aboutsummaryrefslogtreecommitdiffstats
path: root/packages/trpc/models
diff options
context:
space:
mode:
authorMohamed Bassem <me@mbassem.com>2025-11-17 01:12:41 +0000
committerGitHub <noreply@github.com>2025-11-17 01:12:41 +0000
commit88c73e212c4510ce41ad8c6557fa7d5c8f72d199 (patch)
tree11f47349b8c34de1bf541febd9ba48cc44aa305a /packages/trpc/models
parentcc8fee0d28d87299ee9a3ad11dcb4ae5a7b86c15 (diff)
downloadkarakeep-88c73e212c4510ce41ad8c6557fa7d5c8f72d199.tar.zst
feat: Add collaborative lists (#2146)
* feat: Add collaborative lists backend implementation This commit implements the core backend functionality for collaborative lists, allowing multiple users to share and interact with bookmark lists. Database changes: - Add listCollaborators table to track users with access to lists and their roles (viewer/editor) - Add addedBy field to bookmarksInLists to track who added bookmarks - Add relations for collaborative list functionality Access control updates: - Update List model to support role-based access (owner/editor/viewer) - Add methods to check and enforce permissions for list operations - Update Bookmark model to allow access through collaborative lists - Modify bookmark queries to include bookmarks from collaborative lists List collaboration features: - Add/remove/update collaborators - Get list of collaborators - Get lists shared with current user - Only manual lists can have collaborators tRPC procedures: - addCollaborator: Add a user as a collaborator to a list - removeCollaborator: Remove a collaborator from a list - updateCollaboratorRole: Change a collaborator's role - getCollaborators: Get all collaborators for a list - getSharedWithMe: Get all lists shared with the current user - cloneBookmark: Clone a bookmark to the current user's collection Implementation notes: - Editors can add/remove bookmarks from the list (must own the bookmark) - Viewers can only view bookmarks in the list - Only the list owner can manage collaborators and list metadata - Smart lists cannot have collaborators (only manual lists) - Users cannot edit bookmarks they don't own, even in shared lists * feat: Add collaborative lists frontend UI This commit implements the frontend user interface for collaborative lists, allowing users to view shared bookmarks and manage list collaborators. New pages: - /dashboard/shared: Shows bookmarks from lists shared with the user - Displays bookmarks from all collaborative lists - Uses SharedBookmarks component - Shows empty state when no lists are shared Navigation: - Added "Shared with you" link to sidebar with Users icon - Positioned after "Home" in main navigation - Available in both desktop and mobile sidebar Collaborator management: - ManageCollaboratorsModal component for managing list collaborators - Add collaborators by user ID with viewer/editor role - View current collaborators with their roles - Update collaborator roles inline - Remove collaborators - Shows empty state when no collaborators - Integrated into ListOptions dropdown menu - Accessible via "Manage Collaborators" menu item Components created: - SharedBookmarks.tsx: Server component fetching shared lists/bookmarks - ManageCollaboratorsModal.tsx: Client component with tRPC mutations - /dashboard/shared/page.tsx: Route for shared bookmarks page UI features: - Role selector for viewer/editor permissions - Real-time collaborator list updates - Toast notifications for success/error states - Loading states for async operations - Responsive design matching existing UI patterns Implementation notes: - Uses existing tRPC endpoints (getSharedWithMe, getCollaborators, etc.) - Follows established modal patterns from ShareListModal - Integrates seamlessly with existing list UI - Currently uses user ID for adding collaborators (email lookup TBD) * fix typecheck * add collaborator by email * add shared list in the sidebar * fix perm issue * hide UI components from non list owners * list leaving * fix shared bookmarks