291 lines
8.4 KiB
TypeScript
291 lines
8.4 KiB
TypeScript
import { TRPCError } from "@trpc/server";
|
|
|
|
import type { Database } from "@homarr/db";
|
|
import { and, createId, eq, like, not, sql } from "@homarr/db";
|
|
import { groupMembers, groupPermissions, groups } from "@homarr/db/schema/sqlite";
|
|
import { everyoneGroup } from "@homarr/definitions";
|
|
import { validation, z } from "@homarr/validation";
|
|
|
|
import { createTRPCRouter, permissionRequiredProcedure, protectedProcedure } from "../trpc";
|
|
import { throwIfCredentialsDisabled } from "./invite/checks";
|
|
|
|
export const groupRouter = createTRPCRouter({
|
|
getPaginated: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.common.paginated)
|
|
.query(async ({ input, ctx }) => {
|
|
const whereQuery = input.search ? like(groups.name, `%${input.search.trim()}%`) : undefined;
|
|
const groupCount = await ctx.db
|
|
.select({
|
|
count: sql<number>`count(*)`,
|
|
})
|
|
.from(groups)
|
|
.where(whereQuery);
|
|
|
|
const dbGroups = await ctx.db.query.groups.findMany({
|
|
with: {
|
|
members: {
|
|
with: {
|
|
user: {
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
email: true,
|
|
image: true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
limit: input.pageSize,
|
|
offset: (input.page - 1) * input.pageSize,
|
|
where: whereQuery,
|
|
});
|
|
|
|
return {
|
|
items: dbGroups.map((group) => ({
|
|
...group,
|
|
members: group.members.map((member) => member.user),
|
|
})),
|
|
totalCount: groupCount[0]?.count ?? 0,
|
|
};
|
|
}),
|
|
getById: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.common.byId)
|
|
.query(async ({ input, ctx }) => {
|
|
const group = await ctx.db.query.groups.findFirst({
|
|
where: eq(groups.id, input.id),
|
|
with: {
|
|
members: {
|
|
with: {
|
|
user: {
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
email: true,
|
|
image: true,
|
|
provider: true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
permissions: {
|
|
columns: {
|
|
permission: true,
|
|
},
|
|
},
|
|
owner: {
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
image: true,
|
|
email: true,
|
|
},
|
|
},
|
|
},
|
|
});
|
|
|
|
if (!group) {
|
|
throw new TRPCError({
|
|
code: "NOT_FOUND",
|
|
message: "Group not found",
|
|
});
|
|
}
|
|
|
|
return {
|
|
...group,
|
|
members: group.members.map((member) => member.user),
|
|
permissions: group.permissions.map((permission) => permission.permission),
|
|
};
|
|
}),
|
|
// Is protected because also used in board access / integration access forms
|
|
selectable: protectedProcedure
|
|
.input(z.object({ withPermissions: z.boolean().default(false) }).optional())
|
|
.query(async ({ ctx, input }) => {
|
|
const withPermissions = input?.withPermissions && ctx.session.user.permissions.includes("admin");
|
|
|
|
if (!withPermissions) {
|
|
return await ctx.db.query.groups.findMany({
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
},
|
|
});
|
|
}
|
|
|
|
const groups = await ctx.db.query.groups.findMany({
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
},
|
|
with: { permissions: { columns: { permission: true } } },
|
|
});
|
|
|
|
return groups.map((group) => ({
|
|
...group,
|
|
permissions: group.permissions.map((permission) => permission.permission),
|
|
}));
|
|
}),
|
|
search: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(
|
|
z.object({
|
|
query: z.string(),
|
|
limit: z.number().min(1).max(100).default(10),
|
|
}),
|
|
)
|
|
.query(async ({ input, ctx }) => {
|
|
return await ctx.db.query.groups.findMany({
|
|
where: like(groups.name, `%${input.query}%`),
|
|
columns: {
|
|
id: true,
|
|
name: true,
|
|
},
|
|
limit: input.limit,
|
|
});
|
|
}),
|
|
createGroup: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.create)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await checkSimilarNameAndThrowAsync(ctx.db, input.name);
