mirror of
https://github.com/yu-i-i/overleaf-cep.git
synced 2026-05-23 17:19:37 +02:00
Always apply overall dark theme with IEEE-branded editor and tear down ieee-stylesheet feature flag GitOrigin-RevId: 80d10a911f3a188867db9b825f3ae8413f555b64
1147 lines
37 KiB
JavaScript
1147 lines
37 KiB
JavaScript
const _ = require('lodash')
|
|
const OError = require('@overleaf/o-error')
|
|
const crypto = require('crypto')
|
|
const { setTimeout } = require('timers/promises')
|
|
const pProps = require('p-props')
|
|
const logger = require('@overleaf/logger')
|
|
const { expressify } = require('@overleaf/promise-utils')
|
|
const { ObjectId } = require('mongodb-legacy')
|
|
const ProjectDeleter = require('./ProjectDeleter')
|
|
const ProjectDuplicator = require('./ProjectDuplicator')
|
|
const ProjectCreationHandler = require('./ProjectCreationHandler')
|
|
const EditorController = require('../Editor/EditorController')
|
|
const ProjectHelper = require('./ProjectHelper')
|
|
const metrics = require('@overleaf/metrics')
|
|
const { User } = require('../../models/User')
|
|
const SubscriptionLocator = require('../Subscription/SubscriptionLocator')
|
|
const LimitationsManager = require('../Subscription/LimitationsManager')
|
|
const Settings = require('@overleaf/settings')
|
|
const AuthorizationManager = require('../Authorization/AuthorizationManager')
|
|
const InactiveProjectManager = require('../InactiveData/InactiveProjectManager')
|
|
const ProjectUpdateHandler = require('./ProjectUpdateHandler')
|
|
const ProjectGetter = require('./ProjectGetter')
|
|
const PrivilegeLevels = require('../Authorization/PrivilegeLevels')
|
|
const SessionManager = require('../Authentication/SessionManager')
|
|
const Sources = require('../Authorization/Sources')
|
|
const TokenAccessHandler = require('../TokenAccess/TokenAccessHandler')
|
|
const CollaboratorsGetter = require('../Collaborators/CollaboratorsGetter')
|
|
const ProjectEntityHandler = require('./ProjectEntityHandler')
|
|
const TpdsProjectFlusher = require('../ThirdPartyDataStore/TpdsProjectFlusher')
|
|
const Features = require('../../infrastructure/Features')
|
|
const BrandVariationsHandler = require('../BrandVariations/BrandVariationsHandler')
|
|
const UserController = require('../User/UserController')
|
|
const AnalyticsManager = require('../Analytics/AnalyticsManager')
|
|
const SplitTestHandler = require('../SplitTests/SplitTestHandler')
|
|
const SplitTestSessionHandler = require('../SplitTests/SplitTestSessionHandler')
|
|
const FeaturesUpdater = require('../Subscription/FeaturesUpdater')
|
|
const SpellingHandler = require('../Spelling/SpellingHandler')
|
|
const { hasAdminAccess } = require('../Helpers/AdminAuthorizationHelper')
|
|
const InstitutionsFeatures = require('../Institutions/InstitutionsFeatures')
|
|
const InstitutionsGetter = require('../Institutions/InstitutionsGetter')
|
|
const ProjectAuditLogHandler = require('./ProjectAuditLogHandler')
|
|
const PublicAccessLevels = require('../Authorization/PublicAccessLevels')
|
|
const TagsHandler = require('../Tags/TagsHandler')
|
|
const TutorialHandler = require('../Tutorial/TutorialHandler')
|
|
const OnboardingDataCollectionManager = require('../OnboardingDataCollection/OnboardingDataCollectionManager')
|
|
const UserUpdater = require('../User/UserUpdater')
|
|
const Modules = require('../../infrastructure/Modules')
|
|
const UserGetter = require('../User/UserGetter')
|
|
const {
|
|
isStandaloneAiAddOnPlanCode,
|
|
} = require('../Subscription/RecurlyEntities')
|
|
|
|
/**
|
|
* @import { GetProjectsRequest, GetProjectsResponse, Project } from "./types"
|
|
*/
|
|
|
|
const _ProjectController = {
|
|
_isInPercentageRollout(rolloutName, objectId, percentage) {
|
|
if (Settings.bypassPercentageRollouts === true) {
|
|
return true
|
|
}
|
|
const data = `${rolloutName}:${objectId.toString()}`
|
|
const md5hash = crypto.createHash('md5').update(data).digest('hex')
|
|
const counter = parseInt(md5hash.slice(26, 32), 16)
|
|
return counter % 100 < percentage
|
|
},
|
|
|
|
async updateProjectSettings(req, res) {
|
|
const projectId = req.params.Project_id
|
|
|
|
if (req.body.compiler != null) {
|
|
await EditorController.promises.setCompiler(projectId, req.body.compiler)
|
|
}
|
|
|
|
if (req.body.imageName != null) {
|
|
await EditorController.promises.setImageName(
|
|
projectId,
|
|
req.body.imageName
|
|
)
|
|
}
|
|
|
|
if (req.body.name != null) {
|
|
await EditorController.promises.renameProject(projectId, req.body.name)
|
|
}
|
|
|
|
if (req.body.spellCheckLanguage != null) {
|
|
