Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(Feat): V2 slugified project routes #1449

Merged
merged 130 commits into from
Mar 17, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
130 commits
Select commit Hold shift + click to select a range
9473de2
Draft
DanielHougaard Feb 23, 2024
8e3fc04
Slug projects and filter type
DanielHougaard Feb 23, 2024
7438c11
Remove API key auth mode
DanielHougaard Feb 23, 2024
e917b74
feat: standardize org ID's on auth requests
DanielHougaard Feb 24, 2024
bbceb37
feat: fix project query by slug (now accepts an org ID)
DanielHougaard Feb 24, 2024
2032063
Fix: Remove org ID from JWT
DanielHougaard Feb 26, 2024
ce057f4
nit: update error message
maidul98 Feb 28, 2024
12a6fba
Feat: Create project via org slug instead of org ID
DanielHougaard Feb 28, 2024
0f14fab
Update index.ts
DanielHougaard Feb 29, 2024
e7b11ea
Fix: Remove orgId from service token
DanielHougaard Feb 29, 2024
f36a056
Update inject-identity.ts
DanielHougaard Feb 29, 2024
3461804
Update inject-identity.ts
DanielHougaard Feb 29, 2024
c0b0c07
Feat: List secrets by project slug
DanielHougaard Mar 6, 2024
a766329
Fix: Non-existant variable being passed to Posthog
DanielHougaard Mar 6, 2024
f0383dd
Fix: Change org ID to org slug
DanielHougaard Mar 6, 2024
aaca3ac
Fix: Change org ID to org slug
DanielHougaard Mar 6, 2024
a9bba02
Draft
DanielHougaard Feb 23, 2024
92441e0
Slug projects and filter type
DanielHougaard Feb 23, 2024
96abbd9
feat: standardize org ID's on auth requests
DanielHougaard Feb 24, 2024
bd3cbb3
feat: fix project query by slug (now accepts an org ID)
DanielHougaard Feb 24, 2024
5eb3258
Fix: Remove org ID from JWT
DanielHougaard Feb 26, 2024
dbf498b
Fix: Remove orgId from service token
DanielHougaard Feb 29, 2024
307b89e
Update inject-identity.ts
DanielHougaard Feb 29, 2024
30e7fe8
Fix: Rebase errors
DanielHougaard Mar 12, 2024
f860fd3
Update project-types.ts
DanielHougaard Mar 12, 2024
716e705
Fix: Removed legacy create project code
DanielHougaard Mar 15, 2024
4a0668e
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
c2bfeb8
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
8327f41
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
a1fa0c6
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
4f80234
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
29b2b12
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
c42bbbe
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
8fc0819
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
d287c3e
Feat: Org Scoped JWT Tokens
DanielHougaard Mar 9, 2024
dbd7561
Add link button
DanielHougaard Mar 9, 2024
52cf937
Fix: Avoid invalidating all queries on logout to prevent UI glitch
DanielHougaard Mar 9, 2024
143de12
Feat: Select organization on login
DanielHougaard Mar 9, 2024
ec4d1dd
Update _app.tsx
DanielHougaard Mar 9, 2024
2a6032a
Navigate to select org instead of dashboard
DanielHougaard Mar 9, 2024
995777d
Formatting and navigating to select org
DanielHougaard Mar 9, 2024
7fd6b63
Feat: Navigate to select org
DanielHougaard Mar 9, 2024
6e96f23
Feat: Scoped JWT to organization, include authMethod on all service c…
DanielHougaard Mar 12, 2024
47287be
Feat: Scoped JWT to organization, add authMethod to request
DanielHougaard Mar 12, 2024
7df614a
Feat: Scoped JWT to organization, SAML helper functions
DanielHougaard Mar 12, 2024
560274b
Feat: Scoped JWT to organization, Add authMethod to services
DanielHougaard Mar 12, 2024
edbf459
Feat: Scoped JWT to organization
DanielHougaard Mar 12, 2024
5b7562a
Feat: Scoped JWT to organization, Add actorAuthMethod to DTO
DanielHougaard Mar 12, 2024
bd92e35
Feat: Scoped JWT to organization, add actorAuthMethod to Permission t…
DanielHougaard Mar 12, 2024
dac5529
