mirror of
https://github.com/logto-io/logto.git
synced 2024-12-30 20:33:54 -05:00
refactor(schemas): add alteration script for tenant organizations
This commit is contained in:
parent
f5812b689d
commit
3e3fa20241
3 changed files with 302 additions and 4 deletions
6
.github/workflows/main.yml
vendored
6
.github/workflows/main.yml
vendored
|
@ -132,7 +132,7 @@ jobs:
|
|||
# ** Setup up-to-date databases and compare (test `up`) **
|
||||
- name: Setup fresh database
|
||||
working-directory: ./fresh
|
||||
run: pnpm cli db seed
|
||||
run: pnpm cli db seed --test
|
||||
env:
|
||||
DB_URL: postgres://postgres:postgres@localhost:5432/fresh
|
||||
|
||||
|
@ -140,7 +140,7 @@ jobs:
|
|||
working-directory: ./alteration
|
||||
run: |
|
||||
cd packages/cli
|
||||
pnpm start db seed
|
||||
pnpm start db seed --test
|
||||
env:
|
||||
DB_URL: postgres://postgres:postgres@localhost:5432/alteration
|
||||
|
||||
|
@ -161,7 +161,7 @@ jobs:
|
|||
working-directory: ./alteration
|
||||
run: |
|
||||
cd packages/cli
|
||||
pnpm start db seed
|
||||
pnpm start db seed --test
|
||||
env:
|
||||
DB_URL: postgres://postgres:postgres@localhost:5432/old
|
||||
|
||||
|
|
298
packages/schemas/alterations/next-1702544178-sync-tenant-orgs.ts
Normal file
298
packages/schemas/alterations/next-1702544178-sync-tenant-orgs.ts
Normal file
|
@ -0,0 +1,298 @@
|
|||
/**
|
||||
* @fileoverview A preparation for the update of using organizations to manage tenants in the admin
|
||||
* tenant. This script will do the following in the admin tenant:
|
||||
*
|
||||
* 1. Disable registration.
|
||||
* 2. Create organization template roles and scopes.
|
||||
* 3. Create organizations for existing tenants.
|
||||
* 4. Add membership records and assign organization roles to existing users.
|
||||
* 5. Create machine-to-machine Management API role for each tenant.
|
||||
* 6. Create the corresponding machine-to-machine app for each tenant, and assign the Management API role to it.
|
||||
*
|
||||
* The `down` script will revert the changes.
|
||||
*/
|
||||
|
||||
import { ConsoleLog, generateStandardId } from '@logto/shared';
|
||||
import { sql } from 'slonik';
|
||||
|
||||
import { type AlterationScript } from '../lib/types/alteration.js';
|
||||
|
||||
const adminTenantId = 'admin';
|
||||
const consoleLog = new ConsoleLog();
|
||||
|
||||
const alteration: AlterationScript = {
|
||||
up: async (transaction) => {
|
||||
consoleLog.info('=== Sync tenant organizations ===');
|
||||
consoleLog.info('Disable registration');
|
||||
await transaction.query(sql`
|
||||
update public.sign_in_experiences
|
||||
set sign_in_mode = 'SignIn'
|
||||
where tenant_id = ${adminTenantId};
|
||||
`);
|
||||
|
||||
consoleLog.info('Create organization template roles and scopes');
|
||||
await transaction.query(sql`
|
||||
insert into public.organization_roles (id, tenant_id, name, description)
|
||||
values
|
||||
('owner', ${adminTenantId}, 'owner', 'Owner of the tenant, who has all permissions.'),
|
||||
('admin', ${adminTenantId}, 'admin', 'Admin of the tenant, who has all permissions except deleting the tenant.'),
|
||||
('member', ${adminTenantId}, 'member', 'Member of the tenant, who has limited permissions.');
|
||||
`);
|
||||
await transaction.query(sql`
|
||||
insert into public.organization_scopes (id, tenant_id, name, description)
|
||||
values
|
||||
('read-tenant', ${adminTenantId}, 'read:tenant', 'Read the tenant data.'),
|
||||
('write-tenant', ${adminTenantId}, 'write:tenant', 'Write the tenant data, including creating and updating the tenant.'),
|
||||
('delete-tenant', ${adminTenantId}, 'delete:tenant', 'Delete data of the tenant.'),
|
||||
('invite-member', ${adminTenantId}, 'invite:member', 'Invite members to the tenant.'),
|
||||
('remove-member', ${adminTenantId}, 'remove:member', 'Remove members from the tenant.'),
|
||||
('update-member-role', ${adminTenantId}, 'update:member:role', 'Update the role of a member in the tenant.'),
|
||||
('manage-tenant', ${adminTenantId}, 'manage:tenant', 'Manage the tenant settings, including name, billing, etc.');
|
||||
`);
|
||||
await transaction.query(sql`
|
||||
