@strapi/content-manager 0.0.0-next.7f1333f1967e625c57ab16648c057aea08c9dddb → 0.0.0-next.840550dc97a3782302ddf918d3a0d07e59dd11eb

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (27) hide show
  1. package/dist/server/index.js +234 -127
  2. package/dist/server/index.js.map +1 -1
  3. package/dist/server/index.mjs +234 -127
  4. package/dist/server/index.mjs.map +1 -1
  5. package/dist/server/src/controllers/index.d.ts.map +1 -1
  6. package/dist/server/src/history/services/utils.d.ts +2 -3
  7. package/dist/server/src/history/services/utils.d.ts.map +1 -1
  8. package/dist/server/src/preview/controllers/index.d.ts +2 -0
  9. package/dist/server/src/preview/controllers/index.d.ts.map +1 -0
  10. package/dist/server/src/preview/controllers/preview.d.ts +9 -0
  11. package/dist/server/src/preview/controllers/preview.d.ts.map +1 -0
  12. package/dist/server/src/preview/index.d.ts.map +1 -1
  13. package/dist/server/src/preview/routes/index.d.ts +8 -0
  14. package/dist/server/src/preview/routes/index.d.ts.map +1 -0
  15. package/dist/server/src/preview/routes/preview.d.ts +4 -0
  16. package/dist/server/src/preview/routes/preview.d.ts.map +1 -0
  17. package/dist/server/src/preview/services/index.d.ts +11 -0
  18. package/dist/server/src/preview/services/index.d.ts.map +1 -0
  19. package/dist/server/src/preview/services/preview-config.d.ts +30 -0
  20. package/dist/server/src/preview/services/preview-config.d.ts.map +1 -0
  21. package/dist/server/src/preview/services/preview.d.ts +6 -0
  22. package/dist/server/src/preview/services/preview.d.ts.map +1 -0
  23. package/dist/server/src/preview/utils.d.ts +14 -0
  24. package/dist/server/src/preview/utils.d.ts.map +1 -0
  25. package/dist/server/src/routes/index.d.ts.map +1 -1
  26. package/dist/server/src/services/index.d.ts.map +1 -1
  27. package/package.json +6 -6
@@ -7,10 +7,10 @@ import isNil from "lodash/isNil";
7
7
  import _, { intersection as intersection$1, difference as difference$1 } from "lodash";
8
8
  import qs from "qs";
9
9
  import slugify from "@sindresorhus/slugify";
10
- const getService$1 = (name) => {
10
+ const getService$2 = (name) => {
11
11
  return strapi.plugin("content-manager").service(name);
12
12
  };
13
- function getService(strapi2, name) {
13
+ function getService$1(strapi2, name) {
14
14
  return strapi2.service(`plugin::content-manager.${name}`);
15
15
  }
16
16
  const historyRestoreVersionSchema = yup.object().shape({
@@ -46,7 +46,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
46
46
  if (!isSingleType && (!contentTypeUid || !ctx.query.documentId)) {
47
47
  throw new errors.ForbiddenError("contentType and documentId are required");
48
48
  }
49
- const permissionChecker2 = getService$1("permission-checker").create({
49
+ const permissionChecker2 = getService$2("permission-checker").create({
50
50
  userAbility: ctx.state.userAbility,
51
51
  model: ctx.query.contentType
52
52
  });
@@ -54,7 +54,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
54
54
  return ctx.forbidden();
55
55
  }
56
56
  const query = await permissionChecker2.sanitizeQuery(ctx.query);
57
- const { results, pagination: pagination2 } = await getService(strapi2, "history").findVersionsPage({
57
+ const { results, pagination: pagination2 } = await getService$1(strapi2, "history").findVersionsPage({
58
58
  query: {
59
59
  ...query,
60
60
  ...getValidPagination({ page: query.page, pageSize: query.pageSize })
@@ -79,14 +79,14 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
79
79
  async restoreVersion(ctx) {
80
80
  const request = ctx.request;
81
81
  await validateRestoreVersion(request.body, "contentType is required");
82
- const permissionChecker2 = getService$1("permission-checker").create({
82
+ const permissionChecker2 = getService$2("permission-checker").create({
83
83
  userAbility: ctx.state.userAbility,
84
84
  model: request.body.contentType
85
85
  });
86
86
  if (permissionChecker2.cannot.update()) {
87
87
  throw new errors.ForbiddenError();
88
88
  }
89
- const restoredDocument = await getService(strapi2, "history").restoreVersion(
89
+ const restoredDocument = await getService$1(strapi2, "history").restoreVersion(
90
90
  request.params.versionId
91
91
  );
92
92
  return {
@@ -95,7 +95,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
95
95
  }
96
96
  };
97
97
  };
98
- const controllers$1 = {
98
+ const controllers$2 = {
99
99
  "history-version": createHistoryVersionController
100
100
  /**
101
101
  * Casting is needed because the types aren't aware that Strapi supports
@@ -202,6 +202,17 @@ const createServiceUtils = ({ strapi: strapi2 }) => {
202
202
  const meta = await documentMetadataService.getMetadata(contentTypeUid, document);
203
203
  return documentMetadataService.getStatus(document, meta.availableStatus);
204
204
  };
205
+ const getComponentFields = (componentUID) => {
206
+ return Object.entries(strapi2.getModel(componentUID).attributes).reduce(
207
+ (fieldsAcc, [key, attribute]) => {
208
+ if (!["relation", "media", "component", "dynamiczone"].includes(attribute.type)) {
209
+ fieldsAcc.push(key);
210
+ }
211
+ return fieldsAcc;
212
+ },
213
+ []
214
+ );
215
+ };
205
216
  const getDeepPopulate2 = (uid2, useDatabaseSyntax = false) => {
206
217
  const model = strapi2.getModel(uid2);
207
218
  const attributes = Object.entries(model.attributes);
@@ -225,13 +236,19 @@ const createServiceUtils = ({ strapi: strapi2 }) => {
225
236
  }
226
237
  case "component": {
227
238
  const populate = getDeepPopulate2(attribute.component);
228
- acc[attributeName] = { populate };
239
+ acc[attributeName] = {
240
+ populate,
241
+ [fieldSelector]: getComponentFields(attribute.component)
242
+ };
229
243
  break;
230
244
  }
231
245
  case "dynamiczone": {
232
246
  const populatedComponents = (attribute.components || []).reduce(
233
247
  (acc2, componentUID) => {
234
- acc2[componentUID] = { populate: getDeepPopulate2(componentUID) };
