* feat(DB): rearranged queries feat(DB): ready for v1.15.0 * refactor(chalice): upgraded dependencies refactor(crons): upgraded dependencies refactor(alerts): upgraded dependencies * fix(chalice): return error when updating inexistant webhook * feat(chalice): fixed delete webhook response * feat(chalice): limit webhooks name length * feat(chalice): upgraded dependencies feat(alerts): upgraded dependencies feat(crons): upgraded dependencies * fix(chalice): remove urllib3 dependency * feat(chalice): remove FOSS to pydantic v2 * fix(chalice): freeze urllib3 to not have conflicts between boto3 and requests * feat(chalice): refactoring schema in progress * feat(chalice): refactoring schema in progress * feat(chalice): refactoring schema in progress * feat(chalice): refactoring schema in progress feat(chalice): upgraded dependencies * feat(chalice): refactored schema * fix(chalice): pull rebase dev * feat(DB): transfer size support * feat(chalice): support service account * feat(chalice): support service account * fix(chalice): fixed refactored PayloadSchema-name * feat(chalice): path analysis * feat(chalice): support service account 1/2 * feat(DB): timezone support * feat(chalice): upgraded dependencies feat(alerts): upgraded dependencies feat(crons): upgraded dependencies feat(assist): upgraded dependencies feat(sourcemaps): upgraded dependencies * feat(chalice): path analysis schema changes * feat(chalice): path analysis query change * feat(chalice): path analysis query change * feat(chalice): ios replay support * feat(chalice): ios replay support * feat(chalice): path analysis changes * feat(chalice): upgraded dependencies * feat(chalice): simple hide minor paths * feat(chalice): path analysis density * feat(chalice): session's replay ios events * feat(chalice): fixed typo * feat(chalice): support project's platform * feat(DB): support project's platform * feat(chalice): path analysis EE in progress * feat(chalice): project's platform API * feat(chalice): fixed create project * feat(chalice): EE path analysis in progress * feat(chalice): EE path analysis refactor(chalice): support specific database name for clickhouse-client * feat(chalice): upgraded dependencies feat(chalice): path analysis specific event type for startPoint feat(chalice): path analysis specific event type for endPoint feat(chalice): path analysis specific event type for exclude * refactoring(chalice): changed IOS click event type
180 lines
9.5 KiB
Python
180 lines
9.5 KiB
Python
from typing import Optional
|
|
|
|
from fastapi import HTTPException, status
|
|
import schemas
|
|
from chalicelib.core import users, projects
|
|
from chalicelib.utils import pg_client, helper
|
|
from chalicelib.utils.TimeUTC import TimeUTC
|
|
|
|
|
|
def __exists_by_name(tenant_id: int, name: str, exclude_id: Optional[int]) -> bool:
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify(f"""SELECT EXISTS(SELECT 1
|
|
FROM public.roles
|
|
WHERE tenant_id = %(tenant_id)s
|
|
AND name ILIKE %(name)s
|
|
AND deleted_at ISNULL
|
|
{"AND role_id!=%(exclude_id)s" if exclude_id else ""}) AS exists;""",
|
|
{"tenant_id": tenant_id, "name": name, "exclude_id": exclude_id})
|
|
cur.execute(query=query)
|
|
row = cur.fetchone()
|
|
return row["exists"]
|
|
|
|
|
|
def update(tenant_id, user_id, role_id, data: schemas.RolePayloadSchema):
|
|
admin = users.get(user_id=user_id, tenant_id=tenant_id)
|
|
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
if __exists_by_name(tenant_id=tenant_id, name=data.name, exclude_id=role_id):
|
|
raise HTTPException(status_code=status.HTTP_400_BAD_REQUEST, detail=f"name already exists.")
|
|
|
|
if not data.all_projects and (data.projects is None or len(data.projects) == 0):
|
|
return {"errors": ["must specify a project or all projects"]}
|
|
if data.projects is not None and len(data.projects) > 0 and not data.all_projects:
|
|
data.projects = projects.is_authorized_batch(project_ids=data.projects, tenant_id=tenant_id)
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""SELECT 1
|
|
FROM public.roles
|
|
WHERE role_id = %(role_id)s
|
|
AND tenant_id = %(tenant_id)s
|
|
AND protected = TRUE
|
|
LIMIT 1;""",
|
|
{"tenant_id": tenant_id, "role_id": role_id})
|
|
cur.execute(query=query)
|
|
if cur.fetchone() is not None:
|
|
return {"errors": ["this role is protected"]}
|
|
query = cur.mogrify("""UPDATE public.roles
|
|
SET name= %(name)s,
|
|
description= %(description)s,
|
|
permissions= %(permissions)s,
|
|
all_projects= %(all_projects)s
|
|
WHERE role_id = %(role_id)s
|
|
AND tenant_id = %(tenant_id)s
|
|
AND deleted_at ISNULL
|
|
AND protected = FALSE
|
|
RETURNING *, COALESCE((SELECT ARRAY_AGG(project_id)
|
|
FROM roles_projects
|
|
WHERE roles_projects.role_id=%(role_id)s),'{}') AS projects;""",
|
|
{"tenant_id": tenant_id, "role_id": role_id, **data.model_dump()})
|
|
cur.execute(query=query)
|
|
row = cur.fetchone()
|
|
row["created_at"] = TimeUTC.datetime_to_timestamp(row["created_at"])
|
|
if not data.all_projects:
|
|
d_projects = [i for i in row["projects"] if i not in data.projects]
|
|
if len(d_projects) > 0:
|
|
query = cur.mogrify("""DELETE FROM roles_projects
|
|
WHERE role_id=%(role_id)s
|
|
AND project_id IN %(project_ids)s""",
|
|
{"role_id": role_id, "project_ids": tuple(d_projects)})
|
|
cur.execute(query=query)
|
|
n_projects = [i for i in data.projects if i not in row["projects"]]
|
|
if len(n_projects) > 0:
|
|
query = cur.mogrify(f"""INSERT INTO roles_projects(role_id, project_id)
|
|
VALUES {",".join([f"(%(role_id)s,%(project_id_{i})s)" for i in range(len(n_projects))])}""",
|
|
{"role_id": role_id, **{f"project_id_{i}": p for i, p in enumerate(n_projects)}})
|
|
cur.execute(query=query)
|
|
row["projects"] = data.projects
|
|
|
|
return helper.dict_to_camel_case(row)
|
|
|
|
|
|
def create(tenant_id, user_id, data: schemas.RolePayloadSchema):
|
|
admin = users.get(user_id=user_id, tenant_id=tenant_id)
|
|
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
|
|
if __exists_by_name(tenant_id=tenant_id, name=data.name, exclude_id=None):
|
|
raise HTTPException(status_code=status.HTTP_400_BAD_REQUEST, detail=f"name already exists.")
