Compare commits

...

10 Commits

Author SHA1 Message Date
9ddd85d36a Merge pull request 'tech_update' (#23) from tech_update into master
Some checks failed
Build on push / prepare (push) Successful in 5s
Build on push / build-web (push) Failing after 48s
Build on push / build-redirector (push) Failing after 4s
Build on push / build-api (push) Successful in 52s
Test API before pr merge / test-lint (pull_request) Successful in 11s
Test before pr merge / test-lint (pull_request) Successful in 42s
Test before pr merge / test-translation-lint (pull_request) Successful in 40s
Test before pr merge / test-before-merge (pull_request) Successful in 1m36s
Reviewed-on: #23
2025-04-18 12:14:58 +02:00
41e4729ff7 Fixed api test
All checks were successful
Test API before pr merge / test-lint (pull_request) Successful in 19s
Test before pr merge / test-lint (pull_request) Successful in 40s
Test before pr merge / test-translation-lint (pull_request) Successful in 39s
Test before pr merge / test-before-merge (pull_request) Successful in 1m40s
2025-04-18 12:12:35 +02:00
04c47d636e Fixed tests
Some checks failed
Test before pr merge / test-lint (pull_request) Successful in 37s
Test before pr merge / test-before-merge (pull_request) Has been cancelled
Test before pr merge / test-translation-lint (pull_request) Has been cancelled
2025-04-18 12:11:49 +02:00
b872c33c02 Handle visible columns for short urls
Some checks failed
Test before pr merge / test-lint (pull_request) Failing after 35s
Test before pr merge / test-translation-lint (pull_request) Failing after 1m8s
Test before pr merge / test-before-merge (pull_request) Failing after 1m31s
2025-04-18 11:59:36 +02:00
7b62022a83 Updated build
Some checks failed
Test before pr merge / test-lint (pull_request) Failing after 1m4s
Test before pr merge / test-translation-lint (pull_request) Failing after 32s
Test before pr merge / test-before-merge (pull_request) Failing after 1m27s
2025-04-18 11:15:15 +02:00
165c140a25 Added history to frontend 2025-04-18 11:03:13 +02:00
1824ff7564 Updated history and frontend 2025-04-18 10:46:14 +02:00
347f8486af Technical update 2025-04-18 02:26:59 +02:00
0b9489f110 Merge pull request 'Some improvements & bugfixes' (#18) from dev into master
All checks were successful
Build on push / prepare (push) Successful in 7s
Build on push / build-redirector (push) Successful in 31s
Build on push / build-api (push) Successful in 32s
Build on push / build-web (push) Successful in 58s
Reviewed-on: #18
2025-03-14 21:08:49 +01:00
433188995e Merge pull request 'dev' (#17) from dev into master
All checks were successful
Build on push / prepare (push) Successful in 5s
Build on push / build-redirector (push) Successful in 29s
Build on push / build-api (push) Successful in 29s
Build on push / build-web (push) Successful in 53s
Reviewed-on: #17
2025-03-12 10:09:01 +01:00
197 changed files with 3956 additions and 1443 deletions

View File

@ -54,6 +54,7 @@ jobs:
uses: actions/download-artifact@v3
with:
name: version
path: version.txt
- name: Build docker
run: |
@ -86,6 +87,7 @@ jobs:
uses: actions/download-artifact@v3
with:
name: version
path: version.txt
- name: Build docker
run: |
@ -117,6 +119,7 @@ jobs:
uses: actions/download-artifact@v3
with:
name: version
path: version.txt
- name: Prepare web build
run: |
@ -131,7 +134,7 @@ jobs:
- name: Build docker
run: |
cd web
docker build --no-cache -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
docker build --no-cache --build-arg VERSION=$(cat version.txt) -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
- name: Login to registry git.sh-edraft.de
uses: https://github.com/docker/login-action@v1

View File

@ -86,6 +86,7 @@ jobs:
uses: actions/download-artifact@v3
with:
name: version
path: version.txt
- name: Build docker
run: |
@ -117,6 +118,7 @@ jobs:
uses: actions/download-artifact@v3
with:
name: version
path: version.txt
- name: Prepare web build
run: |
@ -131,7 +133,7 @@ jobs:
- name: Build docker
run: |
cd web
docker build --no-cache -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
docker build --no-cache --build-arg VERSION=$(cat version.txt) -t git.sh-edraft.de/sh-edraft.de/open-redirect-web:$(cat ../version.txt) .
- name: Login to registry git.sh-edraft.de
uses: https://github.com/docker/login-action@v1

View File

@ -1,5 +1,5 @@
name: Test before pr merge
run-name: Test before pr merge
name: Test API before pr merge
run-name: Test API before pr merge
on:
pull_request:
types:

View File

@ -8,32 +8,16 @@ from starlette.routing import Route as StarletteRoute
from api.errors import unauthorized
from api.middleware.request import get_request
from api.route_api_key_extension import RouteApiKeyExtension
from api.route_user_extension import RouteUserExtension
from core.environment import Environment
from data.schemas.administration.api_key import ApiKey
from data.schemas.administration.api_key_dao import apiKeyDao
from data.schemas.administration.user import User
class Route(RouteUserExtension):
class Route(RouteUserExtension, RouteApiKeyExtension):
registered_routes: list[StarletteRoute] = []
@classmethod
async def get_api_key(cls, request: Request) -> ApiKey:
auth_header = request.headers.get("Authorization", None)
api_key = auth_header.split(" ")[1]
return await apiKeyDao.find_by_key(api_key)
@classmethod
async def _verify_api_key(cls, req: Request) -> bool:
auth_header = req.headers.get("Authorization", None)
if not auth_header or not auth_header.startswith("API-Key "):
return False
api_key = auth_header.split(" ")[1]
api_key_from_db = await apiKeyDao.find_by_key(api_key)
return api_key_from_db is not None and not api_key_from_db.deleted
@classmethod
async def _get_auth_type(
cls, request: Request, auth_header: str
@ -79,8 +63,7 @@ class Route(RouteUserExtension):
return await cls._get_auth_type(request, auth_header)
@classmethod
async def is_authorized(cls) -> bool:
request = get_request()
async def is_authorized(cls, request: Request) -> bool:
if request is None:
return False
@ -119,7 +102,7 @@ class Route(RouteUserExtension):
return await f(request, *args, **kwargs)
return f(request, *args, **kwargs)
if not await cls.is_authorized():
if not await cls.is_authorized(request):
return unauthorized()
if iscoroutinefunction(f):

View File

@ -0,0 +1,27 @@
from starlette.requests import Request
from data.schemas.administration.api_key import ApiKey
from data.schemas.administration.api_key_dao import apiKeyDao
class RouteApiKeyExtension:
@classmethod
async def get_api_key(cls, request: Request) -> ApiKey:
auth_header = request.headers.get("Authorization", None)
api_key = auth_header.split(" ")[1]
return await apiKeyDao.find_single_by(
[{ApiKey.key: api_key}, {ApiKey.deleted: False}]
)
@classmethod
async def _verify_api_key(cls, req: Request) -> bool:
auth_header = req.headers.get("Authorization", None)
if not auth_header or not auth_header.startswith("API-Key "):
return False
api_key = auth_header.split(" ")[1]
api_key_from_db = await apiKeyDao.find_single_by(
[{ApiKey.key: api_key}, {ApiKey.deleted: False}]
)
return api_key_from_db is not None and not api_key_from_db.deleted

View File

@ -18,6 +18,7 @@ logger = Logger(__name__)
class RouteUserExtension:
_cached_users: dict[int, User] = {}
@classmethod
def _get_user_id_from_token(cls, request: Request) -> Optional[str]:
@ -62,9 +63,7 @@ class RouteUserExtension:
if request is None:
return None
return await userDao.find_single_by(
[{User.keycloak_id: cls.get_token(request)}, {User.deleted: False}]
)
return await userDao.find_by_keycloak_id(cls.get_token(request))
@classmethod
async def get_user_or_default(cls) -> Optional[User]:

View File

@ -0,0 +1,59 @@
from datetime import datetime
from typing import Union, Callable, Any
from api_graphql.abc.query_abc import QueryABC
from core.database.abc.data_access_object_abc import DataAccessObjectABC
class DbHistoryModelQueryABC(QueryABC):
def __init__(self, name: str = __name__):
QueryABC.__init__(self, f"{name}History")
self.set_field("id", lambda x, *_: x.id)
self.set_field("deleted", lambda x, *_: x.deleted)
self.set_field("editor", self._resolve_editor)
self.set_field("created", lambda x, *_: x.created)
self.set_field("updated", lambda x, *_: x.updated)
@staticmethod
async def _resolve_editor(x, *_):
editor = await x.editor
return editor.username if editor else None
@staticmethod
async def _resolve_foreign_history(
updated: datetime,
obj_ident: Union[str, int],
join_dao: DataAccessObjectABC,
foreign_dao: DataAccessObjectABC,
foreign_join_key: Callable[[Any], Any],
obj_key="id",
*_,
):
foreign_history = sorted(
[
*await join_dao.find_by(
[
{obj_key: obj_ident},
{"updated": {"lessOrEqual": updated}},
]
),
*await join_dao.get_history(
obj_ident,
by_key=obj_key,
until=updated,
),
],
key=lambda x: x.updated,
)
foreign_ids = set()
for foreign in foreign_history:
if not foreign.deleted:
foreign_ids.add(foreign_join_key(foreign))
continue
foreign_ids.discard(foreign_join_key(foreign))
return [await foreign_dao.get_by_id(x) for x in sorted(foreign_ids)]

View File

@ -23,5 +23,5 @@ class DbModelCollectionFilterABC[T](CollectionFilterABC):
self.add_field("id", IntCollectionFilter)
self.add_field("deleted", BoolCollectionFilter)
self.add_field("editor", IntCollectionFilter)
self.add_field("createdUtc", DateCollectionFilter)
self.add_field("updatedUtc", DateCollectionFilter)
self.add_field("created", DateCollectionFilter)
self.add_field("updated", DateCollectionFilter)

View File

@ -1,10 +1,11 @@
from typing import Optional
from api_graphql.abc.filter.bool_filter import BoolFilter
from api_graphql.abc.filter.date_filter import DateFilter
from api_graphql.abc.filter.fuzzy_filter import FuzzyFilter
from api_graphql.abc.filter.int_filter import IntFilter
from api_graphql.abc.filter.string_filter import StringFilter
from api_graphql.abc.filter_abc import FilterABC
from api_graphql.filter.fuzzy_filter import FuzzyFilter
class DbModelFilterABC[T](FilterABC[T]):
@ -18,7 +19,7 @@ class DbModelFilterABC[T](FilterABC[T]):
self.add_field("id", IntFilter)
self.add_field("deleted", BoolFilter)
self.add_field("editor", UserFilter)
self.add_field("createdUtc", StringFilter, "created")
self.add_field("updatedUtc", StringFilter, "updated")
self.add_field("created", DateFilter)
self.add_field("updated", DateFilter)
self.add_field("fuzzy", FuzzyFilter)

View File

@ -1,18 +1,54 @@
from copy import deepcopy
from typing import Optional
from api_graphql.abc.query_abc import QueryABC
from data.schemas.administration.user import User
from core.database.abc.data_access_object_abc import DataAccessObjectABC
from core.logger import APILogger
logger = APILogger("api.api")
class DbModelQueryABC(QueryABC):
def __init__(self, name: str = __name__):
def __init__(
self,
name: str = __name__,
dao: DataAccessObjectABC = None,
with_history: bool = False,
):
QueryABC.__init__(self, name)
self._dao: Optional[DataAccessObjectABC] = dao
self.set_field("id", lambda x, *_: x.id)
self.set_field("deleted", lambda x, *_: x.deleted)
self.set_field("editor", self.__get_editor)
self.set_field("createdUtc", lambda x, *_: x.created)
self.set_field("updatedUtc", lambda x, *_: x.updated)
self.set_field("editor", lambda x, *_: x.editor)
self.set_field("created", lambda x, *_: x.created)
self.set_field("updated", lambda x, *_: x.updated)
@staticmethod
async def __get_editor(x: User, *_):
return await x.editor
if with_history:
self.set_field("history", self._resolve_history)
self._history_reference_daos: dict[DataAccessObjectABC, str] = {}
async def _resolve_history(self, x, *_):
if self._dao is None:
raise Exception("DAO not set for history query")
history = sorted(
[await self._dao.get_by_id(x.id), *await self._dao.get_history(x.id)],
key=lambda h: h.updated,
reverse=True,
)
return history
def set_history_reference_dao(self, dao: DataAccessObjectABC, key: str = None):
"""
Set the reference DAO for history resolution.
:param dao:
:param key: The key to use for resolving history.
:return:
"""
if key is None:
key = "id"
self._history_reference_daos[dao] = key

