ToolJet/server/data-migrations/1720434737529-MigrateCustomGroupToNewUserGroup.ts

405 lines
14 KiB
TypeScript
Raw Normal View History

2025-02-25 06:52:50 +00:00
import { MigrationProgress } from '@helpers/migration.helper';
import { NestFactory } from '@nestjs/core';
import { AppGroupPermission } from '@entities/app_group_permission.entity';
import { AppsGroupPermissions } from '@entities/apps_group_permissions.entity';
import { DataSourceGroupPermission } from '@entities/data_source_group_permission.entity';
import { GranularPermissions } from '@entities/granular_permissions.entity';
import { GroupPermission } from '@entities/group_permission.entity';
import { GroupPermissions } from '@entities/group_permissions.entity';
import { Organization } from '@entities/organization.entity';
import { EntityManager, MigrationInterface, QueryRunner } from 'typeorm';
import { AppModule } from '@modules/app/module';
import { GROUP_PERMISSIONS_TYPE, ResourceType, USER_ROLE } from '@modules/group-permissions/constants';
2024-07-10 08:18:26 +00:00
import {
CreateResourcePermissionObject,
ResourcePermissionMetaData,
2025-02-25 06:52:50 +00:00
} from '@modules/group-permissions/types/granular_permissions';
import { CreateGranularPermissionDto } from '@modules/group-permissions/dto/granular-permissions';
import { DEFAULT_GRANULAR_PERMISSIONS_NAME } from '@modules/group-permissions/constants/granular_permissions';
import { TOOLJET_EDITIONS } from '@modules/app/constants';
2025-02-25 06:52:50 +00:00
import { LicenseInitService } from '@modules/licensing/interfaces/IService';
import { getTooljetEdition } from '@helpers/utils.helper';
2024-07-10 08:18:26 +00:00
export class MigrateCustomGroupToNewUserGroup1720434737529 implements MigrationInterface {
public async up(queryRunner: QueryRunner): Promise<void> {
2025-08-03 07:09:18 +00:00
if (getTooljetEdition() === TOOLJET_EDITIONS.Cloud) {
console.log('Migration is only restricted for cloud edition.');
return; // Exit the migration early
}
2024-07-10 08:18:26 +00:00
const manager = queryRunner.manager;
2025-08-03 07:09:18 +00:00
const organizationIds = (
await manager.find(Organization, {
select: ['id'],
})
).map((organization) => organization.id);
if (organizationIds?.length === 0) {
console.log('No organizations found, skipping migration.');
return;
}
2025-02-25 06:52:50 +00:00
const nestApp = await NestFactory.createApplicationContext(await AppModule.register({ IS_GET_CONTEXT: true }));
const licenseService = nestApp.get(LicenseInitService);
const licenseValid =
getTooljetEdition() === TOOLJET_EDITIONS.CE ? true : await licenseService.initForMigration(manager);
2024-09-23 11:34:20 +00:00
if (!licenseValid) {
console.log('Not considering groups for basic plans');
return;
}
const migrationProgress = new MigrationProgress(
'MigrateCustomGroupToNewUserGroup1720434737529',
organizationIds.length
);
2024-07-10 08:18:26 +00:00
for (const organizationId of organizationIds) {
const groups = await manager
.createQueryBuilder(GroupPermission, 'groupPermission')
.where('groupPermission.organizationId = :organizationId', {
organizationId,
})
.leftJoinAndSelect('groupPermission.appGroupPermission', 'appGroupPermission')
.leftJoinAndSelect('groupPermission.userGroupPermission', 'userGroupPermission')
2025-02-25 06:52:50 +00:00
.leftJoinAndSelect('groupPermission.dataSourceGroupPermission', 'dataSourceGroupPermission')
2024-07-10 08:18:26 +00:00
.andWhere('groupPermission.group != :admin', {
admin: 'admin',
})
