- 
          
 - 
                Notifications
    
You must be signed in to change notification settings  - Fork 11
 
[BACK-2780] Add new user profiles endpoint. #698
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
          
     Open
      
      
            lostlevels
  wants to merge
  67
  commits into
  master
  
    
      
        
          
  
    
      Choose a base branch
      
     
    
      
        
      
      
        
          
          
        
        
          
            
              
              
              
  
           
        
        
          
            
              
              
           
        
       
     
  
        
          
            
          
            
          
        
       
    
      
from
jimmy/BACK-2780-new-profiles-endpoint
  
      
      
   
  
    
  
  
  
 
  
      
    base: master
Could not load branches
            
              
  
    Branch not found: {{ refName }}
  
            
                
      Loading
              
            Could not load tags
            
            
              Nothing to show
            
              
  
            
                
      Loading
              
            Are you sure you want to change the base?
            Some commits from the old base branch may be removed from the timeline,
            and old review comments may become outdated.
          
          
  
     Open
                    Changes from 48 commits
      Commits
    
    
            Show all changes
          
          
            67 commits
          
        
        Select commit
          Hold shift + click to select a range
      
      7b25f7a
              
                Refactoring and adding shoreline models to platform/user for auth.
              
              
                lostlevels 76a6bb5
              
                Cleanup.
              
              
                lostlevels 0b9f170
              
                Add /v1/profiles/:userId route.
              
              
                lostlevels a93f797
              
                Renaming.
              
              
                lostlevels 5dbd8ac
              
                Add the route.
              
              
                lostlevels 6a9014c
              
                Fix build.
              
              
                lostlevels ed826a9
              
                Fix test.
              
              
                lostlevels 2a49fb0
              
                Use permissions like in seagull.
              
              
                lostlevels b1fdbd3
              
                Validate the profile.
              
              
                lostlevels 73cb026
              
                HasWritePermissions.
              
              
                lostlevels 7d32881
              
                Rename profile routes to be consistent w/ existing ones.
              
              
                lostlevels 5d56462
              
                Use snakecase attributes for now but don't flatten yet as blip is still
              
              
                lostlevels 82db89b
              
                Have a LegacyUserProfile to support seagull requests.
              
              
                lostlevels 9e9f798
              
                Change leagcy profile routes for simpler proxying in routetable.
              
              
                lostlevels 650b693
              
                Add legacy delete route.
              
              
                lostlevels 523b23e
              
                Move keycloak client and keycloak user_accessor to own package.
              
              
                lostlevels d17ab19
              
                Rename to package keycloak.
              
              
                lostlevels e468cbb
              
                Add user profile config for keycloak 24+.
              
              
                lostlevels 36570c4
              
                Remove user profile config as that's handled in TF.
              
              
                lostlevels deb91a7
              
                Add custodian field to profile.
              
              
                lostlevels 4f40f4b
              
                Allow services to retrieve user profile.
              
              
                lostlevels 49c2809
              
                Use "dummy" attribute "profile_has_custodian" for easier keycloak
              
              
                lostlevels b0b6163
              
                patient.fullName is only set for fake children.
              
              
                lostlevels 97ce75c
              
                Remove "profile_" prefix from profile keycloak attributes. Add
              
              
                lostlevels cdb875c
              
                Use right json.
              
              
                lostlevels 62a9368
              
                Delete unused shoreline code. Move user.FullUser into user.User.
              
              
                lostlevels 5efb6ee
              
                Remove unused hasher code.
              
              
                lostlevels 4670d48
              
                Remove unused fields.
              
              
                lostlevels 992ea71
              
                Add MRN attribute.
              
              
                lostlevels 904e276
              
                Copy amoeba's permissions with regards to membership and custodian.
              
              
                lostlevels 41a1fae
              
                Remove check from route since part of middleware now.
              
              
                lostlevels 8e5598f
              
                Remove unneeded comment.
              
