mirror of
https://github.com/yu-i-i/overleaf-cep.git
synced 2025-07-25 02:00:07 +02:00

* Support for adding reviewer role * show reviewer in track changes user list * added "review" in assertClientCanViewProject * test if reviewer can read project * added collaboratorsGetter tests * eit toggle-track-changes when track changes changes * [real-time] ensure tc is enabled when reviewer role is used * use assertClientCanReviewProjectAndDoc, refactor _assertClientCanApplyUpdate GitOrigin-RevId: 158bd1ff0d4b4977da950134f8ad8b3740855290
81 lines
2.2 KiB
JavaScript
81 lines
2.2 KiB
JavaScript
const { NotAuthorizedError } = require('./Errors')
|
|
|
|
let AuthorizationManager
|
|
module.exports = AuthorizationManager = {
|
|
assertClientCanViewProject(client, callback) {
|
|
AuthorizationManager._assertClientHasPrivilegeLevel(
|
|
client,
|
|
['readOnly', 'readAndWrite', 'review', 'owner'],
|
|
callback
|
|
)
|
|
},
|
|
|
|
assertClientCanEditProject(client, callback) {
|
|
AuthorizationManager._assertClientHasPrivilegeLevel(
|
|
client,
|
|
['readAndWrite', 'owner'],
|
|
callback
|
|
)
|
|
},
|
|
|
|
assertClientCanReviewProject(client, callback) {
|
|
AuthorizationManager._assertClientHasPrivilegeLevel(
|
|
client,
|
|
['readAndWrite', 'owner', 'review'],
|
|
callback
|
|
)
|
|
},
|
|
|
|
_assertClientHasPrivilegeLevel(client, allowedLevels, callback) {
|
|
if (allowedLevels.includes(client.ol_context.privilege_level)) {
|
|
callback(null)
|
|
} else {
|
|
callback(new NotAuthorizedError())
|
|
}
|
|
},
|
|
|
|
assertClientCanViewProjectAndDoc(client, docId, callback) {
|
|
AuthorizationManager.assertClientCanViewProject(client, function (error) {
|
|
if (error) {
|
|
return callback(error)
|
|
}
|
|
AuthorizationManager._assertClientCanAccessDoc(client, docId, callback)
|
|
})
|
|
},
|
|
|
|
assertClientCanEditProjectAndDoc(client, docId, callback) {
|
|
AuthorizationManager.assertClientCanEditProject(client, function (error) {
|
|
if (error) {
|
|
return callback(error)
|
|
}
|
|
AuthorizationManager._assertClientCanAccessDoc(client, docId, callback)
|
|
})
|
|
},
|
|
|
|
assertClientCanReviewProjectAndDoc(client, docId, callback) {
|
|
AuthorizationManager.assertClientCanReviewProject(client, function (error) {
|
|
if (error) {
|
|
return callback(error)
|
|
}
|
|
AuthorizationManager._assertClientCanAccessDoc(client, docId, callback)
|
|
})
|
|
},
|
|
|
|
_assertClientCanAccessDoc(client, docId, callback) {
|
|
if (client.ol_context[`doc:${docId}`] === 'allowed') {
|
|
callback(null)
|
|
} else {
|
|
callback(new NotAuthorizedError())
|
|
}
|
|
},
|
|
|
|
addAccessToDoc(client, docId, callback) {
|
|
client.ol_context[`doc:${docId}`] = 'allowed'
|
|
callback(null)
|
|
},
|
|
|
|
removeAccessToDoc(client, docId, callback) {
|
|
delete client.ol_context[`doc:${docId}`]
|
|
callback(null)
|
|
},
|
|
}
|