mirror of
https://github.com/simstudioai/sim.git
synced 2026-04-06 03:00:16 -04:00
* feat(analytics): add PostHog product analytics * fix(posthog): fix workspace group via URL params, type errors, and clean up comments * fix(posthog): address PR review - fix pre-tx event, auth_method, paused executions, enterprise cancellation, settings double-fire * chore(posthog): remove unused identifyServerPerson * fix(posthog): isolate processQueuedResumes errors, simplify settings posthog deps * fix(posthog): correctly classify SSO auth_method, fix phantom empty-string workspace groups * fix(posthog): remove usePostHog from memo'd TemplateCard, fix copilot chat phantom workspace group * fix(posthog): eliminate all remaining phantom empty-string workspace groups * fix(posthog): fix cancel route phantom group, remove redundant workspaceId shadow in catch block * fix(posthog): use ids.length for block_removed guard to handle container blocks with descendants * chore(posthog): remove unused removedBlockTypes variable * fix(posthog): remove phantom $set person properties from subscription events * fix(posthog): add passedKnowledgeBaseName to knowledge_base_opened effect deps * fix(posthog): capture currentWorkflowId synchronously before async import to avoid stale closure * fix(posthog): add typed captureEvent wrapper for React components, deduplicate copilot_panel_opened * feat(posthog): add task_created and task_message_sent events, remove copilot_panel_opened * feat(posthog): track task_renamed, task_deleted, task_marked_read, task_marked_unread * feat(analytics): expand posthog event coverage with source tracking and lifecycle events * fix(analytics): flush posthog events on SIGTERM before ECS task termination * fix(analytics): fix posthog in useCallback deps and fire block events for bulk operations
161 lines
5.0 KiB
TypeScript
161 lines
5.0 KiB
TypeScript
import { createLogger } from '@sim/logger'
|
|
import { type NextRequest, NextResponse } from 'next/server'
|
|
import { AuditAction, AuditResourceType, recordAudit } from '@/lib/audit/log'
|
|
import { getSession } from '@/lib/auth'
|
|
import { generateRequestId } from '@/lib/core/utils/request'
|
|
import { captureServerEvent } from '@/lib/posthog/server'
|
|
import {
|
|
FileConflictError,
|
|
listWorkspaceFiles,
|
|
uploadWorkspaceFile,
|
|
type WorkspaceFileScope,
|
|
} from '@/lib/uploads/contexts/workspace'
|
|
import { getUserEntityPermissions } from '@/lib/workspaces/permissions/utils'
|
|
import { verifyWorkspaceMembership } from '@/app/api/workflows/utils'
|
|
|
|
export const dynamic = 'force-dynamic'
|
|
|
|
const logger = createLogger('WorkspaceFilesAPI')
|
|
|
|
/**
|
|
* GET /api/workspaces/[id]/files
|
|
* List all files for a workspace (requires read permission)
|
|
*/
|
|
export async function GET(request: NextRequest, { params }: { params: Promise<{ id: string }> }) {
|
|
const requestId = generateRequestId()
|
|
const { id: workspaceId } = await params
|
|
|
|
try {
|
|
const session = await getSession()
|
|
if (!session?.user?.id) {
|
|
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
|
|
}
|
|
|
|
// Check workspace permissions (requires read)
|
|
const userPermission = await verifyWorkspaceMembership(session.user.id, workspaceId)
|
|
if (!userPermission) {
|
|
logger.warn(
|
|
`[${requestId}] User ${session.user.id} lacks permission for workspace ${workspaceId}`
|
|
)
|
|
return NextResponse.json({ error: 'Insufficient permissions' }, { status: 403 })
|
|
}
|
|
|
|
