Party
|
||||||
|
err := s.db.GetContext(ctx, ¤t,
|
||||||
|
"SELECT * FROM parties WHERE id = $1 AND tenant_id = $2", partyID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("fetching party: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
sets := []string{}
|
||||||
|
args := []interface{}{}
|
||||||
|
argIdx := 1
|
||||||
|
|
||||||
|
if input.Name != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("name = $%d", argIdx))
|
||||||
|
args = append(args, *input.Name)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.Role != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("role = $%d", argIdx))
|
||||||
|
args = append(args, *input.Role)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.Representative != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("representative = $%d", argIdx))
|
||||||
|
args = append(args, *input.Representative)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
if input.ContactInfo != nil {
|
||||||
|
sets = append(sets, fmt.Sprintf("contact_info = $%d", argIdx))
|
||||||
|
args = append(args, input.ContactInfo)
|
||||||
|
argIdx++
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(sets) == 0 {
|
||||||
|
return ¤t, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
query := fmt.Sprintf("UPDATE parties SET %s WHERE id = $%d AND tenant_id = $%d",
|
||||||
|
joinStrings(sets, ", "), argIdx, argIdx+1)
|
||||||
|
args = append(args, partyID, tenantID)
|
||||||
|
|
||||||
|
if _, err := s.db.ExecContext(ctx, query, args...); err != nil {
|
||||||
|
return nil, fmt.Errorf("updating party: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var updated models.Party
|
||||||
|
if err := s.db.GetContext(ctx, &updated, "SELECT * FROM parties WHERE id = $1", partyID); err != nil {
|
||||||
|
return nil, fmt.Errorf("fetching updated party: %w", err)
|
||||||
|
}
|
||||||
|
return &updated, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *PartyService) Delete(ctx context.Context, tenantID, partyID uuid.UUID) error {
|
||||||
|
result, err := s.db.ExecContext(ctx,
|
||||||
|
"DELETE FROM parties WHERE id = $1 AND tenant_id = $2", partyID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("deleting party: %w", err)
|
||||||
|
}
|
||||||
|
rows, _ := result.RowsAffected()
|
||||||
|
if rows == 0 {
|
||||||
|
return sql.ErrNoRows
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
112
backend/internal/services/storage.go
Normal file
112
backend/internal/services/storage.go
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
)
|
||||||
|
|
||||||
|
// StorageClient interacts with Supabase Storage via REST API.
|
||||||
|
type StorageClient struct {
|
||||||
|
baseURL string
|
||||||
|
serviceKey string
|
||||||
|
httpClient *http.Client
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewStorageClient(supabaseURL, serviceKey string) *StorageClient {
|
||||||
|
return &StorageClient{
|
||||||
|
baseURL: supabaseURL,
|
||||||
|
serviceKey: serviceKey,
|
||||||
|
httpClient: &http.Client{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Upload stores a file in the given bucket at the specified path.
|
||||||
|
func (s *StorageClient) Upload(ctx context.Context, bucket, path, contentType string, data io.Reader) error {
|
||||||
|
url := fmt.Sprintf("%s/storage/v1/object/%s/%s", s.baseURL, bucket, path)
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "POST", url, data)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating upload request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("Authorization", "Bearer "+s.serviceKey)
|
||||||
|
req.Header.Set("Content-Type", contentType)
|
||||||
|
req.Header.Set("x-upsert", "true")
|
||||||
|
|
||||||
|
resp, err := s.httpClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("uploading to storage: %w", err)
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusCreated {
|
||||||
|
body, _ := io.ReadAll(resp.Body)
|
||||||
|
return fmt.Errorf("storage upload failed (status %d): %s", resp.StatusCode, string(body))
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Download retrieves a file from storage. Caller must close the returned ReadCloser.
|
||||||
|
func (s *StorageClient) Download(ctx context.Context, bucket, path string) (io.ReadCloser, string, error) {
|
||||||
|
url := fmt.Sprintf("%s/storage/v1/object/%s/%s", s.baseURL, bucket, path)
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "GET", url, nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, "", fmt.Errorf("creating download request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("Authorization", "Bearer "+s.serviceKey)
|
||||||
|
|
||||||
|
resp, err := s.httpClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return nil, "", fmt.Errorf("downloading from storage: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
resp.Body.Close()
|
||||||
|
if resp.StatusCode == http.StatusNotFound {
|
||||||
|
return nil, "", fmt.Errorf("file not found in storage")
|
||||||
|
}
|
||||||
|
body, _ := io.ReadAll(resp.Body)
|
||||||
|
return nil, "", fmt.Errorf("storage download failed (status %d): %s", resp.StatusCode, string(body))
|
||||||
|
}
|
||||||
|
|
||||||
|
ct := resp.Header.Get("Content-Type")
|
||||||
|
return resp.Body, ct, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete removes files from storage by their paths.
|
||||||
|
func (s *StorageClient) Delete(ctx context.Context, bucket string, paths []string) error {
|
||||||
|
url := fmt.Sprintf("%s/storage/v1/object/%s", s.baseURL, bucket)
|
||||||
|
|
||||||
|
body, err := json.Marshal(map[string][]string{"prefixes": paths})
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("marshaling delete request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "DELETE", url, bytes.NewReader(body))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("creating delete request: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("Authorization", "Bearer "+s.serviceKey)
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
|
||||||
|
resp, err := s.httpClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("deleting from storage: %w", err)
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusNoContent {
|
||||||
|
respBody, _ := io.ReadAll(resp.Body)
|
||||||
|
return fmt.Errorf("storage delete failed (status %d): %s", resp.StatusCode, string(respBody))
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
211
backend/internal/services/tenant_service.go
Normal file
211
backend/internal/services/tenant_service.go
Normal file
@@ -0,0 +1,211 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
type TenantService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTenantService(db *sqlx.DB) *TenantService {
|
||||||
|
return &TenantService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create creates a new tenant and assigns the creator as owner.
|
||||||
|
func (s *TenantService) Create(ctx context.Context, userID uuid.UUID, name, slug string) (*models.Tenant, error) {
|
||||||
|
tx, err := s.db.BeginTxx(ctx, nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("begin transaction: %w", err)
|
||||||
|
}
|
||||||
|
defer tx.Rollback()
|
||||||
|
|
||||||
|
var tenant models.Tenant
|
||||||
|
err = tx.QueryRowxContext(ctx,
|
||||||
|
`INSERT INTO tenants (name, slug) VALUES ($1, $2) RETURNING id, name, slug, settings, created_at, updated_at`,
|
||||||
|
name, slug,
|
||||||
|
).StructScan(&tenant)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("insert tenant: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = tx.ExecContext(ctx,
|
||||||
|
`INSERT INTO user_tenants (user_id, tenant_id, role) VALUES ($1, $2, 'owner')`,
|
||||||
|
userID, tenant.ID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("assign owner: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := tx.Commit(); err != nil {
|
||||||
|
return nil, fmt.Errorf("commit: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &tenant, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListForUser returns all tenants the user belongs to.
|
||||||
|
func (s *TenantService) ListForUser(ctx context.Context, userID uuid.UUID) ([]models.TenantWithRole, error) {
|
||||||
|
var tenants []models.TenantWithRole
|
||||||
|
err := s.db.SelectContext(ctx, &tenants,
|
||||||
|
`SELECT t.id, t.name, t.slug, t.settings, t.created_at, t.updated_at, ut.role
|
||||||
|
FROM tenants t
|
||||||
|
JOIN user_tenants ut ON ut.tenant_id = t.id
|
||||||
|
WHERE ut.user_id = $1
|
||||||
|
ORDER BY t.name`,
|
||||||
|
userID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("list tenants: %w", err)
|
||||||
|
}
|
||||||
|
return tenants, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetByID returns a single tenant. The caller must verify the user has access.
|
||||||
|
func (s *TenantService) GetByID(ctx context.Context, tenantID uuid.UUID) (*models.Tenant, error) {
|
||||||
|
var tenant models.Tenant
|
||||||
|
err := s.db.GetContext(ctx, &tenant,
|
||||||
|
`SELECT id, name, slug, settings, created_at, updated_at FROM tenants WHERE id = $1`,
|
||||||
|
tenantID,
|
||||||
|
)
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("get tenant: %w", err)
|
||||||
|
}
|
||||||
|
return &tenant, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetUserRole returns the user's role in a tenant, or empty string if not a member.
|
||||||
|
func (s *TenantService) GetUserRole(ctx context.Context, userID, tenantID uuid.UUID) (string, error) {
|
||||||
|
var role string
|
||||||
|
err := s.db.GetContext(ctx, &role,
|
||||||
|
`SELECT role FROM user_tenants WHERE user_id = $1 AND tenant_id = $2`,
|
||||||
|
userID, tenantID,
|
||||||
|
)
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("get user role: %w", err)
|
||||||
|
}
|
||||||
|
return role, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// FirstTenantForUser returns the user's first tenant (by name), used as default.
|
||||||
|
func (s *TenantService) FirstTenantForUser(ctx context.Context, userID uuid.UUID) (*uuid.UUID, error) {
|
||||||
|
var tenantID uuid.UUID
|
||||||
|
err := s.db.GetContext(ctx, &tenantID,
|
||||||
|
`SELECT t.id FROM tenants t
|
||||||
|
JOIN user_tenants ut ON ut.tenant_id = t.id
|
||||||
|
WHERE ut.user_id = $1
|
||||||
|
ORDER BY t.name LIMIT 1`,
|
||||||
|
userID,
|
||||||
|
)
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("first tenant: %w", err)
|
||||||
|
}
|
||||||
|
return &tenantID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListMembers returns all members of a tenant.
|
||||||
|
func (s *TenantService) ListMembers(ctx context.Context, tenantID uuid.UUID) ([]models.UserTenant, error) {
|
||||||
|
var members []models.UserTenant
|
||||||
|
err := s.db.SelectContext(ctx, &members,
|
||||||
|
`SELECT user_id, tenant_id, role, created_at FROM user_tenants WHERE tenant_id = $1 ORDER BY created_at`,
|
||||||
|
tenantID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("list members: %w", err)
|
||||||
|
}
|
||||||
|
return members, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// InviteByEmail looks up a user by email in auth.users and adds them to the tenant.
|
||||||
|
func (s *TenantService) InviteByEmail(ctx context.Context, tenantID uuid.UUID, email, role string) (*models.UserTenant, error) {
|
||||||
|
// Look up user in Supabase auth.users
|
||||||
|
var userID uuid.UUID
|
||||||
|
err := s.db.GetContext(ctx, &userID,
|
||||||
|
`SELECT id FROM auth.users WHERE email = $1`,
|
||||||
|
email,
|
||||||
|
)
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return nil, fmt.Errorf("no user found with email %s", email)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("lookup user: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if already a member
|
||||||
|
var exists bool
|
||||||
|
err = s.db.GetContext(ctx, &exists,
|
||||||
|
`SELECT EXISTS(SELECT 1 FROM user_tenants WHERE user_id = $1 AND tenant_id = $2)`,
|
||||||
|
userID, tenantID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("check membership: %w", err)
|
||||||
|
}
|
||||||
|
if exists {
|
||||||
|
return nil, fmt.Errorf("user is already a member of this tenant")
|
||||||
|
}
|
||||||
|
|
||||||
|
var ut models.UserTenant
|
||||||
|
err = s.db.QueryRowxContext(ctx,
|
||||||
|
`INSERT INTO user_tenants (user_id, tenant_id, role) VALUES ($1, $2, $3)
|
||||||
|
RETURNING user_id, tenant_id, role, created_at`,
|
||||||
|
userID, tenantID, role,
|
||||||
|
).StructScan(&ut)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("invite user: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &ut, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoveMember removes a user from a tenant. Cannot remove the last owner.
