Files
overleaf-cep/services/web/app/src/Features/Project/ProjectController.js
Jakob Ackermann 45a5d090d9 [web] add external 15s heartbeat to socket.io connection (#22853)
* [web] add external 15s heartbeat to socket.io connection

* [web] extend debugging context for client errors

- include performance.now() timestamp for correlating other timings
- include connectionState, especially for new externalHeartbeat detail
- include spellCheckLanguage to check on client-side spelling impact

* [web] remove unnecessary hook dependency

Co-authored-by: Alf Eaton <alf.eaton@overleaf.com>

* Refactor externalHeartbeat

* Add connectionManager to context

* Clear the interval earlier, and on connect

* [web] refactor handling of socket debugging info

* [web] add split-test for external socket heartbeat

* [web] fully remove connectionManager from connection context

---------

Co-authored-by: Alf Eaton <alf.eaton@overleaf.com>
GitOrigin-RevId: fbebe64f8aa207eb4fd4a8f27d522d1cac35f9d4
2025-01-28 09:05:12 +00:00

1163 lines
38 KiB
JavaScript

const _ = require('lodash')
const OError = require('@overleaf/o-error')
const crypto = require('crypto')
const { setTimeout } = require('timers/promises')
const pProps = require('p-props')
const logger = require('@overleaf/logger')
const { expressify } = require('@overleaf/promise-utils')
const { ObjectId } = require('mongodb-legacy')
const ProjectDeleter = require('./ProjectDeleter')
const ProjectDuplicator = require('./ProjectDuplicator')
const ProjectCreationHandler = require('./ProjectCreationHandler')
const EditorController = require('../Editor/EditorController')
const ProjectHelper = require('./ProjectHelper')
const metrics = require('@overleaf/metrics')
const { User } = require('../../models/User')
const SubscriptionLocator = require('../Subscription/SubscriptionLocator')
const LimitationsManager = require('../Subscription/LimitationsManager')
const Settings = require('@overleaf/settings')
const AuthorizationManager = require('../Authorization/AuthorizationManager')
const InactiveProjectManager = require('../InactiveData/InactiveProjectManager')
const ProjectUpdateHandler = require('./ProjectUpdateHandler')
const ProjectGetter = require('./ProjectGetter')
const PrivilegeLevels = require('../Authorization/PrivilegeLevels')
const SessionManager = require('../Authentication/SessionManager')
const Sources = require('../Authorization/Sources')
const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler')
const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter')
const ProjectEntityHandler = require('./ProjectEntityHandler')
const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher')
const Features = require('../../infrastructure/Features')
const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler')
const UserController = require('../User/UserController')
const AnalyticsManager = require('../Analytics/AnalyticsManager')
const SplitTestHandler = require('../SplitTests/SplitTestHandler')
const SplitTestSessionHandler = require('../SplitTests/SplitTestSessionHandler')
const FeaturesUpdater = require('../Subscription/FeaturesUpdater')
const SpellingHandler = require('../Spelling/SpellingHandler')
const { hasAdminAccess } = require('../Helpers/AdminAuthorizationHelper')
const InstitutionsFeatures = require('../Institutions/InstitutionsFeatures')
const InstitutionsGetter = require('../Institutions/InstitutionsGetter')
const ProjectAuditLogHandler = require('./ProjectAuditLogHandler')
const PublicAccessLevels = require('../Authorization/PublicAccessLevels')
const TagsHandler = require('../Tags/TagsHandler')
const TutorialHandler = require('../Tutorial/TutorialHandler')
const OnboardingDataCollectionManager = require('../OnboardingDataCollection/OnboardingDataCollectionManager')
const UserUpdater = require('../User/UserUpdater')
const Modules = require('../../infrastructure/Modules')
const UserGetter = require('../User/UserGetter')
const {
isStandaloneAiAddOnPlanCode,
} = require('../Subscription/RecurlyEntities')
/**
* @import { GetProjectsRequest, GetProjectsResponse, Project } from "./types"
*/
const _ProjectController = {
_isInPercentageRollout(rolloutName, objectId, percentage) {
if (Settings.bypassPercentageRollouts === true) {