View File

@ -0,0 +1,15 @@
from typing import Optional
from api_graphql.abc.filter_abc import FilterABC
class FuzzyFilter(FilterABC):
def __init__(
self,
obj: Optional[dict],
):
FilterABC.__init__(self, obj)
self.add_field("fields", list)
self.add_field("term", str)
self.add_field("threshold", int)

View File

@ -18,3 +18,5 @@ class IntFilter(FilterABC):
self.add_field("lessOrEqual", int)
self.add_field("isNull", int)
self.add_field("isNotNull", int)
self.add_field("in", list)
self.add_field("notIn", list)

View File

@ -18,3 +18,5 @@ class StringFilter(FilterABC):
self.add_field("endsWith", str)
self.add_field("isNull", str)
self.add_field("isNotNull", str)
self.add_field("in", list)
self.add_field("notIn", list)

View File

@ -19,10 +19,12 @@ class FilterABC[T](ABC):
def add_field(
self,
field: str,
filter_type: Union[Type["FilterABC"], Type[Union[int, str, bool, datetime]]],
filter_type: Union[
Type["FilterABC"], Type[Union[int, str, bool, datetime, list]]
],
db_name=None,
):
if field not in self._obj and db_name not in self._obj:
if field not in self._obj:
return
if db_name is None:

View File

@ -1,6 +1,7 @@
from abc import ABC
from typing import Optional, Type, get_origin, get_args
from core.get_value import get_value
from core.typing import T
@ -12,11 +13,15 @@ class InputABC(ABC):
ABC.__init__(self)
self._src = src
self._options = {}
def option(
self, field: str, cast_type: Type[T], default=None, required=False
) -> Optional[T]:
if required and field not in self._src:
raise ValueError(f"{field} is required")
self._options[field] = cast_type
if field not in self._src:
return default
@ -28,4 +33,4 @@ class InputABC(ABC):
return cast_type(value)
def get(self, field: str, default=None) -> Optional[T]:
return self._src.get(field, default)
return get_value(self._src, field, self._options[field], default)

View File

@ -1,7 +1,12 @@
from abc import abstractmethod
from typing import Type, Union
from api_graphql.abc.input_abc import InputABC
from api_graphql.abc.query_abc import QueryABC
from api_graphql.field.mutation_field_builder import MutationFieldBuilder
from core.database.abc.data_access_object_abc import DataAccessObjectABC
from core.database.abc.db_join_model_abc import DbJoinModelABC
from core.typing import T
from service.permission.permissions_enum import Permissions
@ -41,3 +46,79 @@ class MutationABC(QueryABC):
.with_require_any_permission(require_any_permission)
.with_public(public)
)
@staticmethod
async def _resolve_assignments(
foreign_objs: list[int],
resolved_obj: T,
reference_key_own: Union[str, property],
reference_key_foreign: Union[str, property],
source_dao: DataAccessObjectABC[T],
join_dao: DataAccessObjectABC[T],
join_type: Type[DbJoinModelABC],
foreign_dao: DataAccessObjectABC[T],
):
if foreign_objs is None:
return
reference_key_own_attr = reference_key_own
if isinstance(reference_key_own, property):
reference_key_own_attr = reference_key_own.fget.__name__
reference_key_foreign_attr = reference_key_foreign
if isinstance(reference_key_foreign, property):
reference_key_foreign_attr = reference_key_foreign.fget.__name__
foreign_list = await join_dao.find_by(
[{reference_key_own: resolved_obj.id}, {"deleted": False}]
)
to_delete = (
foreign_list
if len(foreign_objs) == 0
else await join_dao.find_by(
[
{reference_key_own: resolved_obj.id},
{reference_key_foreign: {"notIn": foreign_objs}},
]
)
)
foreign_ids = [getattr(x, reference_key_foreign_attr) for x in foreign_list]
deleted_foreign_ids = [
getattr(x, reference_key_foreign_attr)
for x in await join_dao.find_by(
[{reference_key_own: resolved_obj.id}, {"deleted": True}]
)
]
to_create = [
join_type(0, resolved_obj.id, x)
for x in foreign_objs
if x not in foreign_ids and x not in deleted_foreign_ids
]
to_restore = [
await join_dao.get_single_by(
[
{reference_key_own: resolved_obj.id},
{reference_key_foreign: x},
]
)
for x in foreign_objs
if x not in foreign_ids and x in deleted_foreign_ids
]
if len(to_delete) > 0:
await join_dao.delete_many(to_delete)
if len(to_create) > 0:
await join_dao.create_many(to_create)
if len(to_restore) > 0:
await join_dao.restore_many(to_restore)
foreign_changes = [*to_delete, *to_create, *to_restore]
if len(foreign_changes) > 0:
await source_dao.touch(resolved_obj)
await foreign_dao.touch_many_by_id(
[getattr(x, reference_key_foreign_attr) for x in foreign_changes]
)

View File

@ -6,11 +6,12 @@ from typing import Callable, Type, get_args, Any, Union
from ariadne import ObjectType, SubscriptionType
from graphql import GraphQLResolveInfo
from starlette.requests import Request
from typing_extensions import deprecated
from api.middleware.request import get_request
from api.route import Route
from api_graphql.abc.collection_filter_abc import CollectionFilterABC
from api_graphql.abc.field_abc import FieldABC
from api_graphql.abc.input_abc import InputABC
from api_graphql.abc.sort_abc import Sort
from api_graphql.field.collection_field import CollectionField
@ -46,8 +47,8 @@ class QueryABC(ObjectType):
self._subscriptions: dict[str, SubscriptionType] = {}
@staticmethod
async def _authorize():
if not await Route.is_authorized():
async def _authorize(request: Request):
if not await Route.is_authorized(request):
raise UnauthorizedException()
@staticmethod
@ -71,8 +72,6 @@ class QueryABC(ObjectType):
*args,
**kwargs,
):
info = args[0]
if len(permissions) > 0:
user = await Route.get_authenticated_user_or_api_key_or_default()
if user is not None and all(
@ -120,6 +119,9 @@ class QueryABC(ObjectType):
take = None
skip = None
if field.default_filter:
filters.append(field.default_filter(*args, **kwargs))
if field.filter_type and "filter" in kwargs:
in_filters = kwargs["filter"]
if not isinstance(in_filters, list):
@ -227,7 +229,7 @@ class QueryABC(ObjectType):
async def wrapper(*args, **kwargs):
if not field.public:
await self._authorize()
await self._authorize(get_request())
if (
field.require_any is None

View File

@ -2,8 +2,8 @@ from abc import abstractmethod
from asyncio import iscoroutinefunction
from ariadne import SubscriptionType
from graphql import GraphQLResolveInfo
from api.middleware.request import get_request
from api_graphql.abc.query_abc import QueryABC
from api_graphql.field.subscription_field_builder import SubscriptionFieldBuilder
from core.logger import APILogger
@ -20,9 +20,12 @@ class SubscriptionABC(SubscriptionType, QueryABC):
def subscribe(self, builder: SubscriptionFieldBuilder):
field = builder.build()
async def wrapper(*args, **kwargs):
async def wrapper(_, info: GraphQLResolveInfo, *args, **kwargs):
# rebuild args for resolvers
args = [_, info, *args]
if not field.public:
await self._authorize()
r = info.context.get("request")
await self._authorize(r)
if (
field.require_any is None

View File

@ -1,6 +1,7 @@
import importlib
import os
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from api_graphql.abc.mutation_abc import MutationABC
from api_graphql.abc.query_abc import QueryABC
@ -20,7 +21,12 @@ def import_graphql_schema_part(part: str):
import_graphql_schema_part("queries")
import_graphql_schema_part("mutations")
sub_query_classes = [DbModelQueryABC, MutationABC, SubscriptionABC]
sub_query_classes = [
DbModelQueryABC,
DbHistoryModelQueryABC,
MutationABC,
SubscriptionABC,
]
query_classes = [
*[y for x in sub_query_classes for y in x.__subclasses__()],
*[x for x in QueryABC.__subclasses__() if x not in sub_query_classes],

View File

@ -1,4 +1,4 @@
from typing import Union, Type, Optional
from typing import Union, Type, Optional, Callable
from api_graphql.abc.collection_filter_abc import CollectionFilterABC
from api_graphql.abc.field_abc import FieldABC
@ -19,6 +19,7 @@ class DaoField(FieldABC):
public: bool = False,
dao: DataAccessObjectABC = None,
filter_type: Type[FilterABC] = None,
default_filter: Callable = None,
sort_type: Type[T] = None,
direct_result: bool = False,
):
@ -28,6 +29,7 @@ class DaoField(FieldABC):
self._public = public
self._dao = dao
self._filter_type = filter_type
self._default_filter = default_filter
self._sort_type = sort_type
self._direct_result = direct_result
@ -41,6 +43,10 @@ class DaoField(FieldABC):
) -> Optional[Type[FilterABC]]:
return self._filter_type
@property
def default_filter(self) -> Optional[Callable]:
return self._default_filter
@property
def sort_type(self) -> Optional[Type[T]]:
return self._sort_type

View File

@ -1,4 +1,4 @@
from typing import Type, Self
from typing import Type, Self, Callable
from api_graphql.abc.field_builder_abc import FieldBuilderABC
from api_graphql.abc.filter_abc import FilterABC
@ -14,6 +14,7 @@ class DaoFieldBuilder(FieldBuilderABC):
self._dao = None
self._filter_type = None
self._default_filter = None
self._sort_type = None
self._direct_result = False
@ -27,6 +28,12 @@ class DaoFieldBuilder(FieldBuilderABC):
self._filter_type = filter_type
return self
def with_default_filter(self, filter: Callable) -> Self:
assert filter is not None, "filter cannot be None"
assert callable(filter), "filter must be callable"
self._default_filter = filter
return self
def with_sort(self, sort_type: Type[T]) -> Self:
assert sort_type is not None, "sort cannot be None"
self._sort_type = sort_type
@ -45,6 +52,7 @@ class DaoFieldBuilder(FieldBuilderABC):
self._public,
self._dao,
self._filter_type,
self._default_filter,
self._sort_type,
self._direct_result,
)

View File

@ -38,6 +38,9 @@ class MutationFieldBuilder(FieldBuilderABC):
await broadcast.publish(f"{source}", result)
return result
self._resolver = resolver_wrapper
return self
def with_change_broadcast(self, source: str):
assert self._resolver is not None, "resolver cannot be None for broadcast"

View File

@ -4,16 +4,30 @@ type ApiKeyResult {
nodes: [ApiKey]
}
type ApiKeyHistory implements DbHistoryModel {
id: Int
identifier: String
key: String
permissions: [Permission]
deleted: Boolean
editor: String
created: String
updated: String
}
type ApiKey implements DbModel {
id: ID
id: Int
identifier: String
key: String
permissions: [Permission]
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [ApiKeyHistory]
}
input ApiKeySort {
@ -22,12 +36,18 @@ input ApiKeySort {
deleted: SortOrder
editor: UserSort
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum ApiKeyFuzzyFields {
id
identifier
deleted
editor
created
updated
}
input ApiKeyFuzzy {
@ -42,24 +62,24 @@ input ApiKeyFilter {
deleted: BooleanFilter
editorId: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type ApiKeyMutation {
create(input: ApiKeyCreateInput!): ApiKey
update(input: ApiKeyUpdateInput!): ApiKey
delete(identifier: String!): Boolean
restore(identifier: String!): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
}
input ApiKeyCreateInput {
identifier: String
permissions: [ID]
permissions: [Int]
}
input ApiKeyUpdateInput {
id: ID!
id: Int!
identifier: String
permissions: [ID]
permissions: [Int]
}

View File

@ -1,12 +1,21 @@
scalar Upload
interface DbModel {
id: ID
id: Int
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
}
interface DbHistoryModel {
id: Int
deleted: Boolean
editor: String
created: String
updated: String
}
enum SortOrder {
@ -44,6 +53,8 @@ input IntFilter {
isNull: Int
isNotNull: Int
in: [Int]
notIn: [Int]
}
input BooleanFilter {
@ -58,9 +69,18 @@ input DateFilter {
equal: String
notEqual: String
greater: String
greaterOrEqual: String
less: String
lessOrEqual: String
contains: String
notContains: String
isNull: String
isNotNull: String
in: [String]
notIn: [String]
}

