2022-07-06 23:19:05 +02:00
|
|
|
package apis
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2023-04-20 09:44:20 +02:00
|
|
|
"strings"
|
2022-07-06 23:19:05 +02:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/labstack/echo/v5"
|
2022-07-08 23:53:10 +02:00
|
|
|
"github.com/pocketbase/dbx"
|
2022-07-06 23:19:05 +02:00
|
|
|
"github.com/pocketbase/pocketbase/core"
|
|
|
|
"github.com/pocketbase/pocketbase/forms"
|
|
|
|
"github.com/pocketbase/pocketbase/models"
|
|
|
|
"github.com/pocketbase/pocketbase/resolvers"
|
2023-01-18 15:41:33 +02:00
|
|
|
"github.com/pocketbase/pocketbase/tools/routine"
|
2022-07-06 23:19:05 +02:00
|
|
|
"github.com/pocketbase/pocketbase/tools/search"
|
|
|
|
"github.com/pocketbase/pocketbase/tools/subscriptions"
|
|
|
|
)
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
// bindRealtimeApi registers the realtime api endpoints.
|
|
|
|
func bindRealtimeApi(app core.App, rg *echo.Group) {
|
2022-07-06 23:19:05 +02:00
|
|
|
api := realtimeApi{app: app}
|
|
|
|
|
|
|
|
subGroup := rg.Group("/realtime", ActivityLogger(app))
|
|
|
|
subGroup.GET("", api.connect)
|
|
|
|
subGroup.POST("", api.setSubscriptions)
|
|
|
|
|
|
|
|
api.bindEvents()
|
|
|
|
}
|
|
|
|
|
|
|
|
type realtimeApi struct {
|
|
|
|
app core.App
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *realtimeApi) connect(c echo.Context) error {
|
|
|
|
cancelCtx, cancelRequest := context.WithCancel(c.Request().Context())
|
|
|
|
defer cancelRequest()
|
|
|
|
c.SetRequest(c.Request().Clone(cancelCtx))
|
|
|
|
|
|
|
|
// register new subscription client
|
|
|
|
client := subscriptions.NewDefaultClient()
|
|
|
|
api.app.SubscriptionsBroker().Register(client)
|
2022-12-02 14:25:36 +02:00
|
|
|
defer func() {
|
2023-01-18 15:41:33 +02:00
|
|
|
disconnectEvent := &core.RealtimeDisconnectEvent{
|
2022-12-02 14:25:36 +02:00
|
|
|
HttpContext: c,
|
|
|
|
Client: client,
|
2023-01-18 15:41:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := api.app.OnRealtimeDisconnectRequest().Trigger(disconnectEvent); err != nil && api.app.IsDebug() {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
2022-12-02 14:25:36 +02:00
|
|
|
|
|
|
|
api.app.SubscriptionsBroker().Unregister(client.Id())
|
|
|
|
}()
|
2022-07-06 23:19:05 +02:00
|
|
|
|
|
|
|
c.Response().Header().Set("Content-Type", "text/event-stream; charset=UTF-8")
|
|
|
|
c.Response().Header().Set("Cache-Control", "no-store")
|
|
|
|
c.Response().Header().Set("Connection", "keep-alive")
|
2022-09-16 10:19:31 +02:00
|
|
|
// https://github.com/pocketbase/pocketbase/discussions/480#discussioncomment-3657640
|
|
|
|
// https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffering
|
|
|
|
c.Response().Header().Set("X-Accel-Buffering", "no")
|
2022-07-06 23:19:05 +02:00
|
|
|
|
2022-12-02 14:25:36 +02:00
|
|
|
connectEvent := &core.RealtimeConnectEvent{
|
2022-07-06 23:19:05 +02:00
|
|
|
HttpContext: c,
|
|
|
|
Client: client,
|
2023-08-03 11:38:02 +02:00
|
|
|
IdleTimeout: 5 * time.Minute,
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2022-12-02 14:25:36 +02:00
|
|
|
if err := api.app.OnRealtimeConnectRequest().Trigger(connectEvent); err != nil {
|
2022-07-06 23:19:05 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-07-28 07:26:05 +02:00
|
|
|
