overleaf/services/web/app/src/router.js

1264 lines
39 KiB
JavaScript
Raw Normal View History

const AdminController = require('./Features/ServerAdmin/AdminController')
const ErrorController = require('./Features/Errors/ErrorController')
const ProjectController = require('./Features/Project/ProjectController')
const ProjectApiController = require('./Features/Project/ProjectApiController')
const SpellingController = require('./Features/Spelling/SpellingController')
const EditorRouter = require('./Features/Editor/EditorRouter')
const Settings = require('@overleaf/settings')
const TpdsController = require('./Features/ThirdPartyDataStore/TpdsController')
const SubscriptionRouter = require('./Features/Subscription/SubscriptionRouter')
const UploadsRouter = require('./Features/Uploads/UploadsRouter')
const metrics = require('@overleaf/metrics')
const ReferalController = require('./Features/Referal/ReferalController')
const AuthenticationController = require('./Features/Authentication/AuthenticationController')
const SessionManager = require('./Features/Authentication/SessionManager')
const TagsController = require('./Features/Tags/TagsController')
const NotificationsController = require('./Features/Notifications/NotificationsController')
const CollaboratorsRouter = require('./Features/Collaborators/CollaboratorsRouter')
const UserInfoController = require('./Features/User/UserInfoController')
const UserController = require('./Features/User/UserController')
const UserEmailsController = require('./Features/User/UserEmailsController')
const UserPagesController = require('./Features/User/UserPagesController')
const DocumentController = require('./Features/Documents/DocumentController')
const CompileManager = require('./Features/Compile/CompileManager')
const CompileController = require('./Features/Compile/CompileController')
const ClsiCookieManager = require('./Features/Compile/ClsiCookieManager')(
Settings.apis.clsi != null ? Settings.apis.clsi.backendGroupName : undefined
)
const HealthCheckController = require('./Features/HealthCheck/HealthCheckController')
const ProjectDownloadsController = require('./Features/Downloads/ProjectDownloadsController')
const FileStoreController = require('./Features/FileStore/FileStoreController')
const HistoryController = require('./Features/History/HistoryController')
const ExportsController = require('./Features/Exports/ExportsController')
const PasswordResetRouter = require('./Features/PasswordReset/PasswordResetRouter')
const StaticPagesRouter = require('./Features/StaticPages/StaticPagesRouter')
const ChatController = require('./Features/Chat/ChatController')
const Modules = require('./infrastructure/Modules')
const RateLimiterMiddleware = require('./Features/Security/RateLimiterMiddleware')
const InactiveProjectController = require('./Features/InactiveData/InactiveProjectController')
const ContactRouter = require('./Features/Contacts/ContactRouter')
const ReferencesController = require('./Features/References/ReferencesController')
const AuthorizationMiddleware = require('./Features/Authorization/AuthorizationMiddleware')
const BetaProgramController = require('./Features/BetaProgram/BetaProgramController')
const AnalyticsRouter = require('./Features/Analytics/AnalyticsRouter')
const MetaController = require('./Features/Metadata/MetaController')
const TokenAccessController = require('./Features/TokenAccess/TokenAccessController')
const Features = require('./infrastructure/Features')
const LinkedFilesRouter = require('./Features/LinkedFiles/LinkedFilesRouter')
const TemplatesRouter = require('./Features/Templates/TemplatesRouter')
const InstitutionsController = require('./Features/Institutions/InstitutionsController')
const UserMembershipRouter = require('./Features/UserMembership/UserMembershipRouter')
const SystemMessageController = require('./Features/SystemMessages/SystemMessageController')
const AnalyticsRegistrationSourceMiddleware = require('./Features/Analytics/AnalyticsRegistrationSourceMiddleware')
const AnalyticsUTMTrackingMiddleware = require('./Features/Analytics/AnalyticsUTMTrackingMiddleware')
const SplitTestMiddleware = require('./Features/SplitTests/SplitTestMiddleware')
const CaptchaMiddleware = require('./Features/Captcha/CaptchaMiddleware')
const { Joi, validate } = require('./infrastructure/Validation')
const {
renderUnsupportedBrowserPage,
unsupportedBrowserMiddleware,
} = require('./infrastructure/UnsupportedBrowserMiddleware')
const logger = require('@overleaf/logger')
const _ = require('underscore')
const { expressify } = require('./util/promises')
const { plainTextResponse } = require('./infrastructure/Response')
module.exports = { initialize }
function initialize(webRouter, privateApiRouter, publicApiRouter) {
webRouter.use(unsupportedBrowserMiddleware)
if (!Settings.allowPublicAccess) {
webRouter.all('*', AuthenticationController.requireGlobalLogin)
}
webRouter.get('*', AnalyticsRegistrationSourceMiddleware.setInbound())
webRouter.get('*', AnalyticsUTMTrackingMiddleware.recordUTMTags())
webRouter.get(
'*',
expressify(
SplitTestMiddleware.loadAssignmentsInLocals(['unified-navigation'])
)
)
// Mount onto /login in order to get the deviceHistory cookie.
