2016-07-07 18:54:16 -07:00
|
|
|
// Copyright 2016 Documize Inc. <legal@documize.com>. All rights reserved.
|
|
|
|
//
|
2016-10-17 14:00:06 -07:00
|
|
|
// This software (Documize Community Edition) is licensed under
|
2016-07-07 18:54:16 -07:00
|
|
|
// GNU AGPL v3 http://www.gnu.org/licenses/agpl-3.0.en.html
|
|
|
|
//
|
|
|
|
// You can operate outside the AGPL restrictions by purchasing
|
|
|
|
// Documize Enterprise Edition and obtaining a commercial license
|
2016-10-17 14:00:06 -07:00
|
|
|
// by contacting <sales@documize.com>.
|
2016-07-07 18:54:16 -07:00
|
|
|
//
|
|
|
|
// https://documize.com
|
|
|
|
|
2017-07-18 21:55:17 +01:00
|
|
|
// Package space handles API calls and persistence for spaces.
|
|
|
|
// Spaces in Documize contain documents.
|
|
|
|
package space
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"database/sql"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
"github.com/documize/community/core/env"
|
2017-07-24 16:24:21 +01:00
|
|
|
"github.com/documize/community/core/request"
|
|
|
|
"github.com/documize/community/core/response"
|
|
|
|
"github.com/documize/community/core/secrets"
|
|
|
|
"github.com/documize/community/core/streamutil"
|
|
|
|
"github.com/documize/community/core/stringutil"
|
|
|
|
"github.com/documize/community/core/uniqueid"
|
|
|
|
"github.com/documize/community/domain"
|
2017-08-02 15:26:31 +01:00
|
|
|
"github.com/documize/community/domain/mail"
|
2017-07-26 10:50:26 +01:00
|
|
|
"github.com/documize/community/model/account"
|
|
|
|
"github.com/documize/community/model/audit"
|
|
|
|
"github.com/documize/community/model/space"
|
|
|
|
"github.com/documize/community/model/user"
|
2017-07-24 16:24:21 +01:00
|
|
|
)
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
// Handler contains the runtime information such as logging and database.
|
|
|
|
type Handler struct {
|
|
|
|
Runtime *env.Runtime
|
|
|
|
Store *domain.Store
|
|
|
|
}
|
|
|
|
|
2017-07-24 16:24:21 +01:00
|
|
|
// Add creates a new space.
|
|
|
|
func (h *Handler) Add(w http.ResponseWriter, r *http.Request) {
|
2017-07-26 10:50:26 +01:00
|
|
|
method := "space.Add"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
if !h.Runtime.Product.License.IsValid() {
|
|
|
|
response.WriteBadLicense(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if !ctx.Editor {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
var space = space.Space{}
|
2017-07-24 16:24:21 +01:00
|
|
|
err = json.Unmarshal(body, &space)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(space.Name) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "name")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
space.RefID = uniqueid.Generate()
|
2017-07-26 10:50:26 +01:00
|
|
|
space.OrgID = ctx.OrgID
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.Add(ctx, space)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceAdd)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
space, _ = h.Store.Space.Get(ctx, space.RefID)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteJSON(w, space)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get returns the requested space.
|
|
|
|
func (h *Handler) Get(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "Get"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
id := request.Param(r, "folderID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
sp, err := h.Store.Space.Get(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
response.WriteNotFoundError(w, method, id)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, sp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetAll returns spaces the user can see.
|
|
|
|
func (h *Handler) GetAll(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "GetAll"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
sp, err := h.Store.Space.GetAll(ctx)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sp) == 0 {
|
2017-07-26 10:50:26 +01:00
|
|
|
sp = []space.Space{}
|
2017-07-24 16:24:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, sp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetSpaceViewers returns the users that can see the shared spaces.
