@strapi/content-manager 0.0.0-next.959c5589d0d3efa25d7ca014656d9ff48c173399 → 0.0.0-next.ac654f8b8646bf964ebd39d4313c4afab0917a24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (144) hide show
  1. package/dist/_chunks/{ComponentConfigurationPage-gsCd80MU.js → ComponentConfigurationPage-CuKGBO3B.js} +3 -3
  2. package/dist/_chunks/{ComponentConfigurationPage-gsCd80MU.js.map → ComponentConfigurationPage-CuKGBO3B.js.map} +1 -1
  3. package/dist/_chunks/{ComponentConfigurationPage-CIjXcRAB.mjs → ComponentConfigurationPage-DITz-KUa.mjs} +3 -3
  4. package/dist/_chunks/{ComponentConfigurationPage-CIjXcRAB.mjs.map → ComponentConfigurationPage-DITz-KUa.mjs.map} +1 -1
  5. package/dist/_chunks/{EditConfigurationPage-DHDQKBzw.js → EditConfigurationPage-aJ6Nk-e2.js} +3 -3
  6. package/dist/_chunks/{EditConfigurationPage-DHDQKBzw.js.map → EditConfigurationPage-aJ6Nk-e2.js.map} +1 -1
  7. package/dist/_chunks/{EditConfigurationPage-BglmD_BF.mjs → EditConfigurationPage-dpdSMBbB.mjs} +3 -3
  8. package/dist/_chunks/{EditConfigurationPage-BglmD_BF.mjs.map → EditConfigurationPage-dpdSMBbB.mjs.map} +1 -1
  9. package/dist/_chunks/{EditViewPage-C4iTxUPU.js → EditViewPage-CUUoPbuf.js} +37 -7
  10. package/dist/_chunks/EditViewPage-CUUoPbuf.js.map +1 -0
  11. package/dist/_chunks/{EditViewPage-CiwVPMaK.mjs → EditViewPage-HR-LggHQ.mjs} +38 -8
  12. package/dist/_chunks/EditViewPage-HR-LggHQ.mjs.map +1 -0
  13. package/dist/_chunks/{Field-DIjL1b5d.mjs → Field-D8UDC53O.mjs} +43 -24
  14. package/dist/_chunks/Field-D8UDC53O.mjs.map +1 -0
  15. package/dist/_chunks/{Field-DhXEK8y1.js → Field-PPOGQJFw.js} +42 -23
  16. package/dist/_chunks/Field-PPOGQJFw.js.map +1 -0
  17. package/dist/_chunks/{Form-CmNesrvR.mjs → Form-B63Fj3Fj.mjs} +2 -2
  18. package/dist/_chunks/{Form-CmNesrvR.mjs.map → Form-B63Fj3Fj.mjs.map} +1 -1
  19. package/dist/_chunks/{Form-CwmJ4sWe.js → Form-BcGPmYEy.js} +2 -2
  20. package/dist/_chunks/{Form-CwmJ4sWe.js.map → Form-BcGPmYEy.js.map} +1 -1
  21. package/dist/_chunks/{History-BLCCNgCt.js → History-2wgFZpc9.js} +20 -90
  22. package/dist/_chunks/History-2wgFZpc9.js.map +1 -0
  23. package/dist/_chunks/{History-D-99Wh30.mjs → History-HLNHu2qZ.mjs} +21 -91
  24. package/dist/_chunks/History-HLNHu2qZ.mjs.map +1 -0
  25. package/dist/_chunks/{ListConfigurationPage-JPWZz7Kg.mjs → ListConfigurationPage-CdZ3dURz.mjs} +5 -4
  26. package/dist/_chunks/ListConfigurationPage-CdZ3dURz.mjs.map +1 -0
  27. package/dist/_chunks/{ListConfigurationPage-DxWpeZrO.js → ListConfigurationPage-DJpH0BQ7.js} +4 -3
  28. package/dist/_chunks/ListConfigurationPage-DJpH0BQ7.js.map +1 -0
  29. package/dist/_chunks/{ListViewPage-CIQekSFz.js → ListViewPage-BSlwetiz.js} +62 -39
  30. package/dist/_chunks/ListViewPage-BSlwetiz.js.map +1 -0
  31. package/dist/_chunks/{ListViewPage-DSK3f0ST.mjs → ListViewPage-DmNN9hbm.mjs} +62 -39
  32. package/dist/_chunks/ListViewPage-DmNN9hbm.mjs.map +1 -0
  33. package/dist/_chunks/{NoContentTypePage-D99LU1YP.mjs → NoContentTypePage-Bn5ihosL.mjs} +2 -2
  34. package/dist/_chunks/{NoContentTypePage-D99LU1YP.mjs.map → NoContentTypePage-Bn5ihosL.mjs.map} +1 -1
  35. package/dist/_chunks/{NoContentTypePage-C5cxKvC2.js → NoContentTypePage-T65BK8ML.js} +2 -2
  36. package/dist/_chunks/{NoContentTypePage-C5cxKvC2.js.map → NoContentTypePage-T65BK8ML.js.map} +1 -1
  37. package/dist/_chunks/{NoPermissionsPage-DBrBw-0y.mjs → NoPermissionsPage-DaUbhwgn.mjs} +2 -2
  38. package/dist/_chunks/{NoPermissionsPage-DBrBw-0y.mjs.map → NoPermissionsPage-DaUbhwgn.mjs.map} +1 -1
  39. package/dist/_chunks/{NoPermissionsPage-Oy4tmUrW.js → NoPermissionsPage-DzKfa6Jp.js} +2 -2
  40. package/dist/_chunks/{NoPermissionsPage-Oy4tmUrW.js.map → NoPermissionsPage-DzKfa6Jp.js.map} +1 -1
  41. package/dist/_chunks/Preview-DfMsSYsj.js +286 -0
  42. package/dist/_chunks/Preview-DfMsSYsj.js.map +1 -0
  43. package/dist/_chunks/Preview-KmWscqhk.mjs +267 -0
  44. package/dist/_chunks/Preview-KmWscqhk.mjs.map +1 -0
  45. package/dist/_chunks/{Relations-BBmhcWFV.mjs → Relations-7f9zi6m0.mjs} +6 -3
  46. package/dist/_chunks/Relations-7f9zi6m0.mjs.map +1 -0
  47. package/dist/_chunks/{Relations-eG-9p_qS.js → Relations-DvizPJ_G.js} +6 -3
  48. package/dist/_chunks/Relations-DvizPJ_G.js.map +1 -0
  49. package/dist/_chunks/{en-DKV44jRb.mjs → en-CfIXaZf9.mjs} +14 -3
  50. package/dist/_chunks/{en-DKV44jRb.mjs.map → en-CfIXaZf9.mjs.map} +1 -1
  51. package/dist/_chunks/{en-Bm0D0IWz.js → en-DTWPCdTS.js} +14 -3
  52. package/dist/_chunks/{en-Bm0D0IWz.js.map → en-DTWPCdTS.js.map} +1 -1
  53. package/dist/_chunks/{es-EUonQTon.js → es-9K52xZIr.js} +2 -2
  54. package/dist/_chunks/{ja-CcFe8diO.js.map → es-9K52xZIr.js.map} +1 -1
  55. package/dist/_chunks/{es-CeXiYflN.mjs → es-D34tqjMw.mjs} +2 -2
  56. package/dist/_chunks/{es-CeXiYflN.mjs.map → es-D34tqjMw.mjs.map} +1 -1
  57. package/dist/_chunks/{fr-CD9VFbPM.mjs → fr--pg5jUbt.mjs} +13 -3
  58. package/dist/_chunks/{fr-CD9VFbPM.mjs.map → fr--pg5jUbt.mjs.map} +1 -1
  59. package/dist/_chunks/{fr-B7kGGg3E.js → fr-B2Kyv8Z9.js} +13 -3
  60. package/dist/_chunks/{fr-B7kGGg3E.js.map → fr-B2Kyv8Z9.js.map} +1 -1
  61. package/dist/_chunks/{index-BIWDoFLK.js → index-Bi9g8evM.js} +147 -74
  62. package/dist/_chunks/index-Bi9g8evM.js.map +1 -0
  63. package/dist/_chunks/{index-BrUzbQ30.mjs → index-Dh8PRBs6.mjs} +151 -78
  64. package/dist/_chunks/index-Dh8PRBs6.mjs.map +1 -0
  65. package/dist/_chunks/{ja-CcFe8diO.js → ja-7sfIbjxE.js} +2 -2
  66. package/dist/_chunks/{es-EUonQTon.js.map → ja-7sfIbjxE.js.map} +1 -1
  67. package/dist/_chunks/{ja-CtsUxOvk.mjs → ja-BHqhDq4V.mjs} +2 -2
  68. package/dist/_chunks/{ja-CtsUxOvk.mjs.map → ja-BHqhDq4V.mjs.map} +1 -1
  69. package/dist/_chunks/{layout-lMc9i1-Z.js → layout-B5gVWKG8.js} +3 -3
  70. package/dist/_chunks/{layout-lMc9i1-Z.js.map → layout-B5gVWKG8.js.map} +1 -1
  71. package/dist/_chunks/{layout-_5-cXs34.mjs → layout-BUFUpPWR.mjs} +3 -3
  72. package/dist/_chunks/{layout-_5-cXs34.mjs.map → layout-BUFUpPWR.mjs.map} +1 -1
  73. package/dist/_chunks/{relations-BRHithi8.js → relations-BUm40kVE.js} +6 -3
  74. package/dist/_chunks/relations-BUm40kVE.js.map +1 -0
  75. package/dist/_chunks/{relations-B_VLk-DD.mjs → relations-CDnV9k0m.mjs} +6 -3
  76. package/dist/_chunks/relations-CDnV9k0m.mjs.map +1 -0
  77. package/dist/admin/index.js +1 -1
  78. package/dist/admin/index.mjs +4 -4
  79. package/dist/admin/src/pages/EditView/EditViewPage.d.ts +9 -1
  80. package/dist/admin/src/pages/EditView/components/DocumentStatus.d.ts +2 -2
  81. package/dist/admin/src/preview/components/PreviewContent.d.ts +2 -0
  82. package/dist/admin/src/preview/components/PreviewHeader.d.ts +2 -0
  83. package/dist/admin/src/preview/components/PreviewSidePanel.d.ts +3 -0
  84. package/dist/admin/src/preview/index.d.ts +1 -1
  85. package/dist/admin/src/preview/pages/Preview.d.ts +11 -0
  86. package/dist/admin/src/preview/routes.d.ts +3 -0
  87. package/dist/admin/src/preview/services/preview.d.ts +3 -0
  88. package/dist/admin/src/router.d.ts +1 -1
  89. package/dist/server/index.js +344 -136
  90. package/dist/server/index.js.map +1 -1
  91. package/dist/server/index.mjs +345 -137
