@strapi/admin 4.17.0 → 4.18.1-beta.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (1027) hide show
  1. package/index.js +1 -1
  2. package/package.json +36 -34
  3. package/dist/_chunks/AdminSeatInfo-6e7bbb97.mjs +0 -164
  4. package/dist/_chunks/AdminSeatInfo-6e7bbb97.mjs.map +0 -1
  5. package/dist/_chunks/AdminSeatInfo-a10d232f.js +0 -164
  6. package/dist/_chunks/AdminSeatInfo-a10d232f.js.map +0 -1
  7. package/dist/_chunks/AuthenticatedApp-47219c52.js +0 -1477
  8. package/dist/_chunks/AuthenticatedApp-47219c52.js.map +0 -1
  9. package/dist/_chunks/AuthenticatedApp-7d1fdf0c.mjs +0 -1451
  10. package/dist/_chunks/AuthenticatedApp-7d1fdf0c.mjs.map +0 -1
  11. package/dist/_chunks/CreateActionEE-42bd2b19.js +0 -63
  12. package/dist/_chunks/CreateActionEE-42bd2b19.js.map +0 -1
  13. package/dist/_chunks/CreateActionEE-eadd5955.mjs +0 -60
  14. package/dist/_chunks/CreateActionEE-eadd5955.mjs.map +0 -1
  15. package/dist/_chunks/CreatePage-17c8a6e4.mjs +0 -325
  16. package/dist/_chunks/CreatePage-17c8a6e4.mjs.map +0 -1
  17. package/dist/_chunks/CreatePage-32977ee7.mjs +0 -289
  18. package/dist/_chunks/CreatePage-32977ee7.mjs.map +0 -1
  19. package/dist/_chunks/CreatePage-3c0b9dd5.js +0 -346
  20. package/dist/_chunks/CreatePage-3c0b9dd5.js.map +0 -1
  21. package/dist/_chunks/CreatePage-4ba4bd0d.mjs +0 -82
  22. package/dist/_chunks/CreatePage-4ba4bd0d.mjs.map +0 -1
  23. package/dist/_chunks/CreatePage-d2a061b5.js +0 -82
  24. package/dist/_chunks/CreatePage-d2a061b5.js.map +0 -1
  25. package/dist/_chunks/CreatePage-eeb81776.js +0 -312
  26. package/dist/_chunks/CreatePage-eeb81776.js.map +0 -1
  27. package/dist/_chunks/CreateView-2bc998f1.mjs +0 -85
  28. package/dist/_chunks/CreateView-2bc998f1.mjs.map +0 -1
  29. package/dist/_chunks/CreateView-5a0b0eca.js +0 -89
  30. package/dist/_chunks/CreateView-5a0b0eca.js.map +0 -1
  31. package/dist/_chunks/CreateView-8b6412c9.mjs +0 -89
  32. package/dist/_chunks/CreateView-8b6412c9.mjs.map +0 -1
  33. package/dist/_chunks/CreateView-fc328787.js +0 -85
  34. package/dist/_chunks/CreateView-fc328787.js.map +0 -1
  35. package/dist/_chunks/EditPage-0b1a48f7.js +0 -499
  36. package/dist/_chunks/EditPage-0b1a48f7.js.map +0 -1
  37. package/dist/_chunks/EditPage-2b051ea8.mjs +0 -475
  38. package/dist/_chunks/EditPage-2b051ea8.mjs.map +0 -1
  39. package/dist/_chunks/EditPage-6d3fe437.mjs +0 -305
  40. package/dist/_chunks/EditPage-6d3fe437.mjs.map +0 -1
  41. package/dist/_chunks/EditPage-7b9355e4.mjs +0 -775
  42. package/dist/_chunks/EditPage-7b9355e4.mjs.map +0 -1
  43. package/dist/_chunks/EditPage-89052393.js +0 -796
  44. package/dist/_chunks/EditPage-89052393.js.map +0 -1
  45. package/dist/_chunks/EditPage-de127112.js +0 -325
  46. package/dist/_chunks/EditPage-de127112.js.map +0 -1
  47. package/dist/_chunks/EditPage-efc987d7.js +0 -404
  48. package/dist/_chunks/EditPage-efc987d7.js.map +0 -1
  49. package/dist/_chunks/EditPage-faee9ac1.mjs +0 -383
  50. package/dist/_chunks/EditPage-faee9ac1.mjs.map +0 -1
  51. package/dist/_chunks/EditView-0e4d7c80.mjs +0 -432
  52. package/dist/_chunks/EditView-0e4d7c80.mjs.map +0 -1
  53. package/dist/_chunks/EditView-e480d09f.js +0 -452
  54. package/dist/_chunks/EditView-e480d09f.js.map +0 -1
  55. package/dist/_chunks/EditViewPage-3e638ea4.mjs +0 -883
  56. package/dist/_chunks/EditViewPage-3e638ea4.mjs.map +0 -1
  57. package/dist/_chunks/EditViewPage-ef0292a9.js +0 -910
  58. package/dist/_chunks/EditViewPage-ef0292a9.js.map +0 -1
  59. package/dist/_chunks/EventsTable-21c9c326.mjs +0 -91
  60. package/dist/_chunks/EventsTable-21c9c326.mjs.map +0 -1
  61. package/dist/_chunks/EventsTable-c8ea750e.js +0 -91
  62. package/dist/_chunks/EventsTable-c8ea750e.js.map +0 -1
  63. package/dist/_chunks/Filters-4d67a6ca.js +0 -61
  64. package/dist/_chunks/Filters-4d67a6ca.js.map +0 -1
  65. package/dist/_chunks/Filters-8f3c8fcf.mjs +0 -43
  66. package/dist/_chunks/Filters-8f3c8fcf.mjs.map +0 -1
  67. package/dist/_chunks/HomePage-28c2fc09.mjs +0 -84
  68. package/dist/_chunks/HomePage-28c2fc09.mjs.map +0 -1
  69. package/dist/_chunks/HomePage-bfeba10a.mjs +0 -577
  70. package/dist/_chunks/HomePage-bfeba10a.mjs.map +0 -1
  71. package/dist/_chunks/HomePage-d9e5bcf6.js +0 -598
  72. package/dist/_chunks/HomePage-d9e5bcf6.js.map +0 -1
  73. package/dist/_chunks/HomePage-ef17de6c.js +0 -84
  74. package/dist/_chunks/HomePage-ef17de6c.js.map +0 -1
  75. package/dist/_chunks/InformationBoxEE-2d2b6c4a.js +0 -398
  76. package/dist/_chunks/InformationBoxEE-2d2b6c4a.js.map +0 -1
  77. package/dist/_chunks/InformationBoxEE-bd1d2894.mjs +0 -379
  78. package/dist/_chunks/InformationBoxEE-bd1d2894.mjs.map +0 -1
  79. package/dist/_chunks/InstalledPluginsPage-39a094a5.js +0 -189
  80. package/dist/_chunks/InstalledPluginsPage-39a094a5.js.map +0 -1
  81. package/dist/_chunks/InstalledPluginsPage-8e9b0b64.mjs +0 -170
  82. package/dist/_chunks/InstalledPluginsPage-8e9b0b64.mjs.map +0 -1
  83. package/dist/_chunks/InternalErrorPage-040dc993.mjs +0 -41
  84. package/dist/_chunks/InternalErrorPage-040dc993.mjs.map +0 -1
  85. package/dist/_chunks/InternalErrorPage-d0e51ac2.js +0 -41
  86. package/dist/_chunks/InternalErrorPage-d0e51ac2.js.map +0 -1
  87. package/dist/_chunks/Layout-caf718bb.mjs +0 -87
  88. package/dist/_chunks/Layout-caf718bb.mjs.map +0 -1
  89. package/dist/_chunks/Layout-cc5413b2.js +0 -88
  90. package/dist/_chunks/Layout-cc5413b2.js.map +0 -1
  91. package/dist/_chunks/LimitsModal-3327be54.js +0 -75
  92. package/dist/_chunks/LimitsModal-3327be54.js.map +0 -1
  93. package/dist/_chunks/LimitsModal-d438f513.mjs +0 -74
  94. package/dist/_chunks/LimitsModal-d438f513.mjs.map +0 -1
  95. package/dist/_chunks/ListPage-05df9b86.mjs +0 -345
  96. package/dist/_chunks/ListPage-05df9b86.mjs.map +0 -1
  97. package/dist/_chunks/ListPage-17fb477a.js +0 -389
  98. package/dist/_chunks/ListPage-17fb477a.js.map +0 -1
  99. package/dist/_chunks/ListPage-338d8ca5.js +0 -719
  100. package/dist/_chunks/ListPage-338d8ca5.js.map +0 -1
  101. package/dist/_chunks/ListPage-56d94335.js +0 -351
  102. package/dist/_chunks/ListPage-56d94335.js.map +0 -1
  103. package/dist/_chunks/ListPage-5e5ad2aa.js +0 -366
  104. package/dist/_chunks/ListPage-5e5ad2aa.js.map +0 -1
  105. package/dist/_chunks/ListPage-5ed3e9d2.mjs +0 -85
  106. package/dist/_chunks/ListPage-5ed3e9d2.mjs.map +0 -1
  107. package/dist/_chunks/ListPage-7d5baee5.mjs +0 -348
  108. package/dist/_chunks/ListPage-7d5baee5.mjs.map +0 -1
  109. package/dist/_chunks/ListPage-800398cd.mjs +0 -698
  110. package/dist/_chunks/ListPage-800398cd.mjs.map +0 -1
  111. package/dist/_chunks/ListPage-cc823a6a.js +0 -583
  112. package/dist/_chunks/ListPage-cc823a6a.js.map +0 -1
  113. package/dist/_chunks/ListPage-db17e758.js +0 -85
  114. package/dist/_chunks/ListPage-db17e758.js.map +0 -1
  115. package/dist/_chunks/ListPage-de4b7131.mjs +0 -580
  116. package/dist/_chunks/ListPage-de4b7131.mjs.map +0 -1
  117. package/dist/_chunks/ListPage-f43782c4.mjs +0 -370
  118. package/dist/_chunks/ListPage-f43782c4.mjs.map +0 -1
  119. package/dist/_chunks/ListView-521e309f.mjs +0 -271
  120. package/dist/_chunks/ListView-521e309f.mjs.map +0 -1
  121. package/dist/_chunks/ListView-80855396.js +0 -331
  122. package/dist/_chunks/ListView-80855396.js.map +0 -1
  123. package/dist/_chunks/ListView-a33ebe77.js +0 -292
  124. package/dist/_chunks/ListView-a33ebe77.js.map +0 -1
  125. package/dist/_chunks/ListView-b91a8da7.mjs +0 -310
  126. package/dist/_chunks/ListView-b91a8da7.mjs.map +0 -1
  127. package/dist/_chunks/Login-4eb1fb78.mjs +0 -101
  128. package/dist/_chunks/Login-4eb1fb78.mjs.map +0 -1
  129. package/dist/_chunks/Login-906ebde5.js +0 -103
  130. package/dist/_chunks/Login-906ebde5.js.map +0 -1
  131. package/dist/_chunks/MagicLinkEE-03128309.mjs +0 -92
  132. package/dist/_chunks/MagicLinkEE-03128309.mjs.map +0 -1
  133. package/dist/_chunks/MagicLinkEE-ab36ee0f.js +0 -92
  134. package/dist/_chunks/MagicLinkEE-ab36ee0f.js.map +0 -1
  135. package/dist/_chunks/MarketplacePage-62e70483.mjs +0 -1046
  136. package/dist/_chunks/MarketplacePage-62e70483.mjs.map +0 -1
  137. package/dist/_chunks/MarketplacePage-fe1f2c6e.js +0 -1070
  138. package/dist/_chunks/MarketplacePage-fe1f2c6e.js.map +0 -1
  139. package/dist/_chunks/ModalForm-7057f0f5.mjs +0 -28
  140. package/dist/_chunks/ModalForm-7057f0f5.mjs.map +0 -1
  141. package/dist/_chunks/ModalForm-715b963e.js +0 -28
  142. package/dist/_chunks/ModalForm-715b963e.js.map +0 -1
  143. package/dist/_chunks/ProfilePage-5359ee40.mjs +0 -676
  144. package/dist/_chunks/ProfilePage-5359ee40.mjs.map +0 -1
  145. package/dist/_chunks/ProfilePage-5bf5e2ed.js +0 -699
  146. package/dist/_chunks/ProfilePage-5bf5e2ed.js.map +0 -1
  147. package/dist/_chunks/PurchaseAuditLogs-a9c1457c.js +0 -48
  148. package/dist/_chunks/PurchaseAuditLogs-a9c1457c.js.map +0 -1
  149. package/dist/_chunks/PurchaseAuditLogs-e50bb68e.mjs +0 -48
  150. package/dist/_chunks/PurchaseAuditLogs-e50bb68e.mjs.map +0 -1
  151. package/dist/_chunks/PurchaseReviewWorkflows-72d34d9b.mjs +0 -51
  152. package/dist/_chunks/PurchaseReviewWorkflows-72d34d9b.mjs.map +0 -1
  153. package/dist/_chunks/PurchaseReviewWorkflows-afa3d8ae.js +0 -51
  154. package/dist/_chunks/PurchaseReviewWorkflows-afa3d8ae.js.map +0 -1
  155. package/dist/_chunks/PurchaseSingleSignOn-70c10e60.mjs +0 -51
  156. package/dist/_chunks/PurchaseSingleSignOn-70c10e60.mjs.map +0 -1
  157. package/dist/_chunks/PurchaseSingleSignOn-b84a4ad2.js +0 -51
  158. package/dist/_chunks/PurchaseSingleSignOn-b84a4ad2.js.map +0 -1
  159. package/dist/_chunks/ReviewWorkflowsColumn-65518684.mjs +0 -99
  160. package/dist/_chunks/ReviewWorkflowsColumn-65518684.mjs.map +0 -1
  161. package/dist/_chunks/ReviewWorkflowsColumn-b36965fe.js +0 -99
  162. package/dist/_chunks/ReviewWorkflowsColumn-b36965fe.js.map +0 -1
  163. package/dist/_chunks/SSOProviders-62bfad92.mjs +0 -58
  164. package/dist/_chunks/SSOProviders-62bfad92.mjs.map +0 -1
  165. package/dist/_chunks/SSOProviders-b395a4e6.js +0 -59
  166. package/dist/_chunks/SSOProviders-b395a4e6.js.map +0 -1
  167. package/dist/_chunks/SelectRoles-3d810b00.mjs +0 -114
  168. package/dist/_chunks/SelectRoles-3d810b00.mjs.map +0 -1
  169. package/dist/_chunks/SelectRoles-e83f2dee.js +0 -115
  170. package/dist/_chunks/SelectRoles-e83f2dee.js.map +0 -1
  171. package/dist/_chunks/SettingsPage-571f777c.mjs +0 -1074
  172. package/dist/_chunks/SettingsPage-571f777c.mjs.map +0 -1
  173. package/dist/_chunks/SettingsPage-a558ffda.js +0 -1097
  174. package/dist/_chunks/SettingsPage-a558ffda.js.map +0 -1
  175. package/dist/_chunks/SingleSignOnPage-19f2e16f.mjs +0 -325
  176. package/dist/_chunks/SingleSignOnPage-19f2e16f.mjs.map +0 -1
  177. package/dist/_chunks/SingleSignOnPage-b63f4c0f.js +0 -344
  178. package/dist/_chunks/SingleSignOnPage-b63f4c0f.js.map +0 -1
  179. package/dist/_chunks/Table-3f09118e.mjs +0 -206
  180. package/dist/_chunks/Table-3f09118e.mjs.map +0 -1
  181. package/dist/_chunks/Table-69c2c269.js +0 -226
  182. package/dist/_chunks/Table-69c2c269.js.map +0 -1
  183. package/dist/_chunks/TokenTypeSelect-3e46ae6e.mjs +0 -374
  184. package/dist/_chunks/TokenTypeSelect-3e46ae6e.mjs.map +0 -1
  185. package/dist/_chunks/TokenTypeSelect-c75581af.js +0 -392
  186. package/dist/_chunks/TokenTypeSelect-c75581af.js.map +0 -1
  187. package/dist/_chunks/ar-21279f4c.js +0 -936
  188. package/dist/_chunks/ar-21279f4c.js.map +0 -1
  189. package/dist/_chunks/ar-62e5e2b3.mjs +0 -936
  190. package/dist/_chunks/ar-62e5e2b3.mjs.map +0 -1
  191. package/dist/_chunks/build-5bfa2e99.js +0 -68
  192. package/dist/_chunks/build-5bfa2e99.js.map +0 -1
  193. package/dist/_chunks/build-81e67209.mjs +0 -68
  194. package/dist/_chunks/build-81e67209.mjs.map +0 -1
  195. package/dist/_chunks/ca-d05fb350.js +0 -724
  196. package/dist/_chunks/ca-d05fb350.js.map +0 -1
  197. package/dist/_chunks/ca-e99de225.mjs +0 -724
  198. package/dist/_chunks/ca-e99de225.mjs.map +0 -1
  199. package/dist/_chunks/colors-bda951e9.mjs +0 -34
  200. package/dist/_chunks/colors-bda951e9.mjs.map +0 -1
  201. package/dist/_chunks/colors-c17c9c3c.js +0 -33
  202. package/dist/_chunks/colors-c17c9c3c.js.map +0 -1
  203. package/dist/_chunks/constants-28fd3788.js +0 -134
  204. package/dist/_chunks/constants-28fd3788.js.map +0 -1
  205. package/dist/_chunks/constants-2a8f4e41.mjs +0 -11
  206. package/dist/_chunks/constants-2a8f4e41.mjs.map +0 -1
  207. package/dist/_chunks/constants-40ffa931.js +0 -11
  208. package/dist/_chunks/constants-40ffa931.js.map +0 -1
  209. package/dist/_chunks/constants-5345058d.js +0 -121
  210. package/dist/_chunks/constants-5345058d.js.map +0 -1
  211. package/dist/_chunks/constants-71ebbb75.mjs +0 -242
  212. package/dist/_chunks/constants-71ebbb75.mjs.map +0 -1
  213. package/dist/_chunks/constants-73ebce66.js +0 -242
  214. package/dist/_chunks/constants-73ebce66.js.map +0 -1
  215. package/dist/_chunks/constants-7e57b453.mjs +0 -52
  216. package/dist/_chunks/constants-7e57b453.mjs.map +0 -1
  217. package/dist/_chunks/constants-8092eeb5.mjs +0 -59
  218. package/dist/_chunks/constants-8092eeb5.mjs.map +0 -1
  219. package/dist/_chunks/constants-85da8cc4.js +0 -58
  220. package/dist/_chunks/constants-85da8cc4.js.map +0 -1
  221. package/dist/_chunks/constants-a92ce583.mjs +0 -7
  222. package/dist/_chunks/constants-a92ce583.mjs.map +0 -1
  223. package/dist/_chunks/constants-b3c9cbbf.mjs +0 -119
  224. package/dist/_chunks/constants-b3c9cbbf.mjs.map +0 -1
  225. package/dist/_chunks/constants-d3dd8ed6.mjs +0 -7
  226. package/dist/_chunks/constants-d3dd8ed6.mjs.map +0 -1
  227. package/dist/_chunks/constants-d5d67ca8.js +0 -6
  228. package/dist/_chunks/constants-d5d67ca8.js.map +0 -1
  229. package/dist/_chunks/constants-d80f19f3.js +0 -52
  230. package/dist/_chunks/constants-d80f19f3.js.map +0 -1
  231. package/dist/_chunks/constants-da2542a3.js +0 -6
  232. package/dist/_chunks/constants-da2542a3.js.map +0 -1
  233. package/dist/_chunks/constants-e1d0f820.mjs +0 -113
  234. package/dist/_chunks/constants-e1d0f820.mjs.map +0 -1
  235. package/dist/_chunks/cs-2fa881a2.mjs +0 -291
  236. package/dist/_chunks/cs-2fa881a2.mjs.map +0 -1
  237. package/dist/_chunks/cs-eee75b10.js +0 -291
  238. package/dist/_chunks/cs-eee75b10.js.map +0 -1
  239. package/dist/_chunks/de-28f8bc28.mjs +0 -716
  240. package/dist/_chunks/de-28f8bc28.mjs.map +0 -1
  241. package/dist/_chunks/de-976cc986.js +0 -716
  242. package/dist/_chunks/de-976cc986.js.map +0 -1
  243. package/dist/_chunks/develop-ab3daae0.js +0 -61
  244. package/dist/_chunks/develop-ab3daae0.js.map +0 -1
  245. package/dist/_chunks/develop-b194ba9b.mjs +0 -61
  246. package/dist/_chunks/develop-b194ba9b.mjs.map +0 -1
  247. package/dist/_chunks/dk-0b759a56.mjs +0 -634
  248. package/dist/_chunks/dk-0b759a56.mjs.map +0 -1
  249. package/dist/_chunks/dk-6189917e.js +0 -634
  250. package/dist/_chunks/dk-6189917e.js.map +0 -1
  251. package/dist/_chunks/en-390fd1f1.mjs +0 -1029
  252. package/dist/_chunks/en-390fd1f1.mjs.map +0 -1
  253. package/dist/_chunks/en-f40febb9.js +0 -1029
  254. package/dist/_chunks/en-f40febb9.js.map +0 -1
  255. package/dist/_chunks/es-18b29db2.mjs +0 -796
  256. package/dist/_chunks/es-18b29db2.mjs.map +0 -1
  257. package/dist/_chunks/es-3ee0992a.js +0 -796
  258. package/dist/_chunks/es-3ee0992a.js.map +0 -1
  259. package/dist/_chunks/eu-8fd773c2.mjs +0 -832
  260. package/dist/_chunks/eu-8fd773c2.mjs.map +0 -1
  261. package/dist/_chunks/eu-be749f31.js +0 -832
  262. package/dist/_chunks/eu-be749f31.js.map +0 -1
  263. package/dist/_chunks/formatAPIErrors-b599cf27.js +0 -20
  264. package/dist/_chunks/formatAPIErrors-b599cf27.js.map +0 -1
  265. package/dist/_chunks/formatAPIErrors-db6ed675.mjs +0 -21
  266. package/dist/_chunks/formatAPIErrors-db6ed675.mjs.map +0 -1
  267. package/dist/_chunks/fr-29c84e1f.js +0 -762
  268. package/dist/_chunks/fr-29c84e1f.js.map +0 -1
  269. package/dist/_chunks/fr-f37df086.mjs +0 -762
  270. package/dist/_chunks/fr-f37df086.mjs.map +0 -1
  271. package/dist/_chunks/gu-377a4b46.js +0 -623
  272. package/dist/_chunks/gu-377a4b46.js.map +0 -1
  273. package/dist/_chunks/gu-69f0e13a.mjs +0 -623
  274. package/dist/_chunks/gu-69f0e13a.mjs.map +0 -1
  275. package/dist/_chunks/he-aec27352.js +0 -326
  276. package/dist/_chunks/he-aec27352.js.map +0 -1
  277. package/dist/_chunks/he-bd769d7e.mjs +0 -326
  278. package/dist/_chunks/he-bd769d7e.mjs.map +0 -1
  279. package/dist/_chunks/hi-1bdc7a46.js +0 -722
  280. package/dist/_chunks/hi-1bdc7a46.js.map +0 -1
  281. package/dist/_chunks/hi-d397a24b.mjs +0 -722
  282. package/dist/_chunks/hi-d397a24b.mjs.map +0 -1
  283. package/dist/_chunks/hu-e2c05f40.js +0 -832
  284. package/dist/_chunks/hu-e2c05f40.js.map +0 -1
  285. package/dist/_chunks/hu-eb88bd0c.mjs +0 -832
  286. package/dist/_chunks/hu-eb88bd0c.mjs.map +0 -1
  287. package/dist/_chunks/id-586df3a2.js +0 -448
  288. package/dist/_chunks/id-586df3a2.js.map +0 -1
  289. package/dist/_chunks/id-f47699e6.mjs +0 -448
  290. package/dist/_chunks/id-f47699e6.mjs.map +0 -1
  291. package/dist/_chunks/index-3f8cf4d5.js +0 -18413
  292. package/dist/_chunks/index-3f8cf4d5.js.map +0 -1
  293. package/dist/_chunks/index-95e8649d.mjs +0 -18334
  294. package/dist/_chunks/index-95e8649d.mjs.map +0 -1
  295. package/dist/_chunks/index-dfdaf309.mjs +0 -1265
  296. package/dist/_chunks/index-dfdaf309.mjs.map +0 -1
  297. package/dist/_chunks/index-ea5b8bc5.js +0 -1336
  298. package/dist/_chunks/index-ea5b8bc5.js.map +0 -1
  299. package/dist/_chunks/it-4006227c.mjs +0 -459
  300. package/dist/_chunks/it-4006227c.mjs.map +0 -1
  301. package/dist/_chunks/it-9c4295f1.js +0 -459
  302. package/dist/_chunks/it-9c4295f1.js.map +0 -1
  303. package/dist/_chunks/ja-db43ca3d.mjs +0 -633
  304. package/dist/_chunks/ja-db43ca3d.mjs.map +0 -1
  305. package/dist/_chunks/ja-eb74520f.js +0 -633
  306. package/dist/_chunks/ja-eb74520f.js.map +0 -1
  307. package/dist/_chunks/ko-18e71df4.js +0 -631
  308. package/dist/_chunks/ko-18e71df4.js.map +0 -1
  309. package/dist/_chunks/ko-a7826e25.mjs +0 -631
  310. package/dist/_chunks/ko-a7826e25.mjs.map +0 -1
  311. package/dist/_chunks/ml-90131768.mjs +0 -722
  312. package/dist/_chunks/ml-90131768.mjs.map +0 -1
  313. package/dist/_chunks/ml-c5199364.js +0 -722
  314. package/dist/_chunks/ml-c5199364.js.map +0 -1
  315. package/dist/_chunks/ms-bc514df6.js +0 -342
  316. package/dist/_chunks/ms-bc514df6.js.map +0 -1
  317. package/dist/_chunks/ms-f4f16a83.mjs +0 -342
  318. package/dist/_chunks/ms-f4f16a83.mjs.map +0 -1
  319. package/dist/_chunks/nl-887ce2c3.mjs +0 -828
  320. package/dist/_chunks/nl-887ce2c3.mjs.map +0 -1
  321. package/dist/_chunks/nl-f1aedbe2.js +0 -828
  322. package/dist/_chunks/nl-f1aedbe2.js.map +0 -1
  323. package/dist/_chunks/no-ec6c2927.js +0 -310
  324. package/dist/_chunks/no-ec6c2927.js.map +0 -1
  325. package/dist/_chunks/no-f0b02541.mjs +0 -310
  326. package/dist/_chunks/no-f0b02541.mjs.map +0 -1
  327. package/dist/_chunks/pl-9be86414.js +0 -721
  328. package/dist/_chunks/pl-9be86414.js.map +0 -1
  329. package/dist/_chunks/pl-9ccd35d9.mjs +0 -721
  330. package/dist/_chunks/pl-9ccd35d9.mjs.map +0 -1
  331. package/dist/_chunks/pt-4fcc08f1.js +0 -296
  332. package/dist/_chunks/pt-4fcc08f1.js.map +0 -1
  333. package/dist/_chunks/pt-8acb6ac1.mjs +0 -296
  334. package/dist/_chunks/pt-8acb6ac1.mjs.map +0 -1
  335. package/dist/_chunks/pt-BR-d43239e3.js +0 -794
  336. package/dist/_chunks/pt-BR-d43239e3.js.map +0 -1
  337. package/dist/_chunks/pt-BR-fd73cb13.mjs +0 -794
  338. package/dist/_chunks/pt-BR-fd73cb13.mjs.map +0 -1
  339. package/dist/_chunks/ru-9aad40c5.mjs +0 -993
  340. package/dist/_chunks/ru-9aad40c5.mjs.map +0 -1
  341. package/dist/_chunks/ru-c0293425.js +0 -993
  342. package/dist/_chunks/ru-c0293425.js.map +0 -1
  343. package/dist/_chunks/sa-6bf4c20e.mjs +0 -722
  344. package/dist/_chunks/sa-6bf4c20e.mjs.map +0 -1
  345. package/dist/_chunks/sa-8ffb7ca7.js +0 -722
  346. package/dist/_chunks/sa-8ffb7ca7.js.map +0 -1
  347. package/dist/_chunks/sk-58d31b17.mjs +0 -690
  348. package/dist/_chunks/sk-58d31b17.mjs.map +0 -1
  349. package/dist/_chunks/sk-a9308737.js +0 -690
  350. package/dist/_chunks/sk-a9308737.js.map +0 -1
  351. package/dist/_chunks/sv-0f5ffd1e.js +0 -827
  352. package/dist/_chunks/sv-0f5ffd1e.js.map +0 -1
  353. package/dist/_chunks/sv-d80ad633.mjs +0 -827
  354. package/dist/_chunks/sv-d80ad633.mjs.map +0 -1
  355. package/dist/_chunks/th-a53bbf7a.js +0 -430
  356. package/dist/_chunks/th-a53bbf7a.js.map +0 -1
  357. package/dist/_chunks/th-e72c6a22.mjs +0 -430
  358. package/dist/_chunks/th-e72c6a22.mjs.map +0 -1
  359. package/dist/_chunks/tr-b84a68b0.js +0 -785
  360. package/dist/_chunks/tr-b84a68b0.js.map +0 -1
  361. package/dist/_chunks/tr-e35ecfe8.mjs +0 -785
  362. package/dist/_chunks/tr-e35ecfe8.mjs.map +0 -1
  363. package/dist/_chunks/uk-de367ec1.mjs +0 -343
  364. package/dist/_chunks/uk-de367ec1.mjs.map +0 -1
  365. package/dist/_chunks/uk-e5226227.js +0 -343
  366. package/dist/_chunks/uk-e5226227.js.map +0 -1
  367. package/dist/_chunks/useAdminRolePermissions-122fa43a.js +0 -2065
  368. package/dist/_chunks/useAdminRolePermissions-122fa43a.js.map +0 -1
  369. package/dist/_chunks/useAdminRolePermissions-fccd0884.mjs +0 -2036
  370. package/dist/_chunks/useAdminRolePermissions-fccd0884.mjs.map +0 -1
  371. package/dist/_chunks/useAdminRoles-485a39e5.js +0 -65
  372. package/dist/_chunks/useAdminRoles-485a39e5.js.map +0 -1
  373. package/dist/_chunks/useAdminRoles-501e111a.mjs +0 -47
  374. package/dist/_chunks/useAdminRoles-501e111a.mjs.map +0 -1
  375. package/dist/_chunks/useContentTypes-53b449bb.mjs +0 -67
  376. package/dist/_chunks/useContentTypes-53b449bb.mjs.map +0 -1
  377. package/dist/_chunks/useContentTypes-7da293cc.js +0 -85
  378. package/dist/_chunks/useContentTypes-7da293cc.js.map +0 -1
  379. package/dist/_chunks/useLicenseLimitNotification-92085192.js +0 -100
  380. package/dist/_chunks/useLicenseLimitNotification-92085192.js.map +0 -1
  381. package/dist/_chunks/useLicenseLimitNotification-b59fb6f9.mjs +0 -80
  382. package/dist/_chunks/useLicenseLimitNotification-b59fb6f9.mjs.map +0 -1
  383. package/dist/_chunks/useLicenseLimits-497c0f5f.mjs +0 -34
  384. package/dist/_chunks/useLicenseLimits-497c0f5f.mjs.map +0 -1
  385. package/dist/_chunks/useLicenseLimits-e60a01b1.js +0 -52
  386. package/dist/_chunks/useLicenseLimits-e60a01b1.js.map +0 -1
  387. package/dist/_chunks/useReviewWorkflows-26f7e558.js +0 -71
  388. package/dist/_chunks/useReviewWorkflows-26f7e558.js.map +0 -1
  389. package/dist/_chunks/useReviewWorkflows-3e0bcb69.mjs +0 -53
  390. package/dist/_chunks/useReviewWorkflows-3e0bcb69.mjs.map +0 -1
  391. package/dist/_chunks/validateWorkflow-1f89db67.js +0 -1078
  392. package/dist/_chunks/validateWorkflow-1f89db67.js.map +0 -1
  393. package/dist/_chunks/validateWorkflow-8a63abd6.mjs +0 -1055
  394. package/dist/_chunks/validateWorkflow-8a63abd6.mjs.map +0 -1
  395. package/dist/_chunks/validation-2e4cec2b.mjs +0 -16
  396. package/dist/_chunks/validation-2e4cec2b.mjs.map +0 -1
  397. package/dist/_chunks/validation-fabd21cc.js +0 -34
  398. package/dist/_chunks/validation-fabd21cc.js.map +0 -1
  399. package/dist/_chunks/vi-096bccbb.mjs +0 -298
  400. package/dist/_chunks/vi-096bccbb.mjs.map +0 -1
  401. package/dist/_chunks/vi-c5fabb75.js +0 -298
  402. package/dist/_chunks/vi-c5fabb75.js.map +0 -1
  403. package/dist/_chunks/zh-24f618cb.js +0 -836
  404. package/dist/_chunks/zh-24f618cb.js.map +0 -1
  405. package/dist/_chunks/zh-Hans-35d2c374.js +0 -957
  406. package/dist/_chunks/zh-Hans-35d2c374.js.map +0 -1
  407. package/dist/_chunks/zh-Hans-ccf4be4b.mjs +0 -957
  408. package/dist/_chunks/zh-Hans-ccf4be4b.mjs.map +0 -1
  409. package/dist/_chunks/zh-ba29b2e1.mjs +0 -836
  410. package/dist/_chunks/zh-ba29b2e1.mjs.map +0 -1
  411. package/dist/admin/index.js +0 -73
  412. package/dist/admin/index.js.map +0 -1
  413. package/dist/admin/index.mjs +0 -73
  414. package/dist/admin/index.mjs.map +0 -1
  415. package/dist/admin/src/App.d.ts +0 -12
  416. package/dist/admin/src/StrapiApp.d.ts +0 -140
  417. package/dist/admin/src/components/AuthenticatedApp.d.ts +0 -2
  418. package/dist/admin/src/components/DefaultDocument.d.ts +0 -5
  419. package/dist/admin/src/components/DragLayer.d.ts +0 -13
  420. package/dist/admin/src/components/GuidedTour/Homepage.d.ts +0 -2
  421. package/dist/admin/src/components/GuidedTour/Modal.d.ts +0 -2
  422. package/dist/admin/src/components/GuidedTour/Ornaments.d.ts +0 -13
  423. package/dist/admin/src/components/GuidedTour/Provider.d.ts +0 -6
  424. package/dist/admin/src/components/GuidedTour/constants.d.ts +0 -165
  425. package/dist/admin/src/components/InjectionZone.d.ts +0 -59
  426. package/dist/admin/src/components/LanguageProvider.d.ts +0 -8
  427. package/dist/admin/src/components/LeftMenu.d.ts +0 -5
  428. package/dist/admin/src/components/NoJavascript.d.ts +0 -7
  429. package/dist/admin/src/components/NpsSurvey.d.ts +0 -17
  430. package/dist/admin/src/components/Onboarding.d.ts +0 -2
  431. package/dist/admin/src/components/PluginsInitializer.d.ts +0 -5
  432. package/dist/admin/src/components/PrivateRoute.d.ts +0 -8
  433. package/dist/admin/src/components/Providers.d.ts +0 -11
  434. package/dist/admin/src/components/RBACProvider.d.ts +0 -27
  435. package/dist/admin/src/components/Theme.d.ts +0 -12
  436. package/dist/admin/src/components/UnauthenticatedLogo.d.ts +0 -2
  437. package/dist/admin/src/constants.d.ts +0 -192
  438. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Code.d.ts +0 -3
  439. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Heading.d.ts +0 -3
  440. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Image.d.ts +0 -3
  441. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Link.d.ts +0 -3
  442. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/List.d.ts +0 -3
  443. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Paragraph.d.ts +0 -3
  444. package/dist/admin/src/content-manager/components/BlocksInput/Blocks/Quote.d.ts +0 -3
  445. package/dist/admin/src/content-manager/components/BlocksInput/BlocksContent.d.ts +0 -5
  446. package/dist/admin/src/content-manager/components/BlocksInput/BlocksEditor.d.ts +0 -68
  447. package/dist/admin/src/content-manager/components/BlocksInput/BlocksInput.d.ts +0 -18
  448. package/dist/admin/src/content-manager/components/BlocksInput/BlocksToolbar.d.ts +0 -10
  449. package/dist/admin/src/content-manager/components/BlocksInput/EditorLayout.d.ts +0 -10
  450. package/dist/admin/src/content-manager/components/BlocksInput/Modifiers.d.ts +0 -16
  451. package/dist/admin/src/content-manager/components/BlocksInput/plugins/withImages.d.ts +0 -11
  452. package/dist/admin/src/content-manager/components/BlocksInput/plugins/withLinks.d.ts +0 -9
  453. package/dist/admin/src/content-manager/components/BlocksInput/plugins/withStrapiSchema.d.ts +0 -8
  454. package/dist/admin/src/content-manager/components/BlocksInput/utils/conversions.d.ts +0 -13
