@directus/api 20.0.0-rc.0 → 20.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/app.js +9 -4
- package/dist/auth/drivers/ldap.js +4 -4
- package/dist/auth/drivers/local.js +4 -4
- package/dist/auth/drivers/oauth2.js +4 -4
- package/dist/auth/drivers/openid.js +4 -2
- package/dist/cache.js +0 -3
- package/dist/cli/commands/bootstrap/index.js +2 -8
- package/dist/cli/commands/init/index.js +10 -9
- package/dist/cli/utils/defaults.d.ts +11 -4
- package/dist/cli/utils/defaults.js +1 -7
- package/dist/constants.d.ts +9 -1
- package/dist/constants.js +10 -0
- package/dist/controllers/auth.js +16 -5
- package/dist/controllers/permissions.js +2 -14
- package/dist/controllers/roles.js +1 -22
- package/dist/controllers/{access.d.ts → tus.d.ts} +1 -0
- package/dist/controllers/tus.js +72 -0
- package/dist/controllers/users.js +55 -0
- package/dist/database/helpers/fn/types.d.ts +1 -2
- package/dist/database/helpers/fn/types.js +1 -1
- package/dist/database/helpers/geometry/dialects/mssql.d.ts +1 -1
- package/dist/database/helpers/geometry/dialects/mssql.js +2 -4
- package/dist/database/helpers/geometry/dialects/mysql.js +1 -1
- package/dist/database/helpers/geometry/dialects/oracle.d.ts +1 -1
- package/dist/database/helpers/geometry/dialects/oracle.js +3 -5
- package/dist/database/helpers/geometry/types.d.ts +1 -1
- package/dist/database/helpers/geometry/types.js +2 -4
- package/dist/database/index.js +1 -2
- package/dist/database/migrations/20240701A-add-tus-data.js +12 -0
- package/dist/database/{run-ast/types.d.ts → run-ast.d.ts} +9 -3
- package/dist/database/run-ast.js +450 -0
- package/dist/flows.js +4 -3
- package/dist/middleware/authenticate.js +7 -2
- package/dist/middleware/cache.js +1 -1
- package/dist/middleware/check-ip.d.ts +2 -0
- package/dist/middleware/check-ip.js +37 -0
- package/dist/middleware/get-permissions.d.ts +3 -0
- package/dist/middleware/get-permissions.js +10 -0
- package/dist/middleware/respond.js +1 -1
- package/dist/services/activity.js +10 -22
- package/dist/services/assets.d.ts +3 -2
- package/dist/services/assets.js +5 -10
- package/dist/services/authentication.js +26 -32
- package/dist/services/authorization.d.ts +17 -0
- package/dist/services/authorization.js +456 -0
- package/dist/services/collections.js +17 -18
- package/dist/services/fields.d.ts +1 -0
- package/dist/services/fields.js +24 -53
- package/dist/services/files/lib/extract-metadata.d.ts +3 -0
- package/dist/services/files/lib/extract-metadata.js +32 -0
- package/dist/services/files/utils/get-metadata.d.ts +5 -0
- package/dist/services/files/utils/get-metadata.js +107 -0
- package/dist/services/files.d.ts +4 -6
- package/dist/services/files.js +24 -140
- package/dist/services/graphql/index.d.ts +3 -3
- package/dist/services/graphql/index.js +22 -126
- package/dist/services/graphql/subscription.js +4 -2
- package/dist/services/import-export.js +4 -18
- package/dist/services/index.d.ts +2 -3
- package/dist/services/index.js +2 -3
- package/dist/services/items.js +44 -115
- package/dist/services/meta.js +23 -60
- package/dist/services/payload.d.ts +10 -9
- package/dist/services/payload.js +3 -18
- package/dist/services/{permissions.d.ts → permissions/index.d.ts} +7 -5
- package/dist/services/{permissions.js → permissions/index.js} +54 -30
- package/dist/{permissions → services/permissions}/lib/with-app-minimal-permissions.d.ts +1 -1
- package/dist/services/permissions/lib/with-app-minimal-permissions.js +13 -0
- package/dist/services/relations.d.ts +6 -0
- package/dist/services/relations.js +29 -26
- package/dist/services/roles.d.ts +12 -4
- package/dist/services/roles.js +424 -57
- package/dist/services/server.js +6 -0
- package/dist/services/shares.d.ts +2 -0
- package/dist/services/shares.js +8 -12
- package/dist/services/specifications.d.ts +2 -2
- package/dist/services/specifications.js +27 -39
- package/dist/services/tus/data-store.d.ts +36 -0
- package/dist/services/tus/data-store.js +214 -0
- package/dist/services/tus/index.d.ts +2 -0
- package/dist/services/tus/index.js +2 -0
- package/dist/services/tus/lockers.d.ts +36 -0
- package/dist/services/tus/lockers.js +83 -0
- package/dist/services/tus/server.d.ts +8 -0
- package/dist/services/tus/server.js +80 -0
- package/dist/services/tus/utils/wait-timeout.d.ts +1 -0
- package/dist/services/tus/utils/wait-timeout.js +13 -0
- package/dist/services/users.d.ts +5 -1
- package/dist/services/users.js +161 -78
- package/dist/services/utils.js +7 -11
- package/dist/services/versions.d.ts +2 -0
- package/dist/services/versions.js +10 -34
- package/dist/storage/register-locations.js +5 -1
- package/dist/telemetry/lib/get-report.js +2 -2
- package/dist/telemetry/utils/check-increased-user-limits.d.ts +7 -0
- package/dist/telemetry/utils/check-increased-user-limits.js +25 -0
- package/dist/telemetry/utils/get-role-counts-by-roles.d.ts +6 -0
- package/dist/telemetry/utils/get-role-counts-by-roles.js +27 -0
- package/dist/telemetry/utils/get-role-counts-by-users.d.ts +11 -0
- package/dist/telemetry/utils/get-role-counts-by-users.js +34 -0
- package/dist/telemetry/utils/get-user-count.d.ts +8 -0
- package/dist/telemetry/utils/get-user-count.js +33 -0
- package/dist/telemetry/utils/get-user-counts-by-roles.d.ts +7 -0
- package/dist/telemetry/utils/get-user-counts-by-roles.js +35 -0
- package/dist/types/ast.d.ts +1 -43
- package/dist/types/items.d.ts +0 -11
- package/dist/utils/apply-query.d.ts +3 -4
- package/dist/utils/apply-query.js +8 -37
- package/dist/utils/get-accountability-for-role.js +25 -16
- package/dist/utils/get-accountability-for-token.js +16 -17
- package/dist/utils/get-ast-from-query.d.ts +13 -0
- package/dist/utils/get-ast-from-query.js +297 -0
- package/dist/utils/get-cache-key.d.ts +1 -1
- package/dist/utils/get-cache-key.js +1 -12
- package/dist/utils/get-column.d.ts +1 -2
- package/dist/utils/get-column.js +0 -1
- package/dist/utils/get-permissions.d.ts +2 -0
- package/dist/utils/get-permissions.js +150 -0
- package/dist/utils/get-service.js +1 -5
- package/dist/utils/merge-permissions-for-share.d.ts +4 -0
- package/dist/utils/merge-permissions-for-share.js +109 -0
- package/dist/utils/merge-permissions.d.ts +3 -0
- package/dist/utils/merge-permissions.js +95 -0
- package/dist/utils/reduce-schema.d.ts +6 -4
- package/dist/utils/reduce-schema.js +34 -14
- package/dist/utils/verify-session-jwt.js +2 -1
- package/dist/websocket/authenticate.d.ts +2 -0
- package/dist/websocket/authenticate.js +12 -0
- package/dist/websocket/controllers/graphql.js +4 -1
- package/dist/websocket/controllers/hooks.js +0 -4
- package/dist/websocket/controllers/rest.js +2 -0
- package/dist/websocket/handlers/subscribe.js +2 -0
- package/dist/websocket/utils/items.d.ts +1 -1
- package/package.json +35 -33
- package/dist/controllers/access.js +0 -148
- package/dist/controllers/policies.d.ts +0 -2
- package/dist/controllers/policies.js +0 -169
- package/dist/database/get-ast-from-query/get-ast-from-query.d.ts +0 -16
- package/dist/database/get-ast-from-query/get-ast-from-query.js +0 -82
- package/dist/database/get-ast-from-query/lib/convert-wildcards.d.ts +0 -13
- package/dist/database/get-ast-from-query/lib/convert-wildcards.js +0 -69
- package/dist/database/get-ast-from-query/lib/parse-fields.d.ts +0 -15
- package/dist/database/get-ast-from-query/lib/parse-fields.js +0 -190
- package/dist/database/get-ast-from-query/utils/get-deep-query.d.ts +0 -14
- package/dist/database/get-ast-from-query/utils/get-deep-query.js +0 -17
