2025-01-09 06:31:07 -08:00
import type { SourceControlledFile } from '@n8n/api-types' ;
2025-01-10 07:10:19 -08:00
import { Service } from '@n8n/di' ;
2024-09-12 09:07:18 -07:00
// eslint-disable-next-line n8n-local-rules/misplaced-n8n-typeorm-import
import { In } from '@n8n/typeorm' ;
import glob from 'fast-glob' ;
2024-12-23 04:46:13 -08:00
import { Credentials , ErrorReporter , InstanceSettings , Logger } from 'n8n-core' ;
2024-12-11 06:36:17 -08:00
import { ApplicationError , jsonParse , ensureError } from 'n8n-workflow' ;
2024-09-17 00:15:09 -07:00
import { readFile as fsReadFile } from 'node:fs/promises' ;
2023-06-20 10:13:18 -07:00
import path from 'path' ;
2024-09-12 09:07:18 -07:00
import { ActiveWorkflowManager } from '@/active-workflow-manager' ;
import type { Project } from '@/databases/entities/project' ;
import { SharedCredentials } from '@/databases/entities/shared-credentials' ;
import type { TagEntity } from '@/databases/entities/tag-entity' ;
import type { Variables } from '@/databases/entities/variables' ;
import type { WorkflowTagMapping } from '@/databases/entities/workflow-tag-mapping' ;
import { CredentialsRepository } from '@/databases/repositories/credentials.repository' ;
import { ProjectRepository } from '@/databases/repositories/project.repository' ;
import { SharedCredentialsRepository } from '@/databases/repositories/shared-credentials.repository' ;
import { SharedWorkflowRepository } from '@/databases/repositories/shared-workflow.repository' ;
import { TagRepository } from '@/databases/repositories/tag.repository' ;
import { UserRepository } from '@/databases/repositories/user.repository' ;
import { VariablesRepository } from '@/databases/repositories/variables.repository' ;
import { WorkflowTagMappingRepository } from '@/databases/repositories/workflow-tag-mapping.repository' ;
import { WorkflowRepository } from '@/databases/repositories/workflow.repository' ;
import type { IWorkflowToImport } from '@/interfaces' ;
import { isUniqueConstraintError } from '@/response-helper' ;
import { assertNever } from '@/utils' ;
2023-06-20 10:13:18 -07:00
import {
SOURCE_CONTROL_CREDENTIAL_EXPORT_FOLDER ,
SOURCE_CONTROL_GIT_FOLDER ,
SOURCE_CONTROL_TAGS_EXPORT_FILE ,
SOURCE_CONTROL_VARIABLES_EXPORT_FILE ,
SOURCE_CONTROL_WORKFLOW_EXPORT_FOLDER ,
} from './constants' ;
2024-09-12 09:07:18 -07:00
import { getCredentialExportPath , getWorkflowExportPath } from './source-control-helper.ee' ;
2024-08-26 02:10:06 -07:00
import type { ExportableCredential } from './types/exportable-credential' ;
2024-09-12 09:07:18 -07:00
import type { ResourceOwner } from './types/resource-owner' ;
2024-08-26 02:10:06 -07:00
import type { SourceControlWorkflowVersionId } from './types/source-control-workflow-version-id' ;
2023-11-27 04:17:09 -08:00
import { VariablesService } from '../variables/variables.service.ee' ;
2023-06-20 10:13:18 -07:00
@Service ( )
export class SourceControlImportService {
private gitFolder : string ;
private workflowExportFolder : string ;
private credentialExportFolder : string ;
2023-08-02 05:51:09 -07:00
constructor (
2023-10-25 07:35:22 -07:00
private readonly logger : Logger ,
2024-12-11 06:36:17 -08:00
private readonly errorReporter : ErrorReporter ,
2023-08-02 05:51:09 -07:00
private readonly variablesService : VariablesService ,
2024-05-06 08:54:05 -07:00
private readonly activeWorkflowManager : ActiveWorkflowManager ,
2025-01-10 07:10:19 -08:00
private readonly credentialsRepository : CredentialsRepository ,
private readonly projectRepository : ProjectRepository ,
2023-08-08 05:08:56 -07:00
private readonly tagRepository : TagRepository ,
2025-01-10 07:10:19 -08:00
private readonly sharedWorkflowRepository : SharedWorkflowRepository ,
private readonly sharedCredentialsRepository : SharedCredentialsRepository ,