248
+ acc2[componentUID] = {
249
+ populate: getDeepPopulate2(componentUID),
250
+ [fieldSelector]: getComponentFields(componentUID)
251
+ };
235
252
  return acc2;
236
253
  },
237
254
  {}
@@ -344,7 +361,7 @@ const createHistoryService = ({ strapi: strapi2 }) => {
344
361
  const attributeValue = entry.data[attributeKey];
345
362
  const attributeValues = Array.isArray(attributeValue) ? attributeValue : [attributeValue];
346
363
  if (attributeSchema.type === "media") {
347
- const permissionChecker2 = getService$1("permission-checker").create({
364
+ const permissionChecker2 = getService$2("permission-checker").create({
348
365
  userAbility: params.state.userAbility,
349
366
  model: "plugin::upload.file"
350
367
  });
@@ -385,7 +402,7 @@ const createHistoryService = ({ strapi: strapi2 }) => {
385
402
  [attributeKey]: adminUsers
386
403
  };
387
404
  }
388
- const permissionChecker2 = getService$1("permission-checker").create({
405
+ const permissionChecker2 = getService$2("permission-checker").create({
389
406
  userAbility: params.state.userAbility,
390
407
  model: attributeSchema.target
391
408
  });
@@ -561,7 +578,7 @@ const createLifecyclesService = ({ strapi: strapi2 }) => {
561
578
  onCommit(async () => {
562
579
  for (const entry of localeEntries) {
563
580
  const status = await serviceUtils.getVersionStatus(uid2, entry);
564
- await getService(strapi2, "history").createVersion({
581
+ await getService$1(strapi2, "history").createVersion({
565
582
  contentType: uid2,
566
583
  data: omit(FIELDS_TO_IGNORE, entry),
567
584
  relatedDocumentId: documentId,
@@ -594,17 +611,17 @@ const createLifecyclesService = ({ strapi: strapi2 }) => {
594
611
  }
595
612
  };
596
613
  };
597
- const services$1 = {
614
+ const services$2 = {
598
615
  history: createHistoryService,
599
616
  lifecycles: createLifecyclesService
600
617
  };
601
- const info = { pluginName: "content-manager", type: "admin" };
618
+ const info$1 = { pluginName: "content-manager", type: "admin" };
602
619
  const historyVersionRouter = {
603
620
  type: "admin",
604
621
  routes: [
605
622
  {
606
623
  method: "GET",
607
- info,
624
+ info: info$1,
608
625
  path: "/history-versions",
609
626
  handler: "history-version.findMany",
610
627
  config: {
@@ -613,7 +630,7 @@ const historyVersionRouter = {
613
630
  },
614
631
  {
615
632
  method: "PUT",
616
- info,
633
+ info: info$1,
617
634
  path: "/history-versions/:versionId/restore",
618
635
  handler: "history-version.restoreVersion",
619
636
  config: {
@@ -622,7 +639,7 @@ const historyVersionRouter = {
622
639
  }
623
640
  ]
624
641
  };
625
- const routes$1 = {
642
+ const routes$2 = {
626
643
  "history-version": historyVersionRouter
627
644
  };
628
645
  const historyVersion = {
@@ -676,14 +693,14 @@ const getFeature$1 = () => {
676
693
  strapi2.get("models").add(historyVersion);
677
694
  },
678
695
  bootstrap({ strapi: strapi2 }) {
679
- getService(strapi2, "lifecycles").bootstrap();
696
+ getService$1(strapi2, "lifecycles").bootstrap();
680
697
  },
681
698
  destroy({ strapi: strapi2 }) {
682
- getService(strapi2, "lifecycles").destroy();
699
+ getService$1(strapi2, "lifecycles").destroy();
683
700
  },
684
- controllers: controllers$1,
685
- services: services$1,
686
- routes: routes$1
701
+ controllers: controllers$2,
702
+ services: services$2,
703
+ routes: routes$2
687
704
  };
688
705
  }
689
706
  return {
@@ -701,6 +718,88 @@ const ALLOWED_WEBHOOK_EVENTS = {
701
718
  ENTRY_UNPUBLISH: "entry.unpublish"
702
719
  };
703
720
  const FEATURE_ID = "preview";
721
+ const info = { pluginName: "content-manager", type: "admin" };
722
+ const previewRouter = {
723
+ type: "admin",
724
+ routes: [
725
+ {
726
+ method: "GET",
727
+ info,
728
+ path: "/preview/url/:contentType",
729
+ handler: "preview.getPreviewURL",
730
+ config: {
731
+ policies: ["admin::isAuthenticatedAdmin"]
732
+ }
733
+ }
734
+ ]
735
+ };
736
+ const routes$1 = {
737
+ preview: previewRouter
738
+ };
739
+ const createPreviewController = () => {
740
+ return {
741
+ async getPreviewURL(ctx) {
742
+ ctx.request;
743
+ return {
744
+ data: { url: "" }
745
+ };
746
+ }
747
+ };
748
+ };
749
+ const controllers$1 = {
750
+ preview: createPreviewController
751
+ /**
752
+ * Casting is needed because the types aren't aware that Strapi supports
753
+ * passing a controller factory as the value, instead of a controller object directly
754
+ */
755
+ };
756
+ const createPreviewService = () => {
757
+ };
758
+ const createPreviewConfigService = ({ strapi: strapi2 }) => {
759
+ return {
760
+ isEnabled() {
761
+ const config = strapi2.config.get("admin.preview");
762
+ if (!config) {
763
+ return false;
764
+ }
765
+ return config?.enabled ?? true;
766
+ },
767
+ /**
768
+ * Validate if the configuration is valid
769
+ */
770
+ validate() {
771
+ if (!this.isEnabled()) {
772
+ return;
773
+ }
774
+ const handler = this.getPreviewHandler();
775
+ if (typeof handler !== "function") {
776
+ throw new errors.ValidationError(
777
+ "Preview configuration is invalid. Handler must be a function"
778
+ );
779
+ }
780
+ },
781
+ /**
782
+ * Utility to get the preview handler from the configuration
783
+ */
784
+ getPreviewHandler() {
785
+ const config = strapi2.config.get("admin.preview");
786
+ const emptyHandler = () => {
787
+ return void 0;
788
+ };
789
+ if (!this.isEnabled()) {
790
+ return emptyHandler;
791
+ }
792
+ return config?.config?.handler || emptyHandler;
793
+ }
794
+ };
795
+ };
796
+ const services$1 = {
797
+ preview: createPreviewService,
798
+ "preview-config": createPreviewConfigService
799
+ };
800
+ function getService(strapi2, name) {
801
+ return strapi2.service(`plugin::content-manager.${name}`);
802
+ }
704
803
  const getFeature = () => {
705
804
  if (!strapi.features.future.isEnabled(FEATURE_ID)) {
706
805
  return {};
@@ -708,7 +807,12 @@ const getFeature = () => {
708
807
  return {
709
808
