Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migration to role group #71

Open
wants to merge 12 commits into
base: main
Choose a base branch
from
Open

Migration to role group #71

wants to merge 12 commits into from

Conversation

palagdan
Copy link
Collaborator

Resolves partially kbss-cvut/record-manager-ui#202

@palagdan
Copy link
Collaborator Author

2024-09-25_14-40

It should be working as expected. Now I just need to fix the frontend based on the new implementation of the backend.

Copy link

@blcham blcham left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some of the comments i need to explain, som lets have call about it.

src/main/java/cz/cvut/kbss/study/model/RoleGroup.java Outdated Show resolved Hide resolved
if (!currentUser.getTypes().contains(Vocabulary.s_c_administrator)
&& (!instance.getTypes().equals(currentUser.getTypes()) || (instance.getInstitution() != null
if (!currentUser.isAdmin()
&& (!instance.getRoleGroup().getRoles().equals(currentUser.getRoleGroup().getRoles()) || (instance.getInstitution() != null
Copy link

@blcham blcham Sep 26, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wow, not sure if I understand role of this condition now or before, but I am little worried that we need compare roleGroups here instead. Otherwise we would persist different roleGroups in internal-auth profile.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

? (it seems to me that this code is used for both keycloak-auth and internal-auth)

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

src/main/resources/model.ttl Outdated Show resolved Hide resolved
src/main/resources/model.ttl Outdated Show resolved Hide resolved
@palagdan palagdan force-pushed the migration-to-role-group branch 4 times, most recently from 6beabca to 3d722f7 Compare September 26, 2024 16:08
@palagdan
Copy link
Collaborator Author

@blcham
2024-09-26_18-07
If it is okay for current iteration, I can continue with frontend.

@palagdan
Copy link
Collaborator Author

palagdan commented Oct 2, 2024

@blcham

While implementing the logic to support the Keycloak profile, I encountered a problem. When the application extracts roles from the Keycloak claims, it creates a new instance of RoleGroup and adds these roles to this empty group. The issue is that this group does not exist in the database, and a cascade strategy for this role group is not provided because we don’t need it. As a result, when the current user updates or creates something, this empty RoleGroup with the roles is in the transactional context, but the database does not know how to manage it since this RoleGroup does not exist and no cascade strategy is provided, which leads to an error.

I have one idea on how to solve this: retrieve the RoleGroup from the token claim(not roles), attempt to find it in the database, and then add it to the user.

What do you think? Do you have any other ideas?

@blcham
Copy link

blcham commented Oct 2, 2024

Not sure if I understand. Isn't it possible just to ignore persistence of RoleGroup in keycloak profile? E.g. in preUpdate method?

@palagdan
Copy link
Collaborator Author

palagdan commented Oct 3, 2024

@blcham
I am not sure how to ignore the persistence.
I thought that preUpdate method is only for validation.

@blcham blcham force-pushed the migration-to-role-group branch 2 times, most recently from 631a0b3 to 349001c Compare October 9, 2024 10:54
@blcham blcham force-pushed the migration-to-role-group branch 2 times, most recently from 8335db5 to 467b0f7 Compare November 7, 2024 22:18
… exception if the provided role does not exist
http-nio-8080-exec-7] WARN  o.s.w.s.m.s.DefaultHandlerExceptionResolver - Resolved [org.springframework.http.converter.HttpMessageNotWritableException: Could not write JSON: Cannot invoke "cz.cvut.kbss.study.model.RoleGroup.getRoles()" because "this.roleGroup" is null]
@blcham
Copy link

blcham commented Nov 14, 2024

@palagdan so i guess to simulate the error i can change the institution of the user and then save right?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants