* change(ui) - redirect to the landing url on SSO login
* fix(ui): fix share popup styles
* change(ui) - non admin user preference restrictions
* fix(ui) - redirect fix
* change(ui) - show installation btn without mouse hover
* feat(api): api-v1 handle wrong projectKey
feat(api): api-v1 get live sessions
* change(ui) - show role edit on hover
* change(ui) - audit trail count with comma
* fix(ui) - audit trail date range custom picker alignment
* change(ui) - show a message when mob file not found
* feat(api): api-v1 fixed search live sessions
* feat(api): api-v1 handle wrong projectKey
* feat(api): fixed assist error response
* fix(tracker): check node scrolls only on start
* fixup! fix(tracker): check node scrolls only on start
* feat(ui/player): scroll view in click map
* feat(ui/player): rm unused check
* New configuration module (#558)
* ci(dbmigrate): Create db migrate when there is change
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui): fix login error/button margins
* fix(ui) - checkbox click
* fix(ui) - search rename and save fixes
* change(ui) - text changes
* fix(ui) - button text nowrap
* fix(ui): fix slowestdomains widget height
* change(ui) - ignore clicks while annotating
* change(ui) - if block with braces
* change(ui) - capitalize first letter in breadcrumb
* feat(db): remove errors from permissions
feat(api): remove errors from permissions
* feat(api): changed reset password response
* fix(ui) - assist active tab list, broken after with new api changes (pagination)
* fix(ui) - assist active tab list, broken after with new api changes (pagination)
* change(ui) - search compare
* fix(ui): last fixes for 1.7
* fix(ui): fix timeline
* fix(ui): small code fixes
* fix(ui): remove unused
* feat(frontend/assist): show when client tab is inactive + fix reconnection status update
* fix(ui) - visibility settings
* feat(assist): refactored extractSessionInfo
feat(assist): hardcoded session's attributes
* Added snabbdom (JS)
* fix(tracker): version check works with x.x.x-beta versions
* fix(backend): keep the highest user's timestamp instead of the latest message timestamp for correct session duration value
* feat(backend/s3): added file tag RETENTION (#561)
* change(ui) - search optimization and autocomplete improvements
* feat(backend/assets): added new metrics assets_downloaded
* change(ui) - show back the date range in bookmarks since the api is filtering by daterange
* feat(backend-assets): custom headers for cacher requests
* chore(backend): no tidy in dockerfile (local build speed up)
* feat(backend/assets): added proxy support for cacher module
* feat(backend/storage): set retention env variable as not required
* fix(ui): fix jira issues
* ci(helm): use kubectl for deployment
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(tracker):3.5.13: performance improvements for a case of extensive dom
* fix(backend): added missed err var and continue statement
* ci(helm): forcing namespace
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(api): fixed slowest_domains query
* ci(helm): update helm deployment method
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* change(ui) - filter dropdown colros
* fix(ui) - speed index location avg attribute changed to value
* ci(api): enable kubectl apply
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui) - widget y axis label
* feat(api): fixed slowest_domains query
* chore(helm): Adding namespaces to all templates (#565)
* feat(api): assist type-autocomplete
* feat(api): assist global-autocomplete
* feat(sourcemaps): include wasm file in build
* feat(sourcemaps-reader): refactored
* fix(ui): fix data for funnels
* fix(ui): fix all sessions section margin
* fix(ui) - assist loader flag
* fix(ui) - assist loader flag
* fix(ui): fix weird check
* feat(api): autocomplete accept unsupported types
* feat(ui): migrate to yarn v3
* feat(ui): minor fixes for installment
* feat(ui): add typescript plugin to yarn
* chore(helm): Ability to override image registry
* chore(helm): Overriding openreplay docker registry
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui): fix control arrows on firefox
* feat(crons): EE crons
* feat(api): fixed build script
* feat(alerts): fixed build script
* feat(crons): fixed build script
* chore(helm): Updating cron version
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(crons): changes
* chore(helm): optional minio ingress
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(crons): fix build script
feat(alerts): fix build script
* Revert "chore(helm): Updating cron version"
This reverts commit 3ca190ea2f.