  455. package/dist/admin/src/content-manager/components/BlocksInput/utils/enterKey.d.ts +0 -6
  456. package/dist/admin/src/content-manager/components/BlocksInput/utils/links.d.ts +0 -10
  457. package/dist/admin/src/content-manager/components/BlocksInput/utils/types.d.ts +0 -10
  458. package/dist/admin/src/content-manager/components/ComponentIcon.d.ts +0 -8
  459. package/dist/admin/src/content-manager/components/ComponentInitializer.d.ts +0 -10
  460. package/dist/admin/src/content-manager/components/ContentTypeFormWrapper.d.ts +0 -32
  461. package/dist/admin/src/content-manager/components/DragPreviews/CardDragPreview.d.ts +0 -7
  462. package/dist/admin/src/content-manager/components/DragPreviews/ComponentDragPreview.d.ts +0 -6
  463. package/dist/admin/src/content-manager/components/DragPreviews/RelationDragPreview.d.ts +0 -9
  464. package/dist/admin/src/content-manager/components/DynamicZone/AddComponentButton.d.ts +0 -11
  465. package/dist/admin/src/content-manager/components/DynamicZone/ComponentCard.d.ts +0 -9
  466. package/dist/admin/src/content-manager/components/DynamicZone/ComponentCategory.d.ts +0 -17
  467. package/dist/admin/src/content-manager/components/DynamicZone/ComponentPicker.d.ts +0 -9
  468. package/dist/admin/src/content-manager/components/DynamicZone/DynamicComponent.d.ts +0 -15
  469. package/dist/admin/src/content-manager/components/DynamicZone/DynamicZoneLabel.d.ts +0 -13
  470. package/dist/admin/src/content-manager/components/DynamicZone/Field.d.ts +0 -32
  471. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/Provider.d.ts +0 -18
  472. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/reducer.d.ts +0 -150
  473. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/utils/cleanData.d.ts +0 -6
  474. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/utils/findAllAndReplace.d.ts +0 -33
  475. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/utils/getAPIInnerError.d.ts +0 -6
  476. package/dist/admin/src/content-manager/components/EditViewDataManagerProvider/utils/moveFields.d.ts +0 -2
  477. package/dist/admin/src/content-manager/components/FieldComponent.d.ts +0 -16
  478. package/dist/admin/src/content-manager/components/FieldTypeIcon.d.ts +0 -32
  479. package/dist/admin/src/content-manager/components/Hint.d.ts +0 -9
  480. package/dist/admin/src/content-manager/components/InputUID.d.ts +0 -16
  481. package/dist/admin/src/content-manager/components/Inputs.d.ts +0 -11
  482. package/dist/admin/src/content-manager/components/LeftMenu.d.ts +0 -2
  483. package/dist/admin/src/content-manager/components/NonRepeatableComponent.d.ts +0 -9
  484. package/dist/admin/src/content-manager/components/Relations/RelationInput.d.ts +0 -62
  485. package/dist/admin/src/content-manager/components/Relations/RelationInputDataManager.d.ts +0 -26
  486. package/dist/admin/src/content-manager/components/Relations/useRelation.d.ts +0 -31
  487. package/dist/admin/src/content-manager/components/Relations/utils/diffRelations.d.ts +0 -2
  488. package/dist/admin/src/content-manager/components/Relations/utils/getRelationLink.d.ts +0 -2
  489. package/dist/admin/src/content-manager/components/Relations/utils/normalizeRelations.d.ts +0 -13
  490. package/dist/admin/src/content-manager/components/Relations/utils/normalizeSearchResults.d.ts +0 -149
  491. package/dist/admin/src/content-manager/components/RepeatableComponent.d.ts +0 -14
  492. package/dist/admin/src/content-manager/components/Wysiwyg/Editor.d.ts +0 -28
  493. package/dist/admin/src/content-manager/components/Wysiwyg/EditorLayout.d.ts +0 -59
  494. package/dist/admin/src/content-manager/components/Wysiwyg/Field.d.ts +0 -14
  495. package/dist/admin/src/content-manager/components/Wysiwyg/PreviewWysiwyg.d.ts +0 -5
  496. package/dist/admin/src/content-manager/components/Wysiwyg/WysiwygFooter.d.ts +0 -7
  497. package/dist/admin/src/content-manager/components/Wysiwyg/WysiwygNav.d.ts +0 -17
  498. package/dist/admin/src/content-manager/components/Wysiwyg/WysiwygStyles.d.ts +0 -54
  499. package/dist/admin/src/content-manager/components/Wysiwyg/utils/continueList.d.ts +0 -5
  500. package/dist/admin/src/content-manager/components/Wysiwyg/utils/mdRenderer.d.ts +0 -3
  501. package/dist/admin/src/content-manager/components/Wysiwyg/utils/utils.d.ts +0 -16
  502. package/dist/admin/src/content-manager/constants/attributes.d.ts +0 -2
  503. package/dist/admin/src/content-manager/contexts/models.d.ts +0 -5
  504. package/dist/admin/src/content-manager/hooks/useContentManagerInitData.d.ts +0 -29
  505. package/dist/admin/src/content-manager/hooks/useContentTypeLayout.d.ts +0 -6
  506. package/dist/admin/src/content-manager/hooks/useDragAndDrop.d.ts +0 -48
  507. package/dist/admin/src/content-manager/hooks/useFindRedirectionLink.d.ts +0 -2
  508. package/dist/admin/src/content-manager/hooks/useKeyboardDragAndDrop.d.ts +0 -14
  509. package/dist/admin/src/content-manager/hooks/useLayouts.d.ts +0 -10
  510. package/dist/admin/src/content-manager/hooks/useLazyComponents.d.ts +0 -13
  511. package/dist/admin/src/content-manager/hooks/usePrev.d.ts +0 -1
  512. package/dist/admin/src/content-manager/hooks/useSyncRbac.d.ts +0 -28
  513. package/dist/admin/src/content-manager/pages/App.d.ts +0 -47
  514. package/dist/admin/src/content-manager/pages/CollectionTypePages.d.ts +0 -12
  515. package/dist/admin/src/content-manager/pages/ComponentSettingsView.d.ts +0 -2
  516. package/dist/admin/src/content-manager/pages/EditView/EditViewPage.d.ts +0 -18
  517. package/dist/admin/src/content-manager/pages/EditView/components/DeleteLink.d.ts +0 -6
  518. package/dist/admin/src/content-manager/pages/EditView/components/DraftAndPublishBadge.d.ts +0 -2
  519. package/dist/admin/src/content-manager/pages/EditView/components/Header.d.ts +0 -7
  520. package/dist/admin/src/content-manager/pages/EditView/components/Information.d.ts +0 -10
  521. package/dist/admin/src/content-manager/pages/EditView/components/InformationBoxCE.d.ts +0 -2
  522. package/dist/admin/src/content-manager/pages/EditViewLayoutManager.d.ts +0 -26
  523. package/dist/admin/src/content-manager/pages/ListView/ListViewPage.d.ts +0 -25
  524. package/dist/admin/src/content-manager/pages/ListView/components/AdminUsersFilter.d.ts +0 -6
  525. package/dist/admin/src/content-manager/pages/ListView/components/BulkActions/Buttons.d.ts +0 -27
  526. package/dist/admin/src/content-manager/pages/ListView/components/BulkActions/ConfirmBulkActionDialog.d.ts +0 -15
  527. package/dist/admin/src/content-manager/pages/ListView/components/BulkActions/SelectedEntriesModal.d.ts +0 -30
  528. package/dist/admin/src/content-manager/pages/ListView/components/DialogConfirmDelete.d.ts +0 -9
  529. package/dist/admin/src/content-manager/pages/ListView/components/Filter.d.ts +0 -7
  530. package/dist/admin/src/content-manager/pages/ListView/components/InjectionZoneList.d.ts +0 -7
  531. package/dist/admin/src/content-manager/pages/ListView/components/Table.d.ts +0 -28
  532. package/dist/admin/src/content-manager/pages/ListView/components/TableCells/CellContent.d.ts +0 -11
  533. package/dist/admin/src/content-manager/pages/ListView/components/TableCells/CellValue.d.ts +0 -8
  534. package/dist/admin/src/content-manager/pages/ListView/components/TableCells/Components.d.ts +0 -12
  535. package/dist/admin/src/content-manager/pages/ListView/components/TableCells/Media.d.ts +0 -23
  536. package/dist/admin/src/content-manager/pages/ListView/components/TableCells/Relations.d.ts +0 -12
  537. package/dist/admin/src/content-manager/pages/ListView/components/ViewSettingsMenu.d.ts +0 -6
  538. package/dist/admin/src/content-manager/pages/ListView/hooks/useAllowedAttributes.d.ts +0 -3
  539. package/dist/admin/src/content-manager/pages/ListViewLayoutManager.d.ts +0 -75
  540. package/dist/admin/src/content-manager/pages/NoContentTypePage.d.ts +0 -2
  541. package/dist/admin/src/content-manager/pages/NoPermissionsPage.d.ts +0 -2
  542. package/dist/admin/src/content-manager/sharedReducers/crud/actions.d.ts +0 -63
  543. package/dist/admin/src/content-manager/sharedReducers/crud/constants.d.ts +0 -8
  544. package/dist/admin/src/content-manager/sharedReducers/crud/reducer.d.ts +0 -24
  545. package/dist/admin/src/content-manager/utils/api.d.ts +0 -14
  546. package/dist/admin/src/content-manager/utils/arrayMoveItem.d.ts +0 -2
  547. package/dist/admin/src/content-manager/utils/attributes.d.ts +0 -3
  548. package/dist/admin/src/content-manager/utils/data.d.ts +0 -5
  549. package/dist/admin/src/content-manager/utils/dragAndDrop.d.ts +0 -8
  550. package/dist/admin/src/content-manager/utils/fields.d.ts +0 -6
  551. package/dist/admin/src/content-manager/utils/layouts.d.ts +0 -96
  552. package/dist/admin/src/content-manager/utils/paths.d.ts +0 -7
  553. package/dist/admin/src/content-manager/utils/permissions.d.ts +0 -8
  554. package/dist/admin/src/content-manager/utils/refs.d.ts +0 -8
  555. package/dist/admin/src/content-manager/utils/schemas.d.ts +0 -22
  556. package/dist/admin/src/content-manager/utils/translations.d.ts +0 -2
  557. package/dist/admin/src/content-manager/utils/users.d.ts +0 -7
  558. package/dist/admin/src/content-manager/utils/validation.d.ts +0 -21
  559. package/dist/admin/src/core/apis/Components.d.ts +0 -10
  560. package/dist/admin/src/core/apis/CustomFields.d.ts +0 -8
  561. package/dist/admin/src/core/apis/Fields.d.ts +0 -10
  562. package/dist/admin/src/core/apis/Middlewares.d.ts +0 -9
  563. package/dist/admin/src/core/apis/Plugin.d.ts +0 -19
  564. package/dist/admin/src/core/apis/Reducers.d.ts +0 -10
  565. package/dist/admin/src/core/store/configure.d.ts +0 -34
  566. package/dist/admin/src/core/store/hooks.d.ts +0 -37
  567. package/dist/admin/src/core/utils/basename.d.ts +0 -1
  568. package/dist/admin/src/core/utils/createHook.d.ts +0 -11
  569. package/dist/admin/src/features/Configuration.d.ts +0 -54
  570. package/dist/admin/src/hooks/useAdminRoles.d.ts +0 -14
  571. package/dist/admin/src/hooks/useAdminUsers.d.ts +0 -16
  572. package/dist/admin/src/hooks/useContentTypes.d.ts +0 -7
  573. package/dist/admin/src/hooks/useDebounce.d.ts +0 -1
  574. package/dist/admin/src/hooks/useEnterprise.d.ts +0 -8
  575. package/dist/admin/src/hooks/useInjectReducer.d.ts +0 -10
  576. package/dist/admin/src/hooks/useInjectionZone.d.ts +0 -6
  577. package/dist/admin/src/hooks/useLicenseLimitNotification.d.ts +0 -1
  578. package/dist/admin/src/hooks/useMenu.d.ts +0 -9
  579. package/dist/admin/src/hooks/useOnce.d.ts +0 -2
  580. package/dist/admin/src/hooks/useSettingsMenu.d.ts +0 -29
  581. package/dist/admin/src/index.d.ts +0 -4
  582. package/dist/admin/src/layouts/AppLayout.d.ts +0 -7
  583. package/dist/admin/src/layouts/UnauthenticatedLayout.d.ts +0 -11
  584. package/dist/admin/src/pages/Admin.d.ts +0 -7
  585. package/dist/admin/src/pages/Auth/AuthPage.d.ts +0 -6
  586. package/dist/admin/src/pages/Auth/components/FieldActionWrapper.d.ts +0 -3
  587. package/dist/admin/src/pages/Auth/components/ForgotPassword.d.ts +0 -3
  588. package/dist/admin/src/pages/Auth/components/ForgotPasswordSuccess.d.ts +0 -2
  589. package/dist/admin/src/pages/Auth/components/Login.d.ts +0 -8
  590. package/dist/admin/src/pages/Auth/components/Oops.d.ts +0 -2
  591. package/dist/admin/src/pages/Auth/components/Register.d.ts +0 -7
  592. package/dist/admin/src/pages/Auth/components/ResetPassword.d.ts +0 -3
  593. package/dist/admin/src/pages/Auth/constants.d.ts +0 -14
  594. package/dist/admin/src/pages/HomePage.d.ts +0 -3
  595. package/dist/admin/src/pages/InstalledPluginsPage.d.ts +0 -3
  596. package/dist/admin/src/pages/InternalErrorPage.d.ts +0 -7
  597. package/dist/admin/src/pages/Marketplace/MarketplacePage.d.ts +0 -19
  598. package/dist/admin/src/pages/Marketplace/components/NpmPackageCard.d.ts +0 -13
  599. package/dist/admin/src/pages/Marketplace/components/NpmPackagesFilters.d.ts +0 -13
  600. package/dist/admin/src/pages/Marketplace/components/NpmPackagesGrid.d.ts +0 -13
  601. package/dist/admin/src/pages/Marketplace/components/OfflineLayout.d.ts +0 -2
  602. package/dist/admin/src/pages/Marketplace/components/PageHeader.d.ts +0 -8
  603. package/dist/admin/src/pages/Marketplace/components/SortSelect.d.ts +0 -51
  604. package/dist/admin/src/pages/Marketplace/hooks/useMarketplaceData.d.ts +0 -92
  605. package/dist/admin/src/pages/Marketplace/hooks/useNavigatorOnline.d.ts +0 -5
  606. package/dist/admin/src/pages/NotFoundPage.d.ts +0 -1
  607. package/dist/admin/src/pages/ProfilePage.d.ts +0 -2
  608. package/dist/admin/src/pages/Settings/SettingsPage.d.ts +0 -4
  609. package/dist/admin/src/pages/Settings/components/Filters.d.ts +0 -5
  610. package/dist/admin/src/pages/Settings/components/SettingsNav.d.ts +0 -7
  611. package/dist/admin/src/pages/Settings/components/Tokens/FormHead.d.ts +0 -19
  612. package/dist/admin/src/pages/Settings/components/Tokens/LifeSpanInput.d.ts +0 -17
  613. package/dist/admin/src/pages/Settings/components/Tokens/Table.d.ts +0 -27
  614. package/dist/admin/src/pages/Settings/components/Tokens/TokenBox.d.ts +0 -6
  615. package/dist/admin/src/pages/Settings/components/Tokens/TokenDescription.d.ts +0 -8
  616. package/dist/admin/src/pages/Settings/components/Tokens/TokenName.d.ts +0 -8
  617. package/dist/admin/src/pages/Settings/components/Tokens/TokenTypeSelect.d.ts +0 -14
  618. package/dist/admin/src/pages/Settings/components/Tokens/constants.d.ts +0 -2
  619. package/dist/admin/src/pages/Settings/constants.d.ts +0 -4
  620. package/dist/admin/src/pages/Settings/hooks/useRegenerate.d.ts +0 -4
  621. package/dist/admin/src/pages/Settings/pages/ApiTokens/CreateView.d.ts +0 -1
  622. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/EditViewPage.d.ts +0 -2
  623. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/apiTokenPermissions.d.ts +0 -36
  624. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/ActionBoundRoutes.d.ts +0 -1
  625. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/BoundRoute.d.ts +0 -10
  626. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/CollabsableContentType.d.ts +0 -11
  627. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/ContentTypesSection.d.ts +0 -6
  628. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/FormApiTokenContainer.d.ts +0 -20
  629. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/LoadingView.d.ts +0 -5
  630. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/Permissions.d.ts +0 -3
  631. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/components/Regenerate.d.ts +0 -6
  632. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/constants.d.ts +0 -17
  633. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/reducer.d.ts +0 -40
  634. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/utils/getDateOfExpiration.d.ts +0 -1
  635. package/dist/admin/src/pages/Settings/pages/ApiTokens/EditView/utils/transformPermissionsData.d.ts +0 -17
  636. package/dist/admin/src/pages/Settings/pages/ApiTokens/ListView.d.ts +0 -2
  637. package/dist/admin/src/pages/Settings/pages/ApplicationInfo/ApplicationInfoPage.d.ts +0 -2
  638. package/dist/admin/src/pages/Settings/pages/ApplicationInfo/components/LogoInput.d.ts +0 -14
  639. package/dist/admin/src/pages/Settings/pages/ApplicationInfo/utils/constants.d.ts +0 -3
  640. package/dist/admin/src/pages/Settings/pages/ApplicationInfo/utils/files.d.ts +0 -19
  641. package/dist/admin/src/pages/Settings/pages/PurchaseAuditLogs.d.ts +0 -2
  642. package/dist/admin/src/pages/Settings/pages/PurchaseReviewWorkflows.d.ts +0 -2
  643. package/dist/admin/src/pages/Settings/pages/PurchaseSingleSignOn.d.ts +0 -2
  644. package/dist/admin/src/pages/Settings/pages/Roles/CreatePage.d.ts +0 -7
  645. package/dist/admin/src/pages/Settings/pages/Roles/EditPage.d.ts +0 -8
  646. package/dist/admin/src/pages/Settings/pages/Roles/ListPage.d.ts +0 -3
  647. package/dist/admin/src/pages/Settings/pages/Roles/components/CollapseLabel.d.ts +0 -52
  648. package/dist/admin/src/pages/Settings/pages/Roles/components/CollapsePropertyMatrix.d.ts +0 -35
  649. package/dist/admin/src/pages/Settings/pages/Roles/components/ConditionsButton.d.ts +0 -12
  650. package/dist/admin/src/pages/Settings/pages/Roles/components/ConditionsModal.d.ts +0 -32
  651. package/dist/admin/src/pages/Settings/pages/Roles/components/ContentTypeCollapses.d.ts +0 -35
  652. package/dist/admin/src/pages/Settings/pages/Roles/components/ContentTypes.d.ts +0 -8
  653. package/dist/admin/src/pages/Settings/pages/Roles/components/GlobalActions.d.ts +0 -10
  654. package/dist/admin/src/pages/Settings/pages/Roles/components/HiddenAction.d.ts +0 -2
  655. package/dist/admin/src/pages/Settings/pages/Roles/components/Permissions.d.ts +0 -54
  656. package/dist/admin/src/pages/Settings/pages/Roles/components/PluginsAndSettings.d.ts +0 -18
  657. package/dist/admin/src/pages/Settings/pages/Roles/components/RequiredSign.d.ts +0 -2
  658. package/dist/admin/src/pages/Settings/pages/Roles/components/RoleForm.d.ts +0 -12
  659. package/dist/admin/src/pages/Settings/pages/Roles/components/RoleRow.d.ts +0 -10
  660. package/dist/admin/src/pages/Settings/pages/Roles/components/RowLabelWithCheckbox.d.ts +0 -17
  661. package/dist/admin/src/pages/Settings/pages/Roles/hooks/useAdminRolePermissions.d.ts +0 -13
  662. package/dist/admin/src/pages/Settings/pages/Roles/hooks/usePermissionsDataManager.d.ts +0 -29
  663. package/dist/admin/src/pages/Settings/pages/Roles/utils/constants.d.ts +0 -3
  664. package/dist/admin/src/pages/Settings/pages/Roles/utils/createArrayOfValues.d.ts +0 -3
  665. package/dist/admin/src/pages/Settings/pages/Roles/utils/forms.d.ts +0 -28
  666. package/dist/admin/src/pages/Settings/pages/Roles/utils/getCheckboxState.d.ts +0 -8
  667. package/dist/admin/src/pages/Settings/pages/Roles/utils/layouts.d.ts +0 -13
  668. package/dist/admin/src/pages/Settings/pages/Roles/utils/permissions.d.ts +0 -8
  669. package/dist/admin/src/pages/Settings/pages/Roles/utils/removeConditionKeyFromData.d.ts +0 -8
  670. package/dist/admin/src/pages/Settings/pages/Roles/utils/updateConditionsToFalse.d.ts +0 -5
  671. package/dist/admin/src/pages/Settings/pages/Roles/utils/updateValues.d.ts +0 -8
  672. package/dist/admin/src/pages/Settings/pages/TransferTokens/CreateView.d.ts +0 -1
  673. package/dist/admin/src/pages/Settings/pages/TransferTokens/EditView.d.ts +0 -7
  674. package/dist/admin/src/pages/Settings/pages/TransferTokens/ListView.d.ts +0 -3
  675. package/dist/admin/src/pages/Settings/pages/Users/EditPage.d.ts +0 -3
  676. package/dist/admin/src/pages/Settings/pages/Users/ListPage.d.ts +0 -22
  677. package/dist/admin/src/pages/Settings/pages/Users/components/CreateActionCE.d.ts +0 -6
  678. package/dist/admin/src/pages/Settings/pages/Users/components/MagicLinkCE.d.ts +0 -6
  679. package/dist/admin/src/pages/Settings/pages/Users/components/MagicLinkWrapper.d.ts +0 -7
  680. package/dist/admin/src/pages/Settings/pages/Users/components/NewUserForm.d.ts +0 -15
  681. package/dist/admin/src/pages/Settings/pages/Users/components/SelectRoles.d.ts +0 -8
  682. package/dist/admin/src/pages/Settings/pages/Users/components/TableRows.d.ts +0 -9
  683. package/dist/admin/src/pages/Settings/pages/Users/utils/validation.d.ts +0 -13
  684. package/dist/admin/src/pages/Settings/pages/Webhooks/CreatePage.d.ts +0 -3
  685. package/dist/admin/src/pages/Settings/pages/Webhooks/EditPage.d.ts +0 -3
  686. package/dist/admin/src/pages/Settings/pages/Webhooks/ListPage.d.ts +0 -3
  687. package/dist/admin/src/pages/Settings/pages/Webhooks/components/Events.d.ts +0 -32
  688. package/dist/admin/src/pages/Settings/pages/Webhooks/components/EventsTable.d.ts +0 -2
  689. package/dist/admin/src/pages/Settings/pages/Webhooks/components/HeadersInput.d.ts +0 -2
  690. package/dist/admin/src/pages/Settings/pages/Webhooks/components/TriggerContainer.d.ts +0 -13
  691. package/dist/admin/src/pages/Settings/pages/Webhooks/components/WebhookForm.d.ts +0 -22
  692. package/dist/admin/src/pages/Settings/utils/forms.d.ts +0 -3
  693. package/dist/admin/src/pages/UseCasePage.d.ts +0 -8
  694. package/dist/admin/src/reducer.d.ts +0 -19
  695. package/dist/admin/src/render.d.ts +0 -10
  696. package/dist/admin/src/selectors.d.ts +0 -27
  697. package/dist/admin/src/translations/languageNativeNames.d.ts +0 -36
  698. package/dist/admin/src/types/form.d.ts +0 -6
  699. package/dist/admin/src/types/permissions.d.ts +0 -23
  700. package/dist/admin/src/utils/arrays.d.ts +0 -23
  701. package/dist/admin/src/utils/createRoute.d.ts +0 -6
  702. package/dist/admin/src/utils/formatAPIErrors.d.ts +0 -6
  703. package/dist/admin/src/utils/getFullName.d.ts +0 -1
  704. package/dist/admin/src/utils/hashAdminUserEmail.d.ts +0 -6
  705. package/dist/admin/src/utils/objects.d.ts +0 -8
  706. package/dist/admin/src/utils/strings.d.ts +0 -2
  707. package/dist/cli.js +0 -48
  708. package/dist/cli.js.map +0 -1
  709. package/dist/cli.mjs +0 -48
  710. package/dist/cli.mjs.map +0 -1
  711. package/dist/ee/admin/src/constants.d.ts +0 -63
  712. package/dist/ee/admin/src/content-manager/pages/EditView/components/AssigneeSelect.d.ts +0 -2
  713. package/dist/ee/admin/src/content-manager/pages/EditView/components/InformationBoxEE.d.ts +0 -2
  714. package/dist/ee/admin/src/content-manager/pages/EditView/components/StageSelect.d.ts +0 -1
  715. package/dist/ee/admin/src/content-manager/pages/EditView/components/constants.d.ts +0 -2
  716. package/dist/ee/admin/src/content-manager/pages/ListSettingsView/constants.d.ts +0 -7
  717. package/dist/ee/admin/src/content-manager/pages/ListView/components/AssigneeFilter.d.ts +0 -6
  718. package/dist/ee/admin/src/content-manager/pages/ListView/components/ReviewWorkflowsAssigneeEE.d.ts +0 -7
  719. package/dist/ee/admin/src/content-manager/pages/ListView/components/ReviewWorkflowsColumn.d.ts +0 -2
  720. package/dist/ee/admin/src/content-manager/pages/ListView/components/ReviewWorkflowsStageEE.d.ts +0 -7
  721. package/dist/ee/admin/src/content-manager/pages/ListView/components/StageFilter.d.ts +0 -7
  722. package/dist/ee/admin/src/content-manager/pages/ListView/constants.d.ts +0 -86
  723. package/dist/ee/admin/src/hooks/useLicenseLimitNotification.d.ts +0 -1
  724. package/dist/ee/admin/src/hooks/useLicenseLimits.d.ts +0 -20
  725. package/dist/ee/admin/src/pages/AuthPage/components/Login.d.ts +0 -3
  726. package/dist/ee/admin/src/pages/AuthPage/components/Providers.d.ts +0 -2
  727. package/dist/ee/admin/src/pages/AuthPage/components/SSOProviders.d.ts +0 -8
  728. package/dist/ee/admin/src/pages/AuthPage/constants.d.ts +0 -3
  729. package/dist/ee/admin/src/pages/AuthResponse.d.ts +0 -2
  730. package/dist/ee/admin/src/pages/HomePage.d.ts +0 -1
  731. package/dist/ee/admin/src/pages/SettingsPage/constants.d.ts +0 -2
  732. package/dist/ee/admin/src/pages/SettingsPage/pages/ApplicationInfoPage/components/AdminSeatInfo.d.ts +0 -1
  733. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/ListPage.d.ts +0 -2
  734. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/components/ComboboxFilter.d.ts +0 -11
  735. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/components/Modal.d.ts +0 -6
  736. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/components/PaginationFooter.d.ts +0 -6
  737. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/components/TableRows.d.ts +0 -32
  738. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/hooks/useAuditLogsData.d.ts +0 -12
  739. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/hooks/useFormatTimeStamp.d.ts +0 -1
  740. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/tests/utils/data.d.ts +0 -56
  741. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/utils/getActionTypesDefaultMessages.d.ts +0 -31
  742. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/utils/getDisplayedFilters.d.ts +0 -75
  743. package/dist/ee/admin/src/pages/SettingsPage/pages/AuditLogs/utils/tableHeaders.d.ts +0 -32
  744. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/CreatePage.d.ts +0 -1
  745. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/EditPage.d.ts +0 -1
  746. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/ListPage.d.ts +0 -2
  747. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/actions.d.ts +0 -86
  748. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/AddStage.d.ts +0 -8
  749. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/Layout.d.ts +0 -16
  750. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/LimitsModal.d.ts +0 -15
  751. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/Stage.d.ts +0 -10
  752. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/StageDragPreview.d.ts +0 -4
  753. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/Stages.d.ts +0 -7
  754. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/components/WorkflowAttributes.d.ts +0 -4
  755. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/constants.d.ts +0 -20
  756. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/hooks/useReviewWorkflows.d.ts +0 -13
  757. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/hooks/useReviewWorkflowsStages.d.ts +0 -16
  758. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/reducer.d.ts +0 -38
  759. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/selectors.d.ts +0 -62
  760. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/utils/colors.d.ts +0 -8
  761. package/dist/ee/admin/src/pages/SettingsPage/pages/ReviewWorkflows/utils/validateWorkflow.d.ts +0 -5
  762. package/dist/ee/admin/src/pages/SettingsPage/pages/SingleSignOnPage.d.ts +0 -2
  763. package/dist/ee/admin/src/pages/SettingsPage/pages/Users/ListPage.d.ts +0 -1
  764. package/dist/ee/admin/src/pages/SettingsPage/pages/Users/components/CreateActionEE.d.ts +0 -8
  765. package/dist/ee/admin/src/pages/SettingsPage/pages/Users/components/MagicLinkEE.d.ts +0 -2
  766. package/dist/ee/admin/src/pages/SettingsPage/pages/Users/components/ModalForm.d.ts +0 -15
  767. package/dist/ee/admin/src/pages/SettingsPage/pages/Webhooks/components/EventsTable.d.ts +0 -2
  768. package/dist/ee/server/index.js +0 -3866
  769. package/dist/ee/server/index.js.map +0 -1
  770. package/dist/ee/server/index.mjs +0 -3857
  771. package/dist/ee/server/index.mjs.map +0 -1
  772. package/dist/server/index.js +0 -5579
  773. package/dist/server/index.js.map +0 -1
  774. package/dist/server/index.mjs +0 -5562
  775. package/dist/server/index.mjs.map +0 -1
  776. package/dist/server/src/bootstrap.d.ts +0 -6
  777. package/dist/server/src/bootstrap.d.ts.map +0 -1
  778. package/dist/server/src/config/admin-actions.d.ts +0 -34
  779. package/dist/server/src/config/admin-actions.d.ts.map +0 -1
  780. package/dist/server/src/config/admin-conditions.d.ts +0 -47
  781. package/dist/server/src/config/admin-conditions.d.ts.map +0 -1
  782. package/dist/server/src/config/email-templates/forgot-password.d.ts +0 -7
  783. package/dist/server/src/config/email-templates/forgot-password.d.ts.map +0 -1
  784. package/dist/server/src/config/index.d.ts +0 -18
  785. package/dist/server/src/config/index.d.ts.map +0 -1
  786. package/dist/server/src/config/settings.d.ts +0 -8