showing up in homepage * fix getBookmark access check * e2e tests * hide user specific fields from shared lists * simplify bookmark perm checks * disable editable fields in bookmark preview * hide lists if they don't have options * fix list ownership * fix highlights * move tests to trpc * fix alignment of leave list * make tag lists unclickable * allow editors to remove from list * add a badge for shared lists * remove bookmarks of user when they're removed from a list * fix tests * show owner in the manage collab modal * fix hasCollab * drop shared with you * i18n * beta badge * correctly invalidate caches on collab change * reduce unnecessary changes * Add ratelimits * stop manually removing bookmarks on remove * some fixes * fixes * remove unused function * improve tests --------- Co-authored-by: Claude <noreply@anthropic.com>
Diffstat (limited to 'packages/trpc/models')
-rw-r--r--packages/trpc/models/bookmarks.ts309
-rw-r--r--packages/trpc/models/highlights.ts8
-rw-r--r--packages/trpc/models/lists.ts587
3 files changed, 856 insertions, 48 deletions
diff --git a/packages/trpc/models/bookmarks.ts b/packages/trpc/models/bookmarks.ts
index c689f64d..e4bfdab2 100644
--- a/packages/trpc/models/bookmarks.ts
+++ b/packages/trpc/models/bookmarks.ts
@@ -15,19 +15,23 @@ import {
import invariant from "tiny-invariant";
import { z } from "zod";
+import { db as DONT_USE_db } from "@karakeep/db";
import {
assets,
AssetTypes,
bookmarkAssets,
bookmarkLinks,
+ bookmarkLists,
bookmarks,
bookmarksInLists,
bookmarkTags,
bookmarkTexts,
+ listCollaborators,
rssFeedImportsTable,
tagsOnBookmarks,
} from "@karakeep/db/schema";
-import { readAsset } from "@karakeep/shared/assetdb";
+import { SearchIndexingQueue, triggerWebhook } from "@karakeep/shared-server";
+import { deleteAsset, readAsset } from "@karakeep/shared/assetdb";
import serverConfig from "@karakeep/shared/config";
import {
createSignedToken,
@@ -37,6 +41,7 @@ import { zAssetSignedTokenSchema } from "@karakeep/shared/types/assets";
import {
BookmarkTypes,
DEFAULT_NUM_BOOKMARKS_PER_PAGE,
+ ZBareBookmark,
ZBookmark,
ZBookmarkContent,
zGetBookmarksRequestSchema,
@@ -54,26 +59,225 @@ import { mapDBAssetTypeToUserType } from "../lib/attachments";
import { List } from "./lists";
import { PrivacyAware } from "./privacy";
-export class Bookmark implements PrivacyAware {
+async function dummyDrizzleReturnType() {
+ const x = await DONT_USE_db.query.bookmarks.findFirst({
+ with: {
+ tagsOnBookmarks: {
+ with: {
+ tag: true,
+ },
+ },
+ link: true,
+ text: true,
+ asset: true,
+ assets: true,
+ },
+ });
+ if (!x) {
+ throw new Error();
+ }
+ return x;
+}
+
+type BookmarkQueryReturnType = Awaited<
+ ReturnType<typeof dummyDrizzleReturnType>
+>;
+
+export class BareBookmark implements PrivacyAware {
protected constructor(
protected ctx: AuthedContext,
- public bookmark: ZBookmark & { userId: string },
+ private bareBookmark: ZBareBookmark,
) {}
+ get id() {
+ return this.bareBookmark.id;
+ }
+
+ get createdAt() {
+ return this.bareBookmark.createdAt;
+ }
+
+ static async bareFromId(ctx: AuthedContext, bookmarkId: string) {
+ const bookmark = await ctx.db.query.bookmarks.findFirst({
+ where: eq(bookmarks.id, bookmarkId),
+ });
+
+ if (!bookmark) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Bookmark not found",
+ });
+ }
+
+ if (!(await BareBookmark.isAllowedToAccessBookmark(ctx, bookmark))) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Bookmark not found",
+ });
+ }
+
+ return new BareBookmark(ctx, bookmark);
+ }
+
+ protected static async isAllowedToAccessBookmark(
+ ctx: AuthedContext,
+ { id: bookmarkId, userId: bookmarkOwnerId }: { id: string; userId: string },
+ ): Promise<boolean> {
+ if (bookmarkOwnerId == ctx.user.id) {
+ return true;
+ }
+ const bookmarkLists = await List.forBookmark(ctx, bookmarkId);
+ return bookmarkLists.some((l) => l.canUserView());
+ }
+
+ ensureOwnership() {
+ if (this.bareBookmark.userId != this.ctx.user.id) {
+ throw new TRPCError({