- package/dist/database/get-ast-from-query/utils/get-related-collection.d.ts +0 -2
- package/dist/database/get-ast-from-query/utils/get-related-collection.js +0 -13
- package/dist/database/get-ast-from-query/utils/get-relation.d.ts +0 -2
- package/dist/database/get-ast-from-query/utils/get-relation.js +0 -7
- package/dist/database/migrations/20240619A-permissions-policies.js +0 -163
- package/dist/database/run-ast/lib/get-db-query.d.ts +0 -4
- package/dist/database/run-ast/lib/get-db-query.js +0 -194
- package/dist/database/run-ast/lib/parse-current-level.d.ts +0 -7
- package/dist/database/run-ast/lib/parse-current-level.js +0 -41
- package/dist/database/run-ast/run-ast.d.ts +0 -7
- package/dist/database/run-ast/run-ast.js +0 -107
- package/dist/database/run-ast/types.js +0 -1
- package/dist/database/run-ast/utils/apply-case-when.d.ts +0 -16
- package/dist/database/run-ast/utils/apply-case-when.js +0 -26
- package/dist/database/run-ast/utils/apply-parent-filters.d.ts +0 -3
- package/dist/database/run-ast/utils/apply-parent-filters.js +0 -55
- package/dist/database/run-ast/utils/get-column-pre-processor.d.ts +0 -10
- package/dist/database/run-ast/utils/get-column-pre-processor.js +0 -57
- package/dist/database/run-ast/utils/get-field-alias.d.ts +0 -2
- package/dist/database/run-ast/utils/get-field-alias.js +0 -4
- package/dist/database/run-ast/utils/get-inner-query-column-pre-processor.d.ts +0 -5
- package/dist/database/run-ast/utils/get-inner-query-column-pre-processor.js +0 -23
- package/dist/database/run-ast/utils/merge-with-parent-items.d.ts +0 -3
- package/dist/database/run-ast/utils/merge-with-parent-items.js +0 -87
- package/dist/database/run-ast/utils/remove-temporary-fields.d.ts +0 -3
- package/dist/database/run-ast/utils/remove-temporary-fields.js +0 -73
- package/dist/permissions/cache.d.ts +0 -2
- package/dist/permissions/cache.js +0 -23
- package/dist/permissions/lib/fetch-permissions.d.ts +0 -10
- package/dist/permissions/lib/fetch-permissions.js +0 -55
- package/dist/permissions/lib/fetch-policies.d.ts +0 -7
- package/dist/permissions/lib/fetch-policies.js +0 -28
- package/dist/permissions/lib/fetch-roles-tree.d.ts +0 -3
- package/dist/permissions/lib/fetch-roles-tree.js +0 -28
- package/dist/permissions/lib/with-app-minimal-permissions.js +0 -10
- package/dist/permissions/modules/fetch-accountability-collection-access/fetch-accountability-collection-access.d.ts +0 -7
- package/dist/permissions/modules/fetch-accountability-collection-access/fetch-accountability-collection-access.js +0 -56
- package/dist/permissions/modules/fetch-accountability-policy-globals/fetch-accountability-policy-globals.d.ts +0 -3
- package/dist/permissions/modules/fetch-accountability-policy-globals/fetch-accountability-policy-globals.js +0 -16
- package/dist/permissions/modules/fetch-allowed-collections/fetch-allowed-collections.d.ts +0 -8
- package/dist/permissions/modules/fetch-allowed-collections/fetch-allowed-collections.js +0 -24
- package/dist/permissions/modules/fetch-allowed-field-map/fetch-allowed-field-map.d.ts +0 -9
- package/dist/permissions/modules/fetch-allowed-field-map/fetch-allowed-field-map.js +0 -31
- package/dist/permissions/modules/fetch-allowed-fields/fetch-allowed-fields.d.ts +0 -16
- package/dist/permissions/modules/fetch-allowed-fields/fetch-allowed-fields.js +0 -27
- package/dist/permissions/modules/fetch-global-access/fetch-global-access.d.ts +0 -10
- package/dist/permissions/modules/fetch-global-access/fetch-global-access.js +0 -23
- package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-roles.d.ts +0 -5
- package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-roles.js +0 -7
- package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-user.d.ts +0 -5
- package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-user.js +0 -10
- package/dist/permissions/modules/fetch-global-access/types.d.ts +0 -4
- package/dist/permissions/modules/fetch-global-access/types.js +0 -1
- package/dist/permissions/modules/fetch-global-access/utils/fetch-global-access-for-query.d.ts +0 -4
- package/dist/permissions/modules/fetch-global-access/utils/fetch-global-access-for-query.js +0 -27
- package/dist/permissions/modules/fetch-inconsistent-field-map/fetch-inconsistent-field-map.d.ts +0 -12
- package/dist/permissions/modules/fetch-inconsistent-field-map/fetch-inconsistent-field-map.js +0 -32
- package/dist/permissions/modules/fetch-policies-ip-access/fetch-policies-ip-access.d.ts +0 -4
- package/dist/permissions/modules/fetch-policies-ip-access/fetch-policies-ip-access.js +0 -29
- package/dist/permissions/modules/process-ast/lib/extract-fields-from-children.d.ts +0 -4
- package/dist/permissions/modules/process-ast/lib/extract-fields-from-children.js +0 -49
- package/dist/permissions/modules/process-ast/lib/extract-fields-from-query.d.ts +0 -3
- package/dist/permissions/modules/process-ast/lib/extract-fields-from-query.js +0 -56
- package/dist/permissions/modules/process-ast/lib/field-map-from-ast.d.ts +0 -4
- package/dist/permissions/modules/process-ast/lib/field-map-from-ast.js +0 -8
- package/dist/permissions/modules/process-ast/lib/inject-cases.d.ts +0 -9
- package/dist/permissions/modules/process-ast/lib/inject-cases.js +0 -93
- package/dist/permissions/modules/process-ast/process-ast.d.ts +0 -9
- package/dist/permissions/modules/process-ast/process-ast.js +0 -39
- package/dist/permissions/modules/process-ast/types.d.ts +0 -24
- package/dist/permissions/modules/process-ast/types.js +0 -1
- package/dist/permissions/modules/process-ast/utils/collections-in-field-map.d.ts +0 -2
- package/dist/permissions/modules/process-ast/utils/collections-in-field-map.js +0 -7
- package/dist/permissions/modules/process-ast/utils/dedupe-access.d.ts +0 -12
- package/dist/permissions/modules/process-ast/utils/dedupe-access.js +0 -30
- package/dist/permissions/modules/process-ast/utils/extract-paths-from-query.d.ts +0 -15
- package/dist/permissions/modules/process-ast/utils/extract-paths-from-query.js +0 -50
- package/dist/permissions/modules/process-ast/utils/find-related-collection.d.ts +0 -3
- package/dist/permissions/modules/process-ast/utils/find-related-collection.js +0 -9
- package/dist/permissions/modules/process-ast/utils/flatten-filter.d.ts +0 -3
- package/dist/permissions/modules/process-ast/utils/flatten-filter.js +0 -24
- package/dist/permissions/modules/process-ast/utils/format-a2o-key.d.ts +0 -1
- package/dist/permissions/modules/process-ast/utils/format-a2o-key.js +0 -3
- package/dist/permissions/modules/process-ast/utils/get-info-for-path.d.ts +0 -5
- package/dist/permissions/modules/process-ast/utils/get-info-for-path.js +0 -7
- package/dist/permissions/modules/process-ast/utils/has-item-permissions.d.ts +0 -2
- package/dist/permissions/modules/process-ast/utils/has-item-permissions.js +0 -3
- package/dist/permissions/modules/process-ast/utils/stringify-query-path.d.ts +0 -2
- package/dist/permissions/modules/process-ast/utils/stringify-query-path.js +0 -3
- package/dist/permissions/modules/process-ast/utils/validate-path/create-error.d.ts +0 -3
- package/dist/permissions/modules/process-ast/utils/validate-path/create-error.js +0 -16
- package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-existence.d.ts +0 -2
- package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-existence.js +0 -12
- package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-permissions.d.ts +0 -2
- package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-permissions.js +0 -28