  787. package/dist/server/src/config/settings.d.ts.map +0 -1
  788. package/dist/server/src/content-types/Permission.d.ts +0 -63
  789. package/dist/server/src/content-types/Permission.d.ts.map +0 -1
  790. package/dist/server/src/content-types/Role.d.ts +0 -58
  791. package/dist/server/src/content-types/Role.d.ts.map +0 -1
  792. package/dist/server/src/content-types/User.d.ts +0 -107
  793. package/dist/server/src/content-types/User.d.ts.map +0 -1
  794. package/dist/server/src/content-types/api-token-permission.d.ts +0 -36
  795. package/dist/server/src/content-types/api-token-permission.d.ts.map +0 -1
  796. package/dist/server/src/content-types/api-token.d.ts +0 -74
  797. package/dist/server/src/content-types/api-token.d.ts.map +0 -1
  798. package/dist/server/src/content-types/index.d.ts +0 -438
  799. package/dist/server/src/content-types/index.d.ts.map +0 -1
  800. package/dist/server/src/content-types/transfer-token-permission.d.ts +0 -36
  801. package/dist/server/src/content-types/transfer-token-permission.d.ts.map +0 -1
  802. package/dist/server/src/content-types/transfer-token.d.ts +0 -66
  803. package/dist/server/src/content-types/transfer-token.d.ts.map +0 -1
  804. package/dist/server/src/controllers/admin.d.ts +0 -55
  805. package/dist/server/src/controllers/admin.d.ts.map +0 -1
  806. package/dist/server/src/controllers/api-token.d.ts +0 -12
  807. package/dist/server/src/controllers/api-token.d.ts.map +0 -1
  808. package/dist/server/src/controllers/authenticated-user.d.ts +0 -8
  809. package/dist/server/src/controllers/authenticated-user.d.ts.map +0 -1
  810. package/dist/server/src/controllers/authentication.d.ts +0 -14
  811. package/dist/server/src/controllers/authentication.d.ts.map +0 -1
  812. package/dist/server/src/controllers/content-api.d.ts +0 -8
  813. package/dist/server/src/controllers/content-api.d.ts.map +0 -1
  814. package/dist/server/src/controllers/formatters/conditions.d.ts +0 -4
  815. package/dist/server/src/controllers/formatters/conditions.d.ts.map +0 -1
  816. package/dist/server/src/controllers/formatters/format-actions-by-sections.d.ts +0 -8
  817. package/dist/server/src/controllers/formatters/format-actions-by-sections.d.ts.map +0 -1
  818. package/dist/server/src/controllers/formatters/index.d.ts +0 -3
  819. package/dist/server/src/controllers/formatters/index.d.ts.map +0 -1
  820. package/dist/server/src/controllers/index.d.ts +0 -110
  821. package/dist/server/src/controllers/index.d.ts.map +0 -1
  822. package/dist/server/src/controllers/permission.d.ts +0 -15
  823. package/dist/server/src/controllers/permission.d.ts.map +0 -1
  824. package/dist/server/src/controllers/role.d.ts +0 -45
  825. package/dist/server/src/controllers/role.d.ts.map +0 -1
  826. package/dist/server/src/controllers/transfer/index.d.ts +0 -5
  827. package/dist/server/src/controllers/transfer/index.d.ts.map +0 -1
  828. package/dist/server/src/controllers/transfer/runner.d.ts +0 -9
  829. package/dist/server/src/controllers/transfer/runner.d.ts.map +0 -1
  830. package/dist/server/src/controllers/transfer/token.d.ts +0 -11
  831. package/dist/server/src/controllers/transfer/token.d.ts.map +0 -1
  832. package/dist/server/src/controllers/user.d.ts +0 -15
  833. package/dist/server/src/controllers/user.d.ts.map +0 -1
  834. package/dist/server/src/controllers/webhooks.d.ts +0 -12
  835. package/dist/server/src/controllers/webhooks.d.ts.map +0 -1
  836. package/dist/server/src/destroy.d.ts +0 -3
  837. package/dist/server/src/destroy.d.ts.map +0 -1
  838. package/dist/server/src/domain/action/index.d.ts +0 -34
  839. package/dist/server/src/domain/action/index.d.ts.map +0 -1
  840. package/dist/server/src/domain/action/provider.d.ts +0 -40
  841. package/dist/server/src/domain/action/provider.d.ts.map +0 -1
  842. package/dist/server/src/domain/condition/index.d.ts +0 -54
  843. package/dist/server/src/domain/condition/index.d.ts.map +0 -1
  844. package/dist/server/src/domain/condition/provider.d.ts +0 -31
  845. package/dist/server/src/domain/condition/provider.d.ts.map +0 -1
  846. package/dist/server/src/domain/permission/index.d.ts +0 -71
  847. package/dist/server/src/domain/permission/index.d.ts.map +0 -1
  848. package/dist/server/src/domain/user.d.ts +0 -26
  849. package/dist/server/src/domain/user.d.ts.map +0 -1
  850. package/dist/server/src/index.d.ts +0 -11
  851. package/dist/server/src/index.d.ts.map +0 -1
  852. package/dist/server/src/middlewares/data-transfer.d.ts +0 -4
  853. package/dist/server/src/middlewares/data-transfer.d.ts.map +0 -1
  854. package/dist/server/src/middlewares/index.d.ts +0 -11
  855. package/dist/server/src/middlewares/index.d.ts.map +0 -1
  856. package/dist/server/src/middlewares/rateLimit.d.ts +0 -7
  857. package/dist/server/src/middlewares/rateLimit.d.ts.map +0 -1
  858. package/dist/server/src/policies/hasPermissions.d.ts +0 -7
  859. package/dist/server/src/policies/hasPermissions.d.ts.map +0 -1
  860. package/dist/server/src/policies/index.d.ts +0 -15
  861. package/dist/server/src/policies/index.d.ts.map +0 -1
  862. package/dist/server/src/policies/isAuthenticatedAdmin.d.ts +0 -3
  863. package/dist/server/src/policies/isAuthenticatedAdmin.d.ts.map +0 -1
  864. package/dist/server/src/policies/isTelemetryEnabled.d.ts +0 -11
  865. package/dist/server/src/policies/isTelemetryEnabled.d.ts.map +0 -1
  866. package/dist/server/src/register.d.ts +0 -6
  867. package/dist/server/src/register.d.ts.map +0 -1
  868. package/dist/server/src/routes/admin.d.ts +0 -24
  869. package/dist/server/src/routes/admin.d.ts.map +0 -1
  870. package/dist/server/src/routes/api-tokens.d.ts +0 -15
  871. package/dist/server/src/routes/api-tokens.d.ts.map +0 -1
  872. package/dist/server/src/routes/authentication.d.ts +0 -30
  873. package/dist/server/src/routes/authentication.d.ts.map +0 -1
  874. package/dist/server/src/routes/content-api.d.ts +0 -10
  875. package/dist/server/src/routes/content-api.d.ts.map +0 -1
  876. package/dist/server/src/routes/index.d.ts +0 -60
  877. package/dist/server/src/routes/index.d.ts.map +0 -1
  878. package/dist/server/src/routes/permissions.d.ts +0 -10
  879. package/dist/server/src/routes/permissions.d.ts.map +0 -1
  880. package/dist/server/src/routes/roles.d.ts +0 -15
  881. package/dist/server/src/routes/roles.d.ts.map +0 -1
  882. package/dist/server/src/routes/serve-admin-panel.d.ts +0 -6
  883. package/dist/server/src/routes/serve-admin-panel.d.ts.map +0 -1
  884. package/dist/server/src/routes/transfer.d.ts +0 -49
  885. package/dist/server/src/routes/transfer.d.ts.map +0 -1
  886. package/dist/server/src/routes/users.d.ts +0 -15
  887. package/dist/server/src/routes/users.d.ts.map +0 -1
  888. package/dist/server/src/routes/webhooks.d.ts +0 -15
  889. package/dist/server/src/routes/webhooks.d.ts.map +0 -1
  890. package/dist/server/src/services/action.d.ts +0 -10
  891. package/dist/server/src/services/action.d.ts.map +0 -1
  892. package/dist/server/src/services/api-token.d.ts +0 -48
  893. package/dist/server/src/services/api-token.d.ts.map +0 -1
  894. package/dist/server/src/services/auth.d.ts +0 -21
  895. package/dist/server/src/services/auth.d.ts.map +0 -1
  896. package/dist/server/src/services/condition.d.ts +0 -3
  897. package/dist/server/src/services/condition.d.ts.map +0 -1
  898. package/dist/server/src/services/constants.d.ts +0 -34
  899. package/dist/server/src/services/constants.d.ts.map +0 -1
  900. package/dist/server/src/services/content-type.d.ts +0 -29
  901. package/dist/server/src/services/content-type.d.ts.map +0 -1
  902. package/dist/server/src/services/index.d.ts +0 -111
  903. package/dist/server/src/services/index.d.ts.map +0 -1
  904. package/dist/server/src/services/metrics.d.ts +0 -8
  905. package/dist/server/src/services/metrics.d.ts.map +0 -1
  906. package/dist/server/src/services/passport/local-strategy.d.ts +0 -5
  907. package/dist/server/src/services/passport/local-strategy.d.ts.map +0 -1
  908. package/dist/server/src/services/passport.d.ts +0 -12
  909. package/dist/server/src/services/passport.d.ts.map +0 -1
  910. package/dist/server/src/services/permission/engine.d.ts +0 -20
  911. package/dist/server/src/services/permission/engine.d.ts.map +0 -1
  912. package/dist/server/src/services/permission/permissions-manager/index.d.ts +0 -17
  913. package/dist/server/src/services/permission/permissions-manager/index.d.ts.map +0 -1
  914. package/dist/server/src/services/permission/permissions-manager/query-builders.d.ts +0 -4
  915. package/dist/server/src/services/permission/permissions-manager/query-builders.d.ts.map +0 -1
  916. package/dist/server/src/services/permission/permissions-manager/sanitize.d.ts +0 -7
  917. package/dist/server/src/services/permission/permissions-manager/sanitize.d.ts.map +0 -1
  918. package/dist/server/src/services/permission/permissions-manager/validate.d.ts +0 -6
  919. package/dist/server/src/services/permission/permissions-manager/validate.d.ts.map +0 -1
  920. package/dist/server/src/services/permission/queries.d.ts +0 -43
  921. package/dist/server/src/services/permission/queries.d.ts.map +0 -1
  922. package/dist/server/src/services/permission/sections-builder/builder.d.ts +0 -38
  923. package/dist/server/src/services/permission/sections-builder/builder.d.ts.map +0 -1
  924. package/dist/server/src/services/permission/sections-builder/handlers.d.ts +0 -55
  925. package/dist/server/src/services/permission/sections-builder/handlers.d.ts.map +0 -1
  926. package/dist/server/src/services/permission/sections-builder/index.d.ts +0 -9
  927. package/dist/server/src/services/permission/sections-builder/index.d.ts.map +0 -1
  928. package/dist/server/src/services/permission/sections-builder/section.d.ts +0 -38
  929. package/dist/server/src/services/permission/sections-builder/section.d.ts.map +0 -1
  930. package/dist/server/src/services/permission/sections-builder/utils.d.ts +0 -13
  931. package/dist/server/src/services/permission/sections-builder/utils.d.ts.map +0 -1
  932. package/dist/server/src/services/permission.d.ts +0 -68
  933. package/dist/server/src/services/permission.d.ts.map +0 -1
  934. package/dist/server/src/services/project-settings.d.ts +0 -27
  935. package/dist/server/src/services/project-settings.d.ts.map +0 -1
  936. package/dist/server/src/services/role.d.ts +0 -41
  937. package/dist/server/src/services/role.d.ts.map +0 -1
  938. package/dist/server/src/services/token.d.ts +0 -44
  939. package/dist/server/src/services/token.d.ts.map +0 -1
  940. package/dist/server/src/services/transfer/index.d.ts +0 -5
  941. package/dist/server/src/services/transfer/index.d.ts.map +0 -1
  942. package/dist/server/src/services/transfer/permission.d.ts +0 -8
  943. package/dist/server/src/services/transfer/permission.d.ts.map +0 -1
  944. package/dist/server/src/services/transfer/token.d.ts +0 -59
  945. package/dist/server/src/services/transfer/token.d.ts.map +0 -1
  946. package/dist/server/src/services/transfer/utils.d.ts +0 -14
  947. package/dist/server/src/services/transfer/utils.d.ts.map +0 -1
  948. package/dist/server/src/services/user.d.ts +0 -32
  949. package/dist/server/src/services/user.d.ts.map +0 -1
  950. package/dist/server/src/strategies/admin.d.ts +0 -27
  951. package/dist/server/src/strategies/admin.d.ts.map +0 -1
  952. package/dist/server/src/strategies/api-token.d.ts +0 -61
  953. package/dist/server/src/strategies/api-token.d.ts.map +0 -1
  954. package/dist/server/src/strategies/data-transfer.d.ts +0 -53
  955. package/dist/server/src/strategies/data-transfer.d.ts.map +0 -1
  956. package/dist/server/src/strategies/index.d.ts +0 -18
  957. package/dist/server/src/strategies/index.d.ts.map +0 -1
  958. package/dist/server/src/validation/action-provider.d.ts +0 -6
  959. package/dist/server/src/validation/action-provider.d.ts.map +0 -1
  960. package/dist/server/src/validation/api-tokens.d.ts +0 -8
  961. package/dist/server/src/validation/api-tokens.d.ts.map +0 -1
  962. package/dist/server/src/validation/authentication/forgot-password.d.ts +0 -3
  963. package/dist/server/src/validation/authentication/forgot-password.d.ts.map +0 -1
  964. package/dist/server/src/validation/authentication/index.d.ts +0 -6
  965. package/dist/server/src/validation/authentication/index.d.ts.map +0 -1
  966. package/dist/server/src/validation/authentication/register.d.ts +0 -10
  967. package/dist/server/src/validation/authentication/register.d.ts.map +0 -1
  968. package/dist/server/src/validation/authentication/renew-token.d.ts +0 -3
  969. package/dist/server/src/validation/authentication/renew-token.d.ts.map +0 -1
  970. package/dist/server/src/validation/authentication/reset-password.d.ts +0 -3
  971. package/dist/server/src/validation/authentication/reset-password.d.ts.map +0 -1
  972. package/dist/server/src/validation/common-functions/check-fields-are-correctly-nested.d.ts +0 -3
  973. package/dist/server/src/validation/common-functions/check-fields-are-correctly-nested.d.ts.map +0 -1
  974. package/dist/server/src/validation/common-functions/check-fields-dont-have-duplicates.d.ts +0 -3
  975. package/dist/server/src/validation/common-functions/check-fields-dont-have-duplicates.d.ts.map +0 -1
  976. package/dist/server/src/validation/common-functions/index.d.ts +0 -4
  977. package/dist/server/src/validation/common-functions/index.d.ts.map +0 -1
  978. package/dist/server/src/validation/common-validators.d.ts +0 -61
  979. package/dist/server/src/validation/common-validators.d.ts.map +0 -1
  980. package/dist/server/src/validation/permission.d.ts +0 -10
  981. package/dist/server/src/validation/permission.d.ts.map +0 -1
  982. package/dist/server/src/validation/policies/hasPermissions.d.ts +0 -6
  983. package/dist/server/src/validation/policies/hasPermissions.d.ts.map +0 -1
  984. package/dist/server/src/validation/project-settings.d.ts +0 -10
  985. package/dist/server/src/validation/project-settings.d.ts.map +0 -1
  986. package/dist/server/src/validation/role.d.ts +0 -12
  987. package/dist/server/src/validation/role.d.ts.map +0 -1
  988. package/dist/server/src/validation/transfer/index.d.ts +0 -2
  989. package/dist/server/src/validation/transfer/index.d.ts.map +0 -1
  990. package/dist/server/src/validation/transfer/token.d.ts +0 -8
  991. package/dist/server/src/validation/transfer/token.d.ts.map +0 -1
  992. package/dist/server/src/validation/user.d.ts +0 -119
  993. package/dist/server/src/validation/user.d.ts.map +0 -1
  994. package/dist/shared/contracts/admin.d.ts +0 -184
  995. package/dist/shared/contracts/admin.d.ts.map +0 -1
  996. package/dist/shared/contracts/api-token.d.ts +0 -95
  997. package/dist/shared/contracts/api-token.d.ts.map +0 -1
  998. package/dist/shared/contracts/audit-logs.d.ts +0 -42
  999. package/dist/shared/contracts/audit-logs.d.ts.map +0 -1
  1000. package/dist/shared/contracts/authentication.d.ts +0 -130
  1001. package/dist/shared/contracts/authentication.d.ts.map +0 -1
  1002. package/dist/shared/contracts/content-api/permissions.d.ts +0 -24
  1003. package/dist/shared/contracts/content-api/permissions.d.ts.map +0 -1
  1004. package/dist/shared/contracts/content-api/routes.d.ts +0 -28
  1005. package/dist/shared/contracts/content-api/routes.d.ts.map +0 -1
  1006. package/dist/shared/contracts/content-api.d.ts +0 -31
  1007. package/dist/shared/contracts/content-api.d.ts.map +0 -1
  1008. package/dist/shared/contracts/permissions.d.ts +0 -79
  1009. package/dist/shared/contracts/permissions.d.ts.map +0 -1
  1010. package/dist/shared/contracts/providers.d.ts +0 -35
  1011. package/dist/shared/contracts/providers.d.ts.map +0 -1
  1012. package/dist/shared/contracts/review-workflows.d.ts +0 -80
  1013. package/dist/shared/contracts/review-workflows.d.ts.map +0 -1
  1014. package/dist/shared/contracts/roles.d.ts +0 -138
  1015. package/dist/shared/contracts/roles.d.ts.map +0 -1
  1016. package/dist/shared/contracts/shared.d.ts +0 -54
  1017. package/dist/shared/contracts/shared.d.ts.map +0 -1
  1018. package/dist/shared/contracts/transfer.d.ts +0 -142
  1019. package/dist/shared/contracts/transfer.d.ts.map +0 -1
  1020. package/dist/shared/contracts/user.d.ts +0 -109
  1021. package/dist/shared/contracts/user.d.ts.map +0 -1
  1022. package/dist/shared/contracts/users.d.ts +0 -57
  1023. package/dist/shared/contracts/users.d.ts.map +0 -1
  1024. package/dist/shared/contracts/webhooks.d.ts +0 -111
  1025. package/dist/shared/contracts/webhooks.d.ts.map +0 -1
  1026. package/dist/shared/schema.d.ts +0 -8
  1027. package/dist/shared/schema.d.ts.map +0 -1
@@ -1,3857 +0,0 @@
1
- import EE from "@strapi/strapi/dist/utils/ee";
2
- import { resolve, basename, join, extname } from "path";
3
- import fse from "fs-extra";
4
- import koaStatic from "koa-static";
5
- import "@strapi/types";
6
- import { isNil, castArray, pipe, pickBy, get, keys, differenceWith, isEqual, getOr, has, clamp, difference, set, merge, map, uniq, isEmpty, toLower, isFunction, toString, toNumber, reverse, take, prop, drop, pick, isString, defaultsDeep, forEach, filter, cond, stubTrue, flow, size, mean, max, sum, defaultTo, mapValues, curry, includes, isArray, omit, isUndefined, update, property } from "lodash/fp";
7
- import { differenceInHours, parseISO, add } from "date-fns";
8
- import { errors, mapAsync, pipeAsync, getAbsoluteAdminUrl, stringIncludes, reduceAsync, yup, validateYupSchema, env } from "@strapi/utils";
9
- import semver from "semver";
10
- import localProvider from "@strapi/provider-audit-logs-local";
11
- import { scheduleJob } from "node-schedule";
12
- import _ from "lodash";
13
- import { Strategy } from "passport-local";
14
- import passport$2 from "koa-passport";
15
- import "koa-bodyparser";
16
- import compose from "koa-compose";
17
- const registerAdminPanelRoute = ({ strapi: strapi2 }) => {
18
- let buildDir = resolve(strapi2.dirs.dist.root, "build");
19
- if (!fse.pathExistsSync(buildDir)) {
20
- buildDir = resolve(__dirname, "../../build");
21
- }
22
- const serveAdminMiddleware = async (ctx, next) => {
23
- await next();
24
- if (ctx.method !== "HEAD" && ctx.method !== "GET") {
25
- return;
26
- }
27
- if (ctx.body != null || ctx.status !== 404) {
28
- return;
29
- }
30
- ctx.type = "html";
31
- ctx.body = fse.createReadStream(join(buildDir, "index.html"));
32
- };
33
- strapi2.server.routes([
34
- {
35
- method: "GET",
36
- path: `${strapi2.config.admin.path}/:path*`,
37
- handler: [
38
- serveAdminMiddleware,
39
- serveStatic(buildDir, {
40
- maxage: 31536e3,
41
- defer: false,
42
- index: "index.html",
43
- setHeaders(res, path) {
44
- const ext = extname(path);
45
- if (ext !== ".html") {
46
- res.setHeader("cache-control", "public, max-age=31536000, immutable");
47
- }
48
- }
49
- })
50
- ],
51
- config: { auth: false }
52
- }
53
- ]);
54
- };
55
- const serveStatic = (filesDir, koaStaticOptions = {}) => {
56
- const serve = koaStatic(filesDir, koaStaticOptions);
57
- return async (ctx, next) => {
58
- const prev = ctx.path;
59
- const newPath = basename(ctx.path);
60
- ctx.path = newPath;
61
- await serve(ctx, async () => {
62
- ctx.path = prev;
63
- await next();
64
- ctx.path = newPath;
65
- });
66
- ctx.path = prev;
67
- };
68
- };
69
- const getService$1 = (name2) => {
70
- return strapi.service(`admin::${name2}`);
71
- };
72
- const authenticate$2 = async (ctx) => {
73
- const { authorization } = ctx.request.header;
74
- if (!authorization) {
75
- return { authenticated: false };
76
- }
77
- const parts = authorization.split(/\s+/);
78
- if (parts[0].toLowerCase() !== "bearer" || parts.length !== 2) {
79
- return { authenticated: false };
80
- }
81
- const token = parts[1];
82
- const { payload, isValid } = getService$1("token").decodeJwtToken(token);
83
- if (!isValid) {
84
- return { authenticated: false };
85
- }
86
- const user2 = await strapi.query("admin::user").findOne({ where: { id: payload.id }, populate: ["roles"] });
87
- if (!user2 || !(user2.isActive === true)) {
88
- return { authenticated: false };
89
- }
90
- const userAbility = await getService$1("permission").engine.generateUserAbility(user2);
91
- ctx.state.userAbility = userAbility;
92
- ctx.state.user = user2;
93
- return {
94
- authenticated: true,
95
- credentials: user2,
96
- ability: userAbility
97
- };
98
- };
99
- const name$1 = "admin";
100
- const adminAuthStrategy = {
101
- name: name$1,
102
- authenticate: authenticate$2
103
- };
104
- const DAY_IN_MS = 24 * 60 * 60 * 1e3;
105
- const constants = {
106
- CONTENT_TYPE_SECTION: "contentTypes",
107
- SUPER_ADMIN_CODE: "strapi-super-admin",
108
- EDITOR_CODE: "strapi-editor",
109
- AUTHOR_CODE: "strapi-author",
110
- READ_ACTION: "plugin::content-manager.explorer.read",
111
- CREATE_ACTION: "plugin::content-manager.explorer.create",
112
- UPDATE_ACTION: "plugin::content-manager.explorer.update",
113
- DELETE_ACTION: "plugin::content-manager.explorer.delete",
114
- PUBLISH_ACTION: "plugin::content-manager.explorer.publish",
115
- API_TOKEN_TYPE: {
116
- READ_ONLY: "read-only",
117
- FULL_ACCESS: "full-access",
118
- CUSTOM: "custom"
119
- },
120
- // The front-end only displays these values
121
- API_TOKEN_LIFESPANS: {
122
- UNLIMITED: null,
123
- DAYS_7: 7 * DAY_IN_MS,
124
- DAYS_30: 30 * DAY_IN_MS,
125
- DAYS_90: 90 * DAY_IN_MS
126
- },
127
- TRANSFER_TOKEN_TYPE: {
128
- PUSH: "push",
129
- PULL: "pull"
130
- },
131
- TRANSFER_TOKEN_LIFESPANS: {
132
- UNLIMITED: null,
133
- DAYS_7: 7 * DAY_IN_MS,
134
- DAYS_30: 30 * DAY_IN_MS,
135
- DAYS_90: 90 * DAY_IN_MS
136
- }
137
- };
138
- const { UnauthorizedError: UnauthorizedError$1, ForbiddenError: ForbiddenError$1 } = errors;
139
- const isReadScope = (scope) => scope.endsWith("find") || scope.endsWith("findOne");
140
- const extractToken = (ctx) => {
141
- if (ctx.request && ctx.request.header && ctx.request.header.authorization) {
142
- const parts = ctx.request.header.authorization.split(/\s+/);
143
- if (parts[0].toLowerCase() !== "bearer" || parts.length !== 2) {
144
- return null;
145
- }
146
- return parts[1];
147
- }
148
- return null;
149
- };
150
- const authenticate$1 = async (ctx) => {
151
- const apiTokenService = getService$1("api-token");
152
- const token = extractToken(ctx);
153
- if (!token) {
154
- return { authenticated: false };
155
- }
156
- const apiToken = await apiTokenService.getBy({
157
- accessKey: apiTokenService.hash(token)
158
- });
159
- if (!apiToken) {
160
- return { authenticated: false };
161
- }
162
- const currentDate = /* @__PURE__ */ new Date();
163
- if (!isNil(apiToken.expiresAt)) {
164
- const expirationDate = new Date(apiToken.expiresAt);
165
- if (expirationDate < currentDate) {
166
- return { authenticated: false, error: new UnauthorizedError$1("Token expired") };
167
- }
168
- }
169
- const hoursSinceLastUsed = differenceInHours(currentDate, parseISO(apiToken.lastUsedAt));
170
- if (hoursSinceLastUsed >= 1) {
171
- await strapi.query("admin::api-token").update({
172
- where: { id: apiToken.id },
173
- data: { lastUsedAt: currentDate }
174
- });
175
- }
176
- if (apiToken.type === constants.API_TOKEN_TYPE.CUSTOM) {
177
- const ability = await strapi.contentAPI.permissions.engine.generateAbility(
178
- apiToken.permissions.map((action) => ({ action }))
179
- );
180
- return { authenticated: true, ability, credentials: apiToken };
181
- }
182
- return { authenticated: true, credentials: apiToken };
183
- };
184
- const verify = (auth2, config) => {
185
- const { credentials: apiToken, ability } = auth2;
186
- if (!apiToken) {
187
- throw new UnauthorizedError$1("Token not found");
188
- }
189
- const currentDate = /* @__PURE__ */ new Date();
190
- if (!isNil(apiToken.expiresAt)) {
191
- const expirationDate = new Date(apiToken.expiresAt);
192
- if (expirationDate < currentDate) {
193
- throw new UnauthorizedError$1("Token expired");
194
- }
195
- }
196
- if (apiToken.type === constants.API_TOKEN_TYPE.FULL_ACCESS) {
197
- return;
198
- }
199
- if (apiToken.type === constants.API_TOKEN_TYPE.READ_ONLY) {
200
- const scopes = castArray(config.scope);
201
- if (config.scope && scopes.every(isReadScope)) {
202
- return;
203
- }
204
- } else if (apiToken.type === constants.API_TOKEN_TYPE.CUSTOM) {
205
- if (!ability) {
206
- throw new ForbiddenError$1();
207
- }
208
- const scopes = castArray(config.scope);
209
- const isAllowed = scopes.every((scope) => ability.can(scope));
210
- if (isAllowed) {
211
- return;
212
- }
213
- }
214
- throw new ForbiddenError$1();
215
- };
216
- const apiTokenAuthStrategy = {
217
- name: "api-token",
218
- authenticate: authenticate$1,
219
- verify
220
- };
221
- const executeCERegister = ({ strapi: strapi2 }) => {
222
- const passportMiddleware = strapi2.admin?.services.passport.init();
223
- strapi2.server.api("admin").use(passportMiddleware);
224
- strapi2.container.get("auth").register("admin", adminAuthStrategy);
225
- strapi2.container.get("auth").register("content-api", apiTokenAuthStrategy);
226
- if (strapi2.config.serveAdminPanel) {
227
- registerAdminPanelRoute({ strapi: strapi2 });
228
- }
229
- };
230
- async function migrateAuditLogsTable({ oldContentTypes, contentTypes }) {
231
- const oldName = oldContentTypes?.["admin::audit-log"]?.collectionName;
232
- const newName = contentTypes["admin::audit-log"]?.collectionName;
233
- const hasRenamedAuditLogsTable = oldName === "audit_logs" && newName === "strapi_audit_logs";
234
- if (!hasRenamedAuditLogsTable) {
235
- return;
236
- }
237
- const hasAuditLogsTable = await strapi.db.getSchemaConnection().hasTable("audit_logs");
238
- const hasLinkTable = await strapi.db.getSchemaConnection().hasTable("audit_logs_user_links");
239
- if (!hasAuditLogsTable || !hasLinkTable) {
240
- return;
241
- }
242
- const auditLogsColumnInfo = await strapi.db.connection("audit_logs").columnInfo();
243
- const linkColumnInfo = await strapi.db.connection("audit_logs_user_links").columnInfo();
244
- if (!auditLogsColumnInfo.action || !auditLogsColumnInfo.date || !auditLogsColumnInfo.payload || !linkColumnInfo.audit_log_id || !linkColumnInfo.user_id) {
245
- return;
246
- }
247
- await strapi.db.getSchemaConnection().renameTable("audit_logs", "strapi_audit_logs");
248
- await strapi.db.getSchemaConnection().renameTable("audit_logs_user_links", "strapi_audit_logs_user_links");
249
- }
250
- const WORKFLOW_MODEL_UID = "admin::workflow";
251
- const STAGE_MODEL_UID = "admin::workflow-stage";
252
- const STAGE_TRANSITION_UID = "admin::review-workflows.stage.transition";
253
- const STAGE_DEFAULT_COLOR = "#4945FF";
254
- const ENTITY_STAGE_ATTRIBUTE = "strapi_stage";
255
- const ENTITY_ASSIGNEE_ATTRIBUTE = "strapi_assignee";
256
- const MAX_WORKFLOWS = 200;
257
- const MAX_STAGES_PER_WORKFLOW = 200;
258
- const ERRORS = {
259
- WORKFLOW_WITHOUT_STAGES: "A workflow must have at least one stage.",
260
- WORKFLOWS_LIMIT: "You’ve reached the limit of workflows in your plan. Delete a workflow or contact Sales to enable more workflows.",
261
- STAGES_LIMIT: "You’ve reached the limit of stages for this workflow in your plan. Try deleting some stages or contact Sales to enable more stages.",
262
- DUPLICATED_STAGE_NAME: "Stage names must be unique."