webRouter.post(
'/login/can-skip-captcha',
// Keep in sync with the overleaf-login options.
RateLimiterMiddleware.rateLimit({
endpointName: 'can-skip-captcha',
maxRequests: 20,
timeInterval: 60,
}),
CaptchaMiddleware.canSkipCaptcha
)
webRouter.get('/login', UserPagesController.loginPage)
AuthenticationController.addEndpointToLoginWhitelist('/login')
webRouter.post(
'/login',
CaptchaMiddleware.validateCaptcha('login'),
AuthenticationController.passportLogin
)
if (Settings.enableLegacyLogin) {
AuthenticationController.addEndpointToLoginWhitelist('/login/legacy')
webRouter.get('/login/legacy', UserPagesController.loginPage)
webRouter.post(
'/login/legacy',
CaptchaMiddleware.validateCaptcha('login'),
AuthenticationController.passportLogin
)
}
webRouter.get(
'/read-only/one-time-login',
UserPagesController.oneTimeLoginPage
)
AuthenticationController.addEndpointToLoginWhitelist(
'/read-only/one-time-login'
)
webRouter.get('/logout', UserPagesController.logoutPage)
webRouter.post('/logout', UserController.logout)
webRouter.get('/restricted', AuthorizationMiddleware.restricted)
if (Features.hasFeature('registration-page')) {
webRouter.get('/register', UserPagesController.registerPage)
AuthenticationController.addEndpointToLoginWhitelist('/register')
}
EditorRouter.apply(webRouter, privateApiRouter)
CollaboratorsRouter.apply(webRouter, privateApiRouter)
SubscriptionRouter.apply(webRouter, privateApiRouter, publicApiRouter)
UploadsRouter.apply(webRouter, privateApiRouter)
PasswordResetRouter.apply(webRouter, privateApiRouter)
StaticPagesRouter.apply(webRouter, privateApiRouter)
ContactRouter.apply(webRouter, privateApiRouter)
AnalyticsRouter.apply(webRouter, privateApiRouter, publicApiRouter)
LinkedFilesRouter.apply(webRouter, privateApiRouter, publicApiRouter)
TemplatesRouter.apply(webRouter)
UserMembershipRouter.apply(webRouter)
Modules.applyRouter(webRouter, privateApiRouter, publicApiRouter)
if (Settings.enableSubscriptions) {
webRouter.get(
'/user/bonus',
AuthenticationController.requireLogin(),
ReferalController.bonus
)
}
// .getMessages will generate an empty response for anonymous users.