await EditorController.promises.setSpellCheckLanguage(
|
|
projectId,
|
|
req.body.spellCheckLanguage
|
|
)
|
|
}
|
|
|
|
if (req.body.rootDocId != null) {
|
|
await EditorController.promises.setRootDoc(projectId, req.body.rootDocId)
|
|
}
|
|
|
|
if (req.body.mainBibliographyDocId != null) {
|
|
await EditorController.promises.setMainBibliographyDoc(
|
|
projectId,
|
|
req.body.mainBibliographyDocId
|
|
)
|
|
}
|
|
|
|
res.sendStatus(204)
|
|
},
|
|
|
|
async updateProjectAdminSettings(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const user = SessionManager.getSessionUser(req.session)
|
|
const publicAccessLevel = req.body.publicAccessLevel
|
|
const publicAccessLevels = [
|
|
PublicAccessLevels.READ_ONLY,
|
|
PublicAccessLevels.READ_AND_WRITE,
|
|
PublicAccessLevels.PRIVATE,
|
|
PublicAccessLevels.TOKEN_BASED,
|
|
]
|
|
|
|
if (
|
|
req.body.publicAccessLevel != null &&
|
|
publicAccessLevels.includes(publicAccessLevel)
|
|
) {
|
|
await EditorController.promises.setPublicAccessLevel(
|
|
projectId,
|
|
req.body.publicAccessLevel
|
|
)
|
|
|
|
await ProjectAuditLogHandler.promises.addEntry(
|
|
projectId,
|
|
'toggle-access-level',
|
|
user._id,
|
|
req.ip,
|
|
{ publicAccessLevel: req.body.publicAccessLevel, status: 'OK' }
|
|
)
|
|
res.sendStatus(204)
|
|
} else {
|
|
res.sendStatus(500)
|
|
}
|
|
},
|
|
|
|
async deleteProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const user = SessionManager.getSessionUser(req.session)
|
|
await ProjectDeleter.promises.deleteProject(projectId, {
|
|
deleterUser: user,
|
|
ipAddress: req.ip,
|
|
})
|
|
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async archiveProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
await ProjectDeleter.promises.archiveProject(projectId, userId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async unarchiveProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
await ProjectDeleter.promises.unarchiveProject(projectId, userId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async trashProject(req, res) {
|
|
const projectId = req.params.project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
await ProjectDeleter.promises.trashProject(projectId, userId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async untrashProject(req, res) {
|
|
const projectId = req.params.project_id
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
await ProjectDeleter.promises.untrashProject(projectId, userId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async expireDeletedProjectsAfterDuration(_req, res) {
|
|
await ProjectDeleter.promises.expireDeletedProjectsAfterDuration()
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async expireDeletedProject(req, res) {
|
|
const { projectId } = req.params
|
|
await ProjectDeleter.promises.expireDeletedProject(projectId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async restoreProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
await ProjectDeleter.promises.restoreProject(projectId)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async cloneProject(req, res, next) {
|
|
res.setTimeout(5 * 60 * 1000) // allow extra time for the copy to complete
|
|
metrics.inc('cloned-project')
|
|
const projectId = req.params.Project_id
|
|
const { projectName, tags } = req.body
|
|
logger.debug({ projectId, projectName }, 'cloning project')
|
|
if (!SessionManager.isUserLoggedIn(req.session)) {
|
|
return res.json({ redir: '/register' })
|
|
}
|
|
const currentUser = SessionManager.getSessionUser(req.session)
|
|
const { first_name: firstName, last_name: lastName, email } = currentUser
|
|
try {
|
|
const project = await ProjectDuplicator.promises.duplicate(
|
|
currentUser,
|
|
projectId,
|
|
projectName,
|
|
tags
|
|
)
|
|
res.json({
|
|
name: project.name,
|
|
lastUpdated: project.lastUpdated,
|
|
project_id: project._id,
|
|
owner_ref: project.owner_ref,
|
|
owner: {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: currentUser._id,
|
|
},
|
|
})
|
|
} catch (err) {
|
|
OError.tag(err, 'error cloning project', {
|
|
projectId,
|
|
userId: currentUser._id,
|
|
})
|
|
return next(err)
|
|
}
|
|
},
|
|
|
|
async newProject(req, res) {
|
|
const currentUser = SessionManager.getSessionUser(req.session)
|
|
const {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: userId,
|
|
} = currentUser
|
|
const projectName =
|
|
req.body.projectName != null ? req.body.projectName.trim() : undefined
|
|
const { template } = req.body
|
|
|
|
const project = await (template === 'example'
|
|
? ProjectCreationHandler.promises.createExampleProject(
|
|
userId,
|
|
projectName
|
|
)
|
|
