@ruiapp/rapid-core 0.1.82 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bootstrapApplicationConfig.d.ts +6 -0
- package/dist/helpers/metaHelper.d.ts +3 -3
- package/dist/index.js +57 -16
- package/dist/plugins/webhooks/pluginConfig.d.ts +1 -0
- package/dist/types.d.ts +19 -1
- package/package.json +1 -1
- package/src/bootstrapApplicationConfig.ts +615 -602
- package/src/core/server.ts +142 -142
- package/src/dataAccess/columnTypeMapper.ts +22 -22
- package/src/dataAccess/dataAccessTypes.ts +151 -151
- package/src/dataAccess/entityManager.ts +1499 -1496
- package/src/dataAccess/entityMapper.ts +100 -100
- package/src/dataAccess/propertyMapper.ts +28 -28
- package/src/deno-std/http/cookie.ts +372 -372
- package/src/helpers/filterHelper.ts +47 -47
- package/src/helpers/metaHelper.ts +80 -76
- package/src/helpers/runCollectionEntityActionHandler.ts +27 -27
- package/src/index.ts +46 -46
- package/src/plugins/auth/AuthPlugin.ts +85 -85
- package/src/plugins/cronJob/CronJobPlugin.ts +112 -112
- package/src/plugins/dataManage/DataManagePlugin.ts +163 -163
- package/src/plugins/dataManage/actionHandlers/deleteCollectionEntities.ts +38 -38
- package/src/plugins/dataManage/actionHandlers/deleteCollectionEntityById.ts +22 -22
- package/src/plugins/entityAccessControl/EntityAccessControlPlugin.ts +146 -146
- package/src/plugins/fileManage/FileManagePlugin.ts +52 -52
- package/src/plugins/fileManage/actionHandlers/downloadFile.ts +44 -44
- package/src/plugins/metaManage/MetaManagePlugin.ts +500 -488
- package/src/plugins/routeManage/RouteManagePlugin.ts +62 -62
- package/src/plugins/sequence/SequencePlugin.ts +136 -136
- package/src/plugins/sequence/SequencePluginTypes.ts +69 -69
- package/src/plugins/sequence/segments/autoIncrement.ts +78 -78
- package/src/plugins/sequence/segments/dayOfMonth.ts +17 -17
- package/src/plugins/sequence/segments/literal.ts +14 -14
- package/src/plugins/sequence/segments/month.ts +17 -17
- package/src/plugins/sequence/segments/parameter.ts +18 -18
- package/src/plugins/sequence/segments/year.ts +17 -17
- package/src/plugins/setting/SettingPlugin.ts +68 -68
- package/src/plugins/setting/SettingPluginTypes.ts +37 -37
- package/src/plugins/stateMachine/StateMachinePlugin.ts +186 -186
- package/src/plugins/stateMachine/StateMachinePluginTypes.ts +48 -48
- package/src/plugins/webhooks/WebhooksPlugin.ts +148 -148
- package/src/plugins/webhooks/pluginConfig.ts +1 -0
- package/src/queryBuilder/queryBuilder.ts +637 -637
- package/src/server.ts +463 -451
- package/src/types.ts +659 -637
- package/src/utilities/errorUtility.ts +15 -15
|
@@ -1,146 +1,146 @@
|
|
|
1
|
-
import type { RpdApplicationConfig, RpdDataModelProperty } from "~/types";
|
|
2
|
-
|
|
3
|
-
import {
|
|
4
|
-
IRpdServer,
|
|
5
|
-
RapidPlugin,
|
|
6
|
-
RpdConfigurationItemOptions,
|
|
7
|
-
RpdServerPluginConfigurableTargetOptions,
|
|
8
|
-
RpdServerPluginExtendingAbilities,
|
|
9
|
-
} from "~/core/server";
|
|
10
|
-
import { find, set } from "lodash";
|
|
11
|
-
import { ActionHandlerContext } from "~/core/actionHandler";
|
|
12
|
-
import { isAccessAllowed } from "~/utilities/accessControlUtility";
|
|
13
|
-
import { RouteContext } from "~/core/routeContext";
|
|
14
|
-
|
|
15
|
-
class EntityAccessControlPlugin implements RapidPlugin {
|
|
16
|
-
constructor() {}
|
|
17
|
-
|
|
18
|
-
get code(): string {
|
|
19
|
-
return "entityAccessControl";
|
|
20
|
-
}
|
|
21
|
-
|
|
22
|
-
get description(): string {
|
|
23
|
-
return "";
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
|
|
27
|
-
return [];
