2020-07-21 13:20:51 +00:00
|
|
|
/**
|
|
|
|
* Module to manage "active" Grist documents, i.e. those loaded in-memory, with
|
|
|
|
* clients connected to them. It handles the incoming user actions, and outgoing
|
|
|
|
* change events.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import * as assert from 'assert';
|
2020-12-07 21:15:58 +00:00
|
|
|
import {Mutex} from 'async-mutex';
|
2020-07-21 13:20:51 +00:00
|
|
|
import * as bluebird from 'bluebird';
|
|
|
|
import {EventEmitter} from 'events';
|
|
|
|
import {IMessage, MsgType} from 'grain-rpc';
|
|
|
|
import * as imageSize from 'image-size';
|
|
|
|
import * as moment from 'moment-timezone';
|
2021-01-27 23:03:30 +00:00
|
|
|
import fetch from 'node-fetch';
|
2020-07-21 13:20:51 +00:00
|
|
|
import * as tmp from 'tmp';
|
|
|
|
|
2021-07-01 15:15:43 +00:00
|
|
|
import {getEnvContent, LocalActionBundle, SandboxActionBundle, UserActionBundle} from 'app/common/ActionBundle';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {ActionGroup} from 'app/common/ActionGroup';
|
2021-07-01 15:15:43 +00:00
|
|
|
import {
|
|
|
|
ApplyUAOptions,
|
|
|
|
ApplyUAResult,
|
|
|
|
DataSourceTransformed,
|
|
|
|
ForkResult,
|
|
|
|
ImportResult,
|
|
|
|
Query,
|
|
|
|
QueryResult
|
|
|
|
} from 'app/common/ActiveDocAPI';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {ApiError} from 'app/common/ApiError';
|
|
|
|
import {mapGetOrSet, MapWithTTL} from 'app/common/AsyncCreate';
|
2021-07-01 15:15:43 +00:00
|
|
|
import {
|
|
|
|
BulkColValues,
|
|
|
|
CellValue,
|
|
|
|
DocAction,
|
|
|
|
RowRecord,
|
|
|
|
TableDataAction,
|
|
|
|
toTableDataAction,
|
|
|
|
UserAction
|
|
|
|
} from 'app/common/DocActions';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {DocData} from 'app/common/DocData';
|
2020-10-30 16:53:23 +00:00
|
|
|
import {DocSnapshots} from 'app/common/DocSnapshot';
|
2021-03-10 14:08:46 +00:00
|
|
|
import {FormulaProperties, getFormulaProperties} from 'app/common/GranularAccessClause';
|
2020-11-11 21:29:11 +00:00
|
|
|
import {byteString, countIf} from 'app/common/gutil';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {InactivityTimer} from 'app/common/InactivityTimer';
|
|
|
|
import * as marshal from 'app/common/marshal';
|
|
|
|
import {UploadResult} from 'app/common/uploads';
|
2020-09-11 20:27:09 +00:00
|
|
|
import {DocReplacementOptions, DocState} from 'app/common/UserAPI';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {ParseOptions} from 'app/plugin/FileParserAPI';
|
|
|
|
import {GristDocAPI} from 'app/plugin/GristAPI';
|
2020-12-15 04:19:38 +00:00
|
|
|
import {compileAclFormula} from 'app/server/lib/ACLFormula';
|
2020-09-02 18:17:17 +00:00
|
|
|
import {Authorizer} from 'app/server/lib/Authorizer';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {checksumFile} from 'app/server/lib/checksumFile';
|
|
|
|
import {Client} from 'app/server/lib/Client';
|
|
|
|
import {DEFAULT_CACHE_TTL, DocManager} from 'app/server/lib/DocManager';
|
|
|
|
import {makeForkIds} from 'app/server/lib/idUtils';
|
|
|
|
import {ISandbox} from 'app/server/lib/ISandbox';
|
|
|
|
import * as log from 'app/server/lib/log';
|
|
|
|
import {shortDesc} from 'app/server/lib/shortDesc';
|
|
|
|
import {fetchURL, FileUploadInfo, globalUploadSet, UploadInfo} from 'app/server/lib/uploads';
|
|
|
|
|
2020-09-18 23:29:11 +00:00
|
|
|
import {ActionHistory} from './ActionHistory';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {ActionHistoryImpl} from './ActionHistoryImpl';
|
|
|
|
import {ActiveDocImport} from './ActiveDocImport';
|
|
|
|
import {DocClients} from './DocClients';
|
|
|
|
import {DocPluginManager} from './DocPluginManager';
|
2021-07-01 15:15:43 +00:00
|
|
|
import {
|
|
|
|
DocSession,
|
|
|
|
getDocSessionUser,
|
|
|
|
getDocSessionUserId,
|
|
|
|
makeExceptionalDocSession,
|
|
|
|
OptDocSession
|
|
|
|
} from './DocSession';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {DocStorage} from './DocStorage';
|
|
|
|
import {expandQuery} from './ExpandedQuery';
|
2021-03-01 16:51:30 +00:00
|
|
|
import {GranularAccess, GranularAccessForBundle} from './GranularAccess';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {OnDemandActions} from './OnDemandActions';
|
2021-07-14 11:17:12 +00:00
|
|
|
import {getLogMetaFromDocSession} from './serverUtils';
|
2020-07-21 13:20:51 +00:00
|
|
|
import {findOrAddAllEnvelope, Sharing} from './Sharing';
|
2021-07-01 15:15:43 +00:00
|
|
|
import cloneDeep = require('lodash/cloneDeep');
|
|
|
|
import flatten = require('lodash/flatten');
|
|
|
|
import remove = require('lodash/remove');
|
|
|
|
import zipObject = require('lodash/zipObject');
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
bluebird.promisifyAll(tmp);
|
|
|
|
|
|
|
|
const MAX_RECENT_ACTIONS = 100;
|
|
|
|
|
|
|
|
const DEFAULT_TIMEZONE = (process.versions as any).electron ? moment.tz.guess() : "UTC";
|
|
|
|
|
|
|
|
// Number of seconds an ActiveDoc is retained without any clients.
|
|
|
|
// In dev environment, it is convenient to keep this low for quick tests.
|
|
|
|
// In production, it is reasonable to stretch it out a bit.
|
|
|
|
const ACTIVEDOC_TIMEOUT = (process.env.NODE_ENV === 'production') ? 30 : 5;
|
|
|
|
|
|
|
|
// We'll wait this long between re-measuring sandbox memory.
|
|
|
|
const MEMORY_MEASUREMENT_INTERVAL_MS = 60 * 1000;
|
|
|
|
|
|
|
|
// A hook for dependency injection.
|
|
|
|
export const Deps = {ACTIVEDOC_TIMEOUT};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Represents an active document with the given name. The document isn't actually open until
|
|
|
|
* either .loadDoc() or .createDoc() is called.
|
|
|
|
* @param {String} docName - The document's filename, without the '.grist' extension.
|
|
|
|
*/
|
|
|
|
export class ActiveDoc extends EventEmitter {
|
|
|
|
/**
|
|
|
|
* Decorator for ActiveDoc methods that prevents shutdown while the method is running, i.e.
|
|
|
|
* until the returned promise is resolved.
|
|
|
|
*/
|
|
|
|
public static keepDocOpen(target: ActiveDoc, propertyKey: string, descriptor: PropertyDescriptor) {
|
|
|
|
const origFunc = descriptor.value;
|
|
|
|
descriptor.value = function(this: ActiveDoc) {
|
|
|
|
return this._inactivityTimer.disableUntilFinish(origFunc.apply(this, arguments));
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
public readonly docStorage: DocStorage;
|
|
|
|
public readonly docPluginManager: DocPluginManager;
|
|
|
|
public readonly docClients: DocClients; // Only exposed for Sharing.ts
|
|
|
|
public docData: DocData|null = null;
|
|
|
|
|
|
|
|
protected _actionHistory: ActionHistory;
|
|
|
|
protected _docManager: DocManager;
|
|
|
|
protected _docName: string;
|
|
|
|
protected _sharing: Sharing;
|
2020-12-07 21:15:58 +00:00
|
|
|
// This lock is used to avoid reading sandbox state while it is being modified but before
|
|
|
|
// the result has been confirmed to pass granular access rules (which may depend on the
|
|
|
|
// result).
|
|
|
|
protected _modificationLock: Mutex = new Mutex();
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
private readonly _dataEngine: ISandbox;
|
|
|
|
private _activeDocImport: ActiveDocImport;
|
|
|
|
private _onDemandActions: OnDemandActions;
|
2020-09-11 20:27:09 +00:00
|
|
|
private _granularAccess: GranularAccess;
|
2020-07-21 13:20:51 +00:00
|
|
|
private _muted: boolean = false; // If set, changes to this document should not propagate
|
|
|
|
// to outside world
|
2020-10-30 16:53:23 +00:00
|
|
|
private _migrating: number = 0; // If positive, a migration is in progress
|
2020-07-21 13:20:51 +00:00
|
|
|
private _initializationPromise: Promise<boolean>|null = null;
|
|
|
|
// If set, wait on this to be sure the ActiveDoc is fully
|
|
|
|
// initialized. True on success.
|
|
|
|
private _fullyLoaded: boolean = false; // Becomes true once all columns are loaded/computed.
|
|
|
|
private _lastMemoryMeasurement: number = 0; // Timestamp when memory was last measured.
|
|
|
|
private _fetchCache = new MapWithTTL<string, Promise<TableDataAction>>(DEFAULT_CACHE_TTL);
|
|
|
|
|
|
|
|
// Timer for shutting down the ActiveDoc a bit after all clients are gone.
|
|
|
|
private _inactivityTimer = new InactivityTimer(() => this.shutdown(), Deps.ACTIVEDOC_TIMEOUT * 1000);
|
2020-12-14 17:42:09 +00:00
|
|
|
private _recoveryMode: boolean = false;
|
2020-07-21 13:20:51 +00:00
|
|
|
|
2021-03-18 22:40:02 +00:00
|
|
|
constructor(docManager: DocManager, docName: string, options?: {
|
|
|
|
safeMode?: boolean,
|
|
|
|
docUrl?: string
|
|
|
|
}) {
|
2020-07-21 13:20:51 +00:00
|
|
|
super();
|
2021-03-18 22:40:02 +00:00
|
|
|
if (options?.safeMode) { this._recoveryMode = true; }
|
2020-07-21 13:20:51 +00:00
|
|
|
this._docManager = docManager;
|
|
|
|
this._docName = docName;
|
|
|
|
this.docStorage = new DocStorage(docManager.storageManager, docName);
|
|
|
|
this.docClients = new DocClients(this);
|
|
|
|
this._actionHistory = new ActionHistoryImpl(this.docStorage);
|
|
|
|
this.docPluginManager = new DocPluginManager(docManager.pluginManager.getPlugins(),
|
|
|
|
docManager.pluginManager.appRoot!, this, this._docManager.gristServer);
|
|
|
|
|
|
|
|
// Our DataEngine is a separate sandboxed process (one per open document). The data engine runs
|
|
|
|
// user-defined python code including formula calculations. It maintains all document data and
|
|
|
|
// metadata, and applies translates higher-level UserActions into lower-level DocActions.