|
||||||
|
func (s *TenantService) RemoveMember(ctx context.Context, tenantID, userID uuid.UUID) error {
|
||||||
|
// Check if the user being removed is an owner
|
||||||
|
role, err := s.GetUserRole(ctx, userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("check role: %w", err)
|
||||||
|
}
|
||||||
|
if role == "" {
|
||||||
|
return fmt.Errorf("user is not a member of this tenant")
|
||||||
|
}
|
||||||
|
|
||||||
|
if role == "owner" {
|
||||||
|
// Count owners — prevent removing the last one
|
||||||
|
var ownerCount int
|
||||||
|
err := s.db.GetContext(ctx, &ownerCount,
|
||||||
|
`SELECT COUNT(*) FROM user_tenants WHERE tenant_id = $1 AND role = 'owner'`,
|
||||||
|
tenantID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("count owners: %w", err)
|
||||||
|
}
|
||||||
|
if ownerCount <= 1 {
|
||||||
|
return fmt.Errorf("cannot remove the last owner of a tenant")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = s.db.ExecContext(ctx,
|
||||||
|
`DELETE FROM user_tenants WHERE user_id = $1 AND tenant_id = $2`,
|
||||||
|
userID, tenantID,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("remove member: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
167
backend/seed/demo_data.sql
Normal file
167
backend/seed/demo_data.sql
Normal file
@@ -0,0 +1,167 @@
|
|||||||
|
-- KanzlAI Demo Data
|
||||||
|
-- Creates 1 test tenant, 5 cases with deadlines and appointments
|
||||||
|
-- Run with: psql $DATABASE_URL -f demo_data.sql
|
||||||
|
|
||||||
|
SET search_path TO kanzlai, public;
|
||||||
|
|
||||||
|
-- Demo tenant
|
||||||
|
INSERT INTO tenants (id, name, slug, settings) VALUES
|
||||||
|
('a0000000-0000-0000-0000-000000000001', 'Kanzlei Siebels & Partner', 'siebels-partner', '{}')
|
||||||
|
ON CONFLICT (id) DO NOTHING;
|
||||||
|
|
||||||
|
-- Link both users to the demo tenant
|
||||||
|
INSERT INTO user_tenants (user_id, tenant_id, role) VALUES
|
||||||
|
('1da9374d-a8a6-49fc-a2ec-5ddfa91d522d', 'a0000000-0000-0000-0000-000000000001', 'owner'),
|
||||||
|
('ac6c9501-3757-4a6d-8b97-2cff4288382b', 'a0000000-0000-0000-0000-000000000001', 'member')
|
||||||
|
ON CONFLICT DO NOTHING;
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case 1: Patentverletzung (patent infringement) — active
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status) VALUES
|
||||||
|
('c0000000-0000-0000-0000-000000000001',
|
||||||
|
'a0000000-0000-0000-0000-000000000001',
|
||||||
|
'2026/001', 'TechCorp GmbH ./. InnovatAG — Patentverletzung EP 1234567',
|
||||||
|
'patent', 'UPC München (Lokalkammer)', 'UPC_CFI-123/2026',
|
||||||
|
'active');
|
||||||
|
|
||||||
|
INSERT INTO parties (id, tenant_id, case_id, name, role, representative) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'TechCorp GmbH', 'claimant', 'RA Dr. Siebels'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'InnovatAG', 'defendant', 'RA Müller');
|
||||||
|
|
||||||
|
INSERT INTO deadlines (id, tenant_id, case_id, title, due_date, warning_date, status, source) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'Klageerwiderung einreichen', CURRENT_DATE + INTERVAL '3 days', CURRENT_DATE + INTERVAL '1 day', 'pending', 'manual'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'Beweisangebote nachreichen', CURRENT_DATE + INTERVAL '14 days', CURRENT_DATE + INTERVAL '10 days', 'pending', 'manual'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'Schriftsatz Anspruch 3', CURRENT_DATE - INTERVAL '2 days', CURRENT_DATE - INTERVAL '5 days', 'pending', 'manual');
|
||||||
|
|
||||||
|
INSERT INTO appointments (id, tenant_id, case_id, title, start_at, end_at, location, appointment_type) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'Mündliche Verhandlung', CURRENT_DATE + INTERVAL '21 days' + TIME '10:00', CURRENT_DATE + INTERVAL '21 days' + TIME '12:00',
|
||||||
|
'UPC München, Saal 4', 'hearing');
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case 2: Markenrecht (trademark) — active
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status) VALUES
|
||||||
|
('c0000000-0000-0000-0000-000000000002',
|
||||||
|
'a0000000-0000-0000-0000-000000000001',
|
||||||
|
'2026/002', 'BrandHouse ./. CopyShop UG — Markenverletzung DE 30201234',
|
||||||
|
'trademark', 'LG Hamburg', '315 O 78/26',
|
||||||
|
'active');
|
||||||
|
|
||||||
|
INSERT INTO parties (id, tenant_id, case_id, name, role, representative) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'BrandHouse SE', 'claimant', 'RA Dr. Siebels'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'CopyShop UG', 'defendant', 'RA Weber');
|
||||||
|
|
||||||
|
INSERT INTO deadlines (id, tenant_id, case_id, title, due_date, warning_date, status, source) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'Antrag einstweilige Verfügung', CURRENT_DATE + INTERVAL '5 days', CURRENT_DATE + INTERVAL '2 days', 'pending', 'manual'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'Abmahnung Fristablauf', CURRENT_DATE + INTERVAL '30 days', CURRENT_DATE + INTERVAL '25 days', 'pending', 'manual');
|
||||||
|
|
||||||
|
INSERT INTO appointments (id, tenant_id, case_id, title, start_at, end_at, location, appointment_type) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'Mandantenbesprechung BrandHouse', CURRENT_DATE + INTERVAL '2 days' + TIME '14:00', CURRENT_DATE + INTERVAL '2 days' + TIME '15:30',
|
||||||
|
'Kanzlei, Besprechungsraum 1', 'consultation');
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case 3: Arbeitsgericht (labor law) — active
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status) VALUES
|
||||||
|
('c0000000-0000-0000-0000-000000000003',
|
||||||
|
'a0000000-0000-0000-0000-000000000001',
|
||||||
|
'2026/003', 'Schmidt ./. AutoWerk Bayern GmbH — Kündigungsschutz',
|
||||||
|
'labor', 'ArbG München', '12 Ca 456/26',
|
||||||
|
'active');
|
||||||
|
|
||||||
|
INSERT INTO parties (id, tenant_id, case_id, name, role, representative) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'Klaus Schmidt', 'claimant', 'RA Dr. Siebels'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'AutoWerk Bayern GmbH', 'defendant', 'RA Fischer');
|
||||||
|
|
||||||
|
INSERT INTO deadlines (id, tenant_id, case_id, title, due_date, warning_date, status, source) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'Kündigungsschutzklage einreichen (3-Wochen-Frist)', CURRENT_DATE + INTERVAL '7 days', CURRENT_DATE + INTERVAL '4 days', 'pending', 'manual'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'Stellungnahme Arbeitgeber', CURRENT_DATE + INTERVAL '28 days', CURRENT_DATE + INTERVAL '21 days', 'pending', 'manual');
|
||||||
|
|
||||||
|
INSERT INTO appointments (id, tenant_id, case_id, title, start_at, end_at, location, appointment_type) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'Güteverhandlung', CURRENT_DATE + INTERVAL '35 days' + TIME '09:00', CURRENT_DATE + INTERVAL '35 days' + TIME '10:00',
|
||||||
|
'ArbG München, Saal 12', 'hearing');
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case 4: Mietrecht (tenancy) — active
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status) VALUES
|
||||||
|
('c0000000-0000-0000-0000-000000000004',
|
||||||
|
'a0000000-0000-0000-0000-000000000001',
|
||||||
|
'2026/004', 'Hausverwaltung Zentral ./. Meier — Mietrückstand',
|
||||||
|
'civil', 'AG München', '432 C 1234/26',
|
||||||
|
'active');
|
||||||
|
|
||||||
|
INSERT INTO parties (id, tenant_id, case_id, name, role, representative) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'Hausverwaltung Zentral GmbH', 'claimant', 'RA Dr. Siebels'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'Thomas Meier', 'defendant', NULL);
|
||||||
|
|
||||||
|
INSERT INTO deadlines (id, tenant_id, case_id, title, due_date, warning_date, status, source) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'Mahnbescheid beantragen', CURRENT_DATE + INTERVAL '10 days', CURRENT_DATE + INTERVAL '7 days', 'pending', 'manual'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'Räumungsfrist prüfen', CURRENT_DATE + INTERVAL '60 days', CURRENT_DATE + INTERVAL '50 days', 'pending', 'manual');
|
||||||
|
|
||||||
|
INSERT INTO appointments (id, tenant_id, case_id, title, start_at, end_at, location, appointment_type) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'Besprechung Hausverwaltung', CURRENT_DATE + INTERVAL '4 days' + TIME '11:00', CURRENT_DATE + INTERVAL '4 days' + TIME '12:00',
|
||||||
|
'Kanzlei, Besprechungsraum 2', 'meeting');
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case 5: Erbrecht (inheritance) — closed
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO cases (id, tenant_id, case_number, title, case_type, court, court_ref, status) VALUES
|
||||||
|
('c0000000-0000-0000-0000-000000000005',
|
||||||
|
'a0000000-0000-0000-0000-000000000001',
|
||||||
|
'2025/042', 'Nachlass Wagner — Erbauseinandersetzung',
|
||||||
|
'civil', 'AG Starnberg', '3 VI 891/25',
|
||||||
|
'closed');
|
||||||
|
|
||||||
|
INSERT INTO parties (id, tenant_id, case_id, name, role, representative) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000005',
|
||||||
|
'Maria Wagner', 'claimant', 'RA Dr. Siebels'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000005',
|
||||||
|
'Peter Wagner', 'defendant', 'RA Braun');
|
||||||
|
|
||||||
|
INSERT INTO deadlines (id, tenant_id, case_id, title, due_date, warning_date, status, source, completed_at) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000005',
|
||||||
|
'Erbscheinsantrag einreichen', CURRENT_DATE - INTERVAL '30 days', CURRENT_DATE - INTERVAL '37 days', 'completed', 'manual', CURRENT_DATE - INTERVAL '32 days');
|
||||||
|
|
||||||
|
-- ============================================================
|
||||||
|
-- Case events for realistic activity feed
|
||||||
|
-- ============================================================
|
||||||
|
INSERT INTO case_events (id, tenant_id, case_id, event_type, title, description, created_at, updated_at) VALUES
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'case_created', 'Akte angelegt', 'Patentverletzungsklage TechCorp ./. InnovatAG eröffnet', NOW() - INTERVAL '10 days', NOW() - INTERVAL '10 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'party_added', 'Partei hinzugefügt', 'TechCorp GmbH als Kläger eingetragen', NOW() - INTERVAL '10 days', NOW() - INTERVAL '10 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000002',
|
||||||
|
'case_created', 'Akte angelegt', 'Markenrechtsstreit BrandHouse ./. CopyShop eröffnet', NOW() - INTERVAL '7 days', NOW() - INTERVAL '7 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000003',
|
||||||
|
'case_created', 'Akte angelegt', 'Kündigungsschutzklage Schmidt eröffnet', NOW() - INTERVAL '5 days', NOW() - INTERVAL '5 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000004',
|
||||||
|
'case_created', 'Akte angelegt', 'Mietrückstand Hausverwaltung ./. Meier eröffnet', NOW() - INTERVAL '3 days', NOW() - INTERVAL '3 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000001',
|
||||||
|
'status_changed', 'Fristablauf überschritten', 'Schriftsatz Anspruch 3 ist überfällig', NOW() - INTERVAL '1 day', NOW() - INTERVAL '1 day'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000005',
|
||||||
|
'case_created', 'Akte angelegt', 'Erbauseinandersetzung Wagner eröffnet', NOW() - INTERVAL '60 days', NOW() - INTERVAL '60 days'),
|
||||||
|
(gen_random_uuid(), 'a0000000-0000-0000-0000-000000000001', 'c0000000-0000-0000-0000-000000000005',
|
||||||
|
'status_changed', 'Akte geschlossen', 'Erbscheinsverfahren abgeschlossen', NOW() - INTERVAL '20 days', NOW() - INTERVAL '20 days');
|
||||||
39
docker-compose.yml
Normal file
39
docker-compose.yml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
services:
|
||||||
|
backend:
|
||||||
|
build:
|
||||||
|
context: ./backend
|
||||||
|
expose:
|
||||||
|
- "8080"
|
||||||
|
environment:
|
||||||
|
- PORT=8080
|
||||||
|
- DATABASE_URL=${DATABASE_URL}
|
||||||
|
- SUPABASE_URL=${SUPABASE_URL}
|
||||||
|
- SUPABASE_ANON_KEY=${SUPABASE_ANON_KEY}
|
||||||
|
- SUPABASE_SERVICE_KEY=${SUPABASE_SERVICE_KEY}
|
||||||
|
- SUPABASE_JWT_SECRET=${SUPABASE_JWT_SECRET}
|
||||||
|
- ANTHROPIC_API_KEY=${ANTHROPIC_API_KEY}
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "wget", "--spider", "-q", "http://localhost:8080/health"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 3
|
||||||
|
start_period: 5s
|
||||||
|
|
||||||
|
frontend:
|
||||||
|
build:
|
||||||
|
context: ./frontend
|
||||||
|
expose:
|
||||||
|
- "3000"
|
||||||
|
depends_on:
|
||||||
|
backend:
|
||||||
|
condition: service_healthy
|
||||||
|
environment:
|
||||||
|
- API_URL=http://backend:8080
|
||||||
|
- NEXT_PUBLIC_SUPABASE_URL=${SUPABASE_URL}
|
||||||
|
- NEXT_PUBLIC_SUPABASE_ANON_KEY=${SUPABASE_ANON_KEY}
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "node", "-e", "fetch('http://localhost:3000').then(r=>{if(!r.ok)throw r.status;process.exit(0)}).catch(()=>process.exit(1))"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 3
|
||||||
|
start_period: 10s
|
||||||
9
frontend/.dockerignore
Normal file
9
frontend/.dockerignore
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
node_modules/
|
||||||
|
.next/
|
||||||
|
out/
|
||||||
|
build/
|
||||||
|
.git
|
||||||
|
.gitignore
|
||||||
|
Dockerfile
|
||||||
|
.dockerignore
|
||||||
|
.env*
|
||||||
28
frontend/Dockerfile
Normal file
28
frontend/Dockerfile
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Dependencies
|
||||||
|
FROM oven/bun:1 AS deps
|
||||||
|
WORKDIR /app
|
||||||
|
COPY package.json bun.lock ./
|
||||||
|
RUN bun install --frozen-lockfile
|
||||||
|
|
||||||
|
# Build
|
||||||
|
FROM oven/bun:1 AS builder
|
||||||
|
WORKDIR /app
|
||||||
|
COPY --from=deps /app/node_modules ./node_modules
|
||||||
|
COPY . .