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
|
|
31
|
-
return [];
|
|
32
|
-
}
|
|
33
|
-
|
|
34
|
-
get configurations(): RpdConfigurationItemOptions[] {
|
|
35
|
-
return [];
|
|
36
|
-
}
|
|
37
|
-
|
|
38
|
-
async onLoadingApplication(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
39
|
-
const properties: RpdDataModelProperty[] = [
|
|
40
|
-
{
|
|
41
|
-
name: "permissionPolicies",
|
|
42
|
-
code: "permissionPolicies",
|
|
43
|
-
columnName: "permission_policies",
|
|
44
|
-
type: "json",
|
|
45
|
-
},
|
|
46
|
-
];
|
|
47
|
-
server.appendModelProperties("model", properties);
|
|
48
|
-
}
|
|
49
|
-
|
|
50
|
-
async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
51
|
-
const logger = server.getLogger();
|
|
52
|
-
logger.info("Configuring entity access checking policies...");
|
|
53
|
-
|
|
54
|
-
const routes = applicationConfig.routes;
|
|
55
|
-
for (const route of routes) {
|
|
56
|
-
const { actions } = route;
|
|
57
|
-
if (!actions) {
|
|
58
|
-
continue;
|
|
59
|
-
}
|
|
60
|
-
|
|
61
|
-
for (const action of route.actions) {
|
|
62
|
-
if (action.code === "findCollectionEntityById" || action.code === "findCollectionEntities" || action.code === "countCollectionEntities") {
|
|
63
|
-
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
64
|
-
if (!model) {
|
|
65
|
-
continue;
|
|
66
|
-
}
|
|
67
|
-
const { permissionPolicies } = model;
|
|
68
|
-
if (!permissionPolicies) {
|
|
69
|
-
continue;
|
|
70
|
-
}
|
|
71
|
-
if (permissionPolicies.find) {
|
|
72
|
-
set(action, "config.permissionCheck", permissionPolicies.find);
|
|
73
|
-
}
|
|
74
|
-
} else if (action.code === "createCollectionEntity" || action.code === "createCollectionEntitiesBatch") {
|
|
75
|
-
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
76
|
-
if (!model) {
|
|
77
|
-
continue;
|
|
78
|
-
}
|
|
79
|
-
const { permissionPolicies } = model;
|
|
80
|
-
if (!permissionPolicies) {
|
|
81
|
-
continue;
|
|
82
|
-
}
|
|
83
|
-
if (permissionPolicies.create) {
|
|
84
|
-
set(action, "config.permissionCheck", permissionPolicies.create);
|
|
85
|
-
}
|
|
86
|
-
} else if (action.code === "updateCollectionEntityById" || action.code === "addEntityRelations" || action.code === "removeEntityRelations") {
|
|
87
|
-
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
88
|
-
if (!model) {
|
|
89
|
-
continue;
|
|
90
|
-
}
|
|
91
|
-
const { permissionPolicies } = model;
|
|
92
|
-
if (!permissionPolicies) {
|
|
93
|
-
continue;
|
|
94
|
-
}
|
|
95
|
-
if (permissionPolicies.update) {
|
|
96
|
-
set(action, "config.permissionCheck", permissionPolicies.update);
|
|
97
|
-
}
|
|
98
|
-
} else if (action.code === "deleteCollectionEntityById" || action.code === "deleteCollectionEntities") {
|
|
99
|
-
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
100
|
-
if (!model) {
|
|
101
|
-
continue;
|
|
102
|
-
}
|
|
103
|
-
const { permissionPolicies } = model;
|
|
104
|
-
if (!permissionPolicies) {
|
|
105
|
-
continue;
|
|
106
|
-
}
|
|
107
|
-
if (permissionPolicies.delete) {
|
|
108
|
-
set(action, "config.permissionCheck", permissionPolicies.delete);
|
|
109
|
-
}
|
|
110
|
-
}
|
|
111
|
-
}
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
|
|
115
|
-
async onPrepareRouteContext(server: IRpdServer, routeContext: RouteContext) {
|
|
116
|
-
const userId = routeContext.state.userId;
|
|
117
|
-
if (!userId) {
|
|
118
|
-
return;
|
|
119
|
-
}
|
|
120
|
-
|
|
121
|
-
const actions = await server.queryDatabaseObject(
|
|
122
|
-
`select distinct a.* from sys_actions a
|
|
123
|
-
