@directus/api 21.0.0 → 22.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (299) hide show
  1. package/dist/app.js +4 -4
  2. package/dist/auth/drivers/ldap.js +4 -4
  3. package/dist/auth/drivers/local.js +4 -4
  4. package/dist/auth/drivers/oauth2.js +4 -4
  5. package/dist/auth/drivers/openid.js +2 -4
  6. package/dist/cache.js +3 -0
  7. package/dist/cli/commands/bootstrap/index.js +8 -2
  8. package/dist/cli/commands/init/index.js +9 -10
  9. package/dist/cli/commands/init/questions.d.ts +7 -6
  10. package/dist/cli/commands/init/questions.js +2 -2
  11. package/dist/cli/utils/create-env/index.d.ts +2 -2
  12. package/dist/cli/utils/create-env/index.js +3 -1
  13. package/dist/cli/utils/defaults.d.ts +4 -11
  14. package/dist/cli/utils/defaults.js +7 -1
  15. package/dist/cli/utils/drivers.js +1 -1
  16. package/dist/constants.d.ts +1 -1
  17. package/dist/controllers/access.d.ts +2 -0
  18. package/dist/controllers/access.js +148 -0
  19. package/dist/controllers/auth.js +5 -16
  20. package/dist/controllers/permissions.js +14 -2
  21. package/dist/controllers/policies.d.ts +2 -0
  22. package/dist/controllers/policies.js +169 -0
  23. package/dist/controllers/roles.js +22 -1
  24. package/dist/controllers/tus.js +14 -26
  25. package/dist/controllers/users.js +0 -55
  26. package/dist/database/get-ast-from-query/get-ast-from-query.d.ts +16 -0
  27. package/dist/database/get-ast-from-query/get-ast-from-query.js +82 -0
  28. package/dist/database/get-ast-from-query/lib/convert-wildcards.d.ts +13 -0
  29. package/dist/database/get-ast-from-query/lib/convert-wildcards.js +69 -0
  30. package/dist/database/get-ast-from-query/lib/parse-fields.d.ts +15 -0
  31. package/dist/database/get-ast-from-query/lib/parse-fields.js +200 -0
  32. package/dist/database/get-ast-from-query/utils/get-deep-query.d.ts +14 -0
  33. package/dist/database/get-ast-from-query/utils/get-deep-query.js +17 -0
  34. package/dist/database/get-ast-from-query/utils/get-related-collection.d.ts +2 -0
  35. package/dist/database/get-ast-from-query/utils/get-related-collection.js +13 -0
  36. package/dist/database/get-ast-from-query/utils/get-relation.d.ts +2 -0
  37. package/dist/database/get-ast-from-query/utils/get-relation.js +7 -0
  38. package/dist/database/helpers/fn/types.d.ts +2 -1
  39. package/dist/database/helpers/fn/types.js +1 -1
  40. package/dist/database/helpers/geometry/dialects/mssql.d.ts +1 -1
  41. package/dist/database/helpers/geometry/dialects/mssql.js +4 -2
  42. package/dist/database/helpers/geometry/dialects/mysql.js +1 -1
  43. package/dist/database/helpers/geometry/dialects/oracle.d.ts +1 -1
  44. package/dist/database/helpers/geometry/dialects/oracle.js +5 -3
  45. package/dist/database/helpers/geometry/types.d.ts +1 -1
  46. package/dist/database/helpers/geometry/types.js +4 -2
  47. package/dist/database/helpers/index.d.ts +3 -3
  48. package/dist/database/helpers/schema/dialects/cockroachdb.d.ts +2 -1
  49. package/dist/database/helpers/schema/dialects/cockroachdb.js +4 -0
  50. package/dist/database/helpers/schema/dialects/mssql.d.ts +2 -1
  51. package/dist/database/helpers/schema/dialects/mssql.js +4 -0
  52. package/dist/database/helpers/schema/dialects/oracle.d.ts +2 -1
  53. package/dist/database/helpers/schema/dialects/oracle.js +4 -0
  54. package/dist/database/helpers/schema/dialects/postgres.d.ts +2 -1
  55. package/dist/database/helpers/schema/dialects/postgres.js +4 -0
  56. package/dist/database/helpers/schema/types.d.ts +5 -0
  57. package/dist/database/helpers/schema/types.js +3 -0
  58. package/dist/database/helpers/schema/utils/preprocess-bindings.d.ts +8 -0
  59. package/dist/database/helpers/schema/utils/preprocess-bindings.js +30 -0
  60. package/dist/database/index.js +6 -1
  61. package/dist/database/migrations/20210519A-add-system-fk-triggers.js +3 -2
  62. package/dist/database/migrations/20230721A-require-shares-fields.js +3 -5
  63. package/dist/database/migrations/20240716A-update-files-date-fields.js +3 -7
  64. package/dist/{utils/merge-permissions.d.ts → database/migrations/20240806A-permissions-policies.d.ts} +4 -1
  65. package/dist/database/migrations/20240806A-permissions-policies.js +352 -0
  66. package/dist/database/run-ast/lib/get-db-query.d.ts +4 -0
  67. package/dist/database/run-ast/lib/get-db-query.js +218 -0
  68. package/dist/database/run-ast/lib/parse-current-level.d.ts +7 -0
  69. package/dist/database/run-ast/lib/parse-current-level.js +41 -0
  70. package/dist/database/run-ast/run-ast.d.ts +7 -0
  71. package/dist/database/run-ast/run-ast.js +107 -0
  72. package/dist/database/{run-ast.d.ts → run-ast/types.d.ts} +3 -9
  73. package/dist/database/run-ast/types.js +1 -0
  74. package/dist/database/run-ast/utils/apply-case-when.d.ts +16 -0
  75. package/dist/database/run-ast/utils/apply-case-when.js +27 -0
  76. package/dist/database/run-ast/utils/apply-parent-filters.d.ts +3 -0
  77. package/dist/database/run-ast/utils/apply-parent-filters.js +55 -0
  78. package/dist/database/run-ast/utils/get-column-pre-processor.d.ts +10 -0
  79. package/dist/database/run-ast/utils/get-column-pre-processor.js +57 -0
  80. package/dist/database/run-ast/utils/get-field-alias.d.ts +2 -0
  81. package/dist/database/run-ast/utils/get-field-alias.js +4 -0
  82. package/dist/database/run-ast/utils/get-inner-query-column-pre-processor.d.ts +5 -0
  83. package/dist/database/run-ast/utils/get-inner-query-column-pre-processor.js +23 -0
  84. package/dist/database/run-ast/utils/merge-with-parent-items.d.ts +3 -0
  85. package/dist/database/run-ast/utils/merge-with-parent-items.js +87 -0
  86. package/dist/database/run-ast/utils/remove-temporary-fields.d.ts +3 -0
  87. package/dist/database/run-ast/utils/remove-temporary-fields.js +73 -0
  88. package/dist/database/run-ast/utils/with-preprocess-bindings.d.ts +2 -0
  89. package/dist/database/run-ast/utils/with-preprocess-bindings.js +14 -0
  90. package/dist/flows.js +3 -4
  91. package/dist/middleware/authenticate.js +2 -7
  92. package/dist/middleware/cache.js +1 -1
  93. package/dist/middleware/respond.js +1 -1
  94. package/dist/permissions/cache.d.ts +2 -0
  95. package/dist/permissions/cache.js +23 -0
