overleaf/services/web/app/src/Features/Project/ProjectController.js

1171 lines
36 KiB
JavaScript
Raw Normal View History

const _ = require('lodash')
const Path = require('path')
const OError = require('@overleaf/o-error')
const fs = require('fs')
const crypto = require('crypto')
const async = require('async')
const logger = require('@overleaf/logger')
const { ObjectId } = require('mongodb')
const ProjectDeleter = require('./ProjectDeleter')
const ProjectDuplicator = require('./ProjectDuplicator')
const ProjectCreationHandler = require('./ProjectCreationHandler')
const EditorController = require('../Editor/EditorController')
const ProjectHelper = require('./ProjectHelper')
const metrics = require('@overleaf/metrics')
const { User } = require('../../models/User')
const TagsHandler = require('../Tags/TagsHandler')
const SubscriptionLocator = require('../Subscription/SubscriptionLocator')
const NotificationsHandler = require('../Notifications/NotificationsHandler')
const LimitationsManager = require('../Subscription/LimitationsManager')
const Settings = require('@overleaf/settings')
const AuthorizationManager = require('../Authorization/AuthorizationManager')
const InactiveProjectManager = require('../InactiveData/InactiveProjectManager')
const ProjectUpdateHandler = require('./ProjectUpdateHandler')
const ProjectGetter = require('./ProjectGetter')
const PrivilegeLevels = require('../Authorization/PrivilegeLevels')
const SessionManager = require('../Authentication/SessionManager')
const Sources = require('../Authorization/Sources')
const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler')
const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter')
const ProjectEntityHandler = require('./ProjectEntityHandler')
const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher')
const UserGetter = require('../User/UserGetter')
const NotificationsBuilder = require('../Notifications/NotificationsBuilder')
const { V1ConnectionError } = require('../Errors/Errors')
const Features = require('../../infrastructure/Features')
const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler')
const UserController = require('../User/UserController')
const AnalyticsManager = require('../Analytics/AnalyticsManager')
const Modules = require('../../infrastructure/Modules')
const SplitTestV2Handler = require('../SplitTests/SplitTestV2Handler')
const { getNewLogsUIVariantForUser } = require('../Helpers/NewLogsUI')
const FeaturesUpdater = require('../Subscription/FeaturesUpdater')
const _ssoAvailable = (affiliation, session, linkedInstitutionIds) => {
if (!affiliation.institution) return false
// institution.confirmed is for the domain being confirmed, not the email
// Do not show SSO UI for unconfirmed domains
if (!affiliation.institution.confirmed) return false
// Could have multiple emails at the same institution, and if any are
// linked to the institution then do not show notification for others
if (
linkedInstitutionIds.indexOf(affiliation.institution.id.toString()) === -1
) {
if (affiliation.institution.ssoEnabled) return true
if (affiliation.institution.ssoBeta && session.samlBeta) return true
return false
}
return false
}
const ProjectController = {
_isInPercentageRollout(rolloutName, objectId, percentage) {
if (Settings.bypassPercentageRollouts === true) {
return true
}
const data = `${rolloutName}:${objectId.toString()}`
const md5hash = crypto.createHash('md5').update(data).digest('hex')
const counter = parseInt(md5hash.slice(26, 32), 16)
return counter % 100 < percentage
},
updateProjectSettings(req, res, next) {
const projectId = req.params.Project_id
const jobs = []
if (req.body.compiler != null) {
jobs.push(callback =>
EditorController.setCompiler(projectId, req.body.compiler, callback)
)
}
if (req.body.imageName != null) {
jobs.push(callback =>
EditorController.setImageName(projectId, req.body.imageName, callback)
)
}
if (req.body.name != null) {
jobs.push(callback =>
EditorController.renameProject(projectId, req.body.name, callback)
)
}
if (req.body.spellCheckLanguage != null) {
jobs.push(callback =>
EditorController.setSpellCheckLanguage(
projectId,
req.body.spellCheckLanguage,
callback
)
)
}
if (req.body.rootDocId != null) {
jobs.push(callback =>
EditorController.setRootDoc(projectId, req.body.rootDocId, callback)
)
}
async.series(jobs, error => {
if (error != null) {
return next(error)
}
res.sendStatus(204)
