Skip to content

Commit 680475c

Browse files
committed
feat: add new permission constants for knowledge documents, paragraphs, and problems
1 parent 5ca3151 commit 680475c

File tree

4 files changed

+189
-128
lines changed

4 files changed

+189
-128
lines changed

apps/common/constants/permission_constants.py

Lines changed: 143 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,12 @@ class Group(Enum):
2222

2323
KNOWLEDGE = "KNOWLEDGE"
2424

25+
KNOWLEDGE_DOCUMENT = "KNOWLEDGE_DOCUMENT"
26+
27+
KNOWLEDGE_PARAGRAPH = "KNOWLEDGE_PARAGRAPH"
28+
29+
KNOWLEDGE_PROBLEM = "KNOWLEDGE_PROBLEM"
30+
2531
MODEL = "MODEL"
2632

2733
TOOL = "TOOL"
@@ -153,91 +159,143 @@ class PermissionConstants(Enum):
153159
"""
154160
权限枚举
155161
"""
156-
USER_READ = Permission(group=Group.USER, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
157-
RoleConstants.USER])
158-
USER_CREATE = Permission(group=Group.USER, operate=Operate.CREATE,
159-
role_list=[RoleConstants.ADMIN])
160-
USER_EDIT = Permission(group=Group.USER, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN])
161-
USER_DELETE = Permission(group=Group.USER, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN])
162-
163-
MODEL_CREATE = Permission(group=Group.MODEL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
164-
RoleConstants.USER])
165-
MODEL_READ = Permission(group=Group.MODEL, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
166-
RoleConstants.USER])
167-
MODEL_EDIT = Permission(group=Group.MODEL, operate=Operate.EDIT,
168-
role_list=[RoleConstants.ADMIN, RoleConstants.USER])
169-
MODEL_DELETE = Permission(group=Group.MODEL, operate=Operate.DELETE,
170-
role_list=[RoleConstants.ADMIN, RoleConstants.USER])
171-
TOOL_FOLDER_CREATE = Permission(group=Group.TOOL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
172-
RoleConstants.USER])
173-
TOOL_FOLDER_READ = Permission(group=Group.TOOL, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
174-
RoleConstants.USER])
175-
TOOL_FOLDER_EDIT = Permission(group=Group.TOOL, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN,
176-
RoleConstants.USER])
177-
TOOL_FOLDER_DELETE = Permission(group=Group.TOOL, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN,
178-
RoleConstants.USER])
179-
180-
TOOL_CREATE = Permission(group=Group.TOOL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
181-
RoleConstants.USER])
182-
TOOL_EDIT = Permission(group=Group.TOOL, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN,
183-
RoleConstants.USER])
184-
TOOL_READ = Permission(group=Group.TOOL, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
185-
RoleConstants.USER])
186-
TOOL_DELETE = Permission(group=Group.TOOL, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN,
187-
RoleConstants.USER])
188-
TOOL_DEBUG = Permission(group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN,
189-
RoleConstants.USER])
190-
TOOL_IMPORT = Permission(group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN,
191-
RoleConstants.USER])
192-
TOOL_EXPORT = Permission(group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN,
193-
RoleConstants.USER])
194-
195-
KNOWLEDGE_FOLDER_CREATE = Permission(group=Group.KNOWLEDGE, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
196-
RoleConstants.USER])
197-
KNOWLEDGE_FOLDER_READ = Permission(group=Group.KNOWLEDGE, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
198-
RoleConstants.USER],
199-
resource_permission_group_list=[
200-
ResourcePermissionGroup.VIEW
201-
])
202-
KNOWLEDGE_FOLDER_EDIT = Permission(group=Group.KNOWLEDGE, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN,
203-
RoleConstants.USER],
204-
resource_permission_group_list=[
205-
ResourcePermissionGroup.MANAGE
206-
]
207-
)
208-
KNOWLEDGE_FOLDER_DELETE = Permission(group=Group.KNOWLEDGE, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN,
209-
RoleConstants.USER],
210-
