0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2024-12-30 20:33:54 -05:00

refactor(schemas): add alteration script for tenant organizations

This commit is contained in:
Gao Sun 2023-12-14 17:25:17 +08:00
parent f5812b689d
commit 3e3fa20241
No known key found for this signature in database
GPG key ID: 13EBE123E4773688
3 changed files with 302 additions and 4 deletions

View file

@ -132,7 +132,7 @@ jobs:
# ** Setup up-to-date databases and compare (test `up`) ** # ** Setup up-to-date databases and compare (test `up`) **
- name: Setup fresh database - name: Setup fresh database
working-directory: ./fresh working-directory: ./fresh
run: pnpm cli db seed run: pnpm cli db seed --test
env: env:
DB_URL: postgres://postgres:postgres@localhost:5432/fresh DB_URL: postgres://postgres:postgres@localhost:5432/fresh
@ -140,7 +140,7 @@ jobs:
working-directory: ./alteration working-directory: ./alteration
run: | run: |
cd packages/cli cd packages/cli
pnpm start db seed pnpm start db seed --test
env: env:
DB_URL: postgres://postgres:postgres@localhost:5432/alteration DB_URL: postgres://postgres:postgres@localhost:5432/alteration
@ -161,7 +161,7 @@ jobs:
working-directory: ./alteration working-directory: ./alteration
run: | run: |
cd packages/cli cd packages/cli
pnpm start db seed pnpm start db seed --test
env: env:
DB_URL: postgres://postgres:postgres@localhost:5432/old DB_URL: postgres://postgres:postgres@localhost:5432/old