.getMany();
for (const groupPermissions of groups) {
2024-09-23 11:34:20 +00:00
// check if all user groups has any privileges, if yes -> create a custom group for it
if (groupPermissions.group === 'all_users') {
2025-02-25 06:52:50 +00:00
const {
appGroupPermission,
dataSourceGroupPermission,
appCreate,
appDelete,
dataSourceCreate,
dataSourceDelete,
folderCreate,
orgEnvironmentConstantCreate,
} = groupPermissions;
if (
!(
appGroupPermission?.length ||
dataSourceGroupPermission?.length ||
appCreate ||
appDelete ||
dataSourceCreate ||
dataSourceDelete ||
folderCreate ||
orgEnvironmentConstantCreate
)
) {
2024-09-23 11:34:20 +00:00
continue;
}
}
2024-07-10 08:18:26 +00:00
const query = `
INSERT INTO permission_groups (
organization_id,
name,
type,
app_create,
app_delete,
folder_crud,
org_constant_crud,
data_source_create,
data_source_delete
) VALUES (
'${organizationId}',
'${this.getGroupName(groupPermissions.group)}',
'${GROUP_PERMISSIONS_TYPE.CUSTOM_GROUP}',
${groupPermissions.appCreate},
${groupPermissions.appDelete},
${groupPermissions.folderCreate},
${groupPermissions.orgEnvironmentConstantCreate},
2025-02-25 06:52:50 +00:00
${groupPermissions.dataSourceCreate},
${groupPermissions.dataSourceDelete}
2024-07-10 08:18:26 +00:00
) RETURNING *;
`;
const group: GroupPermissions = (await manager.query(query))[0];
const existingGroupUsers = groupPermissions.userGroupPermission;
await this.migrateUserGroup(manager, [...new Set(existingGroupUsers.map((record) => record.userId))], group.id);
2025-02-25 06:52:50 +00:00
const resources = [ResourceType.APP, ResourceType.DATA_SOURCE];
2024-07-10 08:18:26 +00:00
for (const resource of resources) {
if (resource === ResourceType.APP) {
2024-09-23 11:34:20 +00:00
const updateLevelAndHideAppsPermissions = groupPermissions.appGroupPermission.filter(
(appPermissions) => appPermissions.read && appPermissions.hideFromDashboard
2024-07-10 08:18:26 +00:00
);
2025-02-25 06:52:50 +00:00
const createResourcePermissionObjViewAndHide: CreateResourcePermissionObject<ResourceType.APP> = {
2024-07-10 08:18:26 +00:00
canView: true,
canEdit: false,
2024-09-23 11:34:20 +00:00
hideFromDashboard: true,
2024-07-10 08:18:26 +00:00
};
await this.createAppLevelPermissions(
manager,
2024-09-23 11:34:20 +00:00
updateLevelAndHideAppsPermissions,
2024-07-10 08:18:26 +00:00
organizationId,
group,
2024-09-23 11:34:20 +00:00
createResourcePermissionObjViewAndHide
);
const updateLevelAppsPermissions = groupPermissions.appGroupPermission.filter(
(appPermissions) => appPermissions.update && !appPermissions.hideFromDashboard
2024-07-10 08:18:26 +00:00
);
2025-02-25 06:52:50 +00:00
const createResourcePermissionObjEdit: CreateResourcePermissionObject<ResourceType.APP> = {
2024-07-10 08:18:26 +00:00
canView: false,
canEdit: true,
hideFromDashboard: false,
};
await this.createAppLevelPermissions(
manager,
updateLevelAppsPermissions,
organizationId,
group,
createResourcePermissionObjEdit
);
2024-09-23 11:34:20 +00:00
const viewLevelAppsPermissions = groupPermissions.appGroupPermission.filter(
(appPermissions) => appPermissions.read && !appPermissions.update
);
2025-02-25 06:52:50 +00:00
const createResourcePermissionObjView: CreateResourcePermissionObject<ResourceType.APP> = {
2024-09-23 11:34:20 +00:00
canView: true,
canEdit: false,
hideFromDashboard: false,
};
await this.createAppLevelPermissions(
manager,
viewLevelAppsPermissions,
organizationId,
group,
createResourcePermissionObjView
);
2024-07-10 08:18:26 +00:00
}