|
|
|
|
this._dataEngine = this._docManager.gristServer.create.NSandbox({
|
|
|
|
comment: docName,
|
|
|
|
logCalls: false,
|
|
|
|
logTimes: true,
|
|
|
|
logMeta: {docId: docName},
|
2021-03-18 22:40:02 +00:00
|
|
|
docUrl: options?.docUrl,
|
2020-07-21 13:20:51 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
this._activeDocImport = new ActiveDocImport(this);
|
|
|
|
|
|
|
|
// Schedule shutdown immediately. If a client connects soon (normal case), it will get
|
|
|
|
// unscheduled. If not (e.g. abandoned import, network problems after creating a doc), then
|
|
|
|
// the ActiveDoc will get cleaned up.
|
|
|
|
this._inactivityTimer.enable();
|
|
|
|
}
|
|
|
|
|
|
|
|
public get docName(): string { return this._docName; }
|
|
|
|
|
2020-12-14 17:42:09 +00:00
|
|
|
public get recoveryMode(): boolean { return this._recoveryMode; }
|
|
|
|
|
2021-01-15 21:56:58 +00:00
|
|
|
public async getUserOverride(docSession: OptDocSession) {
|
|
|
|
return this._granularAccess.getUserOverride(docSession);
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
// Helpers to log a message along with metadata about the request.
|
2020-09-02 18:17:17 +00:00
|
|
|
public logDebug(s: OptDocSession, msg: string, ...args: any[]) { this._log('debug', s, msg, ...args); }
|
|
|
|
public logInfo(s: OptDocSession, msg: string, ...args: any[]) { this._log('info', s, msg, ...args); }
|
|
|
|
public logWarn(s: OptDocSession, msg: string, ...args: any[]) { this._log('warn', s, msg, ...args); }
|
|
|
|
public logError(s: OptDocSession, msg: string, ...args: any[]) { this._log('error', s, msg, ...args); }
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
// Constructs metadata for logging, given a Client or an OptDocSession.
|
2020-09-02 18:17:17 +00:00
|
|
|
public getLogMeta(docSession: OptDocSession, docMethod?: string): log.ILogMeta {
|
2020-07-21 13:20:51 +00:00
|
|
|
return {
|
2021-07-14 11:17:12 +00:00
|
|
|
...getLogMetaFromDocSession(docSession),
|
2020-07-21 13:20:51 +00:00
|
|
|
docId: this._docName,
|
|
|
|
...(docMethod ? {docMethod} : {}),
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
public setMuted() {
|
|
|
|
this._muted = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
public get muted() {
|
|
|
|
return this._muted;
|
|
|
|
}
|
|
|
|
|
2020-10-30 16:53:23 +00:00
|
|
|
public isMigrating() {
|
|
|
|
return this._migrating;
|
|
|
|
}
|
|
|
|
|
2020-09-18 23:29:11 +00:00
|
|
|
// Note that this method is only used in tests, and should be avoided in production (see note
|
|
|
|
// in ActionHistory about getRecentActions).
|
2020-07-21 13:20:51 +00:00
|
|
|
public getRecentActionsDirect(maxActions?: number): Promise<LocalActionBundle[]> {
|
|
|
|
return this._actionHistory.getRecentActions(maxActions);
|
|
|
|
}
|
|
|
|
|
2020-09-11 20:27:09 +00:00
|
|
|
public async getRecentStates(docSession: OptDocSession, maxStates?: number): Promise<DocState[]> {
|
|
|
|
// Doc states currently don't include user content, so it seems ok to let all
|
|
|
|
// viewers have access to them.
|
2020-07-21 13:20:51 +00:00
|
|
|
return this._actionHistory.getRecentStates(maxStates);
|
|
|
|
}
|
|
|
|
|
2020-09-18 18:43:01 +00:00
|
|
|
/**
|
|
|
|
* Access specific actions identified by actionNum.
|
|
|
|
* TODO: for memory reasons on large docs, would be best not to hold many actions
|
|
|
|
* in memory at a time, so should e.g. fetch them one at a time.
|
|
|
|
*/
|
|
|
|
public getActions(actionNums: number[]): Promise<Array<LocalActionBundle|undefined>> {
|
|
|
|
return this._actionHistory.getActions(actionNums);
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
/**
|
|
|
|
* Get the most recent actions from the history. Results are ordered by
|
|
|
|
* earliest actions first, later actions later. If `summarize` is set,
|
|
|
|
* action summaries are computed and included.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async getRecentActions(docSession: OptDocSession, summarize: boolean): Promise<ActionGroup[]> {
|
2020-09-18 23:29:11 +00:00
|
|
|
const groups = await this._actionHistory.getRecentActionGroups(MAX_RECENT_ACTIONS,
|
|
|
|
{client: docSession.client, summarize});
|
2020-12-11 19:22:35 +00:00
|
|
|
const permittedGroups: ActionGroup[] = [];
|
|
|
|
// Process groups serially since the work is synchronous except for some
|
|
|
|
// possible db accesses that will be serialized in any case.
|
|
|
|
for (const group of groups) {
|
|
|
|
if (await this._granularAccess.allowActionGroup(docSession, group)) {
|
|
|
|
permittedGroups.push(group);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return permittedGroups;
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/** expose action history for tests */
|
|
|
|
public getActionHistory(): ActionHistory {
|
|
|
|
return this._actionHistory;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds a client of this doc to the list of connected clients.
|
|
|
|
* @param client: The client object maintaining the websocket connection.
|
|
|
|
* @param authorizer: The authorizer for the client/doc combination.
|
|
|
|
* @returns docSession
|
|
|
|
*/
|
|
|
|
public addClient(client: Client, authorizer: Authorizer): DocSession {
|
|
|
|
const docSession: DocSession = this.docClients.addClient(client, authorizer);
|
|
|
|
|
|
|
|
// If we had a shutdown scheduled, unschedule it.
|
|
|
|
if (this._inactivityTimer.isEnabled()) {
|
2020-09-02 18:17:17 +00:00
|
|
|
this.logInfo(docSession, "will stay open");
|
2020-07-21 13:20:51 +00:00
|
|
|
this._inactivityTimer.disable();
|
|
|
|
}
|
|
|
|
return docSession;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Shut down the ActiveDoc, and (by default) remove it from the docManager.
|
|
|
|
* @returns {Promise} Promise for when database and data engine are done shutting down.
|
|
|
|
*/
|
|
|
|
public async shutdown(removeThisActiveDoc: boolean = true): Promise<void> {
|
2020-09-02 18:17:17 +00:00
|
|
|
const docSession = makeExceptionalDocSession('system');
|
|
|
|
this.logDebug(docSession, "shutdown starting");
|
2020-07-21 13:20:51 +00:00
|
|
|
this._inactivityTimer.disable();
|
|
|
|
if (this.docClients.clientCount() > 0) {
|
2020-09-02 18:17:17 +00:00
|
|
|
this.logWarn(docSession, `Doc being closed with ${this.docClients.clientCount()} clients left`);
|
|
|
|
await this.docClients.broadcastDocMessage(null, 'docShutdown', null);
|
2020-07-21 13:20:51 +00:00
|
|
|
this.docClients.removeAllClients();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clear the MapWithTTL to remove all timers from the event loop.
|
|
|
|
this._fetchCache.clear();
|
|
|
|
|
|
|
|
if (removeThisActiveDoc) { await this._docManager.removeActiveDoc(this); }
|
|
|
|
try {
|
|
|
|
await this._docManager.storageManager.closeDocument(this.docName);
|
|
|
|
} catch (err) {
|
|
|
|
log.error('Problem shutting down document: %s %s', this.docName, err.message);
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
await Promise.all([
|
|
|
|
this.docStorage.shutdown(),
|
|
|
|
this.docPluginManager.shutdown(),
|
|
|
|
this._dataEngine.shutdown()
|
|
|
|
]);
|
|
|
|
// The this.waitForInitialization promise may not yet have resolved, but
|
|
|
|
// should do so quickly now we've killed everything it depends on.
|
|
|
|
try {
|
|
|
|
await this.waitForInitialization();
|
|
|
|
} catch (err) {
|
|
|
|
// Initialization errors do not matter at this point.
|
|
|
|
}
|
2020-09-02 18:17:17 +00:00
|
|
|
this.logDebug(docSession, "shutdown complete");
|
2020-07-21 13:20:51 +00:00
|
|
|
} catch (err) {
|
2020-09-02 18:17:17 +00:00
|
|
|
this.logError(docSession, "failed to shutdown some resources", err);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new blank document. Returns a promise for the ActiveDoc itself.
|
|
|
|
*/
|
|
|
|
@ActiveDoc.keepDocOpen
|
|
|
|
public async createDoc(docSession: OptDocSession): Promise<ActiveDoc> {
|
|
|
|
this.logDebug(docSession, "createDoc");
|
2020-12-21 14:46:50 +00:00
|
|
|
await this._docManager.storageManager.prepareToCreateDoc(this.docName);
|
2020-07-21 13:20:51 +00:00
|
|
|
await this.docStorage.createFile();
|
2020-12-07 21:15:58 +00:00
|
|
|
await this._rawPyCall('load_empty');
|
2020-07-21 13:20:51 +00:00
|
|
|
const timezone = docSession.browserSettings ? docSession.browserSettings.timezone : DEFAULT_TIMEZONE;
|
|
|
|
// This init action is special. It creates schema tables, and is used to init the DB, but does
|
|
|
|
// not go through other steps of a regular action (no ActionHistory or broadcasting).
|
2020-12-07 21:15:58 +00:00
|
|
|
const initBundle = await this._rawPyCall('apply_user_actions', [["InitNewDoc", timezone]]);
|
2020-07-21 13:20:51 +00:00
|
|
|
await this.docStorage.execTransaction(() =>
|
|
|
|
this.docStorage.applyStoredActions(getEnvContent(initBundle.stored)));
|
|
|
|
|
|
|
|
await this._initDoc(docSession);
|
|
|
|
// Makes sure docPluginManager is ready in case new doc is used to import new data
|
|
|
|
await this.docPluginManager.ready;
|
|
|
|
this._fullyLoaded = true;
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Loads an existing document from storage, fetching all data from the database via DocStorage and
|
|
|
|
* loading it into the DataEngine. User tables are not immediately loaded (see use of
|
|
|
|
* this.waitForInitialization throughout this class to wait for that).
|
|
|
|
* @returns {Promise} Promise for this ActiveDoc itself.