  92. package/dist/server/index.mjs.map +1 -1
  93. package/dist/server/src/controllers/index.d.ts.map +1 -1
  94. package/dist/server/src/history/services/lifecycles.d.ts.map +1 -1
  95. package/dist/server/src/history/services/utils.d.ts +2 -3
  96. package/dist/server/src/history/services/utils.d.ts.map +1 -1
  97. package/dist/server/src/preview/controllers/index.d.ts +2 -0
  98. package/dist/server/src/preview/controllers/index.d.ts.map +1 -0
  99. package/dist/server/src/preview/controllers/preview.d.ts +13 -0
  100. package/dist/server/src/preview/controllers/preview.d.ts.map +1 -0
  101. package/dist/server/src/preview/controllers/validation/preview.d.ts +6 -0
  102. package/dist/server/src/preview/controllers/validation/preview.d.ts.map +1 -0
  103. package/dist/server/src/preview/index.d.ts.map +1 -1
  104. package/dist/server/src/preview/routes/index.d.ts +8 -0
  105. package/dist/server/src/preview/routes/index.d.ts.map +1 -0
  106. package/dist/server/src/preview/routes/preview.d.ts +4 -0
  107. package/dist/server/src/preview/routes/preview.d.ts.map +1 -0
  108. package/dist/server/src/preview/services/index.d.ts +16 -0
  109. package/dist/server/src/preview/services/index.d.ts.map +1 -0
  110. package/dist/server/src/preview/services/preview-config.d.ts +32 -0
  111. package/dist/server/src/preview/services/preview-config.d.ts.map +1 -0
  112. package/dist/server/src/preview/services/preview.d.ts +12 -0
  113. package/dist/server/src/preview/services/preview.d.ts.map +1 -0
  114. package/dist/server/src/preview/utils.d.ts +19 -0
  115. package/dist/server/src/preview/utils.d.ts.map +1 -0
  116. package/dist/server/src/register.d.ts.map +1 -1
  117. package/dist/server/src/routes/index.d.ts.map +1 -1
  118. package/dist/server/src/services/document-manager.d.ts.map +1 -1
  119. package/dist/server/src/services/index.d.ts.map +1 -1
  120. package/dist/shared/contracts/index.d.ts +1 -0
  121. package/dist/shared/contracts/index.d.ts.map +1 -1
  122. package/dist/shared/contracts/preview.d.ts +27 -0
  123. package/dist/shared/contracts/preview.d.ts.map +1 -0
  124. package/dist/shared/index.js +4 -0
  125. package/dist/shared/index.js.map +1 -1
  126. package/dist/shared/index.mjs +4 -0
  127. package/dist/shared/index.mjs.map +1 -1
  128. package/package.json +10 -10
  129. package/dist/_chunks/EditViewPage-C4iTxUPU.js.map +0 -1
  130. package/dist/_chunks/EditViewPage-CiwVPMaK.mjs.map +0 -1
  131. package/dist/_chunks/Field-DIjL1b5d.mjs.map +0 -1
  132. package/dist/_chunks/Field-DhXEK8y1.js.map +0 -1
  133. package/dist/_chunks/History-BLCCNgCt.js.map +0 -1
  134. package/dist/_chunks/History-D-99Wh30.mjs.map +0 -1
  135. package/dist/_chunks/ListConfigurationPage-DxWpeZrO.js.map +0 -1
  136. package/dist/_chunks/ListConfigurationPage-JPWZz7Kg.mjs.map +0 -1
  137. package/dist/_chunks/ListViewPage-CIQekSFz.js.map +0 -1
  138. package/dist/_chunks/ListViewPage-DSK3f0ST.mjs.map +0 -1
  139. package/dist/_chunks/Relations-BBmhcWFV.mjs.map +0 -1
  140. package/dist/_chunks/Relations-eG-9p_qS.js.map +0 -1
  141. package/dist/_chunks/index-BIWDoFLK.js.map +0 -1
  142. package/dist/_chunks/index-BrUzbQ30.mjs.map +0 -1
  143. package/dist/_chunks/relations-BRHithi8.js.map +0 -1
  144. package/dist/_chunks/relations-B_VLk-DD.mjs.map +0 -1
@@ -33,10 +33,10 @@ const isNil__default = /* @__PURE__ */ _interopDefault(isNil);
33
33
  const ___default = /* @__PURE__ */ _interopDefault(_);
34
34
  const qs__default = /* @__PURE__ */ _interopDefault(qs);
35
35
  const slugify__default = /* @__PURE__ */ _interopDefault(slugify);
36
- const getService$1 = (name) => {
36
+ const getService$2 = (name) => {
37
37
  return strapi.plugin("content-manager").service(name);
38
38
  };
39
- function getService(strapi2, name) {
39
+ function getService$1(strapi2, name) {
40
40
  return strapi2.service(`plugin::content-manager.${name}`);
41
41
  }
42
42
  const historyRestoreVersionSchema = yup__namespace.object().shape({
@@ -72,7 +72,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
72
72
  if (!isSingleType && (!contentTypeUid || !ctx.query.documentId)) {
73
73
  throw new strapiUtils.errors.ForbiddenError("contentType and documentId are required");
74
74
  }
75
- const permissionChecker2 = getService$1("permission-checker").create({
75
+ const permissionChecker2 = getService$2("permission-checker").create({
76
76
  userAbility: ctx.state.userAbility,
77
77
  model: ctx.query.contentType
78
78
  });
@@ -80,7 +80,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
80
80
  return ctx.forbidden();
81
81
  }
82
82
  const query = await permissionChecker2.sanitizeQuery(ctx.query);
83
- const { results, pagination } = await getService(strapi2, "history").findVersionsPage({
83
+ const { results, pagination } = await getService$1(strapi2, "history").findVersionsPage({
84
84
  query: {
85
85
  ...query,
86
86
  ...getValidPagination({ page: query.page, pageSize: query.pageSize })
@@ -105,14 +105,14 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
105
105
  async restoreVersion(ctx) {
106
106
  const request = ctx.request;
107
107
  await validateRestoreVersion(request.body, "contentType is required");
108
- const permissionChecker2 = getService$1("permission-checker").create({
108
+ const permissionChecker2 = getService$2("permission-checker").create({
109
109
  userAbility: ctx.state.userAbility,
110
110
  model: request.body.contentType
111
111
  });
112
112
  if (permissionChecker2.cannot.update()) {
113
113
  throw new strapiUtils.errors.ForbiddenError();
114
114
  }
115
- const restoredDocument = await getService(strapi2, "history").restoreVersion(
115
+ const restoredDocument = await getService$1(strapi2, "history").restoreVersion(
116
116
  request.params.versionId
117
117
  );
118
118
  return {
@@ -121,7 +121,7 @@ const createHistoryVersionController = ({ strapi: strapi2 }) => {
121
121
  }
122
122
  };
123
123
  };
124
- const controllers$1 = {
124
+ const controllers$2 = {
125
125
  "history-version": createHistoryVersionController
126
126
  /**
127
127
  * Casting is needed because the types aren't aware that Strapi supports
@@ -228,6 +228,17 @@ const createServiceUtils = ({ strapi: strapi2 }) => {
228
228
  const meta = await documentMetadataService.getMetadata(contentTypeUid, document);
229
229
  return documentMetadataService.getStatus(document, meta.availableStatus);
230
230
  };
231
+ const getComponentFields = (componentUID) => {
232
+ return Object.entries(strapi2.getModel(componentUID).attributes).reduce(
233
+ (fieldsAcc, [key, attribute]) => {
234
+ if (!["relation", "media", "component", "dynamiczone"].includes(attribute.type)) {
235
+ fieldsAcc.push(key);
236
+ }
237
+ return fieldsAcc;
238
+ },
239
+ []
240
+ );
241
+ };
231
242
  const getDeepPopulate2 = (uid2, useDatabaseSyntax = false) => {
232
243
  const model = strapi2.getModel(uid2);
233
244
  const attributes = Object.entries(model.attributes);
@@ -251,13 +262,19 @@ const createServiceUtils = ({ strapi: strapi2 }) => {
251
262
  }
252
263
  case "component": {
253
264
  const populate = getDeepPopulate2(attribute.component);
254
