mirror of
https://github.com/overleaf/overleaf.git
synced 2024-10-24 21:12:38 -04:00
641b10cceb
Improve GCP logging for web GitOrigin-RevId: 1198fab2e821a55563058171cfa435605216e337
1170 lines
36 KiB
JavaScript
1170 lines
36 KiB
JavaScript
const _ = require('lodash')
|
|
const Path = require('path')
|
|
const OError = require('@overleaf/o-error')
|
|
const fs = require('fs')
|
|
const crypto = require('crypto')
|
|
const async = require('async')
|
|
const logger = require('@overleaf/logger')
|
|
const { ObjectId } = require('mongodb')
|
|
const ProjectDeleter = require('./ProjectDeleter')
|
|
const ProjectDuplicator = require('./ProjectDuplicator')
|
|
const ProjectCreationHandler = require('./ProjectCreationHandler')
|
|
const EditorController = require('../Editor/EditorController')
|
|
const ProjectHelper = require('./ProjectHelper')
|
|
const metrics = require('@overleaf/metrics')
|
|
const { User } = require('../../models/User')
|
|
const TagsHandler = require('../Tags/TagsHandler')
|
|
const SubscriptionLocator = require('../Subscription/SubscriptionLocator')
|
|
const NotificationsHandler = require('../Notifications/NotificationsHandler')
|
|
const LimitationsManager = require('../Subscription/LimitationsManager')
|
|
const Settings = require('@overleaf/settings')
|
|
const AuthorizationManager = require('../Authorization/AuthorizationManager')
|
|
const InactiveProjectManager = require('../InactiveData/InactiveProjectManager')
|
|
const ProjectUpdateHandler = require('./ProjectUpdateHandler')
|
|
const ProjectGetter = require('./ProjectGetter')
|
|
const PrivilegeLevels = require('../Authorization/PrivilegeLevels')
|
|
const SessionManager = require('../Authentication/SessionManager')
|
|
const Sources = require('../Authorization/Sources')
|
|
const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler')
|
|
const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter')
|
|
const ProjectEntityHandler = require('./ProjectEntityHandler')
|
|
const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher')
|
|
const UserGetter = require('../User/UserGetter')
|
|
const NotificationsBuilder = require('../Notifications/NotificationsBuilder')
|
|
const { V1ConnectionError } = require('../Errors/Errors')
|
|
const Features = require('../../infrastructure/Features')
|
|
const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler')
|
|
const UserController = require('../User/UserController')
|
|
const AnalyticsManager = require('../Analytics/AnalyticsManager')
|
|
const Modules = require('../../infrastructure/Modules')
|
|
const SplitTestV2Handler = require('../SplitTests/SplitTestV2Handler')
|
|
const { getNewLogsUIVariantForUser } = require('../Helpers/NewLogsUI')
|
|
const FeaturesUpdater = require('../Subscription/FeaturesUpdater')
|
|
|
|
const _ssoAvailable = (affiliation, session, linkedInstitutionIds) => {
|
|
if (!affiliation.institution) return false
|
|
|
|
// institution.confirmed is for the domain being confirmed, not the email
|
|
// Do not show SSO UI for unconfirmed domains
|
|
if (!affiliation.institution.confirmed) return false
|
|
|
|
// Could have multiple emails at the same institution, and if any are
|
|
// linked to the institution then do not show notification for others
|
|
if (
|
|
linkedInstitutionIds.indexOf(affiliation.institution.id.toString()) === -1
|
|
) {
|
|
if (affiliation.institution.ssoEnabled) return true
|
|
if (affiliation.institution.ssoBeta && session.samlBeta) return true
|
|
return false
|
|
}
|
|
return false
|
|
}
|
|
|
|
const ProjectController = {
|
|
_isInPercentageRollout(rolloutName, objectId, percentage) {
|
|
if (Settings.bypassPercentageRollouts === true) {
|
|
return true
|
|
}
|
|
const data = `${rolloutName}:${objectId.toString()}`
|
|
const md5hash = crypto.createHash('md5').update(data).digest('hex')