* feat(crons): fix build script
* feat(crons): fix Dockerfile
* feat(api): fixed metadata change-case
* change(ui) - remove capitalize for the meta value
* change(ui) - autocomplete improvements with custom textfield
* fix(tracker):3.5.13+:reuse metadata on internal-caused restarts
* fix(tracker-assist):3.5.13:send active:true on start; scroll behavior fix
* change(ui) - filters autocomplete blur on pressing Enter key
* fix(tracker): fix node v to lower
* fix(tracker): fix deps
* fix(tracker): fix deps
* fix(ui) - dashboard modal width
* change(ui) - filter dropdown overflow
* chore(helm): clickhouse reclaim polity to retain
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(tracker): fix engine max v
* fix(ui): load metadata in assist tab for sorting
* fix(ui): rm unneeded api call
* fix(tracker): build script to cjs
* change(ui) - removed sample data
* chore(tracker): remove upper node version limit
* Updating Beacon size
Beacon size should be <= QUEUE_MESSAGE_SIZE_LIMIT
* feat(crons): run 24/7
feat(alerts): support env-file override
* feat(api): changed EE env handler
* fix(ui): fix sessions search modal
* change(ui) - margin for error message
* change(ui) - disable assist sort when there are no meta options to choose
* chore(helm): Adding utilities service namespace
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui) - dashboard date range selection reload, metric not found message
* change(ui) - disable clearsearch in assist when there are no filters\
* feat(api): fixed EE env handler
* chore(helm): Adding migration namespaces
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui) - report logo path
* chore(helm): Removing unnecessary SA
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(api): changed EE env handler
* feat(api): changed EE env handler
* feat(api): changed EE env handler
* feat(api): changed EE env handler
* feat(crons): changed crons
* feat(api): accept wrong metric_id
* feat(crons): changed env handler
feat(api): changed env handler
feat(alerts): changed env handler
* feat(utilities): support old version of nodejs
* feat(crons): changed env handler
feat(api): changed env handler
feat(alerts): changed env handler
* fix(tracker): fix srcset tracking
* chore(build): Adding frontent
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(assist): changed general helper
* feat(assist): changed general helper
* fix(ui): fix widget pagination (#570)
* feat(crons): changed entrypoint
* feat(player): dev-log on skipping message
* fix(tracker): removeNode mutation priority over attributes
* fix(tracker): capture relative img timing;use startsWith instead of substr; codestyle fix
* chore(build): fixing api build script
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* chore(ci): faster deployment
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* change(ui) - assist list show active status
* chore(actions): option to build all/specific services in GH
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui) - slowest domain metric data as per the api changes
* ci(helm): updated variable name
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* ci(backend): cherrypick changes to ee
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(backend): disabled pprof in http service
* fix(ui) - TimeToRender avg value as per the API change
* fix(ui) - ResponseTimeDistribution avg value as per the API change
* fix(ui) - MemoryConsumption avg value as per the API change
* fix(ui) - ResponseTime avg value as per the API change
* fix(ui) - DomBuildTime avg value as per the API change
* fix(ui) - FrameRate avg value as per the API change
* chore(helm): proper default tag
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(backend): removed sensitive information from http logs
* ci(backend): adding default parameter value for workflow dispatch
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(backend): deleted empty file
* fix(actions): creating image source file prior
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(helm): variable substitution
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* change(ui) - project list item installation button text change
* fix(ui) - project create validation
* fix(backend): removed unsafe string logs in http service
* chore(kafka): Adding new topic
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(efs-cron): variable name
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui) - developer tools - hint links
* fix(ui) - session filters - country and platform dropdown values
* chore(helm): updating version
* chore(kafka): Update kafka default message size while provisioning
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(tracker): fix dependency security
* change(ui) - webhook delete confirmation
* change(ui) - assist url to handle when empty
* feat(api): autocomplete replace console with errors
feat(DB): clean extra files
* chore(helm): Adding cron jobs
* change(ui) - set changed flag to false after the metric delete to avoid prompt
* chore(helm): enbaling cron only for ee
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(api): autocomplete remove console
* change(ui) - removed Console filter type
* fix(ui) - timeline position
* fix(helm): RFC naming
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui): let user change project in dashboards and select default dashboard
* chore(helm): update registry url
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(DB): return pages_count to DB
* fix(ui) - account settings opt out checkbox
* fix(ui): fix modal width
* fix(ui) - explore circle bg
* fix(ui) - user name overlap
* fix(ui) - empty dashboards create button
* fix(ui): fix timeline position cursor for safari
* fix(ui) - custom metrics errors modal url reset on close
* fix(ui) - onboarding check for siteId
* change(ui) - tracker version
* Update local_deploy.sh
* fix(ui) - drilldown timestamp
* fix(tracker): fix deps for assist
* fix(tracker): update peerjs library
* fix(tracker): update assist v
* fix(tracker): fix type error
* fix(backend): no missing resource relying on resource zero-timing
* Update tracker to v3.5.15
* chore(helm): Adding CSP override variable.