|
|
|
|
*/
|
|
|
|
@ActiveDoc.keepDocOpen
|
|
|
|
public async loadDoc(docSession: OptDocSession): Promise<ActiveDoc> {
|
|
|
|
const startTime = Date.now();
|
|
|
|
this.logDebug(docSession, "loadDoc");
|
|
|
|
try {
|
2021-01-12 15:48:40 +00:00
|
|
|
const isNew: boolean = await this._docManager.storageManager.prepareLocalDoc(this.docName);
|
2020-07-21 13:20:51 +00:00
|
|
|
if (isNew) {
|
|
|
|
await this.createDoc(docSession);
|
2020-09-02 18:17:17 +00:00
|
|
|
await this.addInitialTable(docSession);
|
2020-07-21 13:20:51 +00:00
|
|
|
} else {
|
2020-10-30 16:53:23 +00:00
|
|
|
await this.docStorage.openFile({
|
|
|
|
beforeMigration: async (currentVersion, newVersion) => {
|
|
|
|
return this._beforeMigration(docSession, 'storage', currentVersion, newVersion);
|
|
|
|
},
|
|
|
|
afterMigration: async (newVersion, success) => {
|
|
|
|
return this._afterMigration(docSession, 'storage', newVersion, success);
|
|
|
|
},
|
|
|
|
});
|
2020-07-21 13:20:51 +00:00
|
|
|
const tableNames = await this._loadOpenDoc(docSession);
|
|
|
|
const desiredTableNames = tableNames.filter(name => name.startsWith('_grist_'));
|
|
|
|
await this._loadTables(docSession, desiredTableNames);
|
|
|
|
const pendingTableNames = tableNames.filter(name => !name.startsWith('_grist_'));
|
|
|
|
await this._initDoc(docSession);
|
|
|
|
this._initializationPromise = this._finishInitialization(docSession, pendingTableNames, startTime);
|
|
|
|
}
|
|
|
|
} catch (err) {
|
|
|
|
await this.shutdown();
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Replace this document with another, in-place so its id and other metadata does not change.
|
|
|
|
* This operation will leave the ActiveDoc it is called for unusable. It will mute it,
|
|
|
|
* shut it down, and unlist it via the DocManager. A fresh ActiveDoc can be acquired via the
|
|
|
|
* DocManager.
|
|
|
|
*/
|
|
|
|
public async replace(source: DocReplacementOptions) {
|
|
|
|
// During replacement, it is important for all hands to be off the document. So:
|
|
|
|
// - We set the "mute" flag. Setting this means that any operations in progress
|
|
|
|
// using this ActiveDoc should be ineffective (apart from the replacement).
|
|
|
|
// In other words, the operations shouldn't ultimately result in any changes in S3,
|
|
|
|
// and any related requests should result in a failure or be retried. TODO:
|
|
|
|
// review how well we do on meeting this goal.
|
|
|
|
// - We close the ActiveDoc, retaining its listing in DocManager but shutting down
|
|
|
|
// all its component parts. We retain it in DocManager to delay another
|
|
|
|
// ActiveDoc being opened for the same document if someone is trying to operate
|
|
|
|
// on it.
|
|
|
|
// - We replace the document.
|
|
|
|
// - We remove the ActiveDoc from DocManager, opening the way for the document to be
|
|
|
|
// freshly opened.
|
|
|
|
// The "mute" flag is borrowed from worker shutdown. Note this scenario is a little
|
|
|
|
// different, since the worker is not withdrawing from service, so fresh work may get
|
|
|
|
// assigned to it at any time.
|
|
|
|
this.setMuted();
|
|
|
|
this.docClients.interruptAllClients();
|
|
|
|
try {
|
|
|
|
await this.shutdown(false);
|
|
|
|
await this._docManager.storageManager.replace(this.docName, source);
|
|
|
|
} finally {
|
|
|
|
// Whatever happened, success or failure, there is nothing further we can do
|
|
|
|
// with this ActiveDoc. Unlist it.
|
|
|
|
await this._docManager.removeActiveDoc(this);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Finish initializing ActiveDoc, by initializing ActionHistory, Sharing, and docData.
|
|
|
|
*/
|
|
|
|
public async _initDoc(docSession: OptDocSession|null): Promise<void> {
|
2020-12-07 21:15:58 +00:00
|
|
|
const metaTableData = await this._rawPyCall('fetch_meta_tables');
|
2020-09-02 18:17:17 +00:00
|
|
|
this.docData = new DocData(tableId => this.fetchTable(makeExceptionalDocSession('system'), tableId), metaTableData);
|
2020-07-21 13:20:51 +00:00
|
|
|
this._onDemandActions = new OnDemandActions(this.docStorage, this.docData);
|
|
|
|
|
|
|
|
await this._actionHistory.initialize();
|
2021-03-01 16:51:30 +00:00
|
|
|
this._granularAccess = new GranularAccess(this.docData, this.docClients, (query) => {
|
2020-11-30 15:50:00 +00:00
|
|
|
return this._fetchQueryFromDB(query, false);
|
2021-01-15 21:56:58 +00:00
|
|
|
}, this.recoveryMode, this._docManager.getHomeDbManager(), this.docName);
|
2020-10-19 14:25:21 +00:00
|
|
|
await this._granularAccess.update();
|
2020-12-07 21:15:58 +00:00
|
|
|
this._sharing = new Sharing(this, this._actionHistory, this._modificationLock);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds a small table to start off a newly-created blank document.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public addInitialTable(docSession: OptDocSession) {
|
2020-11-17 13:59:41 +00:00
|
|
|
// Use a non-client-specific session, so that this action is not part of anyone's undo history.
|
|
|
|
const newDocSession = makeExceptionalDocSession('nascent');
|
|
|
|
return this._applyUserActions(newDocSession, [["AddEmptyTable"]]);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Imports files, removes previously created temporary hidden tables and creates the new ones.
|
|
|
|
* Param `prevTableIds` is an array of hiddenTableIds as received from previous `importFiles`
|
|
|
|
* call, or empty if there was no previous call.
|
|
|
|
*/
|
|
|
|
public importFiles(docSession: DocSession, dataSource: DataSourceTransformed,
|
|
|
|
parseOptions: ParseOptions, prevTableIds: string[]): Promise<ImportResult> {
|
|
|
|
return this._activeDocImport.importFiles(docSession, dataSource, parseOptions, prevTableIds);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Finishes import files, creates the new tables, and cleans up temporary hidden tables and uploads.
|
|
|
|
* Param `prevTableIds` is an array of hiddenTableIds as received from previous `importFiles`
|
|
|
|
* call, or empty if there was no previous call.
|
|
|
|
*/
|
|
|
|
public finishImportFiles(docSession: DocSession, dataSource: DataSourceTransformed,
|
|
|
|
parseOptions: ParseOptions, prevTableIds: string[]): Promise<ImportResult> {
|
|
|
|
return this._activeDocImport.finishImportFiles(docSession, dataSource, parseOptions, prevTableIds);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cancels import files, cleans up temporary hidden tables and uploads.
|
|
|
|
* Param `prevTableIds` is an array of hiddenTableIds as received from previous `importFiles`
|
|
|
|
* call, or empty if there was no previous call.
|
|
|
|
*/
|
|
|
|
public cancelImportFiles(docSession: DocSession, dataSource: DataSourceTransformed,
|
|
|
|
prevTableIds: string[]): Promise<void> {
|
|
|
|
return this._activeDocImport.cancelImportFiles(docSession, dataSource, prevTableIds);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Close the current document.
|
|
|
|
*/
|
|
|
|
public async closeDoc(docSession: DocSession): Promise<void> {
|
|
|
|
// Note that it's async only to satisfy the Rpc interface that expects a promise.
|
|
|
|
this.docClients.removeClient(docSession);
|
|
|
|
|
|
|
|
// If no more clients, schedule a shutdown.
|
|
|
|
if (this.docClients.clientCount() === 0) {
|
2021-07-09 13:41:19 +00:00
|
|
|
this.logInfo(docSession, "will self-close in %d ms", this._inactivityTimer.getDelay());
|
2020-07-21 13:20:51 +00:00
|
|
|
this._inactivityTimer.enable();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Import the given upload as new tables in one step.
|
|
|
|
*/
|
|
|
|
@ActiveDoc.keepDocOpen
|
|
|
|
public async oneStepImport(docSession: OptDocSession, uploadInfo: UploadInfo): Promise<void> {
|
|
|
|
await this._activeDocImport.oneStepImport(docSession, uploadInfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This function saves attachments from a given upload and creates an entry for them in the database.
|
|
|
|
* It returns the list of rowIds for the rows created in the _grist_Attachments table.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async addAttachments(docSession: OptDocSession, uploadId: number): Promise<number[]> {
|
|
|
|
const userId = getDocSessionUserId(docSession);
|
2020-07-21 13:20:51 +00:00
|
|
|
const upload: UploadInfo = globalUploadSet.getUploadInfo(uploadId, this.makeAccessId(userId));
|
|
|
|
try {
|
|
|
|
const userActions: UserAction[] = await Promise.all(
|
|
|
|
upload.files.map(file => this._prepAttachment(docSession, file)));
|
2020-09-02 18:17:17 +00:00
|
|
|
const result = await this._applyUserActions(docSession, userActions);
|
2020-07-21 13:20:51 +00:00
|
|
|
return result.retValues;
|
|
|
|
} finally {
|
|
|
|
await globalUploadSet.cleanup(uploadId);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the record from _grist_Attachments table for the given attachment ID,
|
|
|
|
* or throws an error if not found.
|
|
|
|
*/
|
|
|
|
public getAttachmentMetadata(attId: number|string): RowRecord {
|
|
|
|
// docData should always be available after loadDoc() or createDoc().
|
|
|
|
if (!this.docData) {
|
|
|
|
throw new Error("No doc data");
|
|
|
|
}
|
|
|
|
// Parse strings into numbers to make more convenient to call from route handlers.
|
|
|
|
const attachmentId: number = (typeof attId === 'string') ? parseInt(attId, 10) : attId;
|
|
|
|
const attRecord = this.docData.getTable('_grist_Attachments')!.getRecord(attachmentId);
|
|
|
|
if (!attRecord) {
|
|
|
|
throw new ApiError(`Attachment not found: ${attId}`, 404);
|
|
|
|
}
|
|
|
|
return attRecord;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Given the fileIdent of an attachment, returns a promise for the attachment data.
|
|
|
|
* @param {String} fileIdent: The unique identifier of the attachment (as stored in fileIdent
|
|
|
|
* field of the _grist_Attachments table).
|
|
|
|
* @returns {Promise<Buffer>} Promise for the data of this attachment; rejected on error.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async getAttachmentData(docSession: OptDocSession, fileIdent: string): Promise<Buffer> {
|
2020-09-11 20:27:09 +00:00
|
|
|
// We don't know for sure whether the attachment is available via a table the user
|
|
|
|
// has access to, but at least they are presenting a SHA1 checksum of the file content,
|
|
|
|
// and they have at least view access to the document to get to this point. So we go ahead
|
|
|
|
// and serve the attachment.