- package/dist/permissions/modules/process-payload/lib/is-field-nullable.d.ts +0 -5
- package/dist/permissions/modules/process-payload/lib/is-field-nullable.js +0 -12
- package/dist/permissions/modules/process-payload/process-payload.d.ts +0 -13
- package/dist/permissions/modules/process-payload/process-payload.js +0 -77
- package/dist/permissions/modules/validate-access/lib/validate-collection-access.d.ts +0 -12
- package/dist/permissions/modules/validate-access/lib/validate-collection-access.js +0 -11
- package/dist/permissions/modules/validate-access/lib/validate-item-access.d.ts +0 -9
- package/dist/permissions/modules/validate-access/lib/validate-item-access.js +0 -33
- package/dist/permissions/modules/validate-access/validate-access.d.ts +0 -14
- package/dist/permissions/modules/validate-access/validate-access.js +0 -28
- package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-count.d.ts +0 -1
- package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-count.js +0 -8
- package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-users.d.ts +0 -5
- package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-users.js +0 -10
- package/dist/permissions/types.d.ts +0 -6
- package/dist/permissions/types.js +0 -1
- package/dist/permissions/utils/create-default-accountability.d.ts +0 -2
- package/dist/permissions/utils/create-default-accountability.js +0 -11
- package/dist/permissions/utils/extract-required-dynamic-variable-context.d.ts +0 -8
- package/dist/permissions/utils/extract-required-dynamic-variable-context.js +0 -27
- package/dist/permissions/utils/fetch-dynamic-variable-context.d.ts +0 -9
- package/dist/permissions/utils/fetch-dynamic-variable-context.js +0 -43
- package/dist/permissions/utils/filter-policies-by-ip.d.ts +0 -2
- package/dist/permissions/utils/filter-policies-by-ip.js +0 -15
- package/dist/permissions/utils/get-unaliased-field-key.d.ts +0 -5
- package/dist/permissions/utils/get-unaliased-field-key.js +0 -17
- package/dist/permissions/utils/process-permissions.d.ts +0 -7
- package/dist/permissions/utils/process-permissions.js +0 -9
- package/dist/permissions/utils/with-cache.d.ts +0 -10
- package/dist/permissions/utils/with-cache.js +0 -25
- package/dist/services/access.d.ts +0 -10
- package/dist/services/access.js +0 -43
- package/dist/services/policies.d.ts +0 -12
- package/dist/services/policies.js +0 -87
- package/dist/telemetry/utils/check-user-limits.d.ts +0 -5
- package/dist/telemetry/utils/check-user-limits.js +0 -19
- package/dist/utils/fetch-user-count/fetch-access-lookup.d.ts +0 -17
- package/dist/utils/fetch-user-count/fetch-access-lookup.js +0 -22
- package/dist/utils/fetch-user-count/fetch-access-roles.d.ts +0 -16
- package/dist/utils/fetch-user-count/fetch-access-roles.js +0 -37
- package/dist/utils/fetch-user-count/fetch-active-users.d.ts +0 -6
- package/dist/utils/fetch-user-count/fetch-active-users.js +0 -3
- package/dist/utils/fetch-user-count/fetch-user-count.d.ts +0 -12
- package/dist/utils/fetch-user-count/fetch-user-count.js +0 -57
- package/dist/utils/fetch-user-count/get-user-count-query.d.ts +0 -20
- package/dist/utils/fetch-user-count/get-user-count-query.js +0 -17
- package/dist/utils/validate-user-count-integrity.d.ts +0 -13
- package/dist/utils/validate-user-count-integrity.js +0 -29
- /package/dist/database/migrations/{20240619A-permissions-policies.d.ts → 20240701A-add-tus-data.d.ts} +0 -0
- /package/dist/{utils → services/files/utils}/parse-image-metadata.d.ts +0 -0
- /package/dist/{utils → services/files/utils}/parse-image-metadata.js +0 -0
|
@@ -1,163 +0,0 @@
|
|
|
1
|
-
import { randomUUID } from 'node:crypto';
|
|
2
|
-
import { processChunk } from '@directus/utils';
|
|
3
|
-
/**
|
|
4
|
-
* The public role used to be `null`, we gotta create a single new policy for the permissions
|
|
5
|
-
* previously attached to the public role (marked through `role = null`).
|
|
6
|
-
*/
|
|
7
|
-
const PUBLIC_POLICY_ID = 'abf8a154-5b1c-4a46-ac9c-7300570f4f17';
|
|
8
|
-
export async function up(knex) {
|
|
9
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
10
|
-
// Create new policies table that mirrors previous Roles
|
|
11
|
-
await knex.schema.createTable('directus_policies', (table) => {
|
|
12
|
-
table.uuid('id').primary();
|
|
13
|
-
table.string('name', 100).notNullable();
|
|
14
|
-
table.string('icon', 64).notNullable().defaultTo('badge');
|
|
15
|
-
table.text('description');
|
|
16
|
-
table.text('ip_access');
|
|
17
|
-
table.boolean('enforce_tfa').defaultTo(false).notNullable();
|
|
18
|
-
table.boolean('admin_access').defaultTo(false).notNullable();
|
|
19
|
-
table.boolean('app_access').defaultTo(false).notNullable();
|
|
20
|
-
});
|
|
21
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
22
|
-
// Copy over all existing roles into new policies
|
|
23
|
-
const roles = await knex
|
|
24
|
-
.select('id', 'name', 'icon', 'description', 'ip_access', 'enforce_tfa', 'admin_access', 'app_access')
|
|
25
|
-
.from('directus_roles');
|
|
26
|
-
if (roles.length > 0) {
|
|
27
|
-
await processChunk(roles, 100, async (chunk) => {
|
|
28
|
-
await knex('directus_policies').insert(chunk);
|
|
29
|
-
});
|
|
30
|
-
}
|
|
31
|
-
await knex
|
|
32
|
-
.insert({
|
|
33
|
-
id: PUBLIC_POLICY_ID,
|
|
34
|
-
name: '$t:public_label',
|
|
35
|
-
icon: 'public',
|
|
36
|
-
description: '$t:public_description',
|
|
37
|
-
app_access: false,
|
|
38
|
-
})
|
|
39
|
-
.into('directus_policies');
|
|
40
|
-
// Change the admin policy description to $t:admin_policy_description
|
|
41
|
-
await knex('directus_policies')
|
|
42
|
-
.update({
|
|
43
|
-
description: '$t:admin_policy_description',
|
|
44
|
-
})
|
|
45
|
-
.where('description', 'LIKE', '$t:admin_description');
|
|
46
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
47
|
-
// Remove access control + add nesting to roles
|
|
48
|
-
await knex.schema.alterTable('directus_roles', (table) => {
|
|
49
|
-
table.dropColumn('ip_access');
|
|
50
|
-
table.dropColumn('enforce_tfa');
|
|
51
|
-
table.dropColumn('admin_access');
|
|
52
|
-
table.dropColumn('app_access');
|
|
53
|
-
table.uuid('parent').references('directus_roles.id');
|
|
54
|
-
});
|
|
55
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
56
|
-
// Link permissions to policies instead of roles
|
|
57
|
-
await knex.schema.alterTable('directus_permissions', (table) => {
|
|
58
|
-
table.uuid('policy').notNullable().references('directus_policies.id').onDelete('CASCADE');
|
|
59
|
-
// Drop the foreign key constraint here in order to update `null` role to public policy ID
|
|
60
|
-
table.dropForeign('role');
|
|
61
|
-
});
|
|
62
|
-
await knex('directus_permissions')
|
|
63
|
-
.update({
|
|
64
|
-
role: PUBLIC_POLICY_ID,
|
|
65
|
-
})
|
|
66
|
-
.whereNull('role');
|
|
67
|
-
await knex('directus_permissions').update({
|
|
68
|
-
policy: knex.ref('role'),
|
|
69
|
-
});
|
|
70
|
-
await knex.schema.alterTable('directus_permissions', (table) => {
|
|
71
|
-
table.dropColumns('role');
|
|
72
|
-
});
|
|
73
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
74
|
-
// Setup junction table between roles/users and policies
|
|
75
|
-
// This could be a A2O style setup with a collection/item field rather than individual foreign
|
|
76
|
-
// keys, but we want to be able to show the reverse-relationship on the individual policies as
|
|
77
|
-
// well, which would require the O2A type to exist in Directus which currently doesn't.
