overleaf/services/web/app/src/Features/Project/ProjectController.js

1065 lines
32 KiB
JavaScript
Raw Normal View History

const Path = require('path')
const fs = require('fs')
const crypto = require('crypto')
const async = require('async')
const logger = require('logger-sharelatex')
const { ObjectId } = require('../../infrastructure/mongojs')
const ProjectDeleter = require('./ProjectDeleter')
const ProjectDuplicator = require('./ProjectDuplicator')
const ProjectCreationHandler = require('./ProjectCreationHandler')
const EditorController = require('../Editor/EditorController')
const ProjectHelper = require('./ProjectHelper')
const metrics = require('metrics-sharelatex')
const { User } = require('../../models/User')
const TagsHandler = require('../Tags/TagsHandler')
const SubscriptionLocator = require('../Subscription/SubscriptionLocator')
const NotificationsHandler = require('../Notifications/NotificationsHandler')
const LimitationsManager = require('../Subscription/LimitationsManager')
const Settings = require('settings-sharelatex')
const AuthorizationManager = require('../Authorization/AuthorizationManager')
const InactiveProjectManager = require('../InactiveData/InactiveProjectManager')
const ProjectUpdateHandler = require('./ProjectUpdateHandler')
const ProjectGetter = require('./ProjectGetter')
const PrivilegeLevels = require('../Authorization/PrivilegeLevels')
const AuthenticationController = require('../Authentication/AuthenticationController')
const PackageVersions = require('../../infrastructure/PackageVersions')
const Sources = require('../Authorization/Sources')
const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler')
const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter')
const ProjectEntityHandler = require('./ProjectEntityHandler')
const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher')
const UserGetter = require('../User/UserGetter')
const NotificationsBuilder = require('../Notifications/NotificationsBuilder')
const { V1ConnectionError } = require('../Errors/Errors')
const Features = require('../../infrastructure/Features')
const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler')
const { getUserAffiliations } = require('../Institutions/InstitutionsAPI')
const UserController = require('../User/UserController')
const _ssoAvailable = (affiliation, session, linkedInstitutionIds) => {
if (!affiliation.institution) return false
// institution.confirmed is for the domain being confirmed, not the email
// Do not show SSO UI for unconfirmed domains
if (!affiliation.institution.confirmed) return false
// Could have multiple emails at the same institution, and if any are
// linked to the institution then do not show notification for others
if (
linkedInstitutionIds.indexOf(affiliation.institution.id.toString()) === -1
) {
if (affiliation.institution.ssoEnabled) return true
if (affiliation.institution.ssoBeta && session.samlBeta) return true
return false
}
return false
}
const ProjectController = {
_isInPercentageRollout(rolloutName, objectId, percentage) {
if (Settings.bypassPercentageRollouts === true) {
return true
}
const data = `${rolloutName}:${objectId.toString()}`
const md5hash = crypto
.createHash('md5')
.update(data)
.digest('hex')
const counter = parseInt(md5hash.slice(26, 32), 16)
return counter % 100 < percentage
},
updateProjectSettings(req, res, next) {
const projectId = req.params.Project_id
const jobs = []
if (req.body.compiler != null) {
jobs.push(callback =>
EditorController.setCompiler(projectId, req.body.compiler, callback)
)
}
if (req.body.imageName != null) {
jobs.push(callback =>
EditorController.setImageName(projectId, req.body.imageName, callback)
)
}
if (req.body.name != null) {
jobs.push(callback =>
EditorController.renameProject(projectId, req.body.name, callback)
)
}
if (req.body.spellCheckLanguage != null) {
jobs.push(callback =>
EditorController.setSpellCheckLanguage(
projectId,
req.body.spellCheckLanguage,
callback
)
)
}
if (req.body.rootDocId != null) {
jobs.push(callback =>
EditorController.setRootDoc(projectId, req.body.rootDocId, callback)
)
}
async.series(jobs, error => {
