4 command handlers del módulo Roles + Permisos ahora auditan:
| Handler | Action |
|--------------------------------------|------------------------|
| CreateRolCommandHandler | rol.create |
| UpdateRolCommandHandler | rol.update |
| DeactivateRolCommandHandler | rol.deactivate |
| AssignPermisosToRolCommandHandler | rol.permisos_update |
Mismo patrón que B7 (using block + post-commit reads outside scope).
Metadata:
- rol.create: after={Codigo, Nombre, Descripcion}
- rol.update: {before, after} diff
- rol.permisos_update: {before, after} con arrays de codigos ordenados
AssignPermisosToRolCommandHandler captura 'before' leyendo
GetByRolCodigoAsync antes del TransactionScope para poder emitir el diff.
4 test classes actualizados con mock de IAuditLogger.
Suite: 378/378 Application.Tests + 141/141 Api.Tests = 519/519 passing.
Refs: sdd/udt-010-auditoria-trazabilidad/{spec#REQ-RM-AUD, design, tasks#B8}
54 lines
1.9 KiB
C#
54 lines
1.9 KiB
C#
using System.Transactions;
|
|
using SIGCM2.Application.Abstractions;
|
|
using SIGCM2.Application.Abstractions.Persistence;
|
|
using SIGCM2.Application.Audit;
|
|
using SIGCM2.Application.Roles.Dtos;
|
|
using SIGCM2.Domain.Exceptions;
|
|
|
|
namespace SIGCM2.Application.Roles.Deactivate;
|
|
|
|
public sealed class DeactivateRolCommandHandler : ICommandHandler<DeactivateRolCommand, RolDto>
|
|
{
|
|
private readonly IRolRepository _repository;
|
|
private readonly IAuditLogger _audit;
|
|
|
|
public DeactivateRolCommandHandler(IRolRepository repository, IAuditLogger audit)
|
|
{
|
|
_repository = repository;
|
|
_audit = audit;
|
|
}
|
|
|
|
public async Task<RolDto> Handle(DeactivateRolCommand command)
|
|
{
|
|
var existing = await _repository.GetByCodigoAsync(command.Codigo)
|
|
?? throw new RolNotFoundException(command.Codigo);
|
|
|
|
// Guard: block soft-delete when active usuarios reference this rol.
|
|
if (await _repository.HasActiveUsuariosAsync(command.Codigo))
|
|
throw new RolInUseException(command.Codigo);
|
|
|
|
using (var tx = new TransactionScope(
|
|
TransactionScopeOption.Required,
|
|
new TransactionOptions { IsolationLevel = IsolationLevel.ReadCommitted },
|
|
TransactionScopeAsyncFlowOption.Enabled))
|
|
{
|
|
var updated = await _repository.UpdateAsync(
|
|
existing.Codigo, existing.Nombre, existing.Descripcion, activo: false);
|
|
if (!updated)
|
|
throw new RolNotFoundException(command.Codigo);
|
|
|
|
await _audit.LogAsync(
|
|
action: "rol.deactivate",
|
|
targetType: "Rol",
|
|
targetId: existing.Id.ToString());
|
|
|
|
tx.Complete();
|
|
}
|
|
|
|
var rol = await _repository.GetByCodigoAsync(command.Codigo)
|
|
?? throw new RolNotFoundException(command.Codigo);
|
|
|
|
return new RolDto(rol.Id, rol.Codigo, rol.Nombre, rol.Descripcion, rol.Activo, rol.FechaCreacion, rol.FechaModificacion);
|
|
}
|
|
}
|