You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363
  1. import enum
  2. import json
  3. from datetime import datetime
  4. from typing import Any, Optional
  5. import sqlalchemy as sa
  6. from flask_login import UserMixin # type: ignore[import-untyped]
  7. from sqlalchemy import DateTime, String, func, select
  8. from sqlalchemy.orm import Mapped, Session, mapped_column, reconstructor
  9. from typing_extensions import deprecated
  10. from models.base import Base
  11. from .engine import db
  12. from .types import StringUUID
  13. class TenantAccountRole(enum.StrEnum):
  14. OWNER = "owner"
  15. ADMIN = "admin"
  16. EDITOR = "editor"
  17. NORMAL = "normal"
  18. DATASET_OPERATOR = "dataset_operator"
  19. @staticmethod
  20. def is_valid_role(role: str) -> bool:
  21. if not role:
  22. return False
  23. return role in {
  24. TenantAccountRole.OWNER,
  25. TenantAccountRole.ADMIN,
  26. TenantAccountRole.EDITOR,
  27. TenantAccountRole.NORMAL,
  28. TenantAccountRole.DATASET_OPERATOR,
  29. }
  30. @staticmethod
  31. def is_privileged_role(role: Optional["TenantAccountRole"]) -> bool:
  32. if not role:
  33. return False
  34. return role in {TenantAccountRole.OWNER, TenantAccountRole.ADMIN}
  35. @staticmethod
  36. def is_admin_role(role: Optional["TenantAccountRole"]) -> bool:
  37. if not role:
  38. return False
  39. return role == TenantAccountRole.ADMIN
  40. @staticmethod
  41. def is_non_owner_role(role: Optional["TenantAccountRole"]) -> bool:
  42. if not role:
  43. return False
  44. return role in {
  45. TenantAccountRole.ADMIN,
  46. TenantAccountRole.EDITOR,
  47. TenantAccountRole.NORMAL,
  48. TenantAccountRole.DATASET_OPERATOR,
  49. }
  50. @staticmethod
  51. def is_editing_role(role: Optional["TenantAccountRole"]) -> bool:
  52. if not role:
  53. return False
  54. return role in {TenantAccountRole.OWNER, TenantAccountRole.ADMIN, TenantAccountRole.EDITOR}
  55. @staticmethod
  56. def is_dataset_edit_role(role: Optional["TenantAccountRole"]) -> bool:
  57. if not role:
  58. return False
  59. return role in {
  60. TenantAccountRole.OWNER,
  61. TenantAccountRole.ADMIN,
  62. TenantAccountRole.EDITOR,
  63. TenantAccountRole.DATASET_OPERATOR,
  64. }
  65. class AccountStatus(enum.StrEnum):
  66. PENDING = "pending"
  67. UNINITIALIZED = "uninitialized"
  68. ACTIVE = "active"
  69. BANNED = "banned"
  70. CLOSED = "closed"
  71. class Account(UserMixin, Base):
  72. __tablename__ = "accounts"
  73. __table_args__ = (sa.PrimaryKeyConstraint("id", name="account_pkey"), sa.Index("account_email_idx", "email"))
  74. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  75. name: Mapped[str] = mapped_column(String(255))
  76. email: Mapped[str] = mapped_column(String(255))
  77. password: Mapped[str | None] = mapped_column(String(255))
  78. password_salt: Mapped[str | None] = mapped_column(String(255))
  79. avatar: Mapped[str | None] = mapped_column(String(255), nullable=True)
  80. interface_language: Mapped[str | None] = mapped_column(String(255))
  81. interface_theme: Mapped[str | None] = mapped_column(String(255), nullable=True)
  82. timezone: Mapped[str | None] = mapped_column(String(255))
  83. last_login_at: Mapped[datetime | None] = mapped_column(DateTime, nullable=True)
  84. last_login_ip: Mapped[str | None] = mapped_column(String(255), nullable=True)
  85. last_active_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp(), nullable=False)
  86. status: Mapped[str] = mapped_column(String(16), server_default=sa.text("'active'::character varying"))
  87. initialized_at: Mapped[datetime | None] = mapped_column(DateTime, nullable=True)
  88. created_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp(), nullable=False)