: ProjectCreationHandler.promises.createBasicProject(userId, projectName))
|
|
|
|
res.json({
|
|
project_id: project._id,
|
|
owner_ref: project.owner_ref,
|
|
owner: {
|
|
first_name: firstName,
|
|
last_name: lastName,
|
|
email,
|
|
_id: userId,
|
|
},
|
|
})
|
|
},
|
|
|
|
async renameProject(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const newName = req.body.newProjectName
|
|
await EditorController.promises.renameProject(projectId, newName)
|
|
res.sendStatus(200)
|
|
},
|
|
|
|
async userProjectsJson(req, res) {
|
|
const userId = SessionManager.getLoggedInUserId(req.session)
|
|
let projects = await ProjectGetter.promises.findAllUsersProjects(
|
|
userId,
|
|
'name lastUpdated publicAccesLevel archived trashed owner_ref'
|
|
)
|
|
|
|
// _buildProjectList already converts archived/trashed to booleans so isArchivedOrTrashed should not be used here
|
|
projects = ProjectController._buildProjectList(projects, userId)
|
|
.filter(p => !(p.archived || p.trashed))
|
|
.map(p => ({ _id: p.id, name: p.name, accessLevel: p.accessLevel }))
|
|
|
|
res.json({ projects })
|
|
},
|
|
|
|
async projectEntitiesJson(req, res) {
|
|
const projectId = req.params.Project_id
|
|
const project = await ProjectGetter.promises.getProject(projectId)
|
|
|
|
const { docs, files } =
|
|
ProjectEntityHandler.getAllEntitiesFromProject(project)
|
|
const entities = docs
|
|
.concat(files)
|
|
// Sort by path ascending
|
|
.sort((a, b) => (a.path > b.path ? 1 : a.path < b.path ? -1 : 0))
|
|
.map(e => ({
|
|
path: e.path,
|
|
type: e.doc != null ? 'doc' : 'file',
|
|
}))
|
|
res.json({ project_id: projectId, entities })
|
|
},
|
|
|
|
async loadEditor(req, res, next) {
|
|
const timer = new metrics.Timer('load-editor')
|
|
if (!Settings.editorIsOpen) {
|
|
return res.render('general/closed', { title: 'updating_site' })
|
|
}
|
|
|
|
let anonymous, userId, sessionUser
|
|
if (SessionManager.isUserLoggedIn(req.session)) {
|
|
sessionUser = SessionManager.getSessionUser(req.session)
|
|
userId = SessionManager.getLoggedInUserId(req.session)
|
|
anonymous = false
|
|
} else {
|
|
sessionUser = null
|
|
anonymous = true
|
|
userId = null
|
|
}
|
|
|
|
const projectId = req.params.Project_id
|
|
|
|
// should not be used in place of split tests query param overrides (?my-split-test-name=my-variant)
|
|
function shouldDisplayFeature(name, variantFlag) {
|
|
if (req.query && req.query[name]) {
|
|
return req.query[name] === 'true'
|
|
} else {
|
|
return variantFlag === true
|
|
}
|
|
}
|
|
|
|
const splitTests = [
|
|
!anonymous && 'bib-file-tpr-prompt',
|
|
'compile-log-events',
|
|
'math-preview',
|
|
'null-test-share-modal',
|
|
'paywall-cta',
|
|
'pdf-caching-cached-url-lookup',
|
|
'pdf-caching-mode',
|
|
'pdf-caching-prefetch-large',
|
|
'pdf-caching-prefetching',
|
|
'pdf-presentation-mode',
|
|
'revert-file',
|
|
'revert-project',
|
|
'review-panel-redesign',
|
|
!anonymous && 'ro-mirror-on-client',
|
|
'track-pdf-download',
|
|
!anonymous && 'writefull-oauth-promotion',
|
|
'write-and-cite',
|
|
'write-and-cite-ars',
|
|
'default-visual-for-beginners',
|
|
'hotjar',
|
|
'ai-add-on',
|
|
'reviewer-role',
|
|
'papers-integration',
|
|
].filter(Boolean)
|
|
|
|
const getUserValues = async userId =>
|
|
pProps(
|
|
_.mapValues({
|
|
user: (async () => {
|
|
const user = await User.findById(
|
|
userId,
|
|
'email first_name last_name referal_id signUpDate featureSwitches features featuresEpoch refProviders alphaProgram betaProgram isAdmin ace labsProgram completedTutorials writefull'
|
|
).exec()
|
|
// Handle case of deleted user
|
|
if (!user) {
|
|
UserController.logout(req, res, next)
|
|
return
|
|
}
|
|
logger.debug({ projectId, userId }, 'got user')
|
|
return FeaturesUpdater.featuresEpochIsCurrent(user)
|
|
? user
|
|
: await ProjectController._refreshFeatures(req, user)
|
|
})(),
|
|
learnedWords: SpellingHandler.promises.getUserDictionary(userId),
|
|
projectTags: TagsHandler.promises.getTagsForProject(
|
|
userId,
|
|
projectId
|
|
),
|
|
userHasInstitutionLicence: InstitutionsFeatures.promises
|
|
.hasLicence(userId)
|
|
.catch(err => {
|
|
logger.error({ err, userId }, 'failed to get institution licence')
|
|
return false
|
|
}),
|
|
affiliations: InstitutionsGetter.promises
|
|
.getCurrentAffiliations(userId)
|
|
.catch(err => {
|
|
logger.error({ err, userId }, 'failed to get institution licence')
|
|
return false
|
|
}),
|
|
subscription:
|
|
SubscriptionLocator.promises.getUsersSubscription(userId),
|
|
isTokenMember: CollaboratorsGetter.promises.userIsTokenMember(
|
|
userId,
|
|
projectId
|
|
),
|
|