webRouter.get('/system/messages', SystemMessageController.getMessages)
webRouter.get(
'/user/settings',
AuthenticationController.requireLogin(),
UserPagesController.settingsPage
)
webRouter.post(
'/user/settings',
AuthenticationController.requireLogin(),
UserController.updateUserSettings
)
webRouter.post(
'/user/password/update',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'change-password',
maxRequests: 10,
timeInterval: 60,
}),
UserController.changePassword
)
webRouter.get(
'/user/emails',
AuthenticationController.requireLogin(),
UserController.promises.ensureAffiliationMiddleware,
UserEmailsController.list
)
webRouter.get('/user/emails/confirm', UserEmailsController.showConfirm)
webRouter.post(
'/user/emails/confirm',
RateLimiterMiddleware.rateLimit({
endpointName: 'confirm-email',
maxRequests: 10,
timeInterval: 60,
}),
UserEmailsController.confirm
)
webRouter.post(
'/user/emails/resend_confirmation',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'resend-confirmation',
maxRequests: 10,
timeInterval: 60,
}),
UserEmailsController.resendConfirmation
)
webRouter.get(
'/user/emails/primary-email-check',
AuthenticationController.requireLogin(),
UserEmailsController.primaryEmailCheckPage
)
webRouter.post(
'/user/emails/primary-email-check',
AuthenticationController.requireLogin(),
UserEmailsController.primaryEmailCheck
)
if (Features.hasFeature('affiliations')) {
webRouter.post(
'/user/emails',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'add-email',
maxRequests: 10,
timeInterval: 60,
}),
UserEmailsController.add
)
webRouter.post(
'/user/emails/delete',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'delete-email',
maxRequests: 10,
timeInterval: 60,
}),
UserEmailsController.remove
)
webRouter.post(
'/user/emails/default',
AuthenticationController.requireLogin(),
UserEmailsController.setDefault
)
webRouter.post(
'/user/emails/endorse',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'endorse-email',
maxRequests: 30,
timeInterval: 60,
}),
UserEmailsController.endorse
)
}
webRouter.get(
'/user/sessions',
AuthenticationController.requireLogin(),
UserPagesController.sessionsPage
)
webRouter.post(
'/user/sessions/clear',
AuthenticationController.requireLogin(),
UserController.clearSessions
)
webRouter.delete(
'/user/newsletter/unsubscribe',
AuthenticationController.requireLogin(),
UserController.unsubscribe
)
webRouter.post(
'/user/delete',
RateLimiterMiddleware.rateLimit({
endpointName: 'delete-user',
maxRequests: 10,
timeInterval: 60,
}),
AuthenticationController.requireLogin(),
UserController.tryDeleteUser
)
webRouter.get(
'/user/personal_info',
AuthenticationController.requireLogin(),
UserInfoController.getLoggedInUsersPersonalInfo
)
privateApiRouter.get(
'/user/:user_id/personal_info',
AuthenticationController.requirePrivateApiAuth(),
UserInfoController.getPersonalInfo
)
webRouter.get(
'/user/reconfirm',
UserPagesController.renderReconfirmAccountPage
)
// for /user/reconfirm POST, see password router
webRouter.get(
'/user/tpds/queues',
AuthenticationController.requireLogin(),
TpdsController.getQueues
)
webRouter.get(
'/user/projects',
AuthenticationController.requireLogin(),
ProjectController.userProjectsJson
)
webRouter.get(
'/project/:Project_id/entities',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.projectEntitiesJson
)
webRouter.get(
'/project',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'open-dashboard',
maxRequests: 30,
timeInterval: 60,
}),
ProjectController.projectListPage
)
webRouter.post(
'/project/new',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'create-project',
maxRequests: 20,
timeInterval: 60,
}),
ProjectController.newProject
)
for (const route of [
// Keep the old route for continuous metrics
'/Project/:Project_id',
// New route for pdf-detach
'/Project/:Project_id/:detachRole(detacher|detached)',
]) {
webRouter.get(
route,
RateLimiterMiddleware.rateLimit({
endpointName: 'open-project',
params: ['Project_id'],
maxRequests: 15,
timeInterval: 60,
}),
AuthenticationController.validateUserSession(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.loadEditor
)
}
webRouter.head(
'/Project/:Project_id/file/:File_id',
AuthorizationMiddleware.ensureUserCanReadProject,
FileStoreController.getFileHead
)
webRouter.get(
'/Project/:Project_id/file/:File_id',
AuthorizationMiddleware.ensureUserCanReadProject,
FileStoreController.getFile
)
webRouter.post(
'/project/:Project_id/settings',
validate({ body: Joi.object() }),
AuthorizationMiddleware.ensureUserCanWriteProjectSettings,
ProjectController.updateProjectSettings
)
webRouter.post(
'/project/:Project_id/settings/admin',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanAdminProject,
ProjectController.updateProjectAdminSettings
)
webRouter.post(
'/project/:Project_id/compile',
