Compare commits
1 Commits
mai/ritchi
...
mai/pike/p
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
0a0ec016d8 |
@@ -36,12 +36,7 @@ func main() {
|
|||||||
calDAVSvc.Start()
|
calDAVSvc.Start()
|
||||||
defer calDAVSvc.Stop()
|
defer calDAVSvc.Stop()
|
||||||
|
|
||||||
// Start notification reminder service
|
handler := router.New(database, authMW, cfg, calDAVSvc)
|
||||||
notifSvc := services.NewNotificationService(database)
|
|
||||||
notifSvc.Start()
|
|
||||||
defer notifSvc.Stop()
|
|
||||||
|
|
||||||
handler := router.New(database, authMW, cfg, calDAVSvc, notifSvc)
|
|
||||||
|
|
||||||
slog.Info("starting KanzlAI API server", "port", cfg.Port)
|
slog.Info("starting KanzlAI API server", "port", cfg.Port)
|
||||||
if err := http.ListenAndServe(":"+cfg.Port, handler); err != nil {
|
if err := http.ListenAndServe(":"+cfg.Port, handler); err != nil {
|
||||||
|
|||||||
@@ -11,6 +11,7 @@ type contextKey string
|
|||||||
const (
|
const (
|
||||||
userIDKey contextKey = "user_id"
|
userIDKey contextKey = "user_id"
|
||||||
tenantIDKey contextKey = "tenant_id"
|
tenantIDKey contextKey = "tenant_id"
|
||||||
|
userRoleKey contextKey = "user_role"
|
||||||
)
|
)
|
||||||
|
|
||||||
func ContextWithUserID(ctx context.Context, userID uuid.UUID) context.Context {
|
func ContextWithUserID(ctx context.Context, userID uuid.UUID) context.Context {
|
||||||
@@ -30,3 +31,12 @@ func TenantFromContext(ctx context.Context) (uuid.UUID, bool) {
|
|||||||
id, ok := ctx.Value(tenantIDKey).(uuid.UUID)
|
id, ok := ctx.Value(tenantIDKey).(uuid.UUID)
|
||||||
return id, ok
|
return id, ok
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ContextWithUserRole(ctx context.Context, role string) context.Context {
|
||||||
|
return context.WithValue(ctx, userRoleKey, role)
|
||||||
|
}
|
||||||
|
|
||||||
|
func UserRoleFromContext(ctx context.Context) string {
|
||||||
|
role, _ := ctx.Value(userRoleKey).(string)
|
||||||
|
return role
|
||||||
|
}
|
||||||
|
|||||||
@@ -36,15 +36,19 @@ func (m *Middleware) RequireAuth(next http.Handler) http.Handler {
|
|||||||
|
|
||||||
ctx := ContextWithUserID(r.Context(), userID)
|
ctx := ContextWithUserID(r.Context(), userID)
|
||||||
|
|
||||||
// Resolve tenant from user_tenants
|
// Resolve tenant and role from user_tenants
|
||||||
var tenantID uuid.UUID
|
var membership struct {
|
||||||
err = m.db.GetContext(r.Context(), &tenantID,
|
TenantID uuid.UUID `db:"tenant_id"`
|
||||||
"SELECT tenant_id FROM user_tenants WHERE user_id = $1 LIMIT 1", userID)
|
Role string `db:"role"`
|
||||||
|
}
|
||||||
|
err = m.db.GetContext(r.Context(), &membership,
|
||||||
|
"SELECT tenant_id, role FROM user_tenants WHERE user_id = $1 LIMIT 1", userID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(w, "no tenant found for user", http.StatusForbidden)
|
http.Error(w, "no tenant found for user", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ctx = ContextWithTenantID(ctx, tenantID)
|
ctx = ContextWithTenantID(ctx, membership.TenantID)
|
||||||
|
ctx = ContextWithUserRole(ctx, membership.Role)
|
||||||
|
|
||||||
next.ServeHTTP(w, r.WithContext(ctx))
|
next.ServeHTTP(w, r.WithContext(ctx))
|
||||||
})
|
})
|
||||||
|
|||||||
213
backend/internal/auth/permissions.go
Normal file
213
backend/internal/auth/permissions.go
Normal file
@@ -0,0 +1,213 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Valid roles ordered by privilege level (highest first).
|
||||||
|
var ValidRoles = []string{"owner", "partner", "associate", "paralegal", "secretary"}
|
||||||
|
|
||||||
|
// IsValidRole checks if a role string is one of the defined roles.
|
||||||
|
func IsValidRole(role string) bool {
|
||||||
|
for _, r := range ValidRoles {
|
||||||
|
if r == role {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Permission represents an action that can be checked against roles.
|
||||||
|
type Permission int
|
||||||
|
|
||||||
|
const (
|
||||||
|
PermManageTeam Permission = iota
|
||||||
|
PermManageBilling
|
||||||
|
PermCreateCase
|
||||||
|
PermEditAllCases
|
||||||
|
PermEditAssignedCase
|
||||||
|
PermViewAllCases
|
||||||
|
PermManageDeadlines
|
||||||
|
PermManageAppointments
|
||||||
|
PermUploadDocuments
|
||||||
|
PermDeleteDocuments
|
||||||
|
PermDeleteOwnDocuments
|
||||||
|
PermViewAuditLog
|
||||||
|
PermManageSettings
|
||||||
|
PermAIExtraction
|
||||||
|
)
|
||||||
|
|
||||||
|
// rolePermissions maps each role to its set of permissions.
|
||||||
|
var rolePermissions = map[string]map[Permission]bool{
|
||||||
|
"owner": {
|
||||||
|
PermManageTeam: true,
|
||||||
|
PermManageBilling: true,
|
||||||
|
PermCreateCase: true,
|
||||||
|
PermEditAllCases: true,
|
||||||
|
PermEditAssignedCase: true,
|
||||||
|
PermViewAllCases: true,
|
||||||
|
PermManageDeadlines: true,
|
||||||
|
PermManageAppointments: true,
|
||||||
|
PermUploadDocuments: true,
|
||||||
|
PermDeleteDocuments: true,
|
||||||
|
PermDeleteOwnDocuments: true,
|
||||||
|
PermViewAuditLog: true,
|
||||||
|
PermManageSettings: true,
|
||||||
|
PermAIExtraction: true,
|
||||||
|
},
|
||||||
|
"partner": {
|
||||||
|
PermManageTeam: true,
|
||||||
|
PermManageBilling: true,
|
||||||
|
PermCreateCase: true,
|
||||||
|
PermEditAllCases: true,
|
||||||
|
PermEditAssignedCase: true,
|
||||||
|
PermViewAllCases: true,
|
||||||
|
PermManageDeadlines: true,
|
||||||
|
PermManageAppointments: true,
|
||||||
|
PermUploadDocuments: true,
|
||||||
|
PermDeleteDocuments: true,
|
||||||
|
PermDeleteOwnDocuments: true,
|
||||||
|
PermViewAuditLog: true,
|
||||||
|
PermManageSettings: true,
|
||||||
|
PermAIExtraction: true,
|
||||||
|
},
|
||||||
|
"associate": {
|
||||||
|
PermCreateCase: true,
|
||||||
|
PermEditAssignedCase: true,
|
||||||
|
PermViewAllCases: true,
|
||||||
|
PermManageDeadlines: true,
|
||||||
|
PermManageAppointments: true,
|
||||||
|
PermUploadDocuments: true,
|
||||||
|
PermDeleteOwnDocuments: true,
|
||||||
|
PermAIExtraction: true,
|
||||||
|
},
|
||||||
|
"paralegal": {
|
||||||
|
PermEditAssignedCase: true,
|
||||||
|
PermViewAllCases: true,
|
||||||
|
PermManageDeadlines: true,
|
||||||
|
PermManageAppointments: true,
|
||||||
|
PermUploadDocuments: true,
|
||||||
|
},
|
||||||
|
"secretary": {
|
||||||
|
PermViewAllCases: true,
|
||||||
|
PermManageAppointments: true,
|
||||||
|
PermUploadDocuments: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// HasPermission checks if the given role has the specified permission.
|
||||||
|
func HasPermission(role string, perm Permission) bool {
|
||||||
|
perms, ok := rolePermissions[role]
|
||||||
|
if !ok {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return perms[perm]
|
||||||
|
}
|
||||||
|
|
||||||
|
// RequirePermission returns middleware that checks if the user's role has the given permission.
|
||||||
|
func RequirePermission(perm Permission) func(http.Handler) http.Handler {
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
role := UserRoleFromContext(r.Context())
|
||||||
|
if role == "" || !HasPermission(role, perm) {
|
||||||
|
writeJSONError(w, "insufficient permissions", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RequireRole returns middleware that checks if the user has one of the specified roles.
|
||||||
|
func RequireRole(roles ...string) func(http.Handler) http.Handler {
|
||||||
|
allowed := make(map[string]bool, len(roles))
|
||||||
|
for _, r := range roles {
|
||||||
|
allowed[r] = true
|
||||||
|
}
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
role := UserRoleFromContext(r.Context())
|
||||||
|
if !allowed[role] {
|
||||||
|
writeJSONError(w, "insufficient permissions", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsAssignedToCase checks if a user is assigned to a specific case.
|
||||||
|
func IsAssignedToCase(ctx context.Context, db *sqlx.DB, userID, caseID uuid.UUID) (bool, error) {
|
||||||
|
var exists bool
|
||||||
|
err := db.GetContext(ctx, &exists,
|
||||||
|
`SELECT EXISTS(SELECT 1 FROM case_assignments WHERE user_id = $1 AND case_id = $2)`,
|
||||||
|
userID, caseID)
|
||||||
|
return exists, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// CanEditCase checks if a user can edit a specific case based on role and assignment.
|
||||||
|
func CanEditCase(ctx context.Context, db *sqlx.DB, userID, caseID uuid.UUID, role string) (bool, error) {
|
||||||
|
// Owner and partner can edit all cases
|
||||||
|
if HasPermission(role, PermEditAllCases) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
// Others need to be assigned
|
||||||
|
if !HasPermission(role, PermEditAssignedCase) {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
return IsAssignedToCase(ctx, db, userID, caseID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// CanDeleteDocument checks if a user can delete a specific document.
|
||||||
|
func CanDeleteDocument(role string, docUploaderID, userID uuid.UUID) bool {
|
||||||
|
if HasPermission(role, PermDeleteDocuments) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if HasPermission(role, PermDeleteOwnDocuments) {
|
||||||
|
return docUploaderID == userID
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// permissionNames maps Permission constants to their string names for frontend use.
|
||||||
|
var permissionNames = map[Permission]string{
|
||||||
|
PermManageTeam: "manage_team",
|
||||||
|
PermManageBilling: "manage_billing",
|
||||||
|
PermCreateCase: "create_case",
|
||||||
|
PermEditAllCases: "edit_all_cases",
|
||||||
|
PermEditAssignedCase: "edit_assigned_case",
|
||||||
|
PermViewAllCases: "view_all_cases",
|
||||||
|
PermManageDeadlines: "manage_deadlines",
|
||||||
|
PermManageAppointments: "manage_appointments",
|
||||||
|
PermUploadDocuments: "upload_documents",
|
||||||
|
PermDeleteDocuments: "delete_documents",
|
||||||
|
PermDeleteOwnDocuments: "delete_own_documents",
|
||||||
|
PermViewAuditLog: "view_audit_log",
|
||||||
|
PermManageSettings: "manage_settings",
|
||||||
|
PermAIExtraction: "ai_extraction",
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRolePermissions returns a list of permission name strings for the given role.
|
||||||
|
func GetRolePermissions(role string) []string {
|
||||||
|
perms, ok := rolePermissions[role]
|
||||||
|
if !ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
var names []string
|
||||||
|
for p := range perms {
|
||||||
|
if name, ok := permissionNames[p]; ok {
|
||||||
|
names = append(names, name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return names
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeJSONError(w http.ResponseWriter, msg string, status int) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(status)
|
||||||
|
w.Write([]byte(`{"error":"` + msg + `"}`))
|
||||||
|
}
|
||||||
@@ -12,6 +12,7 @@ import (
|
|||||||
// Defined as an interface to avoid circular dependency with services.
|
// Defined as an interface to avoid circular dependency with services.