isInvitedMember:
|
|
CollaboratorsGetter.promises.isUserInvitedMemberOfProject(
|
|
userId,
|
|
projectId
|
|
),
|
|
usedLatex: OnboardingDataCollectionManager.getOnboardingDataValue(
|
|
userId,
|
|
'usedLatex'
|
|
).catch(err => {
|
|
logger.error({ err, userId })
|
|
return null
|
|
}),
|
|
})
|
|
)
|
|
const splitTestAssignments = {}
|
|
|
|
try {
|
|
const responses = await pProps({
|
|
userValues: userId ? getUserValues(userId) : defaultUserValues(),
|
|
splitTestAssignments: Promise.all(
|
|
splitTests.map(async splitTest => {
|
|
splitTestAssignments[splitTest] =
|
|
await SplitTestHandler.promises.getAssignment(req, res, splitTest)
|
|
})
|
|
),
|
|
project: ProjectGetter.promises.getProject(projectId, {
|
|
name: 1,
|
|
lastUpdated: 1,
|
|
track_changes: 1,
|
|
owner_ref: 1,
|
|
brandVariationId: 1,
|
|
overleaf: 1,
|
|
tokens: 1,
|
|
tokenAccessReadAndWrite_refs: 1, // used for link sharing analytics
|
|
collaberator_refs: 1, // used for link sharing analytics
|
|
pendingEditor_refs: 1, // used for link sharing analytics
|
|
reviewer_refs: 1,
|
|
}),
|
|
userIsMemberOfGroupSubscription: sessionUser
|
|
? (async () =>
|
|
(
|
|
await LimitationsManager.promises.userIsMemberOfGroupSubscription(
|
|
sessionUser
|
|
)
|
|
).isMember)()
|
|
: false,
|
|
_flushToTpds:
|
|
TpdsProjectFlusher.promises.flushProjectToTpdsIfNeeded(projectId),
|
|
_activate:
|
|
InactiveProjectManager.promises.reactivateProjectIfRequired(
|
|
projectId
|
|
),
|
|
})
|
|
|
|
const { project, userValues, userIsMemberOfGroupSubscription } = responses
|
|
|
|
const {
|
|
user,
|
|
learnedWords,
|
|
projectTags,
|
|
userHasInstitutionLicence,
|
|
subscription,
|
|
isTokenMember,
|
|
isInvitedMember,
|
|
usedLatex,
|
|
} = userValues
|
|
|
|
const brandVariation = project?.brandVariationId
|
|
? await BrandVariationsHandler.promises.getBrandVariationById(
|
|
project.brandVariationId
|
|
)
|
|
: undefined
|
|
|
|
const anonRequestToken = TokenAccessHandler.getRequestToken(
|
|
req,
|
|
projectId
|
|
)
|
|
const allowedImageNames = ProjectHelper.getAllowedImagesForUser(user)
|
|
|
|
const privilegeLevel =
|
|
await AuthorizationManager.promises.getPrivilegeLevelForProject(
|
|
userId,
|
|
projectId,
|
|
anonRequestToken
|
|
)
|
|
|
|
const [linkSharingChanges, linkSharingEnforcement] = await Promise.all([
|
|
SplitTestHandler.promises.getAssignmentForUser(
|
|
project.owner_ref,
|
|
'link-sharing-warning'
|
|
),
|
|
SplitTestHandler.promises.getAssignmentForUser(
|
|
project.owner_ref,
|
|
'link-sharing-enforcement'
|
|
),
|
|
])
|
|
|
|
if (linkSharingChanges?.variant === 'active') {
|
|
if (linkSharingEnforcement?.variant === 'active') {
|
|
await Modules.promises.hooks.fire(
|
|
'enforceCollaboratorLimit',
|
|
projectId
|
|
)
|
|
}
|
|
if (isTokenMember) {
|
|
// Check explicitly that the user is in read write token refs, while this could be inferred
|
|
// from the privilege level, the privilege level of token members might later be restricted
|
|
const isReadWriteTokenMember =
|
|
await CollaboratorsGetter.promises.userIsReadWriteTokenMember(
|
|
userId,
|
|
projectId
|
|
)
|
|
if (isReadWriteTokenMember) {
|
|
// Check for an edge case where a user is both in read write token access refs but also
|
|
// an invited read write member. Ensure they are not redirected to the sharing updates page
|
|
// We could also delete the token access ref if the user is already a member of the project
|
|
const isInvitedReadWriteMember =
|
|
await CollaboratorsGetter.promises.isUserInvitedReadWriteMemberOfProject(
|
|
userId,
|
|
projectId
|
|
)
|
|
if (!isInvitedReadWriteMember) {
|
|
return res.redirect(`/project/${projectId}/sharing-updates`)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (privilegeLevel == null || privilegeLevel === PrivilegeLevels.NONE) {
|
|
return res.sendStatus(401)
|
|
}
|
|
|
|
const allowedFreeTrial =
|
|
subscription == null ||
|
|
isStandaloneAiAddOnPlanCode(subscription.planCode)
|
|
|
|
let wsUrl = Settings.wsUrl
|
|
let metricName = 'load-editor-ws'
|
|
if (user.betaProgram && Settings.wsUrlBeta !== undefined) {
|
|
wsUrl = Settings.wsUrlBeta
|
|
metricName += '-beta'
|
|
} else if (
|
|
Settings.wsUrlV2 &&
|
|
Settings.wsUrlV2Percentage > 0 &&
|
|
(new ObjectId(projectId).getTimestamp() / 1000) % 100 <
|
|
Settings.wsUrlV2Percentage
|
|
) {
|
|
wsUrl = Settings.wsUrlV2
|
|
metricName += '-v2'
|
|
}
|
|
if (req.query && req.query.ws === 'fallback') {
|
|
// `?ws=fallback` will connect to the bare origin, and ignore
|
|
// the custom wsUrl. Hence it must load the client side
|
|
// javascript from there too.