private readonly userRepository : UserRepository ,
private readonly variablesRepository : VariablesRepository ,
private readonly workflowRepository : WorkflowRepository ,
private readonly workflowTagMappingRepository : WorkflowTagMappingRepository ,
2023-10-23 04:39:35 -07:00
instanceSettings : InstanceSettings ,
2023-08-02 05:51:09 -07:00
) {
2023-10-23 04:39:35 -07:00
this . gitFolder = path . join ( instanceSettings . n8nFolder , SOURCE_CONTROL_GIT_FOLDER ) ;
2023-06-20 10:13:18 -07:00
this . workflowExportFolder = path . join ( this . gitFolder , SOURCE_CONTROL_WORKFLOW_EXPORT_FOLDER ) ;
this . credentialExportFolder = path . join (
this . gitFolder ,
SOURCE_CONTROL_CREDENTIAL_EXPORT_FOLDER ,
) ;
}
2024-12-20 02:44:01 -08:00
async getRemoteVersionIdsFromFiles ( ) : Promise < SourceControlWorkflowVersionId [ ] > {
2023-07-26 00:25:01 -07:00
const remoteWorkflowFiles = await glob ( '*.json' , {
cwd : this.workflowExportFolder ,
absolute : true ,
} ) ;
const remoteWorkflowFilesParsed = await Promise . all (
remoteWorkflowFiles . map ( async ( file ) = > {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Parsing workflow file ${ file } ` ) ;
2023-07-26 00:25:01 -07:00
const remote = jsonParse < IWorkflowToImport > ( await fsReadFile ( file , { encoding : 'utf8' } ) ) ;
if ( ! remote ? . id ) {
return undefined ;
}
return {
id : remote.id ,
versionId : remote.versionId ,
name : remote.name ,
remoteId : remote.id ,
filename : getWorkflowExportPath ( remote . id , this . workflowExportFolder ) ,
} as SourceControlWorkflowVersionId ;
} ) ,
) ;
return remoteWorkflowFilesParsed . filter (
2024-06-24 08:49:59 -07:00
( e ) : e is SourceControlWorkflowVersionId = > e !== undefined ,
) ;
2023-07-26 00:25:01 -07:00
}
2024-12-20 02:44:01 -08:00
async getLocalVersionIdsFromDb ( ) : Promise < SourceControlWorkflowVersionId [ ] > {
2025-01-10 07:10:19 -08:00
const localWorkflows = await this . workflowRepository . find ( {
2023-07-26 00:25:01 -07:00
select : [ 'id' , 'name' , 'versionId' , 'updatedAt' ] ,
} ) ;
2024-01-31 05:25:03 -08:00
return localWorkflows . map ( ( local ) = > {
let updatedAt : Date ;
if ( local . updatedAt instanceof Date ) {
updatedAt = local . updatedAt ;
} else {
2024-12-11 06:36:17 -08:00
this . errorReporter . warn ( 'updatedAt is not a Date' , {
2024-01-31 05:25:03 -08:00
extra : {
type : typeof local . updatedAt ,
value : local.updatedAt ,
} ,
} ) ;
updatedAt = isNaN ( Date . parse ( local . updatedAt ) ) ? new Date ( ) : new Date ( local . updatedAt ) ;
}
return {
id : local.id ,
versionId : local.versionId ,
name : local.name ,
localId : local.id ,
filename : getWorkflowExportPath ( local . id , this . workflowExportFolder ) ,
updatedAt : updatedAt.toISOString ( ) ,
} ;
} ) as SourceControlWorkflowVersionId [ ] ;
2023-07-26 00:25:01 -07:00
}
2024-12-20 02:44:01 -08:00
async getRemoteCredentialsFromFiles ( ) : Promise <
2023-07-26 00:25:01 -07:00
Array < ExportableCredential & { filename : string } >
> {
const remoteCredentialFiles = await glob ( '*.json' , {
cwd : this.credentialExportFolder ,
absolute : true ,
} ) ;
const remoteCredentialFilesParsed = await Promise . all (
remoteCredentialFiles . map ( async ( file ) = > {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Parsing credential file ${ file } ` ) ;
2023-07-26 00:25:01 -07:00
const remote = jsonParse < ExportableCredential > (
await fsReadFile ( file , { encoding : 'utf8' } ) ,
) ;
if ( ! remote ? . id ) {
return undefined ;
}
return {
. . . remote ,
filename : getCredentialExportPath ( remote . id , this . credentialExportFolder ) ,
} ;
} ) ,
) ;
return remoteCredentialFilesParsed . filter ( ( e ) = > e !== undefined ) as Array <
ExportableCredential & { filename : string }
> ;
}
2024-12-20 02:44:01 -08:00
