Files
directus/api/src/services/items.ts
Rijk van Zanten dbf35a1736 Add ability to share items with people outside the platform (#10663)
* Add directus_shares

* Don't check for usage limit on refresh

* Add all endpoints to the shares controller

* Move route `/auth/shared` to `/shared/auth`

* Add password protection

* Add `share` action in permissions

* Add `shares/:pk/info`

* Start on shared-view

* Add basic styling for full shared view

* Fixed migrations

* Add inline style for shared view

* Allow title override

* Finish /info endpoint for shares

* Add basic UUID validation to share/info endpont

* Add UUID validation to other routes

* Add not found state

* Cleanup /extract/finish share login endpoint

* Cleanup auth

* Added `share_start` and `share_end`

* Add share sidebar details.

* Allow share permissions configuration

* Hide the `new_share` button for unauthorized users

* Fix uses_left displayed value

* Show expired / upcoming shares

* Improved expired/upcoming styling

* Fixed share login query

* Fix check-ip and get-permissions middlewares behaviour when role is null

* Simplify cache key

* Fix typescript linting issues

* Handle app auth flow for shared page

* Fixed /users/me response

* Show when user is authenticated

* Try showing item drawer in shared page

* Improved shared card styling

* Add shares permissions and change share card styling

* Pull in schema/permissions on share

* Create getPermissionForShare file

* Change getPermissionsForShare signature

* Render form + item on share after auth

* Finalize public front end

* Handle fake o2m field in applyQuery

* [WIP]

* New translations en-US.yaml (Bulgarian) (#10585)

* smaller label height (#10587)

* Update to the latest Material Icons (#10573)

The icons are based on https://fonts.google.com/icons

* New translations en-US.yaml (Arabic) (#10593)

* New translations en-US.yaml (Arabic) (#10594)

* New translations en-US.yaml (Portuguese, Brazilian) (#10604)

* New translations en-US.yaml (French) (#10605)

* New translations en-US.yaml (Italian) (#10613)

* fix M2A list not updating (#10617)

* Fix filters

* Add admin filter on m2o role selection

* Add admin filter on m2o role selection

* Add o2m permissions traversing

* Finish relational tree permissions generation

* Handle implicit a2o relation

* Update implicit relation regex

* Fix regex

* Fix implicitRelation unnesting for new regex

* Fix implicitRelation length check

* Rename m2a to a2o internally

* Add auto-gen permissions for a2o

* [WIP] Improve share UX

* Add ctx menu options

* Add share dialog

* Add email notifications

* Tweak endpoint

* Tweak file interface disabled state

* Add nicer invalid state to password input

* Dont return info for expired/upcoming shares

* Tweak disabled state for relational interfaces

* Fix share button for non admin roles

* Show/hide edit/delete based on permissions to shares

* Fix imports of mutationtype

* Resolve (my own) suggestions

* Fix migration for ms sql

* Resolve last suggestion

Co-authored-by: Oreilles <oreilles.github@nitoref.io>
Co-authored-by: Oreilles <33065839+oreilles@users.noreply.github.com>
Co-authored-by: Ben Haynes <ben@rngr.org>
Co-authored-by: Thien Nguyen <72242664+tatthien@users.noreply.github.com>
Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com>
2021-12-23 18:51:59 -05:00

