-
Notifications
You must be signed in to change notification settings - Fork 0
/
pipeline_group.go
88 lines (78 loc) · 2.91 KB
/
pipeline_group.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
package group
import (
"github.com/ovh/cds/engine/api/database"
"github.com/ovh/cds/sdk"
)
// LoadAllPipelineGroupByRole load all group for the given pipeline and role
func LoadAllPipelineGroupByRole(db database.Querier, pipelineID int64, role int) ([]sdk.GroupPermission, error) {
groupsPermission := []sdk.GroupPermission{}
query := `
SELECT pipeline_group.group_id, pipeline_group.role
FROM pipeline_group
JOIN pipeline ON pipeline_group.pipeline_id = pipeline.id
WHERE pipeline.id = $1 AND role = $2;
`
rows, err := db.Query(query, pipelineID, role)
if err != nil {
return nil, err
}
defer rows.Close()
for rows.Next() {
var gPermission sdk.GroupPermission
rows.Scan(&gPermission.Group.ID, &gPermission.Permission)
groupsPermission = append(groupsPermission, gPermission)
}
return groupsPermission, nil
}
// InsertGroupsInPipeline Link the given groups and the given pipeline
func InsertGroupsInPipeline(db database.Executer, groupPermission []sdk.GroupPermission, pipelineID int64) error {
for _, g := range groupPermission {
err := InsertGroupInPipeline(db, pipelineID, g.Group.ID, g.Permission)
if err != nil {
return err
}
}
return nil
}
// InsertGroupInPipeline add permissions on Pipeline to Group
func InsertGroupInPipeline(db database.Executer, pipelineID, groupID int64, role int) error {
query := `INSERT INTO pipeline_group (pipeline_id, group_id,role) VALUES($1,$2,$3)`
_, err := db.Exec(query, pipelineID, groupID, role)
return err
}
// UpdateGroupRoleInPipeline update permission on pipeline
func UpdateGroupRoleInPipeline(db database.Executer, pipelineID, groupID int64, role int) error {
query := `UPDATE pipeline_group SET role=$1 WHERE pipeline_id=$2 AND group_id=$3`
_, err := db.Exec(query, role, pipelineID, groupID)
return err
}
// DeleteGroupFromPipeline removes access to pipeline to group members
func DeleteGroupFromPipeline(db database.Executer, pipelineID, groupID int64) error {
query := `DELETE FROM pipeline_group WHERE pipeline_id=$1 AND group_id=$2`
_, err := db.Exec(query, pipelineID, groupID)
return err
}
// DeleteAllGroupFromPipeline Delete all groups from the given pipeline
func DeleteAllGroupFromPipeline(db database.Executer, pipelineID int64) error {
query := `DELETE FROM pipeline_group WHERE pipeline_id=$1 `
_, err := db.Exec(query, pipelineID)
return err
}
// CheckGroupInPipeline checks if group has access to pipeline
func CheckGroupInPipeline(db database.Querier, pipelineID, groupID int64) (bool, error) {
query := `SELECT COUNT(group_id) FROM pipeline_group WHERE pipeline_id = $1 AND group_id = $2`
var nb int64
err := db.QueryRow(query, pipelineID, groupID).Scan(&nb)
if err != nil {
return false, err
}
if nb != 0 {
return true, nil
}
return false, nil
}
func deleteGroupPipelineByGroup(db database.Executer, group *sdk.Group) error {
query := `DELETE FROM pipeline_group WHERE group_id=$1`
_, err := db.Exec(query, group.ID)
return err
}