insert into public.organization_role_scope_relations (tenant_id, organization_role_id, organization_scope_id)
|
||||
values
|
||||
(${adminTenantId}, 'owner', 'read-tenant'),
|
||||
(${adminTenantId}, 'owner', 'write-tenant'),
|
||||
(${adminTenantId}, 'owner', 'delete-tenant'),
|
||||
(${adminTenantId}, 'owner', 'invite-member'),
|
||||
(${adminTenantId}, 'owner', 'remove-member'),
|
||||
(${adminTenantId}, 'owner', 'update-member-role'),
|
||||
(${adminTenantId}, 'owner', 'manage-tenant'),
|
||||
(${adminTenantId}, 'admin', 'read-tenant'),
|
||||
(${adminTenantId}, 'admin', 'write-tenant'),
|
||||
(${adminTenantId}, 'admin', 'delete-tenant'),
|
||||
(${adminTenantId}, 'admin', 'invite-member'),
|
||||
(${adminTenantId}, 'admin', 'remove-member'),
|
||||
(${adminTenantId}, 'admin', 'update-member-role'),
|
||||
(${adminTenantId}, 'member', 'read-tenant'),
|
||||
(${adminTenantId}, 'member', 'write-tenant'),
|
||||
(${adminTenantId}, 'member', 'invite-member')
|
||||
`);
|
||||
|
||||
consoleLog.info('Create organizations for existing tenants');
|
||||
const tenants = await transaction.any<{ id: string }>(sql`
|
||||
select id
|
||||
from public.tenants;
|
||||
`);
|
||||
await transaction.query(sql`
|
||||
insert into public.organizations (id, tenant_id, name)
|
||||
values
|
||||
${sql.join(
|
||||
tenants.map(
|
||||
(tenant) => sql`(${`t-${tenant.id}`}, ${adminTenantId}, ${`Tenant ${tenant.id}`})`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
|
||||
consoleLog.info('Add membership records and assign organization roles to existing users');
|
||||
const usersRoles = await transaction.any<{ userId: string; roleName: string }>(sql`
|
||||
select
|
||||
public.users.id as "userId",
|
||||
public.roles.name as "roleName"
|
||||
from public.users
|
||||
join public.users_roles on public.users_roles.user_id = public.users.id
|
||||
join public.roles on public.roles.id = public.users_roles.role_id
|
||||
where public.roles.tenant_id = ${adminTenantId}
|
||||
and public.roles.name like '%:admin';
|
||||
`);
|
||||
|
||||
// Add membership records
|
||||
await transaction.query(sql`
|
||||
insert into public.organization_user_relations (tenant_id, organization_id, user_id)
|
||||
values
|
||||
${sql.join(
|
||||
usersRoles.map(
|
||||
(userRole) =>
|
||||
sql`(${adminTenantId}, ${`t-${userRole.roleName.slice(0, -6)}`}, ${userRole.userId})`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
// We treat all existing users as the owner of the tenant
|
||||
await transaction.query(sql`
|
||||
insert into public.organization_role_user_relations (tenant_id, organization_id, user_id, organization_role_id)
|
||||
values
|
||||
${sql.join(
|
||||
usersRoles.map(
|
||||
(userRole) =>
|
||||
sql`
|
||||
(
|
||||
${adminTenantId},
|
||||
${`t-${userRole.roleName.slice(0, -6)}`},
|
||||
${userRole.userId},
|
||||
'owner'
|
||||
)
|
||||
`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
|
||||
consoleLog.info('Create machine-to-machine Management API role for each tenant');
|
||||
await transaction.query(sql`
|
||||
insert into public.roles (id, tenant_id, name, description, type)
|
||||
values
|
||||
${sql.join(
|
||||
tenants.map(
|
||||
(tenant) =>
|
||||
sql`
|
||||
(
|
||||
${`m-${tenant.id}`},
|
||||
${adminTenantId},
|
||||
${`machine:mapi:${tenant.id}`},
|
||||
${`Machine-to-machine role for accessing Management API of tenant '${tenant.id}'.`},
|
||||
'MachineToMachine'
|
||||
)
|
||||
`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
|
||||
const managementApiScopes = await transaction.any<{ id: string; indicator: string }>(sql`
|
||||
select public.scopes.id, public.resources.indicator
|
||||
from public.resources
|
||||
join public.scopes on public.scopes.resource_id = public.resources.id
|
||||
where public.resources.indicator like 'https://%.logto.app/api'
|
||||
and public.scopes.name = 'all'
|
||||
and public.resources.tenant_id = ${adminTenantId};
|
||||
`);
|
||||
|
||||
const assertScopeId = (forTenantId: string) => {
|
||||
const scope = managementApiScopes.find(
|
||||
(scope) => scope.indicator === `https://${forTenantId}.logto.app/api`
|
||||
);
|
||||
if (!scope) {
|
||||
throw new Error(`Cannot find Management API scope for tenant '${forTenantId}'.`);