|
||||||
|
ENV API_URL=http://backend:8080
|
||||||
|
RUN mkdir -p public
|
||||||
|
RUN bun run build
|
||||||
|
|
||||||
|
# Run
|
||||||
|
FROM node:22-alpine AS runner
|
||||||
|
WORKDIR /app
|
||||||
|
ENV NODE_ENV=production
|
||||||
|
ENV HOSTNAME=0.0.0.0
|
||||||
|
ENV PORT=3000
|
||||||
|
|
||||||
|
COPY --from=builder /app/.next/standalone ./
|
||||||
|
COPY --from=builder /app/.next/static ./.next/static
|
||||||
|
COPY --from=builder /app/public ./public
|
||||||
|
|
||||||
|
EXPOSE 3000
|
||||||
|
CMD ["node", "server.js"]
|
||||||
@@ -5,9 +5,16 @@
|
|||||||
"": {
|
"": {
|
||||||
"name": "frontend",
|
"name": "frontend",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
|
"@supabase/ssr": "^0.9.0",
|
||||||
|
"@supabase/supabase-js": "^2.100.0",
|
||||||
|
"@tanstack/react-query": "^5.95.2",
|
||||||
|
"date-fns": "^4.1.0",
|
||||||
|
"lucide-react": "^1.6.0",
|
||||||
"next": "15.5.14",
|
"next": "15.5.14",
|
||||||
"react": "19.1.0",
|
"react": "19.1.0",
|
||||||
"react-dom": "19.1.0",
|
"react-dom": "19.1.0",
|
||||||
|
"react-dropzone": "^15.0.0",
|
||||||
|
"sonner": "^2.0.7",
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@eslint/eslintrc": "^3",
|
"@eslint/eslintrc": "^3",
|
||||||
@@ -151,6 +158,22 @@
|
|||||||
|
|
||||||
"@rushstack/eslint-patch": ["@rushstack/eslint-patch@1.16.1", "", {}, "sha512-TvZbIpeKqGQQ7X0zSCvPH9riMSFQFSggnfBjFZ1mEoILW+UuXCKwOoPcgjMwiUtRqFZ8jWhPJc4um14vC6I4ag=="],
|
"@rushstack/eslint-patch": ["@rushstack/eslint-patch@1.16.1", "", {}, "sha512-TvZbIpeKqGQQ7X0zSCvPH9riMSFQFSggnfBjFZ1mEoILW+UuXCKwOoPcgjMwiUtRqFZ8jWhPJc4um14vC6I4ag=="],
|
||||||
|
|
||||||
|
"@supabase/auth-js": ["@supabase/auth-js@2.100.0", "", { "dependencies": { "tslib": "2.8.1" } }, "sha512-pdT3ye3UVRN1Cg0wom6BmyY+XTtp5DiJaYnPi6j8ht5i8Lq8kfqxJMJz9GI9YDKk3w1nhGOPnh6Qz5qpyYm+1w=="],
|
||||||
|
|
||||||
|
"@supabase/functions-js": ["@supabase/functions-js@2.100.0", "", { "dependencies": { "tslib": "2.8.1" } }, "sha512-keLg79RPwP+uiwHuxFPTFgDRxPV46LM4j/swjyR2GKJgWniTVSsgiBHfbIBDcrQwehLepy09b/9QSHUywtKRWQ=="],
|
||||||
|
|
||||||
|
"@supabase/phoenix": ["@supabase/phoenix@0.4.0", "", {}, "sha512-RHSx8bHS02xwfHdAbX5Lpbo6PXbgyf7lTaXTlwtFDPwOIw64NnVRwFAXGojHhjtVYI+PEPNSWwkL90f4agN3bw=="],
|
||||||
|
|
||||||
|
"@supabase/postgrest-js": ["@supabase/postgrest-js@2.100.0", "", { "dependencies": { "tslib": "2.8.1" } }, "sha512-xYNvNbBJaXOGcrZ44wxwp5830uo1okMHGS8h8dm3u4f0xcZ39yzbryUsubTJW41MG2gbL/6U57cA4Pi6YMZ9pA=="],
|
||||||
|
|
||||||
|
"@supabase/realtime-js": ["@supabase/realtime-js@2.100.0", "", { "dependencies": { "@supabase/phoenix": "^0.4.0", "@types/ws": "^8.18.1", "tslib": "2.8.1", "ws": "^8.18.2" } }, "sha512-2AZs00zzEF0HuCKY8grz5eCYlwEfVi5HONLZFoNR6aDfxQivl8zdQYNjyFoqN2MZiVhQHD7u6XV/xHwM8mCEHw=="],
|
||||||
|
|
||||||
|
"@supabase/ssr": ["@supabase/ssr@0.9.0", "", { "dependencies": { "cookie": "^1.0.2" }, "peerDependencies": { "@supabase/supabase-js": "^2.97.0" } }, "sha512-UFY6otYV3yqCgV+AyHj80vNkTvbf1Gas2LW4dpbQ4ap6p6v3eB2oaDfcI99jsuJzwVBCFU4BJI+oDYyhNk1z0Q=="],
|
||||||
|
|
||||||
|
"@supabase/storage-js": ["@supabase/storage-js@2.100.0", "", { "dependencies": { "iceberg-js": "^0.8.1", "tslib": "2.8.1" } }, "sha512-d4EeuK6RNIgYNA2MU9kj8lQrLm5AzZ+WwpWjGkii6SADQNIGTC/uiaTRu02XJ5AmFALQfo8fLl9xuCkO6Xw+iQ=="],
|
||||||
|
|
||||||
|
"@supabase/supabase-js": ["@supabase/supabase-js@2.100.0", "", { "dependencies": { "@supabase/auth-js": "2.100.0", "@supabase/functions-js": "2.100.0", "@supabase/postgrest-js": "2.100.0", "@supabase/realtime-js": "2.100.0", "@supabase/storage-js": "2.100.0" } }, "sha512-r0tlcukejJXJ1m/2eG/Ya5eYs4W8AC7oZfShpG3+SIo/eIU9uIt76ZeYI1SoUwUmcmzlAbgch+HDZDR/toVQPQ=="],
|
||||||
|
|
||||||
"@swc/helpers": ["@swc/helpers@0.5.15", "", { "dependencies": { "tslib": "^2.8.0" } }, "sha512-JQ5TuMi45Owi4/BIMAJBoSQoOJu12oOk/gADqlcUL9JEdHB8vyjUSsxqeNXnmXHjYKMi2WcYtezGEEhqUI/E2g=="],
|
"@swc/helpers": ["@swc/helpers@0.5.15", "", { "dependencies": { "tslib": "^2.8.0" } }, "sha512-JQ5TuMi45Owi4/BIMAJBoSQoOJu12oOk/gADqlcUL9JEdHB8vyjUSsxqeNXnmXHjYKMi2WcYtezGEEhqUI/E2g=="],
|
||||||
|
|
||||||
"@tailwindcss/node": ["@tailwindcss/node@4.2.2", "", { "dependencies": { "@jridgewell/remapping": "^2.3.5", "enhanced-resolve": "^5.19.0", "jiti": "^2.6.1", "lightningcss": "1.32.0", "magic-string": "^0.30.21", "source-map-js": "^1.2.1", "tailwindcss": "4.2.2" } }, "sha512-pXS+wJ2gZpVXqFaUEjojq7jzMpTGf8rU6ipJz5ovJV6PUGmlJ+jvIwGrzdHdQ80Sg+wmQxUFuoW1UAAwHNEdFA=="],
|
"@tailwindcss/node": ["@tailwindcss/node@4.2.2", "", { "dependencies": { "@jridgewell/remapping": "^2.3.5", "enhanced-resolve": "^5.19.0", "jiti": "^2.6.1", "lightningcss": "1.32.0", "magic-string": "^0.30.21", "source-map-js": "^1.2.1", "tailwindcss": "4.2.2" } }, "sha512-pXS+wJ2gZpVXqFaUEjojq7jzMpTGf8rU6ipJz5ovJV6PUGmlJ+jvIwGrzdHdQ80Sg+wmQxUFuoW1UAAwHNEdFA=="],
|
||||||
@@ -183,6 +206,10 @@
|
|||||||
|
|
||||||
"@tailwindcss/postcss": ["@tailwindcss/postcss@4.2.2", "", { "dependencies": { "@alloc/quick-lru": "^5.2.0", "@tailwindcss/node": "4.2.2", "@tailwindcss/oxide": "4.2.2", "postcss": "^8.5.6", "tailwindcss": "4.2.2" } }, "sha512-n4goKQbW8RVXIbNKRB/45LzyUqN451deQK0nzIeauVEqjlI49slUlgKYJM2QyUzap/PcpnS7kzSUmPb1sCRvYQ=="],
|
"@tailwindcss/postcss": ["@tailwindcss/postcss@4.2.2", "", { "dependencies": { "@alloc/quick-lru": "^5.2.0", "@tailwindcss/node": "4.2.2", "@tailwindcss/oxide": "4.2.2", "postcss": "^8.5.6", "tailwindcss": "4.2.2" } }, "sha512-n4goKQbW8RVXIbNKRB/45LzyUqN451deQK0nzIeauVEqjlI49slUlgKYJM2QyUzap/PcpnS7kzSUmPb1sCRvYQ=="],
|
||||||
|
|
||||||
|
"@tanstack/query-core": ["@tanstack/query-core@5.95.2", "", {}, "sha512-o4T8vZHZET4Bib3jZ/tCW9/7080urD4c+0/AUaYVpIqOsr7y0reBc1oX3ttNaSW5mYyvZHctiQ/UOP2PfdmFEQ=="],
|
||||||
|
|
||||||
|
"@tanstack/react-query": ["@tanstack/react-query@5.95.2", "", { "dependencies": { "@tanstack/query-core": "5.95.2" }, "peerDependencies": { "react": "^18 || ^19" } }, "sha512-/wGkvLj/st5Ud1Q76KF1uFxScV7WeqN1slQx5280ycwAyYkIPGaRZAEgHxe3bjirSd5Zpwkj6zNcR4cqYni/ZA=="],
|
||||||
|
|
||||||
"@tybys/wasm-util": ["@tybys/wasm-util@0.10.1", "", { "dependencies": { "tslib": "^2.4.0" } }, "sha512-9tTaPJLSiejZKx+Bmog4uSubteqTvFrVrURwkmHixBo0G4seD0zUxp98E1DzUBJxLQ3NPwXrGKDiVjwx/DpPsg=="],
|
"@tybys/wasm-util": ["@tybys/wasm-util@0.10.1", "", { "dependencies": { "tslib": "^2.4.0" } }, "sha512-9tTaPJLSiejZKx+Bmog4uSubteqTvFrVrURwkmHixBo0G4seD0zUxp98E1DzUBJxLQ3NPwXrGKDiVjwx/DpPsg=="],
|
||||||
|
|
||||||
"@types/estree": ["@types/estree@1.0.8", "", {}, "sha512-dWHzHa2WqEXI/O1E9OjrocMTKJl2mSrEolh1Iomrv6U+JuNwaHXsXx9bLu5gG7BUWFIN0skIQJQ/L1rIex4X6w=="],
|
"@types/estree": ["@types/estree@1.0.8", "", {}, "sha512-dWHzHa2WqEXI/O1E9OjrocMTKJl2mSrEolh1Iomrv6U+JuNwaHXsXx9bLu5gG7BUWFIN0skIQJQ/L1rIex4X6w=="],
|
||||||
@@ -197,6 +224,8 @@
|
|||||||
|
|
||||||
"@types/react-dom": ["@types/react-dom@19.2.3", "", { "peerDependencies": { "@types/react": "^19.2.0" } }, "sha512-jp2L/eY6fn+KgVVQAOqYItbF0VY/YApe5Mz2F0aykSO8gx31bYCZyvSeYxCHKvzHG5eZjc+zyaS5BrBWya2+kQ=="],
|
"@types/react-dom": ["@types/react-dom@19.2.3", "", { "peerDependencies": { "@types/react": "^19.2.0" } }, "sha512-jp2L/eY6fn+KgVVQAOqYItbF0VY/YApe5Mz2F0aykSO8gx31bYCZyvSeYxCHKvzHG5eZjc+zyaS5BrBWya2+kQ=="],
|
||||||
|
|
||||||
|
"@types/ws": ["@types/ws@8.18.1", "", { "dependencies": { "@types/node": "*" } }, "sha512-ThVF6DCVhA8kUGy+aazFQ4kXQ7E1Ty7A3ypFOe0IcJV8O/M511G99AW24irKrW56Wt44yG9+ij8FaqoBGkuBXg=="],
|
||||||
|
|
||||||
"@typescript-eslint/eslint-plugin": ["@typescript-eslint/eslint-plugin@8.57.2", "", { "dependencies": { "@eslint-community/regexpp": "^4.12.2", "@typescript-eslint/scope-manager": "8.57.2", "@typescript-eslint/type-utils": "8.57.2", "@typescript-eslint/utils": "8.57.2", "@typescript-eslint/visitor-keys": "8.57.2", "ignore": "^7.0.5", "natural-compare": "^1.4.0", "ts-api-utils": "^2.4.0" }, "peerDependencies": { "@typescript-eslint/parser": "^8.57.2", "eslint": "^8.57.0 || ^9.0.0 || ^10.0.0", "typescript": ">=4.8.4 <6.0.0" } }, "sha512-NZZgp0Fm2IkD+La5PR81sd+g+8oS6JwJje+aRWsDocxHkjyRw0J5L5ZTlN3LI1LlOcGL7ph3eaIUmTXMIjLk0w=="],
