const _ = require('lodash') const Path = require('path') const OError = require('@overleaf/o-error') const fs = require('fs') const crypto = require('crypto') const async = require('async') const logger = require('logger-sharelatex') const { ObjectId } = require('mongodb') const ProjectDeleter = require('./ProjectDeleter') const ProjectDuplicator = require('./ProjectDuplicator') const ProjectCreationHandler = require('./ProjectCreationHandler') const EditorController = require('../Editor/EditorController') const ProjectHelper = require('./ProjectHelper') const metrics = require('@overleaf/metrics') const { User } = require('../../models/User') const TagsHandler = require('../Tags/TagsHandler') const SubscriptionLocator = require('../Subscription/SubscriptionLocator') const NotificationsHandler = require('../Notifications/NotificationsHandler') const LimitationsManager = require('../Subscription/LimitationsManager') const Settings = require('settings-sharelatex') const AuthorizationManager = require('../Authorization/AuthorizationManager') const InactiveProjectManager = require('../InactiveData/InactiveProjectManager') const ProjectUpdateHandler = require('./ProjectUpdateHandler') const ProjectGetter = require('./ProjectGetter') const PrivilegeLevels = require('../Authorization/PrivilegeLevels') const AuthenticationController = require('../Authentication/AuthenticationController') const Sources = require('../Authorization/Sources') const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler') const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter') const ProjectEntityHandler = require('./ProjectEntityHandler') const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher') const UserGetter = require('../User/UserGetter') const NotificationsBuilder = require('../Notifications/NotificationsBuilder') const { V1ConnectionError } = require('../Errors/Errors') const Features = require('../../infrastructure/Features') const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler') const UserController = require('../User/UserController') const AnalyticsManager = require('../Analytics/AnalyticsManager') const Modules = require('../../infrastructure/Modules') const SplitTestHandler = require('../SplitTests/SplitTestHandler') const { getNewLogsUIVariantForUser } = require('../Helpers/NewLogsUI') const _ssoAvailable = (affiliation, session, linkedInstitutionIds) => { if (!affiliation.institution) return false // institution.confirmed is for the domain being confirmed, not the email // Do not show SSO UI for unconfirmed domains if (!affiliation.institution.confirmed) return false // Could have multiple emails at the same institution, and if any are // linked to the institution then do not show notification for others if ( linkedInstitutionIds.indexOf(affiliation.institution.id.toString()) === -1 ) { if (affiliation.institution.ssoEnabled) return true if (affiliation.institution.ssoBeta && session.samlBeta) return true return false } return false } const ProjectController = { _isInPercentageRollout(rolloutName, objectId, percentage) { if (Settings.bypassPercentageRollouts === true) { return true } const data = `${rolloutName}:${objectId.toString()}` const md5hash = crypto.createHash('md5').update(data).digest('hex') const counter = parseInt(md5hash.slice(26, 32), 16) return counter % 100 < percentage }, updateProjectSettings(req, res, next) { const projectId = req.params.Project_id const jobs = [] if (req.body.compiler != null) { jobs.push(callback => EditorController.setCompiler(projectId, req.body.compiler, callback) ) } if (req.body.imageName != null) { jobs.push(callback => EditorController.setImageName(projectId, req.body.imageName, callback) ) } if (req.body.name != null) { jobs.push(callback => EditorController.renameProject(projectId, req.body.name, callback) ) } if (req.body.spellCheckLanguage != null) { jobs.push(callback => EditorController.setSpellCheckLanguage( projectId, req.body.spellCheckLanguage, callback ) ) } if (req.body.rootDocId != null) { jobs.push(callback => EditorController.setRootDoc(projectId, req.body.rootDocId, callback) ) } async.series(jobs, error => { if (error != null) { return next(error) } res.sendStatus(204) }) }, updateProjectAdminSettings(req, res, next) { const projectId = req.params.Project_id const jobs = [] if (req.body.publicAccessLevel != null) { jobs.push(callback => EditorController.setPublicAccessLevel( projectId, req.body.publicAccessLevel, callback ) ) } async.series(jobs, error => { if (error != null) { return next(error) } res.sendStatus(204) }) }, deleteProject(req, res) { const projectId = req.params.Project_id const user = AuthenticationController.getSessionUser(req) const cb = err => { if (err != null) { res.sendStatus(500) } else { res.sendStatus(200) } } ProjectDeleter.deleteProject( projectId, { deleterUser: user, ipAddress: req.ip }, cb ) }, archiveProject(req, res, next) { const projectId = req.params.Project_id const userId = AuthenticationController.getLoggedInUserId(req) ProjectDeleter.archiveProject(projectId, userId, function (err) { if (err != null) { return next(err) } else { return res.sendStatus(200) } }) }, unarchiveProject(req, res, next) { const projectId = req.params.Project_id const userId = AuthenticationController.getLoggedInUserId(req) ProjectDeleter.unarchiveProject(projectId, userId, function (err) { if (err != null) { return next(err) } else { return res.sendStatus(200) } }) }, trashProject(req, res, next) { const projectId = req.params.project_id const userId = AuthenticationController.getLoggedInUserId(req) ProjectDeleter.trashProject(projectId, userId, function (err) { if (err != null) { return next(err) } else { return res.sendStatus(200) } }) }, untrashProject(req, res, next) { const projectId = req.params.project_id const userId = AuthenticationController.getLoggedInUserId(req) ProjectDeleter.untrashProject(projectId, userId, function (err) { if (err != null) { return next(err) } else { return res.sendStatus(200) } }) }, expireDeletedProjectsAfterDuration(req, res) { ProjectDeleter.expireDeletedProjectsAfterDuration(err => { if (err != null) { res.sendStatus(500) } else { res.sendStatus(200) } }) }, expireDeletedProject(req, res, next) { const { projectId } = req.params ProjectDeleter.expireDeletedProject(projectId, err => { if (err != null) { next(err) } else { res.sendStatus(200) } }) }, restoreProject(req, res) { const projectId = req.params.Project_id ProjectDeleter.restoreProject(projectId, err => { if (err != null) { res.sendStatus(500) } else { res.sendStatus(200) } }) }, cloneProject(req, res, next) { res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete metrics.inc('cloned-project') const projectId = req.params.Project_id const { projectName } = req.body logger.log({ projectId, projectName }, 'cloning project') if (!AuthenticationController.isUserLoggedIn(req)) { return res.send({ redir: '/register' }) } const currentUser = AuthenticationController.getSessionUser(req) const { first_name: firstName, last_name: lastName, email } = currentUser ProjectDuplicator.duplicate( currentUser, projectId, projectName, (err, project) => { if (err != null) { OError.tag(err, 'error cloning project', { projectId, userId: currentUser._id, }) return next(err) } res.send({ name: project.name, project_id: project._id, owner_ref: project.owner_ref, owner: { first_name: firstName, last_name: lastName, email, _id: currentUser._id, }, }) } ) }, newProject(req, res, next) { const currentUser = AuthenticationController.getSessionUser(req) const { first_name: firstName, last_name: lastName, email, _id: userId, } = currentUser const projectName = req.body.projectName != null ? req.body.projectName.trim() : undefined const { template } = req.body async.waterfall( [ cb => { if (template === 'example') { ProjectCreationHandler.createExampleProject(userId, projectName, cb) } else { ProjectCreationHandler.createBasicProject(userId, projectName, cb) } }, ], (err, project) => { if (err != null) { return next(err) } res.send({ project_id: project._id, owner_ref: project.owner_ref, owner: { first_name: firstName, last_name: lastName, email, _id: userId, }, }) } ) }, renameProject(req, res, next) { const projectId = req.params.Project_id const newName = req.body.newProjectName EditorController.renameProject(projectId, newName, err => { if (err != null) { return next(err) } res.sendStatus(200) }) }, userProjectsJson(req, res, next) { const userId = AuthenticationController.getLoggedInUserId(req) ProjectGetter.findAllUsersProjects( userId, 'name lastUpdated publicAccesLevel archived trashed owner_ref tokens', (err, projects) => { if (err != null) { return next(err) } // _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here projects = ProjectController._buildProjectList(projects, userId) .filter(p => !