+ code: "FORBIDDEN",
+ message: "User is not allowed to access resource",
+ });
+ }
+ }
+
ensureCanAccess(ctx: AuthedContext): void {
- if (this.bookmark.userId != ctx.user.id) {
+ if (this.bareBookmark.userId != ctx.user.id) {
throw new TRPCError({
code: "FORBIDDEN",
message: "User is not allowed to access resource",
});
}
}
+}
- static fromData(ctx: AuthedContext, data: ZBookmark) {
- return new Bookmark(ctx, {
- ...data,
- userId: ctx.user.id,
+export class Bookmark extends BareBookmark {
+ protected constructor(
+ ctx: AuthedContext,
+ private bookmark: ZBookmark,
+ ) {
+ super(ctx, bookmark);
+ }
+
+ private static async toZodSchema(
+ bookmark: BookmarkQueryReturnType,
+ includeContent: boolean,
+ ): Promise<ZBookmark> {
+ const { tagsOnBookmarks, link, text, asset, assets, ...rest } = bookmark;
+
+ let content: ZBookmarkContent = {
+ type: BookmarkTypes.UNKNOWN,
+ };
+ if (bookmark.link) {
+ content = {
+ type: BookmarkTypes.LINK,
+ screenshotAssetId: assets.find(
+ (a) => a.assetType == AssetTypes.LINK_SCREENSHOT,
+ )?.id,
+ fullPageArchiveAssetId: assets.find(
+ (a) => a.assetType == AssetTypes.LINK_FULL_PAGE_ARCHIVE,
+ )?.id,
+ precrawledArchiveAssetId: assets.find(
+ (a) => a.assetType == AssetTypes.LINK_PRECRAWLED_ARCHIVE,
+ )?.id,
+ imageAssetId: assets.find(
+ (a) => a.assetType == AssetTypes.LINK_BANNER_IMAGE,
+ )?.id,
+ videoAssetId: assets.find((a) => a.assetType == AssetTypes.LINK_VIDEO)
+ ?.id,
+ url: link.url,
+ title: link.title,
+ description: link.description,
+ imageUrl: link.imageUrl,
+ favicon: link.favicon,
+ htmlContent: includeContent
+ ? await Bookmark.getBookmarkHtmlContent(link, bookmark.userId)
+ : null,
+ crawledAt: link.crawledAt,
+ author: link.author,
+ publisher: link.publisher,
+ datePublished: link.datePublished,
+ dateModified: link.dateModified,
+ };
+ }
+ if (bookmark.text) {
+ content = {
+ type: BookmarkTypes.TEXT,
+ // It's ok to include the text content as it's usually not big and is used to render the text bookmark card.
+ text: text.text ?? "",
+ sourceUrl: text.sourceUrl,
+ };
+ }
+ if (bookmark.asset) {
+ content = {
+ type: BookmarkTypes.ASSET,
+ assetType: asset.assetType,
+ assetId: asset.assetId,
+ fileName: asset.fileName,
+ sourceUrl: asset.sourceUrl,
+ size: assets.find((a) => a.id == asset.assetId)?.size,
+ content: includeContent ? asset.content : null,
+ };
+ }
+
+ return {
+ tags: tagsOnBookmarks
+ .map((t) => ({
+ attachedBy: t.attachedBy,
+ ...t.tag,
+ }))
+ .sort((a, b) =>
+ a.attachedBy === "ai" ? 1 : b.attachedBy === "ai" ? -1 : 0,
+ ),
+ content,
+ assets: assets.map((a) => ({
+ id: a.id,
+ assetType: mapDBAssetTypeToUserType(a.assetType),
+ fileName: a.fileName,
+ })),
+ ...rest,
+ };
+ }
+
+ static async fromId(
+ ctx: AuthedContext,
+ bookmarkId: string,
+ includeContent: boolean,
+ ) {
+ const bookmark = await ctx.db.query.bookmarks.findFirst({
+ where: eq(bookmarks.id, bookmarkId),
+ with: {
+ tagsOnBookmarks: {
+ with: {
+ tag: true,
+ },
+ },
+ link: true,
+ text: true,
+ asset: true,
+ assets: true,
+ },
});
+
+ if (!bookmark) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Bookmark not found",
+ });
+ }
+
+ if (!(await BareBookmark.isAllowedToAccessBookmark(ctx, bookmark))) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Bookmark not found",
+ });
+ }
+ return Bookmark.fromData(
+ ctx,
+ await Bookmark.toZodSchema(bookmark, includeContent),
+ );
+ }
+
+ static fromData(ctx: AuthedContext, data: ZBookmark) {
+ return new Bookmark(ctx, data);
}
static async loadMulti(
@@ -103,7 +307,42 @@ export class Bookmark implements PrivacyAware {
.from(bookmarks)
.where(
and(
- eq(bookmarks.userId, ctx.user.id),
+ // Access control: User can access bookmarks if they either:
+ // 1. Own the bookmark (always)
+ // 2. The bookmark is in a specific shared list being viewed
+ // When listId is specified, we need special handling to show all bookmarks in that list
+ input.listId !== undefined
+ ? // If querying a specific list, check if user has access to that list
