mirror of
https://github.com/labring/FastGPT.git
synced 2025-07-24 22:03:54 +00:00

* update: Add type * fix: update import statement for NextApiRequest type * fix: update imports to use type for LexicalEditor and EditorState * Refactor imports to use 'import type' for type-only imports across multiple files - Updated imports in various components and API files to use 'import type' for better clarity and to optimize TypeScript's type checking. - Ensured consistent usage of type imports in files related to chat, dataset, workflow, and user management. - Improved code readability and maintainability by distinguishing between value and type imports. * refactor: remove old ESLint configuration and add new rules - Deleted the old ESLint configuration file from the app project. - Added a new ESLint configuration file with updated rules and settings. - Changed imports to use type-only imports in various files for better clarity and performance. - Updated TypeScript configuration to remove unnecessary options. - Added an ESLint ignore file to exclude build and dependency directories from linting. * fix: update imports to use 'import type' for type-only imports in schema files
122 lines
3.1 KiB
TypeScript
122 lines
3.1 KiB
TypeScript
import { type MemberGroupSchemaType } from '@fastgpt/global/support/permission/memberGroup/type';
|
|
import { MongoGroupMemberModel } from './groupMemberSchema';
|
|
import { parseHeaderCert } from '../controller';
|
|
import { MongoMemberGroupModel } from './memberGroupSchema';
|
|
import { DefaultGroupName } from '@fastgpt/global/support/user/team/group/constant';
|
|
import { type ClientSession } from 'mongoose';
|
|
import type { GroupMemberRole } from '@fastgpt/global/support/permission/memberGroup/constant';
|
|
import { type AuthModeType, type AuthResponseType } from '../type';
|
|
import { TeamErrEnum } from '@fastgpt/global/common/error/code/team';
|
|
import { TeamPermission } from '@fastgpt/global/support/permission/user/controller';
|
|
import { getTmbInfoByTmbId } from '../../user/team/controller';
|
|
|
|
/**
|
|
* Get the default group of a team
|
|
* @param{Object} obj
|
|
* @param{string} obj.teamId
|
|
* @param{ClientSession} obj.session
|
|
*/
|
|
export const getTeamDefaultGroup = async ({
|
|
teamId,
|
|
session
|
|
}: {
|
|
teamId: string;
|
|
session?: ClientSession;
|
|
}) => {
|
|
const group = await MongoMemberGroupModel.findOne({ teamId, name: DefaultGroupName }, undefined, {
|
|
session
|
|
}).lean();
|
|
|
|
// Create the default group if it does not exist
|
|
if (!group) {
|
|
const [group] = await MongoMemberGroupModel.create(
|
|
[
|
|
{
|
|
teamId,
|
|
name: DefaultGroupName
|
|
}
|
|
],
|
|
{ session }
|
|
);
|
|
|
|
return group;
|
|
}
|
|
return group;
|
|
};
|
|
|
|
export const getGroupsByTmbId = async ({
|
|
tmbId,
|
|
teamId,
|
|
role,
|
|
session
|
|
}: {
|
|
tmbId: string;
|
|
teamId: string;
|
|
role?: `${GroupMemberRole}`[];
|
|
session?: ClientSession;
|
|
}) =>
|
|
(
|
|
await Promise.all([
|
|
(
|
|
await MongoGroupMemberModel.find(
|
|
{
|
|
tmbId,
|
|
groupId: {
|
|
$exists: true
|
|
},
|
|
...(role ? { role: { $in: role } } : {})
|
|
},
|
|
undefined,
|
|
{ session }
|
|
)
|
|
.populate<{ group: MemberGroupSchemaType }>('group')
|
|
.lean()
|
|
).map((item) => item.group),
|
|
role ? [] : getTeamDefaultGroup({ teamId, session })
|
|
])
|
|
).flat();
|
|
|
|
export const getGroupMembersByGroupId = async (groupId: string) => {
|
|
return await MongoGroupMemberModel.find({
|
|
groupId
|
|
}).lean();
|
|
};
|
|
|
|
// auth group member role
|
|
export const authGroupMemberRole = async ({
|
|
groupId,
|
|
role,
|
|
...props
|
|
}: {
|
|
groupId: string;
|
|
role: `${GroupMemberRole}`[];
|
|
} & AuthModeType): Promise<AuthResponseType> => {
|
|
const result = await parseHeaderCert(props);
|
|
const { teamId, tmbId, isRoot } = result;
|
|
if (isRoot) {
|
|
return {
|
|
...result,
|
|
permission: new TeamPermission({
|
|
isOwner: true
|
|
}),
|
|
teamId,
|
|
tmbId
|
|
};
|
|
}
|
|
const [groupMember, tmb] = await Promise.all([
|
|
MongoGroupMemberModel.findOne({ groupId, tmbId }),
|
|
getTmbInfoByTmbId({ tmbId })
|
|
]);
|
|
|
|
// Team admin or role check
|
|
if (tmb.permission.hasManagePer || (groupMember && role.includes(groupMember.role))) {
|
|
return {
|
|
...result,
|
|
permission: tmb.permission,
|
|
teamId,
|
|
tmbId
|
|
};
|
|
}
|
|
return Promise.reject(TeamErrEnum.unAuthTeam);
|
|
};
|