return true
}
const data = `${rolloutName}:${objectId.toString()}`
const md5hash = crypto.createHash('md5').update(data).digest('hex')
const counter = parseInt(md5hash.slice(26, 32), 16)
return counter % 100 < percentage
},
async updateProjectSettings(req, res) {
const projectId = req.params.Project_id
if (req.body.compiler != null) {
await EditorController.promises.setCompiler(projectId, req.body.compiler)
}
if (req.body.imageName != null) {
await EditorController.promises.setImageName(
projectId,
req.body.imageName
)
}
if (req.body.name != null) {
await EditorController.promises.renameProject(projectId, req.body.name)
}
if (req.body.spellCheckLanguage != null) {
await EditorController.promises.setSpellCheckLanguage(
projectId,
req.body.spellCheckLanguage
)
}
if (req.body.rootDocId != null) {
await EditorController.promises.setRootDoc(projectId, req.body.rootDocId)
}
if (req.body.mainBibliographyDocId != null) {
await EditorController.promises.setMainBibliographyDoc(
projectId,
req.body.mainBibliographyDocId
)
}
res.sendStatus(204)
},
async updateProjectAdminSettings(req, res) {
const projectId = req.params.Project_id
const user = SessionManager.getSessionUser(req.session)
const publicAccessLevel = req.body.publicAccessLevel
const publicAccessLevels = [
PublicAccessLevels.READ_ONLY,
PublicAccessLevels.READ_AND_WRITE,
PublicAccessLevels.PRIVATE,
PublicAccessLevels.TOKEN_BASED,
]
if (
req.body.publicAccessLevel != null &&
publicAccessLevels.includes(publicAccessLevel)
) {
await EditorController.promises.setPublicAccessLevel(
projectId,
req.body.publicAccessLevel
)
await ProjectAuditLogHandler.promises.addEntry(
projectId,
'toggle-access-level',
user._id,
req.ip,
{ publicAccessLevel: req.body.publicAccessLevel, status: 'OK' }
)
res.sendStatus(204)
} else {
res.sendStatus(500)
}
},
async deleteProject(req, res) {
const projectId = req.params.Project_id
const user = SessionManager.getSessionUser(req.session)
await ProjectDeleter.promises.deleteProject(projectId, {
deleterUser: user,
ipAddress: req.ip,
})
res.sendStatus(200)
},
async archiveProject(req, res) {
const projectId = req.params.Project_id
const userId = SessionManager.getLoggedInUserId(req.session)
await ProjectDeleter.promises.archiveProject(projectId, userId)
res.sendStatus(200)
},
async unarchiveProject(req, res) {
const projectId = req.params.Project_id
const userId = SessionManager.getLoggedInUserId(req.session)
await ProjectDeleter.promises.unarchiveProject(projectId, userId)
res.sendStatus(200)
},
async trashProject(req, res) {
const projectId = req.params.project_id
const userId = SessionManager.getLoggedInUserId(req.session)
await ProjectDeleter.promises.trashProject(projectId, userId)
res.sendStatus(200)
},
async untrashProject(req, res) {
const projectId = req.params.project_id
const userId = SessionManager.getLoggedInUserId(req.session)
await ProjectDeleter.promises.untrashProject(projectId, userId)
res.sendStatus(200)
},
async expireDeletedProjectsAfterDuration(_req, res) {
await ProjectDeleter.promises.expireDeletedProjectsAfterDuration()
res.sendStatus(200)
},
async expireDeletedProject(req, res) {
const { projectId } = req.params
await ProjectDeleter.promises.expireDeletedProject(projectId)
res.sendStatus(200)
},
async restoreProject(req, res) {
const projectId = req.params.Project_id
await ProjectDeleter.promises.restoreProject(projectId)
res.sendStatus(200)
},
async cloneProject(req, res, next) {
res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete
metrics.inc('cloned-project')
const projectId = req.params.Project_id
const { projectName, tags } = req.body
logger.debug({ projectId, projectName }, 'cloning project')
if (!SessionManager.isUserLoggedIn(req.session)) {
return res.json({ redir: '/register' })
}
const currentUser = SessionManager.getSessionUser(req.session)
const { first_name: firstName, last_name: lastName, email } = currentUser
try {
const project = await ProjectDuplicator.promises.duplicate(
currentUser,
projectId,
projectName,
tags
)
res.json({
name: project.name,
lastUpdated: project.lastUpdated,
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: currentUser._id,
},
})
} catch (err) {
OError.tag(err, 'error cloning project', {
projectId,
userId: currentUser._id,
})
return next(err)