+ or(
+ eq(bookmarks.userId, ctx.user.id),
+ // User is the owner of the list being queried
+ exists(
+ ctx.db
+ .select()
+ .from(bookmarkLists)
+ .where(
+ and(
+ eq(bookmarkLists.id, input.listId),
+ eq(bookmarkLists.userId, ctx.user.id),
+ ),
+ ),
+ ),
+ // User is a collaborator on the list being queried
+ exists(
+ ctx.db
+ .select()
+ .from(listCollaborators)
+ .where(
+ and(
+ eq(listCollaborators.listId, input.listId),
+ eq(listCollaborators.userId, ctx.user.id),
+ ),
+ ),
+ ),
+ )
+ : // If not querying a specific list, only show bookmarks the user owns
+ // Shared bookmarks should only appear when viewing the specific shared list
+ eq(bookmarks.userId, ctx.user.id),
input.archived !== undefined
? eq(bookmarks.archived, input.archived)
: undefined,
@@ -317,7 +556,7 @@ export class Bookmark implements PrivacyAware {
) {
try {
const asset = await readAsset({
- userId: ctx.user.id,
+ userId: bookmark.userId,
assetId: bookmark.content.contentAssetId,
});
bookmark.content.htmlContent = asset.asset.toString("utf8");
@@ -365,7 +604,18 @@ export class Bookmark implements PrivacyAware {
}
asZBookmark(): ZBookmark {
- return this.bookmark;
+ if (this.bookmark.userId === this.ctx.user.id) {
+ return this.bookmark;
+ }
+
+ // Collaborators shouldn't see owner-specific state such as favourites,
+ // archived flag, or personal notes.
+ return {
+ ...this.bookmark,
+ archived: false,
+ favourited: false,
+ note: null,
+ };
}
asPublicBookmark(): ZPublicBookmark {
@@ -512,4 +762,41 @@ export class Bookmark implements PrivacyAware {
}
return htmlToPlainText(content);
}
+
+ private async cleanupAssets() {
+ const assetIds: Set<string> = new Set<string>(
+ this.bookmark.assets.map((a) => a.id),
+ );
+ // Todo: Remove when the bookmark asset is also in the assets table
+ if (this.bookmark.content.type == BookmarkTypes.ASSET) {
+ assetIds.add(this.bookmark.content.assetId);
+ }
+ await Promise.all(
+ Array.from(assetIds).map((assetId) =>
+ deleteAsset({ userId: this.bookmark.userId, assetId }),
+ ),
+ );
+ }
+
+ async delete() {
+ this.ensureOwnership();
+ const deleted = await this.ctx.db
+ .delete(bookmarks)
+ .where(
+ and(
+ eq(bookmarks.userId, this.ctx.user.id),
+ eq(bookmarks.id, this.bookmark.id),
+ ),
+ );
+
+ await SearchIndexingQueue.enqueue({
+ bookmarkId: this.bookmark.id,
+ type: "delete",
+ });
+
+ await triggerWebhook(this.bookmark.id, "deleted", this.ctx.user.id);
+ if (deleted.changes > 0) {
+ await this.cleanupAssets();
+ }
+ }
}
diff --git a/packages/trpc/models/highlights.ts b/packages/trpc/models/highlights.ts
index 326f97f3..260c4b8a 100644
--- a/packages/trpc/models/highlights.ts
+++ b/packages/trpc/models/highlights.ts
@@ -11,6 +11,7 @@ import {
import { zCursorV2 } from "@karakeep/shared/types/pagination";
import { AuthedContext } from "..";
+import { BareBookmark } from "./bookmarks";
import { PrivacyAware } from "./privacy";
export class Highlight implements PrivacyAware {
@@ -64,13 +65,10 @@ export class Highlight implements PrivacyAware {
static async getForBookmark(
ctx: AuthedContext,
- bookmarkId: string,
+ bookmark: BareBookmark,
): Promise<Highlight[]> {
const results = await ctx.db.query.highlights.findMany({
- where: and(
- eq(highlights.bookmarkId, bookmarkId),
- eq(highlights.userId, ctx.user.id),
- ),
+ where: eq(highlights.bookmarkId, bookmark.id),
orderBy: [desc(highlights.createdAt), desc(highlights.id)],
});
diff --git a/packages/trpc/models/lists.ts b/packages/trpc/models/lists.ts
index 48da5ed1..28473c12 100644
--- a/packages/trpc/models/lists.ts
+++ b/packages/trpc/models/lists.ts
@@ -1,11 +1,16 @@
import crypto from "node:crypto";
import { TRPCError } from "@trpc/server";
-import { and, count, eq, or } from "drizzle-orm";
+import { and, count, eq, inArray, or } from "drizzle-orm";
import invariant from "tiny-invariant";
import { z } from "zod";
import { SqliteError } from "@karakeep/db";
-import { bookmarkLists, bookmarksInLists } from "@karakeep/db/schema";