              
                lostlevels d3f829a
              
                Add GroupsForUser as a prelude to some seagull / gatekeeper
              
              
                lostlevels 942e210
              
                Commence "old" seagull routes that retrieves from the seagull collection
              
              
                lostlevels 97d74df
              
                Update migration status.
              
              
                lostlevels 6721784
              
                Make sure seagull.value field is preserved properly during updates and
              
              
                lostlevels 1354fa9
              
                Use fallback profile accessor to check for profile first in seagull.
              
              
                lostlevels 3195e7b
              
                Rename repository for clarity of purpose.
              
              
                lostlevels e993dd1
              
                Bump gocloak.
              
              
                lostlevels 3f9eb22
              
                role field.
              
              
                lostlevels af7234f
              
                Omit profile fields if empty in response.
              
              
                lostlevels 196a609
              
                Add clinic profile fields.
              
              
                lostlevels c0a9513
              
                Add normalizer methods for profiles.
              
              
                lostlevels 07508bb
              
                Account for empty profile fullName.
              
              
                lostlevels 50f373b
              
                [BACK-3046] Create initial shared users with profiles path w/o
              
              
                lostlevels 55f0007
              
                Start metadata/users/:userid/users filter params.
              
              
                lostlevels c8d9d7f
              
                Parse users profiles query filter.
              
              
                lostlevels a2bfbbb
              
                Update users route to properly filter out users. Document Permission /
              
              
                lostlevels c80234d
              
                Remove unused query filter on users profiles.
              
              
                lostlevels 2247fc0
              
                Handle email and emails in legacy seagull profiles.
              
              
                lostlevels d78c148
              
                Read raw value as map from seagull value.
              
              
                lostlevels 3401464
              
                Allow setting of profile on seagull document's value field.
              
              
                lostlevels e4f607e
              
                Migrate diagnosisType.
              
              
                lostlevels f4316d6
              
                Remove email field from clinic as confirmed only a few fake clinic pr…
              
              
                lostlevels 83222e2
              
                Use correct FullName in case of fake children.
              
              
                lostlevels 621062b
              
                Handle certain incorrect types in legacy seagull profile.
              
              
                lostlevels 2908e3c
              
                Fix some logic and tests for profiles.
              
              
                lostlevels aba0355
              
                Set max profile field length to equal keycloak < 24
              
              
                lostlevels 47e7e45
              
                Make some profile values pointers so that some legacy migration profiles
              
              
                lostlevels 7bd8a85
              
                Export MaxProfileFieldLen
              
              
                lostlevels eeee757
              
                Remove unused field, add tests, synchronize keycloak access.
              
              
                lostlevels 2b1f2fb
              
                Use existing UsersArray type, add update tests.
              
              
                lostlevels ee99c6d
              
                Merge remote-tracking branch 'origin/master' into jimmy/BACK-2780-new…
              
              
                lostlevels 68ed56f
              
                Merge remote-tracking branch 'origin/master' into jimmy/BACK-2780-new…
              
              
                lostlevels 7d53e78
              
                Make TargetTimezone a value.
              
              
                lostlevels 737c031
              
                Merge remote-tracking branch 'origin/master' into jimmy/BACK-2780-new…
              
              
                lostlevels 8337700
              
                Remove unused files, remove unneded checks.
              
              
                lostlevels File filter
Filter by extension
Conversations
          Failed to load comments.   
        
        
          
      Loading
        
  Jump to
        
          Jump to file
        
      
      
          Failed to load files.   
        
        
          
