updated permissions
This commit is contained in:
Binary file not shown.
Binary file not shown.
@@ -9,13 +9,15 @@ from reportlab.pdfgen import canvas
|
|||||||
from flask import Blueprint, render_template, request, redirect, url_for, flash
|
from flask import Blueprint, render_template, request, redirect, url_for, flash
|
||||||
import csv
|
import csv
|
||||||
from .warehouse import add_location
|
from .warehouse import add_location
|
||||||
from .settings import (
|
from app.settings import (
|
||||||
settings_handler,
|
settings_handler,
|
||||||
role_permissions_handler,
|
role_permissions_handler,
|
||||||
save_role_permissions_handler,
|
save_role_permissions_handler,
|
||||||
reset_role_permissions_handler,
|
reset_role_permissions_handler,
|
||||||
create_user_handler,
|
save_all_role_permissions_handler,
|
||||||
|
reset_all_role_permissions_handler,
|
||||||
edit_user_handler,
|
edit_user_handler,
|
||||||
|
create_user_handler,
|
||||||
delete_user_handler,
|
delete_user_handler,
|
||||||
save_external_db_handler
|
save_external_db_handler
|
||||||
)
|
)
|
||||||
@@ -278,6 +280,107 @@ def save_external_db():
|
|||||||
def role_permissions():
|
def role_permissions():
|
||||||
return role_permissions_handler()
|
return role_permissions_handler()
|
||||||
|
|
||||||
|
@bp.route('/test_permissions')
|
||||||
|
def test_permissions():
|
||||||
|
from app.settings import role_permissions_handler
|
||||||
|
from flask import render_template, session, redirect, url_for, flash
|
||||||
|
from app.permissions import APP_PERMISSIONS, ACTIONS
|
||||||
|
|
||||||
|
# Check if superadmin
|
||||||
|
if not session.get('role') == 'superadmin':
|
||||||
|
flash('Access denied: Superadmin only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
try:
|
||||||
|
# Get the same data as role_permissions_handler
|
||||||
|
from app.settings import get_external_db_connection
|
||||||
|
|
||||||
|
conn = get_external_db_connection()
|
||||||
|
cursor = conn.cursor()
|
||||||
|
|
||||||
|
# Get roles from role_hierarchy table
|
||||||
|
cursor.execute("SELECT role_name, display_name, description, level FROM role_hierarchy ORDER BY level DESC")
|
||||||
|
role_data = cursor.fetchall()
|
||||||
|
|
||||||
|
roles = {}
|
||||||
|
for role_name, display_name, description, level in role_data:
|
||||||
|
roles[role_name] = {
|
||||||
|
'display_name': display_name,
|
||||||
|
'description': description,
|
||||||
|
'level': level
|
||||||
|
}
|
||||||
|
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
return render_template('test_permissions.html',
|
||||||
|
roles=roles,
|
||||||
|
pages=APP_PERMISSIONS,
|
||||||
|
action_names=ACTIONS)
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
return f"Error: {e}"
|
||||||
|
|
||||||
|
@bp.route('/role_permissions_simple')
|
||||||
|
def role_permissions_simple():
|
||||||
|
# Use the same handler but different template
|
||||||
|
from app.settings import get_external_db_connection
|
||||||
|
from flask import render_template, session, redirect, url_for, flash
|
||||||
|
from app.permissions import APP_PERMISSIONS, ACTIONS
|
||||||
|
import json
|
||||||
|
|
||||||
|
# Check if superadmin
|
||||||
|
if not session.get('role') == 'superadmin':
|
||||||
|
flash('Access denied: Superadmin only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
try:
|
||||||
|
# Get roles and their current permissions
|
||||||
|
conn = get_external_db_connection()
|
||||||
|
cursor = conn.cursor()
|
||||||
|
|
||||||
|
# Get roles from role_hierarchy table
|
||||||
|
cursor.execute("SELECT role_name, display_name, description, level FROM role_hierarchy ORDER BY level DESC")
|
||||||
|
role_data = cursor.fetchall()
|
||||||
|
|
||||||
|
roles = {}
|
||||||
|
for role_name, display_name, description, level in role_data:
|
||||||
|
roles[role_name] = {
|
||||||
|
'display_name': display_name,
|
||||||
|
'description': description,
|
||||||
|
'level': level
|
||||||
|
}
|
||||||
|
|
||||||
|
# Get current role permissions
|
||||||
|
cursor.execute("""
|
||||||
|
SELECT role, permission_key
|
||||||
|
FROM role_permissions
|
||||||
|
WHERE granted = TRUE
|
||||||
|
""")
|
||||||
|
permission_data = cursor.fetchall()
|
||||||
|
|
||||||
|
role_permissions = {}
|
||||||
|
for role, permission_key in permission_data:
|
||||||
|
if role not in role_permissions:
|
||||||
|
role_permissions[role] = []
|
||||||
|
role_permissions[role].append(permission_key)
|
||||||
|
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
# Convert to JSON for JavaScript
|
||||||
|
permissions_json = json.dumps(APP_PERMISSIONS)
