mirror of
https://github.com/gristlabs/grist-core.git
synced 2026-03-02 04:09:24 +00:00
(core) Allow duplicating tables from Raw Data page
Summary: Adds a "Duplicate Table" menu option to the tables listed on the Raw Data page. Clicking it opens a dialog that allows you to make a copy of the table (with or without its data). Test Plan: Python, server, and browser tests. Reviewers: jarek, paulfitz Reviewed By: jarek, paulfitz Subscribers: jarek Differential Revision: https://phab.getgrist.com/D3619
This commit is contained in:
@@ -77,8 +77,10 @@ function isAclTable(tableId: string): boolean {
|
||||
return ['_grist_ACLRules', '_grist_ACLResources'].includes(tableId);
|
||||
}
|
||||
|
||||
function isAddOrUpdateRecordAction(a: UserAction): boolean {
|
||||
return ['AddOrUpdateRecord', 'BulkAddOrUpdateRecord'].includes(String(a[0]));
|
||||
const ADD_OR_UPDATE_RECORD_ACTIONS = ['AddOrUpdateRecord', 'BulkAddOrUpdateRecord'];
|
||||
|
||||
function isAddOrUpdateRecordAction([actionName]: UserAction): boolean {
|
||||
return ADD_OR_UPDATE_RECORD_ACTIONS.includes(String(actionName));
|
||||
}
|
||||
|
||||
// A list of key metadata tables that need special handling. Other metadata tables may
|
||||
@@ -154,6 +156,9 @@ const OTHER_RECOGNIZED_ACTIONS = new Set([
|
||||
'RemoveTable',
|
||||
'RenameTable',
|
||||
|
||||
// A schema action handled specially because of read needs.
|
||||
'DuplicateTable',
|
||||
|
||||
// Display column support.
|
||||
'SetDisplayFormula',
|
||||
'MaybeCopyDisplayFormula',
|
||||
@@ -548,6 +553,7 @@ export class GranularAccess implements GranularAccessForBundle {
|
||||
await this._checkSimpleDataActions(docSession, actions);
|
||||
await this._checkForSpecialOrSurprisingActions(docSession, actions);
|
||||
await this._checkPossiblePythonFormulaModification(docSession, actions);
|
||||
await this._checkDuplicateTableAccess(docSession, actions);
|
||||
await this._checkAddOrUpdateAccess(docSession, actions);
|
||||
}
|
||||
|
||||
@@ -988,21 +994,16 @@ export class GranularAccess implements GranularAccessForBundle {
|
||||
// Don't need to apply this particular check.
|
||||
return;
|
||||
}
|
||||
// Fail if being combined with anything fancy.
|
||||
if (scanActionsRecursively(actions, (a) => {
|
||||
const name = a[0];
|
||||
return !['ApplyUndoActions', 'ApplyDocActions'].includes(String(name)) &&
|
||||
!isAddOrUpdateRecordAction(a) &&
|
||||
!(isDataAction(a) && !getTableId(a).startsWith('_grist_'));
|
||||
})) {
|
||||
throw new Error('Can only combine AddOrUpdate with simple data changes');
|
||||
}
|
||||
|
||||
await this._assertOnlyBundledWithSimpleDataActions(ADD_OR_UPDATE_RECORD_ACTIONS, actions);
|
||||
|
||||
// Check for read access, and that we're not touching metadata.
|
||||
await applyToActionsRecursively(actions, async (a) => {
|
||||
if (!isAddOrUpdateRecordAction(a)) { return; }
|
||||
const actionName = String(a[0]);
|
||||
const tableId = validTableIdString(a[1]);
|
||||
if (tableId.startsWith('_grist_')) {
|
||||
throw new Error(`AddOrUpdate cannot yet be used on metadata tables`);
|
||||
throw new Error(`${actionName} cannot yet be used on metadata tables`);
|
||||
}
|
||||
const tableAccess = await this.getTableAccess(docSession, tableId);
|
||||
accessChecks.fatal.read.throwIfNotFullyAllowed(tableAccess);
|
||||
@@ -1011,6 +1012,20 @@ export class GranularAccess implements GranularAccessForBundle {
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Asserts that `actionNames` (if present in `actions`) are only bundled with simple data actions.
|
||||
*/
|
||||
private async _assertOnlyBundledWithSimpleDataActions(actionNames: string | string[], actions: UserAction[]) {
|
||||
const names = Array.isArray(actionNames) ? actionNames : [actionNames];
|
||||
// Fail if being combined with anything that isn't a simple data action.
|
||||
await applyToActionsRecursively(actions, async (a) => {
|
||||
const name = String(a[0]);
|
||||
if (!names.includes(name) && !(isDataAction(a) && !getTableId(a).startsWith('_grist_'))) {
|
||||
throw new Error(`Can only combine ${names.join(' and ')} with simple data changes`);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
private async _checkPossiblePythonFormulaModification(docSession: OptDocSession, actions: UserAction[]) {
|
||||
// If changes could include Python formulas, then user must have
|
||||
// +S before we even consider passing these to the data engine.
|
||||
@@ -1022,6 +1037,48 @@ export class GranularAccess implements GranularAccessForBundle {
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Like `_checkAddOrUpdateAccess`, but for DuplicateTable actions.
|
||||
*
|
||||
* Permitted only when a user has full access, or full table read and schema edit
|
||||
* access for the table being duplicated.
|
||||
*
|
||||
* Currently, DuplicateTable cannot be combined with other action types, including
|
||||
* simple data actions. This may be relaxed in the future, but should only be done
|
||||
* after careful consideration of its implications.
|
||||
*/
|
||||
private async _checkDuplicateTableAccess(docSession: OptDocSession, actions: UserAction[]) {
|
||||
if (!scanActionsRecursively(actions, ([actionName]) => String(actionName) === 'DuplicateTable')) {
|
||||
// Don't need to apply this particular check.
|
||||
return;
|
||||
}
|
||||
|
||||
// Fail if being combined with another action.
|
||||
await applyToActionsRecursively(actions, async ([actionName]) => {
|
||||
if (String(actionName) !== 'DuplicateTable') {
|
||||
throw new Error('DuplicateTable currently cannot be combined with other actions');
|
||||
}
|
||||
});
|
||||
|
||||
// Check for read and schema edit access, and that we're not duplicating metadata tables.
|
||||
await applyToActionsRecursively(actions, async (a) => {
|
||||
const tableId = validTableIdString(a[1]);
|
||||
if (tableId.startsWith('_grist_')) {
|
||||
throw new Error('DuplicateTable cannot be used on metadata tables');
|
||||
}
|
||||
if (await this.hasFullAccess(docSession)) { return; }
|
||||
|
||||
const tableAccess = await this.getTableAccess(docSession, tableId);
|
||||
accessChecks.fatal.read.throwIfNotFullyAllowed(tableAccess);
|
||||
accessChecks.fatal.schemaEdit.throwIfDenied(tableAccess);
|
||||
|
||||
const includeData = a[3];
|
||||
if (includeData) {
|
||||
accessChecks.fatal.create.throwIfDenied(tableAccess);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Asserts that user has schema access.
|
||||
*/
|
||||
|
||||
Reference in New Issue
Block a user