Skip to content
This repository was archived by the owner on Aug 6, 2024. It is now read-only.

Commit 1c4bb7b

Browse files
authored
Merge pull request #100 from hifis-net/update_v1.13.0
Update v1.13.0
2 parents 3e5f1cb + 7dab24b commit 1c4bb7b

File tree

33 files changed

+291
-217
lines changed

33 files changed

+291
-217
lines changed

.env.example

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ POSTGRES_USER=rsd
3737

3838
# backend (postgREST)
3939
# consumed by services: backend
40-
PGRST_DB_ANON_ROLE=web_anon
40+
PGRST_DB_ANON_ROLE=rsd_web_anon
4141
PGRST_DB_SCHEMA=public
4242
PGRST_SERVER_PORT=3500
4343

CITATION.cff

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,5 +75,5 @@ keywords:
7575
- Software Impact
7676
- Software Reuse
7777
license: Apache-2.0
78-
version: v1.12.0
79-
date-released: '2022-11-30'
78+
version: v1.13.0
79+
date-released: '2022-12-02'

backend-postgrest/tests/docker-compose.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ services:
3838
# enable connection from outside
3939
- "3500:3500"
4040
environment:
41-
- PGRST_DB_URI=postgres://authenticator:simplepassword@database:5432/rsd-db
42-
- PGRST_DB_ANON_ROLE=web_anon
41+
- PGRST_DB_URI=postgres://rsd_authenticator:simplepassword@database:5432/rsd-db
42+
- PGRST_DB_ANON_ROLE=rsd_web_anon
4343
- PGRST_DB_SCHEMA=public
4444
- PGRST_SERVER_PORT=3500
4545
- PGRST_JWT_SECRET=normaly_this_is_a_secret_string_that_none_knows_BUT_this_is_just_a_test

database/001-setup-basic-roles.sql

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,24 +3,24 @@
33
--
44
-- SPDX-License-Identifier: Apache-2.0
55

6-
CREATE ROLE authenticator NOINHERIT LOGIN PASSWORD 'POSTGRES_AUTHENTICATOR_PASSWORD';
6+
CREATE ROLE rsd_authenticator NOINHERIT LOGIN PASSWORD 'POSTGRES_AUTHENTICATOR_PASSWORD';
77

8-
CREATE ROLE web_anon NOLOGIN;
8+
CREATE ROLE rsd_web_anon NOLOGIN;
99

10-
GRANT USAGE ON SCHEMA public TO web_anon;
10+
GRANT USAGE ON SCHEMA public TO rsd_web_anon;
1111

12-
ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO web_anon;
12+
ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO rsd_web_anon;
1313

14-
GRANT web_anon TO authenticator;
14+
GRANT rsd_web_anon TO rsd_authenticator;
1515

1616
CREATE ROLE rsd_admin NOLOGIN;
1717

1818
ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT, INSERT, UPDATE, DELETE ON TABLES TO rsd_admin;
1919

20-
GRANT rsd_admin TO authenticator;
20+
GRANT rsd_admin TO rsd_authenticator;
2121

2222
CREATE ROLE rsd_user NOLOGIN;
2323

2424
ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT, INSERT, UPDATE, DELETE ON TABLES TO rsd_user;
2525

26-
GRANT rsd_user TO authenticator;
26+
GRANT rsd_user TO rsd_authenticator;

database/020-row-level-security.sql

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ CREATE POLICY admin_all_rights ON invite_maintainer_for_organisation TO rsd_admi
149149
-- image
150150
ALTER TABLE image ENABLE ROW LEVEL SECURITY;
151151

152-
CREATE POLICY anyone_can_read ON image FOR SELECT TO web_anon, rsd_user
152+
CREATE POLICY anyone_can_read ON image FOR SELECT TO rsd_web_anon, rsd_user
153153
USING (TRUE);
154154

155155
CREATE POLICY rsd_user_all_rights ON image TO rsd_user
@@ -164,7 +164,7 @@ CREATE POLICY admin_all_rights ON image TO rsd_admin
164164
-- software
165165
ALTER TABLE software ENABLE ROW LEVEL SECURITY;
166166

167-
CREATE POLICY anyone_can_read ON software FOR SELECT TO web_anon, rsd_user
167+
CREATE POLICY anyone_can_read ON software FOR SELECT TO rsd_web_anon, rsd_user
168168
USING (is_published);
169169

170170
CREATE POLICY maintainer_select_related ON software FOR SELECT TO rsd_user
@@ -194,7 +194,7 @@ CREATE POLICY admin_all_rights ON software TO rsd_admin
194194
-- software relations
195195
ALTER TABLE repository_url ENABLE ROW LEVEL SECURITY;
196196

