apostrophe 3.13.0 → 3.14.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,33 @@
1
1
  # Changelog
2
2
 
3
+ ## 3.14.2 (2022-02-27)
4
+
5
+ * Hotfix: fixed a bug introduced by 3.14.1 in which non-parked pages could throw an error during the migration to fix replication issues.
6
+
7
+ ## 3.14.1 (2022-02-25)
8
+
9
+ * Hotfix: fixed a bug in which replication across locales did not work properly for parked pages configured via the `_children` feature. A one-time migration is included to reconnect improperly replicated versions of the same parked pages. This runs automatically, no manual action is required. Thanks to [justyna1](https://github.com/justyna13) for identifying the issue.
10
+
11
+ ## 3.14.0 (2022-02-22)
12
+
13
+ ### Adds
14
+
15
+ * To reduce complications for those implementing caching strategies, the CSRF protection cookie now contains a simple constant string, and is not recorded in `req.session`. This is acceptable because the real purpose of the CSRF check is simply to verify that the browser has sent the cookie at all, which it will not allow a cross-origin script to do.
16
+ * As a result of the above, a session cookie is not generated and sent at all unless `req.session` is actually used or a user logs in. Again, this reduces complications for those implementing caching strategies.
17
+ * When logging out, the session cookie is now cleared in the browser. Formerly the session was destroyed on the server side only, which was sufficient for security purposes but could create caching issues.
18
+ * Uses `express-cache-on-demand` lib to make similar and concurrent requests on pieces and pages faster.
19
+ * Frontend build errors now stop app startup in development, and SCSS and JS/Vue build warnings are visible on the terminal console for the first time.
20
+
21
+ ### Fixes
22
+
23
+ * Fixed a bug when editing a page more than once if the page has a relationship to itself, whether directly or indirectly. Widget ids were unnecessarily regenerated in this situation, causing in-context edits after the first to fail to save.
24
+ * Pages no longer emit double `beforeUpdate` and `beforeSave` events.
25
+ * When the home page extends `@apostrophecms/piece-page-type`, the "show page" URLs for individual pieces should not contain two slashes before the piece slug. Thanks to [Martí Bravo](https://github.com/martibravo) for the fix.
26
+ * Fixes transitions between login page and `afterPasswordVerified` login steps.
27
+ * Frontend build errors now stop the `@apostrophecms/asset:build` task properly in production.
28
+ * `start` replaced with `flex-start` to address SCSS warnings.
29
+ * Dead code removal, as a result of following up on JS/Vue build warnings.
30
+
3
31
  ## 3.13.0 - 2022-02-04
4
32
 
5
33
  ### Adds
package/index.js CHANGED
@@ -202,13 +202,15 @@ module.exports = async function(options) {
202
202
  await self.emit('modulesRegistered'); // formerly modulesReady
203
203
  self.apos.schema.validateAllSchemas();
204
204
  self.apos.schema.registerAllSchemas();
205
- await self.apos.migration.migrate(); // emits before and after events, inside the lock
206
- await self.apos.global.insertIfMissing();
207
- await self.apos.page.implementParkAllInDefaultLocale();
208
- await self.apos.doc.replicate(); // emits beforeReplicate and afterReplicate events
209
- // Replicate will have created the parked pages across locales if needed, but we may
210
- // still need to reset parked properties
211
- await self.apos.page.implementParkAllInOtherLocales();
205
+ await self.apos.lock.withLock('@apostrophecms/migration:migrate', async () => {
206
+ await self.apos.migration.migrate(); // emits before and after events, inside the lock
207
+ await self.apos.global.insertIfMissing();
208
+ await self.apos.page.implementParkAllInDefaultLocale();