RateLimiterMiddleware.rateLimit({
endpointName: 'compile-project-http',
params: ['Project_id'],
maxRequests: 800,
timeInterval: 60 * 60,
}),
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.compile
)
webRouter.post(
'/project/:Project_id/compile/stop',
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.stopCompile
)
// LEGACY: Used by the web download buttons, adds filename header, TODO: remove at some future date
webRouter.get(
'/project/:Project_id/output/output.pdf',
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.downloadPdf
)
// PDF Download button
webRouter.get(
/^\/download\/project\/([^/]*)\/output\/output\.pdf$/,
function (req, res, next) {
const params = { Project_id: req.params[0] }
req.params = params
next()
},
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.downloadPdf
)
// PDF Download button for specific build
webRouter.get(
/^\/download\/project\/([^/]*)\/build\/([0-9a-f-]+)\/output\/output\.pdf$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
build_id: req.params[1],
}
req.params = params
next()
},
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.downloadPdf
)
// Align with limits defined in CompileController.downloadPdf
const rateLimiterMiddlewareOutputFiles = RateLimiterMiddleware.rateLimit({
endpointName: 'misc-output-download',
params: ['Project_id'],
maxRequests: 1000,
timeInterval: 60 * 60,
})
// Used by the pdf viewers
webRouter.get(
/^\/project\/([^/]*)\/output\/(.*)$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
file: req.params[1],
}
req.params = params
next()
},
rateLimiterMiddlewareOutputFiles,
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.getFileFromClsi
)
// direct url access to output files for a specific build (query string not required)
webRouter.get(
/^\/project\/([^/]*)\/build\/([0-9a-f-]+)\/output\/(.*)$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
build_id: req.params[1],
file: req.params[2],
}
req.params = params
next()
},
rateLimiterMiddlewareOutputFiles,
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.getFileFromClsi
)
// direct url access to output files for user but no build, to retrieve files when build fails
webRouter.get(
/^\/project\/([^/]*)\/user\/([0-9a-f-]+)\/output\/(.*)$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
user_id: req.params[1],
file: req.params[2],
}
req.params = params
next()
},
rateLimiterMiddlewareOutputFiles,
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.getFileFromClsi
)
// direct url access to output files for a specific user and build (query string not required)
webRouter.get(
/^\/project\/([^/]*)\/user\/([0-9a-f]+)\/build\/([0-9a-f-]+)\/output\/(.*)$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
user_id: req.params[1],
build_id: req.params[2],
file: req.params[3],
}
req.params = params
next()
},
rateLimiterMiddlewareOutputFiles,
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.getFileFromClsi
)
webRouter.delete(
'/project/:Project_id/output',
validate({ query: { clsiserverid: Joi.string() } }),
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.deleteAuxFiles
)
webRouter.get(
'/project/:Project_id/sync/code',
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.proxySyncCode
)
webRouter.get(
'/project/:Project_id/sync/pdf',
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.proxySyncPdf
)
webRouter.get(
'/project/:Project_id/wordcount',
validate({ query: { clsiserverid: Joi.string() } }),
AuthorizationMiddleware.ensureUserCanReadProject,
CompileController.wordCount
)
webRouter.post(
'/Project/:Project_id/archive',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.archiveProject
)
webRouter.delete(
'/Project/:Project_id/archive',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.unarchiveProject
)
webRouter.post(
'/project/:project_id/trash',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.trashProject
)
webRouter.delete(
'/project/:project_id/trash',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.untrashProject
)
webRouter.delete(
'/Project/:Project_id',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanAdminProject,
ProjectController.deleteProject
)
webRouter.post(
'/Project/:Project_id/restore',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanAdminProject,
ProjectController.restoreProject
)
webRouter.post(
'/Project/:Project_id/clone',
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectController.cloneProject
)
webRouter.post(
'/project/:Project_id/rename',
AuthenticationController.requireLogin(),
AuthorizationMiddleware.ensureUserCanAdminProject,
ProjectController.renameProject
)
webRouter.get(
'/project/:Project_id/updates',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.selectHistoryApi,
HistoryController.proxyToHistoryApiAndInjectUserDetails
)
webRouter.get(
