mirror of
https://github.com/docmost/docmost.git
synced 2026-05-07 22:53:08 +08:00
d7a5fda53c
* feat: feature flag upgrade * fix translations * refactor * fix * fix
267 lines
7.3 KiB
TypeScript
267 lines
7.3 KiB
TypeScript
import {
|
|
BadRequestException,
|
|
Body,
|
|
Controller,
|
|
ForbiddenException,
|
|
HttpCode,
|
|
HttpStatus,
|
|
Inject,
|
|
NotFoundException,
|
|
Post,
|
|
UseGuards,
|
|
} from '@nestjs/common';
|
|
import { AuthUser } from '../../common/decorators/auth-user.decorator';
|
|
import { User, Workspace } from '@docmost/db/types/entity.types';
|
|
import { AuthWorkspace } from '../../common/decorators/auth-workspace.decorator';
|
|
import { ShareService } from './share.service';
|
|
import {
|
|
CreateShareDto,
|
|
ShareIdDto,
|
|
ShareInfoDto,
|
|
SharePageIdDto,
|
|
UpdateShareDto,
|
|
} from './dto/share.dto';
|
|
import { PageRepo } from '@docmost/db/repos/page/page.repo';
|
|
import { PagePermissionRepo } from '@docmost/db/repos/page/page-permission.repo';
|
|
import { PageAccessService } from '../page/page-access/page-access.service';
|
|
import { JwtAuthGuard } from '../../common/guards/jwt-auth.guard';
|
|
import { Public } from '../../common/decorators/public.decorator';
|
|
import { ShareRepo } from '@docmost/db/repos/share/share.repo';
|
|
import { PaginationOptions } from '@docmost/db/pagination/pagination-options';
|
|
import { LicenseCheckService } from '../../integrations/environment/license-check.service';
|
|
import { AuditEvent, AuditResource } from '../../common/events/audit-events';
|
|
import {
|
|
AUDIT_SERVICE,
|
|
IAuditService,
|
|
} from '../../integrations/audit/audit.service';
|
|
|
|
@UseGuards(JwtAuthGuard)
|
|
@Controller('shares')
|
|
export class ShareController {
|
|
constructor(
|
|
private readonly shareService: ShareService,
|
|
private readonly shareRepo: ShareRepo,
|
|
private readonly pageRepo: PageRepo,
|
|
private readonly pagePermissionRepo: PagePermissionRepo,
|
|
private readonly pageAccessService: PageAccessService,
|
|
private readonly licenseCheckService: LicenseCheckService,
|
|
@Inject(AUDIT_SERVICE) private readonly auditService: IAuditService,
|
|
) {}
|
|
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('/')
|
|
async getShares(
|
|
@AuthUser() user: User,
|
|
@Body() pagination: PaginationOptions,
|
|
) {
|
|
return this.shareRepo.getShares(user.id, pagination);
|
|
}
|
|
|
|
@Public()
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('/page-info')
|
|
async getSharedPageInfo(
|
|
@Body() dto: ShareInfoDto,
|
|
@AuthWorkspace() workspace: Workspace,
|
|
) {
|
|
if (!dto.pageId && !dto.shareId) {
|
|
throw new BadRequestException();
|
|
}
|
|
|
|
const shareData = await this.shareService.getSharedPage(dto, workspace.id);
|
|
|
|
const sharingAllowed = await this.shareService.isSharingAllowed(
|
|
workspace.id,
|
|
shareData.share.spaceId,
|
|
);
|
|
if (!sharingAllowed) {
|
|
throw new NotFoundException('Shared page not found');
|
|
}
|
|
|
|
return {
|
|
...shareData,
|
|
features: this.licenseCheckService.resolveFeatures(
|
|
workspace.licenseKey,
|
|
workspace.plan,
|
|
),
|
|
};
|
|
}
|
|
|
|
@Public()
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('/info')
|
|
async getShare(@Body() dto: ShareIdDto) {
|
|
const share = await this.shareRepo.findById(dto.shareId, {
|
|
includeSharedPage: true,
|
|
});
|
|
|
|
if (!share) {
|
|
throw new NotFoundException('Share not found');
|
|
}
|
|
|
|
const sharingAllowed = await this.shareService.isSharingAllowed(
|
|
share.workspaceId,
|
|
share.spaceId,
|
|
);
|
|
if (!sharingAllowed) {
|
|
throw new NotFoundException('Share not found');
|
|
}
|
|
|
|
return share;
|
|
}
|
|
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('/for-page')
|
|
async getShareForPage(
|
|
@Body() dto: SharePageIdDto,
|
|
@AuthUser() user: User,
|
|
@AuthWorkspace() workspace: Workspace,
|
|
) {
|
|
const page = await this.pageRepo.findById(dto.pageId);
|
|
if (!page) {
|
|