if (error != null) {
return next(error)
}
res.sendStatus(204)
})
},
updateProjectAdminSettings(req, res, next) {
const projectId = req.params.Project_id
const jobs = []
if (req.body.publicAccessLevel != null) {
jobs.push(callback =>
EditorController.setPublicAccessLevel(
projectId,
req.body.publicAccessLevel,
callback
)
)
}
async.series(jobs, error => {
if (error != null) {
return next(error)
}
res.sendStatus(204)
})
},
deleteProject(req, res) {
const projectId = req.params.Project_id
const user = AuthenticationController.getSessionUser(req)
const cb = err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
}
ProjectDeleter.deleteProject(
projectId,
{ deleterUser: user, ipAddress: req.ip },
cb
)
},
archiveProject(req, res, next) {
const projectId = req.params.Project_id
const userId = AuthenticationController.getLoggedInUserId(req)
ProjectDeleter.archiveProject(projectId, userId, function(err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
unarchiveProject(req, res, next) {
const projectId = req.params.Project_id
const userId = AuthenticationController.getLoggedInUserId(req)
ProjectDeleter.unarchiveProject(projectId, userId, function(err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
trashProject(req, res, next) {
const projectId = req.params.project_id
const userId = AuthenticationController.getLoggedInUserId(req)
ProjectDeleter.trashProject(projectId, userId, function(err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
untrashProject(req, res, next) {
const projectId = req.params.project_id
const userId = AuthenticationController.getLoggedInUserId(req)
ProjectDeleter.untrashProject(projectId, userId, function(err) {
if (err != null) {
return next(err)
} else {
return res.sendStatus(200)
}
})
},
expireDeletedProjectsAfterDuration(req, res) {
ProjectDeleter.expireDeletedProjectsAfterDuration(err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
})
},
expireDeletedProject(req, res, next) {
const { projectId } = req.params
ProjectDeleter.expireDeletedProject(projectId, err => {
if (err != null) {
next(err)
} else {
res.sendStatus(200)
}
})
},
restoreProject(req, res) {
const projectId = req.params.Project_id
ProjectDeleter.restoreProject(projectId, err => {
if (err != null) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
})
},
cloneProject(req, res, next) {
res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete
metrics.inc('cloned-project')
const projectId = req.params.Project_id
const { projectName } = req.body
logger.log({ projectId, projectName }, 'cloning project')
if (!AuthenticationController.isUserLoggedIn(req)) {
return res.send({ redir: '/register' })
}
const currentUser = AuthenticationController.getSessionUser(req)
const { first_name: firstName, last_name: lastName, email } = currentUser
ProjectDuplicator.duplicate(
currentUser,
projectId,
projectName,
(err, project) => {
if (err != null) {
logger.warn(
{ err, projectId, userId: currentUser._id },
'error cloning project'
)
return next(err)
}
res.send({
name: project.name,
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: currentUser._id
}
})
}
)
},
newProject(req, res, next) {
const currentUser = AuthenticationController.getSessionUser(req)
const {
first_name: firstName,
last_name: lastName,
email,
_id: userId
} = currentUser
const projectName =
req.body.projectName != null ? req.body.projectName.trim() : undefined
const { template } = req.body
async.waterfall(
[
cb => {
if (template === 'example') {
ProjectCreationHandler.createExampleProject(userId, projectName, cb)
} else {
ProjectCreationHandler.createBasicProject(userId, projectName, cb)
}
}
],
(err, project) => {
if (err != null) {
return next(err)
}
res.send({
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: userId
}
})
}
)
},
renameProject(req, res, next) {
const projectId = req.params.Project_id
const newName = req.body.newProjectName
EditorController.renameProject(projectId, newName, err => {
if (err != null) {
return next(err)
}
res.sendStatus(200)
})
},
userProjectsJson(req, res, next) {
const userId = AuthenticationController.getLoggedInUserId(req)
ProjectGetter.findAllUsersProjects(