  89. updated_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp(), nullable=False)
  90. @reconstructor
  91. def init_on_load(self):
  92. self.role: TenantAccountRole | None = None
  93. self._current_tenant: Tenant | None = None
  94. @property
  95. def is_password_set(self):
  96. return self.password is not None
  97. @property
  98. def current_tenant(self):
  99. return self._current_tenant
  100. @current_tenant.setter
  101. def current_tenant(self, tenant: "Tenant"):
  102. with Session(db.engine, expire_on_commit=False) as session:
  103. tenant_join_query = select(TenantAccountJoin).where(
  104. TenantAccountJoin.tenant_id == tenant.id, TenantAccountJoin.account_id == self.id
  105. )
  106. tenant_join = session.scalar(tenant_join_query)
  107. tenant_query = select(Tenant).where(Tenant.id == tenant.id)
  108. # TODO: A workaround to reload the tenant with `expire_on_commit=False`, allowing
  109. # access to it after the session has been closed.
  110. # This prevents `DetachedInstanceError` when accessing the tenant outside
  111. # the session's lifecycle.
  112. # (The `tenant` argument is typically loaded by `db.session` without the
  113. # `expire_on_commit=False` flag, meaning its lifetime is tied to the web
  114. # request's lifecycle.)
  115. tenant_reloaded = session.scalars(tenant_query).one()
  116. if tenant_join:
  117. self.role = TenantAccountRole(tenant_join.role)
  118. self._current_tenant = tenant_reloaded
  119. return
  120. self._current_tenant = None
  121. @property
  122. def current_tenant_id(self) -> str | None:
  123. return self._current_tenant.id if self._current_tenant else None
  124. def set_tenant_id(self, tenant_id: str):
  125. query = (
  126. select(Tenant, TenantAccountJoin)
  127. .where(Tenant.id == tenant_id)
  128. .where(TenantAccountJoin.tenant_id == Tenant.id)
  129. .where(TenantAccountJoin.account_id == self.id)
  130. )
  131. with Session(db.engine, expire_on_commit=False) as session:
  132. tenant_account_join = session.execute(query).first()
  133. if not tenant_account_join:
  134. return
  135. tenant, join = tenant_account_join
  136. self.role = TenantAccountRole(join.role)
  137. self._current_tenant = tenant
  138. @property
  139. def current_role(self):
  140. return self.role
  141. def get_status(self) -> AccountStatus:
  142. status_str = self.status
  143. return AccountStatus(status_str)
  144. @classmethod
  145. def get_by_openid(cls, provider: str, open_id: str):
  146. account_integrate = (
  147. db.session.query(AccountIntegrate)
  148. .where(AccountIntegrate.provider == provider, AccountIntegrate.open_id == open_id)
  149. .one_or_none()
  150. )
  151. if account_integrate:
  152. return db.session.query(Account).where(Account.id == account_integrate.account_id).one_or_none()
  153. return None
  154. # check current_user.current_tenant.current_role in ['admin', 'owner']
  155. @property
  156. def is_admin_or_owner(self):
  157. return TenantAccountRole.is_privileged_role(self.role)
  158. @property
  159. def is_admin(self):
  160. return TenantAccountRole.is_admin_role(self.role)
  161. @property
  162. @deprecated("Use has_edit_permission instead.")
  163. def is_editor(self):
  164. """Determines if the account has edit permissions in their current tenant (workspace).
  165. This property checks if the current role has editing privileges, which includes:
  166. - `OWNER`
  167. - `ADMIN`
  168. - `EDITOR`
  169. Note: This checks for any role with editing permission, not just the 'EDITOR' role specifically.
  170. """
  171. return self.has_edit_permission
  172. @property
  173. def has_edit_permission(self):
  174. """Determines if the account has editing permissions in their current tenant (workspace).