|
|
|
|
if not data.all_projects and (data.projects is None or len(data.projects) == 0):
|
|
return {"errors": ["must specify a project or all projects"]}
|
|
if data.projects is not None and len(data.projects) > 0 and not data.all_projects:
|
|
data.projects = projects.is_authorized_batch(project_ids=data.projects, tenant_id=tenant_id)
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""INSERT INTO roles(tenant_id, name, description, permissions, all_projects)
|
|
VALUES (%(tenant_id)s, %(name)s, %(description)s, %(permissions)s::text[], %(all_projects)s)
|
|
RETURNING *;""",
|
|
{"tenant_id": tenant_id, "name": data.name, "description": data.description,
|
|
"permissions": data.permissions, "all_projects": data.all_projects})
|
|
cur.execute(query=query)
|
|
row = cur.fetchone()
|
|
row["created_at"] = TimeUTC.datetime_to_timestamp(row["created_at"])
|
|
if not data.all_projects:
|
|
role_id = row["role_id"]
|
|
query = cur.mogrify(f"""INSERT INTO roles_projects(role_id, project_id)
|
|
VALUES {",".join(f"(%(role_id)s,%(project_id_{i})s)" for i in range(len(data.projects)))};""",
|
|
{"role_id": role_id, **{f"project_id_{i}": p for i, p in enumerate(data.projects)}})
|
|
cur.execute(query=query)
|
|
return helper.dict_to_camel_case(row)
|
|
|
|
|
|
def get_roles(tenant_id):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""SELECT roles.*, COALESCE(projects, '{}') AS projects
|
|
FROM public.roles
|
|
LEFT JOIN LATERAL (SELECT array_agg(project_id) AS projects
|
|
FROM roles_projects
|
|
INNER JOIN projects USING (project_id)
|
|
WHERE roles_projects.role_id = roles.role_id
|
|
AND projects.deleted_at ISNULL ) AS role_projects ON (TRUE)
|
|
WHERE tenant_id =%(tenant_id)s
|
|
AND deleted_at IS NULL
|
|
ORDER BY role_id;""",
|
|
{"tenant_id": tenant_id})
|
|
cur.execute(query=query)
|
|
rows = cur.fetchall()
|
|
for r in rows:
|
|
r["created_at"] = TimeUTC.datetime_to_timestamp(r["created_at"])
|
|
return helper.list_to_camel_case(rows)
|
|
|
|
|
|
def get_role_by_name(tenant_id, name):
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""SELECT *
|
|
FROM public.roles
|
|
WHERE tenant_id =%(tenant_id)s
|
|
AND deleted_at IS NULL
|
|
AND name ILIKE %(name)s;""",
|
|
{"tenant_id": tenant_id, "name": name})
|
|
cur.execute(query=query)
|
|
row = cur.fetchone()
|
|
if row is not None:
|
|
row["created_at"] = TimeUTC.datetime_to_timestamp(row["created_at"])
|
|
return helper.dict_to_camel_case(row)
|
|
|
|
|
|
def delete(tenant_id, user_id, role_id):
|
|
admin = users.get(user_id=user_id, tenant_id=tenant_id)
|
|
|
|
if not admin["admin"] and not admin["superAdmin"]:
|
|
return {"errors": ["unauthorized"]}
|
|
with pg_client.PostgresClient() as cur:
|
|
query = cur.mogrify("""SELECT 1
|
|
FROM public.roles
|
|
WHERE role_id = %(role_id)s
|
|
AND tenant_id = %(tenant_id)s
|
|
AND protected = TRUE
|
|
LIMIT 1;""",
|
|
{"tenant_id": tenant_id, "role_id": role_id})
|
|
cur.execute(query=query)
|
|
if cur.fetchone() is not None:
|
|
return {"errors": ["this role is protected"]}
|
|
query = cur.mogrify("""SELECT 1
|
|
FROM public.users
|
|
WHERE role_id = %(role_id)s
|
|
AND tenant_id = %(tenant_id)s
|
|
LIMIT 1;""",
|
|
{"tenant_id": tenant_id, "role_id": role_id})
|
|
cur.execute(query=query)
|
|
if cur.fetchone() is not None:
|
|
return {"errors": ["this role is already attached to other user(s)"]}
|
|
query = cur.mogrify("""UPDATE public.roles
|
|
SET deleted_at = timezone('utc'::text, now())
|
|
WHERE role_id = %(role_id)s
|
|
AND tenant_id = %(tenant_id)s
|
|
AND protected = FALSE;""",
|
|
{"tenant_id": tenant_id, "role_id": role_id})
|
|
cur.execute(query=query)
|
|
return get_roles(tenant_id=tenant_id)
|