|
|
// Not resetting it here would possibly load a socket.io v2
|
|
// client and connect to a v0 endpoint.
|
|
wsUrl = undefined
|
|
metricName += '-fallback'
|
|
}
|
|
metrics.inc(metricName)
|
|
|
|
// don't need to wait for these to complete
|
|
ProjectUpdateHandler.promises
|
|
.markAsOpened(projectId)
|
|
.catch(err =>
|
|
logger.error({ err, projectId }, 'failed to mark project as opened')
|
|
)
|
|
SplitTestSessionHandler.promises
|
|
.sessionMaintenance(req, userId ? user : null)
|
|
.catch(err =>
|
|
logger.error({ err }, 'failed to update split test info in session')
|
|
)
|
|
if (userId) {
|
|
const ownerFeatures = await UserGetter.promises.getUserFeatures(
|
|
project.owner_ref
|
|
)
|
|
const planLimit = ownerFeatures?.collaborators || 0
|
|
const namedEditors = project.collaberator_refs?.length || 0
|
|
const pendingEditors = project.pendingEditor_refs?.length || 0
|
|
const exceedAtLimit = planLimit > -1 && namedEditors >= planLimit
|
|
const projectOpenedSegmentation = {
|
|
projectId: project._id,
|
|
// temporary link sharing segmentation:
|
|
linkSharingWarning: linkSharingChanges?.variant,
|
|
linkSharingEnforcement: linkSharingEnforcement?.variant,
|
|
namedEditors,
|
|
pendingEditors,
|
|
tokenEditors: project.tokenAccessReadAndWrite_refs?.length || 0,
|
|
planLimit,
|
|
exceedAtLimit,
|
|
}
|
|
AnalyticsManager.recordEventForUserInBackground(
|
|
userId,
|
|
'project-opened',
|
|
projectOpenedSegmentation
|
|
)
|
|
User.updateOne(
|
|
{ _id: new ObjectId(userId) },
|
|
{ $set: { lastActive: new Date() } }
|
|
)
|
|
.exec()
|
|
.catch(err =>
|
|
logger.error(
|
|
{ err, userId },
|
|
'failed to update lastActive for user'
|
|
)
|
|
)
|
|
}
|
|
|
|
const isAdminOrTemplateOwner =
|
|
hasAdminAccess(user) || Settings.templates?.user_id === userId
|
|
const showTemplatesServerPro =
|
|
Features.hasFeature('templates-server-pro') && isAdminOrTemplateOwner
|
|
|
|
const debugPdfDetach = shouldDisplayFeature('debug_pdf_detach')
|
|
|
|
const detachRole = req.params.detachRole
|
|
|
|
const showSymbolPalette =
|
|
!Features.hasFeature('saas') ||
|
|
(user.features && user.features.symbolPalette)
|
|
|
|
const userInNonIndividualSub =
|
|
userIsMemberOfGroupSubscription || userHasInstitutionLicence
|
|
|
|
const userHasPremiumSub =
|
|
subscription && !isStandaloneAiAddOnPlanCode(subscription.planCode)
|
|
|
|
// Persistent upgrade prompts
|
|
// in header & in share project modal
|
|
const showUpgradePrompt =
|
|
Features.hasFeature('saas') &&
|
|
userId &&
|
|
!userHasPremiumSub &&
|
|
!userInNonIndividualSub
|
|
|
|
let aiFeaturesAllowed = false
|
|
if (userId && Features.hasFeature('saas')) {
|
|
try {
|
|
// exit early if the user couldnt use ai anyways, since permissions checks are expensive
|
|
const canEditProject =
|
|
privilegeLevel === PrivilegeLevels.READ_AND_WRITE ||
|
|
privilegeLevel === PrivilegeLevels.OWNER
|
|
|
|
if (canEditProject) {
|
|
// check permissions for user and project owner, to see if they allow AI on the project
|
|
const permissionsResults = await Modules.promises.hooks.fire(
|
|
'projectAllowsCapability',
|
|
project,
|
|
userId,
|
|
['use-ai']
|
|
)
|
|
const aiAllowed = permissionsResults.every(
|
|
result => result === true
|
|
)
|
|
|
|
aiFeaturesAllowed = aiAllowed
|
|
}
|
|
} catch (err) {
|
|
// still allow users to access project if we cant get their permissions, but disable AI feature
|
|
aiFeaturesAllowed = false
|
|
}
|
|
}
|
|
|
|
const hasNonRecurlySubscription =
|
|
subscription && !subscription.recurlySubscription_id
|
|
const canUseErrorAssistant =
|
|
user.features?.aiErrorAssistant ||
|
|
(splitTestAssignments['ai-add-on']?.variant === 'enabled' &&
|
|
!hasNonRecurlySubscription)
|
|
|
|
let featureUsage = {}
|
|
|
|
if (Features.hasFeature('saas')) {
|
|
const usagesLeft = await Modules.promises.hooks.fire(
|
|
'remainingFeatureAllocation',
|
|
userId
|
|
)
|
|
usagesLeft?.forEach(usage => {
|
|
featureUsage = { ...featureUsage, ...usage }
|
|
})
|
|
}
|
|
|
|
let inEnterpriseCommons = false
|
|
const affiliations = userValues.affiliations || []
|
|
for (const affiliation of affiliations) {
|
|
inEnterpriseCommons =
|
|
inEnterpriseCommons || affiliation.institution?.enterpriseCommons
|
|
}
|
|
|
|
// check if a user has never tried writefull before (writefull.enabled will be null)
