on-zero 0.1.43 → 0.1.45
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/createPermissions.cjs +6 -1
- package/dist/cjs/createPermissions.js +7 -1
- package/dist/cjs/createPermissions.js.map +1 -1
- package/dist/cjs/createPermissions.native.js +5 -0
- package/dist/cjs/createPermissions.native.js.map +1 -1
- package/dist/cjs/mutations.cjs +2 -2
- package/dist/cjs/mutations.js +2 -2
- package/dist/cjs/mutations.js.map +1 -1
- package/dist/cjs/mutations.native.js +2 -2
- package/dist/cjs/mutations.native.js.map +1 -1
- package/dist/esm/createPermissions.js +7 -1
- package/dist/esm/createPermissions.js.map +1 -1
- package/dist/esm/createPermissions.mjs +6 -1
- package/dist/esm/createPermissions.mjs.map +1 -1
- package/dist/esm/createPermissions.native.js +5 -0
- package/dist/esm/createPermissions.native.js.map +1 -1
- package/dist/esm/mutations.js +2 -2
- package/dist/esm/mutations.js.map +1 -1
- package/dist/esm/mutations.mjs +2 -2
- package/dist/esm/mutations.mjs.map +1 -1
- package/dist/esm/mutations.native.js +2 -2
- package/dist/esm/mutations.native.js.map +1 -1
- package/package.json +2 -2
- package/src/createPermissions.ts +11 -1
- package/src/mutations.ts +2 -2
- package/types/createPermissions.d.ts.map +1 -1
|
@@ -40,8 +40,13 @@ function createPermissions({
|
|
|
40
40
|
if (!tableName) throw new Error("Must use PermissionWhere for buildPermissionQuery");
|
|
41
41
|
const tableSchema = schema.tables[tableName];
|
|
42
42
|
if (!tableSchema) throw new Error("No schema?");
|
|
43
|
-
const primaryKeys = tableSchema.primaryKey
|
|
43
|
+
const primaryKeys = tableSchema.primaryKey;
|
|
44
|
+
let permissionReturn;
|
|
45
|
+
try {
|
|
44
46
|
permissionReturn = permissionWhere(eb, authData);
|
|
47
|
+
} catch (err) {
|
|
48
|
+
return process.env.NODE_ENV === "development" && !(err instanceof import_helpers.EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
49
|
+
}
|
|
45
50
|
if (permissionReturn == null) throw new Error(`No permission defined for ${tableName}`);
|
|
46
51
|
if (permissionReturn === !0) return eb.cmpLit(!0, "=", !0);
|
|
47
52
|
if (permissionReturn === !1) return eb.cmpLit(!0, "=", !1);
|
|
@@ -32,7 +32,13 @@ function createPermissions({
|
|
|
32
32
|
const tableSchema = schema.tables[tableName];
|
|
33
33
|
if (!tableSchema)
|
|
34
34
|
throw new Error("No schema?");
|
|
35
|
-
const primaryKeys = tableSchema.primaryKey
|
|
35
|
+
const primaryKeys = tableSchema.primaryKey;
|
|
36
|
+
let permissionReturn;
|
|
37
|
+
try {
|
|
38
|
+
permissionReturn = permissionWhere(eb, authData);
|
|
39
|
+
} catch (err) {
|
|
40
|
+
return process.env.NODE_ENV === "development" && !(err instanceof import_helpers.EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
41
|
+
}
|
|
36
42
|
if (permissionReturn == null)
|
|
37
43
|
throw new Error(`No permission defined for ${tableName}`);
|
|
38
44
|
if (permissionReturn === !0)
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../src/createPermissions.ts"],
|
|
4
|
-
"mappings": ";;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,qBAAoC,8BAEpC,+BAAyC,4CACzC,wBAA+B,qCAC/B,+BAAsC,4CACtC,eAAuB,oBACvB,eAAkC;AAU3B,SAAS,kBAA6C;AAAA,EAC3D;AAAA,EACA;AAAA,EACA,gBAAgB;AAClB,GAIG;AAQD,WAAS,qBACP,UACA,IACA,iBAEA,SACA,mBACA;AAGA,SAD2B,kBAAkB,SAAS,kBAAkB,cAC9C,UAAU,SAAS;AAC3C,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,UAAM,YAAY,yBAAqB,gCAAkB,eAAe;AAExE,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAAmD;AAGrE,UAAM,cAAc,OAAO,OAAO,SAAS;AAE3C,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,YAAY;AAG9B,UAAM,cAAc,YAAY,
|
|
4
|
+
"mappings": ";;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,qBAAoC,8BAEpC,+BAAyC,4CACzC,wBAA+B,qCAC/B,+BAAsC,4CACtC,eAAuB,oBACvB,eAAkC;AAU3B,SAAS,kBAA6C;AAAA,EAC3D;AAAA,EACA;AAAA,EACA,gBAAgB;AAClB,GAIG;AAQD,WAAS,qBACP,UACA,IACA,iBAEA,SACA,mBACA;AAGA,SAD2B,kBAAkB,SAAS,kBAAkB,cAC9C,UAAU,SAAS;AAC3C,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,UAAM,YAAY,yBAAqB,gCAAkB,eAAe;AAExE,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAAmD;AAGrE,UAAM,cAAc,OAAO,OAAO,SAAS;AAE3C,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,YAAY;AAG9B,UAAM,cAAc,YAAY;AAEhC,QAAI;AACJ,QAAI;AACF,yBAAmB,gBAAgB,IAAI,QAAQ;AAAA,IACjD,SAAS,KAAK;AAEZ,aAAI,QAAQ,IAAI,aAAa,iBAAiB,EAAE,eAAe,+BAC7D,QAAQ,KAAK,gBAAgB,SAAS,WAAW,GAAG,GAE/C,GAAG,OAAO,IAAM,KAAK,EAAK;AAAA,IACnC;AAEA,QAAI,oBAAoB;AACtB,YAAM,IAAI,MAAM,6BAA6B,SAAS,EAAE;AAG1D,QAAI,qBAAqB;AACvB,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,QAAI,qBAAqB;AACvB,aAAO,GAAG,OAAO,IAAM,KAAK,EAAK;AAGnC,UAAM,mBAAgC,CAAC;AAEvC,eAAW,OAAO,aAAa;AAC7B,YAAM,QAAQ,OAAO,WAAY,WAAW,UAAU,QAAQ,GAAG;AACjE,uBAAiB,KAAK,GAAG,IAAI,KAAY,KAAK,CAAC;AAAA,IACjD;AAEA,WAAO,GAAG,IAAI,kBAAkB,GAAG,gBAAgB;AAAA,EACrD;AAEA,QAAM,MAAW,OAAO,OAAO,QAAQ;AAErC,QAAI,gBAAgB,UAAU;AAC5B,YAAM,UAAM,sCAAe,GACrB,gBAAY,gCAAkB,KAAK;AACzC,UAAI,CAAC;AACH,cAAM,IAAI,MAAM,sDAAsD;AAExE,YAAM,iBAAiB,IAAI,IAAI,IAAI,UAAU,WAAW,OAAO,GAAG,OAClE,uDAAyB,GAAG;AAAA,IAC9B;AAAA,EACF;AAEA,iBAAe,iBACb,IACA,UACA,WACA,OACA,KACe;AAGf,SAD6B,kBAAkB,SAAS,kBAAkB,gBAC9C,UAAU,SAAS;AAC7C;AAIF,UAAM,gBADa,qBAAO,EACG,SAAS;AACtC,QAAI,QAAqC;AAEzC,QAAI;AACF,cAAQ,UACL,MAAM,CAAC,OACC,qBAAqB,UAAU,IAAI,OAAO,GAAG,CACrD,EACA,IAAI,OAEP,uBAAO,MAAM,GAAG,IAAI,KAAK,CAAC;AAAA,IAC5B,SAAS,KAAK;AACZ,YAAM,aAAa,GAAG,SAAS,kBAAkB,UAAU,EAAE;AAE7D,UAAI,eAAe,4BAAa;AAC9B,YAAI,MAAM,uCAAgC,UAAU;AACpD,cAAI,QAAQ,IAAI,aAAa,iBAAiB,UAC5C,OAAO;AAAA,OAAM,oDAAsB,KAAK,CAAC,KAErC,IAAI,MAAM,GAAG;AAAA,MACrB;AAEA,YAAM,IAAI,MAAM,4BAA4B,UAAU;AAAA,EAAK,GAAG,EAAE;AAAA,IAClE;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,EACF;AACF;",
|
|
5
5
|
"names": []
|
|
6
6
|
}
|
|
@@ -48,7 +48,12 @@ function createPermissions(param) {
|
|
|
48
48
|
var tableSchema = schema.tables[tableName];
|
|
49
49
|
if (!tableSchema) throw new Error("No schema?");
|
|
50
50
|
var primaryKeys = tableSchema.primaryKey,
|
|
51
|
+
permissionReturn;
|
|
52
|
+
try {
|
|
51
53
|
permissionReturn = permissionWhere(eb, authData);
|
|
54
|
+
} catch (err) {
|
|
55
|
+
return process.env.NODE_ENV === "development" && !_instanceof(err, import_helpers.EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
56
|
+
}
|
|
52
57
|
if (permissionReturn == null) throw new Error(`No permission defined for ${tableName}`);
|
|
53
58
|
if (permissionReturn === !0) return eb.cmpLit(!0, "=", !0);
|
|
54
59
|
