@murumets-ee/media 0.4.8 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/admin.d.mts.map +1 -1
- package/dist/admin.mjs +1 -1
- package/dist/admin.mjs.map +1 -1
- package/package.json +9 -14
package/dist/admin.d.mts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"admin.d.mts","names":[],"sources":["../src/admin/routes.ts"],"mappings":";;;;;;;;;;;;;;;;;;;;;;
|
|
1
|
+
{"version":3,"file":"admin.d.mts","names":[],"sources":["../src/admin/routes.ts"],"mappings":";;;;;;;;;;;;;;;;;;;;;;iBAmhBgB,WAAA,CAAA,GAAe,UAAA"}
|
package/dist/admin.mjs
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
const e=[`cover`,`contain`,`inside`,`outside`,`fill`],t=[`webp`,`jpeg`,`png`,`avif`];function n(n){for(let[r,i]of Object.entries(n)){if(typeof r!=`string`||r.length===0||!/^[a-z][a-z0-9_-]*$/.test(r))return{valid:!1,error:`Invalid style name "${r}": must be lowercase alphanumeric (a-z, 0-9, -, _)`};if(!i||typeof i!=`object`)return{valid:!1,error:`Style "${r}" must be an object`};let n=i;if(n.width!==void 0&&(typeof n.width!=`number`||n.width<=0))return{valid:!1,error:`Invalid width for style "${r}": must be a positive number`};if(n.height!==void 0&&(typeof n.height!=`number`||n.height<=0))return{valid:!1,error:`Invalid height for style "${r}": must be a positive number`};if(n.width===void 0&&n.height===void 0)return{valid:!1,error:`Style "${r}" must have at least width or height`};if(n.quality!==void 0&&(typeof n.quality!=`number`||n.quality<1||n.quality>100))return{valid:!1,error:`Invalid quality for style "${r}": must be 1-100`};if(n.fit!==void 0&&!e.includes(n.fit))return{valid:!1,error:`Invalid fit for style "${r}": must be one of ${e.join(`, `)}`};if(n.format!==void 0&&!t.includes(n.format))return{valid:!1,error:`Invalid format for style "${r}": must be one of ${t.join(`, `)}`}}return{valid:!0,styles:n}}const r=/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;function i(e){return r.test(e)}let a=null;async function o(){return a||=(async()=>{let{getApp:e}=await import(`@murumets-ee/core`),{createStorageClient:t}=await import(`@murumets-ee/storage`),{getStorageConfig:n}=await import(`@murumets-ee/storage/plugin`),r=e();return t(n(),{app:r})})(),a}async function s(){let{createAdminClient:e}=await import(`@murumets-ee/core/clients`),{MediaClient:t}=await import(`./client-B5gkUbdQ.mjs`),{Media:n}=await import(`./entity-DZFku8b7.mjs`),r=await o();return new t({admin:e(n),storage:r})}function c(e,t=200){return new Response(JSON.stringify(e),{status:t,headers:{"Content-Type":`application/json`}})}function l(e,t){return c({error:e},t)}async function u(e,{segments:t}){let{isStorageConfigured:n,getStorageConfigReason:r}=await import(`@murumets-ee/storage`);if(t.length===1&&t[0]===`settings`){let{getApp:e}=await import(`@murumets-ee/core`),{resolveImageStyles:t}=await import(`./resolve-image-styles-4f6J73QN.mjs`),n=e();return c({imageStyles:await t(n,n.logger)})}if(t.length===2&&t[1]===`usage`){let e=t[0];if(!i(e))return l(`Invalid media ID format`,400);let{findMediaUsages:n}=await import(`./usage-DIuiD9UM.mjs`),{getApp:r}=await import(`@murumets-ee/core`);return c({usages:await n(e,r().db.readWrite)})}if(!n()){let e=r()??`Storage not configured`;return t.length>0?c({error:e,configured:!1,reason:e},503):c({items:[],total:0,configured:!1,reason:e})}let a=await s();if(t.length>0){let e=t[0],n=await a.findById(e);if(!n)return l(`Media not found`,404);let r=await a.getUrl(e);return c({...n,url:r})}let o=new URL(e.url),u=o.searchParams.get(`search`)??void 0,d=o.searchParams.get(`mediaType`)??void 0,f=Math.min(Math.max(Number(o.searchParams.get(`limit`))||24,1),100),p=Math.max(Number(o.searchParams.get(`offset`))||0,0),m=await a.findMany({search:u,mediaType:d,limit:f,offset:p}),h=m.items.map(e=>e.id),[g,_]=await Promise.all([a.getUrls(h),a.getVariantUrls(h,`thumbnail`)]);return c({items:m.items.map(e=>({id:e.id,title:e.title??null,alt:e.alt??null,filename:e.filename,mimeType:e.mimeType,size:e.size,mediaType:e.mediaType,url:g.get(e.id)??``,thumbnailUrl:_.get(e.id),width:e.width??null,height:e.height??null})),total:m.total})}async function d(e,{segments:t,user:r,audit:i,checkPermission:a}){let{isStorageConfigured:o,getStorageConfigReason:u}=await import(`@murumets-ee/storage`);if(t.length===1&&t[0]===`regenerate-variants`){if(!a(`media`,`create`))return l(`Forbidden: media create permission required for variant regeneration`,403);if(!o())return l(u()??`Storage not configured`,503);let{regenerateAllVariants:e}=await import(`./regenerate-variants-BFnFcnxm.mjs`),{getApp:t}=await import(`@murumets-ee/core`),{resolveImageStyles:
|
|
1
|
+
const e=[`cover`,`contain`,`inside`,`outside`,`fill`],t=[`webp`,`jpeg`,`png`,`avif`];function n(n){for(let[r,i]of Object.entries(n)){if(typeof r!=`string`||r.length===0||!/^[a-z][a-z0-9_-]*$/.test(r))return{valid:!1,error:`Invalid style name "${r}": must be lowercase alphanumeric (a-z, 0-9, -, _)`};if(!i||typeof i!=`object`)return{valid:!1,error:`Style "${r}" must be an object`};let n=i;if(n.width!==void 0&&(typeof n.width!=`number`||n.width<=0))return{valid:!1,error:`Invalid width for style "${r}": must be a positive number`};if(n.height!==void 0&&(typeof n.height!=`number`||n.height<=0))return{valid:!1,error:`Invalid height for style "${r}": must be a positive number`};if(n.width===void 0&&n.height===void 0)return{valid:!1,error:`Style "${r}" must have at least width or height`};if(n.quality!==void 0&&(typeof n.quality!=`number`||n.quality<1||n.quality>100))return{valid:!1,error:`Invalid quality for style "${r}": must be 1-100`};if(n.fit!==void 0&&!e.includes(n.fit))return{valid:!1,error:`Invalid fit for style "${r}": must be one of ${e.join(`, `)}`};if(n.format!==void 0&&!t.includes(n.format))return{valid:!1,error:`Invalid format for style "${r}": must be one of ${t.join(`, `)}`}}return{valid:!0,styles:n}}const r=/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;function i(e){return r.test(e)}let a=null;async function o(){return a||=(async()=>{let{getApp:e}=await import(`@murumets-ee/core`),{createStorageClient:t}=await import(`@murumets-ee/storage`),{getStorageConfig:n}=await import(`@murumets-ee/storage/plugin`),r=e();return t(n(),{app:r})})(),a}async function s(){let{createAdminClient:e}=await import(`@murumets-ee/core/clients`),{MediaClient:t}=await import(`./client-B5gkUbdQ.mjs`),{Media:n}=await import(`./entity-DZFku8b7.mjs`),r=await o();return new t({admin:e(n),storage:r})}function c(e,t=200){return new Response(JSON.stringify(e),{status:t,headers:{"Content-Type":`application/json`}})}function l(e,t){return c({error:e},t)}async function u(e,{segments:t}){let{isStorageConfigured:n,getStorageConfigReason:r}=await import(`@murumets-ee/storage`);if(t.length===1&&t[0]===`settings`){let{getApp:e}=await import(`@murumets-ee/core`),{resolveImageStyles:t}=await import(`./resolve-image-styles-4f6J73QN.mjs`),n=e();return c({imageStyles:await t(n,n.logger)})}if(t.length===2&&t[1]===`usage`){let e=t[0];if(!i(e))return l(`Invalid media ID format`,400);let{findMediaUsages:n}=await import(`./usage-DIuiD9UM.mjs`),{getApp:r}=await import(`@murumets-ee/core`);return c({usages:await n(e,r().db.readWrite)})}if(!n()){let e=r()??`Storage not configured`;return t.length>0?c({error:e,configured:!1,reason:e},503):c({items:[],total:0,configured:!1,reason:e})}let a=await s();if(t.length>0){let e=t[0],n=await a.findById(e);if(!n)return l(`Media not found`,404);let r=await a.getUrl(e);return c({...n,url:r})}let o=new URL(e.url),u=o.searchParams.get(`search`)??void 0,d=o.searchParams.get(`mediaType`)??void 0,f=Math.min(Math.max(Number(o.searchParams.get(`limit`))||24,1),100),p=Math.max(Number(o.searchParams.get(`offset`))||0,0),m=await a.findMany({search:u,mediaType:d,limit:f,offset:p}),h=m.items.map(e=>e.id),[g,_]=await Promise.all([a.getUrls(h),a.getVariantUrls(h,`thumbnail`)]);return c({items:m.items.map(e=>({id:e.id,title:e.title??null,alt:e.alt??null,filename:e.filename,mimeType:e.mimeType,size:e.size,mediaType:e.mediaType,url:g.get(e.id)??