  96. package/dist/permissions/lib/fetch-permissions.d.ts +11 -0
  97. package/dist/permissions/lib/fetch-permissions.js +56 -0
  98. package/dist/permissions/lib/fetch-policies.d.ts +14 -0
  99. package/dist/permissions/lib/fetch-policies.js +43 -0
  100. package/dist/permissions/lib/fetch-roles-tree.d.ts +3 -0
  101. package/dist/permissions/lib/fetch-roles-tree.js +28 -0
  102. package/dist/{services/permissions → permissions}/lib/with-app-minimal-permissions.d.ts +1 -1
  103. package/dist/permissions/lib/with-app-minimal-permissions.js +10 -0
  104. package/dist/permissions/modules/fetch-accountability-collection-access/fetch-accountability-collection-access.d.ts +7 -0
  105. package/dist/permissions/modules/fetch-accountability-collection-access/fetch-accountability-collection-access.js +56 -0
  106. package/dist/permissions/modules/fetch-accountability-policy-globals/fetch-accountability-policy-globals.d.ts +3 -0
  107. package/dist/permissions/modules/fetch-accountability-policy-globals/fetch-accountability-policy-globals.js +16 -0
  108. package/dist/permissions/modules/fetch-allowed-collections/fetch-allowed-collections.d.ts +8 -0
  109. package/dist/permissions/modules/fetch-allowed-collections/fetch-allowed-collections.js +24 -0
  110. package/dist/permissions/modules/fetch-allowed-field-map/fetch-allowed-field-map.d.ts +9 -0
  111. package/dist/permissions/modules/fetch-allowed-field-map/fetch-allowed-field-map.js +31 -0
  112. package/dist/permissions/modules/fetch-allowed-fields/fetch-allowed-fields.d.ts +16 -0
  113. package/dist/permissions/modules/fetch-allowed-fields/fetch-allowed-fields.js +27 -0
  114. package/dist/permissions/modules/fetch-global-access/fetch-global-access.d.ts +10 -0
  115. package/dist/permissions/modules/fetch-global-access/fetch-global-access.js +23 -0
  116. package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-roles.d.ts +5 -0
  117. package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-roles.js +7 -0
  118. package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-user.d.ts +5 -0
  119. package/dist/permissions/modules/fetch-global-access/lib/fetch-global-access-for-user.js +10 -0
  120. package/dist/permissions/modules/fetch-global-access/types.d.ts +4 -0
  121. package/dist/permissions/modules/fetch-global-access/types.js +1 -0
  122. package/dist/permissions/modules/fetch-global-access/utils/fetch-global-access-for-query.d.ts +4 -0
  123. package/dist/permissions/modules/fetch-global-access/utils/fetch-global-access-for-query.js +27 -0
  124. package/dist/permissions/modules/fetch-inconsistent-field-map/fetch-inconsistent-field-map.d.ts +12 -0
  125. package/dist/permissions/modules/fetch-inconsistent-field-map/fetch-inconsistent-field-map.js +32 -0
  126. package/dist/permissions/modules/fetch-policies-ip-access/fetch-policies-ip-access.d.ts +4 -0
  127. package/dist/permissions/modules/fetch-policies-ip-access/fetch-policies-ip-access.js +29 -0
  128. package/dist/permissions/modules/process-ast/lib/extract-fields-from-children.d.ts +4 -0
  129. package/dist/permissions/modules/process-ast/lib/extract-fields-from-children.js +49 -0
  130. package/dist/permissions/modules/process-ast/lib/extract-fields-from-query.d.ts +3 -0
  131. package/dist/permissions/modules/process-ast/lib/extract-fields-from-query.js +56 -0
  132. package/dist/permissions/modules/process-ast/lib/field-map-from-ast.d.ts +4 -0
  133. package/dist/permissions/modules/process-ast/lib/field-map-from-ast.js +8 -0
  134. package/dist/permissions/modules/process-ast/lib/inject-cases.d.ts +9 -0
  135. package/dist/permissions/modules/process-ast/lib/inject-cases.js +93 -0
  136. package/dist/permissions/modules/process-ast/process-ast.d.ts +9 -0
  137. package/dist/permissions/modules/process-ast/process-ast.js +39 -0
  138. package/dist/permissions/modules/process-ast/types.d.ts +18 -0
  139. package/dist/permissions/modules/process-ast/types.js +1 -0
  140. package/dist/permissions/modules/process-ast/utils/collections-in-field-map.d.ts +2 -0
  141. package/dist/permissions/modules/process-ast/utils/collections-in-field-map.js +7 -0
  142. package/dist/permissions/modules/process-ast/utils/dedupe-access.d.ts +12 -0
  143. package/dist/permissions/modules/process-ast/utils/dedupe-access.js +30 -0
  144. package/dist/permissions/modules/process-ast/utils/extract-paths-from-query.d.ts +15 -0
  145. package/dist/permissions/modules/process-ast/utils/extract-paths-from-query.js +60 -0
  146. package/dist/permissions/modules/process-ast/utils/find-related-collection.d.ts +3 -0
  147. package/dist/permissions/modules/process-ast/utils/find-related-collection.js +9 -0
  148. package/dist/permissions/modules/process-ast/utils/flatten-filter.d.ts +3 -0
  149. package/dist/permissions/modules/process-ast/utils/flatten-filter.js +34 -0
  150. package/dist/permissions/modules/process-ast/utils/format-a2o-key.d.ts +1 -0
  151. package/dist/permissions/modules/process-ast/utils/format-a2o-key.js +3 -0
  152. package/dist/permissions/modules/process-ast/utils/get-info-for-path.d.ts +5 -0
  153. package/dist/permissions/modules/process-ast/utils/get-info-for-path.js +7 -0
  154. package/dist/permissions/modules/process-ast/utils/has-item-permissions.d.ts +2 -0
  155. package/dist/permissions/modules/process-ast/utils/has-item-permissions.js +3 -0
  156. package/dist/permissions/modules/process-ast/utils/stringify-query-path.d.ts +2 -0
  157. package/dist/permissions/modules/process-ast/utils/stringify-query-path.js +3 -0
  158. package/dist/permissions/modules/process-ast/utils/validate-path/create-error.d.ts +3 -0
  159. package/dist/permissions/modules/process-ast/utils/validate-path/create-error.js +16 -0
  160. package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-existence.d.ts +2 -0
  161. package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-existence.js +12 -0
  162. package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-permissions.d.ts +2 -0
  163. package/dist/permissions/modules/process-ast/utils/validate-path/validate-path-permissions.js +28 -0
  164. package/dist/permissions/modules/process-payload/lib/is-field-nullable.d.ts +5 -0
  165. package/dist/permissions/modules/process-payload/lib/is-field-nullable.js +12 -0