- acc[attributeName] = { populate };
265
+ acc[attributeName] = {
266
+ populate,
267
+ [fieldSelector]: getComponentFields(attribute.component)
268
+ };
255
269
  break;
256
270
  }
257
271
  case "dynamiczone": {
258
272
  const populatedComponents = (attribute.components || []).reduce(
259
273
  (acc2, componentUID) => {
260
- acc2[componentUID] = { populate: getDeepPopulate2(componentUID) };
274
+ acc2[componentUID] = {
275
+ populate: getDeepPopulate2(componentUID),
276
+ [fieldSelector]: getComponentFields(componentUID)
277
+ };
261
278
  return acc2;
262
279
  },
263
280
  {}
@@ -370,7 +387,7 @@ const createHistoryService = ({ strapi: strapi2 }) => {
370
387
  const attributeValue = entry.data[attributeKey];
371
388
  const attributeValues = Array.isArray(attributeValue) ? attributeValue : [attributeValue];
372
389
  if (attributeSchema.type === "media") {
373
- const permissionChecker2 = getService$1("permission-checker").create({
390
+ const permissionChecker2 = getService$2("permission-checker").create({
374
391
  userAbility: params.state.userAbility,
375
392
  model: "plugin::upload.file"
376
393
  });
@@ -411,7 +428,7 @@ const createHistoryService = ({ strapi: strapi2 }) => {
411
428
  [attributeKey]: adminUsers
412
429
  };
413
430
  }
414
- const permissionChecker2 = getService$1("permission-checker").create({
431
+ const permissionChecker2 = getService$2("permission-checker").create({
415
432
  userAbility: params.state.userAbility,
416
433
  model: attributeSchema.target
417
434
  });
@@ -587,7 +604,7 @@ const createLifecyclesService = ({ strapi: strapi2 }) => {
587
604
  onCommit(async () => {
588
605
  for (const entry of localeEntries) {
589
606
  const status = await serviceUtils.getVersionStatus(uid2, entry);
590
- await getService(strapi2, "history").createVersion({
607
+ await getService$1(strapi2, "history").createVersion({
591
608
  contentType: uid2,
592
609
  data: fp.omit(FIELDS_TO_IGNORE, entry),
593
610
  relatedDocumentId: documentId,
@@ -600,15 +617,19 @@ const createLifecyclesService = ({ strapi: strapi2 }) => {
600
617
  });
601
618
  return result;
602
619
  });
603
- state.deleteExpiredJob = nodeSchedule.scheduleJob("0 0 * * *", () => {
620
+ state.deleteExpiredJob = nodeSchedule.scheduleJob("historyDaily", "0 0 * * *", () => {
604
621
  const retentionDaysInMilliseconds = serviceUtils.getRetentionDays() * 24 * 60 * 60 * 1e3;
605
622
  const expirationDate = new Date(Date.now() - retentionDaysInMilliseconds);
606
623
  strapi2.db.query(HISTORY_VERSION_UID).deleteMany({
607
624
  where: {
608
625
  created_at: {
609
- $lt: expirationDate.toISOString()
626
+ $lt: expirationDate
610
627
  }
611
628
  }
629
+ }).catch((error) => {
630
+ if (error instanceof Error) {
631
+ strapi2.log.error("Error deleting expired history versions", error.message);
632
+ }
612
633
  });
613
634
  });
614
635
  state.isInitialized = true;
@@ -620,17 +641,17 @@ const createLifecyclesService = ({ strapi: strapi2 }) => {
620
641
  }
621
642
  };
622
643
  };
623
- const services$1 = {
644
+ const services$2 = {
624
645
  history: createHistoryService,
625
646
  lifecycles: createLifecyclesService
626
647
  };
627
- const info = { pluginName: "content-manager", type: "admin" };
648
+ const info$1 = { pluginName: "content-manager", type: "admin" };
628
649
  const historyVersionRouter = {
629
650
  type: "admin",
630
651
  routes: [
631
652
  {
632
653
  method: "GET",
633
- info,
654
+ info: info$1,
634
655
  path: "/history-versions",
635
656
  handler: "history-version.findMany",
636
657
  config: {
@@ -639,7 +660,7 @@ const historyVersionRouter = {
639
660
  },
640
661
  {
641
662
  method: "PUT",
642
- info,
663
+ info: info$1,
643
664
  path: "/history-versions/:versionId/restore",
644
665
  handler: "history-version.restoreVersion",
645
666
  config: {
@@ -648,7 +669,7 @@ const historyVersionRouter = {
648
669
  }
649
670
  ]
650
671
  };
651
- const routes$1 = {
672
+ const routes$2 = {
652
673
  "history-version": historyVersionRouter
653
674
  };
654
675
  const historyVersion = {
@@ -702,14 +723,14 @@ const getFeature$1 = () => {
702
723
  strapi2.get("models").add(historyVersion);
703
724
  },
704
725
  bootstrap({ strapi: strapi2 }) {
705
- getService(strapi2, "lifecycles").bootstrap();
726
+ getService$1(strapi2, "lifecycles").bootstrap();
706
727
  },
707
728
  destroy({ strapi: strapi2 }) {
708
- getService(strapi2, "lifecycles").destroy();
729
+ getService$1(strapi2, "lifecycles").destroy();
709
730
  },
710
- controllers: controllers$1,
711
- services: services$1,
712
- routes: routes$1
731
+ controllers: controllers$2,
732
+ services: services$2,
733
+ routes: routes$2
713
734
  };
714
735
  }
715
736
  return {
@@ -719,33 +740,217 @@ const getFeature$1 = () => {
719
740
  };
720
741
  };
721
742
  const history = getFeature$1();
722
- const register = async ({ strapi: strapi2 }) => {
723
- await history.register?.({ strapi: strapi2 });
743
+ const FEATURE_ID = "preview";
744
+ const info = { pluginName: "content-manager", type: "admin" };
745
+ const previewRouter = {
746
+ type: "admin",
747
+ routes: [
748
+ {
749
+ method: "GET",
750
+ info,
751
+ path: "/preview/url/:contentType",
752
+ handler: "preview.getPreviewUrl",
753
+ config: {
754
+ policies: ["admin::isAuthenticatedAdmin"]
755
+ }
756
+ }
757
+ ]
724
758
  };
725
- const ALLOWED_WEBHOOK_EVENTS = {
726
- ENTRY_PUBLISH: "entry.publish",
727
- ENTRY_UNPUBLISH: "entry.unpublish"
759
+ const routes$1 = {
760
+ preview: previewRouter
761
+ };
762
+ function getService(strapi2, name) {
763
+ return strapi2.service(`plugin::content-manager.${name}`);
764
+ }
765
+ const getPreviewUrlSchema = yup__namespace.object().shape({
766
+ // Will be undefined for single types
767
+ documentId: yup__namespace.string(),
768
+ locale: yup__namespace.string().nullable(),
769
+ status: yup__namespace.string()
770
+ }).required();
771
+ const validatePreviewUrl = async (strapi2, uid2, params) => {
772
+ await strapiUtils.validateYupSchema(getPreviewUrlSchema)(params);
773
+ const newParams = fp.pick(["documentId", "locale", "status"], params);
774
+ const model = strapi2.getModel(uid2);
775
+ if (!model || model.modelType !== "contentType") {
776
+ throw new strapiUtils.errors.ValidationError("Invalid content type");
777
+ }
778
+ const isSingleType = model?.kind === "singleType";
779
+ if (!isSingleType && !params.documentId) {
780
+ throw new strapiUtils.errors.ValidationError("documentId is required for Collection Types");
781
+ }
782
+ if (isSingleType) {
783
+ const doc = await strapi2.documents(uid2).findFirst();
784
+ if (!doc) {
785
+ throw new strapiUtils.errors.NotFoundError("Document not found");
786
+ }
787
+ newParams.documentId = doc?.documentId;
788
+ }
789
+ if (!newParams.status) {
790
+ const isDPEnabled = model?.options?.draftAndPublish;
791
+ newParams.status = isDPEnabled ? "draft" : "published";
792
+ }
793
+ return newParams;
794
+ };
795
+ const createPreviewController = () => {
796
+ return {
797
+ /**
798
+ * Transforms an entry into a preview URL, so that it can be previewed
799
+ * in the Content Manager.