|
"@typescript-eslint/eslint-plugin": ["@typescript-eslint/eslint-plugin@8.57.2", "", { "dependencies": { "@eslint-community/regexpp": "^4.12.2", "@typescript-eslint/scope-manager": "8.57.2", "@typescript-eslint/type-utils": "8.57.2", "@typescript-eslint/utils": "8.57.2", "@typescript-eslint/visitor-keys": "8.57.2", "ignore": "^7.0.5", "natural-compare": "^1.4.0", "ts-api-utils": "^2.4.0" }, "peerDependencies": { "@typescript-eslint/parser": "^8.57.2", "eslint": "^8.57.0 || ^9.0.0 || ^10.0.0", "typescript": ">=4.8.4 <6.0.0" } }, "sha512-NZZgp0Fm2IkD+La5PR81sd+g+8oS6JwJje+aRWsDocxHkjyRw0J5L5ZTlN3LI1LlOcGL7ph3eaIUmTXMIjLk0w=="],
|
||||||
|
|
||||||
"@typescript-eslint/parser": ["@typescript-eslint/parser@8.57.2", "", { "dependencies": { "@typescript-eslint/scope-manager": "8.57.2", "@typescript-eslint/types": "8.57.2", "@typescript-eslint/typescript-estree": "8.57.2", "@typescript-eslint/visitor-keys": "8.57.2", "debug": "^4.4.3" }, "peerDependencies": { "eslint": "^8.57.0 || ^9.0.0 || ^10.0.0", "typescript": ">=4.8.4 <6.0.0" } }, "sha512-30ScMRHIAD33JJQkgfGW1t8CURZtjc2JpTrq5n2HFhOefbAhb7ucc7xJwdWcrEtqUIYJ73Nybpsggii6GtAHjA=="],
|
"@typescript-eslint/parser": ["@typescript-eslint/parser@8.57.2", "", { "dependencies": { "@typescript-eslint/scope-manager": "8.57.2", "@typescript-eslint/types": "8.57.2", "@typescript-eslint/typescript-estree": "8.57.2", "@typescript-eslint/visitor-keys": "8.57.2", "debug": "^4.4.3" }, "peerDependencies": { "eslint": "^8.57.0 || ^9.0.0 || ^10.0.0", "typescript": ">=4.8.4 <6.0.0" } }, "sha512-30ScMRHIAD33JJQkgfGW1t8CURZtjc2JpTrq5n2HFhOefbAhb7ucc7xJwdWcrEtqUIYJ73Nybpsggii6GtAHjA=="],
|
||||||
@@ -287,6 +316,8 @@
|
|||||||
|
|
||||||
"async-function": ["async-function@1.0.0", "", {}, "sha512-hsU18Ae8CDTR6Kgu9DYf0EbCr/a5iGL0rytQDobUcdpYOKokk8LEjVphnXkDkgpi0wYVsqrXuP0bZxJaTqdgoA=="],
|
"async-function": ["async-function@1.0.0", "", {}, "sha512-hsU18Ae8CDTR6Kgu9DYf0EbCr/a5iGL0rytQDobUcdpYOKokk8LEjVphnXkDkgpi0wYVsqrXuP0bZxJaTqdgoA=="],
|
||||||
|
|
||||||
|
"attr-accept": ["attr-accept@2.2.5", "", {}, "sha512-0bDNnY/u6pPwHDMoF0FieU354oBi0a8rD9FcsLwzcGWbc8KS8KPIi7y+s13OlVY+gMWc/9xEMUgNE6Qm8ZllYQ=="],
|
||||||
|
|
||||||
"available-typed-arrays": ["available-typed-arrays@1.0.7", "", { "dependencies": { "possible-typed-array-names": "^1.0.0" } }, "sha512-wvUjBtSGN7+7SjNpq/9M2Tg350UZD3q62IFZLbRAR1bSMlCo1ZaeW+BJ+D090e4hIIZLBcTDWe4Mh4jvUDajzQ=="],
|
"available-typed-arrays": ["available-typed-arrays@1.0.7", "", { "dependencies": { "possible-typed-array-names": "^1.0.0" } }, "sha512-wvUjBtSGN7+7SjNpq/9M2Tg350UZD3q62IFZLbRAR1bSMlCo1ZaeW+BJ+D090e4hIIZLBcTDWe4Mh4jvUDajzQ=="],
|
||||||
|
|
||||||
"axe-core": ["axe-core@4.11.1", "", {}, "sha512-BASOg+YwO2C+346x3LZOeoovTIoTrRqEsqMa6fmfAV0P+U9mFr9NsyOEpiYvFjbc64NMrSswhV50WdXzdb/Z5A=="],
|
"axe-core": ["axe-core@4.11.1", "", {}, "sha512-BASOg+YwO2C+346x3LZOeoovTIoTrRqEsqMa6fmfAV0P+U9mFr9NsyOEpiYvFjbc64NMrSswhV50WdXzdb/Z5A=="],
|
||||||
@@ -319,6 +350,8 @@
|
|||||||
|
|
||||||
"concat-map": ["concat-map@0.0.1", "", {}, "sha512-/Srv4dswyQNBfohGpz9o6Yb3Gz3SrUDqBH5rTuhGR7ahtlbYKnVxw2bCFMRljaA7EXHaXZ8wsHdodFvbkhKmqg=="],
|
"concat-map": ["concat-map@0.0.1", "", {}, "sha512-/Srv4dswyQNBfohGpz9o6Yb3Gz3SrUDqBH5rTuhGR7ahtlbYKnVxw2bCFMRljaA7EXHaXZ8wsHdodFvbkhKmqg=="],
|
||||||
|
|
||||||
|
"cookie": ["cookie@1.1.1", "", {}, "sha512-ei8Aos7ja0weRpFzJnEA9UHJ/7XQmqglbRwnf2ATjcB9Wq874VKH9kfjjirM6UhU2/E5fFYadylyhFldcqSidQ=="],
|
||||||
|
|
||||||
"cross-spawn": ["cross-spawn@7.0.6", "", { "dependencies": { "path-key": "^3.1.0", "shebang-command": "^2.0.0", "which": "^2.0.1" } }, "sha512-uV2QOWP2nWzsy2aMp8aRibhi9dlzF5Hgh5SHaB9OiTGEyDTiJJyx0uy51QXdyWbtAHNua4XJzUKca3OzKUd3vA=="],
|
"cross-spawn": ["cross-spawn@7.0.6", "", { "dependencies": { "path-key": "^3.1.0", "shebang-command": "^2.0.0", "which": "^2.0.1" } }, "sha512-uV2QOWP2nWzsy2aMp8aRibhi9dlzF5Hgh5SHaB9OiTGEyDTiJJyx0uy51QXdyWbtAHNua4XJzUKca3OzKUd3vA=="],
|
||||||
|
|
||||||
"csstype": ["csstype@3.2.3", "", {}, "sha512-z1HGKcYy2xA8AGQfwrn0PAy+PB7X/GSj3UVJW9qKyn43xWa+gl5nXmU4qqLMRzWVLFC8KusUX8T/0kCiOYpAIQ=="],
|
"csstype": ["csstype@3.2.3", "", {}, "sha512-z1HGKcYy2xA8AGQfwrn0PAy+PB7X/GSj3UVJW9qKyn43xWa+gl5nXmU4qqLMRzWVLFC8KusUX8T/0kCiOYpAIQ=="],
|
||||||
@@ -331,6 +364,8 @@
|
|||||||
|
|
||||||
"data-view-byte-offset": ["data-view-byte-offset@1.0.1", "", { "dependencies": { "call-bound": "^1.0.2", "es-errors": "^1.3.0", "is-data-view": "^1.0.1" } }, "sha512-BS8PfmtDGnrgYdOonGZQdLZslWIeCGFP9tpan0hi1Co2Zr2NKADsvGYA8XxuG/4UWgJ6Cjtv+YJnB6MM69QGlQ=="],
|
"data-view-byte-offset": ["data-view-byte-offset@1.0.1", "", { "dependencies": { "call-bound": "^1.0.2", "es-errors": "^1.3.0", "is-data-view": "^1.0.1" } }, "sha512-BS8PfmtDGnrgYdOonGZQdLZslWIeCGFP9tpan0hi1Co2Zr2NKADsvGYA8XxuG/4UWgJ6Cjtv+YJnB6MM69QGlQ=="],
|
||||||
|
|
||||||
|
"date-fns": ["date-fns@4.1.0", "", {}, "sha512-Ukq0owbQXxa/U3EGtsdVBkR1w7KOQ5gIBqdH2hkvknzZPYvBxb/aa6E8L7tmjFtkwZBu3UXBbjIgPo/Ez4xaNg=="],
|
||||||
|
|
||||||
"debug": ["debug@4.4.3", "", { "dependencies": { "ms": "^2.1.3" } }, "sha512-RGwwWnwQvkVfavKVt22FGLw+xYSdzARwm0ru6DhTVA3umU5hZc28V3kO4stgYryrTlLpuvgI9GiijltAjNbcqA=="],
|
"debug": ["debug@4.4.3", "", { "dependencies": { "ms": "^2.1.3" } }, "sha512-RGwwWnwQvkVfavKVt22FGLw+xYSdzARwm0ru6DhTVA3umU5hZc28V3kO4stgYryrTlLpuvgI9GiijltAjNbcqA=="],
|
||||||
|
|
||||||
"deep-is": ["deep-is@0.1.4", "", {}, "sha512-oIPzksmTg4/MriiaYGO+okXDT7ztn/w3Eptv/+gSIdMdKsJo0u4CfYNFJPy+4SKMuCqGw2wxnA+URMg3t8a/bQ=="],
|
"deep-is": ["deep-is@0.1.4", "", {}, "sha512-oIPzksmTg4/MriiaYGO+okXDT7ztn/w3Eptv/+gSIdMdKsJo0u4CfYNFJPy+4SKMuCqGw2wxnA+URMg3t8a/bQ=="],
|
||||||
@@ -413,6 +448,8 @@
|
|||||||
|
|
||||||
"file-entry-cache": ["file-entry-cache@8.0.0", "", { "dependencies": { "flat-cache": "^4.0.0" } }, "sha512-XXTUwCvisa5oacNGRP9SfNtYBNAMi+RPwBFmblZEF7N7swHYQS6/Zfk7SRwx4D5j3CH211YNRco1DEMNVfZCnQ=="],
|
"file-entry-cache": ["file-entry-cache@8.0.0", "", { "dependencies": { "flat-cache": "^4.0.0" } }, "sha512-XXTUwCvisa5oacNGRP9SfNtYBNAMi+RPwBFmblZEF7N7swHYQS6/Zfk7SRwx4D5j3CH211YNRco1DEMNVfZCnQ=="],
|
||||||
|
|
||||||
|
"file-selector": ["file-selector@2.1.2", "", { "dependencies": { "tslib": "^2.7.0" } }, "sha512-QgXo+mXTe8ljeqUFaX3QVHc5osSItJ/Km+xpocx0aSqWGMSCf6qYs/VnzZgS864Pjn5iceMRFigeAV7AfTlaig=="],
|
||||||
|
|
||||||
"fill-range": ["fill-range@7.1.1", "", { "dependencies": { "to-regex-range": "^5.0.1" } }, "sha512-YsGpe3WHLK8ZYi4tWDg2Jy3ebRz2rXowDxnld4bkQB00cc/1Zw9AWnC0i9ztDJitivtQvaI9KaLyKrc+hBW0yg=="],
|
"fill-range": ["fill-range@7.1.1", "", { "dependencies": { "to-regex-range": "^5.0.1" } }, "sha512-YsGpe3WHLK8ZYi4tWDg2Jy3ebRz2rXowDxnld4bkQB00cc/1Zw9AWnC0i9ztDJitivtQvaI9KaLyKrc+hBW0yg=="],
|
||||||
|
|
||||||
"find-up": ["find-up@5.0.0", "", { "dependencies": { "locate-path": "^6.0.0", "path-exists": "^4.0.0" } }, "sha512-78/PXT1wlLLDgTzDs7sjq9hzz0vXD+zn+7wypEe4fXQxCmdmqfGsEPQxmiCSQI3ajFV91bVSsvNtrJRiW6nGng=="],
|
"find-up": ["find-up@5.0.0", "", { "dependencies": { "locate-path": "^6.0.0", "path-exists": "^4.0.0" } }, "sha512-78/PXT1wlLLDgTzDs7sjq9hzz0vXD+zn+7wypEe4fXQxCmdmqfGsEPQxmiCSQI3ajFV91bVSsvNtrJRiW6nGng=="],
|
||||||
@@ -463,6 +500,8 @@
|
|||||||
|
|
||||||
"hasown": ["hasown@2.0.2", "", { "dependencies": { "function-bind": "^1.1.2" } }, "sha512-0hJU9SCPvmMzIBdZFqNPXWa6dqh7WdH0cII9y+CyS8rG3nL48Bclra9HmKhVVUHyPWNH5Y7xDwAB7bfgSjkUMQ=="],
|
"hasown": ["hasown@2.0.2", "", { "dependencies": { "function-bind": "^1.1.2" } }, "sha512-0hJU9SCPvmMzIBdZFqNPXWa6dqh7WdH0cII9y+CyS8rG3nL48Bclra9HmKhVVUHyPWNH5Y7xDwAB7bfgSjkUMQ=="],