if api.app.IsDebug() {
|
2022-10-17 07:21:56 +02:00
|
|
|
log.Printf("Realtime connection established: %s\n", client.Id())
|
2022-07-28 07:26:05 +02:00
|
|
|
}
|
|
|
|
|
2022-07-06 23:19:05 +02:00
|
|
|
// signalize established connection (aka. fire "connect" message)
|
2022-12-02 14:25:36 +02:00
|
|
|
connectMsgEvent := &core.RealtimeMessageEvent{
|
|
|
|
HttpContext: c,
|
|
|
|
Client: client,
|
|
|
|
Message: &subscriptions.Message{
|
|
|
|
Name: "PB_CONNECT",
|
2023-07-20 15:32:21 +02:00
|
|
|
Data: []byte(`{"clientId":"` + client.Id() + `"}`),
|
2022-12-02 14:25:36 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
connectMsgErr := api.app.OnRealtimeBeforeMessageSend().Trigger(connectMsgEvent, func(e *core.RealtimeMessageEvent) error {
|
|
|
|
w := e.HttpContext.Response()
|
2023-07-20 15:32:21 +02:00
|
|
|
w.Write([]byte("id:" + client.Id() + "\n"))
|
|
|
|
w.Write([]byte("event:" + e.Message.Name + "\n"))
|
|
|
|
w.Write([]byte("data:"))
|
|
|
|
w.Write(e.Message.Data)
|
|
|
|
w.Write([]byte("\n\n"))
|
2022-12-02 14:25:36 +02:00
|
|
|
w.Flush()
|
2023-07-20 09:40:03 +02:00
|
|
|
return api.app.OnRealtimeAfterMessageSend().Trigger(e)
|
2022-12-02 14:25:36 +02:00
|
|
|
})
|
|
|
|
if connectMsgErr != nil {
|
|
|
|
if api.app.IsDebug() {
|
|
|
|
log.Println("Realtime connection closed (failed to deliver PB_CONNECT):", client.Id(), connectMsgErr)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
|
|
|
|
// start an idle timer to keep track of inactive/forgotten connections
|
2023-08-03 11:38:02 +02:00
|
|
|
idleTimeout := connectEvent.IdleTimeout
|
|
|
|
idleTimer := time.NewTimer(idleTimeout)
|
2022-07-06 23:19:05 +02:00
|
|
|
defer idleTimer.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-idleTimer.C:
|
|
|
|
cancelRequest()
|
|
|
|
case msg, ok := <-client.Channel():
|
|
|
|
if !ok {
|
|
|
|
// channel is closed
|
|
|
|
if api.app.IsDebug() {
|
|
|
|
log.Println("Realtime connection closed (closed channel):", client.Id())
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-12-02 14:25:36 +02:00
|
|
|
msgEvent := &core.RealtimeMessageEvent{
|
|
|
|
HttpContext: c,
|
|
|
|
Client: client,
|
|
|
|
Message: &msg,
|
|
|
|
}
|
|
|
|
msgErr := api.app.OnRealtimeBeforeMessageSend().Trigger(msgEvent, func(e *core.RealtimeMessageEvent) error {
|
|
|
|
w := e.HttpContext.Response()
|
2023-07-20 15:32:21 +02:00
|
|
|
w.Write([]byte("id:" + e.Client.Id() + "\n"))
|
|
|
|
w.Write([]byte("event:" + e.Message.Name + "\n"))
|
|
|
|
w.Write([]byte("data:"))
|
|
|
|
w.Write(e.Message.Data)
|
|
|
|
w.Write([]byte("\n\n"))
|
2022-12-02 14:25:36 +02:00
|
|
|
w.Flush()
|
2023-07-20 09:40:03 +02:00
|
|
|
return api.app.OnRealtimeAfterMessageSend().Trigger(msgEvent)
|
2022-12-02 14:25:36 +02:00
|
|
|
})
|
|
|
|
if msgErr != nil {
|
|
|
|
if api.app.IsDebug() {
|
|
|
|
log.Println("Realtime connection closed (failed to deliver message):", client.Id(), msgErr)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-06 23:19:05 +02:00
|
|
|
idleTimer.Stop()
|
2023-08-03 11:38:02 +02:00
|
|
|
idleTimer.Reset(idleTimeout)
|
2022-07-06 23:19:05 +02:00
|
|
|
case <-c.Request().Context().Done():
|
|
|
|
// connection is closed
|
|
|
|
if api.app.IsDebug() {
|
|
|
|
log.Println("Realtime connection closed (cancelled request):", client.Id())