  175. This property checks if the current role has editing privileges, which includes:
  176. - `OWNER`
  177. - `ADMIN`
  178. - `EDITOR`
  179. """
  180. return TenantAccountRole.is_editing_role(self.role)
  181. @property
  182. def is_dataset_editor(self):
  183. return TenantAccountRole.is_dataset_edit_role(self.role)
  184. @property
  185. def is_dataset_operator(self):
  186. return self.role == TenantAccountRole.DATASET_OPERATOR
  187. class TenantStatus(enum.StrEnum):
  188. NORMAL = "normal"
  189. ARCHIVE = "archive"
  190. class Tenant(Base):
  191. __tablename__ = "tenants"
  192. __table_args__ = (sa.PrimaryKeyConstraint("id", name="tenant_pkey"),)
  193. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  194. name: Mapped[str] = mapped_column(String(255))
  195. encrypt_public_key: Mapped[str | None] = mapped_column(sa.Text)
  196. plan: Mapped[str] = mapped_column(String(255), server_default=sa.text("'basic'::character varying"))
  197. status: Mapped[str] = mapped_column(String(255), server_default=sa.text("'normal'::character varying"))
  198. custom_config: Mapped[str | None] = mapped_column(sa.Text)
  199. created_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp(), nullable=False)
  200. updated_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp())
  201. def get_accounts(self) -> list[Account]:
  202. return list(
  203. db.session.scalars(
  204. select(Account).where(
  205. Account.id == TenantAccountJoin.account_id, TenantAccountJoin.tenant_id == self.id
  206. )
  207. ).all()
  208. )
  209. @property
  210. def custom_config_dict(self) -> dict[str, Any]:
  211. return json.loads(self.custom_config) if self.custom_config else {}
  212. @custom_config_dict.setter
  213. def custom_config_dict(self, value: dict[str, Any]) -> None:
  214. self.custom_config = json.dumps(value)
  215. class TenantAccountJoin(Base):
  216. __tablename__ = "tenant_account_joins"
  217. __table_args__ = (
  218. sa.PrimaryKeyConstraint("id", name="tenant_account_join_pkey"),
  219. sa.Index("tenant_account_join_account_id_idx", "account_id"),
  220. sa.Index("tenant_account_join_tenant_id_idx", "tenant_id"),
  221. sa.UniqueConstraint("tenant_id", "account_id", name="unique_tenant_account_join"),
  222. )
  223. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  224. tenant_id: Mapped[str] = mapped_column(StringUUID)
  225. account_id: Mapped[str] = mapped_column(StringUUID)
  226. current: Mapped[bool] = mapped_column(sa.Boolean, server_default=sa.text("false"))
  227. role: Mapped[str] = mapped_column(String(16), server_default="normal")
  228. invited_by: Mapped[str | None] = mapped_column(StringUUID)
  229. created_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp())
  230. updated_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp())
  231. class AccountIntegrate(Base):
  232. __tablename__ = "account_integrates"
  233. __table_args__ = (
  234. sa.PrimaryKeyConstraint("id", name="account_integrate_pkey"),
  235. sa.UniqueConstraint("account_id", "provider", name="unique_account_provider"),
  236. sa.UniqueConstraint("provider", "open_id", name="unique_provider_open_id"),
  237. )
  238. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  239. account_id: Mapped[str] = mapped_column(StringUUID)
  240. provider: Mapped[str] = mapped_column(String(16))
  241. open_id: Mapped[str] = mapped_column(String(255))
  242. encrypted_token: Mapped[str] = mapped_column(String(255))
  243. created_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp())