if (permissionReturn === !1) return eb.cmpLit(!0, "=", !1);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["__toCommonJS","mod","__copyProps","__defProp","value","createPermissions_exports","__export","createPermissions","module","exports","import_helpers","require","import_didRunPermissionCheck","import_mutatorContext","import_prettyFormatZeroQuery","import_state","import_where","_instanceof","left","right","Symbol","hasInstance","param","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","adminBypassQueries","role","cmpLit","tableName","getWhereTableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","primaryKeyWheres","_iteratorNormalCompletion","_didIteratorError","_iteratorError","_iterator","iterator","_step","next","done","key","push","cmp","
|
|
1
|
+
{"version":3,"names":["__toCommonJS","mod","__copyProps","__defProp","value","createPermissions_exports","__export","createPermissions","module","exports","import_helpers","require","import_didRunPermissionCheck","import_mutatorContext","import_prettyFormatZeroQuery","import_state","import_where","_instanceof","left","right","Symbol","hasInstance","param","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","adminBypassQueries","role","cmpLit","tableName","getWhereTableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","err","process","env","NODE_ENV","EnsureError","console","warn","primaryKeyWheres","_iteratorNormalCompletion","_didIteratorError","_iteratorError","_iterator","iterator","_step","next","done","key","push","cmp","return","and","can","where","obj","ctx","mutatorContext","ensurePermission","tx","setDidRunPermissionCheck","adminBypassMutations","zqlBuilder","getZQL","queryBase","query","one","ensure","run","errorTitle","id"],"sources":["../../src/createPermissions.ts"],"sourcesContent":[null],"mappings":";;;;;;;;;;;;;;;;;;;AAAA,IAAAA,YAAA,GAAAC,GAAA,IAAAC,WAAA,CAAAC,SAAA;EAAAC,KAAA;AAAA,IAAAH,GAAA;AAAA,IAAAI,yBAAA;AAAAC,QAAA,CAAAD,yBAAA;EAAAE,iBAAA,EAAAA,CAAA,KAAAA;AAAA;AAAAC,MAAA,CAAAC,OAAA,GAAAT,YAAoC,CAAAK,yBAEpC;AAcO,IAAAK,cAAS,GAAAC,OAA6C;EAAAC,4BAAA,GAAAD,OAAA;EAAAE,qBAAA,GAAAF,OAAA;EAAAG,4BAAA,GAAAH,OAAA;EAAAI,YAAA,GAAAJ,OAAA;EAAAK,YAAA,GAAAL,OAAA;AAAA,SAC3DM,YAAAC,IAAA,EAAAC,KAAA;EACA,OAAAA,KAAA,mBAAAC,MAAA,UAAAD,KAAA,CAAAC,MAAA,CAAAC,WAAA,MAAAF,KAAA,CAAAC,MAAA,CAAAC,WAAA,EAAAH,IAAA,IAAAA,IAAA,YAAAC,KAAA;AAAA;AAEF,SAIGZ,kBAAAe,KAAA;EAQD;IAAAC,WAAS;IAAAC,MAAA;IAAAC,aAEP;EACA,IAAAH,KAAA;EAOA,SAD2BI,oBAAkBA,CAAAC,QAAS,EAAAC,EAAA,EAAAC,eAAkB,EAAAC,OAC9C,EAAAC,iBAAmB;IAC3C,IAAAC,kBAAiB,GAAMP,aAAS,cAAAA,aAAA;IAGlC,IAAAO,kBAAkB,IAAAL,QAAA,EAAAM,IAAA,KAAqB,SAEvC,OAAKL,EAAA,CAAAM,MAAA;IACH,IAAAC,SAAU,GAAAJ,iBAAM,QAAAf,YAAA,CAAAoB,iBAAmD,EAAAP,eAAA;IAGrE,KAAAM,SAAM,EAEN,MAAK,IAAAE,KAAA;IACH,IAAAC,WAAU,GAAMd,MAAA,CAAAe,MAAY,CAAAJ,SAAA;IAG9B,KAAAG,WAAM,EAEN,MAAI,IAAAD,KAAA;IACJ,IAAIG,WAAA,GAAAF,WAAA,CAAAG,UAAA;MAAAC,gBAAA;IACF;MACFA,gBAAc,GAAAb,eAAA,CAAAD,EAAA,EAAAD,QAAA;IAEZ,SAAIgB,GAAA;MAIN,OAAAC,OAAA,CAAAC,GAAA,CAAAC,QAAA,uBAAA7B,WAAA,CAAA0B,GAAA,EAAAjC,cAAA,CAAAqC,WAAA,KAAAC,OAAA,CAAAC,IAAA,iBAAAd,SAAA,WAAAQ,GAAA,GAAAf,EAAA,CAAAM,MAAA;IAEA;IACE,IAAAQ,gBAAgB,UAGlB,MAAI,IAAAL,KAAA,8BAAqBF,SAAA;IACvB,IAAAO,gBAAiB,KAAM,IAGzB,OAAId,EAAA,CAAAM,MAAA,QAAqB;IACvB,IAAAQ,gBAAiB,KAAM,IAGzB,OAAMd,EAAA,CAAAM,MAAA,QAAiC;IAEvC,IAAAgB,gBAAkB;MAAAC,yBAAa;MAAAC,iBAAA;MAAAC,cAAA;IAC7B;MACA,SAAAC,SAAiB,GAAAd,WAAY,CAAApB,MAAiB,CAACmC,QAAA,KAAAC,KAAA,IAAAL,yBAAA,IAAAK,KAAA,GAAAF,SAAA,CAAAG,IAAA,IAAAC,IAAA,GAAAP,yBAAA;QACjD,IAAAQ,GAAA,GAAAH,KAAA,CAAApD,KAAA;UAAAA,KAAA,UAAA0B,OAAA,eAAAA,OAAA,GAAAA,OAAA,CAAA6B,GAAA;QAEAT,gBAAc,CAAAU,IAAA,CAAAhC,EAAA,CAAAiC,GAAkB,CAAAF,GAAG,EAAAvD,KAAA;MACrC;IAEA,SAAMuC,GAAW;MAEfS,iBAAI,GAAgB,IAAAC,cAAU,GAAAV,GAAA;IAC5B,UAAM;MAEN,IAAI;QACF,CAAAQ,yBAAgB,IAAAG,SAAA,CAAAQ,MAAA,YAAAR,SAAA,CAAAQ,MAAsD;MAExE,UAAM;QAER,IAAAV,iBAAA,EACF,MAAAC,cAAA;MAEA;IASE;IACE,OAAAzB,EAAA,CAAAmC,GAAA,CAAArB,gBAAA,KAAAQ,gBAAA;EAIF;EACA,IAAAc,GAAI,kBAAAA,CAAqCC,KAAA,EAAAC,GAAA;IAEzC,IAAI3C,WAAA;MACF,IAAA4C,GAAA,GAAQ,IAAAtD,qBAEG,CAAAuD,cAAA,GAAqB;QAAAjC,SAAU,GAAI,IAAAnB,YAE3C,CAAIoB,iBAEP,EAAA6B,KAAA;MACF,KAAA9B,SAAc,EACZ,MAAM,IAAAE,KAAA,uDAAuD;MAE7D,MAAIgC,gBAAe,CAAAF,GAAA,CAAAG,EAAA,EAAAH,GAAA,CAAAxC,QAAA,EAAAQ,SAAa,EAAA8B,KAAA,EAAAC,GAAA,OAAAtD,4BAAA,CAAA2D,wBAAA,EAAAJ,GAAA;IAC9B;EACA;EACS,eAAME,iBAAAC,EAAA,EAAA3C,QAAA,EAAAQ,SAAA,EAAsB8B,KAAK,EAACC,GAAA,EAErC;IAAa,IACrBM,oBAAA,GAAA/C,aAAA,cAAAA,aAAA;IAEA,MAAA+C,oBAAgB,IAAA7C,QAAA,EAAAM,IAAA,KAA4B,OAAU;MAAQ,IAAEwC,UAAA,OAAA1D,YAAA,CAAA2D,MAAA;QAAAC,SAAA,GAAAF,UAAA,CAAAtC,SAAA;QAAAyC,KAAA;MAClE;QACFA,KAAA,GAAAD,SAAA,CAAAV,KAAA,WAAArC,EAAA;UAEO,OAAAF,oBAAA,CAAAC,QAAA,EAAAC,EAAA,EAAAqC,KAAA,EAAAC,GAAA;QACL,GAAAW,GAAA,QAAAnE,cAAA,CAAAoE,MAAA,QAAAR,EAAA,CAAAS,GAAA,CAAAH,KAAA;MACA,SAAAjC,GAAA;QACF,IAAAqC,UAAA,MAAA7C,SAAA,kBAAAR,QAAA,EAAAsD,EAAA;QACF,IAAAhE,WAAA,CAAA0B,GAAA,EAAAjC,cAAA,CAAAqC,WAAA","ignoreList":[]}
|
package/dist/cjs/mutations.cjs
CHANGED
|
@@ -63,9 +63,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
63
63
|
const runServerPermissionCheck = async () => {
|
|
64
64
|
(0, import_didRunPermissionCheck.getDidRunPermissionCheck)(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && (await ctx.can(permissions, obj));
|
|
65
65
|
};
|
|
66
|
-
action !== "insert" && (await runServerPermissionCheck());
|
|
66
|
+
action !== "insert" && action !== "upsert" && (await runServerPermissionCheck());
|
|
67
67
|
const existing = mutations2?.[action];
|
|
68
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && (await runServerPermissionCheck());
|
|
68
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && (await runServerPermissionCheck());
|
|
69
69
|
},
|
|
70
70
|
crudMutations = {
|
|
71
71
|
insert: createCRUDMutation("insert"),
|
package/dist/cjs/mutations.js
CHANGED
|
@@ -50,9 +50,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
50
50
|
const runServerPermissionCheck = async () => {
|
|
51
51
|
(0, import_didRunPermissionCheck.getDidRunPermissionCheck)(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && await ctx.can(permissions, obj);
|
|
52
52
|
};
|
|
53
|
-
action !== "insert" && await runServerPermissionCheck();
|
|
53
|
+
action !== "insert" && action !== "upsert" && await runServerPermissionCheck();
|
|
54
54
|
const existing = mutations2?.[action];
|
|
55
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && await runServerPermissionCheck();
|
|
55
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && await runServerPermissionCheck();
|
|
56
56
|
}, crudMutations = {
|
|
57
57
|
insert: createCRUDMutation("insert"),
|
|
58
58
|
