Files
sim/apps/sim/app/api/workspaces/[id]/files/route.ts
Waleed ace87791d8 feat(analytics): add PostHog product analytics (#3910)
* feat(analytics): add PostHog product analytics

* fix(posthog): fix workspace group via URL params, type errors, and clean up comments

* fix(posthog): address PR review - fix pre-tx event, auth_method, paused executions, enterprise cancellation, settings double-fire

* chore(posthog): remove unused identifyServerPerson

* fix(posthog): isolate processQueuedResumes errors, simplify settings posthog deps

* fix(posthog): correctly classify SSO auth_method, fix phantom empty-string workspace groups

* fix(posthog): remove usePostHog from memo'd TemplateCard, fix copilot chat phantom workspace group

* fix(posthog): eliminate all remaining phantom empty-string workspace groups

* fix(posthog): fix cancel route phantom group, remove redundant workspaceId shadow in catch block

* fix(posthog): use ids.length for block_removed guard to handle container blocks with descendants

* chore(posthog): remove unused removedBlockTypes variable

* fix(posthog): remove phantom $set person properties from subscription events

* fix(posthog): add passedKnowledgeBaseName to knowledge_base_opened effect deps

* fix(posthog): capture currentWorkflowId synchronously before async import to avoid stale closure

* fix(posthog): add typed captureEvent wrapper for React components, deduplicate copilot_panel_opened

* feat(posthog): add task_created and task_message_sent events, remove copilot_panel_opened

* feat(posthog): track task_renamed, task_deleted, task_marked_read, task_marked_unread

* feat(analytics): expand posthog event coverage with source tracking and lifecycle events

* fix(analytics): flush posthog events on SIGTERM before ECS task termination

* fix(analytics): fix posthog in useCallback deps and fire block events for bulk operations
2026-04-03 01:00:35 -07:00

161 lines
5.0 KiB
TypeScript

import { createLogger } from '@sim/logger'
import { type NextRequest, NextResponse } from 'next/server'
import { AuditAction, AuditResourceType, recordAudit } from '@/lib/audit/log'
import { getSession } from '@/lib/auth'
import { generateRequestId } from '@/lib/core/utils/request'
import { captureServerEvent } from '@/lib/posthog/server'
import {
FileConflictError,
listWorkspaceFiles,
uploadWorkspaceFile,
type WorkspaceFileScope,
} from '@/lib/uploads/contexts/workspace'
import { getUserEntityPermissions } from '@/lib/workspaces/permissions/utils'
import { verifyWorkspaceMembership } from '@/app/api/workflows/utils'
export const dynamic = 'force-dynamic'
const logger = createLogger('WorkspaceFilesAPI')
/**
* GET /api/workspaces/[id]/files
* List all files for a workspace (requires read permission)
*/
export async function GET(request: NextRequest, { params }: { params: Promise<{ id: string }> }) {
const requestId = generateRequestId()
const { id: workspaceId } = await params
try {
const session = await getSession()
if (!session?.user?.id) {
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
}
// Check workspace permissions (requires read)
const userPermission = await verifyWorkspaceMembership(session.user.id, workspaceId)
if (!userPermission) {
logger.warn(
`[${requestId}] User ${session.user.id} lacks permission for workspace ${workspaceId}`
)
return NextResponse.json({ error: 'Insufficient permissions' }, { status: 403 })
}
const scope = (new URL(request.url).searchParams.get('scope') ?? 'active') as WorkspaceFileScope
if (!['active', 'archived', 'all'].includes(scope)) {
return NextResponse.json({ error: 'Invalid scope' }, { status: 400 })
}
const files = await listWorkspaceFiles(workspaceId, { scope })
logger.info(`[${requestId}] Listed ${files.length} files for workspace ${workspaceId}`)
return NextResponse.json({
success: true,
files,
})
} catch (error) {
logger.error(`[${requestId}] Error listing workspace files:`, error)
return NextResponse.json(
{
success: false,
error: error instanceof Error ? error.message : 'Failed to list files',
},
{ status: 500 }
)
}
}
/**
* POST /api/workspaces/[id]/files
* Upload a new file to workspace storage (requires write permission)
*/
export async function POST(request: NextRequest, { params }: { params: Promise<{ id: string }> }) {
const requestId = generateRequestId()
const { id: workspaceId } = await params
try {
const session = await getSession()
if (!session?.user?.id) {
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
}
// Check workspace permissions (requires write)
const userPermission = await getUserEntityPermissions(session.user.id, 'workspace', workspaceId)
if (userPermission !== 'admin' && userPermission !== 'write') {
logger.warn(
`[${requestId}] User ${session.user.id} lacks write permission for workspace ${workspaceId}`
)
return NextResponse.json({ error: 'Insufficient permissions' }, { status: 403 })
}
const formData = await request.formData()
const rawFile = formData.get('file')
if (!rawFile || !(rawFile instanceof File)) {
return NextResponse.json({ error: 'No file provided' }, { status: 400 })
}
const fileName = rawFile.name || 'untitled.md'
const maxSize = 100 * 1024 * 1024
if (rawFile.size > maxSize) {
return NextResponse.json(
{ error: `File size exceeds 100MB limit (${(rawFile.size / (1024 * 1024)).toFixed(2)}MB)` },
{ status: 400 }
)
}
const buffer = Buffer.from(await rawFile.arrayBuffer())
const userFile = await uploadWorkspaceFile(
workspaceId,
session.user.id,
buffer,
fileName,
rawFile.type || 'application/octet-stream'
)
logger.info(`[${requestId}] Uploaded workspace file: ${fileName}`)
captureServerEvent(
session.user.id,
'file_uploaded',
{ workspace_id: workspaceId, file_type: rawFile.type || 'application/octet-stream' },
{ groups: { workspace: workspaceId } }
)
recordAudit({
workspaceId,
actorId: session.user.id,
actorName: session.user.name,
actorEmail: session.user.email,
action: AuditAction.FILE_UPLOADED,
resourceType: AuditResourceType.FILE,
resourceId: userFile.id,
resourceName: fileName,
description: `Uploaded file "${fileName}"`,
request,
})
return NextResponse.json({
success: true,
file: userFile,
})
} catch (error) {
logger.error(`[${requestId}] Error uploading workspace file:`, error)
const errorMessage = error instanceof Error ? error.message : 'Failed to upload file'
const isDuplicate =
error instanceof FileConflictError || errorMessage.includes('already exists')
return NextResponse.json(
{
success: false,
error: errorMessage,
isDuplicate,
},
{ status: isDuplicate ? 409 : 500 }
)
}
}