800
+ */
801
+ async getPreviewUrl(ctx) {
802
+ const uid2 = ctx.params.contentType;
803
+ const query = ctx.request.query;
804
+ const params = await validatePreviewUrl(strapi, uid2, query);
805
+ const previewService = getService(strapi, "preview");
806
+ const url = await previewService.getPreviewUrl(uid2, params);
807
+ if (!url) {
808
+ ctx.status = 204;
809
+ }
810
+ return {
811
+ data: { url }
812
+ };
813
+ }
814
+ };
815
+ };
816
+ const controllers$1 = {
817
+ preview: createPreviewController
818
+ /**
819
+ * Casting is needed because the types aren't aware that Strapi supports
820
+ * passing a controller factory as the value, instead of a controller object directly
821
+ */
822
+ };
823
+ const createPreviewService = ({ strapi: strapi2 }) => {
824
+ const config = getService(strapi2, "preview-config");
825
+ return {
826
+ async getPreviewUrl(uid2, params) {
827
+ const handler = config.getPreviewHandler();
828
+ try {
829
+ return handler(uid2, params);
830
+ } catch (error) {
831
+ strapi2.log.error(`Failed to get preview URL: ${error}`);
832
+ throw new strapiUtils.errors.ApplicationError("Failed to get preview URL");
833
+ }
834
+ return;
835
+ }
836
+ };
837
+ };
838
+ const extendMiddlewareConfiguration = (middleware = { name: "", config: {} }) => {
839
+ const middlewares = strapi.config.get("middlewares");
840
+ const configuredMiddlewares = middlewares.map((currentMiddleware) => {
841
+ if (currentMiddleware === middleware.name) {
842
+ return middleware;
843
+ }
844
+ if (currentMiddleware.name === middleware.name) {
845
+ return fp.mergeWith(
846
+ (objValue, srcValue) => {
847
+ if (Array.isArray(objValue)) {
848
+ return objValue.concat(srcValue);
849
+ }
850
+ return void 0;
851
+ },
852
+ currentMiddleware,
853
+ middleware
854
+ );
855
+ }
856
+ return currentMiddleware;
857
+ });
858
+ strapi.config.set("middlewares", configuredMiddlewares);
859
+ };
860
+ const createPreviewConfigService = ({ strapi: strapi2 }) => {
861
+ return {
862
+ register() {
863
+ if (!this.isEnabled()) {
864
+ return;
865
+ }
866
+ const config = strapi2.config.get("admin.preview");
867
+ if (config.config?.allowedOrigins) {
868
+ extendMiddlewareConfiguration({
869
+ name: "strapi::security",
870
+ config: {
871
+ contentSecurityPolicy: {
872
+ directives: {
873
+ "frame-src": config.config.allowedOrigins
874
+ }
875
+ }
876
+ }
877
+ });
878
+ }
879
+ },
880
+ isEnabled() {
881
+ const config = strapi2.config.get("admin.preview");
882
+ if (!config) {
883
+ return false;
884
+ }
885
+ return config?.enabled ?? true;
886
+ },
887
+ /**
888
+ * Validate if the configuration is valid
889
+ */
890
+ validate() {
891
+ if (!this.isEnabled()) {
892
+ return;
893
+ }
894
+ const handler = this.getPreviewHandler();
895
+ if (typeof handler !== "function") {
896
+ throw new strapiUtils.errors.ValidationError(
897
+ "Preview configuration is invalid. Handler must be a function"
898
+ );
899
+ }
900
+ },
901
+ /**
902
+ * Utility to get the preview handler from the configuration
903
+ */
904
+ getPreviewHandler() {
905
+ const config = strapi2.config.get("admin.preview");
906
+ const emptyHandler = () => {
907
+ return void 0;
908
+ };
909
+ if (!this.isEnabled()) {
910
+ return emptyHandler;
911
+ }
912
+ return config?.config?.handler || emptyHandler;
913
+ }
914
+ };
915
+ };
916
+ const services$1 = {
917
+ preview: createPreviewService,
918
+ "preview-config": createPreviewConfigService
728
919
  };
729
- const FEATURE_ID = "preview";
730
920
  const getFeature = () => {
731
921
  if (!strapi.features.future.isEnabled(FEATURE_ID)) {
732
922
  return {};
733
923
  }
734
924
  return {
925
+ register() {
926
+ const config = getService(strapi, "preview-config");
927
+ config.validate();
928
+ config.register();
929
+ },
735
930
  bootstrap() {
736
- console.log("Bootstrapping preview server");
737
- }
931
+ },
932
+ routes: routes$1,
933
+ controllers: controllers$1,
934
+ services: services$1
738
935
  };
739
936
  };
740
937
  const preview = getFeature();
938
+ const register = async ({ strapi: strapi2 }) => {
939
+ await history.register?.({ strapi: strapi2 });
940
+ await preview.register?.({ strapi: strapi2 });
941
+ };
942
+ const ALLOWED_WEBHOOK_EVENTS = {
943
+ ENTRY_PUBLISH: "entry.publish",
944
+ ENTRY_UNPUBLISH: "entry.unpublish"
945
+ };
741
946
  const bootstrap = async () => {
742
947
  Object.entries(ALLOWED_WEBHOOK_EVENTS).forEach(([key, value]) => {
743
948
  strapi.get("webhookStore").addAllowedEvent(key, value);
744
949
  });
745
- getService$1("field-sizes").setCustomFieldInputSizes();
746
- await getService$1("components").syncConfigurations();
747
- await getService$1("content-types").syncConfigurations();
748
- await getService$1("permission").registerPermissions();
950
+ getService$2("field-sizes").setCustomFieldInputSizes();
951
+ await getService$2("components").syncConfigurations();
952
+ await getService$2("content-types").syncConfigurations();
953
+ await getService$2("permission").registerPermissions();
749
954
  await history.bootstrap?.({ strapi });
750
955
  await preview.bootstrap?.({ strapi });
751
956
  };
@@ -1237,7 +1442,8 @@ const admin = {
1237
1442
  };
1238
1443
  const routes = {
1239
1444
  admin,
1240
- ...history.routes ? history.routes : {}
1445
+ ...history.routes ? history.routes : {},
1446
+ ...preview.routes ? preview.routes : {}
1241
1447
  };
1242
1448
  const hasPermissionsSchema = strapiUtils.yup.object({
1243
1449
  actions: strapiUtils.yup.array().of(strapiUtils.yup.string()),
@@ -1494,7 +1700,7 @@ const createMetadasSchema = (schema) => {
1494
1700
  if (!value) {
1495
1701
  return strapiUtils.yup.string();
1496
1702
  }
1497
- const targetSchema = getService$1("content-types").findContentType(
1703
+ const targetSchema = getService$2("content-types").findContentType(
1498
1704
  schema.attributes[key].targetModel
1499
1705
  );
1500
1706
  if (!targetSchema) {
@@ -1663,7 +1869,7 @@ const getDocumentLocaleAndStatus = async (request, model, opts = { allowMultiple
1663
1869
  }
1664
1870
  };
1665
1871
  const formatDocumentWithMetadata = async (permissionChecker2, uid2, document, opts = {}) => {
1666
- const documentMetadata2 = getService$1("document-metadata");
1872
+ const documentMetadata2 = getService$2("document-metadata");
1667
1873
  const serviceOutput = await documentMetadata2.formatDocumentWithMetadata(uid2, document, opts);
1668
1874
  let {
1669
1875
  meta: { availableLocales, availableStatus }
@@ -1689,8 +1895,8 @@ const createDocument = async (ctx, opts) => {
1689
1895
  const { userAbility, user } = ctx.state;
1690
1896
  const { model } = ctx.params;
1691
1897
  const { body } = ctx.request;
1692
- const documentManager2 = getService$1("document-manager");
1693
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1898
+ const documentManager2 = getService$2("document-manager");
1899
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1694
1900
  if (permissionChecker2.cannot.create()) {
1695
1901
  throw new strapiUtils.errors.ForbiddenError();
1696
1902
  }
@@ -1710,13 +1916,13 @@ const updateDocument = async (ctx, opts) => {
1710
1916
  const { userAbility, user } = ctx.state;
1711
1917
  const { id, model } = ctx.params;
1712
1918
  const { body } = ctx.request;
1713
- const documentManager2 = getService$1("document-manager");
1714
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1919
+ const documentManager2 = getService$2("document-manager");
1920
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1715
1921
  if (permissionChecker2.cannot.update()) {
1716
1922
  throw new strapiUtils.errors.ForbiddenError();
1717
1923
  }
1718
1924
  const permissionQuery = await permissionChecker2.sanitizedQuery.update(ctx.query);
1719
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
1925
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1720
1926
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1721
1927
  const [documentVersion, documentExists] = await Promise.all([
1722
1928
