-
Notifications
You must be signed in to change notification settings - Fork 1.5k
/
Copy pathendpoints_ee.go
193 lines (159 loc) · 4.55 KB
/
endpoints_ee.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
// +build !oss
/*
* Copyright 2020 Dgraph Labs, Inc. and Contributors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package admin
const adminTypes = `
input BackupInput {
destination: String!
accessKey: String
secretKey: String
sessionToken: String
anonymous: Boolean
forceFull: Boolean
}
type BackupPayload {
response: Response
}
type User {
name: String! @id @dgraph(pred: "dgraph.xid")
# TODO - Update this to actual secret after password PR is merged here.
password: String! @dgraph(pred: "dgraph.password")
groups: [Group] @dgraph(pred: "dgraph.user.group")
}
type Group {
name: String! @id @dgraph(pred: "dgraph.xid")
users: [User] @dgraph(pred: "~dgraph.user.group")
rules: [Rule] @dgraph(pred: "dgraph.acl.rule")
}
type Rule {
id: ID!
predicate: String! @dgraph(pred: "dgraph.rule.predicate")
# TODO - Change permission to enum type once we figure out how to map enum strings to Int
# while storing it in Dgraph.
# We also need validation in Dgraph on ther permitted value of permission to be between [0,7]
# If we change permission to be an ENUM and only allow ACL mutations through the GraphQL API
# then we don't need this validation in Dgrpah.
permission: Int! @dgraph(pred: "dgraph.rule.permission")
}
input StringHashFilter {
eq: String
}
enum UserOrderable {
name
}
enum GroupOrderable {
name
}
input AddUserInput {
name: String!
password: String!
groups: [GroupRef]
}
input AddGroupInput {
name: String!
rules: [RuleRef]
}
input UserRef {
name: String!
}
input GroupRef {
name: String!
}
input RuleRef {
id: ID
predicate: String
permission: Int
}
input UserFilter {
name: StringHashFilter
and: UserFilter
or: UserFilter
not: UserFilter
}
input UserOrder {
asc: UserOrderable
desc: UserOrderable
then: UserOrder
}
input GroupOrder {
asc: GroupOrderable
desc: GroupOrderable
then: GroupOrder
}
input UserPatch {
password: String
groups: [GroupRef]
}
input UpdateUserInput {
filter: UserFilter!
set: UserPatch
remove: UserPatch
}
input GroupFilter {
name: StringHashFilter
and: UserFilter
or: UserFilter
not: UserFilter
}
input GroupPatch {
rules: [RuleRef]
}
input UpdateGroupInput {
filter: GroupFilter!
set: GroupPatch
remove: GroupPatch
}
type AddUserPayload {
user(filter: UserFilter, order: UserOrder, first: Int, offset: Int): [User]
}
type AddGroupPayload {
group(filter: GroupFilter, order: GroupOrder, first: Int, offset: Int): [Group]
}
type DeleteUserPayload {
msg: String
}
type DeleteGroupPayload {
msg: String
}`
const adminMutations = `
backup(input: BackupInput!) : BackupPayload
# ACL related endpoints.
# 1. If user and group don't exist both are created and linked.
# 2. If user doesn't exist but group does, then user is created and both are linked.
# 3. If user exists and group doesn't exist, then two errors are returned i.e. User exists
# and group doesn't exist.
# 4. If user and group exists, then error that user exists.
addUser(input: [AddUserInput]): AddUserPayload
addGroup(input: [AddGroupInput]): AddGroupPayload
# update user allows updating a user's password or updating their groups. If the group
# doesn't exist, then it is created, otherwise linked to the user. If the user filter
# doesn't return anything then nothing happens.
updateUser(input: UpdateUserInput!): AddUserPayload
# update group only allows adding rules to a group.
updateGroup(input: UpdateGroupInput!): AddGroupPayload
deleteGroup(filter: GroupFilter!): DeleteGroupPayload
deleteUser(filter: UserFilter!): DeleteUserPayload`
const adminQueries = `
# ACL related endpoints
# TODO - The endpoints below work fine for members of guardians group but they should only
# return a subset of the data for other users. Test that and add validation in the server
# for them.
getUser(name: String!): User
getGroup(name: String!): Group
# TODO - This needs a custom handler. Implement this later.
# getCurrentUser: User
queryUser(filter: UserFilter): [User]
queryGroup(filter: GroupFilter): [Group]`