userId,
'name lastUpdated publicAccesLevel archived trashed owner_ref tokens',
(err, projects) => {
if (err != null) {
return next(err)
}
// _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here
projects = ProjectController._buildProjectList(projects, userId)
.filter(p => !(p.archived || p.trashed))
.map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel }))
res.json({ projects })
}
)
},
projectEntitiesJson(req, res, next) {
const projectId = req.params.Project_id
ProjectGetter.getProject(projectId, (err, project) => {
if (err != null) {
return next(err)
}
ProjectEntityHandler.getAllEntitiesFromProject(
project,
(err, docs, files) => {
if (err != null) {
return next(err)
}
const entities = docs
.concat(files)
// Sort by path ascending
.sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0))
.map(e => ({
path: e.path,
type: e.doc != null ? 'doc' : 'file'
}))
res.json({ project_id: projectId, entities })
}
)
})
},
projectListPage(req, res, next) {
const timer = new metrics.Timer('project-list')
const userId = AuthenticationController.getLoggedInUserId(req)
const currentUser = AuthenticationController.getSessionUser(req)
let noV1Connection = false
let institutionLinkingError
async.parallel(
{
tags(cb) {
TagsHandler.getAllTags(userId, cb)
},
notifications(cb) {
NotificationsHandler.getUserNotifications(userId, cb)
},
projects(cb) {
ProjectGetter.findAllUsersProjects(
userId,
'name lastUpdated lastUpdatedBy publicAccesLevel archived trashed owner_ref tokens',
cb
)
},
hasSubscription(cb) {
LimitationsManager.hasPaidSubscription(
currentUser,
(error, hasPaidSubscription) => {
if (error != null && error instanceof V1ConnectionError) {
noV1Connection = true
return cb(null, true)
}
cb(error, hasPaidSubscription)
}
)
},
user(cb) {
User.findById(
userId,
'emails featureSwitches overleaf awareOfV2 features lastLoginIp',
cb
)
},
userAffiliations(cb) {
if (!Features.hasFeature('affiliations')) {
return cb(null, [])
}
getUserAffiliations(userId, (error, affiliations) => {
if (error && error instanceof V1ConnectionError) {
noV1Connection = true
return cb(null, [])
}
cb(error, affiliations)
})
}
},
(err, results) => {
if (err != null) {
logger.warn({ err }, 'error getting data for project list page')
return next(err)
}
const { notifications, user, userAffiliations } = results
// Handle case of deleted user
if (user == null) {
UserController.logout(req, res, next)
return
}
const tags = results.tags
const notificationsInstitution = []
for (const notification of notifications) {
notification.html = req.i18n.translate(
notification.templateKey,
notification.messageOpts
)
}
// Institution SSO Notifications
if (Features.hasFeature('saml')) {
const samlSession = req.session.saml
// Notification: SSO Available
const linkedInstitutionIds = []
user.emails.forEach(email => {
if (email.samlProviderId) {
linkedInstitutionIds.push(email.samlProviderId)
}
})
if (Array.isArray(userAffiliations)) {
userAffiliations.forEach(affiliation => {
if (
_ssoAvailable(affiliation, req.session, linkedInstitutionIds)
) {
notificationsInstitution.push({
email: affiliation.email,
institutionId: affiliation.institution.id,
institutionName: affiliation.institution.name,
templateKey: 'notification_institution_sso_available'
})
}
})
}
if (samlSession) {
// Notification: After SSO Linked
if (samlSession.linked) {
notificationsInstitution.push({
email: samlSession.institutionEmail,
institutionName: samlSession.linked.universityName,
templateKey: 'notification_institution_sso_linked'
})
}
// Notification: After SSO Linked or Logging in
// The requested email does not match primary email returned from
// the institution
if (
samlSession.requestedEmail &&
samlSession.emailNonCanonical &&
!samlSession.linkedToAnother
) {
notificationsInstitution.push({
institutionEmail: samlSession.emailNonCanonical,
requestedEmail: samlSession.requestedEmail,
templateKey: 'notification_institution_sso_non_canonical'
})
}
// Notification: Tried to register, but account already existed
// registerIntercept is set before the institution callback.
// institutionEmail is set after institution callback.