|
|
|
|
const id = createId();
|
|
await ctx.db.insert(groups).values({
|
|
id,
|
|
name: input.name,
|
|
ownerId: ctx.session.user.id,
|
|
});
|
|
|
|
return id;
|
|
}),
|
|
updateGroup: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.update)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.id);
|
|
await throwIfGroupNameIsReservedAsync(ctx.db, input.id);
|
|
|
|
await checkSimilarNameAndThrowAsync(ctx.db, input.name, input.id);
|
|
|
|
await ctx.db
|
|
.update(groups)
|
|
.set({
|
|
name: input.name,
|
|
})
|
|
.where(eq(groups.id, input.id));
|
|
}),
|
|
savePermissions: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.savePermissions)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.groupId);
|
|
|
|
await ctx.db.delete(groupPermissions).where(eq(groupPermissions.groupId, input.groupId));
|
|
|
|
await ctx.db.insert(groupPermissions).values(
|
|
input.permissions.map((permission) => ({
|
|
groupId: input.groupId,
|
|
permission,
|
|
})),
|
|
);
|
|
}),
|
|
transferOwnership: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.groupUser)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.groupId);
|
|
await throwIfGroupNameIsReservedAsync(ctx.db, input.groupId);
|
|
|
|
await ctx.db
|
|
.update(groups)
|
|
.set({
|
|
ownerId: input.userId,
|
|
})
|
|
.where(eq(groups.id, input.groupId));
|
|
}),
|
|
deleteGroup: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.common.byId)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.id);
|
|
await throwIfGroupNameIsReservedAsync(ctx.db, input.id);
|
|
|
|
await ctx.db.delete(groups).where(eq(groups.id, input.id));
|
|
}),
|
|
addMember: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.groupUser)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.groupId);
|
|
await throwIfGroupNameIsReservedAsync(ctx.db, input.groupId);
|
|
throwIfCredentialsDisabled();
|
|
|
|
const user = await ctx.db.query.users.findFirst({
|
|
where: eq(groups.id, input.userId),
|
|
});
|
|
|
|
if (!user) {
|
|
throw new TRPCError({
|
|
code: "NOT_FOUND",
|
|
message: "User not found",
|
|
});
|
|
}
|
|
|
|
await ctx.db.insert(groupMembers).values({
|
|
groupId: input.groupId,
|
|
userId: input.userId,
|
|
});
|
|
}),
|
|
removeMember: permissionRequiredProcedure
|
|
.requiresPermission("admin")
|
|
.input(validation.group.groupUser)
|
|
.mutation(async ({ input, ctx }) => {
|
|
await throwIfGroupNotFoundAsync(ctx.db, input.groupId);
|
|
await throwIfGroupNameIsReservedAsync(ctx.db, input.groupId);
|
|
throwIfCredentialsDisabled();
|
|
|
|
await ctx.db
|
|
.delete(groupMembers)
|
|
.where(and(eq(groupMembers.groupId, input.groupId), eq(groupMembers.userId, input.userId)));
|
|
}),
|
|
});
|
|
|
|
const checkSimilarNameAndThrowAsync = async (db: Database, name: string, ignoreId?: string) => {
|
|
const similar = await db.query.groups.findFirst({
|
|
where: and(like(groups.name, `${name}`), not(eq(groups.id, ignoreId ?? ""))),
|
|
});
|
|
|
|
if (similar) {
|
|
throw new TRPCError({
|
|
code: "CONFLICT",
|
|
message: "Found group with similar name",
|
|
});
|
|
}
|
|
};
|
|
|
|
const throwIfGroupNameIsReservedAsync = async (db: Database, id: string) => {
|
|
const count = await db.$count(groups, and(eq(groups.id, id), eq(groups.name, everyoneGroup)));
|
|
|
|
if (count > 0) {
|
|
throw new TRPCError({
|
|
code: "FORBIDDEN",
|
|
message: "Action is forbidden for reserved group names",
|
|
});
|
|
}
|
|
};
|
|
|
|
const throwIfGroupNotFoundAsync = async (db: Database, id: string) => {
|
|
const group = await db.query.groups.findFirst({
|
|
where: eq(groups.id, id),
|
|
});
|
|
|
|
if (!group) {
|
|
throw new TRPCError({
|
|
code: "NOT_FOUND",
|
|
message: "Group not found",
|
|
});
|
|
}
|
|
};
|