}
},
async newProject(req, res) {
const currentUser = SessionManager.getSessionUser(req.session)
const {
first_name: firstName,
last_name: lastName,
email,
_id: userId,
} = currentUser
const projectName =
req.body.projectName != null ? req.body.projectName.trim() : undefined
const { template } = req.body
const project = await (template === 'example'
? ProjectCreationHandler.promises.createExampleProject(
userId,
projectName
)
: ProjectCreationHandler.promises.createBasicProject(userId, projectName))
res.json({
project_id: project._id,
owner_ref: project.owner_ref,
owner: {
first_name: firstName,
last_name: lastName,
email,
_id: userId,
},
})
},
async renameProject(req, res) {
const projectId = req.params.Project_id
const newName = req.body.newProjectName
await EditorController.promises.renameProject(projectId, newName)
res.sendStatus(200)
},
async userProjectsJson(req, res) {
const userId = SessionManager.getLoggedInUserId(req.session)
let projects = await ProjectGetter.promises.findAllUsersProjects(
userId,
'name lastUpdated publicAccesLevel archived trashed owner_ref'
)
// _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here
projects = ProjectController._buildProjectList(projects, userId)
.filter(p => !(p.archived || p.trashed))
.map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel }))
res.json({ projects })
},
async projectEntitiesJson(req, res) {
const projectId = req.params.Project_id
const project = await ProjectGetter.promises.getProject(projectId)
const { docs, files } =
ProjectEntityHandler.getAllEntitiesFromProject(project)
const entities = docs
.concat(files)
// Sort by path ascending
.sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0))
.map(e => ({
path: e.path,
type: e.doc != null ? 'doc' : 'file',
}))
res.json({ project_id: projectId, entities })
},
async loadEditor(req, res, next) {
const timer = new metrics.Timer('load-editor')
if (!Settings.editorIsOpen) {
return res.render('general/closed', { title: 'updating_site' })
}
let anonymous, userId, sessionUser
if (SessionManager.isUserLoggedIn(req.session)) {
sessionUser = SessionManager.getSessionUser(req.session)
userId = SessionManager.getLoggedInUserId(req.session)
anonymous = false
} else {
sessionUser = null
anonymous = true
userId = null
}
const projectId = req.params.Project_id
// should not be used in place of split tests query param overrides (?my-split-test-name=my-variant)
function shouldDisplayFeature(name, variantFlag) {
if (req.query && req.query[name]) {
return req.query[name] === 'true'
} else {
return variantFlag === true
}
}
const splitTests = [
!anonymous && 'bib-file-tpr-prompt',
'compile-log-events',
'external-socket-heartbeat',
'full-project-search',
'math-preview',
'null-test-share-modal',
'paywall-cta',
'pdf-caching-cached-url-lookup',
'pdf-caching-mode',
'pdf-caching-prefetch-large',
'pdf-caching-prefetching',
'revert-file',
'revert-project',
'review-panel-redesign',
!anonymous && 'ro-mirror-on-client',
'track-pdf-download',
!anonymous && 'writefull-oauth-promotion',
'write-and-cite',
'write-and-cite-ars',
'default-visual-for-beginners',
'hotjar',
'ai-add-on',
'reviewer-role',
'papers-integration',
'editor-redesign',
].filter(Boolean)
const getUserValues = async userId =>
pProps(
_.mapValues({
user: (async () => {
const user = await User.findById(
userId,
'email first_name last_name referal_id signUpDate featureSwitches features featuresEpoch refProviders alphaProgram betaProgram isAdmin ace labsProgram completedTutorials writefull'
).exec()
// Handle case of deleted user
if (!user) {
UserController.logout(req, res, next)
return
}
logger.debug({ projectId, userId }, 'got user')
return FeaturesUpdater.featuresEpochIsCurrent(user)
? user
: await ProjectController._refreshFeatures(req, user)
})(),
learnedWords: SpellingHandler.promises.getUserDictionary(userId),
projectTags: TagsHandler.promises.getTagsForProject(
userId,
projectId
),
userHasInstitutionLicence: InstitutionsFeatures.promises
.hasLicence(userId)
.catch(err => {
logger.error({ err, userId }, 'failed to get institution licence')
return false
}),
affiliations: InstitutionsGetter.promises
.getCurrentAffiliations(userId)
.catch(err => {
logger.error({ err, userId }, 'failed to get institution licence')