|
|
78
|
-
// Shouldn't be the end of the world here, as we know we're only attaching policies to two other
|
|
79
|
-
// collections.
|
|
80
|
-
await knex.schema.createTable('directus_access', (table) => {
|
|
81
|
-
table.uuid('id').primary();
|
|
82
|
-
table.uuid('role').references('directus_roles.id').nullable().onDelete('CASCADE');
|
|
83
|
-
table.uuid('user').references('directus_users.id').nullable().onDelete('CASCADE');
|
|
84
|
-
table.uuid('policy').references('directus_policies.id').notNullable().onDelete('CASCADE');
|
|
85
|
-
table.integer('sort');
|
|
86
|
-
});
|
|
87
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
88
|
-
// Attach policies to existing roles for backwards compatibility
|
|
89
|
-
const policyAttachments = roles.map((role) => ({
|
|
90
|
-
id: randomUUID(),
|
|
91
|
-
role: role.id,
|
|
92
|
-
user: null,
|
|
93
|
-
policy: role.id,
|
|
94
|
-
sort: 1,
|
|
95
|
-
}));
|
|
96
|
-
await processChunk(policyAttachments, 100, async (chunk) => {
|
|
97
|
-
await knex('directus_access').insert(chunk);
|
|
98
|
-
});
|
|
99
|
-
await knex('directus_access').insert({
|
|
100
|
-
id: randomUUID(),
|
|
101
|
-
role: null,
|
|
102
|
-
user: null,
|
|
103
|
-
policy: PUBLIC_POLICY_ID,
|
|
104
|
-
sort: 1,
|
|
105
|
-
});
|
|
106
|
-
}
|
|
107
|
-
export async function down(knex) {
|
|
108
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
109
|
-
// Reinstate access control fields on directus roles + remove nesting
|
|
110
|
-
await knex.schema.alterTable('directus_roles', (table) => {
|
|
111
|
-
table.text('ip_access');
|
|
112
|
-
table.boolean('enforce_tfa').defaultTo(false).notNullable();
|
|
113
|
-
table.boolean('admin_access').defaultTo(false).notNullable();
|
|
114
|
-
table.boolean('app_access').defaultTo(true).notNullable();
|
|
115
|
-
table.dropForeign('parent');
|
|
116
|
-
table.dropColumn('parent');
|
|
117
|
-
});
|
|
118
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
119
|
-
// Copy policy access control rules back to roles
|
|
120
|
-
const policies = await knex
|
|
121
|
-
.select('id', 'ip_access', 'enforce_tfa', 'admin_access', 'app_access')
|
|
122
|
-
.from('directus_policies')
|
|
123
|
-
.whereNot({ id: PUBLIC_POLICY_ID });
|
|
124
|
-
for (const policy of policies) {
|
|
125
|
-
await knex('directus_roles')
|
|
126
|
-
.update({
|
|
127
|
-
ip_access: policy.ip_access,
|
|
128
|
-
enforce_tfa: policy.enforce_tfa,
|
|
129
|
-
admin_access: policy.admin_access,
|
|
130
|
-
app_access: policy.app_access,
|
|
131
|
-
})
|
|
132
|
-
.where({ id: policy.id });
|
|
133
|
-
}
|
|
134
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
135
|
-
// Drop all permissions that are only attached to a user
|
|
136
|
-
// TODO query all policies that are attached to a user and delete their permissions,
|
|
137
|
-
// since we don't know were to put them now and it'll cause a foreign key problem
|
|
138
|
-
// as soon as we reference directus_roles in directus_permissions again
|
|
139
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
140
|
-
// Drop policy attachments
|
|
141
|
-
await knex.schema.dropTable('directus_access');
|
|
142
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
143
|
-
// Reattach permissions to roles instead of policies
|
|
144
|
-
await knex.schema.alterTable('directus_permissions', (table) => {
|
|
145
|
-
table.uuid('role').nullable();
|
|
146
|
-
});
|
|
147
|
-
await knex('directus_permissions').update({
|
|
148
|
-
role: knex.ref('policy'),
|
|
149
|
-
});
|
|
150
|
-
await knex('directus_permissions')
|
|
151
|
-
.update({
|
|
152
|
-
role: null,
|
|
153
|
-
})
|
|
154
|
-
.where({ role: PUBLIC_POLICY_ID });
|
|
155
|
-
await knex.schema.alterTable('directus_permissions', (table) => {
|
|
156
|
-
table.uuid('role').references('directus_roles.id').alter();
|
|
157
|
-
table.dropForeign('policy');
|
|
158
|
-
table.dropColumn('policy');
|
|
159
|
-
});
|
|
160
|
-
/////////////////////////////////////////////////////////////////////////////////////////////////
|
|
161
|
-
// Drop policies table
|
|
162
|
-
await knex.schema.dropTable('directus_policies');
|
|
163
|
-
}
|
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
import type { Filter, Query, SchemaOverview } from '@directus/types';
|
|
2
|
-
import type { Knex } from 'knex';
|
|
3
|
-
import type { FieldNode, FunctionFieldNode, O2MNode } from '../../../types/ast.js';
|
|
4
|
-
export declare function getDBQuery(schema: SchemaOverview, knex: Knex, table: string, fieldNodes: (FieldNode | FunctionFieldNode)[], o2mNodes: O2MNode[], query: Query, cases: Filter[]): Knex.QueryBuilder;
|
|
@@ -1,194 +0,0 @@
|
|
|
1
|
-
import { useEnv } from '@directus/env';
|
|
2
|
-
import { cloneDeep } from 'lodash-es';
|
|
3
|
-
import applyQuery, { applyLimit, applySort, generateAlias } from '../../../utils/apply-query.js';
|
|
4
|
-
import { getCollectionFromAlias } from '../../../utils/get-collection-from-alias.js';
|
|
5
|
-
import { getColumn } from '../../../utils/get-column.js';
|
|
6
|
-
import { getHelpers } from '../../helpers/index.js';
|
|
7
|
-
import { applyCaseWhen } from '../utils/apply-case-when.js';
|
|
8
|
-
import { getColumnPreprocessor } from '../utils/get-column-pre-processor.js';
|
|
9
|
-
import { getNodeAlias } from '../utils/get-field-alias.js';
|
|
10
|
-
import { getInnerQueryColumnPreProcessor } from '../utils/get-inner-query-column-pre-processor.js';
|
|
11
|
-
export function getDBQuery(schema, knex, table, fieldNodes, o2mNodes, query, cases) {