  documentManager2.findOne(id, model, { populate, locale, status: "draft" }),
@@ -1747,14 +1953,14 @@ const collectionTypes = {
1747
1953
  const { userAbility } = ctx.state;
1748
1954
  const { model } = ctx.params;
1749
1955
  const { query } = ctx.request;
1750
- const documentMetadata2 = getService$1("document-metadata");
1751
- const documentManager2 = getService$1("document-manager");
1752
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1956
+ const documentMetadata2 = getService$2("document-metadata");
1957
+ const documentManager2 = getService$2("document-manager");
1958
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1753
1959
  if (permissionChecker2.cannot.read()) {
1754
1960
  return ctx.forbidden();
1755
1961
  }
1756
1962
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(query);
1757
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(1).countRelations({ toOne: false, toMany: true }).build();
1963
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(1).countRelations({ toOne: false, toMany: true }).build();
1758
1964
  const { locale, status } = await getDocumentLocaleAndStatus(query, model);
1759
1965
  const { results: documents, pagination } = await documentManager2.findPage(
1760
1966
  { ...permissionQuery, populate, locale, status },
@@ -1783,13 +1989,13 @@ const collectionTypes = {
1783
1989
  async findOne(ctx) {
1784
1990
  const { userAbility } = ctx.state;
1785
1991
  const { model, id } = ctx.params;
1786
- const documentManager2 = getService$1("document-manager");
1787
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
1992
+ const documentManager2 = getService$2("document-manager");
1993
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1788
1994
  if (permissionChecker2.cannot.read()) {
1789
1995
  return ctx.forbidden();
1790
1996
  }
1791
1997
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
1792
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1998
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1793
1999
  const { locale, status } = await getDocumentLocaleAndStatus(ctx.query, model);
1794
2000
  const version = await documentManager2.findOne(id, model, {
1795
2001
  populate,
@@ -1820,7 +2026,7 @@ const collectionTypes = {
1820
2026
  async create(ctx) {
1821
2027
  const { userAbility } = ctx.state;
1822
2028
  const { model } = ctx.params;
1823
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2029
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1824
2030
  const [totalEntries, document] = await Promise.all([
1825
2031
  strapi.db.query(model).count(),
1826
2032
  createDocument(ctx)
@@ -1841,7 +2047,7 @@ const collectionTypes = {
1841
2047
  async update(ctx) {
1842
2048
  const { userAbility } = ctx.state;
1843
2049
  const { model } = ctx.params;
1844
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2050
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1845
2051
  const updatedVersion = await updateDocument(ctx);
1846
2052
  const sanitizedVersion = await permissionChecker2.sanitizeOutput(updatedVersion);
1847
2053
  ctx.body = await formatDocumentWithMetadata(permissionChecker2, model, sanitizedVersion);
@@ -1850,13 +2056,13 @@ const collectionTypes = {
1850
2056
  const { userAbility, user } = ctx.state;
1851
2057
  const { model, sourceId: id } = ctx.params;
1852
2058
  const { body } = ctx.request;
1853
- const documentManager2 = getService$1("document-manager");
1854
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2059
+ const documentManager2 = getService$2("document-manager");
2060
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1855
2061
  if (permissionChecker2.cannot.create()) {
1856
2062
  return ctx.forbidden();
1857
2063
  }
1858
2064
  const permissionQuery = await permissionChecker2.sanitizedQuery.create(ctx.query);
1859
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2065
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1860
2066
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1861
2067
  const document = await documentManager2.findOne(id, model, {
1862
2068
  populate,
@@ -1895,13 +2101,13 @@ const collectionTypes = {
1895
2101
  async delete(ctx) {
1896
2102
  const { userAbility } = ctx.state;
1897
2103
  const { id, model } = ctx.params;
1898
- const documentManager2 = getService$1("document-manager");
1899
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2104
+ const documentManager2 = getService$2("document-manager");
2105
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1900
2106
  if (permissionChecker2.cannot.delete()) {
1901
2107
  return ctx.forbidden();
1902
2108
  }
1903
2109
  const permissionQuery = await permissionChecker2.sanitizedQuery.delete(ctx.query);
1904
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2110
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
1905
2111
  const { locale } = await getDocumentLocaleAndStatus(ctx.query, model);
1906
2112
  const documentLocales = await documentManager2.findLocales(id, model, { populate, locale });
1907
2113
  if (documentLocales.length === 0) {
@@ -1923,14 +2129,14 @@ const collectionTypes = {
1923
2129
  const { userAbility } = ctx.state;
1924
2130
  const { id, model } = ctx.params;
1925
2131
  const { body } = ctx.request;
1926
- const documentManager2 = getService$1("document-manager");
1927
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2132
+ const documentManager2 = getService$2("document-manager");
2133
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1928
2134
  if (permissionChecker2.cannot.publish()) {
1929
2135
  return ctx.forbidden();
1930
2136
  }
1931
2137
  const publishedDocument = await strapi.db.transaction(async () => {
1932
2138
  const permissionQuery = await permissionChecker2.sanitizedQuery.publish(ctx.query);
1933
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
2139
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1934
2140
  let document;
1935
2141
  const { locale } = await getDocumentLocaleAndStatus(body, model);
1936
2142
  const isCreate = fp.isNil(id);
@@ -1978,13 +2184,13 @@ const collectionTypes = {
1978
2184
  const { body } = ctx.request;
1979
2185
  const { documentIds } = body;
1980
2186
  await validateBulkActionInput(body);
1981
- const documentManager2 = getService$1("document-manager");
1982
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2187
+ const documentManager2 = getService$2("document-manager");
2188
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
1983
2189
  if (permissionChecker2.cannot.publish()) {
1984
2190
  return ctx.forbidden();
1985
2191
  }
1986
2192
  const permissionQuery = await permissionChecker2.sanitizedQuery.publish(ctx.query);
1987
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
2193
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).populateDeep(Infinity).countRelations().build();
1988
2194
  const { locale } = await getDocumentLocaleAndStatus(body, model, {
1989
2195
  allowMultipleLocales: true
1990
2196
  });
@@ -2009,8 +2215,8 @@ const collectionTypes = {
2009
2215
  const { body } = ctx.request;
2010
2216
  const { documentIds } = body;
2011
2217
  await validateBulkActionInput(body);
2012
- const documentManager2 = getService$1("document-manager");
2013
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2218
+ const documentManager2 = getService$2("document-manager");
2219
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2014
2220
  if (permissionChecker2.cannot.unpublish()) {
2015
2221
  return ctx.forbidden();
2016
2222
  }
@@ -2039,8 +2245,8 @@ const collectionTypes = {
2039
2245
  const {
2040
2246
  body: { discardDraft, ...body }
2041
2247
  } = ctx.request;
2042
- const documentManager2 = getService$1("document-manager");
2043
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2248
+ const documentManager2 = getService$2("document-manager");
2249
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2044
2250
  if (permissionChecker2.cannot.unpublish()) {
2045
2251
  return ctx.forbidden();
2046
2252
  }
@@ -2048,7 +2254,7 @@ const collectionTypes = {