resource_permission_group_list=[
211-
ResourcePermissionGroup.MANAGE
212-
]
213-
)
214-
KNOWLEDGE_READ = Permission(group=Group.KNOWLEDGE, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
215-
RoleConstants.USER],
216-
resource_permission_group_list=[ResourcePermissionGroup.VIEW])
217-
KNOWLEDGE_CREATE = Permission(group=Group.KNOWLEDGE, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
218-
RoleConstants.USER])
219-
KNOWLEDGE_EDIT = Permission(group=Group.KNOWLEDGE, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN,
220-
RoleConstants.USER])
221-
KNOWLEDGE_DELETE = Permission(group=Group.KNOWLEDGE, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN,
222-
RoleConstants.USER])
223-
DOCUMENT_READ = Permission(group=Group.KNOWLEDGE, operate=Operate.READ, role_list=[RoleConstants.ADMIN,
224-
RoleConstants.USER])
225-
DOCUMENT_CREATE = Permission(group=Group.KNOWLEDGE, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN,
226-
RoleConstants.USER])
227-
DOCUMENT_EDIT = Permission(group=Group.KNOWLEDGE, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN,
228-
RoleConstants.USER])
229-
DOCUMENT_DELETE = Permission(group=Group.KNOWLEDGE, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN,
230-
RoleConstants.USER])
231-
232-
WORKSPACE_USER_RESOURCE_PERMISSION_READ = Permission(group=Group.WORKSPACE_USER_RESOURCE_PERMISSION,
233-
operate=Operate.READ,
234-
role_list=[RoleConstants.ADMIN,
235-
RoleConstants.WORKSPACE_MANAGE])
236-
237-
EMAIL_SETTING_READ = Permission(group=Group.USER, operate=Operate.READ,
238-
role_list=[RoleConstants.ADMIN])
239-
EMAIL_SETTING_EDIT = Permission(group=Group.USER, operate=Operate.EDIT,
240-
role_list=[RoleConstants.ADMIN])
162+
USER_READ = Permission(
163+
group=Group.USER, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
164+
)
165+
USER_CREATE = Permission(
166+
group=Group.USER, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN]
167+
)
168+
USER_EDIT = Permission(
169+
group=Group.USER, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN]
170+
)
171+
USER_DELETE = Permission(
172+
group=Group.USER, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN]
173+
)
174+
MODEL_CREATE = Permission(
175+
group=Group.MODEL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
176+
)
177+
MODEL_READ = Permission(
178+
group=Group.MODEL, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
179+
)
180+
MODEL_EDIT = Permission(
181+
group=Group.MODEL, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
182+
)
183+
MODEL_DELETE = Permission(
184+
group=Group.MODEL, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
185+
)
186+
TOOL_FOLDER_CREATE = Permission(
187+
group=Group.TOOL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
188+
)
189+
TOOL_FOLDER_READ = Permission(
190+
group=Group.TOOL, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
191+
)
192+
TOOL_FOLDER_EDIT = Permission(
193+
group=Group.TOOL, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
194+
)
195+
TOOL_FOLDER_DELETE = Permission(
196+
group=Group.TOOL, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
197+
)
198+
TOOL_CREATE = Permission(
199+
group=Group.TOOL, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
200+
)
201+
TOOL_EDIT = Permission(
202+
group=Group.TOOL, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
203+
)
204+
TOOL_READ = Permission(
205+
group=Group.TOOL, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
206+
)
207+
TOOL_DELETE = Permission(
208+
group=Group.TOOL, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
209+
)
210+
TOOL_DEBUG = Permission(
211+
group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
212+
)
213+
TOOL_IMPORT = Permission(
214+
group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
215+
)
216+
TOOL_EXPORT = Permission(
217+
group=Group.TOOL, operate=Operate.USE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
218+
)
