mirror of
https://github.com/Abdulazizzn/n8n-enterprise-unlocked.git
synced 2025-12-17 18:12:04 +00:00
* first commit for postgres migration * (not working) * sqlite migration * quicksave * fix tests * fix pg test * fix postgres * fix variables import * fix execution saving * add user settings fix * change migration to single lines * patch preferences endpoint * cleanup * improve variable import * cleanup unusued code * Update packages/cli/src/PublicApi/v1/handlers/workflows/workflows.handler.ts Co-authored-by: Omar Ajoue <krynble@gmail.com> * address review notes * fix var update/import * refactor: Separate execution data to its own table (#6323) * wip: Temporary migration process * refactor: Create boilerplate repository methods for executions * fix: Lint issues * refactor: Added search endpoint to repository * refactor: Make the execution list work again * wip: Updating how we create and update executions everywhere * fix: Lint issues and remove most of the direct access to execution model * refactor: Remove includeWorkflowData flag and fix more tests * fix: Lint issues * fix: Fixed ordering of executions for FE, removed transaction when saving execution and removed unnecessary update * refactor: Add comment about missing feature * refactor: Refactor counting executions * refactor: Add migration for other dbms and fix issues found * refactor: Fix lint issues * refactor: Remove unnecessary comment and auto inject repo to internal hooks * refactor: remove type assertion * fix: Fix broken tests * fix: Remove unnecessary import * Remove unnecessary toString() call Co-authored-by: Iván Ovejero <ivov.src@gmail.com> * fix: Address comments after review * refactor: Remove unused import * fix: Lint issues * fix: Add correct migration files --------- Co-authored-by: Iván Ovejero <ivov.src@gmail.com> * remove null values from credential export * fix: Fix an issue with queue mode where all running execution would be returned * fix: Update n8n node to allow for workflow ids with letters * set upstream on set branch * remove typo * add nodeAccess to credentials * fix unsaved run check for undefined id * fix(core): Rename version control feature to source control (#6480) * rename versionControl to sourceControl * fix source control tooltip wording --------- Co-authored-by: Romain Minaud <romain.minaud@gmail.com> * fix(editor): Pay 548 hide the set up version control button (#6485) * feat(DebugHelper Node): Fix and include in main app (#6406) * improve node a bit * fixing continueOnFail() ton contain error in json * improve pairedItem * fix random data returning object results * fix nanoId length typo * update pnpm-lock file --------- Co-authored-by: Marcus <marcus@n8n.io> * fix(editor): Remove setup source control CTA button * fix(editor): Remove setup source control CTA button --------- Co-authored-by: Michael Auerswald <michael.auerswald@gmail.com> Co-authored-by: Marcus <marcus@n8n.io> * fix(editor): Update source control docs links (#6488) * feat(DebugHelper Node): Fix and include in main app (#6406) * improve node a bit * fixing continueOnFail() ton contain error in json * improve pairedItem * fix random data returning object results * fix nanoId length typo * update pnpm-lock file --------- Co-authored-by: Marcus <marcus@n8n.io> * feat(editor): Replace root events with event bus events (no-changelog) (#6454) * feat: replace root events with event bus events * fix: prevent cypress from replacing global with globalThis in import path * feat: remove emitter mixin * fix: replace component events with event bus * fix: fix linting issue * fix: fix breaking expression switch * chore: prettify ndv e2e suite code * fix(editor): Update source control docs links --------- Co-authored-by: Michael Auerswald <michael.auerswald@gmail.com> Co-authored-by: Marcus <marcus@n8n.io> Co-authored-by: Alex Grozav <alex@grozav.com> * fix tag endpoint regex --------- Co-authored-by: Omar Ajoue <krynble@gmail.com> Co-authored-by: Iván Ovejero <ivov.src@gmail.com> Co-authored-by: Romain Minaud <romain.minaud@gmail.com> Co-authored-by: Csaba Tuncsik <csaba@n8n.io> Co-authored-by: Marcus <marcus@n8n.io> Co-authored-by: Alex Grozav <alex@grozav.com>