+import {
+ bookmarkLists,
+ bookmarksInLists,
+ listCollaborators,
+ users,
+} from "@karakeep/db/schema";
import { triggerRuleEngineOnEvent } from "@karakeep/shared-server";
import { parseSearchQuery } from "@karakeep/shared/searchQueryParser";
import { ZSortOrder } from "@karakeep/shared/types/bookmarks";
@@ -15,6 +20,7 @@ import {
zNewBookmarkListSchema,
} from "@karakeep/shared/types/lists";
import { ZCursor } from "@karakeep/shared/types/pagination";
+import { switchCase } from "@karakeep/shared/utils/switch";
import { AuthedContext, Context } from "..";
import { buildImpersonatingAuthedContext } from "../lib/impersonate";
@@ -22,20 +28,54 @@ import { getBookmarkIdsFromMatcher } from "../lib/search";
import { Bookmark } from "./bookmarks";
import { PrivacyAware } from "./privacy";
+interface ListCollaboratorEntry {
+ membershipId: string;
+}
+
export abstract class List implements PrivacyAware {
protected constructor(
protected ctx: AuthedContext,
- public list: ZBookmarkList & { userId: string },
+ protected list: ZBookmarkList & { userId: string },
) {}
+ get id() {
+ return this.list.id;
+ }
+
+ asZBookmarkList() {
+ if (this.list.userId === this.ctx.user.id) {
+ return this.list;
+ }
+
+ // There's some privacy implications here, so we need to think twice
+ // about the values that we return.
+ return {
+ id: this.list.id,
+ name: this.list.name,
+ description: this.list.description,
+ userId: this.list.userId,
+ icon: this.list.icon,
+ type: this.list.type,
+ query: this.list.query,
+ userRole: this.list.userRole,
+ hasCollaborators: this.list.hasCollaborators,
+
+ // Hide parentId as it is not relevant to the user
+ parentId: null,
+ // Hide whether the list is public or not.
+ public: false,
+ };
+ }
+
private static fromData(
ctx: AuthedContext,
data: ZBookmarkList & { userId: string },
+ collaboratorEntry: ListCollaboratorEntry | null,
) {
if (data.type === "smart") {
return new SmartList(ctx, data);
} else {
- return new ManualList(ctx, data);
+ return new ManualList(ctx, data, collaboratorEntry);
}
}
@@ -43,12 +83,64 @@ export abstract class List implements PrivacyAware {
ctx: AuthedContext,
id: string,
): Promise<ManualList | SmartList> {
- const list = await ctx.db.query.bookmarkLists.findFirst({
- where: and(
- eq(bookmarkLists.id, id),
- eq(bookmarkLists.userId, ctx.user.id),
- ),
- });
+ // First try to find the list owned by the user
+ let list = await (async (): Promise<
+ (ZBookmarkList & { userId: string }) | undefined
+ > => {
+ const l = await ctx.db.query.bookmarkLists.findFirst({
+ columns: {
+ rssToken: false,
+ },
+ where: and(
+ eq(bookmarkLists.id, id),
+ eq(bookmarkLists.userId, ctx.user.id),
+ ),
+ with: {
+ collaborators: {
+ columns: {
+ id: true,
+ },
+ limit: 1,
+ },
+ },
+ });
+ return l
+ ? {
+ ...l,
+ userRole: "owner",
+ hasCollaborators: l.collaborators.length > 0,
+ }
+ : l;
+ })();
+
+ // If not found, check if the user is a collaborator
+ let collaboratorEntry: ListCollaboratorEntry | null = null;
+ if (!list) {
+ const collaborator = await ctx.db.query.listCollaborators.findFirst({
+ where: and(
+ eq(listCollaborators.listId, id),
+ eq(listCollaborators.userId, ctx.user.id),
+ ),
+ with: {
+ list: {
+ columns: {
+ rssToken: false,
+ },
+ },
+ },
+ });
+
+ if (collaborator) {
+ list = {
+ ...collaborator.list,
+ userRole: collaborator.role,
+ hasCollaborators: true, // If you're a collaborator, the list has collaborators
+ };
+ collaboratorEntry = {
+ membershipId: collaborator.id,
+ };
+ }
+ }
if (!list) {
throw new TRPCError({
@@ -59,7 +151,7 @@ export abstract class List implements PrivacyAware {
if (list.type === "smart") {
return new SmartList(ctx, list);
} else {
- return new ManualList(ctx, list);
+ return new ManualList(ctx, list, collaboratorEntry);
}
}
@@ -124,8 +216,17 @@ export abstract class List implements PrivacyAware {
// an impersonating context for the list owner as long as
// we don't leak the context.