return false
}),
subscription:
SubscriptionLocator.promises.getUsersSubscription(userId),
isTokenMember: CollaboratorsGetter.promises.userIsTokenMember(
userId,
projectId
),
isInvitedMember:
CollaboratorsGetter.promises.isUserInvitedMemberOfProject(
userId,
projectId
),
usedLatex: OnboardingDataCollectionManager.getOnboardingDataValue(
userId,
'usedLatex'
).catch(err => {
logger.error({ err, userId })
return null
}),
})
)
const splitTestAssignments = {}
try {
const responses = await pProps({
userValues: userId ? getUserValues(userId) : defaultUserValues(),
splitTestAssignments: Promise.all(
splitTests.map(async splitTest => {
splitTestAssignments[splitTest] =
await SplitTestHandler.promises.getAssignment(req, res, splitTest)
})
),
project: ProjectGetter.promises.getProject(projectId, {
name: 1,
lastUpdated: 1,
track_changes: 1,
owner_ref: 1,
brandVariationId: 1,
overleaf: 1,
tokens: 1,
tokenAccessReadAndWrite_refs: 1, // used for link sharing analytics
collaberator_refs: 1, // used for link sharing analytics
pendingEditor_refs: 1, // used for link sharing analytics
reviewer_refs: 1,
}),
userIsMemberOfGroupSubscription: sessionUser
? (async () =>
(
await LimitationsManager.promises.userIsMemberOfGroupSubscription(
sessionUser
)
).isMember)()
: false,
_flushToTpds:
TpdsProjectFlusher.promises.flushProjectToTpdsIfNeeded(projectId),
_activate:
InactiveProjectManager.promises.reactivateProjectIfRequired(
projectId
),
})
const { project, userValues, userIsMemberOfGroupSubscription } = responses
const {
user,
learnedWords,
projectTags,
userHasInstitutionLicence,
subscription,
isTokenMember,
isInvitedMember,
usedLatex,
} = userValues
const brandVariation = project?.brandVariationId
? await BrandVariationsHandler.promises.getBrandVariationById(
project.brandVariationId
)
: undefined
const anonRequestToken = TokenAccessHandler.getRequestToken(
req,
projectId
)
const allowedImageNames = ProjectHelper.getAllowedImagesForUser(user)
const privilegeLevel =
await AuthorizationManager.promises.getPrivilegeLevelForProject(
userId,
projectId,
anonRequestToken
)
const [
linkSharingChanges,
linkSharingEnforcement,
reviewerRoleAssignment,
] = await Promise.all([
SplitTestHandler.promises.getAssignmentForUser(
project.owner_ref,
'link-sharing-warning'
),
SplitTestHandler.promises.getAssignmentForUser(
project.owner_ref,
'link-sharing-enforcement'
),
SplitTestHandler.promises.getAssignmentForUser(
project.owner_ref,
'reviewer-role'
),
])
if (linkSharingChanges?.variant === 'active') {
if (linkSharingEnforcement?.variant === 'active') {
await Modules.promises.hooks.fire(
'enforceCollaboratorLimit',
projectId
)
}
if (isTokenMember) {
// Check explicitly that the user is in read write token refs, while this could be inferred
// from the privilege level, the privilege level of token members might later be restricted
const isReadWriteTokenMember =
await CollaboratorsGetter.promises.userIsReadWriteTokenMember(
userId,
projectId
)
if (isReadWriteTokenMember) {
// Check for an edge case where a user is both in read write token access refs but also
// an invited read write member. Ensure they are not redirected to the sharing updates page
// We could also delete the token access ref if the user is already a member of the project
const isInvitedReadWriteMember =
await CollaboratorsGetter.promises.isUserInvitedReadWriteMemberOfProject(
userId,
projectId
)
if (!isInvitedReadWriteMember) {
return res.redirect(`/project/${projectId}/sharing-updates`)
}
}
}
}
if (privilegeLevel == null || privilegeLevel === PrivilegeLevels.NONE) {
return res.sendStatus(401)
}
const allowedFreeTrial =
subscription == null ||
isStandaloneAiAddOnPlanCode(subscription.planCode)
let wsUrl = Settings.wsUrl
let metricName = 'load-editor-ws'
if (user.betaProgram && Settings.wsUrlBeta !== undefined) {
wsUrl = Settings.wsUrlBeta
metricName += '-beta'
} else if (
Settings.wsUrlV2 &&
Settings.wsUrlV2Percentage > 0 &&
(new ObjectId(projectId).getTimestamp() / 1000) % 100 <
Settings.wsUrlV2Percentage
) {
wsUrl = Settings.wsUrlV2
metricName += '-v2'
}
if (req.query && req.query.ws === 'fallback') {
// `?ws=fallback` will connect to the bare origin, and ignore
// the custom wsUrl. Hence it must load the client side
// javascript from there too.