197-
CREATE POLICY anyone_can_read ON repository_url FOR SELECT TO web_anon, rsd_user
197+
CREATE POLICY anyone_can_read ON repository_url FOR SELECT TO rsd_web_anon, rsd_user
198198
USING (software IN (SELECT id FROM software));
199199

200200
CREATE POLICY maintainer_all_rights ON repository_url TO rsd_user
@@ -208,7 +208,7 @@ CREATE POLICY admin_all_rights ON repository_url TO rsd_admin
208208

209209
ALTER TABLE license_for_software ENABLE ROW LEVEL SECURITY;
210210

211-
CREATE POLICY anyone_can_read ON license_for_software FOR SELECT TO web_anon, rsd_user
211+
CREATE POLICY anyone_can_read ON license_for_software FOR SELECT TO rsd_web_anon, rsd_user
212212
USING (software IN (SELECT id FROM software));
213213

214214
CREATE POLICY maintainer_all_rights ON license_for_software TO rsd_user
@@ -222,7 +222,7 @@ CREATE POLICY admin_all_rights ON license_for_software TO rsd_admin
222222

223223
ALTER TABLE contributor ENABLE ROW LEVEL SECURITY;
224224

225-
CREATE POLICY anyone_can_read ON contributor FOR SELECT TO web_anon, rsd_user
225+
CREATE POLICY anyone_can_read ON contributor FOR SELECT TO rsd_web_anon, rsd_user
226226
USING (software IN (SELECT id FROM software));
227227

228228
CREATE POLICY maintainer_all_rights ON contributor TO rsd_user
@@ -236,7 +236,7 @@ CREATE POLICY admin_all_rights ON contributor TO rsd_admin
236236

237237
ALTER TABLE testimonial ENABLE ROW LEVEL SECURITY;
238238

239-
CREATE POLICY anyone_can_read ON testimonial FOR SELECT TO web_anon, rsd_user
239+
CREATE POLICY anyone_can_read ON testimonial FOR SELECT TO rsd_web_anon, rsd_user
240240
USING (software IN (SELECT id FROM software));
241241

242242
CREATE POLICY maintainer_all_rights ON testimonial TO rsd_user
@@ -250,7 +250,7 @@ CREATE POLICY admin_all_rights ON testimonial TO rsd_admin
250250
-- keywords
251251
ALTER TABLE keyword ENABLE ROW LEVEL SECURITY;
252252

253-
CREATE POLICY anyone_can_read ON keyword FOR SELECT TO web_anon, rsd_user
253+
CREATE POLICY anyone_can_read ON keyword FOR SELECT TO rsd_web_anon, rsd_user
254254
USING (TRUE);
255255

256256
CREATE POLICY maintainer_can_insert ON keyword FOR INSERT TO rsd_user
@@ -267,7 +267,7 @@ CREATE POLICY admin_all_rights ON keyword TO rsd_admin
267267
-- keywords for software
268268
ALTER TABLE keyword_for_software ENABLE ROW LEVEL SECURITY;
269269

270-
CREATE POLICY anyone_can_read ON keyword_for_software FOR SELECT TO web_anon, rsd_user
270+
CREATE POLICY anyone_can_read ON keyword_for_software FOR SELECT TO rsd_web_anon, rsd_user
271271
USING (software IN (SELECT id FROM software));
272272

273273
CREATE POLICY maintainer_all_rights ON keyword_for_software TO rsd_user
@@ -282,7 +282,7 @@ CREATE POLICY admin_all_rights ON keyword_for_software TO rsd_admin
282282
-- projects
283283
ALTER TABLE project ENABLE ROW LEVEL SECURITY;
284284

285-
CREATE POLICY anyone_can_read ON project FOR SELECT TO web_anon, rsd_user
285+
CREATE POLICY anyone_can_read ON project FOR SELECT TO rsd_web_anon, rsd_user
286286
USING (is_published);
287287

288288
CREATE POLICY maintainer_select_related ON project FOR SELECT TO rsd_user
@@ -311,7 +311,7 @@ CREATE POLICY admin_all_rights ON project TO rsd_admin
311311

312312
ALTER TABLE url_for_project ENABLE ROW LEVEL SECURITY;
313313

314-
CREATE POLICY anyone_can_read ON url_for_project FOR SELECT TO web_anon, rsd_user
314+
CREATE POLICY anyone_can_read ON url_for_project FOR SELECT TO rsd_web_anon, rsd_user
315315
USING (project IN (SELECT id FROM project));
316316