})
},
updateProjectAdminSettings(req, res, next) {
const projectId = req.params.Project_id
const jobs = []
if (req.body.publicAccessLevel != null) {
jobs.push(callback =>
EditorController.setPublicAccessLevel(
projectId,
req.body.publicAccessLevel,
callback
)
)
}
async.series(jobs, error => {
if (error != null) {
return next(error)
}
res.sendStatus(204)
})
},
deleteProject(req, res) {
const projectId = req.params.Project_id
const user = SessionManager.getSessionUser(req.session)
const cb = err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
}
ProjectDeleter.deleteProject(
projectId,
{ deleterUser: user, ipAddress: req.ip },
cb
)
},
archiveProject(req, res, next) {
const projectId = req.params.Project_id
const userId = SessionManager.getLoggedInUserId(req.session)
ProjectDeleter.archiveProject(projectId, userId, function (err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
unarchiveProject(req, res, next) {
const projectId = req.params.Project_id
const userId = SessionManager.getLoggedInUserId(req.session)
ProjectDeleter.unarchiveProject(projectId, userId, function (err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
trashProject(req, res, next) {
const projectId = req.params.project_id
const userId = SessionManager.getLoggedInUserId(req.session)
ProjectDeleter.trashProject(projectId, userId, function (err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
untrashProject(req, res, next) {
const projectId = req.params.project_id
const userId = SessionManager.getLoggedInUserId(req.session)
ProjectDeleter.untrashProject(projectId, userId, function (err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
expireDeletedProjectsAfterDuration(req, res) {
ProjectDeleter.expireDeletedProjectsAfterDuration(err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
})
},
expireDeletedProject(req, res, next) {
const { projectId } = req.params
ProjectDeleter.expireDeletedProject(projectId, err => {
if (err != null) {
next(err)
} else {
res.sendStatus(200)
}
})
},
restoreProject(req, res) {
const projectId = req.params.Project_id
ProjectDeleter.restoreProject(projectId, err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
})
},
cloneProject(req, res, next) {
res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete
metrics.inc('cloned-project')
const projectId = req.params.Project_id
const { projectName } = req.body
logger.log({ projectId, projectName }, 'cloning project')
if (!SessionManager.isUserLoggedIn(req.session)) {
return res.send({ redir: '/register' })
}
const currentUser = SessionManager.getSessionUser(req.session)
const { first_name: firstName, last_name: lastName, email } = currentUser
ProjectDuplicator.duplicate(
currentUser,
projectId,
projectName,
(err, project) => {
if (err != null) {
OError.tag(err, 'error cloning project', {
projectId,
userId: currentUser._id,
})
return next(err)
}
res.send({
name: project.name,
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: currentUser._id,
},
})
}
)
},
newProject(req, res, next) {
const currentUser = SessionManager.getSessionUser(req.session)
const {
first_name: firstName,
last_name: lastName,
email,
_id: userId,
} = currentUser
const projectName =
req.body.projectName != null ? req.body.projectName.trim() : undefined
const { template } = req.body
async.waterfall(
[
cb => {
if (template === 'example') {
ProjectCreationHandler.createExampleProject(userId, projectName, cb)
} else {
ProjectCreationHandler.createBasicProject(userId, projectName, cb)
}
},
],
(err, project) => {
if (err != null) {
return next(err)
}
res.send({
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: userId,
},
})
}
)
},
renameProject(req, res, next) {
const projectId = req.params.Project_id
const newName = req.body.newProjectName
EditorController.renameProject(projectId, newName, err => {
if (err != null) {
return next(err)
}
res.sendStatus(200)
})
},
userProjectsJson(req, res, next) {
const userId = SessionManager.getLoggedInUserId(req.session)
ProjectGetter.findAllUsersProjects(
userId,
'name lastUpdated publicAccesLevel archived trashed owner_ref tokens',
(err, projects) => {
if (err != null) {
return next(err)
}
// _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here
projects = ProjectController._buildProjectList(projects, userId)
.filter(p => !(p.archived || p.trashed))
.map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel }))