  bootstrap() {
710
809
  console.log("Bootstrapping preview server");
711
- }
810
+ const config = getService(strapi, "preview-config");
811
+ config.validate();
812
+ },
813
+ routes: routes$1,
814
+ controllers: controllers$1,
815
+ services: services$1
712
816
  };
713
817
  };
714
818
  const preview = getFeature();
@@ -716,10 +820,10 @@ const bootstrap = async () => {
716
820
  Object.entries(ALLOWED_WEBHOOK_EVENTS).forEach(([key, value]) => {
717
821
  strapi.get("webhookStore").addAllowedEvent(key, value);
718
822
  });
719
- getService$1("field-sizes").setCustomFieldInputSizes();
720
- await getService$1("components").syncConfigurations();
721
- await getService$1("content-types").syncConfigurations();
722
- await getService$1("permission").registerPermissions();
823
+ getService$2("field-sizes").setCustomFieldInputSizes();
824
+ await getService$2("components").syncConfigurations();
825
+ await getService$2("content-types").syncConfigurations();
826
+ await getService$2("permission").registerPermissions();
723
827
  await history.bootstrap?.({ strapi });
724
828
  await preview.bootstrap?.({ strapi });
725
829
  };
@@ -1211,7 +1315,8 @@ const admin = {
1211
1315
  };
1212
1316
  const routes = {
1213
1317
  admin,
1214
- ...history.routes ? history.routes : {}
1318
+ ...history.routes ? history.routes : {},
1319
+ ...preview.routes ? preview.routes : {}
1215
1320
  };
1216
1321
  const hasPermissionsSchema = yup$1.object({
1217
1322
  actions: yup$1.array().of(yup$1.string()),
@@ -1468,7 +1573,7 @@ const createMetadasSchema = (schema) => {
1468
1573
  if (!value) {
1469
1574
  return yup$1.string();
1470
1575
  }
1471
- const targetSchema = getService$1("content-types").findContentType(
1576
+ const targetSchema = getService$2("content-types").findContentType(
1472
1577
  schema.attributes[key].targetModel
1473
1578
  );
1474
1579
  if (!targetSchema) {
@@ -1637,7 +1742,7 @@ const getDocumentLocaleAndStatus = async (request, model, opts = { allowMultiple
1637
1742
  }
1638
1743
  };
1639
1744
  const formatDocumentWithMetadata = async (permissionChecker2, uid2, document, opts = {}) => {
1640
- const documentMetadata2 = getService$1("document-metadata");
1745
+ const documentMetadata2 = getService$2("document-metadata");
1641
1746
  const serviceOutput = await documentMetadata2.formatDocumentWithMetadata(uid2, document, opts);
1642
1747
  let {
1643
1748
  meta: { availableLocales, availableStatus }
@@ -1663,8 +1768,8 @@ const createDocument = async (ctx, opts) => {
1663
1768
  const { userAbility, user } = ctx.state;
1664
1769
  const { model } = ctx.params;
1665
1770
  const { body } = ctx.request;
1666
- const documentManager2 = getService$1("document-manager");
1667
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1771
+ const documentManager2 = getService$2("document-manager");
1772
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1668
1773
  if (permissionChecker2.cannot.create()) {
1669
1774
  throw new errors.ForbiddenError();
1670
1775
  }
@@ -1684,13 +1789,13 @@ const updateDocument = async (ctx, opts) => {
1684
1789
  const { userAbility, user } = ctx.state;
1685
1790
  const { id, model } = ctx.params;
1686
1791
  const { body } = ctx.request;
1687
- const documentManager2 = getService$1("document-manager");
1688
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1792
+ const documentManager2 = getService$2("document-manager");
1793
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1689
1794
  if (permissionChecker2.cannot.update()) {
1690
1795
  throw new errors.ForbiddenError();
1691
1796
  }
1692
1797
  const permissionQuery = await permissionChecker2.sanitizedQuery.update(ctx.query);
1693
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
1798
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1694
1799
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1695
1800
  const [documentVersion, documentExists] = await Promise.all([
1696
1801
  documentManager2.findOne(id, model, { populate, locale, status: "draft" }),
@@ -1721,14 +1826,14 @@ const collectionTypes = {
1721
1826
  const { userAbility } = ctx.state;
1722
1827
  const { model } = ctx.params;
1723
1828
  const { query } = ctx.request;
1724
- const documentMetadata2 = getService$1("document-metadata");
1725
- const documentManager2 = getService$1("document-manager");
1726
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1829
+ const documentMetadata2 = getService$2("document-metadata");
1830
+ const documentManager2 = getService$2("document-manager");
1831
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1727
1832
  if (permissionChecker2.cannot.read()) {
1728
1833
  return ctx.forbidden();
1729
1834
  }
1730
1835
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(query);
1731
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(1).countRelations({ toOne: false, toMany: true }).build();
1836
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(1).countRelations({ toOne: false, toMany: true }).build();
1732
1837
  const { locale, status } = await getDocumentLocaleAndStatus(query, model);
1733
1838
  const { results: documents, pagination: pagination2 } = await documentManager2.findPage(
1734
1839
  { ...permissionQuery, populate, locale, status },
@@ -1757,13 +1862,13 @@ const collectionTypes = {
1757
1862
  async findOne(ctx) {
1758
1863
  const { userAbility } = ctx.state;
1759
1864
  const { model, id } = ctx.params;
1760
- const documentManager2 = getService$1("document-manager");
1761
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1865
+ const documentManager2 = getService$2("document-manager");
1866
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1762
1867
  if (permissionChecker2.cannot.read()) {
1763
1868
  return ctx.forbidden();
1764
1869
  }
1765
1870
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
1766
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1871
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1767
