Compare commits
10 Commits
ab3f0b07c2
...
9ddd85d36a
Author | SHA1 | Date | |
---|---|---|---|
9ddd85d36a | |||
41e4729ff7 | |||
04c47d636e | |||
b872c33c02 | |||
7b62022a83 | |||
165c140a25 | |||
1824ff7564 | |||
347f8486af | |||
0b9489f110 | |||
433188995e |
@ -54,6 +54,7 @@ jobs:
|
||||
uses: actions/download-artifact@v3
|
||||
with:
|
||||
name: version
|
||||
path: version.txt
|
||||
|
||||
- name: Build docker
|
||||
run: |
|
||||
@ -86,6 +87,7 @@ jobs:
|
||||
uses: actions/download-artifact@v3
|
||||
with:
|
||||
name: version
|
||||
path: version.txt
|
||||
|
||||
- name: Build docker
|
||||
run: |
|
||||
@ -117,6 +119,7 @@ jobs:
|
||||
uses: actions/download-artifact@v3
|
||||
with:
|
||||
name: version
|
||||
path: version.txt
|
||||
|
||||
- name: Prepare web build
|
||||
run: |
|
||||
@ -131,7 +134,7 @@ jobs:
|
||||
- name: Build docker
|
||||
run: |
|
||||
cd web
|
||||
docker build --no-cache -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
|
||||
docker build --no-cache --build-arg VERSION=$(cat version.txt) -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
|
||||
|
||||
- name: Login to registry git.sh-edraft.de
|
||||
uses: https://github.com/docker/login-action@v1
|
||||
|
@ -86,6 +86,7 @@ jobs:
|
||||
uses: actions/download-artifact@v3
|
||||
with:
|
||||
name: version
|
||||
path: version.txt
|
||||
|
||||
- name: Build docker
|
||||
run: |
|
||||
@ -117,6 +118,7 @@ jobs:
|
||||
uses: actions/download-artifact@v3
|
||||
with:
|
||||
name: version
|
||||
path: version.txt
|
||||
|
||||
- name: Prepare web build
|
||||
run: |
|
||||
@ -131,7 +133,7 @@ jobs:
|
||||
- name: Build docker
|
||||
run: |
|
||||
cd web
|
||||
docker build --no-cache -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
|
||||
docker build --no-cache --build-arg VERSION=$(cat version.txt) -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
|
||||
|
||||
- name: Login to registry git.sh-edraft.de
|
||||
uses: https://github.com/docker/login-action@v1
|
||||
|
@ -1,5 +1,5 @@
|
||||
name: Test before pr merge
|
||||
run-name: Test before pr merge
|
||||
name: Test API before pr merge
|
||||
run-name: Test API before pr merge
|
||||
on:
|
||||
pull_request:
|
||||
types:
|
||||
|
@ -8,32 +8,16 @@ from starlette.routing import Route as StarletteRoute
|
||||
|
||||
from api.errors import unauthorized
|
||||
from api.middleware.request import get_request
|
||||
from api.route_api_key_extension import RouteApiKeyExtension
|
||||
from api.route_user_extension import RouteUserExtension
|
||||
from core.environment import Environment
|
||||
from data.schemas.administration.api_key import ApiKey
|
||||
from data.schemas.administration.api_key_dao import apiKeyDao
|
||||
from data.schemas.administration.user import User
|
||||
|
||||
|
||||
class Route(RouteUserExtension):
|
||||
class Route(RouteUserExtension, RouteApiKeyExtension):
|
||||
registered_routes: list[StarletteRoute] = []
|
||||
|
||||
@classmethod
|
||||
async def get_api_key(cls, request: Request) -> ApiKey:
|
||||
auth_header = request.headers.get("Authorization", None)
|
||||
api_key = auth_header.split(" ")[1]
|
||||
return await apiKeyDao.find_by_key(api_key)
|
||||
|
||||
@classmethod
|
||||
async def _verify_api_key(cls, req: Request) -> bool:
|
||||
auth_header = req.headers.get("Authorization", None)
|
||||
if not auth_header or not auth_header.startswith("API-Key "):
|
||||
return False
|
||||
|
||||
api_key = auth_header.split(" ")[1]
|
||||
api_key_from_db = await apiKeyDao.find_by_key(api_key)
|
||||
return api_key_from_db is not None and not api_key_from_db.deleted
|
||||
|
||||
@classmethod
|
||||
async def _get_auth_type(
|
||||
cls, request: Request, auth_header: str
|
||||
@ -79,8 +63,7 @@ class Route(RouteUserExtension):
|
||||
return await cls._get_auth_type(request, auth_header)
|
||||
|
||||
@classmethod
|
||||
async def is_authorized(cls) -> bool:
|
||||
request = get_request()
|
||||
async def is_authorized(cls, request: Request) -> bool:
|
||||
if request is None:
|
||||
return False
|
||||
|
||||
@ -119,7 +102,7 @@ class Route(RouteUserExtension):
|
||||
return await f(request, *args, **kwargs)
|
||||
return f(request, *args, **kwargs)
|
||||
|
||||
if not await cls.is_authorized():
|
||||
if not await cls.is_authorized(request):
|
||||
return unauthorized()
|
||||
|
||||
if iscoroutinefunction(f):
|
||||
|
27
api/src/api/route_api_key_extension.py
Normal file
27
api/src/api/route_api_key_extension.py
Normal file
@ -0,0 +1,27 @@
|
||||
from starlette.requests import Request
|
||||
|
||||
from data.schemas.administration.api_key import ApiKey
|
||||
from data.schemas.administration.api_key_dao import apiKeyDao
|
||||
|
||||
|
||||
class RouteApiKeyExtension:
|
||||
|
||||
@classmethod
|
||||
async def get_api_key(cls, request: Request) -> ApiKey:
|
||||
auth_header = request.headers.get("Authorization", None)
|
||||
api_key = auth_header.split(" ")[1]
|
||||
return await apiKeyDao.find_single_by(
|
||||
[{ApiKey.key: api_key}, {ApiKey.deleted: False}]
|
||||
)
|
||||
|
||||
@classmethod
|
||||
async def _verify_api_key(cls, req: Request) -> bool:
|
||||
auth_header = req.headers.get("Authorization", None)
|
||||
if not auth_header or not auth_header.startswith("API-Key "):
|
||||
return False
|
||||
|
||||
api_key = auth_header.split(" ")[1]
|
||||
api_key_from_db = await apiKeyDao.find_single_by(
|
||||
[{ApiKey.key: api_key}, {ApiKey.deleted: False}]
|
||||
)
|
||||
return api_key_from_db is not None and not api_key_from_db.deleted
|
@ -18,6 +18,7 @@ logger = Logger(__name__)
|
||||
|
||||
|
||||
class RouteUserExtension:
|
||||
_cached_users: dict[int, User] = {}
|
||||
|
||||
@classmethod
|
||||
def _get_user_id_from_token(cls, request: Request) -> Optional[str]:
|
||||
@ -62,9 +63,7 @@ class RouteUserExtension:
|
||||
if request is None:
|
||||
return None
|
||||
|
||||
return await userDao.find_single_by(
|
||||
[{User.keycloak_id: cls.get_token(request)}, {User.deleted: False}]
|
||||
)
|
||||
return await userDao.find_by_keycloak_id(cls.get_token(request))
|
||||
|
||||
@classmethod
|
||||
async def get_user_or_default(cls) -> Optional[User]:
|
||||
|
59
api/src/api_graphql/abc/db_history_model_query_abc.py
Normal file
59
api/src/api_graphql/abc/db_history_model_query_abc.py
Normal file
@ -0,0 +1,59 @@
|
||||
from datetime import datetime
|
||||
from typing import Union, Callable, Any
|
||||
|
||||
from api_graphql.abc.query_abc import QueryABC
|
||||
from core.database.abc.data_access_object_abc import DataAccessObjectABC
|
||||
|
||||
|
||||
class DbHistoryModelQueryABC(QueryABC):
|
||||
|
||||
def __init__(self, name: str = __name__):
|
||||
QueryABC.__init__(self, f"{name}History")
|
||||
|
||||
self.set_field("id", lambda x, *_: x.id)
|
||||
self.set_field("deleted", lambda x, *_: x.deleted)
|
||||
self.set_field("editor", self._resolve_editor)
|
||||
self.set_field("created", lambda x, *_: x.created)
|
||||
self.set_field("updated", lambda x, *_: x.updated)
|
||||
|
||||
@staticmethod
|
||||
async def _resolve_editor(x, *_):
|
||||
editor = await x.editor
|
||||
return editor.username if editor else None
|
||||
|
||||
@staticmethod
|
||||
async def _resolve_foreign_history(
|
||||
updated: datetime,
|
||||
obj_ident: Union[str, int],
|
||||
join_dao: DataAccessObjectABC,
|
||||
foreign_dao: DataAccessObjectABC,
|
||||
foreign_join_key: Callable[[Any], Any],
|
||||
obj_key="id",
|
||||
*_,
|
||||
):
|
||||
foreign_history = sorted(
|
||||
[
|
||||
*await join_dao.find_by(
|
||||
[
|
||||
{obj_key: obj_ident},
|
||||
{"updated": {"lessOrEqual": updated}},
|
||||
]
|
||||
),
|
||||
*await join_dao.get_history(
|
||||
obj_ident,
|
||||
by_key=obj_key,
|
||||
until=updated,
|
||||
),
|
||||
],
|
||||
key=lambda x: x.updated,
|
||||
)
|
||||
|
||||
foreign_ids = set()
|
||||
for foreign in foreign_history:
|
||||
if not foreign.deleted:
|
||||
foreign_ids.add(foreign_join_key(foreign))
|
||||
continue
|
||||
|
||||
foreign_ids.discard(foreign_join_key(foreign))
|
||||
|
||||
return [await foreign_dao.get_by_id(x) for x in sorted(foreign_ids)]
|
@ -23,5 +23,5 @@ class DbModelCollectionFilterABC[T](CollectionFilterABC):
|
||||
self.add_field("id", IntCollectionFilter)
|
||||
self.add_field("deleted", BoolCollectionFilter)
|
||||
self.add_field("editor", IntCollectionFilter)
|
||||
self.add_field("createdUtc", DateCollectionFilter)
|
||||
self.add_field("updatedUtc", DateCollectionFilter)
|
||||
self.add_field("created", DateCollectionFilter)
|
||||
self.add_field("updated", DateCollectionFilter)
|
||||
|
@ -1,10 +1,11 @@
|
||||
from typing import Optional
|
||||
|
||||
from api_graphql.abc.filter.bool_filter import BoolFilter
|
||||
from api_graphql.abc.filter.date_filter import DateFilter
|
||||
from api_graphql.abc.filter.fuzzy_filter import FuzzyFilter
|
||||
from api_graphql.abc.filter.int_filter import IntFilter
|
||||
from api_graphql.abc.filter.string_filter import StringFilter
|
||||
from api_graphql.abc.filter_abc import FilterABC
|
||||
from api_graphql.filter.fuzzy_filter import FuzzyFilter
|
||||
|
||||
|
||||
class DbModelFilterABC[T](FilterABC[T]):
|
||||
@ -18,7 +19,7 @@ class DbModelFilterABC[T](FilterABC[T]):
|
||||
self.add_field("id", IntFilter)
|
||||
self.add_field("deleted", BoolFilter)
|
||||
self.add_field("editor", UserFilter)
|
||||
self.add_field("createdUtc", StringFilter, "created")
|
||||
self.add_field("updatedUtc", StringFilter, "updated")
|
||||
self.add_field("created", DateFilter)
|
||||
self.add_field("updated", DateFilter)
|
||||
|
||||
self.add_field("fuzzy", FuzzyFilter)
|
||||
|
@ -1,18 +1,54 @@
|
||||
from copy import deepcopy
|
||||
from typing import Optional
|
||||
|
||||
from api_graphql.abc.query_abc import QueryABC
|
||||
from data.schemas.administration.user import User
|
||||
from core.database.abc.data_access_object_abc import DataAccessObjectABC
|
||||
from core.logger import APILogger
|
||||
|
||||
logger = APILogger("api.api")
|
||||
|
||||
|
||||
class DbModelQueryABC(QueryABC):
|
||||
|
||||
def __init__(self, name: str = __name__):
|
||||
def __init__(
|
||||
self,
|
||||
name: str = __name__,
|
||||
dao: DataAccessObjectABC = None,
|
||||
with_history: bool = False,
|
||||
):
|
||||
QueryABC.__init__(self, name)
|
||||
|
||||
self._dao: Optional[DataAccessObjectABC] = dao
|
||||
|
||||
self.set_field("id", lambda x, *_: x.id)
|
||||
self.set_field("deleted", lambda x, *_: x.deleted)
|
||||
self.set_field("editor", self.__get_editor)
|
||||
self.set_field("createdUtc", lambda x, *_: x.created)
|
||||
self.set_field("updatedUtc", lambda x, *_: x.updated)
|
||||
self.set_field("editor", lambda x, *_: x.editor)
|
||||
self.set_field("created", lambda x, *_: x.created)
|
||||
self.set_field("updated", lambda x, *_: x.updated)
|
||||
|
||||
@staticmethod
|
||||
async def __get_editor(x: User, *_):
|
||||
return await x.editor
|
||||
if with_history:
|
||||
self.set_field("history", self._resolve_history)
|
||||
|
||||
self._history_reference_daos: dict[DataAccessObjectABC, str] = {}
|
||||
|
||||
async def _resolve_history(self, x, *_):
|
||||
if self._dao is None:
|
||||
raise Exception("DAO not set for history query")
|
||||
|
||||
history = sorted(
|
||||
[await self._dao.get_by_id(x.id), *await self._dao.get_history(x.id)],
|
||||
key=lambda h: h.updated,
|
||||
reverse=True,
|
||||
)
|
||||
return history
|
||||
|
||||
def set_history_reference_dao(self, dao: DataAccessObjectABC, key: str = None):
|
||||
"""
|
||||
Set the reference DAO for history resolution.
|
||||
:param dao:
|
||||
:param key: The key to use for resolving history.