update: createCRUDMutation("update"),
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../src/mutations.ts"],
|
|
4
|
-
"mappings": ";;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,mCAAyC,4CACzC,uBAAwC;AAcxC,MAAM,cAAc,8BACd,WAAW,2BAGX,mBAA0D,WAAW,WAAW,MACrF,WAAW,WAAW,IAAI,oBAAI,IAAI,IAE7B,gBACJ,WAAW,QAAQ,MAAM,WAAW,QAAQ,IAAI,oBAAI,IAAI;AAI1D,SAAS,yBACP,WACA,iBACG;AAEH,mBAAiB,IAAI,WAAW,eAAe;AAG/C,QAAM,WAAW,cAAc,IAAI,SAAS;AAC5C,MAAI;AACF,WAAO;AAIT,QAAM,QAAQ,IAAI,MAAM,CAAC,GAAQ;AAAA,IAC/B,IAAI,GAAG,KAAa;AAClB,aAAO,iBAAiB,IAAI,SAAS,IAAI,GAAG;AAAA,IAC9C;AAAA,IACA,UAAU;AACR,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,KAAK,OAAO,IAAI,CAAC;AAAA,IAC3C;AAAA,IACA,yBAAyB,GAAG,KAAa;AACvC,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,UAAI,WAAW,OAAO;AACpB,eAAO,EAAE,YAAY,IAAM,cAAc,IAAM,OAAO,QAAQ,GAAG,EAAE;AAAA,IAEvE;AAAA,IACA,IAAI,GAAG,KAAa;AAClB,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,UAAU;AAAA,IACpC;AAAA,EACF,CAAC;AAED,uBAAc,IAAI,WAAW,KAAK,GAC3B;AACT;AA0DO,SAAS,UAGd,OAA0B,aAAqBA,YAAkC;AACjF,MAAI,aAAa;AACf,UAAM,YAAa,MAAgB,OAAO,MAEpC,qBAAqB,CAAC,WACnB,OAAO,KAAqB,QAAa;AAS9C,YAAM,2BAA2B,YAAY;AAC3C,YAAI,uDAAyB,GAAG,KAM5B,QAAQ,IAAI,qBAAqB,SACnC,MAAM,IAAI,IAAI,aAAa,GAAG;AAAA,MAElC;AAEA,MAAI,WAAW,
|
|
4
|
+
"mappings": ";;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,mCAAyC,4CACzC,uBAAwC;AAcxC,MAAM,cAAc,8BACd,WAAW,2BAGX,mBAA0D,WAAW,WAAW,MACrF,WAAW,WAAW,IAAI,oBAAI,IAAI,IAE7B,gBACJ,WAAW,QAAQ,MAAM,WAAW,QAAQ,IAAI,oBAAI,IAAI;AAI1D,SAAS,yBACP,WACA,iBACG;AAEH,mBAAiB,IAAI,WAAW,eAAe;AAG/C,QAAM,WAAW,cAAc,IAAI,SAAS;AAC5C,MAAI;AACF,WAAO;AAIT,QAAM,QAAQ,IAAI,MAAM,CAAC,GAAQ;AAAA,IAC/B,IAAI,GAAG,KAAa;AAClB,aAAO,iBAAiB,IAAI,SAAS,IAAI,GAAG;AAAA,IAC9C;AAAA,IACA,UAAU;AACR,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,KAAK,OAAO,IAAI,CAAC;AAAA,IAC3C;AAAA,IACA,yBAAyB,GAAG,KAAa;AACvC,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,UAAI,WAAW,OAAO;AACpB,eAAO,EAAE,YAAY,IAAM,cAAc,IAAM,OAAO,QAAQ,GAAG,EAAE;AAAA,IAEvE;AAAA,IACA,IAAI,GAAG,KAAa;AAClB,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,UAAU;AAAA,IACpC;AAAA,EACF,CAAC;AAED,uBAAc,IAAI,WAAW,KAAK,GAC3B;AACT;AA0DO,SAAS,UAGd,OAA0B,aAAqBA,YAAkC;AACjF,MAAI,aAAa;AACf,UAAM,YAAa,MAAgB,OAAO,MAEpC,qBAAqB,CAAC,WACnB,OAAO,KAAqB,QAAa;AAS9C,YAAM,2BAA2B,YAAY;AAC3C,YAAI,uDAAyB,GAAG,KAM5B,QAAQ,IAAI,qBAAqB,SACnC,MAAM,IAAI,IAAI,aAAa,GAAG;AAAA,MAElC;AAEA,MAAI,WAAW,YAAY,WAAW,YACpC,MAAM,yBAAyB;AAIjC,YAAM,WAAWA,aAAY,MAAM;AAEnC,MAAI,WACF,MAAM,SAAS,KAAK,GAAG,IAGvB,MAAM,IAAI,GAAG,OAAO,SAAsB,EAAG,MAAM,EAAE,GAAG,IAGtD,WAAW,YAAY,WAAW,aACpC,MAAM,yBAAyB;AAAA,IAEnC,GAGI,gBAAoC;AAAA,MACxC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,IACrC,GAEM,iBAAiB;AAAA,MACrB,GAAGA;AAAA;AAAA,MAEH,GAAG;AAAA,IACL;AAEA,6DAAwB,WAAW,WAAW,GAGvC,yBAAyB,WAAW,cAAc;AAAA,EAC3D;AAGA,SAAO;AACT;",
|
|
5
5
|
"names": ["mutations"]
|
|
6
6
|
}
|
|
@@ -67,9 +67,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
67
67
|
var runServerPermissionCheck = async function () {
|
|
68
68
|
(0, import_didRunPermissionCheck.getDidRunPermissionCheck)(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && (await ctx.can(permissions, obj));
|
|
69
69
|
};
|
|
70
|
-
action !== "insert" && (await runServerPermissionCheck());
|
|
70
|
+
action !== "insert" && action !== "upsert" && (await runServerPermissionCheck());
|
|
71
71
|
var existing = mutations2?.[action];
|
|
72
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && (await runServerPermissionCheck());
|
|
72
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && (await runServerPermissionCheck());
|
|
73
73
|
};
|
|
74
74
|
},
|
|
75
75
|
crudMutations = {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["__toCommonJS","mod","__copyProps","__defProp","value","mutations_exports","__export","mutations","module","exports","import_didRunPermissionCheck","require","import_modelRegistry","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","_mutationRegistry_get","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","has","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","getDidRunPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":";;;;;;;;;;;;;;;;;;;AAAA,IAAAA,YAAA,GAAAC,GAAA,IAAAC,WAAA,CAAAC,SAAA;EAAAC,KAAA;AAAA,IAAAH,GAAA;AAAA,IAAAI,iBAAA;AAAAC,QAAA,CAAAD,iBAAA;EAAAE,SAAA,EAAAA,CAAA,KAAAA;AAAA;AAAAC,MAAA,CAAAC,OAAA,GAAAT,YAAA,CAAAK,iBAAyC;AAezC,IAAAK,4BAAoB,GAAAC,OAAA,4CACH;EAAAC,oBAGX,GAAAD,OAA0D,4BAAW;EAAWE,WACrF,+BAA0B;EAAAC,QAAI,GAAI,yBAGjC;EAAAC,gBAAmB,GAAMC,UAAW,CAAAH,WAAY,MAAAG,UAAA,CAAAH,WAAQ,uBAAAI,GAAA;EAAAC,aAAA,GAAAF,UAAA,CAAAF,QAAA,MAAAE,UAAA,CAAAF,QAAA,uBAAAG,GAAA;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,IAAAE,QAAM,GAAAL,aAAW,CAAAM,GAAc,CAAAJ,SAAI;EACnC,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,IAAAE,KAAM,OAAQC,KAAI,GAAM,EAAC;IACvBF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,IAAAC,qBAAwB;MAC1B,QAAAA,qBAAA,GAAAd,gBAAA,CAAAS,GAAA,CAAAJ,SAAA,eAAAS,qBAAA,uBAAAA,qBAAA,CAAAD,GAAA;IACA;IACEE,QAAA,EAAM;MACN,IAAAC,OAAO,GAAAhB,gBAAsB,CAAAS,GAAA,CAAAJ,SAAY;MAC3C,OAAAW,OAAA,GAAAC,MAAA,CAAAC,IAAA,CAAAF,OAAA;IACA;IACEG,wBAAgBA,CAAAP,CAAA,EAAAC,GAAA;MAChB,IAAIG,OAAA,GAAAhB,gBAAkB,CAAAS,GAAA,CAAAJ,SAAA;MACpB,IAAAW,OAAS,IAAAH,GAAA,IAAAG,OAAkB,EAE/B;QACII,UAAgB;QAClBC,YAAgB;QAChBhC,KAAO,EAAA2B,OAAU,CAAAH,GAAA;MACnB;IACD;IAEDS,IAAAV,CAAA,EAAAC,GAAA;MAEF,IAAAG,OAAA,GAAAhB,gBAAA,CAAAS,GAAA,CAAAJ,SAAA;MA0DO,OAASW,OAGd,GAAAH,GAA0B,IAAAG,OAAA,GAAqB;IAC/C;EACE;EAYI,OAAAb,aAAM,CAAAI,GAAA,CAAAF,SAAA,EAAAK,KAA2B,GAAAA,KAAY;AAC3C;AAOgC,SAElClB,UAAA+B,KAAA,EAAAC,WAAA,EAAAC,UAAA;EAEA,IAAID,WAAW;IAKf,IAAAnB,SAAM,GAAAkB,KAAW,CAAAG,MAAA,CAAAC,IAAY;MAAAC,kBAAM,YAAAA,CAAAC,MAAA;QAE/B,uBACIC,GAAA,EAASC,GAAA,EAAK;UAYpB,IAAAC,wBAAoC,kBAAAA,CAAA;YACxC,IAAQrC,4BAA2B,CAAAsC,wBAAA,EAAAH,GAAA,KAAAI,OAAA,CAAAC,GAAA,CAAAC,gBAAA,qBAAAN,GAAA,CAAAO,GAAA,CAAAb,WAAA,EAAAO,GAAA;UACnC;UACAF,MAAQ,
|
|
1
|
+