|
||||||
type TenantLookup interface {
|
type TenantLookup interface {
|
||||||
FirstTenantForUser(ctx context.Context, userID uuid.UUID) (*uuid.UUID, error)
|
FirstTenantForUser(ctx context.Context, userID uuid.UUID) (*uuid.UUID, error)
|
||||||
|
GetUserRole(ctx context.Context, userID, tenantID uuid.UUID) (string, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// TenantResolver is middleware that resolves the tenant from X-Tenant-ID header
|
// TenantResolver is middleware that resolves the tenant from X-Tenant-ID header
|
||||||
@@ -40,9 +41,21 @@ func (tr *TenantResolver) Resolve(next http.Handler) http.Handler {
|
|||||||
http.Error(w, fmt.Sprintf("invalid X-Tenant-ID: %v", err), http.StatusBadRequest)
|
http.Error(w, fmt.Sprintf("invalid X-Tenant-ID: %v", err), http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
// Verify user has access and get their role
|
||||||
|
role, err := tr.lookup.GetUserRole(r.Context(), userID, parsed)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, "error checking tenant access", http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role == "" {
|
||||||
|
http.Error(w, "no access to this tenant", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
tenantID = parsed
|
tenantID = parsed
|
||||||
|
// Override the role from middleware with the correct one for this tenant
|
||||||
|
r = r.WithContext(ContextWithUserRole(r.Context(), role))
|
||||||
} else {
|
} else {
|
||||||
// Default to user's first tenant
|
// Default to user's first tenant (role already set by middleware)
|
||||||
first, err := tr.lookup.FirstTenantForUser(r.Context(), userID)
|
first, err := tr.lookup.FirstTenantForUser(r.Context(), userID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(w, fmt.Sprintf("resolving tenant: %v", err), http.StatusInternalServerError)
|
http.Error(w, fmt.Sprintf("resolving tenant: %v", err), http.StatusInternalServerError)
|
||||||
|
|||||||
@@ -11,6 +11,7 @@ import (
|
|||||||
|
|
||||||
type mockTenantLookup struct {
|
type mockTenantLookup struct {
|
||||||
tenantID *uuid.UUID
|
tenantID *uuid.UUID
|
||||||
|
role string
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -18,9 +19,16 @@ func (m *mockTenantLookup) FirstTenantForUser(ctx context.Context, userID uuid.U
|
|||||||
return m.tenantID, m.err
|
return m.tenantID, m.err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m *mockTenantLookup) GetUserRole(ctx context.Context, userID, tenantID uuid.UUID) (string, error) {
|
||||||
|
if m.role != "" {
|
||||||
|
return m.role, m.err
|
||||||
|
}
|
||||||
|
return "associate", m.err
|
||||||
|
}
|
||||||
|
|
||||||
func TestTenantResolver_FromHeader(t *testing.T) {
|
func TestTenantResolver_FromHeader(t *testing.T) {
|
||||||
tenantID := uuid.New()
|
tenantID := uuid.New()
|
||||||
tr := NewTenantResolver(&mockTenantLookup{})
|
tr := NewTenantResolver(&mockTenantLookup{role: "partner"})
|
||||||
|
|
||||||
var gotTenantID uuid.UUID
|
var gotTenantID uuid.UUID
|
||||||
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
|||||||
119
backend/internal/handlers/case_assignments.go
Normal file
119
backend/internal/handlers/case_assignments.go
Normal file
@@ -0,0 +1,119 @@
|
|||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseAssignmentHandler struct {
|
||||||
|
svc *services.CaseAssignmentService
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCaseAssignmentHandler(svc *services.CaseAssignmentService) *CaseAssignmentHandler {
|
||||||
|
return &CaseAssignmentHandler{svc: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List handles GET /api/cases/{id}/assignments
|
||||||
|
func (h *CaseAssignmentHandler) List(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
assignments, err := h.svc.ListByCase(r.Context(), tenantID, caseID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]any{
|
||||||
|
"assignments": assignments,
|
||||||
|
"total": len(assignments),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// Assign handles POST /api/cases/{id}/assignments
|
||||||
|
func (h *CaseAssignmentHandler) Assign(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req struct {
|
||||||
|
UserID string `json:"user_id"`
|
||||||
|
Role string `json:"role"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
userID, err := uuid.Parse(req.UserID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid user_id")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.Role == "" {
|
||||||
|
req.Role = "team"
|
||||||
|
}
|
||||||
|
if req.Role != "lead" && req.Role != "team" && req.Role != "viewer" {
|
||||||
|
writeError(w, http.StatusBadRequest, "role must be lead, team, or viewer")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
assignment, err := h.svc.Assign(r.Context(), tenantID, caseID, userID, req.Role)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusCreated, assignment)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unassign handles DELETE /api/cases/{id}/assignments/{uid}
|
||||||
|
func (h *CaseAssignmentHandler) Unassign(w http.ResponseWriter, r *http.Request) {
|
||||||
|
tenantID, ok := auth.TenantFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
writeError(w, http.StatusForbidden, "missing tenant")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
caseID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid case ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
userID, err := uuid.Parse(r.PathValue("uid"))
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusBadRequest, "invalid user ID")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.Unassign(r.Context(), tenantID, caseID, userID); err != nil {
|
||||||
|
writeError(w, http.StatusNotFound, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
writeJSON(w, http.StatusOK, map[string]string{"status": "removed"})
|
||||||
|
}
|
||||||
@@ -167,6 +167,7 @@ func (h *DocumentHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
userID, _ := auth.UserFromContext(r.Context())
|
userID, _ := auth.UserFromContext(r.Context())
|
||||||
|
role := auth.UserRoleFromContext(r.Context())
|
||||||
|
|
||||||
docID, err := uuid.Parse(r.PathValue("docId"))
|
docID, err := uuid.Parse(r.PathValue("docId"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -174,6 +175,26 @@ func (h *DocumentHandler) Delete(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Check permission: owner/partner can delete any, associate can delete own
|
||||||
|
doc, err := h.svc.GetByID(r.Context(), tenantID, docID)
|
||||||
|
if err != nil {
|
||||||
|
writeError(w, http.StatusInternalServerError, err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if doc == nil {
|
||||||
|
writeError(w, http.StatusNotFound, "document not found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
uploaderID := uuid.Nil
|
||||||
|
if doc.UploadedBy != nil {
|
||||||
|
uploaderID = *doc.UploadedBy
|
||||||
|
}
|
||||||
|
if !auth.CanDeleteDocument(role, uploaderID, userID) {
|
||||||
|
writeError(w, http.StatusForbidden, "insufficient permissions to delete this document")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
if err := h.svc.Delete(r.Context(), tenantID, docID, userID); err != nil {
|
if err := h.svc.Delete(r.Context(), tenantID, docID, userID); err != nil {
|
||||||
writeError(w, http.StatusNotFound, "document not found")
|
writeError(w, http.StatusNotFound, "document not found")
|
||||||
return
|
return
|
||||||
|
|||||||
@@ -1,171 +0,0 @@
|
|||||||
package handlers
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"net/http"
|
|
||||||
"strconv"
|
|
||||||
|
|
||||||
"github.com/jmoiron/sqlx"
|
|
||||||
|
|
||||||
"mgit.msbls.de/m/KanzlAI-mGMT/internal/auth"
|
|
||||||
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
|
||||||
)
|
|
||||||
|
|
||||||
// NotificationHandler handles notification API endpoints.
|
|
||||||
type NotificationHandler struct {
|
|
||||||
svc *services.NotificationService
|
|
||||||
db *sqlx.DB
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewNotificationHandler creates a new notification handler.
|
|
||||||
func NewNotificationHandler(svc *services.NotificationService, db *sqlx.DB) *NotificationHandler {
|
|
||||||
return &NotificationHandler{svc: svc, db: db}
|
|
||||||
}
|
|
||||||
|
|
||||||
// List returns paginated notifications for the authenticated user.
|
|
||||||
func (h *NotificationHandler) List(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
limit, _ := strconv.Atoi(r.URL.Query().Get("limit"))
|
|
||||||
offset, _ := strconv.Atoi(r.URL.Query().Get("offset"))
|
|
||||||
|
|
||||||
notifications, total, err := h.svc.ListForUser(r.Context(), tenantID, userID, limit, offset)
|
|
||||||
if err != nil {
|
|
||||||
writeError(w, http.StatusInternalServerError, "failed to list notifications")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, map[string]any{
|
|
||||||
"data": notifications,
|
|
||||||
"total": total,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// UnreadCount returns the count of unread notifications.
|
|
||||||
func (h *NotificationHandler) UnreadCount(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
count, err := h.svc.UnreadCount(r.Context(), tenantID, userID)
|
|
||||||
if err != nil {
|
|
||||||
writeError(w, http.StatusInternalServerError, "failed to count notifications")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, map[string]int{"unread_count": count})
|
|
||||||
}
|
|
||||||
|
|
||||||
// MarkRead marks a single notification as read.
|
|
||||||
func (h *NotificationHandler) MarkRead(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
notifID, err := parsePathUUID(r, "id")
|
|
||||||
if err != nil {
|
|
||||||
writeError(w, http.StatusBadRequest, "invalid notification ID")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := h.svc.MarkRead(r.Context(), tenantID, userID, notifID); err != nil {
|
|
||||||
writeError(w, http.StatusNotFound, err.Error())
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, map[string]string{"status": "ok"})
|
|
||||||
}
|
|
||||||
|
|
||||||
// MarkAllRead marks all notifications as read.
|
|
||||||
func (h *NotificationHandler) MarkAllRead(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := h.svc.MarkAllRead(r.Context(), tenantID, userID); err != nil {
|
|
||||||
writeError(w, http.StatusInternalServerError, "failed to mark all read")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, map[string]string{"status": "ok"})
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetPreferences returns notification preferences for the authenticated user.
|
|
||||||
func (h *NotificationHandler) GetPreferences(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
pref, err := h.svc.GetPreferences(r.Context(), tenantID, userID)
|
|
||||||
if err != nil {
|
|
||||||
writeError(w, http.StatusInternalServerError, "failed to get preferences")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, pref)
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdatePreferences updates notification preferences for the authenticated user.
|
|
||||||
func (h *NotificationHandler) UpdatePreferences(w http.ResponseWriter, r *http.Request) {
|
|
||||||
tenantID, ok := auth.TenantFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
userID, ok := auth.UserFromContext(r.Context())
|
|
||||||
if !ok {
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
var input services.UpdatePreferencesInput
|
|
||||||
if err := json.NewDecoder(r.Body).Decode(&input); err != nil {
|
|
||||||
writeError(w, http.StatusBadRequest, "invalid request body")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
pref, err := h.svc.UpdatePreferences(r.Context(), tenantID, userID, input)
|
|
||||||
if err != nil {
|
|
||||||
writeError(w, http.StatusInternalServerError, "failed to update preferences")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeJSON(w, http.StatusOK, pref)
|
|
||||||
}
|
|
||||||
@@ -117,14 +117,14 @@ func (h *TenantHandler) InviteUser(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Only owners and admins can invite
|
// Only owners and partners can invite
|
||||||
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
jsonError(w, err.Error(), http.StatusInternalServerError)
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if role != "owner" && role != "admin" {
|
if role != "owner" && role != "partner" {
|
||||||
jsonError(w, "only owners and admins can invite users", http.StatusForbidden)
|
jsonError(w, "only owners and partners can invite users", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -141,10 +141,15 @@ func (h *TenantHandler) InviteUser(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
if req.Role == "" {
|
if req.Role == "" {
|
||||||
req.Role = "member"
|
req.Role = "associate"
|
||||||
}
|
}
|
||||||
if req.Role != "member" && req.Role != "admin" {
|
if !auth.IsValidRole(req.Role) {
|
||||||
jsonError(w, "role must be member or admin", http.StatusBadRequest)
|
jsonError(w, "invalid role", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// Non-owners cannot invite as owner
|
||||||
|
if role != "owner" && req.Role == "owner" {
|
||||||
|
jsonError(w, "only owners can invite as owner", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -177,13 +182,13 @@ func (h *TenantHandler) RemoveMember(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Only owners and admins can remove members (or user removing themselves)
|
// Only owners and partners can remove members (or user removing themselves)
|
||||||
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
jsonError(w, err.Error(), http.StatusInternalServerError)
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if role != "owner" && role != "admin" && userID != memberID {
|
if role != "owner" && role != "partner" && userID != memberID {
|
||||||
jsonError(w, "insufficient permissions", http.StatusForbidden)
|
jsonError(w, "insufficient permissions", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -210,14 +215,14 @@ func (h *TenantHandler) UpdateSettings(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Only owners and admins can update settings
|
// Only owners and partners can update settings
|
||||||
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
jsonError(w, err.Error(), http.StatusInternalServerError)
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if role != "owner" && role != "admin" {
|
if role != "owner" && role != "partner" {
|
||||||
jsonError(w, "only owners and admins can update settings", http.StatusForbidden)
|
jsonError(w, "only owners and partners can update settings", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -270,6 +275,85 @@ func (h *TenantHandler) ListMembers(w http.ResponseWriter, r *http.Request) {
|
|||||||
jsonResponse(w, members, http.StatusOK)
|
jsonResponse(w, members, http.StatusOK)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UpdateMemberRole handles PUT /api/tenants/{id}/members/{uid}/role
|
||||||
|
func (h *TenantHandler) UpdateMemberRole(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
tenantID, err := uuid.Parse(r.PathValue("id"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid tenant ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
memberID, err := uuid.Parse(r.PathValue("uid"))
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, "invalid member ID", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only owners and partners can change roles
|
||||||
|
role, err := h.svc.GetUserRole(r.Context(), userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if role != "owner" && role != "partner" {
|
||||||
|
jsonError(w, "only owners and partners can change roles", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var req struct {
|
||||||
|
Role string `json:"role"`
|
||||||
|
}
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
jsonError(w, "invalid request body", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if !auth.IsValidRole(req.Role) {
|
||||||
|
jsonError(w, "invalid role", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Non-owners cannot promote to owner
|
||||||
|
if role != "owner" && req.Role == "owner" {
|
||||||
|
jsonError(w, "only owners can promote to owner", http.StatusForbidden)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := h.svc.UpdateMemberRole(r.Context(), tenantID, memberID, req.Role); err != nil {
|
||||||
|
jsonError(w, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonResponse(w, map[string]string{"status": "updated"}, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetMe handles GET /api/me — returns the current user's ID and role in the active tenant.
|
||||||
|
func (h *TenantHandler) GetMe(w http.ResponseWriter, r *http.Request) {
|
||||||
|
userID, ok := auth.UserFromContext(r.Context())
|
||||||
|
if !ok {
|
||||||
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
role := auth.UserRoleFromContext(r.Context())
|
||||||
|
tenantID, _ := auth.TenantFromContext(r.Context())
|
||||||
|
|
||||||
|
// Get user's permissions for frontend UI
|
||||||
|
perms := auth.GetRolePermissions(role)
|
||||||
|
|
||||||
|
jsonResponse(w, map[string]any{
|
||||||
|
"user_id": userID,
|
||||||
|
"tenant_id": tenantID,
|
||||||
|
"role": role,
|
||||||
|
"permissions": perms,
|
||||||
|
}, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
func jsonResponse(w http.ResponseWriter, data interface{}, status int) {
|
func jsonResponse(w http.ResponseWriter, data interface{}, status int) {
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(status)
|
w.WriteHeader(status)
|
||||||
|
|||||||
@@ -46,7 +46,7 @@ func testServer(t *testing.T) (http.Handler, func()) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
authMW := auth.NewMiddleware(jwtSecret, database)
|
authMW := auth.NewMiddleware(jwtSecret, database)
|
||||||
handler := router.New(database, authMW, cfg, nil, nil)
|
handler := router.New(database, authMW, cfg, nil)
|
||||||
|
|
||||||
return handler, func() { database.Close() }
|
return handler, func() { database.Close() }
|
||||||
}
|
}
|
||||||
|
|||||||
15
backend/internal/models/case_assignment.go
Normal file
15
backend/internal/models/case_assignment.go
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
package models
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseAssignment struct {
|
||||||
|
ID uuid.UUID `db:"id" json:"id"`
|
||||||
|
CaseID uuid.UUID `db:"case_id" json:"case_id"`
|
||||||
|
UserID uuid.UUID `db:"user_id" json:"user_id"`
|
||||||
|
Role string `db:"role" json:"role"`
|
||||||
|
AssignedAt time.Time `db:"assigned_at" json:"assigned_at"`
|
||||||
|
}
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
package models
|
|
||||||
|
|
||||||
import (
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/google/uuid"
|
|
||||||
"github.com/lib/pq"
|
|
||||||
)
|
|
||||||
|
|
||||||
type Notification struct {
|
|
||||||
ID uuid.UUID `db:"id" json:"id"`
|
|
||||||
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
|
||||||
UserID uuid.UUID `db:"user_id" json:"user_id"`
|
|
||||||
Type string `db:"type" json:"type"`
|
|
||||||
EntityType *string `db:"entity_type" json:"entity_type,omitempty"`
|
|
||||||
EntityID *uuid.UUID `db:"entity_id" json:"entity_id,omitempty"`
|
|
||||||
Title string `db:"title" json:"title"`
|
|
||||||
Body *string `db:"body" json:"body,omitempty"`
|
|
||||||
SentAt *time.Time `db:"sent_at" json:"sent_at,omitempty"`
|
|
||||||
ReadAt *time.Time `db:"read_at" json:"read_at,omitempty"`
|
|
||||||
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
|
||||||
}
|
|
||||||
|
|
||||||
type NotificationPreferences struct {
|
|
||||||
UserID uuid.UUID `db:"user_id" json:"user_id"`
|
|
||||||
TenantID uuid.UUID `db:"tenant_id" json:"tenant_id"`
|
|
||||||
DeadlineReminderDays pq.Int64Array `db:"deadline_reminder_days" json:"deadline_reminder_days"`
|
|
||||||
EmailEnabled bool `db:"email_enabled" json:"email_enabled"`
|
|
||||||
DailyDigest bool `db:"daily_digest" json:"daily_digest"`
|
|
||||||
CreatedAt time.Time `db:"created_at" json:"created_at"`
|
|
||||||
UpdatedAt time.Time `db:"updated_at" json:"updated_at"`
|
|
||||||
}
|
|
||||||
@@ -15,7 +15,7 @@ import (
|
|||||||
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/services"
|
||||||
)
|
)
|
||||||
|
|
||||||
func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *services.CalDAVService, notifSvc *services.NotificationService) http.Handler {
|
func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *services.CalDAVService) http.Handler {
|
||||||
mux := http.NewServeMux()
|
mux := http.NewServeMux()
|
||||||
|
|
||||||
// Services
|
// Services
|
||||||
@@ -29,6 +29,7 @@ func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *se
|
|||||||
calculator := services.NewDeadlineCalculator(holidaySvc)
|
calculator := services.NewDeadlineCalculator(holidaySvc)
|
||||||
storageCli := services.NewStorageClient(cfg.SupabaseURL, cfg.SupabaseServiceKey)
|
storageCli := services.NewStorageClient(cfg.SupabaseURL, cfg.SupabaseServiceKey)
|
||||||
documentSvc := services.NewDocumentService(db, storageCli)
|
documentSvc := services.NewDocumentService(db, storageCli)
|
||||||
|
assignmentSvc := services.NewCaseAssignmentService(db)
|
||||||
|
|
||||||
// AI service (optional — only if API key is configured)
|
// AI service (optional — only if API key is configured)
|
||||||
var aiH *handlers.AIHandler
|
var aiH *handlers.AIHandler
|
||||||
@@ -43,12 +44,6 @@ func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *se
|
|||||||
noteSvc := services.NewNoteService(db)
|
noteSvc := services.NewNoteService(db)
|
||||||
dashboardSvc := services.NewDashboardService(db)
|
dashboardSvc := services.NewDashboardService(db)
|
||||||
|
|
||||||
// Notification handler (optional — nil in tests)
|
|
||||||
var notifH *handlers.NotificationHandler
|
|
||||||
if notifSvc != nil {
|
|
||||||
notifH = handlers.NewNotificationHandler(notifSvc, db)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Handlers
|
// Handlers
|
||||||
tenantH := handlers.NewTenantHandler(tenantSvc)
|
tenantH := handlers.NewTenantHandler(tenantSvc)
|
||||||
caseH := handlers.NewCaseHandler(caseSvc)
|
caseH := handlers.NewCaseHandler(caseSvc)
|
||||||
@@ -61,6 +56,7 @@ func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *se
|
|||||||
noteH := handlers.NewNoteHandler(noteSvc)
|
noteH := handlers.NewNoteHandler(noteSvc)
|
||||||
eventH := handlers.NewCaseEventHandler(db)
|
eventH := handlers.NewCaseEventHandler(db)
|
||||||
docH := handlers.NewDocumentHandler(documentSvc)
|
docH := handlers.NewDocumentHandler(documentSvc)
|
||||||
|
assignmentH := handlers.NewCaseAssignmentHandler(assignmentSvc)
|
||||||
|
|
||||||
// Public routes
|
// Public routes
|
||||||
mux.HandleFunc("GET /health", handleHealth(db))
|
mux.HandleFunc("GET /health", handleHealth(db))
|
||||||
@@ -76,87 +72,100 @@ func New(db *sqlx.DB, authMW *auth.Middleware, cfg *config.Config, calDAVSvc *se
|
|||||||
api.HandleFunc("POST /api/tenants/{id}/invite", tenantH.InviteUser)
|
api.HandleFunc("POST /api/tenants/{id}/invite", tenantH.InviteUser)
|
||||||
api.HandleFunc("DELETE /api/tenants/{id}/members/{uid}", tenantH.RemoveMember)
|
api.HandleFunc("DELETE /api/tenants/{id}/members/{uid}", tenantH.RemoveMember)
|
||||||
api.HandleFunc("GET /api/tenants/{id}/members", tenantH.ListMembers)
|
api.HandleFunc("GET /api/tenants/{id}/members", tenantH.ListMembers)
|
||||||
|
api.HandleFunc("PUT /api/tenants/{id}/members/{uid}/role", tenantH.UpdateMemberRole)
|
||||||
|
|
||||||
|
// Permission-wrapping helper: wraps a HandlerFunc with a permission check
|
||||||
|
perm := func(p auth.Permission, fn http.HandlerFunc) http.HandlerFunc {
|
||||||
|
return func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
role := auth.UserRoleFromContext(r.Context())
|
||||||
|
if !auth.HasPermission(role, p) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(http.StatusForbidden)
|
||||||
|
w.Write([]byte(`{"error":"insufficient permissions"}`))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
fn(w, r)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Tenant-scoped routes (require tenant context)
|
// Tenant-scoped routes (require tenant context)
|
||||||
scoped := http.NewServeMux()
|
scoped := http.NewServeMux()
|
||||||
|
|
||||||
// Cases
|
// Current user info (role, permissions) — all authenticated users
|
||||||
scoped.HandleFunc("GET /api/cases", caseH.List)
|
scoped.HandleFunc("GET /api/me", tenantH.GetMe)
|
||||||
scoped.HandleFunc("POST /api/cases", caseH.Create)
|
|
||||||
scoped.HandleFunc("GET /api/cases/{id}", caseH.Get)
|
|
||||||
scoped.HandleFunc("PUT /api/cases/{id}", caseH.Update)
|
|
||||||
scoped.HandleFunc("DELETE /api/cases/{id}", caseH.Delete)
|
|
||||||
|
|
||||||
// Parties
|
// Cases — all can view, create needs PermCreateCase, archive needs PermCreateCase
|
||||||
|
scoped.HandleFunc("GET /api/cases", caseH.List)
|
||||||
|
scoped.HandleFunc("POST /api/cases", perm(auth.PermCreateCase, caseH.Create))
|
||||||
|
scoped.HandleFunc("GET /api/cases/{id}", caseH.Get)
|
||||||
|
scoped.HandleFunc("PUT /api/cases/{id}", caseH.Update) // case-level access checked in handler
|
||||||
|
scoped.HandleFunc("DELETE /api/cases/{id}", perm(auth.PermCreateCase, caseH.Delete))
|
||||||
|
|
||||||
|
// Parties — same access as case editing
|
||||||
scoped.HandleFunc("GET /api/cases/{id}/parties", partyH.List)
|
scoped.HandleFunc("GET /api/cases/{id}/parties", partyH.List)
|
||||||
scoped.HandleFunc("POST /api/cases/{id}/parties", partyH.Create)
|
scoped.HandleFunc("POST /api/cases/{id}/parties", partyH.Create)
|
||||||
scoped.HandleFunc("PUT /api/parties/{partyId}", partyH.Update)
|
scoped.HandleFunc("PUT /api/parties/{partyId}", partyH.Update)
|
||||||
scoped.HandleFunc("DELETE /api/parties/{partyId}", partyH.Delete)
|
scoped.HandleFunc("DELETE /api/parties/{partyId}", partyH.Delete)
|
||||||
|
|
||||||
// Deadlines
|
// Deadlines — manage needs PermManageDeadlines, view is open
|
||||||
scoped.HandleFunc("GET /api/deadlines/{deadlineID}", deadlineH.Get)
|
scoped.HandleFunc("GET /api/deadlines/{deadlineID}", deadlineH.Get)
|
||||||
scoped.HandleFunc("GET /api/deadlines", deadlineH.ListAll)
|
scoped.HandleFunc("GET /api/deadlines", deadlineH.ListAll)
|
||||||
scoped.HandleFunc("GET /api/cases/{caseID}/deadlines", deadlineH.ListForCase)
|
scoped.HandleFunc("GET /api/cases/{caseID}/deadlines", deadlineH.ListForCase)
|
||||||
scoped.HandleFunc("POST /api/cases/{caseID}/deadlines", deadlineH.Create)
|
scoped.HandleFunc("POST /api/cases/{caseID}/deadlines", perm(auth.PermManageDeadlines, deadlineH.Create))
|
||||||
scoped.HandleFunc("PUT /api/deadlines/{deadlineID}", deadlineH.Update)
|
scoped.HandleFunc("PUT /api/deadlines/{deadlineID}", perm(auth.PermManageDeadlines, deadlineH.Update))
|
||||||
scoped.HandleFunc("PATCH /api/deadlines/{deadlineID}/complete", deadlineH.Complete)
|
scoped.HandleFunc("PATCH /api/deadlines/{deadlineID}/complete", perm(auth.PermManageDeadlines, deadlineH.Complete))
|
||||||
scoped.HandleFunc("DELETE /api/deadlines/{deadlineID}", deadlineH.Delete)
|
scoped.HandleFunc("DELETE /api/deadlines/{deadlineID}", perm(auth.PermManageDeadlines, deadlineH.Delete))
|
||||||
|
|
||||||
// Deadline rules (reference data)
|
// Deadline rules (reference data) — all can read
|
||||||
scoped.HandleFunc("GET /api/deadline-rules", ruleH.List)
|
scoped.HandleFunc("GET /api/deadline-rules", ruleH.List)
|
||||||
scoped.HandleFunc("GET /api/deadline-rules/{type}", ruleH.GetRuleTree)
|
scoped.HandleFunc("GET /api/deadline-rules/{type}", ruleH.GetRuleTree)
|
||||||
scoped.HandleFunc("GET /api/proceeding-types", ruleH.ListProceedingTypes)
|
scoped.HandleFunc("GET /api/proceeding-types", ruleH.ListProceedingTypes)
|
||||||
|
|
||||||
// Deadline calculator
|
// Deadline calculator — all can use
|
||||||
scoped.HandleFunc("POST /api/deadlines/calculate", calcH.Calculate)
|
scoped.HandleFunc("POST /api/deadlines/calculate", calcH.Calculate)
|
||||||
|
|
||||||
// Appointments
|
// Appointments — all can manage (PermManageAppointments granted to all)
|
||||||
scoped.HandleFunc("GET /api/appointments/{id}", apptH.Get)
|
scoped.HandleFunc("GET /api/appointments/{id}", apptH.Get)
|
||||||
scoped.HandleFunc("GET /api/appointments", apptH.List)
|
scoped.HandleFunc("GET /api/appointments", apptH.List)
|
||||||
scoped.HandleFunc("POST /api/appointments", apptH.Create)
|
scoped.HandleFunc("POST /api/appointments", perm(auth.PermManageAppointments, apptH.Create))
|
||||||
scoped.HandleFunc("PUT /api/appointments/{id}", apptH.Update)
|
scoped.HandleFunc("PUT /api/appointments/{id}", perm(auth.PermManageAppointments, apptH.Update))
|
||||||
scoped.HandleFunc("DELETE /api/appointments/{id}", apptH.Delete)
|
scoped.HandleFunc("DELETE /api/appointments/{id}", perm(auth.PermManageAppointments, apptH.Delete))
|
||||||
|
|
||||||
// Case events
|
// Case assignments — manage team required for assign/unassign
|
||||||
|
scoped.HandleFunc("GET /api/cases/{id}/assignments", assignmentH.List)
|
||||||
|
scoped.HandleFunc("POST /api/cases/{id}/assignments", perm(auth.PermManageTeam, assignmentH.Assign))
|
||||||
|
scoped.HandleFunc("DELETE /api/cases/{id}/assignments/{uid}", perm(auth.PermManageTeam, assignmentH.Unassign))
|
||||||
|
|
||||||
|
// Case events — all can view
|
||||||
scoped.HandleFunc("GET /api/case-events/{id}", eventH.Get)
|
scoped.HandleFunc("GET /api/case-events/{id}", eventH.Get)
|
||||||
|
|
||||||
// Notes
|
// Notes — all can manage
|
||||||
scoped.HandleFunc("GET /api/notes", noteH.List)
|
scoped.HandleFunc("GET /api/notes", noteH.List)
|
||||||
scoped.HandleFunc("POST /api/notes", noteH.Create)
|
scoped.HandleFunc("POST /api/notes", noteH.Create)
|
||||||
scoped.HandleFunc("PUT /api/notes/{id}", noteH.Update)
|
scoped.HandleFunc("PUT /api/notes/{id}", noteH.Update)
|
||||||
scoped.HandleFunc("DELETE /api/notes/{id}", noteH.Delete)
|
scoped.HandleFunc("DELETE /api/notes/{id}", noteH.Delete)
|
||||||
|
|
||||||
// Dashboard
|
// Dashboard — all can view
|
||||||
scoped.HandleFunc("GET /api/dashboard", dashboardH.Get)
|
scoped.HandleFunc("GET /api/dashboard", dashboardH.Get)
|
||||||
|
|
||||||
// Documents
|
// Documents — all can upload, delete checked in handler (own vs all)
|
||||||
scoped.HandleFunc("GET /api/cases/{id}/documents", docH.ListByCase)
|
scoped.HandleFunc("GET /api/cases/{id}/documents", docH.ListByCase)
|
||||||
scoped.HandleFunc("POST /api/cases/{id}/documents", docH.Upload)
|
scoped.HandleFunc("POST /api/cases/{id}/documents", perm(auth.PermUploadDocuments, docH.Upload))
|
||||||
scoped.HandleFunc("GET /api/documents/{docId}", docH.Download)
|
scoped.HandleFunc("GET /api/documents/{docId}", docH.Download)
|
||||||
scoped.HandleFunc("GET /api/documents/{docId}/meta", docH.GetMeta)
|
scoped.HandleFunc("GET /api/documents/{docId}/meta", docH.GetMeta)
|
||||||
scoped.HandleFunc("DELETE /api/documents/{docId}", docH.Delete)
|
scoped.HandleFunc("DELETE /api/documents/{docId}", docH.Delete) // permission check inside handler
|
||||||
|
|
||||||
// AI endpoints (rate limited: 5 req/min burst 10 per IP)
|
// AI endpoints (rate limited: 5 req/min burst 10 per IP)
|
||||||
if aiH != nil {
|
if aiH != nil {
|
||||||
aiLimiter := middleware.NewTokenBucket(5.0/60.0, 10)
|
aiLimiter := middleware.NewTokenBucket(5.0/60.0, 10)
|
||||||
scoped.HandleFunc("POST /api/ai/extract-deadlines", aiLimiter.LimitFunc(aiH.ExtractDeadlines))
|
scoped.HandleFunc("POST /api/ai/extract-deadlines", perm(auth.PermAIExtraction, aiLimiter.LimitFunc(aiH.ExtractDeadlines)))
|
||||||
scoped.HandleFunc("POST /api/ai/summarize-case", aiLimiter.LimitFunc(aiH.SummarizeCase))
|
scoped.HandleFunc("POST /api/ai/summarize-case", perm(auth.PermAIExtraction, aiLimiter.LimitFunc(aiH.SummarizeCase)))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Notifications
|
// CalDAV sync endpoints — settings permission required
|
||||||
if notifH != nil {
|
|
||||||
scoped.HandleFunc("GET /api/notifications", notifH.List)
|
|
||||||
scoped.HandleFunc("GET /api/notifications/unread-count", notifH.UnreadCount)
|
|
||||||
scoped.HandleFunc("PATCH /api/notifications/{id}/read", notifH.MarkRead)
|
|
||||||
scoped.HandleFunc("PATCH /api/notifications/read-all", notifH.MarkAllRead)
|
|
||||||
scoped.HandleFunc("GET /api/notification-preferences", notifH.GetPreferences)
|
|
||||||
scoped.HandleFunc("PUT /api/notification-preferences", notifH.UpdatePreferences)
|
|
||||||
}
|
|
||||||
|
|
||||||
// CalDAV sync endpoints
|
|
||||||
if calDAVSvc != nil {
|
if calDAVSvc != nil {
|
||||||
calDAVH := handlers.NewCalDAVHandler(calDAVSvc)
|
calDAVH := handlers.NewCalDAVHandler(calDAVSvc)
|
||||||
scoped.HandleFunc("POST /api/caldav/sync", calDAVH.TriggerSync)
|
scoped.HandleFunc("POST /api/caldav/sync", perm(auth.PermManageSettings, calDAVH.TriggerSync))
|
||||||
scoped.HandleFunc("GET /api/caldav/status", calDAVH.GetStatus)
|
scoped.HandleFunc("GET /api/caldav/status", calDAVH.GetStatus)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
92
backend/internal/services/case_assignment_service.go
Normal file
92
backend/internal/services/case_assignment_service.go
Normal file
@@ -0,0 +1,92 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/jmoiron/sqlx"
|
||||||
|
|
||||||
|
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CaseAssignmentService struct {
|
||||||
|
db *sqlx.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCaseAssignmentService(db *sqlx.DB) *CaseAssignmentService {
|
||||||
|
return &CaseAssignmentService{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListByCase returns all assignments for a case.
|
||||||
|
func (s *CaseAssignmentService) ListByCase(ctx context.Context, tenantID, caseID uuid.UUID) ([]models.CaseAssignment, error) {
|
||||||
|
var assignments []models.CaseAssignment
|
||||||
|
err := s.db.SelectContext(ctx, &assignments,
|
||||||
|
`SELECT ca.id, ca.case_id, ca.user_id, ca.role, ca.assigned_at
|
||||||
|
FROM case_assignments ca
|
||||||
|
JOIN cases c ON c.id = ca.case_id
|
||||||
|
WHERE ca.case_id = $1 AND c.tenant_id = $2
|
||||||
|
ORDER BY ca.assigned_at`,
|
||||||
|
caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("list case assignments: %w", err)
|
||||||
|
}
|
||||||
|
return assignments, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Assign adds a user to a case with the given role.
|
||||||
|
func (s *CaseAssignmentService) Assign(ctx context.Context, tenantID, caseID, userID uuid.UUID, role string) (*models.CaseAssignment, error) {
|
||||||
|
// Verify user is a member of this tenant
|
||||||
|
var memberExists bool
|
||||||
|
err := s.db.GetContext(ctx, &memberExists,
|
||||||
|
`SELECT EXISTS(SELECT 1 FROM user_tenants WHERE user_id = $1 AND tenant_id = $2)`,
|
||||||
|
userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("check membership: %w", err)
|
||||||
|
}
|
||||||
|
if !memberExists {
|
||||||
|
return nil, fmt.Errorf("user is not a member of this tenant")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify case belongs to tenant
|
||||||
|
var caseExists bool
|
||||||
|
err = s.db.GetContext(ctx, &caseExists,
|
||||||
|
`SELECT EXISTS(SELECT 1 FROM cases WHERE id = $1 AND tenant_id = $2)`,
|
||||||
|
caseID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("check case: %w", err)
|
||||||
|
}
|
||||||
|
if !caseExists {
|
||||||
|
return nil, fmt.Errorf("case not found")
|
||||||
|
}
|
||||||
|
|
||||||
|
var assignment models.CaseAssignment
|
||||||
|
err = s.db.QueryRowxContext(ctx,
|
||||||
|
`INSERT INTO case_assignments (case_id, user_id, role)
|
||||||
|
VALUES ($1, $2, $3)
|
||||||
|
ON CONFLICT (case_id, user_id) DO UPDATE SET role = EXCLUDED.role
|
||||||
|
RETURNING id, case_id, user_id, role, assigned_at`,
|
||||||
|
caseID, userID, role,
|
||||||
|
).StructScan(&assignment)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("assign user to case: %w", err)
|
||||||
|
}
|
||||||
|
return &assignment, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unassign removes a user from a case.
|
||||||
|
func (s *CaseAssignmentService) Unassign(ctx context.Context, tenantID, caseID, userID uuid.UUID) error {
|
||||||
|
result, err := s.db.ExecContext(ctx,
|
||||||
|
`DELETE FROM case_assignments ca
|
||||||
|
USING cases c
|
||||||
|
WHERE ca.case_id = c.id AND ca.case_id = $1 AND ca.user_id = $2 AND c.tenant_id = $3`,
|
||||||
|
caseID, userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unassign: %w", err)
|
||||||
|
}
|
||||||
|
rows, _ := result.RowsAffected()
|
||||||
|
if rows == 0 {
|
||||||
|
return fmt.Errorf("assignment not found")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -1,501 +0,0 @@
|
|||||||
package services
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
"fmt"
|
|
||||||
"log/slog"
|
|
||||||
"os/exec"
|
|
||||||
"strings"
|
|
||||||
"sync"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/google/uuid"
|
|
||||||
"github.com/jmoiron/sqlx"
|
|
||||||
"github.com/lib/pq"
|
|
||||||
|
|
||||||
"mgit.msbls.de/m/KanzlAI-mGMT/internal/models"
|
|
||||||
)
|
|
||||||
|
|
||||||
// NotificationService handles notification CRUD, deadline reminders, and email sending.
|
|
||||||
type NotificationService struct {
|
|
||||||
db *sqlx.DB
|
|
||||||
stopCh chan struct{}
|
|
||||||
wg sync.WaitGroup
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewNotificationService creates a new notification service.
|
|
||||||
func NewNotificationService(db *sqlx.DB) *NotificationService {
|
|
||||||
return &NotificationService{
|
|
||||||
db: db,
|
|
||||||
stopCh: make(chan struct{}),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Start launches the background reminder checker (every hour) and daily digest (8am).
|
|
||||||
func (s *NotificationService) Start() {
|
|
||||||
s.wg.Add(1)
|
|
||||||
go s.backgroundLoop()
|
|
||||||
}
|
|
||||||
|
|
||||||
// Stop gracefully shuts down background workers.
|
|
||||||
func (s *NotificationService) Stop() {
|
|
||||||
close(s.stopCh)
|
|
||||||
s.wg.Wait()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *NotificationService) backgroundLoop() {
|
|
||||||
defer s.wg.Done()
|
|
||||||
|
|
||||||
// Check reminders on startup
|
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Minute)
|
|
||||||
s.CheckDeadlineReminders(ctx)
|
|
||||||
cancel()
|
|
||||||
|
|
||||||
reminderTicker := time.NewTicker(1 * time.Hour)
|
|
||||||
defer reminderTicker.Stop()
|
|
||||||
|
|
||||||
// Digest ticker: check every 15 minutes, send at 8am
|
|
||||||
digestTicker := time.NewTicker(15 * time.Minute)
|
|
||||||
defer digestTicker.Stop()
|
|
||||||
|
|
||||||
var lastDigestDate string
|
|
||||||
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
case <-s.stopCh:
|
|
||||||
return
|
|
||||||
case <-reminderTicker.C:
|
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Minute)
|
|
||||||
s.CheckDeadlineReminders(ctx)
|
|
||||||
cancel()
|
|
||||||
case now := <-digestTicker.C:
|
|
||||||
today := now.Format("2006-01-02")
|
|
||||||
hour := now.Hour()
|
|
||||||
if hour >= 8 && lastDigestDate != today {
|
|
||||||
lastDigestDate = today
|
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
|
|
||||||
s.SendDailyDigests(ctx)
|
|
||||||
cancel()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// CheckDeadlineReminders finds deadlines due in N days matching user preferences and creates notifications.
|
|
||||||
func (s *NotificationService) CheckDeadlineReminders(ctx context.Context) {
|
|
||||||
slog.Info("checking deadline reminders")
|
|
||||||
|
|
||||||
// Get all user preferences with email enabled
|
|
||||||
var prefs []models.NotificationPreferences
|
|
||||||
err := s.db.SelectContext(ctx, &prefs,
|
|
||||||
`SELECT user_id, tenant_id, deadline_reminder_days, email_enabled, daily_digest, created_at, updated_at
|
|
||||||
FROM notification_preferences`)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to load notification preferences", "error", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(prefs) == 0 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Collect all unique reminder day values across all users
|
|
||||||
daySet := make(map[int64]bool)
|
|
||||||
for _, p := range prefs {
|
|
||||||
for _, d := range p.DeadlineReminderDays {
|
|
||||||
daySet[d] = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if len(daySet) == 0 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Build array of target dates
|
|
||||||
today := time.Now().Truncate(24 * time.Hour)
|
|
||||||
var targetDates []string
|
|
||||||
dayToDate := make(map[string]int64)
|
|
||||||
for d := range daySet {
|
|
||||||
target := today.AddDate(0, 0, int(d))
|
|
||||||
dateStr := target.Format("2006-01-02")
|
|
||||||
targetDates = append(targetDates, dateStr)
|
|
||||||
dayToDate[dateStr] = d
|
|
||||||
}
|
|
||||||
|
|
||||||
// Also check overdue deadlines
|
|
||||||
todayStr := today.Format("2006-01-02")
|
|
||||||
|
|
||||||
// Find pending deadlines matching target dates
|
|
||||||
type deadlineRow struct {
|
|
||||||
models.Deadline
|
|
||||||
CaseTitle string `db:"case_title"`
|
|
||||||
CaseNumber string `db:"case_number"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Reminder deadlines (due in N days)
|
|
||||||
var reminderDeadlines []deadlineRow
|
|
||||||
query, args, err := sqlx.In(
|
|
||||||
`SELECT d.*, c.title AS case_title, c.case_number
|
|
||||||
FROM deadlines d
|
|
||||||
JOIN cases c ON c.id = d.case_id
|
|
||||||
WHERE d.status = 'pending' AND d.due_date IN (?)`,
|
|
||||||
targetDates)
|
|
||||||
if err == nil {
|
|
||||||
query = s.db.Rebind(query)
|
|
||||||
err = s.db.SelectContext(ctx, &reminderDeadlines, query, args...)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to query reminder deadlines", "error", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Overdue deadlines
|
|
||||||
var overdueDeadlines []deadlineRow
|
|
||||||
err = s.db.SelectContext(ctx, &overdueDeadlines,
|
|
||||||
`SELECT d.*, c.title AS case_title, c.case_number
|
|
||||||
FROM deadlines d
|
|
||||||
JOIN cases c ON c.id = d.case_id
|
|
||||||
WHERE d.status = 'pending' AND d.due_date < $1`, todayStr)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to query overdue deadlines", "error", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create notifications for each user based on their tenant and preferences
|
|
||||||
for _, pref := range prefs {
|
|
||||||
// Reminder notifications
|
|
||||||
for _, dl := range reminderDeadlines {
|
|
||||||
if dl.TenantID != pref.TenantID {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
daysUntil := dayToDate[dl.DueDate]
|
|
||||||
// Check if this user cares about this many days
|
|
||||||
if !containsDay(pref.DeadlineReminderDays, daysUntil) {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
title := fmt.Sprintf("Frist in %d Tagen: %s", daysUntil, dl.Title)
|
|
||||||
body := fmt.Sprintf("Akte %s — %s\nFällig am %s", dl.CaseNumber, dl.CaseTitle, dl.DueDate)
|
|
||||||
entityType := "deadline"
|
|
||||||
|
|
||||||
s.CreateNotification(ctx, CreateNotificationInput{
|
|
||||||
TenantID: pref.TenantID,
|
|
||||||
UserID: pref.UserID,
|
|
||||||
Type: "deadline_reminder",
|
|
||||||
EntityType: &entityType,
|
|
||||||
EntityID: &dl.ID,
|
|
||||||
Title: title,
|
|
||||||
Body: &body,
|
|
||||||
SendEmail: pref.EmailEnabled && !pref.DailyDigest,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// Overdue notifications
|
|
||||||
for _, dl := range overdueDeadlines {
|
|
||||||
if dl.TenantID != pref.TenantID {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
title := fmt.Sprintf("Frist überfällig: %s", dl.Title)
|
|
||||||
body := fmt.Sprintf("Akte %s — %s\nFällig seit %s", dl.CaseNumber, dl.CaseTitle, dl.DueDate)
|
|
||||||
entityType := "deadline"
|
|
||||||
|
|
||||||
s.CreateNotification(ctx, CreateNotificationInput{
|
|
||||||
TenantID: pref.TenantID,
|
|
||||||
UserID: pref.UserID,
|
|
||||||
Type: "deadline_overdue",
|
|
||||||
EntityType: &entityType,
|
|
||||||
EntityID: &dl.ID,
|
|
||||||
Title: title,
|
|
||||||
Body: &body,
|
|
||||||
SendEmail: pref.EmailEnabled && !pref.DailyDigest,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// SendDailyDigests compiles pending notifications into one email per user.
|
|
||||||
func (s *NotificationService) SendDailyDigests(ctx context.Context) {
|
|
||||||
slog.Info("sending daily digests")
|
|
||||||
|
|
||||||
// Find users with daily_digest enabled
|
|
||||||
var prefs []models.NotificationPreferences
|
|
||||||
err := s.db.SelectContext(ctx, &prefs,
|
|
||||||
`SELECT user_id, tenant_id, deadline_reminder_days, email_enabled, daily_digest, created_at, updated_at
|
|
||||||
FROM notification_preferences
|
|
||||||
WHERE daily_digest = true AND email_enabled = true`)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to load digest preferences", "error", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, pref := range prefs {
|
|
||||||
// Get unsent notifications for this user from the last 24 hours
|
|
||||||
var notifications []models.Notification
|
|
||||||
err := s.db.SelectContext(ctx, ¬ifications,
|
|
||||||
`SELECT id, tenant_id, user_id, type, entity_type, entity_id, title, body, sent_at, read_at, created_at
|
|
||||||
FROM notifications
|
|
||||||
WHERE user_id = $1 AND tenant_id = $2 AND sent_at IS NULL
|
|
||||||
AND created_at > now() - interval '24 hours'
|
|
||||||
ORDER BY created_at DESC`,
|
|
||||||
pref.UserID, pref.TenantID)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to load unsent notifications", "error", err, "user_id", pref.UserID)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(notifications) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get user email
|
|
||||||
email := s.getUserEmail(ctx, pref.UserID)
|
|
||||||
if email == "" {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// Build digest
|
|
||||||
var lines []string
|
|
||||||
lines = append(lines, fmt.Sprintf("Guten Morgen! Hier ist Ihre Tagesübersicht mit %d Benachrichtigungen:\n", len(notifications)))
|
|
||||||
for _, n := range notifications {
|
|
||||||
body := ""
|
|
||||||
if n.Body != nil {
|
|
||||||
body = " — " + *n.Body
|
|
||||||
}
|
|
||||||
lines = append(lines, fmt.Sprintf("• %s%s", n.Title, body))
|
|
||||||
}
|
|
||||||
lines = append(lines, "\n---\nKanzlAI Kanzleimanagement")
|
|
||||||
|
|
||||||
subject := fmt.Sprintf("KanzlAI Tagesübersicht — %d Benachrichtigungen", len(notifications))
|
|
||||||
bodyText := strings.Join(lines, "\n")
|
|
||||||
|
|
||||||
if err := SendEmail(email, subject, bodyText); err != nil {
|
|
||||||
slog.Error("failed to send digest email", "error", err, "user_id", pref.UserID)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// Mark all as sent
|
|
||||||
ids := make([]uuid.UUID, len(notifications))
|
|
||||||
for i, n := range notifications {
|
|
||||||
ids[i] = n.ID
|
|
||||||
}
|
|
||||||
query, args, err := sqlx.In(
|
|
||||||
`UPDATE notifications SET sent_at = now() WHERE id IN (?)`, ids)
|
|
||||||
if err == nil {
|
|
||||||
query = s.db.Rebind(query)
|
|
||||||
_, err = s.db.ExecContext(ctx, query, args...)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to mark digest notifications sent", "error", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
slog.Info("sent daily digest", "user_id", pref.UserID, "count", len(notifications))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// CreateNotificationInput holds the data for creating a notification.
|
|
||||||
type CreateNotificationInput struct {
|
|
||||||
TenantID uuid.UUID
|
|
||||||
UserID uuid.UUID
|
|
||||||
Type string
|
|
||||||
EntityType *string
|
|
||||||
EntityID *uuid.UUID
|
|
||||||
Title string
|
|
||||||
Body *string
|
|
||||||
SendEmail bool
|
|
||||||
}
|
|
||||||
|
|
||||||
// CreateNotification stores a notification in the DB and optionally sends an email.