263
- };
264
- const WORKFLOW_POPULATE = {
265
- stages: {
266
- populate: {
267
- permissions: {
268
- fields: ["action", "actionParameters"],
269
- populate: {
270
- role: { fields: ["id", "name"] }
271
- }
272
- }
273
- }
274
- }
275
- };
276
- async function migrateReviewWorkflowStagesColor({ oldContentTypes, contentTypes }) {
277
- const hadColor = !!oldContentTypes?.["admin::workflow-stage"]?.attributes?.color;
278
- const hasColor = !!contentTypes?.["admin::workflow-stage"]?.attributes?.color;
279
- if (!hadColor && hasColor) {
280
- await strapi.query("admin::workflow-stage").updateMany({
281
- data: {
282
- color: STAGE_DEFAULT_COLOR
283
- }
284
- });
285
- }
286
- }
287
- const getService = (name2, { strapi: strapi2 } = { strapi: global.strapi }) => {
288
- return strapi2.service(`admin::${name2}`);
289
- };
290
- async function migrateReviewWorkflowStagesRoles({ oldContentTypes, contentTypes }) {
291
- const stageUID = "admin::workflow-stage";
292
- const hadRolePermissions = !!oldContentTypes?.[stageUID]?.attributes?.permissions;
293
- const hasRolePermissions = !!contentTypes?.[stageUID]?.attributes?.permissions;
294
- if (!hadRolePermissions && hasRolePermissions) {
295
- const roleUID = "admin::role";
296
- strapi.log.info(
297
- `Migrating all existing review workflow stages to have RBAC permissions for all ${roleUID}.`
298
- );
299
- const stagePermissionsService = getService("stage-permissions");
300
- const stages2 = await strapi.query(stageUID).findMany();
301
- const roles2 = await strapi.query(roleUID).findMany();
302
- const groupedPermissions = {};
303
- roles2.map((role2) => role2.id).forEach((roleId) => {
304
- stages2.map((stage) => stage.id).forEach((stageId) => {
305
- if (!groupedPermissions[stageId]) {
306
- groupedPermissions[stageId] = [];
307
- }
308
- groupedPermissions[stageId].push({
309
- roleId,
310
- fromStage: stageId,
311
- action: STAGE_TRANSITION_UID
312
- });
313
- });
314
- });
315
- for (const [stageId, permissions] of Object.entries(groupedPermissions)) {
316
- const numericalStageId = Number(stageId);
317
- if (Number.isNaN(numericalStageId)) {
318
- strapi.log.warn(
319
- `Unable to apply ${roleUID} migration for ${stageUID} with id ${stageId}. The stage does not have a numerical id.`
320
- );
321
- continue;
322
- }
323
- const stagePermissions2 = await stagePermissionsService.registerMany(permissions);
324
- await strapi.entityService.update(STAGE_MODEL_UID, numericalStageId, {
325
- data: {
326
- permissions: stagePermissions2.flat().map((permission2) => permission2.id)
327
- }
328
- });
329
- }
330
- }
331
- }
332
- const name = "Default";
333
- const defaultWorkflow = {
334
- name
335
- };
336
- async function migrateReviewWorkflowName({ oldContentTypes, contentTypes }) {
337
- const hadName = !!oldContentTypes?.[WORKFLOW_MODEL_UID]?.attributes?.name;
338
- const hasName = !!contentTypes?.[WORKFLOW_MODEL_UID]?.attributes?.name;
339
- if (!hadName && hasName) {
340
- await strapi.query(WORKFLOW_MODEL_UID).updateMany({
341
- where: {
342
- name: { $null: true }
343
- },
344
- data: {
345
- name: defaultWorkflow.name
346
- }
347
- });
348
- }
349
- }
350
- async function migrateWorkflowsContentTypes({ oldContentTypes, contentTypes }) {
351
- const hadContentTypes = !!oldContentTypes?.[WORKFLOW_MODEL_UID]?.attributes?.contentTypes;
352
- const hasContentTypes = !!contentTypes?.[WORKFLOW_MODEL_UID]?.attributes?.contentTypes;
353
- if (!hadContentTypes && hasContentTypes) {
354
- await strapi.query(WORKFLOW_MODEL_UID).updateMany({ data: { contentTypes: [] } });
355
- const contentTypes2 = pipe([pickBy(get("options.reviewWorkflows")), keys])(oldContentTypes);
356
- if (contentTypes2.length) {
357
- await strapi.query(WORKFLOW_MODEL_UID).update({ where: { id: { $notNull: true } }, data: { contentTypes: contentTypes2 } });
358
- }
359
- }
360
- }
361
- const transformTableName = (table) => {
362
- if (typeof table === "string") {
363
- return { name: table };
364
- }
365
- return table;
366
- };
367
- async function findTables({ strapi: strapi2 }, regex) {
368
- const tables = await strapi2.db.dialect.schemaInspector.getTables();
369
- return tables.filter((tableName) => regex.test(tableName));
370
- }
371
- async function addPersistTables({ strapi: strapi2 }, tableNames) {
372
- const persistedTables = await getPersistedTables({ strapi: strapi2 });
373
- const tables = tableNames.map(transformTableName);
374
- const notPersistedTableNames = differenceWith(isEqual, tables, persistedTables);
375
- const tablesToPersist = differenceWith(
376
- (t1, t2) => t1.name === t2.name,
377
- persistedTables,
378
- notPersistedTableNames
379
- );
380
- if (!notPersistedTableNames.length) {
381
- return;
382
- }
383
- tablesToPersist.push(...notPersistedTableNames);
384
- await strapi2.store.set({
385
- type: "core",
386
- key: "persisted_tables",
387
- value: tablesToPersist
388
- });
389
- }
390
- async function getPersistedTables({ strapi: strapi2 }) {
391
- const persistedTables = await strapi2.store.get({
392
- type: "core",
393
- key: "persisted_tables"
394
- });
395
- return (persistedTables || []).map(transformTableName);
396
- }
397
- async function setPersistedTables({ strapi: strapi2 }, tableNames) {
398
- await strapi2.store.set({
399
- type: "core",
400
- key: "persisted_tables",
401
- value: tableNames
402
- });
403
- }
404
- const persistTablesWithPrefix = async (tableNamePrefix) => {
405
- const tableNameRegex = new RegExp(`^${tableNamePrefix}.*`);
406
- const tableNames = await findTables({ strapi }, tableNameRegex);
407
- await addPersistTables({ strapi }, tableNames);
408
- };
409
- const removePersistedTablesWithSuffix = async (tableNameSuffix) => {
410
- const tableNameRegex = new RegExp(`.*${tableNameSuffix}$`);
411
- const persistedTables = await getPersistedTables({ strapi });
412
- const filteredPersistedTables = persistedTables.filter((table) => {
413
- return !tableNameRegex.test(table.name);
414
- });
415
- if (filteredPersistedTables.length === persistedTables.length) {
416
- return;
417
- }
418
- await setPersistedTables({ strapi }, filteredPersistedTables);
419
- };
420
- const persistTables = async (tables) => {
421
- await addPersistTables({ strapi }, tables);
422
- };
423
- function checkVersionThreshold(startVersion, currentVersion, thresholdVersion) {
424
- return semver.gte(currentVersion, thresholdVersion) && semver.lt(startVersion, thresholdVersion);
425
- }
426
- async function migrateStageAttribute({ oldContentTypes, contentTypes }) {
427
- const getRWVersion = getOr("0.0.0", `${STAGE_MODEL_UID}.options.version`);
428
- const oldRWVersion = getRWVersion(oldContentTypes);
429
- const currentRWVersion = getRWVersion(contentTypes);
430
- const migrationNeeded = checkVersionThreshold(oldRWVersion, currentRWVersion, "1.1.0");
431
- if (migrationNeeded) {
432
- const oldAttributeTableName = "strapi_review_workflows_stage";
433
- const newAttributeTableName = "strapi_stage";
434
- const tables = await findTables({ strapi }, new RegExp(oldAttributeTableName));
435
- await mapAsync(tables, async (tableName) => {
436
- const newTableName = tableName.replace(oldAttributeTableName, newAttributeTableName);
437
- const alreadyHasNextTable = await strapi.db.connection.schema.hasTable(newTableName);
438
- if (alreadyHasNextTable) {
439
- const dataInTable = await strapi.db.connection(newTableName).select().limit(1);
440
- if (!dataInTable.length) {
441
- await strapi.db.connection.schema.dropTable(newTableName);
442
- }
443
- }
444
- try {
445
- await strapi.db.connection.schema.renameTable(tableName, newTableName);
446
- } catch (e) {
447
- strapi.log.warn(
448
- `An error occurred during the migration of ${tableName} table to ${newTableName}.
449
- If ${newTableName} already exists, migration can't be done automatically.`
450
- );
451
- strapi.log.warn(e.message);
452
- }
453
- });
454
- }
455
- }
456
- const getVisibleContentTypesUID = pipe([
457
- // Pick only content-types visible in the content-manager and option is not false
458
- pickBy(
459
- (value) => getOr(true, "pluginOptions.content-manager.visible", value) && !getOr(false, "options.noStageAttribute", value)
460
- ),
461
- // Get UIDs
462
- keys
463
- ]);
464
- const hasStageAttribute = has(["attributes", ENTITY_STAGE_ATTRIBUTE]);
465
- const getWorkflowContentTypeFilter = ({ strapi: strapi2 }, contentType) => {
466
- if (strapi2.db.dialect.supportsOperator("$jsonSupersetOf")) {
467
- return { $jsonSupersetOf: JSON.stringify([contentType]) };
468
- }
469
- return { $contains: `"${contentType}"` };
470
- };
471
- const clampMaxWorkflows = clamp(1, MAX_WORKFLOWS);
472
- const clampMaxStagesPerWorkflow = clamp(1, MAX_STAGES_PER_WORKFLOW);
473
- async function migrateDeletedCTInWorkflows({ oldContentTypes, contentTypes }) {
474
- const deletedContentTypes = difference(keys(oldContentTypes), keys(contentTypes)) ?? [];
475
- if (deletedContentTypes.length) {
476
- await mapAsync(deletedContentTypes, async (deletedContentTypeUID) => {
477
- const workflow2 = await strapi.query(WORKFLOW_MODEL_UID).findOne({
478
- select: ["id", "contentTypes"],
479
- where: {
480
- contentTypes: getWorkflowContentTypeFilter({ strapi }, deletedContentTypeUID)
481
- }
482
- });
483
- if (workflow2) {
484
- await strapi.query(WORKFLOW_MODEL_UID).update({
485
- where: { id: workflow2.id },
486
- data: {
487
- contentTypes: workflow2.contentTypes.filter(
488
- (contentTypeUID) => contentTypeUID !== deletedContentTypeUID
489
- )
490
- }
491
- });
492
- }
493
- });
494
- }
495
- }
496
- const DEFAULT_RETENTION_DAYS = 90;
497
- const defaultEvents = [
498
- "entry.create",
499
- "entry.update",
500
- "entry.delete",
501
- "entry.publish",
502
- "entry.unpublish",
503
- "media.create",
504
- "media.update",
505
- "media.delete",
506
- "media-folder.create",
507
- "media-folder.update",
508
- "media-folder.delete",
509
- "user.create",
510
- "user.update",
511
- "user.delete",
512
- "admin.auth.success",
513
- "admin.logout",
514
- "content-type.create",
515
- "content-type.update",
516
- "content-type.delete",
517
- "component.create",
518
- "component.update",
519
- "component.delete",
520
- "role.create",
521
- "role.update",
522
- "role.delete",
523
- "permission.create",
524
- "permission.update",
525
- "permission.delete"
526
- ];
527
- const getSanitizedUser = (user2) => {
528
- let displayName = user2.email;
529
- if (user2.username) {
530
- displayName = user2.username;
531
- } else if (user2.firstname && user2.lastname) {
532
- displayName = `${user2.firstname} ${user2.lastname}`;
533
- }
534
- return {
535
- id: user2.id,
536
- email: user2.email,
537
- displayName
538
- };
539
- };
540
- const getEventMap = (defaultEvents2) => {
541
- const getDefaultPayload = (...args) => args[0];
542
- return defaultEvents2.reduce((acc, event) => {
543
- acc[event] = getDefaultPayload;
544
- return acc;
545
- }, {});
546
- };
547
- const getRetentionDays = (strapi2) => {
548
- const licenseRetentionDays = EE.features.get("audit-logs")?.options.retentionDays;
549
- const userRetentionDays = strapi2.config.get("admin.auditLogs.retentionDays");
550
- if (licenseRetentionDays == null) {
551
- return userRetentionDays ?? DEFAULT_RETENTION_DAYS;
552
- }
553
- if (userRetentionDays && userRetentionDays < licenseRetentionDays) {
554
- return userRetentionDays;
555
- }
556
- return licenseRetentionDays;
557
- };
558
- const createAuditLogsService = (strapi2) => {
559
- const state = {};
560
- const eventMap = getEventMap(defaultEvents);
561
- const processEvent = (name2, ...args) => {
562
- const requestState = strapi2.requestContext.get()?.state;
563
- const isUsingAdminAuth = requestState?.auth?.strategy.name === "admin";
564
- const user2 = requestState?.user;
565
- if (!isUsingAdminAuth || !user2) {
566
- return null;
567
- }
568
- const getPayload = eventMap[name2];
569
- if (!getPayload) {
570
- return null;
571
- }
572
- const ignoredUids = ["plugin::upload.file", "plugin::upload.folder"];
573
- if (ignoredUids.includes(args[0]?.uid)) {
574
- return null;
575
- }
576
- return {
577
- action: name2,
578
- date: (/* @__PURE__ */ new Date()).toISOString(),
579
- payload: getPayload(...args) || {},
580
- userId: user2.id
581
- };
582
- };
583
- async function handleEvent(name2, ...args) {
584
- const processedEvent = processEvent(name2, ...args);
585
- if (processedEvent) {
586
- await strapi2.db.transaction(({ onCommit }) => {
587
- onCommit(() => state.provider.saveEvent(processedEvent));
588
- });
589
- }
590
- }
591
- return {
592
- async register() {
593
- if (!state.eeEnableUnsubscribe) {
594
- state.eeEnableUnsubscribe = strapi2.eventHub.on("ee.enable", () => {
595
- this.destroy();
596
- this.register();
597
- });
598
- }
599
- if (!state.eeUpdateUnsubscribe) {
600
- state.eeUpdateUnsubscribe = strapi2.eventHub.on("ee.update", () => {
601
- this.destroy();
602
- this.register();
603
- });
604
- }
605
- state.eeDisableUnsubscribe = strapi2.eventHub.on("ee.disable", () => {
606
- this.destroy();
607
- });
608
- state.provider = await localProvider.register({ strapi: strapi2 });
609
- if (!EE.features.isEnabled("audit-logs")) {
610
- return this;
611
- }
612
- state.eventHubUnsubscribe = strapi2.eventHub.subscribe(handleEvent.bind(this));
613
- const retentionDays = getRetentionDays(strapi2);
614
- state.deleteExpiredJob = scheduleJob("0 0 * * *", () => {
615
- const expirationDate = new Date(Date.now() - retentionDays * 24 * 60 * 60 * 1e3);
616
- state.provider.deleteExpiredEvents(expirationDate);
617
- });
618
- return this;
619
- },
620
- async findMany(query) {
621
- const { results, pagination } = await state.provider.findMany(query);
622
- const sanitizedResults = results.map((result) => {
623
- const { user: user2, ...rest } = result;
624
- return {
625
- ...rest,
626
- user: user2 ? getSanitizedUser(user2) : null
627
- };
628
- });
629
- return {
630
- results: sanitizedResults,
631
- pagination
632
- };
633
- },
634
- async findOne(id) {
635
- const result = await state.provider.findOne(id);
636
- if (!result) {
637
- return null;
638
- }
639
- const { user: user2, ...rest } = result;
640
- return {
641
- ...rest,
642
- user: user2 ? getSanitizedUser(user2) : null
643
- };
644
- },
645
- unsubscribe() {
646
- if (state.eeDisableUnsubscribe) {
647
- state.eeDisableUnsubscribe();
648
- }
649
- if (state.eventHubUnsubscribe) {
650
- state.eventHubUnsubscribe();
651
- }
652
- if (state.deleteExpiredJob) {
653
- state.deleteExpiredJob.cancel();
654
- }
655
- return this;
656
- },
657
- destroy() {
658
- return this.unsubscribe();
659
- }
660
- };
661
- };
662
- function contentTypeMiddleware(strapi2) {
663
- const moveReviewWorkflowOption = (ctx) => {
664
- const { reviewWorkflows: reviewWorkflows2, ...contentType } = ctx.request.body.contentType;
665
- if (typeof reviewWorkflows2 === "boolean") {
666
- ctx.request.body.contentType = set("options.reviewWorkflows", reviewWorkflows2, contentType);
667
- }
668
- };
669
- strapi2.server.router.use("/content-type-builder/content-types/:uid?", (ctx, next) => {
670
- if (ctx.method === "PUT" || ctx.method === "POST") {
671
- moveReviewWorkflowOption(ctx);
672
- }
673
- return next();
674
- });
675
- }
676
- const reviewWorkflowsMiddlewares = {
677
- contentTypeMiddleware
678
- };
679
- const register = async ({ strapi: strapi2 }) => {
680
- const auditLogsIsEnabled = strapi2.config.get("admin.auditLogs.enabled", true);
681
- if (auditLogsIsEnabled) {
682
- strapi2.hook("strapi::content-types.beforeSync").register(migrateAuditLogsTable);
683
- const auditLogsService = createAuditLogsService(strapi2);
684
- strapi2.container.register("audit-logs", auditLogsService);
685
- await auditLogsService.register();
686
- }
687
- if (EE.features.isEnabled("review-workflows")) {
688
- strapi2.hook("strapi::content-types.beforeSync").register(migrateStageAttribute);
689
- strapi2.hook("strapi::content-types.afterSync").register(migrateReviewWorkflowStagesColor).register(migrateReviewWorkflowStagesRoles).register(migrateReviewWorkflowName).register(migrateWorkflowsContentTypes).register(migrateDeletedCTInWorkflows);
690
- const reviewWorkflowService = getService("review-workflows");
691
- reviewWorkflowsMiddlewares.contentTypeMiddleware(strapi2);
692
- await reviewWorkflowService.register(EE.features.get("review-workflows"));
693
- }
694
- await executeCERegister({ strapi: strapi2 });
695
- };
696
- const workflow = {
697
- schema: {
698
- collectionName: "strapi_workflows",
699
- info: {
700
- name: "Workflow",
701
- description: "",
702
- singularName: "workflow",
703
- pluralName: "workflows",
704
- displayName: "Workflow"
705
- },
706
- options: {},
707
- pluginOptions: {
708
- "content-manager": {
709
- visible: false
710
- },
711
- "content-type-builder": {
712
- visible: false
713
- }
714
- },
715
- attributes: {
716
- name: {
717
- type: "string",
718
- required: true,
719
- unique: true
720
- },
721
- stages: {
722
- type: "relation",
723
- target: "admin::workflow-stage",
724
- relation: "oneToMany",
725
- mappedBy: "workflow"
726
- },
727
- contentTypes: {
728
- type: "json",
729
- required: true,
730
- default: []
731
- }
732
- }
733
- }
734
- };
735
- const workflowStage = {
736
- schema: {
737
- collectionName: "strapi_workflows_stages",
738
- info: {
739
- name: "Workflow Stage",
740
- description: "",
741
- singularName: "workflow-stage",
742
- pluralName: "workflow-stages",
743
- displayName: "Stages"
744
- },
745
- options: {
746
- version: "1.1.0"
747
- },
748
- pluginOptions: {
749
- "content-manager": {
750
- visible: false
751
- },
752
- "content-type-builder": {
753
- visible: false
754
- }
755
- },
756
- attributes: {
757
- name: {
758
- type: "string",
759
- configurable: false
760
- },
761
- color: {
762
- type: "string",
763
- configurable: false,
764
- default: STAGE_DEFAULT_COLOR
765
- },
766
- workflow: {
767
- type: "relation",
768
- target: "admin::workflow",
769
- relation: "manyToOne",
770
- inversedBy: "stages",
771
- configurable: false
772
- },
773
- permissions: {
774
- type: "relation",
775
- target: "admin::permission",
776
- relation: "manyToMany",
777
- configurable: false
778
- }
779
- }
780
- }
781
- };
782
- const index$3 = {
783
- workflow,
784
- "workflow-stage": workflowStage
785
- };
786
- const actions$1 = [
787
- {
788
- uid: "marketplace.read",
789
- displayName: "Access the marketplace",
790
- pluginName: "admin",
791
- section: "settings",
792
- category: "plugins and marketplace",
793
- subCategory: "marketplace"
794
- },
795
- {
796
- uid: "webhooks.create",
797
- displayName: "Create",
798
- pluginName: "admin",
799
- section: "settings",
800
- category: "webhooks"
801
- },
802
- {
803
- uid: "webhooks.read",
804
- displayName: "Read",
805
- pluginName: "admin",
806
- section: "settings",
807
- category: "webhooks"
808
- },
809
- {
810
- uid: "webhooks.update",
811
- displayName: "Update",
812
- pluginName: "admin",
813
- section: "settings",
814
- category: "webhooks"
815
- },
816
- {
817
- uid: "webhooks.delete",
818
- displayName: "Delete",
819
- pluginName: "admin",
820
- section: "settings",
821
- category: "webhooks"
822
- },
823
- {
824
- uid: "users.create",
825
- displayName: "Create (invite)",
826
- pluginName: "admin",
827
- section: "settings",
828
- category: "users and roles",
829
- subCategory: "users"
830
- },
831
- {
832
- uid: "users.read",
833
- displayName: "Read",
834
- pluginName: "admin",
835
- section: "settings",
836
- category: "users and roles",
837
- subCategory: "users"
838
- },
839
- {
840
- uid: "users.update",
841
- displayName: "Update",
842
- pluginName: "admin",
843
- section: "settings",
844
- category: "users and roles",
845
- subCategory: "users"
846
- },
847
- {
848
- uid: "users.delete",
849
- displayName: "Delete",
850
- pluginName: "admin",
851
- section: "settings",
852
- category: "users and roles",
853
- subCategory: "users"
854
- },
855
- {
856
- uid: "roles.create",
857
- displayName: "Create",
858
- pluginName: "admin",
859
- section: "settings",
860
- category: "users and roles",
861
- subCategory: "roles"
862
- },
863
- {
864
- uid: "roles.read",
865
- displayName: "Read",
866
- pluginName: "admin",
867
- section: "settings",
868
- category: "users and roles",
869
- subCategory: "roles"
870
- },
871
- {
872
- uid: "roles.update",
873
- displayName: "Update",
874
- pluginName: "admin",
875
- section: "settings",
876
- category: "users and roles",
877
- subCategory: "roles"
878
- },
879
- {
880
- uid: "roles.delete",
881
- displayName: "Delete",
882
- pluginName: "admin",
883
- section: "settings",
884
- category: "users and roles",
885
- subCategory: "roles"
886
- },
887
- {
888
- uid: "api-tokens.access",
889
- displayName: "Access the API tokens settings page",
890
- pluginName: "admin",
891
- section: "settings",
892
- category: "api tokens",
893
- subCategory: "api Tokens"
894
- },
895
- {
896
- uid: "api-tokens.create",
897
- displayName: "Create (generate)",
898
- pluginName: "admin",
899
- section: "settings",
900
- category: "api tokens",
901
- subCategory: "general"
902
- },
903
- {
904
- uid: "api-tokens.read",
905
- displayName: "Read",
906
- pluginName: "admin",
907
- section: "settings",
908
- category: "api tokens",
909
- subCategory: "general"
910
- },
911
- {
912
- uid: "api-tokens.update",
913
- displayName: "Update",
914
- pluginName: "admin",
915
- section: "settings",
916
- category: "api tokens",
917
- subCategory: "general"
918
- },
919
- {
920
- uid: "api-tokens.regenerate",
921
- displayName: "Regenerate",
922
- pluginName: "admin",
923
- section: "settings",
924
- category: "api tokens",
925
- subCategory: "general"
926
- },
927
- {
928
- uid: "api-tokens.delete",
929
- displayName: "Delete (revoke)",
930
- pluginName: "admin",
931
- section: "settings",
932
- category: "api tokens",
933
- subCategory: "general"
934
- },
935
- {
936
- uid: "project-settings.update",
937
- displayName: "Update the project level settings",
938
- pluginName: "admin",
939
- section: "settings",
940
- category: "project"
941
- },
942
- {
943
- uid: "project-settings.read",
944
- displayName: "Read the project level settings",
945
- pluginName: "admin",
946
- section: "settings",
947
- category: "project"
948
- },
949
- {
950
- uid: "transfer.tokens.access",
951
- displayName: "Access the transfer tokens settings page",
952
- pluginName: "admin",
953
- section: "settings",
954
- category: "transfer tokens",
955
- subCategory: "transfer tokens"
956
- },
957
- {
958
- uid: "transfer.tokens.create",
959
- displayName: "Create (generate)",
960
- pluginName: "admin",
961
- section: "settings",
962
- category: "transfer tokens",
963
- subCategory: "general"
964
- },
965
- {
966
- uid: "transfer.tokens.read",
967
- displayName: "Read",
968
- pluginName: "admin",
969
- section: "settings",
970
- category: "transfer tokens",
971
- subCategory: "general"
972
- },
973
- {
974
- uid: "transfer.tokens.update",
975
- displayName: "Update",
976
- pluginName: "admin",
977
- section: "settings",
978
- category: "transfer tokens",
979
- subCategory: "general"
980
- },
981
- {
982
- uid: "transfer.tokens.regenerate",
983
- displayName: "Regenerate",
984
- pluginName: "admin",
985
- section: "settings",
986
- category: "transfer tokens",
987
- subCategory: "general"
988
- },
989
- {
990
- uid: "transfer.tokens.delete",
991
- displayName: "Delete (revoke)",
992
- pluginName: "admin",
993
- section: "settings",
994
- category: "transfer tokens",
995
- subCategory: "general"
996
- }
997
- ];
998
- const adminActions = {
999
- actions: actions$1
1000
- };
1001
- const conditions = [
1002
- {
1003
- displayName: "Is creator",
1004
- name: "is-creator",
1005
- plugin: "admin",
1006
- handler: (user2) => ({ "createdBy.id": user2.id })
1007
- },
1008
- {
1009
- displayName: "Has same role as creator",
1010
- name: "has-same-role-as-creator",
1011
- plugin: "admin",
1012
- handler: (user2) => ({
1013
- "createdBy.roles": {
1014
- $elemMatch: {
1015
- id: {
1016
- $in: user2.roles.map((r) => r.id)
1017
- }
1018
- }
1019
- }
1020
- })
1021
- }
1022
- ];
1023
- const adminConditions = {
1024
- conditions
1025
- };
1026
- const defaultAdminAuthSettings = {
1027
- providers: {
1028
- autoRegister: false,
1029
- defaultRole: null,
1030
- ssoLockedRoles: null
1031
- }
1032
- };
1033
- const registerPermissionActions = async () => {
1034
- await getService$1("permission").actionProvider.registerMany(adminActions.actions);
1035
- };
1036
- const registerAdminConditions = async () => {
1037
- await getService$1("permission").conditionProvider.registerMany(adminConditions.conditions);
1038
- };
1039
- const registerModelHooks = () => {
1040
- const { sendDidChangeInterfaceLanguage } = getService$1("metrics");
1041
- strapi.db.lifecycles.subscribe({
1042
- models: ["admin::user"],
1043
- afterCreate: sendDidChangeInterfaceLanguage,
1044
- afterDelete: sendDidChangeInterfaceLanguage,
1045
- afterUpdate({ params }) {
1046
- if (params.data.preferedLanguage) {
1047
- sendDidChangeInterfaceLanguage();
1048
- }
1049
- }
1050
- });
1051
- };
1052
- const syncAuthSettings = async () => {
1053
- const adminStore = await strapi.store({ type: "core", name: "admin" });
1054
- const adminAuthSettings = await adminStore.get({ key: "auth" });
1055
- const newAuthSettings = merge(defaultAdminAuthSettings, adminAuthSettings);
1056
- const roleExists = await getService$1("role").exists({
1057
- id: newAuthSettings.providers.defaultRole
1058
- });
1059
- if (!roleExists) {
1060
- newAuthSettings.providers.defaultRole = null;
1061
- }
1062
- await adminStore.set({ key: "auth", value: newAuthSettings });
1063
- };
1064
- const syncAPITokensPermissions = async () => {
1065
- const validPermissions = strapi.contentAPI.permissions.providers.action.keys();
1066
- const permissionsInDB = await pipeAsync(
1067
- strapi.query("admin::api-token-permission").findMany,
1068
- // @ts-expect-error lodash types
1069
- map("action")
1070
- )();
1071
- const unknownPermissions = uniq(difference(permissionsInDB, validPermissions));
1072
- if (unknownPermissions.length > 0) {
1073
- await strapi.query("admin::api-token-permission").deleteMany({ where: { action: { $in: unknownPermissions } } });
1074
- }
1075
- };
1076
- const executeCEBootstrap = async ({ strapi: strapi2 }) => {
1077
- await registerAdminConditions();
1078
- await registerPermissionActions();
1079
- registerModelHooks();
1080
- const permissionService = getService$1("permission");
1081
- const userService = getService$1("user");
1082
- const roleService = getService$1("role");
1083
- const apiTokenService = getService$1("api-token");
1084
- const transferService = getService$1("transfer");
1085
- const tokenService = getService$1("token");
1086
- await roleService.createRolesIfNoneExist();
1087
- await roleService.resetSuperAdminPermissions();
1088
- await roleService.displayWarningIfNoSuperAdmin();
1089
- await permissionService.cleanPermissionsInDatabase();
1090
- await userService.displayWarningIfUsersDontHaveRole();
1091
- await syncAuthSettings();
1092
- await syncAPITokensPermissions();
1093
- getService$1("metrics").startCron(strapi2);
1094
- apiTokenService.checkSaltIsDefined();
1095
- transferService.token.checkSaltIsDefined();
1096
- tokenService.checkSecretIsDefined();
1097
- };
1098
- const actions = {
1099
- sso: [
1100
- {
1101
- uid: "provider-login.read",
1102
- displayName: "Read",
1103
- pluginName: "admin",
1104
- section: "settings",
1105
- category: "single sign on",
1106
- subCategory: "options"
1107
- },
1108
- {
1109
- uid: "provider-login.update",
1110
- displayName: "Update",
1111
- pluginName: "admin",
1112
- section: "settings",
1113
- category: "single sign on",
1114
- subCategory: "options"
1115
- }
1116
- ],
1117
- auditLogs: [
1118
- {
1119
- uid: "audit-logs.read",
1120
- displayName: "Read",
1121
- pluginName: "admin",
1122