1872
  const { locale, status } = await getDocumentLocaleAndStatus(ctx.query, model);
1768
1873
  const version = await documentManager2.findOne(id, model, {
1769
1874
  populate,
@@ -1794,7 +1899,7 @@ const collectionTypes = {
1794
1899
  async create(ctx) {
1795
1900
  const { userAbility } = ctx.state;
1796
1901
  const { model } = ctx.params;
1797
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1902
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1798
1903
  const [totalEntries, document] = await Promise.all([
1799
1904
  strapi.db.query(model).count(),
1800
1905
  createDocument(ctx)
@@ -1815,7 +1920,7 @@ const collectionTypes = {
1815
1920
  async update(ctx) {
1816
1921
  const { userAbility } = ctx.state;
1817
1922
  const { model } = ctx.params;
1818
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1923
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1819
1924
  const updatedVersion = await updateDocument(ctx);
1820
1925
  const sanitizedVersion = await permissionChecker2.sanitizeOutput(updatedVersion);
1821
1926
  ctx.body = await formatDocumentWithMetadata(permissionChecker2, model, sanitizedVersion);
@@ -1824,13 +1929,13 @@ const collectionTypes = {
1824
1929
  const { userAbility, user } = ctx.state;
1825
1930
  const { model, sourceId: id } = ctx.params;
1826
1931
  const { body } = ctx.request;
1827
- const documentManager2 = getService$1("document-manager");
1828
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1932
+ const documentManager2 = getService$2("document-manager");
1933
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1829
1934
  if (permissionChecker2.cannot.create()) {
1830
1935
  return ctx.forbidden();
1831
1936
  }
1832
1937
  const permissionQuery = await permissionChecker2.sanitizedQuery.create(ctx.query);
1833
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
1938
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1834
1939
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1835
1940
  const document = await documentManager2.findOne(id, model, {
1836
1941
  populate,
@@ -1869,13 +1974,13 @@ const collectionTypes = {
1869
1974
  async delete(ctx) {
1870
1975
  const { userAbility } = ctx.state;
1871
1976
  const { id, model } = ctx.params;
1872
- const documentManager2 = getService$1("document-manager");
1873
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1977
+ const documentManager2 = getService$2("document-manager");
1978
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1874
1979
  if (permissionChecker2.cannot.delete()) {
1875
1980
  return ctx.forbidden();
1876
1981
  }
1877
1982
  const permissionQuery = await permissionChecker2.sanitizedQuery.delete(ctx.query);
1878
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
1983
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1879
1984
  const { locale } = await getDocumentLocaleAndStatus(ctx.query, model);
1880
1985
  const documentLocales = await documentManager2.findLocales(id, model, { populate, locale });
1881
1986
  if (documentLocales.length === 0) {
@@ -1897,14 +2002,14 @@ const collectionTypes = {
1897
2002
  const { userAbility } = ctx.state;
1898
2003
  const { id, model } = ctx.params;
1899
2004
  const { body } = ctx.request;
1900
- const documentManager2 = getService$1("document-manager");
1901
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2005
+ const documentManager2 = getService$2("document-manager");
2006
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1902
2007
  if (permissionChecker2.cannot.publish()) {
1903
2008
  return ctx.forbidden();
1904
2009
  }
1905
2010
  const publishedDocument = await strapi.db.transaction(async () => {
1906
2011
  const permissionQuery = await permissionChecker2.sanitizedQuery.publish(ctx.query);
1907
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
2012
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1908
2013
  let document;
1909
2014
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1910
2015
  const isCreate = isNil$1(id);
@@ -1952,13 +2057,13 @@ const collectionTypes = {
1952
2057
  const { body } = ctx.request;
1953
2058
  const { documentIds } = body;
1954
2059
  await validateBulkActionInput(body);
1955
- const documentManager2 = getService$1("document-manager");
1956
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2060
+ const documentManager2 = getService$2("document-manager");
2061
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1957
2062
  if (permissionChecker2.cannot.publish()) {
1958
2063
  return ctx.forbidden();
1959
2064
  }
1960
2065
  const permissionQuery = await permissionChecker2.sanitizedQuery.publish(ctx.query);
1961
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
2066
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1962
2067
  const { locale } = await getDocumentLocaleAndStatus(body, model, {
1963
2068
  allowMultipleLocales: true
1964
2069
  });
@@ -1983,8 +2088,8 @@ const collectionTypes = {
1983
2088
  const { body } = ctx.request;
1984
2089
  const { documentIds } = body;
1985
2090
  await validateBulkActionInput(body);
1986
- const documentManager2 = getService$1("document-manager");
1987
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2091
+ const documentManager2 = getService$2("document-manager");
2092
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1988
2093
  if (permissionChecker2.cannot.unpublish()) {
1989
2094
  return ctx.forbidden();
1990
2095
  }
@@ -2013,8 +2118,8 @@ const collectionTypes = {
2013
2118
  const {
2014
2119
  body: { discardDraft, ...body }
2015
2120
  } = ctx.request;
2016
- const documentManager2 = getService$1("document-manager");
2017
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2121
+ const documentManager2 = getService$2("document-manager");
2122
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2018
2123
  if (permissionChecker2.cannot.unpublish()) {
2019
2124
  return ctx.forbidden();
2020
2125
  }