View File

@ -0,0 +1,12 @@
enum Attendance {
absent
present
delayed
canceled
}
enum Payment {
not_paid
paid
refunded
}

View File

@ -4,16 +4,30 @@ type DomainResult {
nodes: [Domain]
}
type DomainHistory implements DbHistoryModel {
id: Int
name: String
shortUrls: [ShortUrl]
deleted: Boolean
editor: String
created: String
updated: String
}
type Domain implements DbModel {
id: ID
id: Int
name: String
shortUrls: [ShortUrl]
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [DomainHistory]
}
input DomainSort {
@ -22,8 +36,8 @@ input DomainSort {
deleted: SortOrder
editorId: SortOrder
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum DomainFuzzyFields {
@ -44,15 +58,15 @@ input DomainFilter {
deleted: BooleanFilter
editor: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type DomainMutation {
create(input: DomainCreateInput!): Domain
update(input: DomainUpdateInput!): Domain
delete(id: ID!): Boolean
restore(id: ID!): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
}
input DomainCreateInput {
@ -60,6 +74,6 @@ input DomainCreateInput {
}
input DomainUpdateInput {
id: ID!
id: Int!
name: String
}

View File

@ -1,12 +1,12 @@
type FeatureFlag implements DbModel {
id: ID
id: Int
key: String
value: Boolean
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
}
type FeatureFlagMutation {

View File

@ -4,8 +4,21 @@ type GroupResult {
nodes: [Group]
}
type GroupHistory implements DbHistoryModel {
id: Int
name: String
shortUrls: [ShortUrl]
roles: [Role]
deleted: Boolean
editor: String
created: String
updated: String
}
type Group implements DbModel {
id: ID
id: Int
name: String
shortUrls: [ShortUrl]
@ -13,8 +26,9 @@ type Group implements DbModel {
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [GroupHistory]
}
input GroupSort {
@ -23,8 +37,8 @@ input GroupSort {
deleted: SortOrder
editorId: SortOrder
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum GroupFuzzyFields {
@ -45,24 +59,24 @@ input GroupFilter {
deleted: BooleanFilter
editor: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type GroupMutation {
create(input: GroupCreateInput!): Group
update(input: GroupUpdateInput!): Group
delete(id: ID!): Boolean
restore(id: ID!): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
}
input GroupCreateInput {
name: String!
roles: [ID]
roles: [Int]
}
input GroupUpdateInput {
id: ID!
id: Int!
name: String
roles: [ID]
roles: [Int]
}

View File

@ -4,15 +4,28 @@ type PermissionResult {
nodes: [Permission]
}
type PermissionHistory implements DbHistoryModel {
id: Int
name: String
description: String
deleted: Boolean
editor: String
created: String
updated: String
}
type Permission implements DbModel {
id: ID
id: Int
name: String
description: String
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [PermissionHistory]
}
input PermissionSort {
@ -21,9 +34,9 @@ input PermissionSort {
description: SortOrder
deleted: SortOrder
editorId: SortOrder
createdUtc: SortOrder
updatedUtc: SortOrder
editor: UserSort
created: SortOrder
updated: SortOrder
}
input PermissionFilter {
@ -32,13 +45,13 @@ input PermissionFilter {
description: StringFilter
deleted: BooleanFilter
editor: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
editor: UserFilter
created: DateFilter
updated: DateFilter
}
input PermissionInput {
id: ID
id: Int
name: String
description: String
}

View File

@ -9,7 +9,7 @@ type Query {
user: User
userHasPermission(permission: String!): Boolean
userHasAnyPermission(permissions: [String]!): Boolean
notExistingUsersFromKeycloak: KeycloakUserResult
notExistingUsersFromKeycloak: [KeycloakUser]
domains(filter: [DomainFilter], sort: [DomainSort], skip: Int, take: Int): DomainResult
groups(filter: [GroupFilter], sort: [GroupSort], skip: Int, take: Int): GroupResult

View File

@ -4,8 +4,21 @@ type RoleResult {
nodes: [Role]
}
type RoleHistory implements DbHistoryModel {
id: Int
name: String
description: String
permissions: [Permission]
deleted: Boolean
editor: String
created: String
updated: String
}
type Role implements DbModel {
id: ID
id: Int
name: String
description: String
permissions: [Permission]
@ -13,8 +26,10 @@ type Role implements DbModel {
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [RoleHistory]
}
input RoleSort {
@ -24,13 +39,19 @@ input RoleSort {
deleted: SortOrder
editor: UserSort
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum RoleFuzzyFields {
id
name
description
deleted
editor
created
updated
}
input RoleFuzzy {
@ -48,26 +69,26 @@ input RoleFilter {
deleted: BooleanFilter
editor_id: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type RoleMutation {
create(input: RoleCreateInput!): Role
update(input: RoleUpdateInput!): Role
delete(id: ID!): Boolean
restore(id: ID!): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
}
input RoleCreateInput {
name: String!
description: String
permissions: [ID]
permissions: [Int]
}
input RoleUpdateInput {
id: ID!
id: Int!
name: String
description: String
permissions: [ID]
permissions: [Int]
}

View File

@ -1,12 +1,12 @@
type Setting implements DbModel {
id: ID
id: Int
key: String
value: String
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
}
type SettingMutation {

View File

@ -4,8 +4,25 @@ type ShortUrlResult {
nodes: [ShortUrl]
}
type ShortUrlHistory implements DbHistoryModel {
id: Int
shortUrl: String
targetUrl: String
description: String
visits: Int
loadingScreen: Boolean
group: Group
domain: Domain
deleted: Boolean
editor: String
created: String
updated: String
}
type ShortUrl implements DbModel {
id: ID
id: Int
shortUrl: String
targetUrl: String
description: String
@ -16,8 +33,9 @@ type ShortUrl implements DbModel {
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [ShortUrlHistory]
}
input ShortUrlSort {
@ -28,8 +46,8 @@ input ShortUrlSort {
deleted: SortOrder
editorId: SortOrder
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum ShortUrlFuzzyFields {
@ -57,33 +75,33 @@ input ShortUrlFilter {
deleted: BooleanFilter
editor: IntFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type ShortUrlMutation {
create(input: ShortUrlCreateInput!): ShortUrl
update(input: ShortUrlUpdateInput!): ShortUrl
delete(id: ID!): Boolean
restore(id: ID!): Boolean
trackVisit(id: ID!, agent: String): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
trackVisit(id: Int!, agent: String): Boolean
}
input ShortUrlCreateInput {
shortUrl: String!
targetUrl: String!
description: String
groupId: ID
domainId: ID
groupId: Int
domainId: Int
loadingScreen: Boolean
}
input ShortUrlUpdateInput {
id: ID!
id: Int!
shortUrl: String
targetUrl: String
description: String
groupId: ID
domainId: ID
groupId: Int
domainId: Int
loadingScreen: Boolean
}

View File

@ -9,6 +9,7 @@ type Subscription {
settingChange: SubscriptionChange
userChange: SubscriptionChange
userSettingChange: SubscriptionChange
userLogout: SubscriptionChange
domainChange: SubscriptionChange
groupChange: SubscriptionChange

View File

@ -1,9 +1,3 @@
type KeycloakUserResult {
totalCount: Int
count: Int
nodes: [KeycloakUser]
}
type KeycloakUser {
keycloakId: String
username: String
@ -15,8 +9,22 @@ type UserResult {
nodes: [User]
}
type UserHistory implements DbHistoryModel {
id: Int
keycloakId: String
username: String
email: String
roles: [Role]
deleted: Boolean
editor: String
created: String
updated: String
}
type User implements DbModel {
id: ID
id: Int
keycloakId: String
username: String
email: String
@ -24,8 +32,10 @@ type User implements DbModel {
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
history: [UserHistory]
}
input UserSort {
@ -36,14 +46,20 @@ input UserSort {
deleted: SortOrder
editor: UserSort
createdUtc: SortOrder
updatedUtc: SortOrder
created: SortOrder
updated: SortOrder
}
enum UserFuzzyFields {
id
keycloakId
username
email
deleted
editor
created
updated
}
input UserFuzzy {
@ -62,23 +78,23 @@ input UserFilter {
deleted: BooleanFilter
editor: UserFilter
createdUtc: DateFilter
updatedUtc: DateFilter
created: DateFilter
updated: DateFilter
}
type UserMutation {
create(input: UserCreateInput!): User
update(input: UserUpdateInput!): User
delete(id: ID!): Boolean
restore(id: ID!): Boolean
delete(id: Int!): Boolean
restore(id: Int!): Boolean
}
input UserCreateInput {
keycloakId: String
roles: [ID]
roles: [Int]
}
input UserUpdateInput {
id: ID
roles: [ID]
id: Int
roles: [Int]
}

View File

@ -1,12 +1,12 @@
type UserSetting implements DbModel {
id: ID
id: Int
key: String
value: String
deleted: Boolean
editor: User
createdUtc: String
updatedUtc: String
created: String
updated: String
}
type UserSettingMutation {

View File

@ -1,5 +1,3 @@
from uuid import uuid4
from api_graphql.abc.mutation_abc import MutationABC
from api_graphql.input.api_key_create_input import ApiKeyCreateInput
from api_graphql.input.api_key_update_input import ApiKeyUpdateInput
@ -8,6 +6,7 @@ from data.schemas.administration.api_key import ApiKey
from data.schemas.administration.api_key_dao import apiKeyDao
from data.schemas.permission.api_key_permission import ApiKeyPermission
from data.schemas.permission.api_key_permission_dao import apiKeyPermissionDao
from data.schemas.permission.permission_dao import permissionDao
from service.permission.permissions_enum import Permissions
logger = APILogger(__name__)
@ -44,77 +43,28 @@ class APIKeyMutation(MutationABC):
async def resolve_create(obj: ApiKeyCreateInput, *_):
logger.debug(f"create api key: {obj.__dict__}")
api_key = ApiKey(
0,
obj.identifier,
str(uuid4()),
)
api_key = ApiKey.new(obj.identifier)
await apiKeyDao.create(api_key)
api_key = await apiKeyDao.get_by_identifier(api_key.identifier)
api_key = await apiKeyDao.get_single_by([{ApiKey.identifier: obj.identifier}])
await apiKeyPermissionDao.create_many(
[ApiKeyPermission(0, api_key.id, x) for x in obj.permissions]
)
return api_key
@staticmethod
async def resolve_update(obj: ApiKeyUpdateInput, *_):
async def resolve_update(self, obj: ApiKeyUpdateInput, *_):
logger.debug(f"update api key: {input}")
api_key = await apiKeyDao.get_by_id(obj.id)
if obj.permissions is not None:
permissions = [
x for x in await apiKeyPermissionDao.find_by_api_key_id(api_key.id)
]
to_delete = (
permissions
if len(obj.permissions) == 0
else await apiKeyPermissionDao.find_by(
[
{ApiKeyPermission.api_key_id: api_key.id},
{
ApiKeyPermission.permission_id: {
"notIn": obj.get("permissions", [])
}
},
]
await self._resolve_assignments(
obj.get("permissions", []),
api_key,
ApiKeyPermission.api_key_id,
ApiKeyPermission.permission_id,
apiKeyDao,
apiKeyPermissionDao,
ApiKeyPermission,
permissionDao,
)
)
permission_ids = [x.permission_id for x in permissions]
deleted_permission_ids = [
x.permission_id
for x in await apiKeyPermissionDao.find_by(
[
{ApiKeyPermission.api_key_id: api_key.id},
{ApiKeyPermission.deleted: True},
]
)
]
to_create = [
ApiKeyPermission(0, api_key.id, x)
for x in obj.permissions
if x not in permission_ids and x not in deleted_permission_ids
]
to_restore = [
await apiKeyPermissionDao.get_single_by(
[
{ApiKeyPermission.api_key_id: api_key.id},
{ApiKeyPermission.permission_id: x},
]
)
for x in obj.permissions
if x not in permission_ids and x in deleted_permission_ids
]
if len(to_delete) > 0:
await apiKeyPermissionDao.delete_many(to_delete)
if len(to_create) > 0:
await apiKeyPermissionDao.create_many(to_create)
if len(to_restore) > 0:
await apiKeyPermissionDao.restore_many(to_restore)
return api_key