|
|
|
|
func (h *Handler) GetSpaceViewers(w http.ResponseWriter, r *http.Request) {
|
2017-07-26 10:50:26 +01:00
|
|
|
method := "space.Viewers"
|
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
v, err := h.Store.Space.Viewers(ctx)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(v) == 0 {
|
2017-07-26 10:50:26 +01:00
|
|
|
v = []space.Viewer{}
|
2017-07-24 16:24:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, v)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update processes request to save space object to the database
|
|
|
|
func (h *Handler) Update(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.Update"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if !ctx.Editor {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
folderID := request.Param(r, "folderID")
|
|
|
|
if len(folderID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
var sp space.Space
|
2017-07-24 16:24:21 +01:00
|
|
|
err = json.Unmarshal(body, &sp)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, "marshal")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sp.Name) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "name")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
sp.RefID = folderID
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.Update(ctx, sp)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceUpdate)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteJSON(w, sp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove moves documents to another folder before deleting it
|
|
|
|
func (h *Handler) Remove(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.Remove"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
if !h.Runtime.Product.License.IsValid() {
|
|
|
|
response.WriteBadLicense(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if !ctx.Editor {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
id := request.Param(r, "folderID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
2017-07-26 10:50:26 +01:00
|
|
|
|
|
|
|
move := request.Param(r, "moveToId")
|
2017-07-24 16:24:21 +01:00
|
|
|
if len(move) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "moveToId")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Space.Delete(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Document.MoveDocumentSpace(ctx, id, move)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.MoveSpaceRoles(ctx, id, move)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Pin.DeletePinnedSpace(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceDelete)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete deletes empty space.
|
|
|
|
func (h *Handler) Delete(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.Delete"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
if !h.Runtime.Product.License.IsValid() {
|
|
|
|
response.WriteBadLicense(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if !ctx.Editor {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
id := request.Param(r, "folderID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Space.Delete(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Space.DeleteSpaceRoles(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Pin.DeletePinnedSpace(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceDelete)
|
|
|
|
|
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetPermissions persists specified spac3 permissions
|
|
|
|
func (h *Handler) SetPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.SetPermissions"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if !ctx.Editor {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
id := request.Param(r, "folderID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
sp, err := h.Store.Space.Get(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteNotFoundError(w, method, "No such space")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if sp.UserID != ctx.UserID {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
var model = space.RolesModel{}
|
2017-07-24 16:24:21 +01:00
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// We compare new permisions to what we had before.
|
|
|
|
// Why? So we can send out folder invitation emails.
|
2017-07-26 10:50:26 +01:00
|
|
|
previousRoles, err := h.Store.Space.GetRoles(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store all previous roles as map for easy querying
|
|
|
|
previousRoleUsers := make(map[string]bool)
|
|
|
|
|
|
|
|
for _, v := range previousRoles {
|
|
|
|
previousRoleUsers[v.UserID] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Who is sharing this folder?
|
2017-07-26 10:50:26 +01:00
|
|
|
inviter, err := h.Store.User.Get(ctx, ctx.UserID)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nuke all previous permissions for this folder
|
2017-07-26 10:50:26 +01:00
|
|
|
_, err = h.Store.Space.DeleteSpaceRoles(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
me := false
|
|
|
|
hasEveryoneRole := false
|
|
|
|
roleCount := 0
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
url := ctx.GetAppURL(fmt.Sprintf("s/%s/%s", sp.RefID, stringutil.MakeSlug(sp.Name)))
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
for _, role := range model.Roles {
|
2017-07-26 10:50:26 +01:00
|
|
|
role.OrgID = ctx.OrgID
|
2017-07-24 16:24:21 +01:00
|
|
|
role.LabelID = id
|
|
|
|
|
|
|
|
// Ensure the folder owner always has access!
|
2017-07-26 10:50:26 +01:00
|
|
|
if role.UserID == ctx.UserID {
|
2017-07-24 16:24:21 +01:00
|
|
|
me = true
|
|
|
|
role.CanView = true
|
|
|
|
role.CanEdit = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(role.UserID) == 0 && (role.CanView || role.CanEdit) {
|
|
|
|
hasEveryoneRole = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only persist if there is a role!
|
|
|
|
if role.CanView || role.CanEdit {
|
|
|
|
roleID := uniqueid.Generate()
|
|
|
|
role.RefID = roleID
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.AddRole(ctx, role)
|
2017-08-02 15:26:31 +01:00
|
|
|
if err != nil {
|
|
|
|
h.Runtime.Log.Error("add role", err)
|
|
|
|
}
|
|
|
|
|
2017-07-24 16:24:21 +01:00
|
|
|
roleCount++
|
|
|
|
|
|
|
|
// We send out folder invitation emails to those users
|
|
|
|
// that have *just* been given permissions.
