2017-09-18 17:53:42 +01:00
|
|
|
// Copyright 2016 Documize Inc. <legal@documize.com>. All rights reserved.
|
|
|
|
//
|
|
|
|
// This software (Documize Community Edition) is licensed under
|
|
|
|
// GNU AGPL v3 http://www.gnu.org/licenses/agpl-3.0.en.html
|
|
|
|
//
|
|
|
|
// You can operate outside the AGPL restrictions by purchasing
|
|
|
|
// Documize Enterprise Edition and obtaining a commercial license
|
|
|
|
// by contacting <sales@documize.com>.
|
|
|
|
//
|
|
|
|
// https://documize.com
|
|
|
|
|
|
|
|
// Package permission handles API calls and persistence for spaces.
|
|
|
|
// Spaces in Documize contain documents.
|
|
|
|
package permission
|
|
|
|
|
|
|
|
import (
|
|
|
|
"database/sql"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
|
|
|
|
"github.com/documize/community/core/env"
|
|
|
|
"github.com/documize/community/core/request"
|
|
|
|
"github.com/documize/community/core/response"
|
|
|
|
"github.com/documize/community/core/streamutil"
|
|
|
|
"github.com/documize/community/core/stringutil"
|
|
|
|
"github.com/documize/community/domain"
|
|
|
|
"github.com/documize/community/domain/mail"
|
|
|
|
"github.com/documize/community/model/audit"
|
|
|
|
"github.com/documize/community/model/permission"
|
|
|
|
"github.com/documize/community/model/space"
|
2017-09-21 15:48:00 +01:00
|
|
|
"github.com/documize/community/model/user"
|
2017-09-18 17:53:42 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Handler contains the runtime information such as logging and database.
|
|
|
|
type Handler struct {
|
|
|
|
Runtime *env.Runtime
|
|
|
|
Store *domain.Store
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetSpacePermissions persists specified space permissions
|
|
|
|
func (h *Handler) SetSpacePermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.SetPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
id := request.Param(r, "spaceID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "spaceID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
if !HasPermission(ctx, *h.Store, id, permission.SpaceManage, permission.SpaceOwner) {
|
|
|
|
response.WriteForbiddenError(w)
|
2017-09-18 17:53:42 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
sp, err := h.Store.Space.Get(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteNotFoundError(w, method, "space not found")
|
2017-09-18 17:53:42 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-12-26 13:25:10 +00:00
|
|
|
var model = permission.SpaceRequestModel{}
|
2017-09-18 17:53:42 +01:00
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// We compare new permisions to what we had before.
|
|
|
|
// Why? So we can send out space invitation emails.
|
|
|
|
previousRoles, err := h.Store.Permission.GetSpacePermissions(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store all previous roles as map for easy querying
|
|
|
|
previousRoleUsers := make(map[string]bool)
|
|
|
|
for _, v := range previousRoles {
|
|
|
|
previousRoleUsers[v.WhoID] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Who is sharing this space?
|
|
|
|
inviter, err := h.Store.User.Get(ctx, ctx.UserID)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nuke all previous permissions for this space
|
|
|
|
_, err = h.Store.Permission.DeleteSpacePermissions(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
me := false
|
|
|
|
hasEveryoneRole := false
|
|
|
|
roleCount := 0
|
|
|
|
|
|
|
|
url := ctx.GetAppURL(fmt.Sprintf("s/%s/%s", sp.RefID, stringutil.MakeSlug(sp.Name)))
|
|
|
|
|
|
|
|
for _, perm := range model.Permissions {
|
|
|
|
perm.OrgID = ctx.OrgID
|
|
|
|
perm.SpaceID = id
|
|
|
|
|
|
|
|
// Ensure the space owner always has access!
|
|
|
|
if perm.UserID == ctx.UserID {
|
|
|
|
me = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only persist if there is a role!