res.json({ projects })
}
)
},
projectEntitiesJson(req, res, next) {
const projectId = req.params.Project_id
ProjectGetter.getProject(projectId, (err, project) => {
if (err != null) {
return next(err)
}
ProjectEntityHandler.getAllEntitiesFromProject(
project,
(err, docs, files) => {
if (err != null) {
return next(err)
}
const entities = docs
.concat(files)
// Sort by path ascending
.sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0))
.map(e => ({
path: e.path,
type: e.doc != null ? 'doc' : 'file',
}))
res.json({ project_id: projectId, entities })
}
)
})
},
projectListPage(req, res, next) {
const timer = new metrics.Timer('project-list')
const userId = SessionManager.getLoggedInUserId(req.session)
const currentUser = SessionManager.getSessionUser(req.session)
async.parallel(
{
tags(cb) {
TagsHandler.getAllTags(userId, cb)
},
notifications(cb) {
NotificationsHandler.getUserNotifications(userId, cb)
},
projects(cb) {
ProjectGetter.findAllUsersProjects(
userId,
'name lastUpdated lastUpdatedBy publicAccesLevel archived trashed owner_ref tokens',
cb
)
},
hasSubscription(cb) {
LimitationsManager.hasPaidSubscription(
currentUser,
(error, hasPaidSubscription) => {
if (error != null && error instanceof V1ConnectionError) {
return cb(null, true)
}
cb(error, hasPaidSubscription)
}
)
},
user(cb) {
User.findById(
userId,
'emails featureSwitches overleaf awareOfV2 features lastLoginIp',
cb
)
},
userEmailsData(cb) {
const result = { list: [], allInReconfirmNotificationPeriods: [] }
UserGetter.getUserFullEmails(userId, (error, fullEmails) => {
if (error && error instanceof V1ConnectionError) {
return cb(null, result)
}
if (!Features.hasFeature('affiliations')) {
result.list = fullEmails
return cb(null, result)
}
Modules.hooks.fire(
'allInReconfirmNotificationPeriodsForUser',
fullEmails,
(error, results) => {
if (error != null) {
return cb(error)
}
// Module.hooks.fire accepts multiple methods
// and does async.series
const allInReconfirmNotificationPeriods =
(results && results[0]) || []
return cb(null, {
list: fullEmails,
allInReconfirmNotificationPeriods,
})
}
)
})
},
},
(err, results) => {
if (err != null) {
OError.tag(err, 'error getting data for project list page')
return next(err)
}
const { notifications, user, userEmailsData } = results
const userEmails = userEmailsData.list || []
const userAffiliations = userEmails
.filter(emailData => !!emailData.affiliation)
.map(emailData => {
const result = emailData.affiliation
result.email = emailData.email
return result
})
const { allInReconfirmNotificationPeriods } = userEmailsData
// Handle case of deleted user
if (user == null) {
UserController.logout(req, res, next)
return
}
const tags = results.tags
const notificationsInstitution = []
for (const notification of notifications) {
notification.html = req.i18n.translate(
notification.templateKey,
notification.messageOpts
)
}
// Institution SSO Notifications
let reconfirmedViaSAML
if (Features.hasFeature('saml')) {
reconfirmedViaSAML = _.get(req.session, ['saml', 'reconfirmed'])
const samlSession = req.session.saml
// Notification: SSO Available
const linkedInstitutionIds = []
user.emails.forEach(email => {
if (email.samlProviderId) {
linkedInstitutionIds.push(email.samlProviderId)
}
})
if (Array.isArray(userAffiliations)) {
userAffiliations.forEach(affiliation => {
if (
_ssoAvailable(affiliation, req.session, linkedInstitutionIds)
) {
notificationsInstitution.push({
email: affiliation.email,
institutionId: affiliation.institution.id,
institutionName: affiliation.institution.name,
templateKey: 'notification_institution_sso_available',
})
}
})
}
if (samlSession) {
// Notification: After SSO Linked
if (samlSession.linked) {
notificationsInstitution.push({
email: samlSession.institutionEmail,
institutionName: samlSession.linked.universityName,
templateKey: 'notification_institution_sso_linked',
})
}
// Notification: After SSO Linked or Logging in
// The requested email does not match primary email returned from
// the institution
if (
samlSession.requestedEmail &&
samlSession.emailNonCanonical &&
!samlSession.error
) {
notificationsInstitution.push({
institutionEmail: samlSession.emailNonCanonical,
requestedEmail: samlSession.requestedEmail,
templateKey: 'notification_institution_sso_non_canonical',
})
}
// Notification: Tried to register, but account already existed
// registerIntercept is set before the institution callback.