|
||||||
|
role_permissions_json = json.dumps(role_permissions)
|
||||||
|
|
||||||
|
return render_template('role_permissions_simple.html',
|
||||||
|
roles=roles,
|
||||||
|
pages=APP_PERMISSIONS,
|
||||||
|
action_names=ACTIONS,
|
||||||
|
permissions_json=permissions_json,
|
||||||
|
role_permissions_json=role_permissions_json)
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
flash(f'Error loading role permissions: {e}')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
@bp.route('/settings/save_role_permissions', methods=['POST'])
|
@bp.route('/settings/save_role_permissions', methods=['POST'])
|
||||||
def save_role_permissions():
|
def save_role_permissions():
|
||||||
return save_role_permissions_handler()
|
return save_role_permissions_handler()
|
||||||
@@ -286,6 +389,14 @@ def save_role_permissions():
|
|||||||
def reset_role_permissions():
|
def reset_role_permissions():
|
||||||
return reset_role_permissions_handler()
|
return reset_role_permissions_handler()
|
||||||
|
|
||||||
|
@bp.route('/settings/save_all_role_permissions', methods=['POST'])
|
||||||
|
def save_all_role_permissions():
|
||||||
|
return save_all_role_permissions_handler()
|
||||||
|
|
||||||
|
@bp.route('/settings/reset_all_role_permissions', methods=['POST'])
|
||||||
|
def reset_all_role_permissions():
|
||||||
|
return reset_all_role_permissions_handler()
|
||||||
|
|
||||||
@bp.route('/get_report_data', methods=['GET'])
|
@bp.route('/get_report_data', methods=['GET'])
|
||||||
def get_report_data():
|
def get_report_data():
|
||||||
report = request.args.get('report')
|
report = request.args.get('report')
|
||||||
@@ -683,6 +794,13 @@ def debug_dates():
|
|||||||
@bp.route('/test_database', methods=['GET'])
|
@bp.route('/test_database', methods=['GET'])
|
||||||
def test_database():
|
def test_database():
|
||||||
"""Test database connection and query the scan1_orders table"""
|
"""Test database connection and query the scan1_orders table"""
|
||||||
|
# Check if user has superadmin permissions
|
||||||
|
if 'role' not in session or session['role'] != 'superadmin':
|
||||||
|
return jsonify({
|
||||||
|
"success": False,
|
||||||
|
"error": "Access denied: Superadmin permissions required for database testing."
|
||||||
|
}), 403
|
||||||
|
|
||||||
try:
|
try:
|
||||||
print("DEBUG: Testing database connection...")
|
print("DEBUG: Testing database connection...")
|
||||||
conn = get_db_connection()
|
conn = get_db_connection()
|
||||||
|
|||||||
@@ -491,3 +491,116 @@ def reset_role_permissions_handler():
|
|||||||
|
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
return jsonify({'success': False, 'error': str(e)})
|
return jsonify({'success': False, 'error': str(e)})
|
||||||
|
|
||||||
|
|
||||||
|
def save_all_role_permissions_handler():
|
||||||
|
"""Save all role permissions at once"""
|
||||||
|
if not is_superadmin():
|
||||||
|
return jsonify({'success': False, 'error': 'Access denied: Superadmin only.'})
|
||||||
|
|
||||||
|
try:
|
||||||
|
data = request.get_json()
|
||||||
|
permissions_data = data.get('permissions', {})
|
||||||
|
|
||||||
|
if not permissions_data:
|
||||||
|
return jsonify({'success': False, 'error': 'No permissions data provided'})
|
||||||
|
|
||||||
|
conn = get_external_db_connection()
|
||||||
|
cursor = conn.cursor()
|
||||||
|
|
||||||
|
current_user = session.get('username', 'system')
|
||||||
|
total_updated = 0
|
||||||
|
|
||||||
|
# Process each role's permissions
|
||||||
|
for role, role_permissions in permissions_data.items():
|
||||||
|
# Clear existing permissions for this role
|
||||||
|
cursor.execute("DELETE FROM role_permissions WHERE role = %s", (role,))
|
||||||
|
|
||||||
|
# Convert nested permissions to flat permission keys
|
||||||
|
permission_keys = []
|
||||||
|
for page_key, page_perms in role_permissions.items():
|
||||||
|
for section_key, actions in page_perms.items():
|
||||||
|
for action in actions:
|
||||||
|
permission_key = f"{page_key}.{section_key}.{action}"
|
||||||
|
permission_keys.append(permission_key)
|
||||||
|
|
||||||
|
# Insert new permissions
|
||||||
|
for permission_key in permission_keys:
|
||||||
|
cursor.execute("""
|
||||||
|
INSERT INTO role_permissions (role, permission_key, granted, granted_by)
|
||||||
|
VALUES (%s, %s, TRUE, %s)
|
||||||
|
""", (role, permission_key, current_user))
|
||||||
|
total_updated += 1
|
||||||
|
|
||||||
|
# Log the change
|
||||||
|
cursor.execute("""
|
||||||
|
INSERT INTO permission_audit_log (role, permission_key, action, changed_by, reason)
|
||||||
|
VALUES (%s, %s, 'bulk_update', %s, %s)