|
|
const counter = parseInt(md5hash.slice(26, 32), 16)
|
|
return counter % 100 < percentage
|
|
},
|
|
|
|
updateProjectSettings(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
|
|
const jobs = []
|
|
|
|
if (req.body.compiler != null) {
|
|
jobs.push(callback =>
|
|
EditorController.setCompiler(projectId, req.body.compiler, callback)
|
|
)
|
|
}
|
|
|
|
if (req.body.imageName != null) {
|
|
jobs.push(callback =>
|
|
EditorController.setImageName(projectId, req.body.imageName, callback)
|
|
)
|
|
}
|
|
|
|
if (req.body.name != null) {
|
|
jobs.push(callback =>
|
|
EditorController.renameProject(projectId, req.body.name, callback)
|
|
)
|
|
}
|
|
|
|
if (req.body.spellCheckLanguage != null) {
|
|
jobs.push(callback =>
|
|
EditorController.setSpellCheckLanguage(
|
|
projectId,
|
|
req.body.spellCheckLanguage,
|
|
callback
|
|
)
|
|
)
|
|
}
|
|
|
|
if (req.body.rootDocId != null) {
|
|
jobs.push(callback =>
|
|
EditorController.setRootDoc(projectId, req.body.rootDocId, callback)
|
|
)
|
|
}
|
|
|
|
async.series(jobs, error => {
|
|
if (error != null) {
|
|
return next(error)
|
|
}
|
|
res.sendStatus(204)
|
|
})
|
|
},
|
|
|
|
updateProjectAdminSettings(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
|
|
const jobs = []
|
|
if (req.body.publicAccessLevel != null) {
|
|
jobs.push(callback =>
|
|
EditorController.setPublicAccessLevel(
|
|
projectId,
|
|
req.body.publicAccessLevel,
|
|
callback
|
|
)
|
|
)
|
|
}
|
|
|
|
async.series(jobs, error => {
|
|
if (error != null) {
|
|
return next(error)
|
|
}
|
|
res.sendStatus(204)
|
|
})
|
|
},
|
|
|
|
deleteProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const user = SessionManager.getSessionUser(req.session)
|
|
const cb = err => {
|
|
if (err != null) {
|
|
res.sendStatus(500)
|
|
} else {
|
|
res.sendStatus(200)
|
|
}
|
|
}
|
|
ProjectDeleter.deleteProject(
|
|
projectId,
|
|
{ deleterUser: user, ipAddress: req.ip },
|
|
cb
|
|
)
|
|
},
|
|
|
|
archiveProject(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
|
|
ProjectDeleter.archiveProject(projectId, userId, function (err) {
|
|
if (err != null) {
|
|
return next(err)
|
|
} else {
|
|
return res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
unarchiveProject(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
|
|
ProjectDeleter.unarchiveProject(projectId, userId, function (err) {
|
|
if (err != null) {
|
|
return next(err)
|
|
} else {
|
|
return res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
trashProject(req, res, next) {
|
|
const projectId = req.params.project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
|
|
ProjectDeleter.trashProject(projectId, userId, function (err) {
|
|
if (err != null) {
|
|
return next(err)
|
|
} else {
|
|
return res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
untrashProject(req, res, next) {
|
|
const projectId = req.params.project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
|
|
ProjectDeleter.untrashProject(projectId, userId, function (err) {
|
|
if (err != null) {
|
|
return next(err)
|
|
} else {
|
|
return res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
expireDeletedProjectsAfterDuration(req, res) {
|
|
ProjectDeleter.expireDeletedProjectsAfterDuration(err => {
|
|
if (err != null) {
|
|
res.sendStatus(500)
|
|
} else {
|
|
res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
expireDeletedProject(req, res, next) {
|
|
const { projectId } = req.params
|
|
ProjectDeleter.expireDeletedProject(projectId, err => {
|
|
if (err != null) {
|
|
next(err)
|
|
} else {
|
|
res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
restoreProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
ProjectDeleter.restoreProject(projectId, err => {
|
|
if (err != null) {
|
|
res.sendStatus(500)
|
|
} else {
|
|
res.sendStatus(200)
|