inner join oc_role_sys_action_links ra on a.id = ra.action_id
|
|
124
|
-
inner join oc_role_user_links ru on ru.role_id = ra.role_id
|
|
125
|
-
where ru.user_id = $1;`,
|
|
126
|
-
[userId],
|
|
127
|
-
);
|
|
128
|
-
routeContext.state.allowedActions = actions.map((item) => item.code);
|
|
129
|
-
}
|
|
130
|
-
|
|
131
|
-
async beforeRunRouteActions(server: IRpdServer, handlerContext: ActionHandlerContext): Promise<any> {
|
|
132
|
-
// Check permission
|
|
133
|
-
const { routerContext } = handlerContext;
|
|
134
|
-
const { routeConfig } = routerContext;
|
|
135
|
-
for (const actionConfig of routeConfig.actions) {
|
|
136
|
-
const permissionCheck = actionConfig.config?.permissionCheck;
|
|
137
|
-
if (permissionCheck) {
|
|
138
|
-
if (!isAccessAllowed(permissionCheck, routerContext.state.allowedActions || [])) {
|
|
139
|
-
throw new Error(`Your action of '${actionConfig.code}' is not permitted.`);
|
|
140
|
-
}
|
|
141
|
-
}
|
|
142
|
-
}
|
|
143
|
-
}
|
|
144
|
-
}
|
|
145
|
-
|
|
146
|
-
export default EntityAccessControlPlugin;
|
|
1
|
+
import type { RpdApplicationConfig, RpdDataModelProperty } from "~/types";
|
|
2
|
+
|
|
3
|
+
import {
|
|
4
|
+
IRpdServer,
|
|
5
|
+
RapidPlugin,
|
|
6
|
+
RpdConfigurationItemOptions,
|
|
7
|
+
RpdServerPluginConfigurableTargetOptions,
|
|
8
|
+
RpdServerPluginExtendingAbilities,
|
|
9
|
+
} from "~/core/server";
|
|
10
|
+
import { find, set } from "lodash";
|
|
11
|
+
import { ActionHandlerContext } from "~/core/actionHandler";
|
|
12
|
+
import { isAccessAllowed } from "~/utilities/accessControlUtility";
|
|
13
|
+
import { RouteContext } from "~/core/routeContext";
|
|
14
|
+
|
|
15
|
+
class EntityAccessControlPlugin implements RapidPlugin {
|
|
16
|
+
constructor() {}
|
|
17
|
+
|
|
18
|
+
get code(): string {
|
|
19
|
+
return "entityAccessControl";
|
|
20
|
+
}
|
|
21
|
+
|
|
22
|
+
get description(): string {
|
|
23
|
+
return "";
|
|
24
|
+
}
|
|
25
|
+
|
|
26
|
+
get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
|
|
27
|
+
return [];
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
|
|
31
|
+
return [];
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
get configurations(): RpdConfigurationItemOptions[] {
|
|
35
|
+
return [];
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
async onLoadingApplication(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
39
|
+
const properties: RpdDataModelProperty[] = [
|
|
40
|
+
{
|
|
41
|
+
name: "permissionPolicies",
|
|
42
|
+
code: "permissionPolicies",
|
|
43
|
+
columnName: "permission_policies",
|
|
44
|
+
type: "json",
|
|
45
|
+
},
|
|
46
|
+
];
|
|
47
|
+
server.appendModelProperties("model", properties);
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
51
|
+
const logger = server.getLogger();
|
|
52
|
+
logger.info("Configuring entity access checking policies...");
|
|
53
|
+
|
|
54
|
+
const routes = applicationConfig.routes;
|
|
55
|
+
for (const route of routes) {
|
|
56
|
+
const { actions } = route;
|
|
57
|
+
if (!actions) {
|
|
58
|
+
continue;
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
for (const action of route.actions) {
|
|
62
|
+
if (action.code === "findCollectionEntityById" || action.code === "findCollectionEntities" || action.code === "countCollectionEntities") {
|
|
63
|
+
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
64
|
+
if (!model) {
|
|
65
|
+
continue;
|
|
66
|
+
}
|
|
67
|
+
const { permissionPolicies } = model;
|
|
68
|
+
if (!permissionPolicies) {
|
|
69
|
+
continue;
|
|
70
|
+
}
|
|
71
|
+
if (permissionPolicies.find) {