|
|
|
|
if _, isExisting := previousRoleUsers[role.UserID]; !isExisting {
|
|
|
|
|
|
|
|
// we skip 'everyone' (user id != empty string)
|
|
|
|
if len(role.UserID) > 0 {
|
|
|
|
var existingUser user.User
|
2017-07-26 10:50:26 +01:00
|
|
|
existingUser, err = h.Store.User.Get(ctx, role.UserID)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
if err == nil {
|
2017-08-02 15:26:31 +01:00
|
|
|
mailer := mail.Mailer{Runtime: h.Runtime, Store: h.Store, Context: ctx}
|
|
|
|
go mailer.ShareFolderExistingUser(existingUser.Email, inviter.Fullname(), url, sp.Name, model.Message)
|
2017-07-24 16:24:21 +01:00
|
|
|
h.Runtime.Log.Info(fmt.Sprintf("%s is sharing space %s with existing user %s", inviter.Email, sp.Name, existingUser.Email))
|
|
|
|
} else {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do we need to ensure permissions for space owner when shared?
|
|
|
|
if !me {
|
2017-07-26 10:50:26 +01:00
|
|
|
role := space.Role{}
|
2017-07-24 16:24:21 +01:00
|
|
|
role.LabelID = id
|
2017-07-26 10:50:26 +01:00
|
|
|
role.OrgID = ctx.OrgID
|
|
|
|
role.UserID = ctx.UserID
|
2017-07-24 16:24:21 +01:00
|
|
|
role.CanEdit = true
|
|
|
|
role.CanView = true
|
|
|
|
roleID := uniqueid.Generate()
|
|
|
|
role.RefID = roleID
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.AddRole(ctx, role)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark up folder type as either public, private or restricted access.
|
|
|
|
if hasEveryoneRole {
|
2017-07-26 10:50:26 +01:00
|
|
|
sp.Type = space.ScopePublic
|
2017-07-24 16:24:21 +01:00
|
|
|
} else {
|
|
|
|
if roleCount > 1 {
|
2017-07-26 10:50:26 +01:00
|
|
|
sp.Type = space.ScopeRestricted
|
2017-07-24 16:24:21 +01:00
|
|
|
} else {
|
2017-07-26 10:50:26 +01:00
|
|
|
sp.Type = space.ScopePrivate
|
2017-07-24 16:24:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.Update(ctx, sp)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpacePermission)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetPermissions returns user permissions for the requested folder.
|
|
|
|
func (h *Handler) GetPermissions(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.GetPermissions"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
folderID := request.Param(r, "folderID")
|
|
|
|
if len(folderID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
roles, err := h.Store.Space.GetRoles(ctx, folderID)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(roles) == 0 {
|
2017-07-26 10:50:26 +01:00
|
|
|
roles = []space.Role{}
|
2017-07-24 16:24:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
response.WriteJSON(w, roles)
|
|
|
|
}
|
|
|
|
|
|
|
|
// AcceptInvitation records the fact that a user has completed space onboard process.
|
|
|
|
func (h *Handler) AcceptInvitation(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.AcceptInvitation"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
folderID := request.Param(r, "folderID")
|
|
|
|
if len(folderID) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-08-02 15:58:39 +01:00
|
|
|
org, err := h.Store.Organization.GetOrganizationByDomain(ctx.Subdomain)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// AcceptShare does not authenticate the user hence the context needs to set up
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.OrgID = org.RefID
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
var model = space.AcceptShareModel{}
|
2017-07-24 16:24:21 +01:00
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(model.Serial) == 0 || len(model.Firstname) == 0 || len(model.Lastname) == 0 || len(model.Password) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "Serial, Firstname, Lastname, Password")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
u, err := h.Store.User.GetBySerial(ctx, model.Serial)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err == sql.ErrNoRows {
|
|
|
|
response.WriteDuplicateError(w, method, "user")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// AcceptShare does not authenticate the user hence the context needs to set up
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.UserID = u.RefID
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
u.Firstname = model.Firstname
|
|
|
|
u.Lastname = model.Lastname
|
|
|
|
u.Initials = stringutil.MakeInitials(u.Firstname, u.Lastname)
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.User.UpdateUser(ctx, u)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
salt := secrets.GenerateSalt()
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.User.UpdateUserPassword(ctx, u.RefID, salt, secrets.GeneratePassword(model.Password, salt))
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceJoin)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteJSON(w, u)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invite sends users folder invitation emails.