- section: "settings",
1123
- category: "audit logs",
1124
- subCategory: "options"
1125
- }
1126
- ],
1127
- reviewWorkflows: [
1128
- {
1129
- uid: "review-workflows.create",
1130
- displayName: "Create",
1131
- pluginName: "admin",
1132
- section: "settings",
1133
- category: "review workflows",
1134
- subCategory: "options"
1135
- },
1136
- {
1137
- uid: "review-workflows.read",
1138
- displayName: "Read",
1139
- pluginName: "admin",
1140
- section: "settings",
1141
- category: "review workflows",
1142
- subCategory: "options"
1143
- },
1144
- {
1145
- uid: "review-workflows.update",
1146
- displayName: "Update",
1147
- pluginName: "admin",
1148
- section: "settings",
1149
- category: "review workflows",
1150
- subCategory: "options"
1151
- },
1152
- {
1153
- uid: "review-workflows.delete",
1154
- displayName: "Delete",
1155
- pluginName: "admin",
1156
- section: "settings",
1157
- category: "review workflows",
1158
- subCategory: "options"
1159
- },
1160
- {
1161
- uid: "review-workflows.stage.transition",
1162
- displayName: "Change stage",
1163
- pluginName: "admin",
1164
- section: "internal"
1165
- }
1166
- ]
1167
- };
1168
- const bootstrap = async (args) => {
1169
- const { actionProvider } = getService("permission");
1170
- if (EE.features.isEnabled("sso")) {
1171
- await actionProvider.registerMany(actions.sso);
1172
- }
1173
- if (EE.features.isEnabled("audit-logs")) {
1174
- await persistTablesWithPrefix("strapi_audit_logs");
1175
- await actionProvider.registerMany(actions.auditLogs);
1176
- }
1177
- if (EE.features.isEnabled("review-workflows")) {
1178
- await persistTablesWithPrefix("strapi_workflows");
1179
- const { bootstrap: rwBootstrap } = getService("review-workflows");
1180
- await rwBootstrap();
1181
- await actionProvider.registerMany(actions.reviewWorkflows);
1182
- const { decorator: decorator2 } = getService("review-workflows-decorator");
1183
- strapi.entityService.decorate(decorator2);
1184
- await getService("review-workflows-weekly-metrics").registerCron();
1185
- }
1186
- await getService("seat-enforcement").seatEnforcementWorkflow();
1187
- await executeCEBootstrap(args);
1188
- };
1189
- const executeCEDestroy = async () => {
1190
- const { conditionProvider, actionProvider } = getService$1("permission");
1191
- await conditionProvider.clear();
1192
- await actionProvider.clear();
1193
- };
1194
- const destroy = async ({ strapi: strapi2 }) => {
1195
- if (EE.features.isEnabled("audit-logs")) {
1196
- strapi2.container.get("audit-logs").destroy();
1197
- }
1198
- await executeCEDestroy();
1199
- };
1200
- const enableFeatureMiddleware = (featureName) => (ctx, next) => {
1201
- if (EE.features.isEnabled(featureName)) {
1202
- return next();
1203
- }
1204
- ctx.status = 404;
1205
- };
1206
- const sso$1 = {
1207
- type: "admin",
1208
- routes: [
1209
- {
1210
- method: "GET",
1211
- path: "/providers",
1212
- handler: "authentication.getProviders",
1213
- config: {
1214
- middlewares: [enableFeatureMiddleware("sso")],
1215
- auth: false
1216
- }
1217
- },
1218
- {
1219
- method: "GET",
1220
- path: "/connect/:provider",
1221
- handler: "authentication.providerLogin",
1222
- config: {
1223
- middlewares: [enableFeatureMiddleware("sso")],
1224
- auth: false
1225
- }
1226
- },
1227
- {
1228
- method: "POST",
1229
- path: "/connect/:provider",
1230
- handler: "authentication.providerLogin",
1231
- config: {
1232
- middlewares: [enableFeatureMiddleware("sso")],
1233
- auth: false
1234
- }
1235
- },
1236
- {
1237
- method: "GET",
1238
- path: "/providers/options",
1239
- handler: "authentication.getProviderLoginOptions",
1240
- config: {
1241
- middlewares: [enableFeatureMiddleware("sso")],
1242
- policies: [
1243
- "admin::isAuthenticatedAdmin",
1244
- { name: "admin::hasPermissions", config: { actions: ["admin::provider-login.read"] } }
1245
- ]
1246
- }
1247
- },
1248
- {
1249
- method: "PUT",
1250
- path: "/providers/options",
1251
- handler: "authentication.updateProviderLoginOptions",
1252
- config: {
1253
- middlewares: [enableFeatureMiddleware("sso")],
1254
- policies: [
1255
- "admin::isAuthenticatedAdmin",
1256
- { name: "admin::hasPermissions", config: { actions: ["admin::provider-login.update"] } }
1257
- ]
1258
- }
1259
- },
1260
- {
1261
- method: "GET",
1262
- path: "/providers/isSSOLocked",
1263
- handler: "user.isSSOLocked",
1264
- config: {
1265
- middlewares: [enableFeatureMiddleware("sso")],
1266
- policies: ["admin::isAuthenticatedAdmin"]
1267
- }
1268
- }
1269
- ]
1270
- };
1271
- const licenseLimit = {
1272
- type: "admin",
1273
- routes: [
1274
- // License limit infos
1275
- {
1276
- method: "GET",
1277
- path: "/license-limit-information",
1278
- handler: "admin.licenseLimitInformation",
1279
- config: {
1280
- policies: [
1281
- "admin::isAuthenticatedAdmin",
1282
- {
1283
- name: "admin::hasPermissions",
1284
- config: {
1285
- actions: [
1286
- "admin::users.create",
1287
- "admin::users.read",
1288
- "admin::users.update",
1289
- "admin::users.delete"
1290
- ]
1291
- }
1292
- }
1293
- ]
1294
- }
1295
- }
1296
- ]
1297
- };
1298
- const auditLogs$1 = {
1299
- type: "admin",
1300
- routes: [
1301
- {
1302
- method: "GET",
1303
- path: "/audit-logs",
1304
- handler: "auditLogs.findMany",
1305
- config: {
1306
- middlewares: [enableFeatureMiddleware("audit-logs")],
1307
- policies: [
1308
- "admin::isAuthenticatedAdmin",
1309
- {
1310
- name: "admin::hasPermissions",
1311
- config: {
1312
- actions: ["admin::audit-logs.read"]
1313
- }
1314
- }
1315
- ]
1316
- }
1317
- },
1318
- {
1319
- method: "GET",
1320
- path: "/audit-logs/:id",
1321
- handler: "auditLogs.findOne",
1322
- config: {
1323
- middlewares: [enableFeatureMiddleware("audit-logs")],
1324
- policies: [
1325
- "admin::isAuthenticatedAdmin",
1326
- {
1327
- name: "admin::hasPermissions",
1328
- config: {
1329
- actions: ["admin::audit-logs.read"]
1330
- }
1331
- }
1332
- ]
1333
- }
1334
- }
1335
- ]
1336
- };
1337
- const reviewWorkflows$1 = {
1338
- type: "admin",
1339
- routes: [
1340
- // Review workflow
1341
- {
1342
- method: "POST",
1343
- path: "/review-workflows/workflows",
1344
- handler: "workflows.create",
1345
- config: {
1346
- middlewares: [enableFeatureMiddleware("review-workflows")],
1347
- policies: [
1348
- "admin::isAuthenticatedAdmin",
1349
- {
1350
- name: "admin::hasPermissions",
1351
- config: {
1352
- actions: ["admin::review-workflows.create"]
1353
- }
1354
- }
1355
- ]
1356
- }
1357
- },
1358
- {
1359
- method: "PUT",
1360
- path: "/review-workflows/workflows/:id",
1361
- handler: "workflows.update",
1362
- config: {
1363
- middlewares: [enableFeatureMiddleware("review-workflows")],
1364
- policies: [
1365
- "admin::isAuthenticatedAdmin",
1366
- {
1367
- name: "admin::hasPermissions",
1368
- config: {
1369
- actions: ["admin::review-workflows.update"]
1370
- }
1371
- }
1372
- ]
1373
- }
1374
- },
1375
- {
1376
- method: "DELETE",
1377
- path: "/review-workflows/workflows/:id",
1378
- handler: "workflows.delete",
1379
- config: {
1380
- middlewares: [enableFeatureMiddleware("review-workflows")],
1381
- policies: [
1382
- "admin::isAuthenticatedAdmin",
1383
- {
1384
- name: "admin::hasPermissions",
1385
- config: {
1386
- actions: ["admin::review-workflows.delete"]
1387
- }
1388
- }
1389
- ]
1390
- }
1391
- },
1392
- {
1393
- method: "GET",
1394
- path: "/review-workflows/workflows",
1395
- handler: "workflows.find",
1396
- config: {
1397
- middlewares: [enableFeatureMiddleware("review-workflows")],
1398
- policies: [
1399
- "admin::isAuthenticatedAdmin",
1400
- {
1401
- name: "admin::hasPermissions",
1402
- config: {
1403
- actions: ["admin::review-workflows.read"]
1404
- }
1405
- }
1406
- ]
1407
- }
1408
- },
1409
- {
1410
- method: "GET",
1411
- path: "/review-workflows/workflows/:id",
1412
- handler: "workflows.findById",
1413
- config: {
1414
- middlewares: [enableFeatureMiddleware("review-workflows")],
1415
- policies: [
1416
- "admin::isAuthenticatedAdmin",
1417
- {
1418
- name: "admin::hasPermissions",
1419
- config: {
1420
- actions: ["admin::review-workflows.read"]
1421
- }
1422
- }
1423
- ]
1424
- }
1425
- },
1426
- {
1427
- method: "GET",
1428
- path: "/review-workflows/workflows/:workflow_id/stages",
1429
- handler: "stages.find",
1430
- config: {
1431
- middlewares: [enableFeatureMiddleware("review-workflows")],
1432
- policies: [
1433
- "admin::isAuthenticatedAdmin",
1434
- {
1435
- name: "admin::hasPermissions",
1436
- config: {
1437
- actions: ["admin::review-workflows.read"]
1438
- }
1439
- }
1440
- ]
1441
- }
1442
- },
1443
- {
1444
- method: "GET",
1445
- path: "/review-workflows/workflows/:workflow_id/stages/:id",
1446
- handler: "stages.findById",
1447
- config: {
1448
- middlewares: [enableFeatureMiddleware("review-workflows")],
1449
- policies: [
1450
- "admin::isAuthenticatedAdmin",
1451
- {
1452
- name: "admin::hasPermissions",
1453
- config: {
1454
- actions: ["admin::review-workflows.read"]
1455
- }
1456
- }
1457
- ]
1458
- }
1459
- },
1460
- {
1461
- method: "PUT",
1462
- path: "/content-manager/(collection|single)-types/:model_uid/:id/stage",
1463
- handler: "stages.updateEntity",
1464
- config: {
1465
- middlewares: [enableFeatureMiddleware("review-workflows")],
1466
- policies: ["admin::isAuthenticatedAdmin"]
1467
- }
1468
- },
1469
- {
1470
- method: "GET",
1471
- path: "/content-manager/(collection|single)-types/:model_uid/:id/stages",
1472
- handler: "stages.listAvailableStages",
1473
- config: {
1474
- middlewares: [enableFeatureMiddleware("review-workflows")],
1475
- policies: ["admin::isAuthenticatedAdmin"]
1476
- }
1477
- },
1478
- {
1479
- method: "PUT",
1480
- path: "/content-manager/(collection|single)-types/:model_uid/:id/assignee",
1481
- handler: "assignees.updateEntity",
1482
- config: {
1483
- middlewares: [enableFeatureMiddleware("review-workflows")],
1484
- policies: [
1485
- "admin::isAuthenticatedAdmin",
1486
- {
1487
- name: "admin::hasPermissions",
1488
- config: {
1489
- actions: ["admin::users.read", "admin::review-workflows.read"]
1490
- }
1491
- }
1492
- ]
1493
- }
1494
- }
1495
- ]
1496
- };
1497
- const index$2 = {
1498
- sso: sso$1,
1499
- "license-limit": licenseLimit,
1500
- "audit-logs": auditLogs$1,
1501
- "review-workflows": reviewWorkflows$1
1502
- };
1503
- const isSsoLocked = async (user2) => {
1504
- if (!EE.features.isEnabled("sso")) {
1505
- return false;
1506
- }
1507
- if (!user2) {
1508
- throw new Error("Missing user object");
1509
- }
1510
- const adminStore = await strapi.store({ type: "core", name: "admin" });
1511
- const { providers } = await adminStore.get({ key: "auth" });
1512
- const lockedRoles = providers.ssoLockedRoles ?? [];
1513
- if (isEmpty(lockedRoles)) {
1514
- return false;
1515
- }
1516
- const roles2 = (
1517
- // If the roles are pre-loaded for the given user, then use them
1518
- user2.roles ?? // Otherwise, try to load the role based on the given user ID
1519
- await strapi.query("admin::user").load(user2, "roles", { roles: { fields: ["id"] } }) ?? // If the query fails somehow, default to an empty array
1520
- []
1521
- );
1522
- const isLocked = lockedRoles.some(
1523
- (lockedId) => (
1524
- // lockedRoles will be a string to avoid issues with frontend and bigints
1525
- roles2.some((role2) => lockedId === role2.id.toString())
1526
- )
1527
- );
1528
- return isLocked;
1529
- };
1530
- const { ApplicationError: ApplicationError$6 } = errors;
1531
- const forgotPassword = async ({ email: email2 } = {}) => {
1532
- const user2 = await strapi.query("admin::user").findOne({ where: { email: email2, isActive: true } });
1533
- if (!user2 || await isSsoLocked(user2)) {
1534
- return;
1535
- }
1536
- const resetPasswordToken = getService("token").createToken();
1537
- await getService("user").updateById(user2.id, { resetPasswordToken });
1538
- const url = `${getAbsoluteAdminUrl(
1539
- strapi.config
1540
- )}/auth/reset-password?code=${resetPasswordToken}`;
1541
- return strapi.plugin("email").service("email").sendTemplatedEmail(
1542
- {
1543
- to: user2.email,
1544
- from: strapi.config.get("admin.forgotPassword.from"),
1545
- replyTo: strapi.config.get("admin.forgotPassword.replyTo")
1546
- },
1547
- strapi.config.get("admin.forgotPassword.emailTemplate"),
1548
- {
1549
- url,
1550
- user: _.pick(user2, ["email", "firstname", "lastname", "username"])
1551
- }
1552
- ).catch((err) => {
1553
- strapi.log.error(err);
1554
- });
1555
- };
1556
- const resetPassword = async ({ resetPasswordToken, password: password2 } = {}) => {
1557
- const matchingUser = await strapi.query("admin::user").findOne({ where: { resetPasswordToken, isActive: true } });
1558
- if (!matchingUser || await isSsoLocked(matchingUser)) {
1559
- throw new ApplicationError$6();
1560
- }
1561
- return getService("user").updateById(matchingUser.id, {
1562
- password: password2,
1563
- resetPasswordToken: null
1564
- });
1565
- };
1566
- const auth = {
1567
- forgotPassword,
1568
- resetPassword
1569
- };
1570
- const createLocalStrategy = (strapi2, middleware) => {
1571
- return new Strategy(
1572
- {
1573
- usernameField: "email",
1574
- passwordField: "password",
1575
- session: false
1576
- },
1577
- (email2, password2, done) => {
1578
- return getService$1("auth").checkCredentials({ email: toLower(email2), password: password2 }).then(async ([error, user2, message]) => {
1579
- if (middleware) {
1580
- return middleware([error, user2, message], done);
1581
- }
1582
- return done(error, user2, message);
1583
- }).catch((error) => done(error));
1584
- }
1585
- );
1586
- };
1587
- const authEventsMapper = {
1588
- onConnectionSuccess: "admin.auth.success",
1589
- onConnectionError: "admin.auth.error"
1590
- };
1591
- const valueIsFunctionType = ([, value]) => isFunction(value);
1592
- const keyIsValidEventName = ([key]) => {
1593
- return Object.keys(strapi.admin.services.passport.authEventsMapper).includes(key);
1594
- };
1595
- const getPassportStrategies$1 = () => [createLocalStrategy(strapi)];
1596
- const registerAuthEvents = () => {
1597
- const { events = {} } = strapi.config.get("admin.auth", {});
1598
- const { authEventsMapper: authEventsMapper2 } = strapi.admin.services.passport;
1599
- const eventList = Object.entries(events).filter(keyIsValidEventName).filter(valueIsFunctionType);
1600
- for (const [eventName, handler] of eventList) {
1601
- strapi.eventHub.on(authEventsMapper2[eventName], handler);
1602
- }
1603
- };
1604
- const init = () => {
1605
- strapi.admin.services.passport.getPassportStrategies().forEach((strategy) => passport$2.use(strategy));
1606
- registerAuthEvents();
1607
- return passport$2.initialize();
1608
- };
1609
- const passport$1 = { init, getPassportStrategies: getPassportStrategies$1, authEventsMapper };
1610
- const createProviderRegistry = () => {
1611
- const registry = /* @__PURE__ */ new Map();
1612
- Object.assign(registry, {
1613
- register(provider) {
1614
- if (strapi.isLoaded) {
1615
- throw new Error(`You can't register new provider after the bootstrap`);
1616
- }
1617
- this.set(provider.uid, provider);
1618
- },
1619
- registerMany(providers) {
1620
- providers.forEach((provider) => {
1621
- this.register(provider);
1622
- });
1623
- },
1624
- getAll() {
1625
- return Array.from(this.values());
1626
- }
1627
- });
1628
- return registry;
1629
- };
1630
- const providerRegistry = createProviderRegistry();
1631
- const errorMessage = "SSO is disabled. Its functionnalities cannot be accessed.";
1632
- const getStrategyCallbackURL = (providerName) => {
1633
- if (!EE.features.isEnabled("sso")) {
1634
- throw new Error(errorMessage);
1635
- }
1636
- return `/admin/connect/${providerName}`;
1637
- };
1638
- const syncProviderRegistryWithConfig = () => {
1639
- if (!EE.features.isEnabled("sso")) {
1640
- throw new Error(errorMessage);
1641
- }
1642
- const { providers = [] } = strapi.config.get("admin.auth", {});
1643
- providerRegistry.registerMany(providers);
1644
- };
1645
- const SSOAuthEventsMapper = {
1646
- onSSOAutoRegistration: "admin.auth.autoRegistration"
1647
- };
1648
- const sso = {
1649
- providerRegistry,
1650
- getStrategyCallbackURL,
1651
- syncProviderRegistryWithConfig,
1652
- authEventsMapper: { ...passport$1.authEventsMapper, ...SSOAuthEventsMapper }
1653
- };
1654
- const { UnauthorizedError } = errors;
1655
- const localStrategyMiddleware = async ([error, user2, message], done) => {
1656
- if (user2 && !error && await isSsoLocked(user2)) {
1657
- return done(
1658
- new UnauthorizedError("Login not allowed, please contact your administrator", {
1659
- code: "LOGIN_NOT_ALLOWED"
1660
- }),
1661
- user2,
1662
- message
1663
- );
1664
- }
1665
- return done(error, user2, message);
1666
- };
1667
- const getPassportStrategies = () => {
1668
- if (!EE.features.isEnabled("sso")) {
1669
- return [createLocalStrategy(strapi)];
1670
- }
1671
- const localStrategy = createLocalStrategy(strapi, localStrategyMiddleware);
1672
- if (!strapi.isLoaded) {
1673
- sso.syncProviderRegistryWithConfig();
1674
- }
1675
- const providers = sso.providerRegistry.getAll();
1676
- const strategies = providers.map((provider) => provider.createStrategy(strapi));
1677
- return [localStrategy, ...strategies];
1678
- };
1679
- const passport = {
1680
- getPassportStrategies,
1681
- ...sso
1682
- };
1683
- const { ApplicationError: ApplicationError$5 } = errors;
1684
- const ssoCheckRolesIdForDeletion = async (ids) => {
1685
- const adminStore = await strapi.store({ type: "core", name: "admin" });
1686
- const {
1687
- providers: { defaultRole }
1688
- } = await adminStore.get({ key: "auth" });
1689
- for (const roleId of ids) {
1690
- if (defaultRole && toString(defaultRole) === toString(roleId)) {
1691
- throw new ApplicationError$5(
1692
- "This role is used as the default SSO role. Make sure to change this configuration before deleting the role"
1693
- );
1694
- }
1695
- }
1696
- };
1697
- const role$1 = {
1698
- ssoCheckRolesIdForDeletion
1699
- };
1700
- const { SUPER_ADMIN_CODE: SUPER_ADMIN_CODE$2 } = constants;
1701
- const hasSuperAdminRole = (user2) => {
1702
- return user2.roles.filter((role2) => role2.code === SUPER_ADMIN_CODE$2).length > 0;
1703
- };
1704
- const { ValidationError: ValidationError$3 } = errors;
1705
- const { SUPER_ADMIN_CODE: SUPER_ADMIN_CODE$1 } = constants;
1706
- const updateEEDisabledUsersList = async (id, input) => {
1707
- const disabledUsers = await getService("seat-enforcement").getDisabledUserList();
1708
- if (!disabledUsers) {
1709
- return;
1710
- }
1711
- const user2 = disabledUsers.find((user22) => user22.id === Number(id));
1712
- if (!user2) {
1713
- return;
1714
- }
1715
- if (user2.isActive !== input.isActive) {
1716
- const newDisabledUsersList = disabledUsers.filter((user22) => user22.id !== Number(id));
1717
- await strapi.store.set({
1718
- type: "ee",
1719
- key: "disabled_users",
1720
- value: newDisabledUsersList
1721
- });
1722
- }
1723
- };
1724
- const castNumberArray = pipe(castArray, map(toNumber));
1725
- const removeFromEEDisabledUsersList = async (ids) => {
1726
- let idsToCheck;
1727
- if (typeof ids === "object") {
1728
- idsToCheck = castNumberArray(ids);
1729
- } else {
1730
- idsToCheck = [Number(ids)];
1731
- }
1732
- const disabledUsers = await getService("seat-enforcement").getDisabledUserList();
1733
- if (!disabledUsers) {
1734
- return;
1735
- }
1736
- const newDisabledUsersList = disabledUsers.filter((user2) => !idsToCheck.includes(user2.id));
1737
- await strapi.store.set({
1738
- type: "ee",
1739
- key: "disabled_users",
1740
- value: newDisabledUsersList
1741
- });
1742
- };
1743
- const updateById = async (id, attributes) => {
1744
- if (_.has(attributes, "roles")) {
1745
- const lastAdminUser = await isLastSuperAdminUser(id);
1746
- const superAdminRole = await getService("role").getSuperAdminWithUsersCount();
1747
- const willRemoveSuperAdminRole = !stringIncludes(attributes.roles, superAdminRole.id);
1748
- if (lastAdminUser && willRemoveSuperAdminRole) {
1749
- throw new ValidationError$3("You must have at least one user with super admin role.");
1750
- }
1751
- }
1752
- if (attributes.isActive === false) {
1753
- const lastAdminUser = await isLastSuperAdminUser(id);
1754
- if (lastAdminUser) {
1755
- throw new ValidationError$3("You must have at least one user with super admin role.");
1756
- }
1757
- }
1758
- if (_.has(attributes, "password")) {
1759
- const hashedPassword = await getService("auth").hashPassword(attributes.password);
1760
- const updatedUser2 = await strapi.query("admin::user").update({
1761
- where: { id },
1762
- data: {
1763
- ...attributes,
1764
- password: hashedPassword
1765
- },
1766
- populate: ["roles"]
1767
- });
1768
- strapi.eventHub.emit("user.update", { user: sanitizeUser(updatedUser2) });
1769
- return updatedUser2;
1770
- }
1771
- const updatedUser = await strapi.query("admin::user").update({
1772
- where: { id },
1773
- data: attributes,
1774
- populate: ["roles"]
1775
- });
1776
- await updateEEDisabledUsersList(id, attributes);
1777
- if (updatedUser) {
1778
- strapi.eventHub.emit("user.update", { user: sanitizeUser(updatedUser) });
1779
- }
1780
- return updatedUser;
1781
- };
1782
- const deleteById = async (id) => {
1783
- const userToDelete = await strapi.query("admin::user").findOne({
1784
- where: { id },
1785
- populate: ["roles"]
1786
- });
1787
- if (!userToDelete) {
1788
- return null;
1789
- }
1790
- if (userToDelete) {
1791
- if (userToDelete.roles.some((r) => r.code === SUPER_ADMIN_CODE$1)) {
1792
- const superAdminRole = await getService("role").getSuperAdminWithUsersCount();
1793
- if (superAdminRole.usersCount === 1) {
1794
- throw new ValidationError$3("You must have at least one user with super admin role.");
1795
- }
1796
- }
1797
- }
1798
- const deletedUser = await strapi.query("admin::user").delete({ where: { id }, populate: ["roles"] });
1799
- await removeFromEEDisabledUsersList(id);
1800
- strapi.eventHub.emit("user.delete", { user: sanitizeUser(deletedUser) });
1801
- return deletedUser;
1802
- };
1803
- const deleteByIds = async (ids) => {
1804
- const superAdminRole = await getService("role").getSuperAdminWithUsersCount();
1805
- const nbOfSuperAdminToDelete = await strapi.query("admin::user").count({
1806
- where: {
1807
- id: ids,
1808
- roles: { id: superAdminRole.id }
1809
- }
1810
- });
1811
- if (superAdminRole.usersCount === nbOfSuperAdminToDelete) {
1812
- throw new ValidationError$3("You must have at least one user with super admin role.");
1813
- }
1814
- const deletedUsers = [];
1815
- for (const id of ids) {
1816
- const deletedUser = await strapi.query("admin::user").delete({
1817
- where: { id },
1818
- populate: ["roles"]
1819
- });
1820
- deletedUsers.push(deletedUser);
1821
- }
1822
- await removeFromEEDisabledUsersList(ids);
1823
- strapi.eventHub.emit("user.delete", {
1824
- users: deletedUsers.map((deletedUser) => sanitizeUser(deletedUser))
1825
- });
1826
- return deletedUsers;
1827
- };
1828
- const sanitizeUserRoles = (role2) => _.pick(role2, ["id", "name", "description", "code"]);
1829
- const isLastSuperAdminUser = async (userId) => {
1830
- const user2 = await findOne(userId);
1831
- const superAdminRole = await getService("role").getSuperAdminWithUsersCount();
1832
- return superAdminRole.usersCount === 1 && hasSuperAdminRole(user2);
1833
- };
1834
- const sanitizeUser = (user2) => {
1835
- return {
1836
- ..._.omit(user2, ["password", "resetPasswordToken", "registrationToken", "roles"]),
1837
- roles: user2.roles && user2.roles.map(sanitizeUserRoles)
1838
- };
1839
- };
1840
- const findOne = async (id, populate = ["roles"]) => {
1841
- return strapi.entityService.findOne("admin::user", id, { populate });
1842
- };
1843
- const getCurrentActiveUserCount = async () => {
1844
- return strapi.db.query("admin::user").count({ where: { isActive: true } });
1845
- };
1846
- const user$1 = {
1847
- updateEEDisabledUsersList,
1848
- removeFromEEDisabledUsersList,
1849
- getCurrentActiveUserCount,
1850
- deleteByIds,
1851
- deleteById,
1852
- updateById
1853
- };
1854
- const { SUPER_ADMIN_CODE } = constants;
1855
- const getDisabledUserList = async () => {
1856
- return strapi.store.get({ type: "ee", key: "disabled_users" });
1857
- };
1858
- const enableMaximumUserCount = async (numberOfUsersToEnable) => {
1859
- const disabledUsers = await getDisabledUserList();
1860
- const orderedDisabledUsers = reverse(disabledUsers);
1861
- const usersToEnable = take(numberOfUsersToEnable, orderedDisabledUsers);
1862
- await strapi.db.query("admin::user").updateMany({
1863
- where: { id: map(prop("id"), usersToEnable) },
1864
- data: { isActive: true }
1865
- });
1866
- const remainingDisabledUsers = drop(numberOfUsersToEnable, orderedDisabledUsers);
1867
- await strapi.store.set({
1868
- type: "ee",
1869
- key: "disabled_users",
1870
- value: remainingDisabledUsers
1871
- });
1872
- };
1873
- const disableUsersAboveLicenseLimit = async (numberOfUsersToDisable) => {
1874
- const currentlyDisabledUsers = await getDisabledUserList() ?? [];
1875
- const usersToDisable = [];
1876
- const nonSuperAdminUsersToDisable = await strapi.db.query("admin::user").findMany({
1877
- where: {
1878
- isActive: true,
1879
- roles: {
1880
- code: { $ne: SUPER_ADMIN_CODE }
1881
- }
1882
- },
1883
- orderBy: { createdAt: "DESC" },
1884
- limit: numberOfUsersToDisable
1885
- });
1886
- usersToDisable.push(...nonSuperAdminUsersToDisable);
1887
- if (nonSuperAdminUsersToDisable.length < numberOfUsersToDisable) {
1888
- const superAdminUsersToDisable = await strapi.db.query("admin::user").findMany({
1889
- where: {
1890
- isActive: true,
1891
- roles: { code: SUPER_ADMIN_CODE }
1892
- },
1893
- orderBy: { createdAt: "DESC" },
1894
- limit: numberOfUsersToDisable - nonSuperAdminUsersToDisable.length
1895
- });
1896
- usersToDisable.push(...superAdminUsersToDisable);
1897
- }
1898
- await strapi.db.query("admin::user").updateMany({
1899
- where: { id: map(prop("id"), usersToDisable) },
1900
- data: { isActive: false }
1901
- });
1902
- await strapi.store.set({
1903
- type: "ee",
1904
- key: "disabled_users",
1905
- value: currentlyDisabledUsers.concat(map(pick(["id", "isActive"]), usersToDisable))
1906
- });
1907
- };
1908
- const syncDisabledUserRecords = async () => {
1909
- const disabledUsers = await strapi.store.get({ type: "ee", key: "disabled_users" });
1910
- if (!disabledUsers) {
1911
- return;
1912
- }
1913
- await strapi.db.query("admin::user").updateMany({
1914
- where: { id: map(prop("id"), disabledUsers) },
1915
- data: { isActive: false }
1916
- });
1917
- };
1918
- const seatEnforcementWorkflow = async () => {
1919
- const adminSeats = EE.seats;
1920
- if (isNil(adminSeats)) {
1921
- return;
1922
- }
1923
- await syncDisabledUserRecords();
1924
- const currentActiveUserCount = await getService("user").getCurrentActiveUserCount();
1925
- const adminSeatsLeft = adminSeats - currentActiveUserCount;
1926
- if (adminSeatsLeft > 0) {
1927
- await enableMaximumUserCount(adminSeatsLeft);
1928
- } else if (adminSeatsLeft < 0) {
1929
- await disableUsersAboveLicenseLimit(-adminSeatsLeft);
1930
- }
1931
- };
1932
- const seatEnforcement = {
1933
- seatEnforcementWorkflow,
1934
- getDisabledUserList
1935
- };
1936
- const workflowsContentTypesFactory = ({ strapi: strapi2 }) => {
1937
- const contentManagerContentTypeService = strapi2.plugin("content-manager").service("content-types");
1938
- const stagesService = getService("stages", { strapi: strapi2 });
1939
- const updateContentTypeConfig = async (uid, reviewWorkflowOption) => {
1940
- const modelConfig = await contentManagerContentTypeService.findConfiguration(uid);
1941
- await contentManagerContentTypeService.updateConfiguration(
1942
- { uid },
1943
- { options: merge(modelConfig.options, { reviewWorkflows: reviewWorkflowOption }) }
1944
- );
1945
- };
1946
- return {
1947
- /**
1948
- * Migrates entities stages. Used when a content type is assigned to a workflow.