|
}
|
|
})
|
|
},
|
|
|
|
cloneProject(req, res, next) {
|
|
res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete
|
|
metrics.inc('cloned-project')
|
|
const projectId = req.params.Project_id
|
|
const { projectName } = req.body
|
|
logger.log({ projectId, projectName }, 'cloning project')
|
|
if (!SessionManager.isUserLoggedIn(req.session)) {
|
|
return res.send({ redir: '/register' })
|
|
}
|
|
const currentUser = SessionManager.getSessionUser(req.session)
|
|
const { first_name: firstName, last_name: lastName, email } = currentUser
|
|
ProjectDuplicator.duplicate(
|
|
currentUser,
|
|
projectId,
|
|
projectName,
|
|
(err, project) => {
|
|
if (err != null) {
|
|
OError.tag(err, 'error cloning project', {
|
|
projectId,
|
|
userId: currentUser._id,
|
|
})
|
|
return next(err)
|
|
}
|
|
res.send({
|
|
name: project.name,
|
|
project_id: project._id,
|
|
owner_ref: project.owner_ref,
|
|
owner: {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: currentUser._id,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
},
|
|
|
|
newProject(req, res, next) {
|
|
const currentUser = SessionManager.getSessionUser(req.session)
|
|
const {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: userId,
|
|
} = currentUser
|
|
const projectName =
|
|
req.body.projectName != null ? req.body.projectName.trim() : undefined
|
|
const { template } = req.body
|
|
|
|
async.waterfall(
|
|
[
|
|
cb => {
|
|
if (template === 'example') {
|
|
ProjectCreationHandler.createExampleProject(userId, projectName, cb)
|
|
} else {
|
|
ProjectCreationHandler.createBasicProject(userId, projectName, cb)
|
|
}
|
|
},
|
|
],
|
|
(err, project) => {
|
|
if (err != null) {
|
|
return next(err)
|
|
}
|
|
res.send({
|
|
project_id: project._id,
|
|
owner_ref: project.owner_ref,
|
|
owner: {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: userId,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
},
|
|
|
|
renameProject(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
const newName = req.body.newProjectName
|
|
EditorController.renameProject(projectId, newName, err => {
|
|
if (err != null) {
|
|
return next(err)
|
|
}
|
|
res.sendStatus(200)
|
|
})
|
|
},
|
|
|
|
userProjectsJson(req, res, next) {
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
ProjectGetter.findAllUsersProjects(
|
|
userId,
|
|
'name lastUpdated publicAccesLevel archived trashed owner_ref tokens',
|
|
(err, projects) => {
|
|
if (err != null) {
|
|
return next(err)
|
|
}
|
|
|
|
// _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here
|
|
projects = ProjectController._buildProjectList(projects, userId)
|
|
.filter(p => !(p.archived || p.trashed))
|
|
.map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel }))
|
|
|
|
res.json({ projects })
|
|
}
|
|
)
|
|
},
|
|
|
|
projectEntitiesJson(req, res, next) {
|
|
const projectId = req.params.Project_id
|
|
ProjectGetter.getProject(projectId, (err, project) => {
|
|
if (err != null) {
|
|
return next(err)
|
|
}
|
|
ProjectEntityHandler.getAllEntitiesFromProject(
|
|
project,
|
|
(err, docs, files) => {
|
|
if (err != null) {
|
|
return next(err)
|
|
}
|
|
const entities = docs
|
|
.concat(files)
|
|
// Sort by path ascending
|
|
.sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0))
|
|
.map(e => ({
|
|
path: e.path,
|
|
type: e.doc != null ? 'doc' : 'file',
|
|
}))
|
|
res.json({ project_id: projectId, entities })
|
|
}
|
|
)
|
|
})
|
|
},
|
|
|
|
projectListPage(req, res, next) {
|
|
const timer = new metrics.Timer('project-list')
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
const currentUser = SessionManager.getSessionUser(req.session)
|
|
async.parallel(
|
|
{
|
|
tags(cb) {
|
|
TagsHandler.getAllTags(userId, cb)
|
|
},
|
|
notifications(cb) {
|
|
NotificationsHandler.getUserNotifications(userId, cb)
|
|
},
|
|