// institutionEmail is set after institution callback.
// Check for both in case SSO flow was abandoned
if (
samlSession.registerIntercept &&
samlSession.institutionEmail &&
!samlSession.error
) {
notificationsInstitution.push({
email: samlSession.institutionEmail,
templateKey: 'notification_institution_sso_already_registered',
})
}
// Notification: When there is a session error
if (samlSession.error) {
notificationsInstitution.push({
templateKey: 'notification_institution_sso_error',
error: samlSession.error,
})
}
}
delete req.session.saml
}
const portalTemplates = ProjectController._buildPortalTemplatesList(
userAffiliations
)
const projects = ProjectController._buildProjectList(
results.projects,
userId
)
// in v2 add notifications for matching university IPs
if (Settings.overleaf != null && req.ip !== user.lastLoginIp) {
NotificationsBuilder.ipMatcherAffiliation(user._id).create(
req.ip,
() => {}
)
}
ProjectController._injectProjectUsers(projects, (error, projects) => {
if (error != null) {
return next(error)
}
const viewModel = {
title: 'your_projects',
priority_title: true,
projects,
tags,
notifications: notifications || [],
notificationsInstitution,
allInReconfirmNotificationPeriods,
portalTemplates,
user,
userAffiliations,
userEmails,
hasSubscription: results.hasSubscription,
reconfirmedViaSAML,
zipFileSizeLimit: Settings.maxUploadSize,
isOverleaf: !!Settings.overleaf,
}
const paidUser =
(user.features != null ? user.features.github : undefined) &&
(user.features != null ? user.features.dropbox : undefined) // use a heuristic for paid account
const freeUserProportion = 0.1
const sampleFreeUser =
parseInt(user._id.toString().slice(-2), 16) <
freeUserProportion * 255
const showFrontWidget = paidUser || sampleFreeUser
if (showFrontWidget) {
viewModel.frontChatWidgetRoomId =
Settings.overleaf != null
? Settings.overleaf.front_chat_widget_room_id
: undefined
}
res.render('project/list', viewModel)
timer.done()
})
}
)
},
loadEditor(req, res, next) {
const timer = new metrics.Timer('load-editor')
if (!Settings.editorIsOpen) {
return res.render('general/closed', { title: 'updating_site' })
}
let anonymous, userId, sessionUser
if (SessionManager.isUserLoggedIn(req.session)) {
sessionUser = SessionManager.getSessionUser(req.session)
userId = SessionManager.getLoggedInUserId(req.session)
anonymous = false
} else {
sessionUser = null
anonymous = true
userId = null
}
const projectId = req.params.Project_id
async.auto(
{
project(cb) {
ProjectGetter.getProject(
projectId,
{
name: 1,
lastUpdated: 1,
track_changes: 1,
owner_ref: 1,
brandVariationId: 1,
overleaf: 1,
tokens: 1,
},
(err, project) => {
if (err != null) {
return cb(err)
}
cb(null, project)
}
)
},
user(cb) {
if (userId == null) {
cb(null, defaultSettingsForAnonymousUser(userId))
} else {
User.findById(
userId,
'email first_name last_name referal_id signUpDate featureSwitches features featuresEpoch refProviders alphaProgram betaProgram isAdmin ace',
(err, user) => {
// Handle case of deleted user
if (user == null) {
UserController.logout(req, res, next)
return
}
