@ruiapp/rapid-core 0.1.82 → 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/dist/bootstrapApplicationConfig.d.ts +6 -0
  2. package/dist/helpers/metaHelper.d.ts +3 -3
  3. package/dist/index.js +57 -16
  4. package/dist/plugins/webhooks/pluginConfig.d.ts +1 -0
  5. package/dist/types.d.ts +19 -1
  6. package/package.json +1 -1
  7. package/src/bootstrapApplicationConfig.ts +615 -602
  8. package/src/core/server.ts +142 -142
  9. package/src/dataAccess/columnTypeMapper.ts +22 -22
  10. package/src/dataAccess/dataAccessTypes.ts +151 -151
  11. package/src/dataAccess/entityManager.ts +1499 -1496
  12. package/src/dataAccess/entityMapper.ts +100 -100
  13. package/src/dataAccess/propertyMapper.ts +28 -28
  14. package/src/deno-std/http/cookie.ts +372 -372
  15. package/src/helpers/filterHelper.ts +47 -47
  16. package/src/helpers/metaHelper.ts +80 -76
  17. package/src/helpers/runCollectionEntityActionHandler.ts +27 -27
  18. package/src/index.ts +46 -46
  19. package/src/plugins/auth/AuthPlugin.ts +85 -85
  20. package/src/plugins/cronJob/CronJobPlugin.ts +112 -112
  21. package/src/plugins/dataManage/DataManagePlugin.ts +163 -163
  22. package/src/plugins/dataManage/actionHandlers/deleteCollectionEntities.ts +38 -38
  23. package/src/plugins/dataManage/actionHandlers/deleteCollectionEntityById.ts +22 -22
  24. package/src/plugins/entityAccessControl/EntityAccessControlPlugin.ts +146 -146
  25. package/src/plugins/fileManage/FileManagePlugin.ts +52 -52
  26. package/src/plugins/fileManage/actionHandlers/downloadFile.ts +44 -44
  27. package/src/plugins/metaManage/MetaManagePlugin.ts +500 -488
  28. package/src/plugins/routeManage/RouteManagePlugin.ts +62 -62
  29. package/src/plugins/sequence/SequencePlugin.ts +136 -136
  30. package/src/plugins/sequence/SequencePluginTypes.ts +69 -69
  31. package/src/plugins/sequence/segments/autoIncrement.ts +78 -78
  32. package/src/plugins/sequence/segments/dayOfMonth.ts +17 -17
  33. package/src/plugins/sequence/segments/literal.ts +14 -14
  34. package/src/plugins/sequence/segments/month.ts +17 -17
  35. package/src/plugins/sequence/segments/parameter.ts +18 -18
  36. package/src/plugins/sequence/segments/year.ts +17 -17
  37. package/src/plugins/setting/SettingPlugin.ts +68 -68
  38. package/src/plugins/setting/SettingPluginTypes.ts +37 -37
  39. package/src/plugins/stateMachine/StateMachinePlugin.ts +186 -186
  40. package/src/plugins/stateMachine/StateMachinePluginTypes.ts +48 -48
  41. package/src/plugins/webhooks/WebhooksPlugin.ts +148 -148
  42. package/src/plugins/webhooks/pluginConfig.ts +1 -0
  43. package/src/queryBuilder/queryBuilder.ts +637 -637
  44. package/src/server.ts +463 -451
  45. package/src/types.ts +659 -637
  46. package/src/utilities/errorUtility.ts +15 -15
@@ -1,146 +1,146 @@
1
- import type { RpdApplicationConfig, RpdDataModelProperty } from "~/types";
2
-
3
- import {
4
- IRpdServer,
5
- RapidPlugin,
6
- RpdConfigurationItemOptions,
7
- RpdServerPluginConfigurableTargetOptions,
8
- RpdServerPluginExtendingAbilities,
9
- } from "~/core/server";
10
- import { find, set } from "lodash";
11
- import { ActionHandlerContext } from "~/core/actionHandler";
12
- import { isAccessAllowed } from "~/utilities/accessControlUtility";
13
- import { RouteContext } from "~/core/routeContext";
14
-
15
- class EntityAccessControlPlugin implements RapidPlugin {
16
- constructor() {}
17
-
18
- get code(): string {
19
- return "entityAccessControl";
20
- }
21
-
22
- get description(): string {
23
- return "";
24
- }
25
-
26
- get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
27
- return [];
28
- }
29
-
30
- get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
31
- return [];