projects(cb) {
|
|
ProjectGetter.findAllUsersProjects(
|
|
userId,
|
|
'name lastUpdated lastUpdatedBy publicAccesLevel archived trashed owner_ref tokens',
|
|
cb
|
|
)
|
|
},
|
|
hasSubscription(cb) {
|
|
LimitationsManager.hasPaidSubscription(
|
|
currentUser,
|
|
(error, hasPaidSubscription) => {
|
|
if (error != null && error instanceof V1ConnectionError) {
|
|
return cb(null, true)
|
|
}
|
|
cb(error, hasPaidSubscription)
|
|
}
|
|
)
|
|
},
|
|
user(cb) {
|
|
User.findById(
|
|
userId,
|
|
'emails featureSwitches overleaf awareOfV2 features lastLoginIp',
|
|
cb
|
|
)
|
|
},
|
|
userEmailsData(cb) {
|
|
const result = { list: [], allInReconfirmNotificationPeriods: [] }
|
|
|
|
UserGetter.getUserFullEmails(userId, (error, fullEmails) => {
|
|
if (error && error instanceof V1ConnectionError) {
|
|
return cb(null, result)
|
|
}
|
|
|
|
if (!Features.hasFeature('affiliations')) {
|
|
result.list = fullEmails
|
|
return cb(null, result)
|
|
}
|
|
Modules.hooks.fire(
|
|
'allInReconfirmNotificationPeriodsForUser',
|
|
fullEmails,
|
|
(error, results) => {
|
|
if (error != null) {
|
|
return cb(error)
|
|
}
|
|
|
|
// Module.hooks.fire accepts multiple methods
|
|
// and does async.series
|
|
const allInReconfirmNotificationPeriods =
|
|
(results && results[0]) || []
|
|
return cb(null, {
|
|
list: fullEmails,
|
|
allInReconfirmNotificationPeriods,
|
|
})
|
|
}
|
|
)
|
|
})
|
|
},
|
|
},
|
|
(err, results) => {
|
|
if (err != null) {
|
|
OError.tag(err, 'error getting data for project list page')
|
|
return next(err)
|
|
}
|
|
const { notifications, user, userEmailsData } = results
|
|
|
|
const userEmails = userEmailsData.list || []
|
|
|
|
const userAffiliations = userEmails
|
|
.filter(emailData => !!emailData.affiliation)
|
|
.map(emailData => {
|
|
const result = emailData.affiliation
|
|
result.email = emailData.email
|
|
return result
|
|
})
|
|
|
|
const { allInReconfirmNotificationPeriods } = userEmailsData
|
|
|
|
// Handle case of deleted user
|
|
if (user == null) {
|
|
UserController.logout(req, res, next)
|
|
return
|
|
}
|
|
const tags = results.tags
|
|
const notificationsInstitution = []
|
|
for (const notification of notifications) {
|
|
notification.html = req.i18n.translate(
|
|
notification.templateKey,
|
|
notification.messageOpts
|
|
)
|
|
}
|
|
|
|
// Institution SSO Notifications
|
|
let reconfirmedViaSAML
|
|
if (Features.hasFeature('saml')) {
|
|
reconfirmedViaSAML = _.get(req.session, ['saml', 'reconfirmed'])
|
|
const samlSession = req.session.saml
|
|
// Notification: SSO Available
|
|
const linkedInstitutionIds = []
|
|
user.emails.forEach(email => {
|
|
if (email.samlProviderId) {
|
|
linkedInstitutionIds.push(email.samlProviderId)
|
|
}
|
|
})
|
|
if (Array.isArray(userAffiliations)) {
|
|
userAffiliations.forEach(affiliation => {
|
|
if (
|
|
_ssoAvailable(affiliation, req.session, linkedInstitutionIds)
|
|
) {
|
|
notificationsInstitution.push({
|
|
email: affiliation.email,
|
|
institutionId: affiliation.institution.id,
|
|
institutionName: affiliation.institution.name,
|
|
templateKey: 'notification_institution_sso_available',
|
|
})
|
|
}
|
|
})
|
|
}
|
|
|
|
if (samlSession) {
|
|
// Notification: After SSO Linked
|
|
if (samlSession.linked) {
|
|
notificationsInstitution.push({
|
|
email: samlSession.institutionEmail,
|
|
institutionName: samlSession.linked.universityName,
|
|
templateKey: 'notification_institution_sso_linked',
|
|
})
|
|
}
|
|
|
|
// Notification: After SSO Linked or Logging in
|
|
// The requested email does not match primary email returned from
|
|
// the institution
|
|
if (
|
|
samlSession.requestedEmail &&
|
|
samlSession.emailNonCanonical &&
|
|
!samlSession.error
|
|
) {
|
|
notificationsInstitution.push({
|
|
institutionEmail: samlSession.emailNonCanonical,
|
|