const scope = (new URL(request.url).searchParams.get('scope') ?? 'active') as WorkspaceFileScope
|
|
if (!['active', 'archived', 'all'].includes(scope)) {
|
|
return NextResponse.json({ error: 'Invalid scope' }, { status: 400 })
|
|
}
|
|
|
|
const files = await listWorkspaceFiles(workspaceId, { scope })
|
|
|
|
logger.info(`[${requestId}] Listed ${files.length} files for workspace ${workspaceId}`)
|
|
|
|
return NextResponse.json({
|
|
success: true,
|
|
files,
|
|
})
|
|
} catch (error) {
|
|
logger.error(`[${requestId}] Error listing workspace files:`, error)
|
|
return NextResponse.json(
|
|
{
|
|
success: false,
|
|
error: error instanceof Error ? error.message : 'Failed to list files',
|
|
},
|
|
{ status: 500 }
|
|
)
|
|
}
|
|
}
|
|
|
|
/**
|
|
* POST /api/workspaces/[id]/files
|
|
* Upload a new file to workspace storage (requires write permission)
|
|
*/
|
|
export async function POST(request: NextRequest, { params }: { params: Promise<{ id: string }> }) {
|
|
const requestId = generateRequestId()
|
|
const { id: workspaceId } = await params
|
|
|
|
try {
|
|
const session = await getSession()
|
|
if (!session?.user?.id) {
|
|
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
|
|
}
|
|
|
|
// Check workspace permissions (requires write)
|
|
const userPermission = await getUserEntityPermissions(session.user.id, 'workspace', workspaceId)
|
|
if (userPermission !== 'admin' && userPermission !== 'write') {
|
|
logger.warn(
|
|
`[${requestId}] User ${session.user.id} lacks write permission for workspace ${workspaceId}`
|
|
)
|
|
return NextResponse.json({ error: 'Insufficient permissions' }, { status: 403 })
|
|
}
|
|
|
|
const formData = await request.formData()
|
|
const rawFile = formData.get('file')
|
|
|
|
if (!rawFile || !(rawFile instanceof File)) {
|
|
return NextResponse.json({ error: 'No file provided' }, { status: 400 })
|
|
}
|
|
|
|
const fileName = rawFile.name || 'untitled.md'
|
|
|
|
const maxSize = 100 * 1024 * 1024
|
|
if (rawFile.size > maxSize) {
|
|
return NextResponse.json(
|
|
{ error: `File size exceeds 100MB limit (${(rawFile.size / (1024 * 1024)).toFixed(2)}MB)` },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
|
|
const buffer = Buffer.from(await rawFile.arrayBuffer())
|
|
|
|
const userFile = await uploadWorkspaceFile(
|
|
workspaceId,
|
|
session.user.id,
|
|
buffer,
|
|
fileName,
|
|
rawFile.type || 'application/octet-stream'
|
|
)
|
|
|
|
logger.info(`[${requestId}] Uploaded workspace file: ${fileName}`)
|
|
|
|
captureServerEvent(
|
|
session.user.id,
|
|
'file_uploaded',
|
|
{ workspace_id: workspaceId, file_type: rawFile.type || 'application/octet-stream' },
|
|
{ groups: { workspace: workspaceId } }
|
|
)
|
|
|
|
recordAudit({
|
|
workspaceId,
|
|
actorId: session.user.id,
|
|
actorName: session.user.name,
|
|
actorEmail: session.user.email,
|
|
action: AuditAction.FILE_UPLOADED,
|
|
resourceType: AuditResourceType.FILE,
|
|
resourceId: userFile.id,
|
|
resourceName: fileName,
|
|
description: `Uploaded file "${fileName}"`,
|
|
request,
|
|
})
|
|
|
|
return NextResponse.json({
|
|
success: true,
|
|
file: userFile,
|
|
})
|
|
} catch (error) {
|
|
logger.error(`[${requestId}] Error uploading workspace file:`, error)
|
|
|
|
const errorMessage = error instanceof Error ? error.message : 'Failed to upload file'
|
|
const isDuplicate =
|
|
error instanceof FileConflictError || errorMessage.includes('already exists')
|
|
|
|
return NextResponse.json(
|
|
{
|
|
success: false,
|
|
error: errorMessage,
|
|
isDuplicate,
|
|
},
|
|
{ status: isDuplicate ? 409 : 500 }
|
|
)
|
|
}
|
|
}
|