``,thumbnailUrl:_.get(e.id),width:e.width??null,height:e.height??null})),total:m.total})}async function d(e,{segments:t,user:r,audit:i,checkPermission:a}){let{isStorageConfigured:o,getStorageConfigReason:u}=await import(`@murumets-ee/storage`);if(t.length===1&&t[0]===`regenerate-variants`){if(!a(`media`,`create`))return l(`Forbidden: media create permission required for variant regeneration`,403);if(!o())return l(u()??`Storage not configured`,503);let{regenerateAllVariants:e}=await import(`./regenerate-variants-BFnFcnxm.mjs`),{getApp:t,getContext:n}=await import(`@murumets-ee/core`),{resolveImageStyles:s}=await import(`./resolve-image-styles-4f6J73QN.mjs`),{createStorageClient:d}=await import(`@murumets-ee/storage`),{getStorageConfig:f}=await import(`@murumets-ee/storage/plugin`),p=t(),m=await s(p,p.logger);if(!m||Object.keys(m).length===0)return l(`No image styles configured`,400);let h=d(f(),{app:p}),g=await e({db:p.db.readWrite,storage:h,logger:p.logger.child({media:!0}),styles:m,contextResolver:()=>{let e=n();if(!(!e?.user||!e?.checker))return{user:e.user,checker:e.checker,scope:e.scope}}});return i?.({action:`media.regenerate_variants`,userId:r.id,userName:r.name,metadata:{total:g.total,processed:g.processed,errors:g.errors}}),c(g)}if(t.length===1&&t[0]===`settings`){if(!a(`media`,`create`))return l(`Forbidden: media create permission required for image style management`,403);let t=await e.json();if(!t.imageStyles||typeof t.imageStyles!=`object`)return l(`Body must contain "imageStyles" object`,400);let u=n(t.imageStyles);if(!u.valid)return l(u.error,400);let{createSettingsClient:d}=await import(`@murumets-ee/settings`),{imageStylesSettings:f}=await import(`./image-styles-settings-5zpGEfKG.mjs`),{getApp:p}=await import(`@murumets-ee/core`);return await d(f,{app:p()}).set(`imageStyles`,u.styles),o()&&(await s()).invalidateImageStylesCache(),i?.({action:`media.settings.update`,entityType:`settings`,userId:r.id,userName:r.name,changes:{imageStyles:u.styles}}),c({imageStyles:u.styles})}if(!a(`media`,`create`))return l(`Forbidden: media create permission required for upload`,403);if(!o())return l(u()??`Storage not configured`,503);let d=await s(),f=(await e.formData()).get(`file`);if(!f||f.size===0)return l(`No file provided`,400);if(f.size>50*1024*1024)return l(`File too large: ${(f.size/1024/1024).toFixed(1)} MB exceeds 50 MB limit`,400);let p=Buffer.from(await f.arrayBuffer()),{detectMimeType:m}=await import(`@murumets-ee/storage`),{mimeType:h,mismatch:g}=await m(p,f.type||`application/octet-stream`);if(g)return l(`File content doesn't match declared type: claimed ${f.type}, detected ${h}`,400);let _=await d.upload(p,{filename:f.name,mimeType:h,size:f.size,uploadedBy:r.id}),v={id:_.media.id,title:_.media.title??null,alt:_.media.alt??null,filename:_.media.filename,mimeType:_.media.mimeType,size:_.media.size,mediaType:_.media.mediaType,url:_.url,width:_.media.width??null,height:_.media.height??null};return i?.({action:`media.upload`,entityType:`media`,entityId:_.media.id,userId:r.id,userName:r.name,changes:{filename:_.media.filename,mimeType:_.media.mimeType,size:_.media.size,mediaType:_.media.mediaType}}),c(v,201)}async function f(e,{segments:t,user:n,audit:r,checkPermission:a}){if(!a(`media`,`delete`))return l(`Forbidden: media delete permission required`,403);if(t.length===0)return l(`Media ID required`,400);let o=t[0];if(!i(o))return l(`Invalid media ID format`,400);let{isStorageConfigured:u,getStorageConfigReason:d}=await import(`@murumets-ee/storage`);return u()?(await(await s()).delete(o),r?.({action:`media.delete`,entityType:`media`,entityId:o,userId:n.id,userName:n.name}),c({deleted:1})):l(d()??`Storage not configured`,503)}function p(){return{prefix:`media`,resource:`media`,actions:[`view`,`create`,`update`,`delete`],handlers:{GET:u,POST:d,DELETE:f}}}export{p as mediaRoutes};
|
|
2
2
|
//# sourceMappingURL=admin.mjs.map
|
package/dist/admin.mjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"admin.mjs","names":[],"sources":["../src/admin/routes.ts"],"sourcesContent":["/**\n * Media admin routes for the centralized admin API handler.\n *\n * Provides media-specific operations: upload, URL resolution, delete with storage cleanup,\n * image style settings, and variant regeneration.\n *\n * Standard entity CRUD (PATCH with translations) falls through to the generic entity\n * handler — add `Media` to the `entities` array in your handler config.\n *\n * @example\n * ```typescript\n * import { createAdminApiHandler } from '@murumets-ee/admin-ui/server'\n * import { mediaRoutes } from '@murumets-ee/media/admin'\n * import { Media } from '@murumets-ee/media'\n *\n * const handler = createAdminApiHandler({\n * authenticate: async (req) => { ... },\n * entities: [Article, Media],\n * routes: [mediaRoutes()],\n * })\n * ```\n */\n\nimport type { AdminRoute, AuditLogFn, AuthUser } from '@murumets-ee/core'\nimport type { MediaClient } from '../client.js'\nimport type { MediaPickerItem, MediaPickerListResult } from '../picker/types.js'\nimport type { ImageStyle } from '../types.js'\n\n// ---------------------------------------------------------------------------\n// Image style validation\n// ---------------------------------------------------------------------------\n\nconst VALID_FIT = ['cover', 'contain', 'inside', 'outside', 'fill'] as const\nconst VALID_FORMAT = ['webp', 'jpeg', 'png', 'avif'] as const\n\nfunction validateImageStyles(\n styles: Record<string, unknown>,\n): { valid: true; styles: Record<string, ImageStyle> } | { valid: false; error: string } {\n for (const [name, raw] of Object.entries(styles)) {\n if (typeof name !== 'string' || name.length === 0 || !/^[a-z][a-z0-9_-]*$/.test(name)) {\n return {\n valid: false,\n error: `Invalid style name \"${name}\": must be lowercase alphanumeric (a-z, 0-9, -, _)`,\n }\n }\n if (!raw || typeof raw !== 'object') {\n return { valid: false, error: `Style \"${name}\" must be an object` }\n }\n const style = raw as Record<string, unknown>\n if (style.width !== undefined && (typeof style.width !== 'number' || style.width <= 0)) {\n return { valid: false, error: `Invalid width for style \"${name}\": must be a positive number` }\n }\n if (style.height !== undefined && (typeof style.height !== 'number' || style.height <= 0)) {\n return {\n valid: false,\n error: `Invalid height for style \"${name}\": must be a positive number`,\n }\n }\n if (style.width === undefined && style.height === undefined) {\n return { valid: false, error: `Style \"${name}\" must have at least width or height` }\n }\n if (\n style.quality !== undefined &&\n (typeof style.quality !== 'number' || style.quality < 1 || style.quality > 100)\n ) {\n return { valid: false, error: `Invalid quality for style \"${name}\": must be 1-100` }\n }\n if (\n style.fit !== undefined &&\n !(VALID_FIT as readonly string[]).includes(style.fit as string)\n ) {\n return {\n valid: false,\n error: `Invalid fit for style \"${name}\": must be one of ${VALID_FIT.join(', ')}`,\n }\n }\n if (\n style.format !== undefined &&\n !(VALID_FORMAT as readonly string[]).includes(style.format as string)\n ) {\n return {\n valid: false,\n error: `Invalid format for style \"${name}\": must be one of ${VALID_FORMAT.join(', ')}`,\n }\n }\n }\n return { valid: true, styles: styles as Record<string, ImageStyle> }\n}\n\n// ---------------------------------------------------------------------------\n// Validation\n// ---------------------------------------------------------------------------\n\nconst UUID_RE = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i\n\nfunction isValidUuid(value: string): boolean {\n return UUID_RE.test(value)\n}\n\n// ---------------------------------------------------------------------------\n// Per-request MediaClient factory\n// ---------------------------------------------------------------------------\n//\n// MediaClient and its AdminClient MUST be built per-request — AdminClient's\n// context resolver is captured eagerly at construction (see\n// buildContextResolver in @murumets-ee/core/clients). A module-level singleton\n// would bake the first request's user + tenant scope into every subsequent\n// request's writes — a cross-request permission/scope leak.