317317
CREATE POLICY maintainer_all_rights ON url_for_project TO rsd_user
@@ -325,7 +325,7 @@ CREATE POLICY admin_all_rights ON url_for_project TO rsd_admin
325325
-- project relations
326326
ALTER TABLE team_member ENABLE ROW LEVEL SECURITY;
327327

328-
CREATE POLICY anyone_can_read ON team_member FOR SELECT TO web_anon, rsd_user
328+
CREATE POLICY anyone_can_read ON team_member FOR SELECT TO rsd_web_anon, rsd_user
329329
USING (project IN (SELECT id FROM project));
330330

331331
CREATE POLICY maintainer_all_rights ON team_member TO rsd_user
@@ -340,7 +340,7 @@ CREATE POLICY admin_all_rights ON team_member TO rsd_admin
340340
-- research domain
341341
ALTER TABLE research_domain ENABLE ROW LEVEL SECURITY;
342342

343-
CREATE POLICY anyone_can_read ON research_domain FOR SELECT TO web_anon, rsd_user
343+
CREATE POLICY anyone_can_read ON research_domain FOR SELECT TO rsd_web_anon, rsd_user
344344
USING (TRUE);
345345

346346
CREATE POLICY admin_all_rights ON research_domain TO rsd_admin
@@ -351,7 +351,7 @@ CREATE POLICY admin_all_rights ON research_domain TO rsd_admin
351351
-- keywords and research domains for projects
352352
ALTER TABLE keyword_for_project ENABLE ROW LEVEL SECURITY;
353353

354-
CREATE POLICY anyone_can_read ON keyword_for_project FOR SELECT TO web_anon, rsd_user
354+
CREATE POLICY anyone_can_read ON keyword_for_project FOR SELECT TO rsd_web_anon, rsd_user
355355
USING (project IN (SELECT id FROM project));
356356

357357
CREATE POLICY maintainer_all_rights ON keyword_for_project TO rsd_user
@@ -365,7 +365,7 @@ CREATE POLICY admin_all_rights ON keyword_for_project TO rsd_admin
365365

366366
ALTER TABLE research_domain_for_project ENABLE ROW LEVEL SECURITY;
367367

368-
CREATE POLICY anyone_can_read ON research_domain_for_project FOR SELECT TO web_anon, rsd_user
368+
CREATE POLICY anyone_can_read ON research_domain_for_project FOR SELECT TO rsd_web_anon, rsd_user
369369
USING (project IN (SELECT id FROM project));
370370

371371
CREATE POLICY maintainer_all_rights ON research_domain_for_project TO rsd_user
@@ -382,7 +382,7 @@ CREATE POLICY admin_all_rights ON research_domain_for_project TO rsd_admin
382382
-- should a mention only be visible if you can see at least one software or project for which it relates?
383383
ALTER TABLE mention ENABLE ROW LEVEL SECURITY;
384384

385-
CREATE POLICY anyone_can_read ON mention FOR SELECT TO web_anon, rsd_user
385+
CREATE POLICY anyone_can_read ON mention FOR SELECT TO rsd_web_anon, rsd_user
386386
USING (id IN (SELECT mention FROM mention_for_software) OR id IN (SELECT mention FROM output_for_project) OR id IN (SELECT mention FROM impact_for_project));
387387

388388
CREATE POLICY maintainer_can_read ON mention FOR SELECT TO rsd_user
@@ -401,7 +401,7 @@ CREATE POLICY admin_all_rights ON mention TO rsd_admin
401401

402402
ALTER TABLE mention_for_software ENABLE ROW LEVEL SECURITY;
403403

404-
CREATE POLICY anyone_can_read ON mention_for_software FOR SELECT TO web_anon, rsd_user
404+
CREATE POLICY anyone_can_read ON mention_for_software FOR SELECT TO rsd_web_anon, rsd_user
405405
USING (software IN (SELECT id FROM software));
406406

407407
CREATE POLICY maintainer_all_rights ON mention_for_software TO rsd_user
@@ -415,7 +415,7 @@ CREATE POLICY admin_all_rights ON mention_for_software TO rsd_admin
415415

416416
ALTER TABLE output_for_project ENABLE ROW LEVEL SECURITY;
417417

418-
CREATE POLICY anyone_can_read ON output_for_project FOR SELECT TO web_anon, rsd_user
418+
CREATE POLICY anyone_can_read ON output_for_project FOR SELECT TO rsd_web_anon, rsd_user
419419
USING (project IN (SELECT id FROM project));
420420

421421
CREATE POLICY maintainer_all_rights ON output_for_project TO rsd_user
@@ -429,7 +429,7 @@ CREATE POLICY admin_all_rights ON output_for_project TO rsd_admin
429429