async getLocalCredentialsFromDb ( ) : Promise < Array < ExportableCredential & { filename : string } > > {
2025-01-10 07:10:19 -08:00
const localCredentials = await this . credentialsRepository . find ( {
2024-04-05 04:17:34 -07:00
select : [ 'id' , 'name' , 'type' ] ,
2023-07-26 00:25:01 -07:00
} ) ;
return localCredentials . map ( ( local ) = > ( {
id : local.id ,
name : local.name ,
type : local . type ,
filename : getCredentialExportPath ( local . id , this . credentialExportFolder ) ,
} ) ) as Array < ExportableCredential & { filename : string } > ;
}
2024-12-20 02:44:01 -08:00
async getRemoteVariablesFromFile ( ) : Promise < Variables [ ] > {
2023-06-20 10:13:18 -07:00
const variablesFile = await glob ( SOURCE_CONTROL_VARIABLES_EXPORT_FILE , {
cwd : this.gitFolder ,
absolute : true ,
} ) ;
if ( variablesFile . length > 0 ) {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Importing variables from file ${ variablesFile [ 0 ] } ` ) ;
2023-07-26 00:25:01 -07:00
return jsonParse < Variables [ ] > ( await fsReadFile ( variablesFile [ 0 ] , { encoding : 'utf8' } ) , {
fallbackValue : [ ] ,
} ) ;
2023-06-20 10:13:18 -07:00
}
2023-07-26 00:25:01 -07:00
return [ ] ;
}
2024-12-20 02:44:01 -08:00
async getLocalVariablesFromDb ( ) : Promise < Variables [ ] > {
2024-01-17 07:08:50 -08:00
return await this . variablesService . getAllCached ( ) ;
2023-06-20 10:13:18 -07:00
}
2024-12-20 02:44:01 -08:00
async getRemoteTagsAndMappingsFromFile ( ) : Promise < {
2023-07-26 00:25:01 -07:00
tags : TagEntity [ ] ;
mappings : WorkflowTagMapping [ ] ;
} > {
2023-06-20 10:13:18 -07:00
const tagsFile = await glob ( SOURCE_CONTROL_TAGS_EXPORT_FILE , {
cwd : this.gitFolder ,
absolute : true ,
} ) ;
if ( tagsFile . length > 0 ) {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Importing tags from file ${ tagsFile [ 0 ] } ` ) ;
2023-06-20 10:13:18 -07:00
const mappedTags = jsonParse < { tags : TagEntity [ ] ; mappings : WorkflowTagMapping [ ] } > (
await fsReadFile ( tagsFile [ 0 ] , { encoding : 'utf8' } ) ,
{ fallbackValue : { tags : [ ] , mappings : [ ] } } ,
) ;
return mappedTags ;
}
return { tags : [ ] , mappings : [ ] } ;
}
2024-12-20 02:44:01 -08:00
async getLocalTagsAndMappingsFromDb ( ) : Promise < {
2023-07-26 00:25:01 -07:00
tags : TagEntity [ ] ;
mappings : WorkflowTagMapping [ ] ;
} > {
2023-08-08 05:08:56 -07:00
const localTags = await this . tagRepository . find ( {
2023-07-26 00:25:01 -07:00
select : [ 'id' , 'name' ] ,
2023-06-20 10:13:18 -07:00
} ) ;
2025-01-10 07:10:19 -08:00
const localMappings = await this . workflowTagMappingRepository . find ( {
2023-07-26 00:25:01 -07:00
select : [ 'workflowId' , 'tagId' ] ,
2023-06-20 10:13:18 -07:00
} ) ;
2023-07-26 00:25:01 -07:00
return { tags : localTags , mappings : localMappings } ;
}
2023-06-20 10:13:18 -07:00
2024-12-20 02:44:01 -08:00
async importWorkflowFromWorkFolder ( candidates : SourceControlledFile [ ] , userId : string ) {
2025-01-10 07:10:19 -08:00
const personalProject = await this . projectRepository . getPersonalProjectForUserOrFail ( userId ) ;
2024-05-17 01:53:15 -07:00
const workflowManager = this . activeWorkflowManager ;
2023-07-26 00:25:01 -07:00
const candidateIds = candidates . map ( ( c ) = > c . id ) ;
2025-01-10 07:10:19 -08:00
const existingWorkflows = await this . workflowRepository . findByIds ( candidateIds , {
2024-01-05 04:06:24 -08:00
fields : [ 'id' , 'name' , 'versionId' , 'active' ] ,
2023-06-28 02:06:40 -07:00
} ) ;
2025-01-10 07:10:19 -08:00
const allSharedWorkflows = await this . sharedWorkflowRepository . findWithFields ( candidateIds , {
select : [ 'workflowId' , 'role' , 'projectId' ] ,
} ) ;
2024-05-17 01:53:15 -07:00
const importWorkflowsResult = [ ] ;
// Due to SQLite concurrency issues, we cannot save all workflows at once
// as project creation might cause constraint issues.