View file

@ -0,0 +1,298 @@
/**
* @fileoverview A preparation for the update of using organizations to manage tenants in the admin
* tenant. This script will do the following in the admin tenant:
*
* 1. Disable registration.
* 2. Create organization template roles and scopes.
* 3. Create organizations for existing tenants.
* 4. Add membership records and assign organization roles to existing users.
* 5. Create machine-to-machine Management API role for each tenant.
* 6. Create the corresponding machine-to-machine app for each tenant, and assign the Management API role to it.
*
* The `down` script will revert the changes.
*/
import { ConsoleLog, generateStandardId } from '@logto/shared';
import { sql } from 'slonik';
import { type AlterationScript } from '../lib/types/alteration.js';
const adminTenantId = 'admin';
const consoleLog = new ConsoleLog();
const alteration: AlterationScript = {
up: async (transaction) => {
consoleLog.info('=== Sync tenant organizations ===');
consoleLog.info('Disable registration');
await transaction.query(sql`
update public.sign_in_experiences
set sign_in_mode = 'SignIn'
where tenant_id = ${adminTenantId};
`);
consoleLog.info('Create organization template roles and scopes');
await transaction.query(sql`
insert into public.organization_roles (id, tenant_id, name, description)
values
('owner', ${adminTenantId}, 'owner', 'Owner of the tenant, who has all permissions.'),
('admin', ${adminTenantId}, 'admin', 'Admin of the tenant, who has all permissions except deleting the tenant.'),
('member', ${adminTenantId}, 'member', 'Member of the tenant, who has limited permissions.');
`);
await transaction.query(sql`
insert into public.organization_scopes (id, tenant_id, name, description)
values
('read-tenant', ${adminTenantId}, 'read:tenant', 'Read the tenant data.'),
('write-tenant', ${adminTenantId}, 'write:tenant', 'Write the tenant data, including creating and updating the tenant.'),
('delete-tenant', ${adminTenantId}, 'delete:tenant', 'Delete data of the tenant.'),
('invite-member', ${adminTenantId}, 'invite:member', 'Invite members to the tenant.'),
('remove-member', ${adminTenantId}, 'remove:member', 'Remove members from the tenant.'),
('update-member-role', ${adminTenantId}, 'update:member:role', 'Update the role of a member in the tenant.'),
('manage-tenant', ${adminTenantId}, 'manage:tenant', 'Manage the tenant settings, including name, billing, etc.');
`);
await transaction.query(sql`
insert into public.organization_role_scope_relations (tenant_id, organization_role_id, organization_scope_id)
values
(${adminTenantId}, 'owner', 'read-tenant'),
(${adminTenantId}, 'owner', 'write-tenant'),
(${adminTenantId}, 'owner', 'delete-tenant'),
(${adminTenantId}, 'owner', 'invite-member'),
(${adminTenantId}, 'owner', 'remove-member'),
(${adminTenantId}, 'owner', 'update-member-role'),
(${adminTenantId}, 'owner', 'manage-tenant'),
(${adminTenantId}, 'admin', 'read-tenant'),
(${adminTenantId}, 'admin', 'write-tenant'),
(${adminTenantId}, 'admin', 'delete-tenant'),
(${adminTenantId}, 'admin', 'invite-member'),
(${adminTenantId}, 'admin', 'remove-member'),
(${adminTenantId}, 'admin', 'update-member-role'),
(${adminTenantId}, 'member', 'read-tenant'),
(${adminTenantId}, 'member', 'write-tenant'),
(${adminTenantId}, 'member', 'invite-member')
`);
consoleLog.info('Create organizations for existing tenants');
const tenants = await transaction.any<{ id: string }>(sql`
select id
from public.tenants;
`);
await transaction.query(sql`
insert into public.organizations (id, tenant_id, name)
values
${sql.join(
tenants.map(
(tenant) => sql`(${`t-${tenant.id}`}, ${adminTenantId}, ${`Tenant ${tenant.id}`})`
),
sql`, `
)};
`);
consoleLog.info('Add membership records and assign organization roles to existing users');
const usersRoles = await transaction.any<{ userId: string; roleName: string }>(sql`
select
public.users.id as "userId",
public.roles.name as "roleName"
from public.users
join public.users_roles on public.users_roles.user_id = public.users.id
join public.roles on public.roles.id = public.users_roles.role_id
where public.roles.tenant_id = ${adminTenantId}
and public.roles.name like '%:admin';
`);
// Add membership records
await transaction.query(sql`
insert into public.organization_user_relations (tenant_id, organization_id, user_id)
values
${sql.join(
usersRoles.map(
(userRole) =>
sql`(${adminTenantId}, ${`t-${userRole.roleName.slice(0, -6)}`}, ${userRole.userId})`
),
sql`, `
)};
`);
// We treat all existing users as the owner of the tenant
await transaction.query(sql`
insert into public.organization_role_user_relations (tenant_id, organization_id, user_id, organization_role_id)
values
${sql.join(
usersRoles.map(
(userRole) =>
sql`
(
${adminTenantId},
${`t-${userRole.roleName.slice(0, -6)}`},
${userRole.userId},
'owner'
)
`
),
sql`, `
)};
`);
consoleLog.info('Create machine-to-machine Management API role for each tenant');
await transaction.query(sql`
insert into public.roles (id, tenant_id, name, description, type)
values
${sql.join(
tenants.map(
(tenant) =>
sql`
(
${`m-${tenant.id}`},
${adminTenantId},
${`machine:mapi:${tenant.id}`},
${`Machine-to-machine role for accessing Management API of tenant '${tenant.id}'.`},
'MachineToMachine'
)
`
),
sql`, `
)};
`);
const managementApiScopes = await transaction.any<{ id: string; indicator: string }>(sql`
select public.scopes.id, public.resources.indicator
from public.resources
join public.scopes on public.scopes.resource_id = public.resources.id
where public.resources.indicator like 'https://%.logto.app/api'
and public.scopes.name = 'all'
and public.resources.tenant_id = ${adminTenantId};
`);
const assertScopeId = (forTenantId: string) => {
const scope = managementApiScopes.find(
(scope) => scope.indicator === `https://${forTenantId}.logto.app/api`
);
if (!scope) {
throw new Error(`Cannot find Management API scope for tenant '${forTenantId}'.`);
}
return scope.id;
};
// Insert role - scope relations
await transaction.query(sql`
insert into public.roles_scopes (tenant_id, id, role_id, scope_id)
values
${sql.join(
tenants.map(
(tenant) =>
sql`
(
${adminTenantId},
${generateStandardId()},
${`m-${tenant.id}`},
${assertScopeId(tenant.id)}
)
`
),
sql`, `
)};
`);
consoleLog.info(
'Create the corresponding machine-to-machine app for each tenant, and assign the Management API role to it'
);
await transaction.query(sql`
insert into public.applications (id, tenant_id, secret, name, description, type, oidc_client_metadata)
values
${sql.join(
tenants.map(
(tenant) =>
sql`
(
${`m-${tenant.id}`},
${adminTenantId},
${generateStandardId(32)},
${`Management API access for ${tenant.id}`},
${`Machine-to-machine app for accessing Management API of tenant '${tenant.id}'.`},
'MachineToMachine',
${sql.jsonb({
redirectUris: [],
postLogoutRedirectUris: [],
})}
)
`
),
sql`, `
)};
`);
await transaction.query(sql`
insert into public.applications_roles (tenant_id, id, application_id, role_id)
values
${sql.join(
tenants.map(
(tenant) =>
sql`
(
${adminTenantId},
${generateStandardId()},
${`m-${tenant.id}`},
${`m-${tenant.id}`}
)
`
),
sql`, `
)};
`);
consoleLog.info('=== Sync tenant organizations done ===');
},
down: async (transaction) => {
consoleLog.info('=== Revert sync tenant organizations ===');
consoleLog.info('Remove machine-to-machine apps');
await transaction.query(sql`
delete from public.applications
where public.applications.tenant_id = ${adminTenantId}
and public.applications.id like 'm-%';
`);
consoleLog.info('Remove machine-to-machine roles');
await transaction.query(sql`
delete from public.roles
where public.roles.tenant_id = ${adminTenantId}
and public.roles.id like 'm-%';
`);
consoleLog.info('Remove organizations');
await transaction.query(sql`
delete from public.organizations
where public.organizations.tenant_id = ${adminTenantId}
and public.organizations.id like 't-%';
`);
consoleLog.info('Remove organization roles');
await transaction.query(sql`
delete from public.organization_roles
where public.organization_roles.tenant_id = ${adminTenantId}
and public.organization_roles.id in ('owner', 'admin', 'member');
`);
consoleLog.info('Remove organization scopes');
await transaction.query(sql`
delete from public.organization_scopes
where public.organization_scopes.tenant_id = ${adminTenantId}
and public.organization_scopes.id in (
'read-tenant',
'write-tenant',
'delete-tenant',
'invite-member',
'remove-member',
'update-member-role',
'manage-tenant'
);
`);
consoleLog.info('Enable registration');
await transaction.query(sql`
update public.sign_in_experiences
set sign_in_mode = 'SignInAndRegister'
where tenant_id = ${adminTenantId};
`);
consoleLog.info('=== Revert sync tenant organizations done ===');
},
};
export default alteration;

View file

@ -61,7 +61,7 @@ export const createTenantMachineToMachineApplication = (
}, },
}); });
/** Create role for "tenant application (M2M)" in admin tenant */ /** Create an entry to assign a role to an application in the admin tenant. */
export const createAdminTenantApplicationRole = ( export const createAdminTenantApplicationRole = (
applicationId: string, applicationId: string,
roleId: string roleId: string