Skip to content

Commit

Permalink
chore(build): build 1fcc28d [skip ci]
Browse files Browse the repository at this point in the history
  • Loading branch information
leancloud-bot committed Jul 4, 2024
1 parent 1fcc28d commit 6f78e1c
Show file tree
Hide file tree
Showing 68 changed files with 225,460 additions and 0 deletions.
8 changes: 8 additions & 0 deletions dist/av-core-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-core-min.js.map

Large diffs are not rendered by default.

25,189 changes: 25,189 additions & 0 deletions dist/av-core.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-core.js.map

Large diffs are not rendered by default.

25 changes: 25 additions & 0 deletions dist/av-live-query-core-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query-core-min.js.map

Large diffs are not rendered by default.

41,960 changes: 41,960 additions & 0 deletions dist/av-live-query-core.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query-core.js.map

Large diffs are not rendered by default.

39 changes: 39 additions & 0 deletions dist/av-live-query-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query-min.js.map

Large diffs are not rendered by default.

25 changes: 25 additions & 0 deletions dist/av-live-query-weapp-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query-weapp-min.js.map

Large diffs are not rendered by default.

43,553 changes: 43,553 additions & 0 deletions dist/av-live-query-weapp.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query-weapp.js.map

Large diffs are not rendered by default.

45,409 changes: 45,409 additions & 0 deletions dist/av-live-query.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-live-query.js.map

Large diffs are not rendered by default.

22 changes: 22 additions & 0 deletions dist/av-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-min.js.map

Large diffs are not rendered by default.

8 changes: 8 additions & 0 deletions dist/av-weapp-min.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-weapp-min.js.map

Large diffs are not rendered by default.

27,610 changes: 27,610 additions & 0 deletions dist/av-weapp.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av-weapp.js.map

Large diffs are not rendered by default.

28,823 changes: 28,823 additions & 0 deletions dist/av.js

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions dist/av.js.map

Large diffs are not rendered by default.

294 changes: 294 additions & 0 deletions dist/node/acl.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,294 @@
"use strict";

var _ = require('underscore');

module.exports = function (AV) {
var PUBLIC_KEY = '*';
/**
* Creates a new ACL.
* If no argument is given, the ACL has no permissions for anyone.
* If the argument is a AV.User, the ACL will have read and write
* permission for only that user.
* If the argument is any other JSON object, that object will be interpretted
* as a serialized ACL created with toJSON().
* @see AV.Object#setACL
* @class
*
* <p>An ACL, or Access Control List can be added to any
* <code>AV.Object</code> to restrict access to only a subset of users
* of your application.</p>
*/

AV.ACL = function (arg1) {
var self = this;
self.permissionsById = {};

if (_.isObject(arg1)) {
if (arg1 instanceof AV.User) {
self.setReadAccess(arg1, true);
self.setWriteAccess(arg1, true);
} else {
if (_.isFunction(arg1)) {
throw new Error('AV.ACL() called with a function. Did you forget ()?');
}

AV._objectEach(arg1, function (accessList, userId) {
if (!_.isString(userId)) {
throw new Error('Tried to create an ACL with an invalid userId.');
}

self.permissionsById[userId] = {};

AV._objectEach(accessList, function (allowed, permission) {
if (permission !== 'read' && permission !== 'write') {
throw new Error('Tried to create an ACL with an invalid permission type.');
}

if (!_.isBoolean(allowed)) {
throw new Error('Tried to create an ACL with an invalid permission value.');
}

self.permissionsById[userId][permission] = allowed;
});
});
}
}
};
/**
* Returns a JSON-encoded version of the ACL.
* @return {Object}
*/


AV.ACL.prototype.toJSON = function () {
return _.clone(this.permissionsById);
};

AV.ACL.prototype._setAccess = function (accessType, userId, allowed) {
if (userId instanceof AV.User) {
userId = userId.id;
} else if (userId instanceof AV.Role) {
userId = 'role:' + userId.getName();
}

if (!_.isString(userId)) {
throw new Error('userId must be a string.');
}

if (!_.isBoolean(allowed)) {
throw new Error('allowed must be either true or false.');
}

var permissions = this.permissionsById[userId];

if (!permissions) {
if (!allowed) {
// The user already doesn't have this permission, so no action needed.
return;
} else {
permissions = {};
this.permissionsById[userId] = permissions;
}
}

if (allowed) {
this.permissionsById[userId][accessType] = true;
} else {
delete permissions[accessType];

if (_.isEmpty(permissions)) {
delete this.permissionsById[userId];
}
}
};

AV.ACL.prototype._getAccess = function (accessType, userId) {
if (userId instanceof AV.User) {
userId = userId.id;
} else if (userId instanceof AV.Role) {
userId = 'role:' + userId.getName();
}

var permissions = this.permissionsById[userId];

if (!permissions) {
return false;
}

return permissions[accessType] ? true : false;
};
/**
* Set whether the given user is allowed to read this object.
* @param userId An instance of AV.User or its objectId.
* @param {Boolean} allowed Whether that user should have read access.
*/


AV.ACL.prototype.setReadAccess = function (userId, allowed) {
this._setAccess('read', userId, allowed);
};
/**
* Get whether the given user id is *explicitly* allowed to read this object.
* Even if this returns false, the user may still be able to access it if
* getPublicReadAccess returns true or a role that the user belongs to has
* write access.
* @param userId An instance of AV.User or its objectId, or a AV.Role.
* @return {Boolean}
*/