2025-02-25 06:52:50 +00:00
if (resource === ResourceType.DATA_SOURCE) {
const updateLevelDataSourcePermissions = groupPermissions.dataSourceGroupPermission.filter(
(dataSourcePermissions) => dataSourcePermissions.update
);
const createResourcePermissionObjEdit: CreateResourcePermissionObject<ResourceType.DATA_SOURCE> = {
action: {
canConfigure: true,
canUse: false,
},
};
await this.createDataSourceLevelPermissions(
manager,
updateLevelDataSourcePermissions,
organizationId,
group,
createResourcePermissionObjEdit
);
const viewLevelDataSourcePermissions = groupPermissions.dataSourceGroupPermission.filter(
(dataSourcePermissions) => dataSourcePermissions.read && !dataSourcePermissions.update
);
const createResourcePermissionObjView: CreateResourcePermissionObject<ResourceType.DATA_SOURCE> = {
action: {
canConfigure: false,
canUse: true,
},
};
await this.createDataSourceLevelPermissions(
manager,
viewLevelDataSourcePermissions,
organizationId,
group,
createResourcePermissionObjView
);
}
2024-07-10 08:18:26 +00:00
}
}
2024-09-23 11:34:20 +00:00
migrationProgress.show();
2024-07-10 08:18:26 +00:00
}
2025-02-25 06:52:50 +00:00
await nestApp.close();
2024-07-10 08:18:26 +00:00
}
getGroupName(name: string) {
switch (name) {
case USER_ROLE.BUILDER:
return `custom-${USER_ROLE.BUILDER}`;
case USER_ROLE.END_USER:
return `custom-${USER_ROLE.END_USER}`;
case 'all_users':
return `Custom All users`;
2024-07-12 14:25:47 +00:00
case 'Builder':
return `Custom Builder`;
2024-07-17 08:05:28 +00:00
case 'End-user':
2024-07-12 14:25:47 +00:00
return `Custom End User`;
case 'Admin':
return `Custom Admin`;
2024-07-10 08:18:26 +00:00
default:
return name;
}
}
async createGranularPermission(
manager: EntityManager,
createObject: CreateGranularPermissionDto
): Promise<GranularPermissions> {
const query = `
2024-07-11 13:44:59 +00:00
INSERT INTO granular_permissions (
group_id,
name,
type,
is_all
) VALUES (
$1, $2, $3, $4
) RETURNING *;
`;
const parameters = [createObject.groupId, createObject.name, createObject.type, createObject.isAll];
return (await manager.query(query, parameters))[0];
2024-07-10 08:18:26 +00:00
}
async createAppsResourcePermission(
manager: EntityManager,
createMeta: ResourcePermissionMetaData,
2025-02-25 06:52:50 +00:00
createObject: CreateResourcePermissionObject<ResourceType.APP>
2024-07-10 08:18:26 +00:00
): Promise<AppsGroupPermissions> {
const { granularPermissions } = createMeta;
const query = `
INSERT INTO apps_group_permissions (
granular_permission_id,
can_edit,
can_view,
hide_from_dashboard
) VALUES (
2024-07-11 13:44:59 +00:00
$1, $2, $3, $4
2024-07-10 08:18:26 +00:00
) RETURNING *;
`;
2024-07-11 13:44:59 +00:00
const parameters = [
granularPermissions.id,
createObject.canEdit,
createObject.canView,
createObject.hideFromDashboard,
];
return (await manager.query(query, parameters))[0];
2024-07-10 08:18:26 +00:00
}
2025-02-25 06:52:50 +00:00
async createDataSourceResourcePermission(
manager: EntityManager,
createMeta: ResourcePermissionMetaData,
createObject: CreateResourcePermissionObject<ResourceType.DATA_SOURCE>
): Promise<AppsGroupPermissions> {
const { granularPermissions } = createMeta;
const query = `
INSERT INTO data_sources_group_permissions (
granular_permission_id,
can_configure,
can_use
) VALUES (
$1, $2, $3
) RETURNING *;
`;
const parameters = [
granularPermissions.id,
createObject.action?.canConfigure || false,
createObject.action?.canUse || false,
];
return (await manager.query(query, parameters))[0];
}
2024-07-10 08:18:26 +00:00