@@ -2022,7 +2127,7 @@ const collectionTypes = {
2022
2127
  return ctx.forbidden();
2023
2128
  }
2024
2129
  const permissionQuery = await permissionChecker2.sanitizedQuery.unpublish(ctx.query);
2025
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2130
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2026
2131
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2027
2132
  const document = await documentManager2.findOne(id, model, {
2028
2133
  populate,
@@ -2053,13 +2158,13 @@ const collectionTypes = {
2053
2158
  const { userAbility } = ctx.state;
2054
2159
  const { id, model } = ctx.params;
2055
2160
  const { body } = ctx.request;
2056
- const documentManager2 = getService$1("document-manager");
2057
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2161
+ const documentManager2 = getService$2("document-manager");
2162
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2058
2163
  if (permissionChecker2.cannot.discard()) {
2059
2164
  return ctx.forbidden();
2060
2165
  }
2061
2166
  const permissionQuery = await permissionChecker2.sanitizedQuery.discard(ctx.query);
2062
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2167
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2063
2168
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2064
2169
  const document = await documentManager2.findOne(id, model, {
2065
2170
  populate,
@@ -2084,13 +2189,13 @@ const collectionTypes = {
2084
2189
  const { query, body } = ctx.request;
2085
2190
  const { documentIds } = body;
2086
2191
  await validateBulkActionInput(body);
2087
- const documentManager2 = getService$1("document-manager");
2088
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2192
+ const documentManager2 = getService$2("document-manager");
2193
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2089
2194
  if (permissionChecker2.cannot.delete()) {
2090
2195
  return ctx.forbidden();
2091
2196
  }
2092
2197
  const permissionQuery = await permissionChecker2.sanitizedQuery.delete(query);
2093
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2198
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2094
2199
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2095
2200
  const documentLocales = await documentManager2.findLocales(documentIds, model, {
2096
2201
  populate,
@@ -2111,13 +2216,13 @@ const collectionTypes = {
2111
2216
  async countDraftRelations(ctx) {
2112
2217
  const { userAbility } = ctx.state;
2113
2218
  const { model, id } = ctx.params;
2114
- const documentManager2 = getService$1("document-manager");
2115
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2219
+ const documentManager2 = getService$2("document-manager");
2220
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2116
2221
  if (permissionChecker2.cannot.read()) {
2117
2222
  return ctx.forbidden();
2118
2223
  }
2119
2224
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
2120
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2225
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2121
2226
  const { locale, status } = await getDocumentLocaleAndStatus(ctx.query, model);
2122
2227
  const entity = await documentManager2.findOne(id, model, { populate, locale, status });
2123
2228
  if (!entity) {
@@ -2136,8 +2241,8 @@ const collectionTypes = {
2136
2241
  const ids = ctx.request.query.documentIds;
2137
2242
  const locale = ctx.request.query.locale;
2138
2243
  const { model } = ctx.params;
2139
- const documentManager2 = getService$1("document-manager");
2140
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2244
+ const documentManager2 = getService$2("document-manager");
2245
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2141
2246
  if (permissionChecker2.cannot.read()) {
2142
2247
  return ctx.forbidden();
2143
2248
  }
@@ -2161,13 +2266,13 @@ const collectionTypes = {
2161
2266
  };
2162
2267
  const components$1 = {
2163
2268
  findComponents(ctx) {
2164
- const components2 = getService$1("components").findAllComponents();
2165
- const { toDto } = getService$1("data-mapper");
2269
+ const components2 = getService$2("components").findAllComponents();
2270
+ const { toDto } = getService$2("data-mapper");
2166
2271
  ctx.body = { data: components2.map(toDto) };
2167
2272
  },
2168
2273
  async findComponentConfiguration(ctx) {
2169
2274
  const { uid: uid2 } = ctx.params;
2170
- const componentService = getService$1("components");
2275
+ const componentService = getService$2("components");
2171
2276
  const component = componentService.findComponent(uid2);
2172
2277
  if (!component) {
2173
2278
  return ctx.notFound("component.notFound");
@@ -2184,7 +2289,7 @@ const components$1 = {
2184
2289
  async updateComponentConfiguration(ctx) {
2185
2290
  const { uid: uid2 } = ctx.params;
2186
2291
  const { body } = ctx.request;
2187
- const componentService = getService$1("components");
2292
+ const componentService = getService$2("components");
2188
2293
  const component = componentService.findComponent(uid2);
2189
2294
  if (!component) {
2190
2295
  return ctx.notFound("component.notFound");
@@ -2218,12 +2323,12 @@ const contentTypes = {
2218
2323
  } catch (error) {
2219
2324
  return ctx.send({ error }, 400);
2220
2325
  }
2221
- const contentTypes2 = getService$1("content-types").findContentTypesByKind(kind);
2222
- const { toDto } = getService$1("data-mapper");
2326
+ const contentTypes2 = getService$2("content-types").findContentTypesByKind(kind);
2327
+ const { toDto } = getService$2("data-mapper");
2223
2328
  ctx.body = { data: contentTypes2.map(toDto) };
2224
2329
  },
2225
2330
  async findContentTypesSettings(ctx) {
2226
- const { findAllContentTypes, findConfiguration } = getService$1("content-types");
2331
+ const { findAllContentTypes, findConfiguration } = getService$2("content-types");
2227
2332
  const contentTypes2 = await findAllContentTypes();
2228
2333
  const configurations = await Promise.all(
2229
2334