(p.archived || p.trashed)) .map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel })) res.json({ projects }) } ) }, projectEntitiesJson(req, res, next) { const projectId = req.params.Project_id ProjectGetter.getProject(projectId, (err, project) => { if (err != null) { return next(err) } ProjectEntityHandler.getAllEntitiesFromProject( project, (err, docs, files) => { if (err != null) { return next(err) } const entities = docs .concat(files) // Sort by path ascending .sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0)) .map(e => ({ path: e.path, type: e.doc != null ? 'doc' : 'file', })) res.json({ project_id: projectId, entities }) } ) }) }, projectListPage(req, res, next) { const timer = new metrics.Timer('project-list') const userId = AuthenticationController.getLoggedInUserId(req) const currentUser = AuthenticationController.getSessionUser(req) async.parallel( { tags(cb) { TagsHandler.getAllTags(userId, cb) }, notifications(cb) { NotificationsHandler.getUserNotifications(userId, cb) }, projects(cb) { ProjectGetter.findAllUsersProjects( userId, 'name lastUpdated lastUpdatedBy publicAccesLevel archived trashed owner_ref tokens', cb ) }, hasSubscription(cb) { LimitationsManager.hasPaidSubscription( currentUser, (error, hasPaidSubscription) => { if (error != null && error instanceof V1ConnectionError) { return cb(null, true) } cb(error, hasPaidSubscription) } ) }, user(cb) { User.findById( userId, 'emails featureSwitches overleaf awareOfV2 features lastLoginIp', cb ) }, userEmailsData(cb) { const result = { list: [], allInReconfirmNotificationPeriods: [] } UserGetter.getUserFullEmails(userId, (error, fullEmails) => { if (error && error instanceof V1ConnectionError) { return cb(null, result) } if (!Features.hasFeature('affiliations')) { result.list = fullEmails return cb(null, result) } Modules.hooks.fire( 'allInReconfirmNotificationPeriodsForUser', fullEmails, (error, results) => { // Module.hooks.fire accepts multiple methods // and does async.series const allInReconfirmNotificationPeriods = (results && results[0]) || [] return cb(null, { list: fullEmails, allInReconfirmNotificationPeriods, }) } ) }) }, }, (err, results) => { if (err != null) { OError.tag(err, 'error getting data for project list page') return next(err) } const { notifications, user, userEmailsData } = results const userEmails = userEmailsData.list || [] const userAffiliations = userEmails .filter(emailData => !!emailData.affiliation) .map(emailData => { const result = emailData.affiliation result.email = emailData.email return result }) const { allInReconfirmNotificationPeriods } = userEmailsData // Handle case of deleted user if (user == null) { UserController.logout(req, res, next) return } const tags = results.tags const notificationsInstitution = [] for (const notification of notifications) { notification.html = req.i18n.translate( notification.templateKey, notification.messageOpts ) } // Institution SSO Notifications let reconfirmedViaSAML if (Features.hasFeature('saml')) { reconfirmedViaSAML = _.get(req.session, ['saml', 'reconfirmed']) const samlSession = req.session.saml // Notification: SSO Available const linkedInstitutionIds = [] user.emails.forEach(email => { if (email.samlProviderId) { linkedInstitutionIds.push(email.samlProviderId) } }) if (Array.isArray(userAffiliations)) { userAffiliations.forEach(affiliation => { if ( _ssoAvailable(affiliation, req.session, linkedInstitutionIds) ) { notificationsInstitution.push({ email: affiliation.email, institutionId: affiliation.institution.id, institutionName: affiliation.institution.name, templateKey: 'notification_institution_sso_available', }) } }) } if (samlSession) { // Notification: After SSO Linked if (samlSession.linked) { notificationsInstitution.push({ email: samlSession.institutionEmail, institutionName: samlSession.linked.universityName, templateKey: 'notification_institution_sso_linked', }) } // Notification: After SSO Linked or Logging in // The requested email does not match primary email returned from // the institution if ( samlSession.requestedEmail && samlSession.emailNonCanonical && !samlSession.error ) { notificationsInstitution.push({ institutionEmail: samlSession.emailNonCanonical, requestedEmail: samlSession.requestedEmail, templateKey: 'notification_institution_sso_non_canonical', }) } // Notification: Tried to register, but account already existed // registerIntercept is set before the institution callback. // institutionEmail is set after institution callback. // Check for both in case SSO flow was abandoned if ( samlSession.registerIntercept && samlSession.institutionEmail && !samlSession.error ) { notificationsInstitution.push({ email: samlSession.institutionEmail, templateKey: 'notification_institution_sso_already_registered', }) } // Notification: When there is a session error if (samlSession.error) { notificationsInstitution.push({ templateKey: 'notification_institution_sso_error', error: samlSession.error, }) } } delete req.session.saml } const portalTemplates = ProjectController._buildPortalTemplatesList( userAffiliations ) const projects = ProjectController._buildProjectList( results.projects, userId ) // in v2 add notifications for matching university IPs if (Settings.overleaf != null && req.ip !== user.lastLoginIp) { NotificationsBuilder.ipMatcherAffiliation(user._id).create(req.ip) } ProjectController._injectProjectUsers(projects, (error, projects) => { if (error != null) { return next(error) } const viewModel = { title: 'your_projects', priority_title: true, projects, tags, notifications: notifications || [], notificationsInstitution, allInReconfirmNotificationPeriods, portalTemplates, user, userAffiliations, userEmails, hasSubscription: results.hasSubscription, reconfirmedViaSAML, zipFileSizeLimit: Settings.maxUploadSize, isOverleaf: !!Settings.overleaf, } const paidUser = (user.features != null ? user.features.github : undefined) && (user.features != null ? user.features.dropbox : undefined) // use a heuristic for paid account const freeUserProportion = 0.1 const sampleFreeUser = parseInt(user._id.toString().slice(-2), 16) < freeUserProportion * 255 const showFrontWidget = paidUser || sampleFreeUser if (showFrontWidget) { viewModel.frontChatWidgetRoomId = Settings.overleaf != null ? Settings.overleaf.front_chat_widget_room_id : undefined } res.render('project/list', viewModel) timer.done() }) } ) }, loadEditor(req, res, next) { const timer = new metrics.Timer('load-editor') if (!Settings.editorIsOpen) { return res.render('general/closed', { title: 'updating_site' }) } let anonymous, userId, sessionUser if (AuthenticationController.isUserLoggedIn(req)) { sessionUser = AuthenticationController.getSessionUser(req) userId = AuthenticationController.getLoggedInUserId(req) anonymous = false } else { sessionUser = null anonymous = true userId = null } const projectId = req.params.Project_id async.auto( { project(cb) { ProjectGetter.getProject( projectId, { name: 1, lastUpdated: 1, track_changes: 1, owner_ref: 1, brandVariationId: 1, overleaf: 1, tokens: 1, }, (err, project) => { if (err != null) { return cb(err) } cb(null, project) } ) }, user(cb) { if (userId == null) { cb(null, defaultSettingsForAnonymousUser(userId)) } else { User.findById( userId, 'email first_name last_name referal_id signUpDate featureSwitches features refProviders alphaProgram betaProgram isAdmin ace', (err, user) => { // Handle case of deleted user if (user == null) { UserController.logout(req, res, next) return } logger.log({ projectId, userId }, 'got user') cb(err, user) } ) } }, subscription(cb) { if (userId == null) { return cb() } SubscriptionLocator.getUsersSubscription(userId, cb) }, activate(cb) { InactiveProjectManager.reactivateProjectIfRequired(projectId, cb) }, markAsOpened(cb) { // don't need to wait for this to complete ProjectUpdateHandler.markAsOpened(projectId, () => {}) cb() }, isTokenMember(cb) { if (userId == null) { return cb() } CollaboratorsGetter.userIsTokenMember(userId, projectId, cb) }, brandVariation: [ 'project', (cb, results) => { if ( (results.project != null ? results.project.brandVariationId : undefined) == null ) { return cb() } BrandVariationsHandler.getBrandVariationById( results.project.brandVariationId, (error, brandVariationDetails) => cb(error, brandVariationDetails) ) }, ], flushToTpds: cb => { TpdsProjectFlusher.flushProjectToTpdsIfNeeded(projectId, cb) }, pdfCachingFeatureFlag(cb) { if (!Settings.enablePdfCaching) return cb(null, '') if (!userId) return cb(null, '') SplitTestHandler.getTestSegmentation( userId, 'pdf_caching_5', (err, segmentation) => { if (err) { // Do not fail loading the editor. return cb(null, '') } cb(null, (segmentation && segmentation.variant) || '') } ) }, }, (err, results) => { if (err != null) { OError.tag(err, 'error getting details for project page') return next(err) } const { project } = results const { user } = results const { subscription } = results const { brandVariation } = results const { pdfCachingFeatureFlag } = results const anonRequestToken = TokenAccessHandler.getRequestToken( req, projectId ) const { isTokenMember } = results const allowedImageNames = ProjectHelper.getAllowedImagesForUser( sessionUser ) AuthorizationManager.getPrivilegeLevelForProject( userId, projectId, anonRequestToken, (error, privilegeLevel) => { let allowedFreeTrial = true if (error != null) { return next(error) } if ( privilegeLevel == null || privilegeLevel === PrivilegeLevels.NONE ) { return res.sendStatus(401) } if (subscription != null) { allowedFreeTrial = false } let wsUrl = Settings.wsUrl let metricName = 'load-editor-ws' if (user.betaProgram && Settings.wsUrlBeta !== undefined) { wsUrl = Settings.wsUrlBeta metricName += '-beta' } else if ( Settings.wsUrlV2 && Settings.wsUrlV2Percentage > 0 && (ObjectId(projectId).getTimestamp() / 1000) % 100 < Settings.wsUrlV2Percentage ) { wsUrl = Settings.wsUrlV2 metricName += '-v2' } if (req.query && req.query.ws === 'fallback') { // `?ws=fallback` will connect to the bare origin, and ignore // the custom wsUrl. Hence it must load the client side // javascript from there too. // Not resetting it here would possibly load a socket.io v2 // client and connect to a v0 endpoint. wsUrl = undefined metricName += '-fallback' } metrics.inc(metricName) if (userId) { AnalyticsManager.recordEvent(userId, 'project-opened', { projectId: project._id, }) } const logsUIVariant = getNewLogsUIVariantForUser(user) function shouldDisplayFeature(name, variantFlag) { if (req.query && req.query[name]) { return req.query[name] === 'true' } else { return variantFlag === true } } function partOfPdfCachingRollout(flag) { if (!Settings.enablePdfCaching) { // The feature is disabled globally. return false } const canSeeFeaturePreview = user.alphaProgram || pdfCachingFeatureFlag.includes(flag) if (!canSeeFeaturePreview) { // The user is not in the target group. return false } // Optionally let the user opt-out. // The will opt-out of both caching and metrics collection, // as if this editing session never happened. return shouldDisplayFeature('enable_pdf_caching', true) } res.render('project/editor', { title: project.name, priority_title: true, bodyClasses: ['editor'], project_id: project._id, user: { id: userId, email: user.email, first_name: user.first_name, last_name: user.last_name, referal_id: user.referal_id, signUpDate: user.signUpDate, allowedFreeTrial: allowedFreeTrial, featureSwitches: user.featureSwitches, features: user.features, refProviders: _.mapValues(user.refProviders, Boolean), alphaProgram: user.alphaProgram, betaProgram: user.betaProgram, isAdmin: user.isAdmin, }, userSettings: { mode: user.ace.mode, editorTheme: user.ace.theme, fontSize: user.ace.fontSize, autoComplete: user.ace.autoComplete, autoPairDelimiters: user.ace.autoPairDelimiters, pdfViewer: user.ace.pdfViewer, syntaxValidation: user.ace.syntaxValidation, fontFamily: user.ace.fontFamily || 'lucida', lineHeight: user.ace.lineHeight || 'normal', overallTheme: user.ace.overallTheme, }, privilegeLevel, anonymous, anonymousAccessToken: anonymous ? anonRequestToken : null, isTokenMember, isRestrictedTokenMember: AuthorizationManager.isRestrictedUser( userId, privilegeLevel, isTokenMember ), languages: Settings.languages, editorThemes: THEME_LIST, maxDocLength: Settings.max_doc_length, useV2History: project.overleaf && project.overleaf.history && Boolean(project.overleaf.history.display), brandVariation, allowedImageNames, gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl, wsUrl, showSupport: Features.hasFeature('support'), showNewLogsUI: shouldDisplayFeature( 'new_logs_ui', logsUIVariant.newLogsUI ), logsUISubvariant: logsUIVariant.subvariant, showNewNavigationUI: shouldDisplayFeature( 'new_navigation_ui', user.alphaProgram ), showNewFileViewUI: shouldDisplayFeature( 