{"version":3,"names":["__toCommonJS","mod","__copyProps","__defProp","value","mutations_exports","__export","mutations","module","exports","import_didRunPermissionCheck","require","import_modelRegistry","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","_mutationRegistry_get","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","has","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","getDidRunPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":";;;;;;;;;;;;;;;;;;;AAAA,IAAAA,YAAA,GAAAC,GAAA,IAAAC,WAAA,CAAAC,SAAA;EAAAC,KAAA;AAAA,IAAAH,GAAA;AAAA,IAAAI,iBAAA;AAAAC,QAAA,CAAAD,iBAAA;EAAAE,SAAA,EAAAA,CAAA,KAAAA;AAAA;AAAAC,MAAA,CAAAC,OAAA,GAAAT,YAAA,CAAAK,iBAAyC;AAezC,IAAAK,4BAAoB,GAAAC,OAAA,4CACH;EAAAC,oBAGX,GAAAD,OAA0D,4BAAW;EAAWE,WACrF,+BAA0B;EAAAC,QAAI,GAAI,yBAGjC;EAAAC,gBAAmB,GAAMC,UAAW,CAAAH,WAAY,MAAAG,UAAA,CAAAH,WAAQ,uBAAAI,GAAA;EAAAC,aAAA,GAAAF,UAAA,CAAAF,QAAA,MAAAE,UAAA,CAAAF,QAAA,uBAAAG,GAAA;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,IAAAE,QAAM,GAAAL,aAAW,CAAAM,GAAc,CAAAJ,SAAI;EACnC,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,IAAAE,KAAM,OAAQC,KAAI,GAAM,EAAC;IACvBF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,IAAAC,qBAAwB;MAC1B,QAAAA,qBAAA,GAAAd,gBAAA,CAAAS,GAAA,CAAAJ,SAAA,eAAAS,qBAAA,uBAAAA,qBAAA,CAAAD,GAAA;IACA;IACEE,QAAA,EAAM;MACN,IAAAC,OAAO,GAAAhB,gBAAsB,CAAAS,GAAA,CAAAJ,SAAY;MAC3C,OAAAW,OAAA,GAAAC,MAAA,CAAAC,IAAA,CAAAF,OAAA;IACA;IACEG,wBAAgBA,CAAAP,CAAA,EAAAC,GAAA;MAChB,IAAIG,OAAA,GAAAhB,gBAAkB,CAAAS,GAAA,CAAAJ,SAAA;MACpB,IAAAW,OAAS,IAAAH,GAAA,IAAAG,OAAkB,EAE/B;QACII,UAAgB;QAClBC,YAAgB;QAChBhC,KAAO,EAAA2B,OAAU,CAAAH,GAAA;MACnB;IACD;IAEDS,IAAAV,CAAA,EAAAC,GAAA;MAEF,IAAAG,OAAA,GAAAhB,gBAAA,CAAAS,GAAA,CAAAJ,SAAA;MA0DO,OAASW,OAGd,GAAAH,GAA0B,IAAAG,OAAA,GAAqB;IAC/C;EACE;EAYI,OAAAb,aAAM,CAAAI,GAAA,CAAAF,SAAA,EAAAK,KAA2B,GAAAA,KAAY;AAC3C;AAOgC,SAElClB,UAAA+B,KAAA,EAAAC,WAAA,EAAAC,UAAA;EAEA,IAAID,WAAW;IAKf,IAAAnB,SAAM,GAAAkB,KAAW,CAAAG,MAAA,CAAAC,IAAY;MAAAC,kBAAM,YAAAA,CAAAC,MAAA;QAE/B,uBACIC,GAAA,EAASC,GAAA,EAAK;UAYpB,IAAAC,wBAAoC,kBAAAA,CAAA;YACxC,IAAQrC,4BAA2B,CAAAsC,wBAAA,EAAAH,GAAA,KAAAI,OAAA,CAAAC,GAAA,CAAAC,gBAAA,qBAAAN,GAAA,CAAAO,GAAA,CAAAb,WAAA,EAAAO,GAAA;UACnC;UACAF,MAAQ,iBAAAA,MAAmB,KAAQ,mBAAAG,wBAAA;UACnC,IAAAxB,QAAQ,GAAAiB,UAAmB,GAAAI,MAAQ;UAG/BrB,QAAA,SAAiBA,QAAA,CAAAsB,GAAA,EAAAC,GAAA,UAAAD,GAAA,CAAAQ,EAAA,CAAAC,MAAA,CAAAlC,SAAA,EAAAwB,MAAA,EAAAE,GAAA,IAAAF,MAAA,iBAAAA,MAAA,yBAAAG,wBAAA;QACrB;MAAG;MAAAQ,aAAA;QAEHC,MAAG,EAAAb,kBAAA;QACLc,MAAA,EAAAd,kBAAA;QAEAe,MAAA,EAAAf,kBAAA;QAIFgB,MAAA,EAAAhB,kBAAA;MAGA;MAAAiB,cAAO;QACT,GAAApB,UAAA","ignoreList":[]}
|
|
@@ -18,7 +18,13 @@ function createPermissions({
|
|
|
18
18
|
const tableSchema = schema.tables[tableName];
|
|
19
19
|
if (!tableSchema)
|
|
20
20
|
throw new Error("No schema?");
|
|
21
|
-
const primaryKeys = tableSchema.primaryKey
|
|
21
|
+
const primaryKeys = tableSchema.primaryKey;
|
|
22
|
+
let permissionReturn;
|
|
23
|
+
try {
|
|
24
|
+
permissionReturn = permissionWhere(eb, authData);
|
|
25
|
+
} catch (err) {
|
|
26
|
+
return process.env.NODE_ENV === "development" && !(err instanceof EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
27
|
+
}
|
|
22
28
|
if (permissionReturn == null)
|
|
23
29
|
throw new Error(`No permission defined for ${tableName}`);
|
|
24
30
|
if (permissionReturn === !0)
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../src/createPermissions.ts"],
|
|
4
|
-
"mappings": "AAAA,SAAS,QAAQ,mBAAmB;AAEpC,SAAS,gCAAgC;AACzC,SAAS,sBAAsB;AAC/B,SAAS,6BAA6B;AACtC,SAAS,cAAc;AACvB,SAAS,yBAAyB;AAU3B,SAAS,kBAA6C;AAAA,EAC3D;AAAA,EACA;AAAA,EACA,gBAAgB;AAClB,GAIG;AAQD,WAAS,qBACP,UACA,IACA,iBAEA,SACA,mBACA;AAGA,SAD2B,kBAAkB,SAAS,kBAAkB,cAC9C,UAAU,SAAS;AAC3C,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,UAAM,YAAY,qBAAqB,kBAAkB,eAAe;AAExE,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAAmD;AAGrE,UAAM,cAAc,OAAO,OAAO,SAAS;AAE3C,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,YAAY;AAG9B,UAAM,cAAc,YAAY,
|
|
4
|
+
"mappings": "AAAA,SAAS,QAAQ,mBAAmB;AAEpC,SAAS,gCAAgC;AACzC,SAAS,sBAAsB;AAC/B,SAAS,6BAA6B;AACtC,SAAS,cAAc;AACvB,SAAS,yBAAyB;AAU3B,SAAS,kBAA6C;AAAA,EAC3D;AAAA,EACA;AAAA,EACA,gBAAgB;AAClB,GAIG;AAQD,WAAS,qBACP,UACA,IACA,iBAEA,SACA,mBACA;AAGA,SAD2B,kBAAkB,SAAS,kBAAkB,cAC9C,UAAU,SAAS;AAC3C,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,UAAM,YAAY,qBAAqB,kBAAkB,eAAe;AAExE,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAAmD;AAGrE,UAAM,cAAc,OAAO,OAAO,SAAS;AAE3C,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,YAAY;AAG9B,UAAM,cAAc,YAAY;AAEhC,QAAI;AACJ,QAAI;AACF,yBAAmB,gBAAgB,IAAI,QAAQ;AAAA,IACjD,SAAS,KAAK;AAEZ,aAAI,QAAQ,IAAI,aAAa,iBAAiB,EAAE,eAAe,gBAC7D,QAAQ,KAAK,gBAAgB,SAAS,WAAW,GAAG,GAE/C,GAAG,OAAO,IAAM,KAAK,EAAK;AAAA,IACnC;AAEA,QAAI,oBAAoB;AACtB,YAAM,IAAI,MAAM,6BAA6B,SAAS,EAAE;AAG1D,QAAI,qBAAqB;AACvB,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,QAAI,qBAAqB;AACvB,aAAO,GAAG,OAAO,IAAM,KAAK,EAAK;AAGnC,UAAM,mBAAgC,CAAC;AAEvC,eAAW,OAAO,aAAa;AAC7B,YAAM,QAAQ,OAAO,WAAY,WAAW,UAAU,QAAQ,GAAG;AACjE,uBAAiB,KAAK,GAAG,IAAI,KAAY,KAAK,CAAC;AAAA,IACjD;AAEA,WAAO,GAAG,IAAI,kBAAkB,GAAG,gBAAgB;AAAA,EACrD;AAEA,QAAM,MAAW,OAAO,OAAO,QAAQ;AAErC,QAAI,gBAAgB,UAAU;AAC5B,YAAM,MAAM,eAAe,GACrB,YAAY,kBAAkB,KAAK;AACzC,UAAI,CAAC;AACH,cAAM,IAAI,MAAM,sDAAsD;AAExE,YAAM,iBAAiB,IAAI,IAAI,IAAI,UAAU,WAAW,OAAO,GAAG,GAClE,yBAAyB,GAAG;AAAA,IAC9B;AAAA,EACF;AAEA,iBAAe,iBACb,IACA,UACA,WACA,OACA,KACe;AAGf,SAD6B,kBAAkB,SAAS,kBAAkB,gBAC9C,UAAU,SAAS;AAC7C;AAIF,UAAM,YADa,OAAO,EACG,SAAS;AACtC,QAAI,QAAqC;AAEzC,QAAI;AACF,cAAQ,UACL,MAAM,CAAC,OACC,qBAAqB,UAAU,IAAI,OAAO,GAAG,CACrD,EACA,IAAI,GAEP,OAAO,MAAM,GAAG,IAAI,KAAK,CAAC;AAAA,IAC5B,SAAS,KAAK;AACZ,YAAM,aAAa,GAAG,SAAS,kBAAkB,UAAU,EAAE;AAE7D,UAAI,eAAe,aAAa;AAC9B,YAAI,MAAM,uCAAgC,UAAU;AACpD,cAAI,QAAQ,IAAI,aAAa,iBAAiB,UAC5C,OAAO;AAAA,GAAM,sBAAsB,KAAK,CAAC,KAErC,IAAI,MAAM,GAAG;AAAA,MACrB;AAEA,YAAM,IAAI,MAAM,4BAA4B,UAAU;AAAA,EAAK,GAAG,EAAE;AAAA,IAClE;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,EACF;AACF;",
|
|
5
5
|
"names": []
|
|
6
6
|
}
|
|
@@ -15,8 +15,13 @@ function createPermissions({
|
|
|
15
15
|
if (!tableName) throw new Error("Must use PermissionWhere for buildPermissionQuery");
|
|
16
16
|
const tableSchema = schema.tables[tableName];
|
|
17
17
|
if (!tableSchema) throw new Error("No schema?");
|
|
18
|
-
const primaryKeys = tableSchema.primaryKey
|
|
18
|
+
const primaryKeys = tableSchema.primaryKey;
|
|
19
|
+
let permissionReturn;
|
|
20
|
+
try {
|
|
19
21
|
permissionReturn = permissionWhere(eb, authData);
|
|
22
|
+
} catch (err) {
|
|
23
|
+
return process.env.NODE_ENV === "development" && !(err instanceof EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
24
|
+
}
|
|
20
25
|
if (permissionReturn == null) throw new Error(`No permission defined for ${tableName}`);
|
|
21
26
|
if (permissionReturn === !0) return eb.cmpLit(!0, "=", !0);
|
|
22
27
|