  contentTypes2.map(async (contentType) => {
@@ -2237,7 +2342,7 @@ const contentTypes = {
2237
2342
  },
2238
2343
  async findContentTypeConfiguration(ctx) {
2239
2344
  const { uid: uid2 } = ctx.params;
2240
- const contentTypeService = getService$1("content-types");
2345
+ const contentTypeService = getService$2("content-types");
2241
2346
  const contentType = await contentTypeService.findContentType(uid2);
2242
2347
  if (!contentType) {
2243
2348
  return ctx.notFound("contentType.notFound");
@@ -2259,13 +2364,13 @@ const contentTypes = {
2259
2364
  const { userAbility } = ctx.state;
2260
2365
  const { uid: uid2 } = ctx.params;
2261
2366
  const { body } = ctx.request;
2262
- const contentTypeService = getService$1("content-types");
2263
- const metricsService = getService$1("metrics");
2367
+ const contentTypeService = getService$2("content-types");
2368
+ const metricsService = getService$2("metrics");
2264
2369
  const contentType = await contentTypeService.findContentType(uid2);
2265
2370
  if (!contentType) {
2266
2371
  return ctx.notFound("contentType.notFound");
2267
2372
  }
2268
- if (!getService$1("permission").canConfigureContentType({ userAbility, contentType })) {
2373
+ if (!getService$2("permission").canConfigureContentType({ userAbility, contentType })) {
2269
2374
  return ctx.forbidden();
2270
2375
  }
2271
2376
  let input;
@@ -2298,10 +2403,10 @@ const contentTypes = {
2298
2403
  };
2299
2404
  const init = {
2300
2405
  getInitData(ctx) {
2301
- const { toDto } = getService$1("data-mapper");
2302
- const { findAllComponents } = getService$1("components");
2303
- const { getAllFieldSizes } = getService$1("field-sizes");
2304
- const { findAllContentTypes } = getService$1("content-types");
2406
+ const { toDto } = getService$2("data-mapper");
2407
+ const { findAllComponents } = getService$2("components");
2408
+ const { getAllFieldSizes } = getService$2("field-sizes");
2409
+ const { findAllContentTypes } = getService$2("content-types");
2305
2410
  ctx.body = {
2306
2411
  data: {
2307
2412
  fieldSizes: getAllFieldSizes(),
@@ -2337,7 +2442,7 @@ const addFiltersClause = (params, filtersClause) => {
2337
2442
  params.filters.$and.push(filtersClause);
2338
2443
  };
2339
2444
  const sanitizeMainField = (model, mainField, userAbility) => {
2340
- const permissionChecker2 = getService$1("permission-checker").create({
2445
+ const permissionChecker2 = getService$2("permission-checker").create({
2341
2446
  userAbility,
2342
2447
  model: model.uid
2343
2448
  });
@@ -2355,7 +2460,7 @@ const addStatusToRelations = async (targetUid, relations2) => {
2355
2460
  if (!contentTypes$1.hasDraftAndPublish(strapi.getModel(targetUid))) {
2356
2461
  return relations2;
2357
2462
  }
2358
- const documentMetadata2 = getService$1("document-metadata");
2463
+ const documentMetadata2 = getService$2("document-metadata");
2359
2464
  if (!relations2.length) {
2360
2465
  return relations2;
2361
2466
  }
@@ -2433,7 +2538,7 @@ const relations = {
2433
2538
  ctx.request?.query?.locale
2434
2539
  );
2435
2540
  const { status } = validateStatus(sourceUid, ctx.request?.query?.status);
2436
- const permissionChecker2 = getService$1("permission-checker").create({
2541
+ const permissionChecker2 = getService$2("permission-checker").create({
2437
2542
  userAbility,
2438
2543
  model
2439
2544
  });
@@ -2458,7 +2563,7 @@ const relations = {
2458
2563
  where.id = id;
2459
2564
  }
2460
2565
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
2461
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2566
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2462
2567
  const currentEntity = await strapi.db.query(model).findOne({
2463
2568
  where,
2464
2569
  populate
@@ -2473,7 +2578,7 @@ const relations = {
2473
2578
  }
2474
2579
  entryId = currentEntity.id;
2475
2580
  }
2476
- const modelConfig = isComponent2 ? await getService$1("components").findConfiguration(sourceSchema) : await getService$1("content-types").findConfiguration(sourceSchema);
2581
+ const modelConfig = isComponent2 ? await getService$2("components").findConfiguration(sourceSchema) : await getService$2("content-types").findConfiguration(sourceSchema);
2477
2582
  const targetSchema = strapi.getModel(targetUid);
2478
2583
  const mainField = flow(
2479
2584
  prop(`metadatas.${targetField}.edit.mainField`),
@@ -2527,7 +2632,7 @@ const relations = {
2527
2632
  }
2528
2633
  } = await this.extractAndValidateRequestInfo(ctx, id);
2529
2634
  const { idsToOmit, idsToInclude, _q, ...query } = ctx.request.query;
2530
- const permissionChecker2 = getService$1("permission-checker").create({
2635
+ const permissionChecker2 = getService$2("permission-checker").create({
2531
2636
  userAbility: ctx.state.userAbility,
2532
2637
  model: targetUid
2533
2638
  });
@@ -2606,7 +2711,7 @@ const relations = {
2606
2711
  } = await this.extractAndValidateRequestInfo(ctx, id);
2607
2712
  const { uid: sourceUid } = sourceSchema;
2608
2713
  const { uid: targetUid } = targetSchema;
2609
- const permissionQuery = await getService$1("permission-checker").create({ userAbility, model: targetUid }).sanitizedQuery.read({ fields: fieldsToSelect });
2714
+ const permissionQuery = await getService$2("permission-checker").create({ userAbility, model: targetUid }).sanitizedQuery.read({ fields: fieldsToSelect });
2610
2715
  const dbQuery = strapi.db.query(sourceUid);
2611
2716
  const loadRelations = relations$1.isAnyToMany(attribute) ? (...args) => dbQuery.loadPages(...args) : (...args) => dbQuery.load(...args).then((res2) => ({ results: res2 ? [res2] : [] }));
2612
2717
  const filters = {};
@@ -2647,10 +2752,10 @@ const relations = {
2647
2752
  }
2648
2753
  };
2649
2754
  const buildPopulateFromQuery = async (query, model) => {
2650
- return getService$1("populate-builder")(model).populateFromQuery(query).populateDeep(Infinity).countRelations().build();
2755