  166. package/dist/permissions/modules/process-payload/process-payload.d.ts +13 -0
  167. package/dist/permissions/modules/process-payload/process-payload.js +77 -0
  168. package/dist/permissions/modules/validate-access/lib/validate-collection-access.d.ts +12 -0
  169. package/dist/permissions/modules/validate-access/lib/validate-collection-access.js +11 -0
  170. package/dist/permissions/modules/validate-access/lib/validate-item-access.d.ts +9 -0
  171. package/dist/permissions/modules/validate-access/lib/validate-item-access.js +33 -0
  172. package/dist/permissions/modules/validate-access/validate-access.d.ts +14 -0
  173. package/dist/permissions/modules/validate-access/validate-access.js +28 -0
  174. package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-count.d.ts +1 -0
  175. package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-count.js +8 -0
  176. package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-users.d.ts +5 -0
  177. package/dist/permissions/modules/validate-remaining-admin/validate-remaining-admin-users.js +10 -0
  178. package/dist/permissions/types.d.ts +6 -0
  179. package/dist/permissions/types.js +1 -0
  180. package/dist/permissions/utils/create-default-accountability.d.ts +2 -0
  181. package/dist/permissions/utils/create-default-accountability.js +11 -0
  182. package/dist/permissions/utils/extract-required-dynamic-variable-context.d.ts +8 -0
  183. package/dist/permissions/utils/extract-required-dynamic-variable-context.js +27 -0
  184. package/dist/permissions/utils/fetch-dynamic-variable-context.d.ts +9 -0
  185. package/dist/permissions/utils/fetch-dynamic-variable-context.js +43 -0
  186. package/dist/permissions/utils/filter-policies-by-ip.d.ts +2 -0
  187. package/dist/permissions/utils/filter-policies-by-ip.js +15 -0
  188. package/dist/permissions/utils/get-unaliased-field-key.d.ts +5 -0
  189. package/dist/permissions/utils/get-unaliased-field-key.js +17 -0
  190. package/dist/permissions/utils/process-permissions.d.ts +7 -0
  191. package/dist/permissions/utils/process-permissions.js +9 -0
  192. package/dist/permissions/utils/with-cache.d.ts +10 -0
  193. package/dist/permissions/utils/with-cache.js +25 -0
  194. package/dist/server.js +17 -4
  195. package/dist/services/access.d.ts +10 -0
  196. package/dist/services/access.js +43 -0
  197. package/dist/services/activity.js +22 -10
  198. package/dist/services/assets.d.ts +2 -3
  199. package/dist/services/assets.js +10 -5
  200. package/dist/services/authentication.js +18 -18
  201. package/dist/services/collections.js +18 -17
  202. package/dist/services/fields.d.ts +0 -1
  203. package/dist/services/fields.js +54 -25
  204. package/dist/services/files.js +10 -3
  205. package/dist/services/graphql/index.d.ts +3 -3
  206. package/dist/services/graphql/index.js +126 -22
  207. package/dist/services/graphql/subscription.js +2 -4
  208. package/dist/services/import-export.d.ts +3 -1
  209. package/dist/services/import-export.js +67 -9
  210. package/dist/services/index.d.ts +3 -2
  211. package/dist/services/index.js +3 -2
  212. package/dist/services/items.js +115 -44
  213. package/dist/services/meta.js +60 -23
  214. package/dist/services/notifications.js +14 -6
  215. package/dist/services/payload.d.ts +9 -10
  216. package/dist/services/payload.js +18 -3
  217. package/dist/services/{permissions/index.d.ts → permissions.d.ts} +5 -7
  218. package/dist/services/{permissions/index.js → permissions.js} +30 -54
  219. package/dist/services/policies.d.ts +12 -0
  220. package/dist/services/policies.js +87 -0
  221. package/dist/services/relations.d.ts +0 -6
  222. package/dist/services/relations.js +27 -30
  223. package/dist/services/roles.d.ts +4 -12
  224. package/dist/services/roles.js +57 -424
  225. package/dist/services/shares.d.ts +0 -2
  226. package/dist/services/shares.js +12 -8
  227. package/dist/services/specifications.d.ts +2 -2
  228. package/dist/services/specifications.js +39 -27
  229. package/dist/services/users.d.ts +1 -5
  230. package/dist/services/users.js +78 -161
  231. package/dist/services/utils.js +11 -7
  232. package/dist/services/versions.d.ts +0 -2
  233. package/dist/services/versions.js +34 -10
  234. package/dist/telemetry/lib/get-report.js +2 -2
  235. package/dist/telemetry/utils/check-user-limits.d.ts +5 -0
  236. package/dist/telemetry/utils/check-user-limits.js +19 -0
  237. package/dist/types/ast.d.ts +43 -1
  238. package/dist/types/database.d.ts +1 -1
  239. package/dist/types/items.d.ts +11 -0
  240. package/dist/utils/apply-query.d.ts +11 -7
  241. package/dist/utils/apply-query.js +69 -11
  242. package/dist/utils/fetch-user-count/fetch-access-lookup.d.ts +19 -0
  243. package/dist/utils/fetch-user-count/fetch-access-lookup.js +23 -0
  244. package/dist/utils/fetch-user-count/fetch-access-roles.d.ts +16 -0
  245. package/dist/utils/fetch-user-count/fetch-access-roles.js +37 -0
  246. package/dist/utils/fetch-user-count/fetch-active-users.d.ts +6 -0
  247. package/dist/utils/fetch-user-count/fetch-active-users.js +3 -0
  248. package/dist/utils/fetch-user-count/fetch-user-count.d.ts +12 -0
  249. package/dist/utils/fetch-user-count/fetch-user-count.js +64 -0
  250. package/dist/utils/fetch-user-count/get-user-count-query.d.ts +20 -0
  251. package/dist/utils/fetch-user-count/get-user-count-query.js +17 -0
  252. package/dist/utils/get-accountability-for-role.js +16 -25
  253. package/dist/utils/get-accountability-for-token.js +17 -16
  254. package/dist/utils/get-address.d.ts +5 -0
  255. package/dist/utils/get-address.js +13 -0
  256. package/dist/utils/get-cache-key.d.ts +1 -1
  257. package/dist/utils/get-cache-key.js +12 -1
  258. package/dist/utils/get-column.d.ts +2 -1
  259. package/dist/utils/get-column.js +1 -0
  260. package/dist/utils/get-service.js +5 -1
  261. package/dist/utils/reduce-schema.d.ts +4 -6
  262. package/dist/utils/reduce-schema.js +16 -32
  263. package/dist/utils/sanitize-schema.d.ts +1 -1
  264. package/dist/utils/transaction.js +28 -11
  265. package/dist/utils/validate-user-count-integrity.d.ts +13 -0
  266. package/dist/utils/validate-user-count-integrity.js +29 -0