Feat: Scoped JWT to organization, require organization on all request…
DanielHougaard Mar 12, 2024
bb2413d
Update index.ts
DanielHougaard Mar 12, 2024
885d1fb
Feat: Scoped JWT to organization
DanielHougaard Mar 12, 2024
08b5975
Chore: Move SAML org check to permission service
DanielHougaard Mar 12, 2024
750a43c
Feat: Scoped JWT to organization
DanielHougaard Mar 12, 2024
fe638ce
Feat: Scoped JWT to organization, add actorAuthMethod to services
DanielHougaard Mar 12, 2024
900facd
Feat: Scoped JWT to organization, add actorAuthMethod to services
DanielHougaard Mar 12, 2024
a9c1f27
Feat: Scoped JWT to organization, add actorAuthMethod to DTO's
DanielHougaard Mar 12, 2024
65776b7
Feat: Scoped JWT to organization, actorAuthMethod to create project DTO
DanielHougaard Mar 12, 2024
9b1a153
Fix: Creating dummy workspaces
DanielHougaard Mar 12, 2024
27dcb06
Fix: Invalidate after selecting organization
DanielHougaard Mar 12, 2024
667fa7a
Chore: Optional 'invalidate' option for create org hook
DanielHougaard Mar 12, 2024
5f5d62a
Fix: Selecting SAML enforced organization
DanielHougaard Mar 12, 2024
b9986be
Fix: Creating dummy workspaces
DanielHougaard Mar 12, 2024
e4dba6d
Fix: Formatting and support for selecting org (line 109-122)
DanielHougaard Mar 12, 2024
835c36d
Fix: Select org after creation
DanielHougaard Mar 12, 2024
f59a75d
Feat: Org Scoped JWT's, remove inline service
DanielHougaard Mar 12, 2024
6d60413
Feat: Org Scoped JWT's, service handler
DanielHougaard Mar 12, 2024
92fd2d0
Fix: ActorType unresolved
DanielHougaard Mar 12, 2024
7e2685d
Fix: Better type checking
DanielHougaard Mar 12, 2024
1e20d78
Feat: Org scoped JWT's
DanielHougaard Mar 12, 2024
ad0504e
Fix: Add missing actor org ID
DanielHougaard Mar 12, 2024
0bd3f32
Fix: Add missing actor org ID
DanielHougaard Mar 12, 2024
eace4f1
Fix: Return access token
DanielHougaard Mar 12, 2024
f0e3c9a
Update auth-type.ts
DanielHougaard Mar 12, 2024
c11c5ec
Fix: Add actor org ID
DanielHougaard Mar 12, 2024
4d48870
Chore: Remove unused code
DanielHougaard Mar 12, 2024
f5f20fb
Fix: Add missing actor org ID to permission check
DanielHougaard Mar 12, 2024
e89503f
Fix: Add missing actor auth method to permission checks
DanielHougaard Mar 12, 2024
4aef8ab
Fix: Include actor org id
DanielHougaard Mar 12, 2024
ba22a7f
Chore: Remove redundant lint comment
DanielHougaard Mar 12, 2024
354bac4
Fix: Don't allow org select screen when token already has an organiza…
DanielHougaard Mar 12, 2024
2bd9914
Fix: Add missing actorOrgId to service handlers
DanielHougaard Mar 12, 2024
c3a56f4
Fix: Better type checking
DanielHougaard Mar 12, 2024
926f719
Fix: Rebase fixes
DanielHougaard Mar 12, 2024
8ff37e3
Fix: Rebase LDAP fixes
DanielHougaard Mar 12, 2024
214894c
Chore: Export Cli login interface
DanielHougaard Mar 12, 2024
b80579f
Update queries.tsx
DanielHougaard Mar 12, 2024
9eb2a74
Feat: Org scoped JWT's, CLI support
DanielHougaard Mar 12, 2024
46eea97
Feat: Org scoped JWT's CLI support
DanielHougaard Mar 12, 2024
9bbba92
Feat: Org scoped JWT's CLI support
DanielHougaard Mar 12, 2024
22b2fb4
Feat: Org scoped JWT's CLI support
DanielHougaard Mar 12, 2024
771498b
Update inject-permission.ts
DanielHougaard Mar 12, 2024
41323f2
Fix: MFA
DanielHougaard Mar 12, 2024
ddb1d5a
Remove log
DanielHougaard Mar 12, 2024
de715c0
Fix: Org scoped JWT's, MFA support
DanielHougaard Mar 12, 2024
14c60bd
Fix: Admin signup, select organization
DanielHougaard Mar 12, 2024
60a37e7
Fix: member invites, select org
DanielHougaard Mar 12, 2024
9a724db
Improvement: Use select organization hook
DanielHougaard Mar 12, 2024
8573263
Update permission-service.ts
DanielHougaard Mar 12, 2024
258c9e4
Update permission-service.ts
DanielHougaard Mar 12, 2024
6e2f380
Fix: Make API keys compatible with old endpoints
DanielHougaard Mar 13, 2024
961a73f