|
|
// if they previously accepted writefull, or are have been already assigned to a trial, user.writefull will be true,
|
|
// if they explicitly disabled it, user.writefull will be false
|
|
if (
|
|
aiFeaturesAllowed &&
|
|
user.writefull?.enabled === null &&
|
|
!userIsMemberOfGroupSubscription &&
|
|
!inEnterpriseCommons
|
|
) {
|
|
const { variant } = await SplitTestHandler.promises.getAssignment(
|
|
req,
|
|
res,
|
|
'writefull-auto-account-creation'
|
|
)
|
|
|
|
if (variant === 'enabled') {
|
|
await UserUpdater.promises.updateUser(userId, {
|
|
$set: {
|
|
writefull: { enabled: true, autoCreatedAccount: true },
|
|
},
|
|
})
|
|
user.writefull.enabled = true
|
|
user.writefull.autoCreatedAccount = true
|
|
} else {
|
|
const { variant } = await SplitTestHandler.promises.getAssignment(
|
|
req,
|
|
res,
|
|
'writefull-auto-load'
|
|
)
|
|
if (variant === 'enabled') {
|
|
await UserUpdater.promises.updateUser(userId, {
|
|
$set: {
|
|
writefull: { enabled: true },
|
|
},
|
|
})
|
|
user.writefull.enabled = true
|
|
user.writefull.firstAutoLoad = true
|
|
}
|
|
}
|
|
}
|
|
|
|
const template =
|
|
detachRole === 'detached'
|
|
? 'project/ide-react-detached'
|
|
: 'project/ide-react'
|
|
|
|
// Get the user's assignment for this page's Bootstrap 5 split test, which
|
|
// populates splitTestVariants with a value for the split test name and allows
|
|
// Pug to read it
|
|
await SplitTestHandler.promises.getAssignment(req, res, 'bootstrap-5-ide')
|
|
|
|
res.render(template, {
|
|
title: project.name,
|
|
priority_title: true,
|
|
bodyClasses: ['editor'],
|
|
project_id: project._id,
|
|
projectName: project.name,
|
|
user: {
|
|
id: userId,
|
|
email: user.email,
|
|
first_name: user.first_name,
|
|
last_name: user.last_name,
|
|
referal_id: user.referal_id,
|
|
signUpDate: user.signUpDate,
|
|
allowedFreeTrial,
|
|
hasRecurlySubscription: subscription?.recurlySubscription_id != null,
|
|
featureSwitches: user.featureSwitches,
|
|
features: user.features,
|
|
featureUsage,
|
|
refProviders: _.mapValues(user.refProviders, Boolean),
|
|
writefull: {
|
|
enabled: Boolean(user.writefull?.enabled && aiFeaturesAllowed),
|
|
autoCreatedAccount: Boolean(user.writefull?.autoCreatedAccount),
|
|
firstAutoLoad: Boolean(user.writefull?.firstAutoLoad),
|
|
},
|
|
alphaProgram: user.alphaProgram,
|
|
betaProgram: user.betaProgram,
|
|
labsProgram: user.labsProgram,
|
|
inactiveTutorials: TutorialHandler.getInactiveTutorials(user),
|
|
isAdmin: hasAdminAccess(user),
|
|
},
|
|
userSettings: {
|
|
mode: user.ace.mode,
|
|
editorTheme: user.ace.theme,
|
|
fontSize: user.ace.fontSize,
|
|
autoComplete: user.ace.autoComplete,
|
|
autoPairDelimiters: user.ace.autoPairDelimiters,
|
|
pdfViewer: user.ace.pdfViewer,
|
|
syntaxValidation: user.ace.syntaxValidation,
|
|
fontFamily: user.ace.fontFamily || 'lucida',
|
|
lineHeight: user.ace.lineHeight || 'normal',
|
|
overallTheme: user.ace.overallTheme,
|
|
mathPreview: user.ace.mathPreview,
|
|
},
|
|
privilegeLevel,
|
|
anonymous,
|
|
isTokenMember,
|
|
isRestrictedTokenMember: AuthorizationManager.isRestrictedUser(
|
|
userId,
|
|
privilegeLevel,
|
|
isTokenMember,
|
|
isInvitedMember
|
|
),
|
|
chatEnabled: Features.hasFeature('chat'),
|
|
roMirrorOnClientNoLocalStorage:
|
|
Settings.adminOnlyLogin || project.name.startsWith('Debug: '),
|
|
languages: Settings.languages,
|
|
learnedWords,
|
|
editorThemes: THEME_LIST,
|
|
legacyEditorThemes: LEGACY_THEME_LIST,
|
|
maxDocLength: Settings.max_doc_length,
|
|
brandVariation,
|
|
allowedImageNames,
|
|
gitBridgePublicBaseUrl: Settings.gitBridgePublicBaseUrl,
|
|
gitBridgeEnabled: Features.hasFeature('git-bridge'),
|
|
wsUrl,
|
|
showSupport: Features.hasFeature('support'),
|
|
showTemplatesServerPro,
|
|
debugPdfDetach,
|
|
showSymbolPalette,
|
|
symbolPaletteAvailable: Features.hasFeature('symbol-palette'),
|
|
userRestrictions: Array.from(req.userRestrictions || []),
|
|
showAiErrorAssistant: aiFeaturesAllowed && canUseErrorAssistant,
|
|
detachRole,
|
|
metadata: { viewport: false },
|
|
showUpgradePrompt,
|
|
fixedSizeDocument: true,
|
|
useOpenTelemetry: Settings.useOpenTelemetryClient,
|
|
hasTrackChangesFeature: Features.hasFeature('track-changes'),
|
|
projectTags,
|
|