  267. package/dist/websocket/authenticate.d.ts +0 -2
  268. package/dist/websocket/authenticate.js +0 -12
  269. package/dist/websocket/controllers/graphql.js +3 -7
  270. package/dist/websocket/controllers/hooks.js +4 -0
  271. package/dist/websocket/controllers/rest.js +2 -5
  272. package/dist/websocket/handlers/subscribe.js +0 -2
  273. package/dist/websocket/utils/items.d.ts +1 -1
  274. package/package.json +31 -30
  275. package/dist/database/run-ast.js +0 -458
  276. package/dist/middleware/check-ip.d.ts +0 -2
  277. package/dist/middleware/check-ip.js +0 -37
  278. package/dist/middleware/get-permissions.d.ts +0 -3
  279. package/dist/middleware/get-permissions.js +0 -10
  280. package/dist/services/authorization.d.ts +0 -17
  281. package/dist/services/authorization.js +0 -456
  282. package/dist/services/permissions/lib/with-app-minimal-permissions.js +0 -13
  283. package/dist/telemetry/utils/check-increased-user-limits.d.ts +0 -7
  284. package/dist/telemetry/utils/check-increased-user-limits.js +0 -25
  285. package/dist/telemetry/utils/get-role-counts-by-roles.d.ts +0 -6
  286. package/dist/telemetry/utils/get-role-counts-by-roles.js +0 -27
  287. package/dist/telemetry/utils/get-role-counts-by-users.d.ts +0 -11
  288. package/dist/telemetry/utils/get-role-counts-by-users.js +0 -34
  289. package/dist/telemetry/utils/get-user-count.d.ts +0 -8
  290. package/dist/telemetry/utils/get-user-count.js +0 -33
  291. package/dist/telemetry/utils/get-user-counts-by-roles.d.ts +0 -7
  292. package/dist/telemetry/utils/get-user-counts-by-roles.js +0 -35
  293. package/dist/utils/get-ast-from-query.d.ts +0 -13
  294. package/dist/utils/get-ast-from-query.js +0 -297
  295. package/dist/utils/get-permissions.d.ts +0 -2
  296. package/dist/utils/get-permissions.js +0 -150
  297. package/dist/utils/merge-permissions-for-share.d.ts +0 -4
  298. package/dist/utils/merge-permissions-for-share.js +0 -109
  299. package/dist/utils/merge-permissions.js +0 -95
@@ -20,7 +20,7 @@ const checkCacheMiddleware = asyncHandler(async (req, res, next) => {
20
20
  res.setHeader(`${env['CACHE_STATUS_HEADER']}`, 'MISS');
21
21
  return next();
22
22
  }
23
- const key = getCacheKey(req);
23
+ const key = await getCacheKey(req);
24
24
  let cachedData;
25
25
  try {
26
26
  cachedData = await getCacheValue(cache, key);
@@ -25,7 +25,7 @@ export const respond = asyncHandler(async (req, res) => {
25
25
  !req.sanitizedQuery.export &&
26
26
  res.locals['cache'] !== false &&
27
27
  exceedsMaxSize === false) {
28
- const key = getCacheKey(req);
28
+ const key = await getCacheKey(req);
29
29
  try {
30
30
  await setCacheValue(cache, key, res.locals['payload'], getMilliseconds(env['CACHE_TTL']));
31
31
  await setCacheValue(cache, `${key}__expires_at`, { exp: Date.now() + getMilliseconds(env['CACHE_TTL'], 0) });
@@ -0,0 +1,2 @@
1
+ export declare const useCache: () => import("@directus/memory").Cache;
2
+ export declare function clearCache(): Promise<void>;
@@ -0,0 +1,23 @@
1
+ import { defineCache } from '@directus/memory';
2
+ import { redisConfigAvailable, useRedis } from '../redis/index.js';
3
+ const localOnly = redisConfigAvailable() === false;
4
+ const config = localOnly
5
+ ? {
6
+ type: 'local',
7
+ maxKeys: 500,
8
+ }
9
+ : {
10
+ type: 'multi',
11
+ redis: {
12
+ namespace: 'permissions',
13
+ redis: useRedis(),
14
+ },
15
+ local: {
16
+ maxKeys: 100,
17
+ },
18
+ };
19
+ export const useCache = defineCache(config);
20
+ export function clearCache() {
21
+ const cache = useCache();
22
+ return cache.clear();
23
+ }
@@ -0,0 +1,11 @@
1
+ import type { Accountability, Permission, PermissionsAction } from '@directus/types';
2
+ import type { Context } from '../types.js';
3
+ export declare const fetchPermissions: typeof _fetchPermissions;
4
+ export interface FetchPermissionsOptions {
5
+ action?: PermissionsAction;
6
+ policies: string[];
7
+ collections?: string[];
8
+ accountability?: Pick<Accountability, 'user' | 'role' | 'roles' | 'app'>;
9
+ bypassDynamicVariableProcessing?: boolean;
10
+ }
11
+ export declare function _fetchPermissions(options: FetchPermissionsOptions, context: Context): Promise<Permission[]>;
@@ -0,0 +1,56 @@
1
+ import { pick, sortBy } from 'lodash-es';
2
+ import { fetchDynamicVariableContext } from '../utils/fetch-dynamic-variable-context.js';
3
+ import { processPermissions } from '../utils/process-permissions.js';
4
+ import { withCache } from '../utils/with-cache.js';
5
+ import { withAppMinimalPermissions } from './with-app-minimal-permissions.js';
6
+ export const fetchPermissions = withCache('permissions', _fetchPermissions, ({ action, policies, collections, accountability, bypassDynamicVariableProcessing }) => ({
7
+ policies, // we assume that policies always come from the same source, so they should be in the same order
8
+ ...(action && { action }),
9
+ ...(collections && { collections: sortBy(collections) }),
10
+ ...(accountability && { accountability: pick(accountability, ['user', 'role', 'roles', 'app']) }),
11
+ ...(bypassDynamicVariableProcessing && { bypassDynamicVariableProcessing }),
12
+ }));
13
+ export async function _fetchPermissions(options, context) {
14
+ const { PermissionsService } = await import('../../services/permissions.js');
15
+ const permissionsService = new PermissionsService(context);
16
+ const filter = {
17
+ _and: [{ policy: { _in: options.policies } }],
18
+ };
19
+ if (options.action) {
20
+ filter._and.push({ action: { _eq: options.action } });
21
+ }
22
+ if (options.collections) {
23
+ filter._and.push({ collection: { _in: options.collections } });
24
+ }
25
+ let permissions = (await permissionsService.readByQuery({
26
+ filter,
27
+ limit: -1,
28
+ }));
29
+ // Sort permissions by their order in the policies array
30
+ // This ensures that if a sorted array of policies is passed in the permissions are returned in the same order
31
+ // which is necessary for correctly applying the presets in order
32
+ permissions = sortBy(permissions, (permission) => options.policies.indexOf(permission.policy));
33
+ if (options.accountability && !options.bypassDynamicVariableProcessing) {
34
+ // Add app minimal permissions for the request accountability, if applicable.