// We must iterate over the array and run the whole process workflow by workflow
for ( const candidate of candidates ) {
this . logger . debug ( ` Parsing workflow file ${ candidate . file } ` ) ;
const importedWorkflow = jsonParse < IWorkflowToImport & { owner : string } > (
await fsReadFile ( candidate . file , { encoding : 'utf8' } ) ,
) ;
if ( ! importedWorkflow ? . id ) {
continue ;
}
const existingWorkflow = existingWorkflows . find ( ( e ) = > e . id === importedWorkflow . id ) ;
importedWorkflow . active = existingWorkflow ? . active ? ? false ;
this . logger . debug ( ` Updating workflow id ${ importedWorkflow . id ? ? 'new' } ` ) ;
2025-01-10 07:10:19 -08:00
const upsertResult = await this . workflowRepository . upsert ( { . . . importedWorkflow } , [ 'id' ] ) ;
2024-05-17 01:53:15 -07:00
if ( upsertResult ? . identifiers ? . length !== 1 ) {
throw new ApplicationError ( 'Failed to upsert workflow' , {
extra : { workflowId : importedWorkflow.id ? ? 'new' } ,
} ) ;
}
2023-07-26 00:25:01 -07:00
2024-05-17 01:53:15 -07:00
const isOwnedLocally = allSharedWorkflows . some (
( w ) = > w . workflowId === importedWorkflow . id && w . role === 'workflow:owner' ,
) ;
if ( ! isOwnedLocally ) {
const remoteOwnerProject : Project | null = importedWorkflow . owner
? await this . findOrCreateOwnerProject ( importedWorkflow . owner )
: null ;
2025-01-10 07:10:19 -08:00
await this . sharedWorkflowRepository . upsert (
2024-05-17 01:53:15 -07:00
{
2023-06-28 02:06:40 -07:00
workflowId : importedWorkflow.id ,
2024-05-17 01:53:15 -07:00
projectId : remoteOwnerProject?.id ? ? personalProject . id ,
2024-01-24 04:38:57 -08:00
role : 'workflow:owner' ,
2024-05-17 01:53:15 -07:00
} ,
[ 'workflowId' , 'projectId' ] ,
) ;
}
if ( existingWorkflow ? . active ) {
try {
// remove active pre-import workflow
this . logger . debug ( ` Deactivating workflow id ${ existingWorkflow . id } ` ) ;
await workflowManager . remove ( existingWorkflow . id ) ;
// try activating the imported workflow
this . logger . debug ( ` Reactivating workflow id ${ existingWorkflow . id } ` ) ;
await workflowManager . add ( existingWorkflow . id , 'activate' ) ;
// update the versionId of the workflow to match the imported workflow
2024-10-09 03:56:31 -07:00
} catch ( e ) {
const error = ensureError ( e ) ;
this . logger . error ( ` Failed to activate workflow ${ existingWorkflow . id } ` , { error } ) ;
2024-05-17 01:53:15 -07:00
} finally {
2025-01-10 07:10:19 -08:00
await this . workflowRepository . update (
2024-05-17 01:53:15 -07:00
{ id : existingWorkflow.id } ,
{ versionId : importedWorkflow.versionId } ,
2023-06-20 10:13:18 -07:00
) ;
2023-06-28 02:06:40 -07:00
}
2024-05-17 01:53:15 -07:00
}
2023-06-20 10:13:18 -07:00
2024-05-17 01:53:15 -07:00
importWorkflowsResult . push ( {
id : importedWorkflow.id ? ? 'unknown' ,
name : candidate.file ,
} ) ;
}
2023-06-28 02:06:40 -07:00
return importWorkflowsResult . filter ( ( e ) = > e !== undefined ) as Array < {
id : string ;
name : string ;
} > ;
2023-06-20 10:13:18 -07:00
}
2024-12-20 02:44:01 -08:00
async importCredentialsFromWorkFolder ( candidates : SourceControlledFile [ ] , userId : string ) {
2025-01-10 07:10:19 -08:00
const personalProject = await this . projectRepository . getPersonalProjectForUserOrFail ( userId ) ;
2023-07-26 00:25:01 -07:00
const candidateIds = candidates . map ( ( c ) = > c . id ) ;