Fix: Re-add API key support
DanielHougaard Mar 13, 2024
36efa6b
Update inject-permission.ts
DanielHougaard Mar 13, 2024
60fbd8a
Chore: Better error messages
DanielHougaard Mar 13, 2024
0c1d37c
Update index.ts
DanielHougaard Mar 13, 2024
73cc97c
Fix: Signup not redirecting to backup PDF page due to error
DanielHougaard Mar 13, 2024
c9e5f2b
Select org on signup
DanielHougaard Mar 13, 2024
0081bbd
Type improvements
DanielHougaard Mar 13, 2024
52fd09b
Chore: Removed code that spans out of scope
DanielHougaard Mar 13, 2024
6904cd3
Fix: Better types
DanielHougaard Mar 13, 2024
831da10
Chore: Move comment
DanielHougaard Mar 13, 2024
8f42914
Chore: Change order
DanielHougaard Mar 13, 2024
700a072
Fix: Code readability
DanielHougaard Mar 13, 2024
1dbf80d
Fix: Code readability
DanielHougaard Mar 13, 2024
80b4bc1
Update auth-token-service.ts
DanielHougaard Mar 13, 2024
c42d407
Chore: Remove old comments
DanielHougaard Mar 13, 2024
f53fa46
Fix: Cleanup
DanielHougaard Mar 13, 2024
c94caa6
Chore: Minor code cleanup
DanielHougaard Mar 13, 2024
d1ebdbc
Fix: Add auth method and organization ID to test JWT
DanielHougaard Mar 13, 2024
b547309
Fix: Get org ID in getOrgIdentityPermission DAL operation
DanielHougaard Mar 13, 2024
bebdad8
parent 10a292bca563efbe5972d7ffc33ee4b96a868e42
DanielHougaard Mar 9, 2024
605dad2
Fix: Rebase error
DanielHougaard Mar 13, 2024
4d229ec
Fix: Email signup and switching organization
DanielHougaard Mar 14, 2024
9c9ade5
Feat: Scoped JWT to organization, Add authMethod to services
DanielHougaard Mar 12, 2024
b78d8d2
Feat: CLI support for scoped JWT tokens
DanielHougaard Mar 12, 2024
5c2a108
add small helpful comment
maidul98 Mar 12, 2024
b5a7240
Fix: Select org when using `init`
DanielHougaard Mar 15, 2024
a257743
Update secret-approval-request-service.ts
DanielHougaard Mar 15, 2024
1ac8ddb
Fix: Rebase errors
DanielHougaard Mar 15, 2024
b8ba515
Fix: Rebase errors
DanielHougaard Mar 17, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion backend/e2e-test/vitest-environment-knex.ts
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ import { seedData1 } from "@app/db/seed-data";
import { initEnvConfig } from "@app/lib/config/env";
import { initLogger } from "@app/lib/logger";
import { main } from "@app/server/app";
import { AuthTokenType } from "@app/services/auth/auth-type";
import { AuthMethod, AuthTokenType } from "@app/services/auth/auth-type";

import { mockQueue } from "./mocks/queue";
import { mockSmtpServer } from "./mocks/smtp";
Expand Down Expand Up @@ -52,6 +52,8 @@ export default {
authTokenType: AuthTokenType.ACCESS_TOKEN,
userId: seedData1.id,
tokenVersionId: seedData1.token.id,
authMethod: AuthMethod.EMAIL,
organizationId: seedData1.organization.id,
accessVersion: 1
},
cfg.AUTH_SECRET,
Expand Down
3 changes: 2 additions & 1 deletion backend/src/@types/fastify.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ import { TApiKeyServiceFactory } from "@app/services/api-key/api-key-service";
import { TAuthLoginFactory } from "@app/services/auth/auth-login-service";
import { TAuthPasswordFactory } from "@app/services/auth/auth-password-service";
import { TAuthSignupFactory } from "@app/services/auth/auth-signup-service";
import { ActorType } from "@app/services/auth/auth-type";
import { ActorAuthMethod, ActorType } from "@app/services/auth/auth-type";
import { TAuthTokenServiceFactory } from "@app/services/auth-token/auth-token-service";
import { TIdentityServiceFactory } from "@app/services/identity/identity-service";
import { TIdentityAccessTokenServiceFactory } from "@app/services/identity-access-token/identity-access-token-service";
Expand Down Expand Up @@ -59,6 +59,7 @@ declare module "fastify" {
// identity injection. depending on which kinda of token the information is filled in auth
