Stef Gootzen
33686c6db8
feat: add afterOperation hook ( #2697 )
...
* feat: add afterOperation hook for Find operation
* docs: change #afterOperation to #afteroperation
* chore: extract afterOperation in function
* chore: implement afterChange in operations
* docs: use proper CollectionAfterOperationHook
* chore: remove outdated info
* chore: types afterOperation hook
* chore: improves afterOperation tests
* docs: updates description of afterOperation hook
* chore: improve typings
* chore: improve types
* chore: rename index.tsx => index.ts
---------
Co-authored-by: Jacob Fletcher <jacobsfletch@gmail.com >
Co-authored-by: Alessio Gravili <alessio@gravili.de >
2023-08-15 14:37:01 +02:00
Dan Ribbens
c6e0908076
feat: recursive saveToJWT field support ( #3130 )
2023-08-08 12:38:44 -04:00
Dan Ribbens
356f174b9f
feat: set JWT token field name with saveToJWT ( #3126 )
2023-08-04 13:22:05 -04:00
Alessio Gravili
6a189c6548
fix: wrong links in verification and forgot password emails if serverURL not set ( #3010 )
2023-08-04 11:30:09 -04:00
Alessio Gravili
67ba131cc6
feat: ability to add context to payload's request object ( #2796 )
...
Co-authored-by: Dan Ribbens <dan.ribbens@gmail.com >
2023-07-26 09:07:49 -04:00
Jarrod Flesch
641c765fb9
feat: solidifies bundler adapter pattern ( #3044 )
2023-07-21 17:20:51 -04:00
Jacob Fletcher
2fc03f196e
feat: returns queried user alongside refreshed token ( #2813 )
...
Co-authored-by: Dan Ribbens <dan.ribbens@gmail.com >
2023-07-17 09:35:34 -04:00
Jarrod Flesch
584d865d34
chore: improves error messaging for not found collections ( #2982 )
2023-07-07 11:56:14 -04:00
Jarrod Flesch
5b79067cc1
fix: ensures fields within blocks respect field level access control ( #2969 )
2023-07-05 14:41:39 -04:00
James
f84b4323e2
fix : #2937 , depth not being respected in graphql rich text fields
2023-06-29 20:08:39 -04:00
Jessica Boezwinkle
9fbd7476fb
chore: improves error messaging in unlock/reset/forgot-password
2023-06-26 18:39:46 +01:00
James
85d2467d73
fix : #2831 , persists payloadAPI through local operations that accept req
2023-06-19 15:57:04 -04:00
Alessio Gravili
abe38520aa
fix: user can be created without having to specify an email - #2801
2023-06-12 17:35:06 +02:00
Jarrod Flesch
46a5f41721
fix: sanitize reset password result - #2805 ( #2808 )
2023-06-12 11:23:24 -04:00
James Mikrut
03b1ee0896
chore: remove passport local mongoose ( #2713 )
2023-06-06 10:07:47 -04:00
Jarrod Flesch
f978299868
fix: graphql where types on rows and collapsible's ( #2758 )
...
Co-authored-by: Kári Yngvason <kari@hugsmidjan.is >
Co-authored-by: NikolaGanchev <62907292+NikolaGanchev@users.noreply.github.com >
Co-authored-by: James <james@trbl.design >
2023-06-02 13:50:19 -04:00
James
2d0441a72e
chore: begins work to build queries from fields instead of mongoose schema
2023-04-14 15:52:38 -04:00
James
72a8b1eebe
fix : #2384 , preserves manually set verified from admin UI
2023-03-27 15:39:01 -04:00
Elliot DeNolf
5ac436e184
fix: properly set req.payload on forgotPassword in local API ( #2194 )
2023-02-27 14:31:25 -05:00
James
15b6bb3d75
fix : #2148 , adds queryHiddenFields property to find operation
2023-02-20 21:15:06 -05:00
James
753de21b12
chore: improves reset password / verification workflow
2023-02-19 22:11:28 -05:00
James
3eb85b1554
fix : #2131 , doesn't log in unverified user after resetting password
2023-02-19 22:06:39 -05:00
Daniel Söderling
79d047e64f
fix: sizes property optional on upload ( #2066 )
...
* omit 'sizes' when uploading files from the inferred collection type
* cleanup
* optional sizes on create and update, instead of omitted
2023-02-19 21:02:37 -05:00
James
eb98810cef
chore: ensures generated types can extend TypeWithID
2023-01-31 17:45:10 -05:00
James
c0a942aa4a
chore: finishes typing local API
2023-01-17 16:46:18 -05:00
James
66dac29ee6
chore: merges versions simplification
2023-01-17 15:44:11 -05:00
James
dc0f8deb06
chore: prefers TypeWithID over Record<string, unknown>
2023-01-17 10:53:50 -05:00
James
0af29ff4db
chore: dynamically uses generated types via tsconfig paths
2023-01-15 12:22:16 -05:00
Jessica Boezwinkle
b847d85e60
feat: throws descriptive error when collection or global slug not found
2023-01-12 13:12:46 +00:00
James
d3d367c635
feat: isolates local api to local-only functions, converts it to ts generic for stronger typing
2023-01-11 17:03:10 -05:00
Dan Ribbens
5b70ebd119
fix: use the slug for authentication header API Key
...