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(backend): added pem file support for kafka ssl setup
* feat(backend): added useBatch setup for kafka producer
* ci(backend): set verbose logging
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(backend): using setKey instead of direct writes
* ci(backend): fix error code
* ci(deploy): Updating the image registry
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* feat(api): changed get user id alias
* ci(frontent): removing depricated steps
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* ci(fix): variable replace
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* ci(helm): creating image image_override
Signed-off-by: rjshrjndrn <rjshrjndrn@gmail.com>
* fix(ui): fix timezone settings
* Added failover mechanism for storage service (#576)
* fix(ui): fix typescript config to remove array iterator error
* fix(ui): refactor timezone settings store/comp
* feat(snippet): opensource snippet
* feat(assist): support multiple IPs
* fix(ui): fix type errors in select /timezones fix
* feat(backend): set size of first part of sessions at 500kb
* change(ui) - removed logs
* fix(ui) - custom metric errors reset url on modal close
* feat(DB): no funnel migration
* fix(ui): fix screensize bug
* feat(DB): migrate super old funnels support
* changed db-migration workflow
Co-authored-by: Shekar Siri <sshekarsiri@gmail.com>
Co-authored-by: sylenien <nikita@openreplay.com>
Co-authored-by: Alex Kaminskii <alex@openreplay.com>
Co-authored-by: Alexander <zavorotynskiy@pm.me>
Co-authored-by: rjshrjndrn <rjshrjndrn@gmail.com>
Co-authored-by: Mehdi Osman <estradino@users.noreply.github.com>
Co-authored-by: Alexander <alexander@openreplay.com>
Co-authored-by: Rajesh Rajendran <rjshrjndrn@users.noreply.github.com>
Co-authored-by: Delirium <sylenien@gmail.com>
595 lines
25 KiB
Python
595 lines
25 KiB
Python
import json
|
|
import secrets
|
|
|
|
from decouple import config
|
|
from fastapi import BackgroundTasks
|
|
|
|
import schemas
|
|
from chalicelib.core import authorizers, metadata, projects
|
|
from chalicelib.core import tenants, assist
|
|
from chalicelib.utils import dev, email_helper
|
|
from chalicelib.utils import helper
|
|
from chalicelib.utils import pg_client
|
|
from chalicelib.utils.TimeUTC import TimeUTC
|
|
|
|
|
|
def __generate_invitation_token():
|
|
return secrets.token_urlsafe(64)
|
|
|
|
|
|
def create_new_member(email, invitation_token, admin, name, owner=False):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""\
|
|
WITH u AS (INSERT INTO public.users (email, role, name, data)
|
|
VALUES (%(email)s, %(role)s, %(name)s, %(data)s)
|
|
RETURNING user_id,email,role,name
|
|
),
|
|
au AS (INSERT INTO public.basic_authentication (user_id, invitation_token, invited_at)
|
|
VALUES ((SELECT user_id FROM u), %(invitation_token)s, timezone('utc'::text, now()))
|
|
RETURNING invitation_token
|
|
)
|
|
SELECT u.user_id,
|
|
u.user_id AS id,
|
|
u.email,
|
|
u.role,
|
|
u.name,
|
|
(CASE WHEN u.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN u.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN u.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
au.invitation_token
|
|
FROM u,au;""",
|
|
{"email": email, "role": "owner" if owner else "admin" if admin else "member", "name": name,
|
|