189 lines
5.7 KiB
TypeScript
189 lines
5.7 KiB
TypeScript
import express from 'express';
|
|
import type { INodeCredentialTestResult } from 'n8n-workflow';
|
|
import { deepCopy, LoggerProxy } from 'n8n-workflow';
|
|
import * as Db from '@/Db';
|
|
import * as ResponseHelper from '@/ResponseHelper';
|
|
import type { CredentialsEntity } from '@db/entities/CredentialsEntity';
|
|
|
|
import type { CredentialRequest } from '@/requests';
|
|
import { isSharingEnabled, rightDiff } from '@/UserManagement/UserManagementHelper';
|
|
import { EECredentialsService as EECredentials } from './credentials.service.ee';
|
|
import type { CredentialWithSharings } from './credentials.types';
|
|
import { Container } from 'typedi';
|
|
import { InternalHooks } from '@/InternalHooks';
|
|
|
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
export const EECredentialsController = express.Router();
|
|
|
|
EECredentialsController.use((req, res, next) => {
|
|
if (!isSharingEnabled()) {
|
|
// skip ee router and use free one
|
|
next('router');
|
|
return;
|
|
}
|
|
// use ee router
|
|
next();
|
|
});
|
|
|
|
/**
|
|
* GET /credentials
|
|
*/
|
|
EECredentialsController.get(
|
|
'/',
|
|
ResponseHelper.send(async (req: CredentialRequest.GetAll): Promise<CredentialWithSharings[]> => {
|
|
try {
|
|
const allCredentials = await EECredentials.getAll(req.user, {
|
|
relations: ['shared', 'shared.role', 'shared.user'],
|
|
});
|
|
|
|
// eslint-disable-next-line @typescript-eslint/unbound-method
|
|
return allCredentials.map((credential: CredentialsEntity & CredentialWithSharings) =>
|
|
EECredentials.addOwnerAndSharings(credential),
|
|
);
|
|
} catch (error) {
|
|
LoggerProxy.error('Request to list credentials failed', error as Error);
|
|
throw error;
|
|
}
|
|
}),
|
|
);
|
|
|
|
/**
|
|
* GET /credentials/:id
|
|
*/
|
|
EECredentialsController.get(
|
|
'/:id(\\w+)',
|
|
(req, res, next) => (req.params.id === 'new' ? next('router') : next()), // skip ee router and use free one for naming
|
|
ResponseHelper.send(async (req: CredentialRequest.Get) => {
|
|
const { id: credentialId } = req.params;
|
|
const includeDecryptedData = req.query.includeData === 'true';
|
|
|
|
let credential = (await EECredentials.get(
|
|
{ id: credentialId },
|
|
{ relations: ['shared', 'shared.role', 'shared.user'] },
|
|
)) as CredentialsEntity & CredentialWithSharings;
|
|
|
|
if (!credential) {
|
|
throw new ResponseHelper.NotFoundError(
|
|
'Could not load the credential. If you think this is an error, ask the owner to share it with you again',
|
|
);
|
|
}
|
|
|
|
const userSharing = credential.shared?.find((shared) => shared.user.id === req.user.id);
|
|
|
|
if (!userSharing && req.user.globalRole.name !== 'owner') {
|
|
throw new ResponseHelper.UnauthorizedError('Forbidden.');
|
|
}
|
|
|
|
credential = EECredentials.addOwnerAndSharings(credential);
|
|
|
|
if (!includeDecryptedData || !userSharing || userSharing.role.name !== 'owner') {
|
|
const { data: _, ...rest } = credential;
|
|
return { ...rest };
|
|
}
|
|
|
|
const { data: _, ...rest } = credential;
|
|
|
|
const key = await EECredentials.getEncryptionKey();
|
|
const decryptedData = EECredentials.redact(
|
|
await EECredentials.decrypt(key, credential),
|
|
credential,
|
|
);
|
|
|
|
return { data: decryptedData, ...rest };
|
|
}),
|
|
);
|
|
|
|
/**
|
|
* POST /credentials/test
|
|
*
|
|
* Test if a credential is valid.