209
+ await self.apos.doc.replicate(); // emits beforeReplicate and afterReplicate events
210
+ // Replicate will have created the parked pages across locales if needed, but we may
211
+ // still need to reset parked properties
212
+ await self.apos.page.implementParkAllInOtherLocales();
213
+ });
212
214
  await self.emit('ready'); // formerly afterInit
213
215
  if (self.taskRan) {
214
216
  process.exit(0);
@@ -249,15 +249,23 @@ module.exports = {
249
249
  fs.removeSync(`${bundleDir}/${outputFilename}`);
250
250
  const cssPath = `${bundleDir}/${outputFilename}`.replace(/\.js$/, '.css');
251
251
  fs.removeSync(cssPath);
252
- await Promise.promisify(webpackModule)(require(`./lib/webpack/${name}/webpack.config`)(
253
- {
254
- importFile,
255
- modulesDir,
256
- outputPath: bundleDir,
257
- outputFilename
258
- },
259
- self.apos
260
- ));
252
+ const webpack = Promise.promisify(webpackModule);
253
+ const webpackBaseConfig = require(`./lib/webpack/${name}/webpack.config`);
254
+ const webpackInstanceConfig = webpackBaseConfig({
255
+ importFile,
256
+ modulesDir,
257
+ outputPath: bundleDir,
258
+ outputFilename
259
+ }, self.apos);
260
+ const result = await webpack(webpackInstanceConfig);
261
+ if (result.compilation.errors.length) {
262
+ // Throwing a string is appropriate in a command line task
263
+ throw cleanErrors(result.toString('errors'));
264
+ } else if (result.compilation.warnings.length) {
265
+ self.apos.util.warn(result.toString('errors-warnings'));
266
+ } else if (process.env.APOS_WEBPACK_VERBOSE) {
267
+ self.apos.util.info(result.toString('verbose'));
268
+ }
261
269
  if (fs.existsSync(cssPath)) {
262
270
  fs.writeFileSync(cssPath, self.filterCss(fs.readFileSync(cssPath, 'utf8'), {
263
271
  modulesPrefix: `${self.getAssetBaseUrl()}/modules`
@@ -518,6 +526,13 @@ module.exports = {
518
526
  function getComponentName(component, options, i) {
519
527
  return require('path').basename(component).replace(/\.\w+/, '') + (options.enumerateImports ? `_${i}` : '');
520
528
  }
529
+
530
+ function cleanErrors(errors) {
531
+ // Dev experience: remove confusing and inaccurate webpack warning about module loaders
532
+ // when straightforward JS parse errors occur, stackoverflow is full of people
533
+ // confused by this
534
+ return errors.replace(/(ERROR in[\s\S]*?Module parse failed[\s\S]*)You may need an appropriate loader.*/, '$1');
535
+ }
521
536
  }
522
537
  }
523
538
  };
@@ -1005,10 +1005,12 @@ module.exports = {
1005
1005
  async replicate() {
1006
1006
  const localeNames = Object.keys(self.apos.i18n.locales);
1007
1007
  const criteria = [];
1008
- for (const parked of self.apos.page.parked) {
1008
+ self.apos.page.parked.forEach(pushParkedPageAndParkedChildren);
1009
+ function pushParkedPageAndParkedChildren(page) {
1009
1010
  criteria.push({
1010
- parkedId: parked.parkedId
1011
+ parkedId: page.parkedId
1011
1012
  });
1013
+ (page._children || []).forEach(pushParkedPageAndParkedChildren);
1012
1014
  }
1013
1015
  const pieceModules = Object.values(self.apos.modules).filter(module => self.apos.instanceOf(module, '@apostrophecms/piece-type') && module.options.replicate);
1014
1016
  for (const module of pieceModules) {
@@ -1075,7 +1077,13 @@ module.exports = {
1075
1077
  },
1076
1078
  deduplicateWidgetIds(doc) {
1077
1079
  const seen = new Set();
1078
- self.apos.area.walk(doc, area => {
1080
+ self.apos.area.walk(doc, (area, dotPath) => {
1081
+ if (dotPath.includes('_')) {
1082
+ // Ignore relationships so recursive references from a
1083
+ // doc to itself can't result in random regeneration of
1084
+ // widget ids in the doc proper
1085
+ return;
1086
+ }
1079
1087
  for (const widget of area.items || []) {
1080
1088
  if ((!widget._id) || seen.has(widget._id)) {
1081
1089
  widget._id = cuid();
