over-zero 0.0.0 → 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/createPermissions.cjs +43 -57
- package/dist/cjs/createPermissions.js +46 -48
- package/dist/cjs/createPermissions.js.map +2 -2
- package/dist/cjs/createPermissions.native.js +46 -53
- package/dist/cjs/createPermissions.native.js.map +2 -2
- package/dist/cjs/createZero.cjs +128 -0
- package/dist/cjs/createZero.js +107 -0
- package/dist/cjs/createZero.js.map +6 -0
- package/dist/cjs/createZero.native.js +115 -0
- package/dist/cjs/createZero.native.js.map +6 -0
- package/dist/cjs/createZeroServer.cjs +131 -0
- package/dist/cjs/createZeroServer.js +108 -0
- package/dist/cjs/createZeroServer.js.map +6 -0
- package/dist/cjs/createZeroServer.native.js +107 -0
- package/dist/cjs/createZeroServer.native.js.map +6 -0
- package/dist/cjs/helpers/context.js.map +1 -1
- package/dist/cjs/helpers/context.native.js.map +1 -1
- package/dist/cjs/helpers/createMutators.cjs +11 -11
- package/dist/cjs/helpers/createMutators.js +9 -7
- package/dist/cjs/helpers/createMutators.js.map +1 -1
- package/dist/cjs/helpers/createMutators.native.js +8 -6
- package/dist/cjs/helpers/createMutators.native.js.map +1 -1
- package/dist/cjs/helpers/ensureLoggedIn.cjs +1 -1
- package/dist/cjs/helpers/ensureLoggedIn.js +1 -1
- package/dist/cjs/helpers/ensureLoggedIn.js.map +1 -1
- package/dist/cjs/helpers/ensureLoggedIn.native.js +1 -1
- package/dist/cjs/helpers/ensureLoggedIn.native.js.map +1 -1
- package/dist/cjs/helpers/getAuthData.cjs +0 -36
- package/dist/cjs/helpers/getAuthData.js +0 -28
- package/dist/cjs/helpers/getAuthData.js.map +2 -2
- package/dist/cjs/helpers/getAuthData.native.js +0 -31
- package/dist/cjs/helpers/getAuthData.native.js.map +2 -2
- package/dist/cjs/helpers/useAuthData.cjs +0 -32
- package/dist/cjs/helpers/useAuthData.js +0 -24
- package/dist/cjs/helpers/useAuthData.js.map +2 -2
- package/dist/cjs/helpers/useAuthData.native.js +0 -31
- package/dist/cjs/helpers/useAuthData.native.js.map +2 -2
- package/dist/cjs/helpers/useZeroDebug.cjs +68 -0
- package/dist/cjs/helpers/useZeroDebug.js +49 -0
- package/dist/cjs/helpers/useZeroDebug.js.map +6 -0
- package/dist/cjs/helpers/useZeroDebug.native.js +66 -0
- package/dist/cjs/helpers/useZeroDebug.native.js.map +6 -0
- package/dist/cjs/helpers/zeroEmitter.cjs +2 -2
- package/dist/cjs/helpers/zeroEmitter.js +2 -2
- package/dist/cjs/helpers/zeroEmitter.native.js +1 -1
- package/dist/cjs/helpers/zeroEmitter.native.js.map +1 -1
- package/dist/cjs/index.cjs +3 -1
- package/dist/cjs/index.js +2 -0
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/index.native.js +4 -0
- package/dist/cjs/index.native.js.map +1 -1
- package/dist/cjs/mutations.cjs +50 -0
- package/dist/cjs/mutations.js +43 -0
- package/dist/cjs/mutations.js.map +6 -0
- package/dist/cjs/mutations.native.js +50 -0
- package/dist/cjs/mutations.native.js.map +6 -0
- package/dist/cjs/server.cjs +18 -0
- package/dist/cjs/server.js +15 -0
- package/dist/cjs/server.js.map +6 -0
- package/dist/cjs/server.native.js +20 -0
- package/dist/cjs/server.native.js.map +6 -0
- package/dist/cjs/where.cjs +33 -0
- package/dist/cjs/where.js +28 -0
- package/dist/cjs/where.js.map +6 -0
- package/dist/cjs/where.native.js +34 -0
- package/dist/cjs/where.native.js.map +6 -0
- package/dist/esm/createPermissions.js +48 -47
- package/dist/esm/createPermissions.js.map +2 -2
- package/dist/esm/createPermissions.mjs +41 -55
- package/dist/esm/createPermissions.mjs.map +1 -1
- package/dist/esm/createPermissions.native.js +55 -69
- package/dist/esm/createPermissions.native.js.map +1 -1
- package/dist/esm/createZero.js +99 -0
- package/dist/esm/createZero.js.map +6 -0
- package/dist/esm/createZero.mjs +105 -0
- package/dist/esm/createZero.mjs.map +1 -0
- package/dist/esm/createZero.native.js +119 -0
- package/dist/esm/createZero.native.js.map +1 -0
- package/dist/esm/createZeroServer.js +90 -0
- package/dist/esm/createZeroServer.js.map +6 -0
- package/dist/esm/createZeroServer.mjs +97 -0
- package/dist/esm/createZeroServer.mjs.map +1 -0
- package/dist/esm/createZeroServer.native.js +104 -0
- package/dist/esm/createZeroServer.native.js.map +1 -0
- package/dist/esm/helpers/context.js.map +1 -1
- package/dist/esm/helpers/context.mjs.map +1 -1
- package/dist/esm/helpers/context.native.js.map +1 -1
- package/dist/esm/helpers/createMutators.js +6 -7
- package/dist/esm/helpers/createMutators.js.map +1 -1
- package/dist/esm/helpers/createMutators.mjs +7 -7
- package/dist/esm/helpers/createMutators.mjs.map +1 -1
- package/dist/esm/helpers/createMutators.native.js +9 -7
- package/dist/esm/helpers/createMutators.native.js.map +1 -1
- package/dist/esm/helpers/ensureLoggedIn.js +1 -1
- package/dist/esm/helpers/ensureLoggedIn.js.map +1 -1
- package/dist/esm/helpers/ensureLoggedIn.mjs +1 -1
- package/dist/esm/helpers/ensureLoggedIn.mjs.map +1 -1
- package/dist/esm/helpers/ensureLoggedIn.native.js +1 -1
- package/dist/esm/helpers/ensureLoggedIn.native.js.map +1 -1
- package/dist/esm/helpers/getAuthData.js +0 -12
- package/dist/esm/helpers/getAuthData.js.map +2 -2
- package/dist/esm/helpers/getAuthData.mjs +1 -12
- package/dist/esm/helpers/getAuthData.mjs.map +1 -1
- package/dist/esm/helpers/getAuthData.native.js +1 -12
- package/dist/esm/helpers/getAuthData.native.js.map +1 -1
- package/dist/esm/helpers/useAuthData.js +0 -10
- package/dist/esm/helpers/useAuthData.js.map +2 -2
- package/dist/esm/helpers/useAuthData.mjs +1 -8
- package/dist/esm/helpers/useAuthData.mjs.map +1 -1
- package/dist/esm/helpers/useAuthData.native.js +1 -12
- package/dist/esm/helpers/useAuthData.native.js.map +1 -1
- package/dist/esm/helpers/useZeroDebug.js +35 -0
- package/dist/esm/helpers/useZeroDebug.js.map +6 -0
- package/dist/esm/helpers/useZeroDebug.mjs +45 -0
- package/dist/esm/helpers/useZeroDebug.mjs.map +1 -0
- package/dist/esm/helpers/useZeroDebug.native.js +53 -0
- package/dist/esm/helpers/useZeroDebug.native.js.map +1 -0
- package/dist/esm/helpers/zeroEmitter.js +1 -1
- package/dist/esm/helpers/zeroEmitter.mjs +1 -1
- package/dist/esm/helpers/zeroEmitter.native.js +1 -1
- package/dist/esm/index.js +2 -0
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/index.mjs +3 -1
- package/dist/esm/index.mjs.map +1 -1
- package/dist/esm/index.native.js +3 -1
- package/dist/esm/index.native.js.map +1 -1
- package/dist/esm/mutations.js +27 -0
- package/dist/esm/mutations.js.map +6 -0
- package/dist/esm/mutations.mjs +27 -0
- package/dist/esm/mutations.mjs.map +1 -0
- package/dist/esm/mutations.native.js +29 -0
- package/dist/esm/mutations.native.js.map +1 -0
- package/dist/esm/server.js +2 -0
- package/dist/esm/server.js.map +6 -0
- package/dist/esm/server.mjs +2 -0
- package/dist/esm/server.mjs.map +1 -0
- package/dist/esm/server.native.js +2 -0
- package/dist/esm/server.native.js.map +1 -0
- package/dist/esm/where.js +12 -0
- package/dist/esm/where.js.map +6 -0
- package/dist/esm/where.mjs +9 -0
- package/dist/esm/where.mjs.map +1 -0
- package/dist/esm/where.native.js +9 -0
- package/dist/esm/where.native.js.map +1 -0
- package/package.json +12 -6
- package/src/createPermissions.ts +17 -77
- package/src/{createZeroClient.tsx → createZero.tsx} +25 -17
- package/src/createZeroServer.ts +43 -43
- package/src/helpers/createMutators.ts +19 -29
- package/src/helpers/ensureLoggedIn.ts +2 -1
- package/src/helpers/prettyFormatZeroQuery.ts +1 -1
- package/src/helpers/useZeroDebug.ts +1 -0
- package/src/index.ts +2 -6
- package/src/mutations.ts +20 -7
- package/src/server.ts +1 -0
- package/src/types.ts +74 -7
- package/src/where.ts +28 -0
- package/src/helpers/clearZeroDatabase.ts +0 -68
- package/src/helpers/getAuthData.tsx +0 -12
- package/src/helpers/useAuthData.ts +0 -13
- package/src/helpers/zeroEmitter.ts +0 -5
- package/types/createMutations.d.ts +0 -20
- package/types/createMutations.d.ts.map +0 -1
- package/types/createPermissions.d.ts +0 -37
- package/types/createPermissions.d.ts.map +0 -1
- package/types/createZeroClient.d.ts +0 -45
- package/types/createZeroClient.d.ts.map +0 -1
- package/types/createZeroServer.d.ts +0 -61
- package/types/createZeroServer.d.ts.map +0 -1
- package/types/helpers/batchQuery.d.ts +0 -7
- package/types/helpers/batchQuery.d.ts.map +0 -1
- package/types/helpers/clearZeroDatabase.d.ts +0 -2
- package/types/helpers/clearZeroDatabase.d.ts.map +0 -1
- package/types/helpers/context.d.ts +0 -5
- package/types/helpers/context.d.ts.map +0 -1
- package/types/helpers/createMutators.d.ts +0 -16
- package/types/helpers/createMutators.d.ts.map +0 -1
- package/types/helpers/ensureLoggedIn.d.ts +0 -2
- package/types/helpers/ensureLoggedIn.d.ts.map +0 -1
- package/types/helpers/getAuthData.d.ts +0 -1
- package/types/helpers/getAuthData.d.ts.map +0 -1
- package/types/helpers/prettyFormatZeroQuery.d.ts +0 -3
- package/types/helpers/prettyFormatZeroQuery.d.ts.map +0 -1
- package/types/helpers/useAuthData.d.ts +0 -1
- package/types/helpers/useAuthData.d.ts.map +0 -1
- package/types/helpers/useZeroDebug.d.ts +0 -3
- package/types/helpers/useZeroDebug.d.ts.map +0 -1
- package/types/helpers/zeroEmitter.d.ts +0 -2
- package/types/helpers/zeroEmitter.d.ts.map +0 -1
- package/types/index.d.ts +0 -9
- package/types/index.d.ts.map +0 -1
- package/types/types.d.ts +0 -21
- package/types/types.d.ts.map +0 -1
|
@@ -1,17 +1,14 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { ANYONE_CAN, definePermissions } from "@rocicorp/zero";
|
|
2
|
+
import { ensure, EnsureError, objectEntries } from "@vxrn/helpers";
|
|
3
|
+
import { runWithContext } from "./helpers/context";
|
|
2
4
|
import { prettyFormatZeroQuery } from "./helpers/prettyFormatZeroQuery";
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
}
|
|
11
|
-
const WhereTableNameMap = /* @__PURE__ */ new WeakMap();
|
|
12
|
-
function getWhereTableName(where2) {
|
|
13
|
-
return WhereTableNameMap.get(where2);
|
|
14
|
-
}
|
|
5
|
+
import { getWhereTableName } from "./where";
|
|
6
|
+
function createPermissions({
|
|
7
|
+
environment,
|
|
8
|
+
schema,
|
|
9
|
+
models,
|
|
10
|
+
getContext
|
|
11
|
+
}) {
|
|
15
12
|
const fallbackActions = {
|
|
16
13
|
select: "read",
|
|
17
14
|
insert: "write",
|
|
@@ -23,7 +20,10 @@ function createPermissions(schema, getContext) {
|
|
|
23
20
|
const tableName = getWhereTableName(permissionWhere);
|
|
24
21
|
if (!tableName)
|
|
25
22
|
throw new Error("Must use PermissionWhere for buildPermissionQuery");
|
|
26
|
-
const
|
|
23
|
+
const tableSchema = schema.tables[tableName];
|
|
24
|
+
if (!tableSchema)
|
|
25
|
+
throw new Error("No schema?");
|
|
26
|
+
const primaryKeys = tableSchema.primaryKey, permissionQueryBuilder = permissionWhere(eb, authData), fallbackAction = fallbackActions[action], permissionCondition = permissionQueryBuilder[action] || (fallbackAction ? permissionQueryBuilder[fallbackAction] : void 0);
|
|
27
27
|
if (permissionCondition == null)
|
|
28
28
|
throw new Error(`No permission defined for ${action} (or ${fallbackAction})`);
|
|
29
29
|
if (permissionCondition === !0)
|
|
@@ -37,26 +37,26 @@ function createPermissions(schema, getContext) {
|
|
|
37
37
|
}
|
|
38
38
|
return eb.and(permissionCondition, ...primaryKeyWheres);
|
|
39
39
|
}
|
|
40
|
-
async function can(
|
|
41
|
-
const ctx = getContext(), tableName = getWhereTableName(
|
|
40
|
+
async function can(where, action, obj) {
|
|
41
|
+
const ctx = getContext(), tableName = getWhereTableName(where);
|
|
42
42
|
if (!tableName)
|
|
43
43
|
throw new Error("Must use where('table') style where to pass to can()");
|
|
44
|
-
|
|
44
|
+
environment === "server" && (await ensurePermission(
|
|
45
45
|
ctx.tx,
|
|
46
46
|
ctx.authData,
|
|
47
47
|
tableName,
|
|
48
|
-
|
|
48
|
+
where,
|
|
49
49
|
action,
|
|
50
50
|
obj
|
|
51
51
|
), ctx.didCanPermissionsRun = !0);
|
|
52
52
|
}
|
|
53
|
-
async function ensurePermission(tx, authData, tableName,
|
|
53
|
+
async function ensurePermission(tx, authData, tableName, where, actionIn, obj) {
|
|
54
54
|
if (authData?.role === "admin")
|
|
55
55
|
return;
|
|
56
56
|
const action = String(actionIn), name = `${tableName}.${action}`, queryBase = tx.query[tableName];
|
|
57
57
|
let query = null;
|
|
58
58
|
try {
|
|
59
|
-
query = queryBase.where((eb) => buildPermissionQuery(authData, eb,
|
|
59
|
+
query = queryBase.where((eb) => buildPermissionQuery(authData, eb, where, action, obj)).one(), ensure(await query);
|
|
60
60
|
} catch (err) {
|
|
61
61
|
const errorTitle = `${name} with auth id: ${authData?.id}`;
|
|
62
62
|
if (err instanceof EnsureError) {
|
|
@@ -68,38 +68,39 @@ function createPermissions(schema, getContext) {
|
|
|
68
68
|
${err}`);
|
|
69
69
|
}
|
|
70
70
|
}
|
|
71
|
-
|
|
72
|
-
const
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
71
|
+
const readPermissions = definePermissions(schema, async () => {
|
|
72
|
+
const permissionsEntries = await Promise.all(
|
|
73
|
+
objectEntries(models).map(async ([key, model]) => await runWithContext(
|
|
74
|
+
{
|
|
75
|
+
authData: { id: "", role: void 0, email: "" }
|
|
76
|
+
},
|
|
77
|
+
() => [
|
|
78
|
+
key,
|
|
79
|
+
{
|
|
80
|
+
row: {
|
|
81
|
+
select: [
|
|
82
|
+
(authData, eb) => {
|
|
83
|
+
const out = model.permissions(eb, authData).read;
|
|
84
|
+
return out === !0 ? eb.and() : out === !1 ? eb.cmpLit(!0, "=", !1) : out;
|
|
85
|
+
}
|
|
86
|
+
],
|
|
87
|
+
// we have permissions on these through our model system with custom mutators:
|
|
88
|
+
insert: ANYONE_CAN,
|
|
89
|
+
update: ANYONE_CAN,
|
|
90
|
+
delete: ANYONE_CAN
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
]
|
|
94
|
+
))
|
|
82
95
|
);
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
}
|
|
96
|
+
return Object.fromEntries(permissionsEntries);
|
|
97
|
+
});
|
|
86
98
|
return {
|
|
87
|
-
where,
|
|
88
99
|
can,
|
|
89
|
-
|
|
100
|
+
buildPermissionQuery,
|
|
101
|
+
readPermissions
|
|
90
102
|
};
|
|
91
103
|
}
|
|
92
|
-
function runEnvironmentSafetyCheck() {
|
|
93
|
-
typeof document < "u" || typeof navigator < "u" && navigator.product === "ReactNative" || process.env.VITE_ENVIRONMENT !== "ssr" && console.error(`\u274C\u274C\u274C\u274C
|
|
94
|
-
|
|
95
|
-
ERROR: VITE_ENVIRONMENT is not set to "ssr" on server, which means permissions checks won't run when they should
|
|
96
|
-
This is makes Zero entirely insecure and needs to be fixed immediately.
|
|
97
|
-
|
|
98
|
-
This is likely a One framework issue, unless the user Vite config is overwriting the value.
|
|
99
|
-
One automatically sets this value.
|
|
100
|
-
|
|
101
|
-
`);
|
|
102
|
-
}
|
|
103
104
|
export {
|
|
104
105
|
createPermissions
|
|
105
106
|
};
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../src/createPermissions.ts"],
|
|
4
|
-
"mappings": "
|
|
5
|
-
"names": [
|
|
4
|
+
"mappings": "AAMA,SAAS,YAAY,yBAAyB;AAC9C,SAAS,QAAQ,aAAa,qBAAqB;AACnD,SAAS,sBAAsB;AAC/B,SAAS,6BAA6B;AAEtC,SAAS,yBAAyB;AAE3B,SAAS,kBAA6C;AAAA,EAC3D;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,GAKG;AAkBD,QAAM,kBAA0C;AAAA,IAC9C,QAAQ;AAAA,IACR,QAAQ;AAAA,IACR,QAAQ;AAAA,IACR,QAAQ;AAAA,IACR,QAAQ;AAAA,EACV;AAEA,WAAS,qBAIP,UACA,IACA,iBACA,QAEA,SACA;AACA,UAAM,YAAY,kBAAkB,eAAe;AAEnD,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,mDAAmD;AAGrE,UAAM,cAAc,OAAO,OAAO,SAAS;AAE3C,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,YAAY;AAG9B,UAAM,cAAc,YAAY,YAC1B,yBAAyB,gBAAgB,IAAI,QAAQ,GACrD,iBAAiB,gBAAgB,MAAM,GAEvC,sBACJ,uBAAuB,MAAM,MAC5B,iBAAiB,uBAAuB,cAAc,IAAI;AAE7D,QAAI,uBAAuB;AACzB,YAAM,IAAI,MAAM,6BAA6B,MAAM,QAAQ,cAAc,GAAG;AAG9E,QAAI,wBAAwB;AAC1B,aAAO,GAAG,OAAO,IAAM,KAAK,EAAI;AAGlC,QAAI,wBAAwB;AAC1B,aAAO,GAAG,OAAO,IAAM,KAAK,EAAK;AAGnC,UAAM,mBAAgC,CAAC;AAEvC,eAAW,OAAO,aAAa;AAC7B,YAAM,QAAQ,OAAO,WAAY,WAAW,UAAU,QAAQ,GAAG;AACjE,uBAAiB,KAAK,GAAG,IAAI,KAAY,KAAK,CAAC;AAAA,IACjD;AAEA,WAAO,GAAG,IAAI,qBAAqB,GAAG,gBAAgB;AAAA,EACxD;AAEA,iBAAe,IAGb,OAAe,QAAgB,KAAU;AACzC,UAAM,MAAM,WAAW,GACjB,YAAY,kBAAkB,KAAK;AACzC,QAAI,CAAC;AACH,YAAM,IAAI,MAAM,sDAAsD;AAIxE,IAAI,gBAAgB,aAClB,MAAM;AAAA,MACJ,IAAI;AAAA,MACJ,IAAI;AAAA,MACJ;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IACF,GACA,IAAI,uBAAuB;AAAA,EAE/B;AAEA,iBAAe,iBAIb,IACA,UACA,WACA,OACA,UACA,KACe;AACf,QAAI,UAAU,SAAS;AAErB;AAGF,UAAM,SAAS,OAAO,QAAQ,GACxB,OAAO,GAAG,SAAS,IAAI,MAAM,IAE7B,YAAY,GAAG,MAAM,SAAS;AACpC,QAAI,QAAqC;AAEzC,QAAI;AACF,cAAQ,UACL,MAAM,CAAC,OACC,qBAAqB,UAAU,IAAI,OAAO,QAAQ,GAAG,CAC7D,EACA,IAAI,GAEP,OAAO,MAAM,KAAK;AAAA,IACpB,SAAS,KAAK;AACZ,YAAM,aAAa,GAAG,IAAI,kBAAkB,UAAU,EAAE;AAExD,UAAI,eAAe,aAAa;AAC9B,YAAI,MAAM,uCAAgC,UAAU;AACpD,cAAI,QAAQ,IAAI,aAAa,iBAAiB,UAC5C,OAAO;AAAA,GAAM,sBAAsB,KAAK,CAAC,KAErC,IAAI,MAAM,GAAG;AAAA,MACrB;AAEA,YAAM,IAAI,MAAM,4BAA4B,UAAU;AAAA,EAAK,GAAG,EAAE;AAAA,IAClE;AAAA,EACF;AAEA,QAAM,kBAAkB,kBAAoC,QAAQ,YAAY;AAC9E,UAAM,qBAAqB,MAAM,QAAQ;AAAA,MACvC,cAAc,MAAM,EAAE,IAAI,OAAO,CAAC,KAAK,KAAK,MACnC,MAAM;AAAA,QACX;AAAA,UACE,UAAU,EAAE,IAAI,IAAI,MAAM,QAAW,OAAO,GAAG;AAAA,QACjD;AAAA,QACA,MACS;AAAA,UACL;AAAA,UACA;AAAA,YACE,KAAK;AAAA,cACH,QAAQ;AAAA,gBACN,CAAC,UAAoB,OAAoC;AACvD,wBAAM,MAAM,MAAM,YAAY,IAAI,QAAQ,EAAE;AAE5C,yBAAI,QAAQ,KACH,GAAG,IAAI,IAGZ,QAAQ,KACH,GAAG,OAAO,IAAM,KAAK,EAAK,IAG5B;AAAA,gBACT;AAAA,cACF;AAAA;AAAA,cAEA,QAAQ;AAAA,cACR,QAAQ;AAAA,cACR,QAAQ;AAAA,YACV;AAAA,UACF;AAAA,QACF;AAAA,MAEJ,CACD;AAAA,IACH;AAIA,WAFoB,OAAO,YAAY,kBAAkB;AAAA,EAG3D,CAAC;AAED,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;",
|
|
5
|
+
"names": []
|
|
6
6
|
}
|
|
@@ -1,17 +1,14 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { ANYONE_CAN, definePermissions } from "@rocicorp/zero";
|
|
2
|
+
import { ensure, EnsureError, objectEntries } from "@vxrn/helpers";
|
|
3
|
+
import { runWithContext } from "./helpers/context.mjs";
|
|
2
4
|
import { prettyFormatZeroQuery } from "./helpers/prettyFormatZeroQuery.mjs";
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
}
|
|
11
|
-
const WhereTableNameMap = /* @__PURE__ */new WeakMap();
|
|
12
|
-
function getWhereTableName(where2) {
|
|
13
|
-
return WhereTableNameMap.get(where2);
|
|
14
|
-
}
|
|
5
|
+
import { getWhereTableName } from "./where.mjs";
|
|
6
|
+
function createPermissions({
|
|
7
|
+
environment,
|
|
8
|
+
schema,
|
|
9
|
+
models,
|
|
10
|
+
getContext
|
|
11
|
+
}) {
|
|
15
12
|
const fallbackActions = {
|
|
16
13
|
select: "read",
|
|
17
14
|
insert: "write",
|
|
@@ -22,7 +19,9 @@ function createPermissions(schema, getContext) {
|
|
|
22
19
|
function buildPermissionQuery(authData, eb, permissionWhere, action, objOrId) {
|
|
23
20
|
const tableName = getWhereTableName(permissionWhere);
|
|
24
21
|
if (!tableName) throw new Error("Must use PermissionWhere for buildPermissionQuery");
|
|
25
|
-
const
|
|
22
|
+
const tableSchema = schema.tables[tableName];
|
|
23
|
+
if (!tableSchema) throw new Error("No schema?");
|
|
24
|
+
const primaryKeys = tableSchema.primaryKey,
|
|
26
25
|
permissionQueryBuilder = permissionWhere(eb, authData),
|
|
27
26
|
fallbackAction = fallbackActions[action],
|
|
28
27
|
permissionCondition = permissionQueryBuilder[action] || (fallbackAction ? permissionQueryBuilder[fallbackAction] : void 0);
|
|
@@ -36,20 +35,20 @@ function createPermissions(schema, getContext) {
|
|
|
36
35
|
}
|
|
37
36
|
return eb.and(permissionCondition, ...primaryKeyWheres);
|
|
38
37
|
}
|
|
39
|
-
async function can(
|
|
38
|
+
async function can(where, action, obj) {
|
|
40
39
|
const ctx = getContext(),
|
|
41
|
-
tableName = getWhereTableName(
|
|
40
|
+
tableName = getWhereTableName(where);
|
|
42
41
|
if (!tableName) throw new Error("Must use where('table') style where to pass to can()");
|
|
43
|
-
|
|
42
|
+
environment === "server" && (await ensurePermission(ctx.tx, ctx.authData, tableName, where, action, obj), ctx.didCanPermissionsRun = !0);
|
|
44
43
|
}
|
|
45
|
-
async function ensurePermission(tx, authData, tableName,
|
|
44
|
+
async function ensurePermission(tx, authData, tableName, where, actionIn, obj) {
|
|
46
45
|
if (authData?.role === "admin") return;
|
|
47
46
|
const action = String(actionIn),
|
|
48
47
|
name = `${tableName}.${action}`,
|
|
49
48
|
queryBase = tx.query[tableName];
|
|
50
49
|
let query = null;
|
|
51
50
|
try {
|
|
52
|
-
query = queryBase.where(eb => buildPermissionQuery(authData, eb,
|
|
51
|
+
query = queryBase.where(eb => buildPermissionQuery(authData, eb, where, action, obj)).one(), ensure(await query);
|
|
53
52
|
} catch (err) {
|
|
54
53
|
const errorTitle = `${name} with auth id: ${authData?.id}`;
|
|
55
54
|
if (err instanceof EnsureError) {
|
|
@@ -61,45 +60,32 @@ function createPermissions(schema, getContext) {
|
|
|
61
60
|
${err}`);
|
|
62
61
|
}
|
|
63
62
|
}
|
|
64
|
-
|
|
65
|
-
const
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
return objOrId ? allowed : !1;
|
|
86
|
-
}
|
|
63
|
+
const readPermissions = definePermissions(schema, async () => {
|
|
64
|
+
const permissionsEntries = await Promise.all(objectEntries(models).map(async ([key, model]) => await runWithContext({
|
|
65
|
+
authData: {
|
|
66
|
+
id: "",
|
|
67
|
+
role: void 0,
|
|
68
|
+
email: ""
|
|
69
|
+
}
|
|
70
|
+
}, () => [key, {
|
|
71
|
+
row: {
|
|
72
|
+
select: [(authData, eb) => {
|
|
73
|
+
const out = model.permissions(eb, authData).read;
|
|
74
|
+
return out === !0 ? eb.and() : out === !1 ? eb.cmpLit(!0, "=", !1) : out;
|
|
75
|
+
}],
|
|
76
|
+
// we have permissions on these through our model system with custom mutators:
|
|
77
|
+
insert: ANYONE_CAN,
|
|
78
|
+
update: ANYONE_CAN,
|
|
79
|
+
delete: ANYONE_CAN
|
|
80
|
+
}
|
|
81
|
+
}])));
|
|
82
|
+
return Object.fromEntries(permissionsEntries);
|
|
83
|
+
});
|
|
87
84
|
return {
|
|
88
|
-
where,
|
|
89
85
|
can,
|
|
90
|
-
|
|
86
|
+
buildPermissionQuery,
|
|
87
|
+
readPermissions
|
|
91
88
|
};
|
|
92
89
|
}
|
|
93
|
-
function runEnvironmentSafetyCheck() {
|
|
94
|
-
typeof document < "u" || typeof navigator < "u" && navigator.product === "ReactNative" || process.env.VITE_ENVIRONMENT !== "ssr" && console.error(`\u274C\u274C\u274C\u274C
|
|
95
|
-
|
|
96
|
-
ERROR: VITE_ENVIRONMENT is not set to "ssr" on server, which means permissions checks won't run when they should
|
|
97
|
-
This is makes Zero entirely insecure and needs to be fixed immediately.
|
|
98
|
-
|
|
99
|
-
This is likely a One framework issue, unless the user Vite config is overwriting the value.
|
|
100
|
-
One automatically sets this value.
|
|
101
|
-
|
|
102
|
-
`);
|
|
103
|
-
}
|
|
104
90
|
export { createPermissions };
|
|
105
91
|
//# sourceMappingURL=createPermissions.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["
|
|
1
|
+
{"version":3,"names":["ANYONE_CAN","definePermissions","ensure","EnsureError","objectEntries","runWithContext","prettyFormatZeroQuery","getWhereTableName","createPermissions","environment","schema","models","getContext","fallbackActions","select","insert","update","upsert","delete","buildPermissionQuery","authData","eb","permissionWhere","action","objOrId","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionQueryBuilder","fallbackAction","permissionCondition","cmpLit","primaryKeyWheres","key","value","push","cmp","and","can","where","obj","ctx","ensurePermission","tx","didCanPermissionsRun","actionIn","role","String","name","queryBase","query","one","err","errorTitle","id","msg","process","env","NODE_ENV","readPermissions","permissionsEntries","Promise","all","map","model","email","row","out","permissions","read","Object","fromEntries"],"sources":["../../src/createPermissions.ts"],"sourcesContent":[null],"mappings":"AAMA,SAASA,UAAA,EAAYC,iBAAA,QAAyB;AAC9C,SAASC,MAAA,EAAQC,WAAA,EAAaC,aAAA,QAAqB;AACnD,SAASC,cAAA,QAAsB;AAC/B,SAASC,qBAAA,QAA6B;AAEtC,SAASC,iBAAA,QAAyB;AAE3B,SAASC,kBAA6C;EAC3DC,WAAA;EACAC,MAAA;EACAC,MAAA;EACAC;AACF,GAKG;EAkBD,MAAMC,eAAA,GAA0C;IAC9CC,MAAA,EAAQ;IACRC,MAAA,EAAQ;IACRC,MAAA,EAAQ;IACRC,MAAA,EAAQ;IACRC,MAAA,EAAQ;EACV;EAEA,SAASC,qBAIPC,QAAA,EACAC,EAAA,EACAC,eAAA,EACAC,MAAA,EAEAC,OAAA,EACA;IACA,MAAMC,SAAA,GAAYlB,iBAAA,CAAkBe,eAAe;IAEnD,IAAI,CAACG,SAAA,EACH,MAAM,IAAIC,KAAA,CAAM,mDAAmD;IAGrE,MAAMC,WAAA,GAAcjB,MAAA,CAAOkB,MAAA,CAAOH,SAAS;IAE3C,IAAI,CAACE,WAAA,EACH,MAAM,IAAID,KAAA,CAAM,YAAY;IAG9B,MAAMG,WAAA,GAAcF,WAAA,CAAYG,UAAA;MAC1BC,sBAAA,GAAyBT,eAAA,CAAgBD,EAAA,EAAID,QAAQ;MACrDY,cAAA,GAAiBnB,eAAA,CAAgBU,MAAM;MAEvCU,mBAAA,GACJF,sBAAA,CAAuBR,MAAM,MAC5BS,cAAA,GAAiBD,sBAAA,CAAuBC,cAAc,IAAI;IAE7D,IAAIC,mBAAA,IAAuB,MACzB,MAAM,IAAIP,KAAA,CAAM,6BAA6BH,MAAM,QAAQS,cAAc,GAAG;IAG9E,IAAIC,mBAAA,KAAwB,IAC1B,OAAOZ,EAAA,CAAGa,MAAA,CAAO,IAAM,KAAK,EAAI;IAGlC,IAAID,mBAAA,KAAwB,IAC1B,OAAOZ,EAAA,CAAGa,MAAA,CAAO,IAAM,KAAK,EAAK;IAGnC,MAAMC,gBAAA,GAAgC,EAAC;IAEvC,WAAWC,GAAA,IAAOP,WAAA,EAAa;MAC7B,MAAMQ,KAAA,GAAQ,OAAOb,OAAA,IAAY,WAAWA,OAAA,GAAUA,OAAA,CAAQY,GAAG;MACjED,gBAAA,CAAiBG,IAAA,CAAKjB,EAAA,CAAGkB,GAAA,CAAIH,GAAA,EAAYC,KAAK,CAAC;IACjD;IAEA,OAAOhB,EAAA,CAAGmB,GAAA,CAAIP,mBAAA,EAAqB,GAAGE,gBAAgB;EACxD;EAEA,eAAeM,IAGbC,KAAA,EAAenB,MAAA,EAAgBoB,GAAA,EAAU;IACzC,MAAMC,GAAA,GAAMhC,UAAA,CAAW;MACjBa,SAAA,GAAYlB,iBAAA,CAAkBmC,KAAK;IACzC,IAAI,CAACjB,SAAA,EACH,MAAM,IAAIC,KAAA,CAAM,sDAAsD;IAIpEjB,WAAA,KAAgB,aAClB,MAAMoC,gBAAA,CACJD,GAAA,CAAIE,EAAA,EACJF,GAAA,CAAIxB,QAAA,EACJK,SAAA,EACAiB,KAAA,EACAnB,MAAA,EACAoB,GACF,GACAC,GAAA,CAAIG,oBAAA,GAAuB;EAE/B;EAEA,eAAeF,iBAIbC,EAAA,EACA1B,QAAA,EACAK,SAAA,EACAiB,KAAA,EACAM,QAAA,EACAL,GAAA,EACe;IACf,IAAIvB,QAAA,EAAU6B,IAAA,KAAS,SAErB;IAGF,MAAM1B,MAAA,GAAS2B,MAAA,CAAOF,QAAQ;MACxBG,IAAA,GAAO,GAAG1B,SAAS,IAAIF,MAAM;MAE7B6B,SAAA,GAAYN,EAAA,CAAGO,KAAA,CAAM5B,SAAS;IACpC,IAAI4B,KAAA,GAAqC;IAEzC,IAAI;MACFA,KAAA,GAAQD,SAAA,CACLV,KAAA,CAAOrB,EAAA,IACCF,oBAAA,CAAqBC,QAAA,EAAUC,EAAA,EAAIqB,KAAA,EAAOnB,MAAA,EAAQoB,GAAG,CAC7D,EACAW,GAAA,CAAI,GAEPpD,MAAA,CAAO,MAAMmD,KAAK;IACpB,SAASE,GAAA,EAAK;MACZ,MAAMC,UAAA,GAAa,GAAGL,IAAI,kBAAkB/B,QAAA,EAAUqC,EAAE;MAExD,IAAIF,GAAA,YAAepD,WAAA,EAAa;QAC9B,IAAIuD,GAAA,GAAM,uCAAgCF,UAAU;QACpD,MAAIG,OAAA,CAAQC,GAAA,CAAIC,QAAA,KAAa,iBAAiBR,KAAA,KAC5CK,GAAA,IAAO;AAAA,GAAMpD,qBAAA,CAAsB+C,KAAK,CAAC,KAErC,IAAI3B,KAAA,CAAMgC,GAAG;MACrB;MAEA,MAAM,IAAIhC,KAAA,CAAM,4BAA4B8B,UAAU;AAAA,EAAKD,GAAG,EAAE;IAClE;EACF;EAEA,MAAMO,eAAA,GAAkB7D,iBAAA,CAAoCS,MAAA,EAAQ,YAAY;IAC9E,MAAMqD,kBAAA,GAAqB,MAAMC,OAAA,CAAQC,GAAA,CACvC7D,aAAA,CAAcO,MAAM,EAAEuD,GAAA,CAAI,OAAO,CAAC9B,GAAA,EAAK+B,KAAK,MACnC,MAAM9D,cAAA,CACX;MACEe,QAAA,EAAU;QAAEqC,EAAA,EAAI;QAAIR,IAAA,EAAM;QAAWmB,KAAA,EAAO;MAAG;IACjD,GACA,MACS,CACLhC,GAAA,EACA;MACEiC,GAAA,EAAK;QACHvD,MAAA,EAAQ,CACN,CAACM,QAAA,EAAoBC,EAAA,KAAoC;UACvD,MAAMiD,GAAA,GAAMH,KAAA,CAAMI,WAAA,CAAYlD,EAAA,EAAID,QAAQ,EAAEoD,IAAA;UAE5C,OAAIF,GAAA,KAAQ,KACHjD,EAAA,CAAGmB,GAAA,CAAI,IAGZ8B,GAAA,KAAQ,KACHjD,EAAA,CAAGa,MAAA,CAAO,IAAM,KAAK,EAAK,IAG5BoC,GAAA;QACT,EACF;QAAA;QAEAvD,MAAA,EAAQf,UAAA;QACRgB,MAAA,EAAQhB,UAAA;QACRkB,MAAA,EAAQlB;MACV;IACF,EAGN,CACD,CACH;IAIA,OAFoByE,MAAA,CAAOC,WAAA,CAAYX,kBAAkB;EAG3D,CAAC;EAED,OAAO;IACLtB,GAAA;IACAtB,oBAAA;IACA2C;EACF;AACF","ignoreList":[]}
|
|
@@ -1,29 +1,28 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { ANYONE_CAN, definePermissions } from "@rocicorp/zero";
|
|
2
|
+
import { ensure, EnsureError, objectEntries } from "@vxrn/helpers";
|
|
3
|
+
import { runWithContext } from "./helpers/context.native.js";
|
|
2
4
|
import { prettyFormatZeroQuery } from "./helpers/prettyFormatZeroQuery.native.js";
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
var
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
update: "write",
|
|
19
|
-
upsert: "write",
|
|
20
|
-
delete: "write"
|
|
21
|
-
};
|
|
5
|
+
import { getWhereTableName } from "./where.native.js";
|
|
6
|
+
function createPermissions(param) {
|
|
7
|
+
var {
|
|
8
|
+
environment,
|
|
9
|
+
schema,
|
|
10
|
+
models,
|
|
11
|
+
getContext
|
|
12
|
+
} = param,
|
|
13
|
+
fallbackActions = {
|
|
14
|
+
select: "read",
|
|
15
|
+
insert: "write",
|
|
16
|
+
update: "write",
|
|
17
|
+
upsert: "write",
|
|
18
|
+
delete: "write"
|
|
19
|
+
};
|
|
22
20
|
function buildPermissionQuery(authData, eb, permissionWhere, action, objOrId) {
|
|
23
21
|
var tableName = getWhereTableName(permissionWhere);
|
|
24
22
|
if (!tableName) throw new Error("Must use PermissionWhere for buildPermissionQuery");
|
|
25
|
-
var tableSchema = schema.tables[tableName]
|
|
26
|
-
|
|
23
|
+
var tableSchema = schema.tables[tableName];
|
|
24
|
+
if (!tableSchema) throw new Error("No schema?");
|
|
25
|
+
var primaryKeys = tableSchema.primaryKey,
|
|
27
26
|
permissionQueryBuilder = permissionWhere(eb, authData),
|
|
28
27
|
fallbackAction = fallbackActions[action],
|
|
29
28
|
permissionCondition = permissionQueryBuilder[action] || (fallbackAction ? permissionQueryBuilder[fallbackAction] : void 0);
|
|
@@ -51,13 +50,13 @@ function createPermissions(schema, getContext) {
|
|
|
51
50
|
}
|
|
52
51
|
return eb.and(permissionCondition, ...primaryKeyWheres);
|
|
53
52
|
}
|
|
54
|
-
async function can(
|
|
53
|
+
async function can(where, action, obj) {
|
|
55
54
|
var ctx = getContext(),
|
|
56
|
-
tableName = getWhereTableName(
|
|
55
|
+
tableName = getWhereTableName(where);
|
|
57
56
|
if (!tableName) throw new Error("Must use where('table') style where to pass to can()");
|
|
58
|
-
|
|
57
|
+
environment === "server" && (await ensurePermission(ctx.tx, ctx.authData, tableName, where, action, obj), ctx.didCanPermissionsRun = !0);
|
|
59
58
|
}
|
|
60
|
-
async function ensurePermission(tx, authData, tableName,
|
|
59
|
+
async function ensurePermission(tx, authData, tableName, where, actionIn, obj) {
|
|
61
60
|
if (authData?.role !== "admin") {
|
|
62
61
|
var action = String(actionIn),
|
|
63
62
|
name = `${tableName}.${action}`,
|
|
@@ -65,7 +64,7 @@ function createPermissions(schema, getContext) {
|
|
|
65
64
|
query = null;
|
|
66
65
|
try {
|
|
67
66
|
query = queryBase.where(function (eb) {
|
|
68
|
-
return buildPermissionQuery(authData, eb,
|
|
67
|
+
return buildPermissionQuery(authData, eb, where, action, obj);
|
|
69
68
|
}).one(), ensure(await query);
|
|
70
69
|
} catch (err) {
|
|
71
70
|
var errorTitle = `${name} with auth id: ${authData?.id}`;
|
|
@@ -79,51 +78,38 @@ ${err}`);
|
|
|
79
78
|
}
|
|
80
79
|
}
|
|
81
80
|
}
|
|
82
|
-
|
|
83
|
-
var
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
return objOrId ? allowed : !1;
|
|
110
|
-
}
|
|
81
|
+
var readPermissions = definePermissions(schema, async function () {
|
|
82
|
+
var permissionsEntries = await Promise.all(objectEntries(models).map(async function (param2) {
|
|
83
|
+
var [key, model] = param2;
|
|
84
|
+
return await runWithContext({
|
|
85
|
+
authData: {
|
|
86
|
+
id: "",
|
|
87
|
+
role: void 0,
|
|
88
|
+
email: ""
|
|
89
|
+
}
|
|
90
|
+
}, function () {
|
|
91
|
+
return [key, {
|
|
92
|
+
row: {
|
|
93
|
+
select: [function (authData, eb) {
|
|
94
|
+
var out = model.permissions(eb, authData).read;
|
|
95
|
+
return out === !0 ? eb.and() : out === !1 ? eb.cmpLit(!0, "=", !1) : out;
|
|
96
|
+
}],
|
|
97
|
+
// we have permissions on these through our model system with custom mutators:
|
|
98
|
+
insert: ANYONE_CAN,
|
|
99
|
+
update: ANYONE_CAN,
|
|
100
|
+
delete: ANYONE_CAN
|
|
101
|
+
}
|
|
102
|
+
}];
|
|
103
|
+
});
|
|
104
|
+
})),
|
|
105
|
+
permissions = Object.fromEntries(permissionsEntries);
|
|
106
|
+
return permissions;
|
|
107
|
+
});
|
|
111
108
|
return {
|
|
112
|
-
where,
|
|
113
109
|
can,
|
|
114
|
-
|
|
110
|
+
buildPermissionQuery,
|
|
111
|
+
readPermissions
|
|
115
112
|
};
|
|
116
113
|
}
|
|
117
|
-
function runEnvironmentSafetyCheck() {
|
|
118
|
-
typeof document < "u" || typeof navigator < "u" && navigator.product === "ReactNative" || process.env.VITE_ENVIRONMENT !== "ssr" && console.error(`\u274C\u274C\u274C\u274C
|
|
119
|
-
|
|
120
|
-
ERROR: VITE_ENVIRONMENT is not set to "ssr" on server, which means permissions checks won't run when they should
|
|
121
|
-
This is makes Zero entirely insecure and needs to be fixed immediately.
|
|
122
|
-
|
|
123
|
-
This is likely a One framework issue, unless the user Vite config is overwriting the value.
|
|
124
|
-
One automatically sets this value.
|
|
125
|
-
|
|
126
|
-
`);
|
|
127
|
-
}
|
|
128
114
|
export { createPermissions };
|
|
129
115
|
//# sourceMappingURL=createPermissions.native.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["
|
|
1
|
+
{"version":3,"names":["ANYONE_CAN","definePermissions","ensure","EnsureError","objectEntries","runWithContext","prettyFormatZeroQuery","getWhereTableName","createPermissions","param","environment","schema","models","getContext","fallbackActions","select","insert","update","upsert","delete","buildPermissionQuery","authData","eb","permissionWhere","action","objOrId","tableName","Error","tableSchema","tables","primaryKeys","primaryKey","permissionQueryBuilder","fallbackAction","permissionCondition","cmpLit","primaryKeyWheres","_iteratorNormalCompletion","_didIteratorError","_iteratorError","_iterator","Symbol","iterator","_step","next","done","key","value","push","cmp","err","return","and","can","where","obj","ctx","ensurePermission","tx","didCanPermissionsRun","actionIn","role","String","name","queryBase","query","one","errorTitle","id","msg","process","env","NODE_ENV","readPermissions","permissionsEntries","Promise","all","map","param2","model","email","row","out","permissions","read","Object","fromEntries"],"sources":["../../src/createPermissions.ts"],"sourcesContent":[null],"mappings":"AAMA,SAASA,UAAA,EAAYC,iBAAA,QAAyB;AAC9C,SAASC,MAAA,EAAQC,WAAA,EAAaC,aAAA,QAAqB;AACnD,SAASC,cAAA,QAAsB;AAC/B,SAASC,qBAAA,QAA6B;AAEtC,SAASC,iBAAA,QAAyB;AAE3B,SAASC,kBAA6CC,KAAA;EAC3D;MAAAC,WAAA;MAAAC,MAAA;MAAAC,MAAA;MAAAC;IAAA,IAAAJ,KAAA;IAAAK,eAAA;MACAC,MAAA;MACAC,MAAA;MACAC,MAAA;MAMCC,MAAA;MAkBDC,MAAM;IAA0C;EACtC,SACRC,oBAAQA,CAAAC,QAAA,EAAAC,EAAA,EAAAC,eAAA,EAAAC,MAAA,EAAAC,OAAA;IACR,IAAAC,SAAQ,GAAAnB,iBAAA,CAAAgB,eAAA;IACR,KAAAG,SAAQ,EACR,MAAQ,IAAAC,KAAA;IACV,IAAAC,WAAA,GAAAjB,MAAA,CAAAkB,MAAA,CAAAH,SAAA;IAEA,KAAAE,WAAS,EAWP,MAAM,IAAAD,KAAA,CAAY;IAElB,IAAIG,WAAC,GAAAF,WAAA,CAAAG,UAAA;MAAAC,sBAAA,GAAAT,eAAA,CAAAD,EAAA,EAAAD,QAAA;MAAAY,cAAA,GAAAnB,eAAA,CAAAU,MAAA;MAAAU,mBAAA,GAAAF,sBAAA,CAAAR,MAAA,MAAAS,cAAA,GAAAD,sBAAA,CAAAC,cAAA;IACH,IAAAC,mBAAgB,UAGlB,MAAM,IAAAP,KAAA,8BAAqCH,MAAA,QAAAS,cAAA;IAE3C,IAAIC,mBAAC,SACH,OAAMZ,EAAA,CAAIa,MAAM,YAAY;IAG9B,IAAAD,mBAAoB,SAQpB,OAAIZ,EAAA,CAAAa,MAAA,UAAuB;IACzB,IAAAC,gBAAgB;MAAAC,yBAA6B,GAAM;MAAAC,iBAAsB,GAAG;MAAAC,cAAA;IAG9E,IAAI;MACF,SAAOC,SAAU,GAAMV,WAAS,CAAAW,MAAA,CAAAC,QAAA,KAAAC,KAAA,IAAAN,yBAAA,IAAAM,KAAA,GAAAH,SAAA,CAAAI,IAAA,IAAAC,IAAA,GAAAR,yBAAA;QAG9B,IAAAS,GAAA,GAAAH,KAAA,CAAAI,KAAA;UAAAA,KAAwB,UAAAtB,OAAA,eAAAA,OAAA,GAAAA,OAAA,CAAAqB,GAAA;QAC1BV,gBAAiB,CAAAY,IAAM,CAAA1B,EAAK,CAAA2B,GAAK,CAAAH,GAAA,EAAAC,KAAA;MAGnC;IAEA,SAAAG,GAAW;MACTZ,iBAAc,IAAO,GAAAC,cAAY,GAAAW,GAAW;IAC5C;MACF;QAEA,CAAAb,yBAAc,IAAAG,SAAwB,CAAAW,MAAA,IAAgB,QAAAX,SAAA,CAAAW,MAAA;MACxD;QAEA,IAAAb,iBAGiB,EACT,MAAMC,cACN;MACN;IACE;IAIE,OAAAjB,EAAA,CAAA8B,GAAA,CAAAlB,mBACF,EAAM,GAAAE,gBAAA;EAAA;EACA,eACAiB,IAAAC,KAAA,EAAA9B,MAAA,EAAA+B,GAAA;IAAA,IACJC,GAAA,GAAA3C,UAAA;MAAAa,SAAA,GAAAnB,iBAAA,CAAA+C,KAAA;IAAA,IACA,CAAA5B,SAAA,EACA,UAAAC,KAAA;IAAAjB,WACA,wBAAA+C,gBAAA,CAAAD,GAAA,CAAAE,EAAA,EAAAF,GAAA,CAAAnC,QAAA,EAAAK,SAAA,EAAA4B,KAAA,EAAA9B,MAAA,EAAA+B,GAAA,GAAAC,GAAA,CAAAG,oBAAA;EAAA;EAIN,eAAAF,iBAAAC,EAAA,EAAArC,QAAA,EAAAK,SAAA,EAAA4B,KAAA,EAAAM,QAAA,EAAAL,GAAA;IAEA,IAAAlC,QAAA,EAAewC,IAAA,YAIb;MAOA,IAAIrC,MAAA,GAAUsC,MAAA,CAAAF,QAAS;QAAAG,IAAA,MAAArC,SAAA,IAAAF,MAAA;QAAAwC,SAAA,GAAAN,EAAA,CAAAO,KAAA,CAAAvC,SAAA;QAAAuC,KAAA;MAErB;QAGFA,KAAM,GAAAD,SAAS,CAAOV,KAAA,WAChBhC,EAAA,EAAO;UAGT,OAAqCF,oBAAA,CAAAC,QAAA,EAAAC,EAAA,EAAAgC,KAAA,EAAA9B,MAAA,EAAA+B,GAAA;QAErC,GAAAW,GAAA,IAAAhE,MAAA,OAAA+D,KAAA;MACF,SAAQf,GAAA;QAOV,IAAAiB,UAAc,MAAAJ,IAAA,kBAAA1C,QAAA,EAAA+C,EAAA;QACZ,IAAMlB,GAAA,YAAa/C,WAAO;UAEtB,IAAAkE,GAAA,0CAA4BF,UAAA;UAC9B,MAAIG,OAAM,CAAAC,GAAA,CAAAC,QAAA,sBAAgCP,KAAA,KAAUI,GAAA;AACpD,GAAA/D,qBAAY,CAAA2D,KAAI,UAAatC,KAAA,CAAA0C,GAAA;QACd;QAGjB,UAAA1C,KAAA,6BAAAwC,UAAA;AAEA,EAAAjB,GAAA;MAA8D;IAChE;EACF;EAEA,IAAAuB,eAAM,GAAAxE,iBAAkB,CAAAU,MAAoC,oBAAoB;IAC9E,IAAA+D,kBAAM,SAAqBC,OAAM,CAAAC,GAAQ,CAAAxE,aAAA,CAAAQ,MAAA,EAAAiE,GAAA,iBAAAC,MAAA;QACvC,KAAAhC,GAAA,EAAAiC,KAAc,IAAAD,MAAQ;QACP,OACX,MAAAzE,cAAA;UAAAgB,QACE;YACF+C,EAAA;YACAP,IACS;YACLmB,KAAA;UAAA;QACA,eACO;UAAA,OACH,CAAQlC,GAAA,EAEJ;YAEAmC,GAAA;cAQOlE,MACT,GACF,UAAAM,QAAA,EAAAC,EAAA;gBAAA,IAAA4D,GAAA,GAAAH,KAAA,CAAAI,WAAA,CAAA7D,EAAA,EAAAD,QAAA,EAAA+D,IAAA;gBAEA,OAAQF,GAAA,UAAA5D,EAAA,CAAA8B,GAAA,KAAA8B,GAAA,UAAA5D,EAAA,CAAAa,MAAA,gBAAA+C,GAAA;cACR,EACA;cACF;cACFlE,MAAA,EAAAhB,UAAA;cACFiB,MAAA,EAAAjB,UAAA;cAGLmB,MAAA,EAAAnB;YACH;UAIA,CAFoB,CAGrB;QAED;MACE;MAAAmF,WAAA,GAAAE,MAAA,CAAAC,WAAA,CAAAZ,kBAAA;IACA,OAAAS,WAAA;EAAA,EACA;EACF;IACF9B,GAAA","ignoreList":[]}
|