-
Notifications
You must be signed in to change notification settings - Fork 173
/
meta.go
125 lines (113 loc) · 3.59 KB
/
meta.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
/*
* Copyright (c) 2018. Abstrium SAS <team (at) pydio.com>
* This file is part of Pydio Cells.
*
* Pydio Cells is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Pydio Cells is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with Pydio Cells. If not, see <http://www.gnu.org/licenses/>.
*
* The latest code can be found at <https://pydio.com>.
*/
package grpc
import (
"google.golang.org/protobuf/types/known/anypb"
"github.com/pydio/cells/v4/common"
"github.com/pydio/cells/v4/common/auth"
"github.com/pydio/cells/v4/common/client/grpc"
"github.com/pydio/cells/v4/common/proto/idm"
"github.com/pydio/cells/v4/common/proto/rest"
service "github.com/pydio/cells/v4/common/proto/service"
"github.com/pydio/cells/v4/common/proto/tree"
"github.com/pydio/cells/v4/common/utils/permissions"
)
// ReadNodeStream implements method to be a MetaProvider
func (h *Handler) ReadNodeStream(stream tree.NodeProviderStreamer_ReadNodeStreamServer) error {
ctx := stream.Context()
workspaceClient := idm.NewWorkspaceServiceClient(grpc.GetClientConnFromCtx(ctx, common.ServiceWorkspace))
for {
req, er := stream.Recv()
if req == nil {
break
}
if er != nil {
return er
}
node := req.Node
acls := new([]interface{})
q, _ := anypb.New(&idm.ACLSingleQuery{
NodeIDs: []string{node.Uuid},
Actions: []*idm.ACLAction{
{Name: "content_lock"},
permissions.AclRead,
permissions.AclWrite,
permissions.AclPolicy,
},
})
if e := h.dao.Search(&service.Query{SubQueries: []*anypb.Any{q}}, acls); e != nil {
return e
}
var contentLock string
nodeAcls := map[string][]*idm.ACL{}
for _, in := range *acls {
a, _ := in.(*idm.ACL)
if a.Action.Name == "content_lock" {
contentLock = a.Action.Value
} else if a.WorkspaceID != "" {
if _, exists := nodeAcls[a.WorkspaceID]; !exists {
nodeAcls[a.WorkspaceID] = []*idm.ACL{}
}
nodeAcls[a.WorkspaceID] = append(nodeAcls[a.WorkspaceID], a)
}
}
if contentLock != "" {
node.MustSetMeta(common.MetaFlagContentLock, contentLock)
}
var shares []*idm.Workspace
for wsId := range nodeAcls {
roomQuery, _ := anypb.New(&idm.WorkspaceSingleQuery{
Uuid: wsId,
Scope: idm.WorkspaceScope_ROOM,
})
linkQuery, _ := anypb.New(&idm.WorkspaceSingleQuery{
Uuid: wsId,
Scope: idm.WorkspaceScope_LINK,
})
subjects, _ := auth.SubjectsForResourcePolicyQuery(ctx, &rest.ResourcePolicyQuery{Type: rest.ResourcePolicyQuery_CONTEXT})
wsClient, err := workspaceClient.SearchWorkspace(ctx, &idm.SearchWorkspaceRequest{
Query: &service.Query{
SubQueries: []*anypb.Any{roomQuery, linkQuery},
ResourcePolicyQuery: &service.ResourcePolicyQuery{Subjects: subjects},
Operation: service.OperationType_OR,
},
})
if err == nil {
for {
wsResp, er := wsClient.Recv()
if er != nil {
break
}
if wsResp == nil {
continue
}
shares = append(shares, wsResp.Workspace)
}
}
}
if len(shares) > 0 {
node.MustSetMeta(common.MetaFlagWorkspacesShares, shares)
}
if e := stream.Send(&tree.ReadNodeResponse{Node: node}); e != nil {
return e
}
}
return nil
}