if (permissionReturn === !1) return eb.cmpLit(!0, "=", !1);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["ensure","EnsureError","setDidRunPermissionCheck","mutatorContext","prettyFormatZeroQuery","getZQL","getWhereTableName","createPermissions","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","role","cmpLit","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","primaryKeyWheres","key","value","push","cmp","and","can","where","obj","ctx","ensurePermission","tx","queryBase","query","one","run","
|
|
1
|
+
{"version":3,"names":["ensure","EnsureError","setDidRunPermissionCheck","mutatorContext","prettyFormatZeroQuery","getZQL","getWhereTableName","createPermissions","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","role","cmpLit","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","err","process","env","NODE_ENV","console","warn","primaryKeyWheres","key","value","push","cmp","and","can","where","obj","ctx","ensurePermission","tx","queryBase","query","one","run","errorTitle","id","msg"],"sources":["../../src/createPermissions.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,MAAA,EAAQC,WAAA,QAAmB;AAEpC,SAASC,wBAAA,QAAgC;AACzC,SAASC,cAAA,QAAsB;AAC/B,SAASC,qBAAA,QAA6B;AACtC,SAASC,MAAA,QAAc;AACvB,SAASC,iBAAA,QAAyB;AAU3B,SAASC,kBAA6C;EAC3DC,WAAA;EACAC,MAAA;EACAC,aAAA,GAAgB;AAClB,GAIG;EAQD,SAASC,qBACPC,QAAA,EACAC,EAAA,EACAC,eAAA,EAEAC,OAAA,EACAC,iBAAA,EACA;IAGA,KAD2BN,aAAA,KAAkB,SAASA,aAAA,KAAkB,cAC9CE,QAAA,EAAUK,IAAA,KAAS,SAC3C,OAAOJ,EAAA,CAAGK,MAAA,CAAO,IAAM,KAAK,EAAI;IAGlC,MAAMC,SAAA,GAAYH,iBAAA,IAAqBV,iBAAA,CAAkBQ,eAAe;IAExE,IAAI,CAACK,SAAA,EACH,MAAM,IAAIC,KAAA,CAAM,mDAAmD;IAGrE,MAAMC,WAAA,GAAcZ,MAAA,CAAOa,MAAA,CAAOH,SAAS;IAE3C,IAAI,CAACE,WAAA,EACH,MAAM,IAAID,KAAA,CAAM,YAAY;IAG9B,MAAMG,WAAA,GAAcF,WAAA,CAAYG,UAAA;IAEhC,IAAIC,gBAAA;IACJ,IAAI;MACFA,gBAAA,GAAmBX,eAAA,CAAgBD,EAAA,EAAID,QAAQ;IACjD,SAASc,GAAA,EAAK;MAEZ,OAAIC,OAAA,CAAQC,GAAA,CAAIC,QAAA,KAAa,iBAAiB,EAAEH,GAAA,YAAezB,WAAA,KAC7D6B,OAAA,CAAQC,IAAA,CAAK,gBAAgBZ,SAAS,WAAWO,GAAG,GAE/Cb,EAAA,CAAGK,MAAA,CAAO,IAAM,KAAK,EAAK;IACnC;IAEA,IAAIO,gBAAA,IAAoB,MACtB,MAAM,IAAIL,KAAA,CAAM,6BAA6BD,SAAS,EAAE;IAG1D,IAAIM,gBAAA,KAAqB,IACvB,OAAOZ,EAAA,CAAGK,MAAA,CAAO,IAAM,KAAK,EAAI;IAGlC,IAAIO,gBAAA,KAAqB,IACvB,OAAOZ,EAAA,CAAGK,MAAA,CAAO,IAAM,KAAK,EAAK;IAGnC,MAAMc,gBAAA,GAAgC,EAAC;IAEvC,WAAWC,GAAA,IAAOV,WAAA,EAAa;MAC7B,MAAMW,KAAA,GAAQ,OAAOnB,OAAA,IAAY,WAAWA,OAAA,GAAUA,OAAA,CAAQkB,GAAG;MACjED,gBAAA,CAAiBG,IAAA,CAAKtB,EAAA,CAAGuB,GAAA,CAAIH,GAAA,EAAYC,KAAK,CAAC;IACjD;IAEA,OAAOrB,EAAA,CAAGwB,GAAA,CAAIZ,gBAAA,EAAkB,GAAGO,gBAAgB;EACrD;EAEA,MAAMM,GAAA,GAAW,MAAAA,CAAOC,KAAA,EAAOC,GAAA,KAAQ;IAErC,IAAIhC,WAAA,KAAgB,UAAU;MAC5B,MAAMiC,GAAA,GAAMtC,cAAA,CAAe;QACrBgB,SAAA,GAAYb,iBAAA,CAAkBiC,KAAK;MACzC,IAAI,CAACpB,SAAA,EACH,MAAM,IAAIC,KAAA,CAAM,sDAAsD;MAExE,MAAMsB,gBAAA,CAAiBD,GAAA,CAAIE,EAAA,EAAIF,GAAA,CAAI7B,QAAA,EAAUO,SAAA,EAAWoB,KAAA,EAAOC,GAAG,GAClEtC,wBAAA,CAAyBuC,GAAG;IAC9B;EACF;EAEA,eAAeC,iBACbC,EAAA,EACA/B,QAAA,EACAO,SAAA,EACAoB,KAAA,EACAC,GAAA,EACe;IAGf,KAD6B9B,aAAA,KAAkB,SAASA,aAAA,KAAkB,gBAC9CE,QAAA,EAAUK,IAAA,KAAS,SAC7C;IAIF,MAAM2B,SAAA,GADavC,MAAA,CAAO,EACGc,SAAS;IACtC,IAAI0B,KAAA,GAAqC;IAEzC,IAAI;MACFA,KAAA,GAAQD,SAAA,CACLL,KAAA,CAAO1B,EAAA,IACCF,oBAAA,CAAqBC,QAAA,EAAUC,EAAA,EAAI0B,KAAA,EAAOC,GAAG,CACrD,EACAM,GAAA,CAAI,GAEP9C,MAAA,CAAO,MAAM2C,EAAA,CAAGI,GAAA,CAAIF,KAAK,CAAC;IAC5B,SAASnB,GAAA,EAAK;MACZ,MAAMsB,UAAA,GAAa,GAAG7B,SAAS,kBAAkBP,QAAA,EAAUqC,EAAE;MAE7D,IAAIvB,GAAA,YAAezB,WAAA,EAAa;QAC9B,IAAIiD,GAAA,GAAM,uCAAgCF,UAAU;QACpD,MAAIrB,OAAA,CAAQC,GAAA,CAAIC,QAAA,KAAa,iBAAiBgB,KAAA,KAC5CK,GAAA,IAAO;AAAA,GAAM9C,qBAAA,CAAsByC,KAAK,CAAC,KAErC,IAAIzB,KAAA,CAAM8B,GAAG;MACrB;MAEA,MAAM,IAAI9B,KAAA,CAAM,4BAA4B4B,UAAU;AAAA,EAAKtB,GAAG,EAAE;IAClE;EACF;EAEA,OAAO;IACLY,GAAA;IACA3B;EACF;AACF","ignoreList":[]}
|
|
@@ -21,7 +21,12 @@ function createPermissions(param) {
|
|
|
21
21
|
var tableSchema = schema.tables[tableName];
|
|
22
22
|
if (!tableSchema) throw new Error("No schema?");
|
|
23
23
|
var primaryKeys = tableSchema.primaryKey,
|
|
24
|
+
permissionReturn;
|
|
25
|
+
try {
|
|
24
26
|
permissionReturn = permissionWhere(eb, authData);
|
|
27
|
+
} catch (err) {
|
|
28
|
+
return process.env.NODE_ENV === "development" && !_instanceof(err, EnsureError) && console.warn(`[permission] ${tableName} threw:`, err), eb.cmpLit(!0, "=", !1);
|
|
29
|
+
}
|
|
25
30
|
if (permissionReturn == null) throw new Error(`No permission defined for ${tableName}`);
|
|
26
31
|
if (permissionReturn === !0) return eb.cmpLit(!0, "=", !0);
|
|
27
32
|
if (permissionReturn === !1) return eb.cmpLit(!0, "=", !1);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["ensure","EnsureError","setDidRunPermissionCheck","mutatorContext","prettyFormatZeroQuery","getZQL","getWhereTableName","_instanceof","left","right","Symbol","hasInstance","createPermissions","param","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","adminBypassQueries","role","cmpLit","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","primaryKeyWheres","_iteratorNormalCompletion","_didIteratorError","_iteratorError","_iterator","iterator","_step","next","done","key","value","push","cmp","
|
|
1
|
+
{"version":3,"names":["ensure","EnsureError","setDidRunPermissionCheck","mutatorContext","prettyFormatZeroQuery","getZQL","getWhereTableName","_instanceof","left","right","Symbol","hasInstance","createPermissions","param","environment","schema","adminRoleMode","buildPermissionQuery","authData","eb","permissionWhere","objOrId","tableNameOverride","adminBypassQueries","role","cmpLit","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionReturn","err","process","env","NODE_ENV","console","warn","primaryKeyWheres","_iteratorNormalCompletion","_didIteratorError","_iteratorError","_iterator","iterator","_step","next","done","key","value","push","cmp","return","and","can","where","obj","ctx","ensurePermission","tx","adminBypassMutations","zqlBuilder","queryBase","query","one","run","errorTitle","id","msg"],"sources":["../../src/createPermissions.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,MAAA,EAAQC,WAAA,QAAmB;AAEpC,SAASC,wBAAA,QAAgC;AACzC,SAASC,cAAA,QAAsB;AAC/B,SAASC,qBAAA,QAA6B;AACtC,SAASC,MAAA,QAAc;AACvB,SAASC,iBAAA,QAAyB;AAU3B,SAASC,YAAAC,IAAA,EAA6CC,KAAA;EAC3D,OAAAA,KAAA,mBAAAC,MAAA,UAAAD,KAAA,CAAAC,MAAA,CAAAC,WAAA,MAAAF,KAAA,CAAAC,MAAA,CAAAC,WAAA,EAAAH,IAAA,IAAAA,IAAA,YAAAC,KAAA;AAAA;AACA,SACAG,iBAAgBA,CAAAC,KAAA;EAClB,IAIG;IAAAC,WAAA;IAAAC,MAAA;IAAAC,aAAA;EAAA,IAAAH,KAAA;EAQD,SAASI,qBACPC,QAAA,EACAC,EAAA,EACAC,eAAA,EAEAC,OAAA,EACAC,iBAAA,EACA;IAGA,IAAAC,kBAD2B,GAAkBP,aAAS,cAAkBA,aAC9C,cAAU;IAClC,IAAAO,kBAAiB,IAAML,QAAS,EAAAM,IAAA,cAGlC,OAAML,EAAA,CAAAM,MAAY;IAElB,IAAIC,SAAC,GAAAJ,iBAAA,IAAAhB,iBAAA,CAAAc,eAAA;IACH,KAAAM,SAAU,EAGZ,MAAM,IAAAC,KAAA,oDAAqC;IAE3C,IAAIC,WAAC,GAAAb,MAAA,CAAAc,MAAA,CAAAH,SAAA;IACH,KAAAE,WAAU,EAGZ,MAAM,IAAAD,KAAA,aAAc;IAEpB,IAAIG,WAAA,GAAAF,WAAA,CAAAG,UAAA;MAAAC,gBAAA;IACJ,IAAI;MACFA,gBAAA,GAAmBZ,eAAA,CAAgBD,EAAA,EAAID,QAAQ;IACjD,SAASe,GAAA,EAAK;MAEZ,OAAIC,OAAA,CAAQC,GAAA,CAAIC,QAAA,KAAa,iBAAiB,CAAA7B,WAAE,CAAA0B,GAAA,EAAehC,WAAA,KAC7DoC,OAAQ,CAAAC,IAAK,iBAAgBZ,SAAS,WAAWO,GAAG,GAE/Cd,EAAG,CAAAM,MAAO,KAAM,KAAK,CAAK;IACnC;IAEA,IAAIO,gBAAA,IAAoB,MACtB,MAAM,IAAIL,KAAA,CAAM,6BAA6BD,SAAS,EAAE;IAG1D,IAAIM,gBAAA,KAAqB,IACvB,OAAOb,EAAA,CAAGM,MAAA,CAAO,IAAM,KAAK,EAAI;IAGlC,IAAIO,gBAAA,KAAqB,IACvB,OAAOb,EAAA,CAAGM,MAAA,CAAO,IAAM,KAAK,EAAK;IAGnC,IAAAc,gBAAM,KAAgC;MAACC,yBAAA;MAAAC,iBAAA;MAAAC,cAAA;IAEvC;MACE,SAAMC,SAAQ,GAAOb,WAAY,CAAApB,MAAA,CAAAkC,QAAW,KAAUC,KAAA,IAAQL,yBAAG,IAAAK,KAAA,GAAAF,SAAA,CAAAG,IAAA,IAAAC,IAAA,GAAAP,yBAAA;QACjE,IAAAQ,GAAA,GAAAH,KAAiB,CAAAI,KAAK;UAAGA,KAAI,UAAkB5B,OAAA,eAAAA,OAAA,GAAAA,OAAA,CAAA2B,GAAA;QACjDT,gBAAA,CAAAW,IAAA,CAAA/B,EAAA,CAAAgC,GAAA,CAAAH,GAAA,EAAAC,KAAA;MAEA;IACF,SAAAhB,GAAA;MAEAQ,iBAAwB,KAAO,EAAAC,cAAQ,GAAAT,GAAA;IAErC,UAAI;MACF;QAEA,CAAAO,yBAAK,IAAAG,SAAA,CAAAS,MAAA,YAAAT,SAAA,CAAAS,MAAA;MACH,UAAM;QAER,IAAMX,iBAAiB,EAEzB,MAAAC,cAAA;MACF;IAEA;IASE,OAD6BvB,EAAA,CAAAkC,GAAA,CAAArB,gBAAkB,EAAS,GAAAO,gBAAkB;EAExE;EAIF,IAAAe,GAAA,GAAM,eAAAA,CADaC,KACU,EAAAC,GAAA;IAC7B,IAAI1C,WAAqC;MAEzC,IAAI2C,GAAA,GAAAtD,cAAA;QAAAuB,SAAA,GAAApB,iBAAA,CAAAiD,KAAA;MACF,KAAA7B,SAAQ,EAOV,MAAS,IAAKC,KAAA;MACZ,MAAM+B,gBAAgB,CAAAD,GAAA,CAAAE,EAAA,EAASF,GAAA,CAAAvC,QAAA,EAAAQ,SAAkB,EAAA6B,KAAY,EAAAC,GAAA,GAAAtD,wBAAA,CAAAuD,GAAA;IAE7D;EACE;EACA,eAAIC,gBAAYA,CAAAC,EAAA,EAAAzC,QAAa,EAAAQ,SAAiB,EAAA6B,KAAA,EAC5CC,GAAA;IAAa,IAAAI,oBAAsB,GAAM5C,aAEjC,KAAS,SAAAA,aAAA;IAAA,IACrB,EAAA4C,oBAAA,IAAA1C,QAAA,EAAAM,IAAA;MAEA,IAAAqC,UAAU,GAAMxD,MAAA;QAAAyD,SAAA,GAAAD,UAA4B,CAAAnC,SAAU;QAAAqC,KAAA;MAAQ,IAAE;QAClEA,KAAA,GAAAD,SAAA,CAAAP,KAAA,WAAApC,EAAA;UACF,OAAAF,oBAAA,CAAAC,QAAA,EAAAC,EAAA,EAAAoC,KAAA,EAAAC,GAAA;QAEA,CAAO,EAAAQ,GAAA,IAAAhE,MAAA,OAAA2D,EAAA,CAAAM,GAAA,CAAAF,KAAA;MACL,SAAA9B,GAAA;QACA,IAAAiC,UAAA,MAAAxC,SAAA,kBAAAR,QAAA,EAAAiD,EAAA;QACF,IAAA5D,WAAA,CAAA0B,GAAA,EAAAhC,WAAA;UACF,IAAAmE,GAAA,0CAAAF,UAAA","ignoreList":[]}
|
package/dist/esm/mutations.js
CHANGED
|
@@ -32,9 +32,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
32
32
|
const runServerPermissionCheck = async () => {
|
|
33
33
|
getDidRunPermissionCheck(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && await ctx.can(permissions, obj);
|
|
34
34
|
};
|
|
35
|
-
action !== "insert" && await runServerPermissionCheck();
|
|
35
|
+
action !== "insert" && action !== "upsert" && await runServerPermissionCheck();
|
|
36
36
|
const existing = mutations2?.[action];
|
|
37
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && await runServerPermissionCheck();
|
|
37
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && await runServerPermissionCheck();
|
|
38
38
|
}, crudMutations = {
|
|
39
39
|
insert: createCRUDMutation("insert"),
|
|
40
40
|
update: createCRUDMutation("update"),
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../src/mutations.ts"],
|
|
4
|
-
"mappings": "AAAA,SAAS,gCAAgC;AACzC,SAAS,+BAA+B;AAcxC,MAAM,cAAc,8BACd,WAAW,2BAGX,mBAA0D,WAAW,WAAW,MACrF,WAAW,WAAW,IAAI,oBAAI,IAAI,IAE7B,gBACJ,WAAW,QAAQ,MAAM,WAAW,QAAQ,IAAI,oBAAI,IAAI;AAI1D,SAAS,yBACP,WACA,iBACG;AAEH,mBAAiB,IAAI,WAAW,eAAe;AAG/C,QAAM,WAAW,cAAc,IAAI,SAAS;AAC5C,MAAI;AACF,WAAO;AAIT,QAAM,QAAQ,IAAI,MAAM,CAAC,GAAQ;AAAA,IAC/B,IAAI,GAAG,KAAa;AAClB,aAAO,iBAAiB,IAAI,SAAS,IAAI,GAAG;AAAA,IAC9C;AAAA,IACA,UAAU;AACR,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,KAAK,OAAO,IAAI,CAAC;AAAA,IAC3C;AAAA,IACA,yBAAyB,GAAG,KAAa;AACvC,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,UAAI,WAAW,OAAO;AACpB,eAAO,EAAE,YAAY,IAAM,cAAc,IAAM,OAAO,QAAQ,GAAG,EAAE;AAAA,IAEvE;AAAA,IACA,IAAI,GAAG,KAAa;AAClB,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,UAAU;AAAA,IACpC;AAAA,EACF,CAAC;AAED,uBAAc,IAAI,WAAW,KAAK,GAC3B;AACT;AA0DO,SAAS,UAGd,OAA0B,aAAqBA,YAAkC;AACjF,MAAI,aAAa;AACf,UAAM,YAAa,MAAgB,OAAO,MAEpC,qBAAqB,CAAC,WACnB,OAAO,KAAqB,QAAa;AAS9C,YAAM,2BAA2B,YAAY;AAC3C,QAAI,yBAAyB,GAAG,KAM5B,QAAQ,IAAI,qBAAqB,SACnC,MAAM,IAAI,IAAI,aAAa,GAAG;AAAA,MAElC;AAEA,MAAI,WAAW,
|
|
4
|
+
"mappings": "AAAA,SAAS,gCAAgC;AACzC,SAAS,+BAA+B;AAcxC,MAAM,cAAc,8BACd,WAAW,2BAGX,mBAA0D,WAAW,WAAW,MACrF,WAAW,WAAW,IAAI,oBAAI,IAAI,IAE7B,gBACJ,WAAW,QAAQ,MAAM,WAAW,QAAQ,IAAI,oBAAI,IAAI;AAI1D,SAAS,yBACP,WACA,iBACG;AAEH,mBAAiB,IAAI,WAAW,eAAe;AAG/C,QAAM,WAAW,cAAc,IAAI,SAAS;AAC5C,MAAI;AACF,WAAO;AAIT,QAAM,QAAQ,IAAI,MAAM,CAAC,GAAQ;AAAA,IAC/B,IAAI,GAAG,KAAa;AAClB,aAAO,iBAAiB,IAAI,SAAS,IAAI,GAAG;AAAA,IAC9C;AAAA,IACA,UAAU;AACR,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,KAAK,OAAO,IAAI,CAAC;AAAA,IAC3C;AAAA,IACA,yBAAyB,GAAG,KAAa;AACvC,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,UAAI,WAAW,OAAO;AACpB,eAAO,EAAE,YAAY,IAAM,cAAc,IAAM,OAAO,QAAQ,GAAG,EAAE;AAAA,IAEvE;AAAA,IACA,IAAI,GAAG,KAAa;AAClB,YAAM,UAAU,iBAAiB,IAAI,SAAS;AAC9C,aAAO,UAAU,OAAO,UAAU;AAAA,IACpC;AAAA,EACF,CAAC;AAED,uBAAc,IAAI,WAAW,KAAK,GAC3B;AACT;AA0DO,SAAS,UAGd,OAA0B,aAAqBA,YAAkC;AACjF,MAAI,aAAa;AACf,UAAM,YAAa,MAAgB,OAAO,MAEpC,qBAAqB,CAAC,WACnB,OAAO,KAAqB,QAAa;AAS9C,YAAM,2BAA2B,YAAY;AAC3C,QAAI,yBAAyB,GAAG,KAM5B,QAAQ,IAAI,qBAAqB,SACnC,MAAM,IAAI,IAAI,aAAa,GAAG;AAAA,MAElC;AAEA,MAAI,WAAW,YAAY,WAAW,YACpC,MAAM,yBAAyB;AAIjC,YAAM,WAAWA,aAAY,MAAM;AAEnC,MAAI,WACF,MAAM,SAAS,KAAK,GAAG,IAGvB,MAAM,IAAI,GAAG,OAAO,SAAsB,EAAG,MAAM,EAAE,GAAG,IAGtD,WAAW,YAAY,WAAW,aACpC,MAAM,yBAAyB;AAAA,IAEnC,GAGI,gBAAoC;AAAA,MACxC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,MACnC,QAAQ,mBAAmB,QAAQ;AAAA,IACrC,GAEM,iBAAiB;AAAA,MACrB,GAAGA;AAAA;AAAA,MAEH,GAAG;AAAA,IACL;AAEA,mCAAwB,WAAW,WAAW,GAGvC,yBAAyB,WAAW,cAAc;AAAA,EAC3D;AAGA,SAAO;AACT;",
|
|
5
5
|
"names": ["mutations"]
|
|
6
6
|
}
|
package/dist/esm/mutations.mjs
CHANGED
|
@@ -38,9 +38,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
38
38
|
const runServerPermissionCheck = async () => {
|
|
39
39
|
getDidRunPermissionCheck(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && (await ctx.can(permissions, obj));
|
|
40
40
|
};
|
|
41
|
-
action !== "insert" && (await runServerPermissionCheck());
|
|
41
|
+
action !== "insert" && action !== "upsert" && (await runServerPermissionCheck());
|
|
42
42
|
const existing = mutations2?.[action];
|
|
43
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && (await runServerPermissionCheck());
|
|
43
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && (await runServerPermissionCheck());
|
|
44
44
|
},
|
|
45
45
|
crudMutations = {
|
|
46
46
|
insert: createCRUDMutation("insert"),
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["getDidRunPermissionCheck","setMutationsPermissions","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","value","has","mutations","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,wBAAA,QAAgC;AACzC,SAASC,uBAAA,QAA+B;AAcxC,MAAMC,WAAA,GAAc;EACdC,QAAA,GAAW;EAGXC,gBAAA,GAA0DC,UAAA,CAAWH,WAAW,MACrFG,UAAA,CAAWH,WAAW,IAAI,mBAAII,GAAA,CAAI;EAE7BC,aAAA,GACJF,UAAA,CAAWF,QAAQ,MAAME,UAAA,CAAWF,QAAQ,IAAI,mBAAIG,GAAA,CAAI;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,MAAME,QAAA,GAAWL,aAAA,CAAcM,GAAA,CAAIJ,SAAS;EAC5C,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,MAAME,KAAA,GAAQ,IAAIC,KAAA,CAAM,CAAC,GAAQ;IAC/BF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,OAAOb,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS,IAAIQ,GAAG;IAC9C;IACAC,QAAA,EAAU;MACR,MAAMC,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,OAAOU,OAAA,GAAUC,MAAA,CAAOC,IAAA,CAAKF,OAAO,IAAI,EAAC;IAC3C;IACAG,yBAAyBN,CAAA,EAAGC,GAAA,EAAa;MACvC,MAAME,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,IAAIU,OAAA,IAAWF,GAAA,IAAOE,OAAA,EACpB,OAAO;QAAEI,UAAA,EAAY;QAAMC,YAAA,EAAc;QAAMC,KAAA,EAAON,OAAA,CAAQF,GAAG;MAAE;IAEvE;IACAS,IAAIV,CAAA,EAAGC,GAAA,EAAa;MAClB,MAAME,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,OAAOU,OAAA,GAAUF,GAAA,IAAOE,OAAA,GAAU;IACpC;EACF,CAAC;EAED,OAAAZ,aAAA,CAAcI,GAAA,CAAIF,SAAA,EAAWK,KAAK,GAC3BA,KAAA;AACT;AA0DO,SAASa,UAGdC,KAAA,EAA0BC,WAAA,EAAqBC,UAAA,EAAkC;EACjF,IAAID,WAAA,EAAa;IACf,MAAMpB,SAAA,GAAamB,KAAA,CAAgBG,MAAA,CAAOC,IAAA;MAEpCC,kBAAA,GAAsBC,MAAA,IACnB,OAAOC,GAAA,EAAqBC,GAAA,KAAa;QAS9C,MAAMC,wBAAA,GAA2B,MAAAA,CAAA,KAAY;UACvCrC,wBAAA,CAAyBmC,GAAG,KAM5BG,OAAA,CAAQC,GAAA,CAAIC,gBAAA,KAAqB,UACnC,MAAML,GAAA,CAAIM,GAAA,CAAIZ,WAAA,EAAaO,GAAG;QAElC;QAEIF,MAAA,KAAW,
|
|
1
|
+
{"version":3,"names":["getDidRunPermissionCheck","setMutationsPermissions","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","value","has","mutations","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,wBAAA,QAAgC;AACzC,SAASC,uBAAA,QAA+B;AAcxC,MAAMC,WAAA,GAAc;EACdC,QAAA,GAAW;EAGXC,gBAAA,GAA0DC,UAAA,CAAWH,WAAW,MACrFG,UAAA,CAAWH,WAAW,IAAI,mBAAII,GAAA,CAAI;EAE7BC,aAAA,GACJF,UAAA,CAAWF,QAAQ,MAAME,UAAA,CAAWF,QAAQ,IAAI,mBAAIG,GAAA,CAAI;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,MAAME,QAAA,GAAWL,aAAA,CAAcM,GAAA,CAAIJ,SAAS;EAC5C,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,MAAME,KAAA,GAAQ,IAAIC,KAAA,CAAM,CAAC,GAAQ;IAC/BF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,OAAOb,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS,IAAIQ,GAAG;IAC9C;IACAC,QAAA,EAAU;MACR,MAAMC,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,OAAOU,OAAA,GAAUC,MAAA,CAAOC,IAAA,CAAKF,OAAO,IAAI,EAAC;IAC3C;IACAG,yBAAyBN,CAAA,EAAGC,GAAA,EAAa;MACvC,MAAME,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,IAAIU,OAAA,IAAWF,GAAA,IAAOE,OAAA,EACpB,OAAO;QAAEI,UAAA,EAAY;QAAMC,YAAA,EAAc;QAAMC,KAAA,EAAON,OAAA,CAAQF,GAAG;MAAE;IAEvE;IACAS,IAAIV,CAAA,EAAGC,GAAA,EAAa;MAClB,MAAME,OAAA,GAAUf,gBAAA,CAAiBS,GAAA,CAAIJ,SAAS;MAC9C,OAAOU,OAAA,GAAUF,GAAA,IAAOE,OAAA,GAAU;IACpC;EACF,CAAC;EAED,OAAAZ,aAAA,CAAcI,GAAA,CAAIF,SAAA,EAAWK,KAAK,GAC3BA,KAAA;AACT;AA0DO,SAASa,UAGdC,KAAA,EAA0BC,WAAA,EAAqBC,UAAA,EAAkC;EACjF,IAAID,WAAA,EAAa;IACf,MAAMpB,SAAA,GAAamB,KAAA,CAAgBG,MAAA,CAAOC,IAAA;MAEpCC,kBAAA,GAAsBC,MAAA,IACnB,OAAOC,GAAA,EAAqBC,GAAA,KAAa;QAS9C,MAAMC,wBAAA,GAA2B,MAAAA,CAAA,KAAY;UACvCrC,wBAAA,CAAyBmC,GAAG,KAM5BG,OAAA,CAAQC,GAAA,CAAIC,gBAAA,KAAqB,UACnC,MAAML,GAAA,CAAIM,GAAA,CAAIZ,WAAA,EAAaO,GAAG;QAElC;QAEIF,MAAA,KAAW,YAAYA,MAAA,KAAW,aACpC,MAAMG,wBAAA,CAAyB;QAIjC,MAAMzB,QAAA,GAAWkB,UAAA,GAAYI,MAAM;QAE/BtB,QAAA,GACF,MAAMA,QAAA,CAASuB,GAAA,EAAKC,GAAG,IAGvB,MAAMD,GAAA,CAAIO,EAAA,CAAGC,MAAA,CAAOlC,SAAsB,EAAGyB,MAAM,EAAEE,GAAG,IAGtDF,MAAA,KAAW,YAAYA,MAAA,KAAW,cACpC,MAAMG,wBAAA,CAAyB;MAEnC;MAGIO,aAAA,GAAoC;QACxCC,MAAA,EAAQZ,kBAAA,CAAmB,QAAQ;QACnCa,MAAA,EAAQb,kBAAA,CAAmB,QAAQ;QACnCc,MAAA,EAAQd,kBAAA,CAAmB,QAAQ;QACnCe,MAAA,EAAQf,kBAAA,CAAmB,QAAQ;MACrC;MAEMgB,cAAA,GAAiB;QACrB,GAAGnB,UAAA;QAAA;QAEH,GAAGc;MACL;IAEA,OAAA3C,uBAAA,CAAwBQ,SAAA,EAAWoB,WAAW,GAGvCrB,wBAAA,CAAyBC,SAAA,EAAWwC,cAAc;EAC3D;EAGA,OAAOrB,KAAA;AACT","ignoreList":[]}
|
|
@@ -40,9 +40,9 @@ function mutations(table, permissions, mutations2) {
|
|
|
40
40
|
var runServerPermissionCheck = async function () {
|
|
41
41
|
getDidRunPermissionCheck(ctx) || process.env.VITE_ENVIRONMENT === "ssr" && (await ctx.can(permissions, obj));
|
|
42
42
|
};
|
|
43
|
-
action !== "insert" && (await runServerPermissionCheck());
|
|
43
|
+
action !== "insert" && action !== "upsert" && (await runServerPermissionCheck());
|
|
44
44
|
var existing = mutations2?.[action];
|
|
45
|
-
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), action === "insert" && (await runServerPermissionCheck());
|
|
45
|
+
existing ? await existing(ctx, obj) : await ctx.tx.mutate[tableName][action](obj), (action === "insert" || action === "upsert") && (await runServerPermissionCheck());
|
|
46
46
|
};
|
|
47
47
|
},
|
|
48
48
|
crudMutations = {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["getDidRunPermissionCheck","setMutationsPermissions","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","_mutationRegistry_get","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","value","has","mutations","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,wBAAA,QAAgC;AACzC,SAASC,uBAAA,QAA+B;AAcxC,IAAAC,WAAM,+BAAc;EAAAC,QACd,4BAAW;EAAAC,gBAGX,GAAAC,UAA0D,CAAAH,WAAW,MAAWG,UACrF,CAAAH,WAAW,IAAW,eAAI,IAAAI,GAAI,GAAI;EAAAC,aAE7B,GAAAF,UACJ,CAAAF,QAAW,MAAQE,UAAM,CAAAF,QAAW,IAAQ,eAAI,IAAAG,GAAI,GAAI;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,IAAAE,QAAM,GAAAL,aAAW,CAAAM,GAAc,CAAAJ,SAAI;EACnC,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,IAAAE,KAAM,OAAQC,KAAI,GAAM,EAAC;IACvBF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,IAAAC,qBAAwB;MAC1B,QAAAA,qBAAA,GAAAd,gBAAA,CAAAS,GAAA,CAAAJ,SAAA,eAAAS,qBAAA,uBAAAA,qBAAA,CAAAD,GAAA;IACA;IACEE,QAAA,EAAM;MACN,IAAAC,OAAO,GAAAhB,gBAAsB,CAAAS,GAAA,CAAAJ,SAAY;MAC3C,OAAAW,OAAA,GAAAC,MAAA,CAAAC,IAAA,CAAAF,OAAA;IACA;IACEG,wBAAgBA,CAAAP,CAAA,EAAAC,GAAA;MAChB,IAAIG,OAAA,GAAAhB,gBAAkB,CAAAS,GAAA,CAAAJ,SAAA;MACpB,IAAAW,OAAS,IAAAH,GAAA,IAAAG,OAAkB,EAE/B;QACII,UAAgB;QAClBC,YAAgB;QAChBC,KAAO,EAAAN,OAAU,CAAAH,GAAA;MACnB;IACD;IAEDU,IAAAX,CAAA,EAAAC,GAAA;MAEF,IAAAG,OAAA,GAAAhB,gBAAA,CAAAS,GAAA,CAAAJ,SAAA;MA0DO,OAASW,OAGd,GAAAH,GAA0B,IAAAG,OAAA,GAAqB;IAC/C;EACE;EAYI,OAAAb,aAAM,CAAAI,GAAA,CAAAF,SAAA,EAAAK,KAA2B,GAAAA,KAAY;AAC3C;AAOgC,SAElCc,UAAAC,KAAA,EAAAC,WAAA,EAAAC,UAAA;EAEA,IAAID,WAAW;IAKf,IAAArB,SAAM,GAAAoB,KAAW,CAAAG,MAAA,CAAAC,IAAY;MAAAC,kBAAM,YAAAA,CAAAC,MAAA;QAE/B,uBACIC,GAAA,EAASC,GAAA,EAAK;UAYpB,IAAAC,wBAAoC,kBAAAA,CAAA;YACxCtC,wBAA2B,CAAAoC,GAAA,KAAQG,OAAA,CAAAC,GAAA,CAAAC,gBAAA,qBAAAL,GAAA,CAAAM,GAAA,CAAAZ,WAAA,EAAAO,GAAA;UACnC;UACAF,MAAQ,