@@ -23,7 +23,6 @@ import { detectDocChange } from 'Modules/@apostrophecms/schema/lib/detectChange'
23
23
  import AposPublishMixin from 'Modules/@apostrophecms/ui/mixins/AposPublishMixin';
24
24
  import AposArchiveMixin from 'Modules/@apostrophecms/ui/mixins/AposArchiveMixin';
25
25
  import AposModifiedMixin from 'Modules/@apostrophecms/ui/mixins/AposModifiedMixin';
26
- import klona from 'klona';
27
26
 
28
27
  export default {
29
28
  name: 'AposDocContextMenu',
@@ -263,12 +262,6 @@ export default {
263
262
  // moduleOptions gives us the action, etc. but here we need the schema
264
263
  // which is always type specific, even for pages so get it ourselves
265
264
  let schema = (apos.modules[this.context.type].schema || []).filter(field => apos.schema.components.fields[field.type]);
266
- if (this.restoreOnly) {
267
- schema = klona(schema);
268
- for (const field of schema) {
269
- field.readOnly = true;
270
- }
271
- }
272
265
  // Archive UI is handled via action buttons
273
266
  schema = schema.filter(field => field.name !== 'archived');
274
267
  return schema;
@@ -77,7 +77,15 @@
77
77
  // rolling: true,
78
78
  // secret: 'you should have a secret',
79
79
  // name: self.apos.shortName + '.sid',
80
- // cookie: {}
80
+ // cookie: {
81
+ // path: '/',
82
+ // httpOnly: true,
83
+ // secure: false,
84
+ // // using 'strict' will confuse users if you link to your site
85
+ // // with the expectation that the user is still logged in on arrival.
86
+ // // 'lax' still protects against CSRF attacks
87
+ // sameSite: 'lax'
88
+ // }
81
89
  // }
82
90
  // ```
83
91
  //
@@ -98,17 +106,16 @@
98
106
  //
99
107
  // ### `csrf`
100
108
  //
101
- // By default, Apostrophe implements Angular-compatible [CSRF protection](https://en.wikipedia.org/wiki/Cross-site_request_forgery)
102
- // via an `XSRF-TOKEN` cookie. The `@apostrophecms/asset` module pushes
103
- // a call to the browser to set a jQuery `ajaxPrefilter` which
104
- // adds an `X-XSRF-TOKEN` header to all requests, which must
105
- // match the cookie. This is effective because code running from
106
- // other sites or iframes will not be able to read the cookie and
107
- // send the header.
109
+ // By default, Apostrophe implements [CSRF protection](https://en.wikipedia.org/wiki/Cross-site_request_forgery)
110
+ // by setting a cookie with the value `csrf`, which all legitimate requests originating fromt he page will send
111
+ // back (see the [same-origin policy](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy)).
112
+ // All modern browsers will refuse to allow a CSRF attacker, such as a malicious `POST`-method `form` tag on a third
113
+ // party site pointing to an Apostrophe site, to send cookies to the Apostrophe site.
108
114
  //
109
115
  // All non-safe HTTP requests (not `GET`, `HEAD`, `OPTIONS` or `TRACE`)
110
- // automatically receive this proection via the csrf middleware, which
111
- // rejects requests in which the CSRF token does not match the header.
116
+ // automatically receive this protection via the csrf middleware, which
117
+ // rejects requests in which the cookie is not present.
118
+ //
112
119
  // If the request was made with a valid api key or bearer token it
113
120
  // bypasses this check.
114
121
  //
@@ -124,12 +131,6 @@
124
131
  // You may need to use this feature when implementing POST form
125
132
  // submissions that do not use AJAX and thus don't send the header.
126
133
  //
127
- // There is also a `minimumExceptions` option, which defaults
128
- // to `[ /login ]`. The login form is the only non-AJAX form
129
- // that ships with Apostrophe. XSRF protection for login forms
130
- // is unnecessary because the password itself is unknown to the
131
- // third party site; it effectively serves as an XSRF token.
