def create_excluesion_item_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = trace_id organization_id = eventhelper.get_organization_id(event) project_id = eventhelper.get_project_id(event) email = eventhelper.get_email(event) check_item_code = eventhelper.get_check_item_code(event) coop_id = eventhelper.get_coop_id(event) # Get logging pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェックを行います。 response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Editor) if response_authority: return common_utils.response(response_authority, pm_logger) # return response data response = checkitemsettings_logic.create_excluesion_item( trace_id, user_id, organization_id, project_id, email, check_item_code, coop_id, event['body']) return common_utils.response(response, pm_logger)
def apply_change_email_handler(event, context): user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) pm_logger = common_utils.begin_logger(user_id, __name__, inspect.currentframe()) # return data response response = user_logic.apply_change_email(user_id, email, event['body']) return common_utils.response(response, pm_logger)
def create_organization_handler(event, context): trace_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) body = event['body'] pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # Create data response = organizations_logic.create_organization(trace_id, email, body) return common_utils.response(response, pm_logger)
def execute_copy_item_setting_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = trace_id email = eventhelper.get_email(event) organization_id_destination = eventhelper.get_organization_id(event) project_id_destination = eventhelper.get_project_id(event) coop_id_destination = eventhelper.get_coop_id(event) # Get logging pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # return response data response = checkitemsettings_logic.execute_copy_item_setting( trace_id, organization_id_destination, project_id_destination, coop_id_destination, event['body'], email, user_id) return common_utils.response(response, pm_logger)
def delete_organization_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) organization_id = eventhelper.get_organization_id(event) pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェック response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Owner) if (response_authority): return common_utils.response(response_authority, pm_logger) # delete data response = organizations_logic.delete_organization(trace_id, email, organization_id) return common_utils.response(response, pm_logger)
def create_report_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) organization_id = eventhelper.get_organization_id(event) project_id = eventhelper.get_project_id(event) pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェック response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Editor) if response_authority: return common_utils.response(response_authority, pm_logger) # Create report response = reports_logic.create_report(trace_id, email, organization_id, project_id, event["body"]) return common_utils.response(response, pm_logger)
def generate_security_check_webhook_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) body = eventhelper.parse_body(event) organization_id = body['organizationId'] project_id = body['projectId'] pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェックを行います。 response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Editor) if response_authority: return common_utils.response(response_authority, pm_logger) response = awschecks_logic.generate_security_check_webhook( trace_id, organization_id, project_id, user_id, email) return common_utils.response(response, pm_logger)
def execute_security_check_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) organization_id = eventhelper.get_organization_id(event) project_id = eventhelper.get_project_id(event) # Get logging pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェックを行います。 response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Editor) if response_authority: return common_utils.response(response_authority, pm_logger) # return response data response = awschecks_logic.execute_security_check(trace_id, organization_id, project_id, user_id, email) return common_utils.response(response, pm_logger)
def request_output_report_handler(event, context): trace_id = eventhelper.get_trace_id(event) user_id = eventhelper.get_trace_id(event) email = eventhelper.get_email(event) organization_id = eventhelper.get_organization_id(event) project_id = eventhelper.get_project_id(event) report_id = eventhelper.get_report_id(event) file_type = eventhelper.get_file_type(event) pm_logger = common_utils.begin_logger(trace_id, __name__, inspect.currentframe()) # アクセス権限チェック response_authority = checkauthority.authority(trace_id, user_id, organization_id, Authority.Editor) if response_authority: return common_utils.response(response_authority, pm_logger) # export report response = reports_logic.request_output_report(trace_id, email, organization_id, project_id, report_id, file_type) return common_utils.response(response, pm_logger)