219+
KNOWLEDGE_FOLDER_CREATE = Permission(
220+
group=Group.KNOWLEDGE, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
221+
)
222+
KNOWLEDGE_FOLDER_READ = Permission(
223+
group=Group.KNOWLEDGE, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER],
224+
resource_permission_group_list=[ResourcePermissionGroup.VIEW]
225+
)
226+
KNOWLEDGE_FOLDER_EDIT = Permission(
227+
group=Group.KNOWLEDGE, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER],
228+
resource_permission_group_list=[ResourcePermissionGroup.MANAGE]
229+
)
230+
KNOWLEDGE_FOLDER_DELETE = Permission(
231+
group=Group.KNOWLEDGE, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER],
232+
resource_permission_group_list=[ResourcePermissionGroup.MANAGE]
233+
)
234+
KNOWLEDGE_READ = Permission(
235+
group=Group.KNOWLEDGE, operate=Operate.READ, role_list=[RoleConstants.ADMIN, RoleConstants.USER],
236+
resource_permission_group_list=[ResourcePermissionGroup.VIEW]
237+
)
238+
KNOWLEDGE_CREATE = Permission(
239+
group=Group.KNOWLEDGE, operate=Operate.CREATE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
240+
)
241+
KNOWLEDGE_EDIT = Permission(
242+
group=Group.KNOWLEDGE, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
243+
)
244+
KNOWLEDGE_DELETE = Permission(
245+
group=Group.KNOWLEDGE, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
246+
)
247+
KNOWLEDGE_DOCUMENT_READ = Permission(
248+
group=Group.KNOWLEDGE_DOCUMENT, operate=Operate.READ,
249+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
250+
)
251+
KNOWLEDGE_DOCUMENT_CREATE = Permission(
252+
group=Group.KNOWLEDGE_DOCUMENT, operate=Operate.CREATE,
253+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
254+
)
255+
KNOWLEDGE_DOCUMENT_EDIT = Permission(
256+
group=Group.KNOWLEDGE_DOCUMENT, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
257+
)
258+
KNOWLEDGE_DOCUMENT_DELETE = Permission(
259+
group=Group.KNOWLEDGE_DOCUMENT, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
260+
)
261+
KNOWLEDGE_PARAGRAPH_READ = Permission(
262+
group=Group.KNOWLEDGE_PARAGRAPH, operate=Operate.READ,
263+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
264+
)
265+
KNOWLEDGE_PARAGRAPH_CREATE = Permission(
266+
group=Group.KNOWLEDGE_PARAGRAPH, operate=Operate.CREATE,
267+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
268+
)
269+
KNOWLEDGE_PARAGRAPH_EDIT = Permission(
270+
group=Group.KNOWLEDGE_PARAGRAPH, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
271+
)
272+
KNOWLEDGE_PARAGRAPH_DELETE = Permission(
273+
group=Group.KNOWLEDGE_PARAGRAPH, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
274+
)
275+
KNOWLEDGE_PROBLEM_READ = Permission(
276+
group=Group.KNOWLEDGE_PROBLEM, operate=Operate.READ,
277+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
278+
)
279+
KNOWLEDGE_PROBLEM_CREATE = Permission(
280+
group=Group.KNOWLEDGE_PROBLEM, operate=Operate.CREATE,
281+
role_list=[RoleConstants.ADMIN, RoleConstants.USER]
282+
)
283+
KNOWLEDGE_PROBLEM_EDIT = Permission(
284+
group=Group.KNOWLEDGE_PROBLEM, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
285+
)
286+
KNOWLEDGE_PROBLEM_DELETE = Permission(
287+
group=Group.KNOWLEDGE_PROBLEM, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN, RoleConstants.USER]
288+
)
289+
WORKSPACE_USER_RESOURCE_PERMISSION_READ = Permission(
290+
group=Group.WORKSPACE_USER_RESOURCE_PERMISSION, operate=Operate.READ,
291+
role_list=[RoleConstants.ADMIN, RoleConstants.WORKSPACE_MANAGE]
292+
)
293+
EMAIL_SETTING_READ = Permission(
294+
group=Group.USER, operate=Operate.READ, role_list=[RoleConstants.ADMIN]
295+
)
296+
EMAIL_SETTING_EDIT = Permission(
297+
group=Group.USER, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN]
298+
)
241299

242300
def get_workspace_application_permission(self):
243301
return lambda r, kwargs: Permission(group=self.value.group, operate=self.value.operate,

0 commit comments

Comments
 (0)