2025-01-10 07:10:19 -08:00
const existingCredentials = await this . credentialsRepository . find ( {
2023-07-26 00:25:01 -07:00
where : {
id : In ( candidateIds ) ,
} ,
select : [ 'id' , 'name' , 'type' , 'data' ] ,
} ) ;
2025-01-10 07:10:19 -08:00
const existingSharedCredentials = await this . sharedCredentialsRepository . find ( {
2024-05-17 01:53:15 -07:00
select : [ 'credentialsId' , 'role' ] ,
2023-07-26 00:25:01 -07:00
where : {
credentialsId : In ( candidateIds ) ,
2024-01-24 04:38:57 -08:00
role : 'credential:owner' ,
2023-07-26 00:25:01 -07:00
} ,
} ) ;
let importCredentialsResult : Array < { id : string ; name : string ; type : string } > = [ ] ;
importCredentialsResult = await Promise . all (
candidates . map ( async ( candidate ) = > {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Importing credentials file ${ candidate . file } ` ) ;
2023-07-26 00:25:01 -07:00
const credential = jsonParse < ExportableCredential > (
await fsReadFile ( candidate . file , { encoding : 'utf8' } ) ,
) ;
const existingCredential = existingCredentials . find (
( e ) = > e . id === credential . id && e . type === credential . type ,
) ;
2024-04-05 04:17:34 -07:00
const { name , type , data , id } = credential ;
const newCredentialObject = new Credentials ( { id , name } , type ) ;
2023-07-26 00:25:01 -07:00
if ( existingCredential ? . data ) {
newCredentialObject . data = existingCredential . data ;
} else {
2024-08-06 01:56:02 -07:00
/ * *
* Edge case : Do not import ` oauthTokenData ` , so that that the
* pulling instance reconnects instead of trying to use stubbed values .
* /
const { oauthTokenData , . . . rest } = data ;
newCredentialObject . setData ( rest ) ;
2023-07-26 00:25:01 -07:00
}
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Updating credential id ${ newCredentialObject . id as string } ` ) ;
2025-01-10 07:10:19 -08:00
await this . credentialsRepository . upsert ( newCredentialObject , [ 'id' ] ) ;
2023-07-26 00:25:01 -07:00
2024-03-26 09:18:41 -07:00
const isOwnedLocally = existingSharedCredentials . some (
2024-05-17 01:53:15 -07:00
( c ) = > c . credentialsId === credential . id && c . role === 'credential:owner' ,
2024-03-26 09:18:41 -07:00
) ;
if ( ! isOwnedLocally ) {
2024-05-17 01:53:15 -07:00
const remoteOwnerProject : Project | null = credential . ownedBy
? await this . findOrCreateOwnerProject ( credential . ownedBy )
2024-03-26 09:18:41 -07:00
: null ;
2023-07-26 00:25:01 -07:00
const newSharedCredential = new SharedCredentials ( ) ;
newSharedCredential . credentialsId = newCredentialObject . id as string ;
2024-05-17 01:53:15 -07:00
newSharedCredential . projectId = remoteOwnerProject ? . id ? ? personalProject . id ;
2024-01-24 04:38:57 -08:00
newSharedCredential . role = 'credential:owner' ;
2023-07-26 00:25:01 -07:00
2025-01-10 07:10:19 -08:00
await this . sharedCredentialsRepository . upsert ( { . . . newSharedCredential } , [
2023-07-26 00:25:01 -07:00
'credentialsId' ,
2024-05-17 01:53:15 -07:00
'projectId' ,
2023-07-26 00:25:01 -07:00
] ) ;
}
return {
id : newCredentialObject.id as string ,
name : newCredentialObject.name ,
type : newCredentialObject . type ,
} ;
} ) ,
) ;
return importCredentialsResult . filter ( ( e ) = > e !== undefined ) ;
}
2024-12-20 02:44:01 -08:00
async importTagsFromWorkFolder ( candidate : SourceControlledFile ) {