|
|
*/
|
|
EECredentialsController.post(
|
|
'/test',
|
|
ResponseHelper.send(async (req: CredentialRequest.Test): Promise<INodeCredentialTestResult> => {
|
|
const { credentials } = req.body;
|
|
|
|
const encryptionKey = await EECredentials.getEncryptionKey();
|
|
|
|
const credentialId = credentials.id;
|
|
const { ownsCredential } = await EECredentials.isOwned(req.user, credentialId);
|
|
|
|
const sharing = await EECredentials.getSharing(req.user, credentialId);
|
|
if (!ownsCredential) {
|
|
if (!sharing) {
|
|
throw new ResponseHelper.UnauthorizedError('Forbidden');
|
|
}
|
|
|
|
const decryptedData = await EECredentials.decrypt(encryptionKey, sharing.credentials);
|
|
Object.assign(credentials, { data: decryptedData });
|
|
}
|
|
|
|
const mergedCredentials = deepCopy(credentials);
|
|
if (mergedCredentials.data && sharing?.credentials) {
|
|
const decryptedData = await EECredentials.decrypt(encryptionKey, sharing.credentials);
|
|
mergedCredentials.data = EECredentials.unredact(mergedCredentials.data, decryptedData);
|
|
}
|
|
|
|
return EECredentials.test(req.user, encryptionKey, mergedCredentials);
|
|
}),
|
|
);
|
|
|
|
/**
|
|
* (EE) PUT /credentials/:id/share
|
|
*
|
|
* Grant or remove users' access to a credential.
|
|
*/
|
|
|
|
EECredentialsController.put(
|
|
'/:credentialId/share',
|
|
ResponseHelper.send(async (req: CredentialRequest.Share) => {
|
|
const { credentialId } = req.params;
|
|
const { shareWithIds } = req.body;
|
|
|
|
if (
|
|
!Array.isArray(shareWithIds) ||
|
|
!shareWithIds.every((userId) => typeof userId === 'string')
|
|
) {
|
|
throw new ResponseHelper.BadRequestError('Bad request');
|
|
}
|
|
|
|
const { ownsCredential, credential } = await EECredentials.isOwned(req.user, credentialId);
|
|
if (!ownsCredential || !credential) {
|
|
throw new ResponseHelper.UnauthorizedError('Forbidden');
|
|
}
|
|
|
|
let amountRemoved: number | null = null;
|
|
let newShareeIds: string[] = [];
|
|
await Db.transaction(async (trx) => {
|
|
// remove all sharings that are not supposed to exist anymore
|
|
const { affected } = await EECredentials.pruneSharings(trx, credentialId, [
|
|
req.user.id,
|
|
...shareWithIds,
|
|
]);
|
|
if (affected) amountRemoved = affected;
|
|
|
|
const sharings = await EECredentials.getSharings(trx, credentialId);
|
|
|
|
// extract the new sharings that need to be added
|
|
newShareeIds = rightDiff(
|
|
[sharings, (sharing) => sharing.userId],
|
|
[shareWithIds, (shareeId) => shareeId],
|
|
);
|
|
|
|
if (newShareeIds.length) {
|
|
await EECredentials.share(trx, credential, newShareeIds);
|
|
}
|
|
});
|
|
|
|
void Container.get(InternalHooks).onUserSharedCredentials({
|
|
user: req.user,
|
|
credential_name: credential.name,
|
|
credential_type: credential.type,
|
|
credential_id: credential.id,
|
|
user_id_sharer: req.user.id,
|
|
user_ids_sharees_added: newShareeIds,
|
|
sharees_removed: amountRemoved,
|
|
});
|
|
}),
|
|
);
|