|
2020-07-21 13:20:51 +00:00
|
|
|
const data = await this.docStorage.getFileData(fileIdent);
|
|
|
|
if (!data) { throw new ApiError("Invalid attachment identifier", 404); }
|
2020-09-02 18:17:17 +00:00
|
|
|
this.logInfo(docSession, "getAttachment: %s -> %s bytes", fileIdent, data.length);
|
2020-07-21 13:20:51 +00:00
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Fetches the meta tables to return to the client when first opening a document.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async fetchMetaTables(docSession: OptDocSession) {
|
|
|
|
this.logInfo(docSession, "fetchMetaTables");
|
2020-07-21 13:20:51 +00:00
|
|
|
if (!this.docData) { throw new Error("No doc data"); }
|
|
|
|
// Get metadata from local cache rather than data engine, so that we can
|
|
|
|
// still get it even if data engine is busy calculating.
|
|
|
|
const tables: {[key: string]: TableDataAction} = {};
|
|
|
|
for (const [tableId, tableData] of this.docData.getTables().entries()) {
|
|
|
|
if (!tableId.startsWith('_grist_')) { continue; }
|
|
|
|
tables[tableId] = tableData.getTableDataAction();
|
|
|
|
}
|
2020-09-11 20:27:09 +00:00
|
|
|
return this._granularAccess.filterMetaTables(docSession, tables);
|
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Makes sure document is completely initialized. May throw if doc is broken.
|
|
|
|
*/
|
|
|
|
public async waitForInitialization() {
|
|
|
|
if (this._initializationPromise) {
|
|
|
|
if (!await this._initializationPromise) {
|
|
|
|
throw new Error('ActiveDoc initialization failed');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-09-11 20:27:09 +00:00
|
|
|
// Check if user has rights to download this doc.
|
2020-12-11 19:22:35 +00:00
|
|
|
public async canDownload(docSession: OptDocSession) {
|
2021-01-12 15:48:40 +00:00
|
|
|
return this._granularAccess.canCopyEverything(docSession);
|
2020-09-11 20:27:09 +00:00
|
|
|
}
|
|
|
|
|
2021-07-20 20:20:31 +00:00
|
|
|
// Check if it is appropriate for the user to be treated as an owner of
|
|
|
|
// the document for granular access purposes when in "prefork" mode
|
|
|
|
// (meaning a document has been opened with the intent to fork it, but
|
|
|
|
// an initial modification has not yet been made).
|
|
|
|
// Currently, we decide it is appropriate if the user has access to all
|
|
|
|
// the data in the document, either directly or via the special
|
|
|
|
// "FullCopies" permission.
|
|
|
|
public async canForkAsOwner(docSession: OptDocSession) {
|
|
|
|
return this._granularAccess.canCopyEverything(docSession);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove cached access information for a given session.
|
|
|
|
public flushAccess(docSession: OptDocSession) {
|
|
|
|
return this._granularAccess.flushAccess(docSession);
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
/**
|
|
|
|
* Fetches a particular table from the data engine to return to the client.
|
|
|
|
* @param {String} tableId: The string identifier of the table.
|
|
|
|
* @param {Boolean} waitForFormulas: If true, wait for all data to be loaded/calculated.
|
|
|
|
* @returns {Promise} Promise for the TableData object, which is a BulkAddRecord-like array of the
|
|
|
|
* form of the form ["TableData", table_id, row_ids, column_values].
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async fetchTable(docSession: OptDocSession, tableId: string,
|
2020-07-21 13:20:51 +00:00
|
|
|
waitForFormulas: boolean = false): Promise<TableDataAction> {
|
|
|
|
return this.fetchQuery(docSession, {tableId, filters: {}}, waitForFormulas);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Fetches data according to the given query, which includes tableId and filters (see Query in
|
|
|
|
* app/common/ActiveDocAPI.ts). The data is fetched from the data engine for regular tables, or
|
|
|
|
* from the DocStorage directly for onDemand tables.
|
|
|
|
* @param {Boolean} waitForFormulas: If true, wait for all data to be loaded/calculated. If false,
|
|
|
|
* special "pending" values may be returned.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async fetchQuery(docSession: OptDocSession, query: Query,
|
2020-07-21 13:20:51 +00:00
|
|
|
waitForFormulas: boolean = false): Promise<TableDataAction> {
|
|
|
|
this._inactivityTimer.ping(); // The doc is in active use; ping it to stay open longer.
|
|
|
|
|
2020-09-11 20:27:09 +00:00
|
|
|
// If user does not have rights to access what this query is asking for, fail.
|
2020-12-11 19:22:35 +00:00
|
|
|
const tableAccess = await this._granularAccess.getTableAccess(docSession, query.tableId);
|
2021-02-15 21:36:33 +00:00
|
|
|
|
|
|
|
this._granularAccess.assertCanRead(tableAccess);
|
2020-09-11 20:27:09 +00:00
|
|
|
|
2021-07-30 14:10:54 +00:00
|
|
|
if (query.tableId.startsWith('_gristsys_')) {
|
|
|
|
throw new Error('Cannot fetch _gristsys tables');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (query.tableId.startsWith('_grist_') && !await this._granularAccess.canReadEverything(docSession)) {
|
|
|
|
// Metadata tables may need filtering, and this can't be done by looking at a single
|
|
|
|
// table. So we pick out the table we want from fetchMetaTables (which has applied
|
|
|
|
// filtering).
|
|
|
|
const tables = await this.fetchMetaTables(docSession);
|
|
|
|
const table = tables[query.tableId];
|
|
|
|
if (table) { return table; }
|
|
|
|
// If table not found, continue, to give a consistent error for a table not found.
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
// Some tests read _grist_ tables via the api. The _fetchQueryFromDB method
|
|
|
|
// currently cannot read those tables, so we load them from the data engine
|
|
|
|
// when ready.
|
2020-10-12 13:50:07 +00:00
|
|
|
// Also, if row-level access is being controlled, we wait for formula columns
|
|
|
|
// to be populated.
|
|
|
|
const wantFull = waitForFormulas || query.tableId.startsWith('_grist_') ||
|
2021-02-15 21:36:33 +00:00
|
|
|
this._granularAccess.getReadPermission(tableAccess) === 'mixed';
|
2020-07-21 13:20:51 +00:00
|
|
|
const onDemand = this._onDemandActions.isOnDemand(query.tableId);
|
2020-12-01 21:53:33 +00:00
|
|
|
this.logInfo(docSession, "fetchQuery %s %s", JSON.stringify(query),
|
2020-07-21 13:20:51 +00:00
|
|
|
onDemand ? "(onDemand)" : "(regular)");
|
|
|
|
let data: TableDataAction;
|
|
|
|
if (onDemand) {
|
|
|
|
data = await this._fetchQueryFromDB(query, onDemand);
|
|
|
|
} else if (wantFull) {
|
|
|
|
await this.waitForInitialization();
|
|
|
|
data = await this._fetchQueryFromDataEngine(query);
|
|
|
|
} else {
|
|
|
|
if (!this._fullyLoaded) {
|
|
|
|
data = await this._fetchQueryFromDB(query, false);
|
|
|
|
}
|
|
|
|
if (this._fullyLoaded) { // Already loaded or finished loading while fetching from DB
|
|
|
|
const key = JSON.stringify(query);
|
|
|
|
// TODO: cache longer if the underlying fetch takes longer to do.
|
|
|
|
data = await mapGetOrSet(this._fetchCache, key, () => this._fetchQueryFromDataEngine(query));
|
|
|
|
}
|
|
|
|
}
|
2020-10-12 13:50:07 +00:00
|
|
|
// If row-level access is being controlled, filter the data appropriately.
|
2020-11-03 23:44:09 +00:00
|
|
|
// Likewise if column-level access is being controlled.
|
2021-02-15 21:36:33 +00:00
|
|
|
if (this._granularAccess.getReadPermission(tableAccess) !== 'allow') {
|
2021-03-05 17:12:17 +00:00
|
|
|
data = cloneDeep(data!); // Clone since underlying fetch may be cached and shared.
|
|
|
|
await this._granularAccess.filterData(docSession, data);
|
2020-10-12 13:50:07 +00:00
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
this.logInfo(docSession, "fetchQuery -> %d rows, cols: %s",
|
|
|
|
data![2].length, Object.keys(data![3]).join(", "));
|
|
|
|
return data!;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Fetches the generated schema for a given table.
|
|
|
|
* @param {String} tableId: The string identifier of the table.
|
|
|
|
* @returns {Promise} Promise for a string representing the generated table schema.
|
|
|
|
*/
|
|
|
|
public async fetchTableSchema(docSession: DocSession): Promise<string> {
|
|
|
|
this.logInfo(docSession, "fetchTableSchema(%s)", docSession);
|
2021-05-27 13:18:57 +00:00
|
|
|
// Permit code view if user can read everything, or can download/copy (perhaps
|
|
|
|
// via an exceptional permission for sample documents)
|
|
|
|
if (!(await this._granularAccess.canReadEverything(docSession) ||
|
|
|
|
await this.canDownload(docSession))) {
|
|
|
|
throw new ApiError('Cannot view code, it may contain private material', 403);
|
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
await this.waitForInitialization();
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('fetch_table_schema');
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Makes a query (documented elsewhere) and subscribes to it, so that the client receives
|
|
|
|
* docActions that affect this query's results.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
public async useQuerySet(docSession: OptDocSession, query: Query): Promise<QueryResult> {
|
2020-07-21 13:20:51 +00:00
|
|
|
this.logInfo(docSession, "useQuerySet(%s, %s)", docSession, query);
|
|
|
|
// TODO implement subscribing to the query.
|
|
|
|
// - Convert tableId+colIds to TableData/ColData references
|
|
|
|
// - Return a unique identifier for unsubscribing
|
|
|
|
// - Each call can create its own object, return own identifier.
|
|
|
|
// - Subscription should not be affected by renames (so don't hold on to query/tableId/colIds)
|
|
|
|
// - Table/column deletion should make subscription inactive, and unsubscribing an inactive
|
|
|
|
// subscription should not produce an error.
|
|
|
|
const tableData: TableDataAction = await this.fetchQuery(docSession, query);
|
|
|
|
return {querySubId: 0, tableData};
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes all subscriptions to the given query from this client, so that it stops receiving
|
|
|
|
* docActions relevant only to this query.
|
|
|
|
*/
|
|
|
|
public async disposeQuerySet(docSession: DocSession, querySubId: number): Promise<void> {
|
|
|
|
this.logInfo(docSession, "disposeQuerySet(%s, %s)", docSession, querySubId);
|
|
|
|
// TODO To-be-implemented
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the most likely target column in the document for the given column.
|
|
|
|
* @param {Array} values: An array of values to search for in columns in the document.