View File

@ -2,6 +2,7 @@ from api_graphql.abc.mutation_abc import MutationABC
from api_graphql.input.role_create_input import RoleCreateInput
from api_graphql.input.role_update_input import RoleUpdateInput
from core.logger import APILogger
from data.schemas.permission.permission_dao import permissionDao
from data.schemas.permission.role import Role
from data.schemas.permission.role_dao import roleDao
from data.schemas.permission.role_permission import RolePermission
@ -54,63 +55,23 @@ class RoleMutation(MutationABC):
return role
@staticmethod
async def resolve_update(obj: RoleUpdateInput, *_):
async def resolve_update(self, obj: RoleUpdateInput, *_):
logger.debug(f"update role: {obj.__dict__}")
role = await roleDao.get_by_id(obj.id)
role.name = obj.get("name", role.name)
role.description = obj.get("description", role.description)
await roleDao.update(role)
if obj.permissions is not None:
permissions = [x for x in await rolePermissionDao.get_by_role_id(role.id)]
to_delete = (
permissions
if len(obj.permissions) == 0
else await rolePermissionDao.find_by(
[
{RolePermission.role_id: role.id},
{
RolePermission.permission_id: {
"notIn": obj.get("permissions", [])
}
},
]
await self._resolve_assignments(
obj.get("permissions", []),
role,
RolePermission.role_id,
RolePermission.permission_id,
roleDao,
rolePermissionDao,
RolePermission,
permissionDao,
)
)
permission_ids = [x.permission_id for x in permissions]
deleted_permission_ids = [
x.permission_id
for x in await rolePermissionDao.find_by(
[{RolePermission.role_id: role.id}, {RolePermission.deleted: True}]
)
]
to_create = [
RolePermission(0, role.id, x)
for x in obj.permissions
if x not in permission_ids and x not in deleted_permission_ids
]
to_restore = [
await rolePermissionDao.get_single_by(
[
{RolePermission.role_id: role.id},
{RolePermission.permission_id: x},
]
)
for x in obj.permissions
if x not in permission_ids and x in deleted_permission_ids
]
if len(to_delete) > 0:
await rolePermissionDao.delete_many(to_delete)
if len(to_create) > 0:
await rolePermissionDao.create_many(to_create)
if len(to_restore) > 0:
await rolePermissionDao.restore_many(to_restore)
return role

View File

@ -1,10 +1,13 @@
from api.auth.keycloak_client import Keycloak
from api.broadcast import broadcast
from api.route import Route
from api_graphql.abc.mutation_abc import MutationABC
from api_graphql.input.user_create_input import UserCreateInput
from api_graphql.input.user_update_input import UserUpdateInput
from core.logger import APILogger
from data.schemas.administration.user import User
from data.schemas.administration.user_dao import userDao
from data.schemas.permission.role_dao import roleDao
from data.schemas.permission.role_user import RoleUser
from data.schemas.permission.role_user_dao import roleUserDao
from service.permission.permissions_enum import Permissions
@ -49,62 +52,26 @@ class UserMutation(MutationABC):
raise ValueError(f"Keycloak user with id {obj.keycloak_id} does not exist")
user = User(0, obj.keycloak_id)
await userDao.create(user)
user = await userDao.get_by_keycloak_id(user.keycloak_id)
await roleUserDao.create_many([RoleUser(0, user.id, x) for x in obj.roles])
user_id = await userDao.create(user)
user = await userDao.get_by_id(user_id)
await roleUserDao.create_many([RoleUser(0, user.id, x) for x in set(obj.roles)])
return user
@staticmethod
async def resolve_update(obj: UserUpdateInput, *_):
async def resolve_update(self, obj: UserUpdateInput, *_):
logger.debug(f"update user: {obj.__dict__}")
user = await userDao.get_by_id(obj.id)
if obj.roles is not None:
roles = await roleUserDao.get_by_user_id(user.id)
to_delete = (
roles
if len(obj.roles) == 0
else await roleUserDao.find_by(
[
{RoleUser.user_id: user.id},
{RoleUser.role_id: {"notIn": obj.get("roles", [])}},
]
await self._resolve_assignments(
obj.get("roles", []),
user,
RoleUser.user_id,
RoleUser.role_id,
userDao,
roleUserDao,
RoleUser,
roleDao,
)
)
role_ids = [x.role_id for x in roles]
deleted_role_ids = [
x.role_id
for x in await roleUserDao.find_by(
[{RoleUser.user_id: user.id}, {RoleUser.deleted: True}]
)
]
to_create = [
RoleUser(0, x, user.id)
for x in obj.roles
if x not in role_ids and x not in deleted_role_ids
]
to_restore = [
await roleUserDao.get_single_by(
[
{RoleUser.user_id: user.id},
{RoleUser.role_id: x},
]
)
for x in obj.roles
if x not in role_ids and x in deleted_role_ids
]
if len(to_delete) > 0:
await roleUserDao.delete_many(to_delete)
if len(to_create) > 0:
await roleUserDao.create_many(to_create)
if len(to_restore) > 0:
await roleUserDao.restore_many(to_restore)
return user
@ -113,6 +80,13 @@ class UserMutation(MutationABC):
logger.debug(f"delete user: {id}")
user = await userDao.get_by_id(id)
await userDao.delete(user)
try:
active_user = await Route.get_user_or_default()
if active_user is not None and active_user.id == user.id:
await broadcast.publish("userLogout", user.id)
Keycloak.admin.user_logout(user_id=user.keycloak_id)
except Exception as e:
logger.error(f"Failed to logout user from Keycloak", e)
return True
@staticmethod

View File

@ -0,0 +1,22 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from data.schemas.permission.api_key_permission_dao import apiKeyPermissionDao
from data.schemas.permission.permission_dao import permissionDao
class ApiKeyHistoryQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "ApiKey")
self.set_field("identifier", lambda x, *_: x.identifier)
self.set_field("key", lambda x, *_: x.key)
self.set_field(
"permissions",
lambda x, *_: self._resolve_foreign_history(
x.updated,
x.id,
apiKeyPermissionDao,
permissionDao,
lambda y: y.permission_id,
obj_key="apikeyid",
),
)

View File

@ -1,9 +1,14 @@
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from data.schemas.administration.api_key_dao import apiKeyDao
from data.schemas.permission.role_permission_dao import rolePermissionDao
class ApiKeyQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "ApiKey")
DbModelQueryABC.__init__(self, "ApiKey", apiKeyDao, with_history=True)
self.set_field("identifier", lambda x, *_: x.identifier)
self.set_field("key", lambda x, *_: x.key)
self.set_field("permissions", lambda x, *_: x.permissions)
self.set_history_reference_dao(rolePermissionDao, "apikeyid")

View File

@ -0,0 +1,22 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from data.schemas.public.domain import Domain
from data.schemas.public.short_url import ShortUrl
from data.schemas.public.short_url_dao import shortUrlDao
class DomainHistoryQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "Domain")
self.set_field("name", lambda x, *_: x.name)
self.set_field("shortUrls", self._get_urls)
@staticmethod
async def _get_urls(domain: Domain, *_):
return await shortUrlDao.find_by(
[
{ShortUrl.domain_id: domain.id},
{ShortUrl.deleted: False},
{"updated": {"lessOrEqual": domain.updated}},
]
)

View File

@ -1,5 +1,6 @@
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from data.schemas.public.domain import Domain
from data.schemas.public.domain_dao import domainDao
from data.schemas.public.group import Group
from data.schemas.public.short_url import ShortUrl
from data.schemas.public.short_url_dao import shortUrlDao
@ -7,11 +8,13 @@ from data.schemas.public.short_url_dao import shortUrlDao
class DomainQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "Domain")
DbModelQueryABC.__init__(self, "Domain", domainDao, with_history=True)
self.set_field("name", lambda x, *_: x.name)
self.set_field("shortUrls", self._get_urls)
self.set_history_reference_dao(shortUrlDao, "domainid")
@staticmethod
async def _get_urls(domain: Domain, *_):
return await shortUrlDao.find_by({ShortUrl.domain_id: domain.id})

View File

@ -0,0 +1,47 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from api_graphql.field.resolver_field_builder import ResolverFieldBuilder
from api_graphql.require_any_resolvers import group_by_assignment_resolver
from data.schemas.public.group import Group
from data.schemas.public.group_dao import groupDao
from data.schemas.public.group_role_assignment_dao import groupRoleAssignmentDao
from data.schemas.public.short_url import ShortUrl
from data.schemas.public.short_url_dao import shortUrlDao
from service.permission.permissions_enum import Permissions
class GroupHistoryQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "Group")
self.set_field("name", lambda x, *_: x.name)
self.field(
ResolverFieldBuilder("shortUrls")
.with_resolver(self._get_urls)
.with_require_any(
[
Permissions.groups,
],
[group_by_assignment_resolver],
)
)
self.set_field(
"roles",
lambda x, *_: self._resolve_foreign_history(
x.updated,
x.id,
groupRoleAssignmentDao,
groupDao,
lambda y: y.role_id,
obj_key="groupid",
),
)
@staticmethod
async def _get_urls(group: Group, *_):
return await shortUrlDao.find_by(
[
{ShortUrl.group_id: group.id},
{ShortUrl.deleted: False},
{"updated": {"lessOrEqual": group.updated}},
]
)

View File

@ -3,6 +3,7 @@ from api_graphql.field.resolver_field_builder import ResolverFieldBuilder
from api_graphql.require_any_resolvers import group_by_assignment_resolver
from data.schemas.public.group import Group
from data.schemas.public.group_dao import groupDao
from data.schemas.public.group_role_assignment_dao import groupRoleAssignmentDao
from data.schemas.public.short_url import ShortUrl
from data.schemas.public.short_url_dao import shortUrlDao
from service.permission.permissions_enum import Permissions
@ -10,7 +11,7 @@ from service.permission.permissions_enum import Permissions
class GroupQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "Group")
DbModelQueryABC.__init__(self, "Group", groupDao, with_history=True)
self.set_field("name", lambda x, *_: x.name)
self.field(
@ -25,6 +26,9 @@ class GroupQuery(DbModelQueryABC):
)
self.set_field("roles", self._get_roles)
self.set_history_reference_dao(shortUrlDao, "groupid")
self.set_history_reference_dao(groupRoleAssignmentDao, "groupid")
@staticmethod
async def _get_urls(group: Group, *_):
return await shortUrlDao.find_by({ShortUrl.group_id: group.id})

View File

@ -0,0 +1,24 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from data.schemas.administration.user_dao import userDao
from data.schemas.permission.permission_dao import permissionDao
from data.schemas.permission.role_permission_dao import rolePermissionDao
from data.schemas.permission.role_user_dao import roleUserDao
class RoleHistoryQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "Role")
self.set_field("name", lambda x, *_: x.name)
self.set_field("description", lambda x, *_: x.description)
self.set_field(
"permissions",
lambda x, *_: self._resolve_foreign_history(
x.updated,
x.id,
rolePermissionDao,
permissionDao,
lambda y: y.permission_id,
obj_key="roleid",
),
)

View File

@ -1,11 +1,17 @@
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from data.schemas.permission.role_dao import roleDao
from data.schemas.permission.role_permission_dao import rolePermissionDao
from data.schemas.permission.role_user_dao import roleUserDao
class RoleQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "Role")
DbModelQueryABC.__init__(self, "Role", roleDao, with_history=True)
self.set_field("name", lambda x, *_: x.name)
self.set_field("description", lambda x, *_: x.description)
self.set_field("permissions", lambda x, *_: x.permissions)
self.set_field("users", lambda x, *_: x.users)
self.set_history_reference_dao(rolePermissionDao, "roleid")
self.set_history_reference_dao(roleUserDao, "roleid")

View File

@ -0,0 +1,14 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
class ShortUrlQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "ShortUrl")
self.set_field("shortUrl", lambda x, *_: x.short_url)
self.set_field("targetUrl", lambda x, *_: x.target_url)
self.set_field("description", lambda x, *_: x.description)
self.set_field("group", lambda x, *_: x.group)
self.set_field("domain", lambda x, *_: x.domain)
self.set_field("visits", lambda x, *_: x.visit_count)
self.set_field("loadingScreen", lambda x, *_: x.loading_screen)

View File

@ -1,9 +1,10 @@
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from data.schemas.public.short_url_dao import shortUrlDao
class ShortUrlQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "ShortUrl")
DbModelQueryABC.__init__(self, "ShortUrl", shortUrlDao, with_history=True)
self.set_field("shortUrl", lambda x, *_: x.short_url)
self.set_field("targetUrl", lambda x, *_: x.target_url)