|
||||||
|
""", (role, f"Updated {len(permission_keys)} permissions", current_user, "Bulk permission update"))
|
||||||
|
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
# Clear permission cache since permissions changed
|
||||||
|
clear_permission_cache()
|
||||||
|
|
||||||
|
return jsonify({
|
||||||
|
'success': True,
|
||||||
|
'message': f'Successfully updated {total_updated} permissions across {len(permissions_data)} roles'
|
||||||
|
})
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
return jsonify({'success': False, 'error': str(e)})
|
||||||
|
|
||||||
|
|
||||||
|
def reset_all_role_permissions_handler():
|
||||||
|
"""Reset all role permissions to defaults"""
|
||||||
|
if not is_superadmin():
|
||||||
|
return jsonify({'success': False, 'error': 'Access denied: Superadmin only.'})
|
||||||
|
|
||||||
|
try:
|
||||||
|
# Get all roles
|
||||||
|
conn = get_external_db_connection()
|
||||||
|
cursor = conn.cursor()
|
||||||
|
|
||||||
|
cursor.execute("SELECT role_name FROM role_hierarchy")
|
||||||
|
roles = [row[0] for row in cursor.fetchall()]
|
||||||
|
|
||||||
|
current_user = session.get('username', 'system')
|
||||||
|
total_reset = 0
|
||||||
|
|
||||||
|
# Reset each role to defaults
|
||||||
|
for role in roles:
|
||||||
|
# Clear existing permissions
|
||||||
|
cursor.execute("DELETE FROM role_permissions WHERE role = %s", (role,))
|
||||||
|
|
||||||
|
# Get default permissions for the role
|
||||||
|
default_permissions = get_default_permissions_for_role(role)
|
||||||
|
|
||||||
|
# Add default permissions
|
||||||
|
for permission_key in default_permissions:
|
||||||
|
cursor.execute("""
|
||||||
|
INSERT INTO role_permissions (role, permission_key, granted, granted_by)
|
||||||
|
VALUES (%s, %s, TRUE, %s)
|
||||||
|
""", (role, permission_key, current_user))
|
||||||
|
total_reset += 1
|
||||||
|
|
||||||
|
# Log the change
|
||||||
|
cursor.execute("""
|
||||||
|
INSERT INTO permission_audit_log (role, permission_key, action, changed_by, reason)
|
||||||
|
VALUES (%s, %s, 'reset_all_defaults', %s, %s)
|
||||||
|
""", (role, f"Reset {len(default_permissions)} permissions", current_user, "Reset all to default permissions"))
|
||||||
|
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
# Clear permission cache since permissions changed
|
||||||
|
clear_permission_cache()
|
||||||
|
|
||||||
|
return jsonify({
|
||||||
|
'success': True,
|
||||||
|
'message': f'Successfully reset {total_reset} permissions across {len(roles)} roles to defaults'
|
||||||
|
})
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
return jsonify({'success': False, 'error': str(e)})
|
||||||
|
|||||||
@@ -56,7 +56,9 @@
|
|||||||
<div class="button-row">
|
<div class="button-row">
|
||||||
<button class="btn export-btn" id="export-csv">Export CSV</button>
|
<button class="btn export-btn" id="export-csv">Export CSV</button>
|
||||||
<!-- <button class="btn export-btn" id="export-excel">Export excell</button> -->
|
<!-- <button class="btn export-btn" id="export-excel">Export excell</button> -->
|
||||||
|
{% if session.get('role') == 'superadmin' %}
|
||||||
<button class="btn export-btn test-db-btn" id="test-database">Test Database</button>
|
<button class="btn export-btn test-db-btn" id="test-database">Test Database</button>
|
||||||
|
{% endif %}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -1,198 +1,422 @@
|
|||||||
Here is the content for the `documentation.md` file that explains the functionality of the application:
|
# Quality Control Management System - Documentation
|
||||||
|
|
||||||
|
## Table of Contents
|
||||||
|
1. [Login System](#login-system)
|
||||||
|
2. [Dashboard System](#dashboard-system)
|
||||||
|
3. [User Authentication](#user-authentication)
|
||||||
|
4. [Role-Based Access Control](#role-based-access-control)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Documentation for Quality Recticel Application
|
## Login System
|
||||||
|
|
||||||
---
|
### Overview
|
||||||
|
The Quality Control Management System features a dual-database authentication system that provides flexible user management and robust access control. The login system supports both internal SQLite database users and external MariaDB database users.
|
||||||
|
|
||||||
#### **Overview**
|
### Authentication Flow
|
||||||
The Quality Recticel application is a web-based system designed to manage and monitor quality control processes, user roles, and database interactions. It includes modules for scanning, quality assurance, warehouse management, and administrative settings.
