feat: team permission refine (#4494) (#4498)

* feat: team permission refine (#4402)

* chore: team permission extend

* feat: manage team permission

* chore: api auth

* fix: i18n

* feat: add initv493

* fix: test, org auth manager

* test: app test for refined permission

* update init sh

* fix: add/remove manage permission (#4427)

* fix: add/remove manage permission

* fix: github action fastgpt-test

* fix: mock create model

* fix: team write permission

* fix: ts

* account permission

---------

Co-authored-by: Finley Ge <32237950+FinleyGe@users.noreply.github.com>
This commit is contained in:
Archer 2025-04-10 11:11:54 +08:00 committed by GitHub
parent 80f41dd2a9
commit 199f454b6b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
51 changed files with 1116 additions and 460 deletions

View File

@ -15,6 +15,9 @@ jobs:
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v4
with:
ref: ${{ github.event.pull_request.head.ref }}
repository: ${{ github.event.pull_request.head.repo.full_name }}
- uses: pnpm/action-setup@v4 - uses: pnpm/action-setup@v4
with: with:
version: 10 version: 10

View File

@ -12,21 +12,20 @@
"previewIcon": "node ./scripts/icon/index.js", "previewIcon": "node ./scripts/icon/index.js",
"api:gen": "tsc ./scripts/openapi/index.ts && node ./scripts/openapi/index.js && npx @redocly/cli build-docs ./scripts/openapi/openapi.json -o ./projects/app/public/openapi/index.html", "api:gen": "tsc ./scripts/openapi/index.ts && node ./scripts/openapi/index.js && npx @redocly/cli build-docs ./scripts/openapi/openapi.json -o ./projects/app/public/openapi/index.html",
"create:i18n": "node ./scripts/i18n/index.js", "create:i18n": "node ./scripts/i18n/index.js",
"test": "vitest run --exclude 'test/cases/spec'", "test": "vitest run",
"test:all": "vitest run",
"test:workflow": "vitest run workflow" "test:workflow": "vitest run workflow"
}, },
"devDependencies": { "devDependencies": {
"@chakra-ui/cli": "^2.4.1", "@chakra-ui/cli": "^2.4.1",
"@vitest/coverage-v8": "^3.0.2", "@vitest/coverage-v8": "^3.0.9",
"husky": "^8.0.3", "husky": "^8.0.3",
"i18next": "23.16.8", "i18next": "23.16.8",
"lint-staged": "^13.3.0", "lint-staged": "^13.3.0",
"next-i18next": "15.4.2", "next-i18next": "15.4.2",
"prettier": "3.2.4", "prettier": "3.2.4",
"react-i18next": "14.1.2", "react-i18next": "14.1.2",
"vitest": "^3.0.2", "vitest": "^3.0.9",
"vitest-mongodb": "^1.0.1", "mongodb-memory-server": "^10.1.4",
"zhlint": "^0.7.4" "zhlint": "^0.7.4"
}, },
"lint-staged": { "lint-staged": {

View File

@ -13,12 +13,15 @@ export type CollaboratorItemType = {
orgId: string; orgId: string;
}>; }>;
export type UpdateClbPermissionProps = { export type UpdateClbPermissionProps<addOnly = false> = {
members?: string[]; members?: string[];
groups?: string[]; groups?: string[];
orgs?: string[]; orgs?: string[];
permission: PermissionValueType; } & (addOnly extends true
}; ? {}
: {
permission: PermissionValueType;
});
export type DeletePermissionQuery = RequireOnlyOne<{ export type DeletePermissionQuery = RequireOnlyOne<{
tmbId?: string; tmbId?: string;

View File

@ -5,15 +5,16 @@ export type PerConstructPros = {
per?: PermissionValueType; per?: PermissionValueType;
isOwner?: boolean; isOwner?: boolean;
permissionList?: PermissionListType; permissionList?: PermissionListType;
childUpdatePermissionCallback?: () => void;
}; };
// the Permission helper class // the Permission helper class
export class Permission { export class Permission {
value: PermissionValueType; value: PermissionValueType;
isOwner: boolean; isOwner: boolean = false;
hasManagePer: boolean; hasManagePer: boolean = false;
hasWritePer: boolean; hasWritePer: boolean = false;
hasReadPer: boolean; hasReadPer: boolean = false;
_permissionList: PermissionListType; _permissionList: PermissionListType;
constructor(props?: PerConstructPros) { constructor(props?: PerConstructPros) {
@ -24,11 +25,8 @@ export class Permission {
this.value = per; this.value = per;
} }
this.isOwner = isOwner;
this._permissionList = permissionList; this._permissionList = permissionList;
this.hasManagePer = this.checkPer(this._permissionList['manage'].value); this.updatePermissions();
this.hasWritePer = this.checkPer(this._permissionList['write'].value);
this.hasReadPer = this.checkPer(this._permissionList['read'].value);
} }
// add permission(s) // add permission(s)
@ -68,10 +66,21 @@ export class Permission {
return (this.value & perm) === perm; return (this.value & perm) === perm;
} }
private updatePermissionCallback?: () => void;
setUpdatePermissionCallback(callback: () => void) {
callback();
this.updatePermissionCallback = callback;
}
private updatePermissions() { private updatePermissions() {
this.isOwner = this.value === OwnerPermissionVal; this.isOwner = this.value === OwnerPermissionVal;
this.hasManagePer = this.checkPer(this._permissionList['manage'].value); this.hasManagePer = this.checkPer(this._permissionList['manage'].value);
this.hasWritePer = this.checkPer(this._permissionList['write'].value); this.hasWritePer = this.checkPer(this._permissionList['write'].value);
this.hasReadPer = this.checkPer(this._permissionList['read'].value); this.hasReadPer = this.checkPer(this._permissionList['read'].value);
this.updatePermissionCallback?.();
}
toBinary() {
return this.value.toString(2);
} }
} }

View File

@ -17,23 +17,23 @@ type GroupMemberSchemaType = {
role: `${GroupMemberRole}`; role: `${GroupMemberRole}`;
}; };
type MemberGroupListItemType<T extends boolean | undefined> = MemberGroupSchemaType & { type MemberGroupListItemType<WithMembers extends boolean | undefined> = MemberGroupSchemaType & {
members: T extends true members: WithMembers extends true
? { ? {
tmbId: string; tmbId: string;
name: string; name: string;
avatar: string; avatar: string;
}[] }[]
: undefined; : undefined;
count: T extends true ? number : undefined; count: WithMembers extends true ? number : undefined;
owner?: T extends true owner?: WithMembers extends true
? { ? {
tmbId: string; tmbId: string;
name: string; name: string;
avatar: string; avatar: string;
} }
: undefined; : undefined;
permission: T extends true ? Permission : undefined; permission: WithMembers extends true ? Permission : undefined;
}; };
type GroupMemberItemType = { type GroupMemberItemType = {

View File

@ -1,22 +1,50 @@
import { PermissionKeyEnum } from '../constant'; import { PermissionKeyEnum } from '../constant';
import { PermissionListType } from '../type'; import { PermissionListType } from '../type';
import { PermissionList } from '../constant'; import { PermissionList } from '../constant';
export const TeamPermissionList: PermissionListType = { import { i18nT } from '../../../../web/i18n/utils';
export enum TeamPermissionKeyEnum {
appCreate = 'appCreate',
datasetCreate = 'datasetCreate',
apikeyCreate = 'apikeyCreate'
}
export const TeamPermissionList: PermissionListType<TeamPermissionKeyEnum> = {
[PermissionKeyEnum.read]: { [PermissionKeyEnum.read]: {
...PermissionList[PermissionKeyEnum.read], ...PermissionList[PermissionKeyEnum.read],
value: 0b100 value: 0b000100
}, },
[PermissionKeyEnum.write]: { [PermissionKeyEnum.write]: {
...PermissionList[PermissionKeyEnum.write], ...PermissionList[PermissionKeyEnum.write],
value: 0b010 value: 0b000010
}, },
[PermissionKeyEnum.manage]: { [PermissionKeyEnum.manage]: {
...PermissionList[PermissionKeyEnum.manage], ...PermissionList[PermissionKeyEnum.manage],
value: 0b001 value: 0b000001
},
[TeamPermissionKeyEnum.appCreate]: {
checkBoxType: 'multiple',
description: '',
name: i18nT('account_team:permission_appCreate'),
value: 0b001000
},
[TeamPermissionKeyEnum.datasetCreate]: {
checkBoxType: 'multiple',
description: '',
name: i18nT('account_team:permission_datasetCreate'),
value: 0b010000
},
[TeamPermissionKeyEnum.apikeyCreate]: {
checkBoxType: 'multiple',
description: '',
name: i18nT('account_team:permission_apikeyCreate'),
value: 0b100000
} }
}; };
export const TeamReadPermissionVal = TeamPermissionList['read'].value; export const TeamReadPermissionVal = TeamPermissionList['read'].value;
export const TeamWritePermissionVal = TeamPermissionList['write'].value; export const TeamWritePermissionVal = TeamPermissionList['write'].value;
export const TeamManagePermissionVal = TeamPermissionList['manage'].value; export const TeamManagePermissionVal = TeamPermissionList['manage'].value;
export const TeamAppCreatePermissionVal = TeamPermissionList['appCreate'].value;
export const TeamDatasetCreatePermissionVal = TeamPermissionList['datasetCreate'].value;
export const TeamApikeyCreatePermissionVal = TeamPermissionList['apikeyCreate'].value;
export const TeamDefaultPermissionVal = TeamReadPermissionVal; export const TeamDefaultPermissionVal = TeamReadPermissionVal;

View File

@ -1,7 +1,15 @@
import { PerConstructPros, Permission } from '../controller'; import { PerConstructPros, Permission } from '../controller';
import { TeamDefaultPermissionVal, TeamPermissionList } from './constant'; import {
TeamAppCreatePermissionVal,
TeamDefaultPermissionVal,
TeamPermissionList
} from './constant';
export class TeamPermission extends Permission { export class TeamPermission extends Permission {
hasAppCreatePer: boolean = false;
hasDatasetCreatePer: boolean = false;
hasApikeyCreatePer: boolean = false;
constructor(props?: PerConstructPros) { constructor(props?: PerConstructPros) {
if (!props) { if (!props) {
props = { props = {
@ -12,5 +20,11 @@ export class TeamPermission extends Permission {
} }
props.permissionList = TeamPermissionList; props.permissionList = TeamPermissionList;
super(props); super(props);
this.setUpdatePermissionCallback(() => {
this.hasAppCreatePer = this.checkPer(TeamAppCreatePermissionVal);
this.hasDatasetCreatePer = this.checkPer(TeamAppCreatePermissionVal);
this.hasApikeyCreatePer = this.checkPer(TeamAppCreatePermissionVal);
});
} }
} }

View File

@ -69,7 +69,7 @@ const addCommonMiddleware = (schema: mongoose.Schema) => {
export const getMongoModel = <T>(name: string, schema: mongoose.Schema) => { export const getMongoModel = <T>(name: string, schema: mongoose.Schema) => {
if (connectionMongo.models[name]) return connectionMongo.models[name] as Model<T>; if (connectionMongo.models[name]) return connectionMongo.models[name] as Model<T>;
console.log('Load model======', name); if (process.env.NODE_ENV !== 'test') console.log('Load model======', name);
addCommonMiddleware(schema); addCommonMiddleware(schema);
const model = connectionMongo.model<T>(name, schema); const model = connectionMongo.model<T>(name, schema);

View File

@ -2,7 +2,7 @@ import { TeamPermission } from '@fastgpt/global/support/permission/user/controll
import { AuthModeType, AuthResponseType } from '../type'; import { AuthModeType, AuthResponseType } from '../type';
import { TeamErrEnum } from '@fastgpt/global/common/error/code/team'; import { TeamErrEnum } from '@fastgpt/global/common/error/code/team';
import { authUserPer } from '../user/auth'; import { authUserPer } from '../user/auth';
import { ManagePermissionVal } from '@fastgpt/global/support/permission/constant'; import { TeamManagePermissionVal } from '@fastgpt/global/support/permission/user/constant';
/* /*
Team manager can control org Team manager can control org
@ -15,7 +15,7 @@ export const authOrgMember = async ({
} & AuthModeType): Promise<AuthResponseType> => { } & AuthModeType): Promise<AuthResponseType> => {
const result = await authUserPer({ const result = await authUserPer({
...props, ...props,
per: ManagePermissionVal per: TeamManagePermissionVal
}); });
const { teamId, tmbId, isRoot, tmb } = result; const { teamId, tmbId, isRoot, tmb } = result;

View File

@ -61,5 +61,13 @@
"user_team_invite_member": "Invite members", "user_team_invite_member": "Invite members",
"user_team_leave_team": "Leave the team", "user_team_leave_team": "Leave the team",
"user_team_leave_team_failed": "Failure to leave the team", "user_team_leave_team_failed": "Failure to leave the team",
"waiting": "To be accepted" "waiting": "To be accepted",
"permission_appCreate": "Create Application",
"permission_datasetCreate": "Create Knowledge Base",
"permission_apikeyCreate": "Create API Key",
"permission_appCreate_tip": "Can create applications in the root directory (creation permissions in folders are controlled by the folder)",
"permission_datasetCreate_Tip": "Can create knowledge bases in the root directory (creation permissions in folders are controlled by the folder)",
"permission_apikeyCreate_Tip": "Can create global APIKeys",
"permission_manage": "Admin",
"permission_manage_tip": "Can manage members, create groups, manage all groups, and assign permissions to groups and members"
} }