      Loading
        
  Diff view
Diff view
There are no files selected for viewing
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
              | Original file line number | Diff line number | Diff line change | 
|---|---|---|
| @@ -0,0 +1,116 @@ | ||
| package v1 | ||
| 
     | 
||
| import ( | ||
| "net/http" | ||
| 
     | 
||
| "github.com/ant0ine/go-json-rest/rest" | ||
| 
     | 
||
| "github.com/tidepool-org/platform/request" | ||
| ) | ||
| 
     | 
||
| // requireCustodian aborts with an error if the user associated w/ the | ||
| // request doesn't have custodian access to the user with the id defined in the | ||
| // url param targetParamUserID. | ||
| // | ||
| // This mimics the logic of amoeba's requireCustodian access. This means a | ||
| // user has access to the target user if any of the following is true: | ||
| // - The is a service call (AuthDetails.IsService() == true) | ||
| // - The requester and target are the same - AuthDetails.UserID == targetParamUserID | ||
| // - The requester has explicit permissions to access targetParamUserID | ||
| func (r *Router) requireCustodian(targetParamUserID string, handlerFunc rest.HandlerFunc) rest.HandlerFunc { | ||
| return func(res rest.ResponseWriter, req *rest.Request) { | ||
| if handlerFunc != nil && res != nil && req != nil { | ||
| targetUserID := req.PathParam(targetParamUserID) | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| details := request.GetAuthDetails(ctx) | ||
| if details == nil { | ||
| request.MustNewResponder(res, req).Error(http.StatusUnauthorized, request.ErrorUnauthenticated()) | ||
| return | ||
| } | ||
| if details.IsService() || details.UserID() == targetUserID { | ||
| handlerFunc(res, req) | ||
| return | ||
| } | ||
| hasPerms, err := r.PermissionsClient().HasCustodianPermissions(ctx, details.UserID(), targetUserID) | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| if !hasPerms { | ||
| responder.Empty(http.StatusForbidden) | ||
| return | ||
| } | ||
| handlerFunc(res, req) | ||
| } | ||
| } | ||
| } | ||
| 
     | 
||
| // requireMembership proceeds if the user with the id specified in the URL | ||
| // paramter targetParamUserID has some association with the user in the current | ||
| // request - the "requester". This mimics amoeba's requireMembership function. | ||
| // | ||
| // This proceeds if any of the following are true: | ||
| // - The is a service call (AuthDetails.IsService() == true) | ||
| // - The requester and target are the same - AuthDetails.UserID == targetParamUserID | ||
| // - The requester has any permissions to targetParamUserID OR targetParamUserID has permissions to the requester. | ||
| func (r *Router) requireMembership(targetParamUserID string, handlerFunc rest.HandlerFunc) rest.HandlerFunc { | ||
| return func(res rest.ResponseWriter, req *rest.Request) { | ||
| if handlerFunc != nil && res != nil && req != nil { | ||
| targetUserID := req.PathParam(targetParamUserID) | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| details := request.GetAuthDetails(ctx) | ||
| if details == nil { | ||
| request.MustNewResponder(res, req).Error(http.StatusUnauthorized, request.ErrorUnauthenticated()) | ||
| return | ||
| } | ||
| if details.IsService() || details.UserID() == targetUserID { | ||
| handlerFunc(res, req) | ||
| return | ||
| } | ||
| hasPerms, err := r.PermissionsClient().HasMembershipRelationship(ctx, details.UserID(), targetUserID) | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| if !hasPerms { | ||
| responder.Empty(http.StatusForbidden) | ||
| return | ||
| } | ||
| handlerFunc(res, req) | ||
| } | ||
| } | ||
| } | ||
| 
     | 
||
| // requireWriteAccess aborts with an error if the request isn't a server request | ||
| // or the authenticated user doesn't have access to the user id in the url param, | ||
| // targetParamUserID | ||