2048
2254
  return ctx.forbidden();
2049
2255
  }
2050
2256
  const permissionQuery = await permissionChecker2.sanitizedQuery.unpublish(ctx.query);
2051
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2257
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2052
2258
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2053
2259
  const document = await documentManager2.findOne(id, model, {
2054
2260
  populate,
@@ -2079,13 +2285,13 @@ const collectionTypes = {
2079
2285
  const { userAbility } = ctx.state;
2080
2286
  const { id, model } = ctx.params;
2081
2287
  const { body } = ctx.request;
2082
- const documentManager2 = getService$1("document-manager");
2083
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2288
+ const documentManager2 = getService$2("document-manager");
2289
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2084
2290
  if (permissionChecker2.cannot.discard()) {
2085
2291
  return ctx.forbidden();
2086
2292
  }
2087
2293
  const permissionQuery = await permissionChecker2.sanitizedQuery.discard(ctx.query);
2088
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2294
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2089
2295
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2090
2296
  const document = await documentManager2.findOne(id, model, {
2091
2297
  populate,
@@ -2110,13 +2316,13 @@ const collectionTypes = {
2110
2316
  const { query, body } = ctx.request;
2111
2317
  const { documentIds } = body;
2112
2318
  await validateBulkActionInput(body);
2113
- const documentManager2 = getService$1("document-manager");
2114
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2319
+ const documentManager2 = getService$2("document-manager");
2320
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2115
2321
  if (permissionChecker2.cannot.delete()) {
2116
2322
  return ctx.forbidden();
2117
2323
  }
2118
2324
  const permissionQuery = await permissionChecker2.sanitizedQuery.delete(query);
2119
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2325
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2120
2326
  const { locale } = await getDocumentLocaleAndStatus(body, model);
2121
2327
  const documentLocales = await documentManager2.findLocales(documentIds, model, {
2122
2328
  populate,
@@ -2137,13 +2343,13 @@ const collectionTypes = {
2137
2343
  async countDraftRelations(ctx) {
2138
2344
  const { userAbility } = ctx.state;
2139
2345
  const { model, id } = ctx.params;
2140
- const documentManager2 = getService$1("document-manager");
2141
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2346
+ const documentManager2 = getService$2("document-manager");
2347
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2142
2348
  if (permissionChecker2.cannot.read()) {
2143
2349
  return ctx.forbidden();
2144
2350
  }
2145
2351
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
2146
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2352
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2147
2353
  const { locale, status } = await getDocumentLocaleAndStatus(ctx.query, model);
2148
2354
  const entity = await documentManager2.findOne(id, model, { populate, locale, status });
2149
2355
  if (!entity) {
@@ -2162,8 +2368,8 @@ const collectionTypes = {
2162
2368
  const ids = ctx.request.query.documentIds;
2163
2369
  const locale = ctx.request.query.locale;
2164
2370
  const { model } = ctx.params;
2165
- const documentManager2 = getService$1("document-manager");
2166
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2371
+ const documentManager2 = getService$2("document-manager");
2372
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2167
2373
  if (permissionChecker2.cannot.read()) {
2168
2374
  return ctx.forbidden();
2169
2375
  }
@@ -2187,13 +2393,13 @@ const collectionTypes = {
2187
2393
  };
2188
2394
  const components$1 = {
2189
2395
  findComponents(ctx) {
2190
- const components2 = getService$1("components").findAllComponents();
2191
- const { toDto } = getService$1("data-mapper");
2396
+ const components2 = getService$2("components").findAllComponents();
2397
+ const { toDto } = getService$2("data-mapper");
2192
2398
  ctx.body = { data: components2.map(toDto) };
2193
2399
  },
2194
2400
  async findComponentConfiguration(ctx) {
2195
2401
  const { uid: uid2 } = ctx.params;
2196
- const componentService = getService$1("components");
2402
+ const componentService = getService$2("components");
2197
2403
  const component = componentService.findComponent(uid2);
2198
2404
  if (!component) {
2199
2405
  return ctx.notFound("component.notFound");
@@ -2210,7 +2416,7 @@ const components$1 = {
2210
2416
  async updateComponentConfiguration(ctx) {
2211
2417
  const { uid: uid2 } = ctx.params;
2212
2418
  const { body } = ctx.request;
2213
- const componentService = getService$1("components");
2419
+ const componentService = getService$2("components");
2214
2420
  const component = componentService.findComponent(uid2);
2215
2421
  if (!component) {
2216
2422
  return ctx.notFound("component.notFound");
@@ -2244,12 +2450,12 @@ const contentTypes = {
2244
2450
  } catch (error) {
2245
2451
  return ctx.send({ error }, 400);
2246
2452
  }
2247
- const contentTypes2 = getService$1("content-types").findContentTypesByKind(kind);
2248
- const { toDto } = getService$1("data-mapper");
2453
+ const contentTypes2 = getService$2("content-types").findContentTypesByKind(kind);
2454
+ const { toDto } = getService$2("data-mapper");
2249
2455
  ctx.body = { data: contentTypes2.map(toDto) };
2250
2456
  },
2251
2457
  async findContentTypesSettings(ctx) {
2252
- const { findAllContentTypes, findConfiguration } = getService$1("content-types");
2458
+ const { findAllContentTypes, findConfiguration } = getService$2("content-types");
2253
2459
  const contentTypes2 = await findAllContentTypes();
2254
2460
  const configurations = await Promise.all(
2255
2461
  contentTypes2.map(async (contentType) => {
@@ -2263,7 +2469,7 @@ const contentTypes = {
2263
2469
  },
2264
2470
  async findContentTypeConfiguration(ctx) {
2265
2471
  const { uid: uid2 } = ctx.params;
2266
- const contentTypeService = getService$1("content-types");
2472
+ const contentTypeService = getService$2("content-types");
2267
2473
  const contentType = await contentTypeService.findContentType(uid2);
2268
2474
  if (!contentType) {
2269
2475
  return ctx.notFound("contentType.notFound");
@@ -2285,13 +2491,13 @@ const contentTypes = {
2285
2491
  const { userAbility } = ctx.state;
2286
2492
  const { uid: uid2 } = ctx.params;
2287
2493
  const { body } = ctx.request;
2288
- const contentTypeService = getService$1("content-types");
2289
- const metricsService = getService$1("metrics");
2494
+ const contentTypeService = getService$2("content-types");
2495
+ const metricsService = getService$2("metrics");
2290
2496
  const contentType = await contentTypeService.findContentType(uid2);
2291
2497
  if (!contentType) {
2292
2498
  return ctx.notFound("contentType.notFound");
2293
2499
  }
2294
- if (!getService$1("permission").canConfigureContentType({ userAbility, contentType })) {
2500
+ if (!getService$2("permission").canConfigureContentType({ userAbility, contentType })) {
2295
2501
  return ctx.forbidden();
2296
2502
  }
2297
2503
  let input;
@@ -2324,10 +2530,10 @@ const contentTypes = {
2324
2530
  };
2325
2531
  const init = {
2326
2532
  getInitData(ctx) {
2327
- const { toDto } = getService$1("data-mapper");
2328
- const { findAllComponents } = getService$1("components");
2329
- const { getAllFieldSizes } = getService$1("field-sizes");
2330
- const { findAllContentTypes } = getService$1("content-types");
2533
+ const { toDto } = getService$2("data-mapper");
2534
+ const { findAllComponents } = getService$2("components");
2535
+ const { getAllFieldSizes } = getService$2("field-sizes");
2536
+ const { findAllContentTypes } = getService$2("content-types");
2331
2537
  ctx.body = {
2332
2538
  data: {
2333
2539
  fieldSizes: getAllFieldSizes(),