requestedEmail: samlSession.requestedEmail,
|
|
templateKey: 'notification_institution_sso_non_canonical',
|
|
})
|
|
}
|
|
|
|
// Notification: Tried to register, but account already existed
|
|
// registerIntercept is set before the institution callback.
|
|
// institutionEmail is set after institution callback.
|
|
// Check for both in case SSO flow was abandoned
|
|
if (
|
|
samlSession.registerIntercept &&
|
|
samlSession.institutionEmail &&
|
|
!samlSession.error
|
|
) {
|
|
notificationsInstitution.push({
|
|
email: samlSession.institutionEmail,
|
|
templateKey: 'notification_institution_sso_already_registered',
|
|
})
|
|
}
|
|
|
|
// Notification: When there is a session error
|
|
if (samlSession.error) {
|
|
notificationsInstitution.push({
|
|
templateKey: 'notification_institution_sso_error',
|
|
error: samlSession.error,
|
|
})
|
|
}
|
|
}
|
|
delete req.session.saml
|
|
}
|
|
|
|
const portalTemplates = ProjectController._buildPortalTemplatesList(
|
|
userAffiliations
|
|
)
|
|
const projects = ProjectController._buildProjectList(
|
|
results.projects,
|
|
userId
|
|
)
|
|
|
|
// in v2 add notifications for matching university IPs
|
|
if (Settings.overleaf != null && req.ip !== user.lastLoginIp) {
|
|
NotificationsBuilder.ipMatcherAffiliation(user._id).create(
|
|
req.ip,
|
|
() => {}
|
|
)
|
|
}
|
|
|
|
ProjectController._injectProjectUsers(projects, (error, projects) => {
|
|
if (error != null) {
|
|
return next(error)
|
|
}
|
|
const viewModel = {
|
|
title: 'your_projects',
|
|
priority_title: true,
|
|
projects,
|
|
tags,
|
|
notifications: notifications || [],
|
|
notificationsInstitution,
|
|
allInReconfirmNotificationPeriods,
|
|
portalTemplates,
|
|
user,
|
|
userAffiliations,
|
|
userEmails,
|
|
hasSubscription: results.hasSubscription,
|
|
reconfirmedViaSAML,
|
|
zipFileSizeLimit: Settings.maxUploadSize,
|
|
isOverleaf: !!Settings.overleaf,
|
|
}
|
|
|
|
const paidUser =
|
|
(user.features != null ? user.features.github : undefined) &&
|
|
(user.features != null ? user.features.dropbox : undefined) // use a heuristic for paid account
|
|
const freeUserProportion = 0.1
|
|
const sampleFreeUser =
|
|
parseInt(user._id.toString().slice(-2), 16) <
|
|
freeUserProportion * 255
|
|
const showFrontWidget = paidUser || sampleFreeUser
|
|
|
|
if (showFrontWidget) {
|
|
viewModel.frontChatWidgetRoomId =
|
|
Settings.overleaf != null
|
|
? Settings.overleaf.front_chat_widget_room_id
|
|
: undefined
|
|
}
|
|
|
|
res.render('project/list', viewModel)
|
|
timer.done()
|
|
})
|
|
}
|
|
)
|
|
},
|
|
|
|
loadEditor(req, res, next) {
|
|
const timer = new metrics.Timer('load-editor')
|
|
if (!Settings.editorIsOpen) {
|
|
return res.render('general/closed', { title: 'updating_site' })
|
|
}
|
|
|
|
let anonymous, userId, sessionUser
|
|
if (SessionManager.isUserLoggedIn(req.session)) {
|
|
sessionUser = SessionManager.getSessionUser(req.session)
|
|
userId = SessionManager.getLoggedInUserId(req.session)
|
|
anonymous = false
|
|
} else {
|
|
sessionUser = null
|
|
anonymous = true
|
|
userId = null
|
|
}
|
|
|
|
const projectId = req.params.Project_id
|
|
|
|
async.auto(
|
|
{
|
|
project(cb) {
|
|
ProjectGetter.getProject(
|
|
projectId,
|
|
{
|
|
name: 1,
|
|
lastUpdated: 1,
|
|
track_changes: 1,
|
|
owner_ref: 1,
|
|
brandVariationId: 1,
|
|
overleaf: 1,
|
|
tokens: 1,
|
|
},
|
|
(err, project) => {
|
|
if (err != null) {
|
|
return cb(err)
|
|
}
|
|
cb(null, project)
|
|
}
|
|
)
|
|
},
|
|
user(cb) {
|
|
if (userId == null) {
|
|
cb(null, defaultSettingsForAnonymousUser(userId))
|
|
} else {
|
|
User.findById(
|
|
userId,
|
|
'email first_name last_name referal_id signUpDate featureSwitches features featuresEpoch refProviders alphaProgram betaProgram isAdmin ace',
|
|
(err, user) => {
|
|
// Handle case of deleted user
|
|
if (user == null) {
|
|
