0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2025-03-31 22:51:25 -05:00

fix(schemas): specify function db schema of check_role_type ()

fix(schemas): specify db schema of function check_role_type
This commit is contained in:
Darcy Ye 2023-09-11 16:58:17 +08:00 committed by GitHub
parent 371f8bd782
commit 9f6fc6100d
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 58 additions and 4 deletions

View file

@ -0,0 +1,54 @@
import { sql } from 'slonik';
import type { AlterationScript } from '../lib/types/alteration.js';
/**
* This alteration is a fix on `check_role_type` function, since this function could be called by
* cloud (at the time the DB schema is `cloud` and can not find `public` functions/tables).
*
* As a result, we need to specify the function to be with `public` schema.
*/
const alteration: AlterationScript = {
up: async (pool) => {
await pool.query(
sql`alter table applications_roles drop constraint applications_roles__role_type;`
);
await pool.query(sql`alter table users_roles drop constraint users_roles__role_type;`);
await pool.query(sql`drop function check_role_type;`);
await pool.query(sql`
create function public.check_role_type(role_id varchar(21), target_type role_type) returns boolean as
$$ begin
return (select type from public.roles where id = role_id) = target_type;
end; $$ language plpgsql;
`);
await pool.query(sql`
alter table users_roles add constraint users_roles__role_type
check (public.check_role_type(role_id, 'User'));
`);
await pool.query(
sql`alter table applications_roles add constraint applications_roles__role_type check (public.check_role_type(role_id, 'MachineToMachine'));`
);
},
down: async (pool) => {
await pool.query(
sql`alter table applications_roles drop constraint applications_roles__role_type;`
);
await pool.query(sql`alter table users_roles drop constraint users_roles__role_type;`);
await pool.query(sql`drop function public.check_role_type;`);
await pool.query(sql`
create function check_role_type(role_id varchar(21), target_type role_type) returns boolean as
$$ begin
return (select type from roles where id = role_id) = target_type;
end; $$ language plpgsql;
`);
await pool.query(sql`
alter table users_roles add constraint users_roles__role_type
check (check_role_type(role_id, 'User'));
`);
await pool.query(
sql`alter table applications_roles add constraint applications_roles__role_type check (check_role_type(role_id, 'MachineToMachine'));`
);
},
};
export default alteration;

View file

@ -12,7 +12,7 @@ create table applications_roles (
constraint applications_roles__application_id_role_id
unique (tenant_id, application_id, role_id),
constraint applications_roles__role_type
check (check_role_type(role_id, 'MachineToMachine'))
check (public.check_role_type(role_id, 'MachineToMachine'))
);
create index applications_roles__id

View file

@ -17,7 +17,7 @@ create table roles (
create index roles__id
on roles (tenant_id, id);
create function check_role_type(role_id varchar(21), target_type role_type) returns boolean as
create function public.check_role_type(role_id varchar(21), target_type role_type) returns boolean as
$$ begin
return (select type from roles where id = role_id) = target_type;
return (select type from public.roles where id = role_id) = target_type;
end; $$ language plpgsql;

View file

@ -12,7 +12,7 @@ create table users_roles (
constraint users_roles__user_id_role_id
unique (tenant_id, user_id, role_id),
constraint users_roles__role_type
check (check_role_type(role_id, 'User'))
check (public.check_role_type(role_id, 'User'))
);
create index users_roles__id