+ return getService$2("populate-builder")(model).populateFromQuery(query).populateDeep(Infinity).countRelations().build();
2651
2756
  };
2652
2757
  const findDocument = async (query, uid2, opts = {}) => {
2653
- const documentManager2 = getService$1("document-manager");
2758
+ const documentManager2 = getService$2("document-manager");
2654
2759
  const populate = await buildPopulateFromQuery(query, uid2);
2655
2760
  return documentManager2.findMany({ ...opts, populate }, uid2).then((documents) => documents[0]);
2656
2761
  };
@@ -2658,8 +2763,8 @@ const createOrUpdateDocument = async (ctx, opts) => {
2658
2763
  const { user, userAbility } = ctx.state;
2659
2764
  const { model } = ctx.params;
2660
2765
  const { body, query } = ctx.request;
2661
- const documentManager2 = getService$1("document-manager");
2662
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2766
+ const documentManager2 = getService$2("document-manager");
2767
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2663
2768
  if (permissionChecker2.cannot.create() && permissionChecker2.cannot.update()) {
2664
2769
  throw new errors.ForbiddenError();
2665
2770
  }
@@ -2700,7 +2805,7 @@ const singleTypes = {
2700
2805
  const { userAbility } = ctx.state;
2701
2806
  const { model } = ctx.params;
2702
2807
  const { query = {} } = ctx.request;
2703
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2808
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2704
2809
  if (permissionChecker2.cannot.read()) {
2705
2810
  return ctx.forbidden();
2706
2811
  }
@@ -2734,7 +2839,7 @@ const singleTypes = {
2734
2839
  async createOrUpdate(ctx) {
2735
2840
  const { userAbility } = ctx.state;
2736
2841
  const { model } = ctx.params;
2737
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2842
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2738
2843
  const document = await createOrUpdateDocument(ctx);
2739
2844
  const sanitizedDocument = await permissionChecker2.sanitizeOutput(document);
2740
2845
  ctx.body = await formatDocumentWithMetadata(permissionChecker2, model, sanitizedDocument);
@@ -2743,8 +2848,8 @@ const singleTypes = {
2743
2848
  const { userAbility } = ctx.state;
2744
2849
  const { model } = ctx.params;
2745
2850
  const { query = {} } = ctx.request;
2746
- const documentManager2 = getService$1("document-manager");
2747
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2851
+ const documentManager2 = getService$2("document-manager");
2852
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2748
2853
  if (permissionChecker2.cannot.delete()) {
2749
2854
  return ctx.forbidden();
2750
2855
  }
@@ -2772,8 +2877,8 @@ const singleTypes = {
2772
2877
  const { userAbility } = ctx.state;
2773
2878
  const { model } = ctx.params;
2774
2879
  const { query = {} } = ctx.request;
2775
- const documentManager2 = getService$1("document-manager");
2776
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2880
+ const documentManager2 = getService$2("document-manager");
2881
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2777
2882
  if (permissionChecker2.cannot.publish()) {
2778
2883
  return ctx.forbidden();
2779
2884
  }
@@ -2801,8 +2906,8 @@ const singleTypes = {
2801
2906
  body: { discardDraft, ...body },
2802
2907
  query = {}
2803
2908
  } = ctx.request;
2804
- const documentManager2 = getService$1("document-manager");
2805
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2909
+ const documentManager2 = getService$2("document-manager");
2910
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2806
2911
  if (permissionChecker2.cannot.unpublish()) {
2807
2912
  return ctx.forbidden();
2808
2913
  }
@@ -2836,8 +2941,8 @@ const singleTypes = {
2836
2941
  const { userAbility } = ctx.state;
2837
2942
  const { model } = ctx.params;
2838
2943
  const { body, query = {} } = ctx.request;
2839
- const documentManager2 = getService$1("document-manager");
2840
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2944
+ const documentManager2 = getService$2("document-manager");
2945
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2841
2946
  if (permissionChecker2.cannot.discard()) {
2842
2947
  return ctx.forbidden();
2843
2948
  }
@@ -2860,8 +2965,8 @@ const singleTypes = {
2860
2965
  const { userAbility } = ctx.state;
2861
2966
  const { model } = ctx.params;
2862
2967
  const { query } = ctx.request;
2863
- const documentManager2 = getService$1("document-manager");
2864
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2968
+ const documentManager2 = getService$2("document-manager");
2969
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2865
2970
  const { locale } = await getDocumentLocaleAndStatus(query, model);
2866
2971
  if (permissionChecker2.cannot.read()) {
2867
2972
  return ctx.forbidden();
@@ -2885,7 +2990,7 @@ const uid$1 = {
2885
2990
  const { query = {} } = ctx.request;
2886
2991
  const { locale } = await getDocumentLocaleAndStatus(query, contentTypeUID);
2887
2992
  await validateUIDField(contentTypeUID, field);
2888
- const uidService = getService$1("uid");
2993
+ const uidService = getService$2("uid");
2889
2994
  ctx.body = {
2890
2995
  data: await uidService.generateUIDField({ contentTypeUID, field, data, locale })
2891
2996
  };
@@ -2897,7 +3002,7 @@ const uid$1 = {
2897
3002
  const { query = {} } = ctx.request;
2898
3003
  const { locale } = await getDocumentLocaleAndStatus(query, contentTypeUID);
2899
3004
  await validateUIDField(contentTypeUID, field);
2900
- const uidService = getService$1("uid");
3005
+ const uidService = getService$2("uid");
2901
3006
  const isAvailable = await uidService.checkUIDAvailability({
2902
3007
  contentTypeUID,
2903
3008
  field,
@@ -2918,7 +3023,8 @@ const controllers = {
2918
3023
  relations,
2919
3024
  "single-types": singleTypes,
2920
3025
  uid: uid$1,
2921
- ...history.controllers ? history.controllers : {}
3026
+ ...history.controllers ? history.controllers : {},
3027
+ ...preview.controllers ? preview.controllers : {}