if (err) {
return cb(err)
}
logger.log({ projectId, userId }, 'got user')
if (FeaturesUpdater.featuresEpochIsCurrent(user)) {
return cb(null, user)
}
ProjectController._refreshFeatures(req, user, cb)
}
)
}
},
subscription(cb) {
if (userId == null) {
return cb()
}
SubscriptionLocator.getUsersSubscription(userId, cb)
},
activate(cb) {
InactiveProjectManager.reactivateProjectIfRequired(projectId, cb)
},
markAsOpened(cb) {
// don't need to wait for this to complete
ProjectUpdateHandler.markAsOpened(projectId, () => {})
cb()
},
isTokenMember(cb) {
if (userId == null) {
return cb()
}
CollaboratorsGetter.userIsTokenMember(userId, projectId, cb)
},
brandVariation: [
'project',
(cb, results) => {
if (
(results.project != null
? results.project.brandVariationId
: undefined) == null
) {
return cb()
}
BrandVariationsHandler.getBrandVariationById(
results.project.brandVariationId,
(error, brandVariationDetails) => cb(error, brandVariationDetails)
)
},
],
flushToTpds: cb => {
TpdsProjectFlusher.flushProjectToTpdsIfNeeded(projectId, cb)
},
sharingModalSplitTest(cb) {
SplitTestV2Handler.assignInLocalsContext(
res,
userId,
'project-share-modal-paywall',
err => {
cb(err, null)
}
)
},
},
(err, { project, user, subscription, isTokenMember, brandVariation }) => {
if (err != null) {
OError.tag(err, 'error getting details for project page')
return next(err)
}
const anonRequestToken = TokenAccessHandler.getRequestToken(
req,
projectId
)
const allowedImageNames = ProjectHelper.getAllowedImagesForUser(
sessionUser
)
AuthorizationManager.getPrivilegeLevelForProject(
userId,
projectId,
anonRequestToken,
(error, privilegeLevel) => {
let allowedFreeTrial = true
if (error != null) {
return next(error)
}
if (
privilegeLevel == null ||
privilegeLevel === PrivilegeLevels.NONE
) {
return res.sendStatus(401)
}
if (subscription != null) {
allowedFreeTrial = false
}
let wsUrl = Settings.wsUrl
let metricName = 'load-editor-ws'
if (user.betaProgram && Settings.wsUrlBeta !== undefined) {
wsUrl = Settings.wsUrlBeta
metricName += '-beta'
} else if (
Settings.wsUrlV2 &&
Settings.wsUrlV2Percentage > 0 &&
(ObjectId(projectId).getTimestamp() / 1000) % 100 <
Settings.wsUrlV2Percentage
) {
wsUrl = Settings.wsUrlV2
metricName += '-v2'
}
if (req.query && req.query.ws === 'fallback') {
// `?ws=fallback` will connect to the bare origin, and ignore
// the custom wsUrl. Hence it must load the client side
// javascript from there too.
// Not resetting it here would possibly load a socket.io v2
// client and connect to a v0 endpoint.
wsUrl = undefined
metricName += '-fallback'
}
metrics.inc(metricName)
if (userId) {
AnalyticsManager.recordEventForUser(userId, 'project-opened', {
projectId: project._id,
})
}
const logsUIVariant = getNewLogsUIVariantForUser(user)
function shouldDisplayFeature(name, variantFlag) {
if (req.query && req.query[name]) {
return req.query[name] === 'true'
} else {
return variantFlag === true
}
}
function partOfPdfCachingRollout(flag) {
if (!Settings.enablePdfCaching) {
// The feature is disabled globally.
return false
}
// Let the user opt-in only.