// Not resetting it here would possibly load a socket.io v2
// client and connect to a v0 endpoint.
wsUrl = undefined
metricName += '-fallback'
}
metrics.inc(metricName)
// don't need to wait for these to complete
ProjectUpdateHandler.promises
.markAsOpened(projectId)
.catch(err =>
logger.error({ err, projectId }, 'failed to mark project as opened')
)
SplitTestSessionHandler.promises
.sessionMaintenance(req, userId ? user : null)
.catch(err =>
logger.error({ err }, 'failed to update split test info in session')
)
if (userId) {
const ownerFeatures = await UserGetter.promises.getUserFeatures(
project.owner_ref
)
const planLimit = ownerFeatures?.collaborators || 0
const namedEditors = project.collaberator_refs?.length || 0
const pendingEditors = project.pendingEditor_refs?.length || 0
const exceedAtLimit = planLimit > -1 && namedEditors >= planLimit
const projectOpenedSegmentation = {
projectId: project._id,
// temporary link sharing segmentation:
linkSharingWarning: linkSharingChanges?.variant,
linkSharingEnforcement: linkSharingEnforcement?.variant,
namedEditors,
pendingEditors,
tokenEditors: project.tokenAccessReadAndWrite_refs?.length || 0,
planLimit,
exceedAtLimit,
}
AnalyticsManager.recordEventForUserInBackground(
userId,
'project-opened',
projectOpenedSegmentation
)
User.updateOne(
{ _id: new ObjectId(userId) },
{ $set: { lastActive: new Date() } }
)
.exec()
.catch(err =>
logger.error(
{ err, userId },
'failed to update lastActive for user'
)
)
}
const isAdminOrTemplateOwner =
hasAdminAccess(user) || Settings.templates?.user_id === userId
const showTemplatesServerPro =
Features.hasFeature('templates-server-pro') && isAdminOrTemplateOwner
const debugPdfDetach = shouldDisplayFeature('debug_pdf_detach')
const detachRole = req.params.detachRole
const showSymbolPalette =
!Features.hasFeature('saas') ||
(user.features && user.features.symbolPalette)
const userInNonIndividualSub =
userIsMemberOfGroupSubscription || userHasInstitutionLicence
const userHasPremiumSub =
subscription && !isStandaloneAiAddOnPlanCode(subscription.planCode)
// Persistent upgrade prompts
// in header & in share project modal
const showUpgradePrompt =
Features.hasFeature('saas') &&
userId &&
!userHasPremiumSub &&
!userInNonIndividualSub
let aiFeaturesAllowed = false
if (userId && Features.hasFeature('saas')) {
try {
// exit early if the user couldnt use ai anyways, since permissions checks are expensive
const canEditProject =
privilegeLevel === PrivilegeLevels.READ_AND_WRITE ||
privilegeLevel === PrivilegeLevels.OWNER
if (canEditProject) {
// check permissions for user and project owner, to see if they allow AI on the project
const permissionsResults = await Modules.promises.hooks.fire(
'projectAllowsCapability',
project,
userId,
['use-ai']
)
const aiAllowed = permissionsResults.every(
result => result === true
)
aiFeaturesAllowed = aiAllowed
}
} catch (err) {
// still allow users to access project if we cant get their permissions, but disable AI feature
aiFeaturesAllowed = false
}
}
const hasNonRecurlySubscription =
subscription && !subscription.recurlySubscription_id
const hasManuallyCollectedSubscription =
subscription?.collectionMethod === 'manual'
const canUseErrorAssistant =
user.features?.aiErrorAssistant ||
(splitTestAssignments['ai-add-on']?.variant === 'enabled' &&
!hasNonRecurlySubscription &&
!hasManuallyCollectedSubscription)
let featureUsage = {}
if (Features.hasFeature('saas')) {
const usagesLeft = await Modules.promises.hooks.fire(
'remainingFeatureAllocation',
userId
)
usagesLeft?.forEach(usage => {
featureUsage = { ...featureUsage, ...usage }
})
}
let inEnterpriseCommons = false
const affiliations = userValues.affiliations || []
for (const affiliation of affiliations) {