View File

@ -0,0 +1,23 @@
from api_graphql.abc.db_history_model_query_abc import DbHistoryModelQueryABC
from data.schemas.permission.role_dao import roleDao
from data.schemas.permission.role_user_dao import roleUserDao
class UserHistoryQuery(DbHistoryModelQueryABC):
def __init__(self):
DbHistoryModelQueryABC.__init__(self, "User")
self.set_field("keycloakId", lambda x, *_: x.keycloak_id)
self.set_field("username", lambda x, *_: x.username)
self.set_field("email", lambda x, *_: x.email)
self.set_field(
"roles",
lambda x, *_: self._resolve_foreign_history(
x.updated,
x.id,
roleUserDao,
roleDao,
lambda y: y.role_id,
obj_key="userid",
),
)

View File

@ -1,11 +1,15 @@
from api_graphql.abc.db_model_query_abc import DbModelQueryABC
from data.schemas.administration.user_dao import userDao
from data.schemas.permission.role_user_dao import roleUserDao
class UserQuery(DbModelQueryABC):
def __init__(self):
DbModelQueryABC.__init__(self, "User")
DbModelQueryABC.__init__(self, "User", userDao, with_history=True)
self.set_field("keycloakId", lambda x, *_: x.keycloak_id)
self.set_field("username", lambda x, *_: x.username)
self.set_field("email", lambda x, *_: x.email)
self.set_field("roles", lambda x, *_: x.roles)
self.set_history_reference_dao(roleUserDao, "userid")

View File

@ -49,6 +49,12 @@ class Subscription(SubscriptionABC):
.with_public(True)
)
self.subscribe(
SubscriptionFieldBuilder("userLogout")
.with_resolver(lambda message, *_: message.message)
.with_public(True)
)
self.subscribe(
SubscriptionFieldBuilder("domainChange")
.with_resolver(lambda message, *_: message.message)

View File

@ -11,7 +11,7 @@ from core.database.external_data_temp_table_builder import ExternalDataTempTable
from core.get_value import get_value
from core.logger import DBLogger
from core.string import camel_to_snake
from core.typing import T, Attribute, AttributeFilters, AttributeSorts
from core.typing import T, Attribute, AttributeFilters, AttributeSorts, Id
T_DBM = TypeVar("T_DBM", bound=DbModelABC)
@ -51,6 +51,7 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
db_name: str = None,
ignore=False,
primary_key=False,
aliases: list[str] = None,
):
"""
Add an attribute for db and object mapping to the data access object
@ -59,6 +60,7 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
:param str db_name: Name of the field in the database, if None the attribute lowered attr_name without "_" is used
:param bool ignore: Defines if field is ignored for create and update (for e.g. auto increment fields or created/updated fields)
:param bool primary_key: Defines if field is the primary key
:param list[str] aliases: List of aliases for the attribute name
:return:
"""
if isinstance(attr_name, property):
@ -72,11 +74,20 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
db_name = attr_name.lower().replace("_", "")
self.__db_names[attr_name] = db_name
self.__db_names[db_name] = db_name
if aliases is not None:
for alias in aliases:
if alias in self.__db_names:
raise ValueError(f"Alias {alias} already exists")
self.__db_names[alias] = db_name
if primary_key:
self.__primary_key = db_name
self.__primary_key_type = attr_type
if attr_type in [datetime, datetime.datetime]:
self.__date_attributes.add(attr_name)
self.__date_attributes.add(db_name)
def reference(
@ -156,9 +167,42 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
return 0
return result[0]["count"]
async def get_history(
self,
entry_id: int,
by_key: str = None,
when: datetime = None,
until: datetime = None,
without_deleted=False,
) -> list[T_DBM]:
query = f"SELECT {self._table_name}_history.* FROM {self._table_name}_history"
for join in self.__joins:
query += f" {self.__joins[join].replace(self._table_name, f'{self._table_name}_history')}"
query += f" WHERE {f'{self._table_name}_history.{self.__primary_key}' if by_key is None else f'{self._table_name}_history.{by_key}'} = {entry_id}"
if self._default_filter_condition is not None:
query += f" AND {self._default_filter_condition}"
if without_deleted:
query += f" AND {self._table_name}_history.deleted = false"
if when is not None:
query += f" AND {self._attr_from_date_to_char(f'{self._table_name}_history.updated')} = '{when.strftime(DATETIME_FORMAT)}'"
if until is not None:
query += f" AND {self._attr_from_date_to_char(f'{self._table_name}_history.updated')} <= '{until.strftime(DATETIME_FORMAT)}'"
query += f" ORDER BY {self._table_name}_history.updated DESC;"
result = await self._db.select_map(query)
if result is None:
return []
return [self.to_object(x) for x in result]
async def get_all(self) -> list[T_DBM]:
result = await self._db.select_map(
f"SELECT * FROM {self._table_name}{f" WHERE {self._default_filter_condition}" if self._default_filter_condition is not None else ''}"
f"SELECT * FROM {self._table_name}{f" WHERE {self._default_filter_condition}" if self._default_filter_condition is not None else ''} ORDER BY {self.__primary_key};"
)
if result is None:
return []
@ -278,6 +322,35 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
raise ValueError("More than one result found")
return result[0]
async def touch(self, obj: T_DBM):
"""
Touch the entry to update the last updated date
:return:
"""
await self._db.execute(
f"""
UPDATE {self._table_name}
SET updated = NOW()
WHERE {self.__primary_key} = {self._get_primary_key_value_sql(obj)};
"""
)
async def touch_many_by_id(self, ids: list[Id]):
"""
Touch the entries to update the last updated date
:return:
"""
if len(ids) == 0:
return
await self._db.execute(
f"""
UPDATE {self._table_name}
SET updated = NOW()
WHERE {self.__primary_key} IN ({", ".join([str(x) for x in ids])});
"""
)
async def _build_create_statement(self, obj: T_DBM, skip_editor=False) -> str:
allowed_fields = [
x for x in self.__attributes.keys() if x not in self.__ignored_attributes
@ -499,20 +572,41 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
take: int = None,
skip: int = None,
) -> str:
filter_conditions = []
sort_conditions = []
external_table_deps = []
query = f"SELECT {self._table_name}.* FROM {self._table_name}"
for join in self.__joins:
query += f" {self.__joins[join]}"
# Collect dependencies from filters
if filters is not None and (not isinstance(filters, list) or len(filters) > 0):
conditions, external_table_deps = await self._build_conditions(filters)
filter_conditions, filter_deps = await self._build_conditions(filters)
external_table_deps.extend(filter_deps)
# Collect dependencies from sorts
if sorts is not None and (not isinstance(sorts, list) or len(sorts) > 0):
sort_conditions, sort_deps = self._build_order_by(sorts)
external_table_deps.extend(sort_deps)
# Handle external table dependencies before WHERE and ORDER BY
if external_table_deps:
query = await self._handle_query_external_temp_tables(
query, external_table_deps
)
query += f" WHERE {conditions}"
# Add WHERE clause
if filters is not None and (not isinstance(filters, list) or len(filters) > 0):
query += f" WHERE {filter_conditions}"
# Add ORDER BY clause
if sorts is not None and (not isinstance(sorts, list) or len(sorts) > 0):
query += f" ORDER BY {self._build_order_by(sorts)}"
query += f" ORDER BY {sort_conditions}"
if take is not None:
query += f" LIMIT {take}"
if skip is not None:
query += f" OFFSET {skip}"
@ -737,8 +831,10 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
:param value:
:return:
"""
if db_name in self.__date_attributes:
db_name = f"TO_CHAR({db_name}, 'DD.MM.YYYY HH24:MI:SS.US')"
attr = db_name.split(".")[-1]
if attr in self.__date_attributes:
db_name = self._attr_from_date_to_char(db_name)
sql_value = self._get_value_sql(value)
if operator == "equal":
@ -774,12 +870,17 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
else:
raise ValueError(f"Unsupported operator: {operator}")
def _build_order_by(self, sorts: AttributeSorts) -> str:
@staticmethod
def _attr_from_date_to_char(attr: str) -> str:
return f"TO_CHAR({attr}, 'YYYY-MM-DD HH24:MI:SS.US TZ')"
def _build_order_by(self, sorts: AttributeSorts) -> (str, list[str]):
"""
Build SQL order by clause from the given sorts
:param sorts:
:return:
"""
external_field_table_deps = []
if not isinstance(sorts, list):
sorts = [sorts]
@ -791,35 +892,38 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
if attr in self.__foreign_tables:
foreign_table = self.__foreign_tables[attr]
sort_clauses.extend(
self._build_foreign_order_by(foreign_table, direction)
f_sorts, eftd = self._build_foreign_order_by(
foreign_table, direction
)
if eftd:
external_field_table_deps.extend(eftd)
sort_clauses.extend(f_sorts)
continue
match attr:
case "createdUtc":
attr = "created"
case "updatedUtc":
attr = "updated"
if attr.endswith("Utc") and attr.split("Utc")[0].lower() in [
"created",
"updated",
]:
attr = attr.replace("Utc", "")
external_fields_table_name = self._get_external_field_key(attr)
if external_fields_table_name is not None:
external_fields_table = self._external_fields[
external_fields_table_name
]
db_name = f"{external_fields_table.table_name}.{attr}"
external_field_table_deps.append(external_fields_table.table_name)
else:
db_name = self.__db_names[attr]
sort_clauses.append(f"{db_name} {direction.upper()}")
return ", ".join(sort_clauses)
return ", ".join(sort_clauses), external_field_table_deps
def _build_foreign_order_by(self, table: str, direction: str) -> list[str]:
def _build_foreign_order_by(
self, table: str, direction: dict
) -> (list[str], list[str]):
"""
Build SQL order by clause for foreign key references
:param table: Foreign table name
:param direction: Sort direction
:return: List of order by clauses
"""
external_field_table_deps = []
sort_clauses = []
for attr, sub_direction in direction.items():
if isinstance(attr, property):
@ -827,15 +931,25 @@ class DataAccessObjectABC(ABC, Database, Generic[T_DBM]):
if attr in self.__foreign_tables:
foreign_table = self.__foreign_tables[attr]
sort_clauses.extend(
self._build_foreign_order_by(foreign_table, sub_direction)
)
f_sorts, eftd = self._build_foreign_order_by(foreign_table, direction)
if eftd:
external_field_table_deps.extend(eftd)
sort_clauses.extend(f_sorts)
continue
external_fields_table_name = self._get_external_field_key(attr)
if external_fields_table_name is not None:
external_fields_table = self._external_fields[
external_fields_table_name
]
db_name = f"{external_fields_table.table_name}.{attr}"
external_field_table_deps.append(external_fields_table.table_name)
else:
db_name = f"{table}.{attr.lower().replace('_', '')}"
sort_clauses.append(f"{db_name} {sub_direction.upper()}")
return sort_clauses
return sort_clauses, external_field_table_deps
@staticmethod
async def _get_editor_id(obj: T_DBM):

View File

@ -0,0 +1,19 @@
from datetime import datetime
from typing import Optional
from core.database.abc.db_model_abc import DbModelABC
from core.typing import Id, SerialId
class DbJoinModelABC(DbModelABC):
def __init__(
self,
id: Id,
source_id: Id,
foreign_id: Id,
deleted: bool = False,
editor_id: Optional[SerialId] = None,
created: Optional[datetime] = None,
updated: Optional[datetime] = None,
):
DbModelABC.__init__(self, id, deleted, editor_id, created, updated)

View File

@ -54,7 +54,7 @@ class DbModelABC(ABC):
from data.schemas.administration.user_dao import userDao
return await userDao.get_by_id(self._editor_id)
return await userDao.find_single_by({"id": self._editor_id})
@property
def created(self) -> datetime:

View File

@ -15,5 +15,5 @@ class DbModelDaoABC[T_DBM](DataAccessObjectABC[T_DBM]):
self.attribute(DbModelABC.id, int, ignore=True)
self.attribute(DbModelABC.deleted, bool)
self.attribute(DbModelABC.editor_id, int, ignore=True)
self.attribute(DbModelABC.created, datetime, "createdutc", ignore=True)
self.attribute(DbModelABC.updated, datetime, "updatedutc", ignore=True)
self.attribute(DbModelABC.created, datetime, "created", ignore=True)
self.attribute(DbModelABC.updated, datetime, "updated", ignore=True)

View File

@ -29,6 +29,11 @@ def get_value(
value,
cast_type if not hasattr(cast_type, "__origin__") else cast_type.__origin__,
):
# Handle list[int] case explicitly
if hasattr(cast_type, "__origin__") and cast_type.__origin__ == list:
subtype = cast_type.__args__[0] if hasattr(cast_type, "__args__") else None
if subtype is not None:
return [subtype(item) for item in value]
return value
try:

View File

@ -0,0 +1,2 @@
DROP EXTENSION IF EXISTS fuzzystrmatch;
CREATE EXTENSION fuzzystrmatch SCHEMA public;

View File

@ -0,0 +1,133 @@
ALTER TABLE system._executed_migrations
RENAME COLUMN createdutc TO created;
ALTER TABLE system.files
RENAME COLUMN createdutc TO created;
ALTER TABLE system.files_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.short_url_visits
RENAME COLUMN createdutc TO created;
ALTER TABLE public.short_url_visits_history
RENAME COLUMN createdutc TO created;
ALTER TABLE system.feature_flags_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.user_settings_history
RENAME COLUMN createdutc TO created;
ALTER TABLE administration.users
RENAME COLUMN createdutc TO created;
ALTER TABLE administration.users_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.groups
RENAME COLUMN createdutc TO created;
ALTER TABLE public.groups_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.short_urls
RENAME COLUMN createdutc TO created;
ALTER TABLE administration.api_keys
RENAME COLUMN createdutc TO created;
ALTER TABLE administration.api_keys_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.domains
RENAME COLUMN createdutc TO created;
ALTER TABLE public.domains_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.short_urls_history
RENAME COLUMN createdutc TO created;
ALTER TABLE system.settings
RENAME COLUMN createdutc TO created;
ALTER TABLE public.group_role_assignments
RENAME COLUMN createdutc TO created;
ALTER TABLE public.group_role_assignments_history
RENAME COLUMN createdutc TO created;
ALTER TABLE system.settings_history
RENAME COLUMN createdutc TO created;
ALTER TABLE public.user_settings
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.permissions
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.permissions_history
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.roles
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.roles_history
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.role_permissions
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.role_permissions_history
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.role_users
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.role_users_history
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.api_key_permissions
RENAME COLUMN createdutc TO created;
ALTER TABLE permission.api_key_permissions_history
RENAME COLUMN createdutc TO created;
ALTER TABLE system.feature_flags
RENAME COLUMN createdutc TO created;
ALTER TABLE system._executed_migrations
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.files
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.files_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.short_url_visits
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.short_url_visits_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.feature_flags_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.user_settings_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE administration.users
RENAME COLUMN updatedutc TO updated;
ALTER TABLE administration.users_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.groups
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.groups_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.short_urls
RENAME COLUMN updatedutc TO updated;
ALTER TABLE administration.api_keys
RENAME COLUMN updatedutc TO updated;
ALTER TABLE administration.api_keys_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.domains
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.domains_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.short_urls_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.settings
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.group_role_assignments
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.group_role_assignments_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.settings_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE public.user_settings
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.permissions
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.permissions_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.roles
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.roles_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.role_permissions
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.role_permissions_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.role_users
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.role_users_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.api_key_permissions
RENAME COLUMN updatedutc TO updated;
ALTER TABLE permission.api_key_permissions_history
RENAME COLUMN updatedutc TO updated;
ALTER TABLE system.feature_flags
RENAME COLUMN updatedutc TO updated;

View File

@ -0,0 +1,37 @@
CREATE OR REPLACE FUNCTION public.history_trigger_function()
RETURNS TRIGGER AS
$$
DECLARE
schema_name TEXT;
history_table_name TEXT;
BEGIN
-- Construct the name of the history table based on the current table
schema_name := TG_TABLE_SCHEMA;
history_table_name := TG_TABLE_NAME || '_history';
IF (TG_OP = 'INSERT') THEN
RETURN NEW;
END IF;
-- Insert the old row into the history table on UPDATE or DELETE
IF (TG_OP = 'UPDATE' OR TG_OP = 'DELETE') THEN
EXECUTE format(
'INSERT INTO %I.%I SELECT ($1).*',
schema_name,
history_table_name
)
USING OLD;
END IF;
-- For UPDATE, update the UpdatedUtc column and return the new row
IF (TG_OP = 'UPDATE') THEN
NEW.updated := NOW(); -- Update the UpdatedUtc column
RETURN NEW;
END IF;
-- For DELETE, return OLD to allow the deletion
IF (TG_OP = 'DELETE') THEN
RETURN OLD;
END IF;
END;
$$ LANGUAGE plpgsql;

View File

@ -0,0 +1,23 @@
ALTER TABLE permission.role_permissions
ADD CONSTRAINT unique_role_permission
UNIQUE (roleid, permissionid);
ALTER TABLE permission.api_key_permissions
ADD CONSTRAINT unique_api_key_permission
UNIQUE (apikeyid, permissionid);
ALTER TABLE permission.role_users
ADD CONSTRAINT unique_role_user
UNIQUE (roleid, userid);
ALTER TABLE public.user_settings
ADD CONSTRAINT unique_user_setting
UNIQUE (userid, key);
ALTER TABLE system.settings
ADD CONSTRAINT unique_system_setting
UNIQUE (key);
ALTER TABLE system.feature_flags
ADD CONSTRAINT unique_feature_flag
UNIQUE (key);

View File

@ -111,7 +111,11 @@ def _find_short_url_by_path(path: str) -> Optional[dict]:
if "errors" in data:
logger.warning(f"Failed to find short url by path {path} -> {data["errors"]}")
if "data" not in data or "shortUrls" not in data["data"] or "nodes" not in data["data"]["shortUrls"]:
if (
"data" not in data
or "shortUrls" not in data["data"]
or "nodes" not in data["data"]["shortUrls"]
):
return None
data = data["data"]["shortUrls"]["nodes"]

View File

@ -4,4 +4,8 @@ RUN rm -rf /usr/share/nginx/html/*
COPY ./dist/open-redirect/browser/ /usr/share/nginx/html
RUN apk update
RUN apk add bash
ARG VERSION
RUN echo "{\"version\": \"${VERSION}\"}" > /usr/share/nginx/html/assets/version.json
CMD /bin/bash -c "envsubst '\$CONTAINER_NAME' < /etc/nginx/conf.d/nginx.conf.template > /etc/nginx/nginx.conf; nginx -g 'daemon off;'"

View File

@ -9,7 +9,10 @@
"misprintCoefficient": "0.9",
"ignoredKeys": [
"permissions.*",
"permission_descriptions.*"
"permission_descriptions.*",
"event.participants.attendance_states.*",
"event.participants.payment_*",
"primeng.*"
],
"ignoredMisprintKeys": [],
"customRegExpToFindKeys": [

View File

@ -1,11 +1,16 @@
<main *ngIf="isLoggedIn && !hideUI; else home" [class]="theme">
<main [class]="theme">
<div
class="warning bg3 flex justify-center p-1.5"
*ngIf="showTechnicalDemoBanner">
{{ 'technical_demo_banner' | translate }}
</div>
<app-header></app-header>
<div class="app">
<aside *ngIf="showSidebar">
<app-sidebar></app-sidebar>
</aside>
<section class="component">
<section class="component" *ngIf="loadedGuiSettings">
<router-outlet></router-outlet>
</section>
</div>
@ -30,7 +35,3 @@
</p-confirmDialog>
</main>
<app-spinner></app-spinner>
<ng-template #home>
<router-outlet></router-outlet>
</ng-template>

View File

@ -2,8 +2,8 @@ import { Component, OnDestroy } from '@angular/core';
import { SidebarService } from 'src/app/service/sidebar.service';
import { Subject } from 'rxjs';
import { takeUntil } from 'rxjs/operators';
import { AuthService } from 'src/app/service/auth.service';
import { GuiService } from 'src/app/service/gui.service';
import { FeatureFlagService } from 'src/app/service/feature-flag.service';
@Component({
selector: 'app-root',
@ -11,36 +11,35 @@ import { GuiService } from 'src/app/service/gui.service';
styleUrl: './app.component.scss',
})
export class AppComponent implements OnDestroy {
theme = 'open-redirect';
showSidebar = false;
hideUI = false;
isLoggedIn = false;
theme = 'lan-maestro';
showTechnicalDemoBanner = false;
loadedGuiSettings = false;
unsubscribe$ = new Subject<void>();
constructor(
private sidebar: SidebarService,
private auth: AuthService,
private gui: GuiService
private gui: GuiService,
private features: FeatureFlagService
) {
this.auth.loadUser();
this.auth.user$.pipe(takeUntil(this.unsubscribe$)).subscribe(user => {
this.isLoggedIn = user !== null && user !== undefined;
this.features.get('TechnicalDemoBanner').then(showTechnicalDemoBanner => {
this.showTechnicalDemoBanner = showTechnicalDemoBanner;
});
this.sidebar.visible$
.pipe(takeUntil(this.unsubscribe$))
.subscribe(visible => {
this.showSidebar = visible;
});
this.gui.hideGui$.pipe(takeUntil(this.unsubscribe$)).subscribe(hide => {
this.hideUI = hide;
});
this.gui.theme$.pipe(takeUntil(this.unsubscribe$)).subscribe(theme => {
this.theme = theme;
});
this.gui.loadedGuiSettings$
.pipe(takeUntil(this.unsubscribe$))
.subscribe(loaded => {
this.loadedGuiSettings = loaded;
});
}
ngOnDestroy() {

View File

@ -1,4 +1,11 @@
import { APP_INITIALIZER, ErrorHandler, NgModule } from '@angular/core';
import {
APP_INITIALIZER,
ApplicationRef,
DoBootstrap,
ErrorHandler,
Injector,
NgModule,
} from '@angular/core';
import { BrowserModule } from '@angular/platform-browser';
import { AppRoutingModule } from './app-routing.module';
@ -23,6 +30,8 @@ import { SidebarComponent } from './components/sidebar/sidebar.component';
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
import { ConfigService } from 'src/app/service/config.service';
import { ServerUnavailableComponent } from 'src/app/components/error/server-unavailable/server-unavailable.component';
import { SpinnerService } from 'src/app/service/spinner.service';
import { AuthService } from 'src/app/service/auth.service';
if (environment.production) {
Logger.enableProductionMode();
@ -95,6 +104,20 @@ export function appInitializerFactory(
useClass: ErrorHandlingService,
},
],
bootstrap: [AppComponent],
})
export class AppModule {}
export class AppModule implements DoBootstrap {
constructor(private injector: Injector) {}
async ngDoBootstrap(appRef: ApplicationRef) {
const spinner = this.injector.get(SpinnerService);
spinner.show();
const auth = this.injector.get(AuthService);
const user = await auth.loadUser();
if (!user) {
await auth.login();
}
appRef.bootstrap(AppComponent);
}
}

View File

@ -1,8 +1,9 @@
import { Component } from '@angular/core';
import { ErrorComponentBase } from 'src/app/core/base/error-component-base';
@Component({
selector: 'app-not-found',
templateUrl: './not-found.component.html',
styleUrls: ['./not-found.component.scss'],
})
export class NotFoundComponent {}
export class NotFoundComponent extends ErrorComponentBase {}

View File

@ -1,13 +1,16 @@
import { Component } from '@angular/core';
import { Router } from '@angular/router';
import { ErrorComponentBase } from 'src/app/core/base/error-component-base';
@Component({
selector: 'app-server-unavailable',
templateUrl: './server-unavailable.component.html',
styleUrls: ['./server-unavailable.component.scss'],
})
export class ServerUnavailableComponent {
constructor(private router: Router) {}
export class ServerUnavailableComponent extends ErrorComponentBase {
constructor(private router: Router) {
super();
}
async retryConnection() {
await this.router.navigate(['/']);

View File

@ -1,7 +1,14 @@
<footer>
<footer class="flex justify-between pl-1 pr-1">
<div class="hidden md:block">
<span>web: {{ webVersion }}</span>
<span class="divider"> | </span>
<span>api: {{ apiVersion }}</span>
</div>
<div>
<a [href]="termsUrl">{{ 'footer.terms' | translate }}</a>
<span class="divider"> | </span>
<a [href]="privacyUrl">{{ 'footer.privacy' | translate }}</a>
<span class="divider"> | </span>
<a [href]="imprintUrl">{{ 'footer.imprint' | translate }}</a>
</div>
</footer>

View File

@ -1,16 +0,0 @@
@import "../../../styles/constants.scss";
footer {
width: 100%;
min-height: 25px;
padding: 0 5px;
display: flex;
align-items: center;
justify-content: flex-end;
gap: 10px;
a {
text-decoration: none;
}
}