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// note: in case of reconnect, clients will have to resubmit all subscriptions again
|
|
|
|
func (api *realtimeApi) setSubscriptions(c echo.Context) error {
|
|
|
|
form := forms.NewRealtimeSubscribe()
|
|
|
|
|
|
|
|
// read request data
|
|
|
|
if err := c.Bind(form); err != nil {
|
2022-10-30 10:28:14 +02:00
|
|
|
return NewBadRequestError("", err)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// validate request data
|
|
|
|
if err := form.Validate(); err != nil {
|
2022-10-30 10:28:14 +02:00
|
|
|
return NewBadRequestError("", err)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// find subscription client
|
|
|
|
client, err := api.app.SubscriptionsBroker().ClientById(form.ClientId)
|
|
|
|
if err != nil {
|
2022-10-30 10:28:14 +02:00
|
|
|
return NewNotFoundError("Missing or invalid client id.", err)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// check if the previous request was authorized
|
|
|
|
oldAuthId := extractAuthIdFromGetter(client)
|
|
|
|
newAuthId := extractAuthIdFromGetter(c)
|
|
|
|
if oldAuthId != "" && oldAuthId != newAuthId {
|
2022-10-30 10:28:14 +02:00
|
|
|
return NewForbiddenError("The current and the previous request authorization don't match.", nil)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
event := &core.RealtimeSubscribeEvent{
|
|
|
|
HttpContext: c,
|
|
|
|
Client: client,
|
|
|
|
Subscriptions: form.Subscriptions,
|
|
|
|
}
|
|
|
|
|
2023-05-29 20:50:07 +02:00
|
|
|
return api.app.OnRealtimeBeforeSubscribeRequest().Trigger(event, func(e *core.RealtimeSubscribeEvent) error {
|
2022-07-06 23:19:05 +02:00
|
|
|
// update auth state
|
|
|
|
e.Client.Set(ContextAdminKey, e.HttpContext.Get(ContextAdminKey))
|
2022-10-30 10:28:14 +02:00
|
|
|
e.Client.Set(ContextAuthRecordKey, e.HttpContext.Get(ContextAuthRecordKey))
|
2022-07-06 23:19:05 +02:00
|
|
|
|
|
|
|
// unsubscribe from any previous existing subscriptions
|
|
|
|
e.Client.Unsubscribe()
|
|
|
|
|
|
|
|
// subscribe to the new subscriptions
|
|
|
|
e.Client.Subscribe(e.Subscriptions...)
|
|
|
|
|
2023-07-18 14:31:36 +02:00
|
|
|
return api.app.OnRealtimeAfterSubscribeRequest().Trigger(event, func(e *core.RealtimeSubscribeEvent) error {
|
2023-07-20 09:40:03 +02:00
|
|
|
if e.HttpContext.Response().Committed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-07-18 14:31:36 +02:00
|
|
|
return e.HttpContext.NoContent(http.StatusNoContent)
|
|
|
|
})
|
2022-07-06 23:19:05 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
// updateClientsAuthModel updates the existing clients auth model with the new one (matched by ID).
|
|
|
|
func (api *realtimeApi) updateClientsAuthModel(contextKey string, newModel models.Model) error {
|
|
|
|
for _, client := range api.app.SubscriptionsBroker().Clients() {
|
|
|
|
clientModel, _ := client.Get(contextKey).(models.Model)
|
2023-04-20 09:44:20 +02:00
|
|
|
if clientModel != nil &&
|
|
|
|
clientModel.TableName() == newModel.TableName() &&
|
|
|
|
clientModel.GetId() == newModel.GetId() {
|
2022-10-30 10:28:14 +02:00
|
|
|
client.Set(contextKey, newModel)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
// unregisterClientsByAuthModel unregister all clients that has the provided auth model.