@@ -2363,7 +2569,7 @@ const addFiltersClause = (params, filtersClause) => {
2363
2569
  params.filters.$and.push(filtersClause);
2364
2570
  };
2365
2571
  const sanitizeMainField = (model, mainField, userAbility) => {
2366
- const permissionChecker2 = getService$1("permission-checker").create({
2572
+ const permissionChecker2 = getService$2("permission-checker").create({
2367
2573
  userAbility,
2368
2574
  model: model.uid
2369
2575
  });
@@ -2381,7 +2587,7 @@ const addStatusToRelations = async (targetUid, relations2) => {
2381
2587
  if (!strapiUtils.contentTypes.hasDraftAndPublish(strapi.getModel(targetUid))) {
2382
2588
  return relations2;
2383
2589
  }
2384
- const documentMetadata2 = getService$1("document-metadata");
2590
+ const documentMetadata2 = getService$2("document-metadata");
2385
2591
  if (!relations2.length) {
2386
2592
  return relations2;
2387
2593
  }
@@ -2459,7 +2665,7 @@ const relations = {
2459
2665
  ctx.request?.query?.locale
2460
2666
  );
2461
2667
  const { status } = validateStatus(sourceUid, ctx.request?.query?.status);
2462
- const permissionChecker2 = getService$1("permission-checker").create({
2668
+ const permissionChecker2 = getService$2("permission-checker").create({
2463
2669
  userAbility,
2464
2670
  model
2465
2671
  });
@@ -2484,7 +2690,7 @@ const relations = {
2484
2690
  where.id = id;
2485
2691
  }
2486
2692
  const permissionQuery = await permissionChecker2.sanitizedQuery.read(ctx.query);
2487
- const populate = await getService$1("populate-builder")(model).populateFromQuery(permissionQuery).build();
2693
+ const populate = await getService$2("populate-builder")(model).populateFromQuery(permissionQuery).build();
2488
2694
  const currentEntity = await strapi.db.query(model).findOne({
2489
2695
  where,
2490
2696
  populate
@@ -2499,7 +2705,7 @@ const relations = {
2499
2705
  }
2500
2706
  entryId = currentEntity.id;
2501
2707
  }
2502
- const modelConfig = isComponent2 ? await getService$1("components").findConfiguration(sourceSchema) : await getService$1("content-types").findConfiguration(sourceSchema);
2708
+ const modelConfig = isComponent2 ? await getService$2("components").findConfiguration(sourceSchema) : await getService$2("content-types").findConfiguration(sourceSchema);
2503
2709
  const targetSchema = strapi.getModel(targetUid);
2504
2710
  const mainField = fp.flow(
2505
2711
  fp.prop(`metadatas.${targetField}.edit.mainField`),
@@ -2553,7 +2759,7 @@ const relations = {
2553
2759
  }
2554
2760
  } = await this.extractAndValidateRequestInfo(ctx, id);
2555
2761
  const { idsToOmit, idsToInclude, _q, ...query } = ctx.request.query;
2556
- const permissionChecker2 = getService$1("permission-checker").create({
2762
+ const permissionChecker2 = getService$2("permission-checker").create({
2557
2763
  userAbility: ctx.state.userAbility,
2558
2764
  model: targetUid
2559
2765
  });
@@ -2632,7 +2838,7 @@ const relations = {
2632
2838
  } = await this.extractAndValidateRequestInfo(ctx, id);
2633
2839
  const { uid: sourceUid } = sourceSchema;
2634
2840
  const { uid: targetUid } = targetSchema;
2635
- const permissionQuery = await getService$1("permission-checker").create({ userAbility, model: targetUid }).sanitizedQuery.read({ fields: fieldsToSelect });
2841
+ const permissionQuery = await getService$2("permission-checker").create({ userAbility, model: targetUid }).sanitizedQuery.read({ fields: fieldsToSelect });
2636
2842
  const dbQuery = strapi.db.query(sourceUid);
2637
2843
  const loadRelations = strapiUtils.relations.isAnyToMany(attribute) ? (...args) => dbQuery.loadPages(...args) : (...args) => dbQuery.load(...args).then((res2) => ({ results: res2 ? [res2] : [] }));
2638
2844
  const filters = {};
@@ -2673,10 +2879,10 @@ const relations = {
2673
2879
  }
2674
2880
  };
2675
2881
  const buildPopulateFromQuery = async (query, model) => {
2676
- return getService$1("populate-builder")(model).populateFromQuery(query).populateDeep(Infinity).countRelations().build();
2882
+ return getService$2("populate-builder")(model).populateFromQuery(query).populateDeep(Infinity).countRelations().build();
2677
2883
  };
2678
2884
  const findDocument = async (query, uid2, opts = {}) => {
2679
- const documentManager2 = getService$1("document-manager");
2885
+ const documentManager2 = getService$2("document-manager");
2680
2886
  const populate = await buildPopulateFromQuery(query, uid2);
2681
2887
  return documentManager2.findMany({ ...opts, populate }, uid2).then((documents) => documents[0]);
2682
2888
  };
@@ -2684,8 +2890,8 @@ const createOrUpdateDocument = async (ctx, opts) => {
2684
2890
  const { user, userAbility } = ctx.state;
2685
2891
  const { model } = ctx.params;
2686
2892
  const { body, query } = ctx.request;
2687
- const documentManager2 = getService$1("document-manager");
2688
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2893
+ const documentManager2 = getService$2("document-manager");
2894
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2689
2895
  if (permissionChecker2.cannot.create() && permissionChecker2.cannot.update()) {
2690
2896
  throw new strapiUtils.errors.ForbiddenError();
2691
2897
  }
@@ -2726,7 +2932,7 @@ const singleTypes = {
2726
2932
  const { userAbility } = ctx.state;
2727
2933
  const { model } = ctx.params;
2728
2934
  const { query = {} } = ctx.request;
2729
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2935
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2730
2936
  if (permissionChecker2.cannot.read()) {
2731
2937
  return ctx.forbidden();
2732
2938
  }
@@ -2760,7 +2966,7 @@ const singleTypes = {
2760
2966
  async createOrUpdate(ctx) {
2761
2967
  const { userAbility } = ctx.state;
2762
2968
  const { model } = ctx.params;
2763
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2969
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2764
2970
  const document = await createOrUpdateDocument(ctx);
2765
2971
  const sanitizedDocument = await permissionChecker2.sanitizeOutput(document);
2766
2972
  ctx.body = await formatDocumentWithMetadata(permissionChecker2, model, sanitizedDocument);
@@ -2769,8 +2975,8 @@ const singleTypes = {
2769
2975
  const { userAbility } = ctx.state;
2770
2976
  const { model } = ctx.params;
2771
2977
  const { query = {} } = ctx.request;
2772
- const documentManager2 = getService$1("document-manager");
2773
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
2978
+ const documentManager2 = getService$2("document-manager");
2979
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2774
2980
  if (permissionChecker2.cannot.delete()) {
2775
2981
  return ctx.forbidden();
2776
2982
  }
@@ -2798,8 +3004,8 @@ const singleTypes = {
2798
3004
  const { userAbility } = ctx.state;
2799
3005
  const { model } = ctx.params;
2800
3006
  const { query = {} } = ctx.request;
2801
- const documentManager2 = getService$1("document-manager");
2802
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
3007
+ const documentManager2 = getService$2("document-manager");
3008
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2803
3009
  if (permissionChecker2.cannot.publish()) {
2804
3010
  return ctx.forbidden();
2805
3011
  }
@@ -2827,8 +3033,8 @@ const singleTypes = {
2827
3033
  body: { discardDraft, ...body },
2828
3034
  query = {}
2829
3035
  } = ctx.request;
2830
- const documentManager2 = getService$1("document-manager");
2831
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
3036
+ const documentManager2 = getService$2("document-manager");
3037
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2832
3038
  if (permissionChecker2.cannot.unpublish()) {
2833
3039
  return ctx.forbidden();
2834
3040
  }
@@ -2862,8 +3068,8 @@ const singleTypes = {
2862
3068
  const { userAbility } = ctx.state;
2863
3069
  const { model } = ctx.params;
2864
3070
  const { body, query = {} } = ctx.request;
2865
- const documentManager2 = getService$1("document-manager");
2866
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
3071
+ const documentManager2 = getService$2("document-manager");