2922
3028
  };
2923
3029
  const keys = {
2924
3030
  CONFIGURATION: "configuration"
@@ -3069,12 +3175,12 @@ async function syncMetadatas(configuration, schema) {
3069
3175
  return _.assign(metasWithDefaults, updatedMetas);
3070
3176
  }
3071
3177
  const getTargetSchema = (targetModel) => {
3072
- return getService$1("content-types").findContentType(targetModel);
3178
+ return getService$2("content-types").findContentType(targetModel);
3073
3179
  };
3074
3180
  const DEFAULT_LIST_LENGTH = 4;
3075
3181
  const MAX_ROW_SIZE = 12;
3076
3182
  const isAllowedFieldSize = (type, size) => {
3077
- const { getFieldSize } = getService$1("field-sizes");
3183
+ const { getFieldSize } = getService$2("field-sizes");
3078
3184
  const fieldSize = getFieldSize(type);
3079
3185
  if (!fieldSize.isResizable && size !== fieldSize.default) {
3080
3186
  return false;
@@ -3082,7 +3188,7 @@ const isAllowedFieldSize = (type, size) => {
3082
3188
  return size <= MAX_ROW_SIZE;
3083
3189
  };
3084
3190
  const getDefaultFieldSize = (attribute) => {
3085
- const { hasFieldSize, getFieldSize } = getService$1("field-sizes");
3191
+ const { hasFieldSize, getFieldSize } = getService$2("field-sizes");
3086
3192
  return getFieldSize(hasFieldSize(attribute.customField) ? attribute.customField : attribute.type).default;
3087
3193
  };
3088
3194
  async function createDefaultLayouts(schema) {
@@ -3117,7 +3223,7 @@ function syncLayouts(configuration, schema) {
3117
3223
  for (const el of row) {
3118
3224
  if (!hasEditableAttribute(schema, el.name))
3119
3225
  continue;
3120
- const { hasFieldSize } = getService$1("field-sizes");
3226
+ const { hasFieldSize } = getService$2("field-sizes");
3121
3227
  const fieldType = hasFieldSize(schema.attributes[el.name].customField) ? schema.attributes[el.name].customField : schema.attributes[el.name].type;
3122
3228
  if (!isAllowedFieldSize(fieldType, el.size)) {
3123
3229
  elementsToReAppend.push(el.name);
@@ -3257,17 +3363,17 @@ const configurationService$1 = createConfigurationService({
3257
3363
  isComponent: true,
3258
3364
  prefix: STORE_KEY_PREFIX,
3259
3365
  getModels() {
3260
- const { toContentManagerModel } = getService$1("data-mapper");
3366
+ const { toContentManagerModel } = getService$2("data-mapper");
3261
3367
  return mapValues(toContentManagerModel, strapi.components);
3262
3368
  }
3263
3369
  });
3264
3370
  const components = ({ strapi: strapi2 }) => ({
3265
3371
  findAllComponents() {
3266
- const { toContentManagerModel } = getService$1("data-mapper");
3372
+ const { toContentManagerModel } = getService$2("data-mapper");
3267
3373
  return Object.values(strapi2.components).map(toContentManagerModel);
3268
3374
  },
3269
3375
  findComponent(uid2) {
3270
- const { toContentManagerModel } = getService$1("data-mapper");
3376
+ const { toContentManagerModel } = getService$2("data-mapper");
3271
3377
  const component = strapi2.components[uid2];
3272
3378
  return isNil$1(component) ? component : toContentManagerModel(component);
3273
3379
  },
@@ -3318,17 +3424,17 @@ const configurationService = createConfigurationService({
3318
3424
  storeUtils,
3319
3425
  prefix: "content_types",
3320
3426
  getModels() {
3321
- const { toContentManagerModel } = getService$1("data-mapper");
3427
+ const { toContentManagerModel } = getService$2("data-mapper");
3322
3428
  return mapValues(toContentManagerModel, strapi.contentTypes);
3323
3429
  }
3324
3430
  });
3325
3431
  const service = ({ strapi: strapi2 }) => ({
3326
3432
  findAllContentTypes() {
3327
- const { toContentManagerModel } = getService$1("data-mapper");
3433
+ const { toContentManagerModel } = getService$2("data-mapper");
3328
3434
  return Object.values(strapi2.contentTypes).map(toContentManagerModel);
3329
3435
  },
3330
3436
  findContentType(uid2) {
3331
- const { toContentManagerModel } = getService$1("data-mapper");
3437
+ const { toContentManagerModel } = getService$2("data-mapper");
3332
3438
  const contentType = strapi2.contentTypes[uid2];
3333
3439
  return isNil$1(contentType) ? contentType : toContentManagerModel(contentType);
3334
3440
  },
@@ -3357,7 +3463,7 @@ const service = ({ strapi: strapi2 }) => ({
3357
3463
  return this.findConfiguration(contentType);
3358
3464
  },
3359
3465
  findComponentsConfigurations(contentType) {
3360
- return getService$1("components").findComponentsConfigurations(contentType);
3466
+ return getService$2("components").findComponentsConfigurations(contentType);
3361
3467
  },
3362
3468
  syncConfigurations() {
3363
3469
  return configurationService.syncConfigurations();
@@ -3629,7 +3735,7 @@ const permission = ({ strapi: strapi2 }) => ({
3629
3735
  return userAbility.can(action);
3630
3736
  },
3631
3737
  async registerPermissions() {
3632
- const displayedContentTypes = getService$1("content-types").findDisplayedContentTypes();
3738
+ const displayedContentTypes = getService$2("content-types").findDisplayedContentTypes();
3633
3739
  const contentTypesUids = displayedContentTypes.map(prop("uid"));
3634
3740
  const actions = [
3635
3741
  {
@@ -3905,7 +4011,7 @@ const getQueryPopulate = async (uid2, query) => {
3905
4011
  return populateQuery;
3906
4012
  };
3907
4013
  const buildDeepPopulate = (uid2) => {
3908
- return getService$1("populate-builder")(uid2).populateDeep(Infinity).countRelations().build();
4014
+ return getService$2("populate-builder")(uid2).populateDeep(Infinity).countRelations().build();
3909
4015
  };
3910
4016
  const populateBuilder = (uid2) => {
3911
4017
  let getInitialPopulate = async () => {
@@ -4448,7 +4554,8 @@ const services = {
4448
4554
  permission,
4449
4555
  "populate-builder": populateBuilder$1,
4450
4556
  uid,
4451
- ...history.services ? history.services : {}
4557
+ ...history.services ? history.services : {},
4558
+ ...preview.services ? preview.services : {}
4452
4559
  };
4453
4560
  const index = () => {
4454
4561
  return {