| func (r *Router) requireWriteAccess(targetParamUserID string, handlerFunc rest.HandlerFunc) rest.HandlerFunc { | ||
| return func(res rest.ResponseWriter, req *rest.Request) { | ||
| if handlerFunc != nil && res != nil && req != nil { | ||
| targetUserID := req.PathParam(targetParamUserID) | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| details := request.GetAuthDetails(ctx) | ||
| if details == nil { | ||
| responder.Empty(http.StatusUnauthorized) | ||
| return | ||
| } | ||
| if details.IsService() { | ||
| handlerFunc(res, req) | ||
| return | ||
| } | ||
| hasPerms, err := r.PermissionsClient().HasWritePermissions(ctx, details.UserID(), targetUserID) | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| if !hasPerms { | ||
| responder.Empty(http.StatusForbidden) | ||
| return | ||
| } | ||
| handlerFunc(res, req) | ||
| } | ||
| } | ||
| } | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
              | Original file line number | Diff line number | Diff line change | 
|---|---|---|
| @@ -0,0 +1,260 @@ | ||
| package v1 | ||
| 
     | 
||
| import ( | ||
| "context" | ||
| stdErrs "errors" | ||
| "maps" | ||
| "net/http" | ||
| 
     | 
||
| "github.com/ant0ine/go-json-rest/rest" | ||
| 
     | 
||
| "github.com/tidepool-org/platform/errors" | ||
| "github.com/tidepool-org/platform/permission" | ||
| "github.com/tidepool-org/platform/request" | ||
| structValidator "github.com/tidepool-org/platform/structure/validator" | ||
| "github.com/tidepool-org/platform/user" | ||
| ) | ||
| 
     | 
||
| func (r *Router) ProfileRoutes() []*rest.Route { | ||
| return []*rest.Route{ | ||
| rest.Get("/v1/users/:userId/profile", r.requireMembership("userId", r.GetProfile)), | ||
| rest.Get("/v1/users/:userId/users", r.requireMembership("userId", r.GetUsersWithProfiles)), | ||
| rest.Get("/v1/users/legacy/:userId/profile", r.requireMembership("userId", r.GetLegacyProfile)), | ||
| rest.Put("/v1/users/:userId/profile", r.requireCustodian("userId", r.UpdateProfile)), | ||
| rest.Put("/v1/users/legacy/:userId/profile", r.requireCustodian("userId", r.UpdateLegacyProfile)), | ||
| rest.Post("/v1/users/:userId/profile", r.requireCustodian("userId", r.UpdateProfile)), | ||
| rest.Post("/v1/users/legacy/:userId/profile", r.requireCustodian("userId", r.UpdateLegacyProfile)), | ||
| rest.Delete("/v1/users/:userId/profile", r.requireCustodian("userId", r.DeleteProfile)), | ||
| rest.Delete("/v1/users/legacy/:userId/profile", r.requireCustodian("userId", r.DeleteProfile)), | ||
| } | ||
| } | ||
| 
     | 
||
| func (r *Router) getProfile(ctx context.Context, userID string) (*user.UserProfile, error) { | ||
| // Until seagull migration is complete use UserProfileAccessor() to get a profile instead of the profile within the user itself. | ||
| profile, err := r.UserProfileAccessor().FindUserProfile(ctx, userID) | ||
| if err != nil { | ||
| return nil, err | ||
| } | ||
| if profile == nil { | ||
| return nil, user.ErrUserProfileNotFound | ||
| } | ||
| // Once seagull migration is compelte, we can return | ||
| // the profile attached to the user directly via person.Profile | ||
| // through r.UserAccessor().FindUserProfile | ||
| return profile, nil | ||
| } | ||
| 
     | 
||
| func (r *Router) GetProfile(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| userID := req.PathParam("userId") | ||
| if r.handledUserNotExists(ctx, responder, userID) { | ||
| return | ||
| } | ||
| 
     | 
||
| profile, err := r.getProfile(ctx, userID) | ||
| if err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return | ||
| } | ||
| responder.Data(http.StatusOK, profile) | ||
| } | ||
| 
     | 
||
| func (r *Router) GetUsersWithProfiles(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| targetUserID := req.PathParam("userId") | ||
| if r.handledUserNotExists(ctx, responder, targetUserID) { | ||
| return | ||
| } | ||
| 
     | 
||
| filter := parseUsersQuery(req.URL.Query()) | ||
| if !isUsersQueryValid(filter) { | ||