|
|
|
|
* @param {Number} n: Number of results to return.
|
|
|
|
* @param {String} optTableId: If a valid tableId, search only that table.
|
|
|
|
* @returns {Promise} Promise for an array of colRefs describing matching columns ordered from
|
|
|
|
* best to worst. Match quality is determined by searching only a sample of column data.
|
|
|
|
* See engine.py find_col_from_values for implementation.
|
|
|
|
*/
|
|
|
|
public async findColFromValues(docSession: DocSession, values: any[], n: number,
|
|
|
|
optTableId?: string): Promise<number[]> {
|
2021-03-25 17:37:09 +00:00
|
|
|
// This could leak information about private tables, so check for permission.
|
|
|
|
if (!await this._granularAccess.canScanData(docSession)) { return []; }
|
2020-07-21 13:20:51 +00:00
|
|
|
this.logInfo(docSession, "findColFromValues(%s, %s, %s)", docSession, values, n);
|
|
|
|
await this.waitForInitialization();
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('find_col_from_values', values, n, optTableId);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns error message (traceback) for one invalid formula cell.
|
|
|
|
* @param {String} tableId - Table name
|
|
|
|
* @param {String} colId - Column name
|
|
|
|
* @param {Integer} rowId - Row number
|
|
|
|
* @returns {Promise} Promise for a error message
|
|
|
|
*/
|
|
|
|
public async getFormulaError(docSession: DocSession, tableId: string, colId: string,
|
|
|
|
rowId: number): Promise<CellValue> {
|
2021-04-26 21:54:09 +00:00
|
|
|
if (!await this._granularAccess.hasTableAccess(docSession, tableId)) { return null; }
|
2020-07-21 13:20:51 +00:00
|
|
|
this.logInfo(docSession, "getFormulaError(%s, %s, %s, %s)",
|
|
|
|
docSession, tableId, colId, rowId);
|
|
|
|
await this.waitForInitialization();
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('get_formula_error', tableId, colId, rowId);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Applies an array of user actions received from a browser client.
|
|
|
|
*
|
|
|
|
* @param {Object} docSession: The client session originating this action.
|
|
|
|
* @param {Array} action: The user action to apply, e.g. ["UpdateRecord", tableId, rowId, etc].
|
|
|
|
* @param {Object} options: See _applyUserActions for documentation
|
|
|
|
* @returns {Promise:Array[Object]} Promise that's resolved when action is applied successfully.
|
|
|
|
* The array includes the retValue objects for each
|
|
|
|
* actionGroup.
|
|
|
|
*/
|
|
|
|
public async applyUserActions(docSession: OptDocSession, actions: UserAction[],
|
|
|
|
options?: ApplyUAOptions): Promise<ApplyUAResult> {
|
|
|
|
assert(Array.isArray(actions), "`actions` parameter should be an array.");
|
|
|
|
// Be careful not to sneak into user action queue before Calculate action, otherwise
|
|
|
|
// there'll be a deadlock.
|
|
|
|
await this.waitForInitialization();
|
2020-09-11 20:27:09 +00:00
|
|
|
// Granular access control implemented in _applyUserActions.
|
2021-01-27 23:03:30 +00:00
|
|
|
return await this._applyUserActions(docSession, actions, options);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* A variant of applyUserActions where actions are passed in by ids (actionNum, actionHash)
|
|
|
|
* rather than by value.
|
|
|
|
*
|
|
|
|
* @param docSession: The client session originating this action.
|
|
|
|
* @param actionNums: The user actions to do/undo, by actionNum.
|
|
|
|
* @param actionHashes: actionHash checksums for each listed actionNum.
|
|
|
|
* @param undo: Whether the actions are to be undone.
|
|
|
|
* @param options: As for applyUserActions.
|
|
|
|
* @returns Promise of retValues, see applyUserActions.
|
|
|
|
*/
|
|
|
|
public async applyUserActionsById(docSession: DocSession,
|
|
|
|
actionNums: number[],
|
|
|
|
actionHashes: string[],
|
|
|
|
undo: boolean,
|
|
|
|
options?: ApplyUAOptions): Promise<ApplyUAResult> {
|
|
|
|
const actionBundles = await this._actionHistory.getActions(actionNums);
|
|
|
|
for (const [index, bundle] of actionBundles.entries()) {
|
|
|
|
const actionNum = actionNums[index];
|
|
|
|
const actionHash = actionHashes[index];
|
|
|
|
if (!bundle) { throw new Error(`Could not find actionNum ${actionNum}`); }
|
|
|
|
if (actionHash !== bundle.actionHash) {
|
|
|
|
throw new Error(`Hash mismatch for actionNum ${actionNum}: ` +
|
|
|
|
`expected ${actionHash} but got ${bundle.actionHash}`);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
let actions: UserAction[];
|
|
|
|
if (undo) {
|
|
|
|
actions = [['ApplyUndoActions', flatten(actionBundles.map(a => a!.undo))]];
|
|
|
|
} else {
|
|
|
|
actions = flatten(actionBundles.map(a => a!.userActions));
|
|
|
|
}
|
2020-09-11 20:27:09 +00:00
|
|
|
// Granular access control implemented ultimately in _applyUserActions.
|
|
|
|
// It could be that error cases and timing etc leak some info prior to this
|
|
|
|
// point.
|
2021-06-09 19:31:59 +00:00
|
|
|
// Undos are best effort now by default.
|
|
|
|
return this.applyUserActions(docSession, actions, {bestEffort: undo, ...(options||{})});
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Called by Sharing class for every LocalActionBundle (of our own actions) that gets applied.
|
|
|
|
*/
|
|
|
|
public async processActionBundle(localActionBundle: LocalActionBundle): Promise<void> {
|
|
|
|
const docData = this.docData;
|
|
|
|
if (!docData) { return; } // Happens on doc creation while processing InitNewDoc action.
|
|
|
|
localActionBundle.stored.forEach(da => docData.receiveAction(da[1]));
|
|
|
|
localActionBundle.calc.forEach(da => docData.receiveAction(da[1]));
|
|
|
|
const docActions = getEnvContent(localActionBundle.stored);
|
|
|
|
if (docActions.some(docAction => this._onDemandActions.isSchemaAction(docAction))) {
|
|
|
|
const indexes = this._onDemandActions.getDesiredIndexes();
|
|
|
|
await this.docStorage.updateIndexes(indexes);
|
2020-12-11 19:22:35 +00:00
|
|
|
// TODO: should probably add indexes for user attribute tables.
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Used by tests to force an update indexes. We don't otherwise update indexes until
|
|
|
|
* there is a schema change.
|
|
|
|
*/
|
|
|
|
public async testUpdateIndexes() {
|
|
|
|
const indexes = this._onDemandActions.getDesiredIndexes();
|
|
|
|
await this.docStorage.updateIndexes(indexes);
|
|
|
|
}
|
|
|
|
|
|
|
|
public async removeInstanceFromDoc(docSession: DocSession): Promise<void> {
|
2020-11-12 04:56:05 +00:00
|
|
|
await this._sharing.removeInstanceFromDoc();
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
2020-09-02 18:17:17 +00:00
|
|
|
public async renameDocTo(docSession: OptDocSession, newName: string): Promise<void> {
|
|
|
|
this.logDebug(docSession, 'renameDoc', newName);
|
2020-07-21 13:20:51 +00:00
|
|
|
await this.docStorage.renameDocTo(newName);
|
|
|
|
this._docName = newName;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Initiates user actions bandling for undo.
|
|
|
|
*/
|
|
|
|
public startBundleUserActions(docSession: OptDocSession) {
|
|
|
|
if (!docSession.shouldBundleActions) {
|
|
|
|
docSession.shouldBundleActions = true;
|
|
|
|
docSession.linkId = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Stops user actions bandling for undo.
|
|
|
|
*/
|
|
|
|
public stopBundleUserActions(docSession: OptDocSession) {
|
|
|
|
docSession.shouldBundleActions = false;
|
|
|
|
docSession.linkId = 0;
|
|
|
|
}
|
|
|
|
|
2021-07-07 16:03:01 +00:00
|
|
|
public async autocomplete(docSession: DocSession, txt: string, tableId: string, columnId: string): Promise<string[]> {
|
2020-09-11 20:27:09 +00:00
|
|
|
// Autocompletion can leak names of tables and columns.
|
2021-03-25 17:37:09 +00:00
|
|
|
if (!await this._granularAccess.canScanData(docSession)) { return []; }
|
2020-07-21 13:20:51 +00:00
|
|
|
await this.waitForInitialization();
|
2021-07-15 00:45:53 +00:00
|
|
|
const user = await this._granularAccess.getCachedUser(docSession);
|
|
|
|
return this._pyCall('autocomplete', txt, tableId, columnId, user.toJSON());
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
public fetchURL(docSession: DocSession, url: string): Promise<UploadResult> {
|
|
|
|
return fetchURL(url, this.makeAccessId(docSession.authorizer.getUserId()));
|
|
|
|
}
|
|
|
|
|
2021-03-02 21:11:37 +00:00
|
|
|
public async forwardPluginRpc(docSession: DocSession, pluginId: string, msg: IMessage): Promise<any> {
|
|
|
|
if (await this._granularAccess.hasNuancedAccess(docSession)) {
|
2020-09-11 20:27:09 +00:00
|
|
|
throw new Error('cannot confirm access to plugin');
|
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
const pluginRpc = this.docPluginManager.plugins[pluginId].rpc;
|
|
|
|
switch (msg.mtype) {
|
|
|
|
case MsgType.RpcCall: return pluginRpc.forwardCall(msg);
|
|
|
|
case MsgType.Custom: return pluginRpc.forwardMessage(msg);
|
|
|
|
}
|
|
|
|
throw new Error(`Invalid message type for forwardPluginRpc: ${msg.mtype}`);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reload documents plugins.
|
|
|
|
*/
|
|
|
|
public async reloadPlugins(docSession: DocSession) {
|
|
|
|
// refresh the list plugins found on the system
|
|
|
|
await this._docManager.pluginManager.reloadPlugins();
|
|
|
|
const plugins = this._docManager.pluginManager.getPlugins();
|
|
|
|
// reload found plugins
|
|
|
|
await this.docPluginManager.reload(plugins);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Immediately close the document and data engine, to be reloaded from scratch, and cause all
|
|
|
|
* browser clients to reopen it.
|
|
|
|
*/
|
|
|
|
public async reloadDoc(docSession?: DocSession) {
|
|
|
|
return this.shutdown();
|
|
|
|
}
|
|
|
|
|
2021-03-02 21:11:37 +00:00
|
|
|
public isOwner(docSession: OptDocSession): Promise<boolean> {
|
2020-12-14 17:42:09 +00:00
|
|
|
return this._granularAccess.isOwner(docSession);
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
/**
|
|
|
|
* Fork the current document. In fact, all that requires is calculating a good
|
|
|
|
* ID for the fork. TODO: reconcile the two ways there are now of preparing a fork.