3072
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2867
3073
  if (permissionChecker2.cannot.discard()) {
2868
3074
  return ctx.forbidden();
2869
3075
  }
@@ -2886,8 +3092,8 @@ const singleTypes = {
2886
3092
  const { userAbility } = ctx.state;
2887
3093
  const { model } = ctx.params;
2888
3094
  const { query } = ctx.request;
2889
- const documentManager2 = getService$1("document-manager");
2890
- const permissionChecker2 = getService$1("permission-checker").create({ userAbility, model });
3095
+ const documentManager2 = getService$2("document-manager");
3096
+ const permissionChecker2 = getService$2("permission-checker").create({ userAbility, model });
2891
3097
  const { locale } = await getDocumentLocaleAndStatus(query, model);
2892
3098
  if (permissionChecker2.cannot.read()) {
2893
3099
  return ctx.forbidden();
@@ -2911,7 +3117,7 @@ const uid$1 = {
2911
3117
  const { query = {} } = ctx.request;
2912
3118
  const { locale } = await getDocumentLocaleAndStatus(query, contentTypeUID);
2913
3119
  await validateUIDField(contentTypeUID, field);
2914
- const uidService = getService$1("uid");
3120
+ const uidService = getService$2("uid");
2915
3121
  ctx.body = {
2916
3122
  data: await uidService.generateUIDField({ contentTypeUID, field, data, locale })
2917
3123
  };
@@ -2923,7 +3129,7 @@ const uid$1 = {
2923
3129
  const { query = {} } = ctx.request;
2924
3130
  const { locale } = await getDocumentLocaleAndStatus(query, contentTypeUID);
2925
3131
  await validateUIDField(contentTypeUID, field);
2926
- const uidService = getService$1("uid");
3132
+ const uidService = getService$2("uid");
2927
3133
  const isAvailable = await uidService.checkUIDAvailability({
2928
3134
  contentTypeUID,
2929
3135
  field,
@@ -2944,7 +3150,8 @@ const controllers = {
2944
3150
  relations,
2945
3151
  "single-types": singleTypes,
2946
3152
  uid: uid$1,
2947
- ...history.controllers ? history.controllers : {}
3153
+ ...history.controllers ? history.controllers : {},
3154
+ ...preview.controllers ? preview.controllers : {}
2948
3155
  };
2949
3156
  const keys = {
2950
3157
  CONFIGURATION: "configuration"
@@ -3095,12 +3302,12 @@ async function syncMetadatas(configuration, schema) {
3095
3302
  return ___default.default.assign(metasWithDefaults, updatedMetas);
3096
3303
  }
3097
3304
  const getTargetSchema = (targetModel) => {
3098
- return getService$1("content-types").findContentType(targetModel);
3305
+ return getService$2("content-types").findContentType(targetModel);
3099
3306
  };
3100
3307
  const DEFAULT_LIST_LENGTH = 4;
3101
3308
  const MAX_ROW_SIZE = 12;
3102
3309
  const isAllowedFieldSize = (type, size) => {
3103
- const { getFieldSize } = getService$1("field-sizes");
3310
+ const { getFieldSize } = getService$2("field-sizes");
3104
3311
  const fieldSize = getFieldSize(type);
3105
3312
  if (!fieldSize.isResizable && size !== fieldSize.default) {
3106
3313
  return false;
@@ -3108,7 +3315,7 @@ const isAllowedFieldSize = (type, size) => {
3108
3315
  return size <= MAX_ROW_SIZE;
3109
3316
  };
3110
3317
  const getDefaultFieldSize = (attribute) => {
3111
- const { hasFieldSize, getFieldSize } = getService$1("field-sizes");
3318
+ const { hasFieldSize, getFieldSize } = getService$2("field-sizes");
3112
3319
  return getFieldSize(hasFieldSize(attribute.customField) ? attribute.customField : attribute.type).default;
3113
3320
  };
3114
3321
  async function createDefaultLayouts(schema) {
@@ -3143,7 +3350,7 @@ function syncLayouts(configuration, schema) {
3143
3350
  for (const el of row) {
3144
3351
  if (!hasEditableAttribute(schema, el.name))
3145
3352
  continue;
3146
- const { hasFieldSize } = getService$1("field-sizes");
3353
+ const { hasFieldSize } = getService$2("field-sizes");
3147
3354
  const fieldType = hasFieldSize(schema.attributes[el.name].customField) ? schema.attributes[el.name].customField : schema.attributes[el.name].type;
3148
3355
  if (!isAllowedFieldSize(fieldType, el.size)) {
3149
3356
  elementsToReAppend.push(el.name);
@@ -3283,17 +3490,17 @@ const configurationService$1 = createConfigurationService({
3283
3490
  isComponent: true,
3284
3491
  prefix: STORE_KEY_PREFIX,
3285
3492
  getModels() {
3286
- const { toContentManagerModel } = getService$1("data-mapper");
3493
+ const { toContentManagerModel } = getService$2("data-mapper");
3287
3494
  return fp.mapValues(toContentManagerModel, strapi.components);
3288
3495
  }
3289
3496
  });
3290
3497
  const components = ({ strapi: strapi2 }) => ({
3291
3498
  findAllComponents() {
3292
- const { toContentManagerModel } = getService$1("data-mapper");
3499
+ const { toContentManagerModel } = getService$2("data-mapper");
3293
3500
  return Object.values(strapi2.components).map(toContentManagerModel);
3294
3501
  },
3295
3502
  findComponent(uid2) {
3296
- const { toContentManagerModel } = getService$1("data-mapper");
3503
+ const { toContentManagerModel } = getService$2("data-mapper");
3297
3504
  const component = strapi2.components[uid2];
3298
3505
  return fp.isNil(component) ? component : toContentManagerModel(component);
3299
3506
  },
@@ -3344,17 +3551,17 @@ const configurationService = createConfigurationService({
3344
3551
  storeUtils,
3345
3552
  prefix: "content_types",
3346
3553
  getModels() {
3347
- const { toContentManagerModel } = getService$1("data-mapper");
3554
+ const { toContentManagerModel } = getService$2("data-mapper");
3348
3555
  return fp.mapValues(toContentManagerModel, strapi.contentTypes);
3349
3556
  }
3350
3557
  });
3351
3558
  const service = ({ strapi: strapi2 }) => ({
3352
3559
  findAllContentTypes() {
3353
- const { toContentManagerModel } = getService$1("data-mapper");
3560
+ const { toContentManagerModel } = getService$2("data-mapper");
3354
3561
  return Object.values(strapi2.contentTypes).map(toContentManagerModel);
3355
3562
  },
3356
3563
  findContentType(uid2) {
3357
- const { toContentManagerModel } = getService$1("data-mapper");
3564
+ const { toContentManagerModel } = getService$2("data-mapper");
3358
3565
  const contentType = strapi2.contentTypes[uid2];
3359
3566
  return fp.isNil(contentType) ? contentType : toContentManagerModel(contentType);
3360
3567
  },
@@ -3383,7 +3590,7 @@ const service = ({ strapi: strapi2 }) => ({
3383
3590
  return this.findConfiguration(contentType);
3384
3591
  },
3385
3592
  findComponentsConfigurations(contentType) {
3386
- return getService$1("components").findComponentsConfigurations(contentType);
3593
+ return getService$2("components").findComponentsConfigurations(contentType);
3387
3594
  },
3388
3595
  syncConfigurations() {
3389
3596
  return configurationService.syncConfigurations();
@@ -3655,7 +3862,7 @@ const permission = ({ strapi: strapi2 }) => ({
3655
3862
  return userAbility.can(action);
3656
3863
  },
3657
3864
  async registerPermissions() {
3658
- const displayedContentTypes = getService$1("content-types").findDisplayedContentTypes();
3865
+ const displayedContentTypes = getService$2("content-types").findDisplayedContentTypes();
3659
3866
  const contentTypesUids = displayedContentTypes.map(fp.prop("uid"));
3660
3867
  const actions = [
3661
3868
  {
@@ -3931,7 +4138,7 @@ const getQueryPopulate = async (uid2, query) => {
3931
4138
  return populateQuery;
3932
4139
  };
3933
4140
  const buildDeepPopulate = (uid2) => {
3934
- return getService$1("populate-builder")(uid2).populateDeep(Infinity).countRelations().build();
4141
+ return getService$2("populate-builder")(uid2).populateDeep(Infinity).countRelations().build();
3935
4142
  };
3936
4143
  const populateBuilder = (uid2) => {
3937
4144
  let getInitialPopulate = async () => {
@@ -4474,7 +4681,8 @@ const services = {
4474
4681
  permission,
4475
4682
  "populate-builder": populateBuilder$1,
4476
4683
  uid,
4477
- ...history.services ? history.services : {}
4684
+ ...history.services ? history.services : {},
4685
+ ...preview.services ? preview.services : {}
4478
4686
  };
4479
4687
  const index = () => {
4480
4688
  return {