|
||||||
|
|
||||||
|
"iceberg-js": ["iceberg-js@0.8.1", "", {}, "sha512-1dhVQZXhcHje7798IVM+xoo/1ZdVfzOMIc8/rgVSijRK38EDqOJoGula9N/8ZI5RD8QTxNQtK/Gozpr+qUqRRA=="],
|
||||||
|
|
||||||
"ignore": ["ignore@5.3.2", "", {}, "sha512-hsBTNUqQTDwkWtcdYI2i06Y/nUBEsNEDJKjWdigLvegy8kDuJAS8uRlpkkcQpyEXL0Z/pjDy5HBmMjRCJ2gq+g=="],
|
"ignore": ["ignore@5.3.2", "", {}, "sha512-hsBTNUqQTDwkWtcdYI2i06Y/nUBEsNEDJKjWdigLvegy8kDuJAS8uRlpkkcQpyEXL0Z/pjDy5HBmMjRCJ2gq+g=="],
|
||||||
|
|
||||||
"import-fresh": ["import-fresh@3.3.1", "", { "dependencies": { "parent-module": "^1.0.0", "resolve-from": "^4.0.0" } }, "sha512-TR3KfrTZTYLPB6jUjfx6MF9WcWrHL9su5TObK4ZkYgBdWKPOFoSoQIdEuTuR82pmtxH2spWG9h6etwfr1pLBqQ=="],
|
"import-fresh": ["import-fresh@3.3.1", "", { "dependencies": { "parent-module": "^1.0.0", "resolve-from": "^4.0.0" } }, "sha512-TR3KfrTZTYLPB6jUjfx6MF9WcWrHL9su5TObK4ZkYgBdWKPOFoSoQIdEuTuR82pmtxH2spWG9h6etwfr1pLBqQ=="],
|
||||||
@@ -583,6 +622,8 @@
|
|||||||
|
|
||||||
"loose-envify": ["loose-envify@1.4.0", "", { "dependencies": { "js-tokens": "^3.0.0 || ^4.0.0" }, "bin": { "loose-envify": "cli.js" } }, "sha512-lyuxPGr/Wfhrlem2CL/UcnUc1zcqKAImBDzukY7Y5F/yQiNdko6+fRLevlw1HgMySw7f611UIY408EtxRSoK3Q=="],
|
"loose-envify": ["loose-envify@1.4.0", "", { "dependencies": { "js-tokens": "^3.0.0 || ^4.0.0" }, "bin": { "loose-envify": "cli.js" } }, "sha512-lyuxPGr/Wfhrlem2CL/UcnUc1zcqKAImBDzukY7Y5F/yQiNdko6+fRLevlw1HgMySw7f611UIY408EtxRSoK3Q=="],
|
||||||
|
|
||||||
|
"lucide-react": ["lucide-react@1.6.0", "", { "peerDependencies": { "react": "^16.5.1 || ^17.0.0 || ^18.0.0 || ^19.0.0" } }, "sha512-YxLKVCOF5ZDI1AhKQE5IBYMY9y/Nr4NT15+7QEWpsTSVCdn4vmZhww+6BP76jWYjQx8rSz1Z+gGme1f+UycWEw=="],
|
||||||
|
|
||||||
"magic-string": ["magic-string@0.30.21", "", { "dependencies": { "@jridgewell/sourcemap-codec": "^1.5.5" } }, "sha512-vd2F4YUyEXKGcLHoq+TEyCjxueSeHnFxyyjNp80yg0XV4vUhnDer/lvvlqM/arB5bXQN5K2/3oinyCRyx8T2CQ=="],
|
"magic-string": ["magic-string@0.30.21", "", { "dependencies": { "@jridgewell/sourcemap-codec": "^1.5.5" } }, "sha512-vd2F4YUyEXKGcLHoq+TEyCjxueSeHnFxyyjNp80yg0XV4vUhnDer/lvvlqM/arB5bXQN5K2/3oinyCRyx8T2CQ=="],
|
||||||
|
|
||||||
"math-intrinsics": ["math-intrinsics@1.1.0", "", {}, "sha512-/IXtbwEk5HTPyEwyKX6hGkYXxM9nbj64B+ilVJnC/R6B0pH5G4V3b0pVbL7DBj4tkhBAppbQUlf6F6Xl9LHu1g=="],
|
"math-intrinsics": ["math-intrinsics@1.1.0", "", {}, "sha512-/IXtbwEk5HTPyEwyKX6hGkYXxM9nbj64B+ilVJnC/R6B0pH5G4V3b0pVbL7DBj4tkhBAppbQUlf6F6Xl9LHu1g=="],
|
||||||
@@ -659,6 +700,8 @@
|
|||||||
|
|
||||||
"react-dom": ["react-dom@19.1.0", "", { "dependencies": { "scheduler": "^0.26.0" }, "peerDependencies": { "react": "^19.1.0" } }, "sha512-Xs1hdnE+DyKgeHJeJznQmYMIBG3TKIHJJT95Q58nHLSrElKlGQqDTR2HQ9fx5CN/Gk6Vh/kupBTDLU11/nDk/g=="],
|
"react-dom": ["react-dom@19.1.0", "", { "dependencies": { "scheduler": "^0.26.0" }, "peerDependencies": { "react": "^19.1.0" } }, "sha512-Xs1hdnE+DyKgeHJeJznQmYMIBG3TKIHJJT95Q58nHLSrElKlGQqDTR2HQ9fx5CN/Gk6Vh/kupBTDLU11/nDk/g=="],
|
||||||
|
|
||||||
|
"react-dropzone": ["react-dropzone@15.0.0", "", { "dependencies": { "attr-accept": "^2.2.4", "file-selector": "^2.1.0", "prop-types": "^15.8.1" }, "peerDependencies": { "react": ">= 16.8 || 18.0.0" } }, "sha512-lGjYV/EoqEjEWPnmiSvH4v5IoIAwQM2W4Z1C0Q/Pw2xD0eVzKPS359BQTUMum+1fa0kH2nrKjuavmTPOGhpLPg=="],
|
||||||
|
|
||||||
"react-is": ["react-is@16.13.1", "", {}, "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ=="],
|
"react-is": ["react-is@16.13.1", "", {}, "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ=="],
|
||||||
|
|
||||||
"reflect.getprototypeof": ["reflect.getprototypeof@1.0.10", "", { "dependencies": { "call-bind": "^1.0.8", "define-properties": "^1.2.1", "es-abstract": "^1.23.9", "es-errors": "^1.3.0", "es-object-atoms": "^1.0.0", "get-intrinsic": "^1.2.7", "get-proto": "^1.0.1", "which-builtin-type": "^1.2.1" } }, "sha512-00o4I+DVrefhv+nX0ulyi3biSHCPDe+yLv5o/p6d/UVlirijB8E16FtfwSAi4g3tcqrQ4lRAqQSoFEZJehYEcw=="],
|
"reflect.getprototypeof": ["reflect.getprototypeof@1.0.10", "", { "dependencies": { "call-bind": "^1.0.8", "define-properties": "^1.2.1", "es-abstract": "^1.23.9", "es-errors": "^1.3.0", "es-object-atoms": "^1.0.0", "get-intrinsic": "^1.2.7", "get-proto": "^1.0.1", "which-builtin-type": "^1.2.1" } }, "sha512-00o4I+DVrefhv+nX0ulyi3biSHCPDe+yLv5o/p6d/UVlirijB8E16FtfwSAi4g3tcqrQ4lRAqQSoFEZJehYEcw=="],
|
||||||
@@ -705,6 +748,8 @@
|
|||||||
|
|
||||||
"side-channel-weakmap": ["side-channel-weakmap@1.0.2", "", { "dependencies": { "call-bound": "^1.0.2", "es-errors": "^1.3.0", "get-intrinsic": "^1.2.5", "object-inspect": "^1.13.3", "side-channel-map": "^1.0.1" } }, "sha512-WPS/HvHQTYnHisLo9McqBHOJk2FkHO/tlpvldyrnem4aeQp4hai3gythswg6p01oSoTl58rcpiFAjF2br2Ak2A=="],
|
"side-channel-weakmap": ["side-channel-weakmap@1.0.2", "", { "dependencies": { "call-bound": "^1.0.2", "es-errors": "^1.3.0", "get-intrinsic": "^1.2.5", "object-inspect": "^1.13.3", "side-channel-map": "^1.0.1" } }, "sha512-WPS/HvHQTYnHisLo9McqBHOJk2FkHO/tlpvldyrnem4aeQp4hai3gythswg6p01oSoTl58rcpiFAjF2br2Ak2A=="],
|
||||||
|
|
||||||
|
"sonner": ["sonner@2.0.7", "", { "peerDependencies": { "react": "^18.0.0 || ^19.0.0 || ^19.0.0-rc", "react-dom": "^18.0.0 || ^19.0.0 || ^19.0.0-rc" } }, "sha512-W6ZN4p58k8aDKA4XPcx2hpIQXBRAgyiWVkYhT7CvK6D3iAu7xjvVyhQHg2/iaKJZ1XVJ4r7XuwGL+WGEK37i9w=="],
|
||||||
|
|
||||||
"source-map-js": ["source-map-js@1.2.1", "", {}, "sha512-UXWMKhLOwVKb728IUtQPXxfYU+usdybtUrK/8uGE8CQMvrhOpwvzDBwj0QhSL7MQc7vIsISBG8VQ8+IDQxpfQA=="],
|
"source-map-js": ["source-map-js@1.2.1", "", {}, "sha512-UXWMKhLOwVKb728IUtQPXxfYU+usdybtUrK/8uGE8CQMvrhOpwvzDBwj0QhSL7MQc7vIsISBG8VQ8+IDQxpfQA=="],
|
||||||
|
|
||||||
"stable-hash": ["stable-hash@0.0.5", "", {}, "sha512-+L3ccpzibovGXFK+Ap/f8LOS0ahMrHTf3xu7mMLSpEGU0EO9ucaysSylKo9eRDFNhWve/y275iPmIZ4z39a9iA=="],
|
"stable-hash": ["stable-hash@0.0.5", "", {}, "sha512-+L3ccpzibovGXFK+Ap/f8LOS0ahMrHTf3xu7mMLSpEGU0EO9ucaysSylKo9eRDFNhWve/y275iPmIZ4z39a9iA=="],
|
||||||
@@ -779,6 +824,8 @@
|
|||||||
|
|
||||||
"word-wrap": ["word-wrap@1.2.5", "", {}, "sha512-BN22B5eaMMI9UMtjrGd5g5eCYPpCPDUy0FJXbYsaT5zYxjFOckS53SQDE3pWkVoWpHXVb3BrYcEN4Twa55B5cA=="],
|
"word-wrap": ["word-wrap@1.2.5", "", {}, "sha512-BN22B5eaMMI9UMtjrGd5g5eCYPpCPDUy0FJXbYsaT5zYxjFOckS53SQDE3pWkVoWpHXVb3BrYcEN4Twa55B5cA=="],
|
||||||
|
|
||||||
|
"ws": ["ws@8.20.0", "", { "peerDependencies": { "bufferutil": "^4.0.1", "utf-8-validate": ">=5.0.2" }, "optionalPeers": ["bufferutil", "utf-8-validate"] }, "sha512-sAt8BhgNbzCtgGbt2OxmpuryO63ZoDk/sqaB/znQm94T4fCEsy/yV+7CdC1kJhOU9lboAEU7R3kquuycDoibVA=="],
|
||||||
|
|
||||||
"yocto-queue": ["yocto-queue@0.1.0", "", {}, "sha512-rVksvsnNCdJ/ohGc6xgPwyN8eheCxsiLM8mxuE/t/mOVqJewPuO1miLpTHQiRgTKCLexL4MeAFVagts7HmNZ2Q=="],
|
"yocto-queue": ["yocto-queue@0.1.0", "", {}, "sha512-rVksvsnNCdJ/ohGc6xgPwyN8eheCxsiLM8mxuE/t/mOVqJewPuO1miLpTHQiRgTKCLexL4MeAFVagts7HmNZ2Q=="],
|
||||||
|
|
||||||
"@eslint-community/eslint-utils/eslint-visitor-keys": ["eslint-visitor-keys@3.4.3", "", {}, "sha512-wpc+LXeiyiisxPlEkUzU6svyS1frIO3Mgxj1fdy7Pm8Ygzguax2N3Fa/D/ag1WqbOprdI+uY6wMUl8/a2G+iag=="],
|
"@eslint-community/eslint-utils/eslint-visitor-keys": ["eslint-visitor-keys@3.4.3", "", {}, "sha512-wpc+LXeiyiisxPlEkUzU6svyS1frIO3Mgxj1fdy7Pm8Ygzguax2N3Fa/D/ag1WqbOprdI+uY6wMUl8/a2G+iag=="],
|
||||||
|
|||||||
6
frontend/next-env.d.ts
vendored
Normal file
6
frontend/next-env.d.ts
vendored
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
/// <reference types="next" />
|
||||||
|
/// <reference types="next/image-types/global" />
|
||||||
|
/// <reference path="./.next/types/routes.d.ts" />
|
||||||
|
|
||||||
|
// NOTE: This file should not be edited
|
||||||
|
// see https://nextjs.org/docs/app/api-reference/config/typescript for more information.
|
||||||
@@ -1,7 +1,13 @@
|
|||||||
import type { NextConfig } from "next";
|
import type { NextConfig } from "next";
|
||||||
|
|
||||||
const nextConfig: NextConfig = {
|
const nextConfig: NextConfig = {
|
||||||
/* config options here */
|
output: "standalone",
|
||||||
|
rewrites: async () => [
|
||||||
|
{
|
||||||
|
source: "/api/:path*",
|
||||||
|
destination: `${process.env.API_URL || "http://localhost:8080"}/:path*`,
|
||||||
|
},
|
||||||
|
],
|
||||||
};
|
};
|
||||||
|
|
||||||
export default nextConfig;
|
export default nextConfig;
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"name": "frontend",
|
"name": "kanzlai-mgmt",
|
||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"private": true,
|
"private": true,
|
||||||
"scripts": {
|
"scripts": {
|
||||||
@@ -9,9 +9,16 @@
|
|||||||
"lint": "eslint"
|
"lint": "eslint"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
|
"@supabase/ssr": "^0.9.0",
|
||||||
|
"@supabase/supabase-js": "^2.100.0",
|
||||||
|
"@tanstack/react-query": "^5.95.2",
|
||||||
|
"date-fns": "^4.1.0",
|
||||||
|
"lucide-react": "^1.6.0",
|
||||||
|
"next": "15.5.14",
|
||||||
"react": "19.1.0",
|
"react": "19.1.0",
|
||||||
"react-dom": "19.1.0",
|
"react-dom": "19.1.0",
|
||||||
"next": "15.5.14"
|
"react-dropzone": "^15.0.0",
|
||||||
|
"sonner": "^2.0.7"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"typescript": "^5",
|
"typescript": "^5",
|
||||||
|
|||||||
142
frontend/src/app/(app)/ai/extract/page.tsx
Normal file
142
frontend/src/app/(app)/ai/extract/page.tsx
Normal file
@@ -0,0 +1,142 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useState } from "react";
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { useRouter } from "next/navigation";
|
||||||
|
import { toast } from "sonner";
|
||||||
|
import { Brain } from "lucide-react";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type {
|
||||||
|
Case,
|
||||||
|
ExtractedDeadline,
|
||||||
|
ExtractionResponse,
|
||||||
|
PaginatedResponse,
|
||||||
|
} from "@/lib/types";
|
||||||
|
import { ExtractionForm } from "@/components/ai/ExtractionForm";
|
||||||
|
import { ExtractionResults } from "@/components/ai/ExtractionResults";
|
||||||
|
|
||||||
|
export default function AIExtractPage() {
|
||||||
|
const router = useRouter();
|
||||||
|
const [selectedCaseId, setSelectedCaseId] = useState("");
|
||||||
|
const [isExtracting, setIsExtracting] = useState(false);
|
||||||
|
const [isAdopting, setIsAdopting] = useState(false);
|
||||||
|
const [results, setResults] = useState<ExtractedDeadline[] | null>(null);
|
||||||
|
|
||||||
|
const { data: casesData } = useQuery({
|
||||||
|
queryKey: ["cases"],
|
||||||
|
queryFn: () => api.get<PaginatedResponse<Case>>("/api/cases"),
|
||||||
|
});
|
||||||
|
|
||||||
|
const cases = casesData?.data ?? [];
|
||||||
|
|
||||||
|
async function handleExtract(file: File | null, text: string) {
|
||||||
|
setIsExtracting(true);
|
||||||
|
setResults(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
let response: ExtractionResponse;
|
||||||
|
|
||||||
|
if (file) {
|
||||||
|
const formData = new FormData();
|
||||||
|
formData.append("file", file);
|
||||||
|
response = await api.postFormData<ExtractionResponse>(
|
||||||
|
"/api/ai/extract-deadlines",
|
||||||
|
formData,
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
response = await api.post<ExtractionResponse>(
|
||||||
|
"/api/ai/extract-deadlines",
|
||||||
|
{ text },
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
setResults(response.deadlines);
|
||||||
|
|
||||||
|
if (response.count === 0) {
|
||||||
|
toast.info("Keine Fristen im Dokument gefunden.");
|
||||||
|
} else {
|
||||||
|
toast.success(`${response.count} Frist(en) erkannt.`);
|
||||||
|
}
|
||||||
|
} catch (err: unknown) {
|
||||||
|
const message =
|
||||||
|
err && typeof err === "object" && "error" in err
|
||||||
|
? (err as { error: string }).error
|
||||||
|
: "Analyse fehlgeschlagen";
|
||||||
|
toast.error(message);
|
||||||
|
} finally {
|
||||||
|
setIsExtracting(false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async function handleAdopt(deadlines: ExtractedDeadline[]) {
|
||||||
|
if (!selectedCaseId) return;
|
||||||
|
setIsAdopting(true);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const promises = deadlines.map((d) =>
|
||||||
|
api.post(`/api/cases/${selectedCaseId}/deadlines`, {
|
||||||
|
title: d.title,
|
||||||
|
due_date: d.due_date ?? "",
|
||||||
|
source: "ai_extraction",
|
||||||
|
notes: [
|
||||||
|
d.rule_reference ? `Rechtsgrundlage: ${d.rule_reference}` : "",
|
||||||
|
d.source_quote ? `Quelle: "${d.source_quote}"` : "",
|
||||||
|
`Konfidenz: ${Math.round(d.confidence * 100)}%`,
|
||||||
|
]
|
||||||
|
.filter(Boolean)
|
||||||
|
.join("\n"),
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
|
||||||
|
await Promise.all(promises);
|
||||||
|
toast.success(
|
||||||
|
`${deadlines.length} Frist(en) erfolgreich übernommen.`,
|
||||||
|
);
|
||||||
|
router.push(`/cases/${selectedCaseId}`);
|
||||||
|
} catch (err: unknown) {
|
||||||
|
const message =
|
||||||
|
err && typeof err === "object" && "error" in err
|
||||||
|
? (err as { error: string }).error
|
||||||
|
: "Übernahme fehlgeschlagen";
|
||||||
|
toast.error(message);
|
||||||
|
} finally {
|
||||||
|
setIsAdopting(false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in mx-auto max-w-4xl">
|
||||||
|
<div className="mb-6 flex items-center gap-3">
|
||||||
|
<Brain className="h-5 w-5 text-neutral-500" />
|
||||||
|
<div>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">
|
||||||
|
AI Fristenanalyse
|
||||||
|
</h1>
|
||||||
|
<p className="text-sm text-neutral-500">
|
||||||
|
Fristen automatisch aus Dokumenten extrahieren
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="rounded-lg border border-neutral-200 bg-white p-4 sm:p-6">
|
||||||
|
<ExtractionForm
|
||||||
|
cases={cases}
|
||||||
|
selectedCaseId={selectedCaseId}
|
||||||
|
onCaseChange={setSelectedCaseId}
|
||||||
|
onExtract={handleExtract}
|
||||||
|
isLoading={isExtracting}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{results !== null && (
|
||||||
|
<div className="animate-fade-in mt-6 rounded-lg border border-neutral-200 bg-white p-4 sm:p-6">
|
||||||
|
<ExtractionResults
|
||||||
|
deadlines={results}
|
||||||
|
onAdopt={handleAdopt}
|
||||||
|
isAdopting={isAdopting}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
341
frontend/src/app/(app)/cases/[id]/page.tsx
Normal file
341
frontend/src/app/(app)/cases/[id]/page.tsx
Normal file
@@ -0,0 +1,341 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { useParams } from "next/navigation";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { Case, CaseEvent, Party, Deadline, Document } from "@/lib/types";
|
||||||
|
import { CaseTimeline } from "@/components/cases/CaseTimeline";
|
||||||
|
import { PartyList } from "@/components/cases/PartyList";
|
||||||
|
import {
|
||||||
|
ArrowLeft,
|
||||||
|
Clock,
|
||||||
|
FileText,
|
||||||
|
Users,
|
||||||
|
Activity,
|
||||||
|
AlertTriangle,
|
||||||
|
} from "lucide-react";
|
||||||
|
import { format } from "date-fns";
|
||||||
|
import { de } from "date-fns/locale";
|
||||||
|
import Link from "next/link";
|
||||||
|
import { useState } from "react";
|
||||||
|
import { Skeleton } from "@/components/ui/Skeleton";
|
||||||
|
|
||||||
|
interface CaseDetail extends Case {
|
||||||
|
parties: Party[];
|
||||||
|
recent_events: CaseEvent[];
|
||||||
|
deadlines_count: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
const STATUS_BADGE: Record<string, string> = {
|
||||||
|
active: "bg-emerald-50 text-emerald-700",
|
||||||
|
pending: "bg-amber-50 text-amber-700",
|
||||||
|
closed: "bg-neutral-100 text-neutral-600",
|
||||||
|
archived: "bg-neutral-100 text-neutral-400",
|
||||||
|
};
|
||||||
|
|
||||||
|
const STATUS_LABEL: Record<string, string> = {
|
||||||
|
active: "Aktiv",
|
||||||
|
pending: "Anhängig",
|
||||||
|
closed: "Geschlossen",
|
||||||
|
archived: "Archiviert",
|
||||||
|
};
|
||||||
|
|
||||||
|
const TABS = [
|
||||||
|
{ key: "timeline", label: "Verlauf", icon: Activity },
|
||||||
|
{ key: "deadlines", label: "Fristen", icon: Clock },
|
||||||
|
{ key: "documents", label: "Dokumente", icon: FileText },
|
||||||
|
{ key: "parties", label: "Parteien", icon: Users },
|
||||||
|
] as const;
|
||||||
|
|
||||||
|
type TabKey = (typeof TABS)[number]["key"];
|
||||||
|
|
||||||
|
function CaseDetailSkeleton() {
|
||||||
|
return (
|
||||||
|
<div>
|
||||||
|
<Skeleton className="h-4 w-28" />
|
||||||
|
<div className="mt-4 flex items-start justify-between">
|
||||||
|
<div>
|
||||||
|
<Skeleton className="h-6 w-48" />
|
||||||
|
<Skeleton className="mt-2 h-4 w-64" />
|
||||||
|
</div>
|
||||||
|
<div className="space-y-1">
|
||||||
|
<Skeleton className="h-3 w-24" />
|
||||||
|
<Skeleton className="h-3 w-24" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div className="mt-6 flex gap-4 border-b border-neutral-200 pb-2.5">
|
||||||
|
{[1, 2, 3, 4].map((i) => (
|
||||||
|
<Skeleton key={i} className="h-4 w-20" />
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
<div className="mt-6 space-y-3">
|
||||||
|
{[1, 2, 3].map((i) => (
|
||||||
|
<Skeleton key={i} className="h-14 rounded-md" />
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
export default function CaseDetailPage() {
|
||||||
|
const { id } = useParams<{ id: string }>();
|
||||||
|
const [activeTab, setActiveTab] = useState<TabKey>("timeline");
|
||||||
|
|
||||||
|
const {
|
||||||
|
data: caseDetail,
|
||||||
|
isLoading,
|
||||||
|
error,
|
||||||
|
} = useQuery({
|
||||||
|
queryKey: ["case", id],
|
||||||
|
queryFn: () => api.get<CaseDetail>(`/cases/${id}`),
|
||||||
|
});
|
||||||
|
|
||||||
|
const { data: deadlinesData } = useQuery({
|
||||||
|
queryKey: ["case-deadlines", id],
|
||||||
|
queryFn: () =>
|
||||||
|
api.get<{ deadlines: Deadline[]; total: number }>(
|
||||||
|
`/deadlines?case_id=${id}`,
|
||||||
|
),
|
||||||
|
enabled: activeTab === "deadlines",
|
||||||
|
});
|
||||||
|
|
||||||
|
const { data: documentsData } = useQuery({
|
||||||
|
queryKey: ["case-documents", id],
|
||||||
|
queryFn: () => api.get<Document[]>(`/cases/${id}/documents`),
|
||||||
|
enabled: activeTab === "documents",
|
||||||
|
});
|
||||||
|
|
||||||
|
if (isLoading) {
|
||||||
|
return <CaseDetailSkeleton />;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (error || !caseDetail) {
|
||||||
|
return (
|
||||||
|
<div className="py-12 text-center">
|
||||||
|
<div className="mx-auto mb-3 w-fit rounded-xl bg-red-50 p-3">
|
||||||
|
<AlertTriangle className="h-6 w-6 text-red-500" />
|
||||||
|
</div>
|
||||||
|
<p className="text-sm font-medium text-neutral-900">
|
||||||
|
Akte nicht gefunden
|
||||||
|
</p>
|
||||||
|
<p className="mt-1 text-sm text-neutral-500">
|
||||||
|
Die Akte existiert nicht oder Sie haben keine Berechtigung.