\n//\n// Storage config is process-global and safe to cache once.\n\nlet storagePromise: Promise<Awaited<ReturnType<typeof import('@murumets-ee/storage').createStorageClient>>> | null = null\n\nasync function getStorage() {\n if (!storagePromise) {\n storagePromise = (async () => {\n const { getApp } = await import('@murumets-ee/core')\n const { createStorageClient } = await import('@murumets-ee/storage')\n const { getStorageConfig } = await import('@murumets-ee/storage/plugin')\n const app = getApp()\n return createStorageClient(getStorageConfig(), { app })\n })()\n }\n return storagePromise\n}\n\nasync function getClient(): Promise<MediaClient> {\n const { createAdminClient } = await import('@murumets-ee/core/clients')\n const { MediaClient } = await import('../client.js')\n const { Media } = await import('../entity.js')\n const storage = await getStorage()\n const admin = createAdminClient(Media)\n return new MediaClient({ admin, storage })\n}\n\n// ---------------------------------------------------------------------------\n// Response helpers\n// ---------------------------------------------------------------------------\n\nfunction json(data: unknown, status = 200) {\n return new Response(JSON.stringify(data), {\n status,\n headers: { 'Content-Type': 'application/json' },\n })\n}\n\nfunction errorJson(message: string, status: number) {\n return json({ error: message }, status)\n}\n\n// ---------------------------------------------------------------------------\n// Handlers\n// ---------------------------------------------------------------------------\n\nasync function handleGet(\n req: Request,\n { segments }: { segments: string[]; user: AuthUser; audit?: AuditLogFn },\n): Promise<Response> {\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n\n // GET /media/settings — no storage access needed, only DB + config.\n // Keep working even when storage is disabled so admins can still\n // review / edit image styles.\n if (segments.length === 1 && segments[0] === 'settings') {\n const { getApp } = await import('@murumets-ee/core')\n const { resolveImageStyles } = await import('../resolve-image-styles.js')\n const app = getApp()\n const styles = await resolveImageStyles(app, app.logger)\n return json({ imageStyles: styles })\n }\n\n // GET /media/:id/usage — DB-only lookup, also safe without storage.\n if (segments.length === 2 && segments[1] === 'usage') {\n const id = segments[0]\n if (!isValidUuid(id)) return errorJson('Invalid media ID format', 400)\n\n const { findMediaUsages } = await import('../usage.js')\n const { getApp } = await import('@murumets-ee/core')\n const app = getApp()\n const usages = await findMediaUsages(id, app.db.readWrite)\n return json({ usages })\n }\n\n // Everything below needs a working storage client. If env isn't wired,\n // return a structured \"disabled\" response rather than a 500 — the\n // media list page renders a banner and new admins can finish onboarding\n // without being blocked on a crash loop.\n if (!isStorageConfigured()) {\n const reason = getStorageConfigReason() ?? 'Storage not configured'\n if (segments.length > 0) {\n // Single item / other sub-paths — treat as not-found-ish to avoid\n // leaking existence; include reason so the UI can surface it.\n return json(\n { error: reason, configured: false, reason },\n 503,\n )\n }\n // GET /media — empty list + disabled flag for the picker's banner.\n const response: MediaPickerListResult & { configured: false; reason: string } = {\n items: [],\n total: 0,\n configured: false,\n reason,\n }\n return json(response)\n }\n\n const client = await getClient()\n\n // GET /media/:id — single item with URL (full record for EntityForm + picker)\n if (segments.length > 0) {\n const id = segments[0]\n const record = await client.findById(id)\n if (!record) return errorJson('Media not found', 404)\n\n const url = await client.getUrl(id)\n return json({ ...record, url })\n }\n\n // GET /media — list with search/filter + batch URL resolution\n const url = new URL(req.url)\n const search = url.searchParams.get('search') ?? undefined\n const mediaType = url.searchParams.get('mediaType') ?? undefined\n const limit = Math.min(Math.max(Number(url.searchParams.get('limit')) || 24, 1), 100)\n const offset = Math.max(Number(url.searchParams.get('offset')) || 0, 0)\n\n const result = await client.findMany({\n search,\n mediaType: mediaType as 'image' | 'video' | 'audio' | 'document' | 'other' | undefined,\n limit,\n offset,\n })\n\n // Resolve original URLs + thumbnail variant URLs for all items\n const ids = result.items.map((item) => item.id)\n const [urlMap, thumbMap] = await Promise.all([\n client.getUrls(ids),\n client.getVariantUrls(ids, 'thumbnail'),\n ])\n\n const items: (MediaPickerItem & { thumbnailUrl?: string })[] = result.items.map((item) => ({\n id: item.id,\n title: item.title ?? null,\n alt: item.alt ?? null,\n filename: item.filename,\n mimeType: item.mimeType,\n size: item.size,\n mediaType: item.mediaType,\n url: urlMap.get(item.id) ?? '',\n thumbnailUrl: thumbMap.get(item.id),\n width: item.width ?? null,\n height: item.height ?? null,\n }))\n\n const response: MediaPickerListResult = { items, total: result.total }\n return json(response)\n}\n\nasync function handlePost(\n req: Request,\n {\n segments,\n user,\n audit,\n checkPermission,\n }: {\n segments: string[]\n user: AuthUser\n audit?: AuditLogFn\n checkPermission: (resource: string, action: string) => boolean\n },\n): Promise<Response> {\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n\n // POST /media/settings — image-style editing doesn't touch storage,\n // allow it even when storage is disabled so admins can prep styles\n // ahead of wiring the bucket.\n // (Handled further down — gate only the storage-touching branches.)\n\n // POST /media/regenerate-variants — creates new variant files.\n // Framework-level gate already requires 'media.create' (METHOD_TO_ACTION maps POST → create),\n // so we don't need a redundant handler check here. Leaving a brief assert for defence-in-depth.\n if (segments.length === 1 && segments[0] === 'regenerate-variants') {\n if (!checkPermission('media', 'create')) {\n return errorJson('Forbidden: media create permission required for variant regeneration', 403)\n }\n if (!isStorageConfigured()) {\n return errorJson(\n getStorageConfigReason() ?? 'Storage not configured',\n 503,\n )\n }\n\n const { regenerateAllVariants } = await import('../regenerate-variants.js')\n const { getApp } = await import('@murumets-ee/core')\n const { resolveImageStyles } = await import('../resolve-image-styles.js')\n const { createStorageClient } = await import('@murumets-ee/storage')\n const { getStorageConfig } = await import('@murumets-ee/storage/plugin')\n\n const app = getApp()\n const styles = await resolveImageStyles(app, app.logger)\n if (!styles || Object.keys(styles).length === 0) {\n return errorJson('No image styles configured', 400)\n }\n\n const storageConfig = getStorageConfig()\n const storage = createStorageClient(storageConfig, { app })\n\n const result = await regenerateAllVariants({\n db: app.db.readWrite,\n storage,\n logger: app.logger.child({ media: true }),\n styles,\n })\n\n audit?.({\n action: 'media.regenerate_variants',\n userId: user.id,\n userName: user.name,\n metadata: { total: result.total, processed: result.processed, errors: result.errors },\n })\n\n return json(result)\n }\n\n // POST /media/settings — manages image style definitions.\n // Framework-level gate (POST → media.create) already enforces access.\n if (segments.length === 1 && segments[0] === 'settings') {\n if (!checkPermission('media', 'create')) {\n return errorJson(\n 'Forbidden: media create permission required for image style management',\n 403,\n )\n }\n\n const body = (await req.json()) as { imageStyles?: Record<string, unknown> }\n if (!body.imageStyles || typeof body.imageStyles !== 'object') {\n return errorJson('Body must contain \"imageStyles\" object', 400)\n }\n\n const validation = validateImageStyles(body.imageStyles)\n if (!validation.valid) {\n return errorJson(validation.error, 400)\n }\n\n const { createSettingsClient } = await import('@murumets-ee/settings')\n const { imageStylesSettings } = await import('../image-styles-settings.js')\n const { getApp } = await import('@murumets-ee/core')\n const app = getApp()\n const settingsClient = createSettingsClient(imageStylesSettings, { app })\n await settingsClient.set('imageStyles', validation.styles)\n\n // Invalidate cached styles on the MediaClient singleton — only\n // possible when storage is configured (MediaClient construction\n // requires a StorageClient, which requires env). When disabled,\n // there's no cache to invalidate and the settings write is still\n // valid; the next upload after config lands will see fresh styles.\n if (isStorageConfigured()) {\n const client = await getClient()\n client.invalidateImageStylesCache()\n }\n\n audit?.({\n action: 'media.settings.update',\n entityType: 'settings',\n userId: user.id,\n userName: user.name,\n changes: { imageStyles: validation.styles },\n })\n\n return json({ imageStyles: validation.styles })\n }\n\n // POST /media — upload file (requires media create permission)\n if (!checkPermission('media', 'create')) {\n return errorJson('Forbidden: media create permission required for upload', 403)\n }\n if (!isStorageConfigured()) {\n return errorJson(\n getStorageConfigReason() ?? 'Storage not configured',\n 503,\n )\n }\n\n const client = await getClient()\n\n const formData = await req.formData()\n const file = formData.get('file') as File | null\n if (!file || file.size === 0) {\n return errorJson('No file provided', 400)\n }\n\n // Guard against oversized uploads (50 MB limit)\n const MAX_UPLOAD_SIZE = 50 * 1024 * 1024\n if (file.size > MAX_UPLOAD_SIZE) {\n return errorJson(\n `File too large: ${(file.size / 1024 / 1024).toFixed(1)} MB exceeds 50 MB limit`,\n 400,\n )\n }\n\n const buffer = Buffer.from(await file.arrayBuffer())\n\n // Detect actual MIME type from file content (prevents spoofing)\n const { detectMimeType } = await import('@murumets-ee/storage')\n const { mimeType, mismatch } = await detectMimeType(\n buffer,\n file.type || 'application/octet-stream',\n )\n if (mismatch) {\n return errorJson(\n `File content doesn't match declared type: claimed ${file.type}, detected ${mimeType}`,\n 400,\n )\n }\n\n const result = await client.upload(buffer, {\n filename: file.name,\n mimeType,\n size: file.size,\n uploadedBy: user.id,\n })\n\n const item: MediaPickerItem = {\n id: result.media.id,\n title: result.media.title ?? null,\n alt: result.media.alt ?? null,\n filename: result.media.filename,\n mimeType: result.media.mimeType,\n size: result.media.size,\n mediaType: result.media.mediaType,\n url: result.url,\n width: result.media.width ?? null,\n height: result.media.height ?? null,\n }\n\n audit?.({\n action: 'media.upload',\n entityType: 'media',\n entityId: result.media.id,\n userId: user.id,\n userName: user.name,\n changes: {\n filename: result.media.filename,\n mimeType: result.media.mimeType,\n size: result.media.size,\n mediaType: result.media.mediaType,\n },\n })\n\n return json(item, 201)\n}\n\nasync function handleDelete(\n _req: Request,\n {\n segments,\n user,\n audit,\n checkPermission,\n }: {\n segments: string[]\n user: AuthUser\n audit?: AuditLogFn\n checkPermission: (resource: string, action: string) => boolean\n },\n): Promise<Response> {\n if (!checkPermission('media', 'delete')) {\n return errorJson('Forbidden: media delete permission required', 403)\n }\n\n if (segments.length === 0) {\n return errorJson('Media ID required', 400)\n }\n\n const id = segments[0]\n if (!isValidUuid(id)) return errorJson('Invalid media ID format', 400)\n\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n if (!isStorageConfigured()) {\n // Can't safely delete — MediaClient needs storage to remove the\n // actual object, and partial delete (DB row gone, object orphaned)\n // would leak storage. Surface the reason so the UI can display it.\n return errorJson(getStorageConfigReason() ?? 'Storage not configured', 503)\n }\n\n // AdminClient.delete() checks entity_refs and throws ReferencedEntityError\n // if this media is still referenced. The error bubbles to the caller's\n // error handler which returns 409 with usage details.\n const client = await getClient()\n await client.delete(id)\n\n audit?.({\n action: 'media.delete',\n entityType: 'media',\n entityId: id,\n userId: user.id,\n userName: user.name,\n })\n\n return json({ deleted: 1 })\n}\n\n// ---------------------------------------------------------------------------\n// Route factory\n// ---------------------------------------------------------------------------\n\n/**\n * Create admin API routes for media-specific operations.\n *\n * Standard entity CRUD (PATCH with translations) is handled by the generic entity\n * handler — add `Media` to the `entities` array in your handler config.\n *\n * Routes handled by this plugin:\n * - `GET /api/admin/media` — List media with search/filter + URLs\n * - `GET /api/admin/media/settings` — Get current image styles\n * - `GET /api/admin/media/:id` — Get single media item with URL\n * - `GET /api/admin/media/:id/usage` — Find entities referencing this media\n * - `POST /api/admin/media` — Upload file (FormData with `file` field)\n * - `POST /api/admin/media/settings` — Save image styles (admin only)\n * - `POST /api/admin/media/regenerate-variants` — Regenerate all image variants (admin only)\n * - `DELETE /api/admin/media/:id` — Delete media + storage file (blocked if in use)\n *\n * Routes handled by generic entity handler (via fallthrough):\n * - `PATCH /api/admin/media/:id` — Update metadata with translation support\n */\nexport function mediaRoutes(): AdminRoute {\n return {\n prefix: 'media',\n resource: 'media',\n actions: ['view', 'create', 'update', 'delete'],\n handlers: {\n GET: handleGet,\n POST: handlePost,\n DELETE: handleDelete,\n },\n }\n}\n"],"mappings":"AAgCA,MAAM,EAAY,CAAC,QAAS,UAAW,SAAU,UAAW,OAAO,CAC7D,EAAe,CAAC,OAAQ,OAAQ,MAAO,OAAO,CAEpD,SAAS,EACP,EACuF,CACvF,IAAK,GAAM,CAAC,EAAM,KAAQ,OAAO,QAAQ,EAAO,CAAE,CAChD,GAAI,OAAO,GAAS,UAAY,EAAK,SAAW,GAAK,CAAC,qBAAqB,KAAK,EAAK,CACnF,MAAO,CACL,MAAO,GACP,MAAO,uBAAuB,EAAK,oDACpC,CAEH,GAAI,CAAC,GAAO,OAAO,GAAQ,SACzB,MAAO,CAAE,MAAO,GAAO,MAAO,UAAU,EAAK,qBAAsB,CAErE,IAAM,EAAQ,EACd,GAAI,EAAM,QAAU,IAAA,KAAc,OAAO,EAAM,OAAU,UAAY,EAAM,OAAS,GAClF,MAAO,CAAE,MAAO,GAAO,MAAO,4BAA4B,EAAK,8BAA+B,CAEhG,GAAI,EAAM,SAAW,IAAA,KAAc,OAAO,EAAM,QAAW,UAAY,EAAM,QAAU,GACrF,MAAO,CACL,MAAO,GACP,MAAO,6BAA6B,EAAK,8BAC1C,CAEH,GAAI,EAAM,QAAU,IAAA,IAAa,EAAM,SAAW,IAAA,GAChD,MAAO,CAAE,MAAO,GAAO,MAAO,UAAU,EAAK,sCAAuC,CAEtF,GACE,EAAM,UAAY,IAAA,KACjB,OAAO,EAAM,SAAY,UAAY,EAAM,QAAU,GAAK,EAAM,QAAU,KAE3E,MAAO,CAAE,MAAO,GAAO,MAAO,8BAA8B,EAAK,kBAAmB,CAEtF,GACE,EAAM,MAAQ,IAAA,IACd,CAAE,EAAgC,SAAS,EAAM,IAAc,CAE/D,MAAO,CACL,MAAO,GACP,MAAO,0BAA0B,EAAK,oBAAoB,EAAU,KAAK,KAAK,GAC/E,CAEH,GACE,EAAM,SAAW,IAAA,IACjB,CAAE,EAAmC,SAAS,EAAM,OAAiB,CAErE,MAAO,CACL,MAAO,GACP,MAAO,6BAA6B,EAAK,oBAAoB,EAAa,KAAK,KAAK,GACrF,CAGL,MAAO,CAAE,MAAO,GAAc,SAAsC,CAOtE,MAAM,EAAU,kEAEhB,SAAS,EAAY,EAAwB,CAC3C,OAAO,EAAQ,KAAK,EAAM,CAe5B,IAAI,EAAiH,KAErH,eAAe,GAAa,CAU1B,MATA,CACE,KAAkB,SAAY,CAC5B,GAAM,CAAE,UAAW,MAAM,OAAO,qBAC1B,CAAE,uBAAwB,MAAM,OAAO,wBACvC,CAAE,oBAAqB,MAAM,OAAO,+BACpC,EAAM,GAAQ,CACpB,OAAO,EAAoB,GAAkB,CAAE,CAAE,MAAK,CAAC,IACrD,CAEC,EAGT,eAAe,GAAkC,CAC/C,GAAM,CAAE,qBAAsB,MAAM,OAAO,6BACrC,CAAE,eAAgB,MAAM,OAAO,yBAC/B,CAAE,SAAU,MAAM,OAAO,yBACzB,EAAU,MAAM,GAAY,CAElC,OAAO,IAAI,EAAY,CAAE,MADX,EAAkB,EAAM,CACN,UAAS,CAAC,CAO5C,SAAS,EAAK,EAAe,EAAS,IAAK,CACzC,OAAO,IAAI,SAAS,KAAK,UAAU,EAAK,CAAE,CACxC,SACA,QAAS,CAAE,eAAgB,mBAAoB,CAChD,CAAC,CAGJ,SAAS,EAAU,EAAiB,EAAgB,CAClD,OAAO,EAAK,CAAE,MAAO,EAAS,CAAE,EAAO,CAOzC,eAAe,EACb,EACA,CAAE,YACiB,CACnB,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAKrE,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,WAAY,CACvD,GAAM,CAAE,UAAW,MAAM,OAAO,qBAC1B,CAAE,sBAAuB,MAAM,OAAO,uCACtC,EAAM,GAAQ,CAEpB,OAAO,EAAK,CAAE,YADC,MAAM,EAAmB,EAAK,EAAI,OAAO,CACrB,CAAC,CAItC,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,QAAS,CACpD,IAAM,EAAK,EAAS,GACpB,GAAI,CAAC,EAAY,EAAG,CAAE,OAAO,EAAU,0BAA2B,IAAI,CAEtE,GAAM,CAAE,mBAAoB,MAAM,OAAO,wBACnC,CAAE,UAAW,MAAM,OAAO,qBAGhC,OAAO,EAAK,CAAE,OADC,MAAM,EAAgB,EADzB,GAAQ,CACyB,GAAG,UAAU,CACpC,CAAC,CAOzB,GAAI,CAAC,GAAqB,CAAE,CAC1B,IAAM,EAAS,GAAwB,EAAI,yBAgB3C,OAfI,EAAS,OAAS,EAGb,EACL,CAAE,MAAO,EAAQ,WAAY,GAAO,SAAQ,CAC5C,IACD,CASI,EANyE,CAC9E,MAAO,EAAE,CACT,MAAO,EACP,WAAY,GACZ,SACD,CACoB,CAGvB,IAAM,EAAS,MAAM,GAAW,CAGhC,GAAI,EAAS,OAAS,EAAG,CACvB,IAAM,EAAK,EAAS,GACd,EAAS,MAAM,EAAO,SAAS,EAAG,CACxC,GAAI,CAAC,EAAQ,OAAO,EAAU,kBAAmB,IAAI,CAErD,IAAM,EAAM,MAAM,EAAO,OAAO,EAAG,CACnC,OAAO,EAAK,CAAE,GAAG,EAAQ,MAAK,CAAC,CAIjC,IAAM,EAAM,IAAI,IAAI,EAAI,IAAI,CACtB,EAAS,EAAI,aAAa,IAAI,SAAS,EAAI,IAAA,GAC3C,EAAY,EAAI,aAAa,IAAI,YAAY,EAAI,IAAA,GACjD,EAAQ,KAAK,IAAI,KAAK,IAAI,OAAO,EAAI,aAAa,IAAI,QAAQ,CAAC,EAAI,GAAI,EAAE,CAAE,IAAI,CAC/E,EAAS,KAAK,IAAI,OAAO,EAAI,aAAa,IAAI,SAAS,CAAC,EAAI,EAAG,EAAE,CAEjE,EAAS,MAAM,EAAO,SAAS,CACnC,SACW,YACX,QACA,SACD,CAAC,CAGI,EAAM,EAAO,MAAM,IAAK,GAAS,EAAK,GAAG,CACzC,CAAC,EAAQ,GAAY,MAAM,QAAQ,IAAI,CAC3C,EAAO,QAAQ,EAAI,CACnB,EAAO,eAAe,EAAK,YAAY,CACxC,CAAC,CAiBF,OAAO,EADiC,CAAE,MAdqB,EAAO,MAAM,IAAK,IAAU,CACzF,GAAI,EAAK,GACT,MAAO,EAAK,OAAS,KACrB,IAAK,EAAK,KAAO,KACjB,SAAU,EAAK,SACf,SAAU,EAAK,SACf,KAAM,EAAK,KACX,UAAW,EAAK,UAChB,IAAK,EAAO,IAAI,EAAK,GAAG,EAAI,GAC5B,aAAc,EAAS,IAAI,EAAK,GAAG,CACnC,MAAO,EAAK,OAAS,KACrB,OAAQ,EAAK,QAAU,KACxB,EAAE,CAE8C,MAAO,EAAO,MAAO,CACjD,CAGvB,eAAe,EACb,EACA,CACE,WACA,OACA,QACA,mBAOiB,CACnB,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAUrE,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,sBAAuB,CAClE,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,uEAAwE,IAAI,CAE/F,GAAI,CAAC,GAAqB,CACxB,OAAO,EACL,GAAwB,EAAI,yBAC5B,IACD,CAGH,GAAM,CAAE,yBAA0B,MAAM,OAAO,sCACzC,CAAE,UAAW,MAAM,OAAO,qBAC1B,CAAE,sBAAuB,MAAM,OAAO,uCACtC,CAAE,uBAAwB,MAAM,OAAO,wBACvC,CAAE,oBAAqB,MAAM,OAAO,+BAEpC,EAAM,GAAQ,CACd,EAAS,MAAM,EAAmB,EAAK,EAAI,OAAO,CACxD,GAAI,CAAC,GAAU,OAAO,KAAK,EAAO,CAAC,SAAW,EAC5C,OAAO,EAAU,6BAA8B,IAAI,CAIrD,IAAM,EAAU,EADM,GAAkB,CACW,CAAE,MAAK,CAAC,CAErD,EAAS,MAAM,EAAsB,CACzC,GAAI,EAAI,GAAG,UACX,UACA,OAAQ,EAAI,OAAO,MAAM,CAAE,MAAO,GAAM,CAAC,CACzC,SACD,CAAC,CASF,OAPA,IAAQ,CACN,OAAQ,4BACR,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,SAAU,CAAE,MAAO,EAAO,MAAO,UAAW,EAAO,UAAW,OAAQ,EAAO,OAAQ,CACtF,CAAC,CAEK,EAAK,EAAO,CAKrB,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,WAAY,CACvD,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EACL,yEACA,IACD,CAGH,IAAM,EAAQ,MAAM,EAAI,MAAM,CAC9B,GAAI,CAAC,EAAK,aAAe,OAAO,EAAK,aAAgB,SACnD,OAAO,EAAU,yCAA0C,IAAI,CAGjE,IAAM,EAAa,EAAoB,EAAK,YAAY,CACxD,GAAI,CAAC,EAAW,MACd,OAAO,EAAU,EAAW,MAAO,IAAI,CAGzC,GAAM,CAAE,wBAAyB,MAAM,OAAO,yBACxC,CAAE,uBAAwB,MAAM,OAAO,wCACvC,CAAE,UAAW,MAAM,OAAO,qBAuBhC,OApBA,MADuB,EAAqB,EAAqB,CAAE,IADvD,GAAQ,CACoD,CAAC,CACpD,IAAI,cAAe,EAAW,OAAO,CAOtD,GAAqB,GACR,MAAM,GAAW,EACzB,4BAA4B,CAGrC,IAAQ,CACN,OAAQ,wBACR,WAAY,WACZ,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,QAAS,CAAE,YAAa,EAAW,OAAQ,CAC5C,CAAC,CAEK,EAAK,CAAE,YAAa,EAAW,OAAQ,CAAC,CAIjD,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,yDAA0D,IAAI,CAEjF,GAAI,CAAC,GAAqB,CACxB,OAAO,EACL,GAAwB,EAAI,yBAC5B,IACD,CAGH,IAAM,EAAS,MAAM,GAAW,CAG1B,GADW,MAAM,EAAI,UAAU,EACf,IAAI,OAAO,CACjC,GAAI,CAAC,GAAQ,EAAK,OAAS,EACzB,OAAO,EAAU,mBAAoB,IAAI,CAK3C,GAAI,EAAK,KADe,GAAK,KAAO,KAElC,OAAO,EACL,oBAAoB,EAAK,KAAO,KAAO,MAAM,QAAQ,EAAE,CAAC,yBACxD,IACD,CAGH,IAAM,EAAS,OAAO,KAAK,MAAM,EAAK,aAAa,CAAC,CAG9C,CAAE,kBAAmB,MAAM,OAAO,wBAClC,CAAE,WAAU,YAAa,MAAM,EACnC,EACA,EAAK,MAAQ,2BACd,CACD,GAAI,EACF,OAAO,EACL,qDAAqD,EAAK,KAAK,aAAa,IAC5E,IACD,CAGH,IAAM,EAAS,MAAM,EAAO,OAAO,EAAQ,CACzC,SAAU,EAAK,KACf,WACA,KAAM,EAAK,KACX,WAAY,EAAK,GAClB,CAAC,CAEI,EAAwB,CAC5B,GAAI,EAAO,MAAM,GACjB,MAAO,EAAO,MAAM,OAAS,KAC7B,IAAK,EAAO,MAAM,KAAO,KACzB,SAAU,EAAO,MAAM,SACvB,SAAU,EAAO,MAAM,SACvB,KAAM,EAAO,MAAM,KACnB,UAAW,EAAO,MAAM,UACxB,IAAK,EAAO,IACZ,MAAO,EAAO,MAAM,OAAS,KAC7B,OAAQ,EAAO,MAAM,QAAU,KAChC,CAgBD,OAdA,IAAQ,CACN,OAAQ,eACR,WAAY,QACZ,SAAU,EAAO,MAAM,GACvB,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,QAAS,CACP,SAAU,EAAO,MAAM,SACvB,SAAU,EAAO,MAAM,SACvB,KAAM,EAAO,MAAM,KACnB,UAAW,EAAO,MAAM,UACzB,CACF,CAAC,CAEK,EAAK,EAAM,IAAI,CAGxB,eAAe,EACb,EACA,CACE,WACA,OACA,QACA,mBAOiB,CACnB,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,8CAA+C,IAAI,CAGtE,GAAI,EAAS,SAAW,EACtB,OAAO,EAAU,oBAAqB,IAAI,CAG5C,IAAM,EAAK,EAAS,GACpB,GAAI,CAAC,EAAY,EAAG,CAAE,OAAO,EAAU,0BAA2B,IAAI,CAEtE,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAsBrE,OArBK,GAAqB,EAW1B,MADe,MAAM,GAAW,EACnB,OAAO,EAAG,CAEvB,IAAQ,CACN,OAAQ,eACR,WAAY,QACZ,SAAU,EACV,OAAQ,EAAK,GACb,SAAU,EAAK,KAChB,CAAC,CAEK,EAAK,CAAE,QAAS,EAAG,CAAC,EAjBlB,EAAU,GAAwB,EAAI,yBAA0B,IAAI,CA2C/E,SAAgB,GAA0B,CACxC,MAAO,CACL,OAAQ,QACR,SAAU,QACV,QAAS,CAAC,OAAQ,SAAU,SAAU,SAAS,CAC/C,SAAU,CACR,IAAK,EACL,KAAM,EACN,OAAQ,EACT,CACF"}
|
|
1
|
+
{"version":3,"file":"admin.mjs","names":[],"sources":["../src/admin/routes.ts"],"sourcesContent":["/**\n * Media admin routes for the centralized admin API handler.\n *\n * Provides media-specific operations: upload, URL resolution, delete with storage cleanup,\n * image style settings, and variant regeneration.\n *\n * Standard entity CRUD (PATCH with translations) falls through to the generic entity\n * handler — add `Media` to the `entities` array in your handler config.\n *\n * @example\n * ```typescript\n * import { createAdminApiHandler } from '@murumets-ee/admin-ui/server'\n * import { mediaRoutes } from '@murumets-ee/media/admin'\n * import { Media } from '@murumets-ee/media'\n *\n * const handler = createAdminApiHandler({\n * authenticate: async (req) => { ... },\n * entities: [Article, Media],\n * routes: [mediaRoutes()],\n * })\n * ```\n */\n\nimport type { AdminRoute, AuditLogFn, AuthUser } from '@murumets-ee/core'\nimport type { MediaClient } from '../client.js'\nimport type { MediaPickerItem, MediaPickerListResult } from '../picker/types.js'\nimport type { ImageStyle } from '../types.js'\n\n// ---------------------------------------------------------------------------\n// Image style validation\n// ---------------------------------------------------------------------------\n\nconst VALID_FIT = ['cover', 'contain', 'inside', 'outside', 'fill'] as const\nconst VALID_FORMAT = ['webp', 'jpeg', 'png', 'avif'] as const\n\nfunction validateImageStyles(\n styles: Record<string, unknown>,\n): { valid: true; styles: Record<string, ImageStyle> } | { valid: false; error: string } {\n for (const [name, raw] of Object.entries(styles)) {\n if (typeof name !== 'string' || name.length === 0 || !/^[a-z][a-z0-9_-]*$/.test(name)) {\n return {\n valid: false,\n error: `Invalid style name \"${name}\": must be lowercase alphanumeric (a-z, 0-9, -, _)`,\n }\n }\n if (!raw || typeof raw !== 'object') {\n return { valid: false, error: `Style \"${name}\" must be an object` }\n }\n const style = raw as Record<string, unknown>\n if (style.width !== undefined && (typeof style.width !== 'number' || style.width <= 0)) {\n return { valid: false, error: `Invalid width for style \"${name}\": must be a positive number` }\n }\n if (style.height !== undefined && (typeof style.height !== 'number' || style.height <= 0)) {\n return {\n valid: false,\n error: `Invalid height for style \"${name}\": must be a positive number`,\n }\n }\n if (style.width === undefined && style.height === undefined) {\n return { valid: false, error: `Style \"${name}\" must have at least width or height` }\n }\n if (\n style.quality !== undefined &&\n (typeof style.quality !== 'number' || style.quality < 1 || style.quality > 100)\n ) {\n return { valid: false, error: `Invalid quality for style \"${name}\": must be 1-100` }\n }\n if (\n style.fit !