|
|
12
|
-
const aliasMap = Object.create(null);
|
|
13
|
-
const env = useEnv();
|
|
14
|
-
const preProcess = getColumnPreprocessor(knex, schema, table, cases, aliasMap);
|
|
15
|
-
const queryCopy = cloneDeep(query);
|
|
16
|
-
const helpers = getHelpers(knex);
|
|
17
|
-
const hasCaseWhen = o2mNodes.some((node) => node.whenCase && node.whenCase.length > 0) ||
|
|
18
|
-
fieldNodes.some((node) => node.whenCase && node.whenCase.length > 0);
|
|
19
|
-
queryCopy.limit = typeof queryCopy.limit === 'number' ? queryCopy.limit : Number(env['QUERY_LIMIT_DEFAULT']);
|
|
20
|
-
// Queries with aggregates and groupBy will not have duplicate result
|
|
21
|
-
if (queryCopy.aggregate || queryCopy.group) {
|
|
22
|
-
const flatQuery = knex.from(table).select(fieldNodes.map((node) => preProcess(node)));
|
|
23
|
-
return applyQuery(knex, table, flatQuery, queryCopy, schema, cases).query;
|
|
24
|
-
}
|
|
25
|
-
const primaryKey = schema.collections[table].primary;
|
|
26
|
-
let dbQuery = knex.from(table);
|
|
27
|
-
let sortRecords;
|
|
28
|
-
const innerQuerySortRecords = [];
|
|
29
|
-
let hasMultiRelationalSort;
|
|
30
|
-
if (queryCopy.sort) {
|
|
31
|
-
const sortResult = applySort(knex, schema, dbQuery, queryCopy, table, aliasMap, true);
|
|
32
|
-
if (sortResult) {
|
|
33
|
-
sortRecords = sortResult.sortRecords;
|
|
34
|
-
hasMultiRelationalSort = sortResult.hasMultiRelationalSort;
|
|
35
|
-
}
|
|
36
|
-
}
|
|
37
|
-
const { hasMultiRelationalFilter } = applyQuery(knex, table, dbQuery, queryCopy, schema, cases, {
|
|
38
|
-
aliasMap,
|
|
39
|
-
isInnerQuery: true,
|
|
40
|
-
hasMultiRelationalSort,
|
|
41
|
-
});
|
|
42
|
-
const needsInnerQuery = hasMultiRelationalSort || hasMultiRelationalFilter;
|
|
43
|
-
if (needsInnerQuery) {
|
|
44
|
-
dbQuery.select(`${table}.${primaryKey}`);
|
|
45
|
-
// Only add distinct if there are no case/when constructs, since otherwise we rely on group by
|
|
46
|
-
if (!hasCaseWhen)
|
|
47
|
-
dbQuery.distinct();
|
|
48
|
-
}
|
|
49
|
-
else {
|
|
50
|
-
dbQuery.select(fieldNodes.map((node) => preProcess(node)));
|
|
51
|
-
// Add flags for o2m fields with case/when to the let the DB to the partial item permissions
|
|
52
|
-
dbQuery.select(o2mNodes
|
|
53
|
-
.filter((node) => node.whenCase && node.whenCase.length > 0)
|
|
54
|
-
.map((node) => {
|
|
55
|
-
const columnCases = node.whenCase.map((index) => cases[index]);
|
|
56
|
-
return applyCaseWhen({
|
|
57
|
-
column: knex.raw(1),
|
|
58
|
-
columnCases,
|
|
59
|
-
aliasMap,
|
|
60
|
-
cases,
|
|
61
|
-
table,
|
|
62
|
-
alias: node.fieldKey,
|
|
63
|
-
}, { knex, schema });
|
|
64
|
-
}));
|
|
65
|
-
}
|
|
66
|
-
if (sortRecords) {
|
|
67
|
-
// Clears the order if any, eg: from MSSQL offset
|
|
68
|
-
dbQuery.clear('order');
|
|
69
|
-
if (needsInnerQuery) {
|
|
70
|
-
let orderByString = '';
|
|
71
|
-
const orderByFields = [];
|
|
72
|
-
sortRecords.map((sortRecord) => {
|
|
73
|
-
if (orderByString.length !== 0) {
|
|
74
|
-
orderByString += ', ';
|
|
75
|
-
}
|
|
76
|
-
const sortAlias = `sort_${generateAlias()}`;
|
|
77
|
-
if (sortRecord.column.includes('.')) {
|
|
78
|
-
const [alias, field] = sortRecord.column.split('.');
|
|
79
|
-
const originalCollectionName = getCollectionFromAlias(alias, aliasMap);
|
|
80
|
-
dbQuery.select(getColumn(knex, alias, field, sortAlias, schema, { originalCollectionName }));
|
|
81
|
-
orderByString += `?? ${sortRecord.order}`;
|
|
82
|
-
orderByFields.push(getColumn(knex, alias, field, false, schema, { originalCollectionName }));
|
|
83
|
-
}
|
|
84
|
-
else {
|
|
85
|
-
dbQuery.select(getColumn(knex, table, sortRecord.column, sortAlias, schema));
|
|
86
|
-
orderByString += `?? ${sortRecord.order}`;
|
|
87
|
-
orderByFields.push(getColumn(knex, table, sortRecord.column, false, schema));
|
|
88
|
-
}
|
|
89
|
-
innerQuerySortRecords.push({ alias: sortAlias, order: sortRecord.order });
|
|
90
|
-
});
|
|
91
|
-
dbQuery.orderByRaw(orderByString, orderByFields);
|
|
92
|
-
if (hasMultiRelationalSort) {
|
|
93
|
-
dbQuery = helpers.schema.applyMultiRelationalSort(knex, dbQuery, table, primaryKey, orderByString, orderByFields);
|
|
94
|
-
}
|
|
95
|
-
}
|
|
96
|
-
else {
|
|
97
|
-
sortRecords.map((sortRecord) => {
|
|
98
|
-
if (sortRecord.column.includes('.')) {
|
|
99
|
-
const [alias, field] = sortRecord.column.split('.');
|
|
100
|
-
sortRecord.column = getColumn(knex, alias, field, false, schema, {
|
|
101
|
-
originalCollectionName: getCollectionFromAlias(alias, aliasMap),
|
|
102
|
-
});
|
|
103
|
-
}
|
|
104
|
-
else {
|
|
105
|
-
sortRecord.column = getColumn(knex, table, sortRecord.column, false, schema);
|
|
106
|
-
}
|
|
107
|
-
});
|
|
108
|
-
dbQuery.orderBy(sortRecords);
|
|
109
|
-
}
|
|
110
|
-
}
|
|
111
|
-
if (!needsInnerQuery)
|
|
112
|
-
return dbQuery;
|
|
113
|
-
const innerCaseWhenAliasPrefix = generateAlias();
|
|
114
|
-
if (hasCaseWhen) {
|
|
115
|
-
/* If there are cases, we need to employ a trick in order to evaluate the case/when structure in the inner query,
|
|
116
|
-
while passing the result of the evaluation to the outer query. The case/when needs to be evaluated in the inner
|
|
117
|
-
query since only there all joined in tables, that might be required for the case/when, are available.
|
|
118
|
-
|
|
119
|
-
The problem is, that the resulting columns can not be directly selected in the inner query,
|
|
120
|
-
as a `SELECT DISTINCT` does not work for all datatypes in all vendors.