|
|
|
|
func (h *Handler) Invite(w http.ResponseWriter, r *http.Request) {
|
|
|
|
method := "space.Invite"
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx := domain.GetRequestContext(r)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
id := request.Param(r, "folderID")
|
|
|
|
if len(id) == 0 {
|
|
|
|
response.WriteMissingDataError(w, method, "folderID")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
sp, err := h.Store.Space.Get(ctx, id)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
if sp.UserID != ctx.UserID {
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteForbiddenError(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer streamutil.Close(r.Body)
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, "body")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
var model = space.InvitationModel{}
|
2017-07-24 16:24:21 +01:00
|
|
|
err = json.Unmarshal(body, &model)
|
|
|
|
if err != nil {
|
|
|
|
response.WriteBadRequestError(w, method, "json")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction, err = h.Runtime.Db.Beginx()
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
inviter, err := h.Store.User.Get(ctx, ctx.UserID)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, email := range model.Recipients {
|
2017-07-26 10:50:26 +01:00
|
|
|
u, err := h.Store.User.GetByEmail(ctx, email)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(u.RefID) > 0 {
|
|
|
|
// Ensure they have access to this organization
|
2017-07-26 10:50:26 +01:00
|
|
|
accounts, err2 := h.Store.Account.GetUserAccounts(ctx, u.RefID)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err2 != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// we create if they c
|
|
|
|
hasAccess := false
|
|
|
|
for _, a := range accounts {
|
2017-07-26 10:50:26 +01:00
|
|
|
if a.OrgID == ctx.OrgID {
|
2017-07-24 16:24:21 +01:00
|
|
|
hasAccess = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !hasAccess {
|
|
|
|
var a account.Account
|
|
|
|
a.UserID = u.RefID
|
2017-07-26 10:50:26 +01:00
|
|
|
a.OrgID = ctx.OrgID
|
2017-07-24 16:24:21 +01:00
|
|
|
a.Admin = false
|
|
|
|
a.Editor = false
|
|
|
|
a.Active = true
|
|
|
|
accountID := uniqueid.Generate()
|
|
|
|
a.RefID = accountID
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Account.Add(ctx, a)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure they have space roles
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Space.DeleteUserSpaceRoles(ctx, sp.RefID, u.RefID)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
role := space.Role{}
|
2017-07-24 16:24:21 +01:00
|
|
|
role.LabelID = sp.RefID
|
2017-07-26 10:50:26 +01:00
|
|
|
role.OrgID = ctx.OrgID
|
2017-07-24 16:24:21 +01:00
|
|
|
role.UserID = u.RefID
|
|
|
|
role.CanEdit = false
|
|
|
|
role.CanView = true
|
|
|
|
roleID := uniqueid.Generate()
|
|
|
|
role.RefID = roleID
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.AddRole(ctx, role)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
url := ctx.GetAppURL(fmt.Sprintf("s/%s/%s", sp.RefID, stringutil.MakeSlug(sp.Name)))
|
2017-08-02 15:26:31 +01:00
|
|
|
mailer := mail.Mailer{Runtime: h.Runtime, Store: h.Store, Context: ctx}
|
|
|
|
go mailer.ShareFolderExistingUser(email, inviter.Fullname(), url, sp.Name, model.Message)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
h.Runtime.Log.Info(fmt.Sprintf("%s is sharing space %s with existing user %s", inviter.Email, sp.Name, email))
|
|
|
|
} else {
|
|
|
|
// On-board new user
|
|
|
|
if strings.Contains(email, "@") {
|
2017-07-26 10:50:26 +01:00
|
|
|
url := ctx.GetAppURL(fmt.Sprintf("auth/share/%s/%s", sp.RefID, stringutil.MakeSlug(sp.Name)))
|
2017-08-02 15:26:31 +01:00
|
|
|
err = inviteNewUserToSharedSpace(ctx, h.Runtime, h.Store, email, inviter, url, sp, model.Message)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
h.Runtime.Log.Info(fmt.Sprintf("%s is sharing space %s with new user %s", inviter.Email, sp.Name, email))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We ensure that the folder is marked as restricted as a minimum!
|
2017-07-26 10:50:26 +01:00
|
|
|
if len(model.Recipients) > 0 && sp.Type == space.ScopePrivate {
|
|
|
|
sp.Type = space.ScopeRestricted
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
err = h.Store.Space.Update(ctx, sp)
|
2017-07-24 16:24:21 +01:00
|
|
|
if err != nil {
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Rollback()
|
2017-07-24 16:24:21 +01:00
|
|
|
response.WriteServerError(w, method, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
h.Store.Audit.Record(ctx, audit.EventTypeSpaceInvite)
|
2017-07-24 16:24:21 +01:00
|
|
|
|
2017-07-26 10:50:26 +01:00
|
|
|
ctx.Transaction.Commit()
|
2017-07-24 16:24:21 +01:00
|
|
|
|
|
|
|
response.WriteEmpty(w)
|
|
|
|
}
|