138 lines
No EOL
5.2 KiB
JavaScript
138 lines
No EOL
5.2 KiB
JavaScript
'use strict';
|
|
|
|
const knex = require('../lib/knex');
|
|
const hasher = require('node-object-hash')();
|
|
const dtHelpers = require('../lib/dt-helpers');
|
|
const { enforce, filterObject } = require('../lib/helpers');
|
|
const interoperableErrors = require('../shared/interoperable-errors');
|
|
const shares = require('./shares');
|
|
const namespaceHelpers = require('../lib/namespace-helpers');
|
|
const {MailerType, getSystemSendConfigurationId} = require('../shared/send-configurations');
|
|
const contextHelpers = require('../lib/context-helpers');
|
|
|
|
const allowedKeys = new Set(['name', 'description', 'from_email', 'from_email_overridable', 'from_name', 'from_name_overridable', 'reply_to', 'reply_to_overridable', 'subject', 'subject_overridable', 'verp_hostname', 'mailer_type', 'mailer_settings', 'namespace']);
|
|
|
|
const allowedMailerTypes = new Set(Object.values(MailerType));
|
|
|
|
function hash(entity) {
|
|
return hasher.hash(filterObject(entity, allowedKeys));
|
|
}
|
|
|
|
async function listDTAjax(context, params) {
|
|
return await dtHelpers.ajaxListWithPermissions(
|
|
context,
|
|
[{ entityTypeId: 'sendConfiguration', requiredOperations: ['viewPublic'] }],
|
|
params,
|
|
builder => builder
|
|
.from('send_configurations')
|
|
.innerJoin('namespaces', 'namespaces.id', 'send_configurations.namespace'),
|
|
['send_configurations.id', 'send_configurations.name', 'send_configurations.description', 'send_configurations.mailer_type', 'send_configurations.created', 'namespaces.name']
|
|
);
|
|
}
|
|
|
|
async function getById(context, id, withPermissions = true, withPrivateData = true) {
|
|
return await knex.transaction(async tx => {
|
|
let entity;
|
|
|
|
if (withPrivateData) {
|
|
await shares.enforceEntityPermissionTx(tx, context, 'sendConfiguration', id, 'viewPrivate');
|
|
entity = await tx('send_configurations').where('id', id).first();
|
|
entity.mailer_settings = JSON.parse(entity.mailer_settings);
|
|
} else {
|
|
await shares.enforceEntityPermissionTx(tx, context, 'sendConfiguration', id, 'viewPublic');
|
|
entity = await tx('send_configurations').where('id', id).select(
|
|
['id', 'name', 'description', 'from_email', 'from_email_overridable', 'from_name', 'from_name_overridable', 'reply_to', 'reply_to_overridable', 'subject', 'subject_overridable']
|
|
).first();
|
|
}
|
|
|
|
// note that permissions are optional as as this methods may be used with synthetic admin context
|
|
if (withPermissions) {
|
|
entity.permissions = await shares.getPermissionsTx(tx, context, 'sendConfiguration', id);
|
|
}
|
|
|
|
return entity;
|
|
});
|
|
}
|
|
|
|
async function _validateAndPreprocess(tx, entity, isCreate) {
|
|
await namespaceHelpers.validateEntity(tx, entity);
|
|
|
|
enforce(allowedMailerTypes.has(entity.mailer_type), 'Unknown mailer type');
|
|
entity.mailer_settings = JSON.stringify(entity.mailer_settings);
|
|
}
|
|
|
|
|
|
|
|
async function create(context, entity) {
|
|
return await knex.transaction(async tx => {
|
|
await shares.enforceEntityPermissionTx(tx, context, 'namespace', entity.namespace, 'createSendConfiguration');
|
|
|
|
await _validateAndPreprocess(tx, entity);
|
|
|
|
const ids = await tx('send_configurations').insert(filterObject(entity, allowedKeys));
|
|
const id = ids[0];
|
|
|
|
await shares.rebuildPermissionsTx(tx, { entityTypeId: 'sendConfiguration', entityId: id });
|
|
|
|
return id;
|
|
});
|
|
}
|
|
|
|
async function updateWithConsistencyCheck(context, entity) {
|
|
await knex.transaction(async tx => {
|
|
await shares.enforceEntityPermissionTx(tx, context, 'list', entity.id, 'edit');
|
|
|
|
const existing = await tx('send_configurations').where('id', entity.id).first();
|
|
if (!existing) {
|
|
throw new interoperableErrors.NotFoundError();
|
|
}
|
|
|
|
existing.mailer_settings = JSON.parse(existing.mailer_settings);
|
|
|
|
const existingHash = hash(existing);
|
|
if (existingHash !== entity.originalHash) {
|
|
throw new interoperableErrors.ChangedError();
|
|
}
|
|
|
|
await _validateAndPreprocess(tx, entity);
|
|
|
|
await namespaceHelpers.validateMove(context, entity, existing, 'sendConfiguration', 'createSendConfiguration', 'delete');
|
|
|
|
await tx('send_configurations').where('id', entity.id).update(filterObject(entity, allowedKeys));
|
|
|
|
await shares.rebuildPermissionsTx(tx, { entityTypeId: 'sendConfiguration', entityId: entity.id });
|
|
});
|
|
|
|
// FIXME - recreate respective mailer, notify senders to recreate the mailer
|
|
|
|
}
|
|
|
|
async function remove(context, id) {
|
|
if (id === getSystemSendConfigurationId()) {
|
|
shares.throwPermissionDenied();
|
|
}
|
|
|
|
await knex.transaction(async tx => {
|
|
await shares.enforceEntityPermissionTx(tx, context, 'sendConfiguration', id, 'delete');
|
|
|
|
// FIXME - delete send configuration assignment in campaigns
|
|
await tx('lists').update({send_configuration: null}).where('send_configuration', id);
|
|
|
|
await tx('send_configurations').where('id', id).del();
|
|
});
|
|
}
|
|
|
|
async function getSystemSendConfiguration() {
|
|
return await getById(contextHelpers.getAdminContext(), getSystemSendConfigurationId(), false);
|
|
}
|
|
|
|
module.exports = {
|
|
MailerType,
|
|
hash,
|
|
listDTAjax,
|
|
getById,
|
|
create,
|
|
updateWithConsistencyCheck,
|
|
remove,
|
|
getSystemSendConfiguration
|
|
}; |