|
|
|
|
*/
|
2021-01-12 15:48:40 +00:00
|
|
|
public async fork(docSession: OptDocSession): Promise<ForkResult> {
|
|
|
|
const user = getDocSessionUser(docSession);
|
|
|
|
// For now, fork only if user can read everything (or is owner).
|
|
|
|
// TODO: allow forks with partial content.
|
2021-03-25 17:37:09 +00:00
|
|
|
if (!user || !await this.canDownload(docSession)) {
|
2021-01-12 15:48:40 +00:00
|
|
|
throw new ApiError('Insufficient access to document to copy it entirely', 403);
|
2020-09-11 20:27:09 +00:00
|
|
|
}
|
2021-01-12 15:48:40 +00:00
|
|
|
const userId = user.id;
|
|
|
|
const isAnonymous = this._docManager.isAnonymous(userId);
|
2020-07-21 13:20:51 +00:00
|
|
|
// Get fresh document metadata (the cached metadata doesn't include the urlId).
|
2021-01-12 15:48:40 +00:00
|
|
|
const doc = await docSession.authorizer?.getDoc();
|
2020-07-21 13:20:51 +00:00
|
|
|
if (!doc) { throw new Error('document id not known'); }
|
|
|
|
const trunkDocId = doc.id;
|
|
|
|
const trunkUrlId = doc.urlId || doc.id;
|
|
|
|
await this.flushDoc(); // Make sure fork won't be too out of date.
|
2021-01-12 15:48:40 +00:00
|
|
|
const forkIds = makeForkIds({userId, isAnonymous, trunkDocId, trunkUrlId});
|
|
|
|
|
|
|
|
// To actually create the fork, we call an endpoint. This is so the fork
|
|
|
|
// can be associated with an arbitrary doc worker, rather than tied to the
|
|
|
|
// same worker as the trunk. We use a Permit for authorization.
|
|
|
|
const permitStore = this._docManager.gristServer.getPermitStore();
|
|
|
|
const permitKey = await permitStore.setPermit({docId: forkIds.docId,
|
|
|
|
otherDocId: this.docName});
|
|
|
|
try {
|
2021-01-27 23:03:30 +00:00
|
|
|
const url = await this._docManager.gristServer.getHomeUrlByDocId(
|
|
|
|
forkIds.docId, `/api/docs/${forkIds.docId}/create-fork`);
|
2021-01-12 15:48:40 +00:00
|
|
|
const resp = await fetch(url, {
|
|
|
|
method: 'POST',
|
|
|
|
body: JSON.stringify({ srcDocId: this.docName }),
|
|
|
|
headers: {
|
2021-01-27 23:03:30 +00:00
|
|
|
'Permit': permitKey,
|
2021-01-12 15:48:40 +00:00
|
|
|
'Content-Type': 'application/json',
|
|
|
|
},
|
|
|
|
});
|
|
|
|
if (resp.status !== 200) {
|
|
|
|
throw new ApiError(resp.statusText, resp.status);
|
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
await permitStore.removePermit(permitKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
return forkIds;
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
2020-12-15 04:19:38 +00:00
|
|
|
/**
|
|
|
|
* Check if an ACL formula is valid. If not, will throw an error with an explanation.
|
|
|
|
*/
|
2021-03-10 14:08:46 +00:00
|
|
|
public async checkAclFormula(docSession: DocSession, text: string): Promise<FormulaProperties> {
|
2020-12-15 04:19:38 +00:00
|
|
|
// Checks can leak names of tables and columns.
|
2021-03-10 14:08:46 +00:00
|
|
|
if (await this._granularAccess.hasNuancedAccess(docSession)) { return {}; }
|
2020-12-15 04:19:38 +00:00
|
|
|
await this.waitForInitialization();
|
|
|
|
try {
|
|
|
|
const parsedAclFormula = await this._pyCall('parse_acl_formula', text);
|
|
|
|
compileAclFormula(parsedAclFormula);
|
|
|
|
// TODO We also need to check the validity of attributes, and of tables and columns
|
|
|
|
// mentioned in resources and userAttribute rules.
|
2021-03-10 14:08:46 +00:00
|
|
|
return getFormulaProperties(parsedAclFormula);
|
2020-12-15 04:19:38 +00:00
|
|
|
} catch (e) {
|
|
|
|
e.message = e.message?.replace('[Sandbox] ', '');
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-14 16:10:42 +00:00
|
|
|
/**
|
|
|
|
* Returns the full set of tableIds, with the list of colIds for each table. This is intended
|
|
|
|
* for editing ACLs. It is only available to users who can edit ACLs, and lists all resources
|
|
|
|
* regardless of rules that may block access to them.
|
|
|
|
*/
|
|
|
|
public async getAclResources(docSession: DocSession): Promise<{[tableId: string]: string[]}> {
|
2021-03-25 17:37:09 +00:00
|
|
|
if (!this.docData || !await this._granularAccess.hasAccessRulesPermission(docSession)) {
|
2021-01-14 16:10:42 +00:00
|
|
|
throw new Error('Cannot list ACL resources');
|
|
|
|
}
|
|
|
|
const result: {[tableId: string]: string[]} = {};
|
|
|
|
const tables = this.docData.getTable('_grist_Tables')!;
|
|
|
|
for (const tableId of tables.getColValues('tableId')!) {
|
|
|
|
result[tableId as string] = ['id'];
|
|
|
|
}
|
|
|
|
const columns = this.docData.getTable('_grist_Tables_column')!;
|
|
|
|
for (const col of columns.getRecords()) {
|
|
|
|
const tableId = tables.getValue(col.parentId as number, 'tableId');
|
|
|
|
result[tableId as string].push(col.colId as string);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
public getGristDocAPI(): GristDocAPI {
|
|
|
|
return this.docPluginManager.gristDocAPI;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get recent actions in ActionGroup format with summaries included.
|
|
|
|
public async getActionSummaries(docSession: DocSession): Promise<ActionGroup[]> {
|
2020-09-02 18:17:17 +00:00
|
|
|
return this.getRecentActions(docSession, true);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Applies normal actions to the data engine while processing onDemand actions separately.
|
2020-12-07 21:15:58 +00:00
|
|
|
* Should only be called by a Sharing object, with this._modificationLock held, since the
|
|
|
|
* actions may need to be rolled back if final access control checks fail.
|
2020-07-21 13:20:51 +00:00
|
|
|
*/
|
2021-07-15 00:45:53 +00:00
|
|
|
public async applyActionsToDataEngine(
|
|
|
|
docSession: OptDocSession|null,
|
|
|
|
userActions: UserAction[]
|
|
|
|
): Promise<SandboxActionBundle> {
|
2020-07-21 13:20:51 +00:00
|
|
|
const [normalActions, onDemandActions] = this._onDemandActions.splitByOnDemand(userActions);
|
|
|
|
|
|
|
|
let sandboxActionBundle: SandboxActionBundle;
|
|
|
|
if (normalActions.length > 0) {
|
|
|
|
// For all but the special 'Calculate' action, we wait for full initialization.
|
|
|
|
if (normalActions[0][0] !== 'Calculate') {
|
|
|
|
await this.waitForInitialization();
|
|
|
|
}
|
2021-07-15 00:45:53 +00:00
|
|
|
const user = docSession ? await this._granularAccess.getCachedUser(docSession) : undefined;
|
|
|
|
sandboxActionBundle = await this._rawPyCall('apply_user_actions', normalActions, user?.toJSON());
|
2020-07-21 13:20:51 +00:00
|
|
|
await this._reportDataEngineMemory();
|
|
|
|
} else {
|
|
|
|
// Create default SandboxActionBundle to use if the data engine is not called.
|
|
|
|
sandboxActionBundle = createEmptySandboxActionBundle();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (onDemandActions.length > 0) {
|
|
|
|
const allIndex = findOrAddAllEnvelope(sandboxActionBundle.envelopes);
|
|
|
|
await this.docStorage.execTransaction(async () => {
|
|
|
|
for (const action of onDemandActions) {
|
|
|
|
const {stored, undo, retValues} = await this._onDemandActions.processUserAction(action);
|
|
|
|
// Note: onDemand stored/undo actions are arbitrarily processed/added after normal actions
|
|
|
|
// and do not support access control.
|
|
|
|
sandboxActionBundle.stored.push(...stored.map(a => [allIndex, a] as [number, DocAction]));
|
2021-05-12 15:04:37 +00:00
|
|
|
sandboxActionBundle.direct.push(...stored.map(a => [allIndex, true] as [number, boolean]));
|
2020-07-21 13:20:51 +00:00
|
|
|
sandboxActionBundle.undo.push(...undo.map(a => [allIndex, a] as [number, DocAction]));
|
|
|
|
sandboxActionBundle.retValues.push(retValues);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return sandboxActionBundle;
|
|
|
|
}
|
|
|
|
|
|
|
|
public async fetchSnapshot() {
|
|
|
|
await this.waitForInitialization();
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('fetch_snapshot');
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Needed for test/server/migrations.js tests
|
|
|
|
public async testGetVersionFromDataEngine() {
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('get_version');
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Needed for test/server/lib/HostedStorageManager.ts tests
|
|
|
|
public async testKeepOpen() {
|
|
|
|
this._inactivityTimer.ping();
|
|
|
|
}
|
|
|
|
|
2020-12-18 17:37:16 +00:00
|
|
|
public async getSnapshots(skipMetadataCache?: boolean): Promise<DocSnapshots> {
|
2020-09-11 20:27:09 +00:00
|
|
|
// Assume any viewer can access this list.
|
2020-12-18 17:37:16 +00:00
|
|
|
return this._docManager.storageManager.getSnapshots(this.docName, skipMetadataCache);
|
|
|
|
}
|
|
|
|
|
|
|
|
public async removeSnapshots(docSession: OptDocSession, snapshotIds: string[]): Promise<void> {
|
2021-03-02 21:11:37 +00:00
|
|
|
if (!await this.isOwner(docSession)) {
|
2020-12-18 17:37:16 +00:00
|
|
|
throw new Error('cannot remove snapshots, access denied');
|
|
|
|
}
|
|
|
|
return this._docManager.storageManager.removeSnapshots(this.docName, snapshotIds);
|
|
|
|
}
|
|
|
|
|
|
|
|
public async deleteActions(docSession: OptDocSession, keepN: number): Promise<void> {
|
2021-03-02 21:11:37 +00:00
|
|
|
if (!await this.isOwner(docSession)) {
|
2020-12-18 17:37:16 +00:00
|
|
|
throw new Error('cannot delete actions, access denied');
|
|
|
|
}
|
2021-01-14 16:10:42 +00:00
|
|
|
await this._actionHistory.deleteActions(keepN);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Make sure the current version of the document has been pushed to persistent
|
|
|
|
* storage.