inEnterpriseCommons =
inEnterpriseCommons || affiliation.institution?.enterpriseCommons
}
// check if a user has never tried writefull before (writefull.enabled will be null)
// if they previously accepted writefull, or are have been already assigned to a trial, user.writefull will be true,
// if they explicitly disabled it, user.writefull will be false
if (
aiFeaturesAllowed &&
user.writefull?.enabled === null &&
!userIsMemberOfGroupSubscription &&
!inEnterpriseCommons
) {
const { variant } = await SplitTestHandler.promises.getAssignment(
req,
res,
'writefull-auto-account-creation'
)
if (variant === 'enabled') {
await UserUpdater.promises.updateUser(userId, {
$set: {
writefull: { enabled: true, autoCreatedAccount: true },
},
})
user.writefull.enabled = true
user.writefull.autoCreatedAccount = true
} else {
const { variant } = await SplitTestHandler.promises.getAssignment(
req,
res,
'writefull-auto-load'
)
if (variant === 'enabled') {
await UserUpdater.promises.updateUser(userId, {
$set: {
writefull: { enabled: true },
},
})
user.writefull.enabled = true
user.writefull.firstAutoLoad = true
}
}
}
const template =
detachRole === 'detached'
? 'project/ide-react-detached'
: 'project/ide-react'
// Get the user's assignment for this page's Bootstrap 5 split test, which
// populates splitTestVariants with a value for the split test name and allows
// Pug to read it
await SplitTestHandler.promises.getAssignment(req, res, 'bootstrap-5-ide')
res.render(template, {
title: project.name,
priority_title: true,
bodyClasses: ['editor'],
project_id: project._id,
projectName: project.name,
user: {
id: userId,
email: user.email,
first_name: user.first_name,
last_name: user.last_name,
referal_id: user.referal_id,
signUpDate: user.signUpDate,
allowedFreeTrial,
hasRecurlySubscription: subscription?.recurlySubscription_id != null,
featureSwitches: user.featureSwitches,
features: user.features,
featureUsage,
refProviders: _.mapValues(user.refProviders, Boolean),
writefull: {
enabled: Boolean(user.writefull?.enabled && aiFeaturesAllowed),
autoCreatedAccount: Boolean(user.writefull?.autoCreatedAccount),
firstAutoLoad: Boolean(user.writefull?.firstAutoLoad),
},
alphaProgram: user.alphaProgram,
betaProgram: user.betaProgram,
labsProgram: user.labsProgram,
inactiveTutorials: TutorialHandler.getInactiveTutorials(user),
isAdmin: hasAdminAccess(user),
},
userSettings: {
mode: user.ace.mode,
editorTheme: user.ace.theme,
fontSize: user.ace.fontSize,
autoComplete: user.ace.autoComplete,
autoPairDelimiters: user.ace.autoPairDelimiters,
pdfViewer: user.ace.pdfViewer,
syntaxValidation: user.ace.syntaxValidation,
fontFamily: user.ace.fontFamily || 'lucida',
lineHeight: user.ace.lineHeight || 'normal',
overallTheme: user.ace.overallTheme,
mathPreview: user.ace.mathPreview,
referencesSearchMode: user.ace.referencesSearchMode,
},
privilegeLevel,
anonymous,
isTokenMember,
isRestrictedTokenMember: AuthorizationManager.isRestrictedUser(
userId,
privilegeLevel,
isTokenMember,
isInvitedMember
),
chatEnabled: Features.hasFeature('chat'),
projectHistoryBlobsEnabled: Features.hasFeature(
'project-history-blobs'
),
roMirrorOnClientNoLocalStorage:
Settings.adminOnlyLogin || project.name.startsWith('Debug: '),
languages: Settings.languages,
learnedWords,
editorThemes: THEME_LIST,
legacyEditorThemes: LEGACY_THEME_LIST,
maxDocLength: Settings.max_doc_length,
brandVariation,
allowedImageNames,
gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl,
gitBridgeEnabled: Features.hasFeature('git-bridge'),
wsUrl,
showSupport: Features.hasFeature('support'),
showTemplatesServerPro,
debugPdfDetach,
showSymbolPalette,
symbolPaletteAvailable: Features.hasFeature('symbol-palette'),
userRestrictions: Array.from(req.userRestrictions || []),