  244. updated_at: Mapped[datetime] = mapped_column(DateTime, server_default=func.current_timestamp())
  245. class InvitationCode(Base):
  246. __tablename__ = "invitation_codes"
  247. __table_args__ = (
  248. sa.PrimaryKeyConstraint("id", name="invitation_code_pkey"),
  249. sa.Index("invitation_codes_batch_idx", "batch"),
  250. sa.Index("invitation_codes_code_idx", "code", "status"),
  251. )
  252. id: Mapped[int] = mapped_column(sa.Integer)
  253. batch: Mapped[str] = mapped_column(String(255))
  254. code: Mapped[str] = mapped_column(String(32))
  255. status: Mapped[str] = mapped_column(String(16), server_default=sa.text("'unused'::character varying"))
  256. used_at: Mapped[datetime | None] = mapped_column(DateTime)
  257. used_by_tenant_id: Mapped[str | None] = mapped_column(StringUUID)
  258. used_by_account_id: Mapped[str | None] = mapped_column(StringUUID)
  259. deprecated_at: Mapped[datetime | None] = mapped_column(DateTime, nullable=True)
  260. created_at: Mapped[datetime] = mapped_column(DateTime, server_default=sa.text("CURRENT_TIMESTAMP(0)"))
  261. class TenantPluginPermission(Base):
  262. class InstallPermission(enum.StrEnum):
  263. EVERYONE = "everyone"
  264. ADMINS = "admins"
  265. NOBODY = "noone"
  266. class DebugPermission(enum.StrEnum):
  267. EVERYONE = "everyone"
  268. ADMINS = "admins"
  269. NOBODY = "noone"
  270. __tablename__ = "account_plugin_permissions"
  271. __table_args__ = (
  272. sa.PrimaryKeyConstraint("id", name="account_plugin_permission_pkey"),
  273. sa.UniqueConstraint("tenant_id", name="unique_tenant_plugin"),
  274. )
  275. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  276. tenant_id: Mapped[str] = mapped_column(StringUUID, nullable=False)
  277. install_permission: Mapped[InstallPermission] = mapped_column(String(16), nullable=False, server_default="everyone")
  278. debug_permission: Mapped[DebugPermission] = mapped_column(String(16), nullable=False, server_default="noone")
  279. class TenantPluginAutoUpgradeStrategy(Base):
  280. class StrategySetting(enum.StrEnum):
  281. DISABLED = "disabled"
  282. FIX_ONLY = "fix_only"
  283. LATEST = "latest"
  284. class UpgradeMode(enum.StrEnum):
  285. ALL = "all"
  286. PARTIAL = "partial"
  287. EXCLUDE = "exclude"
  288. __tablename__ = "tenant_plugin_auto_upgrade_strategies"
  289. __table_args__ = (
  290. sa.PrimaryKeyConstraint("id", name="tenant_plugin_auto_upgrade_strategy_pkey"),
  291. sa.UniqueConstraint("tenant_id", name="unique_tenant_plugin_auto_upgrade_strategy"),
  292. )
  293. id: Mapped[str] = mapped_column(StringUUID, server_default=sa.text("uuid_generate_v4()"))
  294. tenant_id: Mapped[str] = mapped_column(StringUUID, nullable=False)
  295. strategy_setting: Mapped[StrategySetting] = mapped_column(String(16), nullable=False, server_default="fix_only")
  296. upgrade_time_of_day: Mapped[int] = mapped_column(sa.Integer, nullable=False, default=0) # seconds of the day
  297. upgrade_mode: Mapped[UpgradeMode] = mapped_column(String(16), nullable=False, server_default="exclude")
  298. exclude_plugins: Mapped[list[str]] = mapped_column(sa.ARRAY(String(255)), nullable=False) # plugin_id (author/name)
  299. include_plugins: Mapped[list[str]] = mapped_column(sa.ARRAY(String(255)), nullable=False) # plugin_id (author/name)
  300. created_at: Mapped[datetime] = mapped_column(DateTime, nullable=False, server_default=func.current_timestamp())
  301. updated_at: Mapped[datetime] = mapped_column(DateTime, nullable=False, server_default=func.current_timestamp())