wikijs-fork/server/graph/resolvers/group.js

203 lines
6.2 KiB
JavaScript
Raw Normal View History

const graphHelper = require('../../helpers/graph')
2019-01-12 23:33:30 +00:00
const safeRegex = require('safe-regex')
2019-01-13 03:33:30 +00:00
const _ = require('lodash')
const gql = require('graphql')
2017-08-07 01:05:10 +00:00
/* global WIKI */
2017-08-07 01:05:10 +00:00
module.exports = {
Query: {
async groups () { return {} }
},
Mutation: {
async groups () { return {} }
},
GroupQuery: {
/**
* FETCH ALL GROUPS
*/
async list () {
return WIKI.models.groups.query().select(
'groups.*',
WIKI.models.groups.relatedQuery('users').count().as('userCount')
)
2018-03-28 04:02:32 +00:00
},
/**
* FETCH A SINGLE GROUP
*/
async single(obj, args) {
return WIKI.models.groups.query().findById(args.id)
}
},
GroupMutation: {
/**
* ASSIGN USER TO GROUP
*/
async assignUser (obj, args, { req }) {
// Check for guest user
if (args.userId === 2) {
throw new gql.GraphQLError('Cannot assign the Guest user to a group.')
}
// Check for valid group
const grp = await WIKI.models.groups.query().findById(args.groupId)
if (!grp) {
throw new gql.GraphQLError('Invalid Group ID')
}
// Check assigned permissions for write:groups
if (
WIKI.auth.checkExclusiveAccess(req.user, ['write:groups'], ['manage:groups', 'manage:system']) &&
grp.permissions.some(p => {
const resType = _.last(p.split(':'))
return ['users', 'groups', 'navigation', 'theme', 'api', 'system'].includes(resType)
})
) {
throw new gql.GraphQLError('You are not authorized to assign a user to this elevated group.')
}
// Check for valid user
const usr = await WIKI.models.users.query().findById(args.userId)
if (!usr) {
throw new gql.GraphQLError('Invalid User ID')
}
// Check for existing relation
const relExist = await WIKI.models.knex('userGroups').where({
userId: args.userId,
groupId: args.groupId
}).first()
if (relExist) {
throw new gql.GraphQLError('User is already assigned to group.')
}
// Assign user to group
await grp.$relatedQuery('users').relate(usr.id)
// Revoke tokens for this user
WIKI.auth.revokeUserTokens({ id: usr.id, kind: 'u' })
WIKI.events.outbound.emit('addAuthRevoke', { id: usr.id, kind: 'u' })
return {
responseResult: graphHelper.generateSuccess('User has been assigned to group.')
}
},
/**
* CREATE NEW GROUP
*/
async create (obj, args, { req }) {
const group = await WIKI.models.groups.query().insertAndFetch({
2018-10-14 21:38:39 +00:00
name: args.name,
permissions: JSON.stringify(WIKI.data.groups.defaultPermissions),
pageRules: JSON.stringify(WIKI.data.groups.defaultPageRules),
2018-10-14 21:38:39 +00:00
isSystem: false
})
2019-01-12 23:33:30 +00:00
await WIKI.auth.reloadGroups()
2020-04-20 00:26:26 +00:00
WIKI.events.outbound.emit('reloadGroups')
return {
responseResult: graphHelper.generateSuccess('Group created successfully.'),
group
}
},
/**
* DELETE GROUP
*/
async delete (obj, args) {
if (args.id === 1 || args.id === 2) {
throw new gql.GraphQLError('Cannot delete this group.')
}
await WIKI.models.groups.query().deleteById(args.id)
WIKI.auth.revokeUserTokens({ id: args.id, kind: 'g' })
WIKI.events.outbound.emit('addAuthRevoke', { id: args.id, kind: 'g' })
2019-01-12 23:33:30 +00:00
await WIKI.auth.reloadGroups()
2020-04-20 00:26:26 +00:00
WIKI.events.outbound.emit('reloadGroups')
2018-03-26 05:11:49 +00:00
return {
responseResult: graphHelper.generateSuccess('Group has been deleted.')
}
},
/**
* UNASSIGN USER FROM GROUP
*/
async unassignUser (obj, args) {
if (args.userId === 2) {
throw new gql.GraphQLError('Cannot unassign Guest user')
}
if (args.userId === 1 && args.groupId === 1) {
throw new gql.GraphQLError('Cannot unassign Administrator user from Administrators group.')
}
const grp = await WIKI.models.groups.query().findById(args.groupId)
if (!grp) {
throw new gql.GraphQLError('Invalid Group ID')
}
const usr = await WIKI.models.users.query().findById(args.userId)
if (!usr) {
throw new gql.GraphQLError('Invalid User ID')
}
await grp.$relatedQuery('users').unrelate().where('userId', usr.id)
WIKI.auth.revokeUserTokens({ id: usr.id, kind: 'u' })
WIKI.events.outbound.emit('addAuthRevoke', { id: usr.id, kind: 'u' })
return {
responseResult: graphHelper.generateSuccess('User has been unassigned from group.')
}
},
/**
* UPDATE GROUP
*/
async update (obj, args, { req }) {
// Check for unsafe regex page rules
if (_.some(args.pageRules, pr => {
2019-01-13 20:37:45 +00:00
return pr.match === 'REGEX' && !safeRegex(pr.path)
2019-01-12 23:33:30 +00:00
})) {
throw new gql.GraphQLError('Some Page Rules contains unsafe or exponential time regex.')
}
// Set default redirect on login value
if (_.isEmpty(args.redirectOnLogin)) {
args.redirectOnLogin = '/'
}
// Check assigned permissions for write:groups
if (
WIKI.auth.checkExclusiveAccess(req.user, ['write:groups'], ['manage:groups', 'manage:system']) &&
args.permissions.some(p => {
const resType = _.last(p.split(':'))
return ['users', 'groups', 'navigation', 'theme', 'api', 'system'].includes(resType)
})
) {
throw new gql.GraphQLError('You are not authorized to manage this group or assign these permissions.')
}
// Update group
await WIKI.models.groups.query().patch({
name: args.name,
redirectOnLogin: args.redirectOnLogin,
permissions: JSON.stringify(args.permissions),
pageRules: JSON.stringify(args.pageRules)
}).where('id', args.id)
2019-01-12 23:33:30 +00:00
// Revoke tokens for this group
WIKI.auth.revokeUserTokens({ id: args.id, kind: 'g' })
WIKI.events.outbound.emit('addAuthRevoke', { id: args.id, kind: 'g' })
// Reload group permissions
2019-01-12 23:33:30 +00:00
await WIKI.auth.reloadGroups()
2020-04-20 00:26:26 +00:00
WIKI.events.outbound.emit('reloadGroups')
2019-01-12 23:33:30 +00:00
return {
responseResult: graphHelper.generateSuccess('Group has been updated.')
}
}
2017-08-07 01:05:10 +00:00
},
Group: {
users (grp) {
return grp.$relatedQuery('users')
2017-08-07 01:05:10 +00:00
}
}
}