Press n or j to go to the next uncovered block, b, p or k for the previous block.
| 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 | 1x 1x 1x 1x 1x 16x 16x 16x 16x 16x 16x 2x 14x 2x 12x 11x 2x 9x 8x 2x 2x 1x | const { DynamoDBClient } = require('@aws-sdk/client-dynamodb')
const { DynamoDBDocumentClient, UpdateCommand, GetCommand } = require('@aws-sdk/lib-dynamodb')
const { requirePermission } = require('../utils/requirePermission')
const client = new DynamoDBClient({})
const docClient = DynamoDBDocumentClient.from(client)
async function assignRolesHandler(event) {
try {
const tenantId = event.pathParameters?.tenantId
const targetUserId = event.pathParameters?.userId
const body = JSON.parse(event.body || '{}')
const currentUserId = event.requestContext?.authorizer?.claims?.sub
if (!currentUserId || !tenantId || !targetUserId) {
return {
statusCode: 401,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*'
},
body: JSON.stringify({ error: 'Unauthorized' })
}
}
if (!body.roleIds || !Array.isArray(body.roleIds)) {
return {
statusCode: 400,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*'
},
body: JSON.stringify({ error: 'Missing roleIds array' })
}
}
// Check target user membership exists
const membership = await docClient.send(
new GetCommand({
TableName: process.env.MEMBERSHIPS_TABLE_NAME,
Key: { userId: targetUserId, tenantId }
})
)
if (!membership.Item || membership.Item.status !== 'active') {
return {
statusCode: 404,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*'
},
body: JSON.stringify({ error: 'User is not a member of this flow' })
}
}
// Update roles in MEMBERSHIPS_TABLE
const result = await docClient.send(
new UpdateCommand({
TableName: process.env.MEMBERSHIPS_TABLE_NAME,
Key: {
userId: targetUserId,
tenantId: tenantId
},
UpdateExpression: 'SET roleIds = :roleIds, updatedAt = :updatedAt',
ExpressionAttributeValues: {
':roleIds': body.roleIds,
':updatedAt': new Date().toISOString()
},
ReturnValues: 'ALL_NEW'
})
)
return {
statusCode: 200,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*'
},
body: JSON.stringify(result.Attributes)
}
} catch (error) {
console.error('Error assigning roles:', error)
return {
statusCode: 500,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*'
},
body: JSON.stringify({ error: 'Failed to assign roles' })
}
}
}
exports.handler = requirePermission(assignRolesHandler, {
permission: 'roles:assign'
})
|