|
||||||
|
</p>
|
||||||
|
<Link
|
||||||
|
href="/cases"
|
||||||
|
className="mt-4 inline-flex items-center gap-1 text-sm text-neutral-500 transition-colors hover:text-neutral-700"
|
||||||
|
>
|
||||||
|
<ArrowLeft className="h-3.5 w-3.5" />
|
||||||
|
Zurück zu Akten
|
||||||
|
</Link>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const deadlines = deadlinesData?.deadlines ?? [];
|
||||||
|
const documents = documentsData ?? [];
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in">
|
||||||
|
<Link
|
||||||
|
href="/cases"
|
||||||
|
className="mb-4 inline-flex items-center gap-1 text-sm text-neutral-500 transition-colors hover:text-neutral-700"
|
||||||
|
>
|
||||||
|
<ArrowLeft className="h-3.5 w-3.5" />
|
||||||
|
Zurück zu Akten
|
||||||
|
</Link>
|
||||||
|
|
||||||
|
<div className="flex flex-col gap-3 sm:flex-row sm:items-start sm:justify-between">
|
||||||
|
<div>
|
||||||
|
<div className="flex flex-wrap items-center gap-3">
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">
|
||||||
|
{caseDetail.title}
|
||||||
|
</h1>
|
||||||
|
<span
|
||||||
|
className={`inline-block rounded-full px-2 py-0.5 text-xs font-medium ${STATUS_BADGE[caseDetail.status] ?? "bg-neutral-100 text-neutral-500"}`}
|
||||||
|
>
|
||||||
|
{STATUS_LABEL[caseDetail.status] ?? caseDetail.status}
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
<div className="mt-1 flex flex-wrap gap-x-4 gap-y-1 text-sm text-neutral-500">
|
||||||
|
<span>Az. {caseDetail.case_number}</span>
|
||||||
|
{caseDetail.case_type && <span>{caseDetail.case_type}</span>}
|
||||||
|
{caseDetail.court && <span>{caseDetail.court}</span>}
|
||||||
|
{caseDetail.court_ref && <span>({caseDetail.court_ref})</span>}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div className="text-right text-xs text-neutral-400">
|
||||||
|
<p>
|
||||||
|
Erstellt:{" "}
|
||||||
|
{format(new Date(caseDetail.created_at), "d. MMM yyyy", {
|
||||||
|
locale: de,
|
||||||
|
})}
|
||||||
|
</p>
|
||||||
|
<p>
|
||||||
|
Aktualisiert:{" "}
|
||||||
|
{format(new Date(caseDetail.updated_at), "d. MMM yyyy", {
|
||||||
|
locale: de,
|
||||||
|
})}
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{caseDetail.ai_summary && (
|
||||||
|
<div className="mt-4 rounded-md border border-blue-100 bg-blue-50 px-4 py-3 text-sm text-blue-800">
|
||||||
|
{caseDetail.ai_summary}
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
|
||||||
|
<div className="mt-6 border-b border-neutral-200">
|
||||||
|
<nav className="-mb-px flex gap-1 overflow-x-auto sm:gap-4">
|
||||||
|
{TABS.map((tab) => (
|
||||||
|
<button
|
||||||
|
key={tab.key}
|
||||||
|
onClick={() => setActiveTab(tab.key)}
|
||||||
|
className={`inline-flex shrink-0 items-center gap-1.5 border-b-2 px-1 pb-2.5 text-sm font-medium transition-colors ${
|
||||||
|
activeTab === tab.key
|
||||||
|
? "border-neutral-900 text-neutral-900"
|
||||||
|
: "border-transparent text-neutral-400 hover:text-neutral-600"
|
||||||
|
}`}
|
||||||
|
>
|
||||||
|
<tab.icon className="h-4 w-4" />
|
||||||
|
{tab.label}
|
||||||
|
{tab.key === "deadlines" && caseDetail.deadlines_count > 0 && (
|
||||||
|
<span className="ml-1 rounded-full bg-neutral-100 px-1.5 py-0.5 text-xs text-neutral-500">
|
||||||
|
{caseDetail.deadlines_count}
|
||||||
|
</span>
|
||||||
|
)}
|
||||||
|
{tab.key === "parties" && caseDetail.parties.length > 0 && (
|
||||||
|
<span className="ml-1 rounded-full bg-neutral-100 px-1.5 py-0.5 text-xs text-neutral-500">
|
||||||
|
{caseDetail.parties.length}
|
||||||
|
</span>
|
||||||
|
)}
|
||||||
|
</button>
|
||||||
|
))}
|
||||||
|
</nav>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="mt-6">
|
||||||
|
{activeTab === "timeline" && (
|
||||||
|
<CaseTimeline events={caseDetail.recent_events ?? []} />
|
||||||
|
)}
|
||||||
|
|
||||||
|
{activeTab === "deadlines" && (
|
||||||
|
<DeadlinesList deadlines={deadlines} />
|
||||||
|
)}
|
||||||
|
|
||||||
|
{activeTab === "documents" && (
|
||||||
|
<DocumentsList documents={documents} />
|
||||||
|
)}
|
||||||
|
|
||||||
|
{activeTab === "parties" && (
|
||||||
|
<PartyList caseId={id} parties={caseDetail.parties ?? []} />
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
function DeadlinesList({ deadlines }: { deadlines: Deadline[] }) {
|
||||||
|
if (deadlines.length === 0) {
|
||||||
|
return (
|
||||||
|
<div className="flex flex-col items-center py-8 text-center">
|
||||||
|
<div className="rounded-xl bg-neutral-100 p-3">
|
||||||
|
<Clock className="h-5 w-5 text-neutral-400" />
|
||||||
|
</div>
|
||||||
|
<p className="mt-2 text-sm text-neutral-500">
|
||||||
|
Keine Fristen vorhanden.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const DEADLINE_STATUS: Record<string, string> = {
|
||||||
|
pending: "bg-amber-50 text-amber-700",
|
||||||
|
completed: "bg-emerald-50 text-emerald-700",
|
||||||
|
overdue: "bg-red-50 text-red-700",
|
||||||
|
};
|
||||||
|
|
||||||
|
const DEADLINE_STATUS_LABEL: Record<string, string> = {
|
||||||
|
pending: "Offen",
|
||||||
|
completed: "Erledigt",
|
||||||
|
overdue: "Überfällig",
|
||||||
|
};
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="space-y-2">
|
||||||
|
{deadlines.map((d) => (
|
||||||
|
<div
|
||||||
|
key={d.id}
|
||||||
|
className="flex flex-col gap-2 rounded-md border border-neutral-200 bg-white px-4 py-3 sm:flex-row sm:items-center sm:justify-between"
|
||||||
|
>
|
||||||
|
<div>
|
||||||
|
<p className="text-sm font-medium text-neutral-900">{d.title}</p>
|
||||||
|
{d.description && (
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
{d.description}
|
||||||
|
</p>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
<div className="flex items-center gap-3">
|
||||||
|
<span
|
||||||
|
className={`rounded-full px-2 py-0.5 text-xs font-medium ${DEADLINE_STATUS[d.status] ?? "bg-neutral-100 text-neutral-500"}`}
|
||||||
|
>
|
||||||
|
{DEADLINE_STATUS_LABEL[d.status] ?? d.status}
|
||||||
|
</span>
|
||||||
|
<span className="whitespace-nowrap text-sm text-neutral-500">
|
||||||
|
{format(new Date(d.due_date), "d. MMM yyyy", { locale: de })}
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
function DocumentsList({ documents }: { documents: Document[] }) {
|
||||||
|
if (documents.length === 0) {
|
||||||
|
return (
|
||||||
|
<div className="flex flex-col items-center py-8 text-center">
|
||||||
|
<div className="rounded-xl bg-neutral-100 p-3">
|
||||||
|
<FileText className="h-5 w-5 text-neutral-400" />
|
||||||
|
</div>
|
||||||
|
<p className="mt-2 text-sm text-neutral-500">
|
||||||
|
Keine Dokumente vorhanden.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="space-y-2">
|
||||||
|
{documents.map((doc) => (
|
||||||
|
<div
|
||||||
|
key={doc.id}
|
||||||
|
className="flex items-center justify-between rounded-md border border-neutral-200 bg-white px-4 py-3"
|
||||||
|
>
|
||||||
|
<div className="flex items-center gap-3">
|
||||||
|
<FileText className="h-4 w-4 text-neutral-400" />
|
||||||
|
<div>
|
||||||
|
<p className="text-sm font-medium text-neutral-900">
|
||||||
|
{doc.title}
|
||||||
|
</p>
|
||||||
|
<div className="flex gap-2 text-xs text-neutral-400">
|
||||||
|
{doc.doc_type && <span>{doc.doc_type}</span>}
|
||||||
|
{doc.file_size && (
|
||||||
|
<span>{(doc.file_size / 1024).toFixed(0)} KB</span>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<a
|
||||||
|
href={`/api/documents/${doc.id}`}
|
||||||
|
className="text-sm text-neutral-500 transition-colors hover:text-neutral-700"
|
||||||
|
>
|
||||||
|
Herunterladen
|
||||||
|
</a>
|
||||||
|
</div>
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
49
frontend/src/app/(app)/cases/new/page.tsx
Normal file
49
frontend/src/app/(app)/cases/new/page.tsx
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useMutation, useQueryClient } from "@tanstack/react-query";
|
||||||
|
import { useRouter } from "next/navigation";
|
||||||
|
import { toast } from "sonner";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { Case } from "@/lib/types";
|
||||||
|
import { CaseForm, type CaseFormData } from "@/components/cases/CaseForm";
|
||||||
|
import { ArrowLeft } from "lucide-react";
|
||||||
|
import Link from "next/link";
|
||||||
|
|
||||||
|
export default function NewCasePage() {
|
||||||
|
const router = useRouter();
|
||||||
|
const queryClient = useQueryClient();
|
||||||
|
|
||||||
|
const mutation = useMutation({
|
||||||
|
mutationFn: (data: CaseFormData) => api.post<Case>("/cases", data),
|
||||||
|
onSuccess: (created) => {
|
||||||
|
queryClient.invalidateQueries({ queryKey: ["cases"] });
|
||||||
|
toast.success("Akte angelegt");
|
||||||
|
router.push(`/cases/${created.id}`);
|
||||||
|
},
|
||||||
|
onError: () => {
|
||||||
|
toast.error("Fehler beim Anlegen der Akte");
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in mx-auto max-w-2xl">
|
||||||
|
<Link
|
||||||
|
href="/cases"
|
||||||
|
className="mb-4 inline-flex items-center gap-1 text-sm text-neutral-500 transition-colors hover:text-neutral-700"
|
||||||
|
>
|
||||||
|
<ArrowLeft className="h-3.5 w-3.5" />
|
||||||
|
Zurück zu Akten
|
||||||
|
</Link>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">Neue Akte</h1>
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
Neue Akte im System anlegen
|
||||||
|
</p>
|
||||||
|
<div className="mt-6 rounded-md border border-neutral-200 bg-white p-4 sm:p-6">
|
||||||
|
<CaseForm
|
||||||
|
onSubmit={(data) => mutation.mutate(data)}
|
||||||
|
isSubmitting={mutation.isPending}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
211
frontend/src/app/(app)/cases/page.tsx
Normal file
211
frontend/src/app/(app)/cases/page.tsx
Normal file
@@ -0,0 +1,211 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { Case } from "@/lib/types";
|
||||||
|
import Link from "next/link";
|
||||||
|
import { useSearchParams, useRouter } from "next/navigation";
|
||||||
|
import { Plus, Search, FolderOpen } from "lucide-react";
|
||||||
|
import { useState } from "react";
|
||||||
|
import { SkeletonTable } from "@/components/ui/Skeleton";
|
||||||
|
import { EmptyState } from "@/components/ui/EmptyState";
|
||||||
|
|
||||||
|
const STATUS_OPTIONS = [
|
||||||
|
{ value: "", label: "Alle Status" },
|
||||||
|
{ value: "active", label: "Aktiv" },
|
||||||
|
{ value: "pending", label: "Anhängig" },
|
||||||
|
{ value: "closed", label: "Geschlossen" },
|
||||||
|
{ value: "archived", label: "Archiviert" },
|
||||||
|
];
|
||||||
|
|
||||||
|
const TYPE_OPTIONS = [
|
||||||
|
{ value: "", label: "Alle Typen" },
|
||||||
|
{ value: "INF", label: "Verletzungsklage" },
|
||||||
|
{ value: "REV", label: "Widerruf" },
|
||||||
|
{ value: "CCR", label: "Einstweilige Verfügung" },
|
||||||
|
{ value: "APP", label: "Berufung" },
|
||||||
|
{ value: "PI", label: "Vorläufiger Rechtsschutz" },
|
||||||
|
{ value: "ZPO_CIVIL", label: "ZPO Zivilverfahren" },
|
||||||
|
];
|
||||||
|
|
||||||
|
const STATUS_BADGE: Record<string, string> = {
|
||||||
|
active: "bg-emerald-50 text-emerald-700",
|
||||||
|
pending: "bg-amber-50 text-amber-700",
|
||||||
|
closed: "bg-neutral-100 text-neutral-600",
|
||||||
|
archived: "bg-neutral-100 text-neutral-400",
|
||||||
|
};
|
||||||
|
|
||||||
|
const STATUS_LABEL: Record<string, string> = {
|
||||||
|
active: "Aktiv",
|
||||||
|
pending: "Anhängig",
|
||||||
|
closed: "Geschlossen",
|
||||||
|
archived: "Archiviert",
|
||||||
|
};
|
||||||
|
|
||||||
|
const inputClass =
|
||||||
|
"rounded-md border border-neutral-200 bg-white px-2.5 py-1.5 text-sm outline-none transition-colors focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400";
|
||||||
|
|
||||||
|
export default function CasesPage() {
|
||||||
|
const router = useRouter();
|
||||||
|
const searchParams = useSearchParams();
|
||||||
|
|
||||||
|
const [search, setSearch] = useState(searchParams.get("search") ?? "");
|
||||||
|
const [status, setStatus] = useState(searchParams.get("status") ?? "");
|
||||||
|
const [type, setType] = useState(searchParams.get("type") ?? "");
|
||||||
|
|
||||||
|
const { data, isLoading } = useQuery({
|
||||||
|
queryKey: ["cases", { search, status, type }],
|
||||||
|
queryFn: () => {
|
||||||
|
const params = new URLSearchParams();
|
||||||
|
if (search) params.set("search", search);
|
||||||
|
if (status) params.set("status", status);
|
||||||
|
if (type) params.set("type", type);
|
||||||
|
params.set("limit", "50");
|
||||||
|
const qs = params.toString();
|
||||||
|
return api.get<{ cases: Case[]; total: number }>(
|
||||||
|
`/cases${qs ? `?${qs}` : ""}`,
|
||||||
|
);
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const cases = data?.cases ?? [];
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in">
|
||||||
|
<div className="flex flex-col gap-3 sm:flex-row sm:items-center sm:justify-between">
|
||||||
|
<div>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">Akten</h1>
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
{data ? `${data.total} Akten` : "\u00A0"}
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<Link
|
||||||
|
href="/cases/new"
|
||||||
|
className="inline-flex w-fit items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
||||||
|
>
|
||||||
|
<Plus className="h-4 w-4" />
|
||||||
|
Neue Akte
|
||||||
|
</Link>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="mt-4 flex flex-col gap-3 sm:flex-row sm:items-center">
|
||||||
|
<div className="relative flex-1">
|
||||||
|
<Search className="absolute left-2.5 top-1/2 h-4 w-4 -translate-y-1/2 text-neutral-400" />
|
||||||
|
<input
|
||||||
|
type="text"
|
||||||
|
placeholder="Suchen nach Aktenzeichen, Titel..."
