@@ -234,7 +234,7 @@ func DeleteInstanceAuditPlan(c echo.Context) error {
234
234
}
235
235
s := model .GetStorage ()
236
236
// check current user instance audit plan permission
237
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
237
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
238
238
if err != nil {
239
239
return controller .JSONBaseErrorReq (c , err )
240
240
}
@@ -276,7 +276,7 @@ func UpdateInstanceAuditPlan(c echo.Context) error {
276
276
return controller .JSONBaseErrorReq (c , err )
277
277
}
278
278
// check current user instance audit plan permission
279
- dbAuditPlans , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
279
+ dbAuditPlans , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
280
280
if err != nil {
281
281
return controller .JSONBaseErrorReq (c , err )
282
282
}
@@ -389,7 +389,7 @@ func UpdateInstanceAuditPlanStatus(c echo.Context) error {
389
389
return controller .JSONBaseErrorReq (c , err )
390
390
}
391
391
// check current user instance audit plan permission
392
- instanceAuditPlan , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
392
+ instanceAuditPlan , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
393
393
if err != nil {
394
394
return controller .JSONBaseErrorReq (c , err )
395
395
}
@@ -501,7 +501,7 @@ func GetInstanceAuditPlans(c echo.Context) error {
501
501
"limit" : limit ,
502
502
"offset" : offset ,
503
503
}
504
- if ! up .IsAdmin () {
504
+ if ! up .CanViewProject () {
505
505
accessinstanceId := up .GetInstancesByOP (v1 .OpPermissionTypeViewOtherAuditPlan )
506
506
if len (accessinstanceId ) > 0 {
507
507
data ["accessible_instances_id" ] = fmt .Sprintf ("\" %s\" " , strings .Join (accessinstanceId , "\" ,\" " ))
@@ -632,7 +632,7 @@ func GetInstanceAuditPlanDetail(c echo.Context) error {
632
632
return controller .JSONBaseErrorReq (c , err )
633
633
}
634
634
// check current user instance audit plan permission
635
- detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
635
+ detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
636
636
if err != nil {
637
637
return controller .JSONBaseErrorReq (c , err )
638
638
}
@@ -758,7 +758,7 @@ func GetInstanceAuditPlanOverview(c echo.Context) error {
758
758
return controller .JSONBaseErrorReq (c , err )
759
759
}
760
760
// check current user instance audit plan permission
761
- detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
761
+ detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
762
762
if err != nil {
763
763
return controller .JSONBaseErrorReq (c , err )
764
764
}
@@ -875,7 +875,7 @@ func DeleteAuditPlanById(c echo.Context) error {
875
875
return controller .JSONBaseErrorReq (c , err )
876
876
}
877
877
// check current user instance audit plan permission
878
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
878
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
879
879
if err != nil {
880
880
return controller .JSONBaseErrorReq (c , err )
881
881
}
@@ -922,7 +922,7 @@ func UpdateAuditPlanStatus(c echo.Context) error {
922
922
return controller .JSONBaseErrorReq (c , err )
923
923
}
924
924
// check current user instance audit plan permission
925
- deatil , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
925
+ deatil , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
926
926
if err != nil {
927
927
return controller .JSONBaseErrorReq (c , err )
928
928
}
@@ -975,7 +975,7 @@ func GetInstanceAuditPlanSQLs(c echo.Context) error {
975
975
return controller .JSONBaseErrorReq (c , err )
976
976
}
977
977
// check current user instance audit plan permission
978
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
978
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
979
979
if err != nil {
980
980
return controller .JSONBaseErrorReq (c , err )
981
981
}
@@ -1074,7 +1074,7 @@ func GetInstanceAuditPlanSQLMeta(c echo.Context) error {
1074
1074
return controller .JSONBaseErrorReq (c , err )
1075
1075
}
1076
1076
// check current user instance audit plan permission
1077
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1077
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1078
1078
if err != nil {
1079
1079
return controller .JSONBaseErrorReq (c , err )
1080
1080
}
@@ -1174,7 +1174,7 @@ func GetInstanceAuditPlanSQLData(c echo.Context) error {
1174
1174
return controller .JSONBaseErrorReq (c , err )
1175
1175
}
1176
1176
// check current user instance audit plan permission
1177
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1177
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1178
1178
if err != nil {
1179
1179
return controller .JSONBaseErrorReq (c , err )
1180
1180
}
@@ -1240,7 +1240,7 @@ func GetInstanceAuditPlanSQLExport(c echo.Context) error {
1240
1240
return controller .JSONBaseErrorReq (c , err )
1241
1241
}
1242
1242
// check current user instance audit plan permission
1243
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1243
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , instanceAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1244
1244
if err != nil {
1245
1245
return controller .JSONBaseErrorReq (c , err )
1246
1246
}
@@ -1337,7 +1337,7 @@ func GetAuditPlanSqlAnalysisData(c echo.Context) error {
1337
1337
if err != nil {
1338
1338
return controller .JSONBaseErrorReq (c , err )
1339
1339
}
1340
- detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , insAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1340
+ detail , exist , err := GetInstanceAuditPlanIfCurrentUserCanView (c , projectUID , insAuditPlanID , v1 .OpPermissionTypeViewOtherAuditPlan )
1341
1341
if err != nil {
1342
1342
return controller .JSONBaseErrorReq (c , err )
1343
1343
}
@@ -1391,7 +1391,7 @@ func AuditPlanTriggerSqlAudit(c echo.Context) error {
1391
1391
if err != nil {
1392
1392
return controller .JSONBaseErrorReq (c , err )
1393
1393
}
1394
- _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanAccess (c , projectUID , insAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
1394
+ _ , exist , err := GetInstanceAuditPlanIfCurrentUserCanOp (c , projectUID , insAuditPlanID , v1 .OpPermissionTypeSaveAuditPlan )
1395
1395
if err != nil {
1396
1396
return controller .JSONBaseErrorReq (c , err )
1397
1397
}
0 commit comments