716 lines
21 KiB
TypeScript

import { Knex } from 'knex';
import { clone, cloneDeep, pick, without, assign } from 'lodash';
import { getCache } from '../cache';
import Keyv from 'keyv';
import getDatabase from '../database';
import runAST from '../database/run-ast';
import emitter from '../emitter';
import env from '../env';
import { ForbiddenException } from '../exceptions';
import { translateDatabaseError } from '../exceptions/database/translate';
import { Accountability, Query, PermissionsAction } from '@directus/shared/types';
import {
AbstractService,
AbstractServiceOptions,
Action,
Item as AnyItem,
PrimaryKey,
SchemaOverview,
MutationOptions,
} from '../types';
import getASTFromQuery from '../utils/get-ast-from-query';
import { AuthorizationService } from './authorization';
import { PayloadService } from './payload';
import { ActivityService, RevisionsService } from './index';
export type QueryOptions = {
stripNonRequested?: boolean;
permissionsAction?: PermissionsAction;
};
export class ItemsService<Item extends AnyItem = AnyItem> implements AbstractService {
collection: string;
knex: Knex;
accountability: Accountability | null;
eventScope: string;
schema: SchemaOverview;
cache: Keyv<any> | null;
constructor(collection: string, options: AbstractServiceOptions) {
this.collection = collection;
this.knex = options.knex || getDatabase();
this.accountability = options.accountability || null;
this.eventScope = this.collection.startsWith('directus_') ? this.collection.substring(9) : 'items';
this.schema = options.schema;
this.cache = getCache().cache;
return this;
}
async getKeysByQuery(query: Query): Promise<PrimaryKey[]> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const readQuery = cloneDeep(query);
readQuery.fields = [primaryKeyField];
// Allow unauthenticated access
const itemsService = new ItemsService(this.collection, {
knex: this.knex,
schema: this.schema,
});
// We read the IDs of the items based on the query, and then run `updateMany`. `updateMany` does it's own
// permissions check for the keys, so we don't have to make this an authenticated read
const items = await itemsService.readByQuery(readQuery);
return items.map((item: AnyItem) => item[primaryKeyField]).filter((pk) => pk);
}
/**
* Create a single new item.
*/
async createOne(data: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const fields = Object.keys(this.schema.collections[this.collection].fields);
const aliases = Object.values(this.schema.collections[this.collection].fields)
.filter((field) => field.alias === true)
.map((field) => field.field);
const payload: AnyItem = cloneDeep(data);
// By wrapping the logic in a transaction, we make sure we automatically roll back all the
// changes in the DB if any of the parts contained within throws an error. This also means
// that any errors thrown in any nested relational changes will bubble up and cancel the whole
// update tree
const primaryKey: PrimaryKey = await this.knex.transaction(async (trx) => {
// We're creating new services instances so they can use the transaction as their Knex interface
const payloadService = new PayloadService(this.collection, {
accountability: this.accountability,
knex: trx,
schema: this.schema,
});
const authorizationService = new AuthorizationService({
accountability: this.accountability,
knex: trx,
schema: this.schema,
});
// Run all hooks that are attached to this event so the end user has the chance to augment the
// item that is about to be saved
const payloadAfterHooks =
opts?.emitEvents !== false
? await emitter.emitFilter(
`${this.eventScope}.create`,
payload,
{
collection: this.collection,
},
{
database: trx,
schema: this.schema,
accountability: this.accountability,
}
)
: payload;
const payloadWithPresets = this.accountability
? await authorizationService.validatePayload('create', this.collection, payloadAfterHooks)
: payloadAfterHooks;
const { payload: payloadWithM2O, revisions: revisionsM2O } = await payloadService.processM2O(payloadWithPresets);
const { payload: payloadWithA2O, revisions: revisionsA2O } = await payloadService.processA2O(payloadWithM2O);
const payloadWithoutAliases = pick(payloadWithA2O, without(fields, ...aliases));
const payloadWithTypeCasting = await payloadService.processValues('create', payloadWithoutAliases);
// In case of manual string / UUID primary keys, they PK already exists in the object we're saving.
let primaryKey = payloadWithTypeCasting[primaryKeyField];
try {
const result = await trx.insert(payloadWithoutAliases).into(this.collection).returning(primaryKeyField);
primaryKey = primaryKey ?? result[0];
} catch (err: any) {
throw await translateDatabaseError(err);
}
// Most database support returning, those who don't tend to return the PK anyways
// (MySQL/SQLite). In case the primary key isn't know yet, we'll do a best-attempt at
// fetching it based on the last inserted row
if (!primaryKey) {