| responder.Error(http.StatusBadRequest, errors.New("unable to parse users query")) | ||
| return | ||
| } | ||
| mergedUserPerms := map[string]*permission.TrustPermissions{} | ||
| trustorPerms, err := r.PermissionsClient().GroupsForUser(ctx, targetUserID) | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| for userID, perms := range trustorPerms { | ||
| if userID == targetUserID { | ||
| // Don't include own user in result | ||
| continue | ||
| } | ||
| 
     | 
||
| clone := maps.Clone(perms) | ||
| mergedUserPerms[userID] = &permission.TrustPermissions{ | ||
| TrustorPermissions: &clone, | ||
| } | ||
| } | ||
| 
     | 
||
| trusteePerms, err := r.PermissionsClient().UsersInGroup(ctx, targetUserID) | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| for userID, perms := range trusteePerms { | ||
| if userID == targetUserID { | ||
| // Don't include own user in result | ||
| continue | ||
| } | ||
| 
     | 
||
| if _, ok := mergedUserPerms[userID]; !ok { | ||
| mergedUserPerms[userID] = &permission.TrustPermissions{} | ||
| } | ||
| clone := maps.Clone(perms) | ||
| mergedUserPerms[userID].TrusteePermissions = &clone | ||
| } | ||
| filteredUserPerms := make(map[string]*permission.TrustPermissions, len(mergedUserPerms)) | ||
| 
     | 
||
| for userID, trustPerms := range mergedUserPerms { | ||
| if userMatchesQueryOnPermissions(*trustPerms, filter) { | ||
| filteredUserPerms[userID] = trustPerms | ||
| } | ||
| } | ||
| 
     | 
||
| results := make([]*user.User, 0, len(mergedUserPerms)) | ||
| // just doing sequentially fetching of users for now | ||
| for userID, trustPerms := range filteredUserPerms { | ||
| // Does this mean all users should already be migrated | ||
| // to keycloak before this call? Or should UserAccessor have a "fallback" like shoreline's legacy mongodb repo? | ||
| sharedUser, err := r.UserAccessor().FindUserById(ctx, userID) | ||
| if stdErrs.Is(err, user.ErrUserNotFound) || sharedUser == nil { | ||
| // According to seagull code, "It's possible for a user profile to be deleted before the sharing permissions", so we can ignore if user or profile not found. | ||
| continue | ||
| } | ||
| if err != nil { | ||
| responder.InternalServerError(err) | ||
| return | ||
| } | ||
| if !userMatchesQueryOnUser(sharedUser, filter) { | ||
| continue | ||
| } | ||
| profile, err := r.getProfile(ctx, userID) | ||
| if stdErrs.Is(err, user.ErrUserProfileNotFound) || profile == nil { | ||
| continue | ||
| } | ||
| if err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return | ||
| } | ||
| trustorPerms := trustPerms.TrustorPermissions | ||
| if trustorPerms == nil || len(*trustorPerms) == 0 { | ||
| profile = profile.ClearPatientInfo() | ||
| } else { | ||
| 
     | 
||
| if trustorPerms.HasAny(permission.Custodian, permission.Read, permission.Write) { | ||
| // TODO: need to read seagull.value.settings | ||
| } | ||
| if trustorPerms.Has(permission.Custodian) { | ||
| // TODO: need to read seagull.value.preferences | ||
| } | ||
| } | ||
| sharedUser.Profile = profile | ||
| sharedUser.TrusteePermissions = trustPerms.TrusteePermissions | ||
| sharedUser.TrustorPermissions = trustPerms.TrustorPermissions | ||
| // Seems no sharedUser.Sanitize call to filter out "protected" fields in seagull except sanitizeUser to remove "passwordExists" field - which doesn't exist in current platform/user.User | ||
| matchedUser := userMatchingQuery(sharedUser, filter) | ||
| if matchedUser != nil { | ||
| results = append(results, matchedUser) | ||
| } | ||
| } | ||
| 
     | 
||
| responder.Data(http.StatusOK, results) | ||
| } | ||
| 
     | 
||
| func (r *Router) GetLegacyProfile(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| userID := req.PathParam("userId") | ||
| if r.handledUserNotExists(ctx, responder, userID) { | ||
| return | ||
| } | ||
| 
     | 
||
| profile, err := r.getProfile(ctx, userID) | ||