// The flag will opt-out of both caching and metrics collection,
// as if this editing session never happened.
return shouldDisplayFeature('enable_pdf_caching', false)
}
res.render('project/editor', {
title: project.name,
priority_title: true,
bodyClasses: ['editor'],
project_id: project._id,
user: {
id: userId,
email: user.email,
first_name: user.first_name,
last_name: user.last_name,
referal_id: user.referal_id,
signUpDate: user.signUpDate,
allowedFreeTrial: allowedFreeTrial,
featureSwitches: user.featureSwitches,
features: user.features,
refProviders: _.mapValues(user.refProviders, Boolean),
alphaProgram: user.alphaProgram,
betaProgram: user.betaProgram,
isAdmin: user.isAdmin,
},
userSettings: {
mode: user.ace.mode,
editorTheme: user.ace.theme,
fontSize: user.ace.fontSize,
autoComplete: user.ace.autoComplete,
autoPairDelimiters: user.ace.autoPairDelimiters,
pdfViewer: user.ace.pdfViewer,
syntaxValidation: user.ace.syntaxValidation,
fontFamily: user.ace.fontFamily || 'lucida',
lineHeight: user.ace.lineHeight || 'normal',
overallTheme: user.ace.overallTheme,
},
privilegeLevel,
anonymous,
anonymousAccessToken: anonymous ? anonRequestToken : null,
isTokenMember,
isRestrictedTokenMember: AuthorizationManager.isRestrictedUser(
userId,
privilegeLevel,
isTokenMember
),
languages: Settings.languages,
editorThemes: THEME_LIST,
maxDocLength: Settings.max_doc_length,
useV2History:
project.overleaf &&
project.overleaf.history &&
Boolean(project.overleaf.history.display),
brandVariation,
allowedImageNames,
gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl,
wsUrl,
showSupport: Features.hasFeature('support'),
showNewLogsUI: shouldDisplayFeature(
'new_logs_ui',
logsUIVariant.newLogsUI
),
logsUISubvariant: logsUIVariant.subvariant,
showNewNavigationUI: shouldDisplayFeature(
'new_navigation_ui',
true
),
showNewPdfPreview: shouldDisplayFeature(
'new_pdf_preview',
user.alphaProgram
),
showSymbolPalette: shouldDisplayFeature(
'symbol_palette',
user.alphaProgram || user.betaProgram
),
trackPdfDownload: partOfPdfCachingRollout('collect-metrics'),
enablePdfCaching: partOfPdfCachingRollout('enable-caching'),
resetServiceWorker:
Boolean(Settings.resetServiceWorker) &&
!shouldDisplayFeature('enable_pdf_caching', false),
})
timer.done()
}
)
}
)
},
_refreshFeatures(req, user, callback) {
// If the feature refresh has failed in this session, don't retry
// it - require the user to log in again.
if (req.session.feature_refresh_failed) {
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'skipped',
})
return callback(null, user)
}
// If the refresh takes too long then return the current
// features. Note that the user.features property may still be
// updated in the background after the callback is called.
