-
Notifications
You must be signed in to change notification settings - Fork 2.6k
feat: Remove debug permission #4059
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -93,8 +93,8 @@ class ApplicationChatRecordOperateAPI(APIView): | |
| ) | ||
| @has_permissions(PermissionConstants.APPLICATION_CHAT_LOG_READ.get_workspace_application_permission(), | ||
| PermissionConstants.APPLICATION_CHAT_LOG_READ.get_workspace_permission_workspace_manage_role(), | ||
| PermissionConstants.APPLICATION_DEBUG.get_workspace_application_permission(), | ||
| PermissionConstants.APPLICATION_DEBUG.get_workspace_permission_workspace_manage_role(), | ||
| PermissionConstants.APPLICATION_EDIT.get_workspace_application_permission(), | ||
| PermissionConstants.APPLICATION_EDIT.get_workspace_permission_workspace_manage_role(), | ||
| ViewPermission([RoleConstants.USER.get_workspace_role()], | ||
| [PermissionConstants.APPLICATION.get_workspace_application_permission()], | ||
| CompareConstants.AND), | ||
|
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The provided Python function for class Overall, the permissions specified seem mostly appropriate for accessing and managing chat records:
Potential Issues
Additional Considerations
SummaryThis code snippet seems broadly correct given its primary intent is to restrict access based on specific roles for viewing and managing chat records. However, thorough validation of action permissions across various endpoints is crucial for maintaining security and integrity in your API system. |
||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -510,12 +510,6 @@ class PermissionConstants(Enum): | |
| parent_group=[WorkspaceGroup.TOOL, UserGroup.TOOL], | ||
| resource_permission_group_list=[ResourcePermissionConst.TOOL_MANGE] | ||
| ) | ||
|
|
||
| TOOL_DEBUG = Permission( | ||
| group=Group.TOOL, operate=Operate.DEBUG, role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.TOOL, UserGroup.TOOL], | ||
| resource_permission_group_list=[ResourcePermissionConst.TOOL_MANGE] | ||
| ) | ||
| TOOL_IMPORT = Permission( | ||
| group=Group.TOOL, operate=Operate.IMPORT, role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.TOOL, UserGroup.TOOL], | ||
|
|
@@ -804,16 +798,21 @@ class PermissionConstants(Enum): | |
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_VIEW], | ||
| ) | ||
| APPLICATION_DEBUG = Permission(group=Group.APPLICATION, operate=Operate.DEBUG, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_CREATE = Permission(group=Group.APPLICATION, operate=Operate.CREATE, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_EDIT = Permission(group=Group.APPLICATION, operate=Operate.EDIT, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_DELETE = Permission(group=Group.APPLICATION, operate=Operate.DELETE, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_IMPORT = Permission(group=Group.APPLICATION, operate=Operate.IMPORT, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
|
|
@@ -824,17 +823,6 @@ class PermissionConstants(Enum): | |
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| ) | ||
|
|
||
| APPLICATION_DELETE = Permission(group=Group.APPLICATION, operate=Operate.DELETE, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_EDIT = Permission(group=Group.APPLICATION, operate=Operate.EDIT, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
| resource_permission_group_list=[ResourcePermissionConst.APPLICATION_MANGE], | ||
| ) | ||
| APPLICATION_RESOURCE_AUTHORIZATION = Permission(group=Group.APPLICATION, operate=Operate.AUTH, | ||
| role_list=[RoleConstants.ADMIN, RoleConstants.USER], | ||
| parent_group=[WorkspaceGroup.APPLICATION, UserGroup.APPLICATION], | ||
|
|
@@ -1233,20 +1221,20 @@ class PermissionConstants(Enum): | |
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.READ, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_DEBUG = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.DEBUG, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_EXPORT = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.EXPORT, role_list=[RoleConstants.ADMIN], | ||
| RESOURCE_APPLICATION_EDIT = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_DELETE = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.DELETE, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_EDIT = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.EDIT, role_list=[RoleConstants.ADMIN], | ||
| RESOURCE_APPLICATION_DEBUG = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.DEBUG, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_EXPORT = Permission( | ||
| group=Group.SYSTEM_RES_APPLICATION, operate=Operate.EXPORT, role_list=[RoleConstants.ADMIN], | ||
| parent_group=[SystemGroup.RESOURCE_APPLICATION], is_ee=settings.edition == "EE" | ||
| ) | ||
| RESOURCE_APPLICATION_AUTH = Permission( | ||
|
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The code contains several inconsistencies:
Here are some optimization suggestions:
Fixing these issues will make the code cleaner and more maintainable. |
||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The code has been corrected with the appropriate permissions. Here's the optimized version:
This version includes adjustments to ensure correct usage of
permssion_classes(which should include all necessary middleware for checking user permissions), provides specific details about how authentication is managed, and suggests returning a 403 Forbidden status when unauthorized access is detected.