auth: TAuthMode;
permission: {
authMethod: ActorAuthMethod;
type: ActorType;
id: string;
orgId?: string;
Expand Down
3 changes: 3 additions & 0 deletions backend/src/ee/routes/v1/ldap-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -122,6 +122,7 @@ export const registerLdapRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorId: req.permission.id,
orgId: req.query.organizationId,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId
});
return ldap;
Expand Down Expand Up @@ -151,6 +152,7 @@ export const registerLdapRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorId: req.permission.id,
orgId: req.body.organizationId,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
...req.body
});
Expand Down Expand Up @@ -184,6 +186,7 @@ export const registerLdapRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorId: req.permission.id,
orgId: req.body.organizationId,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
...req.body
});
Expand Down
20 changes: 19 additions & 1 deletion backend/src/ee/routes/v1/license-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId,
actorAuthMethod: req.permission.authMethod,
billingCycle: req.query.billingCycle
});
return data;
Expand All @@ -45,6 +46,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return { plan };
Expand All @@ -66,6 +68,8 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
const data = await server.services.license.getOrgPlan({
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -89,6 +93,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId,
actorAuthMethod: req.permission.authMethod,
success_url: req.body.success_url
});
return data;
Expand All @@ -110,6 +115,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -131,6 +137,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -152,6 +159,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -173,6 +181,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -198,6 +207,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId,
name: req.body.name,
email: req.body.email
Expand All @@ -221,6 +231,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand All @@ -246,6 +257,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId,
success_url: req.body.success_url,
cancel_url: req.body.cancel_url
Expand All @@ -271,6 +283,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
const data = await server.services.license.delOrgPmtMethods({
actorId: req.permission.id,
actor: req.permission.type,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId,
pmtMethodId: req.params.pmtMethodId
Expand All @@ -295,6 +308,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
const data = await server.services.license.getOrgTaxIds({
actorId: req.permission.id,
actor: req.permission.type,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId
});
Expand Down Expand Up @@ -322,6 +336,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
const data = await server.services.license.addOrgTaxId({
actorId: req.permission.id,
actor: req.permission.type,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId,
type: req.body.type,
Expand All @@ -348,6 +363,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
const data = await server.services.license.delOrgTaxId({
actorId: req.permission.id,
actor: req.permission.type,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId,
taxId: req.params.taxId
Expand All @@ -373,7 +389,8 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
orgId: req.params.organizationId
orgId: req.params.organizationId,
actorAuthMethod: req.permission.authMethod
});
return data;
}
Expand All @@ -396,6 +413,7 @@ export const registerLicenseRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actor: req.permission.type,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.params.organizationId