|
||||
:return:
|
||||
"""
|
||||
if key is None:
|
||||
key = "id"
|
||||
self._history_reference_daos[dao] = key
|
||||
|
15
api/src/api_graphql/abc/filter/fuzzy_filter.py
Normal file
15
api/src/api_graphql/abc/filter/fuzzy_filter.py
Normal file
@ -0,0 +1,15 @@
|
||||
from typing import Optional
|
||||
|
||||
from api_graphql.abc.filter_abc import FilterABC
|
||||
|
||||
|
||||
class FuzzyFilter(FilterABC):
|
||||
def __init__(
|
||||
self,
|
||||
obj: Optional[dict],
|
||||
):
|
||||
FilterABC.__init__(self, obj)
|
||||
|
||||
self.add_field("fields", list)
|
||||
self.add_field("term", str)
|
||||
self.add_field("threshold", int)
|
@ -18,3 +18,5 @@ class IntFilter(FilterABC):
|
||||
self.add_field("lessOrEqual", int)
|
||||
self.add_field("isNull", int)
|
||||
self.add_field("isNotNull", int)
|
||||
self.add_field("in", list)
|
||||
self.add_field("notIn", list)
|
||||
|
@ -18,3 +18,5 @@ class StringFilter(FilterABC):
|
||||
self.add_field("endsWith", str)
|
||||
self.add_field("isNull", str)
|
||||
self.add_field("isNotNull", str)
|
||||
self.add_field("in", list)
|
||||
self.add_field("notIn", list)
|
||||
|
@ -19,10 +19,12 @@ class FilterABC[T](ABC):
|
||||
def add_field(
|
||||
self,
|
||||
field: str,
|
||||
filter_type: Union[Type["FilterABC"], Type[Union[int, str, bool, datetime]]],
|
||||
filter_type: Union[
|
||||
Type["FilterABC"], Type[Union[int, str, bool, datetime, list]]
|
||||
],
|
||||
db_name=None,
|
||||
):
|
||||
if field not in self._obj and db_name not in self._obj:
|
||||
if field not in self._obj:
|
||||
return
|
||||
|
||||
if db_name is None:
|
||||
|
@ -1,6 +1,7 @@
|
||||
from abc import ABC
|
||||
from typing import Optional, Type, get_origin, get_args
|
||||
|
||||
from core.get_value import get_value
|
||||
from core.typing import T
|
||||
|
||||
|
||||
@ -12,11 +13,15 @@ class InputABC(ABC):
|
||||
ABC.__init__(self)
|
||||
self._src = src
|
||||
|
||||
self._options = {}
|
||||
|
||||
def option(
|
||||
self, field: str, cast_type: Type[T], default=None, required=False
|
||||
) -> Optional[T]:
|
||||
if required and field not in self._src:
|
||||
raise ValueError(f"{field} is required")
|
||||
|
||||
self._options[field] = cast_type
|
||||
if field not in self._src:
|
||||
return default
|
||||
|
||||
@ -28,4 +33,4 @@ class InputABC(ABC):
|
||||
return cast_type(value)
|
||||
|
||||
def get(self, field: str, default=None) -> Optional[T]:
|
||||
return self._src.get(field, default)
|
||||
return get_value(self._src, field, self._options[field], default)
|
||||
|
@ -1,7 +1,12 @@
|
||||
from abc import abstractmethod
|
||||
from typing import Type, Union
|
||||
|
||||
from api_graphql.abc.input_abc import InputABC
|
||||
from api_graphql.abc.query_abc import QueryABC
|
||||
from api_graphql.field.mutation_field_builder import MutationFieldBuilder
|
||||
from core.database.abc.data_access_object_abc import DataAccessObjectABC
|
||||
from core.database.abc.db_join_model_abc import DbJoinModelABC
|
||||
from core.typing import T
|
||||
from service.permission.permissions_enum import Permissions
|
||||
|
||||
|
||||
@ -41,3 +46,79 @@ class MutationABC(QueryABC):
|
||||
.with_require_any_permission(require_any_permission)
|
||||
.with_public(public)
|
||||
)
|
||||
|
||||
@staticmethod
|
||||
async def _resolve_assignments(
|
||||
foreign_objs: list[int],
|
||||
resolved_obj: T,
|
||||
reference_key_own: Union[str, property],
|
||||
reference_key_foreign: Union[str, property],
|
||||
source_dao: DataAccessObjectABC[T],
|
||||
join_dao: DataAccessObjectABC[T],
|
||||
join_type: Type[DbJoinModelABC],
|
||||
foreign_dao: DataAccessObjectABC[T],
|
||||
):
|
||||
if foreign_objs is None:
|
||||
return
|
||||
|
||||
reference_key_own_attr = reference_key_own
|
||||
if isinstance(reference_key_own, property):
|
||||
reference_key_own_attr = reference_key_own.fget.__name__
|
||||
|
||||
reference_key_foreign_attr = reference_key_foreign
|
||||
if isinstance(reference_key_foreign, property):
|
||||
reference_key_foreign_attr = reference_key_foreign.fget.__name__
|
||||
|
||||
foreign_list = await join_dao.find_by(
|
||||
[{reference_key_own: resolved_obj.id}, {"deleted": False}]
|
||||
)
|
||||
|
||||
to_delete = (
|
||||
foreign_list
|
||||
if len(foreign_objs) == 0
|
||||
else await join_dao.find_by(
|
||||
[
|
||||
{reference_key_own: resolved_obj.id},
|
||||
{reference_key_foreign: {"notIn": foreign_objs}},
|
||||
]
|
||||
)
|
||||
)
|
||||
foreign_ids = [getattr(x, reference_key_foreign_attr) for x in foreign_list]
|
||||
deleted_foreign_ids = [
|
||||
getattr(x, reference_key_foreign_attr)
|
||||
for x in await join_dao.find_by(
|
||||
[{reference_key_own: resolved_obj.id}, {"deleted": True}]
|
||||
)
|
||||
]
|
||||
|
||||
to_create = [
|
||||
join_type(0, resolved_obj.id, x)
|
||||
for x in foreign_objs
|
||||
if x not in foreign_ids and x not in deleted_foreign_ids
|
||||
]
|
||||
to_restore = [
|
||||
await join_dao.get_single_by(
|
||||
[
|
||||
{reference_key_own: resolved_obj.id},
|
||||
{reference_key_foreign: x},
|
||||
]
|
||||
)
|
||||
for x in foreign_objs
|
||||
if x not in foreign_ids and x in deleted_foreign_ids
|
||||
]
|
||||
|
||||
if len(to_delete) > 0:
|
||||
await join_dao.delete_many(to_delete)
|
||||
|
||||
if len(to_create) > 0:
|
||||
await join_dao.create_many(to_create)
|
||||
|
||||
if len(to_restore) > 0:
|
||||
await join_dao.restore_many(to_restore)
|
||||
|
||||
foreign_changes = [*to_delete, *to_create, *to_restore]
|
||||
if len(foreign_changes) > 0:
|
||||
await source_dao.touch(resolved_obj)
|
||||
await foreign_dao.touch_many_by_id(
|
||||
[getattr(x, reference_key_foreign_attr) for x in foreign_changes]
|
||||
)
|
||||
|
@ -6,11 +6,12 @@ from typing import Callable, Type, get_args, Any, Union
|
||||
|
||||
from ariadne import ObjectType, SubscriptionType
|
||||
from graphql import GraphQLResolveInfo
|
||||
from starlette.requests import Request
|
||||
from typing_extensions import deprecated
|
||||
|
||||
from api.middleware.request import get_request
|
||||
from api.route import Route
|
||||
from api_graphql.abc.collection_filter_abc import CollectionFilterABC
|
||||
from api_graphql.abc.field_abc import FieldABC
|
||||
from api_graphql.abc.input_abc import InputABC
|
||||
from api_graphql.abc.sort_abc import Sort
|
||||
from api_graphql.field.collection_field import CollectionField
|
||||
@ -46,8 +47,8 @@ class QueryABC(ObjectType):
|
||||
self._subscriptions: dict[str, SubscriptionType] = {}
|
||||
|
||||
@staticmethod
|
||||
async def _authorize():
|
||||
if not await Route.is_authorized():
|
||||
async def _authorize(request: Request):
|
||||
if not await Route.is_authorized(request):
|
||||
raise UnauthorizedException()
|
||||
|
||||
@staticmethod
|
||||
@ -71,8 +72,6 @@ class QueryABC(ObjectType):
|
||||
*args,
|
||||
**kwargs,
|
||||
):
|
||||
info = args[0]
|
||||
|
||||
if len(permissions) > 0:
|
||||
user = await Route.get_authenticated_user_or_api_key_or_default()
|
||||
if user is not None and all(
|
||||
@ -120,6 +119,9 @@ class QueryABC(ObjectType):
|
||||
take = None
|
||||
skip = None
|
||||
|
||||
if field.default_filter:
|
||||
filters.append(field.default_filter(*args, **kwargs))
|
||||
|
||||
if field.filter_type and "filter" in kwargs:
|
||||
in_filters = kwargs["filter"]
|
||||
if not isinstance(in_filters, list):
|
||||
@ -227,7 +229,7 @@ class QueryABC(ObjectType):
|
||||
|
||||
async def wrapper(*args, **kwargs):
|
||||
if not field.public:
|
||||
await self._authorize()
|
||||
await self._authorize(get_request())
|
||||
|
||||
if (
|
||||
field.require_any is None
|
||||
|
@ -2,8 +2,8 @@ from abc import abstractmethod
|
||||
from asyncio import iscoroutinefunction
|
||||
|
||||
from ariadne import SubscriptionType
|
||||
from graphql import GraphQLResolveInfo
|
||||
|
||||
from api.middleware.request import get_request
|
||||
from api_graphql.abc.query_abc import QueryABC
|
||||
from api_graphql.field.subscription_field_builder import SubscriptionFieldBuilder
|
||||
from core.logger import APILogger
|
||||
@ -20,9 +20,12 @@ class SubscriptionABC(SubscriptionType, QueryABC):
|
||||
def subscribe(self, builder: SubscriptionFieldBuilder):
|
||||
field = builder.build()
|
||||
|
||||
async def wrapper(*args, **kwargs):
|
||||
async def wrapper(_, info: GraphQLResolveInfo, *args, **kwargs):
|
||||
# rebuild args for resolvers
|
||||
args = [_, info, *args]
|
||||
if not field.public:
|
||||
await self._authorize()
|
||||
r = info.context.get("request")
|
||||
await self._authorize(r)
|
||||
|
||||
if (
|
||||
field.require_any is None
|
||||
|
@ -1,6 +1,7 @@
|
||||
import importlib
|
||||
import os
|
||||
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from api_graphql.abc.mutation_abc import MutationABC
|
||||
from api_graphql.abc.query_abc import QueryABC
|
||||
@ -20,7 +21,12 @@ def import_graphql_schema_part(part: str):
|
||||
import_graphql_schema_part("queries")
|
||||
import_graphql_schema_part("mutations")
|
||||
|
||||
sub_query_classes = [DbModelQueryABC, MutationABC, SubscriptionABC]
|
||||
sub_query_classes = [
|
||||
DbModelQueryABC,
|
||||
DbHistoryModelQueryABC,
|
||||
MutationABC,
|
||||
SubscriptionABC,
|
||||
]
|
||||
query_classes = [
|
||||
*[y for x in sub_query_classes for y in x.__subclasses__()],
|
||||
*[x for x in QueryABC.__subclasses__() if x not in sub_query_classes],
|
||||
|
@ -1,4 +1,4 @@
|
||||
from typing import Union, Type, Optional
|
||||
from typing import Union, Type, Optional, Callable
|
||||
|
||||
from api_graphql.abc.collection_filter_abc import CollectionFilterABC
|
||||
from api_graphql.abc.field_abc import FieldABC
|
||||
@ -19,6 +19,7 @@ class DaoField(FieldABC):
|
||||
public: bool = False,
|
||||
dao: DataAccessObjectABC = None,
|
||||
filter_type: Type[FilterABC] = None,
|
||||
default_filter: Callable = None,
|
||||
sort_type: Type[T] = None,
|
||||
direct_result: bool = False,
|
||||
):
|
||||
@ -28,6 +29,7 @@ class DaoField(FieldABC):
|
||||
self._public = public
|
||||
self._dao = dao
|
||||
self._filter_type = filter_type
|
||||
self._default_filter = default_filter
|
||||
self._sort_type = sort_type
|
||||
self._direct_result = direct_result
|
||||
|
||||
@ -41,6 +43,10 @@ class DaoField(FieldABC):
|
||||
) -> Optional[Type[FilterABC]]:
|
||||
return self._filter_type
|
||||
|
||||
@property
|
||||
def default_filter(self) -> Optional[Callable]:
|
||||
return self._default_filter
|
||||
|
||||
@property
|
||||
def sort_type(self) -> Optional[Type[T]]:
|
||||
return self._sort_type
|
||||
|
@ -1,4 +1,4 @@
|
||||
from typing import Type, Self
|
||||
from typing import Type, Self, Callable
|
||||
|
||||
from api_graphql.abc.field_builder_abc import FieldBuilderABC
|
||||
from api_graphql.abc.filter_abc import FilterABC
|
||||
@ -14,6 +14,7 @@ class DaoFieldBuilder(FieldBuilderABC):
|
||||
|
||||
self._dao = None
|
||||
self._filter_type = None
|
||||
self._default_filter = None
|
||||
self._sort_type = None
|
||||
self._direct_result = False
|
||||
|
||||
@ -27,6 +28,12 @@ class DaoFieldBuilder(FieldBuilderABC):
|
||||
self._filter_type = filter_type
|
||||
return self
|
||||
|
||||
def with_default_filter(self, filter: Callable) -> Self:
|
||||
assert filter is not None, "filter cannot be None"
|
||||
assert callable(filter), "filter must be callable"
|
||||
self._default_filter = filter
|
||||
return self
|
||||
|
||||
def with_sort(self, sort_type: Type[T]) -> Self:
|
||||
assert sort_type is not None, "sort cannot be None"
|
||||
self._sort_type = sort_type
|
||||
@ -45,6 +52,7 @@ class DaoFieldBuilder(FieldBuilderABC):
|
||||
self._public,
|
||||
self._dao,
|
||||
self._filter_type,
|
||||
self._default_filter,
|
||||
self._sort_type,
|
||||
self._direct_result,
|
||||
)
|
||||
|
@ -38,6 +38,9 @@ class MutationFieldBuilder(FieldBuilderABC):
|
||||
await broadcast.publish(f"{source}", result)
|
||||
return result
|
||||
|
||||
self._resolver = resolver_wrapper
|
||||
return self
|
||||
|
||||
def with_change_broadcast(self, source: str):
|
||||
assert self._resolver is not None, "resolver cannot be None for broadcast"
|
||||
|
||||
|
@ -4,16 +4,30 @@ type ApiKeyResult {
|
||||
nodes: [ApiKey]
|
||||
}
|
||||
|
||||
type ApiKeyHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
identifier: String
|
||||
key: String
|
||||
permissions: [Permission]
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type ApiKey implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
identifier: String
|
||||
key: String
|
||||
permissions: [Permission]
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
|
||||
history: [ApiKeyHistory]
|
||||
}
|
||||
|
||||
input ApiKeySort {
|
||||
@ -22,12 +36,18 @@ input ApiKeySort {
|
||||
|
||||
deleted: SortOrder
|
||||
editor: UserSort
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum ApiKeyFuzzyFields {
|
||||
id
|
||||
identifier
|
||||
|
||||
deleted
|
||||
editor
|
||||
created
|
||||
updated
|
||||
}
|
||||
|
||||
input ApiKeyFuzzy {
|
||||
@ -42,24 +62,24 @@ input ApiKeyFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editorId: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type ApiKeyMutation {
|
||||
create(input: ApiKeyCreateInput!): ApiKey
|
||||
update(input: ApiKeyUpdateInput!): ApiKey
|
||||
delete(identifier: String!): Boolean
|
||||
restore(identifier: String!): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
}
|
||||
|
||||
input ApiKeyCreateInput {
|
||||
identifier: String
|
||||
permissions: [ID]
|
||||
permissions: [Int]
|
||||
}
|
||||
|
||||
input ApiKeyUpdateInput {
|
||||
id: ID!
|
||||
id: Int!
|
||||
identifier: String
|
||||
permissions: [ID]
|
||||
permissions: [Int]
|
||||
}
|
@ -1,12 +1,21 @@
|
||||
scalar Upload
|
||||
|
||||
interface DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
interface DbHistoryModel {
|
||||
id: Int
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
enum SortOrder {
|
||||
@ -44,6 +53,8 @@ input IntFilter {
|
||||
|
||||
isNull: Int
|
||||
isNotNull: Int
|
||||
in: [Int]
|
||||
notIn: [Int]
|
||||
}
|
||||
|
||||
input BooleanFilter {
|
||||
@ -58,9 +69,18 @@ input DateFilter {
|
||||
equal: String
|
||||
notEqual: String
|
||||
|
||||
greater: String
|
||||
greaterOrEqual: String
|
||||
|
||||
less: String
|
||||
lessOrEqual: String
|
||||
|
||||
contains: String
|
||||
notContains: String
|
||||
|
||||
isNull: String
|
||||
isNotNull: String
|
||||
|
||||
in: [String]
|
||||
notIn: [String]
|
||||
}
|
12
api/src/api_graphql/graphql/base_model.gql
Normal file
12
api/src/api_graphql/graphql/base_model.gql
Normal file
@ -0,0 +1,12 @@
|
||||
enum Attendance {
|
||||
absent
|
||||
present
|
||||
delayed
|
||||
canceled
|
||||
}
|
||||
|
||||
enum Payment {
|
||||
not_paid
|
||||
paid
|
||||
refunded
|
||||
}
|
@ -4,16 +4,30 @@ type DomainResult {
|
||||
nodes: [Domain]
|
||||
}
|
||||
|
||||
type DomainHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
name: String
|
||||
|
||||
shortUrls: [ShortUrl]
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type Domain implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
name: String
|
||||
|
||||
shortUrls: [ShortUrl]
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
|
||||
history: [DomainHistory]
|
||||
}
|
||||
|
||||
input DomainSort {
|
||||
@ -22,8 +36,8 @@ input DomainSort {
|
||||
|
||||
deleted: SortOrder
|
||||
editorId: SortOrder
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum DomainFuzzyFields {
|
||||
@ -44,15 +58,15 @@ input DomainFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type DomainMutation {
|
||||
create(input: DomainCreateInput!): Domain
|
||||
update(input: DomainUpdateInput!): Domain
|
||||
delete(id: ID!): Boolean
|
||||
restore(id: ID!): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
}
|
||||
|
||||
input DomainCreateInput {
|
||||
@ -60,6 +74,6 @@ input DomainCreateInput {
|
||||
}
|
||||
|
||||
input DomainUpdateInput {
|
||||
id: ID!