"data": json.dumps({"lastAnnouncementView": TimeUTC.now()}),
|
|
"invitation_token": invitation_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
return helper.dict_to_camel_case(cur.fetchone())
|
|
|
|
|
|
def restore_member(user_id, email, invitation_token, admin, name, owner=False):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""\
|
|
UPDATE public.users
|
|
SET name= %(name)s,
|
|
role = %(role)s,
|
|
deleted_at= NULL,
|
|
created_at = timezone('utc'::text, now()),
|
|
api_key= generate_api_key(20)
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING user_id AS id,
|
|
email,
|
|
role,
|
|
name,
|
|
(CASE WHEN role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN role = 'member' THEN TRUE ELSE FALSE END) AS member;""",
|
|
{"user_id": user_id, "email": email,
|
|
"role": "owner" if owner else "admin" if admin else "member", "name": name})
|
|
cur.execute(
|
|
query
|
|
)
|
|
result = cur.fetchone()
|
|
query = cur.mogrify("""\
|
|
UPDATE public.basic_authentication
|
|
SET invitation_token = %(invitation_token)s,
|
|
invited_at = timezone('utc'::text, now()),
|
|
change_pwd_expire_at = NULL,
|
|
change_pwd_token = NULL
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING invitation_token;""",
|
|
{"user_id": user_id, "invitation_token": invitation_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
result["invitation_token"] = cur.fetchone()["invitation_token"]
|
|
|
|
return helper.dict_to_camel_case(result)
|
|
|
|
|
|
def generate_new_invitation(user_id):
|
|
invitation_token = __generate_invitation_token()
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""\
|
|
UPDATE public.basic_authentication
|
|
SET invitation_token = %(invitation_token)s,
|
|
invited_at = timezone('utc'::text, now()),
|
|
change_pwd_expire_at = NULL,
|
|
change_pwd_token = NULL
|
|
WHERE user_id=%(user_id)s
|
|
RETURNING invitation_token;""",
|
|
{"user_id": user_id, "invitation_token": invitation_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
return __get_invitation_link(cur.fetchone().pop("invitation_token"))
|
|
|
|
|
|
def reset_member(tenant_id, editor_id, user_id_to_update):
|
|
admin = get(tenant_id=tenant_id, user_id=editor_id)
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
user = get(tenant_id=tenant_id, user_id=user_id_to_update)
|
|
if not user:
|
|
return {"errors": ["user not found"]}
|
|
return {"data": {"invitationLink": generate_new_invitation(user_id_to_update)}}
|
|
|
|
|
|
def update(tenant_id, user_id, changes):
|
|
AUTH_KEYS = ["password", "invitationToken", "invitedAt", "changePwdExpireAt", "changePwdToken"]
|
|
if len(changes.keys()) == 0:
|
|
return None
|
|
|
|
sub_query_users = []
|
|
sub_query_bauth = []
|
|
for key in changes.keys():
|
|
if key in AUTH_KEYS:
|
|
if key == "password":
|
|
sub_query_bauth.append("password = crypt(%(password)s, gen_salt('bf', 12))")
|
|
sub_query_bauth.append("changed_at = timezone('utc'::text, now())")
|
|
else:
|
|
sub_query_bauth.append(f"{helper.key_to_snake_case(key)} = %({key})s")
|
|
else:
|
|
sub_query_users.append(f"{helper.key_to_snake_case(key)} = %({key})s")
|
|
|
|
with pg_client.PostgresClient() as cur:
|
|
if len(sub_query_users) > 0:
|
|
cur.execute(
|
|
cur.mogrify(f"""\
|
|
UPDATE public.users
|
|
SET {" ,".join(sub_query_users)}
|
|
FROM public.basic_authentication
|
|
WHERE users.user_id = %(user_id)s
|
|