// Check for both in case SSO flow was abandoned
if (
samlSession.registerIntercept &&
samlSession.institutionEmail &&
!samlSession.linkedToAnother
) {
notificationsInstitution.push({
email: samlSession.institutionEmail,
templateKey: 'notification_institution_sso_already_registered'
})
}
// Notification: Already linked to another account
if (samlSession.linkedToAnother) {
notificationsInstitution.push({
templateKey: 'notification_institution_sso_linked_by_another'
})
}
// Notification: When there is a session error
if (samlSession.error) {
institutionLinkingError = samlSession.error
notificationsInstitution.push({
message: samlSession.error.message,
templateKey: 'notification_institution_sso_error',
tryAgain: samlSession.error.tryAgain
})
}
}
delete req.session.saml
}
const portalTemplates = ProjectController._buildPortalTemplatesList(
userAffiliations
)
const projects = ProjectController._buildProjectList(
results.projects,
userId
)
const warnings = ProjectController._buildWarningsList(noV1Connection)
// in v2 add notifications for matching university IPs
if (Settings.overleaf != null && req.ip !== user.lastLoginIp) {
NotificationsBuilder.ipMatcherAffiliation(user._id).create(req.ip)
}
ProjectController._injectProjectUsers(projects, (error, projects) => {
if (error != null) {
return next(error)
}
const viewModel = {
title: 'your_projects',
priority_title: true,
projects,
tags,
notifications: notifications || [],
notificationsInstitution,
portalTemplates,
user,
userAffiliations,
hasSubscription: results.hasSubscription,
institutionLinkingError,
warnings,
zipFileSizeLimit: Settings.maxUploadSize
}
if (
Settings.algolia &&
Settings.algolia.app_id &&
Settings.algolia.read_only_api_key
) {
viewModel.showUserDetailsArea = true
viewModel.algolia_api_key = Settings.algolia.read_only_api_key
viewModel.algolia_app_id = Settings.algolia.app_id
} else {
viewModel.showUserDetailsArea = false
}
const paidUser =
(user.features != null ? user.features.github : undefined) &&
(user.features != null ? user.features.dropbox : undefined) // use a heuristic for paid account
const freeUserProportion = 0.1
const sampleFreeUser =
parseInt(user._id.toString().slice(-2), 16) <
freeUserProportion * 255
const showFrontWidget = paidUser || sampleFreeUser
if (showFrontWidget) {
viewModel.frontChatWidgetRoomId =
Settings.overleaf != null
? Settings.overleaf.front_chat_widget_room_id
: undefined
}
res.render('project/list', viewModel)
timer.done()
})
}
)
},
loadEditor(req, res, next) {
const timer = new metrics.Timer('load-editor')
if (!Settings.editorIsOpen) {
return res.render('general/closed', { title: 'updating_site' })
}
let anonymous, userId, sessionUser
if (AuthenticationController.isUserLoggedIn(req)) {
sessionUser = AuthenticationController.getSessionUser(req)
userId = AuthenticationController.getLoggedInUserId(req)
anonymous = false
} else {
sessionUser = null
anonymous = true
userId = null
}
const projectId = req.params.Project_id
async.auto(
{
project(cb) {
ProjectGetter.getProject(
projectId,
{
name: 1,
lastUpdated: 1,
track_changes: 1,
owner_ref: 1,
brandVariationId: 1,
overleaf: 1,
tokens: 1
},
(err, project) => {
if (err != null) {
return cb(err)
}
cb(null, project)
}
)
},
user(cb) {
if (userId == null) {
cb(null, defaultSettingsForAnonymousUser(userId))
} else {
User.findById(
userId,
'email first_name last_name referal_id signUpDate featureSwitches features refProviders alphaProgram betaProgram isAdmin ace',
(err, user) => {
// Handle case of deleted user
if (user == null) {
UserController.logout(req, res, next)
return
}
logger.log({ projectId, userId }, 'got user')
cb(err, user)
}
)
}
},
subscription(cb) {
if (userId == null) {
return cb()
}
SubscriptionLocator.getUsersSubscription(userId, cb)
},
activate(cb) {
InactiveProjectManager.reactivateProjectIfRequired(projectId, cb)
},
markAsOpened(cb) {
// don't need to wait for this to complete
ProjectUpdateHandler.markAsOpened(projectId, () => {})
cb()
},
isTokenMember(cb) {
if (userId == null) {
return cb()
}
CollaboratorsGetter.userIsTokenMember(userId, projectId, cb)
},
brandVariation: [
'project',
(cb, results) => {
if (
(results.project != null
? results.project.brandVariationId
: undefined) == null
) {
return cb()
}
BrandVariationsHandler.getBrandVariationById(
results.project.brandVariationId,
(error, brandVariationDetails) => cb(error, brandVariationDetails)
)
}
],
flushToTpds: cb => {
TpdsProjectFlusher.flushProjectToTpdsIfNeeded(projectId, cb)