35
+ // Normally this is done in the permissions service readByQuery, but it also needs to do it here
36
+ // since the permissions service is created without accountability.
37
+ // We call it without the policies filter, since the static minimal app permissions don't have a policy attached.
38
+ const permissionsWithAppPermissions = withAppMinimalPermissions(options.accountability ?? null, permissions, {
39
+ _and: filter._and.slice(1),
40
+ });
41
+ const permissionsContext = await fetchDynamicVariableContext({
42
+ accountability: options.accountability,
43
+ policies: options.policies,
44
+ permissions: permissionsWithAppPermissions,
45
+ }, context);
46
+ // Replace dynamic variables with their actual values
47
+ const processedPermissions = processPermissions({
48
+ permissions: permissionsWithAppPermissions,
49
+ accountability: options.accountability,
50
+ permissionsContext,
51
+ });
52
+ // TODO merge in permissions coming from the share scope
53
+ return processedPermissions;
54
+ }
55
+ return permissions;
56
+ }
@@ -0,0 +1,14 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Context } from '../types.js';
3
+ export interface AccessRow {
4
+ policy: {
5
+ id: string;
6
+ ip_access: string[] | null;
7
+ };
8
+ role: string | null;
9
+ }
10
+ export declare const fetchPolicies: typeof _fetchPolicies;
11
+ /**
12
+ * Fetch the policies associated with the current user accountability
13
+ */
14
+ export declare function _fetchPolicies({ roles, user, ip }: Pick<Accountability, 'user' | 'roles' | 'ip'>, context: Context): Promise<string[]>;
@@ -0,0 +1,43 @@
1
+ import { filterPoliciesByIp } from '../utils/filter-policies-by-ip.js';
2
+ import { withCache } from '../utils/with-cache.js';
3
+ export const fetchPolicies = withCache('policies', _fetchPolicies, ({ roles, user, ip }) => ({ roles, user, ip }));
4
+ /**
5
+ * Fetch the policies associated with the current user accountability
6
+ */
7
+ export async function _fetchPolicies({ roles, user, ip }, context) {
8
+ const { AccessService } = await import('../../services/access.js');
9
+ const accessService = new AccessService(context);
10
+ let roleFilter;
11
+ if (roles.length === 0) {
12
+ // Users without role assumes the Public role permissions along with their attached policies
13
+ roleFilter = { _and: [{ role: { _null: true } }, { user: { _null: true } }] };
14
+ }
15
+ else {
16
+ roleFilter = { role: { _in: roles } };
17
+ }
18
+ // If the user is not null, we also want to include the policies attached to the user
19
+ const filter = user ? { _or: [{ user: { _eq: user } }, roleFilter] } : roleFilter;
20
+ const accessRows = (await accessService.readByQuery({
21
+ filter,
22
+ fields: ['policy.id', 'policy.ip_access', 'role'],
23
+ limit: -1,
24
+ }));
25
+ const filteredAccessRows = filterPoliciesByIp(accessRows, ip);
26
+ /*
27
+ * Sort rows by priority (goes bottom up):
28
+ * - Parent role policies
29
+ * - Child role policies
30
+ * - User policies
31
+ */
32
+ filteredAccessRows.sort((a, b) => {
33
+ if (!a.role && !b.role)
34
+ return 0;
35
+ if (!a.role)
36
+ return 1;
37
+ if (!b.role)
38
+ return -1;
39
+ return roles.indexOf(a.role) - roles.indexOf(b.role);
40
+ });
41
+ const ids = filteredAccessRows.map(({ policy }) => policy.id);
42
+ return ids;
43
+ }
@@ -0,0 +1,3 @@
1
+ import type { Knex } from 'knex';
2
+ export declare const fetchRolesTree: typeof _fetchRolesTree;
3
+ export declare function _fetchRolesTree(start: string | null, knex: Knex): Promise<string[]>;
@@ -0,0 +1,28 @@
1
+ import { withCache } from '../utils/with-cache.js';
2
+ export const fetchRolesTree = withCache('roles-tree', _fetchRolesTree);
3
+ export async function _fetchRolesTree(start, knex) {
4
+ if (!start)
5
+ return [];
6
+ let parent = start;
7
+ const roles = [];
8
+ while (parent) {
9
+ const role = await knex
10
+ .select('id', 'parent')
11
+ .from('directus_roles')
12
+ .where({ id: parent })
13
+ .first();
14
+ if (!role) {
15
+ break;
16
+ }
17
+ roles.push(role.id);
18
+ // Prevent infinite recursion loops
19
+ if (role.parent && roles.includes(role.parent) === true) {
20
+ roles.reverse();
21
+ const rolesStr = roles.map((role) => `"${role}"`).join('->');
22
+ throw new Error(`Recursion encountered: role "${role.id}" already exists in tree path ${rolesStr}`);
23
+ }
24
+ parent = role.parent;
25
+ }
26
+ roles.reverse();
27
+ return roles;
28
+ }
@@ -1,2 +1,2 @@
1
1
  import type { Accountability, Permission, Query } from '@directus/types';
2
- export declare function withAppMinimalPermissions(accountability: Accountability | null, permissions: Permission[], filter: Query['filter']): Permission[];
2
+ export declare function withAppMinimalPermissions(accountability: Pick<Accountability, 'app'> | null, permissions: Permission[], filter: Query['filter']): Permission[];
@@ -0,0 +1,10 @@
1
+ import { appAccessMinimalPermissions } from '@directus/system-data';
2
+ import { cloneDeep } from 'lodash-es';
3
+ import { filterItems } from '../../utils/filter-items.js';
4
+ export function withAppMinimalPermissions(accountability, permissions, filter) {
5
+ if (accountability?.app === true) {
6
+ const filteredAppMinimalPermissions = cloneDeep(filterItems(appAccessMinimalPermissions, filter));
7
+ return [...permissions, ...filteredAppMinimalPermissions];
8
+ }
9
+ return permissions;
10
+ }
@@ -0,0 +1,7 @@
1
+ import type { Accountability, CollectionAccess } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ /**
4
+ * Get all permissions + minimal app permissions (if applicable) for the user + role in the current accountability.