|
||||
id: Int!
|
||||
name: String
|
||||
}
|
@ -1,12 +1,12 @@
|
||||
type FeatureFlag implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
key: String
|
||||
value: Boolean
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type FeatureFlagMutation {
|
||||
|
@ -4,8 +4,21 @@ type GroupResult {
|
||||
nodes: [Group]
|
||||
}
|
||||
|
||||
type GroupHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
name: String
|
||||
|
||||
shortUrls: [ShortUrl]
|
||||
roles: [Role]
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type Group implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
name: String
|
||||
|
||||
shortUrls: [ShortUrl]
|
||||
@ -13,8 +26,9 @@ type Group implements DbModel {
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
history: [GroupHistory]
|
||||
}
|
||||
|
||||
input GroupSort {
|
||||
@ -23,8 +37,8 @@ input GroupSort {
|
||||
|
||||
deleted: SortOrder
|
||||
editorId: SortOrder
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum GroupFuzzyFields {
|
||||
@ -45,24 +59,24 @@ input GroupFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type GroupMutation {
|
||||
create(input: GroupCreateInput!): Group
|
||||
update(input: GroupUpdateInput!): Group
|
||||
delete(id: ID!): Boolean
|
||||
restore(id: ID!): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
}
|
||||
|
||||
input GroupCreateInput {
|
||||
name: String!
|
||||
roles: [ID]
|
||||
roles: [Int]
|
||||
}
|
||||
|
||||
input GroupUpdateInput {
|
||||
id: ID!
|
||||
id: Int!
|
||||
name: String
|
||||
roles: [ID]
|
||||
roles: [Int]
|
||||
}
|
@ -4,15 +4,28 @@ type PermissionResult {
|
||||
nodes: [Permission]
|
||||
}
|
||||
|
||||
type PermissionHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
name: String
|
||||
description: String
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type Permission implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
name: String
|
||||
description: String
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
|
||||
history: [PermissionHistory]
|
||||
}
|
||||
|
||||
input PermissionSort {
|
||||
@ -21,9 +34,9 @@ input PermissionSort {
|
||||
description: SortOrder
|
||||
|
||||
deleted: SortOrder
|
||||
editorId: SortOrder
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
editor: UserSort
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
input PermissionFilter {
|
||||
@ -32,13 +45,13 @@ input PermissionFilter {
|
||||
description: StringFilter
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
editor: UserFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
input PermissionInput {
|
||||
id: ID
|
||||
id: Int
|
||||
name: String
|
||||
description: String
|
||||
}
|
||||
|
@ -9,7 +9,7 @@ type Query {
|
||||
user: User
|
||||
userHasPermission(permission: String!): Boolean
|
||||
userHasAnyPermission(permissions: [String]!): Boolean
|
||||
notExistingUsersFromKeycloak: KeycloakUserResult
|
||||
notExistingUsersFromKeycloak: [KeycloakUser]
|
||||
|
||||
domains(filter: [DomainFilter], sort: [DomainSort], skip: Int, take: Int): DomainResult
|
||||
groups(filter: [GroupFilter], sort: [GroupSort], skip: Int, take: Int): GroupResult
|
||||
|
@ -4,8 +4,21 @@ type RoleResult {
|
||||
nodes: [Role]
|
||||
}
|
||||
|
||||
type RoleHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
name: String
|
||||
description: String
|
||||
|
||||
permissions: [Permission]
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type Role implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
name: String
|
||||
description: String
|
||||
permissions: [Permission]
|
||||
@ -13,8 +26,10 @@ type Role implements DbModel {
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
|
||||
history: [RoleHistory]
|
||||
}
|
||||
|
||||
input RoleSort {
|
||||
@ -24,13 +39,19 @@ input RoleSort {
|
||||
|
||||
deleted: SortOrder
|
||||
editor: UserSort
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum RoleFuzzyFields {
|
||||
id
|
||||
name
|
||||
description
|
||||
|
||||
deleted
|
||||
editor
|
||||
created
|
||||
updated
|
||||
}
|
||||
|
||||
input RoleFuzzy {
|
||||
@ -48,26 +69,26 @@ input RoleFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor_id: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type RoleMutation {
|
||||
create(input: RoleCreateInput!): Role
|
||||
update(input: RoleUpdateInput!): Role
|
||||
delete(id: ID!): Boolean
|
||||
restore(id: ID!): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
}
|
||||
|
||||
input RoleCreateInput {
|
||||
name: String!
|
||||
description: String
|
||||
permissions: [ID]
|
||||
permissions: [Int]
|
||||
}
|
||||
|
||||
input RoleUpdateInput {
|
||||
id: ID!
|
||||
id: Int!
|
||||
name: String
|
||||
description: String
|
||||
permissions: [ID]
|
||||
permissions: [Int]
|
||||
}
|
@ -1,12 +1,12 @@
|
||||
type Setting implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
key: String
|
||||
value: String
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type SettingMutation {
|
||||
|
@ -4,8 +4,25 @@ type ShortUrlResult {
|
||||
nodes: [ShortUrl]
|
||||
}
|
||||
|
||||
type ShortUrlHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
shortUrl: String
|
||||
targetUrl: String
|
||||
description: String
|
||||
visits: Int
|
||||
loadingScreen: Boolean
|
||||
|
||||
group: Group
|
||||
domain: Domain
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type ShortUrl implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
shortUrl: String
|
||||
targetUrl: String
|
||||
description: String
|
||||
@ -16,8 +33,9 @@ type ShortUrl implements DbModel {
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
history: [ShortUrlHistory]
|
||||
}
|
||||
|
||||
input ShortUrlSort {
|
||||
@ -28,8 +46,8 @@ input ShortUrlSort {
|
||||
|
||||
deleted: SortOrder
|
||||
editorId: SortOrder
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum ShortUrlFuzzyFields {
|
||||
@ -57,33 +75,33 @@ input ShortUrlFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor: IntFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type ShortUrlMutation {
|
||||
create(input: ShortUrlCreateInput!): ShortUrl
|
||||
update(input: ShortUrlUpdateInput!): ShortUrl
|
||||
delete(id: ID!): Boolean
|
||||
restore(id: ID!): Boolean
|
||||
trackVisit(id: ID!, agent: String): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
trackVisit(id: Int!, agent: String): Boolean
|
||||
}
|
||||
|
||||
input ShortUrlCreateInput {
|
||||
shortUrl: String!
|
||||
targetUrl: String!
|
||||
description: String
|
||||
groupId: ID
|
||||
domainId: ID
|
||||
groupId: Int
|
||||
domainId: Int
|
||||
loadingScreen: Boolean
|
||||
}
|
||||
|
||||
input ShortUrlUpdateInput {
|
||||
id: ID!
|
||||
id: Int!
|
||||
shortUrl: String
|
||||
targetUrl: String
|
||||
description: String
|
||||
groupId: ID
|
||||
domainId: ID
|
||||
groupId: Int
|
||||
domainId: Int
|
||||
loadingScreen: Boolean
|
||||
}
|
||||
|
@ -9,6 +9,7 @@ type Subscription {
|
||||
settingChange: SubscriptionChange
|
||||
userChange: SubscriptionChange
|
||||
userSettingChange: SubscriptionChange
|
||||
userLogout: SubscriptionChange
|
||||
|
||||
domainChange: SubscriptionChange
|
||||
groupChange: SubscriptionChange
|
||||
|
@ -1,9 +1,3 @@
|
||||
type KeycloakUserResult {
|
||||
totalCount: Int
|
||||
count: Int
|
||||
nodes: [KeycloakUser]
|
||||
}
|
||||
|
||||
type KeycloakUser {
|
||||
keycloakId: String
|
||||
username: String
|
||||
@ -15,8 +9,22 @@ type UserResult {
|
||||
nodes: [User]
|
||||
}
|
||||
|
||||
type UserHistory implements DbHistoryModel {
|
||||
id: Int
|
||||
keycloakId: String
|
||||
username: String
|
||||
email: String
|
||||
|
||||
roles: [Role]
|
||||
|
||||
deleted: Boolean
|
||||
editor: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type User implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
keycloakId: String
|
||||
username: String
|
||||
email: String
|
||||
@ -24,8 +32,10 @@ type User implements DbModel {
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
|
||||
history: [UserHistory]
|
||||
}
|
||||
|
||||
input UserSort {
|
||||
@ -36,14 +46,20 @@ input UserSort {
|
||||
|
||||
deleted: SortOrder
|
||||
editor: UserSort
|
||||
createdUtc: SortOrder
|
||||
updatedUtc: SortOrder
|
||||
created: SortOrder
|
||||
updated: SortOrder
|
||||
}
|
||||
|
||||
enum UserFuzzyFields {
|
||||
id
|
||||
keycloakId
|
||||
username
|
||||
email
|
||||
|
||||
deleted
|
||||
editor
|
||||
created
|
||||
updated
|
||||
}
|
||||
|
||||
input UserFuzzy {
|
||||
@ -62,23 +78,23 @@ input UserFilter {
|
||||
|
||||
deleted: BooleanFilter
|
||||
editor: UserFilter
|
||||
createdUtc: DateFilter
|
||||
updatedUtc: DateFilter
|
||||
created: DateFilter
|
||||
updated: DateFilter
|
||||
}
|
||||
|
||||
type UserMutation {
|
||||
create(input: UserCreateInput!): User
|
||||
update(input: UserUpdateInput!): User
|
||||
delete(id: ID!): Boolean
|
||||
restore(id: ID!): Boolean
|
||||
delete(id: Int!): Boolean
|
||||
restore(id: Int!): Boolean
|
||||
}
|
||||
|
||||
input UserCreateInput {
|
||||
keycloakId: String
|
||||
roles: [ID]
|
||||
roles: [Int]
|
||||
}
|
||||
|
||||
input UserUpdateInput {
|
||||
id: ID
|
||||
roles: [ID]
|
||||
id: Int
|
||||
roles: [Int]
|
||||
}
|
@ -1,12 +1,12 @@
|
||||
type UserSetting implements DbModel {
|
||||
id: ID
|
||||
id: Int
|
||||
key: String
|
||||
value: String
|
||||
|
||||
deleted: Boolean
|
||||
editor: User
|
||||
createdUtc: String
|
||||
updatedUtc: String
|
||||
created: String
|
||||
updated: String
|
||||
}
|
||||
|
||||
type UserSettingMutation {
|
||||
|
@ -1,5 +1,3 @@
|
||||
from uuid import uuid4
|
||||
|
||||
from api_graphql.abc.mutation_abc import MutationABC
|
||||
from api_graphql.input.api_key_create_input import ApiKeyCreateInput
|
||||
from api_graphql.input.api_key_update_input import ApiKeyUpdateInput
|
||||
@ -8,6 +6,7 @@ from data.schemas.administration.api_key import ApiKey
|
||||
from data.schemas.administration.api_key_dao import apiKeyDao
|
||||
from data.schemas.permission.api_key_permission import ApiKeyPermission
|
||||
from data.schemas.permission.api_key_permission_dao import apiKeyPermissionDao
|
||||
from data.schemas.permission.permission_dao import permissionDao
|
||||
from service.permission.permissions_enum import Permissions
|
||||
|
||||
logger = APILogger(__name__)
|
||||
@ -44,77 +43,28 @@ class APIKeyMutation(MutationABC):
|
||||
async def resolve_create(obj: ApiKeyCreateInput, *_):
|
||||
logger.debug(f"create api key: {obj.__dict__}")
|
||||
|
||||
api_key = ApiKey(
|
||||
0,
|
||||
obj.identifier,
|
||||
str(uuid4()),
|
||||
)
|
||||
api_key = ApiKey.new(obj.identifier)
|
||||
await apiKeyDao.create(api_key)
|
||||
api_key = await apiKeyDao.get_by_identifier(api_key.identifier)
|
||||
api_key = await apiKeyDao.get_single_by([{ApiKey.identifier: obj.identifier}])
|
||||
await apiKeyPermissionDao.create_many(
|
||||
[ApiKeyPermission(0, api_key.id, x) for x in obj.permissions]
|
||||
)
|
||||
return api_key
|
||||
|
||||
@staticmethod
|
||||
async def resolve_update(obj: ApiKeyUpdateInput, *_):
|
||||
async def resolve_update(self, obj: ApiKeyUpdateInput, *_):
|
||||
logger.debug(f"update api key: {input}")
|
||||
api_key = await apiKeyDao.get_by_id(obj.id)
|
||||
|
||||
if obj.permissions is not None:
|
||||
permissions = [
|
||||
x for x in await apiKeyPermissionDao.find_by_api_key_id(api_key.id)
|
||||
]
|
||||
|
||||
to_delete = (
|
||||
permissions
|
||||
if len(obj.permissions) == 0
|
||||
else await apiKeyPermissionDao.find_by(
|
||||
[
|
||||
{ApiKeyPermission.api_key_id: api_key.id},
|
||||
{
|
||||
ApiKeyPermission.permission_id: {
|
||||
"notIn": obj.get("permissions", [])
|
||||
}
|
||||
},
|
||||
]
|
||||
await self._resolve_assignments(
|
||||
obj.get("permissions", []),
|
||||
api_key,
|
||||
ApiKeyPermission.api_key_id,
|
||||
ApiKeyPermission.permission_id,
|
||||
apiKeyDao,
|
||||
apiKeyPermissionDao,
|
||||
ApiKeyPermission,
|
||||
permissionDao,
|
||||
)
|
||||
)
|
||||
permission_ids = [x.permission_id for x in permissions]
|
||||
deleted_permission_ids = [
|
||||
x.permission_id
|
||||
for x in await apiKeyPermissionDao.find_by(
|
||||
[
|
||||
{ApiKeyPermission.api_key_id: api_key.id},
|
||||
{ApiKeyPermission.deleted: True},
|
||||
]
|
||||
)
|
||||
]
|
||||
|
||||
to_create = [
|
||||
ApiKeyPermission(0, api_key.id, x)
|
||||
for x in obj.permissions
|
||||
if x not in permission_ids and x not in deleted_permission_ids
|
||||
]
|
||||
to_restore = [
|
||||
await apiKeyPermissionDao.get_single_by(
|
||||
[
|
||||
{ApiKeyPermission.api_key_id: api_key.id},
|
||||
{ApiKeyPermission.permission_id: x},
|
||||
]
|
||||
)
|
||||
for x in obj.permissions
|
||||
if x not in permission_ids and x in deleted_permission_ids
|
||||
]
|
||||
|
||||
if len(to_delete) > 0:
|
||||
await apiKeyPermissionDao.delete_many(to_delete)
|
||||
|
||||
if len(to_create) > 0:
|
||||
await apiKeyPermissionDao.create_many(to_create)
|
||||
|
||||
if len(to_restore) > 0:
|
||||
await apiKeyPermissionDao.restore_many(to_restore)
|
||||
|
||||
return api_key
|
||||
|
||||
|
@ -2,6 +2,7 @@ from api_graphql.abc.mutation_abc import MutationABC
|
||||
from api_graphql.input.role_create_input import RoleCreateInput
|
||||
from api_graphql.input.role_update_input import RoleUpdateInput
|
||||
from core.logger import APILogger
|
||||
from data.schemas.permission.permission_dao import permissionDao
|
||||
from data.schemas.permission.role import Role
|
||||
from data.schemas.permission.role_dao import roleDao
|
||||
from data.schemas.permission.role_permission import RolePermission
|
||||
@ -54,63 +55,23 @@ class RoleMutation(MutationABC):
|
||||
|
||||
return role
|
||||
|
||||
@staticmethod
|
||||
async def resolve_update(obj: RoleUpdateInput, *_):
|
||||
async def resolve_update(self, obj: RoleUpdateInput, *_):
|
||||
logger.debug(f"update role: {obj.__dict__}")
|
||||
role = await roleDao.get_by_id(obj.id)
|
||||
role.name = obj.get("name", role.name)
|
||||
role.description = obj.get("description", role.description)
|
||||
await roleDao.update(role)
|
||||
|
||||
if obj.permissions is not None:
|
||||
permissions = [x for x in await rolePermissionDao.get_by_role_id(role.id)]
|
||||
|
||||
to_delete = (
|
||||
permissions
|
||||
if len(obj.permissions) == 0
|
||||
else await rolePermissionDao.find_by(
|
||||
[
|
||||
{RolePermission.role_id: role.id},
|
||||
{
|
||||
RolePermission.permission_id: {
|
||||
"notIn": obj.get("permissions", [])
|
||||
}
|
||||
},
|
||||
]
|
||||
await self._resolve_assignments(
|
||||
obj.get("permissions", []),
|
||||
role,
|
||||
RolePermission.role_id,
|
||||
RolePermission.permission_id,