2023-07-26 00:25:01 -07:00
let mappedTags ;
try {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Importing tags from file ${ candidate . file } ` ) ;
2023-07-26 00:25:01 -07:00
mappedTags = jsonParse < { tags : TagEntity [ ] ; mappings : WorkflowTagMapping [ ] } > (
await fsReadFile ( candidate . file , { encoding : 'utf8' } ) ,
{ fallbackValue : { tags : [ ] , mappings : [ ] } } ,
) ;
2024-10-09 03:56:31 -07:00
} catch ( e ) {
const error = ensureError ( e ) ;
this . logger . error ( ` Failed to import tags from file ${ candidate . file } ` , { error } ) ;
2023-07-26 00:25:01 -07:00
return ;
}
if ( mappedTags . mappings . length === 0 && mappedTags . tags . length === 0 ) {
return ;
}
const existingWorkflowIds = new Set (
(
2025-01-10 07:10:19 -08:00
await this . workflowRepository . find ( {
2023-07-26 00:25:01 -07:00
select : [ 'id' ] ,
} )
) . map ( ( e ) = > e . id ) ,
) ;
await Promise . all (
mappedTags . tags . map ( async ( tag ) = > {
2023-08-08 05:08:56 -07:00
const findByName = await this . tagRepository . findOne ( {
2023-07-26 00:25:01 -07:00
where : { name : tag.name } ,
select : [ 'id' ] ,
} ) ;
if ( findByName && findByName . id !== tag . id ) {
2023-11-29 03:25:10 -08:00
throw new ApplicationError (
2023-07-26 00:25:01 -07:00
` A tag with the name <strong> ${ tag . name } </strong> already exists locally.<br />Please either rename the local tag, or the remote one with the id <strong> ${ tag . id } </strong> in the tags.json file. ` ,
) ;
}
2023-08-22 03:24:43 -07:00
const tagCopy = this . tagRepository . create ( tag ) ;
await this . tagRepository . upsert ( tagCopy , {
skipUpdateIfNoValuesChanged : true ,
conflictPaths : { id : true } ,
} ) ;
2023-07-26 00:25:01 -07:00
} ) ,
) ;
await Promise . all (
mappedTags . mappings . map ( async ( mapping ) = > {
if ( ! existingWorkflowIds . has ( String ( mapping . workflowId ) ) ) return ;
2025-01-10 07:10:19 -08:00
await this . workflowTagMappingRepository . upsert (
2023-07-26 00:25:01 -07:00
{ tagId : String ( mapping . tagId ) , workflowId : String ( mapping . workflowId ) } ,
{
skipUpdateIfNoValuesChanged : true ,
conflictPaths : { tagId : true , workflowId : true } ,
} ,
) ;
} ) ,
) ;
return mappedTags ;
}
2024-12-20 02:44:01 -08:00
async importVariablesFromWorkFolder (
2023-07-26 00:25:01 -07:00
candidate : SourceControlledFile ,
valueOverrides ? : {
[ key : string ] : string ;
} ,
) {
const result : { imported : string [ ] } = { imported : [ ] } ;
let importedVariables ;
2023-06-20 10:13:18 -07:00
try {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Importing variables from file ${ candidate . file } ` ) ;
2023-07-26 00:25:01 -07:00
importedVariables = jsonParse < Array < Partial < Variables > >> (
await fsReadFile ( candidate . file , { encoding : 'utf8' } ) ,
{ fallbackValue : [ ] } ,
) ;
2024-10-09 03:56:31 -07:00
} catch ( e ) {
this . logger . error ( ` Failed to import tags from file ${ candidate . file } ` , { error : e } ) ;
2023-07-26 00:25:01 -07:00
return ;
}
const overriddenKeys = Object . keys ( valueOverrides ? ? { } ) ;
for ( const variable of importedVariables ) {
if ( ! variable . key ) {
continue ;
}
2024-05-17 01:53:15 -07:00
// by default no value is stored remotely, so an empty string is returned
2023-07-26 00:25:01 -07:00
// it must be changed to undefined so as to not overwrite existing values!
