feat: implement full RBAC role-based access control
Backend: - deps.py: add require_admin, require_manager, require_labeler, require_guest_or_above - user.py: all write endpoints require admin - datasource.py: write/sync endpoints require admin - metadata.py: sync endpoint requires admin - classification.py: category/rule write requires admin; results query requires guest+ with data isolation - project.py: GET requires manager with created_by filtering; DELETE checks ownership - task.py: my-tasks requires labeler with assignee_id filtering; create-task requires manager - dashboard.py: requires guest_or_above - report.py: requires guest_or_above - project_service: list_projects adds created_by filter; list_results adds project_ids filter Frontend: - stores/user.ts: add hasRole, hasAnyRole, isAdmin, isManager, isLabeler, isSuperadmin - router/index.ts: add roles to route meta; beforeEach checks role permissions - Layout.vue: filter menu routes by user roles - System.vue: hide add/edit/delete buttons for non-admins - DataSource.vue: hide add/edit/delete/sync buttons for non-admins - Project.vue: hide add/delete buttons for non-admins
This commit is contained in:
@@ -7,7 +7,7 @@ from app.models.user import User
|
||||
from app.schemas.metadata import DatabaseOut, DataTableOut, DataColumnOut
|
||||
from app.schemas.common import ResponseModel, ListResponse
|
||||
from app.services import metadata_service
|
||||
from app.api.deps import get_current_user
|
||||
from app.api.deps import get_current_user, require_admin
|
||||
|
||||
router = APIRouter()
|
||||
|
||||
@@ -60,7 +60,7 @@ def list_columns(
|
||||
def sync_metadata(
|
||||
source_id: int,
|
||||
db: Session = Depends(get_db),
|
||||
current_user: User = Depends(get_current_user),
|
||||
current_user: User = Depends(require_admin),
|
||||
):
|
||||
result = metadata_service.sync_metadata(db, source_id, current_user.id)
|
||||
return ResponseModel(data=result)
|
||||
|
||||
Reference in New Issue
Block a user