5
+ * The permissions will be filtered by IP access.
6
+ */
7
+ export declare function fetchAccountabilityCollectionAccess(accountability: Pick<Accountability, 'user' | 'roles' | 'role' | 'ip' | 'admin' | 'app'>, context: Context): Promise<CollectionAccess>;
@@ -0,0 +1,56 @@
1
+ import { PERMISSION_ACTIONS } from '@directus/constants';
2
+ import { mapValues, uniq } from 'lodash-es';
3
+ import { fetchPermissions } from '../../lib/fetch-permissions.js';
4
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
5
+ /**
6
+ * Get all permissions + minimal app permissions (if applicable) for the user + role in the current accountability.
7
+ * The permissions will be filtered by IP access.
8
+ */
9
+ export async function fetchAccountabilityCollectionAccess(accountability, context) {
10
+ if (accountability.admin) {
11
+ return mapValues(context.schema.collections, () => Object.fromEntries(PERMISSION_ACTIONS.map((action) => [
12
+ action,
13
+ {
14
+ access: 'full',
15
+ fields: ['*'],
16
+ },
17
+ ])));
18
+ }
19
+ const policies = await fetchPolicies(accountability, context);
20
+ const permissions = await fetchPermissions({ policies, accountability }, context);
21
+ const infos = {};
22
+ for (const perm of permissions) {
23
+ // Ensure that collection is in infos
24
+ if (!infos[perm.collection]) {
25
+ infos[perm.collection] = {
26
+ read: { access: 'none' },
27
+ create: { access: 'none' },
28
+ update: { access: 'none' },
29
+ delete: { access: 'none' },
30
+ share: { access: 'none' },
31
+ };
32
+ }
33
+ // Ensure that action with default values is in collection infos
34
+ if (infos[perm.collection][perm.action]?.access === 'none') {
35
+ // If a permissions is iterated over it means that the user has access to it, so set access to 'full'
36
+ // Set access to 'full' initially and refine that whenever a permission with filters is encountered
37
+ infos[perm.collection][perm.action].access = 'full';
38
+ }
39
+ const info = infos[perm.collection][perm.action];
40
+ // Set access to 'partial' if the permission has filters, which means that the user has conditional access
41
+ if (info.access === 'full' && perm.permissions && Object.keys(perm.permissions).length > 0) {
42
+ info.access = 'partial';
43
+ }
44
+ if (perm.fields && info.fields?.[0] !== '*') {
45
+ info.fields = uniq([...(info.fields || []), ...(perm.fields || [])]);
46
+ if (info.fields.includes('*')) {
47
+ info.fields = ['*'];
48
+ }
49
+ }
50
+ if (perm.presets) {
51
+ info.presets = { ...(info.presets ?? {}), ...perm.presets };
52
+ }
53
+ }
54
+ // TODO Should fields by null, undefined or and empty array if no access?
55
+ return infos;
56
+ }
@@ -0,0 +1,3 @@
1
+ import type { Accountability, Globals } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ export declare function fetchAccountabilityPolicyGlobals(accountability: Pick<Accountability, 'user' | 'roles' | 'ip' | 'admin' | 'app'>, context: Context): Promise<Globals>;
@@ -0,0 +1,16 @@
1
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
2
+ export async function fetchAccountabilityPolicyGlobals(accountability, context) {
3
+ const policies = await fetchPolicies(accountability, context);
4
+ // Policies are already filtered down by the accountability IP, so we don't need to check it again
5
+ const result = await context.knex
6
+ .select(1)
7
+ .from('directus_policies')
8
+ .whereIn('id', policies)
9
+ .where('enforce_tfa', true)
10
+ .first();
11
+ return {
12
+ app_access: accountability.app,
13
+ admin_access: accountability.admin,
14
+ enforce_tfa: !!result,
15
+ };
16
+ }
@@ -0,0 +1,8 @@
1
+ import type { Accountability, PermissionsAction } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ export interface FetchAllowedCollectionsOptions {
4
+ action: PermissionsAction;
5
+ accountability: Pick<Accountability, 'user' | 'role' | 'roles' | 'ip' | 'admin' | 'app'>;
6
+ }
7
+ export declare const fetchAllowedCollections: typeof _fetchAllowedCollections;
8
+ export declare function _fetchAllowedCollections({ action, accountability }: FetchAllowedCollectionsOptions, { knex, schema }: Context): Promise<string[]>;
@@ -0,0 +1,24 @@
1
+ import { uniq } from 'lodash-es';
2
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
3
+ import { withCache } from '../../utils/with-cache.js';
4
+ import { fetchPermissions } from '../../lib/fetch-permissions.js';
5
+ export const fetchAllowedCollections = withCache('allowed-collections', _fetchAllowedCollections, ({ action, accountability: { user, role, roles, ip, admin, app } }) => ({
6
+ action,
7
+ accountability: {
8
+ user,
9
+ role,
10
+ roles,
11
+ ip,
12
+ admin,
13
+ app,
14
+ },
15
+ }));
16
+ export async function _fetchAllowedCollections({ action, accountability }, { knex, schema }) {
17
+ if (accountability.admin) {
18
+ return Object.keys(schema.collections);
19
+ }
20
+ const policies = await fetchPolicies(accountability, { knex, schema });
21
+ const permissions = await fetchPermissions({ action, policies, accountability }, { knex, schema });
22
+ const collections = permissions.map(({ collection }) => collection);
23
+ return uniq(collections);
24
+ }
@@ -0,0 +1,9 @@
1
+ import type { Accountability, PermissionsAction } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ export type FieldMap = Record<string, string[]>;
4
+ export interface FetchAllowedFieldMapOptions {
5
+ accountability: Pick<Accountability, 'user' | 'role' | 'roles' | 'ip' | 'admin' | 'app'>;
6
+ action: PermissionsAction;
7
+ }
8
+ export declare const fetchAllowedFieldMap: typeof _fetchAllowedFieldMap;
9
+ export declare function _fetchAllowedFieldMap({ accountability, action }: FetchAllowedFieldMapOptions, { knex, schema }: Context): Promise<FieldMap>;