UserController.logout(req, res, next)
|
|
return
|
|
}
|
|
if (err) {
|
|
return cb(err)
|
|
}
|
|
logger.log({ projectId, userId }, 'got user')
|
|
if (FeaturesUpdater.featuresEpochIsCurrent(user)) {
|
|
return cb(null, user)
|
|
}
|
|
ProjectController._refreshFeatures(req, user, cb)
|
|
}
|
|
)
|
|
}
|
|
},
|
|
subscription(cb) {
|
|
if (userId == null) {
|
|
return cb()
|
|
}
|
|
SubscriptionLocator.getUsersSubscription(userId, cb)
|
|
},
|
|
activate(cb) {
|
|
InactiveProjectManager.reactivateProjectIfRequired(projectId, cb)
|
|
},
|
|
markAsOpened(cb) {
|
|
// don't need to wait for this to complete
|
|
ProjectUpdateHandler.markAsOpened(projectId, () => {})
|
|
cb()
|
|
},
|
|
isTokenMember(cb) {
|
|
if (userId == null) {
|
|
return cb()
|
|
}
|
|
CollaboratorsGetter.userIsTokenMember(userId, projectId, cb)
|
|
},
|
|
brandVariation: [
|
|
'project',
|
|
(cb, results) => {
|
|
if (
|
|
(results.project != null
|
|
? results.project.brandVariationId
|
|
: undefined) == null
|
|
) {
|
|
return cb()
|
|
}
|
|
BrandVariationsHandler.getBrandVariationById(
|
|
results.project.brandVariationId,
|
|
(error, brandVariationDetails) => cb(error, brandVariationDetails)
|
|
)
|
|
},
|
|
],
|
|
flushToTpds: cb => {
|
|
TpdsProjectFlusher.flushProjectToTpdsIfNeeded(projectId, cb)
|
|
},
|
|
sharingModalSplitTest(cb) {
|
|
SplitTestV2Handler.assignInLocalsContext(
|
|
res,
|
|
userId,
|
|
'project-share-modal-paywall',
|
|
err => {
|
|
cb(err, null)
|
|
}
|
|
)
|
|
},
|
|
},
|
|
(err, { project, user, subscription, isTokenMember, brandVariation }) => {
|
|
if (err != null) {
|
|
OError.tag(err, 'error getting details for project page')
|
|
return next(err)
|
|
}
|
|
const anonRequestToken = TokenAccessHandler.getRequestToken(
|
|
req,
|
|
projectId
|
|
)
|
|
const allowedImageNames = ProjectHelper.getAllowedImagesForUser(
|
|
sessionUser
|
|
)
|
|
|
|
AuthorizationManager.getPrivilegeLevelForProject(
|
|
userId,
|
|
projectId,
|
|
anonRequestToken,
|
|
(error, privilegeLevel) => {
|
|
let allowedFreeTrial = true
|
|
if (error != null) {
|
|
return next(error)
|
|
}
|
|
if (
|
|
privilegeLevel == null ||
|
|
privilegeLevel === PrivilegeLevels.NONE
|
|
) {
|
|
return res.sendStatus(401)
|
|
}
|
|
|
|
if (subscription != null) {
|
|
allowedFreeTrial = false
|
|
}
|
|
|
|
let wsUrl = Settings.wsUrl
|
|
let metricName = 'load-editor-ws'
|
|
if (user.betaProgram && Settings.wsUrlBeta !== undefined) {
|
|
wsUrl = Settings.wsUrlBeta
|
|
metricName += '-beta'
|
|
} else if (
|
|
Settings.wsUrlV2 &&
|
|
Settings.wsUrlV2Percentage > 0 &&
|
|
(ObjectId(projectId).getTimestamp() / 1000) % 100 <
|
|
Settings.wsUrlV2Percentage
|
|
) {
|
|
wsUrl = Settings.wsUrlV2
|
|
metricName += '-v2'
|
|
}
|
|
if (req.query && req.query.ws === 'fallback') {
|
|
// `?ws=fallback` will connect to the bare origin, and ignore
|
|
// the custom wsUrl. Hence it must load the client side
|
|
// javascript from there too.
|
|
// Not resetting it here would possibly load a socket.io v2
|
|
// client and connect to a v0 endpoint.
|
|
wsUrl = undefined
|
|
metricName += '-fallback'
|
|
}
|
|
metrics.inc(metricName)
|
|
|
|
if (userId) {
|
|
AnalyticsManager.recordEventForUser(userId, 'project-opened', {
|
|
projectId: project._id,
|
|
})
|
|
}
|
|
|
|
const logsUIVariant = getNewLogsUIVariantForUser(user)
|
|
|
|
function shouldDisplayFeature(name, variantFlag) {
|
|
if (req.query && req.query[name]) {
|
|
return req.query[name] === 'true'
|
|
} else {
|
|
return variantFlag === true
|
|
}
|
|
}
|
|
|
|
function partOfPdfCachingRollout(flag) {
|
|
if (!Settings.enablePdfCaching) {
|
|
// The feature is disabled globally.
|
|
return false
|
|
}
|
|
// Let the user opt-in only.
|
|
// The flag will opt-out of both caching and metrics collection,
|
|
// as if this editing session never happened.