View File

@ -100,7 +100,6 @@
"team.group.manage_tip": "Can manage members, create groups, manage all groups, assign permissions to groups and members", "team.group.manage_tip": "Can manage members, create groups, manage all groups, assign permissions to groups and members",
"team.group.members": "member", "team.group.members": "member",
"team.group.name": "Group name", "team.group.name": "Group name",
"team.group.permission.manage": "administrator",
"team.group.permission.write": "Workbench/knowledge base creation", "team.group.permission.write": "Workbench/knowledge base creation",
"team.group.permission_tip": "Members with individually configured permissions will follow the individual permission configuration and will no longer be affected by group permissions.\n\nIf a member is in multiple permission groups, the member's permissions are combined.", "team.group.permission_tip": "Members with individually configured permissions will follow the individual permission configuration and will no longer be affected by group permissions.\n\nIf a member is in multiple permission groups, the member's permissions are combined.",
"team.group.role.admin": "administrator", "team.group.role.admin": "administrator",
@ -112,5 +111,6 @@
"team.manage_collaborators": "Manage Collaborators", "team.manage_collaborators": "Manage Collaborators",
"team.no_collaborators": "No Collaborators", "team.no_collaborators": "No Collaborators",
"team.org.org": "Organization", "team.org.org": "Organization",
"team.write_role_member": "" "team.write_role_member": "Write Permission",
"team.collaborator.added": "Added"
} }

View File

@ -77,5 +77,13 @@
"user_team_invite_member": "邀请成员", "user_team_invite_member": "邀请成员",
"user_team_leave_team": "离开团队", "user_team_leave_team": "离开团队",
"user_team_leave_team_failed": "离开团队失败", "user_team_leave_team_failed": "离开团队失败",
"waiting": "待接受" "waiting": "待接受",
"permission_appCreate": "创建应用",
"permission_datasetCreate": "创建知识库",
"permission_apikeyCreate": "创建 API 密钥",
"permission_appCreate_tip": "可以在根目录创建应用,(文件夹下的创建权限由文件夹控制)",
"permission_datasetCreate_Tip": "可以在根目录创建知识库,(文件夹下的创建权限由文件夹控制)",
"permission_apikeyCreate_Tip": "可以创建全局的 APIKey",
"permission_manage": "管理员",
"permission_manage_tip": "可以管理成员、创建群组、管理所有群组、为群组和成员分配权限"
} }

View File

@ -98,11 +98,9 @@
"team.group.keep_admin": "保留管理员权限", "team.group.keep_admin": "保留管理员权限",
"team.group.manage_member": "管理成员", "team.group.manage_member": "管理成员",
"team.group.manage_tip": "可以管理成员、创建群组、管理所有群组、为群组和成员分配权限", "team.group.manage_tip": "可以管理成员、创建群组、管理所有群组、为群组和成员分配权限",
"team.group.permission_tip": "单独配置权限的成员,将遵循个人权限配置,不再受群组权限影响。\n若成员在多个权限组则该成员的权限取并集。",
"team.group.members": "成员", "team.group.members": "成员",
"team.group.name": "群组名称", "team.group.name": "群组名称",
"team.group.permission.manage": "管理员",
"team.group.permission.write": "工作台/知识库创建",
"team.group.permission_tip": "单独配置权限的成员,将遵循个人权限配置,不再受群组权限影响。\n若成员在多个权限组则该成员的权限取并集。",
"team.group.role.admin": "管理员", "team.group.role.admin": "管理员",
"team.group.role.member": "成员", "team.group.role.member": "成员",
"team.group.role.owner": "所有者", "team.group.role.owner": "所有者",
@ -112,5 +110,6 @@
"team.manage_collaborators": "管理协作者", "team.manage_collaborators": "管理协作者",
"team.no_collaborators": "暂无协作者", "team.no_collaborators": "暂无协作者",
"team.org.org": "部门", "team.org.org": "部门",
"team.write_role_member": "可写权限" "team.write_role_member": "可写权限",
"team.collaborator.added": "已添加"
} }

View File

@ -61,5 +61,13 @@
"user_team_invite_member": "邀請成員", "user_team_invite_member": "邀請成員",
"user_team_leave_team": "離開團隊", "user_team_leave_team": "離開團隊",
"user_team_leave_team_failed": "離開團隊失敗", "user_team_leave_team_failed": "離開團隊失敗",
"waiting": "待接受" "waiting": "待接受",
"permission_appCreate": "建立應用",
"permission_datasetCreate": "建立知識庫",
"permission_apikeyCreate": "建立 API 密鑰",
"permission_appCreate_tip": "可以在根目錄建立應用,(資料夾下的建立權限由資料夾控制)",
"permission_datasetCreate_Tip": "可以在根目錄建立知識庫,(資料夾下的建立權限由資料夾控制)",
"permission_apikeyCreate_Tip": "可以建立全域的 APIKey",
"permission_manage": "管理員",
"permission_manage_tip": "可以管理成員、建立群組、管理所有群組、為群組和成員分配權限"
} }

View File

@ -100,7 +100,6 @@
"team.group.manage_tip": "可以管理成員、創建群組、管理所有群組、為群組和成員分配權限", "team.group.manage_tip": "可以管理成員、創建群組、管理所有群組、為群組和成員分配權限",
"team.group.members": "成員", "team.group.members": "成員",
"team.group.name": "群組名稱", "team.group.name": "群組名稱",
"team.group.permission.manage": "管理員",
"team.group.permission.write": "工作臺/知識庫建立", "team.group.permission.write": "工作臺/知識庫建立",
"team.group.permission_tip": "單獨設定權限的成員,將依照個人權限設定,不再受群組權限影響。\n若成員屬於多個權限群組該成員的權限將會合併。", "team.group.permission_tip": "單獨設定權限的成員,將依照個人權限設定,不再受群組權限影響。\n若成員屬於多個權限群組該成員的權限將會合併。",
"team.group.role.admin": "管理員", "team.group.role.admin": "管理員",
@ -112,5 +111,6 @@
"team.manage_collaborators": "管理協作者", "team.manage_collaborators": "管理協作者",
"team.no_collaborators": "目前沒有協作者", "team.no_collaborators": "目前沒有協作者",
"team.org.org": "組織", "team.org.org": "組織",
"team.write_role_member": "可寫入權限" "team.write_role_member": "可寫入權限",
"team.collaborator.added": "已添加"
} }

