botserver/src/basic/keywords/find.rs

113 lines
3.7 KiB
Rust
Raw Normal View History

use super::table_access::{check_table_access, filter_fields_by_role, AccessType, UserRoles};
use crate::security::sql_guard::sanitize_identifier;
use crate::shared::models::UserSession;
use crate::shared::state::AppState;
use crate::shared::utils;
use crate::shared::utils::to_array;
2025-10-11 20:02:14 -03:00
use diesel::pg::PgConnection;
2025-10-11 12:29:03 -03:00
use diesel::prelude::*;
use diesel::sql_types::Text;
use log::{error, trace, warn};
2025-10-06 10:30:17 -03:00
use rhai::Dynamic;
use rhai::Engine;
use serde_json::{json, Value};
#[derive(QueryableByName)]
struct JsonRow {
#[diesel(sql_type = Text)]
row_data: String,
}
pub fn find_keyword(state: &AppState, user: UserSession, engine: &mut Engine) {
let connection = state.conn.clone();
let user_roles = UserRoles::from_user_session(&user);
2025-10-11 20:02:14 -03:00
engine
.register_custom_syntax(["FIND", "$expr$", ",", "$expr$"], false, {
2025-10-11 20:02:14 -03:00
move |context, inputs| {
let table_name = context.eval_expression_tree(&inputs[0])?;
let filter = context.eval_expression_tree(&inputs[1])?;
let mut binding = connection.get().map_err(|e| format!("DB error: {e}"))?;
2025-10-11 20:02:14 -03:00
let binding2 = table_name.to_string();
let binding3 = filter.to_string();
let access_info = match check_table_access(
&mut binding,
&binding2,
&user_roles,
AccessType::Read,
) {
Ok(info) => info,
Err(e) => {
warn!("FIND access denied: {e}");
return Err(e.into());
}
};
2025-10-11 20:02:14 -03:00
let result = tokio::task::block_in_place(|| {
tokio::runtime::Handle::current()
.block_on(async { execute_find(&mut binding, &binding2, &binding3) })
2025-10-11 20:02:14 -03:00
})
.map_err(|e| format!("DB error: {e}"))?;
2025-10-11 20:02:14 -03:00
if let Some(results) = result.get("results") {
let filtered =
filter_fields_by_role(results.clone(), &user_roles, &access_info);
let array = to_array(utils::json_value_to_dynamic(&filtered));
2025-10-11 20:02:14 -03:00
Ok(Dynamic::from(array))
} else {
Err("No results".into())
}
2025-10-06 10:30:17 -03:00
}
2025-10-11 20:02:14 -03:00
})
2025-12-28 19:29:18 -03:00
.expect("valid syntax registration");
2025-10-06 10:30:17 -03:00
}
pub fn execute_find(
2025-10-11 20:02:14 -03:00
conn: &mut PgConnection,
2025-10-06 10:30:17 -03:00
table_str: &str,
filter_str: &str,
) -> Result<Value, String> {
trace!(
"Starting execute_find with table: {table_str}, filter: {filter_str}"
2025-10-06 10:30:17 -03:00
);
let safe_table = sanitize_identifier(table_str);
2025-10-11 20:02:14 -03:00
let (where_clause, params) = utils::parse_filter(filter_str).map_err(|e| e.to_string())?;
2025-10-06 10:30:17 -03:00
let query = format!(
"SELECT row_to_json(t)::text as row_data FROM (SELECT * FROM {safe_table} WHERE {where_clause} LIMIT 10) t"
2025-10-06 10:30:17 -03:00
);
let raw_results: Vec<JsonRow> = if params.is_empty() {
diesel::sql_query(&query)
.load(conn)
.map_err(|e| {
error!("SQL execution error: {e}");
e.to_string()
})?
} else {
diesel::sql_query(&query)
.bind::<Text, _>(&params[0])
.load(conn)
.map_err(|e| {
error!("SQL execution error: {e}");
e.to_string()
})?
};
let results: Vec<Value> = raw_results
.into_iter()
.filter_map(|row| serde_json::from_str(&row.row_data).ok())
.collect();
2025-10-06 10:30:17 -03:00
Ok(json!({
"command": "find",
"table": table_str,
"filter": filter_str,
"results": results,
"count": results.len()
2025-10-06 10:30:17 -03:00
}))
}