AND users.user_id = basic_authentication.user_id
|
|
RETURNING users.user_id AS id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member;""",
|
|
{"user_id": user_id, **changes})
|
|
)
|
|
if len(sub_query_bauth) > 0:
|
|
cur.execute(
|
|
cur.mogrify(f"""\
|
|
UPDATE public.basic_authentication
|
|
SET {" ,".join(sub_query_bauth)}
|
|
FROM public.users AS users
|
|
WHERE basic_authentication.user_id = %(user_id)s
|
|
AND users.user_id = basic_authentication.user_id
|
|
RETURNING users.user_id AS id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member;""",
|
|
{"user_id": user_id, **changes})
|
|
)
|
|
|
|
return helper.dict_to_camel_case(cur.fetchone())
|
|
|
|
|
|
def create_member(tenant_id, user_id, data, background_tasks: BackgroundTasks):
|
|
admin = get(tenant_id=tenant_id, user_id=user_id)
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
if data.get("userId") is not None:
|
|
return {"errors": ["please use POST/PUT /client/members/{memberId} for update"]}
|
|
user = get_by_email_only(email=data["email"])
|
|
if user:
|
|
return {"errors": ["user already exists"]}
|
|
name = data.get("name", None)
|
|
if name is not None and not helper.is_alphabet_latin_space(name):
|
|
return {"errors": ["invalid user name"]}
|
|
if name is None:
|
|
name = data["email"]
|
|
invitation_token = __generate_invitation_token()
|
|
user = get_deleted_user_by_email(email=data["email"])
|
|
if user is not None:
|
|
new_member = restore_member(email=data["email"], invitation_token=invitation_token,
|
|
admin=data.get("admin", False), name=name, user_id=user["userId"])
|
|
else:
|
|
new_member = create_new_member(email=data["email"], invitation_token=invitation_token,
|
|
admin=data.get("admin", False), name=name)
|
|
new_member["invitationLink"] = __get_invitation_link(new_member.pop("invitationToken"))
|
|
|
|
# helper.async_post(config('email_basic') % 'member_invitation',
|
|
# {
|
|
# "email": data["email"],
|
|
# "invitationLink": new_member["invitationLink"],
|
|
# "clientId": tenants.get_by_tenant_id(tenant_id)["name"],
|
|
# "senderName": admin["name"]
|
|
# })
|
|
background_tasks.add_task(email_helper.send_team_invitation, **{
|
|
"recipient": data["email"],
|
|
"invitation_link": new_member["invitationLink"],
|
|
"client_id": tenants.get_by_tenant_id(tenant_id)["name"],
|
|
"sender_name": admin["name"]
|
|
})
|
|
return {"data": new_member}
|
|
|
|
|
|
def __get_invitation_link(invitation_token):
|
|
return config("SITE_URL") + config("invitation_link") % invitation_token
|
|
|
|
|
|
def allow_password_change(user_id, delta_min=10):
|
|
pass_token = secrets.token_urlsafe(8)
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""UPDATE public.basic_authentication
|
|
SET change_pwd_expire_at = timezone('utc'::text, now()+INTERVAL '%(delta)s MINUTES'),
|
|
change_pwd_token = %(pass_token)s
|
|
WHERE user_id = %(user_id)s""",
|
|
{"user_id": user_id, "delta": delta_min, "pass_token": pass_token})
|
|
cur.execute(
|
|
query
|
|
)
|
|
return pass_token
|
|
|
|
|
|
def get(user_id, tenant_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
email,
|
|
role,
|
|
name,
|
|
(CASE WHEN role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
api_key,
|
|
TRUE AS has_password
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE
|
|