|
|
72
|
+
set(action, "config.permissionCheck", permissionPolicies.find);
|
|
73
|
+
}
|
|
74
|
+
} else if (action.code === "createCollectionEntity" || action.code === "createCollectionEntitiesBatch") {
|
|
75
|
+
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
76
|
+
if (!model) {
|
|
77
|
+
continue;
|
|
78
|
+
}
|
|
79
|
+
const { permissionPolicies } = model;
|
|
80
|
+
if (!permissionPolicies) {
|
|
81
|
+
continue;
|
|
82
|
+
}
|
|
83
|
+
if (permissionPolicies.create) {
|
|
84
|
+
set(action, "config.permissionCheck", permissionPolicies.create);
|
|
85
|
+
}
|
|
86
|
+
} else if (action.code === "updateCollectionEntityById" || action.code === "addEntityRelations" || action.code === "removeEntityRelations") {
|
|
87
|
+
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
88
|
+
if (!model) {
|
|
89
|
+
continue;
|
|
90
|
+
}
|
|
91
|
+
const { permissionPolicies } = model;
|
|
92
|
+
if (!permissionPolicies) {
|
|
93
|
+
continue;
|
|
94
|
+
}
|
|
95
|
+
if (permissionPolicies.update) {
|
|
96
|
+
set(action, "config.permissionCheck", permissionPolicies.update);
|
|
97
|
+
}
|
|
98
|
+
} else if (action.code === "deleteCollectionEntityById" || action.code === "deleteCollectionEntities") {
|
|
99
|
+
const model = find(applicationConfig.models, (item) => item.singularCode === action.config.singularCode);
|
|
100
|
+
if (!model) {
|
|
101
|
+
continue;
|
|
102
|
+
}
|
|
103
|
+
const { permissionPolicies } = model;
|
|
104
|
+
if (!permissionPolicies) {
|
|
105
|
+
continue;
|
|
106
|
+
}
|
|
107
|
+
if (permissionPolicies.delete) {
|
|
108
|
+
set(action, "config.permissionCheck", permissionPolicies.delete);
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
async onPrepareRouteContext(server: IRpdServer, routeContext: RouteContext) {
|
|
116
|
+
const userId = routeContext.state.userId;
|
|
117
|
+
if (!userId) {
|
|
118
|
+
return;
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
const actions = await server.queryDatabaseObject(
|
|
122
|
+
`select distinct a.* from sys_actions a
|
|
123
|
+
inner join oc_role_sys_action_links ra on a.id = ra.action_id
|
|
124
|
+
inner join oc_role_user_links ru on ru.role_id = ra.role_id
|
|
125
|
+
where ru.user_id = $1;`,
|
|
126
|
+
[userId],
|
|
127
|
+
);
|
|
128
|
+
routeContext.state.allowedActions = actions.map((item) => item.code);
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
async beforeRunRouteActions(server: IRpdServer, handlerContext: ActionHandlerContext): Promise<any> {
|
|
132
|
+
// Check permission
|
|
133
|
+
const { routerContext } = handlerContext;
|
|
134
|
+
const { routeConfig } = routerContext;
|
|
135
|
+
for (const actionConfig of routeConfig.actions) {
|
|
136
|
+
const permissionCheck = actionConfig.config?.permissionCheck;
|
|
137
|
+
if (permissionCheck) {
|
|
138
|
+
if (!isAccessAllowed(permissionCheck, routerContext.state.allowedActions || [])) {
|
|
139
|
+
throw new Error(`Your action of '${actionConfig.code}' is not permitted.`);
|
|
140
|
+
}
|
|
141
|
+
}
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
export default EntityAccessControlPlugin;
|
|
@@ -1,52 +1,52 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* File manager plugin
|
|
3
|
-
*/
|
|
4
|
-
|
|
5
|
-
import { RpdApplicationConfig } from "~/types";
|
|
6
|
-
|
|
7
|
-
import * as downloadDocumentActionHandler from "./actionHandlers/downloadDocument";
|
|
8
|
-
import * as downloadFileActionHandler from "./actionHandlers/downloadFile";
|
|
9
|
-
import * as uploadFileActionHandler from "./actionHandlers/uploadFile";