|
|
return shouldDisplayFeature('enable_pdf_caching', false)
|
|
}
|
|
|
|
res.render('project/editor', {
|
|
title: project.name,
|
|
priority_title: true,
|
|
bodyClasses: ['editor'],
|
|
project_id: project._id,
|
|
user: {
|
|
id: userId,
|
|
email: user.email,
|
|
first_name: user.first_name,
|
|
last_name: user.last_name,
|
|
referal_id: user.referal_id,
|
|
signUpDate: user.signUpDate,
|
|
allowedFreeTrial: allowedFreeTrial,
|
|
featureSwitches: user.featureSwitches,
|
|
features: user.features,
|
|
refProviders: _.mapValues(user.refProviders, Boolean),
|
|
alphaProgram: user.alphaProgram,
|
|
betaProgram: user.betaProgram,
|
|
isAdmin: user.isAdmin,
|
|
},
|
|
userSettings: {
|
|
mode: user.ace.mode,
|
|
editorTheme: user.ace.theme,
|
|
fontSize: user.ace.fontSize,
|
|
autoComplete: user.ace.autoComplete,
|
|
autoPairDelimiters: user.ace.autoPairDelimiters,
|
|
pdfViewer: user.ace.pdfViewer,
|
|
syntaxValidation: user.ace.syntaxValidation,
|
|
fontFamily: user.ace.fontFamily || 'lucida',
|
|
lineHeight: user.ace.lineHeight || 'normal',
|
|
overallTheme: user.ace.overallTheme,
|
|
},
|
|
privilegeLevel,
|
|
anonymous,
|
|
anonymousAccessToken: anonymous ? anonRequestToken : null,
|
|
isTokenMember,
|
|
isRestrictedTokenMember: AuthorizationManager.isRestrictedUser(
|
|
userId,
|
|
privilegeLevel,
|
|
isTokenMember
|
|
),
|
|
languages: Settings.languages,
|
|
editorThemes: THEME_LIST,
|
|
maxDocLength: Settings.max_doc_length,
|
|
useV2History:
|
|
project.overleaf &&
|
|
project.overleaf.history &&
|
|
Boolean(project.overleaf.history.display),
|
|
brandVariation,
|
|
allowedImageNames,
|
|
gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl,
|
|
wsUrl,
|
|
showSupport: Features.hasFeature('support'),
|
|
showNewLogsUI: shouldDisplayFeature(
|
|
'new_logs_ui',
|
|
logsUIVariant.newLogsUI
|
|
),
|
|
logsUISubvariant: logsUIVariant.subvariant,
|
|
showNewNavigationUI: shouldDisplayFeature(
|
|
'new_navigation_ui',
|
|
true
|
|
),
|
|
showNewPdfPreview: shouldDisplayFeature(
|
|
'new_pdf_preview',
|
|
user.alphaProgram
|
|
),
|
|
showSymbolPalette: shouldDisplayFeature(
|
|
'symbol_palette',
|
|
user.alphaProgram || user.betaProgram
|
|
),
|
|
trackPdfDownload: partOfPdfCachingRollout('collect-metrics'),
|
|
enablePdfCaching: partOfPdfCachingRollout('enable-caching'),
|
|
resetServiceWorker:
|
|
Boolean(Settings.resetServiceWorker) &&
|
|
!shouldDisplayFeature('enable_pdf_caching', false),
|
|
})
|
|
timer.done()
|
|
}
|
|
)
|
|
}
|
|
)
|
|
},
|
|
|
|
_refreshFeatures(req, user, callback) {
|
|
// If the feature refresh has failed in this session, don't retry
|
|
// it - require the user to log in again.
|
|
if (req.session.feature_refresh_failed) {
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'skipped',
|
|
})
|
|
return callback(null, user)
|
|
}
|
|
// If the refresh takes too long then return the current
|
|
// features. Note that the user.features property may still be
|
|
// updated in the background after the callback is called.
|
|
callback = _.once(callback)
|
|
const refreshTimeoutHandler = setTimeout(() => {
|
|
req.session.feature_refresh_failed = { reason: 'timeout', at: new Date() }
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'timeout',
|
|
})
|
|
callback(null, user)
|
|
}, 5000)
|
|
// try to refresh user features now
|
|
const timer = new metrics.Timer('features-refresh-on-load-editor')
|
|
FeaturesUpdater.refreshFeatures(
|
|
user._id,
|
|
'load-editor',
|
|
(err, features) => {
|
|
clearTimeout(refreshTimeoutHandler)
|
|
timer.done()
|
|
if (err) {
|
|
// keep a record to prevent unneceary retries and leave
|
|
// the original features unmodified if the refresh failed
|
|
req.session.feature_refresh_failed = {
|
|
reason: 'error',
|
|
at: new Date(),
|
|
}
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'error',
|
|
})
|
|
} else {
|
|
user.features = features
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'success',
|
|
})
|
|
}
|
|
return callback(null, user)
|
|
}
|
|
)
|
|
},
|
|
|
|
_buildProjectList(allProjects, userId) {
|
|
let project
|
|
const {
|
|
owned,
|
|
readAndWrite,
|
|
readOnly,
|
|
tokenReadAndWrite,
|
|
tokenReadOnly,
|
|
} = allProjects
|
|
const projects = []
|
|
for (project of owned) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'owner',
|
|
Sources.OWNER,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
// Invite-access
|
|
for (project of readAndWrite) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readWrite',
|
|
Sources.INVITE,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
for (project of readOnly) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readOnly',
|
|
Sources.INVITE,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
// Token-access
|
|
// Only add these projects if they're not already present, this gives us cascading access
|
|
// from 'owner' => 'token-read-only'
|
|
for (project of tokenReadAndWrite) {
|
|
if (
|
|
projects.filter(p => p.id.toString() === project._id.toString())
|
|
.length === 0
|
|
) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readAndWrite',
|
|
Sources.TOKEN,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
}
|
|
for (project of tokenReadOnly) {
|
|
if (
|
|
projects.filter(p => p.id.toString() === project._id.toString())
|
|
.length === 0
|
|
) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readOnly',
|
|
Sources.TOKEN,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
}
|
|
|
|
return projects
|
|
},
|
|
|
|
_buildProjectViewModel(project, accessLevel, source, userId) {
|
|
const archived = ProjectHelper.isArchived(project, userId)
|
|
// If a project is simultaneously trashed and archived, we will consider it archived but not trashed.