== undefined &&\n !(VALID_FIT as readonly string[]).includes(style.fit as string)\n ) {\n return {\n valid: false,\n error: `Invalid fit for style \"${name}\": must be one of ${VALID_FIT.join(', ')}`,\n }\n }\n if (\n style.format !== undefined &&\n !(VALID_FORMAT as readonly string[]).includes(style.format as string)\n ) {\n return {\n valid: false,\n error: `Invalid format for style \"${name}\": must be one of ${VALID_FORMAT.join(', ')}`,\n }\n }\n }\n return { valid: true, styles: styles as Record<string, ImageStyle> }\n}\n\n// ---------------------------------------------------------------------------\n// Validation\n// ---------------------------------------------------------------------------\n\nconst UUID_RE = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i\n\nfunction isValidUuid(value: string): boolean {\n return UUID_RE.test(value)\n}\n\n// ---------------------------------------------------------------------------\n// Per-request MediaClient factory\n// ---------------------------------------------------------------------------\n//\n// MediaClient and its AdminClient MUST be built per-request — AdminClient's\n// context resolver is captured eagerly at construction (see\n// buildContextResolver in @murumets-ee/core/clients). A module-level singleton\n// would bake the first request's user + tenant scope into every subsequent\n// request's writes — a cross-request permission/scope leak.\n//\n// Storage config is process-global and safe to cache once.\n\nlet storagePromise: Promise<Awaited<ReturnType<typeof import('@murumets-ee/storage').createStorageClient>>> | null = null\n\nasync function getStorage() {\n if (!storagePromise) {\n storagePromise = (async () => {\n const { getApp } = await import('@murumets-ee/core')\n const { createStorageClient } = await import('@murumets-ee/storage')\n const { getStorageConfig } = await import('@murumets-ee/storage/plugin')\n const app = getApp()\n return createStorageClient(getStorageConfig(), { app })\n })()\n }\n return storagePromise\n}\n\nasync function getClient(): Promise<MediaClient> {\n const { createAdminClient } = await import('@murumets-ee/core/clients')\n const { MediaClient } = await import('../client.js')\n const { Media } = await import('../entity.js')\n const storage = await getStorage()\n const admin = createAdminClient(Media)\n return new MediaClient({ admin, storage })\n}\n\n// ---------------------------------------------------------------------------\n// Response helpers\n// ---------------------------------------------------------------------------\n\nfunction json(data: unknown, status = 200) {\n return new Response(JSON.stringify(data), {\n status,\n headers: { 'Content-Type': 'application/json' },\n })\n}\n\nfunction errorJson(message: string, status: number) {\n return json({ error: message }, status)\n}\n\n// ---------------------------------------------------------------------------\n// Handlers\n// ---------------------------------------------------------------------------\n\nasync function handleGet(\n req: Request,\n { segments }: { segments: string[]; user: AuthUser; audit?: AuditLogFn },\n): Promise<Response> {\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n\n // GET /media/settings — no storage access needed, only DB + config.\n // Keep working even when storage is disabled so admins can still\n // review / edit image styles.\n if (segments.length === 1 && segments[0] === 'settings') {\n const { getApp } = await import('@murumets-ee/core')\n const { resolveImageStyles } = await import('../resolve-image-styles.js')\n const app = getApp()\n const styles = await resolveImageStyles(app, app.logger)\n return json({ imageStyles: styles })\n }\n\n // GET /media/:id/usage — DB-only lookup, also safe without storage.\n if (segments.length === 2 && segments[1] === 'usage') {\n const id = segments[0]\n if (!isValidUuid(id)) return errorJson('Invalid media ID format', 400)\n\n const { findMediaUsages } = await import('../usage.js')\n const { getApp } = await import('@murumets-ee/core')\n const app = getApp()\n const usages = await findMediaUsages(id, app.db.readWrite)\n return json({ usages })\n }\n\n // Everything below needs a working storage client. If env isn't wired,\n // return a structured \"disabled\" response rather than a 500 — the\n // media list page renders a banner and new admins can finish onboarding\n // without being blocked on a crash loop.\n if (!isStorageConfigured()) {\n const reason = getStorageConfigReason() ?? 'Storage not configured'\n if (segments.length > 0) {\n // Single item / other sub-paths — treat as not-found-ish to avoid\n // leaking existence; include reason so the UI can surface it.\n return json(\n { error: reason, configured: false, reason },\n 503,\n )\n }\n // GET /media — empty list + disabled flag for the picker's banner.\n const response: MediaPickerListResult & { configured: false; reason: string } = {\n items: [],\n total: 0,\n configured: false,\n reason,\n }\n return json(response)\n }\n\n const client = await getClient()\n\n // GET /media/:id — single item with URL (full record for EntityForm + picker)\n if (segments.length > 0) {\n const id = segments[0]\n const record = await client.findById(id)\n if (!record) return errorJson('Media not found', 404)\n\n const url = await client.getUrl(id)\n return json({ ...record, url })\n }\n\n // GET /media — list with search/filter + batch URL resolution\n const url = new URL(req.url)\n const search = url.searchParams.get('search') ?? undefined\n const mediaType = url.searchParams.get('mediaType') ?? undefined\n const limit = Math.min(Math.max(Number(url.searchParams.get('limit')) || 24, 1), 100)\n const offset = Math.max(Number(url.searchParams.get('offset')) || 0, 0)\n\n const result = await client.findMany({\n search,\n mediaType: mediaType as 'image' | 'video' | 'audio' | 'document' | 'other' | undefined,\n limit,\n offset,\n })\n\n // Resolve original URLs + thumbnail variant URLs for all items\n const ids = result.items.map((item) => item.id)\n const [urlMap, thumbMap] = await Promise.all([\n client.getUrls(ids),\n client.getVariantUrls(ids, 'thumbnail'),\n ])\n\n const items: (MediaPickerItem & { thumbnailUrl?: string })[] = result.items.map((item) => ({\n id: item.id,\n title: item.title ?? null,\n alt: item.alt ?? null,\n filename: item.filename,\n mimeType: item.mimeType,\n size: item.size,\n mediaType: item.mediaType,\n url: urlMap.get(item.id) ?? '',\n thumbnailUrl: thumbMap.get(item.id),\n width: item.width ?? null,\n height: item.height ?? null,\n }))\n\n const response: MediaPickerListResult = { items, total: result.total }\n return json(response)\n}\n\nasync function handlePost(\n req: Request,\n {\n segments,\n user,\n audit,\n checkPermission,\n }: {\n segments: string[]\n user: AuthUser\n audit?: AuditLogFn\n checkPermission: (resource: string, action: string) => boolean\n },\n): Promise<Response> {\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n\n // POST /media/settings — image-style editing doesn't touch storage,\n // allow it even when storage is disabled so admins can prep styles\n // ahead of wiring the bucket.\n // (Handled further down — gate only the storage-touching branches.)\n\n // POST /media/regenerate-variants — creates new variant files.\n // Framework-level gate already requires 'media.create' (METHOD_TO_ACTION maps POST → create),\n // so we don't need a redundant handler check here. Leaving a brief assert for defence-in-depth.\n if (segments.length === 1 && segments[0] === 'regenerate-variants') {\n if (!checkPermission('media', 'create')) {\n return errorJson('Forbidden: media create permission required for variant regeneration', 403)\n }\n if (!isStorageConfigured()) {\n return errorJson(\n getStorageConfigReason() ?? 