Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
39 commits
Select commit Hold shift + click to select a range
ba27a06
oss ent sync
Shivam-nagar23 Feb 20, 2025
9a11c16
oss change
Shivam-nagar23 Feb 20, 2025
cce2e63
oss sync
Shivam-nagar23 Feb 20, 2025
210669b
sync
Shivam-nagar23 Feb 20, 2025
f836c4f
self register bean
Shivam-nagar23 Feb 21, 2025
5da69c8
user bean import
Shivam-nagar23 Feb 21, 2025
8b576c6
oss merge
Shivam-nagar23 Feb 21, 2025
ce3748b
signature changes
Shivam-nagar23 Feb 21, 2025
1526d6a
oss sync
Shivam-nagar23 Feb 21, 2025
4a106a9
oss refactoring
Shivam-nagar23 Feb 21, 2025
8fb2539
oss ent sync
Shivam-nagar23 Feb 21, 2025
1cf3888
final role filters to be considered
Shivam-nagar23 Feb 21, 2025
a955875
sync changes
Shivam-nagar23 Feb 21, 2025
be29ab1
audit creation oss
Shivam-nagar23 Feb 21, 2025
82a23ea
user service
Shivam-nagar23 Feb 21, 2025
1d51d6c
oss sycn
Shivam-nagar23 Feb 21, 2025
b057ed1
osse nt sync
Shivam-nagar23 Feb 21, 2025
d972d37
cluster entity
Shivam-nagar23 Feb 23, 2025
ebf3157
user service refactoring
Shivam-nagar23 Feb 23, 2025
79ceb16
oss sync
Shivam-nagar23 Feb 23, 2025
01aea38
user service refactoring
Shivam-nagar23 Feb 23, 2025
9936acd
user common service chnages
Shivam-nagar23 Feb 23, 2025
06819c4
oss sync
Shivam-nagar23 Feb 23, 2025
f5c61e9
user services chnages
Shivam-nagar23 Feb 23, 2025
1f41460
oss refactoing
Shivam-nagar23 Feb 23, 2025
4d4a835
token
Shivam-nagar23 Feb 23, 2025
42b6dee
subaction
Shivam-nagar23 Feb 23, 2025
f04bf91
oss ent sync
Shivam-nagar23 Feb 23, 2025
9da2876
update oss sync
Shivam-nagar23 Feb 23, 2025
c41bbe5
oss sync
Shivam-nagar23 Feb 23, 2025
2234c63
user service
Shivam-nagar23 Feb 23, 2025
c2fb678
user service
Shivam-nagar23 Feb 23, 2025
67b19e5
user response
Shivam-nagar23 Feb 23, 2025
34d2060
sync
Shivam-nagar23 Feb 23, 2025
a74eb7a
approver
Shivam-nagar23 Feb 23, 2025
9e2ee91
oss ent sync
Shivam-nagar23 Feb 23, 2025
e08ad15
oss
Shivam-nagar23 Feb 23, 2025
5059299
user service
Shivam-nagar23 Feb 24, 2025
84cf514
review comments
Shivam-nagar23 Feb 24, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion api/auth/sso/SsoLoginHandler.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@ package sso
import (
"encoding/json"
"errors"
"github.com/devtron-labs/devtron/pkg/auth/user/bean"
"net/http"
"strconv"

"github.com/devtron-labs/devtron/api/bean"
"github.com/devtron-labs/devtron/api/restHandler/common"
"github.com/devtron-labs/devtron/pkg/auth/authorisation/casbin"
"github.com/devtron-labs/devtron/pkg/auth/sso"
Expand Down
7 changes: 4 additions & 3 deletions api/auth/user/UserAuthHandler.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ import (
"encoding/json"
"fmt"
bean2 "github.com/devtron-labs/devtron/pkg/auth/authorisation/casbin/bean"
bean3 "github.com/devtron-labs/devtron/pkg/auth/user/bean"
"net/http"
"strings"

Expand Down Expand Up @@ -194,7 +195,7 @@ func (handler UserAuthHandlerImpl) AddDefaultPolicyAndRoles(w http.ResponseWrite
roleView = strings.ReplaceAll(roleView, "<ENV>", env)
roleView = strings.ReplaceAll(roleView, "<APP>", app)

var roleAdminData bean.RoleData
var roleAdminData bean3.RoleData
err = json.Unmarshal([]byte(roleAdmin), &roleAdminData)
if err != nil {
handler.logger.Errorw("request err, AddDefaultPolicyAndRoles", "err", err, "payload", roleAdminData)
Expand All @@ -208,7 +209,7 @@ func (handler UserAuthHandlerImpl) AddDefaultPolicyAndRoles(w http.ResponseWrite
return
}