430430
ALTER TABLE impact_for_project ENABLE ROW LEVEL SECURITY;
431431

432-
CREATE POLICY anyone_can_read ON impact_for_project FOR SELECT TO web_anon, rsd_user
432+
CREATE POLICY anyone_can_read ON impact_for_project FOR SELECT TO rsd_web_anon, rsd_user
433433
USING (project IN (SELECT id FROM project));
434434

435435
CREATE POLICY maintainer_all_rights ON impact_for_project TO rsd_user
@@ -444,7 +444,7 @@ CREATE POLICY admin_all_rights ON impact_for_project TO rsd_admin
444444
-- releases
445445
ALTER TABLE release ENABLE ROW LEVEL SECURITY;
446446

447-
CREATE POLICY anyone_can_read ON release FOR SELECT TO web_anon, rsd_user
447+
CREATE POLICY anyone_can_read ON release FOR SELECT TO rsd_web_anon, rsd_user
448448
USING (software IN (SELECT id FROM software));
449449

450450
CREATE POLICY maintainer_select ON release FOR SELECT TO rsd_user
@@ -457,7 +457,7 @@ CREATE POLICY admin_all_rights ON release TO rsd_admin
457457

458458
ALTER TABLE release_content ENABLE ROW LEVEL SECURITY;
459459

460-
CREATE POLICY anyone_can_read ON release_content FOR SELECT TO web_anon, rsd_user
460+
CREATE POLICY anyone_can_read ON release_content FOR SELECT TO rsd_web_anon, rsd_user
461461
USING (release_id IN (SELECT id FROM release));
462462

463463
CREATE POLICY maintainer_select ON release_content FOR SELECT TO rsd_user
@@ -501,7 +501,7 @@ CREATE POLICY admin_all_rights ON orcid_whitelist TO rsd_admin
501501
-- organisation
502502
ALTER TABLE organisation ENABLE ROW LEVEL SECURITY;
503503

504-
CREATE POLICY anyone_can_read ON organisation FOR SELECT TO web_anon, rsd_user
504+
CREATE POLICY anyone_can_read ON organisation FOR SELECT TO rsd_web_anon, rsd_user
505505
USING (TRUE);
506506

507507
CREATE POLICY maintainer_can_update ON organisation FOR UPDATE TO rsd_user
@@ -519,7 +519,7 @@ CREATE POLICY admin_all_rights ON organisation TO rsd_admin
519519
-- inter relations
520520
ALTER TABLE software_for_software ENABLE ROW LEVEL SECURITY;
521521

522-
CREATE POLICY anyone_can_read ON software_for_software FOR SELECT TO web_anon, rsd_user
522+
CREATE POLICY anyone_can_read ON software_for_software FOR SELECT TO rsd_web_anon, rsd_user
523523
USING (origin IN (SELECT id FROM software) AND relation IN (SELECT id FROM software));
524524

525525
CREATE POLICY maintainer_origin_can_read ON software_for_software FOR SELECT TO rsd_user
@@ -538,7 +538,7 @@ CREATE POLICY admin_all_rights ON software_for_software TO rsd_admin
538538

539539
ALTER TABLE software_for_project ENABLE ROW LEVEL SECURITY;
540540

541-
CREATE POLICY anyone_can_read ON software_for_project FOR SELECT TO web_anon, rsd_user
541+
CREATE POLICY anyone_can_read ON software_for_project FOR SELECT TO rsd_web_anon, rsd_user
542542
USING (software IN (SELECT id FROM software) AND project IN (SELECT id FROM project));
543543

544544
CREATE POLICY maintainer_can_read ON software_for_project FOR SELECT TO rsd_user
@@ -560,7 +560,7 @@ CREATE POLICY admin_all_rights ON software_for_project TO rsd_admin
560560

561561
ALTER TABLE project_for_project ENABLE ROW LEVEL SECURITY;
562562

563-
CREATE POLICY anyone_can_read ON project_for_project FOR SELECT TO web_anon, rsd_user
563+
CREATE POLICY anyone_can_read ON project_for_project FOR SELECT TO rsd_web_anon, rsd_user
564564
USING (origin IN (SELECT id FROM project) AND relation IN (SELECT id FROM project));
565565

566566
CREATE POLICY maintainer_can_read ON project_for_project FOR SELECT TO rsd_user
@@ -582,7 +582,7 @@ CREATE POLICY admin_all_rights ON project_for_project TO rsd_admin
582582