});
return data;
Expand Down
5 changes: 5 additions & 0 deletions backend/src/ee/routes/v1/org-role-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ export const registerOrgRoleRouter = async (server: FastifyZodProvider) => {
req.permission.id,
req.params.organizationId,
req.body,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand Down Expand Up @@ -84,6 +85,7 @@ export const registerOrgRoleRouter = async (server: FastifyZodProvider) => {
req.params.organizationId,
req.params.roleId,
req.body,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand All @@ -110,6 +112,7 @@ export const registerOrgRoleRouter = async (server: FastifyZodProvider) => {
req.permission.id,
req.params.organizationId,
req.params.roleId,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand Down Expand Up @@ -138,6 +141,7 @@ export const registerOrgRoleRouter = async (server: FastifyZodProvider) => {
const roles = await server.services.orgRole.listRoles(
req.permission.id,
req.params.organizationId,
req.permission.authMethod,
req.permission.orgId
);
return { data: { roles } };
Expand All @@ -163,6 +167,7 @@ export const registerOrgRoleRouter = async (server: FastifyZodProvider) => {
const { permissions, membership } = await server.services.orgRole.getUserPermission(
req.permission.id,
req.params.organizationId,
req.permission.authMethod,
req.permission.orgId
);
return { permissions, membership };
Expand Down
5 changes: 5 additions & 0 deletions backend/src/ee/routes/v1/project-role-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ export const registerProjectRoleRouter = async (server: FastifyZodProvider) => {
req.permission.id,
req.params.projectId,
req.body,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand Down Expand Up @@ -65,6 +66,7 @@ export const registerProjectRoleRouter = async (server: FastifyZodProvider) => {
req.params.projectId,
req.params.roleId,
req.body,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand Down Expand Up @@ -92,6 +94,7 @@ export const registerProjectRoleRouter = async (server: FastifyZodProvider) => {
req.permission.id,
req.params.projectId,
req.params.roleId,
req.permission.authMethod,
req.permission.orgId
);
return { role };
Expand Down Expand Up @@ -121,6 +124,7 @@ export const registerProjectRoleRouter = async (server: FastifyZodProvider) => {
req.permission.type,
req.permission.id,
req.params.projectId,
req.permission.authMethod,
req.permission.orgId
);
return { data: { roles } };
Expand Down Expand Up @@ -148,6 +152,7 @@ export const registerProjectRoleRouter = async (server: FastifyZodProvider) => {
const { permissions, membership } = await server.services.projectRole.getUserPermission(
req.permission.id,
req.params.projectId,
req.permission.authMethod,
req.permission.orgId
);
return { data: { permissions, membership } };
Expand Down
3 changes: 3 additions & 0 deletions backend/src/ee/routes/v1/project-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,7 @@ export const registerProjectRouter = async (server: FastifyZodProvider) => {
handler: async (req) => {
const secretSnapshots = await server.services.snapshot.listSnapshots({
actor: req.permission.type,
actorAuthMethod: req.permission.authMethod,
actorId: req.permission.id,
actorOrgId: req.permission.orgId,
projectId: req.params.workspaceId,
Expand Down Expand Up @@ -69,6 +70,7 @@ export const registerProjectRouter = async (server: FastifyZodProvider) => {
const count = await server.services.snapshot.projectSecretSnapshotCount({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
projectId: req.params.workspaceId,
environment: req.query.environment,
Expand Down Expand Up @@ -130,6 +132,7 @@ export const registerProjectRouter = async (server: FastifyZodProvider) => {