|
|
||||||
func (s *NotificationService) CreateNotification(ctx context.Context, input CreateNotificationInput) (*models.Notification, error) {
|
|
||||||
// Dedup: check if we already sent this notification today
|
|
||||||
if input.EntityID != nil {
|
|
||||||
var count int
|
|
||||||
err := s.db.GetContext(ctx, &count,
|
|
||||||
`SELECT COUNT(*) FROM notifications
|
|
||||||
WHERE user_id = $1 AND entity_id = $2 AND type = $3
|
|
||||||
AND created_at::date = CURRENT_DATE`,
|
|
||||||
input.UserID, input.EntityID, input.Type)
|
|
||||||
if err == nil && count > 0 {
|
|
||||||
return nil, nil // Already notified today
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var n models.Notification
|
|
||||||
err := s.db.QueryRowxContext(ctx,
|
|
||||||
`INSERT INTO notifications (tenant_id, user_id, type, entity_type, entity_id, title, body)
|
|
||||||
VALUES ($1, $2, $3, $4, $5, $6, $7)
|
|
||||||
RETURNING id, tenant_id, user_id, type, entity_type, entity_id, title, body, sent_at, read_at, created_at`,
|
|
||||||
input.TenantID, input.UserID, input.Type, input.EntityType, input.EntityID,
|
|
||||||
input.Title, input.Body).StructScan(&n)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to create notification", "error", err)
|
|
||||||
return nil, fmt.Errorf("create notification: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Send email immediately if requested (non-digest users)
|
|
||||||
if input.SendEmail {
|
|
||||||
email := s.getUserEmail(ctx, input.UserID)
|
|
||||||
if email != "" {
|
|
||||||
go func() {
|
|
||||||
if err := SendEmail(email, input.Title, derefStr(input.Body)); err != nil {
|
|
||||||
slog.Error("failed to send notification email", "error", err, "user_id", input.UserID)
|
|
||||||
} else {
|
|
||||||
// Mark as sent
|
|
||||||
_, _ = s.db.Exec(`UPDATE notifications SET sent_at = now() WHERE id = $1`, n.ID)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return &n, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// ListForUser returns notifications for a user in a tenant, paginated.
|
|
||||||
func (s *NotificationService) ListForUser(ctx context.Context, tenantID, userID uuid.UUID, limit, offset int) ([]models.Notification, int, error) {
|
|
||||||
if limit <= 0 {
|
|
||||||
limit = 50
|
|
||||||
}
|
|
||||||
if limit > 200 {
|
|
||||||
limit = 200
|
|
||||||
}
|
|
||||||
|
|
||||||
var total int
|
|
||||||
err := s.db.GetContext(ctx, &total,
|
|
||||||
`SELECT COUNT(*) FROM notifications WHERE user_id = $1 AND tenant_id = $2`,
|
|
||||||
userID, tenantID)
|
|
||||||
if err != nil {
|
|
||||||
return nil, 0, fmt.Errorf("count notifications: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var notifications []models.Notification
|
|
||||||
err = s.db.SelectContext(ctx, ¬ifications,
|
|
||||||
`SELECT id, tenant_id, user_id, type, entity_type, entity_id, title, body, sent_at, read_at, created_at
|
|
||||||
FROM notifications
|
|
||||||
WHERE user_id = $1 AND tenant_id = $2
|
|
||||||
ORDER BY created_at DESC
|
|
||||||
LIMIT $3 OFFSET $4`,
|
|
||||||
userID, tenantID, limit, offset)
|
|
||||||
if err != nil {
|
|
||||||
return nil, 0, fmt.Errorf("list notifications: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return notifications, total, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UnreadCount returns the number of unread notifications for a user.
|
|
||||||
func (s *NotificationService) UnreadCount(ctx context.Context, tenantID, userID uuid.UUID) (int, error) {
|
|
||||||
var count int
|
|
||||||
err := s.db.GetContext(ctx, &count,
|
|
||||||
`SELECT COUNT(*) FROM notifications WHERE user_id = $1 AND tenant_id = $2 AND read_at IS NULL`,
|
|
||||||
userID, tenantID)
|
|
||||||
return count, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// MarkRead marks a single notification as read.
|
|
||||||
func (s *NotificationService) MarkRead(ctx context.Context, tenantID, userID, notificationID uuid.UUID) error {
|
|
||||||
result, err := s.db.ExecContext(ctx,
|
|
||||||
`UPDATE notifications SET read_at = now()
|
|
||||||
WHERE id = $1 AND user_id = $2 AND tenant_id = $3 AND read_at IS NULL`,
|
|
||||||
notificationID, userID, tenantID)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("mark notification read: %w", err)
|
|
||||||
}
|
|
||||||
rows, _ := result.RowsAffected()
|
|
||||||
if rows == 0 {
|
|
||||||
return fmt.Errorf("notification not found or already read")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// MarkAllRead marks all notifications as read for a user.
|
|
||||||
func (s *NotificationService) MarkAllRead(ctx context.Context, tenantID, userID uuid.UUID) error {
|
|
||||||
_, err := s.db.ExecContext(ctx,
|
|
||||||
`UPDATE notifications SET read_at = now()
|
|
||||||
WHERE user_id = $1 AND tenant_id = $2 AND read_at IS NULL`,
|
|
||||||
userID, tenantID)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetPreferences returns notification preferences for a user, creating defaults if needed.
|
|
||||||
func (s *NotificationService) GetPreferences(ctx context.Context, tenantID, userID uuid.UUID) (*models.NotificationPreferences, error) {
|
|
||||||
var pref models.NotificationPreferences
|
|
||||||
err := s.db.GetContext(ctx, &pref,
|
|
||||||
`SELECT user_id, tenant_id, deadline_reminder_days, email_enabled, daily_digest, created_at, updated_at
|
|
||||||
FROM notification_preferences
|
|
||||||
WHERE user_id = $1 AND tenant_id = $2`,
|
|
||||||
userID, tenantID)
|
|
||||||
if err != nil {
|
|
||||||
// Return defaults if no preferences set
|
|
||||||
return &models.NotificationPreferences{
|
|
||||||
UserID: userID,
|
|
||||||
TenantID: tenantID,
|
|
||||||
DeadlineReminderDays: pq.Int64Array{7, 3, 1},
|
|
||||||
EmailEnabled: true,
|
|
||||||
DailyDigest: false,
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
return &pref, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdatePreferences upserts notification preferences for a user.
|
|
||||||
func (s *NotificationService) UpdatePreferences(ctx context.Context, tenantID, userID uuid.UUID, input UpdatePreferencesInput) (*models.NotificationPreferences, error) {
|
|
||||||
var pref models.NotificationPreferences
|
|
||||||
err := s.db.QueryRowxContext(ctx,
|
|
||||||
`INSERT INTO notification_preferences (user_id, tenant_id, deadline_reminder_days, email_enabled, daily_digest)
|
|
||||||
VALUES ($1, $2, $3, $4, $5)
|
|
||||||
ON CONFLICT (user_id, tenant_id)
|
|
||||||
DO UPDATE SET deadline_reminder_days = $3, email_enabled = $4, daily_digest = $5, updated_at = now()
|
|
||||||
RETURNING user_id, tenant_id, deadline_reminder_days, email_enabled, daily_digest, created_at, updated_at`,
|
|
||||||
userID, tenantID, pq.Int64Array(input.DeadlineReminderDays), input.EmailEnabled, input.DailyDigest).StructScan(&pref)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("update preferences: %w", err)
|
|
||||||
}
|
|
||||||
return &pref, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdatePreferencesInput holds the data for updating notification preferences.
|
|
||||||
type UpdatePreferencesInput struct {
|
|
||||||
DeadlineReminderDays []int64 `json:"deadline_reminder_days"`
|
|
||||||
EmailEnabled bool `json:"email_enabled"`
|
|
||||||
DailyDigest bool `json:"daily_digest"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// SendEmail sends an email using the `m mail send` CLI command.
|
|
||||||
func SendEmail(to, subject, body string) error {
|
|
||||||
cmd := exec.Command("m", "mail", "send",
|
|
||||||
"--to", to,
|
|
||||||
"--subject", subject,
|
|
||||||
"--body", body,
|
|
||||||
"--yes")
|
|
||||||
output, err := cmd.CombinedOutput()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("m mail send failed: %w (output: %s)", err, string(output))
|
|
||||||
}
|
|
||||||
slog.Info("email sent", "to", to, "subject", subject)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// getUserEmail looks up the email for a user from Supabase auth.users.
|
|
||||||
func (s *NotificationService) getUserEmail(ctx context.Context, userID uuid.UUID) string {
|
|
||||||
var email string
|
|
||||||
err := s.db.GetContext(ctx, &email,
|
|
||||||
`SELECT email FROM auth.users WHERE id = $1`, userID)
|
|
||||||
if err != nil {
|
|
||||||
slog.Error("failed to get user email", "error", err, "user_id", userID)
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
return email
|
|
||||||
}
|
|
||||||
|
|
||||||
func containsDay(arr pq.Int64Array, day int64) bool {
|
|
||||||
for _, d := range arr {
|
|
||||||
if d == day {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
func derefStr(s *string) string {
|
|
||||||
if s == nil {
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
return *s
|
|
||||||
}
|
|
||||||
@@ -189,6 +189,40 @@ func (s *TenantService) UpdateSettings(ctx context.Context, tenantID uuid.UUID,
|
|||||||
return &tenant, nil
|
return &tenant, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UpdateMemberRole changes a member's role in a tenant.
|
||||||
|
func (s *TenantService) UpdateMemberRole(ctx context.Context, tenantID, userID uuid.UUID, newRole string) error {
|
||||||
|
// Get current role
|
||||||
|
currentRole, err := s.GetUserRole(ctx, userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("get current role: %w", err)
|
||||||
|
}
|
||||||
|
if currentRole == "" {
|
||||||
|
return fmt.Errorf("user is not a member of this tenant")
|
||||||
|
}
|
||||||
|
|
||||||
|
// If demoting the last owner, block it
|
||||||
|
if currentRole == "owner" && newRole != "owner" {
|
||||||
|
var ownerCount int
|
||||||
|
err := s.db.GetContext(ctx, &ownerCount,
|
||||||
|
`SELECT COUNT(*) FROM user_tenants WHERE tenant_id = $1 AND role = 'owner'`,
|
||||||
|
tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("count owners: %w", err)
|
||||||
|
}
|
||||||
|
if ownerCount <= 1 {
|
||||||
|
return fmt.Errorf("cannot demote the last owner")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = s.db.ExecContext(ctx,
|
||||||
|
`UPDATE user_tenants SET role = $1 WHERE user_id = $2 AND tenant_id = $3`,
|
||||||
|
newRole, userID, tenantID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("update role: %w", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// RemoveMember removes a user from a tenant. Cannot remove the last owner.
|
// RemoveMember removes a user from a tenant. Cannot remove the last owner.
|
||||||
func (s *TenantService) RemoveMember(ctx context.Context, tenantID, userID uuid.UUID) error {
|
func (s *TenantService) RemoveMember(ctx context.Context, tenantID, userID uuid.UUID) error {
|
||||||
// Check if the user being removed is an owner
|
// Check if the user being removed is an owner
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ import {
|
|||||||
Clock,
|
Clock,
|
||||||
FileText,
|
FileText,
|
||||||
Users,
|
Users,
|
||||||
|
UserCheck,
|
||||||
StickyNote,
|
StickyNote,
|
||||||
AlertTriangle,
|
AlertTriangle,
|
||||||
} from "lucide-react";
|
} from "lucide-react";
|
||||||
@@ -43,6 +44,7 @@ const TABS = [
|
|||||||
{ segment: "fristen", label: "Fristen", icon: Clock },
|
{ segment: "fristen", label: "Fristen", icon: Clock },
|
||||||
{ segment: "dokumente", label: "Dokumente", icon: FileText },
|
{ segment: "dokumente", label: "Dokumente", icon: FileText },
|
||||||
{ segment: "parteien", label: "Parteien", icon: Users },
|
{ segment: "parteien", label: "Parteien", icon: Users },
|
||||||
|
{ segment: "mitarbeiter", label: "Mitarbeiter", icon: UserCheck },
|
||||||
{ segment: "notizen", label: "Notizen", icon: StickyNote },
|
{ segment: "notizen", label: "Notizen", icon: StickyNote },
|
||||||
] as const;
|
] as const;
|
||||||
|
|
||||||
@@ -51,6 +53,7 @@ const TAB_LABELS: Record<string, string> = {
|
|||||||
fristen: "Fristen",
|
fristen: "Fristen",
|
||||||
dokumente: "Dokumente",
|
dokumente: "Dokumente",
|
||||||
parteien: "Parteien",
|
parteien: "Parteien",
|
||||||
|
mitarbeiter: "Mitarbeiter",
|
||||||
notizen: "Notizen",
|
notizen: "Notizen",
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
9
frontend/src/app/(app)/cases/[id]/mitarbeiter/page.tsx
Normal file
9
frontend/src/app/(app)/cases/[id]/mitarbeiter/page.tsx
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useParams } from "next/navigation";
|
||||||
|
import { CaseAssignments } from "@/components/cases/CaseAssignments";
|
||||||
|
|
||||||
|
export default function CaseMitarbeiterPage() {
|
||||||
|
const { id } = useParams<{ id: string }>();
|
||||||
|
return <CaseAssignments caseId={id} />;
|
||||||
|
}
|
||||||
@@ -10,6 +10,7 @@ import { Plus, Search, FolderOpen } from "lucide-react";
|
|||||||
import { useState } from "react";
|
import { useState } from "react";
|
||||||
import { SkeletonTable } from "@/components/ui/Skeleton";
|
import { SkeletonTable } from "@/components/ui/Skeleton";
|
||||||
import { EmptyState } from "@/components/ui/EmptyState";
|
import { EmptyState } from "@/components/ui/EmptyState";
|
||||||
|
import { usePermissions } from "@/lib/hooks/usePermissions";
|
||||||
|
|
||||||
const STATUS_OPTIONS = [
|
const STATUS_OPTIONS = [
|
||||||
{ value: "", label: "Alle Status" },
|
{ value: "", label: "Alle Status" },
|
||||||
@@ -49,6 +50,8 @@ const inputClass =
|
|||||||
export default function CasesPage() {
|
export default function CasesPage() {
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
const searchParams = useSearchParams();
|
const searchParams = useSearchParams();
|
||||||
|
const { can } = usePermissions();
|
||||||
|
const canCreateCase = can("create_case");
|
||||||
|
|
||||||
const [search, setSearch] = useState(searchParams.get("search") ?? "");
|
const [search, setSearch] = useState(searchParams.get("search") ?? "");
|
||||||
const [status, setStatus] = useState(searchParams.get("status") ?? "");
|
const [status, setStatus] = useState(searchParams.get("status") ?? "");
|
||||||
@@ -86,13 +89,15 @@ export default function CasesPage() {
|
|||||||
{data ? `${data.total} Akten` : "\u00A0"}
|
{data ? `${data.total} Akten` : "\u00A0"}
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
<Link
|
{canCreateCase && (
|
||||||
href="/cases/new"
|
<Link
|
||||||
className="inline-flex w-fit items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
href="/cases/new"
|
||||||
>
|
className="inline-flex w-fit items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
||||||
<Plus className="h-4 w-4" />
|
>
|
||||||
Neue Akte
|
<Plus className="h-4 w-4" />
|
||||||
</Link>
|
Neue Akte
|
||||||
|
</Link>
|
||||||
|
)}
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div className="mt-4 flex flex-col gap-3 sm:flex-row sm:items-center">
|
<div className="mt-4 flex flex-col gap-3 sm:flex-row sm:items-center">
|
||||||
@@ -145,7 +150,7 @@ export default function CasesPage() {
|
|||||||
: "Erstellen Sie Ihre erste Akte, um loszulegen."
|
: "Erstellen Sie Ihre erste Akte, um loszulegen."