users.user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def generate_new_api_key(user_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""UPDATE public.users
|
|
SET api_key=generate_api_key(20)
|
|
WHERE
|
|
users.user_id = %(userId)s
|
|
AND deleted_at IS NULL
|
|
RETURNING api_key;""",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def edit(user_id_to_update, tenant_id, changes: schemas.EditUserSchema, editor_id):
|
|
user = get(user_id=user_id_to_update, tenant_id=tenant_id)
|
|
if editor_id != user_id_to_update or changes.admin is not None and changes.admin != user["admin"]:
|
|
admin = get(tenant_id=tenant_id, user_id=editor_id)
|
|
if not admin["superAdmin"] and not admin["admin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
_changes = {}
|
|
if editor_id == user_id_to_update:
|
|
if changes.admin is not None:
|
|
if user["superAdmin"]:
|
|
changes.admin = None
|
|
elif changes.admin != user["admin"]:
|
|
return {"errors": ["cannot change your own role"]}
|
|
|
|
if changes.email is not None and changes.email != user["email"]:
|
|
if email_exists(changes.email):
|
|
return {"errors": ["email already exists."]}
|
|
if get_deleted_user_by_email(changes.email) is not None:
|
|
return {"errors": ["email previously deleted."]}
|
|
_changes["email"] = changes.email
|
|
|
|
if changes.name is not None and len(changes.name) > 0:
|
|
_changes["name"] = changes.name
|
|
|
|
if changes.admin is not None:
|
|
_changes["role"] = "admin" if changes.admin else "member"
|
|
|
|
if len(_changes.keys()) > 0:
|
|
updated_user = update(tenant_id=tenant_id, user_id=user_id_to_update, changes=_changes)
|
|
return {"data": updated_user}
|
|
return {"data": user}
|
|
|
|
|
|
def get_by_email_only(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id AS id,
|
|
1 AS tenant_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE
|
|
users.email = %(email)s
|
|
AND users.deleted_at IS NULL;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchall()
|
|
return helper.list_to_camel_case(r)
|
|
|
|
|
|
def get_by_email_reset(email, reset_token):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id AS id,
|
|
1 AS tenant_id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE
|
|
users.email = %(email)s
|
|
AND basic_authentication.token =%(token)s
|
|
AND users.deleted_at IS NULL""",
|
|
{"email": email, "token": reset_token})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def get_members(tenant_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
f"""SELECT
|
|
users.user_id AS id,
|
|
users.email,
|
|
users.role,
|
|
users.name,
|
|
users.created_at,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member,
|
|
DATE_PART('day',timezone('utc'::text, now()) \
|
|
- COALESCE(basic_authentication.invited_at,'2000-01-01'::timestamp ))>=1 AS expired_invitation,
|
|
basic_authentication.password IS NOT NULL AS joined,
|
|
invitation_token
|
|
FROM public.users LEFT JOIN public.basic_authentication ON users.user_id=basic_authentication.user_id
|
|
WHERE users.deleted_at IS NULL
|
|
ORDER BY name, id"""
|
|
)
|
|
r = cur.fetchall()
|
|
if len(r):
|
|
r = helper.list_to_camel_case(r)
|
|
for u in r:
|
|
u["createdAt"] = TimeUTC.datetime_to_timestamp(u["createdAt"])
|
|
if u["invitationToken"]:
|
|
u["invitationLink"] = __get_invitation_link(u.pop("invitationToken"))
|
|
else:
|
|
u["invitationLink"] = None
|
|
return r
|
|
|
|