132
- //
133
134
  // ### Adding your own middleware
134
135
  //
135
136
  // Use the `middleware` section in your module. That function should
@@ -323,12 +324,11 @@ module.exports = {
323
324
  },
324
325
  ...((self.options.csrf === false) ? {} : {
325
326
  // Angular-compatible CSRF protection middleware. On safe requests (GET, HEAD, OPTIONS, TRACE),
326
- // set the XSRF-TOKEN cookie if missing. On unsafe requests (everything else),
327
- // make sure our jQuery `ajaxPrefilter` set the X-XSRF-TOKEN header to match the
328
- // cookie.
327
+ // set the csrf cookie if missing.
329
328
  //
330
- // This works because if we're running via a script tag or iframe, we won't
331
- // be able to read the cookie.
329
+ // This works because requests not meeting the expectations of the same-origin policy
330
+ // won't be able to send cookies to the origin at all, even though the value is
331
+ // well-known.
332
332
  csrf(req, res, next) {
333
333
  if (req.csrfExempt) {
334
334
  return next();
@@ -426,7 +426,11 @@ module.exports = {
426
426
  _.defaults(sessionOptions.cookie, {
427
427
  path: '/',
428
428
  httpOnly: true,
429
- secure: false
429
+ secure: false,
430
+ // Ensure that Safari follows the same policy as other modern browsers
431
+ // to prevent CSRF attacks. "lax" just means that navigation links
432
+ // leading to the site will receive the cookie, it is not insecure
433
+ sameSite: 'lax'
430
434
  // maxAge is set for us by connect-mongo,
431
435
  // and defaults to 2 weeks
432
436
  });
@@ -506,28 +510,30 @@ module.exports = {
506
510
  // that this URL should be subject to CSRF.
507
511
 
508
512
  csrfWithoutExceptions(req, res, next) {
509
- let token;
510
513
  // OPTIONS request cannot set a cookie, so manipulating the session here
511
514
  // is not helpful. Do not attempt to set XSRF-TOKEN for OPTIONS
512
515
  if (req.method === 'OPTIONS') {
513
516
  return next();
514
517
  }
515
- // Safe request establishes XSRF-TOKEN in session if not set already
518
+ // Safe request establishes CSRF cookie, whose purpose is only to check
519
+ // that the same-origin policy is followed, not to be unique and secure
520
+ // in itself
516
521
  if (req.method === 'GET' || req.method === 'HEAD' || req.method === 'TRACE') {
517
- token = req.session && req.session['XSRF-TOKEN'];
518
- if (!token) {
519
- token = self.apos.util.generateId();
520
- req.session['XSRF-TOKEN'] = token;
521
- }
522
- // Reset the cookie so that if its lifetime somehow detaches from
523
- // that of the session cookie we're still OK
524
- res.cookie(self.apos.csrfCookieName, token);
522
+ // Use the same standard for the session and CSRF cookies
523
+ res.cookie(self.apos.csrfCookieName, 'csrf', {
524
+ // Will inherit sameSite: 'lax', which is important for
525
+ // CSRF protection in Safari
526
+ ...self.sessionOptions.cookie,
527
+ // 1 year (the limit). The value is known, we are relying
528
+ // on SameSite (modern browsers)
529
+ maxAge: 31536000
530
+ });
525
531
  } else {
526
- // All non-safe requests must be preceded by a safe request that establishes
527
- // the CSRF token, both as a cookie and in the session. Otherwise a user who is logged
528
- // in but doesn't currently have a CSRF token is still vulnerable.
529
- // See options.csrfExceptions
530
- if (!req.cookies[self.apos.csrfCookieName] || req.get('X-XSRF-TOKEN') !== req.cookies[self.apos.csrfCookieName] || req.session['XSRF-TOKEN'] !== req.cookies[self.apos.csrfCookieName]) {
532
+ // Check that the request arrived with the CSRF cookie.