|
||||
roleDao,
|
||||
rolePermissionDao,
|
||||
RolePermission,
|
||||
permissionDao,
|
||||
)
|
||||
)
|
||||
permission_ids = [x.permission_id for x in permissions]
|
||||
deleted_permission_ids = [
|
||||
x.permission_id
|
||||
for x in await rolePermissionDao.find_by(
|
||||
[{RolePermission.role_id: role.id}, {RolePermission.deleted: True}]
|
||||
)
|
||||
]
|
||||
|
||||
to_create = [
|
||||
RolePermission(0, role.id, x)
|
||||
for x in obj.permissions
|
||||
if x not in permission_ids and x not in deleted_permission_ids
|
||||
]
|
||||
to_restore = [
|
||||
await rolePermissionDao.get_single_by(
|
||||
[
|
||||
{RolePermission.role_id: role.id},
|
||||
{RolePermission.permission_id: x},
|
||||
]
|
||||
)
|
||||
for x in obj.permissions
|
||||
if x not in permission_ids and x in deleted_permission_ids
|
||||
]
|
||||
|
||||
if len(to_delete) > 0:
|
||||
await rolePermissionDao.delete_many(to_delete)
|
||||
|
||||
if len(to_create) > 0:
|
||||
await rolePermissionDao.create_many(to_create)
|
||||
|
||||
if len(to_restore) > 0:
|
||||
await rolePermissionDao.restore_many(to_restore)
|
||||
|
||||
return role
|
||||
|
||||
|
@ -1,10 +1,13 @@
|
||||
from api.auth.keycloak_client import Keycloak
|
||||
from api.broadcast import broadcast
|
||||
from api.route import Route
|
||||
from api_graphql.abc.mutation_abc import MutationABC
|
||||
from api_graphql.input.user_create_input import UserCreateInput
|
||||
from api_graphql.input.user_update_input import UserUpdateInput
|
||||
from core.logger import APILogger
|
||||
from data.schemas.administration.user import User
|
||||
from data.schemas.administration.user_dao import userDao
|
||||
from data.schemas.permission.role_dao import roleDao
|
||||
from data.schemas.permission.role_user import RoleUser
|
||||
from data.schemas.permission.role_user_dao import roleUserDao
|
||||
from service.permission.permissions_enum import Permissions
|
||||
@ -49,62 +52,26 @@ class UserMutation(MutationABC):
|
||||
raise ValueError(f"Keycloak user with id {obj.keycloak_id} does not exist")
|
||||
|
||||
user = User(0, obj.keycloak_id)
|
||||
await userDao.create(user)
|
||||
user = await userDao.get_by_keycloak_id(user.keycloak_id)
|
||||
await roleUserDao.create_many([RoleUser(0, user.id, x) for x in obj.roles])
|
||||
user_id = await userDao.create(user)
|
||||
user = await userDao.get_by_id(user_id)
|
||||
await roleUserDao.create_many([RoleUser(0, user.id, x) for x in set(obj.roles)])
|
||||
|
||||
return user
|
||||
|
||||
@staticmethod
|
||||
async def resolve_update(obj: UserUpdateInput, *_):
|
||||
async def resolve_update(self, obj: UserUpdateInput, *_):
|
||||
logger.debug(f"update user: {obj.__dict__}")
|
||||
user = await userDao.get_by_id(obj.id)
|
||||
|
||||
if obj.roles is not None:
|
||||
roles = await roleUserDao.get_by_user_id(user.id)
|
||||
|
||||
to_delete = (
|
||||
roles
|
||||
if len(obj.roles) == 0
|
||||
else await roleUserDao.find_by(
|
||||
[
|
||||
{RoleUser.user_id: user.id},
|
||||
{RoleUser.role_id: {"notIn": obj.get("roles", [])}},
|
||||
]
|
||||
await self._resolve_assignments(
|
||||
obj.get("roles", []),
|
||||
user,
|
||||
RoleUser.user_id,
|
||||
RoleUser.role_id,
|
||||
userDao,
|
||||
roleUserDao,
|
||||
RoleUser,
|
||||
roleDao,
|
||||
)
|
||||
)
|
||||
role_ids = [x.role_id for x in roles]
|
||||
deleted_role_ids = [
|
||||
x.role_id
|
||||
for x in await roleUserDao.find_by(
|
||||
[{RoleUser.user_id: user.id}, {RoleUser.deleted: True}]
|
||||
)
|
||||
]
|
||||
|
||||
to_create = [
|
||||
RoleUser(0, x, user.id)
|
||||
for x in obj.roles
|
||||
if x not in role_ids and x not in deleted_role_ids
|
||||
]
|
||||
to_restore = [
|
||||
await roleUserDao.get_single_by(
|
||||
[
|
||||
{RoleUser.user_id: user.id},
|
||||
{RoleUser.role_id: x},
|
||||
]
|
||||
)
|
||||
for x in obj.roles
|
||||
if x not in role_ids and x in deleted_role_ids
|
||||
]
|
||||
|
||||
if len(to_delete) > 0:
|
||||
await roleUserDao.delete_many(to_delete)
|
||||
|
||||
if len(to_create) > 0:
|
||||
await roleUserDao.create_many(to_create)
|
||||
|
||||
if len(to_restore) > 0:
|
||||
await roleUserDao.restore_many(to_restore)
|
||||
|
||||
return user
|
||||
|
||||
@ -113,6 +80,13 @@ class UserMutation(MutationABC):
|
||||
logger.debug(f"delete user: {id}")
|
||||
user = await userDao.get_by_id(id)
|
||||
await userDao.delete(user)
|
||||
try:
|
||||
active_user = await Route.get_user_or_default()
|
||||
if active_user is not None and active_user.id == user.id:
|
||||
await broadcast.publish("userLogout", user.id)
|
||||
Keycloak.admin.user_logout(user_id=user.keycloak_id)
|
||||
except Exception as e:
|
||||
logger.error(f"Failed to logout user from Keycloak", e)
|
||||
return True
|
||||
|
||||
@staticmethod
|
||||
|
22
api/src/api_graphql/queries/api_key_history_query.py
Normal file
22
api/src/api_graphql/queries/api_key_history_query.py
Normal file
@ -0,0 +1,22 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from data.schemas.permission.api_key_permission_dao import apiKeyPermissionDao
|
||||
from data.schemas.permission.permission_dao import permissionDao
|
||||
|
||||
|
||||
class ApiKeyHistoryQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "ApiKey")
|
||||
|
||||
self.set_field("identifier", lambda x, *_: x.identifier)
|
||||
self.set_field("key", lambda x, *_: x.key)
|
||||
self.set_field(
|
||||
"permissions",
|
||||
lambda x, *_: self._resolve_foreign_history(
|
||||
x.updated,
|
||||
x.id,
|
||||
apiKeyPermissionDao,
|
||||
permissionDao,
|
||||
lambda y: y.permission_id,
|
||||
obj_key="apikeyid",
|
||||
),
|
||||
)
|
@ -1,9 +1,14 @@
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from data.schemas.administration.api_key_dao import apiKeyDao
|
||||
from data.schemas.permission.role_permission_dao import rolePermissionDao
|
||||
|
||||
|
||||
class ApiKeyQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "ApiKey")
|
||||
DbModelQueryABC.__init__(self, "ApiKey", apiKeyDao, with_history=True)
|
||||
|
||||
self.set_field("identifier", lambda x, *_: x.identifier)
|
||||
self.set_field("key", lambda x, *_: x.key)
|
||||
self.set_field("permissions", lambda x, *_: x.permissions)
|
||||
|
||||
self.set_history_reference_dao(rolePermissionDao, "apikeyid")
|
||||
|
22
api/src/api_graphql/queries/domain_history_query.py
Normal file
22
api/src/api_graphql/queries/domain_history_query.py
Normal file
@ -0,0 +1,22 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from data.schemas.public.domain import Domain
|
||||
from data.schemas.public.short_url import ShortUrl
|
||||
from data.schemas.public.short_url_dao import shortUrlDao
|
||||
|
||||
|
||||
class DomainHistoryQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "Domain")
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.set_field("shortUrls", self._get_urls)
|
||||
|
||||
@staticmethod
|
||||
async def _get_urls(domain: Domain, *_):
|
||||
return await shortUrlDao.find_by(
|
||||
[
|
||||
{ShortUrl.domain_id: domain.id},
|
||||
{ShortUrl.deleted: False},
|
||||
{"updated": {"lessOrEqual": domain.updated}},
|
||||
]
|
||||
)
|
@ -1,5 +1,6 @@
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from data.schemas.public.domain import Domain
|
||||
from data.schemas.public.domain_dao import domainDao
|
||||
from data.schemas.public.group import Group
|
||||
from data.schemas.public.short_url import ShortUrl
|
||||
from data.schemas.public.short_url_dao import shortUrlDao
|
||||
@ -7,11 +8,13 @@ from data.schemas.public.short_url_dao import shortUrlDao
|
||||
|
||||
class DomainQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "Domain")
|
||||
DbModelQueryABC.__init__(self, "Domain", domainDao, with_history=True)
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.set_field("shortUrls", self._get_urls)
|
||||
|
||||
self.set_history_reference_dao(shortUrlDao, "domainid")
|
||||
|
||||
@staticmethod
|
||||
async def _get_urls(domain: Domain, *_):
|
||||
return await shortUrlDao.find_by({ShortUrl.domain_id: domain.id})
|
||||
|
47
api/src/api_graphql/queries/group_history_query.py
Normal file
47
api/src/api_graphql/queries/group_history_query.py
Normal file
@ -0,0 +1,47 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from api_graphql.field.resolver_field_builder import ResolverFieldBuilder
|
||||
from api_graphql.require_any_resolvers import group_by_assignment_resolver
|
||||
from data.schemas.public.group import Group
|
||||
from data.schemas.public.group_dao import groupDao
|
||||
from data.schemas.public.group_role_assignment_dao import groupRoleAssignmentDao
|
||||
from data.schemas.public.short_url import ShortUrl
|
||||
from data.schemas.public.short_url_dao import shortUrlDao
|
||||
from service.permission.permissions_enum import Permissions
|
||||
|
||||
|
||||
class GroupHistoryQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "Group")
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.field(
|
||||
ResolverFieldBuilder("shortUrls")
|
||||
.with_resolver(self._get_urls)
|
||||
.with_require_any(
|
||||
[
|
||||
Permissions.groups,
|
||||
],
|
||||
[group_by_assignment_resolver],
|
||||
)
|
||||
)
|
||||
self.set_field(
|
||||
"roles",
|
||||
lambda x, *_: self._resolve_foreign_history(
|
||||
x.updated,
|
||||
x.id,
|
||||
groupRoleAssignmentDao,
|
||||
groupDao,
|
||||
lambda y: y.role_id,
|
||||
obj_key="groupid",
|
||||
),
|
||||
)
|
||||
|
||||
@staticmethod
|
||||
async def _get_urls(group: Group, *_):
|
||||
return await shortUrlDao.find_by(
|
||||
[
|
||||
{ShortUrl.group_id: group.id},
|
||||
{ShortUrl.deleted: False},
|
||||
{"updated": {"lessOrEqual": group.updated}},
|
||||
]
|
||||
)
|
@ -3,6 +3,7 @@ from api_graphql.field.resolver_field_builder import ResolverFieldBuilder
|
||||
from api_graphql.require_any_resolvers import group_by_assignment_resolver
|
||||
from data.schemas.public.group import Group
|
||||
from data.schemas.public.group_dao import groupDao
|
||||
from data.schemas.public.group_role_assignment_dao import groupRoleAssignmentDao
|
||||
from data.schemas.public.short_url import ShortUrl
|
||||
from data.schemas.public.short_url_dao import shortUrlDao
|
||||
from service.permission.permissions_enum import Permissions
|
||||
@ -10,7 +11,7 @@ from service.permission.permissions_enum import Permissions
|
||||
|
||||
class GroupQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "Group")
|
||||
DbModelQueryABC.__init__(self, "Group", groupDao, with_history=True)
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.field(
|
||||
@ -25,6 +26,9 @@ class GroupQuery(DbModelQueryABC):
|
||||
)
|
||||
self.set_field("roles", self._get_roles)
|
||||
|
||||
self.set_history_reference_dao(shortUrlDao, "groupid")
|
||||
self.set_history_reference_dao(groupRoleAssignmentDao, "groupid")
|
||||
|
||||
@staticmethod
|
||||
async def _get_urls(group: Group, *_):
|
||||
return await shortUrlDao.find_by({ShortUrl.group_id: group.id})
|
||||
|
24
api/src/api_graphql/queries/role_history_query.py
Normal file
24
api/src/api_graphql/queries/role_history_query.py
Normal file
@ -0,0 +1,24 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from data.schemas.administration.user_dao import userDao
|
||||
from data.schemas.permission.permission_dao import permissionDao
|
||||
from data.schemas.permission.role_permission_dao import rolePermissionDao
|
||||
from data.schemas.permission.role_user_dao import roleUserDao
|
||||
|
||||
|
||||
class RoleHistoryQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "Role")
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.set_field("description", lambda x, *_: x.description)
|
||||
self.set_field(
|
||||
"permissions",
|
||||
lambda x, *_: self._resolve_foreign_history(
|
||||
x.updated,
|
||||
x.id,
|
||||
rolePermissionDao,
|
||||
permissionDao,
|
||||
lambda y: y.permission_id,
|
||||
obj_key="roleid",
|
||||
),
|
||||
)
|
@ -1,11 +1,17 @@
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from data.schemas.permission.role_dao import roleDao
|
||||
from data.schemas.permission.role_permission_dao import rolePermissionDao
|
||||
from data.schemas.permission.role_user_dao import roleUserDao
|
||||
|
||||
|
||||
class RoleQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "Role")
|
||||
DbModelQueryABC.__init__(self, "Role", roleDao, with_history=True)
|
||||
|
||||
self.set_field("name", lambda x, *_: x.name)
|
||||
self.set_field("description", lambda x, *_: x.description)
|
||||
self.set_field("permissions", lambda x, *_: x.permissions)
|
||||
self.set_field("users", lambda x, *_: x.users)
|
||||
|
||||
self.set_history_reference_dao(rolePermissionDao, "roleid")
|
||||
self.set_history_reference_dao(roleUserDao, "roleid")
|
||||
|
14
api/src/api_graphql/queries/short_url_history_query.py
Normal file
14
api/src/api_graphql/queries/short_url_history_query.py
Normal file
@ -0,0 +1,14 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
|
||||
|
||||
class ShortUrlQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "ShortUrl")
|
||||
|
||||
self.set_field("shortUrl", lambda x, *_: x.short_url)
|
||||
self.set_field("targetUrl", lambda x, *_: x.target_url)
|
||||
self.set_field("description", lambda x, *_: x.description)
|
||||
self.set_field("group", lambda x, *_: x.group)
|
||||
self.set_field("domain", lambda x, *_: x.domain)
|
||||
self.set_field("visits", lambda x, *_: x.visit_count)
|
||||
self.set_field("loadingScreen", lambda x, *_: x.loading_screen)
|
@ -1,9 +1,10 @@
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from data.schemas.public.short_url_dao import shortUrlDao
|
||||
|
||||
|
||||
class ShortUrlQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "ShortUrl")
|
||||
DbModelQueryABC.__init__(self, "ShortUrl", shortUrlDao, with_history=True)
|
||||
|
||||
self.set_field("shortUrl", lambda x, *_: x.short_url)
|
||||
self.set_field("targetUrl", lambda x, *_: x.target_url)
|
||||
|
23
api/src/api_graphql/queries/user_history_query.py
Normal file
23
api/src/api_graphql/queries/user_history_query.py
Normal file
@ -0,0 +1,23 @@
|
||||
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
|
||||
from data.schemas.permission.role_dao import roleDao
|
||||
from data.schemas.permission.role_user_dao import roleUserDao
|
||||
|
||||
|
||||
class UserHistoryQuery(DbHistoryModelQueryABC):
|
||||
def __init__(self):
|
||||
DbHistoryModelQueryABC.__init__(self, "User")
|
||||
|
||||
self.set_field("keycloakId", lambda x, *_: x.keycloak_id)
|
||||
self.set_field("username", lambda x, *_: x.username)
|
||||
self.set_field("email", lambda x, *_: x.email)
|
||||
self.set_field(
|
||||
"roles",
|
||||