}
},
(err, results) => {
if (err != null) {
logger.warn({ err }, 'error getting details for project page')
return next(err)
}
const { project } = results
const { user } = results
const { subscription } = results
const { brandVariation } = results
const anonRequestToken = TokenAccessHandler.getRequestToken(
req,
projectId
)
const { isTokenMember } = results
const allowedImageNames = ProjectHelper.getAllowedImagesForUser(
sessionUser
)
AuthorizationManager.getPrivilegeLevelForProject(
userId,
projectId,
anonRequestToken,
(error, privilegeLevel) => {
let allowedFreeTrial
if (error != null) {
return next(error)
}
if (
privilegeLevel == null ||
privilegeLevel === PrivilegeLevels.NONE
) {
return res.sendStatus(401)
}
if (
subscription != null &&
subscription.freeTrial != null &&
subscription.freeTrial.expiresAt != null
) {
allowedFreeTrial = !!subscription.freeTrial.allowed || true
}
let wsUrl = Settings.wsUrl
let metricName = 'load-editor-ws'
if (user.betaProgram && Settings.wsUrlBeta !== undefined) {
wsUrl = Settings.wsUrlBeta
metricName += '-beta'
} else if (
Settings.wsUrlV2 &&
Settings.wsUrlV2Percentage > 0 &&
(ObjectId(projectId).getTimestamp() / 1000) %
100 <
Settings.wsUrlV2Percentage
) {
wsUrl = Settings.wsUrlV2
metricName += '-v2'
}
if (req.query && req.query.ws === 'fallback') {
// `?ws=fallback` will connect to the bare origin, and ignore
// the custom wsUrl. Hence it must load the client side
// javascript from there too.
// Not resetting it here would possibly load a socket.io v2
// client and connect to a v0 endpoint.
wsUrl = undefined
metricName += '-fallback'
}
metrics.inc(metricName)
const enableOptimize =
!!Settings.experimentId && !user.features.zotero
res.render('project/editor', {
title: project.name,
priority_title: true,
bodyClasses: ['editor'],
project_id: project._id,
user: {
id: userId,
email: user.email,
first_name: user.first_name,
last_name: user.last_name,
referal_id: user.referal_id,
signUpDate: user.signUpDate,
subscription: {
freeTrial: { allowed: allowedFreeTrial }
},
featureSwitches: user.featureSwitches,
features: user.features,
refProviders: user.refProviders,
alphaProgram: user.alphaProgram,
betaProgram: user.betaProgram,
isAdmin: user.isAdmin
},
userSettings: {
mode: user.ace.mode,
editorTheme: user.ace.theme,
fontSize: user.ace.fontSize,
autoComplete: user.ace.autoComplete,
autoPairDelimiters: user.ace.autoPairDelimiters,
pdfViewer: user.ace.pdfViewer,
syntaxValidation: user.ace.syntaxValidation,
fontFamily: user.ace.fontFamily || 'lucida',
lineHeight: user.ace.lineHeight || 'normal',
overallTheme: user.ace.overallTheme
},
trackChangesState: project.track_changes,
privilegeLevel,
chatUrl: Settings.apis.chat.url,
anonymous,
anonymousAccessToken: anonymous ? anonRequestToken : null,
isTokenMember,
isRestrictedTokenMember: AuthorizationManager.isRestrictedUser(
userId,
privilegeLevel,
isTokenMember
),
languages: Settings.languages,
editorThemes: THEME_LIST,
maxDocLength: Settings.max_doc_length,
useV2History:
project.overleaf &&
project.overleaf.history &&
Boolean(project.overleaf.history.display),
brandVariation,
allowedImageNames,
gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl,
wsUrl,
showSupport: Features.hasFeature('support'),
gaOptimize: enableOptimize
})
timer.done()
}
)
}
)
},
_buildProjectList(allProjects, userId) {
let project
const {
owned,
readAndWrite,
readOnly,
tokenReadAndWrite,
tokenReadOnly
} = allProjects
const projects = []
for (project of owned) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'owner',
Sources.OWNER,
userId
)
)
}
// Invite-access
for (project of readAndWrite) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readWrite',
Sources.INVITE,
userId
)
)
}
for (project of readOnly) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.INVITE,
userId
)
)
}
// Token-access
// Only add these projects if they're not already present, this gives us cascading access
// from 'owner' => 'token-read-only'
for (project of tokenReadAndWrite) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readAndWrite',
Sources.TOKEN,
userId
)
)
}
}
for (project of tokenReadOnly) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.TOKEN,
userId
)
)
}
}
return projects
},
_buildProjectViewModel(project, accessLevel, source, userId) {
const archived = ProjectHelper.isArchived(project, userId)
// If a project is simultaneously trashed and archived, we will consider it archived but not trashed.