|
|
||||||
|
|
||||||
---
|
#### 1. Login Page Access
|
||||||
|
- **URL**: `/login`
|
||||||
|
- **Template**: `login.html`
|
||||||
|
- **Methods**: `GET`, `POST`
|
||||||
|
|
||||||
### **Features**
|
#### 2. User Interface
|
||||||
|
The login page features:
|
||||||
|
- **Company Logo**: Displayed prominently on the left side
|
||||||
|
- **Login Form**: Clean, centered form on the right side
|
||||||
|
- **Required Fields**:
|
||||||
|
- Username (text input)
|
||||||
|
- Password (password input)
|
||||||
|
- **Responsive Design**: Adapts to different screen sizes
|
||||||
|
|
||||||
#### 1. **User Management**
|
#### 3. Authentication Methods
|
||||||
- **Roles**:
|
|
||||||
- `superadmin`: Full access to all features and settings.
|
|
||||||
- `administrator`: Limited administrative access.
|
|
||||||
- `quality`: Access to quality assurance features.
|
|
||||||
- `warehouse`: Access to warehouse management features.
|
|
||||||
- `scan`: Access to scanning features.
|
|
||||||
- **Functionalities**:
|
|
||||||
- Create, edit, and delete users.
|
|
||||||
- Assign roles to users.
|
|
||||||
- Manage user credentials.
|
|
||||||
|
|
||||||
#### 2. **Scan Module**
|
##### Internal Database Authentication
|
||||||
- **Input Form**:
|
Users can access the system using the internal SQLite database by prefixing their username with `#`:
|
||||||
- Allows users to input scan data, including:
|
|
||||||
- Operator Code
|
|
||||||
- CP Code
|
|
||||||
- OC1 Code
|
|
||||||
- OC2 Code
|
|
||||||
- Defect Code
|
|
||||||
- Date and Time
|
|
||||||
- **Latest Scans Table**:
|
|
||||||
- Displays the last 15 scans with details such as:
|
|
||||||
- Approved Quantity
|
|
||||||
- Rejected Quantity
|
|
||||||
- Data is dynamically fetched from the database.
|
|
||||||
|
|
||||||
#### 3. **Quality Module**
|
**Format**: `#username`
|
||||||
- Provides tools for quality assurance personnel to monitor and manage quality-related data.
|
**Example**: `#admin` for internal admin user
|
||||||
|
|
||||||
#### 4. **Warehouse Module**
|
**Database Details**:
|
||||||
- Enables warehouse personnel to manage inventory and related processes.
|
- **Location**: `py_app/instance/users.db`
|
||||||
|
- **Table**: `users`
|
||||||
|
- **Schema**: `username, password, role`
|
||||||
|
- **Use Case**: System administrators, fallback authentication
|
||||||
|
|
||||||
#### 5. **Settings Module**
|
##### External Database Authentication
|
||||||
- **External Database Configuration**:
|
Standard authentication uses the external MariaDB database:
|
||||||
- Allows the `superadmin` to configure external database settings, including:
|
|
||||||
- Server Domain/IP
|
|
||||||
- Port
|
|
||||||
- Database Name
|
|
||||||
- Username and Password
|
|
||||||
- **User Management**:
|
|
||||||
- Provides an interface to manage users and their roles.
|
|
||||||
|
|
||||||
---
|
**Format**: `username` (no prefix)
|
||||||
|
**Example**: `john.doe` for external user
|
||||||
|
|
||||||
### **Database Structure**
|
**Database Details**:
|
||||||
|
- **Type**: MariaDB
|
||||||
|
- **Configuration**: Loaded from `external_database_settings`
|
||||||
|
- **Table**: `users`
|
||||||
|
- **Schema**: `username, password, role`
|
||||||
|
- **Use Case**: Regular operational users
|
||||||
|
|
||||||
#### **Table: `scan1_orders`**
|
#### 4. Authentication Logic
|
||||||
- **Columns**:
|
|
||||||
- `Id`: Auto-incremented primary key.
|
|
||||||
- `operator_code`: Operator code (4 characters).
|
|
||||||
- `CP_full_code`: Full CP code (15 characters, unique).
|
|
||||||
- `OC1_code`: OC1 code (4 characters).
|
|
||||||
- `OC2_code`: OC2 code (4 characters).
|
|
||||||
- `CP_base_code`: Auto-generated base code (first 10 characters of `CP_full_code`).
|
|
||||||
- `quality_code`: Quality code (3 digits).
|
|
||||||
- `date`: Date in `yyyy-mm-dd` format.
|
|
||||||
- `time`: Time in `hh:mm:ss` format.
|
|
||||||
- `approved_quantity`: Number of approved items (calculated dynamically).
|
|
||||||
- `rejected_quantity`: Number of rejected items (calculated dynamically).
|
|
||||||
|
|
||||||
#### **Triggers**
|
```python
|
||||||
- **`increment_approved_quantity`**:
|
# Authentication Process Flow
|
||||||
- Updates `approved_quantity` based on the number of rows with the same `CP_base_code` and `quality_code = 000`.
|
if username.startswith('#'):
|
||||||
- **`increment_rejected_quantity`**:
|
# Internal SQLite Database Authentication
|
||||||
- Updates `rejected_quantity` based on the number of rows with the same `CP_base_code` and `quality_code != 000`.
|
username_clean = username[1:].strip()
|
||||||
|
# Query: py_app/instance/users.db
|
||||||
|
|
||||||
---
|
else:
|
||||||
|
# External MariaDB Database Authentication
|
||||||
### **Key Files**
|
# Primary: External database query
|
||||||
|
# Fallback: Internal database if external fails
|
||||||
#### 1. **`run.py`**
|
|
||||||
- Entry point for the application.