return []
|
|
|
|
|
|
def delete_member(user_id, tenant_id, id_to_delete):
|
|
if user_id == id_to_delete:
|
|
return {"errors": ["unauthorized, cannot delete self"]}
|
|
|
|
admin = get(user_id=user_id, tenant_id=tenant_id)
|
|
if admin["member"]:
|
|
return {"errors": ["unauthorized"]}
|
|
|
|
to_delete = get(user_id=id_to_delete, tenant_id=tenant_id)
|
|
if to_delete is None:
|
|
return {"errors": ["not found"]}
|
|
|
|
if to_delete["superAdmin"]:
|
|
return {"errors": ["cannot delete super admin"]}
|
|
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(f"""UPDATE public.users
|
|
SET deleted_at = timezone('utc'::text, now())
|
|
WHERE user_id=%(user_id)s;""",
|
|
{"user_id": id_to_delete}))
|
|
cur.execute(
|
|
cur.mogrify(f"""UPDATE public.basic_authentication
|
|
SET password= NULL
|
|
WHERE user_id=%(user_id)s;""",
|
|
{"user_id": id_to_delete}))
|
|
return {"data": get_members(tenant_id=tenant_id)}
|
|
|
|
|
|
def change_password(tenant_id, user_id, email, old_password, new_password):
|
|
item = get(tenant_id=tenant_id, user_id=user_id)
|
|
if item is None:
|
|
return {"errors": ["access denied"]}
|
|
if old_password == new_password:
|
|
return {"errors": ["old and new password are the same"]}
|
|
auth = authenticate(email, old_password, for_change_password=True)
|
|
if auth is None:
|
|
return {"errors": ["wrong password"]}
|
|
changes = {"password": new_password}
|
|
user = update(tenant_id=tenant_id, user_id=user_id, changes=changes)
|
|
r = authenticate(user['email'], new_password)
|
|
tenant_id = r.pop("tenantId")
|
|
|
|
r["limits"] = {
|
|
"teamMember": -1,
|
|
"projects": -1,
|
|
"metadata": metadata.get_remaining_metadata_with_count(tenant_id)}
|
|
|
|
c = tenants.get_by_tenant_id(tenant_id)
|
|
c.pop("createdAt")
|
|
c["projects"] = projects.get_projects(tenant_id=tenant_id, recording_state=True, recorded=True,
|
|
stack_integrations=True)
|
|
c["smtp"] = helper.has_smtp()
|
|
c["iceServers"] = assist.get_ice_servers()
|
|
return {
|
|
'jwt': r.pop('jwt'),
|
|
'data': {
|
|
"user": r,
|
|
"client": c
|
|
}
|
|
}
|
|
|
|
|
|
def set_password_invitation(user_id, new_password):
|
|
changes = {"password": new_password,
|
|
"invitationToken": None, "invitedAt": None,
|
|
"changePwdExpireAt": None, "changePwdToken": None}
|
|
user = update(tenant_id=-1, user_id=user_id, changes=changes)
|
|
r = authenticate(user['email'], new_password)
|
|
tenant_id = r.pop("tenantId")
|
|
|
|
r["limits"] = {
|
|
"teamMember": -1,
|
|
"projects": -1,
|
|
"metadata": metadata.get_remaining_metadata_with_count(tenant_id)}
|
|
|
|
c = tenants.get_by_tenant_id(tenant_id)
|
|
c.pop("createdAt")
|
|
c["projects"] = projects.get_projects(tenant_id=tenant_id, recording_state=True, recorded=True,
|
|
stack_integrations=True)
|
|
c["smtp"] = helper.has_smtp()
|
|
c["iceServers"] = assist.get_ice_servers()
|
|
return {
|
|
'jwt': r.pop('jwt'),
|
|
'data': {
|
|
"user": r,
|
|
"client": c
|
|
}
|
|
}
|
|
|
|
|
|
def count_members():
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute("""SELECT COUNT(user_id)
|
|
FROM public.users WHERE deleted_at IS NULL;""")
|
|
r = cur.fetchone()
|
|
return r["count"]
|
|
|
|
|
|
def email_exists(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
count(user_id)
|
|
FROM public.users
|
|
WHERE
|
|
email = %(email)s
|
|
AND deleted_at IS NULL
|
|