1949
- * @param {*} options
1950
- * @param {Array<string>} options.srcContentTypes - The content types assigned to the previous workflow
1951
- * @param {Array<string>} options.destContentTypes - The content types assigned to the new workflow
1952
- * @param {Workflow.Stage} options.stageId - The new stage to assign the entities to
1953
- */
1954
- async migrate({ srcContentTypes = [], destContentTypes, stageId }) {
1955
- const workflowsService = getService("workflows", { strapi: strapi2 });
1956
- const { created, deleted } = diffContentTypes(srcContentTypes, destContentTypes);
1957
- await mapAsync(
1958
- created,
1959
- async (uid) => {
1960
- const srcWorkflows = await workflowsService._getAssignedWorkflows(uid, {});
1961
- if (srcWorkflows.length) {
1962
- await stagesService.updateEntitiesStage(uid, { toStageId: stageId });
1963
- await mapAsync(
1964
- srcWorkflows,
1965
- (srcWorkflow) => this.transferContentTypes(srcWorkflow, uid)
1966
- );
1967
- }
1968
- await updateContentTypeConfig(uid, true);
1969
- return stagesService.updateEntitiesStage(uid, {
1970
- fromStageId: null,
1971
- toStageId: stageId
1972
- });
1973
- },
1974
- // transferContentTypes can cause race conditions if called in parallel when updating the same workflow
1975
- { concurrency: 1 }
1976
- );
1977
- await mapAsync(deleted, async (uid) => {
1978
- await updateContentTypeConfig(uid, false);
1979
- await stagesService.deleteAllEntitiesStage(uid, {});
1980
- });
1981
- },
1982
- /**
1983
- * Filters the content types assigned to a workflow
1984
- * @param {Workflow} srcWorkflow - The workflow to transfer from
1985
- * @param {string} uid - The content type uid
1986
- */
1987
- async transferContentTypes(srcWorkflow, uid) {
1988
- await strapi2.entityService.update(WORKFLOW_MODEL_UID, srcWorkflow.id, {
1989
- data: {
1990
- contentTypes: srcWorkflow.contentTypes.filter((contentType) => contentType !== uid)
1991
- }
1992
- });
1993
- }
1994
- };
1995
- };
1996
- const diffContentTypes = (srcContentTypes, destContentTypes) => {
1997
- const created = difference(destContentTypes, srcContentTypes);
1998
- const deleted = difference(srcContentTypes, destContentTypes);
1999
- return { created, deleted };
2000
- };
2001
- const { ApplicationError: ApplicationError$4 } = errors;
2002
- const processFilters = ({ strapi: strapi2 }, filters = {}) => {
2003
- const processedFilters = { ...filters };
2004
- if (isString(filters.contentTypes)) {
2005
- processedFilters.contentTypes = getWorkflowContentTypeFilter({ strapi: strapi2 }, filters.contentTypes);
2006
- }
2007
- return processedFilters;
2008
- };
2009
- const processPopulate = (populate) => {
2010
- if (!populate) {
2011
- return populate;
2012
- }
2013
- return WORKFLOW_POPULATE;
2014
- };
2015
- const workflows$1 = ({ strapi: strapi2 }) => {
2016
- const workflowsContentTypes = workflowsContentTypesFactory({ strapi: strapi2 });
2017
- const workflowsValidationService = getService("review-workflows-validation", { strapi: strapi2 });
2018
- const metrics = getService("review-workflows-metrics", { strapi: strapi2 });
2019
- return {
2020
- /**
2021
- * Returns all the workflows matching the user-defined filters.
2022
- * @param {object} opts - Options for the query.
2023
- * @param {object} opts.filters - Filters object.
2024
- * @returns {Promise<object[]>} - List of workflows that match the user's filters.
2025
- */
2026
- async find(opts = {}) {
2027
- const filters = processFilters({ strapi: strapi2 }, opts.filters);
2028
- const populate = processPopulate(opts.populate);
2029
- return strapi2.entityService.findMany(WORKFLOW_MODEL_UID, { ...opts, filters, populate });
2030
- },
2031
- /**
2032
- * Returns the workflow with the specified ID.
2033
- * @param {string} id - ID of the requested workflow.
2034
- * @param {object} opts - Options for the query.
2035
- * @returns {Promise<object>} - Workflow object matching the requested ID.
2036
- */
2037
- findById(id, opts) {
2038
- const populate = processPopulate(opts.populate);
2039
- return strapi2.entityService.findOne(WORKFLOW_MODEL_UID, id, { ...opts, populate });
2040
- },
2041
- /**
2042
- * Creates a new workflow.
2043
- * @param {object} opts - Options for creating the new workflow.
2044
- * @returns {Promise<object>} - Workflow object that was just created.
2045
- * @throws {ValidationError} - If the workflow has no stages.
2046
- */
2047
- async create(opts) {
2048
- let createOpts = { ...opts, populate: WORKFLOW_POPULATE };
2049
- workflowsValidationService.validateWorkflowStages(opts.data.stages);
2050
- await workflowsValidationService.validateWorkflowCount(1);
2051
- return strapi2.db.transaction(async () => {
2052
- const stages2 = await getService("stages", { strapi: strapi2 }).createMany(opts.data.stages);
2053
- const mapIds = map(get("id"));
2054
- createOpts = set("data.stages", mapIds(stages2), createOpts);
2055
- if (opts.data.contentTypes) {
2056
- await workflowsContentTypes.migrate({
2057
- destContentTypes: opts.data.contentTypes,
2058
- stageId: stages2[0].id
2059
- });
2060
- }
2061
- metrics.sendDidCreateWorkflow();
2062
- return strapi2.entityService.create(WORKFLOW_MODEL_UID, createOpts);
2063
- });
2064
- },
2065
- /**
2066
- * Updates an existing workflow.
2067
- * @param {object} workflow - The existing workflow to update.
2068
- * @param {object} opts - Options for updating the workflow.
2069
- * @returns {Promise<object>} - Workflow object that was just updated.
2070
- * @throws {ApplicationError} - If the supplied stage ID does not belong to the workflow.
2071
- */
2072
- async update(workflow2, opts) {
2073
- const stageService = getService("stages", { strapi: strapi2 });
2074
- let updateOpts = { ...opts, populate: { ...WORKFLOW_POPULATE } };
2075
- let updatedStageIds;
2076
- await workflowsValidationService.validateWorkflowCount();
2077
- return strapi2.db.transaction(async () => {
2078
- if (opts.data.stages) {
2079
- workflowsValidationService.validateWorkflowStages(opts.data.stages);
2080
- opts.data.stages.forEach(
2081
- (stage) => this.assertStageBelongsToWorkflow(stage.id, workflow2)
2082
- );
2083
- updatedStageIds = await stageService.replaceStages(workflow2.stages, opts.data.stages, workflow2.contentTypes).then((stages2) => stages2.map((stage) => stage.id));
2084
- updateOpts = set("data.stages", updatedStageIds, updateOpts);
2085
- }
2086
- if (opts.data.contentTypes) {
2087
- await workflowsContentTypes.migrate({
2088
- srcContentTypes: workflow2.contentTypes,
2089
- destContentTypes: opts.data.contentTypes,
2090
- stageId: updatedStageIds ? updatedStageIds[0] : workflow2.stages[0].id
2091
- });
2092
- }
2093
- metrics.sendDidEditWorkflow();
2094
- return strapi2.entityService.update(WORKFLOW_MODEL_UID, workflow2.id, updateOpts);
2095
- });
2096
- },
2097
- /**
2098
- * Deletes an existing workflow.
2099
- * Also deletes all the workflow stages and migrate all assigned the content types.
2100
- * @param {*} workflow
2101
- * @param {*} opts
2102
- * @returns
2103
- */
2104
- async delete(workflow2, opts) {
2105
- const stageService = getService("stages", { strapi: strapi2 });
2106
- const workflowCount = await this.count();
2107
- if (workflowCount <= 1) {
2108
- throw new ApplicationError$4("Can not delete the last workflow");
2109
- }
2110
- return strapi2.db.transaction(async () => {
2111
- await stageService.deleteMany(workflow2.stages);
2112
- await workflowsContentTypes.migrate({
2113
- srcContentTypes: workflow2.contentTypes,
2114
- destContentTypes: []
2115
- });
2116
- return strapi2.entityService.delete(WORKFLOW_MODEL_UID, workflow2.id, opts);
2117
- });
2118
- },
2119
- /**
2120
- * Returns the total count of workflows.
2121
- * @returns {Promise<number>} - Total count of workflows.
2122
- */
2123
- count() {
2124
- return strapi2.entityService.count(WORKFLOW_MODEL_UID);
2125
- },
2126
- /**
2127
- * Finds the assigned workflow for a given content type ID.
2128
- * @param {string} uid - Content type ID to find the assigned workflow for.
2129
- * @param {object} opts - Options for the query.
2130
- * @returns {Promise<object|null>} - Assigned workflow object if found, or null.
2131
- */
2132
- async getAssignedWorkflow(uid, opts = {}) {
2133
- const workflows2 = await this._getAssignedWorkflows(uid, opts);
2134
- return workflows2.length > 0 ? workflows2[0] : null;
2135
- },
2136
- /**
2137
- * Finds all the assigned workflows for a given content type ID.
2138
- * Normally, there should only be one workflow assigned to a content type.
2139
- * However, edge cases can occur where a content type is assigned to multiple workflows.
2140
- * @param {string} uid - Content type ID to find the assigned workflows for.
2141
- * @param {object} opts - Options for the query.
2142
- * @returns {Promise<object[]>} - List of assigned workflow objects.
2143
- */
2144
- async _getAssignedWorkflows(uid, opts = {}) {
2145
- return this.find({
2146
- ...opts,
2147
- filters: { contentTypes: getWorkflowContentTypeFilter({ strapi: strapi2 }, uid) }
2148
- });
2149
- },
2150
- /**
2151
- * Asserts that a content type has an assigned workflow.
2152
- * @param {string} uid - Content type ID to verify the assignment of.
2153
- * @returns {Promise<object>} - Workflow object associated with the content type ID.
2154
- * @throws {ApplicationError} - If no assigned workflow is found for the content type ID.
2155
- */
2156
- async assertContentTypeBelongsToWorkflow(uid) {
2157
- const workflow2 = await this.getAssignedWorkflow(uid, {
2158
- populate: "stages"
2159
- });
2160
- if (!workflow2) {
2161
- throw new ApplicationError$4(`Review workflows is not activated on Content Type ${uid}.`);
2162
- }
2163
- return workflow2;
2164
- },
2165
- /**
2166
- * Asserts that a stage belongs to a given workflow.
2167
- * @param {string} stageId - ID of stage to check.
2168
- * @param {object} workflow - Workflow object to check against.
2169
- * @returns
2170
- * @throws {ApplicationError} - If the stage does not belong to the specified workflow.
2171
- */
2172
- assertStageBelongsToWorkflow(stageId, workflow2) {
2173
- if (!stageId) {
2174
- return;
2175
- }
2176
- const belongs = workflow2.stages.some((stage) => stage.id === stageId);
2177
- if (!belongs) {
2178
- throw new ApplicationError$4(`Stage does not belong to workflow "${workflow2.name}"`);
2179
- }
2180
- }
2181
- };
2182
- };
2183
- const { ApplicationError: ApplicationError$3, ValidationError: ValidationError$2 } = errors;
2184
- const sanitizedStageFields = ["id", "name", "workflow", "color"];
2185
- const sanitizeStageFields = pick(sanitizedStageFields);
2186
- const stages$1 = ({ strapi: strapi2 }) => {
2187
- const metrics = getService("review-workflows-metrics", { strapi: strapi2 });
2188
- const stagePermissionsService = getService("stage-permissions", { strapi: strapi2 });
2189
- const workflowsValidationService = getService("review-workflows-validation", { strapi: strapi2 });
2190
- return {
2191
- find({ workflowId, populate }) {
2192
- const params = {
2193
- filters: { workflow: workflowId },
2194
- populate
2195
- };
2196
- return strapi2.entityService.findMany(STAGE_MODEL_UID, params);
2197
- },
2198
- findById(id, { populate } = {}) {
2199
- const params = {
2200
- populate
2201
- };
2202
- return strapi2.entityService.findOne(STAGE_MODEL_UID, id, params);
2203
- },
2204
- async createMany(stagesList, { fields } = {}) {
2205
- const params = { select: fields ?? "*" };
2206
- const stages2 = await Promise.all(
2207
- stagesList.map(
2208
- (stage) => strapi2.entityService.create(STAGE_MODEL_UID, {
2209
- data: sanitizeStageFields(stage),
2210
- ...params
2211
- })
2212
- )
2213
- );
2214
- await reduceAsync(stagesList)(async (_2, stage, idx) => {
2215
- if (!stage.permissions || stage.permissions.length === 0) {
2216
- return;
2217
- }
2218
- const stagePermissions2 = stage.permissions;
2219
- const stageId = stages2[idx].id;
2220
- const permissions = await mapAsync(
2221
- stagePermissions2,
2222
- // Register each stage permission
2223
- (permission2) => stagePermissionsService.register({
2224
- roleId: permission2.role,
2225
- action: permission2.action,
2226
- fromStage: stageId
2227
- })
2228
- );
2229
- await strapi2.entityService.update(STAGE_MODEL_UID, stageId, {
2230
- data: {
2231
- permissions: permissions.flat().map((p) => p.id)
2232
- }
2233
- });
2234
- }, []);
2235
- metrics.sendDidCreateStage();
2236
- return stages2;
2237
- },
2238
- async update(srcStage, destStage) {
2239
- let stagePermissions2 = srcStage?.permissions ?? [];
2240
- const stageId = destStage.id;
2241
- if (destStage.permissions) {
2242
- await this.deleteStagePermissions([srcStage]);
2243
- const permissions = await mapAsync(
2244
- destStage.permissions,
2245
- (permission2) => stagePermissionsService.register({
2246
- roleId: permission2.role,
2247
- action: permission2.action,
2248
- fromStage: stageId
2249
- })
2250
- );
2251
- stagePermissions2 = permissions.flat().map((p) => p.id);
2252
- }
2253
- const stage = await strapi2.entityService.update(STAGE_MODEL_UID, stageId, {
2254
- data: {
2255
- ...destStage,
2256
- permissions: stagePermissions2
2257
- }
2258
- });
2259
- metrics.sendDidEditStage();
2260
- return stage;
2261
- },
2262
- async delete(stage) {
2263
- await this.deleteStagePermissions([stage]);
2264
- const deletedStage = await strapi2.entityService.delete(STAGE_MODEL_UID, stage.id);
2265
- metrics.sendDidDeleteStage();
2266
- return deletedStage;
2267
- },
2268
- async deleteMany(stages2) {
2269
- await this.deleteStagePermissions(stages2);
2270
- return strapi2.entityService.deleteMany(STAGE_MODEL_UID, {
2271
- filters: { id: { $in: stages2.map((s) => s.id) } }
2272
- });
2273
- },
2274
- async deleteStagePermissions(stages2) {
2275
- const permissions = stages2.map((s) => s.permissions || []).flat();
2276
- await stagePermissionsService.unregister(permissions || []);
2277
- },
2278
- count({ workflowId } = {}) {
2279
- const opts = {};
2280
- if (workflowId) {
2281
- opts.where = {
2282
- workflow: workflowId
2283
- };
2284
- }
2285
- return strapi2.entityService.count(STAGE_MODEL_UID, opts);
2286
- },
2287
- async replaceStages(srcStages, destStages, contentTypesToMigrate = []) {
2288
- const { created, updated, deleted } = getDiffBetweenStages(srcStages, destStages);
2289
- assertAtLeastOneStageRemain(srcStages || [], { created, deleted });
2290
- return strapi2.db.transaction(async ({ trx }) => {
2291
- const createdStages = await this.createMany(created, { fields: ["id"] });
2292
- const createdStagesIds = map("id", createdStages);
2293
- await mapAsync(updated, (destStage) => {
2294
- const srcStage = srcStages.find((s) => s.id === destStage.id);
2295
- return this.update(srcStage, destStage);
2296
- });
2297
- await mapAsync(deleted, async (stage) => {
2298
- const nearestStage = findNearestMatchingStage(
2299
- [...srcStages, ...createdStages],
2300
- srcStages.findIndex((s) => s.id === stage.id),
2301
- (targetStage) => {
2302
- return !deleted.find((s) => s.id === targetStage.id);
2303
- }
2304
- );
2305
- await mapAsync(contentTypesToMigrate, (contentTypeUID) => {
2306
- this.updateEntitiesStage(contentTypeUID, {
2307
- fromStageId: stage.id,
2308
- toStageId: nearestStage.id,
2309
- trx
2310
- });
2311
- });
2312
- return this.delete(stage);
2313
- });
2314
- return destStages.map((stage) => ({
2315
- ...stage,
2316
- id: stage.id ?? createdStagesIds.shift()
2317
- }));
2318
- });
2319
- },
2320
- /**
2321
- * Update the stage of an entity
2322
- *
2323
- * @param {object} entityInfo
2324
- * @param {number} entityInfo.id - Entity id
2325
- * @param {string} entityInfo.modelUID - the content-type of the entity
2326
- * @param {number} stageId - The id of the stage to assign to the entity
2327
- */
2328
- async updateEntity(entityInfo, stageId) {
2329
- const stage = await this.findById(stageId);
2330
- await workflowsValidationService.validateWorkflowCount();
2331
- if (!stage) {
2332
- throw new ApplicationError$3(`Selected stage does not exist`);
2333
- }
2334
- const entity = await strapi2.entityService.update(entityInfo.modelUID, entityInfo.id, {
2335
- // @ts-expect-error - entity service can not receive any type of attribute
2336
- data: { [ENTITY_STAGE_ATTRIBUTE]: stageId },
2337
- populate: [ENTITY_STAGE_ATTRIBUTE]
2338
- });
2339
- metrics.sendDidChangeEntryStage();
2340
- return entity;
2341
- },
2342
- /**
2343
- * Updates entity stages of a content type:
2344
- * - If fromStageId is undefined, all entities with an existing stage will be assigned the new stage
2345
- * - If fromStageId is null, all entities without a stage will be assigned the new stage
2346
- * - If fromStageId is a number, all entities with that stage will be assigned the new stage
2347
- *
2348
- * For performance reasons we use knex queries directly.
2349
- *
2350
- * @param {string} contentTypeUID
2351
- * @param {number | undefined | null} fromStageId
2352
- * @param {number} toStageId
2353
- * @param {import('knex').Knex.Transaction} trx
2354
- * @returns
2355
- */
2356
- async updateEntitiesStage(contentTypeUID, { fromStageId, toStageId }) {
2357
- const { attributes, tableName } = strapi2.db.metadata.get(contentTypeUID);
2358
- const joinTable = attributes[ENTITY_STAGE_ATTRIBUTE].joinTable;
2359
- const joinColumn = joinTable.joinColumn.name;
2360
- const invJoinColumn = joinTable.inverseJoinColumn.name;
2361
- await workflowsValidationService.validateWorkflowCount();
2362
- return strapi2.db.transaction(async ({ trx }) => {
2363
- if (fromStageId === void 0) {
2364
- return strapi2.db.getConnection().from(joinTable.name).update({ [invJoinColumn]: toStageId }).transacting(trx);
2365
- }
2366
- const selectStatement = strapi2.db.getConnection().select({ [joinColumn]: "t1.id", [invJoinColumn]: toStageId }).from(`${tableName} as t1`).leftJoin(`${joinTable.name} as t2`, `t1.id`, `t2.${joinColumn}`).where(`t2.${invJoinColumn}`, fromStageId).toSQL();
2367
- return strapi2.db.getConnection(joinTable.name).insert(
2368
- strapi2.db.connection.raw(
2369
- `(${joinColumn}, ${invJoinColumn}) ${selectStatement.sql}`,
2370
- selectStatement.bindings
2371
- )
2372
- ).transacting(trx);
2373
- });
2374
- },
2375
- /**
2376
- * Deletes all entity stages of a content type
2377
- * @param {string} contentTypeUID
2378
- * @returns
2379
- */
2380
- async deleteAllEntitiesStage(contentTypeUID) {
2381
- const { attributes } = strapi2.db.metadata.get(contentTypeUID);
2382
- const joinTable = attributes[ENTITY_STAGE_ATTRIBUTE].joinTable;
2383
- return strapi2.db.transaction(
2384
- async ({ trx }) => strapi2.db.getConnection().from(joinTable.name).delete().transacting(trx)
2385
- );
2386
- }
2387
- };
2388
- };
2389
- function getDiffBetweenStages(sourceStages, comparisonStages) {
2390
- const result = comparisonStages.reduce(
2391
- // ...