@@ -0,0 +1,31 @@
1
+ import { uniq } from 'lodash-es';
2
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
3
+ import { withCache } from '../../utils/with-cache.js';
4
+ import { fetchPermissions } from '../../lib/fetch-permissions.js';
5
+ export const fetchAllowedFieldMap = withCache('allowed-field-map', _fetchAllowedFieldMap, ({ action, accountability: { user, role, roles, ip, admin, app } }) => ({
6
+ action,
7
+ accountability: { user, role, roles, ip, admin, app },
8
+ }));
9
+ export async function _fetchAllowedFieldMap({ accountability, action }, { knex, schema }) {
10
+ const fieldMap = {};
11
+ if (accountability.admin) {
12
+ for (const [collection, { fields }] of Object.entries(schema.collections)) {
13
+ fieldMap[collection] = Object.keys(fields);
14
+ }
15
+ return fieldMap;
16
+ }
17
+ const policies = await fetchPolicies(accountability, { knex, schema });
18
+ const permissions = await fetchPermissions({ action, policies, accountability }, { knex, schema });
19
+ for (const { collection, fields } of permissions) {
20
+ if (!fieldMap[collection]) {
21
+ fieldMap[collection] = [];
22
+ }
23
+ if (fields) {
24
+ fieldMap[collection].push(...fields);
25
+ }
26
+ }
27
+ for (const [collection, fields] of Object.entries(fieldMap)) {
28
+ fieldMap[collection] = uniq(fields);
29
+ }
30
+ return fieldMap;
31
+ }
@@ -0,0 +1,16 @@
1
+ import type { Accountability, PermissionsAction } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ export interface FetchAllowedFieldsOptions {
4
+ collection: string;
5
+ action: PermissionsAction;
6
+ accountability: Pick<Accountability, 'user' | 'role' | 'roles' | 'ip' | 'app'>;
7
+ }
8
+ export declare const fetchAllowedFields: typeof _fetchAllowedFields;
9
+ /**
10
+ * Look up all fields that are allowed to be used for the given collection and action for the given
11
+ * accountability object
12
+ *
13
+ * Done by looking up all available policies for the current accountability object, and reading all
14
+ * permissions that exist for the collection+action+policy combination
15
+ */
16
+ export declare function _fetchAllowedFields({ accountability, action, collection }: FetchAllowedFieldsOptions, { knex, schema }: Context): Promise<string[]>;
@@ -0,0 +1,27 @@
1
+ import { uniq } from 'lodash-es';
2
+ import { fetchPermissions } from '../../lib/fetch-permissions.js';
3
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
4
+ import { withCache } from '../../utils/with-cache.js';
5
+ export const fetchAllowedFields = withCache('allowed-fields', _fetchAllowedFields, ({ action, collection, accountability: { user, role, roles, ip, app } }) => ({
6
+ action,
7
+ collection,
8
+ accountability: { user, role, roles, ip, app },
9
+ }));
10
+ /**
11
+ * Look up all fields that are allowed to be used for the given collection and action for the given
12
+ * accountability object
13
+ *
14
+ * Done by looking up all available policies for the current accountability object, and reading all
15
+ * permissions that exist for the collection+action+policy combination
16
+ */
17
+ export async function _fetchAllowedFields({ accountability, action, collection }, { knex, schema }) {
18
+ const policies = await fetchPolicies(accountability, { knex, schema });
19
+ const permissions = await fetchPermissions({ action, collections: [collection], policies, accountability }, { knex, schema });
20
+ const allowedFields = [];
21
+ for (const { fields } of permissions) {
22
+ if (!fields)
23
+ continue;
24
+ allowedFields.push(...fields);
25
+ }
26
+ return uniq(allowedFields).filter((field) => field === '*' || field in (schema.collections[collection]?.fields ?? {}));
27
+ }
@@ -0,0 +1,10 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Knex } from 'knex';
3
+ import type { GlobalAccess } from './types.js';
4
+ export declare const fetchGlobalAccess: typeof _fetchGlobalAccess;
5
+ /**
6
+ * Fetch the global access (eg admin/app access) rules for the given roles, or roles+user combination
7
+ *
8
+ * Will fetch roles and user info separately so they can be cached and reused individually
9
+ */
10
+ export declare function _fetchGlobalAccess(accountability: Pick<Accountability, 'user' | 'roles' | 'ip'>, knex: Knex): Promise<GlobalAccess>;
@@ -0,0 +1,23 @@
1
+ import { withCache } from '../../utils/with-cache.js';
2
+ import { fetchGlobalAccessForRoles } from './lib/fetch-global-access-for-roles.js';
3
+ import { fetchGlobalAccessForUser } from './lib/fetch-global-access-for-user.js';
4
+ export const fetchGlobalAccess = withCache('global-access', _fetchGlobalAccess, ({ user, roles, ip }) => ({
5
+ user,
6
+ roles,
7
+ ip,
8
+ }));
9
+ /**
10
+ * Fetch the global access (eg admin/app access) rules for the given roles, or roles+user combination
11
+ *
12
+ * Will fetch roles and user info separately so they can be cached and reused individually
13
+ */
14
+ export async function _fetchGlobalAccess(accountability, knex) {
15
+ const access = await fetchGlobalAccessForRoles(accountability, knex);
16
+ if (accountability.user !== undefined) {
17
+ const userAccess = await fetchGlobalAccessForUser(accountability, knex);
18
+ // If app/admin is already true, keep it true
19
+ access.app ||= userAccess.app;
20
+ access.admin ||= userAccess.admin;
21
+ }
22
+ return access;
23
+ }
@@ -0,0 +1,5 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Knex } from 'knex';
3
+ import type { GlobalAccess } from '../types.js';
4
+ export declare const fetchGlobalAccessForRoles: typeof _fetchGlobalAccessForRoles;
5
+ export declare function _fetchGlobalAccessForRoles(accountability: Pick<Accountability, 'roles' | 'ip'>, knex: Knex): Promise<GlobalAccess>;
@@ -0,0 +1,7 @@
1