linkSharingWarning: linkSharingChanges?.variant === 'active',
|
|
linkSharingEnforcement: linkSharingEnforcement?.variant === 'active',
|
|
usedLatex:
|
|
// only use the usedLatex value if the split test is enabled
|
|
splitTestAssignments['default-visual-for-beginners']?.variant ===
|
|
'enabled'
|
|
? usedLatex
|
|
: null,
|
|
isSaas: Features.hasFeature('saas'),
|
|
shouldLoadHotjar: splitTestAssignments.hotjar?.variant === 'enabled',
|
|
isReviewerRoleEnabled:
|
|
(privilegeLevel === PrivilegeLevels.OWNER &&
|
|
splitTestAssignments['reviewer-role']?.variant === 'enabled') ||
|
|
Object.keys(project.reviewer_refs || {}).length > 0,
|
|
})
|
|
timer.done()
|
|
} catch (err) {
|
|
OError.tag(err, 'error getting details for project page')
|
|
return next(err)
|
|
}
|
|
},
|
|
|
|
async _refreshFeatures(req, user) {
|
|
// If the feature refresh has failed in this session, don't retry
|
|
// it - require the user to log in again.
|
|
if (req.session.feature_refresh_failed) {
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'skipped',
|
|
})
|
|
return user
|
|
}
|
|
// If the refresh takes too long then return the current
|
|
// features. Note that the user.features property may still be
|
|
// updated in the background after the promise is resolved.
|
|
const abortController = new AbortController()
|
|
const refreshTimeoutHandler = async () => {
|
|
await setTimeout(5000, { signal: abortController.signal })
|
|
req.session.feature_refresh_failed = {
|
|
reason: 'timeout',
|
|
at: new Date(),
|
|
}
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'timeout',
|
|
})
|
|
return user
|
|
}
|
|
|
|
// try to refresh user features now
|
|
const timer = new metrics.Timer('features-refresh-on-load-editor')
|
|
|
|
return Promise.race([
|
|
refreshTimeoutHandler(),
|
|
(async () => {
|
|
try {
|
|
user.features = await FeaturesUpdater.promises.refreshFeatures(
|
|
user._id,
|
|
'load-editor'
|
|
)
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'success',
|
|
})
|
|
} catch (err) {
|
|
// keep a record to prevent unneceary retries and leave
|
|
// the original features unmodified if the refresh failed
|
|
req.session.feature_refresh_failed = {
|
|
reason: 'error',
|
|
at: new Date(),
|
|
}
|
|
metrics.inc('features-refresh', 1, {
|
|
path: 'load-editor',
|
|
status: 'error',
|
|
})
|
|
}
|
|
abortController.abort()
|
|
timer.done()
|
|
return user
|
|
})(),
|
|
])
|
|
},
|
|
_buildProjectList(allProjects, userId) {
|
|
let project
|
|
const {
|
|
owned,
|
|
review,
|
|
readAndWrite,
|
|
readOnly,
|
|
tokenReadAndWrite,
|
|
tokenReadOnly,
|
|
} = allProjects
|
|
const projects = []
|
|
for (project of owned) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'owner',
|
|
Sources.OWNER,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
// Invite-access
|
|
for (project of readAndWrite) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readWrite',
|
|
Sources.INVITE,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
for (project of review) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'review',
|
|
Sources.INVITE,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
for (project of readOnly) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readOnly',
|
|
Sources.INVITE,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
// Token-access
|
|
// Only add these projects if they're not already present, this gives us cascading access
|
|
// from 'owner' => 'token-read-only'
|
|
for (project of tokenReadAndWrite) {
|
|
if (
|
|
projects.filter(p => p.id.toString() === project._id.toString())
|
|
.length === 0
|
|
) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readAndWrite',
|
|
Sources.TOKEN,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
}
|
|
for (project of tokenReadOnly) {
|
|
if (
|
|
projects.filter(p => p.id.toString() === project._id.toString())
|
|
.length === 0
|
|
) {
|
|
projects.push(
|
|
ProjectController._buildProjectViewModel(
|
|
project,
|
|
'readOnly',
|
|
Sources.TOKEN,
|
|
userId
|
|
)
|
|
)
|
|
}
|
|
}
|
|
|
|
return projects
|
|
},
|
|
_buildProjectViewModel(project, accessLevel, source, userId) {
|
|
const archived = ProjectHelper.isArchived(project, userId)
|
|
// If a project is simultaneously trashed and archived, we will consider it archived but not trashed.