2392
- (acc, stageToCompare) => {
2393
- const srcStage = sourceStages.find((stage) => stage.id === stageToCompare.id);
2394
- if (!srcStage) {
2395
- acc.created.push(stageToCompare);
2396
- } else if (!isEqual(
2397
- pick(["name", "color", "permissions"], srcStage),
2398
- pick(["name", "color", "permissions"], stageToCompare)
2399
- )) {
2400
- acc.updated.push(stageToCompare);
2401
- }
2402
- return acc;
2403
- },
2404
- { created: [], updated: [] }
2405
- );
2406
- result.deleted = sourceStages.filter(
2407
- (srcStage) => !comparisonStages.some((cmpStage) => cmpStage.id === srcStage.id)
2408
- );
2409
- return result;
2410
- }
2411
- function assertAtLeastOneStageRemain(workflowStages, diffStages) {
2412
- const remainingStagesCount = workflowStages.length - diffStages.deleted.length + diffStages.created.length;
2413
- if (remainingStagesCount < 1) {
2414
- throw new ValidationError$2(ERRORS.WORKFLOW_WITHOUT_STAGES);
2415
- }
2416
- }
2417
- function findNearestMatchingStage(stages2, startIndex, condition) {
2418
- for (let i = startIndex; i >= 0; i -= 1) {
2419
- if (condition(stages2[i])) {
2420
- return stages2[i];
2421
- }
2422
- }
2423
- const remainingArray = stages2.slice(startIndex + 1);
2424
- const nearestObject = remainingArray.filter(condition)[0];
2425
- return nearestObject;
2426
- }
2427
- const { ApplicationError: ApplicationError$2 } = errors;
2428
- const validActions = [STAGE_TRANSITION_UID];
2429
- const stagePermissions = ({ strapi: strapi2 }) => {
2430
- const roleService = getService("role");
2431
- const permissionService = getService("permission");
2432
- return {
2433
- async register({ roleId, action, fromStage }) {
2434
- if (!validActions.includes(action)) {
2435
- throw new ApplicationError$2(`Invalid action ${action}`);
2436
- }
2437
- const permissions = await roleService.addPermissions(roleId, [
2438
- {
2439
- action,
2440
- actionParameters: {
2441
- from: fromStage
2442
- }
2443
- }
2444
- ]);
2445
- return permissions;
2446
- },
2447
- async registerMany(permissions) {
2448
- return mapAsync(permissions, this.register);
2449
- },
2450
- async unregister(permissions) {
2451
- const permissionIds = permissions.map(prop("id"));
2452
- await permissionService.deleteByIds(permissionIds);
2453
- },
2454
- can(action, fromStage) {
2455
- const requestState = strapi2.requestContext.get()?.state;
2456
- if (!requestState) {
2457
- return false;
2458
- }
2459
- const userRoles = requestState.user?.roles;
2460
- if (userRoles?.some((role2) => role2.code === "strapi-super-admin")) {
2461
- return true;
2462
- }
2463
- return requestState.userAbility.can({
2464
- name: action,
2465
- params: { from: fromStage }
2466
- });
2467
- }
2468
- };
2469
- };
2470
- const { ApplicationError: ApplicationError$1 } = errors;
2471
- const assignees$1 = ({ strapi: strapi2 }) => {
2472
- const metrics = getService("review-workflows-metrics", { strapi: strapi2 });
2473
- return {
2474
- async findEntityAssigneeId(id, model) {
2475
- const entity = await strapi2.entityService.findOne(model, id, {
2476
- populate: [ENTITY_ASSIGNEE_ATTRIBUTE],
2477
- fields: []
2478
- });
2479
- return entity?.[ENTITY_ASSIGNEE_ATTRIBUTE]?.id ?? null;
2480
- },
2481
- /**
2482
- * Update the assignee of an entity
2483
- */
2484
- async updateEntityAssignee(id, model, assigneeId) {
2485
- if (isNil(assigneeId)) {
2486
- return this.deleteEntityAssignee(id, model);
2487
- }
2488
- const userExists = await getService("user", { strapi: strapi2 }).exists({ id: assigneeId });
2489
- if (!userExists) {
2490
- throw new ApplicationError$1(`Selected user does not exist`);
2491
- }
2492
- metrics.sendDidEditAssignee(await this.findEntityAssigneeId(id, model), assigneeId);
2493
- return strapi2.entityService.update(model, id, {
2494
- // @ts-expect-error check entity service types
2495
- data: { [ENTITY_ASSIGNEE_ATTRIBUTE]: assigneeId },
2496
- populate: [ENTITY_ASSIGNEE_ATTRIBUTE],
2497
- fields: []
2498
- });
2499
- },
2500
- async deleteEntityAssignee(id, model) {
2501
- metrics.sendDidEditAssignee(await this.findEntityAssigneeId(id, model), null);
2502
- return strapi2.entityService.update(model, id, {
2503
- // @ts-expect-error check entity service types
2504
- data: { [ENTITY_ASSIGNEE_ATTRIBUTE]: null },
2505
- populate: [ENTITY_ASSIGNEE_ATTRIBUTE],
2506
- fields: []
2507
- });
2508
- }
2509
- };
2510
- };
2511
- const defaultStages = [
2512
- {
2513
- name: "To do",
2514
- color: "#4945FF"
2515
- },
2516
- {
2517
- name: "Ready to review",
2518
- color: "#9736E8"
2519
- },
2520
- {
2521
- name: "In progress",
2522
- color: "#EE5E52"
2523
- },
2524
- {
2525
- name: "Reviewed",
2526
- color: "#328048"
2527
- }
2528
- ];
2529
- const WORKFLOW_UPDATE_STAGE = "review-workflows.updateEntryStage";
2530
- const webhookEvents = {
2531
- WORKFLOW_UPDATE_STAGE
2532
- };
2533
- const MAX_DB_TABLE_NAME_LEN = 63;
2534
- const MAX_JOIN_TABLE_NAME_SUFFIX = 1 + ENTITY_STAGE_ATTRIBUTE.length + "_links_inv_fk".length;
2535
- const MAX_CONTENT_TYPE_NAME_LEN = MAX_DB_TABLE_NAME_LEN - MAX_JOIN_TABLE_NAME_SUFFIX;
2536
- const DEFAULT_OPTIONS = {
2537
- numberOfWorkflows: MAX_WORKFLOWS,
2538
- stagesPerWorkflow: MAX_STAGES_PER_WORKFLOW
2539
- };
2540
- async function initDefaultWorkflow({ workflowsService, stagesService }) {
2541
- const wfCount = await workflowsService.count();
2542
- const stagesCount = await stagesService.count();
2543
- if (wfCount === 0 && stagesCount === 0) {
2544
- const workflow2 = {
2545
- ...defaultWorkflow,
2546
- stages: defaultStages
2547
- };
2548
- await workflowsService.create({ data: workflow2 });
2549
- }
2550
- }
2551
- function extendReviewWorkflowContentTypes({ strapi: strapi2 }) {
2552
- const extendContentType = (contentTypeUID) => {
2553
- const assertContentTypeCompatibility = (contentType) => contentType.collectionName.length <= MAX_CONTENT_TYPE_NAME_LEN;
2554
- const incompatibleContentTypeAlert = (contentType) => {
2555
- strapi2.log.warn(
2556
- `Review Workflow cannot be activated for the content type with the name '${contentType.info.displayName}' because the name exceeds the maximum length of ${MAX_CONTENT_TYPE_NAME_LEN} characters.`
2557
- );
2558
- return contentType;
2559
- };
2560
- const setRelation = (path, target) => set(path, {
2561
- writable: true,
2562
- private: false,
2563
- configurable: false,
2564
- visible: false,
2565
- useJoinTable: true,
2566
- // We want a join table to persist data when downgrading to CE
2567
- type: "relation",
2568
- relation: "oneToOne",
2569
- target
2570
- });
2571
- const setReviewWorkflowAttributes = pipe([
2572
- setRelation(`attributes.${ENTITY_STAGE_ATTRIBUTE}`, STAGE_MODEL_UID),
2573
- setRelation(`attributes.${ENTITY_ASSIGNEE_ATTRIBUTE}`, "admin::user")
2574
- ]);
2575
- const extendContentTypeIfCompatible = cond([
2576
- [assertContentTypeCompatibility, setReviewWorkflowAttributes],
2577
- [stubTrue, incompatibleContentTypeAlert]
2578
- ]);
2579
- strapi2.container.get("content-types").extend(contentTypeUID, extendContentTypeIfCompatible);
2580
- };
2581
- pipe([
2582
- getVisibleContentTypesUID,
2583
- // Iterate over UIDs to extend the content-type
2584
- forEach(extendContentType)
2585
- ])(strapi2.contentTypes);
2586
- }
2587
- function persistStagesJoinTables({ strapi: strapi2 }) {
2588
- return async ({ contentTypes }) => {
2589
- const getStageTableToPersist = (contentTypeUID) => {
2590
- const { attributes, tableName } = strapi2.db.metadata.get(contentTypeUID);
2591
- const joinTableName = attributes[ENTITY_STAGE_ATTRIBUTE].joinTable.name;
2592
- return { name: joinTableName, dependsOn: [{ name: tableName }] };
2593
- };
2594
- const joinTablesToPersist = pipe([
2595
- getVisibleContentTypesUID,
2596
- filter((uid) => hasStageAttribute(contentTypes[uid])),
2597
- map(getStageTableToPersist)
2598
- ])(contentTypes);
2599
- await removePersistedTablesWithSuffix("_strapi_stage_links");
2600
- await persistTables(joinTablesToPersist);
2601
- };
2602
- }
2603
- const registerWebhookEvents = async ({ strapi: strapi2 }) => Object.entries(webhookEvents).forEach(
2604
- ([eventKey, event]) => strapi2.webhookStore.addAllowedEvent(eventKey, event)
2605
- );
2606
- const reviewWorkflows = ({ strapi: strapi2 }) => {
2607
- const workflowsService = getService("workflows", { strapi: strapi2 });
2608
- const stagesService = getService("stages", { strapi: strapi2 });
2609
- const workflowsValidationService = getService("review-workflows-validation", { strapi: strapi2 });
2610
- return {
2611
- async bootstrap() {
2612
- await registerWebhookEvents({ strapi: strapi2 });
2613
- await initDefaultWorkflow({ workflowsService, stagesService, strapi: strapi2 });
2614
- },
2615
- async register({ options } = { options: {} }) {
2616
- extendReviewWorkflowContentTypes({ strapi: strapi2 });
2617
- strapi2.hook("strapi::content-types.afterSync").register(persistStagesJoinTables({ strapi: strapi2 }));
2618
- const reviewWorkflowsOptions = defaultsDeep(DEFAULT_OPTIONS, options);
2619
- workflowsValidationService.register(reviewWorkflowsOptions);
2620
- }
2621
- };
2622
- };
2623
- const { ValidationError: ValidationError$1 } = errors;
2624
- const reviewWorkflowsValidation = ({ strapi: strapi2 }) => {
2625
- return {
2626
- limits: {
2627
- numberOfWorkflows: MAX_WORKFLOWS,
2628
- stagesPerWorkflow: MAX_STAGES_PER_WORKFLOW
2629
- },
2630
- register({ numberOfWorkflows, stagesPerWorkflow }) {
2631
- if (!Object.isFrozen(this.limits)) {
2632
- this.limits.numberOfWorkflows = clampMaxWorkflows(
2633
- numberOfWorkflows || this.limits.numberOfWorkflows
2634
- );
2635
- this.limits.stagesPerWorkflow = clampMaxStagesPerWorkflow(
2636
- stagesPerWorkflow || this.limits.stagesPerWorkflow
2637
- );
2638
- Object.freeze(this.limits);
2639
- }
2640
- },
2641
- /**
2642
- * Validates the stages of a workflow.
2643
- * @param {Array} stages - Array of stages to be validated.
2644
- * @throws {ValidationError} - If the workflow has no stages or exceeds the limit.
2645
- */
2646
- validateWorkflowStages(stages2) {
2647
- if (!stages2 || stages2.length === 0) {
2648
- throw new ValidationError$1(ERRORS.WORKFLOW_WITHOUT_STAGES);
2649
- }
2650
- if (stages2.length > this.limits.stagesPerWorkflow) {
2651
- throw new ValidationError$1(ERRORS.STAGES_LIMIT);
2652
- }
2653
- const stageNames = stages2.map((stage) => stage.name);
2654
- if (uniq(stageNames).length !== stageNames.length) {
2655
- throw new ValidationError$1(ERRORS.DUPLICATED_STAGE_NAME);
2656
- }
2657
- },
2658
- async validateWorkflowCountStages(workflowId, countAddedStages = 0) {
2659
- const stagesService = getService("stages", { strapi: strapi2 });
2660
- const countWorkflowStages = await stagesService.count({ workflowId });
2661
- if (countWorkflowStages + countAddedStages > this.limits.stagesPerWorkflow) {
2662
- throw new ValidationError$1(ERRORS.STAGES_LIMIT);
2663
- }
2664
- },
2665
- /**
2666
- * Validates the count of existing and added workflows.
2667
- * @param {number} [countAddedWorkflows=0] - The count of workflows to be added.
2668
- * @throws {ValidationError} - If the total count of workflows exceeds the limit.
2669
- * @returns {Promise<void>} - A Promise that resolves when the validation is completed.
2670
- */
2671
- async validateWorkflowCount(countAddedWorkflows = 0) {
2672
- const workflowsService = getService("workflows", { strapi: strapi2 });
2673
- const countWorkflows = await workflowsService.count();
2674
- if (countWorkflows + countAddedWorkflows > this.limits.numberOfWorkflows) {
2675
- throw new ValidationError$1(ERRORS.WORKFLOWS_LIMIT);
2676
- }
2677
- }
2678
- };
2679
- };
2680
- const getDataWithStage = async (workflow2, data) => {
2681
- if (!isNil(ENTITY_STAGE_ATTRIBUTE)) {
2682
- return { ...data, [ENTITY_STAGE_ATTRIBUTE]: workflow2.stages[0].id };
2683
- }
2684
- return data;
2685
- };
2686
- const getEntityStage = async (uid, id) => {
2687
- const entity = await strapi.entityService.findOne(uid, id, {
2688
- populate: {
2689
- [ENTITY_STAGE_ATTRIBUTE]: {
2690
- populate: {
2691
- workflow: true
2692
- }
2693
- }
2694
- }
2695
- });
2696
- return entity?.[ENTITY_STAGE_ATTRIBUTE] ?? {};
2697
- };
2698
- const decorator = (service) => ({
2699
- async create(uid, opts = {}) {
2700
- const workflow2 = await getService("workflows").getAssignedWorkflow(uid, {
2701
- populate: "stages"
2702
- });
2703
- if (!workflow2) {
2704
- return service.create.call(this, uid, opts);
2705
- }
2706
- const data = await getDataWithStage(workflow2, opts.data);
2707
- return service.create.call(this, uid, { ...opts, data });
2708
- },
2709
- async update(uid, entityId, opts = {}) {
2710
- const data = { ...opts.data };
2711
- if (isNil(data[ENTITY_STAGE_ATTRIBUTE])) {
2712
- delete data[ENTITY_STAGE_ATTRIBUTE];
2713
- return service.update.call(this, uid, entityId, { ...opts, data });
2714
- }
2715
- const previousStage = await getEntityStage(uid, entityId);
2716
- const updatedEntity = await service.update.call(this, uid, entityId, { ...opts, data });
2717
- const updatedStage = updatedEntity[ENTITY_STAGE_ATTRIBUTE];
2718
- if (updatedStage && previousStage?.id && previousStage.id !== updatedStage.id) {
2719
- const model = strapi.getModel(uid);
2720
- strapi.eventHub.emit(WORKFLOW_UPDATE_STAGE, {
2721
- model: model.modelName,
2722
- uid: model.uid,
2723
- entity: {
2724
- id: entityId
2725
- },
2726
- workflow: {
2727
- id: previousStage.workflow.id,
2728
- stages: {
2729
- from: {
2730
- id: previousStage.id,
2731
- name: previousStage.name
2732
- },
2733
- to: {
2734
- id: updatedStage.id,
2735
- name: updatedStage.name
2736
- }
2737
- }
2738
- }
2739
- });
2740
- }
2741
- return updatedEntity;
2742
- }
2743
- });
2744
- const reviewWorkflowsDecorator = () => ({
2745
- decorator
2746
- });
2747
- const sendDidCreateStage = async () => {
2748
- strapi.telemetry.send("didCreateStage", {});
2749
- };
2750
- const sendDidEditStage = async () => {
2751
- strapi.telemetry.send("didEditStage", {});
2752
- };
2753
- const sendDidDeleteStage = async () => {
2754
- strapi.telemetry.send("didDeleteStage", {});
2755
- };
2756
- const sendDidChangeEntryStage = async () => {
2757
- strapi.telemetry.send("didChangeEntryStage", {});
2758
- };
2759
- const sendDidCreateWorkflow = async () => {
2760
- strapi.telemetry.send("didCreateWorkflow", {});
2761
- };
2762
- const sendDidEditWorkflow = async () => {
2763
- strapi.telemetry.send("didEditWorkflow", {});
2764
- };
2765
- const sendDidEditAssignee = async (fromId, toId) => {
2766
- strapi.telemetry.send("didEditAssignee", { from: fromId, to: toId });
2767
- };
2768
- const sendDidSendReviewWorkflowPropertiesOnceAWeek = async (numberOfActiveWorkflows, avgStagesCount, maxStagesCount, activatedContentTypes) => {
2769
- strapi.telemetry.send("didSendReviewWorkflowPropertiesOnceAWeek", {
2770
- groupProperties: {
2771
- numberOfActiveWorkflows,
2772
- avgStagesCount,
2773
- maxStagesCount,
2774
- activatedContentTypes
2775
- }
2776
- });
2777
- };
2778
- const reviewWorkflowsMetrics = {
2779
- sendDidCreateStage,
2780
- sendDidEditStage,
2781
- sendDidDeleteStage,
2782
- sendDidChangeEntryStage,
2783
- sendDidCreateWorkflow,
2784
- sendDidEditWorkflow,
2785
- sendDidSendReviewWorkflowPropertiesOnceAWeek,
2786
- sendDidEditAssignee
2787
- };
2788
- const ONE_WEEK = 7 * 24 * 60 * 60 * 1e3;
2789
- const getWeeklyCronScheduleAt = (date) => `${date.getSeconds()} ${date.getMinutes()} ${date.getHours()} * * ${date.getDay()}`;
2790
- const getMetricsStoreValue = async () => {
2791
- const value = await strapi.store.get({ type: "plugin", name: "ee", key: "metrics" });
2792
- return defaultTo({}, value);
2793
- };
2794
- const setMetricsStoreValue = (value) => strapi.store.set({ type: "plugin", name: "ee", key: "metrics", value });
2795
- const reviewWorkflowsWeeklyMetrics = ({ strapi: strapi2 }) => {
2796
- const metrics = getService("review-workflows-metrics", { strapi: strapi2 });
2797
- const workflowsService = getService("workflows", { strapi: strapi2 });
2798
- return {
2799
- async computeMetrics() {
2800
- const workflows2 = await workflowsService.find({ populate: "stages" });
2801
- const stagesCount = flow(
2802
- map("stages"),
2803
- // Number of stages per workflow
2804
- map(size)
2805
- )(workflows2);
2806
- const contentTypesCount = flow(
2807
- map("contentTypes"),
2808
- // Number of content types per workflow
2809
- map(size)
2810
- )(workflows2);
2811
- return {
2812
- numberOfActiveWorkflows: size(workflows2),
2813
- avgStagesCount: mean(stagesCount),
2814
- maxStagesCount: max(stagesCount),
2815
- activatedContentTypes: sum(contentTypesCount)
2816
- };
2817
- },
2818
- async sendMetrics() {
2819
- const computedMetrics = await this.computeMetrics();
2820
- metrics.sendDidSendReviewWorkflowPropertiesOnceAWeek(computedMetrics);
2821
- const metricsInfoStored = await getMetricsStoreValue();
2822
- await setMetricsStoreValue({ ...metricsInfoStored, lastWeeklyUpdate: (/* @__PURE__ */ new Date()).getTime() });
2823
- },
2824
- async ensureWeeklyStoredCronSchedule() {
2825
- const metricsInfoStored = await getMetricsStoreValue();
2826
- const { weeklySchedule: currentSchedule, lastWeeklyUpdate } = metricsInfoStored;
2827
- const now = /* @__PURE__ */ new Date();
2828
- let weeklySchedule = currentSchedule;
2829
- if (!currentSchedule || !lastWeeklyUpdate || lastWeeklyUpdate + ONE_WEEK < now.getTime()) {
2830
- weeklySchedule = getWeeklyCronScheduleAt(add(now, { seconds: 10 }));
2831
- await setMetricsStoreValue({ ...metricsInfoStored, weeklySchedule });
2832
- }
2833
- return weeklySchedule;
2834
- },
2835
- async registerCron() {
2836
- const weeklySchedule = await this.ensureWeeklyStoredCronSchedule();
2837
- strapi2.cron.add({ [weeklySchedule]: this.sendMetrics.bind(this) });
2838
- }
2839
- };
2840
- };
2841
- const index$1 = {
2842
- auth,
2843
- passport,
2844
- role: role$1,
2845
- user: user$1,
2846
- "seat-enforcement": seatEnforcement,
2847
- workflows: workflows$1,
2848
- stages: stages$1,
2849
- "stage-permissions": stagePermissions,
2850
- assignees: assignees$1,
2851
- "review-workflows": reviewWorkflows,
2852
- "review-workflows-validation": reviewWorkflowsValidation,
2853
- "review-workflows-decorator": reviewWorkflowsDecorator,
2854
- "review-workflows-metrics": reviewWorkflowsMetrics,
2855
- "review-workflows-weekly-metrics": reviewWorkflowsWeeklyMetrics
2856
- };
2857
- const providerOptionsUpdateSchema = yup.object().shape({
2858
- autoRegister: yup.boolean().required(),
2859
- defaultRole: yup.strapiID().when("autoRegister", (value, initSchema) => {
2860
- return value ? initSchema.required() : initSchema.nullable();
2861
- }).test("is-valid-role", "You must submit a valid default role", (roleId) => {
2862
- if (roleId === null) {
2863
- return true;
2864
- }
2865
- return strapi.admin.services.role.exists({ id: roleId });
2866
- }),
2867
- ssoLockedRoles: yup.array().nullable().of(
2868
- yup.strapiID().test(
2869
- "is-valid-role",
2870
- "You must submit a valid role for the SSO Locked roles",
2871
- (roleId) => {
2872
- return strapi.admin.services.role.exists({ id: roleId });
2873
- }
2874
- )
2875
- )
2876
- });
2877
- const validateProviderOptionsUpdate = validateYupSchema(providerOptionsUpdateSchema);
2878
- const PROVIDER_REDIRECT_BASE = "/auth/login";
2879
- const PROVIDER_REDIRECT_SUCCESS = `${PROVIDER_REDIRECT_BASE}/success`;
2880
- const PROVIDER_REDIRECT_ERROR = `${PROVIDER_REDIRECT_BASE}/error`;
2881
- const PROVIDER_URLS_MAP = {
2882
- success: PROVIDER_REDIRECT_SUCCESS,
2883
- error: PROVIDER_REDIRECT_ERROR
2884
- };
2885
- const getAdminStore = async () => strapi.store({ type: "core", name: "admin" });
2886
- const getPrefixedRedirectUrls = () => {
2887
- const { url: adminUrl } = strapi.config.get("admin");
2888
- const prefixUrl = (url) => `${adminUrl || "/admin"}${url}`;
2889
- return mapValues(prefixUrl, PROVIDER_URLS_MAP);
2890
- };
2891
- const utils = {
2892
- getAdminStore,
2893
- getPrefixedRedirectUrls
2894
- };
2895
- const defaultConnectionError = () => new Error("Invalid connection payload");
2896
- const authenticate = async (ctx, next) => {
2897
- const {
2898
- params: { provider }
2899
- } = ctx;
2900
- const redirectUrls = utils.getPrefixedRedirectUrls();
2901
- return passport$2.authenticate(provider, null, async (error, profile) => {
2902
- if (error || !profile || !profile.email) {
2903
- if (error) {
2904
- strapi.log.error(error);
2905
- }
2906
- strapi.eventHub.emit("admin.auth.error", {
2907
- error: error || defaultConnectionError(),
2908
- provider
2909
- });
2910
- return ctx.redirect(redirectUrls.error);
2911
- }
2912
- const user2 = await getService("user").findOneByEmail(profile.email);
2913
- const scenario = user2 ? existingUserScenario : nonExistingUserScenario;
2914
- return scenario(ctx, next)(user2 || profile, provider);
2915
- })(ctx, next);
2916
- };
2917
- const existingUserScenario = (ctx, next) => async (user2, provider) => {
2918
- const redirectUrls = utils.getPrefixedRedirectUrls();
2919
- if (!user2.isActive) {
2920
- strapi.eventHub.emit("admin.auth.error", {
2921
- error: new Error(`Deactivated user tried to login (${user2.id})`),
2922
- provider
2923
- });
2924
- return ctx.redirect(redirectUrls.error);
2925
- }
2926
- ctx.state.user = user2;
2927
- return next();
2928
- };
2929
- const nonExistingUserScenario = (ctx, next) => async (profile, provider) => {
2930
- const { email: email2, firstname: firstname2, lastname: lastname2, username: username2 } = profile;
2931
- const redirectUrls = utils.getPrefixedRedirectUrls();
2932
- const adminStore = await utils.getAdminStore();
2933
- const { providers } = await adminStore.get({ key: "auth" });
2934
- const isMissingRegisterFields = !username2 && (!firstname2 || !lastname2);
2935
- if (!providers.autoRegister || !providers.defaultRole || isMissingRegisterFields) {
2936
- strapi.eventHub.emit("admin.auth.error", { error: defaultConnectionError(), provider });
2937
- return ctx.redirect(redirectUrls.error);
2938
- }
2939
- const defaultRole = await getService("role").findOne({ id: providers.defaultRole });
2940
- if (!defaultRole) {
2941
- strapi.eventHub.emit("admin.auth.error", { error: defaultConnectionError(), provider });
2942
- return ctx.redirect(redirectUrls.error);
2943
- }
2944
- ctx.state.user = await getService("user").create({
2945
- email: email2,
2946
- username: username2,
2947
- firstname: firstname2,
2948
- lastname: lastname2,
2949
- roles: [defaultRole.id],
2950
- isActive: true,
2951
- registrationToken: null
2952
- });
2953
- strapi.eventHub.emit("admin.auth.autoRegistration", {
2954
- user: ctx.state.user,
2955
- provider
2956
- });
2957
- return next();
2958
- };
2959
- const redirectWithAuth = (ctx) => {
2960
- const {
2961
- params: { provider }
2962
- } = ctx;
2963
- const redirectUrls = utils.getPrefixedRedirectUrls();
2964
- const domain = strapi.config.get("admin.auth.domain");
2965
- const { user: user2 } = ctx.state;
2966
- const jwt = getService("token").createJwtToken(user2);
2967
- const isProduction = strapi.config.get("environment") === "production";
2968
- const cookiesOptions = { httpOnly: false, secure: isProduction, overwrite: true, domain };
2969
- const sanitizedUser = getService("user").sanitizeUser(user2);
2970
- strapi.eventHub.emit("admin.auth.success", { user: sanitizedUser, provider });
2971
- ctx.cookies.set("jwtToken", jwt, cookiesOptions);
2972
- ctx.redirect(redirectUrls.success);
2973
- };
2974
- const middlewares = {
2975
- authenticate,
2976
- redirectWithAuth
2977
- };
2978
- const toProviderDTO = pick(["uid", "displayName", "icon"]);
2979
- const toProviderLoginOptionsDTO = pick(["autoRegister", "defaultRole", "ssoLockedRoles"]);
2980
- const { ValidationError } = errors;
2981
- const providerAuthenticationFlow = compose([
2982
- middlewares.authenticate,
2983
- middlewares.redirectWithAuth
2984
- ]);
2985
- const authentication = {
2986
- async getProviders(ctx) {
2987
- const { providerRegistry: providerRegistry2 } = strapi.admin.services.passport;
2988
- ctx.body = providerRegistry2.getAll().map(toProviderDTO);
2989
- },
2990
- async getProviderLoginOptions(ctx) {
2991
- const adminStore = await utils.getAdminStore();
2992
- const { providers: providersOptions } = await adminStore.get({ key: "auth" });
2993
- ctx.body = {
2994
- data: toProviderLoginOptionsDTO(providersOptions)
2995
- };
2996
- },
2997
- async updateProviderLoginOptions(ctx) {
2998
- const {
2999
- request: { body }
3000
- } = ctx;
3001
- await validateProviderOptionsUpdate(body);
3002
- const adminStore = await utils.getAdminStore();
3003
- const currentAuthOptions = await adminStore.get({ key: "auth" });
3004
- const newAuthOptions = { ...currentAuthOptions, providers: body };
3005
- await adminStore.set({ key: "auth", value: newAuthOptions });
3006
- ctx.body = {
3007
- data: toProviderLoginOptionsDTO(newAuthOptions.providers)
3008
- };
3009
- },
3010
- providerLogin(ctx, next) {
3011
- const {
3012
- params: { provider: providerName }
3013
- } = ctx;
3014
- const { providerRegistry: providerRegistry2 } = strapi.admin.services.passport;
3015
- if (!providerRegistry2.has(providerName)) {
3016
- throw new ValidationError(`Invalid provider supplied: ${providerName}`);
3017
- }
3018
- return providerAuthenticationFlow(ctx, next);
3019
- }
3020
- };
3021
- const roleCreateSchema = yup.object().shape({
3022
- name: yup.string().min(1).required(),
3023
- description: yup.string().nullable()
3024
- }).noUnknown();
3025
- const rolesDeleteSchema = yup.object().shape({
3026
- ids: yup.array().of(yup.strapiID()).min(1).required().test(
3027
- "roles-deletion-checks",
3028
- "Roles deletion checks have failed",
3029
- async function rolesDeletionChecks(ids) {
3030
- try {
3031
- await strapi.admin.services.role.checkRolesIdForDeletion(ids);
3032
- if (EE.features.isEnabled("sso")) {
3033
- await strapi.admin.services.role.ssoCheckRolesIdForDeletion(ids);
3034
- }
3035
- } catch (e) {
3036
- return this.createError({ path: "ids", message: e.message });
3037
- }
3038
- return true;
3039
- }
3040
- )
3041
- }).noUnknown();
3042
- const roleDeleteSchema = yup.strapiID().required().test(
3043
- "no-admin-single-delete",
3044
- "Role deletion checks have failed",
3045
- async function noAdminSingleDelete(id) {
3046
- try {
3047
- await strapi.admin.services.role.checkRolesIdForDeletion([id]);
3048
- if (EE.features.isEnabled("sso")) {
3049
- await strapi.admin.services.role.ssoCheckRolesIdForDeletion([id]);
3050
- }
3051
- } catch (e) {
3052
- return this.createError({ path: "id", message: e.message });
3053
- }
3054
- return true;
3055
- }
3056
- );
3057
- const validateRoleCreateInput = validateYupSchema(roleCreateSchema);
3058
- const validateRolesDeleteInput = validateYupSchema(rolesDeleteSchema);
3059
- const validateRoleDeleteInput = validateYupSchema(roleDeleteSchema);
3060
- const role = {
3061
- /**
3062
- * Create a new role
3063
- * @param {KoaContext} ctx - koa context
3064
- */
3065
- async create(ctx) {
3066
- await validateRoleCreateInput(ctx.request.body);
3067
- const roleService = getService("role");
3068
- const role2 = await roleService.create(ctx.request.body);
3069
- const sanitizedRole = roleService.sanitizeRole(role2);
3070
- ctx.created({ data: sanitizedRole });
3071
- },
3072
- /**
3073
- * Delete a role
3074
- * @param {KoaContext} ctx - koa context
3075
- */
3076
- async deleteOne(ctx) {
3077
- const { id } = ctx.params;
3078
- await validateRoleDeleteInput(id);
3079
- const roleService = getService("role");
3080
- const roles2 = await roleService.deleteByIds([id]);
3081
- const sanitizedRole = roles2.map((role2) => roleService.sanitizeRole(role2))[0] || null;
3082
- return ctx.deleted({
3083
- data: sanitizedRole
3084
- });
3085
- },
3086
- /**
3087
- * delete several roles
3088
- * @param {KoaContext} ctx - koa context
3089
- */
3090
- async deleteMany(ctx) {
3091
- const { body } = ctx.request;
3092
- await validateRolesDeleteInput(body);
3093
- const roleService = getService("role");
3094
- const roles2 = await roleService.deleteByIds(body.ids);
3095
- const sanitizedRoles = roles2.map(roleService.sanitizeRole);
3096
- return ctx.deleted({
3097
- data: sanitizedRoles
3098
- });
3099
- }
3100
- };
3101
- const getDefaultActionAttributes = () => ({
3102
- options: {
3103
- applyToProperties: null
3104
- }
3105
- });
3106
- const actionFields = [
3107
- "section",
3108
- "displayName",
3109
- "category",
3110
- "subCategory",
3111
- "pluginName",
3112
- "subjects",
3113
- "options",
3114
- "actionId"
3115
- ];
3116
- const sanitizeActionAttributes = pick(actionFields);
3117
- const computeActionId = (attributes) => {
3118
- const { pluginName, uid } = attributes;
3119
- if (!pluginName) {
3120
- return `api::${uid}`;
3121
- }
3122
- if (pluginName === "admin") {
3123
- return `admin::${uid}`;
3124
- }
3125
- return `plugin::${pluginName}.${uid}`;
3126
- };
3127
- const assignActionId = (attrs) => set("actionId", computeActionId(attrs), attrs);
3128
- const assignOrOmitSubCategory = (action) => {
3129
- const shouldHaveSubCategory = ["settings", "plugins"].includes(action.section);
3130
- return shouldHaveSubCategory ? set("subCategory", action.subCategory || "general", action) : omit("subCategory", action);
3131
- };
3132
- const appliesToProperty = curry((property2, action) => {
3133
- return pipe(prop("options.applyToProperties"), includes(property2))(action);
3134
- });
3135
- const appliesToSubject = curry((subject, action) => {
3136
- return isArray(action.subjects) && includes(subject, action.subjects);
3137
- });
3138
- const create = pipe(
3139