533
+ // This isn't meant to be a unique code that no one could guess,
534
+ // but rather a check that the request from the same origin,
535
+ // as cross-origin requests cannot set cookies on our origin at all.
536
+ if (req.cookies[self.apos.csrfCookieName] !== 'csrf') {
531
537
  res.statusCode = 403;
532
538
  return res.send({
533
539
  name: 'forbidden',
@@ -86,9 +86,6 @@ module.exports = {
86
86
  // `parse` (can be 'json` to always parse the response body as JSON, otherwise the response body is
87
87
  // parsed as JSON only if the content-type is application/json)
88
88
  // `headers` (an object containing header names and values)
89
- // `csrf` (if true, which is the default, and the `jar` contains the CSRF cookie for this Apostrophe site
90
- // due to a previous GET request, send it as the X-XSRF-TOKEN header; if a string, send the current value of the cookie of that name
91
- // in the `jar` as the X-XSRF-TOKEN header; if false, disable this feature)
92
89
  // `fullResponse` (if true, return an object with `status`, `headers` and `body`
93
90
  // properties, rather than returning the body directly; the individual `headers` are canonicalized
94
91
  // to lowercase names. If a header appears multiple times an array is returned for it)
@@ -113,9 +110,6 @@ module.exports = {
113
110
  // `parse` (can be 'json` to always parse the response body as JSON, otherwise the response body is
114
111
  // parsed as JSON only if the content-type is application/json)
115
112
  // `headers` (an object containing header names and values)
116
- // `csrf` (if true, which is the default, and the `jar` contains the CSRF cookie for this Apostrophe site
117
- // due to a previous GET request, send it as the X-XSRF-TOKEN header; if a string, send the current value of the cookie of that name
118
- // in the `jar` as the X-XSRF-TOKEN header; if false, disable this feature)
119
113
  // `fullResponse` (if true, return an object with `status`, `headers` and `body`
120
114
  // properties, rather than returning the body directly; the individual `headers` are canonicalized
121
115
  // to lowercase names. If a header appears multiple times an array is returned for it)
@@ -140,9 +134,6 @@ module.exports = {
140
134
  // `parse` (can be 'json` to always parse the response body as JSON, otherwise the response body is
141
135
  // parsed as JSON only if the content-type is application/json)
142
136
  // `headers` (an object containing header names and values)
143
- // `csrf` (if true, which is the default, and the `jar` contains the CSRF cookie for this Apostrophe site
144
- // due to a previous GET request, send it as the X-XSRF-TOKEN header; if a string, send the current value of the cookie of that name
145
- // in the `jar` as the X-XSRF-TOKEN header; if false, disable this feature)
146
137
  // `fullResponse` (if true, return an object with `status`, `headers` and `body`
147
138
  // properties, rather than returning the body directly; the individual `headers` are canonicalized
148
139
  // to lowercase names. If a header appears multiple times an array is returned for it)
@@ -167,9 +158,6 @@ module.exports = {
167
158
  // `parse` (can be 'json` to always parse the response body as JSON, otherwise the response body is
168
159
  // parsed as JSON only if the content-type is application/json)
169
160
  // `headers` (an object containing header names and values)
170
- // `csrf` (if true, which is the default, and the `jar` contains the CSRF cookie for this Apostrophe site
171
- // due to a previous GET request, send it as the X-XSRF-TOKEN header; if a string, send the current value of the cookie of that name
172
- // in the `jar` as the X-XSRF-TOKEN header; if false, disable this feature)
173
161
  // `fullResponse` (if true, return an object with `status`, `headers` and `body`
174
162
  // properties, rather than returning the body directly; the individual `headers` are canonicalized
175
163
  // to lowercase names. If a header appears multiple times an array is returned for it)
@@ -228,14 +216,6 @@ module.exports = {
228
216
  options.headers = options.headers || {};
229
217
  options.headers['Content-Type'] = 'application/x-www-form-urlencoded';
230
218
  }
231
- if ((options.csrf !== false) && options.jar) {
232
- options.headers = options.headers || {};
233
- const cookieName = ((typeof options.csrf) === 'string') ? options.csrf : self.apos.csrfCookieName;
234
- const cookieValue = self.getCookie(options.jar, url, cookieName);
235
- if (cookieValue != null) {
236
- options.headers['x-xsrf-token'] = cookieValue;
237
- }
238
- }
239
219
  const res = await fetch(url, options);
240
220
  let body;
241
221
  if (options.jar) {
@@ -42,6 +42,7 @@ const Passport = require('passport').Passport;
42
42
  const LocalStrategy = require('passport-local');
43
43
  const Promise = require('bluebird');
44
44
  const cuid = require('cuid');
45
+ const expressSession = require('express-session');
45
46
 
46
47
  module.exports = {
47
48
  cascades: [ 'requirements' ],
@@ -133,7 +134,16 @@ module.exports = {
133
134
  return req.session.destroy(callback);
134
135
  })();
135
136
  };
137
+ const cookie = req.session.cookie;
136
138
  await destroySession();
139
+ // Session cookie expiration isn't automatic with `req.session.destroy`.