|
||||||
}
|
}
|
||||||
action={
|
action={
|
||||||
!search && !status && !type ? (
|
!search && !status && !type && canCreateCase ? (
|
||||||
<Link
|
<Link
|
||||||
href="/cases/new"
|
href="/cases/new"
|
||||||
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white transition-colors hover:bg-neutral-800"
|
||||||
|
|||||||
@@ -1,12 +1,11 @@
|
|||||||
"use client";
|
"use client";
|
||||||
|
|
||||||
import { useQuery } from "@tanstack/react-query";
|
import { useQuery } from "@tanstack/react-query";
|
||||||
import { Settings, Calendar, Users, Bell } from "lucide-react";
|
import { Settings, Calendar, Users } from "lucide-react";
|
||||||
import Link from "next/link";
|
import Link from "next/link";
|
||||||
import { api } from "@/lib/api";
|
import { api } from "@/lib/api";
|
||||||
import type { Tenant } from "@/lib/types";
|
import type { Tenant } from "@/lib/types";
|
||||||
import { CalDAVSettings } from "@/components/settings/CalDAVSettings";
|
import { CalDAVSettings } from "@/components/settings/CalDAVSettings";
|
||||||
import { NotificationSettings } from "@/components/settings/NotificationSettings";
|
|
||||||
import { SkeletonCard } from "@/components/ui/Skeleton";
|
import { SkeletonCard } from "@/components/ui/Skeleton";
|
||||||
import { EmptyState } from "@/components/ui/EmptyState";
|
import { EmptyState } from "@/components/ui/EmptyState";
|
||||||
|
|
||||||
@@ -98,19 +97,6 @@ export default function EinstellungenPage() {
|
|||||||
</div>
|
</div>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
{/* Notification Settings */}
|
|
||||||
<section className="rounded-xl border border-neutral-200 bg-white p-5">
|
|
||||||
<div className="flex items-center gap-2.5 border-b border-neutral-100 pb-3">
|
|
||||||
<Bell className="h-4 w-4 text-neutral-500" />
|
|
||||||
<h2 className="text-sm font-semibold text-neutral-900">
|
|
||||||
Benachrichtigungen
|
|
||||||
</h2>
|
|
||||||
</div>
|
|
||||||
<div className="mt-4">
|
|
||||||
<NotificationSettings />
|
|
||||||
</div>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
{/* CalDAV Settings */}
|
{/* CalDAV Settings */}
|
||||||
<section className="rounded-xl border border-neutral-200 bg-white p-5">
|
<section className="rounded-xl border border-neutral-200 bg-white p-5">
|
||||||
<div className="flex items-center gap-2.5 border-b border-neutral-100 pb-3">
|
<div className="flex items-center gap-2.5 border-b border-neutral-100 pb-3">
|
||||||
|
|||||||
180
frontend/src/components/cases/CaseAssignments.tsx
Normal file
180
frontend/src/components/cases/CaseAssignments.tsx
Normal file
@@ -0,0 +1,180 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useState } from "react";
|
||||||
|
import { useQuery, useMutation, useQueryClient } from "@tanstack/react-query";
|
||||||
|
import { toast } from "sonner";
|
||||||
|
import { UserPlus, Trash2, Users } from "lucide-react";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { CaseAssignment, UserTenant } from "@/lib/types";
|
||||||
|
import { CASE_ASSIGNMENT_ROLE_LABELS } from "@/lib/types";
|
||||||
|
import type { CaseAssignmentRole } from "@/lib/types";
|
||||||
|
import { Skeleton } from "@/components/ui/Skeleton";
|
||||||
|
import { EmptyState } from "@/components/ui/EmptyState";
|
||||||
|
import { usePermissions } from "@/lib/hooks/usePermissions";
|
||||||
|
|
||||||
|
export function CaseAssignments({ caseId }: { caseId: string }) {
|
||||||
|
const queryClient = useQueryClient();
|
||||||
|
const { can } = usePermissions();
|
||||||
|
const canManage = can("manage_team");
|
||||||
|
|
||||||
|
const tenantId =
|
||||||
|
typeof window !== "undefined"
|
||||||
|
? localStorage.getItem("kanzlai_tenant_id")
|
||||||
|
: null;
|
||||||
|
|
||||||
|
const [selectedUser, setSelectedUser] = useState("");
|
||||||
|
const [assignRole, setAssignRole] = useState<CaseAssignmentRole>("team");
|
||||||
|
|
||||||
|
const { data, isLoading } = useQuery({
|
||||||
|
queryKey: ["case-assignments", caseId],
|
||||||
|
queryFn: () =>
|
||||||
|
api.get<{ assignments: CaseAssignment[]; total: number }>(
|
||||||
|
`/cases/${caseId}/assignments`,
|
||||||
|
),
|
||||||
|
});
|
||||||
|
|
||||||
|
const { data: members } = useQuery({
|
||||||
|
queryKey: ["tenant-members", tenantId],
|
||||||
|
queryFn: () =>
|
||||||
|
api.get<UserTenant[]>(`/tenants/${tenantId}/members`),
|
||||||
|
enabled: !!tenantId && canManage,
|
||||||
|
});
|
||||||
|
|
||||||
|
const assignMutation = useMutation({
|
||||||
|
mutationFn: (input: { user_id: string; role: string }) =>
|
||||||
|
api.post(`/cases/${caseId}/assignments`, input),
|
||||||
|
onSuccess: () => {
|
||||||
|
queryClient.invalidateQueries({ queryKey: ["case-assignments", caseId] });
|
||||||
|
setSelectedUser("");
|
||||||
|
toast.success("Mitarbeiter zugewiesen");
|
||||||
|
},
|
||||||
|
onError: (err: { error?: string }) => {
|
||||||
|
toast.error(err.error || "Fehler beim Zuweisen");
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const unassignMutation = useMutation({
|
||||||
|
mutationFn: (userId: string) =>
|
||||||
|
api.delete(`/cases/${caseId}/assignments/${userId}`),
|
||||||
|
onSuccess: () => {
|
||||||
|
queryClient.invalidateQueries({ queryKey: ["case-assignments", caseId] });
|
||||||
|
toast.success("Zuweisung entfernt");
|
||||||
|
},
|
||||||
|
onError: (err: { error?: string }) => {
|
||||||
|
toast.error(err.error || "Fehler beim Entfernen");
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const assignments = data?.assignments ?? [];
|
||||||
|
const assignedUserIds = new Set(assignments.map((a) => a.user_id));
|
||||||
|
const availableMembers = (members ?? []).filter(
|
||||||
|
(m) => !assignedUserIds.has(m.user_id),
|
||||||
|
);
|
||||||
|
|
||||||
|
const handleAssign = (e: React.FormEvent) => {
|
||||||
|
e.preventDefault();
|
||||||
|
if (!selectedUser) return;
|
||||||
|
assignMutation.mutate({ user_id: selectedUser, role: assignRole });
|
||||||
|
};
|
||||||
|
|
||||||
|
if (isLoading) {
|
||||||
|
return (
|
||||||
|
<div className="space-y-3">
|
||||||
|
<Skeleton className="h-10 w-full" />
|
||||||
|
<Skeleton className="h-10 w-full" />
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="space-y-4">
|
||||||
|
<h3 className="text-sm font-semibold text-neutral-900">
|
||||||
|
Zugewiesene Mitarbeiter
|
||||||
|
</h3>
|
||||||
|
|
||||||
|
{/* Assign form — only for owners/partners */}
|
||||||
|
{canManage && availableMembers.length > 0 && (
|
||||||
|
<form onSubmit={handleAssign} className="flex flex-col gap-2 sm:flex-row">
|
||||||
|
<select
|
||||||
|
value={selectedUser}
|
||||||
|
onChange={(e) => setSelectedUser(e.target.value)}
|
||||||
|
className="flex-1 rounded-md border border-neutral-200 px-2 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
||||||
|
>
|
||||||
|
<option value="">Mitarbeiter auswählen...</option>
|
||||||
|
{availableMembers.map((m) => (
|
||||||
|
<option key={m.user_id} value={m.user_id}>
|
||||||
|
{m.user_id.slice(0, 8)}... ({m.role})
|
||||||
|
</option>
|
||||||
|
))}
|
||||||
|
</select>
|
||||||
|
<select
|
||||||
|
value={assignRole}
|
||||||
|
onChange={(e) => setAssignRole(e.target.value as CaseAssignmentRole)}
|
||||||
|
className="rounded-md border border-neutral-200 px-2 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
||||||
|
>
|
||||||
|
{(Object.keys(CASE_ASSIGNMENT_ROLE_LABELS) as CaseAssignmentRole[]).map(
|
||||||
|
(r) => (
|
||||||
|
<option key={r} value={r}>
|
||||||
|
{CASE_ASSIGNMENT_ROLE_LABELS[r]}
|
||||||
|
</option>
|
||||||
|
),
|
||||||
|
)}
|
||||||
|
</select>
|
||||||
|
<button
|
||||||
|
type="submit"
|
||||||
|
disabled={assignMutation.isPending || !selectedUser}
|
||||||
|
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-3 py-1.5 text-sm font-medium text-white hover:bg-neutral-800 disabled:opacity-50"
|
||||||
|
>
|
||||||
|
<UserPlus className="h-3.5 w-3.5" />
|
||||||
|
Zuweisen
|
||||||
|
</button>
|
||||||
|
</form>
|
||||||
|
)}
|
||||||
|
|
||||||
|
{/* Assignments list */}
|
||||||
|
{assignments.length > 0 ? (
|
||||||
|
<div className="overflow-hidden rounded-md border border-neutral-200">
|
||||||
|
{assignments.map((a, i) => (
|
||||||
|
<div
|
||||||
|
key={a.id}
|
||||||
|
className={`flex items-center justify-between px-4 py-2.5 ${
|
||||||
|
i < assignments.length - 1 ? "border-b border-neutral-100" : ""
|
||||||
|
}`}
|
||||||
|
>
|
||||||
|
<div className="flex items-center gap-3">
|
||||||
|
<div className="flex h-7 w-7 items-center justify-center rounded-full bg-neutral-100">
|
||||||
|
<Users className="h-3.5 w-3.5 text-neutral-500" />
|
||||||
|
</div>
|
||||||
|
<div>
|
||||||
|
<p className="text-sm text-neutral-900">
|
||||||
|
{a.user_id.slice(0, 8)}...
|
||||||
|
</p>
|
||||||
|
<p className="text-xs text-neutral-500">
|
||||||
|
{CASE_ASSIGNMENT_ROLE_LABELS[a.role as CaseAssignmentRole] ??
|
||||||
|
a.role}
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{canManage && (
|
||||||
|
<button
|
||||||
|
onClick={() => unassignMutation.mutate(a.user_id)}
|
||||||
|
disabled={unassignMutation.isPending}
|
||||||
|
className="rounded-md p-1 text-neutral-400 hover:bg-red-50 hover:text-red-600 disabled:opacity-50"
|
||||||
|
title="Zuweisung entfernen"
|
||||||
|
>
|
||||||
|
<Trash2 className="h-3.5 w-3.5" />
|
||||||
|
</button>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
) : (
|
||||||
|
<EmptyState
|
||||||
|
icon={Users}
|
||||||
|
title="Keine Zuweisungen"
|
||||||
|
description="Noch keine Mitarbeiter zugewiesen."