lambda x, *_: self._resolve_foreign_history(
|
||||
x.updated,
|
||||
x.id,
|
||||
roleUserDao,
|
||||
roleDao,
|
||||
lambda y: y.role_id,
|
||||
obj_key="userid",
|
||||
),
|
||||
)
|
@ -1,11 +1,15 @@
|
||||
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
|
||||
from data.schemas.administration.user_dao import userDao
|
||||
from data.schemas.permission.role_user_dao import roleUserDao
|
||||
|
||||
|
||||
class UserQuery(DbModelQueryABC):
|
||||
def __init__(self):
|
||||
DbModelQueryABC.__init__(self, "User")
|
||||
DbModelQueryABC.__init__(self, "User", userDao, with_history=True)
|
||||
|
||||
self.set_field("keycloakId", lambda x, *_: x.keycloak_id)
|
||||
self.set_field("username", lambda x, *_: x.username)
|
||||
self.set_field("email", lambda x, *_: x.email)
|
||||
self.set_field("roles", lambda x, *_: x.roles)
|
||||
|
||||
self.set_history_reference_dao(roleUserDao, "userid")
|
||||
|
@ -49,6 +49,12 @@ class Subscription(SubscriptionABC):
|
||||
.with_public(True)
|
||||
)
|
||||
|
||||
self.subscribe(
|
||||
SubscriptionFieldBuilder("userLogout")
|
||||
.with_resolver(lambda message, *_: message.message)
|
||||
.with_public(True)
|
||||
)
|
||||
|
||||
self.subscribe(
|
||||
SubscriptionFieldBuilder("domainChange")
|
||||
.with_resolver(lambda message, *_: message.message)
|
||||
|
@ -11,7 +11,7 @@ from core.database.external_data_temp_table_builder import ExternalDataTempTable
|
||||
from core.get_value import get_value
|
||||
from core.logger import DBLogger
|
||||
from core.string import camel_to_snake
|
||||
from core.typing import T, Attribute, AttributeFilters, AttributeSorts
|
||||
from core.typing import T, Attribute, AttributeFilters, AttributeSorts, Id
|
||||
|
||||
T_DBM = TypeVar("T_DBM", bound=DbModelABC)
|
||||
|
||||
@ -51,6 +51,7 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
db_name: str = None,
|
||||
ignore=False,
|
||||
primary_key=False,
|
||||
aliases: list[str] = None,
|
||||
):
|
||||
"""
|
||||
Add an attribute for db and object mapping to the data access object
|
||||
@ -59,6 +60,7 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
:param str db_name: Name of the field in the database, if None the attribute lowered attr_name without "_" is used
|
||||
:param bool ignore: Defines if field is ignored for create and update (for e.g. auto increment fields or created/updated fields)
|
||||
:param bool primary_key: Defines if field is the primary key
|
||||
:param list[str] aliases: List of aliases for the attribute name
|
||||
:return:
|
||||
"""
|
||||
if isinstance(attr_name, property):
|
||||
@ -72,11 +74,20 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
db_name = attr_name.lower().replace("_", "")
|
||||
|
||||
self.__db_names[attr_name] = db_name
|
||||
self.__db_names[db_name] = db_name
|
||||
|
||||
if aliases is not None:
|
||||
for alias in aliases:
|
||||
if alias in self.__db_names:
|
||||
raise ValueError(f"Alias {alias} already exists")
|
||||
self.__db_names[alias] = db_name
|
||||
|
||||
if primary_key:
|
||||
self.__primary_key = db_name
|
||||
self.__primary_key_type = attr_type
|
||||
|
||||
if attr_type in [datetime, datetime.datetime]:
|
||||
self.__date_attributes.add(attr_name)
|
||||
self.__date_attributes.add(db_name)
|
||||
|
||||
def reference(
|
||||
@ -156,9 +167,42 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
return 0
|
||||
return result[0]["count"]
|
||||
|
||||
async def get_history(
|
||||
self,
|
||||
entry_id: int,
|
||||
by_key: str = None,
|
||||
when: datetime = None,
|
||||
until: datetime = None,
|
||||
without_deleted=False,
|
||||
) -> list[T_DBM]:
|
||||
query = f"SELECT {self._table_name}_history.* FROM {self._table_name}_history"
|
||||
for join in self.__joins:
|
||||
query += f" {self.__joins[join].replace(self._table_name, f'{self._table_name}_history')}"
|
||||
|
||||
query += f" WHERE {f'{self._table_name}_history.{self.__primary_key}' if by_key is None else f'{self._table_name}_history.{by_key}'} = {entry_id}"
|
||||
|
||||
if self._default_filter_condition is not None:
|
||||
query += f" AND {self._default_filter_condition}"
|
||||
|
||||
if without_deleted:
|
||||
query += f" AND {self._table_name}_history.deleted = false"
|
||||
|
||||
if when is not None:
|
||||
query += f" AND {self._attr_from_date_to_char(f'{self._table_name}_history.updated')} = '{when.strftime(DATETIME_FORMAT)}'"
|
||||
|
||||
if until is not None:
|
||||
query += f" AND {self._attr_from_date_to_char(f'{self._table_name}_history.updated')} <= '{until.strftime(DATETIME_FORMAT)}'"
|
||||
|
||||
query += f" ORDER BY {self._table_name}_history.updated DESC;"
|
||||
|
||||
result = await self._db.select_map(query)
|
||||
if result is None:
|
||||
return []
|
||||
return [self.to_object(x) for x in result]
|
||||
|
||||
async def get_all(self) -> list[T_DBM]:
|
||||
result = await self._db.select_map(
|
||||
f"SELECT * FROM {self._table_name}{f" WHERE {self._default_filter_condition}" if self._default_filter_condition is not None else ''}"
|
||||
f"SELECT * FROM {self._table_name}{f" WHERE {self._default_filter_condition}" if self._default_filter_condition is not None else ''} ORDER BY {self.__primary_key};"
|
||||
)
|
||||
if result is None:
|
||||
return []
|
||||
@ -278,6 +322,35 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
raise ValueError("More than one result found")
|
||||
return result[0]
|
||||
|
||||
async def touch(self, obj: T_DBM):
|
||||
"""
|
||||
Touch the entry to update the last updated date
|
||||
:return:
|
||||
"""
|
||||
await self._db.execute(
|
||||
f"""
|
||||
UPDATE {self._table_name}
|
||||
SET updated = NOW()
|
||||
WHERE {self.__primary_key} = {self._get_primary_key_value_sql(obj)};
|
||||
"""
|
||||
)
|
||||
|
||||
async def touch_many_by_id(self, ids: list[Id]):
|
||||
"""
|
||||
Touch the entries to update the last updated date
|
||||
:return:
|
||||
"""
|
||||
if len(ids) == 0:
|
||||
return
|
||||
|
||||
await self._db.execute(
|
||||
f"""
|
||||
UPDATE {self._table_name}
|
||||
SET updated = NOW()
|
||||
WHERE {self.__primary_key} IN ({", ".join([str(x) for x in ids])});
|
||||
"""
|
||||
)
|
||||
|
||||
async def _build_create_statement(self, obj: T_DBM, skip_editor=False) -> str:
|
||||
allowed_fields = [
|
||||
x for x in self.__attributes.keys() if x not in self.__ignored_attributes
|
||||
@ -499,20 +572,41 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
take: int = None,
|
||||
skip: int = None,
|
||||
) -> str:
|
||||
filter_conditions = []
|
||||
sort_conditions = []
|
||||
|
||||
external_table_deps = []
|
||||
query = f"SELECT {self._table_name}.* FROM {self._table_name}"
|
||||
for join in self.__joins:
|
||||
query += f" {self.__joins[join]}"
|
||||
|
||||
# Collect dependencies from filters
|
||||
if filters is not None and (not isinstance(filters, list) or len(filters) > 0):
|
||||
conditions, external_table_deps = await self._build_conditions(filters)
|
||||
filter_conditions, filter_deps = await self._build_conditions(filters)
|
||||
external_table_deps.extend(filter_deps)
|
||||
|
||||
# Collect dependencies from sorts
|
||||
if sorts is not None and (not isinstance(sorts, list) or len(sorts) > 0):
|
||||
sort_conditions, sort_deps = self._build_order_by(sorts)
|
||||
external_table_deps.extend(sort_deps)
|
||||
|
||||
# Handle external table dependencies before WHERE and ORDER BY
|
||||
if external_table_deps:
|
||||
query = await self._handle_query_external_temp_tables(
|
||||
query, external_table_deps
|
||||
)
|
||||
query += f" WHERE {conditions}"
|
||||
|
||||
# Add WHERE clause
|
||||
if filters is not None and (not isinstance(filters, list) or len(filters) > 0):
|
||||
query += f" WHERE {filter_conditions}"
|
||||
|
||||
# Add ORDER BY clause
|
||||
if sorts is not None and (not isinstance(sorts, list) or len(sorts) > 0):
|
||||
query += f" ORDER BY {self._build_order_by(sorts)}"
|
||||
query += f" ORDER BY {sort_conditions}"
|
||||
|
||||
if take is not None:
|
||||
query += f" LIMIT {take}"
|
||||
|
||||
if skip is not None:
|
||||
query += f" OFFSET {skip}"
|
||||
|
||||
@ -737,8 +831,10 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
:param value:
|
||||
:return:
|
||||
"""
|
||||
if db_name in self.__date_attributes:
|
||||
db_name = f"TO_CHAR({db_name}, 'DD.MM.YYYY HH24:MI:SS.US')"
|
||||
attr = db_name.split(".")[-1]
|
||||
|
||||
if attr in self.__date_attributes:
|
||||
db_name = self._attr_from_date_to_char(db_name)
|
||||
|
||||
sql_value = self._get_value_sql(value)
|
||||
if operator == "equal":
|
||||
@ -774,12 +870,17 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
else:
|
||||
raise ValueError(f"Unsupported operator: {operator}")
|
||||
|
||||
def _build_order_by(self, sorts: AttributeSorts) -> str:
|
||||
@staticmethod
|
||||
def _attr_from_date_to_char(attr: str) -> str:
|
||||
return f"TO_CHAR({attr}, 'YYYY-MM-DD HH24:MI:SS.US TZ')"
|
||||
|
||||
def _build_order_by(self, sorts: AttributeSorts) -> (str, list[str]):
|
||||
"""
|
||||
Build SQL order by clause from the given sorts
|
||||
:param sorts:
|
||||
:return:
|
||||
"""
|
||||
external_field_table_deps = []
|
||||
if not isinstance(sorts, list):
|
||||
sorts = [sorts]
|
||||
|
||||
@ -791,35 +892,38 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
|
||||
if attr in self.__foreign_tables:
|
||||
foreign_table = self.__foreign_tables[attr]
|
||||
sort_clauses.extend(
|
||||
self._build_foreign_order_by(foreign_table, direction)
|
||||
f_sorts, eftd = self._build_foreign_order_by(
|
||||
foreign_table, direction
|
||||
)
|
||||
if eftd:
|
||||
external_field_table_deps.extend(eftd)
|
||||
|
||||
sort_clauses.extend(f_sorts)
|
||||
continue
|
||||
|
||||
match attr:
|
||||
case "createdUtc":
|
||||
attr = "created"
|
||||
case "updatedUtc":
|
||||
attr = "updated"
|
||||
|
||||
if attr.endswith("Utc") and attr.split("Utc")[0].lower() in [
|
||||
"created",
|
||||
"updated",
|
||||
]:
|
||||
attr = attr.replace("Utc", "")
|
||||
|
||||
external_fields_table_name = self._get_external_field_key(attr)
|
||||
if external_fields_table_name is not None:
|
||||
external_fields_table = self._external_fields[
|
||||
external_fields_table_name
|
||||
]
|
||||
db_name = f"{external_fields_table.table_name}.{attr}"
|
||||
external_field_table_deps.append(external_fields_table.table_name)
|
||||
else:
|
||||
db_name = self.__db_names[attr]
|
||||
sort_clauses.append(f"{db_name} {direction.upper()}")
|
||||
|
||||
return ", ".join(sort_clauses)
|
||||
return ", ".join(sort_clauses), external_field_table_deps
|
||||
|
||||
def _build_foreign_order_by(self, table: str, direction: str) -> list[str]:
|
||||
def _build_foreign_order_by(
|
||||
self, table: str, direction: dict
|
||||
) -> (list[str], list[str]):
|
||||
"""
|
||||
Build SQL order by clause for foreign key references
|
||||
:param table: Foreign table name
|
||||
:param direction: Sort direction
|
||||
:return: List of order by clauses
|
||||
"""
|
||||
external_field_table_deps = []
|
||||
sort_clauses = []
|
||||
for attr, sub_direction in direction.items():
|
||||
if isinstance(attr, property):
|
||||
@ -827,15 +931,25 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
|
||||
|
||||
if attr in self.__foreign_tables:
|
||||
foreign_table = self.__foreign_tables[attr]
|
||||
sort_clauses.extend(
|
||||
self._build_foreign_order_by(foreign_table, sub_direction)
|
||||
)
|
||||
f_sorts, eftd = self._build_foreign_order_by(foreign_table, direction)
|
||||
if eftd:
|
||||
external_field_table_deps.extend(eftd)
|
||||
|
||||
sort_clauses.extend(f_sorts)
|
||||
continue
|
||||
|
||||
external_fields_table_name = self._get_external_field_key(attr)
|
||||
if external_fields_table_name is not None:
|
||||
external_fields_table = self._external_fields[
|
||||
external_fields_table_name
|
||||
]
|
||||
db_name = f"{external_fields_table.table_name}.{attr}"
|
||||
external_field_table_deps.append(external_fields_table.table_name)
|
||||
else:
|
||||
db_name = f"{table}.{attr.lower().replace('_', '')}"
|
||||
sort_clauses.append(f"{db_name} {sub_direction.upper()}")
|
||||
|
||||
return sort_clauses
|
||||
return sort_clauses, external_field_table_deps
|
||||
|
||||
@staticmethod
|
||||
async def _get_editor_id(obj: T_DBM):
|
||||
|
19
api/src/core/database/abc/db_join_model_abc.py
Normal file
19
api/src/core/database/abc/db_join_model_abc.py
Normal file
@ -0,0 +1,19 @@
|
||||
from datetime import datetime
|
||||
from typing import Optional
|
||||
|
||||
from core.database.abc.db_model_abc import DbModelABC
|
||||
from core.typing import Id, SerialId
|
||||
|
||||
|
||||
class DbJoinModelABC(DbModelABC):
|
||||
def __init__(
|
||||
self,
|
||||
id: Id,
|
||||
source_id: Id,
|
||||
foreign_id: Id,
|
||||
deleted: bool = False,
|
||||
editor_id: Optional[SerialId] = None,
|
||||
created: Optional[datetime] = None,
|
||||
updated: Optional[datetime] = None,
|
||||
):
|
||||
DbModelABC.__init__(self, id, deleted, editor_id, created, updated)
|
@ -54,7 +54,7 @@ class DbModelABC(ABC):
|
||||
|
||||
from data.schemas.administration.user_dao import userDao
|
||||
|
||||
return await userDao.get_by_id(self._editor_id)
|
||||
return await userDao.find_single_by({"id": self._editor_id})
|
||||
|
||||
@property
|
||||
def created(self) -> datetime:
|
||||
|
@ -15,5 +15,5 @@ class DbModelDaoABC[T_DBM](DataAccessObjectABC[T_DBM]):
|
||||
self.attribute(DbModelABC.id, int, ignore=True)
|
||||
self.attribute(DbModelABC.deleted, bool)
|
||||
self.attribute(DbModelABC.editor_id, int, ignore=True)
|
||||
self.attribute(DbModelABC.created, datetime, "createdutc", ignore=True)
|
||||
self.attribute(DbModelABC.updated, datetime, "updatedutc", ignore=True)
|
||||
self.attribute(DbModelABC.created, datetime, "created", ignore=True)
|
||||
self.attribute(DbModelABC.updated, datetime, "updated", ignore=True)
|
||||
|
@ -29,6 +29,11 @@ def get_value(
|
||||
value,
|
||||
cast_type if not hasattr(cast_type, "__origin__") else cast_type.__origin__,
|
||||
):
|
||||
# Handle list[int] case explicitly
|
||||
if hasattr(cast_type, "__origin__") and cast_type.__origin__ == list:
|
||||
subtype = cast_type.__args__[0] if hasattr(cast_type, "__args__") else None
|
||||
if subtype is not None:
|
||||
return [subtype(item) for item in value]
|
||||
return value
|
||||
|
||||
try:
|
||||
|
@ -0,0 +1,2 @@
|
||||
DROP EXTENSION IF EXISTS fuzzystrmatch;
|
||||
CREATE EXTENSION fuzzystrmatch SCHEMA public;
|
133
api/src/data/scripts/2025-04-07-12-15-rename-utc-fields.sql
Normal file
133
api/src/data/scripts/2025-04-07-12-15-rename-utc-fields.sql
Normal file
@ -0,0 +1,133 @@
|
||||