var roleTriggerData bean.RoleData
var roleTriggerData bean3.RoleData
err = json.Unmarshal([]byte(roleTrigger), &roleTriggerData)
if err != nil {
handler.logger.Errorw("request err, AddDefaultPolicyAndRoles", "err", err, "payload", roleTriggerData)
Expand All @@ -222,7 +223,7 @@ func (handler UserAuthHandlerImpl) AddDefaultPolicyAndRoles(w http.ResponseWrite
return
}

var roleViewData bean.RoleData
var roleViewData bean3.RoleData
err = json.Unmarshal([]byte(roleView), &roleViewData)
if err != nil {
handler.logger.Errorw("request err, AddDefaultPolicyAndRoles", "err", err, "payload", roleViewData)
Expand Down
45 changes: 14 additions & 31 deletions api/auth/user/UserRestHandler.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,6 @@ import (
"strconv"
"strings"

"github.com/devtron-labs/devtron/api/bean"
"github.com/devtron-labs/devtron/api/restHandler/common"
"github.com/devtron-labs/devtron/internal/util"
"github.com/devtron-labs/devtron/pkg/auth/authorisation/casbin"
Expand Down Expand Up @@ -102,7 +101,7 @@ func (handler UserRestHandlerImpl) CreateUser(w http.ResponseWriter, r *http.Req
common.WriteJsonResp(w, err, "Unauthorized User", http.StatusUnauthorized)
return
}
var userInfo bean.UserInfo
var userInfo bean2.UserInfo
err = decoder.Decode(&userInfo)
if err != nil {
handler.logger.Errorw("request err, CreateUser", "err", err, "payload", userInfo)
Expand Down Expand Up @@ -166,7 +165,7 @@ func (handler UserRestHandlerImpl) UpdateUser(w http.ResponseWriter, r *http.Req
common.WriteJsonResp(w, err, "Unauthorized User", http.StatusUnauthorized)
return
}
var userInfo bean.UserInfo
var userInfo bean2.UserInfo
err = decoder.Decode(&userInfo)
if err != nil {
handler.logger.Errorw("request err, UpdateUser", "err", err, "payload", userInfo)
Expand Down Expand Up @@ -201,22 +200,6 @@ func (handler UserRestHandlerImpl) UpdateUser(w http.ResponseWriter, r *http.Req
return
}
common.WriteJsonResp(w, err, res, http.StatusOK)
//if len(restrictedGroups) == 0 {
// common.WriteJsonResp(w, err, res, http.StatusOK)
//} else {
// errorMessageForGroupsWithoutSuperAdmin, errorMessageForGroupsWithSuperAdmin := helper.CreateErrorMessageForUserRoleGroups(restrictedGroups)
//
// if rolesChanged || groupsModified {
// // warning
// message := fmt.Errorf("User permissions updated partially. %s%s", errorMessageForGroupsWithoutSuperAdmin, errorMessageForGroupsWithSuperAdmin)
// common.WriteJsonResp(w, message, nil, http.StatusExpectationFailed)
//
// } else {
// //error
// message := fmt.Errorf("Permission could not be added/removed. %s%s", errorMessageForGroupsWithoutSuperAdmin, errorMessageForGroupsWithSuperAdmin)
// common.WriteJsonResp(w, message, nil, http.StatusBadRequest)
// }
//}
}