|
|
|
|
*/
|
|
|
|
public async flushDoc(): Promise<void> {
|
|
|
|
return this._docManager.storageManager.flushDoc(this.docName);
|
|
|
|
}
|
|
|
|
|
|
|
|
public makeAccessId(userId: number|null): string|null {
|
|
|
|
return this._docManager.makeAccessId(userId);
|
|
|
|
}
|
|
|
|
|
2020-12-07 21:15:58 +00:00
|
|
|
/**
|
|
|
|
* Called by Sharing manager when working on modifying the document.
|
|
|
|
* Called when DocActions have been produced from UserActions, but
|
2021-03-01 16:51:30 +00:00
|
|
|
* before those DocActions have been applied to the DB. GranularAccessBundle
|
|
|
|
* methods can confirm that those DocActions are legal according to any
|
|
|
|
* granular access rules.
|
2020-12-07 21:15:58 +00:00
|
|
|
*/
|
2021-03-01 16:51:30 +00:00
|
|
|
public getGranularAccessForBundle(docSession: OptDocSession, docActions: DocAction[], undo: DocAction[],
|
2021-05-12 15:04:37 +00:00
|
|
|
userActions: UserAction[], isDirect: boolean[]): GranularAccessForBundle {
|
|
|
|
this._granularAccess.getGranularAccessForBundle(docSession, docActions, undo, userActions, isDirect);
|
2021-03-01 16:51:30 +00:00
|
|
|
return this._granularAccess;
|
2020-09-02 18:17:17 +00:00
|
|
|
}
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
/**
|
|
|
|
* Loads an open document from DocStorage. Returns a list of the tables it contains.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
protected async _loadOpenDoc(docSession: OptDocSession): Promise<string[]> {
|
2020-07-21 13:20:51 +00:00
|
|
|
// Fetch the schema version of document and sandbox, and migrate if the sandbox is newer.
|
|
|
|
const [schemaVersion, docInfoData] = await Promise.all([
|
2020-12-07 21:15:58 +00:00
|
|
|
this._rawPyCall('get_version'),
|
2020-07-21 13:20:51 +00:00
|
|
|
this.docStorage.fetchTable('_grist_DocInfo'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
// Migrate the document if needed.
|
2021-04-26 21:54:09 +00:00
|
|
|
const values = marshal.loads(docInfoData);
|
2020-07-21 13:20:51 +00:00
|
|
|
const versionCol = values.schemaVersion;
|
|
|
|
const docSchemaVersion = (versionCol && versionCol.length === 1 ? versionCol[0] : 0);
|
|
|
|
if (docSchemaVersion < schemaVersion) {
|
|
|
|
this.logInfo(docSession, "Doc needs migration from v%s to v%s", docSchemaVersion, schemaVersion);
|
2020-10-30 16:53:23 +00:00
|
|
|
await this._beforeMigration(docSession, 'schema', docSchemaVersion, schemaVersion);
|
|
|
|
let success: boolean = false;
|
|
|
|
try {
|
|
|
|
await this._migrate(docSession);
|
|
|
|
success = true;
|
|
|
|
} finally {
|
|
|
|
await this._afterMigration(docSession, 'schema', schemaVersion, success);
|
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
} else if (docSchemaVersion > schemaVersion) {
|
|
|
|
// We do NOT attempt to down-migrate in this case. Migration code cannot down-migrate
|
|
|
|
// directly (since it doesn't know anything about newer documents). We could revert the
|
|
|
|
// migration action, but that requires merging and still may not be safe. For now, doing
|
|
|
|
// nothing seems best, as long as we follow the recommendations in migrations.py (never
|
|
|
|
// remove/modify/rename metadata tables or columns, or change their meaning).
|
|
|
|
this.logWarn(docSession, "Doc is newer (v%s) than this version of Grist (v%s); " +
|
|
|
|
"proceeding with fingers crossed", docSchemaVersion, schemaVersion);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the initial meta tables which determine the document schema.
|
|
|
|
const [tablesData, columnsData] = await Promise.all([
|
|
|
|
this.docStorage.fetchTable('_grist_Tables'),
|
|
|
|
this.docStorage.fetchTable('_grist_Tables_column'),
|
|
|
|
]);
|
|
|
|
|
2020-12-07 21:15:58 +00:00
|
|
|
const tableNames: string[] = await this._rawPyCall('load_meta_tables', tablesData, columnsData);
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
// Figure out which tables are on-demand.
|
2021-04-26 21:54:09 +00:00
|
|
|
const tablesParsed: BulkColValues = marshal.loads(tablesData);
|
2020-07-21 13:20:51 +00:00
|
|
|
const onDemandMap = zipObject(tablesParsed.tableId as string[], tablesParsed.onDemand);
|
|
|
|
const onDemandNames = remove(tableNames, (t) => onDemandMap[t]);
|
|
|
|
|
|
|
|
this.logDebug(docSession, "found %s tables: %s", tableNames.length,
|
|
|
|
tableNames.join(", "));
|
|
|
|
this.logDebug(docSession, "skipping %s on-demand tables: %s", onDemandNames.length,
|
|
|
|
onDemandNames.join(", "));
|
|
|
|
|
|
|
|
return tableNames;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Applies an array of user actions to the sandbox and broadcasts the results to doc's clients.
|
|
|
|
*
|
|
|
|
* @private
|
|
|
|
* @param {Object} client - The client originating this action. May be null.
|
|
|
|
* @param {Array} actions - The user actions to apply.
|
|
|
|
* @param {String} options.desc - Description of the action which overrides the default client
|
|
|
|
* description if provided. Should be used to describe bundled actions.
|
|
|
|
* @param {Int} options.otherId - Action number for the original useraction to which this undo/redo
|
|
|
|
* action applies.
|
|
|
|
* @param {Boolean} options.linkId - ActionNumber of the previous action in an undo/redo bundle.
|
|
|
|
* @returns {Promise} Promise that's resolved when all actions are applied successfully to {
|
|
|
|
* actionNum: number of the action that got recorded
|
|
|
|
* retValues: array of return values, one for each of the passed-in user actions.
|
|
|
|
* isModification: true if document was changed by one or more actions.
|
|
|
|
* }
|
|
|
|
*/
|
2020-11-02 15:48:47 +00:00
|
|
|
@ActiveDoc.keepDocOpen
|
2020-09-02 18:17:17 +00:00
|
|
|
protected async _applyUserActions(docSession: OptDocSession, actions: UserAction[],
|
2020-07-21 13:20:51 +00:00
|
|
|
options: ApplyUAOptions = {}): Promise<ApplyUAResult> {
|
2020-09-11 20:27:09 +00:00
|
|
|
|
2020-09-02 18:17:17 +00:00
|
|
|
const client = docSession.client;
|
|
|
|
this.logDebug(docSession, "_applyUserActions(%s, %s)", client, shortDesc(actions));
|
2020-07-21 13:20:51 +00:00
|
|
|
this._inactivityTimer.ping(); // The doc is in active use; ping it to stay open longer.
|
|
|
|
|
2021-06-09 19:31:59 +00:00
|
|
|
if (options?.bestEffort) {
|
|
|
|
actions = await this._granularAccess.prefilterUserActions(docSession, actions);
|
|
|
|
}
|
2021-02-15 21:36:33 +00:00
|
|
|
await this._granularAccess.assertCanMaybeApplyUserActions(docSession, actions);
|
|
|
|
|
2020-12-07 21:15:58 +00:00
|
|
|
const user = docSession.mode === 'system' ? 'grist' :
|
2021-07-12 16:10:04 +00:00
|
|
|
(client?.getProfile()?.email || '');
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
// Create the UserActionBundle.
|
|
|
|
const action: UserActionBundle = {
|
|
|
|
info: {
|
|
|
|
time: Date.now(),
|
|
|
|
user,
|
|
|
|
inst: this._sharing.instanceId || "unset-inst",
|
|
|
|
desc: options.desc,
|
|
|
|
otherId: options.otherId || 0,
|
|
|
|
linkId: options.linkId || 0,
|
|
|
|
},
|
|
|
|
userActions: actions,
|
|
|
|
};
|
|
|
|
|
|
|
|
const result: ApplyUAResult = await new Promise<ApplyUAResult>(
|
|
|
|
(resolve, reject) =>
|
2021-04-26 21:54:09 +00:00
|
|
|
this._sharing.addUserAction({action, docSession, resolve, reject}));
|
2020-11-09 23:40:43 +00:00
|
|
|
this.logDebug(docSession, "_applyUserActions returning %s", shortDesc(result));
|
2020-07-21 13:20:51 +00:00
|
|
|
|
|
|
|
if (result.isModification) {
|
|
|
|
this._fetchCache.clear(); // This could be more nuanced.
|
2020-10-30 16:53:23 +00:00
|
|
|
this._docManager.markAsChanged(this, 'edit');
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Prepares a single attachment by adding it DocStorage and returns a UserAction to apply.
|
|
|
|
*/
|
|
|
|
private async _prepAttachment(docSession: OptDocSession, fileData: FileUploadInfo): Promise<UserAction> {
|
|
|
|
// Check that upload size is within the configured limits.
|
|
|
|
const limit = (Number(process.env.GRIST_MAX_UPLOAD_ATTACHMENT_MB) * 1024 * 1024) || Infinity;
|
|
|
|
if (fileData.size > limit) {
|
|
|
|
throw new ApiError(`Attachments must not exceed ${byteString(limit)}`, 413);
|
|
|
|
}
|
|
|
|
|
|
|
|
let dimensions: {width?: number, height?: number} = {};
|
|
|
|
// imageSize returns an object with a width, height and type property if the file is an image.
|
|
|
|
// The width and height properties are integers representing width and height in pixels.
|
|
|
|
try {
|
|
|
|
dimensions = await bluebird.fromCallback((cb: any) => imageSize(fileData.absPath, cb));
|
|
|
|
} catch (err) {
|
|
|
|
// Non-images will fail in some way, and that's OK.
|
|
|
|
dimensions.height = 0;
|
|
|
|
dimensions.width = 0;
|
|
|
|
}
|
|
|
|
const checksum = await checksumFile(fileData.absPath);
|
|
|
|
const fileIdent = checksum + fileData.ext;
|
|
|
|
const ret: boolean = await this.docStorage.findOrAttachFile(fileData.absPath, fileIdent);
|
|
|
|
this.logInfo(docSession, "addAttachment: file %s (image %sx%s) %s", fileIdent,
|
|
|
|
dimensions.width, dimensions.height, ret ? "attached" : "already exists");
|
|
|
|
return ['AddRecord', '_grist_Attachments', null, {
|
|
|
|
fileIdent,
|
|
|
|
fileName: fileData.origName,
|
|
|
|
// We used to set fileType, but it's not easily available for native types. Since it's
|
|
|
|
// also entirely unused, we just skip it until it becomes relevant.