210
pnpm-lock.yaml generated
View File

@ -4,11 +4,6 @@ settings:
autoInstallPeers: true autoInstallPeers: true
excludeLinksFromLockfile: false excludeLinksFromLockfile: false
patchedDependencies:
mdast-util-gfm-autolink-literal@2.0.1:
hash: f63d515781110436299ab612306211a9621c6dfaec1ce1a19e2f27454dc70251
path: patches/mdast-util-gfm-autolink-literal@2.0.1.patch
importers: importers:
.: .:
@ -17,8 +12,8 @@ importers:
specifier: ^2.4.1 specifier: ^2.4.1
version: 2.5.8(encoding@0.1.13)(react@18.3.1) version: 2.5.8(encoding@0.1.13)(react@18.3.1)
'@vitest/coverage-v8': '@vitest/coverage-v8':
specifier: ^3.0.2 specifier: ^3.0.9
version: 3.0.8(vitest@3.0.8(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)) version: 3.1.1(vitest@3.1.1(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))
husky: husky:
specifier: ^8.0.3 specifier: ^8.0.3
version: 8.0.3 version: 8.0.3
@ -28,6 +23,9 @@ importers:
lint-staged: lint-staged:
specifier: ^13.3.0 specifier: ^13.3.0
version: 13.3.0 version: 13.3.0
mongodb-memory-server:
specifier: ^10.1.4
version: 10.1.4(socks@2.8.4)
next-i18next: next-i18next:
specifier: 15.4.2 specifier: 15.4.2
version: 15.4.2(i18next@23.16.8)(next@14.2.26(@babel/core@7.26.10)(react-dom@18.3.1(react@18.3.1))(react@18.3.1)(sass@1.85.1))(react-i18next@14.1.2(i18next@23.16.8)(react-dom@18.3.1(react@18.3.1))(react@18.3.1))(react@18.3.1) version: 15.4.2(i18next@23.16.8)(next@14.2.26(@babel/core@7.26.10)(react-dom@18.3.1(react@18.3.1))(react@18.3.1)(sass@1.85.1))(react-i18next@14.1.2(i18next@23.16.8)(react-dom@18.3.1(react@18.3.1))(react@18.3.1))(react@18.3.1)
@ -38,11 +36,8 @@ importers:
specifier: 14.1.2 specifier: 14.1.2
version: 14.1.2(i18next@23.16.8)(react-dom@18.3.1(react@18.3.1))(react@18.3.1) version: 14.1.2(i18next@23.16.8)(react-dom@18.3.1(react@18.3.1))(react@18.3.1)
vitest: vitest:
specifier: ^3.0.2 specifier: ^3.0.9
version: 3.0.8(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0) version: 3.1.1(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
vitest-mongodb:
specifier: ^1.0.1
version: 1.0.1(socks@2.8.4)
zhlint: zhlint:
specifier: ^0.7.4 specifier: ^0.7.4
version: 0.7.4(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)(typescript@5.8.2) version: 0.7.4(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)(typescript@5.8.2)
@ -3565,11 +3560,11 @@ packages:
'@ungap/structured-clone@1.3.0': '@ungap/structured-clone@1.3.0':
resolution: {integrity: sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g==} resolution: {integrity: sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g==}
'@vitest/coverage-v8@3.0.8': '@vitest/coverage-v8@3.1.1':
resolution: {integrity: sha512-y7SAKsQirsEJ2F8bulBck4DoluhI2EEgTimHd6EEUgJBGKy9tC25cpywh1MH4FvDGoG2Unt7+asVd1kj4qOSAw==} resolution: {integrity: sha512-MgV6D2dhpD6Hp/uroUoAIvFqA8AuvXEFBC2eepG3WFc1pxTfdk1LEqqkWoWhjz+rytoqrnUUCdf6Lzco3iHkLQ==}
peerDependencies: peerDependencies:
'@vitest/browser': 3.0.8 '@vitest/browser': 3.1.1
vitest: 3.0.8 vitest: 3.1.1
peerDependenciesMeta: peerDependenciesMeta:
'@vitest/browser': '@vitest/browser':
optional: true optional: true
@ -3580,6 +3575,9 @@ packages:
'@vitest/expect@3.0.8': '@vitest/expect@3.0.8':
resolution: {integrity: sha512-Xu6TTIavTvSSS6LZaA3EebWFr6tsoXPetOWNMOlc7LO88QVVBwq2oQWBoDiLCN6YTvNYsGSjqOO8CAdjom5DCQ==} resolution: {integrity: sha512-Xu6TTIavTvSSS6LZaA3EebWFr6tsoXPetOWNMOlc7LO88QVVBwq2oQWBoDiLCN6YTvNYsGSjqOO8CAdjom5DCQ==}
'@vitest/expect@3.1.1':
resolution: {integrity: sha512-q/zjrW9lgynctNbwvFtQkGK9+vvHA5UzVi2V8APrp1C6fG6/MuYYkmlx4FubuqLycCeSdHD5aadWfua/Vr0EUA==}
'@vitest/mocker@3.0.8': '@vitest/mocker@3.0.8':
resolution: {integrity: sha512-n3LjS7fcW1BCoF+zWZxG7/5XvuYH+lsFg+BDwwAz0arIwHQJFUEsKBQ0BLU49fCxuM/2HSeBPHQD8WjgrxMfow==} resolution: {integrity: sha512-n3LjS7fcW1BCoF+zWZxG7/5XvuYH+lsFg+BDwwAz0arIwHQJFUEsKBQ0BLU49fCxuM/2HSeBPHQD8WjgrxMfow==}
peerDependencies: peerDependencies:
@ -3591,33 +3589,59 @@ packages:
vite: vite:
optional: true optional: true
'@vitest/mocker@3.1.1':
resolution: {integrity: sha512-bmpJJm7Y7i9BBELlLuuM1J1Q6EQ6K5Ye4wcyOpOMXMcePYKSIYlpcrCm4l/O6ja4VJA5G2aMJiuZkZdnxlC3SA==}
peerDependencies:
msw: ^2.4.9
vite: ^5.0.0 || ^6.0.0
peerDependenciesMeta:
msw:
optional: true
vite:
optional: true
'@vitest/pretty-format@3.0.8': '@vitest/pretty-format@3.0.8':
resolution: {integrity: sha512-BNqwbEyitFhzYMYHUVbIvepOyeQOSFA/NeJMIP9enMntkkxLgOcgABH6fjyXG85ipTgvero6noreavGIqfJcIg==} resolution: {integrity: sha512-BNqwbEyitFhzYMYHUVbIvepOyeQOSFA/NeJMIP9enMntkkxLgOcgABH6fjyXG85ipTgvero6noreavGIqfJcIg==}
'@vitest/pretty-format@3.1.1':
resolution: {integrity: sha512-dg0CIzNx+hMMYfNmSqJlLSXEmnNhMswcn3sXO7Tpldr0LiGmg3eXdLLhwkv2ZqgHb/d5xg5F7ezNFRA1fA13yA==}
'@vitest/runner@1.6.1': '@vitest/runner@1.6.1':
resolution: {integrity: sha512-3nSnYXkVkf3mXFfE7vVyPmi3Sazhb/2cfZGGs0JRzFsPFvAMBEcrweV1V1GsrstdXeKCTXlJbvnQwGWgEIHmOA==} resolution: {integrity: sha512-3nSnYXkVkf3mXFfE7vVyPmi3Sazhb/2cfZGGs0JRzFsPFvAMBEcrweV1V1GsrstdXeKCTXlJbvnQwGWgEIHmOA==}
'@vitest/runner@3.0.8': '@vitest/runner@3.0.8':
resolution: {integrity: sha512-c7UUw6gEcOzI8fih+uaAXS5DwjlBaCJUo7KJ4VvJcjL95+DSR1kova2hFuRt3w41KZEFcOEiq098KkyrjXeM5w==} resolution: {integrity: sha512-c7UUw6gEcOzI8fih+uaAXS5DwjlBaCJUo7KJ4VvJcjL95+DSR1kova2hFuRt3w41KZEFcOEiq098KkyrjXeM5w==}
'@vitest/runner@3.1.1':
resolution: {integrity: sha512-X/d46qzJuEDO8ueyjtKfxffiXraPRfmYasoC4i5+mlLEJ10UvPb0XH5M9C3gWuxd7BAQhpK42cJgJtq53YnWVA==}
'@vitest/snapshot@1.6.1': '@vitest/snapshot@1.6.1':
resolution: {integrity: sha512-WvidQuWAzU2p95u8GAKlRMqMyN1yOJkGHnx3M1PL9Raf7AQ1kwLKg04ADlCa3+OXUZE7BceOhVZiuWAbzCKcUQ==} resolution: {integrity: sha512-WvidQuWAzU2p95u8GAKlRMqMyN1yOJkGHnx3M1PL9Raf7AQ1kwLKg04ADlCa3+OXUZE7BceOhVZiuWAbzCKcUQ==}
'@vitest/snapshot@3.0.8': '@vitest/snapshot@3.0.8':
resolution: {integrity: sha512-x8IlMGSEMugakInj44nUrLSILh/zy1f2/BgH0UeHpNyOocG18M9CWVIFBaXPt8TrqVZWmcPjwfG/ht5tnpba8A==} resolution: {integrity: sha512-x8IlMGSEMugakInj44nUrLSILh/zy1f2/BgH0UeHpNyOocG18M9CWVIFBaXPt8TrqVZWmcPjwfG/ht5tnpba8A==}
'@vitest/snapshot@3.1.1':
resolution: {integrity: sha512-bByMwaVWe/+1WDf9exFxWWgAixelSdiwo2p33tpqIlM14vW7PRV5ppayVXtfycqze4Qhtwag5sVhX400MLBOOw==}
'@vitest/spy@1.6.1': '@vitest/spy@1.6.1':
resolution: {integrity: sha512-MGcMmpGkZebsMZhbQKkAf9CX5zGvjkBTqf8Zx3ApYWXr3wG+QvEu2eXWfnIIWYSJExIp4V9FCKDEeygzkYrXMw==} resolution: {integrity: sha512-MGcMmpGkZebsMZhbQKkAf9CX5zGvjkBTqf8Zx3ApYWXr3wG+QvEu2eXWfnIIWYSJExIp4V9FCKDEeygzkYrXMw==}
'@vitest/spy@3.0.8': '@vitest/spy@3.0.8':
resolution: {integrity: sha512-MR+PzJa+22vFKYb934CejhR4BeRpMSoxkvNoDit68GQxRLSf11aT6CTj3XaqUU9rxgWJFnqicN/wxw6yBRkI1Q==} resolution: {integrity: sha512-MR+PzJa+22vFKYb934CejhR4BeRpMSoxkvNoDit68GQxRLSf11aT6CTj3XaqUU9rxgWJFnqicN/wxw6yBRkI1Q==}
'@vitest/spy@3.1.1':
resolution: {integrity: sha512-+EmrUOOXbKzLkTDwlsc/xrwOlPDXyVk3Z6P6K4oiCndxz7YLpp/0R0UsWVOKT0IXWjjBJuSMk6D27qipaupcvQ==}
'@vitest/utils@1.6.1': '@vitest/utils@1.6.1':
resolution: {integrity: sha512-jOrrUvXM4Av9ZWiG1EajNto0u96kWAhJ1LmPmJhXXQx/32MecEKd10pOLYgS2BQx1TgkGhloPU1ArDW2vvaY6g==} resolution: {integrity: sha512-jOrrUvXM4Av9ZWiG1EajNto0u96kWAhJ1LmPmJhXXQx/32MecEKd10pOLYgS2BQx1TgkGhloPU1ArDW2vvaY6g==}
'@vitest/utils@3.0.8': '@vitest/utils@3.0.8':
resolution: {integrity: sha512-nkBC3aEhfX2PdtQI/QwAWp8qZWwzASsU4Npbcd5RdMPBSSLCpkZp52P3xku3s3uA0HIEhGvEcF8rNkBsz9dQ4Q==} resolution: {integrity: sha512-nkBC3aEhfX2PdtQI/QwAWp8qZWwzASsU4Npbcd5RdMPBSSLCpkZp52P3xku3s3uA0HIEhGvEcF8rNkBsz9dQ4Q==}
'@vitest/utils@3.1.1':
resolution: {integrity: sha512-1XIjflyaU2k3HMArJ50bwSh3wKWPD6Q47wz/NUSmRV0zNywPc4w79ARjg/i/aNINHwA+mIALhUVqD9/aUvZNgg==}
'@vue/compiler-core@3.5.13': '@vue/compiler-core@3.5.13':
resolution: {integrity: sha512-oOdAkwqUfW1WqpwSYJce06wvt6HljgY3fGeM9NcVA1HaYOij3mZG9Rkysn0OHuyUAGMbEbARIpsG+LPVlBJ5/Q==} resolution: {integrity: sha512-oOdAkwqUfW1WqpwSYJce06wvt6HljgY3fGeM9NcVA1HaYOij3mZG9Rkysn0OHuyUAGMbEbARIpsG+LPVlBJ5/Q==}
@ -9330,6 +9354,11 @@ packages:
engines: {node: ^18.0.0 || ^20.0.0 || >=22.0.0} engines: {node: ^18.0.0 || ^20.0.0 || >=22.0.0}
hasBin: true hasBin: true
vite-node@3.1.1:
resolution: {integrity: sha512-V+IxPAE2FvXpTCHXyNem0M+gWm6J7eRyWPR6vYoG/Gl+IscNOjXzztUhimQgTxaAoUoj40Qqimaa0NLIOOAH4w==}
engines: {node: ^18.0.0 || ^20.0.0 || >=22.0.0}
hasBin: true
vite@5.4.14: vite@5.4.14:
resolution: {integrity: sha512-EK5cY7Q1D8JNhSaPKVK4pwBFvaTmZxEnoKXLG/U9gmdDcihQGNzFlgIvaxezFR4glP1LsuiedwMBqCXH3wZccA==} resolution: {integrity: sha512-EK5cY7Q1D8JNhSaPKVK4pwBFvaTmZxEnoKXLG/U9gmdDcihQGNzFlgIvaxezFR4glP1LsuiedwMBqCXH3wZccA==}
engines: {node: ^18.0.0 || >=20.0.0} engines: {node: ^18.0.0 || >=20.0.0}
@ -9401,9 +9430,6 @@ packages:
yaml: yaml:
optional: true optional: true
vitest-mongodb@1.0.1:
resolution: {integrity: sha512-a9Mc2F35h8qxI1uOgsrCUH28TglClAd8gdXkn7CBqmC6bLr6D2Ibyxp0Xz6/AU0ukAOfuf/6oqUS+ZN0VlxVyQ==}
vitest@1.6.1: vitest@1.6.1:
resolution: {integrity: sha512-Ljb1cnSJSivGN0LqXd/zmDbWEM0RNNg2t1QW/XUhYl/qPqyu7CsqeWtqQXHVaJsecLPuDoak2oJcZN2QoRIOag==} resolution: {integrity: sha512-Ljb1cnSJSivGN0LqXd/zmDbWEM0RNNg2t1QW/XUhYl/qPqyu7CsqeWtqQXHVaJsecLPuDoak2oJcZN2QoRIOag==}
engines: {node: ^18.0.0 || >=20.0.0} engines: {node: ^18.0.0 || >=20.0.0}
@ -9457,6 +9483,34 @@ packages:
jsdom: jsdom:
optional: true optional: true
vitest@3.1.1:
resolution: {integrity: sha512-kiZc/IYmKICeBAZr9DQ5rT7/6bD9G7uqQEki4fxazi1jdVl2mWGzedtBs5s6llz59yQhVb7FFY2MbHzHCnT79Q==}
engines: {node: ^18.0.0 || ^20.0.0 || >=22.0.0}
hasBin: true
peerDependencies:
'@edge-runtime/vm': '*'
'@types/debug': ^4.1.12
'@types/node': ^18.0.0 || ^20.0.0 || >=22.0.0
'@vitest/browser': 3.1.1
'@vitest/ui': 3.1.1
happy-dom: '*'
jsdom: '*'
peerDependenciesMeta:
'@edge-runtime/vm':
optional: true
'@types/debug':
optional: true
'@types/node':
optional: true
'@vitest/browser':
optional: true
'@vitest/ui':
optional: true
happy-dom:
optional: true
jsdom:
optional: true
void-elements@3.1.0: void-elements@3.1.0:
resolution: {integrity: sha512-Dhxzh5HZuiHQhbvTW9AMetFfBHDMYpo23Uo9btPXgdYP+3T5S+p+jgNy7spra+veYhBP2dCSgxR/i2Y02h5/6w==} resolution: {integrity: sha512-Dhxzh5HZuiHQhbvTW9AMetFfBHDMYpo23Uo9btPXgdYP+3T5S+p+jgNy7spra+veYhBP2dCSgxR/i2Y02h5/6w==}
engines: {node: '>=0.10.0'} engines: {node: '>=0.10.0'}
@ -12846,7 +12900,7 @@ snapshots:
'@ungap/structured-clone@1.3.0': {} '@ungap/structured-clone@1.3.0': {}
'@vitest/coverage-v8@3.0.8(vitest@3.0.8(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))': '@vitest/coverage-v8@3.1.1(vitest@3.1.1(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))':
dependencies: dependencies:
'@ampproject/remapping': 2.3.0 '@ampproject/remapping': 2.3.0
'@bcoe/v8-coverage': 1.0.2 '@bcoe/v8-coverage': 1.0.2
@ -12860,7 +12914,7 @@ snapshots:
std-env: 3.8.1 std-env: 3.8.1
test-exclude: 7.0.1 test-exclude: 7.0.1
tinyrainbow: 2.0.0 tinyrainbow: 2.0.0
vitest: 3.0.8(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0) vitest: 3.1.1(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
transitivePeerDependencies: transitivePeerDependencies:
- supports-color - supports-color
@ -12877,6 +12931,13 @@ snapshots:
chai: 5.2.0 chai: 5.2.0
tinyrainbow: 2.0.0 tinyrainbow: 2.0.0
'@vitest/expect@3.1.1':
dependencies:
'@vitest/spy': 3.1.1
'@vitest/utils': 3.1.1
chai: 5.2.0
tinyrainbow: 2.0.0
'@vitest/mocker@3.0.8(vite@6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))': '@vitest/mocker@3.0.8(vite@6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))':
dependencies: dependencies:
'@vitest/spy': 3.0.8 '@vitest/spy': 3.0.8
@ -12885,10 +12946,22 @@ snapshots:
optionalDependencies: optionalDependencies:
vite: 6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0) vite: 6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
'@vitest/mocker@3.1.1(vite@6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))':
dependencies:
'@vitest/spy': 3.1.1
estree-walker: 3.0.3
magic-string: 0.30.17
optionalDependencies:
vite: 6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
'@vitest/pretty-format@3.0.8': '@vitest/pretty-format@3.0.8':
dependencies: dependencies:
tinyrainbow: 2.0.0 tinyrainbow: 2.0.0
'@vitest/pretty-format@3.1.1':
dependencies:
tinyrainbow: 2.0.0
'@vitest/runner@1.6.1': '@vitest/runner@1.6.1':
dependencies: dependencies:
'@vitest/utils': 1.6.1 '@vitest/utils': 1.6.1
@ -12900,6 +12973,11 @@ snapshots:
'@vitest/utils': 3.0.8 '@vitest/utils': 3.0.8
pathe: 2.0.3 pathe: 2.0.3
'@vitest/runner@3.1.1':
dependencies:
'@vitest/utils': 3.1.1
pathe: 2.0.3
'@vitest/snapshot@1.6.1': '@vitest/snapshot@1.6.1':
dependencies: dependencies:
magic-string: 0.30.17 magic-string: 0.30.17
@ -12912,6 +12990,12 @@ snapshots:
magic-string: 0.30.17 magic-string: 0.30.17
pathe: 2.0.3 pathe: 2.0.3
'@vitest/snapshot@3.1.1':
dependencies:
'@vitest/pretty-format': 3.1.1
magic-string: 0.30.17
pathe: 2.0.3
'@vitest/spy@1.6.1': '@vitest/spy@1.6.1':
dependencies: dependencies:
tinyspy: 2.2.1 tinyspy: 2.2.1
@ -12920,6 +13004,10 @@ snapshots:
dependencies: dependencies:
tinyspy: 3.0.2 tinyspy: 3.0.2
'@vitest/spy@3.1.1':
dependencies:
tinyspy: 3.0.2
'@vitest/utils@1.6.1': '@vitest/utils@1.6.1':
dependencies: dependencies:
diff-sequences: 29.6.3 diff-sequences: 29.6.3
@ -12933,6 +13021,12 @@ snapshots:
loupe: 3.1.3 loupe: 3.1.3
tinyrainbow: 2.0.0 tinyrainbow: 2.0.0
'@vitest/utils@3.1.1':
dependencies:
'@vitest/pretty-format': 3.1.1
loupe: 3.1.3
tinyrainbow: 2.0.0
'@vue/compiler-core@3.5.13': '@vue/compiler-core@3.5.13':
dependencies: dependencies:
'@babel/parser': 7.26.10 '@babel/parser': 7.26.10
@ -19984,6 +20078,27 @@ snapshots:
- tsx - tsx
- yaml - yaml
vite-node@3.1.1(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0):
dependencies:
cac: 6.7.14
debug: 4.4.0
es-module-lexer: 1.6.0
pathe: 2.0.3
vite: 6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
transitivePeerDependencies:
- '@types/node'
- jiti
- less
- lightningcss
- sass
- sass-embedded
- stylus
- sugarss
- supports-color
- terser
- tsx
- yaml
vite@5.4.14(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0): vite@5.4.14(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0):
dependencies: dependencies:
esbuild: 0.21.5 esbuild: 0.21.5
@ -20006,20 +20121,6 @@ snapshots:
sass: 1.85.1 sass: 1.85.1
terser: 5.39.0 terser: 5.39.0
vitest-mongodb@1.0.1(socks@2.8.4):
dependencies:
debug: 4.4.0
mongodb-memory-server: 10.1.4(socks@2.8.4)
transitivePeerDependencies:
- '@aws-sdk/credential-providers'
- '@mongodb-js/zstd'
- gcp-metadata
- kerberos
- mongodb-client-encryption
- snappy
- socks
- supports-color
vitest@1.6.1(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0): vitest@1.6.1(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0):
dependencies: dependencies:
'@vitest/expect': 1.6.1 '@vitest/expect': 1.6.1
@ -20093,6 +20194,45 @@ snapshots:
- tsx - tsx
- yaml - yaml
vitest@3.1.1(@types/debug@4.1.12)(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0):
dependencies:
'@vitest/expect': 3.1.1
'@vitest/mocker': 3.1.1(vite@6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0))
'@vitest/pretty-format': 3.1.1
'@vitest/runner': 3.1.1
'@vitest/snapshot': 3.1.1
'@vitest/spy': 3.1.1
'@vitest/utils': 3.1.1
chai: 5.2.0
debug: 4.4.0
expect-type: 1.2.0
magic-string: 0.30.17
pathe: 2.0.3
std-env: 3.8.1
tinybench: 2.9.0
tinyexec: 0.3.2
tinypool: 1.0.2
tinyrainbow: 2.0.0
vite: 6.2.2(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
vite-node: 3.1.1(@types/node@20.17.24)(sass@1.85.1)(terser@5.39.0)
why-is-node-running: 2.3.0
optionalDependencies:
'@types/debug': 4.1.12
'@types/node': 20.17.24
transitivePeerDependencies:
- jiti
- less
- lightningcss
- msw
- sass
- sass-embedded
- stylus
- sugarss
- supports-color
- terser
- tsx
- yaml
void-elements@3.1.0: {} void-elements@3.1.0: {}
vue@3.5.13(typescript@5.8.2): vue@3.5.13(typescript@5.8.2):