|
|
|
|
func (api *realtimeApi) unregisterClientsByAuthModel(contextKey string, model models.Model) error {
|
|
|
|
for _, client := range api.app.SubscriptionsBroker().Clients() {
|
|
|
|
clientModel, _ := client.Get(contextKey).(models.Model)
|
2023-04-20 09:44:20 +02:00
|
|
|
if clientModel != nil &&
|
|
|
|
clientModel.TableName() == model.TableName() &&
|
|
|
|
clientModel.GetId() == model.GetId() {
|
2022-10-30 10:28:14 +02:00
|
|
|
api.app.SubscriptionsBroker().Unregister(client.Id())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *realtimeApi) bindEvents() {
|
|
|
|
// update the clients that has admin or auth record association
|
2022-09-21 13:41:20 +02:00
|
|
|
api.app.OnModelAfterUpdate().PreAdd(func(e *core.ModelEvent) error {
|
2023-04-20 09:44:20 +02:00
|
|
|
if record := api.resolveRecord(e.Model); record != nil && record.Collection().IsAuth() {
|
2022-10-30 10:28:14 +02:00
|
|
|
return api.updateClientsAuthModel(ContextAuthRecordKey, record)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
if admin, ok := e.Model.(*models.Admin); ok && admin != nil {
|
|
|
|
return api.updateClientsAuthModel(ContextAdminKey, admin)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
// remove the client(s) associated to the deleted admin or auth record
|
2022-09-21 13:41:20 +02:00
|
|
|
api.app.OnModelAfterDelete().PreAdd(func(e *core.ModelEvent) error {
|
2023-04-20 09:44:20 +02:00
|
|
|
if collection := api.resolveRecordCollection(e.Model); collection != nil && collection.IsAuth() {
|
|
|
|
return api.unregisterClientsByAuthModel(ContextAuthRecordKey, e.Model)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
if admin, ok := e.Model.(*models.Admin); ok && admin != nil {
|
|
|
|
return api.unregisterClientsByAuthModel(ContextAdminKey, admin)
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2022-09-21 13:41:20 +02:00
|
|
|
api.app.OnModelAfterCreate().PreAdd(func(e *core.ModelEvent) error {
|
2023-04-20 09:44:20 +02:00
|
|
|
if record := api.resolveRecord(e.Model); record != nil {
|
2023-05-29 21:28:07 +02:00
|
|
|
if err := api.broadcastRecord("create", record, false); err != nil && api.app.IsDebug() {
|
2023-01-18 15:41:33 +02:00
|
|
|
log.Println(err)
|
|
|
|
}
|
2022-08-09 15:20:39 +02:00
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2022-09-21 13:41:20 +02:00
|
|
|
api.app.OnModelAfterUpdate().PreAdd(func(e *core.ModelEvent) error {
|
2023-04-20 09:44:20 +02:00
|
|
|
if record := api.resolveRecord(e.Model); record != nil {
|
2023-05-29 21:28:07 +02:00
|
|
|
if err := api.broadcastRecord("update", record, false); err != nil && api.app.IsDebug() {
|
2023-01-18 15:41:33 +02:00
|
|
|
log.Println(err)
|
|
|
|
}
|
2022-08-09 15:20:39 +02:00
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2022-07-14 21:35:57 +02:00
|
|
|
api.app.OnModelBeforeDelete().Add(func(e *core.ModelEvent) error {
|
2023-04-20 09:44:20 +02:00
|
|
|
if record := api.resolveRecord(e.Model); record != nil {
|
2023-05-29 21:28:07 +02:00
|
|
|
if err := api.broadcastRecord("delete", record, true); err != nil && api.app.IsDebug() {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
api.app.OnModelAfterDelete().Add(func(e *core.ModelEvent) error {
|
|
|
|
if record := api.resolveRecord(e.Model); record != nil {
|
|
|
|
if err := api.broadcastDryCachedRecord("delete", record); err != nil && api.app.IsDebug() {
|
2023-01-18 15:41:33 +02:00
|
|
|
log.Println(err)
|
|
|
|
}
|
2022-07-14 21:35:57 +02:00
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-04-20 09:44:20 +02:00
|
|
|
// resolveRecord converts *if possible* the provided model interface to a Record.
|
|
|
|
// This is usually helpful if the provided model is a custom Record model struct.
