added access_control to privilege

pull/87/head
Caozhenhui 2021-12-02 10:43:32 +08:00
parent 213f669924
commit 8dd998ed0c
4 changed files with 21 additions and 13 deletions

View File

@ -1,11 +1,13 @@
'use strict';
app.controller('PrivilegeController', function ($scope,
$window,
$uibModal,
PrivilegeService,
toaster,
$translate,
SweetAlert) {
$scope.cur_user = JSON.parse($window.localStorage.getItem("myems_admin_ui_current_user"));
$scope.getAllPrivileges = function () {
PrivilegeService.getAllPrivileges(function (response) {
if (angular.isDefined(response.status) && response.status === 200) {
@ -31,7 +33,8 @@ app.controller('PrivilegeController', function ($scope,
}
});
modalInstance.result.then(function (privilege) {
PrivilegeService.addPrivilege(privilege, function (response) {
let headers = { "User-UUID": $scope.cur_user.uuid, "Token": $scope.cur_user.token };
PrivilegeService.addPrivilege(privilege, headers, function (response) {
if (angular.isDefined(response.status) && response.status === 201) {
toaster.pop({
type: "success",
@ -70,7 +73,8 @@ app.controller('PrivilegeController', function ($scope,
});
modalInstance.result.then(function (modifiedPrivilege) {
PrivilegeService.editPrivilege(modifiedPrivilege, function (response) {
let headers = { "User-UUID": $scope.cur_user.uuid, "Token": $scope.cur_user.token };
PrivilegeService.editPrivilege(modifiedPrivilege, headers, function (response) {
if (angular.isDefined(response.status) && response.status === 200) {
toaster.pop({
type: "success",
@ -107,7 +111,8 @@ app.controller('PrivilegeController', function ($scope,
},
function (isConfirm) {
if (isConfirm) {
PrivilegeService.deletePrivilege(privilege, function (response) {
let headers = { "User-UUID": $scope.cur_user.uuid, "Token": $scope.cur_user.token };
PrivilegeService.deletePrivilege(privilege, headers, function (response) {
if (angular.isDefined(response.status) && response.status === 204) {
toaster.pop({
type: "success",

View File

@ -9,24 +9,24 @@ app.factory('PrivilegeService', function($http) {
callback(response);
});
},
addPrivilege: function(privilege, callback) {
$http.post(getAPI()+'privileges',{data:privilege})
addPrivilege: function(privilege, headers, callback) {
$http.post(getAPI()+'privileges', {headers}, {data:privilege})
.then(function (response) {
callback(response);
}, function (response) {
callback(response);
});
},
editPrivilege: function(privilege, callback) {
$http.put(getAPI()+'privileges/'+privilege.id,{data:privilege})
editPrivilege: function(privilege, headers, callback) {
$http.put(getAPI()+'privileges/'+privilege.id, {headers}, {data:privilege})
.then(function (response) {
callback(response);
}, function (response) {
callback(response);
});
},
deletePrivilege: function(privilege, callback) {
$http.delete(getAPI()+'privileges/'+privilege.id)
deletePrivilege: function(privilege, headers, callback) {
$http.delete(getAPI()+'privileges/'+privilege.id, {headers})
.then(function (response) {
callback(response);
}, function (response) {

View File

@ -1251,15 +1251,15 @@ curl -i -X GET {{base_url}}/privileges
```
* DELETE Privilege by ID
```bash
curl -i -X DELETE {{base_url}}/privileges/{id}
curl -i -H "User-UUID: dcdb67d1-6116-4987-916f-6fc6cf2bc0e4" -H "Token: GET-TOKEN-AFTER-LOGIN" -X DELETE {{base_url}}/privileges/{id}
```
* POST New Privilege
```bash
curl -i -H "Content-Type: application/json" -X POST -d '{"data":{"name":"superusers","data":"{\"spaces\":[1,2,3,5]}"}}' {{base_url}}/privileges
curl -i -H "Content-Type: application/json" -H "User-UUID: dcdb67d1-6116-4987-916f-6fc6cf2bc0e4" -H "Token: GET-TOKEN-AFTER-LOGIN" -X POST -d '{"data":{"name":"superusers","data":"{\"spaces\":[1,2,3,5]}"}}' {{base_url}}/privileges
```
* PUT Privilege
```bash
curl -i -H "Content-Type: application/json" -X PUT -d '{"data":{"name":"superusers", "data":"{\"spaces\":[1, 3]}"}}' {{base_url}}/privileges/{id}
curl -i -H "Content-Type: application/json" -H "User-UUID: dcdb67d1-6116-4987-916f-6fc6cf2bc0e4" -H "Token: GET-TOKEN-AFTER-LOGIN" -X PUT -d '{"data":{"name":"superusers", "data":"{\"spaces\":[1, 3]}"}}' {{base_url}}/privileges/{id}
```
### Rule

View File

@ -2,7 +2,7 @@ import falcon
import simplejson as json
import mysql.connector
import config
from core.useractivity import user_logger
from core.useractivity import user_logger, access_control
class PrivilegeCollection:
@ -42,6 +42,7 @@ class PrivilegeCollection:
@user_logger
def on_post(req, resp):
"""Handles POST requests"""
access_control(req)
try:
raw_json = req.stream.read().decode('utf-8')
new_values = json.loads(raw_json)
@ -101,6 +102,7 @@ class PrivilegeItem:
@staticmethod
@user_logger
def on_delete(req, resp, id_):
access_control(req)
if not id_.isdigit() or int(id_) <= 0:
raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',
description='API.INVALID_PRIVILEGE_ID')
@ -142,6 +144,7 @@ class PrivilegeItem:
@user_logger
def on_put(req, resp, id_):
"""Handles PUT requests"""
access_control(req)
try:
raw_json = req.stream.read().decode('utf-8')
new_values = json.loads(raw_json)