View File

@ -1,20 +1,24 @@
import React from 'react'; import React from 'react';
import { useTranslation } from 'next-i18next';
import { Box, Checkbox, HStack, VStack } from '@chakra-ui/react'; import { Box, Checkbox, HStack, VStack } from '@chakra-ui/react';
import Avatar from '@fastgpt/web/components/common/Avatar'; import Avatar from '@fastgpt/web/components/common/Avatar';
import PermissionTags from './PermissionTags'; import PermissionTags from './PermissionTags';
import { PermissionValueType } from '@fastgpt/global/support/permission/type'; import { PermissionValueType } from '@fastgpt/global/support/permission/type';
import MyIcon from '@fastgpt/web/components/common/Icon'; import MyIcon from '@fastgpt/web/components/common/Icon';
import OrgTags from '../../user/team/OrgTags'; import OrgTags from '../../user/team/OrgTags';
import Tag from '@fastgpt/web/components/common/Tag';
function MemberItemCard({ function MemberItemCard({
avatar, avatar,
key, key,
onChange, onChange: _onChange,
isChecked, isChecked,
onDelete, onDelete,
name, name,
permission, permission,
orgs orgs,
addOnly,
rightSlot
}: { }: {
avatar: string; avatar: string;
key: string; key: string;
@ -23,44 +27,66 @@ function MemberItemCard({
onDelete?: () => void; onDelete?: () => void;
name: string; name: string;
permission?: PermissionValueType; permission?: PermissionValueType;
addOnly?: boolean;
orgs?: string[]; orgs?: string[];
rightSlot?: React.ReactNode;
}) { }) {
const isAdded = addOnly && !!permission;
const onChange = () => {
if (!isAdded) _onChange();
};
const { t } = useTranslation();
return ( return (
<> <HStack
<HStack justifyContent="space-between"
justifyContent="space-between" alignItems="center"
alignItems="center" key={key}
key={key} px="3"
px="3" py="2"
py="2" borderRadius="sm"
borderRadius="sm" _hover={{
_hover={{ bgColor: 'myGray.50',
bgColor: 'myGray.50', cursor: 'pointer'
cursor: 'pointer' }}
}} onClick={onChange}
onClick={onChange} >
> {isChecked !== undefined && (
{isChecked !== undefined && <Checkbox isChecked={isChecked} pointerEvents="none" />} <Checkbox isChecked={isChecked} pointerEvents="none" disabled={isAdded} />
<Avatar src={avatar} w="1.5rem" borderRadius={'50%'} /> )}
<Avatar src={avatar} w="1.5rem" borderRadius={'50%'} />
<Box w="full"> <Box w="full">
<Box fontSize={'sm'}>{name}</Box> <Box fontSize={'sm'} className="textEllipsis" maxW="300px">
<Box lineHeight={1}>{orgs && orgs.length > 0 && <OrgTags orgs={orgs} />}</Box> {name}
</Box> </Box>
{permission && <PermissionTags permission={permission} />} <Box lineHeight={1}>{orgs && orgs.length > 0 && <OrgTags orgs={orgs} />}</Box>
{onDelete !== undefined && ( </Box>
<MyIcon {!isAdded && permission && <PermissionTags permission={permission} />}
name="common/closeLight" {isAdded && (
w="1rem" <Tag
cursor={'pointer'} mixBlendMode={'multiply'}
_hover={{ colorSchema="blue"
color: 'red.600' border="none"
}} py={2}
onClick={onDelete} px={3}
/> fontSize={'xs'}
)} >
</HStack> {t('user:team.collaborator.added')}
</> </Tag>
)}
{onDelete !== undefined && (
<MyIcon
name="common/closeLight"
w="1rem"
cursor={'pointer'}
_hover={{
color: 'red.600'
}}
onClick={onDelete}
/>
)}
{rightSlot}
</HStack>
); );
} }

View File

@ -1,17 +1,6 @@
import { useUserStore } from '@/web/support/user/useUserStore'; import { useUserStore } from '@/web/support/user/useUserStore';
import { ChevronDownIcon } from '@chakra-ui/icons'; import { ChevronDownIcon } from '@chakra-ui/icons';
import { import { Box, Button, Flex, Grid, HStack, ModalBody, ModalFooter, Text } from '@chakra-ui/react';
Box,
Button,
Checkbox,
Flex,
Grid,
HStack,
ModalBody,
ModalFooter,
Tag,
Text
} from '@chakra-ui/react';
import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant'; import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant';
import MyAvatar from '@fastgpt/web/components/common/Avatar'; import MyAvatar from '@fastgpt/web/components/common/Avatar';
import MyIcon from '@fastgpt/web/components/common/Icon'; import MyIcon from '@fastgpt/web/components/common/Icon';
@ -19,27 +8,26 @@ import SearchInput from '@fastgpt/web/components/common/Input/SearchInput';
import MyModal from '@fastgpt/web/components/common/MyModal'; import MyModal from '@fastgpt/web/components/common/MyModal';
import { useRequest2 } from '@fastgpt/web/hooks/useRequest'; import { useRequest2 } from '@fastgpt/web/hooks/useRequest';
import { useTranslation } from 'next-i18next'; import { useTranslation } from 'next-i18next';
import { useEffect, useMemo, useRef, useState } from 'react'; import { useMemo, useRef, useState } from 'react';
import PermissionSelect from './PermissionSelect'; import PermissionSelect from './PermissionSelect';
import PermissionTags from './PermissionTags';
import { import {
DEFAULT_ORG_AVATAR, DEFAULT_ORG_AVATAR,
DEFAULT_TEAM_AVATAR, DEFAULT_TEAM_AVATAR,
DEFAULT_USER_AVATAR DEFAULT_USER_AVATAR
} from '@fastgpt/global/common/system/constants'; } from '@fastgpt/global/common/system/constants';
import Path from '@/components/common/folder/Path'; import Path from '@/components/common/folder/Path';
import { OrgListItemType, OrgType } from '@fastgpt/global/support/user/team/org/type'; import { OrgListItemType } from '@fastgpt/global/support/user/team/org/type';
import { useContextSelector } from 'use-context-selector'; import { useContextSelector } from 'use-context-selector';
import { CollaboratorContext } from './context'; import { CollaboratorContext } from './context';
import { getTeamMembers } from '@/web/support/user/team/api'; import { getTeamMembers } from '@/web/support/user/team/api';
import { getGroupList } from '@/web/support/user/team/group/api'; import { getGroupList } from '@/web/support/user/team/group/api';
import { useScrollPagination } from '@fastgpt/web/hooks/useScrollPagination'; import { useScrollPagination } from '@fastgpt/web/hooks/useScrollPagination';
import MemberItemCard from './MemberItemCard'; import MemberItemCard from './MemberItemCard';
import { GetSearchUserGroupOrg } from '@/web/support/user/api';
import useOrg from '@/web/support/user/team/org/hooks/useOrg'; import useOrg from '@/web/support/user/team/org/hooks/useOrg';
import { TeamMemberItemType } from '@fastgpt/global/support/user/team/type'; import { TeamMemberItemType } from '@fastgpt/global/support/user/team/type';
import { MemberGroupListItemType } from '@fastgpt/global/support/permission/memberGroup/type'; import { MemberGroupListItemType } from '@fastgpt/global/support/permission/memberGroup/type';
import _ from 'lodash'; import { UpdateClbPermissionProps } from '@fastgpt/global/support/permission/collaborator';
import { ValueOf } from 'next/dist/shared/lib/constants';
const HoverBoxStyle = { const HoverBoxStyle = {
bgColor: 'myGray.50', bgColor: 'myGray.50',
@ -131,8 +119,8 @@ function MemberModal({
members: selectedMemberList.map((item) => item.tmbId), members: selectedMemberList.map((item) => item.tmbId),
groups: selectedGroupList.map((item) => item._id), groups: selectedGroupList.map((item) => item._id),
orgs: selectedOrgList.map((item) => item._id), orgs: selectedOrgList.map((item) => item._id),
permission: selectedPermission! permission: addOnly ? undefined : selectedPermission!
}), } as UpdateClbPermissionProps<ValueOf<typeof addOnly>>),
{ {
successToast: t('common:common.Add Success'), successToast: t('common:common.Add Success'),
onSuccess() { onSuccess() {
@ -285,6 +273,7 @@ function MemberModal({
const collaborator = collaboratorList?.find((v) => v.tmbId === member.tmbId); const collaborator = collaboratorList?.find((v) => v.tmbId === member.tmbId);
return ( return (
<MemberItemCard <MemberItemCard
addOnly={addOnly}
avatar={member.avatar} avatar={member.avatar}
key={member.tmbId} key={member.tmbId}
name={member.memberName} name={member.memberName}
@ -321,49 +310,33 @@ function MemberModal({
}; };
const collaborator = collaboratorList?.find((v) => v.orgId === org._id); const collaborator = collaboratorList?.find((v) => v.orgId === org._id);
return ( return (
<HStack <MemberItemCard
justifyContent="space-between" avatar={org.avatar}
key={org._id} key={org._id}
py="2" name={org.name}
px="3" onChange={onChange}
borderRadius="sm" addOnly={addOnly}
alignItems="center" permission={collaborator?.permission.value}
_hover={HoverBoxStyle} isChecked={!!selectedOrgList.find((v) => String(v._id) === String(org._id))}
onClick={onChange} rightSlot={
> org.total && (
<Checkbox <MyIcon
isChecked={!!selectedOrgList.find((v) => v._id === org._id)} name="core/chat/chevronRight"
pointerEvents="none" w="16px"
/> p="4px"
<MyAvatar src={org.avatar} w="1.5rem" borderRadius={'50%'} /> rounded={'6px'}
<HStack w="full"> _hover={{
<Text>{org.name}</Text> bgColor: 'myGray.200'
{org.total && ( }}
<> onClick={(e) => {
<Tag size="sm" my="auto"> onClickOrg(org);
{org.total} // setPath(getOrgChildrenPath(org));
</Tag> e.stopPropagation();
</> }}
)} />
</HStack> )
<PermissionTags permission={collaborator?.permission.value} /> }
{org.total && ( />
<MyIcon
name="core/chat/chevronRight"
w="16px"
p="4px"
rounded={'6px'}
_hover={{
bgColor: 'myGray.200'
}}
onClick={(e) => {
onClickOrg(org);
// setPath(getOrgChildrenPath(org));
e.stopPropagation();
}}
/>
)}
</HStack>
); );
}); });
return searchKey ? ( return searchKey ? (
@ -372,6 +345,9 @@ function MemberModal({
<OrgMemberScrollData> <OrgMemberScrollData>
{Orgs} {Orgs}
{orgMembers.map((member) => { {orgMembers.map((member) => {
const isChecked = !!selectedMemberList.find(
(v) => v.tmbId === member.tmbId
);
return ( return (
<MemberItemCard <MemberItemCard
avatar={member.avatar} avatar={member.avatar}
@ -385,7 +361,9 @@ function MemberModal({
return [...state, member]; return [...state, member];
}); });
}} }}
isChecked={!!selectedMemberList.find((v) => v.tmbId === member.tmbId)} isChecked={isChecked}
permission={member.permission.value}
addOnly={addOnly && !!member.permission.value}
orgs={member.orgs} orgs={member.orgs}
/> />
); );
@ -414,6 +392,7 @@ function MemberModal({
permission={collaborator?.permission.value} permission={collaborator?.permission.value}
onChange={onChange} onChange={onChange}
isChecked={!!selectedGroupList.find((v) => v._id === group._id)} isChecked={!!selectedGroupList.find((v) => v._id === group._id)}
addOnly={addOnly}
/> />
); );
})} })}