'/project/:Project_id/doc/:doc_id/diff',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.selectHistoryApi,
HistoryController.proxyToHistoryApi
)
webRouter.get(
'/project/:Project_id/diff',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.selectHistoryApi,
HistoryController.proxyToHistoryApiAndInjectUserDetails
)
webRouter.get(
'/project/:Project_id/filetree/diff',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.selectHistoryApi,
HistoryController.proxyToHistoryApi
)
webRouter.post(
'/project/:Project_id/doc/:doc_id/version/:version_id/restore',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
HistoryController.selectHistoryApi,
HistoryController.proxyToHistoryApi
)
webRouter.post(
'/project/:project_id/doc/:doc_id/restore',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
HistoryController.restoreDocFromDeletedDoc
)
webRouter.post(
'/project/:project_id/restore_file',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
HistoryController.restoreFileFromV2
)
webRouter.get(
'/project/:project_id/version/:version/zip',
RateLimiterMiddleware.rateLimit({
endpointName: 'download-project-revision',
maxRequests: 30,
timeInterval: 60 * 60,
}),
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.downloadZipOfVersion
)
privateApiRouter.post(
'/project/:Project_id/history/resync',
AuthenticationController.requirePrivateApiAuth(),
HistoryController.resyncProjectHistory
)
webRouter.get(
'/project/:Project_id/labels',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
HistoryController.selectHistoryApi,
HistoryController.ensureProjectHistoryEnabled,
HistoryController.getLabels
)
webRouter.post(
'/project/:Project_id/labels',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
HistoryController.selectHistoryApi,
HistoryController.ensureProjectHistoryEnabled,
HistoryController.createLabel
)
webRouter.delete(
'/project/:Project_id/labels/:label_id',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
HistoryController.selectHistoryApi,
HistoryController.ensureProjectHistoryEnabled,
HistoryController.deleteLabel
)
webRouter.post(
'/project/:project_id/export/:brand_variation_id',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
ExportsController.exportProject
)
webRouter.get(
'/project/:project_id/export/:export_id',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
ExportsController.exportStatus
)
webRouter.get(
'/project/:project_id/export/:export_id/:type',
AuthorizationMiddleware.ensureUserCanWriteProjectContent,
ExportsController.exportDownload
)
webRouter.get(
'/Project/:Project_id/download/zip',
RateLimiterMiddleware.rateLimit({
endpointName: 'zip-download',
params: ['Project_id'],
maxRequests: 10,
timeInterval: 60,
}),
AuthorizationMiddleware.ensureUserCanReadProject,
ProjectDownloadsController.downloadProject
)
webRouter.get(
'/project/download/zip',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'multiple-projects-zip-download',
maxRequests: 10,
timeInterval: 60,
}),
AuthorizationMiddleware.ensureUserCanReadMultipleProjects,
ProjectDownloadsController.downloadMultipleProjects
)
webRouter.get(
'/project/:project_id/metadata',
AuthorizationMiddleware.ensureUserCanReadProject,
Settings.allowAnonymousReadAndWriteSharing
? (req, res, next) => {
next()
}
: AuthenticationController.requireLogin(),
MetaController.getMetadata
)
webRouter.post(
'/project/:project_id/doc/:doc_id/metadata',
AuthorizationMiddleware.ensureUserCanReadProject,
Settings.allowAnonymousReadAndWriteSharing
? (req, res, next) => {
next()
}
: AuthenticationController.requireLogin(),
MetaController.broadcastMetadataForDoc
)
privateApiRouter.post(
'/internal/expire-deleted-projects-after-duration',
AuthenticationController.requirePrivateApiAuth(),
ProjectController.expireDeletedProjectsAfterDuration
)
privateApiRouter.post(
'/internal/expire-deleted-users-after-duration',
AuthenticationController.requirePrivateApiAuth(),
UserController.expireDeletedUsersAfterDuration
)
privateApiRouter.post(
'/internal/project/:projectId/expire-deleted-project',
AuthenticationController.requirePrivateApiAuth(),
ProjectController.expireDeletedProject
)
privateApiRouter.post(
'/internal/users/:userId/expire',
AuthenticationController.requirePrivateApiAuth(),
UserController.expireDeletedUser
)
privateApiRouter.get(
'/user/:userId/tag',
AuthenticationController.requirePrivateApiAuth(),
TagsController.apiGetAllTags
)
webRouter.get(
'/tag',
AuthenticationController.requireLogin(),
TagsController.getAllTags
)
webRouter.post(
'/tag',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'create-tag',
maxRequests: 30,
timeInterval: 60,
}),
TagsController.createTag
)
webRouter.post(
'/tag/:tagId/rename',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'rename-tag',
maxRequests: 30,
timeInterval: 60,
}),
TagsController.renameTag
)
webRouter.delete(
'/tag/:tagId',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'delete-tag',