LIMIT 1;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchone()
|
|
return r["count"] > 0
|
|
|
|
|
|
def get_deleted_user_by_email(email):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
*
|
|
FROM public.users
|
|
WHERE
|
|
email = %(email)s
|
|
AND deleted_at NOTNULL
|
|
LIMIT 1;""",
|
|
{"email": email})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def get_by_invitation_token(token, pass_token=None):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"""SELECT
|
|
*,
|
|
DATE_PART('day',timezone('utc'::text, now()) \
|
|
- COALESCE(basic_authentication.invited_at,'2000-01-01'::timestamp ))>=1 AS expired_invitation,
|
|
change_pwd_expire_at <= timezone('utc'::text, now()) AS expired_change,
|
|
(EXTRACT(EPOCH FROM current_timestamp-basic_authentication.change_pwd_expire_at))::BIGINT AS change_pwd_age
|
|
FROM public.users INNER JOIN public.basic_authentication USING(user_id)
|
|
WHERE invitation_token = %(token)s {"AND change_pwd_token = %(pass_token)s" if pass_token else ""}
|
|
LIMIT 1;""",
|
|
{"token": token, "pass_token": pass_token})
|
|
)
|
|
r = cur.fetchone()
|
|
return helper.dict_to_camel_case(r)
|
|
|
|
|
|
def auth_exists(user_id, tenant_id, jwt_iat, jwt_aud):
|
|
with pg_client.PostgresClient() as cur:
|
|
cur.execute(
|
|
cur.mogrify(
|
|
f"SELECT user_id AS id,jwt_iat, changed_at FROM public.users INNER JOIN public.basic_authentication USING(user_id) WHERE user_id = %(userId)s AND deleted_at IS NULL LIMIT 1;",
|
|
{"userId": user_id})
|
|
)
|
|
r = cur.fetchone()
|
|
return r is not None \
|
|
and r.get("jwt_iat") is not None \
|
|
and (abs(jwt_iat - TimeUTC.datetime_to_timestamp(r["jwt_iat"]) // 1000) <= 1 \
|
|
or (jwt_aud.startswith("plugin") \
|
|
and (r["changed_at"] is None \
|
|
or jwt_iat >= (TimeUTC.datetime_to_timestamp(r["changed_at"]) // 1000)))
|
|
)
|
|
|
|
|
|
def authenticate(email, password, for_change_password=False, for_plugin=False):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(
|
|
f"""SELECT
|
|
users.user_id,
|
|
1 AS tenant_id,
|
|
users.role,
|
|
users.name,
|
|
(CASE WHEN users.role = 'owner' THEN TRUE ELSE FALSE END) AS super_admin,
|
|
(CASE WHEN users.role = 'admin' THEN TRUE ELSE FALSE END) AS admin,
|
|
(CASE WHEN users.role = 'member' THEN TRUE ELSE FALSE END) AS member
|
|
FROM public.users INNER JOIN public.basic_authentication USING(user_id)
|
|
WHERE users.email = %(email)s
|
|
AND basic_authentication.password = crypt(%(password)s, basic_authentication.password)
|
|
AND basic_authentication.user_id = (SELECT su.user_id FROM public.users AS su WHERE su.email=%(email)s AND su.deleted_at IS NULL LIMIT 1)
|
|
LIMIT 1;""",
|
|
{"email": email, "password": password})
|
|
|
|
cur.execute(query)
|
|
r = cur.fetchone()
|
|
|
|
if r is not None:
|
|
if for_change_password:
|
|
return True
|
|
r = helper.dict_to_camel_case(r)
|
|
query = cur.mogrify(
|
|
f"""UPDATE public.users
|
|
SET jwt_iat = timezone('utc'::text, now())
|
|
WHERE user_id = %(user_id)s
|
|
RETURNING jwt_iat;""",
|
|
{"user_id": r["userId"]})
|
|
cur.execute(query)
|
|
return {
|
|
"jwt": authorizers.generate_jwt(r['userId'], r['tenantId'],
|
|
TimeUTC.datetime_to_timestamp(cur.fetchone()["jwt_iat"]),
|
|
aud=f"plugin:{helper.get_stage_name()}" if for_plugin else f"front:{helper.get_stage_name()}"),
|
|
"email": email,
|
|
**r
|
|
}
|
|
return None
|