View File

@ -110,7 +110,15 @@ const CollaboratorContextProvider = ({
} = useRequest2( } = useRequest2(
async () => { async () => {
if (feConfigs.isPlus) { if (feConfigs.isPlus) {
return onGetCollaboratorList(); const data = await onGetCollaboratorList();
return data.map((item) => {
return {
...item,
permission: new Permission({
per: item.permission.value
})
};
});
} }
return []; return [];
}, },

View File

@ -10,7 +10,14 @@ function OrgTags({ orgs, type = 'simple' }: { orgs?: string[]; type?: 'simple' |
label={ label={
<VStack gap="1" alignItems={'start'}> <VStack gap="1" alignItems={'start'}>
{orgs.map((org, index) => ( {orgs.map((org, index) => (
<Box key={index} fontSize="sm" fontWeight={400} color="myGray.500"> <Box
key={index}
fontSize="sm"
fontWeight={400}
color="myGray.500"
maxW={'300px'}
className="textEllipsis"
>
{org.slice(1)} {org.slice(1)}
</Box> </Box>
))} ))}

View File

@ -91,7 +91,7 @@ const AccountContainer = ({
} }
] ]
: []), : []),
...(userInfo?.team?.permission.hasManagePer ...(userInfo?.team?.permission.hasApikeyCreatePer
? [ ? [
{ {
icon: 'key', icon: 'key',

View File

@ -27,6 +27,9 @@ import Avatar from '@fastgpt/web/components/common/Avatar';
import MemberTag from '../../../../components/support/user/team/Info/MemberTag'; import MemberTag from '../../../../components/support/user/team/Info/MemberTag';
import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant'; import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant';
import { import {
TeamApikeyCreatePermissionVal,
TeamAppCreatePermissionVal,
TeamDatasetCreatePermissionVal,
TeamManagePermissionVal, TeamManagePermissionVal,
TeamPermissionList, TeamPermissionList,
TeamWritePermissionVal TeamWritePermissionVal
@ -42,6 +45,9 @@ import MyIcon from '@fastgpt/web/components/common/Icon';
import { useContextSelector } from 'use-context-selector'; import { useContextSelector } from 'use-context-selector';
import SearchInput from '@fastgpt/web/components/common/Input/SearchInput'; import SearchInput from '@fastgpt/web/components/common/Input/SearchInput';
import { GetSearchUserGroupOrg } from '@/web/support/user/api'; import { GetSearchUserGroupOrg } from '@/web/support/user/api';
import { PermissionValueType } from '@fastgpt/global/support/permission/type';
import { CollaboratorItemType } from '@fastgpt/global/support/permission/collaborator';
import { Permission } from '@fastgpt/global/support/permission/controller';
function PermissionManage({ function PermissionManage({
Tabs, Tabs,
@ -104,19 +110,18 @@ function PermissionManage({
}, [collaboratorList, searchResult, searchKey]); }, [collaboratorList, searchResult, searchKey]);
const { runAsync: onUpdatePermission, loading: addLoading } = useRequest2( const { runAsync: onUpdatePermission, loading: addLoading } = useRequest2(
async ({ id, type, per }: { id: string; type: 'add' | 'remove'; per: 'write' | 'manage' }) => { async ({ id, type, per }: { id: string; type: 'add' | 'remove'; per: PermissionValueType }) => {
const clb = collaboratorList.find( const clb = collaboratorList.find(
(clb) => clb.tmbId === id || clb.groupId === id || clb.orgId === id (clb) => clb.tmbId === id || clb.groupId === id || clb.orgId === id
); );
if (!clb) return; if (!clb) return;
const updatePer = per === 'write' ? TeamWritePermissionVal : TeamManagePermissionVal;
const permission = new TeamPermission({ per: clb.permission.value }); const permission = new TeamPermission({ per: clb.permission.value });
if (type === 'add') { if (type === 'add') {
permission.addPer(updatePer); permission.addPer(per);
} else { } else {
permission.removePer(updatePer); permission.removePer(per);
} }
return onUpdateCollaborators({ return onUpdateCollaborators({
@ -132,12 +137,48 @@ function PermissionManage({
useRequest2(onDelOneCollaborator); useRequest2(onDelOneCollaborator);
const userManage = userInfo?.permission.hasManagePer; const userManage = userInfo?.permission.hasManagePer;
const hasDeletePer = (per: TeamPermission) => { const hasDeletePer = (per: Permission) => {
if (userInfo?.permission.isOwner) return true; if (userInfo?.permission.isOwner) return true;
if (userManage && !per.hasManagePer) return true; if (userManage && !per.hasManagePer) return true;
return false; return false;
}; };
function PermissionCheckBox({
isDisabled,
per,
clbPer,
id
}: {
isDisabled: boolean;
per: PermissionValueType;
clbPer: Permission;
id: string;
}) {
return (
<Td>
<Box mx="auto" w="fit-content">
<Checkbox
isDisabled={isDisabled}
isChecked={clbPer.checkPer(per)}
onChange={(e) =>
e.target.checked
? onUpdatePermission({
id,
type: 'add',
per
})
: onUpdatePermission({
id,
type: 'remove',
per
})
}
/>
</Box>
</Td>
);
}
return ( return (
<> <>
<Flex justify={'space-between'} align={'center'} pb={'1rem'}> <Flex justify={'space-between'} align={'center'} pb={'1rem'}>
@ -174,13 +215,26 @@ function PermissionManage({
</Th> </Th>
<Th bg="myGray.100"> <Th bg="myGray.100">
<Box mx="auto" w="fit-content"> <Box mx="auto" w="fit-content">
{t('user:team.group.permission.write')} {t('account_team:permission_appCreate')}
<QuestionTip ml="1" label={t('account_team:permission_appCreate_tip')} />
</Box> </Box>
</Th> </Th>
<Th bg="myGray.100"> <Th bg="myGray.100">
<Box mx="auto" w="fit-content"> <Box mx="auto" w="fit-content">
{t('user:team.group.permission.manage')} {t('account_team:permission_datasetCreate')}
<QuestionTip ml="1" label={t('user:team.group.manage_tip')} /> <QuestionTip ml="1" label={t('account_team:permission_datasetCreate_Tip')} />
</Box>
</Th>
<Th bg="myGray.100">
<Box mx="auto" w="fit-content">
{t('account_team:permission_apikeyCreate')}
<QuestionTip ml="1" label={t('account_team:permission_apikeyCreate_Tip')} />
</Box>
</Th>
<Th bg="myGray.100">
<Box mx="auto" w="fit-content">
{t('account_team:permission_manage')}
<QuestionTip ml="1" label={t('account_team:permission_manage_tip')} />
</Box> </Box>
</Th> </Th>
<Th bg="myGray.100" borderRightRadius="md"> <Th bg="myGray.100" borderRightRadius="md">
@ -210,48 +264,30 @@ function PermissionManage({
<Box>{member.name}</Box> <Box>{member.name}</Box>
</HStack> </HStack>
</Td> </Td>
<Td> <PermissionCheckBox
<Box mx="auto" w="fit-content"> isDisabled={member.permission.isOwner || !userManage}
<Checkbox per={TeamAppCreatePermissionVal}
isDisabled={member.permission.isOwner || !userManage} clbPer={member.permission}
isChecked={member.permission.hasWritePer} id={member.tmbId!}
onChange={(e) => />
e.target.checked <PermissionCheckBox
? onUpdatePermission({ isDisabled={member.permission.isOwner || !userManage}
id: member.tmbId!, per={TeamDatasetCreatePermissionVal}
type: 'add', clbPer={member.permission}
per: 'write' id={member.tmbId!}
}) />
: onUpdatePermission({ <PermissionCheckBox
id: member.tmbId!, isDisabled={member.permission.isOwner || !userManage}
type: 'remove', per={TeamApikeyCreatePermissionVal}
per: 'write' clbPer={member.permission}
}) id={member.tmbId!}
} />
/> <PermissionCheckBox
</Box> isDisabled={member.permission.isOwner || !userInfo?.permission.isOwner}
</Td> per={TeamManagePermissionVal}
<Td> clbPer={member.permission}
<Box mx="auto" w="fit-content"> id={member.tmbId!}
<Checkbox />
isDisabled={member.permission.isOwner || !userInfo?.permission.isOwner}
isChecked={member.permission.hasManagePer}
onChange={(e) =>
e.target.checked
? onUpdatePermission({
id: member.tmbId!,
type: 'add',
per: 'manage'
})
: onUpdatePermission({
id: member.tmbId!,
type: 'remove',
per: 'manage'
})
}
/>
</Box>
</Td>
<Td> <Td>
{hasDeletePer(member.permission) && {hasDeletePer(member.permission) &&
userInfo?.team.tmbId !== member.tmbId && ( userInfo?.team.tmbId !== member.tmbId && (
@ -268,7 +304,6 @@ function PermissionManage({
</Tr> </Tr>
))} ))}
</> </>
<> <>
<Tr borderBottom={'1px solid'} borderColor={'myGray.200'} /> <Tr borderBottom={'1px solid'} borderColor={'myGray.200'} />
<Tr userSelect={'none'}> <Tr userSelect={'none'}>
@ -286,40 +321,30 @@ function PermissionManage({
<Td pl={10}> <Td pl={10}>
<MemberTag name={org.name} avatar={org.avatar} /> <MemberTag name={org.name} avatar={org.avatar} />
</Td> </Td>
<Td> <PermissionCheckBox
<Box mx="auto" w="fit-content"> isDisabled={org.permission.isOwner || !userManage}
<Checkbox per={TeamAppCreatePermissionVal}
isDisabled={!userManage} clbPer={org.permission}
isChecked={org.permission.hasWritePer} id={org.orgId!}
onChange={(e) => />
e.target.checked <PermissionCheckBox
? onUpdatePermission({ id: org.orgId!, type: 'add', per: 'write' }) isDisabled={org.permission.isOwner || !userManage}
: onUpdatePermission({ per={TeamDatasetCreatePermissionVal}
id: org.orgId!, clbPer={org.permission}
type: 'remove', id={org.orgId!}
per: 'write' />
}) <PermissionCheckBox
} isDisabled={org.permission.isOwner || !userManage}
/> per={TeamApikeyCreatePermissionVal}
</Box> clbPer={org.permission}
</Td> id={org.orgId!}
<Td> />
<Box mx="auto" w="fit-content"> <PermissionCheckBox
<Checkbox isDisabled={org.permission.isOwner || !userInfo?.permission.isOwner}
isDisabled={!userInfo?.permission.isOwner} per={TeamManagePermissionVal}
isChecked={org.permission.hasManagePer} clbPer={org.permission}
onChange={(e) => id={org.orgId!}
e.target.checked />
? onUpdatePermission({ id: org.orgId!, type: 'add', per: 'manage' })
: onUpdatePermission({
id: org.orgId!,
type: 'remove',
per: 'manage'
})
}
/>
</Box>
</Td>
<Td> <Td>
{hasDeletePer(org.permission) && ( {hasDeletePer(org.permission) && (
<Box mx="auto" w="fit-content"> <Box mx="auto" w="fit-content">
@ -358,48 +383,30 @@ function PermissionManage({
avatar={group.avatar} avatar={group.avatar}
/> />
</Td> </Td>
<Td> <PermissionCheckBox
<Box mx="auto" w="fit-content"> isDisabled={group.permission.isOwner || !userManage}
<Checkbox per={TeamAppCreatePermissionVal}
isDisabled={!userManage} clbPer={group.permission}
isChecked={group.permission.hasWritePer} id={group.groupId!}
onChange={(e) => />
e.target.checked <PermissionCheckBox
? onUpdatePermission({ isDisabled={group.permission.isOwner || !userManage}
id: group.groupId!, per={TeamDatasetCreatePermissionVal}
type: 'add', clbPer={group.permission}
per: 'write' id={group.groupId!}
}) />
: onUpdatePermission({ <PermissionCheckBox
id: group.groupId!, isDisabled={group.permission.isOwner || !userManage}
type: 'remove', per={TeamApikeyCreatePermissionVal}
per: 'write' clbPer={group.permission}
}) id={group.groupId!}
} />
/> <PermissionCheckBox
</Box> isDisabled={group.permission.isOwner || !userInfo?.permission.isOwner}
</Td> per={TeamManagePermissionVal}
<Td> clbPer={group.permission}
<Box mx="auto" w="fit-content"> id={group.groupId!}
<Checkbox />
isDisabled={!userInfo?.permission.isOwner}
isChecked={group.permission.hasManagePer}
onChange={(e) =>
e.target.checked
? onUpdatePermission({
id: group.groupId!,
type: 'add',
per: 'manage'
})
: onUpdatePermission({
id: group.groupId!,
type: 'remove',
per: 'manage'
})
}
/>
</Box>
</Td>
<Td> <Td>
{hasDeletePer(group.permission) && ( {hasDeletePer(group.permission) && (
<Box mx="auto" w="fit-content"> <Box mx="auto" w="fit-content">