|
|
121
|
-
|
|
122
|
-
So instead of having an inner query which might look like this:
|
|
123
|
-
|
|
124
|
-
SELECT DISTINCT ...,
|
|
125
|
-
CASE WHEN <condition> THEN <actual-column> END AS <alias>
|
|
126
|
-
|
|
127
|
-
Another problem is that all not all rows with the same primary key are guaranteed to have the same value for
|
|
128
|
-
the columns with the case/when, so we to `or` those together, but counting the number of flags in a group by
|
|
129
|
-
operation. This way the flag is set to > 0 if any of the rows in the group allows access to the column.
|
|
130
|
-
|
|
131
|
-
The inner query only evaluates the condition and passes up or-ed flag, that is used in the wrapper query to select
|
|
132
|
-
the actual column:
|
|
133
|
-
|
|
134
|
-
SELECT ...,
|
|
135
|
-
COUNT (CASE WHEN <condition> THEN 1 END) AS <random-prefix>_<alias>
|
|
136
|
-
...
|
|
137
|
-
GROUP BY <primary-key>
|
|
138
|
-
|
|
139
|
-
Then, in the wrapper query there is no need to evaluate the condition again, but instead rely on the flag:
|
|
140
|
-
|
|
141
|
-
SELECT ...,
|
|
142
|
-
CASE WHEN `inner`.<random-prefix>_<alias> > 0 THEN <actual-column> END AS <alias>
|
|
143
|
-
*/
|
|
144
|
-
const innerPreprocess = getInnerQueryColumnPreProcessor(knex, schema, table, cases, aliasMap, innerCaseWhenAliasPrefix);
|
|
145
|
-
// To optimize the query we avoid having unnecessary columns in the inner query, that don't have a caseWhen, since
|
|
146
|
-
// they are selected in the outer query directly
|
|
147
|
-
dbQuery.select(fieldNodes.map(innerPreprocess).filter((x) => x !== null));
|
|
148
|
-
// In addition to the regular columns select a flag that indicates if a user has access to o2m related field
|
|
149
|
-
// based on the case/when of that field.
|
|
150
|
-
dbQuery.select(o2mNodes.map(innerPreprocess).filter((x) => x !== null));
|
|
151
|
-
dbQuery.groupByRaw(`${table}.${primaryKey}`);
|
|
152
|
-
}
|
|
153
|
-
const wrapperQuery = knex
|
|
154
|
-
.from(table)
|
|
155
|
-
.innerJoin(knex.raw('??', dbQuery.as('inner')), `${table}.${primaryKey}`, `inner.${primaryKey}`);
|
|
156
|
-
if (!hasCaseWhen) {
|
|
157
|
-
// No need for case/when in the wrapper query, just select the preprocessed columns
|
|
158
|
-
wrapperQuery.select(fieldNodes.map((node) => preProcess(node)));
|
|
159
|
-
}
|
|
160
|
-
else {
|
|
161
|
-
// This applies a simplified case/when construct in the wrapper query, that only looks at flag > 1
|
|
162
|
-
// Distinguish between column with and without case/when and handle them differently
|
|
163
|
-
const plainColumns = fieldNodes.filter((fieldNode) => !fieldNode.whenCase || fieldNode.whenCase.length === 0);
|
|
164
|
-
const whenCaseColumns = fieldNodes.filter((fieldNode) => fieldNode.whenCase && fieldNode.whenCase.length > 0);
|
|
165
|
-
// Select the plain columns
|
|
166
|
-
wrapperQuery.select(plainColumns.map((node) => preProcess(node)));
|
|
167
|
-
// Select the case/when columns based on the flag from the inner query
|
|
168
|
-
wrapperQuery.select(whenCaseColumns.map((fieldNode) => {
|
|
169
|
-
const alias = getNodeAlias(fieldNode);
|
|
170
|
-
const innerAlias = `${innerCaseWhenAliasPrefix}_${alias}`;
|
|
171
|
-
// Preprocess the column without the case/when, since that is applied in a simpler fashion in the select
|
|
172
|
-
const column = preProcess({ ...fieldNode, whenCase: [] }, { noAlias: true });
|
|
173
|
-
return knex.raw(`CASE WHEN ??.?? > 0 THEN ?? END as ??`, ['inner', innerAlias, column, alias]);
|
|
174
|
-
}));
|
|
175
|
-
// Pass the flags of o2m fields up through the wrapper query
|
|
176
|
-
wrapperQuery.select(o2mNodes
|
|
177
|
-
.filter((node) => node.whenCase && node.whenCase.length > 0)
|
|
178
|
-
.map((node) => {
|
|
179
|
-
const alias = node.fieldKey;
|
|
180
|
-
const innerAlias = `${innerCaseWhenAliasPrefix}_${alias}`;
|
|
181
|
-
return knex.raw(`CASE WHEN ??.?? > 0 THEN 1 END as ??`, ['inner', innerAlias, alias]);
|
|
182
|
-
}));
|
|
183
|
-
}
|
|
184
|
-
if (sortRecords && needsInnerQuery) {
|
|
185
|
-
innerQuerySortRecords.map((innerQuerySortRecord) => {
|
|
186
|
-
wrapperQuery.orderBy(`inner.${innerQuerySortRecord.alias}`, innerQuerySortRecord.order);
|
|
187
|
-
});
|
|
188
|
-
if (hasMultiRelationalSort) {
|
|
189
|
-
wrapperQuery.where('inner.directus_row_number', '=', 1);
|
|
190
|
-
applyLimit(knex, wrapperQuery, queryCopy.limit);
|
|
191
|
-
}
|
|
192
|
-
}
|
|
193
|
-
return wrapperQuery;
|
|
194
|
-
}
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
import type { Query, SchemaOverview } from '@directus/types';
|
|
2
|
-
import type { FieldNode, FunctionFieldNode, NestedCollectionNode } from '../../../types/ast.js';
|
|
3
|
-
export declare function parseCurrentLevel(schema: SchemaOverview, collection: string, children: (NestedCollectionNode | FieldNode | FunctionFieldNode)[], query: Query): Promise<{
|
|
4
|
-
fieldNodes: FieldNode[];
|
|
5
|
-
nestedCollectionNodes: NestedCollectionNode[];
|
|
6
|
-
primaryKeyField: string;
|
|
7
|
-
}>;
|
|
@@ -1,41 +0,0 @@
|
|
|
1
|
-
import { parseFilterKey } from '../../../utils/parse-filter-key.js';
|
|
2
|
-
export async function parseCurrentLevel(schema, collection, children, query) {
|
|
3
|
-
const primaryKeyField = schema.collections[collection].primary;
|
|
4
|
-
const columnsInCollection = Object.keys(schema.collections[collection].fields);
|
|
5
|
-
const columnsToSelectInternal = [];
|
|
6
|
-
const nestedCollectionNodes = [];
|
|
7
|
-
for (const child of children) {
|
|
8
|
-
if (child.type === 'field' || child.type === 'functionField') {
|
|
9
|
-
const { fieldName } = parseFilterKey(child.name);
|
|
10
|
-
if (columnsInCollection.includes(fieldName)) {
|
|
11
|
-
columnsToSelectInternal.push(child.fieldKey);
|
|
12
|
-
}
|
|
13
|
-
continue;
|
|
14
|
-
}
|
|
15
|
-
if (!child.relation)
|
|
16
|
-
continue;
|
|
17
|
-
if (child.type === 'm2o') {
|
|
18
|
-
columnsToSelectInternal.push(child.relation.field);
|
|
19
|
-
}
|
|
20
|
-
if (child.type === 'a2o') {
|
|
21
|
-
columnsToSelectInternal.push(child.relation.field);
|
|
22
|
-
columnsToSelectInternal.push(child.relation.meta.one_collection_field);
|
|
23
|
-
}
|
|
24
|
-
nestedCollectionNodes.push(child);
|
|
25
|
-
}
|
|
26
|
-
const isAggregate = (query.group || (query.aggregate && Object.keys(query.aggregate).length > 0)) ?? false;
|
|
27
|
-
/** Always fetch primary key in case there's a nested relation that needs it. Aggregate payloads
|
|
28
|
-
* can't have nested relational fields
|
|
29
|
-
*/
|
|
30
|
-
if (isAggregate === false && columnsToSelectInternal.includes(primaryKeyField) === false) {
|
|
31
|
-
columnsToSelectInternal.push(primaryKeyField);
|
|
32
|
-
}
|
|
33
|
-
/** Make sure select list has unique values */
|
|
34
|
-
const columnsToSelect = [...new Set(columnsToSelectInternal)];
|
|
35
|
-
const fieldNodes = columnsToSelect.map((column) => children.find((childNode) => (childNode.type === 'field' || childNode.type === 'functionField') && childNode.fieldKey === column) ?? {
|
|
36
|
-
type: 'field',
|
|
37
|
-
name: column,
|
|
38
|
-
fieldKey: column,
|
|
39
|
-
});
|
|
40
|
-
return { fieldNodes, nestedCollectionNodes, primaryKeyField };
|
|
41
|
-
}
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
import type { Item, SchemaOverview } from '@directus/types';
|
|
2
|
-
import type { AST, NestedCollectionNode } from '../../types/ast.js';
|
|
3
|
-
import type { RunASTOptions } from './types.js';
|
|
4
|
-
/**
|
|
5
|
-
* Execute a given AST using Knex. Returns array of items based on requested AST.