ALTER TABLE system._executed_migrations
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.files
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.files_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.short_url_visits
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.short_url_visits_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.feature_flags_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.user_settings_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE administration.users
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE administration.users_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.groups
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.groups_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.short_urls
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE administration.api_keys
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE administration.api_keys_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.domains
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.domains_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.short_urls_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.settings
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.group_role_assignments
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.group_role_assignments_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.settings_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE public.user_settings
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.permissions
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.permissions_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.roles
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.roles_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.role_permissions
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.role_permissions_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.role_users
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.role_users_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.api_key_permissions
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE permission.api_key_permissions_history
|
||||
RENAME COLUMN createdutc TO created;
|
||||
ALTER TABLE system.feature_flags
|
||||
RENAME COLUMN createdutc TO created;
|
||||
|
||||
ALTER TABLE system._executed_migrations
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.files
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.files_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.short_url_visits
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.short_url_visits_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.feature_flags_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.user_settings_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE administration.users
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE administration.users_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.groups
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.groups_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.short_urls
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE administration.api_keys
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE administration.api_keys_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.domains
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.domains_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.short_urls_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.settings
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.group_role_assignments
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.group_role_assignments_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.settings_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE public.user_settings
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.permissions
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.permissions_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.roles
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.roles_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.role_permissions
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.role_permissions_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.role_users
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.role_users_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.api_key_permissions
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE permission.api_key_permissions_history
|
||||
RENAME COLUMN updatedutc TO updated;
|
||||
ALTER TABLE system.feature_flags
|
||||
RENAME COLUMN updatedutc TO updated;
|
@ -0,0 +1,37 @@
|
||||
CREATE OR REPLACE FUNCTION public.history_trigger_function()
|
||||
RETURNS TRIGGER AS
|
||||
$$
|
||||
DECLARE
|
||||
schema_name TEXT;
|
||||
history_table_name TEXT;
|
||||
BEGIN
|
||||
-- Construct the name of the history table based on the current table
|
||||
schema_name := TG_TABLE_SCHEMA;
|
||||
history_table_name := TG_TABLE_NAME || '_history';
|
||||
|
||||
IF (TG_OP = 'INSERT') THEN
|
||||
RETURN NEW;
|
||||
END IF;
|
||||
|
||||
-- Insert the old row into the history table on UPDATE or DELETE
|
||||
IF (TG_OP = 'UPDATE' OR TG_OP = 'DELETE') THEN
|
||||
EXECUTE format(
|
||||
'INSERT INTO %I.%I SELECT ($1).*',
|
||||
schema_name,
|
||||
history_table_name
|
||||
)
|
||||
USING OLD;
|
||||
END IF;
|
||||
|
||||
-- For UPDATE, update the UpdatedUtc column and return the new row
|
||||
IF (TG_OP = 'UPDATE') THEN
|
||||
NEW.updated := NOW(); -- Update the UpdatedUtc column
|
||||
RETURN NEW;
|
||||
END IF;
|
||||
|
||||
-- For DELETE, return OLD to allow the deletion
|
||||
IF (TG_OP = 'DELETE') THEN
|
||||
RETURN OLD;
|
||||
END IF;
|
||||
END;
|
||||
$$ LANGUAGE plpgsql;
|
23
api/src/data/scripts/2025-04-13-08-45-fix-join-tables.sql
Normal file
23
api/src/data/scripts/2025-04-13-08-45-fix-join-tables.sql
Normal file
@ -0,0 +1,23 @@
|
||||
ALTER TABLE permission.role_permissions
|
||||
ADD CONSTRAINT unique_role_permission
|
||||
UNIQUE (roleid, permissionid);
|
||||
|
||||
ALTER TABLE permission.api_key_permissions
|
||||
ADD CONSTRAINT unique_api_key_permission
|
||||
UNIQUE (apikeyid, permissionid);
|
||||
|
||||
ALTER TABLE permission.role_users
|
||||
ADD CONSTRAINT unique_role_user
|
||||
UNIQUE (roleid, userid);
|
||||
|
||||
ALTER TABLE public.user_settings
|
||||
ADD CONSTRAINT unique_user_setting
|
||||
UNIQUE (userid, key);
|
||||
|
||||
ALTER TABLE system.settings
|
||||
ADD CONSTRAINT unique_system_setting
|
||||
UNIQUE (key);
|
||||
|
||||
ALTER TABLE system.feature_flags
|
||||
ADD CONSTRAINT unique_feature_flag
|
||||
UNIQUE (key);
|
@ -111,7 +111,11 @@ def _find_short_url_by_path(path: str) -> Optional[dict]:
|
||||
if "errors" in data:
|
||||
logger.warning(f"Failed to find short url by path {path} -> {data["errors"]}")
|
||||
|
||||
if "data" not in data or "shortUrls" not in data["data"] or "nodes" not in data["data"]["shortUrls"]:
|
||||
if (
|
||||
"data" not in data
|
||||
or "shortUrls" not in data["data"]
|
||||
or "nodes" not in data["data"]["shortUrls"]
|
||||
):
|
||||
return None
|
||||
|
||||
data = data["data"]["shortUrls"]["nodes"]
|
||||
|
@ -4,4 +4,8 @@ RUN rm -rf /usr/share/nginx/html/*
|
||||
COPY ./dist/open-redirect/browser/ /usr/share/nginx/html
|
||||
RUN apk update
|
||||
RUN apk add bash
|
||||
|
||||
ARG VERSION
|
||||
RUN echo "{\"version\": \"${VERSION}\"}" > /usr/share/nginx/html/assets/version.json
|
||||
|
||||
CMD /bin/bash -c "envsubst '\$CONTAINER_NAME' < /etc/nginx/conf.d/nginx.conf.template > /etc/nginx/nginx.conf; nginx -g 'daemon off;'"
|
||||
|
@ -9,7 +9,10 @@
|
||||
"misprintCoefficient": "0.9",
|
||||
"ignoredKeys": [
|
||||
"permissions.*",
|
||||
"permission_descriptions.*"
|
||||
"permission_descriptions.*",
|
||||
"event.participants.attendance_states.*",
|
||||
"event.participants.payment_*",
|
||||
"primeng.*"
|
||||
],
|
||||
"ignoredMisprintKeys": [],
|
||||
"customRegExpToFindKeys": [
|
||||
|
@ -1,11 +1,16 @@
|
||||
<main *ngIf="isLoggedIn && !hideUI; else home" [class]="theme">
|
||||
<main [class]="theme">
|
||||
<div
|
||||
class="warning bg3 flex justify-center p-1.5"
|
||||
*ngIf="showTechnicalDemoBanner">
|
||||
{{ 'technical_demo_banner' | translate }}
|
||||
</div>
|
||||
<app-header></app-header>
|
||||
|
||||
<div class="app">
|
||||
<aside *ngIf="showSidebar">
|
||||
<app-sidebar></app-sidebar>
|
||||
</aside>
|
||||
<section class="component">
|
||||
<section class="component" *ngIf="loadedGuiSettings">
|
||||
<router-outlet></router-outlet>
|
||||
</section>
|
||||
</div>
|
||||
@ -30,7 +35,3 @@
|
||||
</p-confirmDialog>
|
||||
</main>
|
||||
<app-spinner></app-spinner>
|
||||
|
||||
<ng-template #home>
|
||||
<router-outlet></router-outlet>
|
||||
</ng-template>
|
@ -2,8 +2,8 @@ import { Component, OnDestroy } from '@angular/core';
|
||||
import { SidebarService } from 'src/app/service/sidebar.service';
|
||||
import { Subject } from 'rxjs';
|
||||
import { takeUntil } from 'rxjs/operators';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { GuiService } from 'src/app/service/gui.service';
|
||||
import { FeatureFlagService } from 'src/app/service/feature-flag.service';
|
||||
|
||||
@Component({
|
||||
selector: 'app-root',
|
||||
@ -11,36 +11,35 @@ import { GuiService } from 'src/app/service/gui.service';
|
||||
styleUrl: './app.component.scss',
|
||||
})
|
||||
export class AppComponent implements OnDestroy {
|
||||
theme = 'open-redirect';
|
||||
showSidebar = false;
|
||||
hideUI = false;
|
||||
isLoggedIn = false;
|
||||
theme = 'lan-maestro';
|
||||
showTechnicalDemoBanner = false;
|
||||
|
||||
loadedGuiSettings = false;
|
||||
unsubscribe$ = new Subject<void>();
|
||||
|
||||
constructor(
|
||||
private sidebar: SidebarService,
|
||||
private auth: AuthService,
|
||||
private gui: GuiService
|
||||
private gui: GuiService,
|
||||
private features: FeatureFlagService
|
||||
) {
|
||||
this.auth.loadUser();
|
||||
|
||||
this.auth.user$.pipe(takeUntil(this.unsubscribe$)).subscribe(user => {
|
||||
this.isLoggedIn = user !== null && user !== undefined;
|
||||
this.features.get('TechnicalDemoBanner').then(showTechnicalDemoBanner => {
|
||||
this.showTechnicalDemoBanner = showTechnicalDemoBanner;
|
||||
});
|
||||
|
||||
this.sidebar.visible$
|
||||
.pipe(takeUntil(this.unsubscribe$))
|
||||
.subscribe(visible => {
|
||||
this.showSidebar = visible;
|
||||
});
|
||||
|
||||
this.gui.hideGui$.pipe(takeUntil(this.unsubscribe$)).subscribe(hide => {
|
||||
this.hideUI = hide;
|
||||
});
|
||||
|
||||
this.gui.theme$.pipe(takeUntil(this.unsubscribe$)).subscribe(theme => {
|
||||
this.theme = theme;
|
||||
});
|
||||
this.gui.loadedGuiSettings$
|
||||
.pipe(takeUntil(this.unsubscribe$))
|
||||
.subscribe(loaded => {
|
||||
this.loadedGuiSettings = loaded;
|
||||
});
|
||||
}
|
||||
|
||||
ngOnDestroy() {
|
||||
|
@ -1,4 +1,11 @@
|
||||
import { APP_INITIALIZER, ErrorHandler, NgModule } from '@angular/core';
|
||||
import {
|
||||
APP_INITIALIZER,
|
||||
ApplicationRef,
|
||||
DoBootstrap,
|
||||
ErrorHandler,
|
||||
Injector,
|
||||
NgModule,
|
||||
} from '@angular/core';
|
||||
import { BrowserModule } from '@angular/platform-browser';
|
||||
|
||||
import { AppRoutingModule } from './app-routing.module';
|
||||
@ -23,6 +30,8 @@ import { SidebarComponent } from './components/sidebar/sidebar.component';
|
||||
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
|
||||
import { ConfigService } from 'src/app/service/config.service';
|
||||
import { ServerUnavailableComponent } from 'src/app/components/error/server-unavailable/server-unavailable.component';
|
||||
import { SpinnerService } from 'src/app/service/spinner.service';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
|
||||
if (environment.production) {
|
||||
Logger.enableProductionMode();
|
||||
@ -95,6 +104,20 @@ export function appInitializerFactory(
|
||||
useClass: ErrorHandlingService,
|
||||
},
|
||||
],
|
||||
bootstrap: [AppComponent],
|
||||
})
|
||||
export class AppModule {}
|
||||
export class AppModule implements DoBootstrap {
|
||||
constructor(private injector: Injector) {}
|
||||
|
||||
async ngDoBootstrap(appRef: ApplicationRef) {
|
||||
const spinner = this.injector.get(SpinnerService);
|
||||
spinner.show();
|
||||
|
||||
const auth = this.injector.get(AuthService);
|
||||
const user = await auth.loadUser();
|
||||
if (!user) {
|
||||
await auth.login();
|
||||
}
|
||||
|
||||
appRef.bootstrap(AppComponent);
|
||||
}
|
||||
}
|
||||
|
@ -1,8 +1,9 @@
|
||||
import { Component } from '@angular/core';
|
||||
import { ErrorComponentBase } from 'src/app/core/base/error-component-base';
|
||||
|
||||
@Component({
|
||||
selector: 'app-not-found',
|
||||
templateUrl: './not-found.component.html',
|
||||
styleUrls: ['./not-found.component.scss'],
|
||||
})
|
||||
export class NotFoundComponent {}
|
||||
export class NotFoundComponent extends ErrorComponentBase {}
|
||||
|
@ -1,13 +1,16 @@
|
||||
import { Component } from '@angular/core';
|
||||
import { Router } from '@angular/router';
|
||||
import { ErrorComponentBase } from 'src/app/core/base/error-component-base';
|
||||
|
||||
@Component({
|
||||
selector: 'app-server-unavailable',
|
||||
templateUrl: './server-unavailable.component.html',
|
||||
styleUrls: ['./server-unavailable.component.scss'],
|
||||
})
|
||||
export class ServerUnavailableComponent {
|
||||
constructor(private router: Router) {}
|
||||
export class ServerUnavailableComponent extends ErrorComponentBase {
|
||||
constructor(private router: Router) {
|
||||
super();
|
||||
}
|
||||
|
||||
async retryConnection() {
|
||||
await this.router.navigate(['/']);
|
||||
|
@ -1,7 +1,14 @@
|
||||
<footer>
|
||||
<footer class="flex justify-between pl-1 pr-1">
|
||||
<div class="hidden md:block">
|
||||
<span>web: {{ webVersion }}</span>
|
||||
<span class="divider"> | </span>
|
||||
<span>api: {{ apiVersion }}</span>
|
||||
</div>
|
||||
<div>
|
||||
<a [href]="termsUrl">{{ 'footer.terms' | translate }}</a>
|
||||
<span class="divider"> | </span>
|
||||
<a [href]="privacyUrl">{{ 'footer.privacy' | translate }}</a>
|
||||
<span class="divider"> | </span>
|
||||
<a [href]="imprintUrl">{{ 'footer.imprint' | translate }}</a>
|
||||
</div>
|
||||
</footer>
|
||||
|
@ -1,16 +0,0 @@
|
||||
@import "../../../styles/constants.scss";
|
||||
|
||||
footer {
|
||||
width: 100%;
|
||||
min-height: 25px;
|
||||
padding: 0 5px;
|
||||
|
||||
display: flex;
|
||||
align-items: center;
|
||||
justify-content: flex-end;
|
||||
gap: 10px;
|
||||
|
||||
a {
|
||||
text-decoration: none;
|
||||
}
|
||||
}
|
@ -1,23 +1,37 @@