throw new NotFoundException('Shared page not found');
|
|
}
|
|
|
|
await this.pageAccessService.validateCanView(page, user);
|
|
|
|
return this.shareService.getShareForPage(page.id, workspace.id);
|
|
}
|
|
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('create')
|
|
async create(
|
|
@Body() createShareDto: CreateShareDto,
|
|
@AuthUser() user: User,
|
|
@AuthWorkspace() workspace: Workspace,
|
|
) {
|
|
const page = await this.pageRepo.findById(createShareDto.pageId);
|
|
|
|
if (!page || workspace.id !== page.workspaceId) {
|
|
throw new NotFoundException('Page not found');
|
|
}
|
|
|
|
// User must be able to edit the page to create a share
|
|
//TODO: i dont think this is neccessary if we prevent restricted pages from getting shared
|
|
// rather, use space level permission and workspace/space level sharing restriction
|
|
await this.pageAccessService.validateCanEdit(page, user);
|
|
|
|
// Prevent sharing restricted pages
|
|
const isRestricted = await this.pagePermissionRepo.hasRestrictedAncestor(
|
|
page.id,
|
|
);
|
|
if (isRestricted) {
|
|
throw new BadRequestException('Cannot share a restricted page');
|
|
}
|
|
|
|
const sharingAllowed = await this.shareService.isSharingAllowed(
|
|
workspace.id,
|
|
page.spaceId,
|
|
);
|
|
if (!sharingAllowed) {
|
|
throw new ForbiddenException('Public sharing is disabled');
|
|
}
|
|
|
|
const share = await this.shareService.createShare({
|
|
page,
|
|
authUserId: user.id,
|
|
workspaceId: workspace.id,
|
|
createShareDto,
|
|
});
|
|
|
|
this.auditService.log({
|
|
event: AuditEvent.SHARE_CREATED,
|
|
resourceType: AuditResource.SHARE,
|
|
resourceId: share.id,
|
|
spaceId: page.spaceId,
|
|
metadata: {
|
|
pageId: page.id,
|
|
spaceId: page.spaceId,
|
|
},
|
|
});
|
|
|
|
return share;
|
|
}
|
|
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('update')
|
|
async update(@Body() updateShareDto: UpdateShareDto, @AuthUser() user: User) {
|
|
const share = await this.shareRepo.findById(updateShareDto.shareId);
|
|
|
|
if (!share) {
|
|
throw new NotFoundException('Share not found');
|
|
}
|
|
|
|
const page = await this.pageRepo.findById(share.pageId);
|
|
if (!page) {
|
|
throw new NotFoundException('Page not found');
|
|
}
|
|
|
|
// User must be able to edit the page to update its share
|
|
await this.pageAccessService.validateCanEdit(page, user);
|
|
|
|
return this.shareService.updateShare(share.id, updateShareDto);
|
|
}
|
|
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('delete')
|
|
async delete(@Body() shareIdDto: ShareIdDto, @AuthUser() user: User) {
|
|
const share = await this.shareRepo.findById(shareIdDto.shareId);
|
|
|
|
if (!share) {
|
|
throw new NotFoundException('Share not found');
|
|
}
|
|
|
|
const page = await this.pageRepo.findById(share.pageId);
|
|
if (!page) {
|
|
throw new NotFoundException('Page not found');
|
|
}
|
|
|
|
// User must be able to edit the page to delete its share
|
|
await this.pageAccessService.validateCanEdit(page, user);
|
|
|
|
await this.shareRepo.deleteShare(share.id);
|
|
|
|
this.auditService.log({
|
|
event: AuditEvent.SHARE_DELETED,
|
|
resourceType: AuditResource.SHARE,
|
|
resourceId: share.id,
|
|
spaceId: share.spaceId,
|
|
changes: {
|
|
before: {
|
|
pageId: share.pageId,
|
|
spaceId: share.spaceId,
|
|
},
|
|
},
|
|
});
|
|
}
|
|
|
|
@Public()
|
|
@HttpCode(HttpStatus.OK)
|
|
@Post('/tree')
|
|
async getSharePageTree(
|
|
@Body() dto: ShareIdDto,
|
|
@AuthWorkspace() workspace: Workspace,
|
|
) {
|
|
const treeData = await this.shareService.getShareTree(
|
|
dto.shareId,
|
|
workspace.id,
|
|
);
|
|
|
|
const sharingAllowed = await this.shareService.isSharingAllowed(
|
|
workspace.id,
|
|
treeData.share.spaceId,
|
|
);
|
|
if (!sharingAllowed) {
|
|
throw new NotFoundException('Share not found');
|
|
}
|
|
|
|
return {
|
|
...treeData,
|
|
features: this.licenseCheckService.resolveFeatures(
|
|
workspace.licenseKey,
|
|
workspace.plan,
|
|
),
|
|
};
|
|
}
|
|
}
|