const auditLogs = await server.services.auditLog.listProjectAuditLogs({
actorId: req.permission.id,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
projectId: req.params.workspaceId,
...req.query,
auditLogActor: req.query.actor,
Expand Down
3 changes: 3 additions & 0 deletions backend/src/ee/routes/v1/saml-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -231,6 +231,7 @@ export const registerSamlRouter = async (server: FastifyZodProvider) => {
actor: req.permission.type,
actorId: req.permission.id,
actorOrgId: req.permission.orgId,
actorAuthMethod: req.permission.authMethod,
orgId: req.query.organizationId,
type: "org"
});
Expand Down Expand Up @@ -259,6 +260,7 @@ export const registerSamlRouter = async (server: FastifyZodProvider) => {
const saml = await server.services.saml.createSamlCfg({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.body.organizationId,
...req.body
Expand Down Expand Up @@ -290,6 +292,7 @@ export const registerSamlRouter = async (server: FastifyZodProvider) => {
const saml = await server.services.saml.updateSamlCfg({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.body.organizationId,
...req.body
Expand Down
3 changes: 3 additions & 0 deletions backend/src/ee/routes/v1/scim-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ export const registerScimRouter = async (server: FastifyZodProvider) => {
actorId: req.permission.id,
actorOrgId: req.permission.orgId,
orgId: req.body.organizationId,
actorAuthMethod: req.permission.authMethod,
description: req.body.description,
ttlDays: req.body.ttlDays
});
Expand All @@ -65,6 +66,7 @@ export const registerScimRouter = async (server: FastifyZodProvider) => {
const scimTokens = await server.services.scim.listScimTokens({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
orgId: req.query.organizationId
});
Expand Down Expand Up @@ -92,6 +94,7 @@ export const registerScimRouter = async (server: FastifyZodProvider) => {
scimTokenId: req.params.scimTokenId,
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId
});

Expand Down
5 changes: 5 additions & 0 deletions backend/src/ee/routes/v1/secret-approval-policy-router.ts
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ export const registerSecretApprovalPolicyRouter = async (server: FastifyZodProvi
const approval = await server.services.secretApprovalPolicy.createSecretApprovalPolicy({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
projectId: req.body.workspaceId,
...req.body,
Expand Down Expand Up @@ -72,6 +73,7 @@ export const registerSecretApprovalPolicyRouter = async (server: FastifyZodProvi
const approval = await server.services.secretApprovalPolicy.updateSecretApprovalPolicy({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
...req.body,
secretPolicyId: req.params.sapId
Expand All @@ -98,6 +100,7 @@ export const registerSecretApprovalPolicyRouter = async (server: FastifyZodProvi
const approval = await server.services.secretApprovalPolicy.deleteSecretApprovalPolicy({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
secretPolicyId: req.params.sapId
});
Expand All @@ -123,6 +126,7 @@ export const registerSecretApprovalPolicyRouter = async (server: FastifyZodProvi
const approvals = await server.services.secretApprovalPolicy.getSecretApprovalPolicyByProjectId({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
projectId: req.query.workspaceId
});
Expand Down Expand Up @@ -150,6 +154,7 @@ export const registerSecretApprovalPolicyRouter = async (server: FastifyZodProvi
const policy = await server.services.secretApprovalPolicy.getSecretApprovalPolicyOfFolder({
actor: req.permission.type,
actorId: req.permission.id,
actorAuthMethod: req.permission.authMethod,
actorOrgId: req.permission.orgId,
projectId: req.query.workspaceId,
...req.query
Expand Down
Loading
Loading