|
|
|
|
if permission.HasAnyPermission(perm) {
|
|
|
|
// identify publically shared spaces
|
2017-10-04 13:27:48 -04:00
|
|
|
if perm.UserID == "0" || perm.UserID == "" {
|
|
|
|
perm.UserID = "0"
|
2017-09-18 17:53:42 +01:00
|
|
|
hasEveryoneRole = true
|
|
|
|
}
|
|
|
|
|
|
|
|
r := permission.EncodeUserPermissions(perm)
|
|
|
|
|
|
|
|
for _, p := range r {
|
|
|
|
err = h.Store.Permission.AddPermission(ctx, p)
|
|
|
|
if err != nil {
|
|
|
|
h.Runtime.Log.Error("set permission", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
roleCount++
|
|
|
|
}
|
|
|
|
|
|
|
|
// We send out space invitation emails to those users
|
|
|
|
// that have *just* been given permissions.
|
|
|
|
if _, isExisting := previousRoleUsers[perm.UserID]; !isExisting {
|
|
|
|
|
|
|
|
// we skip 'everyone' (user id != empty string)
|
2017-10-04 13:27:48 -04:00
|
|
|
if perm.UserID != "0" && perm.UserID != "" {
|
2017-09-18 17:53:42 +01:00
|
|
|
existingUser, err := h.Store.User.Get(ctx, perm.UserID)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
mailer := mail.Mailer{Runtime: h.Runtime, Store: h.Store, Context: ctx}
|
|
|
|
go mailer.ShareSpaceExistingUser(existingUser.Email, inviter.Fullname(), url, sp.Name, model.Message)
|
|
|
|
h.Runtime.Log.Info(fmt.Sprintf("%s is sharing space %s with existing user %s", inviter.Email, sp.Name, existingUser.Email))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do we need to ensure permissions for space owner when shared?
|
|
|
|
if !me {
|
|
|
|
perm := permission.Permission{}
|
|
|
|
perm.OrgID = ctx.OrgID
|
|
|
|
perm.Who = "user"
|
|
|
|
perm.WhoID = ctx.UserID
|
|
|
|
perm.Scope = "object"
|
|
|
|
perm.Location = "space"
|
|
|
|
perm.RefID = id
|
|
|
|
perm.Action = "" // we send array for actions below
|
|
|
|
|
|
|
|
err = h.Store.Permission.AddPermissions(ctx, perm, permission.SpaceView, permission.SpaceManage)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark up space type as either public, private or restricted access.
|
|
|
|
if hasEveryoneRole {
|
|
|
|
sp.Type = space.ScopePublic
|
|
|
|
} else {
|
|
|
|
if roleCount > 1 {
|
|
|
|
sp.Type = space.ScopeRestricted
|
|
|
|
} else {
|
|
|
|
sp.Type = space.ScopePrivate
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = h.Store.Space.Update(ctx, sp)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction.Commit()
|
|
|
|
|
2018-02-04 15:43:57 +00:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpacePermission)
|
|
|
|
|
2017-09-18 17:53:42 +01:00
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
// GetSpacePermissions returns permissions for all users for given space.
|
2017-09-18 17:53:42 +01:00
|
|
|
func (h *Handler) GetSpacePermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
spaceID := request.Param(r, "spaceID")
|
|
|
|
if len(spaceID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "spaceID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
perms, err := h.Store.Permission.GetSpacePermissions(ctx, spaceID)
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(perms) == 0 {
|
|
|
|
perms = []permission.Permission{}
|
|
|
|
}
|
|
|
|
|
|
|
|
userPerms := make(map[string][]permission.Permission)
|
|
|
|
for _, p := range perms {
|
|
|
|
userPerms[p.WhoID] = append(userPerms[p.WhoID], p)
|
|
|
|
}
|
|
|
|
|
|
|
|
records := []permission.Record{}
|
|
|
|
for _, up := range userPerms {
|
|
|
|
records = append(records, permission.DecodeUserPermissions(up))
|
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, records)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetUserSpacePermissions returns permissions for the requested space, for current user.
