mirror of
https://github.com/PostHog/posthog.git
synced 2024-12-01 04:12:23 +01:00
8a56b4ea4a
* fix unable to add custom role bug * add events usage * add test * make test more clear
78 lines
3.3 KiB
Python
78 lines
3.3 KiB
Python
from rest_framework import exceptions, mixins, serializers, viewsets
|
|
from rest_framework.permissions import SAFE_METHODS, BasePermission, IsAuthenticated
|
|
|
|
from ee.api.role import RoleSerializer
|
|
from ee.models.feature_flag_role_access import FeatureFlagRoleAccess
|
|
from ee.models.organization_resource_access import OrganizationResourceAccess
|
|
from ee.models.role import Role
|
|
from posthog.api.feature_flag import FeatureFlagSerializer
|
|
from posthog.api.routing import StructuredViewSetMixin
|
|
from posthog.models import FeatureFlag
|
|
from posthog.models.organization import OrganizationMembership
|
|
|
|
|
|
class FeatureFlagRoleAccessPermissions(BasePermission):
|
|
message = "You can't edit roles for this feature flag."
|
|
|
|
def has_permission(self, request, view):
|
|
if request.method in SAFE_METHODS:
|
|
return True
|
|
if (
|
|
request.user.organization_memberships.get(organization=request.user.organization).level
|
|
>= OrganizationMembership.Level.ADMIN
|
|
):
|
|
return True
|
|
try:
|
|
resource_access = OrganizationResourceAccess.objects.get(
|
|
resource=OrganizationResourceAccess.Resources.FEATURE_FLAGS,
|
|
organization=request.user.organization,
|
|
)
|
|
if resource_access.access_level == OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT:
|
|
return True
|
|
except OrganizationResourceAccess.DoesNotExist: # no organization resource access for this means full default edit access
|
|
return True
|
|
try:
|
|
feature_flag: FeatureFlag = FeatureFlag.objects.get(id=view.parents_query_dict["feature_flag_id"])
|
|
if feature_flag.created_by.uuid == request.user.uuid:
|
|
return True
|
|
except FeatureFlag.DoesNotExist:
|
|
raise exceptions.NotFound("Feature flag not found.")
|
|
|
|
has_role_membership_with_access = request.user.role_memberships.filter(
|
|
role__feature_flags_access_level=OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT
|
|
).exists()
|
|
return has_role_membership_with_access
|
|
|
|
|
|
class FeatureFlagRoleAccessSerializer(serializers.ModelSerializer):
|
|
feature_flag = FeatureFlagSerializer(read_only=True)
|
|
role = RoleSerializer(read_only=True)
|
|
role_id = serializers.PrimaryKeyRelatedField(write_only=True, source="role", queryset=Role.objects.all())
|
|
|
|
class Meta:
|
|
model = FeatureFlagRoleAccess
|
|
fields = ["id", "feature_flag", "role", "role_id", "added_at", "updated_at"]
|
|
read_only_fields = ["id", "added_at", "updated_at"]
|
|
|
|
def create(self, validated_data):
|
|
validated_data["feature_flag_id"] = self.context["feature_flag_id"]
|
|
return super().create(validated_data)
|
|
|
|
|
|
class FeatureFlagRoleAccessViewSet(
|
|
StructuredViewSetMixin,
|
|
mixins.ListModelMixin,
|
|
mixins.CreateModelMixin,
|
|
mixins.DestroyModelMixin,
|
|
mixins.RetrieveModelMixin,
|
|
viewsets.GenericViewSet,
|
|
):
|
|
permission_classes = [IsAuthenticated, FeatureFlagRoleAccessPermissions]
|
|
serializer_class = FeatureFlagRoleAccessSerializer
|
|
queryset = FeatureFlagRoleAccess.objects.select_related("feature_flag")
|
|
filter_rewrite_rules = {"team_id": "feature_flag__team_id"}
|
|
|
|
def get_queryset(self):
|
|
filters = self.request.GET.dict()
|
|
return super().get_queryset().filter(**filters)
|