|
|
|
|
func (api *realtimeApi) resolveRecord(model models.Model) (record *models.Record) {
|
|
|
|
record, _ = model.(*models.Record)
|
|
|
|
|
|
|
|
// check if it is custom Record model struct (ignore "private" tables)
|
|
|
|
if record == nil && !strings.HasPrefix(model.TableName(), "_") {
|
|
|
|
record, _ = api.app.Dao().FindRecordById(model.TableName(), model.GetId())
|
|
|
|
}
|
|
|
|
|
|
|
|
return record
|
|
|
|
}
|
|
|
|
|
|
|
|
// resolveRecordCollection extracts *if possible* the Collection model from the provided model interface.
|
|
|
|
// This is usually helpful if the provided model is a custom Record model struct.
|
|
|
|
func (api *realtimeApi) resolveRecordCollection(model models.Model) (collection *models.Collection) {
|
|
|
|
if record, ok := model.(*models.Record); ok {
|
|
|
|
collection = record.Collection()
|
|
|
|
} else if !strings.HasPrefix(model.TableName(), "_") {
|
|
|
|
// check if it is custom Record model struct (ignore "private" tables)
|
|
|
|
collection, _ = api.app.Dao().FindCollectionByNameOrId(model.TableName())
|
|
|
|
}
|
|
|
|
|
|
|
|
return collection
|
|
|
|
}
|
|
|
|
|
|
|
|
// canAccessRecord checks if the subscription client has access to the specified record model.
|
2022-07-06 23:19:05 +02:00
|
|
|
func (api *realtimeApi) canAccessRecord(client subscriptions.Client, record *models.Record, accessRule *string) bool {
|
|
|
|
admin, _ := client.Get(ContextAdminKey).(*models.Admin)
|
|
|
|
if admin != nil {
|
|
|
|
// admins can access everything
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
if accessRule == nil {
|
|
|
|
// only admins can access this record
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
ruleFunc := func(q *dbx.SelectQuery) error {
|
|
|
|
if *accessRule == "" {
|
|
|
|
return nil // empty public rule
|
|
|
|
}
|
|
|
|
|
2023-04-04 19:33:35 +02:00
|
|
|
// mock request data
|
2023-07-17 22:13:39 +02:00
|
|
|
requestInfo := &models.RequestInfo{
|
2022-11-17 14:17:10 +02:00
|
|
|
Method: "GET",
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
2023-07-17 22:13:39 +02:00
|
|
|
requestInfo.AuthRecord, _ = client.Get(ContextAuthRecordKey).(*models.Record)
|
2022-07-06 23:19:05 +02:00
|
|
|
|
2023-07-17 22:13:39 +02:00
|
|
|
resolver := resolvers.NewRecordFieldResolver(api.app.Dao(), record.Collection(), requestInfo, true)
|
2022-07-06 23:19:05 +02:00
|
|
|
expr, err := search.FilterData(*accessRule).BuildExpr(resolver)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
resolver.UpdateQuery(q)
|
|
|
|
q.AndWhere(expr)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
foundRecord, err := api.app.Dao().FindRecordById(record.Collection().Id, record.Id, ruleFunc)
|
2022-07-06 23:19:05 +02:00
|
|
|
if err == nil && foundRecord != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type recordData struct {
|
|
|
|
Action string `json:"action"`
|
|
|
|
Record *models.Record `json:"record"`
|
|
|
|
}
|
|
|
|
|
2023-05-29 21:28:07 +02:00
|
|
|
func (api *realtimeApi) broadcastRecord(action string, record *models.Record, dryCache bool) error {
|
2022-07-06 23:19:05 +02:00
|
|
|
collection := record.Collection()
|
|
|
|
if collection == nil {
|
|
|
|
return errors.New("Record collection not set.")
