* chore: user store code refactor * chore: general unauthorized screen asset added * chore: workspace setting sidebar options updated for guest and viewer * chore: NotAuthorizedView component code updated * chore: project setting layout code refactor * chore: workspace setting members and exports page permission validation added * chore: workspace members and exports settings page improvement * chore: project invite modal updated * chore: workspace setting unauthorized access empty state * chore: workspace setting unauthorized access empty state * chore: project settings sidebar permission updated * fix: project settings user role permission updated * chore: app sidebar role permission validation updated * chore: app sidebar role permission validation * chore: disabled page empty state validation * chore: app sidebar add project improvement * chore: guest role changes * fix: user favorite * chore: changed pages permission * chore: guest role changes * fix: app sidebar project item permission * fix: project setting empty state flicker * fix: workspace setting empty state flicker * chore: granted notification permission to viewer * chore: project invite and edit validation updated * chore: favorite validation added for guest and viewer role * chore: create view validation updated * chore: views permission changes * chore: create view empty state validation updated * chore: created ENUM for permissions --------- Co-authored-by: NarayanBavisetti <narayan3119@gmail.com> Co-authored-by: Bavisetti Narayan <72156168+NarayanBavisetti@users.noreply.github.com>
133 lines
4.6 KiB
Python
133 lines
4.6 KiB
Python
# Django imports
|
|
from django.db import IntegrityError
|
|
|
|
# Third party imports
|
|
from rest_framework import status
|
|
from rest_framework.response import Response
|
|
|
|
# Module imports
|
|
from plane.db.models import Webhook, WebhookLog, Workspace
|
|
from plane.db.models.webhook import generate_token
|
|
from ..base import BaseAPIView
|
|
from plane.app.permissions import allow_permission, ROLE
|
|
from plane.app.serializers import WebhookSerializer, WebhookLogSerializer
|
|
|
|
|
|
class WebhookEndpoint(BaseAPIView):
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def post(self, request, slug):
|
|
workspace = Workspace.objects.get(slug=slug)
|
|
try:
|
|
serializer = WebhookSerializer(
|
|
data=request.data, context={"request": request}
|
|
)
|
|
if serializer.is_valid():
|
|
serializer.save(workspace_id=workspace.id)
|
|
return Response(
|
|
serializer.data, status=status.HTTP_201_CREATED
|
|
)
|
|
return Response(
|
|
serializer.errors, status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
except IntegrityError as e:
|
|
if "already exists" in str(e):
|
|
return Response(
|
|
{"error": "URL already exists for the workspace"},
|
|
status=status.HTTP_410_GONE,
|
|
)
|
|
raise IntegrityError
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def get(self, request, slug, pk=None):
|
|
if pk is None:
|
|
webhooks = Webhook.objects.filter(workspace__slug=slug)
|
|
serializer = WebhookSerializer(
|
|
webhooks,
|
|
fields=(
|
|
"id",
|
|
"url",
|
|
"is_active",
|
|
"created_at",
|
|
"updated_at",
|
|
"project",
|
|
"issue",
|
|
"cycle",
|
|
"module",
|
|
"issue_comment",
|
|
),
|
|
many=True,
|
|
)
|
|
return Response(serializer.data, status=status.HTTP_200_OK)
|
|
else:
|
|
webhook = Webhook.objects.get(workspace__slug=slug, pk=pk)
|
|
serializer = WebhookSerializer(
|
|
webhook,
|
|
fields=(
|
|
"id",
|
|
"url",
|
|
"is_active",
|
|
"created_at",
|
|
"updated_at",
|
|
"project",
|
|
"issue",
|
|
"cycle",
|
|
"module",
|
|
"issue_comment",
|
|
),
|
|
)
|
|
return Response(serializer.data, status=status.HTTP_200_OK)
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def patch(self, request, slug, pk):
|
|
webhook = Webhook.objects.get(workspace__slug=slug, pk=pk)
|
|
serializer = WebhookSerializer(
|
|
webhook,
|
|
data=request.data,
|
|
context={request: request},
|
|
partial=True,
|
|
fields=(
|
|
"id",
|
|
"url",
|
|
"is_active",
|
|
"created_at",
|
|
"updated_at",
|
|
"project",
|
|
"issue",
|
|
"cycle",
|
|
"module",
|
|
"issue_comment",
|
|
),
|
|
)
|
|
if serializer.is_valid():
|
|
serializer.save()
|
|
return Response(serializer.data, status=status.HTTP_200_OK)
|
|
return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST)
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def delete(self, request, slug, pk):
|
|
webhook = Webhook.objects.get(pk=pk, workspace__slug=slug)
|
|
webhook.delete()
|
|
return Response(status=status.HTTP_204_NO_CONTENT)
|
|
|
|
|
|
class WebhookSecretRegenerateEndpoint(BaseAPIView):
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def post(self, request, slug, pk):
|
|
webhook = Webhook.objects.get(workspace__slug=slug, pk=pk)
|
|
webhook.secret_key = generate_token()
|
|
webhook.save()
|
|
serializer = WebhookSerializer(webhook)
|
|
return Response(serializer.data, status=status.HTTP_200_OK)
|
|
|
|
|
|
class WebhookLogsEndpoint(BaseAPIView):
|
|
|
|
@allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE")
|
|
def get(self, request, slug, webhook_id):
|
|
webhook_logs = WebhookLog.objects.filter(
|
|
workspace__slug=slug, webhook_id=webhook_id
|
|
)
|
|
serializer = WebhookLogSerializer(webhook_logs, many=True)
|
|
return Response(serializer.data, status=status.HTTP_200_OK)
|