// Fetching it with max should be safe, as we're in the context of the current transaction
const result = await trx.max(primaryKeyField, { as: 'id' }).from(this.collection).first();
primaryKey = result.id;
// Set the primary key on the input item, in order for the "after" event hook to be able
// to read from it
payload[primaryKeyField] = primaryKey;
}
const { revisions: revisionsO2M } = await payloadService.processO2M(payload, primaryKey);
// If this is an authenticated action, and accountability tracking is enabled, save activity row
if (this.accountability && this.schema.collections[this.collection].accountability !== null) {
const activityService = new ActivityService({
knex: trx,
schema: this.schema,
});
const activity = await activityService.createOne({
action: Action.CREATE,
user: this.accountability!.user,
collection: this.collection,
ip: this.accountability!.ip,
user_agent: this.accountability!.userAgent,
item: primaryKey,
});
// If revisions are tracked, create revisions record
if (this.schema.collections[this.collection].accountability === 'all') {
const revisionsService = new RevisionsService({
knex: trx,
schema: this.schema,
});
const revision = await revisionsService.createOne({
activity: activity,
collection: this.collection,
item: primaryKey,
data: await payloadService.prepareDelta(payload),
delta: await payloadService.prepareDelta(payload),
});
// Make sure to set the parent field of the child-revision rows
const childrenRevisions = [...revisionsM2O, ...revisionsA2O, ...revisionsO2M];
if (childrenRevisions.length > 0) {
await revisionsService.updateMany(childrenRevisions, { parent: revision });
}
if (opts?.onRevisionCreate) {
opts.onRevisionCreate(revision);
}
}
}
return primaryKey;
});
if (opts?.emitEvents !== false) {
emitter.emitAction(
`${this.eventScope}.create`,
{
payload,
key: primaryKey,
collection: this.collection,
},
{
// This hook is called async. If we would pass the transaction here, the hook can be
// called after the transaction is done #5460
database: getDatabase(),
schema: this.schema,
accountability: this.accountability,
}
);
}
if (this.cache && env.CACHE_AUTO_PURGE && opts?.autoPurgeCache !== false) {
await this.cache.clear();
}
return primaryKey;
}
/**
* Create multiple new items at once. Inserts all provided records sequentially wrapped in a transaction.
*/
async createMany(data: Partial<Item>[], opts?: MutationOptions): Promise<PrimaryKey[]> {
const primaryKeys = await this.knex.transaction(async (trx) => {
const service = new ItemsService(this.collection, {
accountability: this.accountability,
schema: this.schema,
knex: trx,
});
const primaryKeys: PrimaryKey[] = [];
for (const payload of data) {
const primaryKey = await service.createOne(payload, { ...(opts || {}), autoPurgeCache: false });
primaryKeys.push(primaryKey);
}
return primaryKeys;
});
if (this.cache && env.CACHE_AUTO_PURGE && opts?.autoPurgeCache !== false) {
await this.cache.clear();
}
return primaryKeys;
}
/**
* Get items by query
*/
async readByQuery(query: Query, opts?: QueryOptions): Promise<Item[]> {
const authorizationService = new AuthorizationService({
accountability: this.accountability,
knex: this.knex,
schema: this.schema,
});
let ast = await getASTFromQuery(this.collection, query, this.schema, {
accountability: this.accountability,
// By setting the permissions action, you can read items using the permissions for another
// operation's permissions. This is used to dynamically check if you have update/delete
// access to (a) certain item(s)
action: opts?.permissionsAction || 'read',
knex: this.knex,
});
if (this.accountability && this.accountability.admin !== true) {
ast = await authorizationService.processAST(ast, opts?.permissionsAction);
}
const records = await runAST(ast, this.schema, {
knex: this.knex,
// GraphQL requires relational keys to be returned regardless
stripNonRequested: opts?.stripNonRequested !== undefined ? opts.stripNonRequested : true,
});
if (records === null) {
throw new ForbiddenException();
}
const filteredRecords = await emitter.emitFilter(
`${this.eventScope}.read`,
records,
{
query,
collection: this.collection,
},
{
database: this.knex,
schema: this.schema,
accountability: this.accountability,
}
);
emitter.emitAction(
`${this.eventScope}.read`,
{
payload: filteredRecords,
query,
collection: this.collection,
},
{
database: getDatabase(),
schema: this.schema,
accountability: this.accountability,
}
);
return filteredRecords as Item[];
}
/**
* Get single item by primary key
*/
async readOne(key: PrimaryKey, query: Query = {}, opts?: QueryOptions): Promise<Item> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const filterWithKey = assign({}, query.filter, { [primaryKeyField]: { _eq: key } });
const queryWithKey = assign({}, query, { filter: filterWithKey });
const results = await this.readByQuery(queryWithKey, opts);
if (results.length === 0) {
throw new ForbiddenException();
}
return results[0];
}