func (handler UserRestHandlerImpl) GetById(w http.ResponseWriter, r *http.Request) {
Expand All @@ -233,7 +216,7 @@ func (handler UserRestHandlerImpl) GetById(w http.ResponseWriter, r *http.Reques
common.WriteJsonResp(w, err, nil, http.StatusBadRequest)
return
}
res, err := handler.userService.GetById(int32(id))
res, err := handler.userService.GetByIdWithoutGroupClaims(int32(id))
if err != nil {
handler.logger.Errorw("service err, GetById", "err", err, "id", id)
common.WriteJsonResp(w, err, "Failed to get by id", http.StatusInternalServerError)
Expand Down Expand Up @@ -271,7 +254,7 @@ func (handler UserRestHandlerImpl) GetAllV2(w http.ResponseWriter, r *http.Reque
common.WriteJsonResp(w, errors.New("unauthorized"), nil, http.StatusForbidden)
return
}
req := &bean.ListingRequest{}
req := &bean2.ListingRequest{}
err = decoder.Decode(req, r.URL.Query())
if err != nil {
handler.logger.Errorw("request err, GetAll", "err", err, "payload", req)
Expand Down Expand Up @@ -357,7 +340,7 @@ func (handler UserRestHandlerImpl) DeleteUser(w http.ResponseWriter, r *http.Req
return
}
handler.logger.Infow("request payload, DeleteUser", "err", err, "id", id)
user, err := handler.userService.GetById(int32(id))
user, err := handler.userService.GetByIdWithoutGroupClaims(int32(id))
if err != nil {
common.WriteJsonResp(w, err, "", http.StatusInternalServerError)
return
Expand Down Expand Up @@ -398,7 +381,7 @@ func (handler UserRestHandlerImpl) BulkDeleteUsers(w http.ResponseWriter, r *htt
}
decoder := json.NewDecoder(r.Body)
// request decoding
var request *bean.BulkDeleteRequest
var request *bean2.BulkDeleteRequest
err = decoder.Decode(&request)
if err != nil {
handler.logger.Errorw("request err, BulkDeleteUsers", "payload", request, "err", err)
Expand Down Expand Up @@ -474,7 +457,7 @@ func (handler UserRestHandlerImpl) CreateRoleGroup(w http.ResponseWriter, r *htt
common.WriteJsonResp(w, err, "Unauthorized User", http.StatusUnauthorized)
return
}
var request bean.RoleGroup
var request bean2.RoleGroup
err = decoder.Decode(&request)
if err != nil {
handler.logger.Errorw("request err, CreateRoleGroup", "err", err, "payload", request)
Expand Down Expand Up @@ -527,7 +510,7 @@ func (handler UserRestHandlerImpl) UpdateRoleGroup(w http.ResponseWriter, r *htt
common.WriteJsonResp(w, err, "Unauthorized User", http.StatusUnauthorized)
return
}
var request bean.RoleGroup
var request bean2.RoleGroup
err = decoder.Decode(&request)
if err != nil {
handler.logger.Errorw("request err, UpdateRoleGroup", "err", err, "payload", request)
Expand Down Expand Up @@ -586,7 +569,7 @@ func (handler UserRestHandlerImpl) FetchRoleGroupsV2(w http.ResponseWriter, r *h
return
}

req := &bean.ListingRequest{}
req := &bean2.ListingRequest{}
err = decoder.Decode(req, r.URL.Query())
if err != nil {
handler.logger.Errorw("request err, FetchRoleGroups", "err", err, "payload", req)
Expand Down Expand Up @@ -644,7 +627,7 @@ func (handler UserRestHandlerImpl) FetchDetailedRoleGroups(w http.ResponseWriter
common.WriteJsonResp(w, errors.New("unauthorized"), nil, http.StatusForbidden)
return
}
req := &bean.ListingRequest{ShowAll: true}
req := &bean2.ListingRequest{ShowAll: true}
res, err := handler.roleGroupService.FetchDetailedRoleGroups(req)
if err != nil {
handler.logger.Errorw("service err, FetchRoleGroups", "err", err)
Expand Down Expand Up @@ -723,7 +706,7 @@ func (handler UserRestHandlerImpl) BulkDeleteRoleGroups(w http.ResponseWriter, r
}
decoder := json.NewDecoder(r.Body)
// request decoding
var request *bean.BulkDeleteRequest
var request *bean2.BulkDeleteRequest
err = decoder.Decode(&request)
if err != nil {
handler.logger.Errorw("request err, BulkDeleteRoleGroups", "payload", request, "err", err)
Expand Down Expand Up @@ -765,7 +748,7 @@ func (handler UserRestHandlerImpl) CheckUserRoles(w http.ResponseWriter, r *http
common.WriteJsonResp(w, err, "Unauthorized User", http.StatusUnauthorized)
return
}
roles, err := handler.userService.CheckUserRoles(userId)
roles, err := handler.userService.CheckUserRoles(userId, "")
if err != nil {
handler.logger.Errorw("service err, CheckUserRoles", "err", err, "userId", userId)
common.WriteJsonResp(w, err, nil, http.StatusInternalServerError)
Expand All @@ -779,7 +762,7 @@ func (handler UserRestHandlerImpl) CheckUserRoles(w http.ResponseWriter, r *http
result := make(map[string]interface{})
var isSuperAdmin, isAdmin, isManager, isTrigger bool
for _, role := range roles {
if role == bean.SUPERADMIN {
if role == bean2.SUPERADMIN {
isSuperAdmin = true
break
}
Expand Down Expand Up @@ -811,7 +794,7 @@ func (handler UserRestHandlerImpl) CheckUserRoles(w http.ResponseWriter, r *http
result["roles"] = roles
result["superAdmin"] = false
for _, item := range roles {
if item == bean.SUPERADMIN {
if item == bean2.SUPERADMIN {
result["superAdmin"] = true
}
}
Expand Down
Loading