140
+ // Fix that to reduce challenges for those attempting to implement custom
141
+ // caching strategies at the edge
142
+ // https://github.com/expressjs/session/issues/241
143
+ const expireCookie = new expressSession.Cookie(cookie);
144
+ expireCookie.expires = new Date(0);
145
+ const name = self.apos.modules['@apostrophecms/express'].sessionOptions.name;
146
+ req.res.header('set-cookie', expireCookie.serialize(name, 'deleted'));
137
147
  }
138
148
  },
139
149
  // invokes the `props(req, user)` function for the requirement specified by
@@ -6,8 +6,9 @@
6
6
  :class="themeClass"
7
7
  >
8
8
  <div class="apos-login__wrapper">
9
- <transition name="fade-body">
9
+ <transition name="fade-body" mode="out-in">
10
10
  <div
11
+ key="1"
11
12
  class="apos-login__upper"
12
13
  v-if="loaded && phase === 'beforeSubmit'"
13
14
  >
@@ -18,25 +19,19 @@
18
19
  />
19
20
 
20
21
  <div class="apos-login__body">
21
- <form
22
- @submit.prevent="submit"
23
- >
22
+ <form @submit.prevent="submit">
24
23
  <AposSchema
25
24
  :schema="schema"
26
25
  v-model="doc"
27
26
  />
28
- <!-- Do not ask these components to render without their props,
29
- v-show is not enough -->
30
- <template v-if="loaded">
31
- <Component
32
- v-for="requirement in beforeSubmitRequirements"
33
- :key="requirement.name"
34
- :is="requirement.component"
35
- v-bind="getRequirementProps(requirement.name)"
36
- @done="requirementDone(requirement, $event)"
37
- @block="requirementBlock(requirement)"
38
- />
39
- </template>
27
+ <Component
28
+ v-for="requirement in beforeSubmitRequirements"
29
+ :key="requirement.name"
30
+ :is="requirement.component"
31
+ v-bind="getRequirementProps(requirement.name)"
32
+ @done="requirementDone(requirement, $event)"
33
+ @block="requirementBlock(requirement)"
34
+ />
40
35
  <!-- TODO -->
41
36
  <!-- <a href="#" class="apos-login__link">Forgot Password</a> -->
42
37
  <AposButton
@@ -53,8 +48,9 @@
53
48
  </div>
54
49
  </div>
55
50
  <div
51
+ key="2"
56
52
  class="apos-login__upper"
57
- v-else-if="activeSoloRequirement && !fetchingRequirementProps"
53
+ v-else-if="activeSoloRequirement"
58
54
  >
59
55
  <TheAposLoginHeader
60
56
  :env="context.env"
@@ -64,6 +60,7 @@
64
60
  />
65
61
  <div class="apos-login__body">
66
62
  <Component
63
+ v-if="!fetchingRequirementProps"
67
64
  v-bind="getRequirementProps(activeSoloRequirement.name)"
68
65
  :is="activeSoloRequirement.component"
69
66
  :success="activeSoloRequirement.success"
@@ -392,12 +389,11 @@ function getRequirements() {
392
389
  transition-delay: 0.6s;
393
390
  }
394
391
 
395
- .fade-leave-active {
392
+ .fade-body-leave-active {
396
393
  transition: all 0.25s linear;
397
- transition-delay: 0;
398
394
  }
399
395
 
400
- .fade-body-enter-to,.fade-body-leave {
396
+ .fade-body-enter-to, .fade-body-leave {
401
397
  transform: translateY(0);
402
398
  }
403
399
 
@@ -459,7 +455,7 @@ function getRequirements() {
459
455
  max-width: $login-container;
460
456
  margin: auto;
461
457
  align-items: center;
462
- justify-content: start;
458
+ justify-content: flex-start;
463
459
  }
464
460
 
465
461
  &__project-version {
@@ -50,7 +50,7 @@ export default {
50
50
  display: flex;