maxRequests: 30,
timeInterval: 60,
}),
TagsController.deleteTag
)
webRouter.post(
'/tag/:tagId/project/:projectId',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'add-project-to-tag',
maxRequests: 30,
timeInterval: 60,
}),
TagsController.addProjectToTag
)
webRouter.delete(
'/tag/:tagId/project/:projectId',
AuthenticationController.requireLogin(),
RateLimiterMiddleware.rateLimit({
endpointName: 'remove-project-from-tag',
maxRequests: 30,
timeInterval: 60,
}),
TagsController.removeProjectFromTag
)
webRouter.get(
'/notifications',
AuthenticationController.requireLogin(),
NotificationsController.getAllUnreadNotifications
)
webRouter.delete(
'/notifications/:notificationId',
AuthenticationController.requireLogin(),
NotificationsController.markNotificationAsRead
)
// Deprecated in favour of /internal/project/:project_id but still used by versioning
privateApiRouter.get(
'/project/:project_id/details',
AuthenticationController.requirePrivateApiAuth(),
ProjectApiController.getProjectDetails
)
// New 'stable' /internal API end points
privateApiRouter.get(
'/internal/project/:project_id',
AuthenticationController.requirePrivateApiAuth(),
ProjectApiController.getProjectDetails
)
privateApiRouter.get(
'/internal/project/:Project_id/zip',
AuthenticationController.requirePrivateApiAuth(),
ProjectDownloadsController.downloadProject
)
privateApiRouter.get(
'/internal/project/:project_id/compile/pdf',
AuthenticationController.requirePrivateApiAuth(),
CompileController.compileAndDownloadPdf
)
privateApiRouter.post(
'/internal/deactivateOldProjects',
AuthenticationController.requirePrivateApiAuth(),
InactiveProjectController.deactivateOldProjects
)
privateApiRouter.post(
'/internal/project/:project_id/deactivate',
AuthenticationController.requirePrivateApiAuth(),
InactiveProjectController.deactivateProject
)
privateApiRouter.get(
/^\/internal\/project\/([^/]*)\/output\/(.*)$/,
function (req, res, next) {
const params = {
Project_id: req.params[0],
file: req.params[1],
}
req.params = params
next()
},
AuthenticationController.requirePrivateApiAuth(),
CompileController.getFileFromClsi
)
privateApiRouter.get(
'/project/:Project_id/doc/:doc_id',
AuthenticationController.requirePrivateApiAuth(),
DocumentController.getDocument
)
privateApiRouter.post(
'/project/:Project_id/doc/:doc_id',
AuthenticationController.requirePrivateApiAuth(),
DocumentController.setDocument
)
privateApiRouter.post(
'/user/:user_id/update/*',
AuthenticationController.requirePrivateApiAuth(),
TpdsController.mergeUpdate
)
privateApiRouter.delete(
'/user/:user_id/update/*',
AuthenticationController.requirePrivateApiAuth(),
TpdsController.deleteUpdate
)
privateApiRouter.post(
'/project/:project_id/contents/*',
AuthenticationController.requirePrivateApiAuth(),
TpdsController.updateProjectContents
)
privateApiRouter.delete(
'/project/:project_id/contents/*',
AuthenticationController.requirePrivateApiAuth(),
TpdsController.deleteProjectContents
)
webRouter.post(
'/spelling/check',
AuthenticationController.requireLogin(),
SpellingController.proxyRequestToSpellingApi
)
webRouter.post(
'/spelling/learn',
validate({
body: Joi.object({
word: Joi.string().required(),
}),
}),
AuthenticationController.requireLogin(),
SpellingController.learn
)
webRouter.get(
'/project/:project_id/messages',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
ChatController.getMessages
)
webRouter.post(
'/project/:project_id/messages',
AuthorizationMiddleware.blockRestrictedUserFromProject,
AuthorizationMiddleware.ensureUserCanReadProject,
RateLimiterMiddleware.rateLimit({
endpointName: 'send-chat-message',
maxRequests: 100,
timeInterval: 60,
}),
ChatController.sendMessage
)
webRouter.post(
'/project/:Project_id/references/index',
AuthorizationMiddleware.ensureUserCanReadProject,
RateLimiterMiddleware.rateLimit({
endpointName: 'index-project-references',
maxRequests: 30,
timeInterval: 60,
}),
ReferencesController.index
)
webRouter.post(
'/project/:Project_id/references/indexAll',
AuthorizationMiddleware.ensureUserCanReadProject,
RateLimiterMiddleware.rateLimit({
endpointName: 'index-all-project-references',
maxRequests: 30,
timeInterval: 60,
}),
ReferencesController.indexAll
)
// disable beta program while v2 is in beta
webRouter.get(
'/beta/participate',
AuthenticationController.requireLogin(),
BetaProgramController.optInPage
)
webRouter.post(
'/beta/opt-in',
AuthenticationController.requireLogin(),
BetaProgramController.optIn
)
webRouter.post(
'/beta/opt-out',
AuthenticationController.requireLogin(),
BetaProgramController.optOut
)
// New "api" endpoints. Started as a way for v1 to call over to v2 (for
// long-term features, as opposed to the nominally temporary ones in the
// overleaf-integration module), but may expand beyond that role.