|
|
||||||
- Starts the Flask server.
|
|
||||||
|
|
||||||
#### 2. **`routes.py`**
|
|
||||||
- Defines the routes and logic for the application.
|
|
||||||
- Handles user authentication, form submissions, and database interactions.
|
|
||||||
|
|
||||||
#### 3. **`models.py`**
|
|
||||||
- Defines the `User` model for managing user data.
|
|
||||||
|
|
||||||
#### 4. **`create_scan_1db.py`**
|
|
||||||
- Script to create the `scan1_orders` table in the database.
|
|
||||||
|
|
||||||
#### 5. **`create_triggers.py`**
|
|
||||||
- Script to create database triggers for dynamically updating `approved_quantity` and `rejected_quantity`.
|
|
||||||
|
|
||||||
#### 6. **`seed.py`**
|
|
||||||
- Seeds the database with default users.
|
|
||||||
|
|
||||||
#### 7. **Templates**
|
|
||||||
- **`scan.html`**:
|
|
||||||
- Interface for the Scan Module.
|
|
||||||
- **`settings.html`**:
|
|
||||||
- Interface for managing users and external database settings.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
### **How to Run the Application**
|
|
||||||
|
|
||||||
1. **Set Up the Environment**:
|
|
||||||
- Install dependencies:
|
|
||||||
```bash
|
|
||||||
pip install flask mariadb
|
|
||||||
```
|
```
|
||||||
|
|
||||||
2. **Configure the Database**:
|
#### 5. Security Features
|
||||||
- Update the `external_server.conf` file with the correct database credentials.
|
|
||||||
|
|
||||||
3. **Create the Database and Triggers**:
|
##### Input Validation
|
||||||
- Run the create_scan_1db.py script:
|
- **Required Fields**: Both username and password must be provided
|
||||||
```bash
|
- **Sanitization**: Automatic trimming of whitespace
|
||||||
python py_app/app/db_create_scripts/create_scan_1db.py
|
- **Error Handling**: Clear error messages for invalid inputs
|
||||||
|
|
||||||
|
##### Database Connection Security
|
||||||
|
- **Dual Fallback**: External database with internal fallback
|
||||||
|
- **Error Isolation**: Database errors don't expose system details
|
||||||
|
- **Connection Management**: Proper connection opening/closing
|
||||||
|
|
||||||
|
##### Session Management
|
||||||
|
- **Secure Sessions**: User credentials stored in Flask session
|
||||||
|
- **Role Tracking**: User role preserved for authorization
|
||||||
|
- **Session Data**:
|
||||||
|
- `session['user']`: Username
|
||||||
|
- `session['role']`: User role
|
||||||
|
|
||||||
|
#### 6. User Roles
|
||||||
|
|
||||||
|
The system supports multiple user roles with different access levels:
|
||||||
|
|
||||||
|
- **superadmin**: Full system access, all modules and administrative functions
|
||||||
|
- **admin**: Administrative access with some limitations
|
||||||
|
- **quality**: Quality control module access
|
||||||
|
- **warehouse**: Warehouse management module access
|
||||||
|
- **scan**: Scanning operations access
|
||||||
|
- **etichete**: Label management access
|
||||||
|
- **management**: Management reporting and oversight
|
||||||
|
|
||||||
|
#### 7. Login Process
|
||||||
|
|
||||||
|
1. **User Navigation**: User accesses `/login` URL
|
||||||
|
2. **Form Display**: Login form rendered with company branding
|
||||||
|
3. **Credential Submission**: User enters username/password and submits
|
||||||
|
4. **Authentication Check**:
|
||||||
|
- Internal users: Check SQLite database
|
||||||
|
- External users: Check MariaDB database with SQLite fallback
|
||||||
|
5. **Session Creation**: Valid credentials create user session
|
||||||
|
6. **Redirect**: Successful login redirects to `/dashboard`
|
||||||
|
7. **Error Handling**: Invalid credentials display error message
|
||||||
|
|
||||||
|
#### 8. Error Messages
|
||||||
|
|
||||||
|
- **Missing Credentials**: "Please enter both username and password."
|
||||||
|
- **Invalid Credentials**: "Invalid credentials. Please try again."