View File

@ -1,23 +1,37 @@
import { ComponentFixture, TestBed } from "@angular/core/testing";
import { ComponentFixture, TestBed } from '@angular/core/testing';
import { FooterComponent } from "src/app/components/footer/footer.component";
import { TranslateModule } from "@ngx-translate/core";
import { BrowserModule } from "@angular/platform-browser";
import { BrowserAnimationsModule } from "@angular/platform-browser/animations";
import { SharedModule } from "src/app/modules/shared/shared.module";
import { FooterComponent } from 'src/app/components/footer/footer.component';
import { TranslateModule } from '@ngx-translate/core';
import { SharedModule } from 'src/app/modules/shared/shared.module';
import { AuthService } from 'src/app/service/auth.service';
import { KeycloakService } from 'keycloak-angular';
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
import { ToastService } from 'src/app/service/toast.service';
import { ConfirmationService, MessageService } from 'primeng/api';
import { ActivatedRoute } from '@angular/router';
import { of } from 'rxjs';
describe("FooterComponent", () => {
describe('FooterComponent', () => {
let component: FooterComponent;
let fixture: ComponentFixture<FooterComponent>;
beforeEach(async () => {
await TestBed.configureTestingModule({
declarations: [FooterComponent],
imports: [
BrowserModule,
BrowserAnimationsModule,
SharedModule,
TranslateModule.forRoot(),
imports: [SharedModule, TranslateModule.forRoot()],
providers: [
AuthService,
KeycloakService,
ErrorHandlingService,
ToastService,
MessageService,
ConfirmationService,
{
provide: ActivatedRoute,
useValue: {
snapshot: { params: of({}) },
},
},
],
}).compileComponents();
});
@ -28,7 +42,7 @@ describe("FooterComponent", () => {
fixture.detectChanges();
});
it("should create", () => {
it('should create', () => {
expect(component).toBeTruthy();
});
});

View File

@ -1,5 +1,7 @@
import { Component } from '@angular/core';
import { ConfigService } from 'src/app/service/config.service';
import { VersionService } from 'src/app/service/version.service';
import { ToastService } from 'src/app/service/toast.service';
@Component({
selector: 'app-footer',
@ -7,7 +9,21 @@ import { ConfigService } from 'src/app/service/config.service';
styleUrls: ['./footer.component.scss'],
})
export class FooterComponent {
constructor(private config: ConfigService) {}
webVersion = '0.0.0';
apiVersion = '0.0.0';
constructor(
private toast: ToastService,
private config: ConfigService,
private version: VersionService
) {
this.version.getApiVersion().subscribe(version => {
this.apiVersion = version;
});
this.version.getWebVersion().subscribe(version => {
this.webVersion = version.version;
});
}
get termsUrl(): string {
return this.config.settings.termsUrl;

View File

@ -2,22 +2,25 @@
<div class="header">
<div class="flex items-center justify-center">
<p-button
*ngIf="user"
type="button"
icon="pi pi-bars"
class="btn icon-btn p-button-text"
(onClick)="toggleSidebar()"
></p-button>
(onClick)="toggleSidebar()"></p-button>
</div>
<div class="logo">
<!-- <img src="/assets/images/logo.svg" alt="logo"/>-->
</div>
<div class="app-name">
<h1>Open-redirect</h1>
<h1>LAN-Maestro</h1>
</div>
</div>
<div class="flex items-center justify-center w-1/3" *ngIf="menu.length > 0">
<app-menu-bar class="w-full" [elements]="menu"></app-menu-bar>
</div>
<div class="flex items-center justify-center">
<div class="flex items-center justify-center">
<div class="flex items-center justify-center" *ngIf="themeList.length > 0">
<p-button
type="button"
icon="pi pi-palette"
@ -29,7 +32,7 @@
[model]="themeList"
class="lang-menu"></p-menu>
</div>
<div class="flex items-center justify-center">
<div class="flex items-center justify-center" *ngIf="langList.length > 0">
<p-button
type="button"
icon="pi pi-globe"

View File

@ -1,16 +1,16 @@
import { ComponentFixture, TestBed } from "@angular/core/testing";
import { HeaderComponent } from "src/app/components/header/header.component";
import { TranslateModule } from "@ngx-translate/core";
import { ConfirmationService, MessageService } from "primeng/api";
import { ActivatedRoute } from "@angular/router";
import { of } from "rxjs";
import { SharedModule } from "src/app/modules/shared/shared.module";
import { ErrorHandlingService } from "src/app/service/error-handling.service";
import { ToastService } from "src/app/service/toast.service";
import { AuthService } from "src/app/service/auth.service";
import { KeycloakService } from "keycloak-angular";
import { ComponentFixture, TestBed } from '@angular/core/testing';
import { HeaderComponent } from 'src/app/components/header/header.component';
import { TranslateModule } from '@ngx-translate/core';
import { ConfirmationService, MessageService } from 'primeng/api';
import { ActivatedRoute } from '@angular/router';
import { of } from 'rxjs';
import { SharedModule } from 'src/app/modules/shared/shared.module';
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
import { ToastService } from 'src/app/service/toast.service';
import { AuthService } from 'src/app/service/auth.service';
import { KeycloakService } from 'keycloak-angular';
describe("HeaderComponent", () => {
describe('HeaderComponent', () => {
let component: HeaderComponent;
let fixture: ComponentFixture<HeaderComponent>;
@ -41,7 +41,7 @@ describe("HeaderComponent", () => {
fixture.detectChanges();
});
it("should create", () => {
it('should create', () => {
expect(component).toBeTruthy();
});
});

View File

@ -48,12 +48,12 @@ export class HeaderComponent implements OnInit, OnDestroy {
});
this.auth.user$.pipe(takeUntil(this.unsubscribe$)).subscribe(async user => {
this.user = user;
await this.initMenuLists();
if (user) {
await this.loadTheme();
await this.loadLang();
}
this.user = user;
this.guiService.loadedGuiSettings$.next(true);
});
this.themeList = this.config.settings.themes.map(theme => {
@ -87,27 +87,7 @@ export class HeaderComponent implements OnInit, OnDestroy {
}
async initMenuList() {
this.menu = [
{
label: 'common.news',
routerLink: ['/'],
icon: 'pi pi-home',
},
{
label: 'header.menu.about',
routerLink: ['/about'],
icon: 'pi pi-info',
},
];
if (this.auth.user$.value) {
this.menu.push({
label: 'header.menu.admin',
routerLink: ['/admin'],
icon: 'pi pi-cog',
visible: await this.auth.isAdmin(),
});
}
this.menu = [];
}
async initLangMenuList() {

View File

@ -0,0 +1 @@
<p>home works!</p>

View File

@ -1,15 +1,6 @@
import { ComponentFixture, TestBed } from '@angular/core/testing';
import { HomeComponent } from './home.component';
import { SharedModule } from 'src/app/modules/shared/shared.module';
import { TranslateModule } from '@ngx-translate/core';
import { AuthService } from 'src/app/service/auth.service';
import { KeycloakService } from 'keycloak-angular';
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
import { ToastService } from 'src/app/service/toast.service';
import { ConfirmationService, MessageService } from 'primeng/api';
import { ActivatedRoute } from '@angular/router';
import { of } from 'rxjs';
describe('HomeComponent', () => {
let component: HomeComponent;
@ -18,21 +9,6 @@ describe('HomeComponent', () => {
beforeEach(async () => {
await TestBed.configureTestingModule({
declarations: [HomeComponent],
imports: [SharedModule, TranslateModule.forRoot()],
providers: [
AuthService,
KeycloakService,
ErrorHandlingService,
ToastService,
MessageService,
ConfirmationService,
{
provide: ActivatedRoute,
useValue: {
snapshot: { params: of({}) },
},
},
],
}).compileComponents();
fixture = TestBed.createComponent(HomeComponent);

View File

@ -1,5 +1,5 @@
import { Component } from '@angular/core';
import { KeycloakService } from 'keycloak-angular';
import { SpinnerService } from 'src/app/service/spinner.service';
@Component({
selector: 'app-home',
@ -7,9 +7,7 @@ import { KeycloakService } from 'keycloak-angular';
styleUrl: './home.component.scss',
})
export class HomeComponent {
constructor(private keycloak: KeycloakService) {
if (!this.keycloak.isLoggedIn()) {
this.keycloak.login().then(() => {});
}
constructor(private spinner: SpinnerService) {
this.spinner.hide();
}
}

View File

@ -1,17 +1,17 @@
import { ComponentFixture, TestBed } from "@angular/core/testing";
import { ComponentFixture, TestBed } from '@angular/core/testing';
import { SidebarComponent } from "./sidebar.component";
import { SharedModule } from "src/app/modules/shared/shared.module";
import { TranslateModule } from "@ngx-translate/core";
import { AuthService } from "src/app/service/auth.service";
import { ErrorHandlingService } from "src/app/service/error-handling.service";
import { ToastService } from "src/app/service/toast.service";
import { ConfirmationService, MessageService } from "primeng/api";
import { ActivatedRoute } from "@angular/router";
import { of } from "rxjs";
import { KeycloakService } from "keycloak-angular";
import { SidebarComponent } from './sidebar.component';
import { SharedModule } from 'src/app/modules/shared/shared.module';
import { TranslateModule } from '@ngx-translate/core';
import { AuthService } from 'src/app/service/auth.service';
import { ErrorHandlingService } from 'src/app/service/error-handling.service';
import { ToastService } from 'src/app/service/toast.service';
import { ConfirmationService, MessageService } from 'primeng/api';
import { ActivatedRoute } from '@angular/router';
import { of } from 'rxjs';
import { KeycloakService } from 'keycloak-angular';
describe("SidebarComponent", () => {
describe('SidebarComponent', () => {
let component: SidebarComponent;
let fixture: ComponentFixture<SidebarComponent>;
@ -40,7 +40,7 @@ describe("SidebarComponent", () => {
fixture.detectChanges();
});
it("should create", () => {
it('should create', () => {
expect(component).toBeTruthy();
});
});

View File

@ -1,13 +1,13 @@
import { Component, OnDestroy } from "@angular/core";
import { MenuElement } from "src/app/model/view/menu-element";
import { Subject } from "rxjs";
import { SidebarService } from "src/app/service/sidebar.service";
import { takeUntil } from "rxjs/operators";
import { Component, OnDestroy } from '@angular/core';
import { MenuElement } from 'src/app/model/view/menu-element';
import { Subject } from 'rxjs';
import { SidebarService } from 'src/app/service/sidebar.service';
import { takeUntil } from 'rxjs/operators';
@Component({
selector: "app-sidebar",
templateUrl: "./sidebar.component.html",
styleUrl: "./sidebar.component.scss",
selector: 'app-sidebar',
templateUrl: './sidebar.component.html',
styleUrl: './sidebar.component.scss',
})
export class SidebarComponent implements OnDestroy {
elements: MenuElement[] = [];
@ -17,7 +17,7 @@ export class SidebarComponent implements OnDestroy {
constructor(private sidebar: SidebarService) {
this.sidebar.elements$
.pipe(takeUntil(this.unsubscribe$))
.subscribe((elements) => {
.subscribe(elements => {
this.elements = elements;
});
}

View File

@ -1,8 +1,8 @@
import { ComponentFixture, TestBed } from "@angular/core/testing";
import { ComponentFixture, TestBed } from '@angular/core/testing';
import { SpinnerComponent } from "src/app/components/spinner/spinner.component";
import { SpinnerComponent } from 'src/app/components/spinner/spinner.component';
describe("SpinnerComponent", () => {
describe('SpinnerComponent', () => {
let component: SpinnerComponent;
let fixture: ComponentFixture<SpinnerComponent>;
@ -18,7 +18,7 @@ describe("SpinnerComponent", () => {
fixture.detectChanges();
});
it("should create", () => {
it('should create', () => {
expect(component).toBeTruthy();
});
});

View File

@ -1,16 +1,16 @@
import { Component } from "@angular/core";
import { SpinnerService } from "src/app/service/spinner.service";
import { Component } from '@angular/core';
import { SpinnerService } from 'src/app/service/spinner.service';
@Component({
selector: "app-spinner",
templateUrl: "./spinner.component.html",
styleUrls: ["./spinner.component.scss"],
selector: 'app-spinner',
templateUrl: './spinner.component.html',
styleUrls: ['./spinner.component.scss'],
})
export class SpinnerComponent {
showSpinnerState = false;
constructor(public spinnerService: SpinnerService) {
this.spinnerService.showSpinnerState$.subscribe((value) => {
this.spinnerService.showSpinnerState$.subscribe(value => {
this.showSpinnerState = value;
});
}