publicApiRouter.post(
'/api/clsi/compile/:submission_id',
AuthenticationController.requirePrivateApiAuth(),
CompileController.compileSubmission
)
publicApiRouter.get(
/^\/api\/clsi\/compile\/([^/]*)\/build\/([0-9a-f-]+)\/output\/(.*)$/,
function (req, res, next) {
const params = {
submission_id: req.params[0],
build_id: req.params[1],
file: req.params[2],
}
req.params = params
next()
},
AuthenticationController.requirePrivateApiAuth(),
CompileController.getFileFromClsiWithoutUser
)
publicApiRouter.post(
'/api/institutions/confirm_university_domain',
RateLimiterMiddleware.rateLimit({
endpointName: 'confirm-university-domain',
maxRequests: 1,
timeInterval: 60,
}),
AuthenticationController.requirePrivateApiAuth(),
InstitutionsController.confirmDomain
)
webRouter.get('/chrome', function (req, res, next) {
// Match v1 behaviour - this is used for a Chrome web app
if (SessionManager.isUserLoggedIn(req.session)) {
res.redirect('/project')
} else {
res.redirect('/register')
}
})
// Admin Stuff
webRouter.get(
'/admin',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.index
)
webRouter.get(
'/admin/user',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
(req, res) => res.redirect('/admin/register')
) // this gets removed by admin-panel addon
webRouter.get(
'/admin/register',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.registerNewUser
)
webRouter.post(
'/admin/register',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
UserController.register
)
if (!Features.hasFeature('saas')) {
webRouter.post(
'/admin/openEditor',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.openEditor
)
webRouter.post(
'/admin/closeEditor',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.closeEditor
)
webRouter.post(
'/admin/disconnectAllUsers',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.disconnectAllUsers
)
}
webRouter.post(
'/admin/flushProjectToTpds',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.flushProjectToTpds
)
webRouter.post(
'/admin/pollDropboxForUser',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.pollDropboxForUser
)
webRouter.post(
'/admin/messages',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.createMessage
)
webRouter.post(
'/admin/messages/clear',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.clearMessages
)
webRouter.post(
'/admin/unregisterServiceWorker',
AuthorizationMiddleware.ensureUserIsSiteAdmin,
AdminController.unregisterServiceWorker
)
privateApiRouter.get('/perfTest', (req, res) => {
plainTextResponse(res, 'hello')
})
publicApiRouter.get('/status', (req, res) => {
if (!Settings.siteIsOpen) {
plainTextResponse(res, 'web site is closed (web)')
} else if (!Settings.editorIsOpen) {
plainTextResponse(res, 'web editor is closed (web)')
} else {
plainTextResponse(res, 'web sharelatex is alive (web)')
}
})
privateApiRouter.get('/status', (req, res) => {
plainTextResponse(res, 'web sharelatex is alive (api)')
})
// used by kubernetes health-check and acceptance tests
webRouter.get('/dev/csrf', (req, res) => {
plainTextResponse(res, res.locals.csrfToken)
})
publicApiRouter.get(
'/health_check',
HealthCheckController.checkActiveHandles,
HealthCheckController.check
)
privateApiRouter.get(
'/health_check',
HealthCheckController.checkActiveHandles,
HealthCheckController.checkApi
)
publicApiRouter.get(
'/health_check/api',
HealthCheckController.checkActiveHandles,
HealthCheckController.checkApi
)
privateApiRouter.get(
'/health_check/api',
HealthCheckController.checkActiveHandles,
HealthCheckController.checkApi
)
publicApiRouter.get(
'/health_check/full',
HealthCheckController.checkActiveHandles,