callback = _.once(callback)
const refreshTimeoutHandler = setTimeout(() => {
req.session.feature_refresh_failed = { reason: 'timeout', at: new Date() }
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'timeout',
})
callback(null, user)
}, 5000)
// try to refresh user features now
const timer = new metrics.Timer('features-refresh-on-load-editor')
FeaturesUpdater.refreshFeatures(
user._id,
'load-editor',
(err, features) => {
clearTimeout(refreshTimeoutHandler)
timer.done()
if (err) {
// keep a record to prevent unneceary retries and leave
// the original features unmodified if the refresh failed
req.session.feature_refresh_failed = {
reason: 'error',
at: new Date(),
}
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'error',
})
} else {
user.features = features
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'success',
})
}
return callback(null, user)
}
)
},
_buildProjectList(allProjects, userId) {
let project
const {
owned,
readAndWrite,
readOnly,
tokenReadAndWrite,
tokenReadOnly,
} = allProjects
const projects = []
for (project of owned) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'owner',
Sources.OWNER,
userId
)
)
}
// Invite-access
for (project of readAndWrite) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readWrite',
Sources.INVITE,
userId
)
)
}
for (project of readOnly) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.INVITE,
userId
)
)
}
// Token-access
// Only add these projects if they're not already present, this gives us cascading access
// from 'owner' => 'token-read-only'
for (project of tokenReadAndWrite) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readAndWrite',
Sources.TOKEN,
userId
)
)
}
}
for (project of tokenReadOnly) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.TOKEN,
userId
)
)
}
}
return projects
},
_buildProjectViewModel(project, accessLevel, source, userId) {
const archived = ProjectHelper.isArchived(project, userId)
// If a project is simultaneously trashed and archived, we will consider it archived but not trashed.
const trashed = ProjectHelper.isTrashed(project, userId) && !archived
TokenAccessHandler.protectTokens(project, accessLevel)
const model = {
id: project._id,
name: project.name,
lastUpdated: project.lastUpdated,
lastUpdatedBy: project.lastUpdatedBy,
publicAccessLevel: project.publicAccesLevel,
accessLevel,
source,
archived,
trashed,
owner_ref: project.owner_ref,
isV1Project: false,
}
if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) {
model.owner_ref = null
model.lastUpdatedBy = null
}
return model
},
_injectProjectUsers(projects, callback) {
const users = {}
for (const project of projects) {
if (project.owner_ref != null) {
users[project.owner_ref.toString()] = true
}
if (project.lastUpdatedBy != null) {
users[project.lastUpdatedBy.toString()] = true
}
}
const userIds = Object.keys(users)
async.eachSeries(
userIds,
(userId, cb) => {
UserGetter.getUser(
userId,
{ first_name: 1, last_name: 1, email: 1 },
(error, user) => {
if (error != null) {
return cb(error)
}
users[userId] = user
cb()
}
)
},
error => {
if (error != null) {
return callback(error)
}
for (const project of projects) {
if (project.owner_ref != null) {
project.owner = users[project.owner_ref.toString()]
}
if (project.lastUpdatedBy != null) {
project.lastUpdatedBy =
users[project.lastUpdatedBy.toString()] || null
}
}
callback(null, projects)
}
)
},
_buildPortalTemplatesList(affiliations) {
if (affiliations == null) {
affiliations = []
}
const portalTemplates = []
for (const aff of affiliations) {
if (
aff.portal &&
aff.portal.slug &&
aff.portal.templates_count &&
aff.portal.templates_count > 0
) {
const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/'
portalTemplates.push({
name: aff.institution.name,
url: Settings.siteUrl + portalPath + aff.portal.slug,
})
}
}
return portalTemplates
},
}
const defaultSettingsForAnonymousUser = userId => ({
id: userId,
ace: {
mode: 'none',
theme: 'textmate',
fontSize: '12',
autoComplete: true,
spellCheckLanguage: '',
pdfViewer: '',
syntaxValidation: true,
},
subscription: {
freeTrial: {
allowed: true,
},
},
featureSwitches: {
github: false,
},
alphaProgram: false,
betaProgram: false,
})
const THEME_LIST = []
function generateThemeList() {
const files = fs.readdirSync(
Path.join(__dirname, '/../../../../node_modules/ace-builds/src-noconflict')
)
const result = []
for (const file of files) {
if (file.slice(-2) === 'js' && /^theme-/.test(file)) {
const cleanName = file.slice(0, -3).slice(6)
result.push(THEME_LIST.push(cleanName))
} else {
result.push(undefined)
}
}
}
generateThemeList()
module.exports = ProjectController