const trashed = ProjectHelper.isTrashed(project, userId) && !archived
TokenAccessHandler.protectTokens(project, accessLevel)
const model = {
id: project._id,
name: project.name,
lastUpdated: project.lastUpdated,
lastUpdatedBy: project.lastUpdatedBy,
publicAccessLevel: project.publicAccesLevel,
accessLevel,
source,
archived,
trashed,
owner_ref: project.owner_ref,
isV1Project: false
}
if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) {
model.owner_ref = null
model.lastUpdatedBy = null
}
return model
},
_injectProjectUsers(projects, callback) {
const users = {}
for (const project of projects) {
if (project.owner_ref != null) {
users[project.owner_ref.toString()] = true
}
if (project.lastUpdatedBy != null) {
users[project.lastUpdatedBy.toString()] = true
}
}
const userIds = Object.keys(users)
async.eachSeries(
userIds,
(userId, cb) => {
UserGetter.getUser(
userId,
{ first_name: 1, last_name: 1, email: 1 },
(error, user) => {
if (error != null) {
return cb(error)
}
users[userId] = user
cb()
}
)
},
error => {
if (error != null) {
return callback(error)
}
for (const project of projects) {
if (project.owner_ref != null) {
project.owner = users[project.owner_ref.toString()]
}
if (project.lastUpdatedBy != null) {
project.lastUpdatedBy =
users[project.lastUpdatedBy.toString()] || null
}
}
callback(null, projects)
}
)
},
_buildWarningsList(noConnection) {
return noConnection
? [
'Error accessing Overleaf V1. Some of your projects or features may be missing.'
]
: []
},
_buildPortalTemplatesList(affiliations) {
if (affiliations == null) {
affiliations = []
}
const portalTemplates = []
for (let aff of affiliations) {
if (
aff.portal &&
aff.portal.slug &&
aff.portal.templates_count &&
aff.portal.templates_count > 0
) {
const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/'
portalTemplates.push({
name: aff.institution.name,
url: Settings.siteUrl + portalPath + aff.portal.slug
})
}
}
return portalTemplates
}
}
var defaultSettingsForAnonymousUser = userId => ({
id: userId,
ace: {
mode: 'none',
theme: 'textmate',
fontSize: '12',
autoComplete: true,
spellCheckLanguage: '',
pdfViewer: '',
syntaxValidation: true
},
subscription: {
freeTrial: {
allowed: true
}
},
featureSwitches: {
github: false
}
})
var THEME_LIST = []
function generateThemeList() {
const files = fs.readdirSync(
Path.join(
__dirname,
'/../../../../frontend/js/vendor/',
PackageVersions.lib('ace')
)
)
const result = []
for (let file of files) {
if (file.slice(-2) === 'js' && /^theme-/.test(file)) {
const cleanName = file.slice(0, -3).slice(6)
result.push(THEME_LIST.push(cleanName))
} else {
result.push(undefined)
}
}
}
generateThemeList()
module.exports = ProjectController