|
|
6
|
-
*/
|
|
7
|
-
export declare function runAst(originalAST: AST | NestedCollectionNode, schema: SchemaOverview, options?: RunASTOptions): Promise<null | Item | Item[]>;
|
|
@@ -1,107 +0,0 @@
|
|
|
1
|
-
import { useEnv } from '@directus/env';
|
|
2
|
-
import { cloneDeep, merge } from 'lodash-es';
|
|
3
|
-
import { PayloadService } from '../../services/payload.js';
|
|
4
|
-
import getDatabase from '../index.js';
|
|
5
|
-
import { getDBQuery } from './lib/get-db-query.js';
|
|
6
|
-
import { parseCurrentLevel } from './lib/parse-current-level.js';
|
|
7
|
-
import { applyParentFilters } from './utils/apply-parent-filters.js';
|
|
8
|
-
import { mergeWithParentItems } from './utils/merge-with-parent-items.js';
|
|
9
|
-
import { removeTemporaryFields } from './utils/remove-temporary-fields.js';
|
|
10
|
-
/**
|
|
11
|
-
* Execute a given AST using Knex. Returns array of items based on requested AST.
|
|
12
|
-
*/
|
|
13
|
-
export async function runAst(originalAST, schema, options) {
|
|
14
|
-
const ast = cloneDeep(originalAST);
|
|
15
|
-
const knex = options?.knex || getDatabase();
|
|
16
|
-
if (ast.type === 'a2o') {
|
|
17
|
-
const results = {};
|
|
18
|
-
for (const collection of ast.names) {
|
|
19
|
-
results[collection] = await run(collection, ast.children[collection], ast.query[collection], ast.cases[collection] ?? []);
|
|
20
|
-
}
|
|
21
|
-
return results;
|
|
22
|
-
}
|
|
23
|
-
else {
|
|
24
|
-
return await run(ast.name, ast.children, options?.query || ast.query, ast.cases);
|
|
25
|
-
}
|
|
26
|
-
async function run(collection, children, query, cases) {
|
|
27
|
-
const env = useEnv();
|
|
28
|
-
// Retrieve the database columns to select in the current AST
|
|
29
|
-
const { fieldNodes, primaryKeyField, nestedCollectionNodes } = await parseCurrentLevel(schema, collection, children, query);
|
|
30
|
-
const o2mNodes = nestedCollectionNodes.filter((node) => node.type === 'o2m');
|
|
31
|
-
// The actual knex query builder instance. This is a promise that resolves with the raw items from the db
|
|
32
|
-
const dbQuery = getDBQuery(schema, knex, collection, fieldNodes, o2mNodes, query, cases);
|
|
33
|
-
const rawItems = await dbQuery;
|
|
34
|
-
if (!rawItems)
|
|
35
|
-
return null;
|
|
36
|
-
// Run the items through the special transforms
|
|
37
|
-
const payloadService = new PayloadService(collection, { knex, schema });
|
|
38
|
-
let items = await payloadService.processValues('read', rawItems, query.alias ?? {});
|
|
39
|
-
if (!items || (Array.isArray(items) && items.length === 0))
|
|
40
|
-
return items;
|
|
41
|
-
// Apply the `_in` filters to the nested collection batches
|
|
42
|
-
const nestedNodes = applyParentFilters(schema, nestedCollectionNodes, items);
|
|
43
|
-
for (const nestedNode of nestedNodes) {
|
|
44
|
-
let nestedItems = [];
|
|
45
|
-
if (nestedNode.type === 'o2m') {
|
|
46
|
-
let hasMore = true;
|
|
47
|
-
let batchCount = 0;
|
|
48
|
-
// If a nested node has a whenCase it indicates that the user might not be able to access the field for all items.
|
|
49
|
-
// In that case the queried item includes a flag under the fieldKey that is populated in the db and indicates
|
|
50
|
-
// if the user has access to that field for that specific item.
|
|
51
|
-
const hasWhenCase = nestedNode.whenCase && nestedNode.whenCase.length > 0;
|
|
52
|
-
let fieldAllowed = true;
|
|
53
|
-
if (hasWhenCase) {
|
|
54
|
-
// Extract flag and remove field from item, so it can be populated with the actual items
|
|
55
|
-
if (Array.isArray(items)) {
|
|
56
|
-
fieldAllowed = [];
|
|
57
|
-
for (const item of items) {
|
|
58
|
-
fieldAllowed.push(!!item[nestedNode.fieldKey]);
|
|
59
|
-
delete item[nestedNode.fieldKey];
|
|
60
|
-
}
|
|
61
|
-
}
|
|
62
|
-
else {
|
|
63
|
-
fieldAllowed = !!items[nestedNode.fieldKey];
|
|
64
|
-
delete items[nestedNode.fieldKey];
|
|
65
|
-
}
|
|
66
|
-
}
|
|
67
|
-
while (hasMore) {
|
|
68
|
-
const node = merge({}, nestedNode, {
|
|
69
|
-
query: {
|
|
70
|
-
limit: env['RELATIONAL_BATCH_SIZE'],
|
|
71
|
-
offset: batchCount * env['RELATIONAL_BATCH_SIZE'],
|
|
72
|
-
page: null,
|
|
73
|
-
},
|
|
74
|
-
});
|
|
75
|
-
nestedItems = (await runAst(node, schema, { knex, nested: true }));
|
|
76
|
-
if (nestedItems) {
|
|
77
|
-
items = mergeWithParentItems(schema, nestedItems, items, nestedNode, fieldAllowed);
|
|
78
|
-
}
|
|
79
|
-
if (!nestedItems || nestedItems.length < env['RELATIONAL_BATCH_SIZE']) {
|
|
80
|
-
hasMore = false;
|
|
81
|
-
}
|
|
82
|
-
batchCount++;
|
|
83
|
-
}
|
|
84
|
-
}
|
|
85
|
-
else {
|
|
86
|
-
const node = merge({}, nestedNode, {
|
|
87
|
-
query: { limit: -1 },
|
|
88
|
-
});
|
|
89
|
-
nestedItems = (await runAst(node, schema, { knex, nested: true }));
|
|
90
|
-
if (nestedItems) {
|
|
91
|
-
// Merge all fetched nested records with the parent items
|
|
92
|
-
items = mergeWithParentItems(schema, nestedItems, items, nestedNode, true);
|
|
93
|
-
}
|
|
94
|
-
}
|
|
95
|
-
}
|
|
96
|
-
// During the fetching of data, we have to inject a couple of required fields for the child nesting
|
|
97
|
-
// to work (primary / foreign keys) even if they're not explicitly requested. After all fetching
|
|
98
|
-
// and nesting is done, we parse through the output structure, and filter out all non-requested
|
|
99
|
-
// fields
|
|
100
|
-
// The field allowed flags injected in `getDBQuery` are already removed while processing the nested nodes in
|
|
101
|
-
// the previous step.