View File

@ -36,6 +36,7 @@ import { useSystem } from '@fastgpt/web/hooks/useSystem';
import { useChatStore } from '@/web/core/chat/context/useChatStore'; import { useChatStore } from '@/web/core/chat/context/useChatStore';
import { RequireOnlyOne } from '@fastgpt/global/common/type/utils'; import { RequireOnlyOne } from '@fastgpt/global/common/type/utils';
import UserBox from '@fastgpt/web/components/common/UserBox'; import UserBox from '@fastgpt/web/components/common/UserBox';
import { PermissionValueType } from '@fastgpt/global/support/permission/type';
const HttpEditModal = dynamic(() => import('./HttpPluginEditModal')); const HttpEditModal = dynamic(() => import('./HttpPluginEditModal'));
const ListItem = () => { const ListItem = () => {
@ -429,7 +430,7 @@ const ListItem = () => {
members?: string[]; members?: string[];
groups?: string[]; groups?: string[];
orgs?: string[]; orgs?: string[];
permission: number; permission: PermissionValueType;
}) => }) =>
postUpdateAppCollaborators({ postUpdateAppCollaborators({
...props, ...props,

View File

@ -4,6 +4,7 @@ import { authApp } from '@fastgpt/service/support/permission/app/auth';
import { WritePermissionVal } from '@fastgpt/global/support/permission/constant'; import { WritePermissionVal } from '@fastgpt/global/support/permission/constant';
import { authUserPer } from '@fastgpt/service/support/permission/user/auth'; import { authUserPer } from '@fastgpt/service/support/permission/user/auth';
import { onCreateApp } from './create'; import { onCreateApp } from './create';
import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
export type copyAppQuery = {}; export type copyAppQuery = {};
@ -17,19 +18,16 @@ async function handler(
req: ApiRequestProps<copyAppBody, copyAppQuery>, req: ApiRequestProps<copyAppBody, copyAppQuery>,
res: ApiResponseType<any> res: ApiResponseType<any>
): Promise<copyAppResponse> { ): Promise<copyAppResponse> {
const [{ app, tmbId }] = await Promise.all([ const { app } = await authApp({
authApp({ req,
req, authToken: true,
authToken: true, per: WritePermissionVal,
per: WritePermissionVal, appId: req.body.appId
appId: req.body.appId });
}),
authUserPer({ const { tmbId } = app.parentId
req, ? await authApp({ req, appId: app.parentId, per: TeamAppCreatePermissionVal, authToken: true })
authToken: true, : await authUserPer({ req, authToken: true, per: TeamAppCreatePermissionVal });
per: WritePermissionVal
})
]);
const appId = await onCreateApp({ const appId = await onCreateApp({
parentId: app.parentId, parentId: app.parentId,

View File

@ -17,6 +17,7 @@ import { CommonErrEnum } from '@fastgpt/global/common/error/code/common';
import { MongoTeamMember } from '@fastgpt/service/support/user/team/teamMemberSchema'; import { MongoTeamMember } from '@fastgpt/service/support/user/team/teamMemberSchema';
import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils'; import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils';
import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller'; import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller';
import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
export type CreateAppBody = { export type CreateAppBody = {
parentId?: ParentIdType; parentId?: ParentIdType;
@ -36,18 +37,15 @@ async function handler(req: ApiRequestProps<CreateAppBody>) {
} }
// 凭证校验 // 凭证校验
const [{ teamId, tmbId, userId }] = await Promise.all([ const { teamId, tmbId, userId } = parentId
authUserPer({ req, authToken: true, per: WritePermissionVal }), ? await authApp({ req, appId: parentId, per: TeamAppCreatePermissionVal, authToken: true })
...(parentId : await authUserPer({ req, authToken: true, per: TeamAppCreatePermissionVal });
? [authApp({ req, appId: parentId, per: WritePermissionVal, authToken: true })]
: [])
]);
// 上限校验 // 上限校验
await checkTeamAppLimit(teamId); await checkTeamAppLimit(teamId);
const tmb = await MongoTeamMember.findById({ _id: tmbId }, 'userId').populate<{ const tmb = await MongoTeamMember.findById({ _id: tmbId }, 'userId').populate<{
user: { avatar: string; username: string }; user: { username: string };
}>('user', 'avatar username'); }>('user', 'username');
// 创建app // 创建app
const appId = await onCreateApp({ const appId = await onCreateApp({
@ -60,7 +58,7 @@ async function handler(req: ApiRequestProps<CreateAppBody>) {
chatConfig, chatConfig,
teamId, teamId,
tmbId, tmbId,
userAvatar: tmb?.user?.avatar, userAvatar: tmb?.avatar,
username: tmb?.user?.username username: tmb?.user?.username
}); });

View File

@ -16,7 +16,7 @@ import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun';
import { CommonErrEnum } from '@fastgpt/global/common/error/code/common'; import { CommonErrEnum } from '@fastgpt/global/common/error/code/common';
import { syncCollaborators } from '@fastgpt/service/support/permission/inheritPermission'; import { syncCollaborators } from '@fastgpt/service/support/permission/inheritPermission';
import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller'; import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller';
import { TeamWritePermissionVal } from '@fastgpt/global/support/permission/user/constant'; import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema'; import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
export type CreateAppFolderBody = { export type CreateAppFolderBody = {
@ -33,21 +33,9 @@ async function handler(req: ApiRequestProps<CreateAppFolderBody>) {
} }
// 凭证校验 // 凭证校验
const { teamId, tmbId } = await authUserPer({ const { teamId, tmbId } = parentId
req, ? await authApp({ req, appId: parentId, per: TeamAppCreatePermissionVal, authToken: true })
authToken: true, : await authUserPer({ req, authToken: true, per: TeamAppCreatePermissionVal });
per: TeamWritePermissionVal
});
if (parentId) {
// if it is not a root folder
await authApp({
req,
appId: parentId,
per: WritePermissionVal,
authToken: true
});
}
// Create app // Create app
await mongoSessionRun(async (session) => { await mongoSessionRun(async (session) => {

View File

@ -9,6 +9,8 @@ import { onCreateApp, type CreateAppBody } from '../create';
import { AppSchema } from '@fastgpt/global/core/app/type'; import { AppSchema } from '@fastgpt/global/core/app/type';
import { AppTypeEnum } from '@fastgpt/global/core/app/constants'; import { AppTypeEnum } from '@fastgpt/global/core/app/constants';
import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils'; import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils';
import { authApp } from '@fastgpt/service/support/permission/app/auth';
import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
export type createHttpPluginQuery = {}; export type createHttpPluginQuery = {};
@ -29,11 +31,9 @@ async function handler(
return Promise.reject('缺少参数'); return Promise.reject('缺少参数');
} }
const { teamId, tmbId, userId } = await authUserPer({ const { teamId, tmbId, userId } = parentId
req, ? await authApp({ req, appId: parentId, per: TeamAppCreatePermissionVal, authToken: true })
authToken: true, : await authUserPer({ req, authToken: true, per: TeamAppCreatePermissionVal });
per: WritePermissionVal
});
await mongoSessionRun(async (session) => { await mongoSessionRun(async (session) => {
// create http plugin folder // create http plugin folder

View File

@ -20,7 +20,7 @@ import { ClientSession } from 'mongoose';
import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun'; import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun';
import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller'; import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller';
import { authUserPer } from '@fastgpt/service/support/permission/user/auth'; import { authUserPer } from '@fastgpt/service/support/permission/user/auth';
import { TeamWritePermissionVal } from '@fastgpt/global/support/permission/user/constant'; import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { AppErrEnum } from '@fastgpt/global/common/error/code/app'; import { AppErrEnum } from '@fastgpt/global/common/error/code/app';
import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller'; import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema'; import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
@ -79,7 +79,7 @@ async function handler(req: ApiRequestProps<AppUpdateBody, AppUpdateQuery>) {
await authUserPer({ await authUserPer({
req, req,
authToken: true, authToken: true,
per: TeamWritePermissionVal per: TeamAppCreatePermissionVal
}); });
} }
} else { } else {

View File

@ -6,11 +6,9 @@ import {
getLLMModel, getLLMModel,
getEmbeddingModel, getEmbeddingModel,
getDatasetModel, getDatasetModel,
getDefaultEmbeddingModel, getDefaultEmbeddingModel
getVlmModel
} from '@fastgpt/service/core/ai/model'; } from '@fastgpt/service/core/ai/model';
import { checkTeamDatasetLimit } from '@fastgpt/service/support/permission/teamLimit'; import { checkTeamDatasetLimit } from '@fastgpt/service/support/permission/teamLimit';
import { WritePermissionVal } from '@fastgpt/global/support/permission/constant';
import { NextAPI } from '@/service/middleware/entry'; import { NextAPI } from '@/service/middleware/entry';
import type { ApiRequestProps } from '@fastgpt/service/type/next'; import type { ApiRequestProps } from '@fastgpt/service/type/next';
import { parseParentIdInMongo } from '@fastgpt/global/common/parentFolder/utils'; import { parseParentIdInMongo } from '@fastgpt/global/common/parentFolder/utils';
@ -18,6 +16,7 @@ import { authDataset } from '@fastgpt/service/support/permission/dataset/auth';
import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils'; import { pushTrack } from '@fastgpt/service/common/middle/tracks/utils';
import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun'; import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun';
import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller'; import { refreshSourceAvatar } from '@fastgpt/service/common/file/image/controller';
import { TeamDatasetCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
export type DatasetCreateQuery = {}; export type DatasetCreateQuery = {};
export type DatasetCreateBody = CreateDatasetParams; export type DatasetCreateBody = CreateDatasetParams;
@ -41,25 +40,20 @@ async function handler(
} = req.body; } = req.body;
// auth // auth
const [{ teamId, tmbId, userId }] = await Promise.all([ const { teamId, tmbId, userId } = parentId
authUserPer({ ? await authDataset({
req, req,
authToken: true, datasetId: parentId,
authApiKey: true, authToken: true,
per: WritePermissionVal authApiKey: true,
}), per: TeamDatasetCreatePermissionVal
...(parentId })
? [ : await authUserPer({
authDataset({ req,
req, authToken: true,
datasetId: parentId, authApiKey: true,
authToken: true, per: TeamDatasetCreatePermissionVal
authApiKey: true, });
per: WritePermissionVal
})
]
: [])
]);
// check model valid // check model valid
const vectorModelStore = getEmbeddingModel(vectorModel); const vectorModelStore = getEmbeddingModel(vectorModel);

View File

@ -5,8 +5,7 @@ import { CommonErrEnum } from '@fastgpt/global/common/error/code/common';
import { authUserPer } from '@fastgpt/service/support/permission/user/auth'; import { authUserPer } from '@fastgpt/service/support/permission/user/auth';
import { import {
OwnerPermissionVal, OwnerPermissionVal,
PerResourceTypeEnum, PerResourceTypeEnum
WritePermissionVal
} from '@fastgpt/global/support/permission/constant'; } from '@fastgpt/global/support/permission/constant';
import { authDataset } from '@fastgpt/service/support/permission/dataset/auth'; import { authDataset } from '@fastgpt/service/support/permission/dataset/auth';
import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun'; import { mongoSessionRun } from '@fastgpt/service/common/mongo/sessionRun';
@ -16,6 +15,7 @@ import { DatasetTypeEnum } from '@fastgpt/global/core/dataset/constants';
import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller'; import { getResourceClbsAndGroups } from '@fastgpt/service/support/permission/controller';
import { syncCollaborators } from '@fastgpt/service/support/permission/inheritPermission'; import { syncCollaborators } from '@fastgpt/service/support/permission/inheritPermission';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema'; import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
import { TeamDatasetCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
export type DatasetFolderCreateQuery = {}; export type DatasetFolderCreateQuery = {};
export type DatasetFolderCreateBody = { export type DatasetFolderCreateBody = {
parentId?: string; parentId?: string;
@ -33,20 +33,20 @@ async function handler(
return Promise.reject(CommonErrEnum.missingParams); return Promise.reject(CommonErrEnum.missingParams);
} }
const { tmbId, teamId } = await authUserPer({ const { teamId, tmbId } = parentId
req, ? await authDataset({
per: WritePermissionVal, req,
authToken: true datasetId: parentId,
}); authToken: true,
authApiKey: true,
if (parentId) { per: TeamDatasetCreatePermissionVal
await authDataset({ })
datasetId: parentId, : await authUserPer({
per: WritePermissionVal, req,
req, authToken: true,
authToken: true authApiKey: true,
}); per: TeamDatasetCreatePermissionVal
} });
await mongoSessionRun(async (session) => { await mongoSessionRun(async (session) => {
const dataset = await MongoDataset.create({ const dataset = await MongoDataset.create({

View File

@ -23,7 +23,7 @@ import {
syncCollaborators syncCollaborators
} from '@fastgpt/service/support/permission/inheritPermission'; } from '@fastgpt/service/support/permission/inheritPermission';
import { authUserPer } from '@fastgpt/service/support/permission/user/auth'; import { authUserPer } from '@fastgpt/service/support/permission/user/auth';
import { TeamWritePermissionVal } from '@fastgpt/global/support/permission/user/constant'; import { TeamDatasetCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { DatasetErrEnum } from '@fastgpt/global/common/error/code/dataset'; import { DatasetErrEnum } from '@fastgpt/global/common/error/code/dataset';
import { MongoDatasetTraining } from '@fastgpt/service/core/dataset/training/schema'; import { MongoDatasetTraining } from '@fastgpt/service/core/dataset/training/schema';
import { MongoDatasetCollection } from '@fastgpt/service/core/dataset/collection/schema'; import { MongoDatasetCollection } from '@fastgpt/service/core/dataset/collection/schema';
@ -104,7 +104,7 @@ async function handler(
await authUserPer({ await authUserPer({
req, req,
authToken: true, authToken: true,
per: TeamWritePermissionVal per: TeamDatasetCreatePermissionVal
}); });
} }
} else { } else {