if ( variable . value === '' ) {
variable . value = undefined ;
}
if ( overriddenKeys . includes ( variable . key ) && valueOverrides ) {
variable . value = valueOverrides [ variable . key ] ;
overriddenKeys . splice ( overriddenKeys . indexOf ( variable . key ) , 1 ) ;
}
try {
2025-01-10 07:10:19 -08:00
await this . variablesRepository . upsert ( { . . . variable } , [ 'id' ] ) ;
2023-07-26 00:25:01 -07:00
} catch ( errorUpsert ) {
if ( isUniqueConstraintError ( errorUpsert as Error ) ) {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Variable ${ variable . key } already exists, updating instead ` ) ;
2023-07-26 00:25:01 -07:00
try {
2025-01-10 07:10:19 -08:00
await this . variablesRepository . update ( { key : variable.key } , { . . . variable } ) ;
2023-07-26 00:25:01 -07:00
} catch ( errorUpdate ) {
2023-10-25 07:35:22 -07:00
this . logger . debug ( ` Failed to update variable ${ variable . key } , skipping ` ) ;
this . logger . debug ( ( errorUpdate as Error ) . message ) ;
2023-07-26 00:25:01 -07:00
}
}
} finally {
result . imported . push ( variable . key ) ;
}
2023-06-20 10:13:18 -07:00
}
2023-07-26 00:25:01 -07:00
// add remaining overrides as new variables
if ( overriddenKeys . length > 0 && valueOverrides ) {
for ( const key of overriddenKeys ) {
result . imported . push ( key ) ;
2025-01-10 07:10:19 -08:00
const newVariable = this . variablesRepository . create ( {
2023-11-10 06:04:26 -08:00
key ,
value : valueOverrides [ key ] ,
} ) ;
2025-01-10 07:10:19 -08:00
await this . variablesRepository . save ( newVariable , { transaction : false } ) ;
2023-07-26 00:25:01 -07:00
}
}
2023-08-02 05:51:09 -07:00
await this . variablesService . updateCache ( ) ;
2023-07-26 00:25:01 -07:00
return result ;
2023-06-20 10:13:18 -07:00
}
2024-05-17 01:53:15 -07:00
private async findOrCreateOwnerProject ( owner : ResourceOwner ) : Promise < Project | null > {
if ( typeof owner === 'string' || owner . type === 'personal' ) {
const email = typeof owner === 'string' ? owner : owner.personalEmail ;
2025-01-10 07:10:19 -08:00
const user = await this . userRepository . findOne ( {
2024-05-17 01:53:15 -07:00
where : { email } ,
} ) ;
if ( ! user ) {
return null ;
}
2025-01-10 07:10:19 -08:00
return await this . projectRepository . getPersonalProjectForUserOrFail ( user . id ) ;
2024-05-17 01:53:15 -07:00
} else if ( owner . type === 'team' ) {
2025-01-10 07:10:19 -08:00
let teamProject = await this . projectRepository . findOne ( {
2024-05-17 01:53:15 -07:00
where : { id : owner.teamId } ,
} ) ;
if ( ! teamProject ) {
try {
2025-01-10 07:10:19 -08:00
teamProject = await this . projectRepository . save (
this . projectRepository . create ( {
2024-05-17 01:53:15 -07:00
id : owner.teamId ,
name : owner.teamName ,
type : 'team' ,
} ) ,
) ;
} catch ( e ) {
2025-01-10 07:10:19 -08:00
teamProject = await this . projectRepository . findOne ( {
2024-05-17 01:53:15 -07:00
where : { id : owner.teamId } ,
} ) ;
if ( ! teamProject ) {
throw e ;
}
}
}
return teamProject ;
}
assertNever ( owner ) ;
const errorOwner = owner as ResourceOwner ;
throw new ApplicationError (
` Unknown resource owner type " ${
typeof errorOwner !== 'string' ? errorOwner . type : 'UNKNOWN'
} " found when importing from source controller ` ,
) ;
}
2023-06-20 10:13:18 -07:00
}