const authedCtx = await buildImpersonatingAuthedContext(listdb.userId);
- const list = List.fromData(authedCtx, listdb);
- const bookmarkIds = await list.getBookmarkIds();
+ const listObj = List.fromData(
+ authedCtx,
+ {
+ ...listdb,
+ userRole: "public",
+ hasCollaborators: false, // Public lists don't expose collaborators
+ },
+ null,
+ );
+ const bookmarkIds = await listObj.getBookmarkIds();
+ const list = listObj.asZBookmarkList();
const bookmarks = await Bookmark.loadMulti(authedCtx, {
ids: bookmarkIds,
@@ -137,9 +238,9 @@ export abstract class List implements PrivacyAware {
return {
list: {
- icon: list.list.icon,
- name: list.list.name,
- description: list.list.description,
+ icon: list.icon,
+ name: list.name,
+ description: list.description,
ownerName: listdb.user.name,
numItems: bookmarkIds.length,
},
@@ -164,32 +265,127 @@ export abstract class List implements PrivacyAware {
query: input.query,
})
.returning();
- return this.fromData(ctx, result);
+ return this.fromData(
+ ctx,
+ {
+ ...result,
+ userRole: "owner",
+ hasCollaborators: false, // Newly created lists have no collaborators
+ },
+ null,
+ );
+ }
+
+ static async getAll(ctx: AuthedContext) {
+ const [ownedLists, sharedLists] = await Promise.all([
+ this.getAllOwned(ctx),
+ this.getSharedWithUser(ctx),
+ ]);
+ return [...ownedLists, ...sharedLists];
}
- static async getAll(ctx: AuthedContext): Promise<(ManualList | SmartList)[]> {
+ static async getAllOwned(
+ ctx: AuthedContext,
+ ): Promise<(ManualList | SmartList)[]> {
const lists = await ctx.db.query.bookmarkLists.findMany({
columns: {
rssToken: false,
},
where: and(eq(bookmarkLists.userId, ctx.user.id)),
+ with: {
+ collaborators: {
+ columns: {
+ id: true,
+ },
+ limit: 1,
+ },
+ },
});
- return lists.map((l) => this.fromData(ctx, l));
+ return lists.map((l) =>
+ this.fromData(
+ ctx,
+ {
+ ...l,
+ userRole: "owner",
+ hasCollaborators: l.collaborators.length > 0,
+ },
+ null /* this is an owned list */,
+ ),
+ );
}
static async forBookmark(ctx: AuthedContext, bookmarkId: string) {
const lists = await ctx.db.query.bookmarksInLists.findMany({
- where: and(eq(bookmarksInLists.bookmarkId, bookmarkId)),
+ where: eq(bookmarksInLists.bookmarkId, bookmarkId),
with: {
list: {
columns: {
rssToken: false,
},
+ with: {
+ collaborators: {
+ where: eq(listCollaborators.userId, ctx.user.id),
+ columns: {
+ id: true,
+ role: true,
+ },
+ },
+ },
},
},
});
- invariant(lists.map((l) => l.list.userId).every((id) => id == ctx.user.id));
- return lists.map((l) => this.fromData(ctx, l.list));
+
+ // For owner lists, we need to check if they actually have collaborators
+ // by querying the collaborators table separately (without user filter)
+ const ownerListIds = lists
+ .filter((l) => l.list.userId === ctx.user.id)
+ .map((l) => l.list.id);
+
+ const listsWithCollaborators = new Set<string>();
+ if (ownerListIds.length > 0) {
+ // Use a single query with inArray instead of N queries
+ const collaborators = await ctx.db.query.listCollaborators.findMany({
+ where: inArray(listCollaborators.listId, ownerListIds),
+ columns: {
+ listId: true,
+ },
+ });
+ collaborators.forEach((c) => {
+ listsWithCollaborators.add(c.listId);
+ });
+ }
+
+ return lists.flatMap((l) => {
+ let userRole: "owner" | "editor" | "viewer" | null;
+ let collaboratorEntry: ListCollaboratorEntry | null = null;
+ if (l.list.collaborators.length > 0) {
+ invariant(l.list.collaborators.length == 1);
+ userRole = l.list.collaborators[0].role;
+ collaboratorEntry = {
+ membershipId: l.list.collaborators[0].id,
+ };