View File

@ -4,12 +4,10 @@ import { authUserPer } from '@fastgpt/service/support/permission/user/auth';
import { getNanoid } from '@fastgpt/global/common/string/tools'; import { getNanoid } from '@fastgpt/global/common/string/tools';
import type { ApiRequestProps } from '@fastgpt/service/type/next'; import type { ApiRequestProps } from '@fastgpt/service/type/next';
import { NextAPI } from '@/service/middleware/entry'; import { NextAPI } from '@/service/middleware/entry';
import { import { ManagePermissionVal } from '@fastgpt/global/support/permission/constant';
ManagePermissionVal,
WritePermissionVal
} from '@fastgpt/global/support/permission/constant';
import { authApp } from '@fastgpt/service/support/permission/app/auth'; import { authApp } from '@fastgpt/service/support/permission/app/auth';
import { OpenApiErrEnum } from '@fastgpt/global/common/error/code/openapi'; import { OpenApiErrEnum } from '@fastgpt/global/common/error/code/openapi';
import { TeamApikeyCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
async function handler(req: ApiRequestProps<EditApiKeyProps>): Promise<string> { async function handler(req: ApiRequestProps<EditApiKeyProps>): Promise<string> {
const { appId, name, limit } = req.body; const { appId, name, limit } = req.body;
@ -19,7 +17,7 @@ async function handler(req: ApiRequestProps<EditApiKeyProps>): Promise<string> {
const { teamId, tmbId } = await authUserPer({ const { teamId, tmbId } = await authUserPer({
req, req,
authToken: true, authToken: true,
per: WritePermissionVal per: TeamApikeyCreatePermissionVal
}); });
return { teamId, tmbId }; return { teamId, tmbId };
} else { } else {

View File

@ -31,6 +31,7 @@ import MyIcon from '@fastgpt/web/components/common/Icon';
import TemplateMarketModal from '@/pageComponents/app/list/TemplateMarketModal'; import TemplateMarketModal from '@/pageComponents/app/list/TemplateMarketModal';
import MyImage from '@fastgpt/web/components/common/Image/MyImage'; import MyImage from '@fastgpt/web/components/common/Image/MyImage';
import JsonImportModal from '@/pageComponents/app/list/JsonImportModal'; import JsonImportModal from '@/pageComponents/app/list/JsonImportModal';
import { PermissionValueType } from '@fastgpt/global/support/permission/type';
const CreateModal = dynamic(() => import('@/pageComponents/app/list/CreateModal')); const CreateModal = dynamic(() => import('@/pageComponents/app/list/CreateModal'));
const EditFolderModal = dynamic( const EditFolderModal = dynamic(
@ -213,7 +214,7 @@ const MyApps = () => {
{(folderDetail {(folderDetail
? folderDetail.permission.hasWritePer && folderDetail?.type !== AppTypeEnum.httpPlugin ? folderDetail.permission.hasWritePer && folderDetail?.type !== AppTypeEnum.httpPlugin
: userInfo?.team.permission.hasWritePer) && ( : userInfo?.team.permission.hasAppCreatePer) && (
<MyMenu <MyMenu
size="md" size="md"
Button={ Button={
@ -327,7 +328,7 @@ const MyApps = () => {
}: { }: {
members?: string[]; members?: string[];
groups?: string[]; groups?: string[];
permission: number; permission: PermissionValueType;
}) => { }) => {
return postUpdateAppCollaborators({ return postUpdateAppCollaborators({
members, members,

View File

@ -29,6 +29,7 @@ import { DatasetTypeEnum } from '@fastgpt/global/core/dataset/constants';
import { useToast } from '@fastgpt/web/hooks/useToast'; import { useToast } from '@fastgpt/web/hooks/useToast';
import MyBox from '@fastgpt/web/components/common/MyBox'; import MyBox from '@fastgpt/web/components/common/MyBox';
import { useSystemStore } from '@/web/common/system/useSystemStore'; import { useSystemStore } from '@/web/common/system/useSystemStore';
import { PermissionValueType } from '@fastgpt/global/support/permission/type';
const EditFolderModal = dynamic( const EditFolderModal = dynamic(
() => import('@fastgpt/web/components/common/MyModal/EditFolderModal') () => import('@fastgpt/web/components/common/MyModal/EditFolderModal')
@ -138,7 +139,7 @@ const Dataset = () => {
{(folderDetail {(folderDetail
? folderDetail.permission.hasWritePer ? folderDetail.permission.hasWritePer
: userInfo?.team?.permission.hasWritePer) && ( : userInfo?.team?.permission.hasDatasetCreatePer) && (
<Box pl={[0, 4]}> <Box pl={[0, 4]}>
<MyMenu <MyMenu
size="md" size="md"
@ -248,7 +249,7 @@ const Dataset = () => {
}: { }: {
members?: string[]; members?: string[];
groups?: string[]; groups?: string[];
permission: number; permission: PermissionValueType;
}) => }) =>
postUpdateDatasetCollaborators({ postUpdateDatasetCollaborators({
members, members,

View File

@ -0,0 +1,57 @@
import * as createapi from '@/pages/api/core/app/create';
import { AppErrEnum } from '@fastgpt/global/common/error/code/app';
import { AppTypeEnum } from '@fastgpt/global/core/app/constants';
import { TeamAppCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
import { getFakeUsers } from '@test/datas/users';
import { Call } from '@test/utils/request';
import { expect, it, describe } from 'vitest';
describe('create api', () => {
it('should return 200 when create app success', async () => {
const users = await getFakeUsers(2);
await MongoResourcePermission.create({
resourceType: 'team',
teamId: users.members[0].teamId,
resourceId: null,
tmbId: users.members[0].tmbId,
permission: TeamAppCreatePermissionVal
});
const res = await Call<createapi.CreateAppBody, {}, {}>(createapi.default, {
auth: users.members[0],
body: {
modules: [],
name: 'testfolder',
type: AppTypeEnum.folder
}
});
expect(res.error).toBeUndefined();
expect(res.code).toBe(200);
const folderId = res.data as string;
const res2 = await Call<createapi.CreateAppBody, {}, {}>(createapi.default, {
auth: users.members[0],
body: {
modules: [],
name: 'testapp',
type: AppTypeEnum.simple,
parentId: String(folderId)
}
});
expect(res2.error).toBeUndefined();
expect(res2.code).toBe(200);
expect(res2.data).toBeDefined();
const res3 = await Call<createapi.CreateAppBody, {}, {}>(createapi.default, {
auth: users.members[1],
body: {
modules: [],
name: 'testapp',
type: AppTypeEnum.simple,
parentId: String(folderId)
}
});
expect(res3.error).toBe(AppErrEnum.unAuthApp);
expect(res3.code).toBe(500);
});
});

View File

@ -0,0 +1,54 @@
import * as createapi from '@/pages/api/core/dataset/create';
import { DatasetTypeEnum } from '@fastgpt/global/core/dataset/constants';
import { TeamDatasetCreatePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
import { getFakeUsers } from '@test/datas/users';
import { Call } from '@test/utils/request';
import { vi, describe, it, expect } from 'vitest';
describe('create dataset', () => {
it('should return 200 when create dataset success', async () => {
const users = await getFakeUsers(2);
await MongoResourcePermission.create({
resourceType: 'team',
teamId: users.members[0].teamId,
resourceId: null,
tmbId: users.members[0].tmbId,
permission: TeamDatasetCreatePermissionVal
});
const res = await Call<
createapi.DatasetCreateBody,
createapi.DatasetCreateQuery,
createapi.DatasetCreateResponse
>(createapi.default, {
auth: users.members[0],
body: {
name: 'folder',
intro: 'intro',
avatar: 'avatar',
type: DatasetTypeEnum.folder
}
});
expect(res.error).toBeUndefined();
expect(res.code).toBe(200);
const folderId = res.data as string;
const res2 = await Call<
createapi.DatasetCreateBody,
createapi.DatasetCreateQuery,
createapi.DatasetCreateResponse
>(createapi.default, {
auth: users.members[0],
body: {
name: 'test',
intro: 'intro',
avatar: 'avatar',
type: DatasetTypeEnum.dataset,
parentId: folderId
}
});
expect(res2.error).toBeUndefined();
expect(res2.code).toBe(200);
});
});

View File

@ -0,0 +1,64 @@
import { EditApiKeyProps } from '@/global/support/openapi/api';
import * as createapi from '@/pages/api/support/openapi/create';
import { DatasetTypeEnum } from '@fastgpt/global/core/dataset/constants';
import { ManagePermissionVal } from '@fastgpt/global/support/permission/constant';
import {
TeamApikeyCreatePermissionVal,
TeamDatasetCreatePermissionVal
} from '@fastgpt/global/support/permission/user/constant';
import { MongoApp } from '@fastgpt/service/core/app/schema';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
import { getFakeUsers } from '@test/datas/users';
import { Call } from '@test/utils/request';
import { describe, it, expect } from 'vitest';
describe('create dataset', () => {
it('should return 200 when create dataset success', async () => {
const users = await getFakeUsers(2);
await MongoResourcePermission.create({
resourceType: 'team',
teamId: users.members[0].teamId,
resourceId: null,
tmbId: users.members[0].tmbId,
permission: TeamApikeyCreatePermissionVal
});
const res = await Call<EditApiKeyProps>(createapi.default, {
auth: users.members[0],
body: {
name: 'test',
limit: {
maxUsagePoints: 1000
}
}
});
expect(res.error).toBeUndefined();
expect(res.code).toBe(200);
await MongoResourcePermission.create({
resourceType: 'app',
teamId: users.members[1].teamId,
resourceId: null,
tmbId: users.members[1].tmbId,
permission: ManagePermissionVal
});
const app = await MongoApp.create({
name: 'a',
type: 'simple',
tmbId: users.members[1].tmbId,
teamId: users.members[1].teamId
});
const res2 = await Call<EditApiKeyProps>(createapi.default, {
auth: users.members[1],
body: {
appId: app._id,
name: 'test',
limit: {
maxUsagePoints: 1000
}
}
});
expect(res2.error).toBeUndefined();
expect(res2.code).toBe(200);
});
});

View File

@ -0,0 +1,26 @@
{
"compilerOptions": {
"target": "es2022",
"lib": ["dom", "dom.iterable", "esnext"],
"allowJs": true,
"skipLibCheck": true,
"strict": true,
"forceConsistentCasingInFileNames": true,
"noEmit": true,
"esModuleInterop": true,
"module": "esnext",
"moduleResolution": "node",
"resolveJsonModule": true,
"isolatedModules": true,
"jsx": "preserve",
"incremental": true,
"baseUrl": ".",
"paths": {
"@/*": ["../src/*"],
"@fastgpt/*": ["../../../packages/*"],
"@test/*": ["../../../test/*"]
}
},
"include": ["**/*.test.ts"],
"exclude": ["**/node_modules"]
}

View File

@ -1,6 +1,6 @@
import { readFileSync } from 'fs'; import { readFileSync } from 'fs';
import { resolve } from 'path'; import { resolve } from 'path';
import { describe, it, expect, beforeEach, vi } from 'vitest'; import { it, expect, vi } from 'vitest';
import { dispatchWorkFlow } from '@fastgpt/service/core/workflow/dispatch'; import { dispatchWorkFlow } from '@fastgpt/service/core/workflow/dispatch';
import { import {
getWorkflowEntryNodeIds, getWorkflowEntryNodeIds,
@ -29,8 +29,9 @@ vi.mock(import('@fastgpt/service/support/wallet/usage/utils'), async (importOrig
}); });
const testWorkflow = async (path: string) => { const testWorkflow = async (path: string) => {
const workflowStr = readFileSync(resolve(path), 'utf-8'); const fileContent = readFileSync(resolve(process.cwd(), path), 'utf-8');
const workflow = JSON.parse(workflowStr); const workflow = JSON.parse(fileContent);
console.log(workflow, 111);
const { nodes, edges, chatConfig } = workflow; const { nodes, edges, chatConfig } = workflow;
let runtimeNodes = storeNodes2RuntimeNodes(nodes, getWorkflowEntryNodeIds(nodes)); let runtimeNodes = storeNodes2RuntimeNodes(nodes, getWorkflowEntryNodeIds(nodes));
const variables = {}; const variables = {};
@ -74,9 +75,9 @@ const testWorkflow = async (path: string) => {
it('Workflow test: simple workflow', async () => { it('Workflow test: simple workflow', async () => {
// create a simple app // create a simple app
await testWorkflow('test/cases/workflow/simple.json'); // await testWorkflow('test/cases/service/core/app/workflow/loopTest.json');
}); });
it('Workflow test: output test', async () => { it('Workflow test: output test', async () => {
console.log(await testWorkflow('test/cases/workflow/loopTest.json')); // console.log(await testWorkflow('@/test/cases/workflow/loopTest.json'));
}); });