|
|
10
|
-
import {
|
|
11
|
-
IRpdServer,
|
|
12
|
-
RapidPlugin,
|
|
13
|
-
RpdConfigurationItemOptions,
|
|
14
|
-
RpdServerPluginConfigurableTargetOptions,
|
|
15
|
-
RpdServerPluginExtendingAbilities,
|
|
16
|
-
} from "~/core/server";
|
|
17
|
-
|
|
18
|
-
import pluginRoutes from "./routes";
|
|
19
|
-
|
|
20
|
-
class FileManager implements RapidPlugin {
|
|
21
|
-
get code(): string {
|
|
22
|
-
return "fileManager";
|
|
23
|
-
}
|
|
24
|
-
|
|
25
|
-
get description(): string {
|
|
26
|
-
return null;
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
|
|
30
|
-
return [];
|
|
31
|
-
}
|
|
32
|
-
|
|
33
|
-
get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
|
|
34
|
-
return [];
|
|
35
|
-
}
|
|
36
|
-
|
|
37
|
-
get configurations(): RpdConfigurationItemOptions[] {
|
|
38
|
-
return [];
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
async registerActionHandlers(server: IRpdServer): Promise<any> {
|
|
42
|
-
server.registerActionHandler(this, downloadDocumentActionHandler);
|
|
43
|
-
server.registerActionHandler(this, downloadFileActionHandler);
|
|
44
|
-
server.registerActionHandler(this, uploadFileActionHandler);
|
|
45
|
-
}
|
|
46
|
-
|
|
47
|
-
async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
48
|
-
server.appendApplicationConfig({ routes: pluginRoutes });
|
|
49
|
-
}
|
|
50
|
-
}
|
|
51
|
-
|
|
52
|
-
export default FileManager;
|
|
1
|
+
/**
|
|
2
|
+
* File manager plugin
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { RpdApplicationConfig } from "~/types";
|
|
6
|
+
|
|
7
|
+
import * as downloadDocumentActionHandler from "./actionHandlers/downloadDocument";
|
|
8
|
+
import * as downloadFileActionHandler from "./actionHandlers/downloadFile";
|
|
9
|
+
import * as uploadFileActionHandler from "./actionHandlers/uploadFile";
|
|
10
|
+
import {
|
|
11
|
+
IRpdServer,
|
|
12
|
+
RapidPlugin,
|
|
13
|
+
RpdConfigurationItemOptions,
|
|
14
|
+
RpdServerPluginConfigurableTargetOptions,
|
|
15
|
+
RpdServerPluginExtendingAbilities,
|
|
16
|
+
} from "~/core/server";
|
|
17
|
+
|
|
18
|
+
import pluginRoutes from "./routes";
|
|
19
|
+
|
|
20
|
+
class FileManager implements RapidPlugin {
|
|
21
|
+
get code(): string {
|
|
22
|
+
return "fileManager";
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
get description(): string {
|
|
26
|
+
return null;
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
get extendingAbilities(): RpdServerPluginExtendingAbilities[] {
|
|
30
|
+
return [];
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
get configurableTargets(): RpdServerPluginConfigurableTargetOptions[] {
|
|
34
|
+
return [];
|
|
35
|
+
}
|
|
36
|
+
|
|
37
|
+
get configurations(): RpdConfigurationItemOptions[] {
|
|
38
|
+
return [];
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
async registerActionHandlers(server: IRpdServer): Promise<any> {
|
|
42
|
+
server.registerActionHandler(this, downloadDocumentActionHandler);
|
|
43
|
+
server.registerActionHandler(this, downloadFileActionHandler);
|
|
44
|
+
server.registerActionHandler(this, uploadFileActionHandler);
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
async configureRoutes(server: IRpdServer, applicationConfig: RpdApplicationConfig): Promise<any> {
|
|
48
|
+
server.appendApplicationConfig({ routes: pluginRoutes });
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
export default FileManager;
|
|
@@ -1,44 +1,44 @@
|
|
|
1
|
-
import path from "path";
|
|
2
|
-
import { readFile } from "~/utilities/fsUtility";
|
|
3
|
-
