All files / roles assign.js

100% Statements 22/22
93.33% Branches 14/15
100% Functions 1/1
100% Lines 22/22

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 971x 1x 1x   1x 1x     16x 16x 16x 16x 16x   16x 2x                   14x 2x                     12x             11x 2x                     9x                               8x                 2x 2x                     1x      
const { DynamoDBClient } = require('@aws-sdk/client-dynamodb')
const { DynamoDBDocumentClient, UpdateCommand, GetCommand } = require('@aws-sdk/lib-dynamodb')
const { requirePermission } = require('../utils/requirePermission')
 
const client = new DynamoDBClient({})
const docClient = DynamoDBDocumentClient.from(client)
 
async function assignRolesHandler(event) {
  try {
    const tenantId = event.pathParameters?.tenantId
    const targetUserId = event.pathParameters?.userId
    const body = JSON.parse(event.body || '{}')
    const currentUserId = event.requestContext?.authorizer?.claims?.sub
 
    if (!currentUserId || !tenantId || !targetUserId) {
      return {
        statusCode: 401,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Unauthorized' })
      }
    }
 
    if (!body.roleIds || !Array.isArray(body.roleIds)) {
      return {
        statusCode: 400,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Missing roleIds array' })
      }
    }
 
    // Check target user membership exists
    const membership = await docClient.send(
      new GetCommand({
        TableName: process.env.MEMBERSHIPS_TABLE_NAME,
        Key: { userId: targetUserId, tenantId }
      })
    )
 
    if (!membership.Item || membership.Item.status !== 'active') {
      return {
        statusCode: 404,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'User is not a member of this flow' })
      }
    }
 
    // Update roles in MEMBERSHIPS_TABLE
    const result = await docClient.send(
      new UpdateCommand({
        TableName: process.env.MEMBERSHIPS_TABLE_NAME,
        Key: {
          userId: targetUserId,
          tenantId: tenantId
        },
        UpdateExpression: 'SET roleIds = :roleIds, updatedAt = :updatedAt',
        ExpressionAttributeValues: {
          ':roleIds': body.roleIds,
          ':updatedAt': new Date().toISOString()
        },
        ReturnValues: 'ALL_NEW'
      })
    )
 
    return {
      statusCode: 200,
      headers: {
        'Content-Type': 'application/json',
        'Access-Control-Allow-Origin': '*'
      },
      body: JSON.stringify(result.Attributes)
    }
  } catch (error) {
    console.error('Error assigning roles:', error)
    return {
      statusCode: 500,
      headers: {
        'Content-Type': 'application/json',
        'Access-Control-Allow-Origin': '*'
      },
      body: JSON.stringify({ error: 'Failed to assign roles' })
    }
  }
}
 
exports.handler = requirePermission(assignRolesHandler, {
  permission: 'roles:assign'
})