'new_file_view', user.alphaProgram ), showSymbolPalette: shouldDisplayFeature( 'symbol_palette', user.betaProgram ), trackPdfDownload: partOfPdfCachingRollout('collect-metrics'), enablePdfCaching: partOfPdfCachingRollout('enable-caching'), resetServiceWorker: Boolean(Settings.resetServiceWorker), }) timer.done() } ) } ) }, _buildProjectList(allProjects, userId) { let project const { owned, readAndWrite, readOnly, tokenReadAndWrite, tokenReadOnly, } = allProjects const projects = [] for (project of owned) { projects.push( ProjectController._buildProjectViewModel( project, 'owner', Sources.OWNER, userId ) ) } // Invite-access for (project of readAndWrite) { projects.push( ProjectController._buildProjectViewModel( project, 'readWrite', Sources.INVITE, userId ) ) } for (project of readOnly) { projects.push( ProjectController._buildProjectViewModel( project, 'readOnly', Sources.INVITE, userId ) ) } // Token-access // Only add these projects if they're not already present, this gives us cascading access // from 'owner' => 'token-read-only' for (project of tokenReadAndWrite) { if ( projects.filter(p => p.id.toString() === project._id.toString()) .length === 0 ) { projects.push( ProjectController._buildProjectViewModel( project, 'readAndWrite', Sources.TOKEN, userId ) ) } } for (project of tokenReadOnly) { if ( projects.filter(p => p.id.toString() === project._id.toString()) .length === 0 ) { projects.push( ProjectController._buildProjectViewModel( project, 'readOnly', Sources.TOKEN, userId ) ) } } return projects }, _buildProjectViewModel(project, accessLevel, source, userId) { const archived = ProjectHelper.isArchived(project, userId) // If a project is simultaneously trashed and archived, we will consider it archived but not trashed. const trashed = ProjectHelper.isTrashed(project, userId) && !archived TokenAccessHandler.protectTokens(project, accessLevel) const model = { id: project._id, name: project.name, lastUpdated: project.lastUpdated, lastUpdatedBy: project.lastUpdatedBy, publicAccessLevel: project.publicAccesLevel, accessLevel, source, archived, trashed, owner_ref: project.owner_ref, isV1Project: false, } if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) { model.owner_ref = null model.lastUpdatedBy = null } return model }, _injectProjectUsers(projects, callback) { const users = {} for (const project of projects) { if (project.owner_ref != null) { users[project.owner_ref.toString()] = true } if (project.lastUpdatedBy != null) { users[project.lastUpdatedBy.toString()] = true } } const userIds = Object.keys(users) async.eachSeries( userIds, (userId, cb) => { UserGetter.getUser( userId, { first_name: 1, last_name: 1, email: 1 }, (error, user) => { if (error != null) { return cb(error) } users[userId] = user cb() } ) }, error => { if (error != null) { return callback(error) } for (const project of projects) { if (project.owner_ref != null) { project.owner = users[project.owner_ref.toString()] } if (project.lastUpdatedBy != null) { project.lastUpdatedBy = users[project.lastUpdatedBy.toString()] || null } } callback(null, projects) } ) }, _buildPortalTemplatesList(affiliations) { if (affiliations == null) { affiliations = [] } const portalTemplates = [] for (const aff of affiliations) { if ( aff.portal && aff.portal.slug && aff.portal.templates_count && aff.portal.templates_count > 0 ) { const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/' portalTemplates.push({ name: aff.institution.name, url: Settings.siteUrl + portalPath + aff.portal.slug, }) } } return portalTemplates }, } var defaultSettingsForAnonymousUser = userId => ({ id: userId, ace: { mode: 'none', theme: 'textmate', fontSize: '12', autoComplete: true, spellCheckLanguage: '', pdfViewer: '', syntaxValidation: true, }, subscription: { freeTrial: { allowed: true, }, }, featureSwitches: { github: false, }, alphaProgram: false, betaProgram: false, }) var THEME_LIST = [] function generateThemeList() { const files = fs.readdirSync( Path.join(__dirname, '/../../../../node_modules/ace-builds/src-noconflict') ) const result = [] for (const file of files) { if (file.slice(-2) === 'js' && /^theme-/.test(file)) { const cleanName = file.slice(0, -3).slice(6) result.push(THEME_LIST.push(cleanName)) } else { result.push(undefined) } } } generateThemeList() module.exports = ProjectController