/**
* Get multiple items by primary keys
*/
async readMany(keys: PrimaryKey[], query: Query = {}, opts?: QueryOptions): Promise<Item[]> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const filterWithKey = { _and: [{ [primaryKeyField]: { _in: keys } }, query.filter ?? {}] };
const queryWithKey = assign({}, query, { filter: filterWithKey });
const results = await this.readByQuery(queryWithKey, opts);
return results;
}
/**
* Update multiple items by query
*/
async updateByQuery(query: Query, data: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey[]> {
const keys = await this.getKeysByQuery(query);
return keys.length ? await this.updateMany(keys, data, opts) : [];
}
/**
* Update a single item by primary key
*/
async updateOne(key: PrimaryKey, data: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey> {
await this.updateMany([key], data, opts);
return key;
}
/**
* Update many items by primary key
*/
async updateMany(keys: PrimaryKey[], data: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey[]> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const fields = Object.keys(this.schema.collections[this.collection].fields);
const aliases = Object.values(this.schema.collections[this.collection].fields)
.filter((field) => field.alias === true)
.map((field) => field.field);
const payload: Partial<AnyItem> = cloneDeep(data);
const authorizationService = new AuthorizationService({
accountability: this.accountability,
knex: this.knex,
schema: this.schema,
});
// Run all hooks that are attached to this event so the end user has the chance to augment the
// item that is about to be saved
const payloadAfterHooks =
opts?.emitEvents !== false
? await emitter.emitFilter(
`${this.eventScope}.update`,
payload,
{
keys,
collection: this.collection,
},
{
database: this.knex,
schema: this.schema,
accountability: this.accountability,
}
)
: payload;
if (this.accountability) {
await authorizationService.checkAccess('update', this.collection, keys);
}
const payloadWithPresets = this.accountability
? await authorizationService.validatePayload('update', this.collection, payloadAfterHooks)
: payloadAfterHooks;
await this.knex.transaction(async (trx) => {
const payloadService = new PayloadService(this.collection, {
accountability: this.accountability,
knex: trx,
schema: this.schema,
});
const { payload: payloadWithM2O, revisions: revisionsM2O } = await payloadService.processM2O(payloadWithPresets);
const { payload: payloadWithA2O, revisions: revisionsA2O } = await payloadService.processA2O(payloadWithM2O);
const payloadWithoutAliasAndPK = pick(payloadWithA2O, without(fields, primaryKeyField, ...aliases));
const payloadWithTypeCasting = await payloadService.processValues('update', payloadWithoutAliasAndPK);
if (Object.keys(payloadWithTypeCasting).length > 0) {
try {
await trx(this.collection).update(payloadWithTypeCasting).whereIn(primaryKeyField, keys);
} catch (err: any) {
throw await translateDatabaseError(err);
}
}
const childrenRevisions = [...revisionsM2O, ...revisionsA2O];
for (const key of keys) {
const { revisions } = await payloadService.processO2M(payload, key);
childrenRevisions.push(...revisions);
}
// If this is an authenticated action, and accountability tracking is enabled, save activity row
if (this.accountability && this.schema.collections[this.collection].accountability !== null) {
const activityService = new ActivityService({
knex: trx,
schema: this.schema,
});
const activity = await activityService.createMany(
keys.map((key) => ({
action: Action.UPDATE,
user: this.accountability!.user,
collection: this.collection,
ip: this.accountability!.ip,
user_agent: this.accountability!.userAgent,
item: key,
}))
);
if (this.schema.collections[this.collection].accountability === 'all') {
const itemsService = new ItemsService(this.collection, {
knex: trx,
schema: this.schema,
});
const snapshots = await itemsService.readMany(keys);
const revisionsService = new RevisionsService({
knex: trx,
schema: this.schema,
});
const revisionIDs = await revisionsService.createMany(
await Promise.all(
activity.map(async (activity, index) => ({
activity: activity,
collection: this.collection,
item: keys[index],
data:
snapshots && Array.isArray(snapshots) ? JSON.stringify(snapshots[index]) : JSON.stringify(snapshots),
delta: await payloadService.prepareDelta(payloadWithTypeCasting),
}))
)
);
for (let i = 0; i < revisionIDs.length; i++) {
const revisionID = revisionIDs[i];
if (opts?.onRevisionCreate) {
opts.onRevisionCreate(revisionID);
}
if (i === 0) {
// In case of a nested relational creation/update in a updateMany, the nested m2o/a2o
// creation is only done once. We treat the first updated item as the "main" update,
// with all other revisions on the current level as regular "flat" updates, and
// nested revisions as children of this first "root" item.
if (childrenRevisions.length > 0) {
await revisionsService.updateMany(childrenRevisions, { parent: revisionID });
}
}
}
}
}
});
if (this.cache && env.CACHE_AUTO_PURGE && opts?.autoPurgeCache !== false) {
await this.cache.clear();
}
if (opts?.emitEvents !== false) {
emitter.emitAction(
`${this.eventScope}.update`,
{
payload,
keys,
collection: this.collection,
},
{
// This hook is called async. If we would pass the transaction here, the hook can be
// called after the transaction is done #5460
database: getDatabase(),
schema: this.schema,
accountability: this.accountability,
}
);
}
return keys;
}
/**
* Upsert a single item
*/
async upsertOne(payload: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const primaryKey: PrimaryKey | undefined = payload[primaryKeyField];
const exists =
primaryKey &&
!!(await this.knex
.select(primaryKeyField)
.from(this.collection)
.where({ [primaryKeyField]: primaryKey })
.first());
if (exists) {
return await this.updateOne(primaryKey as PrimaryKey, payload, opts);
} else {
return await this.createOne(payload, opts);
}
}
/**
* Upsert many items
*/
async upsertMany(payloads: Partial<Item>[], opts?: MutationOptions): Promise<PrimaryKey[]> {
const primaryKeys = await this.knex.transaction(async (trx) => {
const service = new ItemsService(this.collection, {
accountability: this.accountability,
schema: this.schema,
knex: trx,
});
const primaryKeys: PrimaryKey[] = [];
for (const payload of payloads) {
const primaryKey = await service.upsertOne(payload, { ...(opts || {}), autoPurgeCache: false });
primaryKeys.push(primaryKey);
}
return primaryKeys;
});
if (this.cache && env.CACHE_AUTO_PURGE && opts?.autoPurgeCache !== false) {
await this.cache.clear();
}
return primaryKeys;
}
/**
* Delete multiple items by query
*/
async deleteByQuery(query: Query, opts?: MutationOptions): Promise<PrimaryKey[]> {
const keys = await this.getKeysByQuery(query);
return keys.length ? await this.deleteMany(keys, opts) : [];
}
/**
* Delete a single item by primary key
*/
async deleteOne(key: PrimaryKey, opts?: MutationOptions): Promise<PrimaryKey> {
await this.deleteMany([key], opts);
return key;
}
/**
* Delete multiple items by primary key
*/
async deleteMany(keys: PrimaryKey[], opts?: MutationOptions): Promise<PrimaryKey[]> {
const primaryKeyField = this.schema.collections[this.collection].primary;
if (this.accountability && this.accountability.admin !== true) {
const authorizationService = new AuthorizationService({
accountability: this.accountability,
schema: this.schema,
});
await authorizationService.checkAccess('delete', this.collection, keys);
}
if (opts?.emitEvents !== false) {
await emitter.emitFilter(
`${this.eventScope}.delete`,
keys,
{
collection: this.collection,
},
{
database: this.knex,
schema: this.schema,
accountability: this.accountability,
}
);
}
await this.knex.transaction(async (trx) => {
await trx(this.collection).whereIn(primaryKeyField, keys).delete();
if (this.accountability && this.schema.collections[this.collection].accountability !== null) {
const activityService = new ActivityService({
knex: trx,
schema: this.schema,
});
await activityService.createMany(
keys.map((key) => ({
action: Action.DELETE,
user: this.accountability!.user,
collection: this.collection,
ip: this.accountability!.ip,
user_agent: this.accountability!.userAgent,
item: key,
}))
);
}
});
if (this.cache && env.CACHE_AUTO_PURGE && opts?.autoPurgeCache !== false) {
await this.cache.clear();
}
if (opts?.emitEvents !== false) {
emitter.emitAction(
`${this.eventScope}.delete`,
{
payload: keys,
collection: this.collection,
},
{
// This hook is called async. If we would pass the transaction here, the hook can be
// called after the transaction is done #5460
database: getDatabase(),
schema: this.schema,
accountability: this.accountability,
}
);
}
return keys;
}
/**
* Read/treat collection as singleton
*/
async readSingleton(query: Query, opts?: QueryOptions): Promise<Partial<Item>> {
query = clone(query);
query.limit = 1;
const records = await this.readByQuery(query, opts);
const record = records[0];
if (!record) {
let fields = Object.entries(this.schema.collections[this.collection].fields);
const defaults: Record<string, any> = {};
if (query.fields && query.fields.includes('*') === false) {
fields = fields.filter(([name]) => {
return query.fields!.includes(name);
});
}
for (const [name, field] of fields) {
if (this.schema.collections[this.collection].primary === name) {
defaults[name] = null;
continue;
}
defaults[name] = field.defaultValue;
}
return defaults as Partial<Item>;
}
return record;
}
/**
* Upsert/treat collection as singleton
*/
async upsertSingleton(data: Partial<Item>, opts?: MutationOptions): Promise<PrimaryKey> {
const primaryKeyField = this.schema.collections[this.collection].primary;
const record = await this.knex.select(primaryKeyField).from(this.collection).limit(1).first();
if (record) {
return await this.updateOne(record[primaryKeyField], data, opts);
}
return await this.createOne(data, opts);
}
}