|
|
1
|
+
{"version":3,"names":["getDidRunPermissionCheck","setMutationsPermissions","registryKey","proxyKey","mutationRegistry","globalThis","Map","proxyRegistry","getOrCreateMutationProxy","tableName","implementations","set","existing","get","proxy","Proxy","_","key","_mutationRegistry_get","ownKeys","current","Object","keys","getOwnPropertyDescriptor","enumerable","configurable","value","has","mutations","table","permissions","mutations2","schema","name","createCRUDMutation","action","ctx","obj","runServerPermissionCheck","process","env","VITE_ENVIRONMENT","can","tx","mutate","crudMutations","insert","update","delete","upsert","finalMutations"],"sources":["../../src/mutations.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,wBAAA,QAAgC;AACzC,SAASC,uBAAA,QAA+B;AAcxC,IAAAC,WAAM,+BAAc;EAAAC,QACd,4BAAW;EAAAC,gBAGX,GAAAC,UAA0D,CAAAH,WAAW,MAAWG,UACrF,CAAAH,WAAW,IAAW,eAAI,IAAAI,GAAI,GAAI;EAAAC,aAE7B,GAAAF,UACJ,CAAAF,QAAW,MAAQE,UAAM,CAAAF,QAAW,IAAQ,eAAI,IAAAG,GAAI,GAAI;AAI1D,SAASE,yBACPC,SAAA,EACAC,eAAA,EACG;EAEHN,gBAAA,CAAiBO,GAAA,CAAIF,SAAA,EAAWC,eAAe;EAG/C,IAAAE,QAAM,GAAAL,aAAW,CAAAM,GAAc,CAAAJ,SAAI;EACnC,IAAIG,QAAA,EACF,OAAOA,QAAA;EAIT,IAAAE,KAAM,OAAQC,KAAI,GAAM,EAAC;IACvBF,IAAIG,CAAA,EAAGC,GAAA,EAAa;MAClB,IAAAC,qBAAwB;MAC1B,QAAAA,qBAAA,GAAAd,gBAAA,CAAAS,GAAA,CAAAJ,SAAA,eAAAS,qBAAA,uBAAAA,qBAAA,CAAAD,GAAA;IACA;IACEE,QAAA,EAAM;MACN,IAAAC,OAAO,GAAAhB,gBAAsB,CAAAS,GAAA,CAAAJ,SAAY;MAC3C,OAAAW,OAAA,GAAAC,MAAA,CAAAC,IAAA,CAAAF,OAAA;IACA;IACEG,wBAAgBA,CAAAP,CAAA,EAAAC,GAAA;MAChB,IAAIG,OAAA,GAAAhB,gBAAkB,CAAAS,GAAA,CAAAJ,SAAA;MACpB,IAAAW,OAAS,IAAAH,GAAA,IAAAG,OAAkB,EAE/B;QACII,UAAgB;QAClBC,YAAgB;QAChBC,KAAO,EAAAN,OAAU,CAAAH,GAAA;MACnB;IACD;IAEDU,IAAAX,CAAA,EAAAC,GAAA;MAEF,IAAAG,OAAA,GAAAhB,gBAAA,CAAAS,GAAA,CAAAJ,SAAA;MA0DO,OAASW,OAGd,GAAAH,GAA0B,IAAAG,OAAA,GAAqB;IAC/C;EACE;EAYI,OAAAb,aAAM,CAAAI,GAAA,CAAAF,SAAA,EAAAK,KAA2B,GAAAA,KAAY;AAC3C;AAOgC,SAElCc,UAAAC,KAAA,EAAAC,WAAA,EAAAC,UAAA;EAEA,IAAID,WAAW;IAKf,IAAArB,SAAM,GAAAoB,KAAW,CAAAG,MAAA,CAAAC,IAAY;MAAAC,kBAAM,YAAAA,CAAAC,MAAA;QAE/B,uBACIC,GAAA,EAASC,GAAA,EAAK;UAYpB,IAAAC,wBAAoC,kBAAAA,CAAA;YACxCtC,wBAA2B,CAAAoC,GAAA,KAAQG,OAAA,CAAAC,GAAA,CAAAC,gBAAA,qBAAAL,GAAA,CAAAM,GAAA,CAAAZ,WAAA,EAAAO,GAAA;UACnC;UACAF,MAAQ,iBAAAA,MAAmB,KAAQ,mBAAAG,wBAAA;UACnC,IAAA1B,QAAQ,GAAAmB,UAAmB,GAAAI,MAAQ;UAG/BvB,QAAA,SAAiBA,QAAA,CAAAwB,GAAA,EAAAC,GAAA,UAAAD,GAAA,CAAAO,EAAA,CAAAC,MAAA,CAAAnC,SAAA,EAAA0B,MAAA,EAAAE,GAAA,IAAAF,MAAA,iBAAAA,MAAA,yBAAAG,wBAAA;QACrB;MAAG;MAAAO,aAAA;QAEHC,MAAG,EAAAZ,kBAAA;QACLa,MAAA,EAAAb,kBAAA;QAEAc,MAAA,EAAAd,kBAAA,SAAwB;QAI1Be,MAAA,EAAAf,kBAAA;MAGA;MAAAgB,cAAO;QACT,GAAAnB,UAAA","ignoreList":[]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "on-zero",
|
|
3
|
-
"version": "0.1.
|
|
3
|
+
"version": "0.1.45",
|
|
4
4
|
"description": "A typed layer over @rocicorp/zero with queries, mutations, and permissions",
|
|
5
5
|
"sideEffects": false,
|
|
6
6
|
"source": "src/index.ts",
|
|
@@ -71,7 +71,7 @@
|
|
|
71
71
|
}
|
|
72
72
|
},
|
|
73
73
|
"dependencies": {
|
|
74
|
-
"@take-out/helpers": "0.1.
|
|
74
|
+
"@take-out/helpers": "0.1.45",
|
|
75
75
|
"@sinclair/typebox-codegen": "^0.11.1",
|
|
76
76
|
"chokidar": "^4.0.3",
|
|
77
77
|
"citty": "^0.1.6",
|
package/src/createPermissions.ts
CHANGED
|
@@ -57,7 +57,17 @@ export function createPermissions<Schema extends ZeroSchema>({
|
|
|
57
57
|
}
|
|
58
58
|
|
|
59
59
|
const primaryKeys = tableSchema.primaryKey
|
|
60
|
-
|
|
60
|
+
|
|
61
|
+
let permissionReturn: PermissionReturn
|
|
62
|
+
try {
|
|
63
|
+
permissionReturn = permissionWhere(eb, authData)
|
|
64
|
+
} catch (err) {
|
|
65
|
+
// treat throws as deny — ensure() is the idiomatic "deny if falsy" pattern
|
|
66
|
+
if (process.env.NODE_ENV === 'development' && !(err instanceof EnsureError)) {
|
|
67
|
+
console.warn(`[permission] ${tableName} threw:`, err)
|
|
68
|
+
}
|
|
69
|
+
return eb.cmpLit(true, '=', false)
|
|
70
|
+
}
|
|
61
71
|
|
|
62
72
|
if (permissionReturn == null) {
|
|
63
73
|
throw new Error(`No permission defined for ${tableName}`)
|
package/src/mutations.ts
CHANGED
|
@@ -148,7 +148,7 @@ export function mutations<
|
|
|
148
148
|
}
|
|
149
149
|
}
|
|
150
150
|
|
|
151
|
-
if (action !== 'insert') {
|
|
151
|
+
if (action !== 'insert' && action !== 'upsert') {
|
|
152
152
|
await runServerPermissionCheck()
|
|
153
153
|
}
|
|
154
154
|
|
|
@@ -162,7 +162,7 @@ export function mutations<
|
|
|
162
162
|
await ctx.tx.mutate[tableName as TableName]
|
|
163
163
|
}
|
|
164
164
|
|
|
165
|
-
if (action === 'insert') {
|
|
165
|
+
if (action === 'insert' || action === 'upsert') {
|
|
166
166
|
await runServerPermissionCheck()
|
|
167
167
|
}
|
|
168
168
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"createPermissions.d.ts","sourceRoot":"","sources":["../src/createPermissions.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,EAAE,SAAS,EAAe,KAAK,EAAE,MAAM,SAAS,CAAA;AAC1F,OAAO,KAAK,EACV,SAAS,EACT,iBAAiB,EAEjB,MAAM,IAAI,UAAU,EACrB,MAAM,gBAAgB,CAAA;AAEvB,wBAAgB,iBAAiB,CAAC,MAAM,SAAS,UAAU,EAAE,EAC3D,WAAW,EACX,MAAM,EACN,aAAqB,GACtB,EAAE;IACD,WAAW,EAAE,QAAQ,GAAG,QAAQ,CAAA;IAChC,MAAM,EAAE,MAAM,CAAA;IACd,aAAa,CAAC,EAAE,aAAa,CAAA;CAC9B;;2BAQ+B,eAAe,uDACjC,QAAQ,GAAG,IAAI,MACrB,iBAAiB,CAAC,GAAG,EAAE,GAAG,CAAC,mBACd,eAAe,WAEvB,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GAAG,MAAM,sBACjB,SAAS;
|
|
1
|
+
{"version":3,"file":"createPermissions.d.ts","sourceRoot":"","sources":["../src/createPermissions.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,EAAE,SAAS,EAAe,KAAK,EAAE,MAAM,SAAS,CAAA;AAC1F,OAAO,KAAK,EACV,SAAS,EACT,iBAAiB,EAEjB,MAAM,IAAI,UAAU,EACrB,MAAM,gBAAgB,CAAA;AAEvB,wBAAgB,iBAAiB,CAAC,MAAM,SAAS,UAAU,EAAE,EAC3D,WAAW,EACX,MAAM,EACN,aAAqB,GACtB,EAAE;IACD,WAAW,EAAE,QAAQ,GAAG,QAAQ,CAAA;IAChC,MAAM,EAAE,MAAM,CAAA;IACd,aAAa,CAAC,EAAE,aAAa,CAAA;CAC9B;;2BAQ+B,eAAe,uDACjC,QAAQ,GAAG,IAAI,MACrB,iBAAiB,CAAC,GAAG,EAAE,GAAG,CAAC,mBACd,eAAe,WAEvB,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GAAG,MAAM,sBACjB,SAAS;EAgHhC"}
|