|
|
|
|
fileSize: fileData.size,
|
|
|
|
imageHeight: dimensions.height,
|
|
|
|
imageWidth: dimensions.width,
|
|
|
|
timeUploaded: Date.now()
|
|
|
|
}];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* If the software is newer than the document, migrate the document by fetching all tables, and
|
|
|
|
* giving them to the sandbox so that it can produce migration actions.
|
|
|
|
* TODO: We haven't figured out how to do sharing between different Grist versions that
|
|
|
|
* expect different schema versions. The returned actions at the moment aren't even shared with
|
|
|
|
* collaborators.
|
|
|
|
*/
|
2020-09-02 18:17:17 +00:00
|
|
|
private async _migrate(docSession: OptDocSession): Promise<void> {
|
2020-11-11 21:29:11 +00:00
|
|
|
const tableNames = await this.docStorage.getAllTableNames();
|
|
|
|
|
|
|
|
// Fetch only metadata tables first, and try to migrate with only those.
|
|
|
|
const tableData: {[key: string]: Buffer|null} = {};
|
|
|
|
for (const tableName of tableNames) {
|
|
|
|
if (tableName.startsWith('_grist_')) {
|
|
|
|
tableData[tableName] = await this.docStorage.fetchTable(tableName);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let docActions: DocAction[];
|
|
|
|
try {
|
|
|
|
// The last argument tells create_migrations() that only metadata is included.
|
2020-12-07 21:15:58 +00:00
|
|
|
docActions = await this._rawPyCall('create_migrations', tableData, true);
|
2020-11-11 21:29:11 +00:00
|
|
|
} catch (e) {
|
|
|
|
if (!/need all tables/.test(e.message)) {
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
// If the migration failed because it needs all tables (i.e. involves changes to data), then
|
|
|
|
// fetch them all. TODO: This is used for some older migrations, and is relied on by tests.
|
|
|
|
// If a new migration needs this flag, more work is needed. The current approach creates
|
|
|
|
// more memory pressure than usual since full data is present in memory at once both in node
|
|
|
|
// and in Python; and it doesn't skip onDemand tables. This is liable to cause crashes.
|
|
|
|
this.logWarn(docSession, "_migrate: retrying with all tables");
|
|
|
|
for (const tableName of tableNames) {
|
|
|
|
if (!tableData[tableName] && !tableName.startsWith('_gristsys_')) {
|
|
|
|
tableData[tableName] = await this.docStorage.fetchTable(tableName);
|
|
|
|
}
|
|
|
|
}
|
2020-12-07 21:15:58 +00:00
|
|
|
docActions = await this._rawPyCall('create_migrations', tableData);
|
2020-11-11 21:29:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const processedTables = Object.keys(tableData);
|
|
|
|
const numSchema = countIf(processedTables, t => t.startsWith("_grist_"));
|
|
|
|
const numUser = countIf(processedTables, t => !t.startsWith("_grist_"));
|
|
|
|
this.logInfo(docSession, "_migrate: applying %d migration actions (processed %s schema, %s user tables)",
|
|
|
|
docActions.length, numSchema, numUser);
|
|
|
|
|
2020-07-21 13:20:51 +00:00
|
|
|
docActions.forEach((action, i) => this.logInfo(docSession, "_migrate: docAction %s: %s", i, shortDesc(action)));
|
|
|
|
await this.docStorage.execTransaction(() => this.docStorage.applyStoredActions(docActions));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Load the specified tables into the data engine.
|
|
|
|
*/
|
|
|
|
private async _loadTables(docSession: OptDocSession, tableNames: string[]) {
|
|
|
|
this.logDebug(docSession, "loading %s tables: %s", tableNames.length,
|
|
|
|
tableNames.join(", "));
|
|
|
|
// Pass the resulting array to `map`, which allows parallel processing of the tables. Database
|
|
|
|
// and DataEngine may still do things serially, but it allows them to be busy simultaneously.
|
|
|
|
await bluebird.map(tableNames, async (tableName: string) =>
|
2020-12-07 21:15:58 +00:00
|
|
|
this._pyCall('load_table', tableName, await this._fetchTableIfPresent(tableName)),
|
2020-07-21 13:20:51 +00:00
|
|
|
// How many tables to query for and push to the data engine in parallel.
|
|
|
|
{ concurrency: 3 });
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetches and returns the requested table, or null if it's missing. This allows documents to
|
|
|
|
// load with missing metadata tables (should only matter if migrations are also broken).
|
|
|
|
private async _fetchTableIfPresent(tableName: string): Promise<Buffer|null> {
|
|
|
|
try {
|
|
|
|
return await this.docStorage.fetchTable(tableName);
|
|
|
|
} catch (err) {
|
|
|
|
if (/no such table/.test(err.message)) { return null; }
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// It's a bit risky letting "Calculate" (and other formula-dependent calls) to disable
|
|
|
|
// inactivityTimer, since a user formulas with an infinite loop can disable it forever.
|
|
|
|
// TODO find a solution to this issue.
|
|
|
|
@ActiveDoc.keepDocOpen
|
|
|
|
private async _finishInitialization(docSession: OptDocSession, pendingTableNames: string[], startTime: number) {
|
|
|
|
try {
|
|
|
|
await this._loadTables(docSession, pendingTableNames);
|
2020-12-07 21:15:58 +00:00
|
|
|
// Calculations are not associated specifically with the user opening the document.
|
|
|
|
// TODO: be careful with which users can create formulas.
|
|
|
|
await this._applyUserActions(makeExceptionalDocSession('system'), [['Calculate']]);
|
2020-07-21 13:20:51 +00:00
|
|
|
await this._reportDataEngineMemory();
|
|
|
|
this._fullyLoaded = true;
|
|
|
|
const endTime = Date.now();
|
|
|
|
const loadMs = endTime - startTime;
|
|
|
|
// Adjust the inactivity timer: if the load took under 1 sec, use the regular timeout; if it
|
|
|
|
// took longer, scale it up proportionately.
|
|
|
|
const closeTimeout = Math.max(loadMs, 1000) * Deps.ACTIVEDOC_TIMEOUT;
|
|
|
|
this._inactivityTimer.setDelay(closeTimeout);
|
|
|
|
this.logDebug(docSession, `loaded in ${loadMs} ms, InactivityTimer set to ${closeTimeout} ms`);
|
|
|
|
return true;
|
|
|
|
} catch (err) {
|
|
|
|
this.logWarn(docSession, "_finishInitialization stopped with %s", err);
|
|
|
|
this._fullyLoaded = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private async _fetchQueryFromDB(query: Query, onDemand: boolean): Promise<TableDataAction> {
|
|
|
|
// Expand query to compute formulas (or include placeholders for them).
|
|
|
|
const expandedQuery = expandQuery(query, this.docData!, onDemand);
|
|
|
|
const marshalled = await this.docStorage.fetchQuery(expandedQuery);
|
|
|
|
const table = this.docStorage.decodeMarshalledData(marshalled, query.tableId);
|
|
|
|
|
|
|
|
// Substitute in constant values for errors / placeholders.
|
|
|
|
if (expandedQuery.constants) {
|
|
|
|
for (const colId of Object.keys(expandedQuery.constants)) {
|
|
|
|
const constant = expandedQuery.constants[colId];
|
|
|
|
table[colId] = table[colId].map(() => constant);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return toTableDataAction(query.tableId, table);
|
|
|
|
}
|
|
|
|
|
|
|
|
private async _fetchQueryFromDataEngine(query: Query): Promise<TableDataAction> {
|
2020-12-07 21:15:58 +00:00
|
|
|
return this._pyCall('fetch_table', query.tableId, true, query.filters);
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private async _reportDataEngineMemory() {
|
|
|
|
const now = Date.now();
|
|
|
|
if (now >= this._lastMemoryMeasurement + MEMORY_MEASUREMENT_INTERVAL_MS) {
|
|
|
|
this._lastMemoryMeasurement = now;
|
|
|
|
await this._dataEngine.reportMemoryUsage();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-02 18:17:17 +00:00
|
|
|
private _log(level: string, docSession: OptDocSession, msg: string, ...args: any[]) {
|
|
|
|
log.origLog(level, `ActiveDoc ` + msg, ...args, this.getLogMeta(docSession));
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
2020-09-11 20:27:09 +00:00
|
|
|
|
2020-10-30 16:53:23 +00:00
|
|
|
/**
|
|
|
|
* Called before a migration. Makes sure a back-up is made.
|
|
|
|
*/
|
|
|
|
private async _beforeMigration(docSession: OptDocSession, versionType: 'storage' | 'schema',
|
|
|
|
currentVersion: number, newVersion: number) {
|
|
|
|
this._migrating++;
|
|
|
|
const label = `migrate-${versionType}-last-v${currentVersion}-before-v${newVersion}`;
|
|
|
|
this._docManager.markAsChanged(this); // Give backup current time.
|
|
|
|
const location = await this._docManager.makeBackup(this, label);
|
|
|
|
this.logInfo(docSession, "_beforeMigration: backup made with label %s at %s", label, location);
|
|
|
|
this.emit("backupMade", location);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Called after a migration.
|
|
|
|
*/
|
|
|
|
private async _afterMigration(docSession: OptDocSession, versionType: 'storage' | 'schema',
|
|
|
|
newVersion: number, success: boolean) {
|
|
|
|
this._migrating--;
|
|
|
|
// Mark as changed even if migration is not successful, out of caution.
|
|
|
|
if (!this._migrating) { this._docManager.markAsChanged(this); }
|
|
|
|
}
|
2020-12-07 21:15:58 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Call a method in the sandbox, without checking the _modificationLock. Calls to
|
|
|
|
* the sandbox are naturally serialized.
|
|
|
|
*/
|
|
|
|
private _rawPyCall(funcName: string, ...varArgs: unknown[]): Promise<any> {
|
|
|
|
return this._dataEngine.pyCall(funcName, ...varArgs);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Call a method in the sandbox, while checking on the _modificationLock. If the
|
|
|
|
* lock is held, the call will wait until the lock is released, and then hold
|
|
|
|
* the lock itself while operating.
|
|
|
|
*/
|
|
|
|
private _pyCall(funcName: string, ...varArgs: unknown[]): Promise<any> {
|
|
|
|
return this._modificationLock.runExclusive(() => this._rawPyCall(funcName, ...varArgs));
|
|
|
|
}
|
2020-07-21 13:20:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Helper to initialize a sandbox action bundle with no values.
|
|
|
|
function createEmptySandboxActionBundle(): SandboxActionBundle {
|
|
|
|
return {
|
|
|
|
envelopes: [],
|
|
|
|
stored: [],
|
2021-05-12 15:04:37 +00:00
|
|
|
direct: [],
|
2020-07-21 13:20:51 +00:00
|
|
|
calc: [],
|
|
|
|
undo: [],
|
|
|
|
retValues: []
|
|
|
|
};
|
|
|
|
}
|