|
|
|
|
func (h *Handler) GetUserSpacePermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetUserSpacePermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
spaceID := request.Param(r, "spaceID")
|
|
|
|
if len(spaceID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "spaceID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
perms, err := h.Store.Permission.GetUserSpacePermissions(ctx, spaceID)
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(perms) == 0 {
|
|
|
|
perms = []permission.Permission{}
|
|
|
|
}
|
|
|
|
|
|
|
|
record := permission.DecodeUserPermissions(perms)
|
|
|
|
response.WriteJSON(w, record)
|
|
|
|
}
|
2017-09-21 15:48:00 +01:00
|
|
|
|
2017-09-21 18:59:43 +01:00
|
|
|
// GetCategoryViewers returns user permissions for given category.
|
|
|
|
func (h *Handler) GetCategoryViewers(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetCategoryViewers"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
categoryID := request.Param(r, "categoryID")
|
|
|
|
if len(categoryID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "categoryID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
u, err := h.Store.Permission.GetCategoryUsers(ctx, categoryID)
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(u) == 0 {
|
|
|
|
u = []user.User{}
|
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, u)
|
|
|
|
}
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
// GetCategoryPermissions returns user permissions for given category.
|
|
|
|
func (h *Handler) GetCategoryPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetCategoryPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
categoryID := request.Param(r, "categoryID")
|
|
|
|
if len(categoryID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "categoryID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-21 18:59:43 +01:00
|
|
|
u, err := h.Store.Permission.GetCategoryPermissions(ctx, categoryID)
|
2017-09-21 15:48:00 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(u) == 0 {
|
2017-09-21 18:59:43 +01:00
|
|
|
u = []permission.Permission{}
|
2017-09-21 15:48:00 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, u)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetCategoryPermissions persists specified category permissions
|
|
|
|
func (h *Handler) SetCategoryPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "permission.SetCategoryPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
id := request.Param(r, "categoryID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "categoryID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-22 08:52:11 +01:00
|
|
|
spaceID := request.Query(r, "space")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "space")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var model = []permission.CategoryViewRequestModel{}
|
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if !HasPermission(ctx, *h.Store, spaceID, permission.SpaceManage, permission.SpaceOwner) {
|
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nuke all previous permissions for this category
|
|
|
|
_, err = h.Store.Permission.DeleteCategoryPermissions(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range model {
|
|
|
|
perm := permission.Permission{}
|
|
|
|
perm.OrgID = ctx.OrgID
|
|
|
|
perm.Who = "user"
|
|
|
|
perm.WhoID = m.UserID
|
|
|
|
perm.Scope = "object"
|
|
|
|
perm.Location = "category"
|
|
|
|
perm.RefID = m.CategoryID
|
|
|
|
perm.Action = permission.CategoryView
|
|
|
|
|
|
|
|
err = h.Store.Permission.AddPermission(ctx, perm)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction.Commit()
|
|
|
|
|
2018-02-04 15:43:57 +00:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeCategoryPermission)
|
|
|
|
|
2017-09-21 15:48:00 +01:00
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|
2017-12-26 13:25:10 +00:00
|
|
|
|
|
|
|
// GetDocumentPermissions returns permissions for all users for given document.
|
|
|
|
func (h *Handler) GetDocumentPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetDocumentPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
documentID := request.Param(r, "documentID")
|
|
|
|
if len(documentID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "documentID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
perms, err := h.Store.Permission.GetDocumentPermissions(ctx, documentID)
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(perms) == 0 {
|
|
|
|
perms = []permission.Permission{}
|
|
|
|
}
|
|
|
|
|
|
|
|
userPerms := make(map[string][]permission.Permission)
|
|
|
|
for _, p := range perms {
|
|
|
|
userPerms[p.WhoID] = append(userPerms[p.WhoID], p)
|
|
|
|
}
|
|
|
|
|
|
|
|
records := []permission.DocumentRecord{}
|
|
|
|
for _, up := range userPerms {
|
|
|
|
records = append(records, permission.DecodeUserDocumentPermissions(up))
|
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, records)
|
|
|
|
}
|
|
|
|
|
2018-01-10 16:07:17 +00:00
|
|
|
// GetUserDocumentPermissions returns permissions for the requested document, for current user.