|
||||||
|
- **Database Errors**: Handled gracefully with fallback mechanisms
|
||||||
|
|
||||||
|
#### 9. Post-Login Behavior
|
||||||
|
|
||||||
|
After successful authentication:
|
||||||
|
- **Session Establishment**: User session created with username and role
|
||||||
|
- **Dashboard Redirect**: User redirected to main dashboard
|
||||||
|
- **Access Control**: Role-based permissions applied throughout system
|
||||||
|
- **Navigation**: Header displays logged-in user information
|
||||||
|
|
||||||
|
#### 10. Security Considerations
|
||||||
|
|
||||||
|
##### Password Security
|
||||||
|
- **Storage**: Passwords stored in plaintext (consider encryption upgrade)
|
||||||
|
- **Transmission**: Form-based submission over HTTPS recommended
|
||||||
|
- **Session**: Password not stored in session, only username/role
|
||||||
|
|
||||||
|
##### Database Security
|
||||||
|
- **Connection Strings**: External database settings in separate config
|
||||||
|
- **Error Handling**: Database errors logged but not exposed to users
|
||||||
|
- **Fallback System**: Ensures availability even if external database fails
|
||||||
|
|
||||||
|
### Technical Implementation
|
||||||
|
|
||||||
|
#### Frontend Components
|
||||||
|
- **Template**: `templates/login.html`
|
||||||
|
- **Styling**: Login-specific CSS in `static/style.css`
|
||||||
|
- **Assets**: Company logo (`static/logo_login.jpg`)
|
||||||
|
|
||||||
|
#### Backend Components
|
||||||
|
- **Route Handler**: `@bp.route('/login', methods=['GET', 'POST'])`
|
||||||
|
- **Database Connections**: SQLite and MariaDB integration
|
||||||
|
- **Session Management**: Flask session handling
|
||||||
|
- **Error Handling**: Comprehensive exception management
|
||||||
|
|
||||||
|
#### Configuration Files
|
||||||
|
- **External Database**: Configuration loaded from `external_database_settings`
|
||||||
|
- **Internal Database**: SQLite database in `instance/users.db`
|
||||||
|
|
||||||
|
### Usage Examples
|
||||||
|
|
||||||
|
#### Standard User Login
|
||||||
```
|
```
|
||||||
- Run the create_triggers.py script:
|
Username: john.doe
|
||||||
```bash
|
Password: userpassword
|
||||||
python py_app/app/db_create_scripts/create_triggers.py
|
Result: Queries external MariaDB database
|
||||||
```
|
```
|
||||||
|
|
||||||
4. **Seed the Database**:
|
#### Internal Admin Login
|
||||||
- Run the seed.py script:
|
```
|
||||||
```bash
|
Username: #admin
|
||||||
python py_app/seed.py
|
Password: adminpassword
|
||||||
|
Result: Queries internal SQLite database
|
||||||
```
|
```
|
||||||
|
|
||||||
5. **Start the Application**:
|
#### System Administrator Login
|
||||||
- Run the run.py file:
|
|
||||||
```bash
|
|
||||||
python py_app/run.py
|
|
||||||
```
|
```
|
||||||
|
Username: #superadmin
|
||||||
6. **Access the Application**:
|
Password: superpass
|
||||||
- Open a browser and navigate to:
|
Result: Internal database, full system access
|
||||||
```
|
|
||||||
http://127.0.0.1:5000
|
|
||||||
```
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### **Troubleshooting**
|
## Dashboard System
|
||||||
|
|
||||||
1. **Database Connection Issues**:
|
### Overview
|
||||||
- Ensure the `external_server.conf` file is correctly configured.
|
The dashboard serves as the central hub of the Quality Control Management System, providing authenticated users with access to various system modules based on their assigned roles. It features a clean, card-based interface that displays available modules and ensures proper access control.
|
||||||
- Verify that the database server is running.
|
|
||||||
|
|
||||||
2. **Trigger Errors**:
|
### Dashboard Access
|
||||||
- Check the trigger definitions in the database using:
|
|
||||||
```sql
|
#### 1. Dashboard Page Access
|
||||||
SHOW TRIGGERS;
|
- **URL**: `/dashboard`
|
||||||
|
- **Template**: `dashboard.html`
|
||||||
|
- **Methods**: `GET`
|
||||||
|
- **Authentication Required**: Yes (redirects to login if not authenticated)
|
||||||
|
|
||||||
|
#### 2. User Interface Design
|
||||||
|
|
||||||
|
The dashboard features a modern, responsive card-based layout:
|
||||||
|
- **Container**: Full-width responsive grid layout
|
||||||
|
- **Module Cards**: Individual cards for each system module
|
||||||
|
- **Visual Hierarchy**: Clear headings, descriptions, and call-to-action buttons
|
||||||
|
