68 lines
2.5 KiB
Python
68 lines
2.5 KiB
Python
import logging
|
|
import os
|
|
|
|
from common.ddb_service.client import DynamoDbUtilsService
|
|
from common.response import ok, bad_request
|
|
from common.util import get_multi_query_params
|
|
from libs.data_types import Model
|
|
from libs.utils import get_permissions_by_username, get_user_roles, check_user_permissions
|
|
|
|
model_table = os.environ.get('DYNAMODB_TABLE')
|
|
user_table = os.environ.get('MULTI_USER_TABLE')
|
|
|
|
logger = logging.getLogger(__name__)
|
|
logger.setLevel(os.environ.get('LOG_LEVEL') or logging.ERROR)
|
|
|
|
ddb_service = DynamoDbUtilsService(logger=logger)
|
|
|
|
|
|
def handler(event, context):
|
|
_filter = {}
|
|
|
|
types = get_multi_query_params(event, 'types')
|
|
if types:
|
|
_filter['model_type'] = types
|
|
|
|
status = get_multi_query_params(event, 'status')
|
|
if status:
|
|
_filter['job_status'] = status
|
|
|
|
resp = ddb_service.scan(table=model_table, filters=_filter)
|
|
|
|
if resp is None or len(resp) == 0:
|
|
return ok(data={'models': []})
|
|
|
|
models = []
|
|
|
|
try:
|
|
requestor_name = event['requestContext']['authorizer']['username']
|
|
requestor_permissions = get_permissions_by_username(ddb_service, user_table, requestor_name)
|
|
requestor_roles = get_user_roles(ddb_service=ddb_service, user_table_name=user_table, username=requestor_name)
|
|
if 'train' not in requestor_permissions or \
|
|
('all' not in requestor_permissions['train'] and 'list' not in requestor_permissions['train']):
|
|
return bad_request(message='user has no permission to train')
|
|
|
|
for r in resp:
|
|
model = Model(**(ddb_service.deserialize(r)))
|
|
model_dto = {
|
|
'id': model.id,
|
|
'model_name': model.name,
|
|
'created': model.timestamp,
|
|
'params': model.params,
|
|
'status': model.job_status.value,
|
|
'output_s3_location': model.output_s3_location
|
|
}
|
|
if model.allowed_roles_or_users and check_user_permissions(model.allowed_roles_or_users, requestor_roles,
|
|
requestor_name):
|
|
models.append(model_dto)
|
|
elif not model.allowed_roles_or_users and \
|
|
'user' in requestor_permissions and \
|
|
'all' in requestor_permissions['user']:
|
|
# superuser can view the legacy data
|
|
models.append(model_dto)
|
|
|
|
return ok(data={'models': models}, decimal=True)
|
|
except Exception as e:
|
|
logger.error(e)
|
|
return bad_request(message=str(e))
|