51
51
  flex-direction: column;
52
52
  justify-content: center;
53
- align-items: start;
53
+ align-items: flex-start;
54
54
  width: max-content;
55
55
  }
56
56
 
@@ -231,41 +231,36 @@ module.exports = {
231
231
  // Perform the actual migrations. Implementation of
232
232
  // the @apostrophecms/migration:migrate task
233
233
  async migrate(options) {
234
- await self.apos.lock.lock(self.__meta.name);
235
234
  await self.emit('before');
236
- try {
237
- if (self.apos.isNew) {
238
- // Since the site is brand new (zero documents), we may assume
239
- // it requires no migrations. Mark them all as "done" but note
240
- // that they were skipped, just in case we decide that's an issue later
241
- const at = new Date();
242
- // Just in case the db has no documents but did
243
- // start to run migrations on a previous attempt,
244
- // which causes an occasional unique key error if not
245
- // corrected for here
246
- await self.db.removeMany({});
247
- await self.db.insertMany(self.migrations.map(migration => ({
248
- _id: migration.name,
249
- at,
250
- skipped: true
251
- })));
252
- } else {
253
- for (const migration of self.migrations) {
254
- await self.runOne(migration);
255
- }
235
+ if (self.apos.isNew) {
236
+ // Since the site is brand new (zero documents), we may assume
237
+ // it requires no migrations. Mark them all as "done" but note
238
+ // that they were skipped, just in case we decide that's an issue later
239
+ const at = new Date();
240
+ // Just in case the db has no documents but did
241
+ // start to run migrations on a previous attempt,
242
+ // which causes an occasional unique key error if not
243
+ // corrected for here
244
+ await self.db.removeMany({});
245
+ await self.db.insertMany(self.migrations.map(migration => ({
246
+ _id: migration.name,
247
+ at,
248
+ skipped: true
249
+ })));
250
+ } else {
251
+ for (const migration of self.migrations) {
252
+ await self.runOne(migration);
256
253
  }
257
- // In production, this event is emitted only at the end of the migrate command line task.
258
- // In dev it is emitted at every startup after the automatic migration.
259
- //
260
- // Intentionally emitted regardless of whether the site is new or not.
261
- //
262
- // This is the right time to park pages, for instance, because the
263
- // database is guaranteed to be in a stable state, whether because the
264
- // site is new or because migrations ran successfully.
265
- await self.emit('after');
266
- } finally {
267
- await self.apos.lock.unlock(self.__meta.name);
268
254
  }
255
+ // In production, this event is emitted only at the end of the migrate command line task.
256
+ // In dev it is emitted at every startup after the automatic migration.
257
+ //
258
+ // Intentionally emitted regardless of whether the site is new or not.
259
+ //
260
+ // This is the right time to park pages, for instance, because the
261
+ // database is guaranteed to be in a stable state, whether because the
262
+ // site is new or because migrations ran successfully.
263
+ await self.emit('after');
269
264
  },
270
265
  async runOne(migration) {
271
266
  const info = await self.db.findOne({ _id: migration.name });