|
2017-12-26 13:25:10 +00:00
|
|
|
func (h *Handler) GetUserDocumentPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetUserDocumentPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
documentID := request.Param(r, "documentID")
|
|
|
|
if len(documentID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "documentID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
perms, err := h.Store.Permission.GetUserDocumentPermissions(ctx, documentID)
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(perms) == 0 {
|
|
|
|
perms = []permission.Permission{}
|
|
|
|
}
|
|
|
|
|
|
|
|
record := permission.DecodeUserDocumentPermissions(perms)
|
|
|
|
response.WriteJSON(w, record)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetDocumentPermissions persists specified document permissions
|
|
|
|
// These permissions override document permissions
|
|
|
|
func (h *Handler) SetDocumentPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.SetDocumentPermissions"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
|
|
|
|
|
|
|
id := request.Param(r, "documentID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "documentID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
doc, err := h.Store.Document.Get(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteNotFoundError(w, method, "document not found")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
sp, err := h.Store.Space.Get(ctx, doc.LabelID)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteNotFoundError(w, method, "space not found")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// if !HasPermission(ctx, *h.Store, doc.LabelID, permission.SpaceManage, permission.SpaceOwner) {
|
|
|
|
// response.WriteForbiddenError(w)
|
|
|
|
// return
|
|
|
|
// }
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var model = []permission.DocumentRecord{}
|
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// We compare new permisions to what we had before.
|
|
|
|
// Why? So we can send out space invitation emails.
|
|
|
|
previousRoles, err := h.Store.Permission.GetDocumentPermissions(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store all previous approval roles as map for easy querying
|
|
|
|
previousRoleUsers := make(map[string]bool)
|
|
|
|
for _, v := range previousRoles {
|
|
|
|
if v.Action == permission.DocumentApprove {
|
|
|
|
previousRoleUsers[v.WhoID] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get user who is setting document permissions so we can send out emails with context
|
|
|
|
inviter, err := h.Store.User.Get(ctx, ctx.UserID)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nuke all previous permissions for this document
|
|
|
|
_, err = h.Store.Permission.DeleteDocumentPermissions(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Transaction.Rollback()
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
h.Runtime.Log.Error(method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
url := ctx.GetAppURL(fmt.Sprintf("s/%s/%s/d/%s/%s",
|
|
|
|
sp.RefID, stringutil.MakeSlug(sp.Name), doc.RefID, stringutil.MakeSlug(doc.Title)))
|
|
|
|
|
|
|
|
for _, perm := range model {
|
|
|
|
perm.OrgID = ctx.OrgID
|
|
|
|
perm.DocumentID = id
|
|
|
|
|
|
|
|
// Only persist if there is a role!
|
|
|
|
if permission.HasAnyDocumentPermission(perm) {
|
|
|
|
r := permission.EncodeUserDocumentPermissions(perm)
|
|
|
|
|
|
|
|
for _, p := range r {
|
|
|
|
err = h.Store.Permission.AddPermission(ctx, p)
|
|
|
|
if err != nil {
|
|
|
|
h.Runtime.Log.Error("set document permission", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send email notification to users who have been given document approver role
|
|
|
|
if _, isExisting := previousRoleUsers[perm.UserID]; !isExisting {
|
|
|
|
|
|
|
|
// we skip 'everyone' (user id != empty string)
|
|
|
|
if perm.UserID != "0" && perm.UserID != "" && perm.DocumentRoleApprove {
|
|
|
|
existingUser, err := h.Store.User.Get(ctx, perm.UserID)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
mailer := mail.Mailer{Runtime: h.Runtime, Store: h.Store, Context: ctx}
|
|
|
|
go mailer.DocumentApprover(existingUser.Email, inviter.Fullname(), url, doc.Title)
|
|
|
|
h.Runtime.Log.Info(fmt.Sprintf("%s has made %s document approver for: %s", inviter.Email, existingUser.Email, doc.Title))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Transaction.Commit()
|
|
|
|
|
2018-02-04 15:43:57 +00:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeDocumentPermission)
|
|
|
|
|
2017-12-26 13:25:10 +00:00
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|