AV.ACL.prototype.getReadAccess = function (userId) {
return this._getAccess('read', userId);
};
/**
* Set whether the given user id is allowed to write this object.
* @param userId An instance of AV.User or its objectId, or a AV.Role..
* @param {Boolean} allowed Whether that user should have write access.
*/


AV.ACL.prototype.setWriteAccess = function (userId, allowed) {
this._setAccess('write', userId, allowed);
};
/**
* Get whether the given user id is *explicitly* allowed to write this object.
* Even if this returns false, the user may still be able to write it if
* getPublicWriteAccess returns true or a role that the user belongs to has
* write access.
* @param userId An instance of AV.User or its objectId, or a AV.Role.
* @return {Boolean}
*/


AV.ACL.prototype.getWriteAccess = function (userId) {
return this._getAccess('write', userId);
};
/**
* Set whether the public is allowed to read this object.
* @param {Boolean} allowed
*/


AV.ACL.prototype.setPublicReadAccess = function (allowed) {
this.setReadAccess(PUBLIC_KEY, allowed);
};
/**
* Get whether the public is allowed to read this object.
* @return {Boolean}
*/


AV.ACL.prototype.getPublicReadAccess = function () {
return this.getReadAccess(PUBLIC_KEY);
};
/**
* Set whether the public is allowed to write this object.
* @param {Boolean} allowed
*/


AV.ACL.prototype.setPublicWriteAccess = function (allowed) {
this.setWriteAccess(PUBLIC_KEY, allowed);
};
/**
* Get whether the public is allowed to write this object.
* @return {Boolean}
*/


AV.ACL.prototype.getPublicWriteAccess = function () {
return this.getWriteAccess(PUBLIC_KEY);
};
/**
* Get whether users belonging to the given role are allowed
* to read this object. Even if this returns false, the role may
* still be able to write it if a parent role has read access.
*
* @param role The name of the role, or a AV.Role object.
* @return {Boolean} true if the role has read access. false otherwise.
* @throws {String} If role is neither a AV.Role nor a String.
*/


AV.ACL.prototype.getRoleReadAccess = function (role) {
if (role instanceof AV.Role) {
// Normalize to the String name
role = role.getName();
}

if (_.isString(role)) {
return this.getReadAccess('role:' + role);
}

throw new Error('role must be a AV.Role or a String');
};
/**
* Get whether users belonging to the given role are allowed
* to write this object. Even if this returns false, the role may
* still be able to write it if a parent role has write access.
*
* @param role The name of the role, or a AV.Role object.
* @return {Boolean} true if the role has write access. false otherwise.
* @throws {String} If role is neither a AV.Role nor a String.
*/


AV.ACL.prototype.getRoleWriteAccess = function (role) {
if (role instanceof AV.Role) {
// Normalize to the String name
role = role.getName();
}

if (_.isString(role)) {
return this.getWriteAccess('role:' + role);
}

throw new Error('role must be a AV.Role or a String');
};
/**
* Set whether users belonging to the given role are allowed
* to read this object.
*
* @param role The name of the role, or a AV.Role object.
* @param {Boolean} allowed Whether the given role can read this object.
* @throws {String} If role is neither a AV.Role nor a String.
*/


AV.ACL.prototype.setRoleReadAccess = function (role, allowed) {
if (role instanceof AV.Role) {
// Normalize to the String name
role = role.getName();
}

if (_.isString(role)) {
this.setReadAccess('role:' + role, allowed);
return;
}

throw new Error('role must be a AV.Role or a String');
};
/**
* Set whether users belonging to the given role are allowed
* to write this object.
*
* @param role The name of the role, or a AV.Role object.
* @param {Boolean} allowed Whether the given role can write this object.
* @throws {String} If role is neither a AV.Role nor a String.
*/


AV.ACL.prototype.setRoleWriteAccess = function (role, allowed) {
if (role instanceof AV.Role) {
// Normalize to the String name
role = role.getName();
}

if (_.isString(role)) {
this.setWriteAccess('role:' + role, allowed);
return;
}

throw new Error('role must be a AV.Role or a String');
};
};
43 changes: 43 additions & 0 deletions dist/node/adapter.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
"use strict";

var _interopRequireDefault = require("@babel/runtime-corejs3/helpers/interopRequireDefault");

var _keys = _interopRequireDefault(require("@babel/runtime-corejs3/core-js-stable/instance/keys"));

var _ = require('underscore');

var EventEmitter = require('eventemitter3');

var _require = require('./utils'),
inherits = _require.inherits;

var AdapterManager = inherits(EventEmitter, {
constructor: function constructor() {
EventEmitter.apply(this);
this._adapters = {};
},
getAdapter: function getAdapter(name) {
var adapter = this._adapters[name];

if (adapter === undefined) {
throw new Error("".concat(name, " adapter is not configured"));
}

return adapter;
},
setAdapters: function setAdapters(newAdapters) {
var _this = this;

_.extend(this._adapters, newAdapters);

(0, _keys.default)(_).call(_, newAdapters).forEach(function (name) {
return _this.emit(name, newAdapters[name]);
});
}
});
var adapterManager = new AdapterManager();
module.exports = {
getAdapter: adapterManager.getAdapter.bind(adapterManager),
setAdapters: adapterManager.setAdapters.bind(adapterManager),
adapterManager: adapterManager
};
Loading

0 comments on commit 6f78e1c

Please sign in to comment.