|
||||||
|
/>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
@@ -2,7 +2,6 @@
|
|||||||
|
|
||||||
import { createClient } from "@/lib/supabase/client";
|
import { createClient } from "@/lib/supabase/client";
|
||||||
import { TenantSwitcher } from "./TenantSwitcher";
|
import { TenantSwitcher } from "./TenantSwitcher";
|
||||||
import { NotificationBell } from "@/components/notifications/NotificationBell";
|
|
||||||
import { LogOut } from "lucide-react";
|
import { LogOut } from "lucide-react";
|
||||||
import { useRouter } from "next/navigation";
|
import { useRouter } from "next/navigation";
|
||||||
import { useEffect, useState } from "react";
|
import { useEffect, useState } from "react";
|
||||||
@@ -30,7 +29,6 @@ export function Header() {
|
|||||||
<div className="w-8 lg:w-0" />
|
<div className="w-8 lg:w-0" />
|
||||||
<div className="flex items-center gap-2 sm:gap-3">
|
<div className="flex items-center gap-2 sm:gap-3">
|
||||||
<TenantSwitcher />
|
<TenantSwitcher />
|
||||||
<NotificationBell />
|
|
||||||
{email && (
|
{email && (
|
||||||
<span className="hidden text-sm text-neutral-500 sm:inline">
|
<span className="hidden text-sm text-neutral-500 sm:inline">
|
||||||
{email}
|
{email}
|
||||||
|
|||||||
@@ -13,19 +13,32 @@ import {
|
|||||||
X,
|
X,
|
||||||
} from "lucide-react";
|
} from "lucide-react";
|
||||||
import { useState, useEffect } from "react";
|
import { useState, useEffect } from "react";
|
||||||
|
import { usePermissions } from "@/lib/hooks/usePermissions";
|
||||||
|
|
||||||
const navigation = [
|
interface NavItem {
|
||||||
|
name: string;
|
||||||
|
href: string;
|
||||||
|
icon: typeof LayoutDashboard;
|
||||||
|
permission?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
const allNavigation: NavItem[] = [
|
||||||
{ name: "Dashboard", href: "/dashboard", icon: LayoutDashboard },
|
{ name: "Dashboard", href: "/dashboard", icon: LayoutDashboard },
|
||||||
{ name: "Akten", href: "/cases", icon: FolderOpen },
|
{ name: "Akten", href: "/cases", icon: FolderOpen },
|
||||||
{ name: "Fristen", href: "/fristen", icon: Clock },
|
{ name: "Fristen", href: "/fristen", icon: Clock },
|
||||||
{ name: "Termine", href: "/termine", icon: Calendar },
|
{ name: "Termine", href: "/termine", icon: Calendar },
|
||||||
{ name: "AI Analyse", href: "/ai/extract", icon: Brain },
|
{ name: "AI Analyse", href: "/ai/extract", icon: Brain, permission: "ai_extraction" },
|
||||||
{ name: "Einstellungen", href: "/einstellungen", icon: Settings },
|
{ name: "Einstellungen", href: "/einstellungen", icon: Settings, permission: "manage_settings" },
|
||||||
];
|
];
|
||||||
|
|
||||||
export function Sidebar() {
|
export function Sidebar() {
|
||||||
const pathname = usePathname();
|
const pathname = usePathname();
|
||||||
const [mobileOpen, setMobileOpen] = useState(false);
|
const [mobileOpen, setMobileOpen] = useState(false);
|
||||||
|
const { can, isLoading: permLoading } = usePermissions();
|
||||||
|
|
||||||
|
const navigation = allNavigation.filter(
|
||||||
|
(item) => !item.permission || permLoading || can(item.permission),
|
||||||
|
);
|
||||||
|
|
||||||
// Close on route change
|
// Close on route change
|
||||||
useEffect(() => {
|
useEffect(() => {
|
||||||
|
|||||||
@@ -1,205 +0,0 @@
|
|||||||
"use client";
|
|
||||||
|
|
||||||
import { useEffect, useRef, useState } from "react";
|
|
||||||
import { useQuery, useMutation, useQueryClient } from "@tanstack/react-query";
|
|
||||||
import { Bell, Check, CheckCheck, ExternalLink } from "lucide-react";
|
|
||||||
import { api } from "@/lib/api";
|
|
||||||
import type { Notification, NotificationListResponse } from "@/lib/types";
|
|
||||||
|
|
||||||
function getEntityLink(n: Notification): string | null {
|
|
||||||
if (!n.entity_type || !n.entity_id) return null;
|
|
||||||
switch (n.entity_type) {
|
|
||||||
case "deadline":
|
|
||||||
return `/fristen/${n.entity_id}`;
|
|
||||||
case "appointment":
|
|
||||||
return `/termine/${n.entity_id}`;
|
|
||||||
case "case":
|
|
||||||
return `/akten/${n.entity_id}`;
|
|
||||||
default:
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getTypeColor(type: Notification["type"]): string {
|
|
||||||
switch (type) {
|
|
||||||
case "deadline_overdue":
|
|
||||||
return "bg-red-500";
|
|
||||||
case "deadline_reminder":
|
|
||||||
return "bg-amber-500";
|
|
||||||
case "case_update":
|
|
||||||
return "bg-blue-500";
|
|
||||||
case "assignment":
|
|
||||||
return "bg-violet-500";
|
|
||||||
default:
|
|
||||||
return "bg-neutral-500";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function timeAgo(dateStr: string): string {
|
|
||||||
const now = new Date();
|
|
||||||
const date = new Date(dateStr);
|
|
||||||
const diffMs = now.getTime() - date.getTime();
|
|
||||||
const diffMin = Math.floor(diffMs / 60000);
|
|
||||||
if (diffMin < 1) return "gerade eben";
|
|
||||||
if (diffMin < 60) return `vor ${diffMin} Min.`;
|
|
||||||
const diffHours = Math.floor(diffMin / 60);
|
|
||||||
if (diffHours < 24) return `vor ${diffHours} Std.`;
|
|
||||||
const diffDays = Math.floor(diffHours / 24);
|
|
||||||
if (diffDays === 1) return "gestern";
|
|
||||||
return `vor ${diffDays} Tagen`;
|
|
||||||
}
|
|
||||||
|
|
||||||
export function NotificationBell() {
|
|
||||||
const [open, setOpen] = useState(false);
|
|
||||||
const panelRef = useRef<HTMLDivElement>(null);
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
|
|
||||||
const { data: unreadData } = useQuery({
|
|
||||||
queryKey: ["notifications-unread-count"],
|
|
||||||
queryFn: () =>
|
|
||||||
api.get<{ unread_count: number }>("/api/notifications/unread-count"),
|
|
||||||
refetchInterval: 30_000,
|
|
||||||
});
|
|
||||||
|
|
||||||
const { data: notifData } = useQuery({
|
|
||||||
queryKey: ["notifications"],
|
|
||||||
queryFn: () =>
|
|
||||||
api.get<NotificationListResponse>("/api/notifications?limit=20"),
|
|
||||||
enabled: open,
|
|
||||||
});
|
|
||||||
|
|
||||||
const markRead = useMutation({
|
|
||||||
mutationFn: (id: string) =>
|
|
||||||
api.patch(`/api/notifications/${id}/read`),
|
|
||||||
onSuccess: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["notifications"] });
|
|
||||||
queryClient.invalidateQueries({
|
|
||||||
queryKey: ["notifications-unread-count"],
|
|
||||||
});
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
const markAllRead = useMutation({
|
|
||||||
mutationFn: () => api.patch("/api/notifications/read-all"),
|
|
||||||
onSuccess: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["notifications"] });
|
|
||||||
queryClient.invalidateQueries({
|
|
||||||
queryKey: ["notifications-unread-count"],
|
|
||||||
});
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
// Close on click outside
|
|
||||||
useEffect(() => {
|
|
||||||
function handleClickOutside(e: MouseEvent) {
|
|
||||||
if (panelRef.current && !panelRef.current.contains(e.target as Node)) {
|
|
||||||
setOpen(false);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (open) {
|
|
||||||
document.addEventListener("mousedown", handleClickOutside);
|
|
||||||
}
|
|
||||||
return () => document.removeEventListener("mousedown", handleClickOutside);
|
|
||||||
}, [open]);
|
|
||||||
|
|
||||||
const unreadCount = unreadData?.unread_count ?? 0;
|
|
||||||
const notifications = notifData?.data ?? [];
|
|
||||||
|
|
||||||
return (
|
|
||||||
<div className="relative" ref={panelRef}>
|
|
||||||
<button
|
|
||||||
onClick={() => setOpen(!open)}
|
|
||||||
className="relative rounded-md p-1.5 text-neutral-400 transition-colors hover:bg-neutral-100 hover:text-neutral-600"
|
|
||||||
title="Benachrichtigungen"
|
|
||||||
>
|
|
||||||
<Bell className="h-4 w-4" />
|
|
||||||
{unreadCount > 0 && (
|
|
||||||
<span className="absolute -right-0.5 -top-0.5 flex h-4 min-w-4 items-center justify-center rounded-full bg-red-500 px-1 text-[10px] font-bold text-white">
|
|
||||||
{unreadCount > 99 ? "99+" : unreadCount}
|
|
||||||
</span>
|
|
||||||
)}
|
|
||||||
</button>
|
|
||||||
|
|
||||||
{open && (
|
|
||||||
<div className="absolute right-0 top-full z-50 mt-2 w-80 rounded-xl border border-neutral-200 bg-white shadow-lg sm:w-96">
|
|
||||||
{/* Header */}
|
|
||||||
<div className="flex items-center justify-between border-b border-neutral-100 px-4 py-3">
|
|
||||||
<h3 className="text-sm font-semibold text-neutral-900">
|
|
||||||
Benachrichtigungen
|
|
||||||
</h3>
|
|
||||||
{unreadCount > 0 && (
|
|
||||||
<button
|
|
||||||
onClick={() => markAllRead.mutate()}
|
|
||||||
className="flex items-center gap-1 text-xs text-neutral-500 hover:text-neutral-700"
|
|
||||||
>
|
|
||||||
<CheckCheck className="h-3 w-3" />
|
|
||||||
Alle gelesen
|
|
||||||
</button>
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
|
|
||||||
{/* Notification list */}
|
|
||||||
<div className="max-h-96 overflow-y-auto">
|
|
||||||
{notifications.length === 0 ? (
|
|
||||||
<div className="p-6 text-center text-sm text-neutral-400">
|
|
||||||
Keine Benachrichtigungen
|
|
||||||
</div>
|
|
||||||
) : (
|
|
||||||
notifications.map((n) => {
|
|
||||||
const link = getEntityLink(n);
|
|
||||||
return (
|
|
||||||
<div
|
|
||||||
key={n.id}
|
|
||||||
className={`flex items-start gap-3 border-b border-neutral-50 px-4 py-3 transition-colors last:border-0 ${
|
|
||||||
n.read_at
|
|
||||||
? "bg-white"
|
|
||||||
: "bg-blue-50/50"
|
|
||||||
}`}
|
|
||||||
>
|
|
||||||
<div
|
|
||||||
className={`mt-1.5 h-2 w-2 flex-shrink-0 rounded-full ${getTypeColor(n.type)}`}
|
|
||||||
/>
|
|
||||||
<div className="min-w-0 flex-1">
|
|
||||||
<p className="text-sm font-medium text-neutral-900 leading-snug">
|
|
||||||
{n.title}
|
|
||||||
</p>
|
|
||||||
{n.body && (
|
|
||||||
<p className="mt-0.5 text-xs text-neutral-500 line-clamp-2">
|
|
||||||
{n.body}
|
|
||||||
</p>
|
|
||||||
)}
|
|
||||||
<div className="mt-1.5 flex items-center gap-2">
|
|
||||||
<span className="text-[11px] text-neutral-400">
|
|
||||||
{timeAgo(n.created_at)}
|
|
||||||
</span>
|
|
||||||
{link && (
|
|
||||||
<a
|
|
||||||
href={link}
|
|
||||||
onClick={() => setOpen(false)}
|
|
||||||
className="flex items-center gap-0.5 text-[11px] text-blue-600 hover:text-blue-700"
|
|
||||||
>
|
|
||||||
<ExternalLink className="h-2.5 w-2.5" />
|
|
||||||
Anzeigen
|
|
||||||
</a>
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
{!n.read_at && (
|
|
||||||
<button
|
|
||||||
onClick={() => markRead.mutate(n.id)}
|
|
||||||
className="flex-shrink-0 rounded p-1 text-neutral-400 hover:bg-neutral-100 hover:text-neutral-600"
|
|
||||||
title="Als gelesen markieren"
|
|
||||||
>
|
|
||||||
<Check className="h-3 w-3" />
|
|
||||||
</button>
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
);
|
|
||||||
})
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
);
|
|
||||||
}
|
|
||||||
@@ -1,167 +0,0 @@
|
|||||||
"use client";
|
|
||||||
|
|
||||||
import { useState } from "react";
|
|
||||||
import { useQuery, useMutation, useQueryClient } from "@tanstack/react-query";
|
|
||||||
import { api } from "@/lib/api";
|
|
||||||
import type { NotificationPreferences } from "@/lib/types";
|
|
||||||
|
|
||||||
const REMINDER_OPTIONS = [
|
|
||||||
{ value: 14, label: "14 Tage" },
|
|
||||||
{ value: 7, label: "7 Tage" },
|
|
||||||
{ value: 3, label: "3 Tage" },
|
|
||||||
{ value: 1, label: "1 Tag" },
|
|
||||||
];
|
|
||||||
|
|
||||||
export function NotificationSettings() {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
const [saved, setSaved] = useState(false);
|
|
||||||
|
|
||||||
const { data: prefs, isLoading } = useQuery({
|
|
||||||
queryKey: ["notification-preferences"],
|
|
||||||
queryFn: () =>
|
|
||||||
api.get<NotificationPreferences>("/api/notification-preferences"),
|
|
||||||
});
|
|
||||||
|
|
||||||
const [reminderDays, setReminderDays] = useState<number[]>([]);
|
|
||||||
const [emailEnabled, setEmailEnabled] = useState(true);
|
|
||||||
const [dailyDigest, setDailyDigest] = useState(false);
|
|
||||||
const [initialized, setInitialized] = useState(false);
|
|
||||||
|
|
||||||
// Sync state from server once loaded
|
|
||||||
if (prefs && !initialized) {
|
|
||||||
setReminderDays(prefs.deadline_reminder_days);
|
|
||||||
setEmailEnabled(prefs.email_enabled);
|
|
||||||
setDailyDigest(prefs.daily_digest);
|
|
||||||
setInitialized(true);
|
|
||||||
}
|
|
||||||
|
|
||||||
const update = useMutation({
|
|
||||||
mutationFn: (input: {
|
|
||||||
deadline_reminder_days: number[];
|
|
||||||
email_enabled: boolean;
|
|
||||||
daily_digest: boolean;
|
|
||||||
}) => api.put<NotificationPreferences>("/api/notification-preferences", input),
|
|
||||||
onSuccess: () => {
|
|
||||||
queryClient.invalidateQueries({
|
|
||||||
queryKey: ["notification-preferences"],
|
|
||||||
});
|
|
||||||
setSaved(true);
|
|
||||||
setTimeout(() => setSaved(false), 2000);
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
function toggleDay(day: number) {
|
|
||||||
setReminderDays((prev) =>
|
|
||||||
prev.includes(day) ? prev.filter((d) => d !== day) : [...prev, day].sort((a, b) => b - a),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function handleSave() {
|
|
||||||
update.mutate({
|
|
||||||
deadline_reminder_days: reminderDays,
|
|
||||||
email_enabled: emailEnabled,
|
|
||||||
daily_digest: dailyDigest,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
if (isLoading) {
|
|
||||||
return (
|
|
||||||
<div className="animate-pulse space-y-3">
|
|
||||||
<div className="h-4 w-48 rounded bg-neutral-200" />
|
|
||||||
<div className="h-8 w-full rounded bg-neutral-100" />
|
|
||||||
<div className="h-8 w-full rounded bg-neutral-100" />
|
|
||||||
</div>
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
return (
|
|
||||||
<div className="space-y-5">
|
|
||||||
{/* Reminder days */}
|
|
||||||
<div>
|
|
||||||
<p className="text-sm font-medium text-neutral-700">
|
|
||||||
Fristen-Erinnerungen
|
|
||||||
</p>
|
|
||||||
<p className="mt-0.5 text-xs text-neutral-500">
|
|
||||||
Erinnern Sie mich vor Fristablauf:
|
|
||||||
</p>
|
|
||||||
<div className="mt-2 flex flex-wrap gap-2">
|
|
||||||
{REMINDER_OPTIONS.map((opt) => (
|
|
||||||
<button
|
|
||||||
key={opt.value}
|
|
||||||
onClick={() => toggleDay(opt.value)}
|
|
||||||
className={`rounded-lg border px-3 py-1.5 text-sm transition-colors ${
|
|
||||||
reminderDays.includes(opt.value)
|
|
||||||
? "border-blue-500 bg-blue-50 text-blue-700"
|
|
||||||
: "border-neutral-200 bg-white text-neutral-600 hover:border-neutral-300"
|
|
||||||
}`}
|
|
||||||
>
|
|
||||||
{opt.label}
|
|
||||||
</button>
|
|
||||||
))}
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
{/* Email toggle */}
|
|
||||||
<label className="flex items-center justify-between">
|
|
||||||
<div>
|
|
||||||
<p className="text-sm font-medium text-neutral-700">
|
|
||||||
E-Mail-Benachrichtigungen
|
|
||||||
</p>
|
|
||||||
<p className="text-xs text-neutral-500">
|
|
||||||
Erinnerungen per E-Mail erhalten
|
|
||||||
</p>
|
|
||||||
</div>
|
|
||||||
<button
|
|
||||||
onClick={() => setEmailEnabled(!emailEnabled)}
|
|
||||||
className={`relative h-6 w-11 rounded-full transition-colors ${