+ } else if (l.list.userId === ctx.user.id) {
+ userRole = "owner";
+ } else {
+ userRole = null;
+ }
+ return userRole
+ ? [
+ this.fromData(
+ ctx,
+ {
+ ...l.list,
+ userRole,
+ hasCollaborators:
+ userRole !== "owner"
+ ? true
+ : listsWithCollaborators.has(l.list.id),
+ },
+ collaboratorEntry,
+ ),
+ ]
+ : [];
+ });
}
ensureCanAccess(ctx: AuthedContext): void {
@@ -201,7 +397,81 @@ export abstract class List implements PrivacyAware {
}
}
+ /**
+ * Check if the user can view this list and its bookmarks.
+ */
+ canUserView(): boolean {
+ return switchCase(this.list.userRole, {
+ owner: true,
+ editor: true,
+ viewer: true,
+ public: true,
+ });
+ }
+
+ /**
+ * Check if the user can edit this list (add/remove bookmarks).
+ */
+ canUserEdit(): boolean {
+ return switchCase(this.list.userRole, {
+ owner: true,
+ editor: true,
+ viewer: false,
+ public: false,
+ });
+ }
+
+ /**
+ * Check if the user can manage this list (edit metadata, delete, manage collaborators).
+ * Only the owner can manage the list.
+ */
+ canUserManage(): boolean {
+ return switchCase(this.list.userRole, {
+ owner: true,
+ editor: false,
+ viewer: false,
+ public: false,
+ });
+ }
+
+ /**
+ * Ensure the user can view this list. Throws if they cannot.
+ */
+ ensureCanView(): void {
+ if (!this.canUserView()) {
+ throw new TRPCError({
+ code: "FORBIDDEN",
+ message: "User is not allowed to view this list",
+ });
+ }
+ }
+
+ /**
+ * Ensure the user can edit this list. Throws if they cannot.
+ */
+ ensureCanEdit(): void {
+ if (!this.canUserEdit()) {
+ throw new TRPCError({
+ code: "FORBIDDEN",
+ message: "User is not allowed to edit this list",
+ });
+ }
+ }
+
+ /**
+ * Ensure the user can manage this list. Throws if they cannot.
+ */
+ ensureCanManage(): void {
+ if (!this.canUserManage()) {
+ throw new TRPCError({
+ code: "FORBIDDEN",
+ message: "User is not allowed to manage this list",
+ });
+ }
+ }
+
async delete() {
+ this.ensureCanManage();
const res = await this.ctx.db
.delete(bookmarkLists)
.where(
@@ -216,22 +486,23 @@ export abstract class List implements PrivacyAware {
}
async getChildren(): Promise<(ManualList | SmartList)[]> {
- const lists = await List.getAll(this.ctx);
- const listById = new Map(lists.map((l) => [l.list.id, l]));
+ const lists = await List.getAllOwned(this.ctx);
+ const listById = new Map(lists.map((l) => [l.id, l]));
const adjecencyList = new Map<string, string[]>();
// Initialize all lists with empty arrays first
lists.forEach((l) => {
- adjecencyList.set(l.list.id, []);
+ adjecencyList.set(l.id, []);
});
// Then populate the parent-child relationships
lists.forEach((l) => {
- if (l.list.parentId) {
- const currentChildren = adjecencyList.get(l.list.parentId) ?? [];
- currentChildren.push(l.list.id);
- adjecencyList.set(l.list.parentId, currentChildren);
+ const parentId = l.asZBookmarkList().parentId;
+ if (parentId) {
+ const currentChildren = adjecencyList.get(parentId) ?? [];
+ currentChildren.push(l.id);
+ adjecencyList.set(parentId, currentChildren);
}
});
@@ -253,6 +524,7 @@ export abstract class List implements PrivacyAware {
async update(
input: z.infer<typeof zEditBookmarkListSchemaWithValidation>,
): Promise<void> {
+ this.ensureCanManage();
const result = await this.ctx.db
.update(bookmarkLists)
.set({
@@ -273,7 +545,21 @@ export abstract class List implements PrivacyAware {
if (result.length == 0) {
throw new TRPCError({ code: "NOT_FOUND" });
}
- this.list = result[0];
+ invariant(result[0].userId === this.ctx.user.id);
+ // Fetch current collaborators count to update hasCollaborators
+ const collaboratorsCount =