BREAKING CHANGE: replaced the useAPIKey authentication header format to use the collection slug instead of the collection label. Previous: `${collection.labels.singular} API-Key ${apiKey}`, updated: `${collection.slug} API-Key ${apiKey}`
2022-12-19 11:02:40 -05:00
Jarrod Flesch
eda6f70acb
Roadmap/#1379 admin ui doc level access ( #1624 )
...
* feat: adds document level access endpoints so admin ui can now accurately reflect document level access control
* chore(docs): new doc access callout, updates useDocumentInfo props from change
2022-12-14 16:14:29 -05:00
James
b6ec4bd2d4
chore: binds prefs model even if not local
2022-12-05 10:25:36 -05:00
Dan Ribbens
bab34d82f5
feat: add i18n to admin panel ( #1326 )
...
Co-authored-by: shikhantmaungs <shinkhantmaungs@gmail.com >
Co-authored-by: Thomas Ghysels <info@thomasg.be >
Co-authored-by: Kokutse Djoguenou <kokutse@Kokutses-MacBook-Pro.local >
Co-authored-by: Christian Gil <47041342+ChrisGV04@users.noreply.github.com >
Co-authored-by: Łukasz Rabiec <lukaszrabiec@gmail.com >
Co-authored-by: Jenny <jennifer.eberlei@gmail.com >
Co-authored-by: Hung Vu <hunghvu2017@gmail.com >
Co-authored-by: Shin Khant Maung <101539335+shinkhantmaungs@users.noreply.github.com >
Co-authored-by: Carlo Brualdi <carlo.brualdi@gmail.com >
Co-authored-by: Ariel Tonglet <ariel.tonglet@gmail.com >
Co-authored-by: Roman Ryzhikov <general+github@ya.ru >
Co-authored-by: maekoya <maekoya@stromatolite.jp >
Co-authored-by: Emilia Trollros <3m1l1a@emiliatrollros.se >
Co-authored-by: Kokutse J Djoguenou <90865585+Julesdj@users.noreply.github.com >
Co-authored-by: Mitch Dries <mitch.dries@gmail.com >
BREAKING CHANGE: If you assigned labels to collections, globals or block names, you need to update your config! Your GraphQL schema and generated Typescript interfaces may have changed. Payload no longer uses labels for code based naming. To prevent breaking changes to your GraphQL API and typescript types in your project, you can assign the below properties to match what Payload previously generated for you from labels.
On Collections
Use `graphQL.singularName`, `graphQL.pluralName` for GraphQL schema names.
Use `typescript.interface` for typescript generation name.
On Globals
Use `graphQL.name` for GraphQL Schema name.
Use `typescript.interface` for typescript generation name.
On Blocks (within Block fields)
Use `graphQL.singularName` for graphQL schema names.
2022-11-18 07:36:30 -05:00
James
2f684040fc
fix : #1361 , ensures collection auth depth works while retrieving static assets
2022-11-12 15:44:24 -05:00
Nick Borko
cfef68f364
fix: fixed GraphQL Access query resolver to return the correct data ( #1339 )
2022-11-11 04:25:46 -08:00
Daniel Söderling
09d793926d
feat: added beforeLogin hook ( #1289 )
2022-10-24 12:05:12 -04:00
Jacob Fletcher
1cfce87549
feat: async admin access control
2022-10-06 13:16:15 -04:00
Dan Ribbens
22ea98ca33
fix: field level access for nested fields
2022-09-22 21:37:02 -04:00
James
c8b37f40cb
fix: incorrect auth strategy type
2022-09-09 20:03:49 -07:00
dsod
bc97d3d6f2
Keep original request and add properties to it, instead of copy
2022-08-20 01:33:29 +02:00
James
e9b3f3f060
fix : #884
2022-08-04 14:03:23 -04:00
James Mikrut
bd4dd45f8e
Merge pull request #819 from payloadcms/feat/dataloader
...
feat: greatly enhances performance by using dataloader pattern to batch populations
2022-07-27 11:36:28 -04:00
Jarrod Flesch
d5e88cc1a9
fix: accesses payload config correctly in gql refresh resolver
2022-07-27 09:17:07 -04:00
James
a8a21e119b
chore: better naming conventions within local api
2022-07-26 12:58:02 -04:00
James
c5bcd1e341
feat: greatly enhances performance by using dataloader pattern to batch populations
2022-07-25 15:12:28 -04:00
Vincent Van Dijck
8feed39fb9
fix: trim trailing whitespaces of email in login
2022-07-24 23:08:35 +02:00
James
e1c35b5220
chore: further documents strategies
2022-07-21 16:42:40 -07:00
Luciano Greiner
3b4d5afd41
fix: avoid assuming Email will be present on JWT token. Using ID instead as email might not be in if using disableLocalStrategy ( #789 )
2022-07-21 15:20:23 -07:00
Luciano Greiner
3a3026cd63
feat: pass payload and names to custom auth strategies ( #781 )
2022-07-21 18:18:26 -04:00