HealthCheckController.check
)
privateApiRouter.get(
'/health_check/full',
HealthCheckController.checkActiveHandles,
HealthCheckController.check
)
publicApiRouter.get('/health_check/redis', HealthCheckController.checkRedis)
privateApiRouter.get('/health_check/redis', HealthCheckController.checkRedis)
publicApiRouter.get('/health_check/mongo', HealthCheckController.checkMongo)
privateApiRouter.get('/health_check/mongo', HealthCheckController.checkMongo)
webRouter.get(
'/status/compiler/:Project_id',
RateLimiterMiddleware.rateLimit({
endpointName: 'status-compiler',
maxRequests: 10,
timeInterval: 60,
}),
AuthorizationMiddleware.ensureUserCanReadProject,
function (req, res) {
const projectId = req.params.Project_id
const sendRes = _.once(function (statusCode, message) {
res.status(statusCode)
plainTextResponse(res, message)
ClsiCookieManager.clearServerId(projectId)
}) // force every compile to a new server
// set a timeout
let handler = setTimeout(function () {
sendRes(500, 'Compiler timed out')
handler = null
}, 10000)
// use a valid user id for testing
const testUserId = '123456789012345678901234'
// run the compile
CompileManager.compile(
projectId,
testUserId,
{},
function (error, status) {
if (handler) {
clearTimeout(handler)
}
if (error) {
sendRes(500, `Compiler returned error ${error.message}`)
} else if (status === 'success') {
sendRes(200, 'Compiler returned in less than 10 seconds')
} else {
sendRes(500, `Compiler returned failure ${status}`)
}
}
)
}
)
webRouter.get('/no-cache', function (req, res, next) {
res.header('Cache-Control', 'max-age=0')
res.sendStatus(404)
})
webRouter.get('/oops-express', (req, res, next) =>
next(new Error('Test error'))
)
webRouter.get('/oops-internal', function (req, res, next) {
throw new Error('Test error')
})
webRouter.get('/oops-mongo', (req, res, next) =>
require('./models/Project').Project.findOne({}, function () {
throw new Error('Test error')
})
)
privateApiRouter.get('/opps-small', function (req, res, next) {
logger.err('test error occured')
res.sendStatus(200)
})
webRouter.post('/error/client', function (req, res, next) {
logger.warn(
{ err: req.body.error, meta: req.body.meta },
'client side error'
)
metrics.inc('client-side-error')
res.sendStatus(204)
})
webRouter.get(
`/read/:token(${TokenAccessController.READ_ONLY_TOKEN_PATTERN})`,
RateLimiterMiddleware.rateLimit({
endpointName: 'read-only-token',
maxRequests: 15,
timeInterval: 60,
}),
AnalyticsRegistrationSourceMiddleware.setSource(
'collaboration',
'link-sharing'
),
TokenAccessController.tokenAccessPage,
AnalyticsRegistrationSourceMiddleware.clearSource()
)
webRouter.get(
`/:token(${TokenAccessController.READ_AND_WRITE_TOKEN_PATTERN})`,
RateLimiterMiddleware.rateLimit({
endpointName: 'read-and-write-token',
maxRequests: 15,
timeInterval: 60,
}),
AnalyticsRegistrationSourceMiddleware.setSource(
'collaboration',
'link-sharing'
),
TokenAccessController.tokenAccessPage,
AnalyticsRegistrationSourceMiddleware.clearSource()
)
webRouter.post(
`/:token(${TokenAccessController.READ_AND_WRITE_TOKEN_PATTERN})/grant`,
RateLimiterMiddleware.rateLimit({
endpointName: 'grant-token-access-read-write',
maxRequests: 10,
timeInterval: 60,
}),
TokenAccessController.grantTokenAccessReadAndWrite
)
webRouter.post(
`/read/:token(${TokenAccessController.READ_ONLY_TOKEN_PATTERN})/grant`,
RateLimiterMiddleware.rateLimit({
endpointName: 'grant-token-access-read-only',
maxRequests: 10,
timeInterval: 60,
}),
TokenAccessController.grantTokenAccessReadOnly
)
webRouter.get('/unsupported-browser', renderUnsupportedBrowserPage)
webRouter.get('*', ErrorController.notFound)
}