View File

@ -0,0 +1,9 @@
import { inject } from '@angular/core';
import { SpinnerService } from 'src/app/service/spinner.service';
export class ErrorComponentBase {
constructor() {
const spinner = inject(SpinnerService);
spinner.hide();
}
}

View File

@ -26,8 +26,8 @@ export abstract class FormPageBase<
protected filterService = inject(FilterService);
protected dataService = inject(PageDataService) as S;
protected constructor() {
const id = this.route.snapshot.params['id'];
protected constructor(idKey: string = 'id') {
const id = this.route.snapshot.params[idKey];
this.validateRoute(id);
this.buildForm();

View File

@ -115,7 +115,6 @@ export abstract class PageBase<
.onChange()
.pipe(takeUntil(this.unsubscribe$))
.subscribe(() => {
logger.debug('Reload data');
this.load(true);
});
}

View File

@ -0,0 +1,49 @@
import { Injectable } from '@angular/core';
import { Observable } from 'rxjs';
import { MutationResult } from 'apollo-angular';
import { Filter } from 'src/app/model/graphql/filter/filter.model';
import { Sort } from 'src/app/model/graphql/filter/sort.model';
import { QueryResult } from 'src/app/model/entities/query-result';
import { DbModel } from 'src/app/model/entities/db-model';
@Injectable({
providedIn: 'root',
})
export abstract class PageWithHistoryDataService<T> {
abstract load(
filter?: Filter[],
sort?: Sort[],
skip?: number,
take?: number
): Observable<QueryResult<T>>;
abstract loadHistory(id: number, options?: object): Observable<DbModel[]>;
abstract onChange(): Observable<void>;
}
export interface Create<T, C> {
create(object: C): Observable<T | undefined> | Observable<MutationResult>;
}
export interface Update<T, U> {
update(object: U): Observable<T | undefined> | Observable<MutationResult>;
}
export interface Delete<T> {
delete(
object: T
): Observable<T | undefined | boolean> | Observable<MutationResult>;
}
export interface Restore<T> {
restore(
object: T
): Observable<T | undefined | boolean> | Observable<MutationResult>;
}
export interface LoadHistory<T> {
loadHistory(
id: number
): Observable<T | undefined | boolean> | Observable<DbModel[] | undefined>;
}

View File

@ -14,6 +14,7 @@ export const ID_COLUMN = {
translationKey: 'common.id',
type: 'number',
filterable: true,
sortable: true,
value: (row: { id?: number }) => row.id,
class: 'max-w-24',
};
@ -23,6 +24,7 @@ export const NAME_COLUMN = {
translationKey: 'common.name',
type: 'text',
filterable: true,
sortable: true,
value: (row: { name?: string }) => row.name,
};
@ -31,6 +33,7 @@ export const DESCRIPTION_COLUMN = {
translationKey: 'common.description',
type: 'text',
filterable: true,
sortable: true,
value: (row: { description?: string }) => row.description,
};
@ -38,35 +41,49 @@ export const DELETED_COLUMN = {
name: 'deleted',
translationKey: 'common.deleted',
type: 'bool',
filterable: true,
filterable: false,
sortable: true,
value: (row: DbModel) => row.deleted,
visible: false,
};
export const EDITOR_COLUMN = {
name: 'editor',
translationKey: 'common.editor',
type: 'text',
filterable: true,
value: (row: DbModel) => row.editor?.username,
filterSelector: (mode: string, value: unknown) => {
return { editor: { username: { [mode]: value } } };
},
class: 'max-w-32',
visible: false,
};
export const CREATED_UTC_COLUMN = {
name: 'createdUtc',
name: 'created',
translationKey: 'common.created',
type: 'date',
filterable: true,
value: (row: DbModel) => row.createdUtc,
sortable: true,
value: (row: DbModel) => row.created,
class: 'max-w-32',
visible: false,
};
export const UPDATED_UTC_COLUMN = {
name: 'updatedUtc',
name: 'updated',
translationKey: 'common.updated',
type: 'date',
filterable: true,
value: (row: DbModel) => row.updatedUtc,
sortable: true,
value: (row: DbModel) => row.updated,
class: 'max-w-32',
visible: false,
};
export const DB_MODEL_COLUMNS = [
DELETED_COLUMN,
EDITOR_COLUMN,
CREATED_UTC_COLUMN,
UPDATED_UTC_COLUMN,

View File

@ -1,22 +1,39 @@
import { Injectable } from "@angular/core";
import { CanActivate } from "@angular/router";
import { KeycloakService } from "keycloak-angular";
import { Injectable } from '@angular/core';
import { CanActivate, Router } from '@angular/router';
import { KeycloakService } from 'keycloak-angular';
import { Logger } from 'src/app/service/logger.service';
import { AuthService } from 'src/app/service/auth.service';
const logger = new Logger('AuthGuard');
@Injectable({
providedIn: "root",
providedIn: 'root',
})
export class AuthGuard implements CanActivate {
constructor(private keycloak: KeycloakService) {}
constructor(
private keycloak: KeycloakService,
private auth: AuthService,
private router: Router
) {}
async canActivate(): Promise<boolean> {
try {
if (!this.keycloak.isLoggedIn()) {
logger.debug('User not logged in, redirecting to login page');
await this.auth.login();
}
if (this.keycloak.isTokenExpired()) {
logger.debug('Token expired, updating token');
await this.keycloak.updateToken();
}
if (!this.keycloak.isLoggedIn()) {
await this.keycloak.login();
} catch (err) {
logger.error('Error during authentication', err);
await this.router.navigate(['/']);
return false;
}
logger.debug('Check is user logged in');
return this.keycloak.isLoggedIn();
}
}

View File

@ -1,24 +1,24 @@
import { Injectable } from "@angular/core";
import { ActivatedRouteSnapshot, Router } from "@angular/router";
import { Logger } from "src/app/service/logger.service";
import { ToastService } from "src/app/service/toast.service";
import { AuthService } from "src/app/service/auth.service";
import { PermissionsEnum } from "src/app/model/auth/permissionsEnum";
import { Injectable } from '@angular/core';
import { ActivatedRouteSnapshot, Router } from '@angular/router';
import { Logger } from 'src/app/service/logger.service';
import { ToastService } from 'src/app/service/toast.service';
import { AuthService } from 'src/app/service/auth.service';
import { PermissionsEnum } from 'src/app/model/auth/permissionsEnum';
const log = new Logger("PermissionGuard");
const log = new Logger('PermissionGuard');
@Injectable({
providedIn: "root",
providedIn: 'root',
})
export class PermissionGuard {
constructor(
private router: Router,
private toast: ToastService,
private auth: AuthService,
private auth: AuthService
) {}
async canActivate(route: ActivatedRouteSnapshot): Promise<boolean> {
const permissions = route.data["permissions"] as PermissionsEnum[];
const permissions = route.data['permissions'] as PermissionsEnum[];
if (!permissions || permissions.length === 0) {
return true;
@ -26,11 +26,11 @@ export class PermissionGuard {
const validate = await this.auth.hasAnyPermissionLazy(permissions);
if (!validate) {
log.debug("Permission denied", permissions);
this.toast.warn("common.warning", "error.permission_denied");
this.router.navigate(["/"]).then();
log.debug('Permission denied', permissions);
this.toast.warn('common.warning', 'error.permission_denied');
this.router.navigate(['/']).then();
}
log.debug("Permission granted", permissions);
log.debug('Permission granted', permissions);
return validate;
}
}

View File

@ -2,27 +2,55 @@ import { HttpInterceptorFn } from '@angular/common/http';
import { KeycloakService } from 'keycloak-angular';
import { inject } from '@angular/core';
import { from, switchMap } from 'rxjs';
import { ConfigService } from 'src/app/service/config.service';
import { catchError } from 'rxjs/operators';
import { AuthService } from 'src/app/service/auth.service';
export const tokenInterceptor: HttpInterceptorFn = (req, next) => {
const keycloak = inject(KeycloakService);
const config = inject(ConfigService);
if (
!config.settings.api.url ||
!req.url.startsWith(config.settings.api.url)
) {
return next(req);
}
const keycloak = inject(KeycloakService);
if (!keycloak.isLoggedIn()) {
return next(req);
}
if (keycloak.isTokenExpired()) {
keycloak.updateToken().then();
}
return from(keycloak.getToken()).pipe(
switchMap(token => {
const modifiedReq = token
? req.clone({
if (!token) {
return next(req);
}
if (!keycloak.isTokenExpired()) {
return next(
req.clone({
headers: req.headers.set('Authorization', `Bearer ${token}`),
})
: req;
);
}
return next(modifiedReq);
return from(keycloak.updateToken(30)).pipe(
switchMap(() => {
return keycloak.getToken();
}),
switchMap(newToken => {
return next(
req.clone({
headers: req.headers.set('Authorization', `Bearer ${newToken}`),
})
);
}),
catchError(() => {
const auth = inject(AuthService);
auth.logout().then();
return next(req);
})
);
})
);
};

View File

@ -2,6 +2,10 @@ export enum PermissionsEnum {
// Administration
administrator = 'administrator',
// Settings
settings = 'settings',
settingsUpdate = 'settings.update',
apiKeys = 'api_keys',
apiKeysCreate = 'api_keys.create',
apiKeysUpdate = 'api_keys.update',

View File

@ -1,13 +1,14 @@
import { Role } from "src/app/model/entities/role";
import { DbModel } from "src/app/model/entities/db-model";
import { Role } from 'src/app/model/entities/role';
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
export interface NotExistingUser {
keycloakId: string;
username: string;
}
export interface User extends DbModel {
export interface User extends DbModelWithHistory {
id: number;
keycloakId: string;
username: string;
email: string;
roles: Role[];

View File

@ -1,7 +1,7 @@
import { DbModel } from 'src/app/model/entities/db-model';
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
import { Permission } from 'src/app/model/entities/role';
export interface ApiKey extends DbModel {
export interface ApiKey extends DbModelWithHistory {
identifier?: string;
key?: string;
permissions?: Permission[];

View File

@ -1,9 +1,19 @@
import { User } from "src/app/model/auth/user";
import { User } from 'src/app/model/auth/user';
export interface DbModelWithHistory {
id?: number;
editor?: User;
deleted?: boolean;
created?: Date;
updated?: Date;
history?: DbModel[];
}
export interface DbModel {
id?: number;
editor?: User;
deleted?: boolean;
createdUtc?: Date;
updatedUtc?: Date;
created?: Date;
updated?: Date;
}

View File

@ -1,6 +1,6 @@
import { DbModel } from 'src/app/model/entities/db-model';
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
export interface Domain extends DbModel {
export interface Domain extends DbModelWithHistory {
name: string;
}

View File

@ -1,7 +1,7 @@
import { DbModel } from 'src/app/model/entities/db-model';
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
import { Role } from 'src/app/model/entities/role';
export interface Group extends DbModel {
export interface Group extends DbModelWithHistory {
name: string;
roles: Role[];
}

View File

@ -1,9 +1,11 @@
import { DbModel } from "src/app/model/entities/db-model";
import { DbModel, DbModelWithHistory } from 'src/app/model/entities/db-model';
import { User } from 'src/app/model/auth/user';
export interface Role extends DbModel {
export interface Role extends DbModelWithHistory {
name?: string;
description?: string;
permissions?: Permission[];
users?: User[];
}
export interface RoleCreateInput {

View File

@ -1,8 +1,8 @@
import { DbModel } from 'src/app/model/entities/db-model';
import { DbModelWithHistory } from 'src/app/model/entities/db-model';
import { Group } from 'src/app/model/entities/group';
import { Domain } from 'src/app/model/entities/domain';
export interface ShortUrl extends DbModel {
export interface ShortUrl extends DbModelWithHistory {
shortUrl: string;
targetUrl: string;
description: string;

View File

@ -1,5 +1,5 @@
import { gql } from "apollo-angular";
import { EDITOR_FRAGMENT } from "src/app/model/graphql/editor.query";
import { gql } from 'apollo-angular';
import { EDITOR_FRAGMENT } from 'src/app/model/graphql/editor.query';
export const DB_MODEL_FRAGMENT = gql`
fragment DB_MODEL on DbModel {
@ -10,9 +10,21 @@ export const DB_MODEL_FRAGMENT = gql`
editor {
...EDITOR
}
createdUtc
updatedUtc
created
updated
}
${EDITOR_FRAGMENT}
`;
export const DB_HISTORY_MODEL_FRAGMENT = gql`
fragment DB_HISTORY_MODEL on DbHistoryModel {
__typename
id
deleted
editor
created
updated
}
`;

Some files were not shown because too many files have changed in this diff Show More