showAiErrorAssistant: aiFeaturesAllowed && canUseErrorAssistant,
detachRole,
metadata: { viewport: false },
showUpgradePrompt,
fixedSizeDocument: true,
useOpenTelemetry: Settings.useOpenTelemetryClient,
hasTrackChangesFeature: Features.hasFeature('track-changes'),
projectTags,
linkSharingWarning: linkSharingChanges?.variant === 'active',
linkSharingEnforcement: linkSharingEnforcement?.variant === 'active',
usedLatex:
// only use the usedLatex value if the split test is enabled
splitTestAssignments['default-visual-for-beginners']?.variant ===
'enabled'
? usedLatex
: null,
isSaas: Features.hasFeature('saas'),
shouldLoadHotjar: splitTestAssignments.hotjar?.variant === 'enabled',
isReviewerRoleEnabled:
reviewerRoleAssignment?.variant === 'enabled' ||
Object.keys(project.reviewer_refs || {}).length > 0,
})
timer.done()
} catch (err) {
OError.tag(err, 'error getting details for project page')
return next(err)
}
},
async _refreshFeatures(req, user) {
// If the feature refresh has failed in this session, don't retry
// it - require the user to log in again.
if (req.session.feature_refresh_failed) {
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'skipped',
})
return user
}
// If the refresh takes too long then return the current
// features. Note that the user.features property may still be
// updated in the background after the promise is resolved.
const abortController = new AbortController()
const refreshTimeoutHandler = async () => {
await setTimeout(5000, { signal: abortController.signal })
req.session.feature_refresh_failed = {
reason: 'timeout',
at: new Date(),
}
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'timeout',
})
return user
}
// try to refresh user features now
const timer = new metrics.Timer('features-refresh-on-load-editor')
return Promise.race([
refreshTimeoutHandler(),
(async () => {
try {
user.features = await FeaturesUpdater.promises.refreshFeatures(
user._id,
'load-editor'
)
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'success',
})
} catch (err) {
// keep a record to prevent unneceary retries and leave
// the original features unmodified if the refresh failed
req.session.feature_refresh_failed = {
reason: 'error',
at: new Date(),
}
metrics.inc('features-refresh', 1, {
path: 'load-editor',
status: 'error',
})
}
abortController.abort()
timer.done()
return user
})(),
])
},
_buildProjectList(allProjects, userId) {
let project
const {
owned,
review,
readAndWrite,
readOnly,
tokenReadAndWrite,
tokenReadOnly,
} = allProjects
const projects = []
for (project of owned) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'owner',
Sources.OWNER,
userId
)
)
}
// Invite-access
for (project of readAndWrite) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readWrite',
Sources.INVITE,
userId
)
)
}
for (project of review) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'review',
Sources.INVITE,
userId
)
)
}
for (project of readOnly) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.INVITE,
userId
)
)
}
// Token-access
// Only add these projects if they're not already present, this gives us cascading access
// from 'owner' => 'token-read-only'
for (project of tokenReadAndWrite) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readAndWrite',
Sources.TOKEN,
userId
)
)
}
}
for (project of tokenReadOnly) {
if (
projects.filter(p => p.id.toString() === project._id.toString())
.length === 0
) {
projects.push(
ProjectController._buildProjectViewModel(
project,
'readOnly',
Sources.TOKEN,
userId
)
)
}
}
return projects
},
_buildProjectViewModel(project, accessLevel, source, userId) {
const archived = ProjectHelper.isArchived(project, userId)
// If a project is simultaneously trashed and archived, we will consider it archived but not trashed.