| if err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return | ||
| } | ||
| responder.Data(http.StatusOK, profile.ToLegacyProfile()) | ||
| } | ||
| 
     | 
||
| func (r *Router) UpdateProfile(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| 
     | 
||
| profile := &user.UserProfile{} | ||
| if err := request.DecodeRequestBody(req.Request, profile); err != nil { | ||
| responder.Error(http.StatusBadRequest, err) | ||
| return | ||
| } | ||
| r.updateProfile(res, req, profile) | ||
| } | ||
| 
     | 
||
| func (r *Router) UpdateLegacyProfile(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| 
     | 
||
| profile := &user.LegacyUserProfile{} | ||
| if err := request.DecodeRequestBody(req.Request, profile); err != nil { | ||
| responder.Error(http.StatusBadRequest, err) | ||
| return | ||
| } | ||
| r.updateProfile(res, req, profile.ToUserProfile()) | ||
| } | ||
| 
     | 
||
| func (r *Router) updateProfile(res rest.ResponseWriter, req *rest.Request, profile *user.UserProfile) { | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| userID := req.PathParam("userId") | ||
| if err := structValidator.New().Validate(profile); err != nil { | ||
| responder.Error(http.StatusBadRequest, err) | ||
| return | ||
| } | ||
| if r.handledUserNotExists(ctx, responder, userID) { | ||
| return | ||
| } | ||
| // Once seagull migration is complete, we can use r.UserAccessor().UpdateUserProfile. | ||
| if err := r.UserProfileAccessor().UpdateUserProfile(ctx, userID, profile); err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return | ||
| } | ||
| responder.Empty(http.StatusOK) | ||
| } | ||
| 
     | 
||
| func (r *Router) DeleteProfile(res rest.ResponseWriter, req *rest.Request) { | ||
| responder := request.MustNewResponder(res, req) | ||
| ctx := req.Context() | ||
| userID := req.PathParam("userId") | ||
| 
     | 
||
| err := r.UserProfileAccessor().DeleteUserProfile(ctx, userID) | ||
| if err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return | ||
| } | ||
| responder.Empty(http.StatusOK) | ||
| } | ||
| 
     | 
||
| func (r *Router) handleProfileErr(responder *request.Responder, err error) { | ||
| switch { | ||
| case stdErrs.Is(err, user.ErrUserNotFound), stdErrs.Is(err, user.ErrUserProfileNotFound): | ||
| responder.Empty(http.StatusNotFound) | ||
| return | ||
| default: | ||
| responder.InternalServerError(err) | ||
| } | ||
| } | ||
| 
     | 
||
| func (r *Router) handledUserNotExists(ctx context.Context, responder *request.Responder, userID string) (handled bool) { | ||
| person, err := r.UserAccessor().FindUserById(ctx, userID) | ||
| if err != nil { | ||
| r.handleProfileErr(responder, err) | ||
| return true | ||
| } | ||
| if person == nil { | ||
| responder.Empty(http.StatusNotFound) | ||
| return true | ||
| } | ||
| return false | ||
| } | ||
      
      Oops, something went wrong.
        
    
  
  Add this suggestion to a batch that can be applied as a single commit.
  This suggestion is invalid because no changes were made to the code.
  Suggestions cannot be applied while the pull request is closed.
  Suggestions cannot be applied while viewing a subset of changes.
  Only one suggestion per line can be applied in a batch.
  Add this suggestion to a batch that can be applied as a single commit.
  Applying suggestions on deleted lines is not supported.
  You must change the existing code in this line in order to create a valid suggestion.
  Outdated suggestions cannot be applied.
  This suggestion has been applied or marked resolved.
  Suggestions cannot be applied from pending reviews.
  Suggestions cannot be applied on multi-line comments.
  Suggestions cannot be applied while the pull request is queued to merge.
  Suggestion cannot be applied right now. Please check back later.
  
    
  
    
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, we should migrate all users to mongo