32
- }
33
-
34
- get configurations(): RpdConfigurationItemOptions[] {
35
- return [];
36
- }
37
-
38
- async onLoadingApplication(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
39
- const properties: RpdDataModelProperty[] = [
40
- {
41
- name: "permissionPolicies",
42
- code: "permissionPolicies",
43
- columnName: "permission_policies",
44
- type: "json",
45
- },
46
- ];
47
- server.appendModelProperties("model", properties);
48
- }
49
-
50
- async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
51
- const logger = server.getLogger();
52
- logger.info("Configuring entity access checking policies...");
53
-
54
- const routes = applicationConfig.routes;
55
- for (const route of routes) {
56
- const { actions } = route;
57
- if (!actions) {
58
- continue;
59
- }
60
-
61
- for (const action of route.actions) {
62
- if (action.code === "findCollectionEntityById" || action.code === "findCollectionEntities" || action.code === "countCollectionEntities") {
63
- const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
64
- if (!model) {
65
- continue;
66
- }
67
- const { permissionPolicies } = model;
68
- if (!permissionPolicies) {
69
- continue;
70
- }
71
- if (permissionPolicies.find) {
72
- set(action, "config.permissionCheck", permissionPolicies.find);
73
- }
74
- } else if (action.code === "createCollectionEntity" || action.code === "createCollectionEntitiesBatch") {
75
- const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
76
- if (!model) {
77
- continue;
78
- }
79
- const { permissionPolicies } = model;
80
- if (!permissionPolicies) {
81
- continue;
82
- }
83
- if (permissionPolicies.create) {
84
- set(action, "config.permissionCheck", permissionPolicies.create);
85
- }
86
- } else if (action.code === "updateCollectionEntityById" || action.code === "addEntityRelations" || action.code === "removeEntityRelations") {
87
- const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
88
- if (!model) {
89
- continue;
90
- }
91
- const { permissionPolicies } = model;
92
- if (!permissionPolicies) {
93
- continue;
94
- }
95
- if (permissionPolicies.update) {
96
- set(action, "config.permissionCheck", permissionPolicies.update);
97
- }
98
- } else if (action.code === "deleteCollectionEntityById" || action.code === "deleteCollectionEntities") {
99
- const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
100
- if (!model) {
101
- continue;
102
- }
103
- const { permissionPolicies } = model;
104
- if (!permissionPolicies) {
105
- continue;
106
- }
107
- if (permissionPolicies.delete) {
108
- set(action, "config.permissionCheck", permissionPolicies.delete);
109
- }
110
- }
111
- }
112
- }
113
- }
114
-
115
- async onPrepareRouteContext(server: IRpdServer, routeContext: RouteContext) {
116
- const userId = routeContext.state.userId;
117
- if (!userId) {
118
- return;
119
- }
120
-
121
- const actions = await server.queryDatabaseObject(
122
- `select distinct a.* from sys_actions a
123
- inner join oc_role_sys_action_links ra on a.id = ra.action_id
124
- inner join oc_role_user_links ru on ru.role_id = ra.role_id
125
- where ru.user_id = $1;`,
126
- [userId],
127
- );
128
- routeContext.state.allowedActions = actions.map((item) => item.code);
129
- }
130
-
131
- async beforeRunRouteActions(server: IRpdServer, handlerContext: ActionHandlerContext): Promise<any> {
132
- // Check permission
133
- const { routerContext } = handlerContext;
134
- const { routeConfig } = routerContext;
135
- for (const actionConfig of routeConfig.actions) {
136
- const permissionCheck = actionConfig.config?.permissionCheck;
137
- if (permissionCheck) {
138
- if (!isAccessAllowed(permissionCheck, routerContext.state.allowedActions || [])) {
139
- throw new Error(`Your action of '${actionConfig.code}' is not permitted.`);
140
- }
141
- }
142
- }
143
- }
144
- }
145
-
146
- export default EntityAccessControlPlugin;
1
+ import type { RpdApplicationConfig, RpdDataModelProperty } from "~/types";
2
+
3
+ import {
4
+ IRpdServer,
5
+ RapidPlugin,
6
+ RpdConfigurationItemOptions,
7
+ RpdServerPluginConfigurableTargetOptions,
8
+ RpdServerPluginExtendingAbilities,
9
+ } from "~/core/server";
10
+ import { find, set } from "lodash";
11
+ import { ActionHandlerContext } from "~/core/actionHandler";
12
+ import { isAccessAllowed } from "~/utilities/accessControlUtility";
13
+ import { RouteContext } from "~/core/routeContext";
14
+
15
+ class EntityAccessControlPlugin implements RapidPlugin {
16
+ constructor() {}
17
+
18
+ get code(): string {
19
+ return "entityAccessControl";
20
+ }
21
+
22
+ get description(): string {
23
+ return "";
24
+ }
25
+
26
+ get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
27
+ return [];
28
+ }
29
+
30
+ get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
31
+ return [];
32
+ }
33
+
34
+ get configurations(): RpdConfigurationItemOptions[] {
35
+ return [];
36
+ }
37
+
38
+ async onLoadingApplication(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
39
+ const properties: RpdDataModelProperty[] = [
40
+ {
41
+ name: "permissionPolicies",
42
+ code: "permissionPolicies",
43
+ columnName: "permission_policies",
44
+ type: "json",
45
+ },
46
+ ];
47
+ server.appendModelProperties("model", properties);
48
+ }
49
+
50
+ async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
51
+ const logger = server.getLogger();
52
+ logger.info("Configuring entity access checking policies...");
53
+
54
+ const routes = applicationConfig.routes;
55
+ for (const route of routes) {
56
+ const { actions } = route;
57
+ if (!actions) {
58
+ continue;
59
+ }
60
+
61
+ for (const action of route.actions) {
62
+ if (action.code === "findCollectionEntityById" || action.code === "findCollectionEntities" || action.code === "countCollectionEntities") {
63
+ const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
64
+ if (!model) {
65
+ continue;
66
+ }
67
+ const { permissionPolicies } = model;
68
+ if (!permissionPolicies) {
69
+ continue;
70
+ }
71
+ if (permissionPolicies.find) {
72
+ set(action, "config.permissionCheck", permissionPolicies.find);
73
+ }
74
+ } else if (action.code === "createCollectionEntity" || action.code === "createCollectionEntitiesBatch") {
75
+ const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
76
+ if (!model) {
77
+ continue;
78
+ }
79
+ const { permissionPolicies } = model;
80
+ if (!permissionPolicies) {
81
+ continue;
82
+ }
83
+ if (permissionPolicies.create) {
84
+ set(action, "config.permissionCheck", permissionPolicies.create);
85
+ }
86
+ } else if (action.code === "updateCollectionEntityById" || action.code === "addEntityRelations" || action.code === "removeEntityRelations") {
87
+ const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
88
+ if (!model) {
89
+ continue;
90
+ }
91
+ const { permissionPolicies } = model;
92
+ if (!permissionPolicies) {
93
+ continue;
94
+ }
95
+ if (permissionPolicies.update) {
96
+ set(action, "config.permissionCheck", permissionPolicies.update);
97
+ }
98
+ } else if (action.code === "deleteCollectionEntityById" || action.code === "deleteCollectionEntities") {
99
+ const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
100
+ if (!model) {
101
+ continue;
102
+ }
103
+ const { permissionPolicies } = model;
104
+ if (!permissionPolicies) {
105
+ continue;
106
+ }
107
+ if (permissionPolicies.delete) {
108
+ set(action, "config.permissionCheck", permissionPolicies.delete);
109
+ }
110
+ }
111
+ }
112
+ }
113
+ }
114
+
115
+ async onPrepareRouteContext(server: IRpdServer, routeContext: RouteContext) {
116
+ const userId = routeContext.state.userId;
117
+ if (!userId) {
118
+ return;
119
+ }
120
+
121
+ const actions = await server.queryDatabaseObject(
122
+ `select distinct a.* from sys_actions a
123
+ inner join oc_role_sys_action_links ra on a.id = ra.action_id
124
+ inner join oc_role_user_links ru on ru.role_id = ra.role_id
125
+ where ru.user_id = $1;`,
126
+ [userId],
127
+ );
128
+ routeContext.state.allowedActions = actions.map((item) => item.code);
129
+ }
130
+
131
+ async beforeRunRouteActions(server: IRpdServer, handlerContext: ActionHandlerContext): Promise<any> {
132
+ // Check permission
133
+ const { routerContext } = handlerContext;
134
+ const { routeConfig } = routerContext;
135
+ for (const actionConfig of routeConfig.actions) {
136
+ const permissionCheck = actionConfig.config?.permissionCheck;
137
+ if (permissionCheck) {
138
+ if (!isAccessAllowed(permissionCheck, routerContext.state.allowedActions || [])) {
139
+ throw new Error(`Your action of '${actionConfig.code}' is not permitted.`);
140
+ }
141
+ }
142
+ }
143
+ }
144
+ }
145
+
146
+ export default EntityAccessControlPlugin;
@@ -1,52 +1,52 @@
1
- /**
2
- * File manager plugin
3
- */
4
-
5
- import { RpdApplicationConfig } from "~/types";
6
-
7
- import * as downloadDocumentActionHandler from "./actionHandlers/downloadDocument";
8
- import * as downloadFileActionHandler from "./actionHandlers/downloadFile";
9
- import * as uploadFileActionHandler from "./actionHandlers/uploadFile";
10
- import {
11
- IRpdServer,
12
- RapidPlugin,
13
- RpdConfigurationItemOptions,
14
- RpdServerPluginConfigurableTargetOptions,
15
- RpdServerPluginExtendingAbilities,
16
- } from "~/core/server";
17
-
18
- import pluginRoutes from "./routes";
19
-
20
- class FileManager implements RapidPlugin {
21
- get code(): string {
22
- return "fileManager";
23
- }
24
-
25
- get description(): string {
26
- return null;
27
- }
28
-
29
- get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
30
- return [];
31
- }
32
-
33
- get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
34
- return [];
35
- }
36
-
37
- get configurations(): RpdConfigurationItemOptions[] {
38
- return [];
39
- }
40
-
41
- async registerActionHandlers(server: IRpdServer): Promise<any> {
42
- server.registerActionHandler(this, downloadDocumentActionHandler);
43
- server.registerActionHandler(this, downloadFileActionHandler);
44
- server.registerActionHandler(this, uploadFileActionHandler);
45
- }
46
-
47
- async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
48
- server.appendApplicationConfig({ routes: pluginRoutes });
49
- }
50
- }
51
-
52
- export default FileManager;
1
+ /**
2
+ * File manager plugin
3
+ */
4
+
5
+ import { RpdApplicationConfig } from "~/types";
6
+
7
+ import * as downloadDocumentActionHandler from "./actionHandlers/downloadDocument";
8
+ import * as downloadFileActionHandler from "./actionHandlers/downloadFile";
9
+ import * as uploadFileActionHandler from "./actionHandlers/uploadFile";
10
+ import {
11
+ IRpdServer,
12
+ RapidPlugin,
13
+ RpdConfigurationItemOptions,
14
+ RpdServerPluginConfigurableTargetOptions,
15
+ RpdServerPluginExtendingAbilities,
16
+ } from "~/core/server";
17
+
18
+ import pluginRoutes from "./routes";
19
+
20
+ class FileManager implements RapidPlugin {
21
+ get code(): string {
22
+ return "fileManager";
23
+ }
24
+
25
+ get description(): string {
26
+ return null;
27
+ }
28
+
29
+ get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
30
+ return [];
31
+ }
32
+
33
+ get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
34
+ return [];
35
+ }
36
+
37
+ get configurations(): RpdConfigurationItemOptions[] {
38
+ return [];
39
+ }
40
+
41
+ async registerActionHandlers(server: IRpdServer): Promise<any> {
42
+ server.registerActionHandler(this, downloadDocumentActionHandler);
43
+ server.registerActionHandler(this, downloadFileActionHandler);
44
+ server.registerActionHandler(this, uploadFileActionHandler);
45
+ }
46
+
47
+ async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
48
+ server.appendApplicationConfig({ routes: pluginRoutes });
49
+ }
50
+ }
51
+
52
+ export default FileManager;
@@ -1,44 +1,44 @@
1
- import path from "path";
2
- import { readFile } from "~/utilities/fsUtility";
3
- import { ActionHandlerContext } from "~/core/actionHandler";
4
- import { RapidPlugin } from "~/core/server";
5
-
6
- export type DownloadFileInput = {
7
- fileId?: string;
8
- fileKey?: string;
9
- fileName?: string;
10
- inline?: boolean;
11
- };
12
-
13
- export const code = "downloadFile";
14
-
15
- export async function handler(plugin: RapidPlugin, ctx: ActionHandlerContext, options: any) {
16
- const { server, applicationConfig, routerContext } = ctx;
17
- const { request, response } = routerContext;
18
- //TODO: only public files can download by this handler
19
-
20
- const input: DownloadFileInput = ctx.input;
21
-
22
- let fileKey: string = input.fileKey;
23
-
24
- if (!fileKey && input.fileId) {
25
- const dataAccessor = ctx.server.getDataAccessor({
26
- singularCode: "ecm_storage_object",
27
- });
28
-
29
- const storageObject = await dataAccessor.findById(input.fileId);
30
- if (!storageObject) {
31
- ctx.output = { error: new Error("Storage object not found.") };
32
- return;
33
- }
34
-
35
- fileKey = storageObject.key;
36
- }
37
- const filePathName = path.join(server.config.localFileStoragePath, fileKey);
38
- const attachmentFileName = input.fileName || path.basename(fileKey);
39
-
40
- response.body = await readFile(filePathName);
41
-
42
- const dispositionType = input.inline ? "inline" : "attachment";
43
- response.headers.set("Content-Disposition", `${dispositionType}; filename="${encodeURIComponent(attachmentFileName)}"`);
44
- }
1
+ import path from "path";
2
+ import { readFile } from "~/utilities/fsUtility";
3
+ import { ActionHandlerContext } from "~/core/actionHandler";
4
+ import { RapidPlugin } from "~/core/server";
5
+
6
+ export type DownloadFileInput = {
7
+ fileId?: string;
8
+ fileKey?: string;
9
+ fileName?: string;
10
+ inline?: boolean;
11
+ };
12
+
13
+ export const code = "downloadFile";
14
+
15
+ export async function handler(plugin: RapidPlugin, ctx: ActionHandlerContext, options: any) {
16
+ const { server, applicationConfig, routerContext } = ctx;
17
+ const { request, response } = routerContext;
18
+ //TODO: only public files can download by this handler
19
+
20
+ const input: DownloadFileInput = ctx.input;
21
+
22
+ let fileKey: string = input.fileKey;
23
+
24
+ if (!fileKey && input.fileId) {
25
+ const dataAccessor = ctx.server.getDataAccessor({
26
+ singularCode: "ecm_storage_object",
27
+ });
28
+
29
+ const storageObject = await dataAccessor.findById(input.fileId);
30
+ if (!storageObject) {
31
+ ctx.output = { error: new Error("Storage object not found.") };
32
+ return;
33
+ }
34
+
35
+ fileKey = storageObject.key;
36
+ }
37
+ const filePathName = path.join(server.config.localFileStoragePath, fileKey);
38
+ const attachmentFileName = input.fileName || path.basename(fileKey);
39
+
40
+ response.body = await readFile(filePathName);
41
+
42
+ const dispositionType = input.inline ? "inline" : "attachment";
43
+ response.headers.set("Content-Disposition", `${dispositionType}; filename="${encodeURIComponent(attachmentFileName)}"`);
44
+ }