|
|
|
|
}
|
|
|
|
|
|
|
|
clients := api.app.SubscriptionsBroker().Clients()
|
|
|
|
if len(clients) == 0 {
|
|
|
|
return nil // no subscribers
|
|
|
|
}
|
|
|
|
|
2023-01-25 22:39:42 +02:00
|
|
|
// create a clean record copy without expand and unknown fields
|
|
|
|
// because we don't know if the clients have permissions to view them
|
|
|
|
cleanRecord := record.CleanCopy()
|
2022-07-19 12:09:54 +02:00
|
|
|
|
2022-07-06 23:19:05 +02:00
|
|
|
subscriptionRuleMap := map[string]*string{
|
2022-07-19 12:09:54 +02:00
|
|
|
(collection.Name + "/" + cleanRecord.Id): collection.ViewRule,
|
|
|
|
(collection.Id + "/" + cleanRecord.Id): collection.ViewRule,
|
2022-11-08 12:57:50 +02:00
|
|
|
(collection.Name + "/*"): collection.ListRule,
|
|
|
|
(collection.Id + "/*"): collection.ListRule,
|
|
|
|
// @deprecated: the same as the wildcard topic but kept for backward compatibility
|
|
|
|
collection.Name: collection.ListRule,
|
|
|
|
collection.Id: collection.ListRule,
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2022-07-19 12:09:54 +02:00
|
|
|
data := &recordData{
|
2022-07-06 23:19:05 +02:00
|
|
|
Action: action,
|
2023-01-25 22:39:42 +02:00
|
|
|
Record: cleanRecord,
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2022-10-30 10:28:14 +02:00
|
|
|
dataBytes, err := json.Marshal(data)
|
2022-07-06 23:19:05 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range clients {
|
2023-01-18 15:41:33 +02:00
|
|
|
client := client
|
|
|
|
|
2022-07-06 23:19:05 +02:00
|
|
|
for subscription, rule := range subscriptionRuleMap {
|
|
|
|
if !client.HasSubscription(subscription) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-07-19 12:09:54 +02:00
|
|
|
if !api.canAccessRecord(client, data.Record, rule) {
|
2022-07-06 23:19:05 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
msg := subscriptions.Message{
|
|
|
|
Name: subscription,
|
2023-07-20 15:32:21 +02:00
|
|
|
Data: dataBytes,
|
2022-10-30 10:28:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// ignore the auth record email visibility checks for
|
|
|
|
// auth owner, admin or manager
|
|
|
|
if collection.IsAuth() {
|
|
|
|
authId := extractAuthIdFromGetter(client)
|
|
|
|
if authId == data.Record.Id ||
|
|
|
|
api.canAccessRecord(client, data.Record, collection.AuthOptions().ManageRule) {
|
|
|
|
data.Record.IgnoreEmailVisibility(true) // ignore
|
|
|
|
if newData, err := json.Marshal(data); err == nil {
|
2023-07-20 15:32:21 +02:00
|
|
|
msg.Data = newData
|
2022-10-30 10:28:14 +02:00
|
|
|
}
|
|
|
|
data.Record.IgnoreEmailVisibility(false) // restore
|
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
2023-05-29 21:28:07 +02:00
|
|
|
if dryCache {
|
|
|
|
client.Set(action+"/"+data.Record.Id, msg)
|
|
|
|
} else {
|
|
|
|
routine.FireAndForget(func() {
|
2023-07-20 15:32:21 +02:00
|
|
|
client.Send(msg)
|
2023-05-29 21:28:07 +02:00
|
|
|
})
|
|
|
|
}
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-05-29 21:28:07 +02:00
|
|
|
// broadcastDryCachedRecord broadcasts record if it is cached in the client context.
|
|
|
|
func (api *realtimeApi) broadcastDryCachedRecord(action string, record *models.Record) error {
|
|
|
|
clients := api.app.SubscriptionsBroker().Clients()
|
|
|
|
|
|
|
|
for _, client := range clients {
|
|
|
|
key := action + "/" + record.Id
|
|
|
|
|
|
|
|
msg, ok := client.Get(key).(subscriptions.Message)
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
client.Unset(key)
|
|
|
|
|
|
|
|
client := client
|
|
|
|
|
|
|
|
routine.FireAndForget(func() {
|
2023-07-20 15:32:21 +02:00
|
|
|
client.Send(msg)
|
2023-05-29 21:28:07 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-06 23:19:05 +02:00
|
|
|
type getter interface {
|
|
|
|
Get(string) any
|
|
|
|
}
|
|
|
|
|
|
|
|
func extractAuthIdFromGetter(val getter) string {
|
2022-10-30 10:28:14 +02:00
|
|
|
record, _ := val.Get(ContextAuthRecordKey).(*models.Record)
|
|
|
|
if record != nil {
|
|
|
|
return record.Id
|
2022-07-06 23:19:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
admin, _ := val.Get(ContextAdminKey).(*models.Admin)
|
|
|
|
if admin != nil {
|
|
|
|
return admin.Id
|
|
|
|
}
|
|
|
|
|
|
|
|
return ""
|
|
|
|
}
|