+ import { withCache } from '../../../utils/with-cache.js';
2
+ import { fetchGlobalAccessForQuery } from '../utils/fetch-global-access-for-query.js';
3
+ export const fetchGlobalAccessForRoles = withCache('global-access-role', _fetchGlobalAccessForRoles, ({ roles, ip }) => ({ roles, ip }));
4
+ export async function _fetchGlobalAccessForRoles(accountability, knex) {
5
+ const query = knex.where('role', 'in', accountability.roles);
6
+ return await fetchGlobalAccessForQuery(query, accountability);
7
+ }
@@ -0,0 +1,5 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Knex } from 'knex';
3
+ import type { GlobalAccess } from '../types.js';
4
+ export declare const fetchGlobalAccessForUser: typeof _fetchGlobalAccessForUser;
5
+ export declare function _fetchGlobalAccessForUser(accountability: Pick<Accountability, 'user' | 'ip'>, knex: Knex): Promise<GlobalAccess>;
@@ -0,0 +1,10 @@
1
+ import { withCache } from '../../../utils/with-cache.js';
2
+ import { fetchGlobalAccessForQuery } from '../utils/fetch-global-access-for-query.js';
3
+ export const fetchGlobalAccessForUser = withCache('global-access-user', _fetchGlobalAccessForUser, ({ user, ip }) => ({
4
+ user,
5
+ ip,
6
+ }));
7
+ export async function _fetchGlobalAccessForUser(accountability, knex) {
8
+ const query = knex.where('user', '=', accountability.user);
9
+ return await fetchGlobalAccessForQuery(query, accountability);
10
+ }
@@ -0,0 +1,4 @@
1
+ export interface GlobalAccess {
2
+ app: boolean;
3
+ admin: boolean;
4
+ }
@@ -0,0 +1,4 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Knex } from 'knex';
3
+ import type { GlobalAccess } from '../types.js';
4
+ export declare function fetchGlobalAccessForQuery(query: Knex.QueryBuilder<any, any[]>, accountability: Pick<Accountability, 'ip'>): Promise<GlobalAccess>;
@@ -0,0 +1,27 @@
1
+ import { toBoolean, toArray } from '@directus/utils';
2
+ import { ipInNetworks } from '../../../../utils/ip-in-networks.js';
3
+ export async function fetchGlobalAccessForQuery(query, accountability) {
4
+ const globalAccess = {
5
+ app: false,
6
+ admin: false,
7
+ };
8
+ const accessRows = await query
9
+ .select('directus_policies.admin_access', 'directus_policies.app_access', 'directus_policies.ip_access')
10
+ .from('directus_access')
11
+ // @NOTE: `where` clause comes from the caller
12
+ .leftJoin('directus_policies', 'directus_policies.id', 'directus_access.policy');
13
+ // Additively merge access permissions
14
+ for (const { admin_access, app_access, ip_access } of accessRows) {
15
+ if (accountability.ip && ip_access) {
16
+ // Skip row if IP is not in the allowed networks
17
+ const networks = toArray(ip_access);
18
+ if (!ipInNetworks(accountability.ip, networks))
19
+ continue;
20
+ }
21
+ globalAccess.admin ||= toBoolean(admin_access);
22
+ globalAccess.app ||= globalAccess.admin || toBoolean(app_access);
23
+ if (globalAccess.admin)
24
+ break;
25
+ }
26
+ return globalAccess;
27
+ }
@@ -0,0 +1,12 @@
1
+ import type { Accountability, PermissionsAction } from '@directus/types';
2
+ import type { Context } from '../../types.js';
3
+ export type FieldMap = Record<string, string[]>;
4
+ export interface FetchInconsistentFieldMapOptions {
5
+ accountability: Pick<Accountability, 'user' | 'role' | 'roles' | 'ip' | 'admin' | 'app'> | null;
6
+ action: PermissionsAction;
7
+ }
8
+ /**
9
+ * Fetch a field map for fields that may or may not be null based on item-by-item permissions.
10
+ */
11
+ export declare const fetchInconsistentFieldMap: typeof _fetchInconsistentFieldMap;
12
+ export declare function _fetchInconsistentFieldMap({ accountability, action }: FetchInconsistentFieldMapOptions, { knex, schema }: Context): Promise<FieldMap>;
@@ -0,0 +1,32 @@
1
+ import { uniq, intersection, difference, pick } from 'lodash-es';
2
+ import { fetchPolicies } from '../../lib/fetch-policies.js';
3
+ import { withCache } from '../../utils/with-cache.js';
4
+ import { fetchPermissions } from '../../lib/fetch-permissions.js';
5
+ /**
6
+ * Fetch a field map for fields that may or may not be null based on item-by-item permissions.
7
+ */
8
+ export const fetchInconsistentFieldMap = withCache('inconsistent-field-map', _fetchInconsistentFieldMap, ({ action, accountability }) => ({
9
+ action,
10
+ accountability: accountability ? pick(accountability, ['user', 'role', 'roles', 'ip', 'admin', 'app']) : null,
11
+ }));
12
+ export async function _fetchInconsistentFieldMap({ accountability, action }, { knex, schema }) {
13
+ const fieldMap = {};
14
+ if (!accountability || accountability.admin) {
15
+ for (const collection of Object.keys(schema.collections)) {
16
+ fieldMap[collection] = [];
17
+ }
18
+ return fieldMap;
19
+ }
20
+ const policies = await fetchPolicies(accountability, { knex, schema });
21
+ const permissions = await fetchPermissions({ action, policies, accountability }, { knex, schema });
22
+ const collections = uniq(permissions.map(({ collection }) => collection));
23
+ for (const collection of collections) {
24
+ const fields = permissions
25
+ .filter((permission) => permission.collection === collection)
26
+ .map((permission) => permission.fields ?? []);
27
+ const availableEverywhere = intersection(...fields);
28
+ const availableSomewhere = difference(uniq(fields.flat()), availableEverywhere);
29
+ fieldMap[collection] = availableSomewhere;
30
+ }
31
+ return fieldMap;
32
+ }
@@ -0,0 +1,4 @@
1
+ import type { Accountability } from '@directus/types';
2
+ import type { Knex } from 'knex';
3
+ export declare const fetchPoliciesIpAccess: typeof _fetchPoliciesIpAccess;
4
+ export declare function _fetchPoliciesIpAccess(accountability: Pick<Accountability, 'user' | 'roles'>, knex: Knex): Promise<string[][]>;