const trashed = ProjectHelper.isTrashed(project, userId) && !archived
const model = {
id: project._id,
name: project.name,
lastUpdated: project.lastUpdated,
lastUpdatedBy: project.lastUpdatedBy,
publicAccessLevel: project.publicAccesLevel,
accessLevel,
source,
archived,
trashed,
owner_ref: project.owner_ref,
isV1Project: false,
}
if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) {
model.owner_ref = null
model.lastUpdatedBy = null
}
return model
},
_buildPortalTemplatesList(affiliations) {
if (affiliations == null) {
affiliations = []
}
const portalTemplates = []
for (const aff of affiliations) {
if (
aff.portal &&
aff.portal.slug &&
aff.portal.templates_count &&
aff.portal.templates_count > 0
) {
const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/'
portalTemplates.push({
name: aff.institution.name,
url: Settings.siteUrl + portalPath + aff.portal.slug,
})
}
}
return portalTemplates
},
}
const defaultSettingsForAnonymousUser = userId => ({
id: userId,
ace: {
mode: 'none',
theme: 'textmate',
fontSize: '12',
autoComplete: true,
spellCheckLanguage: '',
pdfViewer: '',
syntaxValidation: true,
},
subscription: {
freeTrial: {
allowed: true,
},
},
featureSwitches: {
github: false,
},
alphaProgram: false,
betaProgram: false,
writefull: {
enabled: false,
},
})
const defaultUserValues = () => ({
user: defaultSettingsForAnonymousUser(null),
learnedWords: [],
projectTags: [],
userHasInstitutionLicence: false,
subscription: undefined,
isTokenMember: false,
isInvitedMember: false,
})
const THEME_LIST = [
'cobalt',
'dracula',
'eclipse',
'monokai',
'overleaf',
'textmate',
]
const LEGACY_THEME_LIST = [
'ambiance',
'chaos',
'chrome',
'clouds',
'clouds_midnight',
'crimson_editor',
'dawn',
'dreamweaver',
'github',
'gob',
'gruvbox',
'idle_fingers',
'iplastic',
'katzenmilch',
'kr_theme',
'kuroir',
'merbivore',
'merbivore_soft',
'mono_industrial',
'nord_dark',
'pastel_on_dark',
'solarized_dark',
'solarized_light',
'sqlserver',
'terminal',
'tomorrow',
'tomorrow_night',
'tomorrow_night_blue',
'tomorrow_night_bright',
'tomorrow_night_eighties',
'twilight',
'vibrant_ink',
'xcode',
]
const ProjectController = {
archiveProject: expressify(_ProjectController.archiveProject),
cloneProject: expressify(_ProjectController.cloneProject),
deleteProject: expressify(_ProjectController.deleteProject),
expireDeletedProject: expressify(_ProjectController.expireDeletedProject),
expireDeletedProjectsAfterDuration: expressify(
_ProjectController.expireDeletedProjectsAfterDuration
),
loadEditor: expressify(_ProjectController.loadEditor),
newProject: expressify(_ProjectController.newProject),
projectEntitiesJson: expressify(_ProjectController.projectEntitiesJson),
renameProject: expressify(_ProjectController.renameProject),
restoreProject: expressify(_ProjectController.restoreProject),
trashProject: expressify(_ProjectController.trashProject),
unarchiveProject: expressify(_ProjectController.unarchiveProject),
untrashProject: expressify(_ProjectController.untrashProject),
updateProjectAdminSettings: expressify(
_ProjectController.updateProjectAdminSettings
),
updateProjectSettings: expressify(_ProjectController.updateProjectSettings),
userProjectsJson: expressify(_ProjectController.userProjectsJson),
_buildProjectList: _ProjectController._buildProjectList,
_buildProjectViewModel: _ProjectController._buildProjectViewModel,
_injectProjectUsers: _ProjectController._injectProjectUsers,
_isInPercentageRollout: _ProjectController._isInPercentageRollout,
_refreshFeatures: _ProjectController._refreshFeatures,
}
module.exports = ProjectController