async migrateUserGroup(manager: EntityManager, userIds: string[], groupId: string) {
if (userIds.length == 0) return;
const valuesString = userIds.map((id) => `('${id}', '${groupId}')`).join(',');
const query = `
INSERT INTO group_users (user_id, group_id)
VALUES ${valuesString};
`;
return await manager.query(query);
}
async addAppsGroupToPermissions(manager: EntityManager, appIds: string[], appPermissionsId: string) {
const valuesString = appIds.map((id) => `('${id}', '${appPermissionsId}')`).join(',');
const query = `
INSERT INTO group_apps (app_id, apps_group_permissions_id)
VALUES ${valuesString};
`;
return await manager.query(query);
}
2025-02-25 06:52:50 +00:00
async addDataSourceGroupToPermissions(
manager: EntityManager,
dataSourceIds: string[],
dataSourcePermissionsId: string
) {
const valuesString = dataSourceIds.map((id) => `('${id}', '${dataSourcePermissionsId}')`).join(',');
const query = `
INSERT INTO group_data_sources (data_source_id, data_sources_group_permissions_id)
VALUES ${valuesString};
`;
return await manager.query(query);
}
2024-07-10 08:18:26 +00:00
async createAppLevelPermissions(
manager: EntityManager,
appsPermissions: AppGroupPermission[],
organizationId: string,
group: GroupPermissions,
2025-02-25 06:52:50 +00:00
createResourcePermissionObj: CreateResourcePermissionObject<ResourceType.APP>
2024-07-10 08:18:26 +00:00
) {
2024-09-23 11:34:20 +00:00
const nameInit = createResourcePermissionObj.canEdit
? 'Updatable'
: `Viewable ${createResourcePermissionObj.hideFromDashboard ? 'hidden' : ''}`;
2024-07-10 08:18:26 +00:00
if (appsPermissions.length === 0) return;
2024-09-23 11:34:20 +00:00
const dtoObject: CreateGranularPermissionDto = {
name: `${nameInit} ${DEFAULT_GRANULAR_PERMISSIONS_NAME[ResourceType.APP]}`,
2024-07-10 08:18:26 +00:00
groupId: group.id,
2024-09-23 11:34:20 +00:00
type: ResourceType.APP,
2024-07-10 08:18:26 +00:00
isAll: false,
2025-02-25 06:52:50 +00:00
createResourcePermissionObject: {},
2024-07-10 08:18:26 +00:00
};
const granularPermissions = await this.createGranularPermission(manager, dtoObject);
const appsGroupPermissions = await this.createAppsResourcePermission(
manager,
{ granularPermissions, organizationId },
createResourcePermissionObj
);
await this.addAppsGroupToPermissions(
manager,
appsPermissions.map((record) => record.appId),
appsGroupPermissions.id
);
}
2025-02-25 06:52:50 +00:00
async createDataSourceLevelPermissions(
manager: EntityManager,
dataSourcePermissions: DataSourceGroupPermission[],
organizationId: string,
group: GroupPermissions,
createResourcePermissionObj: CreateResourcePermissionObject<ResourceType.DATA_SOURCE>
) {
const nameInit = createResourcePermissionObj.action?.canConfigure ? 'Configurable' : 'Usable';
if (dataSourcePermissions.length === 0) return;
const dtoObject = {
name: `${nameInit} ${DEFAULT_GRANULAR_PERMISSIONS_NAME[ResourceType.DATA_SOURCE]}`,
groupId: group.id,
type: ResourceType.DATA_SOURCE,
isAll: false,
createResourcePermissionObject: {},
};
const granularPermissions = await this.createGranularPermission(manager, dtoObject);
const dataSourceGroupPermissions = await this.createDataSourceResourcePermission(
manager,
{ granularPermissions, organizationId },
createResourcePermissionObj
);
await this.addDataSourceGroupToPermissions(
manager,
dataSourcePermissions.map((record) => record.dataSourceId),
dataSourceGroupPermissions.id
);
}
2024-07-10 08:18:26 +00:00
public async down(queryRunner: QueryRunner): Promise<void> {}
}