- **Responsive Design**: Adapts to different screen sizes and devices
|
||||||
|
|
||||||
|
#### 3. Available Modules
|
||||||
|
|
||||||
|
##### Scanning Module
|
||||||
|
- **Card Title**: "Access Scanning Module"
|
||||||
|
- **Description**: "Final scanning module for production orders"
|
||||||
|
- **Button**: "Launch Scanning Module"
|
||||||
|
- **Route**: `/scan`
|
||||||
|
- **Required Roles**: `superadmin`, `scan`
|
||||||
|
- **Purpose**: Quality control scanning operations for production orders
|
||||||
|
|
||||||
|
##### Reports Module (Quality)
|
||||||
|
- **Card Title**: "Access Reports Module"
|
||||||
|
- **Description**: "Module for verification and quality settings configuration"
|
||||||
|
- **Button**: "Launch Reports Module"
|
||||||
|
- **Route**: `/quality`
|
||||||
|
- **Required Roles**: `superadmin`, `quality`
|
||||||
|
- **Purpose**: Quality reporting, defects analysis, and quality control reports
|
||||||
|
|
||||||
|
##### Warehouse Module
|
||||||
|
- **Card Title**: "Access Warehouse Module"
|
||||||
|
- **Description**: "Access warehouse module functionalities"
|
||||||
|
- **Button**: "Open Warehouse"
|
||||||
|
- **Route**: `/warehouse`
|
||||||
|
- **Required Roles**: `superadmin`, `warehouse`
|
||||||
|
- **Purpose**: Warehouse management operations and inventory control
|
||||||
|
|
||||||
|
##### Labels Module
|
||||||
|
- **Card Title**: "Access Labels Module"
|
||||||
|
- **Description**: "Module for label management"
|
||||||
|
- **Button**: "Launch Labels Module"
|
||||||
|
- **Route**: `/etichete`
|
||||||
|
- **Required Roles**: `superadmin`, `etichete`
|
||||||
|
- **Purpose**: Label creation, template management, and printing operations
|
||||||
|
|
||||||
|
##### Settings Module
|
||||||
|
- **Card Title**: "Manage Settings"
|
||||||
|
- **Description**: "Access and manage application settings"
|
||||||
|
- **Button**: "Access Settings Page"
|
||||||
|
- **Route**: `/settings`
|
||||||
|
- **Required Roles**: `superadmin` only
|
||||||
|
- **Purpose**: System configuration, user management, and administrative settings
|
||||||
|
|
||||||
|
#### 4. Access Control Logic
|
||||||
|
|
||||||
|
The dashboard implements role-based access control at both the display and route levels:
|
||||||
|
|
||||||
|
##### Frontend Display Control
|
||||||
|
All module cards are displayed to all authenticated users, but access is controlled at the route level.
|
||||||
|
|
||||||
|
##### Backend Route Protection
|
||||||
|
Each module route implements permission checking:
|
||||||
|
|
||||||
|
```python
|
||||||
|
# Quality Module Access Control
|
||||||
|
@bp.route('/quality')
|
||||||
|
def quality():
|
||||||
|
if 'role' not in session or session['role'] not in ['superadmin', 'quality']:
|
||||||
|
flash('Access denied: Quality users only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
# Warehouse Module Access Control
|
||||||
|
@bp.route('/warehouse')
|
||||||
|
def warehouse():
|
||||||
|
if 'role' not in session or session['role'] not in ['superadmin', 'warehouse']:
|
||||||
|
flash('Access denied: Warehouse users only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
# Scanning Module Access Control
|
||||||
|
@bp.route('/scan')
|
||||||
|
def scan():
|
||||||
|
if 'role' not in session or session['role'] not in ['superadmin', 'scan']:
|
||||||
|
flash('Access denied: Scan users only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
# Labels Module Access Control
|
||||||
|
@bp.route('/etichete')
|
||||||
|
def etichete():
|
||||||
|
if 'role' not in session or session['role'] not in ['superadmin', 'etichete']:
|
||||||
|
flash('Access denied: Etichete users only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
|
|
||||||
|
# Settings Module Access Control (Superadmin Only)
|
||||||
|
def settings_handler():
|
||||||
|
if 'role' not in session or session['role'] != 'superadmin':
|
||||||
|
flash('Access denied: Superadmin only.')
|
||||||
|
return redirect(url_for('main.dashboard'))
|
||||||
```
|
```
|
||||||
|
|
||||||
3. **Form Submission Errors**:
|
#### 5. User Experience Flow
|
||||||
- Verify that all required fields in the form are filled out.
|
|
||||||
|
|
||||||
4. **Permission Issues**:
|
1. **Authentication Check**: User must be logged in to access dashboard
|
||||||
- Ensure the user has the correct role for accessing specific modules.