|
|
||||||
emailEnabled ? "bg-blue-500" : "bg-neutral-300"
|
|
||||||
}`}
|
|
||||||
>
|
|
||||||
<span
|
|
||||||
className={`absolute left-0.5 top-0.5 h-5 w-5 rounded-full bg-white shadow transition-transform ${
|
|
||||||
emailEnabled ? "translate-x-5" : "translate-x-0"
|
|
||||||
}`}
|
|
||||||
/>
|
|
||||||
</button>
|
|
||||||
</label>
|
|
||||||
|
|
||||||
{/* Daily digest toggle */}
|
|
||||||
<label className="flex items-center justify-between">
|
|
||||||
<div>
|
|
||||||
<p className="text-sm font-medium text-neutral-700">
|
|
||||||
Tagesübersicht
|
|
||||||
</p>
|
|
||||||
<p className="text-xs text-neutral-500">
|
|
||||||
Alle Benachrichtigungen gesammelt um 8:00 Uhr per E-Mail
|
|
||||||
</p>
|
|
||||||
</div>
|
|
||||||
<button
|
|
||||||
onClick={() => setDailyDigest(!dailyDigest)}
|
|
||||||
className={`relative h-6 w-11 rounded-full transition-colors ${
|
|
||||||
dailyDigest ? "bg-blue-500" : "bg-neutral-300"
|
|
||||||
}`}
|
|
||||||
>
|
|
||||||
<span
|
|
||||||
className={`absolute left-0.5 top-0.5 h-5 w-5 rounded-full bg-white shadow transition-transform ${
|
|
||||||
dailyDigest ? "translate-x-5" : "translate-x-0"
|
|
||||||
}`}
|
|
||||||
/>
|
|
||||||
</button>
|
|
||||||
</label>
|
|
||||||
|
|
||||||
{/* Save */}
|
|
||||||
<div className="flex items-center gap-3 pt-2">
|
|
||||||
<button
|
|
||||||
onClick={handleSave}
|
|
||||||
disabled={update.isPending}
|
|
||||||
className="rounded-md bg-neutral-900 px-4 py-2 text-sm font-medium text-white hover:bg-neutral-800 disabled:opacity-50"
|
|
||||||
>
|
|
||||||
{update.isPending ? "Speichern..." : "Speichern"}
|
|
||||||
</button>
|
|
||||||
{saved && (
|
|
||||||
<span className="text-sm text-green-600">Gespeichert</span>
|
|
||||||
)}
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
);
|
|
||||||
}
|
|
||||||
@@ -3,27 +3,36 @@
|
|||||||
import { useState } from "react";
|
import { useState } from "react";
|
||||||
import { useQuery, useMutation, useQueryClient } from "@tanstack/react-query";
|
import { useQuery, useMutation, useQueryClient } from "@tanstack/react-query";
|
||||||
import { toast } from "sonner";
|
import { toast } from "sonner";
|
||||||
import { UserPlus, Trash2, Shield, Crown, User } from "lucide-react";
|
import { UserPlus, Trash2, Crown, Scale, Briefcase, FileText, Phone } from "lucide-react";
|
||||||
import { api } from "@/lib/api";
|
import { api } from "@/lib/api";
|
||||||
import type { UserTenant } from "@/lib/types";
|
import type { UserTenant, UserRole } from "@/lib/types";
|
||||||
|
import { ROLE_LABELS } from "@/lib/types";
|
||||||
import { Skeleton } from "@/components/ui/Skeleton";
|
import { Skeleton } from "@/components/ui/Skeleton";
|
||||||
import { EmptyState } from "@/components/ui/EmptyState";
|
import { EmptyState } from "@/components/ui/EmptyState";
|
||||||
|
import { usePermissions } from "@/lib/hooks/usePermissions";
|
||||||
|
|
||||||
const ROLE_LABELS: Record<string, { label: string; icon: typeof Crown }> = {
|
const ROLE_CONFIG: Record<UserRole, { label: string; icon: typeof Crown }> = {
|
||||||
owner: { label: "Eigentümer", icon: Crown },
|
owner: { label: ROLE_LABELS.owner, icon: Crown },
|
||||||
admin: { label: "Administrator", icon: Shield },
|
partner: { label: ROLE_LABELS.partner, icon: Scale },
|
||||||
member: { label: "Mitglied", icon: User },
|
associate: { label: ROLE_LABELS.associate, icon: Briefcase },
|
||||||
|
paralegal: { label: ROLE_LABELS.paralegal, icon: FileText },
|
||||||
|
secretary: { label: ROLE_LABELS.secretary, icon: Phone },
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const INVITE_ROLES: UserRole[] = ["partner", "associate", "paralegal", "secretary"];
|
||||||
|
|
||||||
export function TeamSettings() {
|
export function TeamSettings() {
|
||||||
const queryClient = useQueryClient();
|
const queryClient = useQueryClient();
|
||||||
|
const { can, role: myRole } = usePermissions();
|
||||||
const tenantId =
|
const tenantId =
|
||||||
typeof window !== "undefined"
|
typeof window !== "undefined"
|
||||||
? localStorage.getItem("kanzlai_tenant_id")
|
? localStorage.getItem("kanzlai_tenant_id")
|
||||||
: null;
|
: null;
|
||||||
|
|
||||||
const [email, setEmail] = useState("");
|
const [email, setEmail] = useState("");
|
||||||
const [role, setRole] = useState("member");
|
const [role, setRole] = useState<string>("associate");
|
||||||
|
|
||||||
|
const canManageTeam = can("manage_team");
|
||||||
|
|
||||||
const {
|
const {
|
||||||
data: members,
|
data: members,
|
||||||
@@ -42,7 +51,7 @@ export function TeamSettings() {
|
|||||||
onSuccess: () => {
|
onSuccess: () => {
|
||||||
queryClient.invalidateQueries({ queryKey: ["tenant-members"] });
|
queryClient.invalidateQueries({ queryKey: ["tenant-members"] });
|
||||||
setEmail("");
|
setEmail("");
|
||||||
setRole("member");
|
setRole("associate");
|
||||||
toast.success("Benutzer eingeladen");
|
toast.success("Benutzer eingeladen");
|
||||||
},
|
},
|
||||||
onError: (err: { error?: string }) => {
|
onError: (err: { error?: string }) => {
|
||||||
@@ -62,6 +71,19 @@ export function TeamSettings() {
|
|||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
|
const updateRoleMutation = useMutation({
|
||||||
|
mutationFn: ({ userId, newRole }: { userId: string; newRole: string }) =>
|
||||||
|
api.put(`/tenants/${tenantId}/members/${userId}/role`, { role: newRole }),
|
||||||
|
onSuccess: () => {
|
||||||
|
queryClient.invalidateQueries({ queryKey: ["tenant-members"] });
|
||||||
|
queryClient.invalidateQueries({ queryKey: ["me"] });
|
||||||
|
toast.success("Rolle aktualisiert");
|
||||||
|
},
|
||||||
|
onError: (err: { error?: string }) => {
|
||||||
|
toast.error(err.error || "Fehler beim Aktualisieren der Rolle");
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
const handleInvite = (e: React.FormEvent) => {
|
const handleInvite = (e: React.FormEvent) => {
|
||||||
e.preventDefault();
|
e.preventDefault();
|
||||||
if (!email.trim()) return;
|
if (!email.trim()) return;
|
||||||
@@ -81,7 +103,7 @@ export function TeamSettings() {
|
|||||||
if (error) {
|
if (error) {
|
||||||
return (
|
return (
|
||||||
<EmptyState
|
<EmptyState
|
||||||
icon={User}
|
icon={Briefcase}
|
||||||
title="Fehler beim Laden"
|
title="Fehler beim Laden"
|
||||||
description="Team-Mitglieder konnten nicht geladen werden."
|
description="Team-Mitglieder konnten nicht geladen werden."
|
||||||
/>
|
/>
|
||||||
@@ -90,38 +112,44 @@ export function TeamSettings() {
|
|||||||
|
|
||||||
return (
|
return (
|
||||||
<div className="space-y-6">
|
<div className="space-y-6">
|
||||||
{/* Invite Form */}
|
{/* Invite Form — only for owners/partners */}
|
||||||
<form onSubmit={handleInvite} className="flex flex-col gap-3 sm:flex-row">
|
{canManageTeam && (
|
||||||
<input
|
<form onSubmit={handleInvite} className="flex flex-col gap-3 sm:flex-row">
|
||||||
type="email"
|
<input
|
||||||
value={email}
|
type="email"
|
||||||
onChange={(e) => setEmail(e.target.value)}
|
value={email}
|
||||||
placeholder="name@example.com"
|
onChange={(e) => setEmail(e.target.value)}
|
||||||
className="flex-1 rounded-md border border-neutral-200 px-3 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
placeholder="name@example.com"
|
||||||
/>
|
className="flex-1 rounded-md border border-neutral-200 px-3 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
||||||
<select
|
/>
|
||||||
value={role}
|
<select
|
||||||
onChange={(e) => setRole(e.target.value)}
|
value={role}
|
||||||
className="rounded-md border border-neutral-200 px-2 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
onChange={(e) => setRole(e.target.value)}
|
||||||
>
|
className="rounded-md border border-neutral-200 px-2 py-1.5 text-sm outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
||||||
<option value="member">Mitglied</option>
|
>
|
||||||
<option value="admin">Administrator</option>
|
{INVITE_ROLES.map((r) => (
|
||||||
</select>
|
<option key={r} value={r}>
|
||||||
<button
|
{ROLE_LABELS[r]}
|
||||||
type="submit"
|
</option>
|
||||||
disabled={inviteMutation.isPending || !email.trim()}
|
))}
|
||||||
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-4 py-1.5 text-sm font-medium text-white hover:bg-neutral-800 disabled:opacity-50"
|
</select>
|
||||||
>
|
<button
|
||||||
<UserPlus className="h-3.5 w-3.5" />
|
type="submit"
|
||||||
{inviteMutation.isPending ? "Einladen..." : "Einladen"}
|
disabled={inviteMutation.isPending || !email.trim()}
|
||||||
</button>
|
className="inline-flex items-center gap-1.5 rounded-md bg-neutral-900 px-4 py-1.5 text-sm font-medium text-white hover:bg-neutral-800 disabled:opacity-50"
|
||||||
</form>
|
>
|
||||||
|
<UserPlus className="h-3.5 w-3.5" />
|
||||||
|
{inviteMutation.isPending ? "Einladen..." : "Einladen"}
|
||||||
|
</button>
|
||||||
|
</form>
|
||||||
|
)}
|
||||||
|
|
||||||
{/* Members List */}
|
{/* Members List */}
|
||||||
{Array.isArray(members) && members.length > 0 ? (
|
{Array.isArray(members) && members.length > 0 ? (
|
||||||
<div className="overflow-hidden rounded-md border border-neutral-200">
|
<div className="overflow-hidden rounded-md border border-neutral-200">
|
||||||
{members.map((member, i) => {
|
{members.map((member, i) => {
|
||||||
const roleInfo = ROLE_LABELS[member.role] || ROLE_LABELS.member;
|
const roleKey = (member.role as UserRole) || "associate";
|
||||||
|
const roleInfo = ROLE_CONFIG[roleKey] || ROLE_CONFIG.associate;
|
||||||
const RoleIcon = roleInfo.icon;
|
const RoleIcon = roleInfo.icon;
|
||||||
return (
|
return (
|
||||||
<div
|
<div
|
||||||
@@ -141,23 +169,48 @@ export function TeamSettings() {
|
|||||||
<p className="text-xs text-neutral-500">{roleInfo.label}</p>
|
<p className="text-xs text-neutral-500">{roleInfo.label}</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
{member.role !== "owner" && (
|
<div className="flex items-center gap-2">
|
||||||
<button
|
{/* Role dropdown — only for owners/partners, not for the member's own row if they are owner */}
|
||||||
onClick={() => removeMutation.mutate(member.user_id)}
|
{canManageTeam && member.role !== "owner" && (
|
||||||
disabled={removeMutation.isPending}
|
<select
|
||||||
className="rounded-md p-1.5 text-neutral-400 hover:bg-red-50 hover:text-red-600 disabled:opacity-50"
|
value={member.role}
|
||||||
title="Mitglied entfernen"
|
onChange={(e) =>
|
||||||
>
|
updateRoleMutation.mutate({
|
||||||
<Trash2 className="h-4 w-4" />
|
userId: member.user_id,
|
||||||
</button>
|
newRole: e.target.value,
|
||||||
)}
|
})
|
||||||
|
}
|
||||||
|
disabled={updateRoleMutation.isPending}
|
||||||
|
className="rounded-md border border-neutral-200 px-2 py-1 text-xs outline-none focus:border-neutral-400 focus:ring-1 focus:ring-neutral-400"
|
||||||
|
>
|
||||||
|
{myRole === "owner" && (
|
||||||
|
<option value="owner">{ROLE_LABELS.owner}</option>
|
||||||
|
)}
|
||||||
|
{INVITE_ROLES.map((r) => (
|
||||||
|
<option key={r} value={r}>
|
||||||
|
{ROLE_LABELS[r]}
|
||||||
|
</option>
|
||||||
|
))}
|
||||||
|
</select>
|
||||||
|
)}
|
||||||
|
{canManageTeam && member.role !== "owner" && (
|
||||||
|
<button
|
||||||
|
onClick={() => removeMutation.mutate(member.user_id)}
|
||||||
|
disabled={removeMutation.isPending}
|
||||||
|
className="rounded-md p-1.5 text-neutral-400 hover:bg-red-50 hover:text-red-600 disabled:opacity-50"
|
||||||
|
title="Mitglied entfernen"
|
||||||
|
>
|
||||||
|
<Trash2 className="h-4 w-4" />
|
||||||
|
</button>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
})}
|
})}
|
||||||
</div>
|
</div>
|
||||||
) : (
|
) : (
|
||||||
<EmptyState
|
<EmptyState
|
||||||
icon={User}
|
icon={Briefcase}
|
||||||
title="Noch keine Mitglieder"
|
title="Noch keine Mitglieder"
|
||||||
description="Laden Sie Teammitglieder per E-Mail ein."
|
description="Laden Sie Teammitglieder per E-Mail ein."
|
||||||
/>
|
/>
|
||||||
|
|||||||
29
frontend/src/lib/hooks/usePermissions.ts
Normal file
29
frontend/src/lib/hooks/usePermissions.ts
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { useQuery } from "@tanstack/react-query";
|
||||||
|
import { api } from "@/lib/api";
|
||||||
|
import type { UserInfo } from "@/lib/types";
|
||||||
|
|
||||||
|
export function usePermissions() {
|
||||||
|
const { data, isLoading } = useQuery({
|
||||||
|
queryKey: ["me"],
|
||||||
|
queryFn: () => api.get<UserInfo>("/me"),
|
||||||
|
staleTime: 60 * 1000,
|
||||||
|
});
|
||||||
|
|
||||||
|
const role = data?.role ?? null;
|
||||||
|
const permissions = data?.permissions ?? [];
|
||||||
|
|
||||||
|
function can(permission: string): boolean {
|
||||||
|
return permissions.includes(permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
role,
|
||||||
|
permissions,
|
||||||
|
can,
|
||||||
|
isLoading,
|
||||||
|
userId: data?.user_id ?? null,
|
||||||
|
tenantId: data?.tenant_id ?? null,
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -189,36 +189,39 @@ export interface Note {
|
|||||||
updated_at: string;
|
updated_at: string;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Notifications
|
export interface CaseAssignment {
|
||||||
|
|
||||||
export interface Notification {
|
|
||||||
id: string;
|
id: string;
|
||||||
tenant_id: string;
|
case_id: string;
|
||||||
user_id: string;
|
user_id: string;
|
||||||
type: "deadline_reminder" | "deadline_overdue" | "case_update" | "assignment";
|
role: string;
|
||||||
entity_type?: "deadline" | "appointment" | "case";
|
assigned_at: string;
|
||||||
entity_id?: string;
|
|
||||||
title: string;
|
|
||||||
body?: string;
|
|
||||||
sent_at?: string;
|
|
||||||
read_at?: string;
|
|
||||||
created_at: string;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
export interface NotificationPreferences {
|
export interface UserInfo {
|
||||||
user_id: string;
|
user_id: string;
|
||||||
tenant_id: string;
|
tenant_id: string;
|
||||||
deadline_reminder_days: number[];
|
role: UserRole;
|
||||||
email_enabled: boolean;
|
permissions: string[];
|
||||||
daily_digest: boolean;
|
|
||||||
created_at?: string;
|
|
||||||
updated_at?: string;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
export interface NotificationListResponse {
|
export type UserRole = "owner" | "partner" | "associate" | "paralegal" | "secretary";
|
||||||
data: Notification[];
|
|
||||||
total: number;
|
export const ROLE_LABELS: Record<UserRole, string> = {
|
||||||
}
|
owner: "Inhaber",
|
||||||
|
partner: "Partner",
|
||||||
|
associate: "Anwalt",
|
||||||
|
paralegal: "Paralegal",
|
||||||
|
secretary: "Sekretariat",
|
||||||
|
};
|
||||||
|
|
||||||
|
export const CASE_ASSIGNMENT_ROLES = ["lead", "team", "viewer"] as const;
|
||||||
|
export type CaseAssignmentRole = (typeof CASE_ASSIGNMENT_ROLES)[number];
|
||||||
|
|
||||||
|
export const CASE_ASSIGNMENT_ROLE_LABELS: Record<CaseAssignmentRole, string> = {
|
||||||
|
lead: "Federführend",
|
||||||
|
team: "Team",
|
||||||
|
viewer: "Einsicht",
|
||||||
|
};
|
||||||
|
|
||||||
export interface ApiError {
|
export interface ApiError {
|
||||||
error: string;
|
error: string;
|
||||||
|
|||||||
Reference in New Issue
Block a user