|
|
const trashed = ProjectHelper.isTrashed(project, userId) && !archived
|
|
|
|
TokenAccessHandler.protectTokens(project, accessLevel)
|
|
const model = {
|
|
id: project._id,
|
|
name: project.name,
|
|
lastUpdated: project.lastUpdated,
|
|
lastUpdatedBy: project.lastUpdatedBy,
|
|
publicAccessLevel: project.publicAccesLevel,
|
|
accessLevel,
|
|
source,
|
|
archived,
|
|
trashed,
|
|
owner_ref: project.owner_ref,
|
|
isV1Project: false,
|
|
}
|
|
if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) {
|
|
model.owner_ref = null
|
|
model.lastUpdatedBy = null
|
|
}
|
|
return model
|
|
},
|
|
|
|
_injectProjectUsers(projects, callback) {
|
|
const users = {}
|
|
for (const project of projects) {
|
|
if (project.owner_ref != null) {
|
|
users[project.owner_ref.toString()] = true
|
|
}
|
|
if (project.lastUpdatedBy != null) {
|
|
users[project.lastUpdatedBy.toString()] = true
|
|
}
|
|
}
|
|
|
|
const userIds = Object.keys(users)
|
|
async.eachSeries(
|
|
userIds,
|
|
(userId, cb) => {
|
|
UserGetter.getUser(
|
|
userId,
|
|
{ first_name: 1, last_name: 1, email: 1 },
|
|
(error, user) => {
|
|
if (error != null) {
|
|
return cb(error)
|
|
}
|
|
users[userId] = user
|
|
cb()
|
|
}
|
|
)
|
|
},
|
|
error => {
|
|
if (error != null) {
|
|
return callback(error)
|
|
}
|
|
for (const project of projects) {
|
|
if (project.owner_ref != null) {
|
|
project.owner = users[project.owner_ref.toString()]
|
|
}
|
|
if (project.lastUpdatedBy != null) {
|
|
project.lastUpdatedBy =
|
|
users[project.lastUpdatedBy.toString()] || null
|
|
}
|
|
}
|
|
callback(null, projects)
|
|
}
|
|
)
|
|
},
|
|
|
|
_buildPortalTemplatesList(affiliations) {
|
|
if (affiliations == null) {
|
|
affiliations = []
|
|
}
|
|
const portalTemplates = []
|
|
for (const aff of affiliations) {
|
|
if (
|
|
aff.portal &&
|
|
aff.portal.slug &&
|
|
aff.portal.templates_count &&
|
|
aff.portal.templates_count > 0
|
|
) {
|
|
const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/'
|
|
portalTemplates.push({
|
|
name: aff.institution.name,
|
|
url: Settings.siteUrl + portalPath + aff.portal.slug,
|
|
})
|
|
}
|
|
}
|
|
return portalTemplates
|
|
},
|
|
}
|
|
|
|
const defaultSettingsForAnonymousUser = userId => ({
|
|
id: userId,
|
|
ace: {
|
|
mode: 'none',
|
|
theme: 'textmate',
|
|
fontSize: '12',
|
|
autoComplete: true,
|
|
spellCheckLanguage: '',
|
|
pdfViewer: '',
|
|
syntaxValidation: true,
|
|
},
|
|
subscription: {
|
|
freeTrial: {
|
|
allowed: true,
|
|
},
|
|
},
|
|
featureSwitches: {
|
|
github: false,
|
|
},
|
|
alphaProgram: false,
|
|
betaProgram: false,
|
|
})
|
|
|
|
const THEME_LIST = []
|
|
function generateThemeList() {
|
|
const files = fs.readdirSync(
|
|
Path.join(__dirname, '/../../../../node_modules/ace-builds/src-noconflict')
|
|
)
|
|
const result = []
|
|
for (const file of files) {
|
|
if (file.slice(-2) === 'js' && /^theme-/.test(file)) {
|
|
const cleanName = file.slice(0, -3).slice(6)
|
|
result.push(THEME_LIST.push(cleanName))
|
|
} else {
|
|
result.push(undefined)
|
|
}
|
|
}
|
|
}
|
|
generateThemeList()
|
|
|
|
module.exports = ProjectController
|