|
2. **Dashboard Display**: All module cards shown regardless of role
|
||||||
|
3. **Module Selection**: User clicks on desired module button
|
||||||
|
4. **Permission Validation**: System checks user role against module requirements
|
||||||
|
5. **Access Grant/Deny**:
|
||||||
|
- **Authorized**: User redirected to module interface
|
||||||
|
- **Unauthorized**: Error message displayed, user remains on dashboard
|
||||||
|
|
||||||
|
#### 6. Session Management
|
||||||
|
|
||||||
|
The dashboard relies on Flask session management:
|
||||||
|
- **Session Check**: `if 'user' not in session` validates authentication
|
||||||
|
- **Role Access**: `session['role']` determines module permissions
|
||||||
|
- **Debug Logging**: Session information logged for troubleshooting
|
||||||
|
|
||||||
|
#### 7. Error Handling
|
||||||
|
|
||||||
|
##### Authentication Errors
|
||||||
|
- **Unauthenticated Users**: Automatic redirect to login page
|
||||||
|
- **Session Timeout**: Redirect to login with appropriate messaging
|
||||||
|
|
||||||
|
##### Authorization Errors
|
||||||
|
- **Insufficient Permissions**: Flash message with specific role requirements
|
||||||
|
- **Access Denied**: User returned to dashboard with error notification
|
||||||
|
- **Clear Messaging**: Specific error messages indicate required permissions
|
||||||
|
|
||||||
|
#### 8. Security Features
|
||||||
|
|
||||||
|
##### Session Security
|
||||||
|
- **Authentication Required**: All dashboard access requires valid session
|
||||||
|
- **Role Validation**: Each module validates user role before access
|
||||||
|
- **Automatic Redirect**: Unauthorized access redirected safely
|
||||||
|
|
||||||
|
##### Access Control
|
||||||
|
- **Principle of Least Privilege**: Users only access modules for their role
|
||||||
|
- **Superadmin Override**: Superadmin role has access to all modules
|
||||||
|
- **Route-Level Protection**: Backend validation prevents unauthorized access
|
||||||
|
|
||||||
|
#### 9. Module Descriptions
|
||||||
|
|
||||||
|
##### Quality Reports Module
|
||||||
|
- **Primary Function**: Generate quality control reports and analytics
|
||||||
|
- **Key Features**:
|
||||||
|
- Daily, weekly, and custom date range reports
|
||||||
|
- Quality defects analysis and tracking
|
||||||
|
- Export capabilities (CSV format)
|
||||||
|
- Database testing tools (superadmin only)
|
||||||
|
|
||||||
|
##### Scanning Module
|
||||||
|
- **Primary Function**: Production order scanning and quality validation
|
||||||
|
- **Key Features**:
|
||||||
|
- Barcode/QR code scanning interface
|
||||||
|
- Real-time quality validation
|
||||||
|
- Production order processing
|
||||||
|
|
||||||
|
##### Warehouse Module
|
||||||
|
- **Primary Function**: Warehouse operations and inventory management
|
||||||
|
- **Key Features**:
|
||||||
|
- Inventory tracking and management
|
||||||
|
- Location management
|
||||||
|
- Warehouse reporting
|
||||||
|
|
||||||
|
##### Labels Module
|
||||||
|
- **Primary Function**: Label design, generation, and printing
|
||||||
|
- **Key Features**:
|
||||||
|
- Label template creation and management
|
||||||
|
- Dynamic label generation
|
||||||
|
- Print management system
|
||||||
|
|
||||||
|
##### Settings Module
|
||||||
|
- **Primary Function**: System administration and configuration
|
||||||
|
- **Key Features**:
|
||||||
|
- User account management
|
||||||
|
- Role and permission configuration
|
||||||
|
- Database settings management
|
||||||
|
- System configuration options
|
||||||
|
|
||||||
|
#### 10. Technical Implementation
|
||||||
|
|
||||||
|
##### Frontend Components
|
||||||
|
- **Template**: `templates/dashboard.html`
|
||||||
|
- **Styling**: Dashboard-specific CSS classes in `static/style.css`
|
||||||
|
- **Layout**: CSS Grid/Flexbox responsive card layout
|
||||||
|
- **Navigation**: Base template integration with header/footer
|
||||||
|
|
||||||
|
##### Backend Components
|
||||||
|
- **Route Handler**: `@bp.route('/dashboard')`
|
||||||
|
- **Session Management**: Flask session integration
|
||||||
|
- **Authentication Check**: User session validation
|
||||||
|
- **Logging**: Debug output for troubleshooting
|
||||||
|
|
||||||
|
##### Styling Classes
|
||||||
|
- `.dashboard-container`: Main container with responsive grid
|
||||||
|
- `.dashboard-card`: Individual module cards
|
||||||
|
- `.btn`: Standardized button styling
|
||||||
|
- Responsive breakpoints for mobile/tablet adaptation
|
||||||
|
|
||||||
|
### Usage Examples
|
||||||
|
|
||||||
|
#### Superadmin User Dashboard Access
|
||||||
|
```
|
||||||
|
Role: superadmin
|
||||||
|
Available Modules: All (Scanning, Quality, Warehouse, Labels, Settings)
|
||||||
|
Special Access: Settings module exclusive access
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Quality Control User Dashboard Access
|
||||||
|
```
|
||||||
|
Role: quality
|
||||||
|
Available Modules: Quality Reports module only
|
||||||
|
Restricted Access: Cannot access other modules
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Multi-Role Access Example
|
||||||
|
```
|
||||||
|
Role: warehouse
|
||||||
|
Available Modules: Warehouse module only
|
||||||
|
Access Pattern: Click → Permission Check → Module Access
|
||||||
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### **Future Enhancements**
|
*This documentation covers the dashboard system implementation. For specific module details, see their respective documentation sections.*
|
||||||
- Add detailed logging for debugging.
|
|
||||||
- Implement role-based access control for more granular permissions.
|
|
||||||
- Add support for exporting scan data to CSV or Excel.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
Save this content as `documentation.md` in the root directory of your project.3. **Form Submission Errors**:
|
|
||||||
- Verify that all required fields in the form are filled out.
|
|
||||||
|
|
||||||
4. **Permission Issues**:
|
|
||||||
- Ensure the user has the correct role for accessing specific modules.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
### **Future Enhancements**
|
|
||||||
- Add detailed logging for debugging.
|
|
||||||
- Implement role-based access control for more granular permissions.
|
|
||||||
- Add support for exporting scan data to CSV or Excel.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
Save this content as `documentation.md` in the root directory of your project.
|
|
||||||
Reference in New Issue
Block a user