|
|
102
|
-
if (options?.nested !== true && options?.stripNonRequested !== false) {
|
|
103
|
-
items = removeTemporaryFields(schema, items, originalAST, primaryKeyField);
|
|
104
|
-
}
|
|
105
|
-
return items;
|
|
106
|
-
}
|
|
107
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export {};
|
|
@@ -1,16 +0,0 @@
|
|
|
1
|
-
import type { Filter, SchemaOverview } from '@directus/types';
|
|
2
|
-
import type { Knex } from 'knex';
|
|
3
|
-
import type { AliasMap } from '../../../utils/get-column-path.js';
|
|
4
|
-
export interface ApplyCaseWhenOptions {
|
|
5
|
-
column: Knex.Raw;
|
|
6
|
-
columnCases: Filter[];
|
|
7
|
-
table: string;
|
|
8
|
-
cases: Filter[];
|
|
9
|
-
aliasMap: AliasMap;
|
|
10
|
-
alias?: string;
|
|
11
|
-
}
|
|
12
|
-
export interface ApplyCaseWhenContext {
|
|
13
|
-
knex: Knex;
|
|
14
|
-
schema: SchemaOverview;
|
|
15
|
-
}
|
|
16
|
-
export declare function applyCaseWhen({ columnCases, table, aliasMap, cases, column, alias }: ApplyCaseWhenOptions, { knex, schema }: ApplyCaseWhenContext): Knex.Raw;
|
|
@@ -1,26 +0,0 @@
|
|
|
1
|
-
import { applyFilter } from '../../../utils/apply-query.js';
|
|
2
|
-
export function applyCaseWhen({ columnCases, table, aliasMap, cases, column, alias }, { knex, schema }) {
|
|
3
|
-
const caseQuery = knex.queryBuilder();
|
|
4
|
-
applyFilter(knex, schema, caseQuery, { _or: columnCases }, table, aliasMap, cases);
|
|
5
|
-
const compiler = knex.client.queryCompiler(caseQuery);
|
|
6
|
-
const sqlParts = [];
|
|
7
|
-
// Only empty filters, so no where was generated, skip it
|
|
8
|
-
if (!compiler.grouped.where)
|
|
9
|
-
return column;
|
|
10
|
-
for (const statement of compiler.grouped.where) {
|
|
11
|
-
const val = compiler[statement.type](statement);
|
|
12
|
-
if (val) {
|
|
13
|
-
if (sqlParts.length > 0) {
|
|
14
|
-
sqlParts.push(statement.bool);
|
|
15
|
-
}
|
|
16
|
-
sqlParts.push(val);
|
|
17
|
-
}
|
|
18
|
-
}
|
|
19
|
-
const sql = sqlParts.join(' ');
|
|
20
|
-
const bindings = caseQuery.toSQL().bindings;
|
|
21
|
-
const result = knex.raw(`(CASE WHEN ${sql} THEN ?? END)`, [...bindings, column]);
|
|
22
|
-
if (alias) {
|
|
23
|
-
return knex.raw(result + ' AS ??', [alias]);
|
|
24
|
-
}
|
|
25
|
-
return result;
|
|
26
|
-
}
|
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
import type { Item, SchemaOverview } from '@directus/types';
|
|
2
|
-
import type { NestedCollectionNode } from '../../../types/ast.js';
|
|
3
|
-
export declare function applyParentFilters(schema: SchemaOverview, nestedCollectionNodes: NestedCollectionNode[], parentItem: Item | Item[]): NestedCollectionNode[];
|
|
@@ -1,55 +0,0 @@
|
|
|
1
|
-
import { toArray } from '@directus/utils';
|
|
2
|
-
import { isNil, merge, uniq } from 'lodash-es';
|
|
3
|
-
export function applyParentFilters(schema, nestedCollectionNodes, parentItem) {
|
|
4
|
-
const parentItems = toArray(parentItem);
|
|
5
|
-
for (const nestedNode of nestedCollectionNodes) {
|
|
6
|
-
if (!nestedNode.relation)
|
|
7
|
-
continue;
|
|
8
|
-
if (nestedNode.type === 'm2o') {
|
|
9
|
-
const foreignField = schema.collections[nestedNode.relation.related_collection].primary;
|
|
10
|
-
const foreignIds = uniq(parentItems.map((res) => res[nestedNode.relation.field])).filter((id) => !isNil(id));
|
|
11
|
-
merge(nestedNode, { query: { filter: { [foreignField]: { _in: foreignIds } } } });
|
|
12
|
-
}
|
|
13
|
-
else if (nestedNode.type === 'o2m') {
|
|
14
|
-
const relatedM2OisFetched = !!nestedNode.children.find((child) => {
|
|
15
|
-
return child.type === 'field' && child.name === nestedNode.relation.field;
|
|
16
|
-
});
|
|
17
|
-
if (relatedM2OisFetched === false) {
|
|
18
|
-
nestedNode.children.push({
|
|
19
|
-
type: 'field',
|
|
20
|
-
name: nestedNode.relation.field,
|
|
21
|
-
fieldKey: nestedNode.relation.field,
|
|
22
|
-
whenCase: [],
|
|
23
|
-
});
|
|
24
|
-
}
|
|
25
|
-
if (nestedNode.relation.meta?.sort_field) {
|
|
26
|
-
nestedNode.children.push({
|
|
27
|
-
type: 'field',
|
|
28
|
-
name: nestedNode.relation.meta.sort_field,
|
|
29
|
-
fieldKey: nestedNode.relation.meta.sort_field,
|
|
30
|
-
whenCase: [],
|
|
31
|
-
});
|
|
32
|
-
}
|
|
33
|
-
const foreignField = nestedNode.relation.field;
|
|
34
|
-
const foreignIds = uniq(parentItems.map((res) => res[nestedNode.parentKey])).filter((id) => !isNil(id));
|
|
35
|
-
merge(nestedNode, { query: { filter: { [foreignField]: { _in: foreignIds } } } });
|
|
36
|
-
}
|
|
37
|
-
else if (nestedNode.type === 'a2o') {
|
|
38
|
-
const keysPerCollection = {};
|
|
39
|
-
for (const parentItem of parentItems) {
|
|
40
|
-
const collection = parentItem[nestedNode.relation.meta.one_collection_field];
|
|
41
|
-
if (!keysPerCollection[collection])
|
|
42
|
-
keysPerCollection[collection] = [];
|
|
43
|
-
keysPerCollection[collection].push(parentItem[nestedNode.relation.field]);
|
|
44
|
-
}
|
|
45
|
-
for (const relatedCollection of nestedNode.names) {
|
|
46
|
-
const foreignField = nestedNode.relatedKey[relatedCollection];
|
|
47
|
-
const foreignIds = uniq(keysPerCollection[relatedCollection]);
|
|
48
|
-
merge(nestedNode, {
|
|
49
|
-
query: { [relatedCollection]: { filter: { [foreignField]: { _in: foreignIds } }, limit: foreignIds.length } },
|
|
50
|
-
});
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
return nestedCollectionNodes;
|
|
55
|
-
}
|