|
||||
import { ComponentFixture, TestBed } from "@angular/core/testing";
|
||||
import { ComponentFixture, TestBed } from '@angular/core/testing';
|
||||
|
||||
import { FooterComponent } from "src/app/components/footer/footer.component";
|
||||
import { TranslateModule } from "@ngx-translate/core";
|
||||
import { BrowserModule } from "@angular/platform-browser";
|
||||
import { BrowserAnimationsModule } from "@angular/platform-browser/animations";
|
||||
import { SharedModule } from "src/app/modules/shared/shared.module";
|
||||
import { FooterComponent } from 'src/app/components/footer/footer.component';
|
||||
import { TranslateModule } from '@ngx-translate/core';
|
||||
import { SharedModule } from 'src/app/modules/shared/shared.module';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
import { ConfirmationService, MessageService } from 'primeng/api';
|
||||
import { ActivatedRoute } from '@angular/router';
|
||||
import { of } from 'rxjs';
|
||||
|
||||
describe("FooterComponent", () => {
|
||||
describe('FooterComponent', () => {
|
||||
let component: FooterComponent;
|
||||
let fixture: ComponentFixture<FooterComponent>;
|
||||
|
||||
beforeEach(async () => {
|
||||
await TestBed.configureTestingModule({
|
||||
declarations: [FooterComponent],
|
||||
imports: [
|
||||
BrowserModule,
|
||||
BrowserAnimationsModule,
|
||||
SharedModule,
|
||||
TranslateModule.forRoot(),
|
||||
imports: [SharedModule, TranslateModule.forRoot()],
|
||||
providers: [
|
||||
AuthService,
|
||||
KeycloakService,
|
||||
ErrorHandlingService,
|
||||
ToastService,
|
||||
MessageService,
|
||||
ConfirmationService,
|
||||
{
|
||||
provide: ActivatedRoute,
|
||||
useValue: {
|
||||
snapshot: { params: of({}) },
|
||||
},
|
||||
},
|
||||
],
|
||||
}).compileComponents();
|
||||
});
|
||||
@ -28,7 +42,7 @@ describe("FooterComponent", () => {
|
||||
fixture.detectChanges();
|
||||
});
|
||||
|
||||
it("should create", () => {
|
||||
it('should create', () => {
|
||||
expect(component).toBeTruthy();
|
||||
});
|
||||
});
|
||||
|
@ -1,5 +1,7 @@
|
||||
import { Component } from '@angular/core';
|
||||
import { ConfigService } from 'src/app/service/config.service';
|
||||
import { VersionService } from 'src/app/service/version.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
|
||||
@Component({
|
||||
selector: 'app-footer',
|
||||
@ -7,7 +9,21 @@ import { ConfigService } from 'src/app/service/config.service';
|
||||
styleUrls: ['./footer.component.scss'],
|
||||
})
|
||||
export class FooterComponent {
|
||||
constructor(private config: ConfigService) {}
|
||||
webVersion = '0.0.0';
|
||||
apiVersion = '0.0.0';
|
||||
|
||||
constructor(
|
||||
private toast: ToastService,
|
||||
private config: ConfigService,
|
||||
private version: VersionService
|
||||
) {
|
||||
this.version.getApiVersion().subscribe(version => {
|
||||
this.apiVersion = version;
|
||||
});
|
||||
this.version.getWebVersion().subscribe(version => {
|
||||
this.webVersion = version.version;
|
||||
});
|
||||
}
|
||||
|
||||
get termsUrl(): string {
|
||||
return this.config.settings.termsUrl;
|
||||
|
@ -2,22 +2,25 @@
|
||||
<div class="header">
|
||||
<div class="flex items-center justify-center">
|
||||
<p-button
|
||||
*ngIf="user"
|
||||
type="button"
|
||||
icon="pi pi-bars"
|
||||
class="btn icon-btn p-button-text"
|
||||
(onClick)="toggleSidebar()"
|
||||
></p-button>
|
||||
(onClick)="toggleSidebar()"></p-button>
|
||||
</div>
|
||||
<div class="logo">
|
||||
<!-- <img src="/assets/images/logo.svg" alt="logo"/>-->
|
||||
</div>
|
||||
<div class="app-name">
|
||||
<h1>Open-redirect</h1>
|
||||
<h1>LAN-Maestro</h1>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="flex items-center justify-center w-1/3" *ngIf="menu.length > 0">
|
||||
<app-menu-bar class="w-full" [elements]="menu"></app-menu-bar>
|
||||
</div>
|
||||
|
||||
<div class="flex items-center justify-center">
|
||||
<div class="flex items-center justify-center">
|
||||
<div class="flex items-center justify-center" *ngIf="themeList.length > 0">
|
||||
<p-button
|
||||
type="button"
|
||||
icon="pi pi-palette"
|
||||
@ -29,7 +32,7 @@
|
||||
[model]="themeList"
|
||||
class="lang-menu"></p-menu>
|
||||
</div>
|
||||
<div class="flex items-center justify-center">
|
||||
<div class="flex items-center justify-center" *ngIf="langList.length > 0">
|
||||
<p-button
|
||||
type="button"
|
||||
icon="pi pi-globe"
|
||||
|
@ -1,16 +1,16 @@
|
||||
import { ComponentFixture, TestBed } from "@angular/core/testing";
|
||||
import { HeaderComponent } from "src/app/components/header/header.component";
|
||||
import { TranslateModule } from "@ngx-translate/core";
|
||||
import { ConfirmationService, MessageService } from "primeng/api";
|
||||
import { ActivatedRoute } from "@angular/router";
|
||||
import { of } from "rxjs";
|
||||
import { SharedModule } from "src/app/modules/shared/shared.module";
|
||||
import { ErrorHandlingService } from "src/app/service/error-handling.service";
|
||||
import { ToastService } from "src/app/service/toast.service";
|
||||
import { AuthService } from "src/app/service/auth.service";
|
||||
import { KeycloakService } from "keycloak-angular";
|
||||
import { ComponentFixture, TestBed } from '@angular/core/testing';
|
||||
import { HeaderComponent } from 'src/app/components/header/header.component';
|
||||
import { TranslateModule } from '@ngx-translate/core';
|
||||
import { ConfirmationService, MessageService } from 'primeng/api';
|
||||
import { ActivatedRoute } from '@angular/router';
|
||||
import { of } from 'rxjs';
|
||||
import { SharedModule } from 'src/app/modules/shared/shared.module';
|
||||
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
|
||||
describe("HeaderComponent", () => {
|
||||
describe('HeaderComponent', () => {
|
||||
let component: HeaderComponent;
|
||||
let fixture: ComponentFixture<HeaderComponent>;
|
||||
|
||||
@ -41,7 +41,7 @@ describe("HeaderComponent", () => {
|
||||
fixture.detectChanges();
|
||||
});
|
||||
|
||||
it("should create", () => {
|
||||
it('should create', () => {
|
||||
expect(component).toBeTruthy();
|
||||
});
|
||||
});
|
||||
|
@ -48,12 +48,12 @@ export class HeaderComponent implements OnInit, OnDestroy {
|
||||
});
|
||||
|
||||
this.auth.user$.pipe(takeUntil(this.unsubscribe$)).subscribe(async user => {
|
||||
this.user = user;
|
||||
await this.initMenuLists();
|
||||
if (user) {
|
||||
await this.loadTheme();
|
||||
await this.loadLang();
|
||||
}
|
||||
|
||||
this.user = user;
|
||||
this.guiService.loadedGuiSettings$.next(true);
|
||||
});
|
||||
|
||||
this.themeList = this.config.settings.themes.map(theme => {
|
||||
@ -87,27 +87,7 @@ export class HeaderComponent implements OnInit, OnDestroy {
|
||||
}
|
||||
|
||||
async initMenuList() {
|
||||
this.menu = [
|
||||
{
|
||||
label: 'common.news',
|
||||
routerLink: ['/'],
|
||||
icon: 'pi pi-home',
|
||||
},
|
||||
{
|
||||
label: 'header.menu.about',
|
||||
routerLink: ['/about'],
|
||||
icon: 'pi pi-info',
|
||||
},
|
||||
];
|
||||
|
||||
if (this.auth.user$.value) {
|
||||
this.menu.push({
|
||||
label: 'header.menu.admin',
|
||||
routerLink: ['/admin'],
|
||||
icon: 'pi pi-cog',
|
||||
visible: await this.auth.isAdmin(),
|
||||
});
|
||||
}
|
||||
this.menu = [];
|
||||
}
|
||||
|
||||
async initLangMenuList() {
|
||||
|
@ -0,0 +1 @@
|
||||
<p>home works!</p>
|
@ -1,15 +1,6 @@
|
||||
import { ComponentFixture, TestBed } from '@angular/core/testing';
|
||||
|
||||
import { HomeComponent } from './home.component';
|
||||
import { SharedModule } from 'src/app/modules/shared/shared.module';
|
||||
import { TranslateModule } from '@ngx-translate/core';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
import { ConfirmationService, MessageService } from 'primeng/api';
|
||||
import { ActivatedRoute } from '@angular/router';
|
||||
import { of } from 'rxjs';
|
||||
|
||||
describe('HomeComponent', () => {
|
||||
let component: HomeComponent;
|
||||
@ -18,21 +9,6 @@ describe('HomeComponent', () => {
|
||||
beforeEach(async () => {
|
||||
await TestBed.configureTestingModule({
|
||||
declarations: [HomeComponent],
|
||||
imports: [SharedModule, TranslateModule.forRoot()],
|
||||
providers: [
|
||||
AuthService,
|
||||
KeycloakService,
|
||||
ErrorHandlingService,
|
||||
ToastService,
|
||||
MessageService,
|
||||
ConfirmationService,
|
||||
{
|
||||
provide: ActivatedRoute,
|
||||
useValue: {
|
||||
snapshot: { params: of({}) },
|
||||
},
|
||||
},
|
||||
],
|
||||
}).compileComponents();
|
||||
|
||||
fixture = TestBed.createComponent(HomeComponent);
|
||||
|
@ -1,5 +1,5 @@
|
||||
import { Component } from '@angular/core';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
import { SpinnerService } from 'src/app/service/spinner.service';
|
||||
|
||||
@Component({
|
||||
selector: 'app-home',
|
||||
@ -7,9 +7,7 @@ import { KeycloakService } from 'keycloak-angular';
|
||||
styleUrl: './home.component.scss',
|
||||
})
|
||||
export class HomeComponent {
|
||||
constructor(private keycloak: KeycloakService) {
|
||||
if (!this.keycloak.isLoggedIn()) {
|
||||
this.keycloak.login().then(() => {});
|
||||
}
|
||||
constructor(private spinner: SpinnerService) {
|
||||
this.spinner.hide();
|
||||
}
|
||||
}
|
||||
|
@ -1,17 +1,17 @@
|
||||
import { ComponentFixture, TestBed } from "@angular/core/testing";
|
||||
import { ComponentFixture, TestBed } from '@angular/core/testing';
|
||||
|
||||
import { SidebarComponent } from "./sidebar.component";
|
||||
import { SharedModule } from "src/app/modules/shared/shared.module";
|
||||
import { TranslateModule } from "@ngx-translate/core";
|
||||
import { AuthService } from "src/app/service/auth.service";
|
||||
import { ErrorHandlingService } from "src/app/service/error-handling.service";
|
||||
import { ToastService } from "src/app/service/toast.service";
|
||||
import { ConfirmationService, MessageService } from "primeng/api";
|
||||
import { ActivatedRoute } from "@angular/router";
|
||||
import { of } from "rxjs";
|
||||
import { KeycloakService } from "keycloak-angular";
|
||||
import { SidebarComponent } from './sidebar.component';
|
||||
import { SharedModule } from 'src/app/modules/shared/shared.module';
|
||||
import { TranslateModule } from '@ngx-translate/core';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
import { ConfirmationService, MessageService } from 'primeng/api';
|
||||
import { ActivatedRoute } from '@angular/router';
|
||||
import { of } from 'rxjs';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
|
||||
describe("SidebarComponent", () => {
|
||||
describe('SidebarComponent', () => {
|
||||
let component: SidebarComponent;
|
||||
let fixture: ComponentFixture<SidebarComponent>;
|
||||
|
||||
@ -40,7 +40,7 @@ describe("SidebarComponent", () => {
|
||||
fixture.detectChanges();
|
||||
});
|
||||
|
||||
it("should create", () => {
|
||||
it('should create', () => {
|
||||
expect(component).toBeTruthy();
|
||||
});
|
||||
});
|
||||
|
@ -1,13 +1,13 @@
|
||||
import { Component, OnDestroy } from "@angular/core";
|
||||
import { MenuElement } from "src/app/model/view/menu-element";
|
||||
import { Subject } from "rxjs";
|
||||
import { SidebarService } from "src/app/service/sidebar.service";
|
||||
import { takeUntil } from "rxjs/operators";
|
||||
import { Component, OnDestroy } from '@angular/core';
|
||||
import { MenuElement } from 'src/app/model/view/menu-element';
|
||||
import { Subject } from 'rxjs';
|
||||
import { SidebarService } from 'src/app/service/sidebar.service';
|
||||
import { takeUntil } from 'rxjs/operators';
|
||||
|
||||
@Component({
|
||||
selector: "app-sidebar",
|
||||
templateUrl: "./sidebar.component.html",
|
||||
styleUrl: "./sidebar.component.scss",
|
||||
selector: 'app-sidebar',
|
||||
templateUrl: './sidebar.component.html',
|
||||
styleUrl: './sidebar.component.scss',
|
||||
})
|
||||
export class SidebarComponent implements OnDestroy {
|
||||
elements: MenuElement[] = [];
|
||||
@ -17,7 +17,7 @@ export class SidebarComponent implements OnDestroy {
|
||||
constructor(private sidebar: SidebarService) {
|
||||
this.sidebar.elements$
|
||||
.pipe(takeUntil(this.unsubscribe$))
|
||||
.subscribe((elements) => {
|
||||
.subscribe(elements => {
|
||||
this.elements = elements;
|
||||
});
|
||||
}
|
||||
|
@ -1,8 +1,8 @@
|
||||
import { ComponentFixture, TestBed } from "@angular/core/testing";
|
||||
import { ComponentFixture, TestBed } from '@angular/core/testing';
|
||||
|
||||
import { SpinnerComponent } from "src/app/components/spinner/spinner.component";
|
||||
import { SpinnerComponent } from 'src/app/components/spinner/spinner.component';
|
||||
|
||||
describe("SpinnerComponent", () => {
|
||||
describe('SpinnerComponent', () => {
|
||||
let component: SpinnerComponent;
|
||||
let fixture: ComponentFixture<SpinnerComponent>;
|
||||
|
||||
@ -18,7 +18,7 @@ describe("SpinnerComponent", () => {
|
||||
fixture.detectChanges();
|
||||
});
|
||||
|
||||
it("should create", () => {
|
||||
it('should create', () => {
|
||||
expect(component).toBeTruthy();
|
||||
});
|
||||
});
|
||||
|
@ -1,16 +1,16 @@
|
||||
import { Component } from "@angular/core";
|
||||
import { SpinnerService } from "src/app/service/spinner.service";
|
||||
import { Component } from '@angular/core';
|
||||
import { SpinnerService } from 'src/app/service/spinner.service';
|
||||
|
||||
@Component({
|
||||
selector: "app-spinner",
|
||||
templateUrl: "./spinner.component.html",
|
||||
styleUrls: ["./spinner.component.scss"],
|
||||
selector: 'app-spinner',
|
||||
templateUrl: './spinner.component.html',
|
||||
styleUrls: ['./spinner.component.scss'],
|
||||
})
|
||||
export class SpinnerComponent {
|
||||
showSpinnerState = false;
|
||||
|
||||
constructor(public spinnerService: SpinnerService) {
|
||||
this.spinnerService.showSpinnerState$.subscribe((value) => {
|
||||
this.spinnerService.showSpinnerState$.subscribe(value => {
|
||||
this.showSpinnerState = value;
|
||||
});
|
||||
}
|
||||
|
9
web/src/app/core/base/error-component-base.ts
Normal file
9
web/src/app/core/base/error-component-base.ts
Normal file
@ -0,0 +1,9 @@
|
||||
import { inject } from '@angular/core';
|
||||
import { SpinnerService } from 'src/app/service/spinner.service';
|
||||
|
||||
export class ErrorComponentBase {
|
||||
constructor() {
|
||||
const spinner = inject(SpinnerService);
|
||||
spinner.hide();
|
||||
}
|
||||
}
|
@ -26,8 +26,8 @@ export abstract class FormPageBase<
|
||||
protected filterService = inject(FilterService);
|
||||
protected dataService = inject(PageDataService) as S;
|
||||
|
||||
protected constructor() {