- // Create and assign an action identifier to the action
3140
- // (need to be done before the sanitizeActionAttributes since we need the uid here)
3141
- assignActionId,
3142
- // Add or remove the sub category field based on the pluginName attribute
3143
- assignOrOmitSubCategory,
3144
- // Remove unwanted attributes from the payload
3145
- sanitizeActionAttributes,
3146
- // Complete the action creation by adding default values for some attributes
3147
- merge(getDefaultActionAttributes())
3148
- );
3149
- const actionDomain = {
3150
- actionFields,
3151
- appliesToProperty,
3152
- appliesToSubject,
3153
- assignActionId,
3154
- assignOrOmitSubCategory,
3155
- create,
3156
- computeActionId,
3157
- getDefaultActionAttributes,
3158
- sanitizeActionAttributes
3159
- };
3160
- const checkFieldsAreCorrectlyNested = (fields) => {
3161
- if (_.isNil(fields)) {
3162
- return true;
3163
- }
3164
- if (!Array.isArray(fields)) {
3165
- return false;
3166
- }
3167
- let failed = false;
3168
- for (let indexA = 0; indexA < fields.length; indexA += 1) {
3169
- failed = fields.slice(indexA + 1).some(
3170
- (fieldB) => fieldB.startsWith(`${fields[indexA]}.`) || fields[indexA].startsWith(`${fieldB}.`)
3171
- );
3172
- if (failed)
3173
- break;
3174
- }
3175
- return !failed;
3176
- };
3177
- const checkFieldsDontHaveDuplicates = (fields) => {
3178
- if (_.isNil(fields)) {
3179
- return true;
3180
- }
3181
- if (!Array.isArray(fields)) {
3182
- return false;
3183
- }
3184
- return _.uniq(fields).length === fields.length;
3185
- };
3186
- const getActionFromProvider = (actionId) => {
3187
- return getService$1("permission").actionProvider.get(actionId);
3188
- };
3189
- const email = yup.string().email().lowercase();
3190
- const firstname = yup.string().trim().min(1);
3191
- const lastname = yup.string();
3192
- const username = yup.string().min(1);
3193
- const password = yup.string().min(8).matches(/[a-z]/, "${path} must contain at least one lowercase character").matches(/[A-Z]/, "${path} must contain at least one uppercase character").matches(/\d/, "${path} must contain at least one number");
3194
- const roles = yup.array(yup.strapiID()).min(1);
3195
- const isAPluginName = yup.string().test("is-a-plugin-name", "is not a plugin name", function(value) {
3196
- return [void 0, "admin", ...Object.keys(strapi.plugins)].includes(value) ? true : this.createError({ path: this.path, message: `${this.path} is not an existing plugin` });
3197
- });
3198
- const arrayOfConditionNames = yup.array().of(yup.string()).test("is-an-array-of-conditions", "is not a plugin name", function(value) {
3199
- const ids = strapi.admin.services.permission.conditionProvider.keys();
3200
- return _.isUndefined(value) || _.difference(value, ids).length === 0 ? true : this.createError({ path: this.path, message: `contains conditions that don't exist` });
3201
- });
3202
- const permissionsAreEquals = (a, b) => a.action === b.action && (a.subject === b.subject || _.isNil(a.subject) && _.isNil(b.subject));
3203
- const checkNoDuplicatedPermissions = (permissions) => !Array.isArray(permissions) || permissions.every(
3204
- (permA, i) => permissions.slice(i + 1).every((permB) => !permissionsAreEquals(permA, permB))
3205
- );
3206
- const checkNilFields = (action) => function(fields) {
3207
- if (isNil(action)) {
3208
- return true;
3209
- }
3210
- return actionDomain.appliesToProperty("fields", action) || isNil(fields);
3211
- };
3212
- const fieldsPropertyValidation = (action) => yup.array().of(yup.string()).nullable().test(
3213
- "field-nested",
3214
- "Fields format are incorrect (bad nesting).",
3215
- checkFieldsAreCorrectlyNested
3216
- ).test(
3217
- "field-nested",
3218
- "Fields format are incorrect (duplicates).",
3219
- checkFieldsDontHaveDuplicates
3220
- ).test(
3221
- "fields-restriction",
3222
- "The permission at ${path} must have fields set to null or undefined",
3223
- // @ts-expect-error yup types
3224
- checkNilFields(action)
3225
- );
3226
- const permission = yup.object().shape({
3227
- action: yup.string().required().test("action-validity", "action is not an existing permission action", function(actionId) {
3228
- if (isNil(actionId)) {
3229
- return true;
3230
- }
3231
- return !!getActionFromProvider(actionId);
3232
- }),
3233
- actionParameters: yup.object().nullable(),
3234
- subject: yup.string().nullable().test("subject-validity", "Invalid subject submitted", function(subject) {
3235
- const action = getActionFromProvider(this.options.parent.action);
3236
- if (!action) {
3237
- return true;
3238
- }
3239
- if (isNil(action.subjects)) {
3240
- return isNil(subject);
3241
- }
3242
- if (isArray(action.subjects)) {
3243
- return action.subjects.includes(subject);
3244
- }
3245
- return false;
3246
- }),
3247
- properties: yup.object().test("properties-structure", "Invalid property set at ${path}", function(properties) {
3248
- const action = getActionFromProvider(this.options.parent.action);
3249
- const hasNoProperties = isEmpty(properties) || isNil(properties);
3250
- if (!has("options.applyToProperties", action)) {
3251
- return hasNoProperties;
3252
- }
3253
- if (hasNoProperties) {
3254
- return true;
3255
- }
3256
- const { applyToProperties } = action.options;
3257
- if (!isArray(applyToProperties)) {
3258
- return false;
3259
- }
3260
- return Object.keys(properties).every((property2) => applyToProperties.includes(property2));
3261
- }).test(
3262
- "fields-property",
3263
- "Invalid fields property at ${path}",
3264
- async function(properties = {}) {
3265
- const action = getActionFromProvider(this.options.parent.action);
3266
- if (!action || !properties) {
3267
- return true;
3268
- }
3269
- if (!actionDomain.appliesToProperty("fields", action)) {
3270
- return true;
3271
- }
3272
- try {
3273
- await fieldsPropertyValidation(action).validate(properties.fields, {
3274
- strict: true,
3275
- abortEarly: false
3276
- });
3277
- return true;
3278
- } catch (e) {
3279
- throw this.createError({
3280
- message: e.message,
3281
- path: `${this.path}.fields`
3282
- });
3283
- }
3284
- }
3285
- ),
3286
- conditions: yup.array().of(yup.string())
3287
- }).noUnknown();
3288
- const updatePermissions = yup.object().shape({
3289
- permissions: yup.array().required().of(permission).test(
3290
- "duplicated-permissions",
3291
- "Some permissions are duplicated (same action and subject)",
3292
- checkNoDuplicatedPermissions
3293
- )
3294
- }).required().noUnknown();
3295
- const validators = {
3296
- email,
3297
- firstname,
3298
- lastname,
3299
- username,
3300
- password,
3301
- roles,
3302
- isAPluginName,
3303
- arrayOfConditionNames,
3304
- permission,
3305
- updatePermissions
3306
- };
3307
- const userCreationSchema = yup.object().shape({
3308
- email: validators.email.required(),
3309
- firstname: validators.firstname.required(),
3310
- lastname: validators.lastname,
3311
- roles: validators.roles.min(1),
3312
- preferedLanguage: yup.string().nullable()
3313
- }).noUnknown();
3314
- const profileUpdateSchema = yup.object().shape({
3315
- email: validators.email.notNull(),
3316
- firstname: validators.firstname.notNull(),
3317
- lastname: validators.lastname.nullable(),
3318
- username: validators.username.nullable(),
3319
- password: validators.password.notNull(),
3320
- currentPassword: yup.string().when(
3321
- "password",
3322
- (password2, schema) => !isUndefined(password2) ? schema.required() : schema
3323
- ).notNull(),
3324
- preferedLanguage: yup.string().nullable()
3325
- }).noUnknown();
3326
- const userUpdateSchema = yup.object().shape({
3327
- email: validators.email.notNull(),
3328
- firstname: validators.firstname.notNull(),
3329
- lastname: validators.lastname.nullable(),
3330
- username: validators.username.nullable(),
3331
- password: validators.password.notNull(),
3332
- isActive: yup.bool().notNull(),
3333
- roles: validators.roles.min(1).notNull()
3334
- }).noUnknown();
3335
- const usersDeleteSchema = yup.object().shape({
3336
- ids: yup.array().of(yup.strapiID()).min(1).required()
3337
- }).noUnknown();
3338
- validateYupSchema(userCreationSchema);
3339
- validateYupSchema(profileUpdateSchema);
3340
- const validateUserUpdateInput = validateYupSchema(userUpdateSchema);
3341
- validateYupSchema(usersDeleteSchema);
3342
- const schemas = {
3343
- userCreationSchema,
3344
- usersDeleteSchema,
3345
- userUpdateSchema
3346
- };
3347
- const ssoUserCreationInputExtension = yup.object().shape({
3348
- useSSORegistration: yup.boolean()
3349
- }).noUnknown();
3350
- const validateUserCreationInput = (data) => {
3351
- let schema = schemas.userCreationSchema;
3352
- if (EE.features.isEnabled("sso")) {
3353
- schema = schema.concat(ssoUserCreationInputExtension);
3354
- }
3355
- return validateYupSchema(schema)(data);
3356
- };
3357
- const { ApplicationError, ForbiddenError } = errors;
3358
- const pickUserCreationAttributes = pick(["firstname", "lastname", "email", "roles"]);
3359
- const hasAdminSeatsAvaialble = async () => {
3360
- if (!strapi.EE) {
3361
- return true;
3362
- }
3363
- const permittedSeats = EE.seats;
3364
- if (isNil(permittedSeats)) {
3365
- return true;
3366
- }
3367
- const userCount = await strapi.service("admin::user").getCurrentActiveUserCount();
3368
- if (userCount < permittedSeats) {
3369
- return true;
3370
- }
3371
- };
3372
- const user = {
3373
- async create(ctx) {
3374
- if (!await hasAdminSeatsAvaialble()) {
3375
- throw new ForbiddenError("License seat limit reached. You cannot create a new user");
3376
- }
3377
- const { body } = ctx.request;
3378
- const cleanData = { ...body, email: _.get(body, `email`, ``).toLowerCase() };
3379
- await validateUserCreationInput(cleanData);
3380
- const attributes = pickUserCreationAttributes(cleanData);
3381
- const { useSSORegistration } = cleanData;
3382
- const userAlreadyExists = await getService("user").exists({ email: attributes.email });
3383
- if (userAlreadyExists) {
3384
- throw new ApplicationError("Email already taken");
3385
- }
3386
- if (useSSORegistration) {
3387
- Object.assign(attributes, { registrationToken: null, isActive: true });
3388
- }
3389
- const createdUser = await getService("user").create(attributes);
3390
- const userInfo = getService("user").sanitizeUser(createdUser);
3391
- Object.assign(userInfo, { registrationToken: createdUser.registrationToken });
3392
- ctx.created({ data: userInfo });
3393
- },
3394
- async update(ctx) {
3395
- const { id } = ctx.params;
3396
- const { body: input } = ctx.request;
3397
- await validateUserUpdateInput(input);
3398
- if (_.has(input, "email")) {
3399
- const uniqueEmailCheck = await getService("user").exists({
3400
- id: { $ne: id },
3401
- email: input.email
3402
- });
3403
- if (uniqueEmailCheck) {
3404
- throw new ApplicationError("A user with this email address already exists");
3405
- }
3406
- }
3407
- const user2 = await getService("user").findOne(id, null);
3408
- if (!await hasAdminSeatsAvaialble() && !user2.isActive && input.isActive) {
3409
- throw new ForbiddenError("License seat limit reached. You cannot active this user");
3410
- }
3411
- const updatedUser = await getService("user").updateById(id, input);
3412
- if (!updatedUser) {
3413
- return ctx.notFound("User does not exist");
3414
- }
3415
- ctx.body = {
3416
- data: getService("user").sanitizeUser(updatedUser)
3417
- };
3418
- },
3419
- async isSSOLocked(ctx) {
3420
- const { user: user2 } = ctx.state;
3421
- const isSSOLocked = await isSsoLocked(user2);
3422
- ctx.body = {
3423
- data: {
3424
- isSSOLocked
3425
- }
3426
- };
3427
- }
3428
- };
3429
- const ALLOWED_SORT_STRINGS = ["action:ASC", "action:DESC", "date:ASC", "date:DESC"];
3430
- const validateFindManySchema = yup.object().shape({
3431
- page: yup.number().integer().min(1),
3432
- pageSize: yup.number().integer().min(1).max(100),
3433
- sort: yup.mixed().oneOf(ALLOWED_SORT_STRINGS)
3434
- }).required();
3435
- const validateFindMany = validateYupSchema(validateFindManySchema, { strict: false });
3436
- const auditLogs = {
3437
- async findMany(ctx) {
3438
- const { query } = ctx.request;
3439
- await validateFindMany(query);
3440
- const auditLogs2 = strapi.container.get("audit-logs");
3441
- const body = await auditLogs2.findMany(query);
3442
- ctx.body = body;
3443
- },
3444
- async findOne(ctx) {
3445
- const { id } = ctx.params;
3446
- const auditLogs2 = strapi.container.get("audit-logs");
3447
- const body = await auditLogs2.findOne(id);
3448
- ctx.body = body;
3449
- }
3450
- };
3451
- const admin = {
3452
- // NOTE: Overrides CE admin controller
3453
- async getProjectType() {
3454
- const flags = strapi.config.get("admin.flags", {});
3455
- try {
3456
- return { data: { isEE: strapi.EE, features: EE.features.list(), flags } };
3457
- } catch (err) {
3458
- return { data: { isEE: false, features: [], flags } };
3459
- }
3460
- },
3461
- async licenseLimitInformation() {
3462
- const permittedSeats = EE.seats;
3463
- let shouldNotify = false;
3464
- let licenseLimitStatus = null;
3465
- let enforcementUserCount;
3466
- const currentActiveUserCount = await getService("user").getCurrentActiveUserCount();
3467
- const eeDisabledUsers = await getService("seat-enforcement").getDisabledUserList();
3468
- if (eeDisabledUsers) {
3469
- enforcementUserCount = currentActiveUserCount + eeDisabledUsers.length;
3470
- } else {
3471
- enforcementUserCount = currentActiveUserCount;
3472
- }
3473
- if (!isNil(permittedSeats) && enforcementUserCount > permittedSeats) {
3474
- shouldNotify = true;
3475
- licenseLimitStatus = "OVER_LIMIT";
3476
- }
3477
- if (!isNil(permittedSeats) && enforcementUserCount === permittedSeats) {
3478
- shouldNotify = true;
3479
- licenseLimitStatus = "AT_LIMIT";
3480
- }
3481
- const data = {
3482
- enforcementUserCount,
3483
- currentActiveUserCount,
3484
- permittedSeats,
3485
- shouldNotify,
3486
- shouldStopCreate: isNil(permittedSeats) ? false : currentActiveUserCount >= permittedSeats,
3487
- licenseLimitStatus,
3488
- isHostedOnStrapiCloud: env("STRAPI_HOSTING", null) === "strapi.cloud",
3489
- features: EE.features.list() ?? []
3490
- };
3491
- return { data };
3492
- }
3493
- };
3494
- const stageObject = yup.object().shape({
3495
- id: yup.number().integer().min(1),
3496
- name: yup.string().max(255).required(),
3497
- color: yup.string().matches(/^#(?:[0-9a-fA-F]{3}){1,2}$/i),
3498
- // hex color
3499
- permissions: yup.array().of(
3500
- yup.object().shape({
3501
- role: yup.number().integer().min(1).required(),
3502
- action: yup.string().oneOf([STAGE_TRANSITION_UID]).required(),
3503
- actionParameters: yup.object().shape({
3504
- from: yup.number().integer().min(1).required(),
3505
- to: yup.number().integer().min(1)
3506
- })
3507
- })
3508
- )
3509
- });
3510
- const validateUpdateStageOnEntitySchema = yup.object().shape({
3511
- id: yup.number().integer().min(1).required()
3512
- }).required();
3513
- const validateContentTypes = yup.array().of(
3514
- // @ts-expect-error yup types
3515
- yup.string().test({
3516
- name: "content-type-exists",
3517
- message: (value) => `Content type ${value.originalValue} does not exist`,
3518
- test(uid) {
3519
- return strapi.getModel(uid);
3520
- }
3521
- }).test({
3522
- name: "content-type-review-workflow-enabled",
3523
- message: (value) => `Content type ${value.originalValue} does not have review workflow enabled`,
3524
- test(uid) {
3525
- const model = strapi.getModel(uid);
3526
- return hasStageAttribute(model);
3527
- }
3528
- })
3529
- );
3530
- const validateWorkflowCreateSchema = yup.object().shape({
3531
- name: yup.string().max(255).min(1, "Workflow name can not be empty").required(),
3532
- stages: yup.array().of(stageObject).uniqueProperty("name", "Stage name must be unique").min(1, "Can not create a workflow without stages").max(200, "Can not have more than 200 stages").required("Can not create a workflow without stages"),
3533
- contentTypes: validateContentTypes
3534
- });
3535
- const validateWorkflowUpdateSchema = yup.object().shape({
3536
- name: yup.string().max(255).min(1, "Workflow name can not be empty"),
3537
- stages: yup.array().of(stageObject).uniqueProperty("name", "Stage name must be unique").min(1, "Can not update a workflow without stages").max(200, "Can not have more than 200 stages"),
3538
- contentTypes: validateContentTypes
3539
- });
3540
- const validateUpdateAssigneeOnEntitySchema = yup.object().shape({
3541
- id: yup.number().integer().min(1).nullable()
3542
- }).required();
3543
- const validateWorkflowCreate = validateYupSchema(validateWorkflowCreateSchema);
3544
- const validateUpdateStageOnEntity = validateYupSchema(validateUpdateStageOnEntitySchema);
3545
- const validateUpdateAssigneeOnEntity = validateYupSchema(
3546
- validateUpdateAssigneeOnEntitySchema
3547
- );
3548
- const validateWorkflowUpdate = validateYupSchema(validateWorkflowUpdateSchema);
3549
- function getWorkflowsPermissionChecker({ strapi: strapi2 }, userAbility) {
3550
- return strapi2.plugin("content-manager").service("permission-checker").create({ userAbility, model: WORKFLOW_MODEL_UID });
3551
- }
3552
- function formatWorkflowToAdmin(workflow2) {
3553
- if (!workflow2)
3554
- return;
3555
- if (!workflow2.stages)
3556
- return workflow2;
3557
- const transformPermissions = map(update("role", property("id")));
3558
- const transformStages = map(update("permissions", transformPermissions));
3559
- return update("stages", transformStages, workflow2);
3560
- }
3561
- const workflows = {
3562
- /**
3563
- * Create a new workflow
3564
- * @param {import('koa').BaseContext} ctx - koa context
3565
- */
3566
- async create(ctx) {
3567
- const { body, query } = ctx.request;
3568
- const { sanitizeCreateInput, sanitizeOutput, sanitizedQuery } = getWorkflowsPermissionChecker(
3569
- { strapi },
3570
- ctx.state.userAbility
3571
- );
3572
- const { populate } = await sanitizedQuery.create(query);
3573
- const workflowBody = await validateWorkflowCreate(body.data);
3574
- const workflowService = getService("workflows");
3575
- const createdWorkflow = await workflowService.create({
3576
- data: await sanitizeCreateInput(workflowBody),
3577
- populate
3578
- }).then(formatWorkflowToAdmin);
3579
- ctx.body = {
3580
- data: await sanitizeOutput(createdWorkflow)
3581
- };
3582
- },
3583
- /**
3584
- * Update a workflow
3585
- * @param {import('koa').BaseContext} ctx - koa context
3586
- */
3587
- async update(ctx) {
3588
- const { id } = ctx.params;
3589
- const { body, query } = ctx.request;
3590
- const workflowService = getService("workflows");
3591
- const { sanitizeUpdateInput, sanitizeOutput, sanitizedQuery } = getWorkflowsPermissionChecker(
3592
- { strapi },
3593
- ctx.state.userAbility
3594
- );
3595
- const { populate } = await sanitizedQuery.update(query);
3596
- const workflowBody = await validateWorkflowUpdate(body.data);
3597
- const workflow2 = await workflowService.findById(id, { populate: WORKFLOW_POPULATE });
3598
- if (!workflow2) {
3599
- return ctx.notFound();
3600
- }
3601
- const getPermittedFieldToUpdate = sanitizeUpdateInput(workflow2);
3602
- const dataToUpdate = await getPermittedFieldToUpdate(workflowBody);
3603
- const updatedWorkflow = await workflowService.update(workflow2, {
3604
- data: dataToUpdate,
3605
- populate
3606
- }).then(formatWorkflowToAdmin);
3607
- ctx.body = {
3608
- data: await sanitizeOutput(updatedWorkflow)
3609
- };
3610
- },
3611
- /**
3612
- * Delete a workflow
3613
- * @param {import('koa').BaseContext} ctx - koa context
3614
- */
3615
- async delete(ctx) {
3616
- const { id } = ctx.params;
3617
- const { query } = ctx.request;
3618
- const workflowService = getService("workflows");
3619
- const { sanitizeOutput, sanitizedQuery } = getWorkflowsPermissionChecker(
3620
- { strapi },
3621
- ctx.state.userAbility
3622
- );
3623
- const { populate } = await sanitizedQuery.delete(query);
3624
- const workflow2 = await workflowService.findById(id, { populate: WORKFLOW_POPULATE });
3625
- if (!workflow2) {
3626
- return ctx.notFound("Workflow doesn't exist");
3627
- }
3628
- const deletedWorkflow = await workflowService.delete(workflow2, { populate }).then(formatWorkflowToAdmin);
3629
- ctx.body = {
3630
- data: await sanitizeOutput(deletedWorkflow)
3631
- };
3632
- },
3633
- /**
3634
- * List all workflows
3635
- * @param {import('koa').BaseContext} ctx - koa context
3636
- */
3637
- async find(ctx) {
3638
- const { query } = ctx.request;
3639
- const workflowService = getService("workflows");
3640
- const { sanitizeOutput, sanitizedQuery } = getWorkflowsPermissionChecker(
3641
- { strapi },
3642
- ctx.state.userAbility
3643
- );
3644
- const { populate, filters, sort } = await sanitizedQuery.read(query);
3645
- const [workflows2, workflowCount] = await Promise.all([
3646
- workflowService.find({ populate, filters, sort }).then(map(formatWorkflowToAdmin)),
3647
- workflowService.count()
3648
- ]);
3649
- ctx.body = {
3650
- data: await mapAsync(workflows2, sanitizeOutput),
3651
- meta: {
3652
- workflowCount
3653
- }
3654
- };
3655
- },
3656
- /**
3657
- * Get one workflow based on its id contained in request parameters
3658
- * Returns count of workflows in meta, used to prevent workflow edition when
3659
- * max workflow count is reached for the current plan
3660
- * @param {import('koa').BaseContext} ctx - koa context
3661
- */
3662
- async findById(ctx) {
3663
- const { id } = ctx.params;
3664
- const { query } = ctx.request;
3665
- const { sanitizeOutput, sanitizedQuery } = getWorkflowsPermissionChecker(
3666
- { strapi },
3667
- ctx.state.userAbility
3668
- );
3669
- const { populate } = await sanitizedQuery.read(query);
3670
- const workflowService = getService("workflows");
3671
- const [workflow2, workflowCount] = await Promise.all([
3672
- workflowService.findById(id, { populate }).then(formatWorkflowToAdmin),
3673
- workflowService.count()
3674
- ]);
3675
- ctx.body = {
3676
- data: await sanitizeOutput(workflow2),
3677
- meta: { workflowCount }
3678
- };
3679
- }
3680
- };
3681
- function sanitizeStage({ strapi: strapi2 }, userAbility) {
3682
- const permissionChecker = strapi2.plugin("content-manager").service("permission-checker").create({ userAbility, model: STAGE_MODEL_UID });
3683
- return (entity) => permissionChecker.sanitizeOutput(entity);
3684
- }
3685
- const stages = {
3686
- /**
3687
- * List all stages
3688
- * @param {import('koa').BaseContext} ctx - koa context
3689
- */
3690
- async find(ctx) {
3691
- const { workflow_id: workflowId } = ctx.params;
3692
- const { populate } = ctx.query;
3693
- const stagesService = getService("stages");
3694
- const sanitizer = sanitizeStage({ strapi }, ctx.state.userAbility);
3695
- const stages2 = await stagesService.find({
3696
- workflowId,
3697
- populate
3698
- });
3699
- ctx.body = {
3700
- data: await mapAsync(stages2, sanitizer)
3701
- };
3702
- },
3703
- /**
3704
- * Get one stage
3705
- * @param {import('koa').BaseContext} ctx - koa context
3706
- */
3707
- async findById(ctx) {
3708
- const { id, workflow_id: workflowId } = ctx.params;
3709
- const { populate } = ctx.query;
3710
- const stagesService = getService("stages");
3711
- const sanitizer = sanitizeStage({ strapi }, ctx.state.userAbility);
3712
- const stage = await stagesService.findById(id, {
3713
- workflowId,
3714
- populate
3715
- });
3716
- ctx.body = {
3717
- data: await sanitizer(stage)
3718
- };
3719
- },
3720
- /**
3721
- * Updates an entity's stage.
3722
- * @async
3723
- * @param {Object} ctx - The Koa context object.
3724
- * @param {Object} ctx.params - An object containing the parameters from the request URL.
3725
- * @param {string} ctx.params.model_uid - The model UID of the entity.
3726
- * @param {string} ctx.params.id - The ID of the entity to update.
3727
- * @param {Object} ctx.request.body.data - Optional data object containing the new stage ID for the entity.
3728
- * @param {string} ctx.request.body.data.id - The ID of the new stage for the entity.
3729
- * @throws {ApplicationError} If review workflows is not activated on the specified model UID.
3730
- * @throws {ValidationError} If the `data` object in the request body fails to pass validation.
3731
- * @returns {Promise<void>} A promise that resolves when the entity's stage has been updated.
3732
- */
3733
- async updateEntity(ctx) {
3734
- const stagesService = getService("stages");
3735
- const stagePermissions2 = getService("stage-permissions");
3736
- const workflowService = getService("workflows");
3737
- const { model_uid: modelUID, id } = ctx.params;
3738
- const { body } = ctx.request;
3739
- const { sanitizeOutput } = strapi.plugin("content-manager").service("permission-checker").create({ userAbility: ctx.state.userAbility, model: modelUID });
3740
- const entity = await strapi.entityService.findOne(modelUID, Number(id), {
3741
- populate: [ENTITY_STAGE_ATTRIBUTE]
3742
- });
3743
- if (!entity) {
3744
- ctx.throw(404, "Entity not found");
3745
- }
3746
- const canTransition = stagePermissions2.can(
3747
- STAGE_TRANSITION_UID,
3748
- entity[ENTITY_STAGE_ATTRIBUTE]?.id
3749
- );
3750
- if (!canTransition) {
3751
- ctx.throw(403, "Forbidden stage transition");
3752
- }
3753
- const { id: stageId } = await validateUpdateStageOnEntity(
3754
- { id: Number(body?.data?.id) },
3755
- "You should pass an id to the body of the put request."
3756
- );
3757
- const workflow2 = await workflowService.assertContentTypeBelongsToWorkflow(modelUID);
3758
- workflowService.assertStageBelongsToWorkflow(stageId, workflow2);
3759
- const updatedEntity = await stagesService.updateEntity({ id: entity.id, modelUID }, stageId);
3760
- ctx.body = { data: await sanitizeOutput(updatedEntity) };
3761
- },
3762
- /**
3763
- * List all the stages that are available for a user to transition an entity to.
3764
- * If the user has permission to change the current stage of the entity every other stage in the workflow is returned
3765
- * @async
3766
- * @param {*} ctx
3767
- * @param {string} ctx.params.model_uid - The model UID of the entity.
3768
- * @param {string} ctx.params.id - The ID of the entity.
3769
- * @throws {ApplicationError} If review workflows is not activated on the specified model UID.
3770
- */
3771
- async listAvailableStages(ctx) {
3772
- const stagePermissions2 = getService("stage-permissions");
3773
- const workflowService = getService("workflows");
3774
- const { model_uid: modelUID, id } = ctx.params;
3775
- if (strapi.plugin("content-manager").service("permission-checker").create({ userAbility: ctx.state.userAbility, model: modelUID }).cannot.read()) {
3776
- return ctx.forbidden();
3777
- }
3778
- const entity = await strapi.entityService.findOne(modelUID, Number(id), {
3779
- populate: [ENTITY_STAGE_ATTRIBUTE]
3780
- });
3781
- if (!entity) {
3782
- ctx.throw(404, "Entity not found");
3783
- }
3784
- const entityStageId = entity[ENTITY_STAGE_ATTRIBUTE]?.id;
3785
- const canTransition = stagePermissions2.can(STAGE_TRANSITION_UID, entityStageId);
3786
- const [workflowCount, { stages: workflowStages }] = await Promise.all([
3787
- workflowService.count(),
3788
- workflowService.getAssignedWorkflow(modelUID, {
3789
- populate: "stages"
3790
- })
3791
- ]);
3792
- const meta = {
3793
- stageCount: workflowStages.length,
3794
- workflowCount
3795
- };
3796
- if (!canTransition) {
3797
- ctx.body = {
3798
- data: [],
3799
- meta
3800
- };
3801
- return;
3802
- }
3803
- const data = workflowStages.filter((stage) => stage.id !== entityStageId);
3804
- ctx.body = {
3805
- data,
3806
- meta
3807
- };
3808
- }
3809
- };
3810
- const assignees = {
3811
- /**
3812
- * Updates an entity's assignee.
3813
- * @async
3814
- * @param {Object} ctx - The Koa context object.
3815
- * @param {Object} ctx.params - An object containing the parameters from the request URL.
3816
- * @param {string} ctx.params.model_uid - The model UID of the entity.
3817
- * @param {string} ctx.params.id - The ID of the entity to update.
3818
- * @param {Object} ctx.request.body.data - Optional data object containing the new assignee ID for the entity.
3819
- * @param {string} ctx.request.body.data.id - The ID of the new assignee for the entity.
3820
- * @throws {ApplicationError} If review workflows is not activated on the specified model UID.
3821
- * @throws {ValidationError} If the `data` object in the request body fails to pass validation.
3822
- * @returns {Promise<void>} A promise that resolves when the entity's assignee has been updated.
3823
- */
3824
- async updateEntity(ctx) {
3825
- const assigneeService = getService("assignees");
3826
- const workflowService = getService("workflows");
3827
- const { model_uid: model, id } = ctx.params;
3828
- const { sanitizeOutput } = strapi.plugin("content-manager").service("permission-checker").create({ userAbility: ctx.state.userAbility, model });
3829
- const { id: assigneeId } = await validateUpdateAssigneeOnEntity(
3830
- ctx.request?.body?.data,
3831
- "You should pass a valid id to the body of the put request."
3832
- );
3833
- await workflowService.assertContentTypeBelongsToWorkflow(model);
3834
- const entity = await assigneeService.updateEntityAssignee(id, model, assigneeId);
3835
- ctx.body = { data: await sanitizeOutput(entity) };
3836
- }
3837
- };
3838
- const index = {
3839
- authentication,
3840
- role,
3841
- user,
3842
- auditLogs,
3843
- admin,
3844
- workflows,
3845
- stages,
3846
- assignees
3847
- };
3848
- export {
3849
- bootstrap,
3850
- index$3 as contentTypes,
3851
- index as controllers,
3852
- destroy,
3853
- register,
3854
- index$2 as routes,
3855
- index$1 as services
3856
- };
3857
- //# sourceMappingURL=index.mjs.map