|
||||||
|
value={search}
|
||||||
|
onChange={(e) => setSearch(e.target.value)}
|
||||||
|
className={`w-full pl-9 pr-3 ${inputClass}`}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
<div className="flex gap-3">
|
||||||
|
<select
|
||||||
|
value={status}
|
||||||
|
onChange={(e) => setStatus(e.target.value)}
|
||||||
|
className={inputClass}
|
||||||
|
>
|
||||||
|
{STATUS_OPTIONS.map((o) => (
|
||||||
|
<option key={o.value} value={o.value}>
|
||||||
|
{o.label}
|
||||||
|
</option>
|
||||||
|
))}
|
||||||
|
</select>
|
||||||
|
<select
|
||||||
|
value={type}
|
||||||
|
onChange={(e) => setType(e.target.value)}
|
||||||
|
className={inputClass}
|
||||||
|
>
|
||||||
|
{TYPE_OPTIONS.map((o) => (
|
||||||
|
<option key={o.value} value={o.value}>
|
||||||
|
{o.label}
|
||||||
|
</option>
|
||||||
|
))}
|
||||||
|
</select>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="mt-4">
|
||||||
|
{isLoading ? (
|
||||||
|
<SkeletonTable rows={5} />
|
||||||
|
) : cases.length === 0 ? (
|
||||||
|
<EmptyState
|
||||||
|
icon={FolderOpen}
|
||||||
|
title="Keine Akten gefunden"
|
||||||
|
description={
|
||||||
|
search || status || type
|
||||||
|
? "Versuchen Sie andere Suchkriterien."
|
||||||
|
: "Erstellen Sie Ihre erste Akte, um loszulegen."
|
||||||
|
}
|
||||||
|
action={
|
||||||
|
!search && !status && !type ? (
|
||||||
|
<Link
|
||||||
|
href="/cases/new"
|
||||||
|
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
||||||
|
>
|
||||||
|
<Plus className="h-4 w-4" />
|
||||||
|
Neue Akte anlegen
|
||||||
|
</Link>
|
||||||
|
) : undefined
|
||||||
|
}
|
||||||
|
/>
|
||||||
|
) : (
|
||||||
|
<div className="-mx-4 overflow-x-auto sm:mx-0">
|
||||||
|
<div className="min-w-[640px] sm:min-w-0">
|
||||||
|
<div className="overflow-hidden rounded-md border border-neutral-200 bg-white">
|
||||||
|
<table className="w-full text-sm">
|
||||||
|
<thead>
|
||||||
|
<tr className="border-b border-neutral-100 text-left text-xs font-medium uppercase tracking-wider text-neutral-400">
|
||||||
|
<th className="px-4 py-2.5">Aktenzeichen</th>
|
||||||
|
<th className="px-4 py-2.5">Titel</th>
|
||||||
|
<th className="hidden px-4 py-2.5 md:table-cell">Typ</th>
|
||||||
|
<th className="hidden px-4 py-2.5 lg:table-cell">
|
||||||
|
Gericht
|
||||||
|
</th>
|
||||||
|
<th className="px-4 py-2.5">Status</th>
|
||||||
|
<th className="hidden px-4 py-2.5 sm:table-cell">
|
||||||
|
Erstellt
|
||||||
|
</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody className="divide-y divide-neutral-100">
|
||||||
|
{cases.map((c) => (
|
||||||
|
<tr
|
||||||
|
key={c.id}
|
||||||
|
onClick={() => router.push(`/cases/${c.id}`)}
|
||||||
|
className="cursor-pointer transition-colors hover:bg-neutral-50"
|
||||||
|
>
|
||||||
|
<td className="whitespace-nowrap px-4 py-2.5 font-medium text-neutral-900">
|
||||||
|
{c.case_number}
|
||||||
|
</td>
|
||||||
|
<td className="max-w-[200px] truncate px-4 py-2.5 text-neutral-700">
|
||||||
|
{c.title}
|
||||||
|
</td>
|
||||||
|
<td className="hidden px-4 py-2.5 text-neutral-500 md:table-cell">
|
||||||
|
{c.case_type ?? "-"}
|
||||||
|
</td>
|
||||||
|
<td className="hidden px-4 py-2.5 text-neutral-500 lg:table-cell">
|
||||||
|
{c.court ?? "-"}
|
||||||
|
</td>
|
||||||
|
<td className="px-4 py-2.5">
|
||||||
|
<span
|
||||||
|
className={`inline-block rounded-full px-2 py-0.5 text-xs font-medium ${STATUS_BADGE[c.status] ?? "bg-neutral-100 text-neutral-500"}`}
|
||||||
|
>
|
||||||
|
{STATUS_LABEL[c.status] ?? c.status}
|
||||||
|
</span>
|
||||||
|
</td>
|
||||||
|
<td className="hidden whitespace-nowrap px-4 py-2.5 text-neutral-400 sm:table-cell">
|
||||||
|
{new Date(c.created_at).toLocaleDateString("de-DE")}
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
))}
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
100
frontend/src/app/(app)/dashboard/page.tsx
Normal file
100
frontend/src/app/(app)/dashboard/page.tsx
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { DashboardData } from "@/lib/types";
|
||||||
|
import { DeadlineTrafficLights } from "@/components/dashboard/DeadlineTrafficLights";
|
||||||
|
import { CaseOverviewGrid } from "@/components/dashboard/CaseOverviewGrid";
|
||||||
|
import { UpcomingTimeline } from "@/components/dashboard/UpcomingTimeline";
|
||||||
|
import { AISummaryCard } from "@/components/dashboard/AISummaryCard";
|
||||||
|
import { QuickActions } from "@/components/dashboard/QuickActions";
|
||||||
|
import { Skeleton, SkeletonCard } from "@/components/ui/Skeleton";
|
||||||
|
import { AlertTriangle, RefreshCw } from "lucide-react";
|
||||||
|
|
||||||
|
function DashboardSkeleton() {
|
||||||
|
return (
|
||||||
|
<div className="mx-auto max-w-6xl space-y-6">
|
||||||
|
<div>
|
||||||
|
<Skeleton className="h-5 w-28" />
|
||||||
|
<Skeleton className="mt-2 h-3.5 w-52" />
|
||||||
|
</div>
|
||||||
|
<div className="grid grid-cols-1 gap-4 sm:grid-cols-3">
|
||||||
|
{[1, 2, 3].map((i) => (
|
||||||
|
<Skeleton key={i} className="h-28 rounded-xl" />
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
<div className="grid grid-cols-1 gap-6 lg:grid-cols-3">
|
||||||
|
<div className="lg:col-span-2">
|
||||||
|
<SkeletonCard className="min-h-[200px]" />
|
||||||
|
</div>
|
||||||
|
<div className="space-y-6">
|
||||||
|
<SkeletonCard />
|
||||||
|
<SkeletonCard />
|
||||||
|
<SkeletonCard />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
export default function DashboardPage() {
|
||||||
|
const { data, isLoading, error, refetch } = useQuery({
|
||||||
|
queryKey: ["dashboard"],
|
||||||
|
queryFn: () => api.get<DashboardData>("/dashboard"),
|
||||||
|
refetchInterval: 60_000,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (isLoading) {
|
||||||
|
return <DashboardSkeleton />;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (error || !data) {
|
||||||
|
return (
|
||||||
|
<div className="mx-auto max-w-md py-16 text-center">
|
||||||
|
<div className="mx-auto mb-3 rounded-xl bg-red-50 p-3 w-fit">
|
||||||
|
<AlertTriangle className="h-6 w-6 text-red-500" />
|
||||||
|
</div>
|
||||||
|
<h2 className="text-sm font-medium text-neutral-900">
|
||||||
|
Dashboard konnte nicht geladen werden
|
||||||
|
</h2>
|
||||||
|
<p className="mt-1 text-sm text-neutral-500">
|
||||||
|
Bitte versuchen Sie es erneut oder prüfen Sie Ihre Verbindung.
|
||||||
|
</p>
|
||||||
|
<button
|
||||||
|
onClick={() => refetch()}
|
||||||
|
className="mt-4 inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
||||||
|
>
|
||||||
|
<RefreshCw className="h-3.5 w-3.5" />
|
||||||
|
Erneut laden
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in mx-auto max-w-6xl space-y-6">
|
||||||
|
<div>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">Dashboard</h1>
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
Fristenübersicht und Kanzlei-Status
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<DeadlineTrafficLights data={data.deadline_summary} />
|
||||||
|
|
||||||
|
<div className="grid grid-cols-1 gap-6 lg:grid-cols-3">
|
||||||
|
<div className="lg:col-span-2">
|
||||||
|
<UpcomingTimeline
|
||||||
|
deadlines={data.upcoming_deadlines}
|
||||||
|
appointments={data.upcoming_appointments}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
<div className="space-y-6">
|
||||||
|
<CaseOverviewGrid data={data.case_summary} />
|
||||||
|
<AISummaryCard data={data} />
|
||||||
|
<QuickActions />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
73
frontend/src/app/(app)/fristen/page.tsx
Normal file
73
frontend/src/app/(app)/fristen/page.tsx
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { DeadlineList } from "@/components/deadlines/DeadlineList";
|
||||||
|
import { DeadlineCalendarView } from "@/components/deadlines/DeadlineCalendarView";
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { Deadline } from "@/lib/types";
|
||||||
|
import { Calendar, List, Calculator } from "lucide-react";
|
||||||
|
import Link from "next/link";
|
||||||
|
import { useState } from "react";
|
||||||
|
|
||||||
|
type ViewMode = "list" | "calendar";
|
||||||
|
|
||||||
|
export default function FristenPage() {
|
||||||
|
const [view, setView] = useState<ViewMode>("list");
|
||||||
|
|
||||||
|
const { data: deadlines } = useQuery({
|
||||||
|
queryKey: ["deadlines"],
|
||||||
|
queryFn: () => api.get<Deadline[]>("/api/deadlines"),
|
||||||
|
});
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in space-y-4">
|
||||||
|
<div className="flex flex-col gap-3 sm:flex-row sm:items-center sm:justify-between">
|
||||||
|
<div>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">Fristen</h1>
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
Alle Fristen im Überblick
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div className="flex items-center gap-2">
|
||||||
|
<Link
|
||||||
|
href="/fristen/rechner"
|
||||||
|
className="flex items-center gap-1.5 rounded-md border border-neutral-200 bg-white px-3 py-1.5 text-sm text-neutral-700 transition-colors hover:bg-neutral-50"
|
||||||
|
>
|
||||||
|
<Calculator className="h-3.5 w-3.5" />
|
||||||
|
Fristenrechner
|
||||||
|
</Link>
|
||||||
|
<div className="flex rounded-md border border-neutral-200 bg-white">
|
||||||
|
<button
|
||||||
|
onClick={() => setView("list")}
|
||||||
|
className={`flex items-center gap-1 rounded-l-md px-2.5 py-1.5 text-sm transition-colors ${
|
||||||
|
view === "list"
|
||||||
|
? "bg-neutral-100 font-medium text-neutral-900"
|
||||||
|
: "text-neutral-500 hover:text-neutral-700"
|
||||||
|
}`}
|
||||||
|
>
|
||||||
|
<List className="h-3.5 w-3.5" />
|
||||||
|
Liste
|
||||||
|
</button>
|
||||||
|
<button
|
||||||
|
onClick={() => setView("calendar")}
|
||||||
|
className={`flex items-center gap-1 rounded-r-md px-2.5 py-1.5 text-sm transition-colors ${
|
||||||
|
view === "calendar"
|
||||||
|
? "bg-neutral-100 font-medium text-neutral-900"
|
||||||
|
: "text-neutral-500 hover:text-neutral-700"
|
||||||
|
}`}
|
||||||
|
>
|
||||||
|
<Calendar className="h-3.5 w-3.5" />
|
||||||
|
Kalender
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{view === "list" ? (
|
||||||
|
<DeadlineList />
|
||||||
|
) : (
|
||||||
|
<DeadlineCalendarView deadlines={deadlines || []} />
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
28
frontend/src/app/(app)/fristen/rechner/page.tsx
Normal file
28
frontend/src/app/(app)/fristen/rechner/page.tsx
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { DeadlineCalculator } from "@/components/deadlines/DeadlineCalculator";
|
||||||
|
import { ArrowLeft } from "lucide-react";
|
||||||
|
import Link from "next/link";
|
||||||
|
|
||||||
|
export default function FristenrechnerPage() {
|
||||||
|
return (
|
||||||
|
<div className="animate-fade-in space-y-4">
|
||||||
|
<div>
|
||||||
|
<Link
|
||||||
|
href="/fristen"
|
||||||
|
className="mb-2 inline-flex items-center gap-1 text-sm text-neutral-500 transition-colors hover:text-neutral-700"
|
||||||
|
>
|
||||||
|
<ArrowLeft className="h-3.5 w-3.5" />
|
||||||
|
Zurück zu Fristen
|
||||||
|
</Link>
|
||||||
|
<h1 className="text-lg font-semibold text-neutral-900">
|
||||||
|
Fristenrechner
|
||||||
|
</h1>
|
||||||
|
<p className="mt-0.5 text-sm text-neutral-500">
|
||||||
|
Berechnen Sie Fristen basierend auf Verfahrensart und Auslösedatum
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<DeadlineCalculator />
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user