View File

@ -1,4 +1,12 @@
import { AuthUserTypeEnum } from '@fastgpt/global/support/permission/constant'; import { AuthUserTypeEnum, PerResourceTypeEnum } from '@fastgpt/global/support/permission/constant';
import { MemberGroupSchemaType } from '@fastgpt/global/support/permission/memberGroup/type';
import { PermissionValueType } from '@fastgpt/global/support/permission/type';
import { TeamManagePermissionVal } from '@fastgpt/global/support/permission/user/constant';
import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant';
import { OrgSchemaType, OrgType } from '@fastgpt/global/support/user/team/org/type';
import { MongoMemberGroupModel } from '@fastgpt/service/support/permission/memberGroup/memberGroupSchema';
import { MongoOrgModel } from '@fastgpt/service/support/permission/org/orgSchema';
import { MongoResourcePermission } from '@fastgpt/service/support/permission/schema';
import { MongoUser } from '@fastgpt/service/support/user/schema'; import { MongoUser } from '@fastgpt/service/support/user/schema';
import { MongoTeamMember } from '@fastgpt/service/support/user/team/teamMemberSchema'; import { MongoTeamMember } from '@fastgpt/service/support/user/team/teamMemberSchema';
import { MongoTeam } from '@fastgpt/service/support/user/team/teamSchema'; import { MongoTeam } from '@fastgpt/service/support/user/team/teamSchema';
@ -33,22 +41,40 @@ export async function getRootUser(): Promise<parseHeaderCertRet> {
}; };
} }
export async function getUser(username: string): Promise<parseHeaderCertRet> { export async function getUser(username: string, teamId?: string): Promise<parseHeaderCertRet> {
const user = await MongoUser.create({ const user = await MongoUser.create({
username, username,
password: '123456' password: '123456'
}); });
const team = await MongoTeam.create({ const tmb = await (async () => {
name: 'test team', if (!teamId) {
ownerId: user._id const team = await MongoTeam.create({
}); name: username,
ownerId: user._id
});
const tmb = await MongoTeamMember.create({
name: username,
teamId: team._id,
userId: user._id,
status: 'active',
role: 'owner'
});
const tmb = await MongoTeamMember.create({ await MongoMemberGroupModel.create({
teamId: team._id, teamId: team._id,
userId: user._id, name: DefaultGroupName,
status: 'active' avatar: team.avatar
}); });
return tmb;
}
return MongoTeamMember.create({
teamId,
userId: user._id,
status: 'active'
});
})();
return { return {
userId: user._id, userId: user._id,
@ -61,3 +87,90 @@ export async function getUser(username: string): Promise<parseHeaderCertRet> {
tmbId: tmb?._id tmbId: tmb?._id
}; };
} }
let fakeUsers: Record<string, parseHeaderCertRet> = {};
async function getFakeUser(username: string) {
if (username === 'Owner') {
if (!fakeUsers[username]) {
fakeUsers[username] = await getUser(username);
}
return fakeUsers[username];
}
const owner = await getFakeUser('Owner');
const ownerTeamId = owner.teamId;
if (!fakeUsers[username]) {
fakeUsers[username] = await getUser(username, ownerTeamId);
}
return fakeUsers[username];
}
async function addPermission({
user,
permission
}: {
user: parseHeaderCertRet;
permission: PermissionValueType;
}) {
const { teamId, tmbId } = user;
await MongoResourcePermission.updateOne({
resourceType: PerResourceTypeEnum.team,
teamId,
resourceId: null,
tmbId,
permission
});
}
export async function getFakeUsers(num: number = 10) {
const owner = await getFakeUser('Owner');
const manager = await getFakeUser('Manager');
await MongoResourcePermission.create({
resourceType: PerResourceTypeEnum.team,
teamId: owner.teamId,
resourceId: null,
tmbId: manager.tmbId,
permission: TeamManagePermissionVal
});
const members = (await Promise.all(
Array.from({ length: num }, (_, i) => `member${i + 1}`) // 团队 member1, member2, ..., member10
.map((username) => getFakeUser(username))
)) as parseHeaderCertRet[];
return {
owner,
manager,
members
};
}
export async function getFakeGroups(num: number = 5) {
// create 5 groups
const teamId = (await getFakeUser('Owner')).teamId;
return MongoMemberGroupModel.create([
...Array(num)
.keys()
.map((i) => ({
name: `group${i + 1}`,
teamId
}))
]) as Promise<MemberGroupSchemaType[]>;
}
export async function getFakeOrgs() {
// create 5 orgs
const pathIds = ['root', 'org1', 'org2', 'org3', 'org4', 'org5'];
const paths = ['', '/root', '/root', '/root', '/root/org1', '/root/org1/org4'];
const teamId = (await getFakeUser('Owner')).teamId;
return MongoOrgModel.create(
pathIds.map((pathId, i) => ({
pathId,
name: pathId,
path: paths[i],
teamId
}))
) as Promise<OrgSchemaType[]>;
}
export async function clean() {
fakeUsers = {};
}

18
test/globalSetup.ts Normal file
View File

@ -0,0 +1,18 @@
import { MongoMemoryReplSet } from 'mongodb-memory-server';
import type { TestProject } from 'vitest/node';
export default async function setup(project: TestProject) {
const replset = await MongoMemoryReplSet.create({ replSet: { count: 1 } });
const uri = replset.getUri();
project.provide('MONGODB_URI', uri);
return async () => {
await replset.stop();
};
}
declare module 'vitest' {
export interface ProvidedContext {
MONGODB_URI: string;
}
}

View File

@ -1,4 +1,8 @@
import { TeamErrEnum } from '@fastgpt/global/common/error/code/team';
import { AuthUserTypeEnum } from '@fastgpt/global/support/permission/constant'; import { AuthUserTypeEnum } from '@fastgpt/global/support/permission/constant';
import { TeamPermission } from '@fastgpt/global/support/permission/user/controller';
import { MongoGroupMemberModel } from '@fastgpt/service/support/permission/memberGroup/groupMemberSchema';
import { getTmbInfoByTmbId } from '@fastgpt/service/support/user/team/controller';
import { vi } from 'vitest'; import { vi } from 'vitest';
// vi.mock(import('@/service/middleware/entry'), async () => { // vi.mock(import('@/service/middleware/entry'), async () => {
@ -87,3 +91,62 @@ vi.mock(import('@fastgpt/service/support/permission/controller'), async (importO
parseHeaderCert parseHeaderCert
}; };
}); });
vi.mock(
import('@fastgpt/service/support/permission/memberGroup/controllers'),
async (importOriginal) => {
const mod = await importOriginal();
const parseHeaderCert = vi.fn(
({
req,
authToken = false,
authRoot = false,
authApiKey = false
}: {
req: MockReqType;
authToken?: boolean;
authRoot?: boolean;
authApiKey?: boolean;
}) => {
const { auth } = req;
if (!auth) {
return Promise.reject(Error('unAuthorization(mock)'));
}
return Promise.resolve(auth);
}
);
const authGroupMemberRole = vi.fn(async ({ groupId, role, ...props }: any) => {
const result = await parseHeaderCert(props);
const { teamId, tmbId, isRoot } = result;
if (isRoot) {
return {
...result,
permission: new TeamPermission({
isOwner: true
}),
teamId,
tmbId
};
}
const [groupMember, tmb] = await Promise.all([
MongoGroupMemberModel.findOne({ groupId, tmbId }),
getTmbInfoByTmbId({ tmbId })
]);
// Team admin or role check
if (tmb.permission.hasManagePer || (groupMember && role.includes(groupMember.role))) {
return {
...result,
permission: tmb.permission,
teamId,
tmbId
};
}
return Promise.reject(TeamErrEnum.unAuthTeam);
});
return {
...mod,
authGroupMemberRole
};
}
);

View File

@ -1,31 +1,22 @@
import { existsSync, readFileSync } from 'fs';
import mongoose from '@fastgpt/service/common/mongo';
import { connectMongo } from '@fastgpt/service/common/mongo/init';
import {
connectionMongo,
connectionLogMongo,
MONGO_URL,
MONGO_LOG_URL
} from '@fastgpt/service/common/mongo';
import { initGlobalVariables } from '@/service/common/system';
import { afterAll, beforeAll, vi } from 'vitest';
import { setup, teardown } from 'vitest-mongodb';
import setupModels from './setupModels';
import './mocks'; import './mocks';
import { existsSync, readFileSync } from 'fs';
import { connectMongo } from '@fastgpt/service/common/mongo/init';
import { initGlobalVariables } from '@/service/common/system';
import { afterAll, beforeAll, beforeEach, inject, vi } from 'vitest';
import setupModels from './setupModels';
import { clean } from './datas/users';
import { connectionLogMongo, connectionMongo, Mongoose } from '@fastgpt/service/common/mongo';
import { randomUUID } from 'crypto';
vi.stubEnv('NODE_ENV', 'test'); vi.stubEnv('NODE_ENV', 'test');
vi.mock(import('@fastgpt/service/common/mongo'), async (importOriginal) => {
vi.mock(import('@fastgpt/service/common/mongo/init'), async (importOriginal: any) => {
const mod = await importOriginal(); const mod = await importOriginal();
return { return {
...mod, ...mod,
connectionMongo: await (async () => { connectMongo: async (db: Mongoose, url: string) => {
if (!global.mongodb) { (await db.connect(url)).connection.useDb(randomUUID());
global.mongodb = mongoose; }
await global.mongodb.connect((globalThis as any).__MONGO_URI__ as string);
}
return global.mongodb;
})()
}; };
}); });
@ -59,18 +50,12 @@ vi.mock(import('@/service/common/system'), async (importOriginal) => {
}); });
beforeAll(async () => { beforeAll(async () => {
await setup({ vi.stubEnv('MONGODB_URI', inject('MONGODB_URI'));
type: 'replSet', await connectMongo(connectionMongo, inject('MONGODB_URI'));
serverOptions: { await connectMongo(connectionLogMongo, inject('MONGODB_URI'));
replSet: {
count: 1
}
}
});
vi.stubEnv('MONGODB_URI', (globalThis as any).__MONGO_URI__);
initGlobalVariables(); initGlobalVariables();
await connectMongo(connectionMongo, MONGO_URL); global.systemEnv = {} as any;
await connectMongo(connectionLogMongo, MONGO_LOG_URL);
// await getInitConfig(); // await getInitConfig();
if (existsSync('projects/app/.env.local')) { if (existsSync('projects/app/.env.local')) {
@ -83,13 +68,27 @@ beforeAll(async () => {
systemEnv[key] = value; systemEnv[key] = value;
} }
} }
global.systemEnv = {} as any;
global.systemEnv.oneapiUrl = systemEnv['OPENAI_BASE_URL']; global.systemEnv.oneapiUrl = systemEnv['OPENAI_BASE_URL'];
global.systemEnv.chatApiKey = systemEnv['CHAT_API_KEY']; global.systemEnv.chatApiKey = systemEnv['CHAT_API_KEY'];
await setupModels();
} }
global.feConfigs = {
isPlus: false
} as any;
await setupModels();
}); });
afterAll(async () => { afterAll(async () => {
await teardown(); if (connectionMongo?.connection) connectionMongo?.connection.close();
if (connectionLogMongo?.connection) connectionLogMongo?.connection.close();
});
beforeEach(async () => {
await connectMongo(connectionMongo, inject('MONGODB_URI'));
await connectMongo(connectionLogMongo, inject('MONGODB_URI'));
return async () => {
clean();
await connectionMongo?.connection.db?.dropDatabase();
await connectionLogMongo?.connection.db?.dropDatabase();
};
}); });

View File

@ -3,6 +3,7 @@ import { ModelProviderIdType } from 'packages/global/core/ai/provider';
export default async function setupModels() { export default async function setupModels() {
global.llmModelMap = new Map<string, any>(); global.llmModelMap = new Map<string, any>();
global.embeddingModelMap = new Map<string, any>();
global.llmModelMap.set('gpt-4o-mini', { global.llmModelMap.set('gpt-4o-mini', {
type: ModelTypeEnum.llm, type: ModelTypeEnum.llm,
model: 'gpt-4o-mini', model: 'gpt-4o-mini',
@ -47,6 +48,22 @@ export default async function setupModels() {
maxContext: 4096, maxContext: 4096,
maxResponse: 4096, maxResponse: 4096,
quoteMaxToken: 2048 quoteMaxToken: 2048
},
embedding: {
type: ModelTypeEnum.embedding,
model: 'text-embedding-ada-002',
name: 'text-embedding-ada-002',
avatar: 'text-embedding-ada-002',
isActive: true,
isDefault: true,
isCustom: false,
requestUrl: undefined,
requestAuth: undefined,
defaultConfig: undefined,
defaultToken: 1,
maxToken: 100,
provider: 'OpenAI',
weight: 1
} }
}; };
} }

View File

@ -1,21 +1,35 @@
import { NextApiHandler } from '@fastgpt/service/common/middle/entry'; import { NextApiHandler } from '@fastgpt/service/common/middle/entry';
import { MockReqType } from '../mocks/request'; import { MockReqType } from '../mocks/request';
import { vi } from 'vitest';
export async function Call<B = any, Q = any, R = any>( export async function Call<B = any, Q = any, R = any>(
handler: NextApiHandler<R>, handler: NextApiHandler<R>,
props?: MockReqType<B, Q> props?: MockReqType<B, Q>
) { ) {
const { body = {}, query = {}, ...rest } = props || {}; const { body = {}, query = {}, ...rest } = props || {};
return (await handler( let raw;
const res: any = {
setHeader: vi.fn(),
write: vi.fn((data: any) => {
raw = data;
}),
end: vi.fn()
};
const response = (await handler(
{ {
body: body, body: JSON.parse(JSON.stringify(body)),
query: query, query: JSON.parse(JSON.stringify(query)),
...(rest as any) ...(rest as any)
}, },
{} as any res
)) as Promise<{ )) as any;
return {
...response,
raw
} as {
code: number; code: number;
data: R; data: R;
error?: any; error?: any;
}>; raw?: any;
};
} }

View File

@ -5,13 +5,18 @@ export default defineConfig({
coverage: { coverage: {
enabled: true, enabled: true,
reporter: ['html', 'json-summary', 'json'], reporter: ['html', 'json-summary', 'json'],
all: false, reportOnFailure: true,
reportOnFailure: true include: ['projects/**/*.ts', 'packages/**/*.ts'],
cleanOnRerun: false
}, },
outputFile: 'test-results.json', outputFile: 'test-results.json',
setupFiles: ['./test/setup.ts'], setupFiles: 'test/setup.ts',
include: ['./test/test.ts', './test/cases/**/*.test.ts'], globalSetup: 'test/globalSetup.ts',
testTimeout: 5000 fileParallelism: false,
pool: 'threads',
include: ['test/test.ts', 'test/cases/**/*.test.ts', 'projects/app/test/**/*.test.ts'],
testTimeout: 5000,
reporters: ['github-actions', 'default']
}, },
resolve: { resolve: {
alias: { alias: {