583583
ALTER TABLE software_for_organisation ENABLE ROW LEVEL SECURITY;
584584

585-
CREATE POLICY anyone_can_read ON software_for_organisation FOR SELECT TO web_anon, rsd_user
585+
CREATE POLICY anyone_can_read ON software_for_organisation FOR SELECT TO rsd_web_anon, rsd_user
586586
USING (software IN (SELECT id FROM software));
587587

588588
CREATE POLICY maintainer_can_read ON software_for_organisation FOR SELECT TO rsd_user
@@ -604,7 +604,7 @@ CREATE POLICY admin_all_rights ON software_for_organisation TO rsd_admin
604604

605605
ALTER TABLE project_for_organisation ENABLE ROW LEVEL SECURITY;
606606

607-
CREATE POLICY anyone_can_read ON project_for_organisation FOR SELECT TO web_anon, rsd_user
607+
CREATE POLICY anyone_can_read ON project_for_organisation FOR SELECT TO rsd_web_anon, rsd_user
608608
USING (project IN (SELECT id FROM project));
609609

610610
CREATE POLICY maintainer_can_read ON project_for_organisation FOR SELECT TO rsd_user
@@ -627,7 +627,7 @@ CREATE POLICY admin_all_rights ON project_for_organisation TO rsd_admin
627627
-- meta-pages
628628
ALTER TABLE meta_pages ENABLE ROW LEVEL SECURITY;
629629

630-
CREATE POLICY anyone_can_read ON meta_pages FOR SELECT TO web_anon, rsd_user
630+
CREATE POLICY anyone_can_read ON meta_pages FOR SELECT TO rsd_web_anon, rsd_user
631631
USING (TRUE);
632632

633633
CREATE POLICY admin_all_rights ON meta_pages TO rsd_admin
@@ -638,7 +638,7 @@ CREATE POLICY admin_all_rights ON meta_pages TO rsd_admin
638638
-- oaipmh
639639
ALTER TABLE oaipmh ENABLE ROW LEVEL SECURITY;
640640

641-
CREATE POLICY anyone_can_read ON oaipmh FOR SELECT TO web_anon, rsd_user
641+
CREATE POLICY anyone_can_read ON oaipmh FOR SELECT TO rsd_web_anon, rsd_user
642642
USING (TRUE);
643643

644644
CREATE POLICY admin_all_rights ON oaipmh TO rsd_admin

deployment/docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ services:
3939
- 3500
4040
environment:
4141
# it needs to be here to use values from .env file
42-
- PGRST_DB_URI=postgres://authenticator:${POSTGRES_AUTHENTICATOR_PASSWORD}@${POSTGRES_DB_HOST}:${POSTGRES_DB_HOST_PORT}/${POSTGRES_DB}
42+
- PGRST_DB_URI=postgres://rsd_authenticator:${POSTGRES_AUTHENTICATOR_PASSWORD}@${POSTGRES_DB_HOST}:${POSTGRES_DB_HOST_PORT}/${POSTGRES_DB}
4343
- PGRST_DB_ANON_ROLE
4444
- PGRST_DB_SCHEMA
4545
- PGRST_SERVER_PORT

docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ services:
4040
- 3500
4141
environment:
4242
# it needs to be here to use values from .env file
43-
- PGRST_DB_URI=postgres://authenticator:${POSTGRES_AUTHENTICATOR_PASSWORD}@${POSTGRES_DB_HOST}:${POSTGRES_DB_HOST_PORT}/${POSTGRES_DB}
43+
- PGRST_DB_URI=postgres://rsd_authenticator:${POSTGRES_AUTHENTICATOR_PASSWORD}@${POSTGRES_DB_HOST}:${POSTGRES_DB_HOST_PORT}/${POSTGRES_DB}
4444
- PGRST_DB_ANON_ROLE
4545
- PGRST_DB_SCHEMA
4646
- PGRST_SERVER_PORT

frontend/components/layout/CardGrid.tsx

Lines changed: 0 additions & 31 deletions
This file was deleted.
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
// SPDX-FileCopyrightText: 2022 Dusan Mijatovic (dv4all)
2+
// SPDX-FileCopyrightText: 2022 dv4all
3+
//
4+
// SPDX-License-Identifier: Apache-2.0
5+
6+
type CardTitleProps = {
7+
title: string,
8+
children: any,
9+
className?: string
10+
}
11+
12+
/**
13+
* Card title max 3 lines with line clamp
14+
* @returns
15+
*/
16+
export default function CardTitle({title,children,className=''}:CardTitleProps) {
17+
return (
18+
<h2
19+
title={title}
20+
className={`group-hover:text-white line-clamp-3 max-h-[6.5rem] ${className}`}
21+
>
22+
{children}
23+
</h2>
24+
)
25+
}

0 commit comments

Comments
 (0)