|
|
const trashed = ProjectHelper.isTrashed(project, userId) && !archived
|
|
|
|
const model = {
|
|
id: project._id,
|
|
name: project.name,
|
|
lastUpdated: project.lastUpdated,
|
|
lastUpdatedBy: project.lastUpdatedBy,
|
|
publicAccessLevel: project.publicAccesLevel,
|
|
accessLevel,
|
|
source,
|
|
archived,
|
|
trashed,
|
|
owner_ref: project.owner_ref,
|
|
isV1Project: false,
|
|
}
|
|
if (accessLevel === PrivilegeLevels.READ_ONLY && source === Sources.TOKEN) {
|
|
model.owner_ref = null
|
|
model.lastUpdatedBy = null
|
|
}
|
|
return model
|
|
},
|
|
_buildPortalTemplatesList(affiliations) {
|
|
if (affiliations == null) {
|
|
affiliations = []
|
|
}
|
|
const portalTemplates = []
|
|
for (const aff of affiliations) {
|
|
if (
|
|
aff.portal &&
|
|
aff.portal.slug &&
|
|
aff.portal.templates_count &&
|
|
aff.portal.templates_count > 0
|
|
) {
|
|
const portalPath = aff.institution.isUniversity ? '/edu/' : '/org/'
|
|
portalTemplates.push({
|
|
name: aff.institution.name,
|
|
url: Settings.siteUrl + portalPath + aff.portal.slug,
|
|
})
|
|
}
|
|
}
|
|
return portalTemplates
|
|
},
|
|
}
|
|
|
|
const defaultSettingsForAnonymousUser = userId => ({
|
|
id: userId,
|
|
ace: {
|
|
mode: 'none',
|
|
theme: 'textmate',
|
|
fontSize: '12',
|
|
autoComplete: true,
|
|
spellCheckLanguage: '',
|
|
pdfViewer: '',
|
|
syntaxValidation: true,
|
|
},
|
|
subscription: {
|
|
freeTrial: {
|
|
allowed: true,
|
|
},
|
|
},
|
|
featureSwitches: {
|
|
github: false,
|
|
},
|
|
alphaProgram: false,
|
|
betaProgram: false,
|
|
writefull: {
|
|
enabled: false,
|
|
},
|
|
})
|
|
|
|
const defaultUserValues = () => ({
|
|
user: defaultSettingsForAnonymousUser(null),
|
|
learnedWords: [],
|
|
projectTags: [],
|
|
userHasInstitutionLicence: false,
|
|
subscription: undefined,
|
|
isTokenMember: false,
|
|
isInvitedMember: false,
|
|
})
|
|
|
|
const THEME_LIST = [
|
|
'cobalt',
|
|
'dracula',
|
|
'eclipse',
|
|
'monokai',
|
|
'overleaf',
|
|
'textmate',
|
|
]
|
|
|
|
const LEGACY_THEME_LIST = [
|
|
'ambiance',
|
|
'chaos',
|
|
'chrome',
|
|
'clouds',
|
|
'clouds_midnight',
|
|
'crimson_editor',
|
|
'dawn',
|
|
'dreamweaver',
|
|
'github',
|
|
'gob',
|
|
'gruvbox',
|
|
'idle_fingers',
|
|
'iplastic',
|
|
'katzenmilch',
|
|
'kr_theme',
|
|
'kuroir',
|
|
'merbivore',
|
|
'merbivore_soft',
|
|
'mono_industrial',
|
|
'nord_dark',
|
|
'pastel_on_dark',
|
|
'solarized_dark',
|
|
'solarized_light',
|
|
'sqlserver',
|
|
'terminal',
|
|
'tomorrow',
|
|
'tomorrow_night',
|
|
'tomorrow_night_blue',
|
|
'tomorrow_night_bright',
|
|
'tomorrow_night_eighties',
|
|
'twilight',
|
|
'vibrant_ink',
|
|
'xcode',
|
|
]
|
|
|
|
const ProjectController = {
|
|
archiveProject: expressify(_ProjectController.archiveProject),
|
|
cloneProject: expressify(_ProjectController.cloneProject),
|
|
deleteProject: expressify(_ProjectController.deleteProject),
|
|
expireDeletedProject: expressify(_ProjectController.expireDeletedProject),
|
|
expireDeletedProjectsAfterDuration: expressify(
|
|
_ProjectController.expireDeletedProjectsAfterDuration
|
|
),
|
|
loadEditor: expressify(_ProjectController.loadEditor),
|
|
newProject: expressify(_ProjectController.newProject),
|
|
projectEntitiesJson: expressify(_ProjectController.projectEntitiesJson),
|
|
renameProject: expressify(_ProjectController.renameProject),
|
|
restoreProject: expressify(_ProjectController.restoreProject),
|
|
trashProject: expressify(_ProjectController.trashProject),
|
|
unarchiveProject: expressify(_ProjectController.unarchiveProject),
|
|
untrashProject: expressify(_ProjectController.untrashProject),
|
|
updateProjectAdminSettings: expressify(
|
|
_ProjectController.updateProjectAdminSettings
|
|
),
|
|
updateProjectSettings: expressify(_ProjectController.updateProjectSettings),
|
|
userProjectsJson: expressify(_ProjectController.userProjectsJson),
|
|
_buildProjectList: _ProjectController._buildProjectList,
|
|
_buildProjectViewModel: _ProjectController._buildProjectViewModel,
|
|
_injectProjectUsers: _ProjectController._injectProjectUsers,
|
|
_isInPercentageRollout: _ProjectController._isInPercentageRollout,
|
|
_refreshFeatures: _ProjectController._refreshFeatures,
|
|
}
|
|
|
|
module.exports = ProjectController
|