'Storage not configured',\n 503,\n )\n }\n\n const { regenerateAllVariants } = await import('../regenerate-variants.js')\n const { getApp, getContext } = await import('@murumets-ee/core')\n const { resolveImageStyles } = await import('../resolve-image-styles.js')\n const { createStorageClient } = await import('@murumets-ee/storage')\n const { getStorageConfig } = await import('@murumets-ee/storage/plugin')\n\n const app = getApp()\n const styles = await resolveImageStyles(app, app.logger)\n if (!styles || Object.keys(styles).length === 0) {\n return errorJson('No image styles configured', 400)\n }\n\n const storageConfig = getStorageConfig()\n const storage = createStorageClient(storageConfig, { app })\n\n const result = await regenerateAllVariants({\n db: app.db.readWrite,\n storage,\n logger: app.logger.child({ media: true }),\n styles,\n contextResolver: () => {\n const ctx = getContext()\n if (!ctx?.user || !ctx?.checker) return undefined\n return { user: ctx.user, checker: ctx.checker, scope: ctx.scope }\n },\n })\n\n audit?.({\n action: 'media.regenerate_variants',\n userId: user.id,\n userName: user.name,\n metadata: { total: result.total, processed: result.processed, errors: result.errors },\n })\n\n return json(result)\n }\n\n // POST /media/settings — manages image style definitions.\n // Framework-level gate (POST → media.create) already enforces access.\n if (segments.length === 1 && segments[0] === 'settings') {\n if (!checkPermission('media', 'create')) {\n return errorJson(\n 'Forbidden: media create permission required for image style management',\n 403,\n )\n }\n\n const body = (await req.json()) as { imageStyles?: Record<string, unknown> }\n if (!body.imageStyles || typeof body.imageStyles !== 'object') {\n return errorJson('Body must contain \"imageStyles\" object', 400)\n }\n\n const validation = validateImageStyles(body.imageStyles)\n if (!validation.valid) {\n return errorJson(validation.error, 400)\n }\n\n const { createSettingsClient } = await import('@murumets-ee/settings')\n const { imageStylesSettings } = await import('../image-styles-settings.js')\n const { getApp } = await import('@murumets-ee/core')\n const app = getApp()\n const settingsClient = createSettingsClient(imageStylesSettings, { app })\n await settingsClient.set('imageStyles', validation.styles)\n\n // Invalidate cached styles on the MediaClient singleton — only\n // possible when storage is configured (MediaClient construction\n // requires a StorageClient, which requires env). When disabled,\n // there's no cache to invalidate and the settings write is still\n // valid; the next upload after config lands will see fresh styles.\n if (isStorageConfigured()) {\n const client = await getClient()\n client.invalidateImageStylesCache()\n }\n\n audit?.({\n action: 'media.settings.update',\n entityType: 'settings',\n userId: user.id,\n userName: user.name,\n changes: { imageStyles: validation.styles },\n })\n\n return json({ imageStyles: validation.styles })\n }\n\n // POST /media — upload file (requires media create permission)\n if (!checkPermission('media', 'create')) {\n return errorJson('Forbidden: media create permission required for upload', 403)\n }\n if (!isStorageConfigured()) {\n return errorJson(\n getStorageConfigReason() ?? 'Storage not configured',\n 503,\n )\n }\n\n const client = await getClient()\n\n const formData = await req.formData()\n const file = formData.get('file') as File | null\n if (!file || file.size === 0) {\n return errorJson('No file provided', 400)\n }\n\n // Guard against oversized uploads (50 MB limit)\n const MAX_UPLOAD_SIZE = 50 * 1024 * 1024\n if (file.size > MAX_UPLOAD_SIZE) {\n return errorJson(\n `File too large: ${(file.size / 1024 / 1024).toFixed(1)} MB exceeds 50 MB limit`,\n 400,\n )\n }\n\n const buffer = Buffer.from(await file.arrayBuffer())\n\n // Detect actual MIME type from file content (prevents spoofing)\n const { detectMimeType } = await import('@murumets-ee/storage')\n const { mimeType, mismatch } = await detectMimeType(\n buffer,\n file.type || 'application/octet-stream',\n )\n if (mismatch) {\n return errorJson(\n `File content doesn't match declared type: claimed ${file.type}, detected ${mimeType}`,\n 400,\n )\n }\n\n const result = await client.upload(buffer, {\n filename: file.name,\n mimeType,\n size: file.size,\n uploadedBy: user.id,\n })\n\n const item: MediaPickerItem = {\n id: result.media.id,\n title: result.media.title ?? null,\n alt: result.media.alt ?? null,\n filename: result.media.filename,\n mimeType: result.media.mimeType,\n size: result.media.size,\n mediaType: result.media.mediaType,\n url: result.url,\n width: result.media.width ?? null,\n height: result.media.height ?? null,\n }\n\n audit?.({\n action: 'media.upload',\n entityType: 'media',\n entityId: result.media.id,\n userId: user.id,\n userName: user.name,\n changes: {\n filename: result.media.filename,\n mimeType: result.media.mimeType,\n size: result.media.size,\n mediaType: result.media.mediaType,\n },\n })\n\n return json(item, 201)\n}\n\nasync function handleDelete(\n _req: Request,\n {\n segments,\n user,\n audit,\n checkPermission,\n }: {\n segments: string[]\n user: AuthUser\n audit?: AuditLogFn\n checkPermission: (resource: string, action: string) => boolean\n },\n): Promise<Response> {\n if (!checkPermission('media', 'delete')) {\n return errorJson('Forbidden: media delete permission required', 403)\n }\n\n if (segments.length === 0) {\n return errorJson('Media ID required', 400)\n }\n\n const id = segments[0]\n if (!isValidUuid(id)) return errorJson('Invalid media ID format', 400)\n\n const { isStorageConfigured, getStorageConfigReason } = await import('@murumets-ee/storage')\n if (!isStorageConfigured()) {\n // Can't safely delete — MediaClient needs storage to remove the\n // actual object, and partial delete (DB row gone, object orphaned)\n // would leak storage. Surface the reason so the UI can display it.\n return errorJson(getStorageConfigReason() ?? 'Storage not configured', 503)\n }\n\n // AdminClient.delete() checks entity_refs and throws ReferencedEntityError\n // if this media is still referenced. The error bubbles to the caller's\n // error handler which returns 409 with usage details.\n const client = await getClient()\n await client.delete(id)\n\n audit?.({\n action: 'media.delete',\n entityType: 'media',\n entityId: id,\n userId: user.id,\n userName: user.name,\n })\n\n return json({ deleted: 1 })\n}\n\n// ---------------------------------------------------------------------------\n// Route factory\n// ---------------------------------------------------------------------------\n\n/**\n * Create admin API routes for media-specific operations.\n *\n * Standard entity CRUD (PATCH with translations) is handled by the generic entity\n * handler — add `Media` to the `entities` array in your handler config.\n *\n * Routes handled by this plugin:\n * - `GET /api/admin/media` — List media with search/filter + URLs\n * - `GET /api/admin/media/settings` — Get current image styles\n * - `GET /api/admin/media/:id` — Get single media item with URL\n * - `GET /api/admin/media/:id/usage` — Find entities referencing this media\n * - `POST /api/admin/media` — Upload file (FormData with `file` field)\n * - `POST /api/admin/media/settings` — Save image styles (admin only)\n * - `POST /api/admin/media/regenerate-variants` — Regenerate all image variants (admin only)\n * - `DELETE /api/admin/media/:id` — Delete media + storage file (blocked if in use)\n *\n * Routes handled by generic entity handler (via fallthrough):\n * - `PATCH /api/admin/media/:id` — Update metadata with translation support\n */\nexport function mediaRoutes(): AdminRoute {\n return {\n prefix: 'media',\n resource: 'media',\n actions: ['view', 'create', 'update', 'delete'],\n handlers: {\n GET: handleGet,\n POST: handlePost,\n DELETE: handleDelete,\n },\n }\n}\n"],"mappings":"AAgCA,MAAM,EAAY,CAAC,QAAS,UAAW,SAAU,UAAW,OAAO,CAC7D,EAAe,CAAC,OAAQ,OAAQ,MAAO,OAAO,CAEpD,SAAS,EACP,EACuF,CACvF,IAAK,GAAM,CAAC,EAAM,KAAQ,OAAO,QAAQ,EAAO,CAAE,CAChD,GAAI,OAAO,GAAS,UAAY,EAAK,SAAW,GAAK,CAAC,qBAAqB,KAAK,EAAK,CACnF,MAAO,CACL,MAAO,GACP,MAAO,uBAAuB,EAAK,oDACpC,CAEH,GAAI,CAAC,GAAO,OAAO,GAAQ,SACzB,MAAO,CAAE,MAAO,GAAO,MAAO,UAAU,EAAK,qBAAsB,CAErE,IAAM,EAAQ,EACd,GAAI,EAAM,QAAU,IAAA,KAAc,OAAO,EAAM,OAAU,UAAY,EAAM,OAAS,GAClF,MAAO,CAAE,MAAO,GAAO,MAAO,4BAA4B,EAAK,8BAA+B,CAEhG,GAAI,EAAM,SAAW,IAAA,KAAc,OAAO,EAAM,QAAW,UAAY,EAAM,QAAU,GACrF,MAAO,CACL,MAAO,GACP,MAAO,6BAA6B,EAAK,8BAC1C,CAEH,GAAI,EAAM,QAAU,IAAA,IAAa,EAAM,SAAW,IAAA,GAChD,MAAO,CAAE,MAAO,GAAO,MAAO,UAAU,EAAK,sCAAuC,CAEtF,GACE,EAAM,UAAY,IAAA,KACjB,OAAO,EAAM,SAAY,UAAY,EAAM,QAAU,GAAK,EAAM,QAAU,KAE3E,MAAO,CAAE,MAAO,GAAO,MAAO,8BAA8B,EAAK,kBAAmB,CAEtF,GACE,EAAM,MAAQ,IAAA,IACd,CAAE,EAAgC,SAAS,EAAM,IAAc,CAE/D,MAAO,CACL,MAAO,GACP,MAAO,0BAA0B,EAAK,oBAAoB,EAAU,KAAK,KAAK,GAC/E,CAEH,GACE,EAAM,SAAW,IAAA,IACjB,CAAE,EAAmC,SAAS,EAAM,OAAiB,CAErE,MAAO,CACL,MAAO,GACP,MAAO,6BAA6B,EAAK,oBAAoB,EAAa,KAAK,KAAK,GACrF,CAGL,MAAO,CAAE,MAAO,GAAc,SAAsC,CAOtE,MAAM,EAAU,kEAEhB,SAAS,EAAY,EAAwB,CAC3C,OAAO,EAAQ,KAAK,EAAM,CAe5B,IAAI,EAAiH,KAErH,eAAe,GAAa,CAU1B,MATA,CACE,KAAkB,SAAY,CAC5B,GAAM,CAAE,UAAW,MAAM,OAAO,qBAC1B,CAAE,uBAAwB,MAAM,OAAO,wBACvC,CAAE,oBAAqB,MAAM,OAAO,+BACpC,EAAM,GAAQ,CACpB,OAAO,EAAoB,GAAkB,CAAE,CAAE,MAAK,CAAC,IACrD,CAEC,EAGT,eAAe,GAAkC,CAC/C,GAAM,CAAE,qBAAsB,MAAM,OAAO,6BACrC,CAAE,eAAgB,MAAM,OAAO,yBAC/B,CAAE,SAAU,MAAM,OAAO,yBACzB,EAAU,MAAM,GAAY,CAElC,OAAO,IAAI,EAAY,CAAE,MADX,EAAkB,EAAM,CACN,UAAS,CAAC,CAO5C,SAAS,EAAK,EAAe,EAAS,IAAK,CACzC,OAAO,IAAI,SAAS,KAAK,UAAU,EAAK,CAAE,CACxC,SACA,QAAS,CAAE,eAAgB,mBAAoB,CAChD,CAAC,CAGJ,SAAS,EAAU,EAAiB,EAAgB,CAClD,OAAO,EAAK,CAAE,MAAO,EAAS,CAAE,EAAO,CAOzC,eAAe,EACb,EACA,CAAE,YACiB,CACnB,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAKrE,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,WAAY,CACvD,GAAM,CAAE,UAAW,MAAM,OAAO,qBAC1B,CAAE,sBAAuB,MAAM,OAAO,uCACtC,EAAM,GAAQ,CAEpB,OAAO,EAAK,CAAE,YADC,MAAM,EAAmB,EAAK,EAAI,OAAO,CACrB,CAAC,CAItC,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,QAAS,CACpD,IAAM,EAAK,EAAS,GACpB,GAAI,CAAC,EAAY,EAAG,CAAE,OAAO,EAAU,0BAA2B,IAAI,CAEtE,GAAM,CAAE,mBAAoB,MAAM,OAAO,wBACnC,CAAE,UAAW,MAAM,OAAO,qBAGhC,OAAO,EAAK,CAAE,OADC,MAAM,EAAgB,EADzB,GAAQ,CACyB,GAAG,UAAU,CACpC,CAAC,CAOzB,GAAI,CAAC,GAAqB,CAAE,CAC1B,IAAM,EAAS,GAAwB,EAAI,yBAgB3C,OAfI,EAAS,OAAS,EAGb,EACL,CAAE,MAAO,EAAQ,WAAY,GAAO,SAAQ,CAC5C,IACD,CASI,EANyE,CAC9E,MAAO,EAAE,CACT,MAAO,EACP,WAAY,GACZ,SACD,CACoB,CAGvB,IAAM,EAAS,MAAM,GAAW,CAGhC,GAAI,EAAS,OAAS,EAAG,CACvB,IAAM,EAAK,EAAS,GACd,EAAS,MAAM,EAAO,SAAS,EAAG,CACxC,GAAI,CAAC,EAAQ,OAAO,EAAU,kBAAmB,IAAI,CAErD,IAAM,EAAM,MAAM,EAAO,OAAO,EAAG,CACnC,OAAO,EAAK,CAAE,GAAG,EAAQ,MAAK,CAAC,CAIjC,IAAM,EAAM,IAAI,IAAI,EAAI,IAAI,CACtB,EAAS,EAAI,aAAa,IAAI,SAAS,EAAI,IAAA,GAC3C,EAAY,EAAI,aAAa,IAAI,YAAY,EAAI,IAAA,GACjD,EAAQ,KAAK,IAAI,KAAK,IAAI,OAAO,EAAI,aAAa,IAAI,QAAQ,CAAC,EAAI,GAAI,EAAE,CAAE,IAAI,CAC/E,EAAS,KAAK,IAAI,OAAO,EAAI,aAAa,IAAI,SAAS,CAAC,EAAI,EAAG,EAAE,CAEjE,EAAS,MAAM,EAAO,SAAS,CACnC,SACW,YACX,QACA,SACD,CAAC,CAGI,EAAM,EAAO,MAAM,IAAK,GAAS,EAAK,GAAG,CACzC,CAAC,EAAQ,GAAY,MAAM,QAAQ,IAAI,CAC3C,EAAO,QAAQ,EAAI,CACnB,EAAO,eAAe,EAAK,YAAY,CACxC,CAAC,CAiBF,OAAO,EADiC,CAAE,MAdqB,EAAO,MAAM,IAAK,IAAU,CACzF,GAAI,EAAK,GACT,MAAO,EAAK,OAAS,KACrB,IAAK,EAAK,KAAO,KACjB,SAAU,EAAK,SACf,SAAU,EAAK,SACf,KAAM,EAAK,KACX,UAAW,EAAK,UAChB,IAAK,EAAO,IAAI,EAAK,GAAG,EAAI,GAC5B,aAAc,EAAS,IAAI,EAAK,GAAG,CACnC,MAAO,EAAK,OAAS,KACrB,OAAQ,EAAK,QAAU,KACxB,EAAE,CAE8C,MAAO,EAAO,MAAO,CACjD,CAGvB,eAAe,EACb,EACA,CACE,WACA,OACA,QACA,mBAOiB,CACnB,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAUrE,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,sBAAuB,CAClE,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,uEAAwE,IAAI,CAE/F,GAAI,CAAC,GAAqB,CACxB,OAAO,EACL,GAAwB,EAAI,yBAC5B,IACD,CAGH,GAAM,CAAE,yBAA0B,MAAM,OAAO,sCACzC,CAAE,SAAQ,cAAe,MAAM,OAAO,qBACtC,CAAE,sBAAuB,MAAM,OAAO,uCACtC,CAAE,uBAAwB,MAAM,OAAO,wBACvC,CAAE,oBAAqB,MAAM,OAAO,+BAEpC,EAAM,GAAQ,CACd,EAAS,MAAM,EAAmB,EAAK,EAAI,OAAO,CACxD,GAAI,CAAC,GAAU,OAAO,KAAK,EAAO,CAAC,SAAW,EAC5C,OAAO,EAAU,6BAA8B,IAAI,CAIrD,IAAM,EAAU,EADM,GAAkB,CACW,CAAE,MAAK,CAAC,CAErD,EAAS,MAAM,EAAsB,CACzC,GAAI,EAAI,GAAG,UACX,UACA,OAAQ,EAAI,OAAO,MAAM,CAAE,MAAO,GAAM,CAAC,CACzC,SACA,oBAAuB,CACrB,IAAM,EAAM,GAAY,CACpB,MAAC,GAAK,MAAQ,CAAC,GAAK,SACxB,MAAO,CAAE,KAAM,EAAI,KAAM,QAAS,EAAI,QAAS,MAAO,EAAI,MAAO,EAEpE,CAAC,CASF,OAPA,IAAQ,CACN,OAAQ,4BACR,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,SAAU,CAAE,MAAO,EAAO,MAAO,UAAW,EAAO,UAAW,OAAQ,EAAO,OAAQ,CACtF,CAAC,CAEK,EAAK,EAAO,CAKrB,GAAI,EAAS,SAAW,GAAK,EAAS,KAAO,WAAY,CACvD,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EACL,yEACA,IACD,CAGH,IAAM,EAAQ,MAAM,EAAI,MAAM,CAC9B,GAAI,CAAC,EAAK,aAAe,OAAO,EAAK,aAAgB,SACnD,OAAO,EAAU,yCAA0C,IAAI,CAGjE,IAAM,EAAa,EAAoB,EAAK,YAAY,CACxD,GAAI,CAAC,EAAW,MACd,OAAO,EAAU,EAAW,MAAO,IAAI,CAGzC,GAAM,CAAE,wBAAyB,MAAM,OAAO,yBACxC,CAAE,uBAAwB,MAAM,OAAO,wCACvC,CAAE,UAAW,MAAM,OAAO,qBAuBhC,OApBA,MADuB,EAAqB,EAAqB,CAAE,IADvD,GAAQ,CACoD,CAAC,CACpD,IAAI,cAAe,EAAW,OAAO,CAOtD,GAAqB,GACR,MAAM,GAAW,EACzB,4BAA4B,CAGrC,IAAQ,CACN,OAAQ,wBACR,WAAY,WACZ,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,QAAS,CAAE,YAAa,EAAW,OAAQ,CAC5C,CAAC,CAEK,EAAK,CAAE,YAAa,EAAW,OAAQ,CAAC,CAIjD,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,yDAA0D,IAAI,CAEjF,GAAI,CAAC,GAAqB,CACxB,OAAO,EACL,GAAwB,EAAI,yBAC5B,IACD,CAGH,IAAM,EAAS,MAAM,GAAW,CAG1B,GADW,MAAM,EAAI,UAAU,EACf,IAAI,OAAO,CACjC,GAAI,CAAC,GAAQ,EAAK,OAAS,EACzB,OAAO,EAAU,mBAAoB,IAAI,CAK3C,GAAI,EAAK,KADe,GAAK,KAAO,KAElC,OAAO,EACL,oBAAoB,EAAK,KAAO,KAAO,MAAM,QAAQ,EAAE,CAAC,yBACxD,IACD,CAGH,IAAM,EAAS,OAAO,KAAK,MAAM,EAAK,aAAa,CAAC,CAG9C,CAAE,kBAAmB,MAAM,OAAO,wBAClC,CAAE,WAAU,YAAa,MAAM,EACnC,EACA,EAAK,MAAQ,2BACd,CACD,GAAI,EACF,OAAO,EACL,qDAAqD,EAAK,KAAK,aAAa,IAC5E,IACD,CAGH,IAAM,EAAS,MAAM,EAAO,OAAO,EAAQ,CACzC,SAAU,EAAK,KACf,WACA,KAAM,EAAK,KACX,WAAY,EAAK,GAClB,CAAC,CAEI,EAAwB,CAC5B,GAAI,EAAO,MAAM,GACjB,MAAO,EAAO,MAAM,OAAS,KAC7B,IAAK,EAAO,MAAM,KAAO,KACzB,SAAU,EAAO,MAAM,SACvB,SAAU,EAAO,MAAM,SACvB,KAAM,EAAO,MAAM,KACnB,UAAW,EAAO,MAAM,UACxB,IAAK,EAAO,IACZ,MAAO,EAAO,MAAM,OAAS,KAC7B,OAAQ,EAAO,MAAM,QAAU,KAChC,CAgBD,OAdA,IAAQ,CACN,OAAQ,eACR,WAAY,QACZ,SAAU,EAAO,MAAM,GACvB,OAAQ,EAAK,GACb,SAAU,EAAK,KACf,QAAS,CACP,SAAU,EAAO,MAAM,SACvB,SAAU,EAAO,MAAM,SACvB,KAAM,EAAO,MAAM,KACnB,UAAW,EAAO,MAAM,UACzB,CACF,CAAC,CAEK,EAAK,EAAM,IAAI,CAGxB,eAAe,EACb,EACA,CACE,WACA,OACA,QACA,mBAOiB,CACnB,GAAI,CAAC,EAAgB,QAAS,SAAS,CACrC,OAAO,EAAU,8CAA+C,IAAI,CAGtE,GAAI,EAAS,SAAW,EACtB,OAAO,EAAU,oBAAqB,IAAI,CAG5C,IAAM,EAAK,EAAS,GACpB,GAAI,CAAC,EAAY,EAAG,CAAE,OAAO,EAAU,0BAA2B,IAAI,CAEtE,GAAM,CAAE,sBAAqB,0BAA2B,MAAM,OAAO,wBAsBrE,OArBK,GAAqB,EAW1B,MADe,MAAM,GAAW,EACnB,OAAO,EAAG,CAEvB,IAAQ,CACN,OAAQ,eACR,WAAY,QACZ,SAAU,EACV,OAAQ,EAAK,GACb,SAAU,EAAK,KAChB,CAAC,CAEK,EAAK,CAAE,QAAS,EAAG,CAAC,EAjBlB,EAAU,GAAwB,EAAI,yBAA0B,IAAI,CA2C/E,SAAgB,GAA0B,CACxC,MAAO,CACL,OAAQ,QACR,SAAU,QACV,QAAS,CAAC,OAAQ,SAAU,SAAU,SAAS,CAC/C,SAAU,CACR,IAAK,EACL,KAAM,EACN,OAAQ,EACT,CACF"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@murumets-ee/media",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.5.1",
|
|
4
4
|
"license": "Elastic-2.0",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"exports": {
|
|
@@ -56,23 +56,18 @@
|
|
|
56
56
|
"server-only": "^0.0.1",
|
|
57
57
|
"sharp": "^0.34.5",
|
|
58
58
|
"tailwind-merge": "^2.6.0",
|
|
59
|
-
"@murumets-ee/core": "0.
|
|
60
|
-
"@murumets-ee/db": "0.
|
|
61
|
-
"@murumets-ee/entity": "0.
|
|
62
|
-
"@murumets-ee/logging": "0.
|
|
63
|
-
"@murumets-ee/settings": "0.
|
|
64
|
-
"@murumets-ee/storage": "0.
|
|
59
|
+
"@murumets-ee/core": "0.5.1",
|
|
60
|
+
"@murumets-ee/db": "0.5.1",
|
|
61
|
+
"@murumets-ee/entity": "0.5.1",
|
|
62
|
+
"@murumets-ee/logging": "0.5.1",
|
|
63
|
+
"@murumets-ee/settings": "0.5.1",
|
|
64
|
+
"@murumets-ee/storage": "0.5.1",
|
|
65
|
+
"@murumets-ee/ui": "0.5.1"
|
|
65
66
|
},
|
|
66
67
|
"peerDependencies": {
|
|
67
68
|
"lucide-react": ">=0.400.0",
|
|
68
69
|
"react": ">=19.0.0",
|
|
69
|
-
"react-dom": ">=19.0.0"
|
|
70
|
-
"@murumets-ee/ui": "0.4.8"
|
|
71
|
-
},
|
|
72
|
-
"peerDependenciesMeta": {
|
|
73
|
-
"@murumets-ee/ui": {
|
|
74
|
-
"optional": true
|
|
75
|
-
}
|
|
70
|
+
"react-dom": ">=19.0.0"
|
|
76
71
|
},
|
|
77
72
|
"devDependencies": {
|
|
78
73
|
"@types/node": "^22.10.5",
|