import { ActionHandlerContext } from "~/core/actionHandler";
|
|
4
|
-
import { RapidPlugin } from "~/core/server";
|
|
5
|
-
|
|
6
|
-
export type DownloadFileInput = {
|
|
7
|
-
fileId?: string;
|
|
8
|
-
fileKey?: string;
|
|
9
|
-
fileName?: string;
|
|
10
|
-
inline?: boolean;
|
|
11
|
-
};
|
|
12
|
-
|
|
13
|
-
export const code = "downloadFile";
|
|
14
|
-
|
|
15
|
-
export async function handler(plugin: RapidPlugin, ctx: ActionHandlerContext, options: any) {
|
|
16
|
-
const { server, applicationConfig, routerContext } = ctx;
|
|
17
|
-
const { request, response } = routerContext;
|
|
18
|
-
//TODO: only public files can download by this handler
|
|
19
|
-
|
|
20
|
-
const input: DownloadFileInput = ctx.input;
|
|
21
|
-
|
|
22
|
-
let fileKey: string = input.fileKey;
|
|
23
|
-
|
|
24
|
-
if (!fileKey && input.fileId) {
|
|
25
|
-
const dataAccessor = ctx.server.getDataAccessor({
|
|
26
|
-
singularCode: "ecm_storage_object",
|
|
27
|
-
});
|
|
28
|
-
|
|
29
|
-
const storageObject = await dataAccessor.findById(input.fileId);
|
|
30
|
-
if (!storageObject) {
|
|
31
|
-
ctx.output = { error: new Error("Storage object not found.") };
|
|
32
|
-
return;
|
|
33
|
-
}
|
|
34
|
-
|
|
35
|
-
fileKey = storageObject.key;
|
|
36
|
-
}
|
|
37
|
-
const filePathName = path.join(server.config.localFileStoragePath, fileKey);
|
|
38
|
-
const attachmentFileName = input.fileName || path.basename(fileKey);
|
|
39
|
-
|
|
40
|
-
response.body = await readFile(filePathName);
|
|
41
|
-
|
|
42
|
-
const dispositionType = input.inline ? "inline" : "attachment";
|
|
43
|
-
response.headers.set("Content-Disposition", `${dispositionType}; filename="${encodeURIComponent(attachmentFileName)}"`);
|
|
44
|
-
}
|
|
1
|
+
import path from "path";
|
|
2
|
+
import { readFile } from "~/utilities/fsUtility";
|
|
3
|
+
import { ActionHandlerContext } from "~/core/actionHandler";
|
|
4
|
+
import { RapidPlugin } from "~/core/server";
|
|
5
|
+
|
|
6
|
+
export type DownloadFileInput = {
|
|
7
|
+
fileId?: string;
|
|
8
|
+
fileKey?: string;
|
|
9
|
+
fileName?: string;
|
|
10
|
+
inline?: boolean;
|
|
11
|
+
};
|
|
12
|
+
|
|
13
|
+
export const code = "downloadFile";
|
|
14
|
+
|
|
15
|
+
export async function handler(plugin: RapidPlugin, ctx: ActionHandlerContext, options: any) {
|
|
16
|
+
const { server, applicationConfig, routerContext } = ctx;
|
|
17
|
+
const { request, response } = routerContext;
|
|
18
|
+
//TODO: only public files can download by this handler
|
|
19
|
+
|
|
20
|
+
const input: DownloadFileInput = ctx.input;
|
|
21
|
+
|
|
22
|
+
let fileKey: string = input.fileKey;
|
|
23
|
+
|
|
24
|
+
if (!fileKey && input.fileId) {
|
|
25
|
+
const dataAccessor = ctx.server.getDataAccessor({
|
|
26
|
+
singularCode: "ecm_storage_object",
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
const storageObject = await dataAccessor.findById(input.fileId);
|
|
30
|
+
if (!storageObject) {
|
|
31
|
+
ctx.output = { error: new Error("Storage object not found.") };
|
|
32
|
+
return;
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
fileKey = storageObject.key;
|
|
36
|
+
}
|
|
37
|
+
const filePathName = path.join(server.config.localFileStoragePath, fileKey);
|
|
38
|
+
const attachmentFileName = input.fileName || path.basename(fileKey);
|
|
39
|
+
|
|
40
|
+
response.body = await readFile(filePathName);
|
|
41
|
+
|
|
42
|
+
const dispositionType = input.inline ? "inline" : "attachment";
|
|
43
|
+
response.headers.set("Content-Disposition", `${dispositionType}; filename="${encodeURIComponent(attachmentFileName)}"`);
|
|
44
|
+
}
|