|
||||
}
|
||||
return scope.id;
|
||||
};
|
||||
|
||||
// Insert role - scope relations
|
||||
await transaction.query(sql`
|
||||
insert into public.roles_scopes (tenant_id, id, role_id, scope_id)
|
||||
values
|
||||
${sql.join(
|
||||
tenants.map(
|
||||
(tenant) =>
|
||||
sql`
|
||||
(
|
||||
${adminTenantId},
|
||||
${generateStandardId()},
|
||||
${`m-${tenant.id}`},
|
||||
${assertScopeId(tenant.id)}
|
||||
)
|
||||
`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
|
||||
consoleLog.info(
|
||||
'Create the corresponding machine-to-machine app for each tenant, and assign the Management API role to it'
|
||||
);
|
||||
await transaction.query(sql`
|
||||
insert into public.applications (id, tenant_id, secret, name, description, type, oidc_client_metadata)
|
||||
values
|
||||
${sql.join(
|
||||
tenants.map(
|
||||
(tenant) =>
|
||||
sql`
|
||||
(
|
||||
${`m-${tenant.id}`},
|
||||
${adminTenantId},
|
||||
${generateStandardId(32)},
|
||||
${`Management API access for ${tenant.id}`},
|
||||
${`Machine-to-machine app for accessing Management API of tenant '${tenant.id}'.`},
|
||||
'MachineToMachine',
|
||||
${sql.jsonb({
|
||||
redirectUris: [],
|
||||
postLogoutRedirectUris: [],
|
||||
})}
|
||||
)
|
||||
`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
await transaction.query(sql`
|
||||
insert into public.applications_roles (tenant_id, id, application_id, role_id)
|
||||
values
|
||||
${sql.join(
|
||||
tenants.map(
|
||||
(tenant) =>
|
||||
sql`
|
||||
(
|
||||
${adminTenantId},
|
||||
${generateStandardId()},
|
||||
${`m-${tenant.id}`},
|
||||
${`m-${tenant.id}`}
|
||||
)
|
||||
`
|
||||
),
|
||||
sql`, `
|
||||
)};
|
||||
`);
|
||||
|
||||
consoleLog.info('=== Sync tenant organizations done ===');
|
||||
},
|
||||
down: async (transaction) => {
|
||||
consoleLog.info('=== Revert sync tenant organizations ===');
|
||||
|
||||
consoleLog.info('Remove machine-to-machine apps');
|
||||
await transaction.query(sql`
|
||||
delete from public.applications
|
||||
where public.applications.tenant_id = ${adminTenantId}
|
||||
and public.applications.id like 'm-%';
|
||||
`);
|
||||
|
||||
consoleLog.info('Remove machine-to-machine roles');
|
||||
await transaction.query(sql`
|
||||
delete from public.roles
|
||||
where public.roles.tenant_id = ${adminTenantId}
|
||||
and public.roles.id like 'm-%';
|
||||
`);
|
||||
|
||||
consoleLog.info('Remove organizations');
|
||||
await transaction.query(sql`
|
||||
delete from public.organizations
|
||||
where public.organizations.tenant_id = ${adminTenantId}
|
||||
and public.organizations.id like 't-%';
|
||||
`);
|
||||
|
||||
consoleLog.info('Remove organization roles');
|
||||
await transaction.query(sql`
|
||||
delete from public.organization_roles
|
||||
where public.organization_roles.tenant_id = ${adminTenantId}
|
||||
and public.organization_roles.id in ('owner', 'admin', 'member');
|
||||
`);
|
||||
|
||||
consoleLog.info('Remove organization scopes');
|
||||
await transaction.query(sql`
|
||||
delete from public.organization_scopes
|
||||
where public.organization_scopes.tenant_id = ${adminTenantId}
|
||||
and public.organization_scopes.id in (
|
||||
'read-tenant',
|
||||
'write-tenant',
|
||||
'delete-tenant',
|
||||
'invite-member',
|
||||
'remove-member',
|
||||
'update-member-role',
|
||||
'manage-tenant'
|
||||
);
|
||||
`);
|
||||
|
||||
consoleLog.info('Enable registration');
|
||||
await transaction.query(sql`
|
||||
update public.sign_in_experiences
|
||||
set sign_in_mode = 'SignInAndRegister'
|
||||
where tenant_id = ${adminTenantId};
|
||||
`);
|
||||
|
||||
consoleLog.info('=== Revert sync tenant organizations done ===');
|
||||
},
|
||||
};
|
||||
|
||||
export default alteration;
|
|
@ -61,7 +61,7 @@ export const createTenantMachineToMachineApplication = (
|
|||
},
|
||||
});
|
||||
|
||||
/** Create role for "tenant application (M2M)" in admin tenant */
|
||||
/** Create an entry to assign a role to an application in the admin tenant. */
|
||||
export const createAdminTenantApplicationRole = (
|
||||
applicationId: string,
|
||||
roleId: string
|
||||
|
|
Loading…
Reference in a new issue