|
||||
const id = this.route.snapshot.params['id'];
|
||||
protected constructor(idKey: string = 'id') {
|
||||
const id = this.route.snapshot.params[idKey];
|
||||
this.validateRoute(id);
|
||||
|
||||
this.buildForm();
|
||||
|
@ -115,7 +115,6 @@ export abstract class PageBase<
|
||||
.onChange()
|
||||
.pipe(takeUntil(this.unsubscribe$))
|
||||
.subscribe(() => {
|
||||
logger.debug('Reload data');
|
||||
this.load(true);
|
||||
});
|
||||
}
|
||||
|
49
web/src/app/core/base/page-with-history.data.service.ts
Normal file
49
web/src/app/core/base/page-with-history.data.service.ts
Normal file
@ -0,0 +1,49 @@
|
||||
import { Injectable } from '@angular/core';
|
||||
import { Observable } from 'rxjs';
|
||||
import { MutationResult } from 'apollo-angular';
|
||||
import { Filter } from 'src/app/model/graphql/filter/filter.model';
|
||||
import { Sort } from 'src/app/model/graphql/filter/sort.model';
|
||||
import { QueryResult } from 'src/app/model/entities/query-result';
|
||||
import { DbModel } from 'src/app/model/entities/db-model';
|
||||
|
||||
@Injectable({
|
||||
providedIn: 'root',
|
||||
})
|
||||
export abstract class PageWithHistoryDataService<T> {
|
||||
abstract load(
|
||||
filter?: Filter[],
|
||||
sort?: Sort[],
|
||||
skip?: number,
|
||||
take?: number
|
||||
): Observable<QueryResult<T>>;
|
||||
|
||||
abstract loadHistory(id: number, options?: object): Observable<DbModel[]>;
|
||||
|
||||
abstract onChange(): Observable<void>;
|
||||
}
|
||||
|
||||
export interface Create<T, C> {
|
||||
create(object: C): Observable<T | undefined> | Observable<MutationResult>;
|
||||
}
|
||||
|
||||
export interface Update<T, U> {
|
||||
update(object: U): Observable<T | undefined> | Observable<MutationResult>;
|
||||
}
|
||||
|
||||
export interface Delete<T> {
|
||||
delete(
|
||||
object: T
|
||||
): Observable<T | undefined | boolean> | Observable<MutationResult>;
|
||||
}
|
||||
|
||||
export interface Restore<T> {
|
||||
restore(
|
||||
object: T
|
||||
): Observable<T | undefined | boolean> | Observable<MutationResult>;
|
||||
}
|
||||
|
||||
export interface LoadHistory<T> {
|
||||
loadHistory(
|
||||
id: number
|
||||
): Observable<T | undefined | boolean> | Observable<DbModel[] | undefined>;
|
||||
}
|
@ -14,6 +14,7 @@ export const ID_COLUMN = {
|
||||
translationKey: 'common.id',
|
||||
type: 'number',
|
||||
filterable: true,
|
||||
sortable: true,
|
||||
value: (row: { id?: number }) => row.id,
|
||||
class: 'max-w-24',
|
||||
};
|
||||
@ -23,6 +24,7 @@ export const NAME_COLUMN = {
|
||||
translationKey: 'common.name',
|
||||
type: 'text',
|
||||
filterable: true,
|
||||
sortable: true,
|
||||
value: (row: { name?: string }) => row.name,
|
||||
};
|
||||
|
||||
@ -31,6 +33,7 @@ export const DESCRIPTION_COLUMN = {
|
||||
translationKey: 'common.description',
|
||||
type: 'text',
|
||||
filterable: true,
|
||||
sortable: true,
|
||||
value: (row: { description?: string }) => row.description,
|
||||
};
|
||||
|
||||
@ -38,35 +41,49 @@ export const DELETED_COLUMN = {
|
||||
name: 'deleted',
|
||||
translationKey: 'common.deleted',
|
||||
type: 'bool',
|
||||
filterable: true,
|
||||
filterable: false,
|
||||
sortable: true,
|
||||
value: (row: DbModel) => row.deleted,
|
||||
visible: false,
|
||||
};
|
||||
|
||||
export const EDITOR_COLUMN = {
|
||||
name: 'editor',
|
||||
translationKey: 'common.editor',
|
||||
type: 'text',
|
||||
filterable: true,
|
||||
value: (row: DbModel) => row.editor?.username,
|
||||
filterSelector: (mode: string, value: unknown) => {
|
||||
return { editor: { username: { [mode]: value } } };
|
||||
},
|
||||
class: 'max-w-32',
|
||||
visible: false,
|
||||
};
|
||||
|
||||
export const CREATED_UTC_COLUMN = {
|
||||
name: 'createdUtc',
|
||||
name: 'created',
|
||||
translationKey: 'common.created',
|
||||
type: 'date',
|
||||
filterable: true,
|
||||
value: (row: DbModel) => row.createdUtc,
|
||||
sortable: true,
|
||||
value: (row: DbModel) => row.created,
|
||||
class: 'max-w-32',
|
||||
visible: false,
|
||||
};
|
||||
|
||||
export const UPDATED_UTC_COLUMN = {
|
||||
name: 'updatedUtc',
|
||||
name: 'updated',
|
||||
translationKey: 'common.updated',
|
||||
type: 'date',
|
||||
filterable: true,
|
||||
value: (row: DbModel) => row.updatedUtc,
|
||||
sortable: true,
|
||||
value: (row: DbModel) => row.updated,
|
||||
class: 'max-w-32',
|
||||
visible: false,
|
||||
};
|
||||
|
||||
export const DB_MODEL_COLUMNS = [
|
||||
DELETED_COLUMN,
|
||||
EDITOR_COLUMN,
|
||||
CREATED_UTC_COLUMN,
|
||||
UPDATED_UTC_COLUMN,
|
||||
|
@ -1,22 +1,39 @@
|
||||
import { Injectable } from "@angular/core";
|
||||
import { CanActivate } from "@angular/router";
|
||||
import { KeycloakService } from "keycloak-angular";
|
||||
import { Injectable } from '@angular/core';
|
||||
import { CanActivate, Router } from '@angular/router';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
import { Logger } from 'src/app/service/logger.service';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
|
||||
const logger = new Logger('AuthGuard');
|
||||
|
||||
@Injectable({
|
||||
providedIn: "root",
|
||||
providedIn: 'root',
|
||||
})
|
||||
export class AuthGuard implements CanActivate {
|
||||
constructor(private keycloak: KeycloakService) {}
|
||||
constructor(
|
||||
private keycloak: KeycloakService,
|
||||
private auth: AuthService,
|
||||
private router: Router
|
||||
) {}
|
||||
|
||||
async canActivate(): Promise<boolean> {
|
||||
try {
|
||||
if (!this.keycloak.isLoggedIn()) {
|
||||
logger.debug('User not logged in, redirecting to login page');
|
||||
await this.auth.login();
|
||||
}
|
||||
|
||||
if (this.keycloak.isTokenExpired()) {
|
||||
logger.debug('Token expired, updating token');
|
||||
await this.keycloak.updateToken();
|
||||
}
|
||||
|
||||
if (!this.keycloak.isLoggedIn()) {
|
||||
await this.keycloak.login();
|
||||
} catch (err) {
|
||||
logger.error('Error during authentication', err);
|
||||
await this.router.navigate(['/']);
|
||||
return false;
|
||||
}
|
||||
|
||||
logger.debug('Check is user logged in');
|
||||
return this.keycloak.isLoggedIn();
|
||||
}
|
||||
}
|
||||
|
@ -1,24 +1,24 @@
|
||||
import { Injectable } from "@angular/core";
|
||||
import { ActivatedRouteSnapshot, Router } from "@angular/router";
|
||||
import { Logger } from "src/app/service/logger.service";
|
||||
import { ToastService } from "src/app/service/toast.service";
|
||||
import { AuthService } from "src/app/service/auth.service";
|
||||
import { PermissionsEnum } from "src/app/model/auth/permissionsEnum";
|
||||
import { Injectable } from '@angular/core';
|
||||
import { ActivatedRouteSnapshot, Router } from '@angular/router';
|
||||
import { Logger } from 'src/app/service/logger.service';
|
||||
import { ToastService } from 'src/app/service/toast.service';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
import { PermissionsEnum } from 'src/app/model/auth/permissionsEnum';
|
||||
|
||||
const log = new Logger("PermissionGuard");
|
||||
const log = new Logger('PermissionGuard');
|
||||
|
||||
@Injectable({
|
||||
providedIn: "root",
|
||||
providedIn: 'root',
|
||||
})
|
||||
export class PermissionGuard {
|
||||
constructor(
|
||||
private router: Router,
|
||||
private toast: ToastService,
|
||||
private auth: AuthService,
|
||||
private auth: AuthService
|
||||
) {}
|
||||
|
||||
async canActivate(route: ActivatedRouteSnapshot): Promise<boolean> {
|
||||
const permissions = route.data["permissions"] as PermissionsEnum[];
|
||||
const permissions = route.data['permissions'] as PermissionsEnum[];
|
||||
|
||||
if (!permissions || permissions.length === 0) {
|
||||
return true;
|
||||
@ -26,11 +26,11 @@ export class PermissionGuard {
|
||||
|
||||
const validate = await this.auth.hasAnyPermissionLazy(permissions);
|
||||
if (!validate) {
|
||||
log.debug("Permission denied", permissions);
|
||||
this.toast.warn("common.warning", "error.permission_denied");
|
||||
this.router.navigate(["/"]).then();
|
||||
log.debug('Permission denied', permissions);
|
||||
this.toast.warn('common.warning', 'error.permission_denied');
|
||||
this.router.navigate(['/']).then();
|
||||
}
|
||||
log.debug("Permission granted", permissions);
|
||||
log.debug('Permission granted', permissions);
|
||||
return validate;
|
||||
}
|
||||
}
|
||||
|
@ -2,27 +2,55 @@ import { HttpInterceptorFn } from '@angular/common/http';
|
||||
import { KeycloakService } from 'keycloak-angular';
|
||||
import { inject } from '@angular/core';
|
||||
import { from, switchMap } from 'rxjs';
|
||||
import { ConfigService } from 'src/app/service/config.service';
|
||||
import { catchError } from 'rxjs/operators';
|
||||
import { AuthService } from 'src/app/service/auth.service';
|
||||
|
||||
export const tokenInterceptor: HttpInterceptorFn = (req, next) => {
|
||||
const keycloak = inject(KeycloakService);
|
||||
const config = inject(ConfigService);
|
||||
if (
|
||||
!config.settings.api.url ||
|
||||
!req.url.startsWith(config.settings.api.url)
|
||||
) {
|
||||
return next(req);
|
||||
}
|
||||
|
||||
const keycloak = inject(KeycloakService);
|
||||
if (!keycloak.isLoggedIn()) {
|
||||
return next(req);
|
||||
}
|
||||
|
||||
if (keycloak.isTokenExpired()) {
|
||||
keycloak.updateToken().then();
|
||||
}
|
||||
|
||||
return from(keycloak.getToken()).pipe(
|
||||
switchMap(token => {
|
||||
const modifiedReq = token
|
||||
? req.clone({
|
||||
if (!token) {
|
||||
return next(req);
|
||||
}
|
||||
|
||||
if (!keycloak.isTokenExpired()) {
|
||||
return next(
|
||||
req.clone({
|
||||
headers: req.headers.set('Authorization', `Bearer ${token}`),
|
||||
})
|
||||
: req;
|
||||
);
|
||||
}
|
||||
|
||||
return next(modifiedReq);
|
||||
return from(keycloak.updateToken(30)).pipe(
|
||||
switchMap(() => {
|
||||
return keycloak.getToken();
|
||||
}),
|
||||
switchMap(newToken => {
|
||||
return next(
|
||||
req.clone({
|
||||
headers: req.headers.set('Authorization', `Bearer ${newToken}`),
|
||||
})
|
||||
);
|
||||
}),
|
||||
catchError(() => {
|
||||
const auth = inject(AuthService);
|
||||
auth.logout().then();
|
||||
return next(req);
|
||||
})
|
||||
);
|
||||
})
|
||||
);
|
||||
};
|
||||
|
@ -2,6 +2,10 @@ export enum PermissionsEnum {
|
||||
// Administration
|
||||
administrator = 'administrator',
|
||||
|
||||
// Settings
|
||||
settings = 'settings',
|
||||
settingsUpdate = 'settings.update',
|
||||
|
||||
apiKeys = 'api_keys',
|
||||
apiKeysCreate = 'api_keys.create',
|
||||
apiKeysUpdate = 'api_keys.update',
|
||||
|
@ -1,13 +1,14 @@
|
||||
import { Role } from "src/app/model/entities/role";
|
||||
import { DbModel } from "src/app/model/entities/db-model";
|
||||
import { Role } from 'src/app/model/entities/role';
|
||||
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
|
||||
export interface NotExistingUser {
|
||||
keycloakId: string;
|
||||
username: string;
|
||||
}
|
||||
|
||||
export interface User extends DbModel {
|
||||
export interface User extends DbModelWithHistory {
|
||||
id: number;
|
||||
keycloakId: string;
|
||||
username: string;
|
||||
email: string;
|
||||
roles: Role[];
|
||||
|
@ -1,7 +1,7 @@
|
||||
import { DbModel } from 'src/app/model/entities/db-model';
|
||||
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
import { Permission } from 'src/app/model/entities/role';
|
||||
|
||||
export interface ApiKey extends DbModel {
|
||||
export interface ApiKey extends DbModelWithHistory {
|
||||
identifier?: string;
|
||||
key?: string;
|
||||
permissions?: Permission[];
|
||||
|
@ -1,9 +1,19 @@
|
||||
import { User } from "src/app/model/auth/user";
|
||||
import { User } from 'src/app/model/auth/user';
|
||||
|
||||
export interface DbModelWithHistory {
|
||||
id?: number;
|
||||
editor?: User;
|
||||
deleted?: boolean;
|
||||
created?: Date;
|
||||
updated?: Date;
|
||||
|
||||
history?: DbModel[];
|
||||
}
|
||||
|
||||
export interface DbModel {
|
||||
id?: number;
|
||||
editor?: User;
|
||||
deleted?: boolean;
|
||||
createdUtc?: Date;
|
||||
updatedUtc?: Date;
|
||||
created?: Date;
|
||||
updated?: Date;
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
import { DbModel } from 'src/app/model/entities/db-model';
|
||||
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
|
||||
export interface Domain extends DbModel {
|
||||
export interface Domain extends DbModelWithHistory {
|
||||
name: string;
|
||||
}
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
import { DbModel } from 'src/app/model/entities/db-model';
|
||||
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
import { Role } from 'src/app/model/entities/role';
|
||||
|
||||
export interface Group extends DbModel {
|
||||
export interface Group extends DbModelWithHistory {
|
||||
name: string;
|
||||
roles: Role[];
|
||||
}
|
||||
|
@ -1,9 +1,11 @@
|
||||
import { DbModel } from "src/app/model/entities/db-model";
|
||||
import { DbModel, DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
import { User } from 'src/app/model/auth/user';
|
||||
|
||||
export interface Role extends DbModel {
|
||||
export interface Role extends DbModelWithHistory {
|
||||
name?: string;
|
||||
description?: string;
|
||||
permissions?: Permission[];
|
||||
users?: User[];
|
||||
}
|
||||
|
||||
export interface RoleCreateInput {
|
||||
|
@ -1,8 +1,8 @@
|
||||
import { DbModel } from 'src/app/model/entities/db-model';
|
||||
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
|
||||
import { Group } from 'src/app/model/entities/group';
|
||||
import { Domain } from 'src/app/model/entities/domain';
|
||||
|
||||
export interface ShortUrl extends DbModel {
|
||||
export interface ShortUrl extends DbModelWithHistory {
|
||||
shortUrl: string;
|
||||
targetUrl: string;
|
||||
description: string;
|
||||
|
@ -1,5 +1,5 @@
|
||||
import { gql } from "apollo-angular";
|
||||
import { EDITOR_FRAGMENT } from "src/app/model/graphql/editor.query";
|
||||
import { gql } from 'apollo-angular';
|
||||
import { EDITOR_FRAGMENT } from 'src/app/model/graphql/editor.query';
|
||||
|
||||
export const DB_MODEL_FRAGMENT = gql`
|
||||
fragment DB_MODEL on DbModel {
|
||||
@ -10,9 +10,21 @@ export const DB_MODEL_FRAGMENT = gql`
|
||||
editor {
|
||||
...EDITOR
|
||||
}
|
||||
createdUtc
|
||||
updatedUtc
|
||||
created
|
||||
updated
|
||||
}
|
||||
|
||||
${EDITOR_FRAGMENT}
|
||||
`;
|
||||
|
||||
export const DB_HISTORY_MODEL_FRAGMENT = gql`
|
||||
fragment DB_HISTORY_MODEL on DbHistoryModel {
|
||||
__typename
|
||||
id
|
||||
|
||||
deleted
|
||||
editor
|
||||
created
|
||||
updated
|
||||
}
|
||||
`;
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user