+ await this.ctx.db.query.listCollaborators.findMany({
+ where: eq(listCollaborators.listId, this.list.id),
+ columns: {
+ id: true,
+ },
+ limit: 1,
+ });
+ this.list = {
+ ...result[0],
+ userRole: "owner",
+ hasCollaborators: collaboratorsCount.length > 0,
+ };
}
private async setRssToken(token: string | null) {
@@ -294,6 +580,7 @@ export abstract class List implements PrivacyAware {
}
async getRssToken(): Promise<string | null> {
+ this.ensureCanManage();
const [result] = await this.ctx.db
.select({ rssToken: bookmarkLists.rssToken })
.from(bookmarkLists)
@@ -308,13 +595,237 @@ export abstract class List implements PrivacyAware {
}
async regenRssToken() {
+ this.ensureCanManage();
return await this.setRssToken(crypto.randomBytes(32).toString("hex"));
}
async clearRssToken() {
+ this.ensureCanManage();
await this.setRssToken(null);
}
+ /**
+ * Add a collaborator to this list by email.
+ */
+ async addCollaboratorByEmail(
+ email: string,
+ role: "viewer" | "editor",
+ ): Promise<void> {
+ this.ensureCanManage();
+
+ // Look up the user by email
+ const user = await this.ctx.db.query.users.findFirst({
+ where: (users, { eq }) => eq(users.email, email),
+ });
+
+ if (!user) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "No user found with that email address",
+ });
+ }
+
+ // Check that the user is not adding themselves
+ if (user.id === this.list.userId) {
+ throw new TRPCError({
+ code: "BAD_REQUEST",
+ message: "Cannot add the list owner as a collaborator",
+ });
+ }
+
+ // Check that the collaborator is not already added
+ const existing = await this.ctx.db.query.listCollaborators.findFirst({
+ where: and(
+ eq(listCollaborators.listId, this.list.id),
+ eq(listCollaborators.userId, user.id),
+ ),
+ });
+
+ if (existing) {
+ throw new TRPCError({
+ code: "BAD_REQUEST",
+ message: "User is already a collaborator on this list",
+ });
+ }
+
+ // Only manual lists can be collaborative
+ if (this.list.type !== "manual") {
+ throw new TRPCError({
+ code: "BAD_REQUEST",
+ message: "Only manual lists can have collaborators",
+ });
+ }
+
+ await this.ctx.db.insert(listCollaborators).values({
+ listId: this.list.id,
+ userId: user.id,
+ role,
+ addedBy: this.ctx.user.id,
+ });
+ }
+
+ /**
+ * Remove a collaborator from this list.
+ * Only the list owner can remove collaborators.
+ * This also removes all bookmarks that the collaborator added to the list.
+ */
+ async removeCollaborator(userId: string): Promise<void> {
+ this.ensureCanManage();
+
+ const result = await this.ctx.db
+ .delete(listCollaborators)
+ .where(
+ and(
+ eq(listCollaborators.listId, this.list.id),
+ eq(listCollaborators.userId, userId),
+ ),
+ );
+
+ if (result.changes === 0) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Collaborator not found",
+ });
+ }
+ }
+
+ /**
+ * Allow a user to leave a list (remove themselves as a collaborator).
+ * This bypasses the owner check since users should be able to leave lists they're collaborating on.
+ * This also removes all bookmarks that the user added to the list.
+ */
+ async leaveList(): Promise<void> {
+ if (this.list.userRole === "owner") {
+ throw new TRPCError({
+ code: "BAD_REQUEST",
+ message:
+ "List owners cannot leave their own list. Delete the list instead.",
+ });
+ }
+
+ const result = await this.ctx.db
+ .delete(listCollaborators)
+ .where(
+ and(
+ eq(listCollaborators.listId, this.list.id),
+ eq(listCollaborators.userId, this.ctx.user.id),
+ ),
+ );
+
+ if (result.changes === 0) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Collaborator not found",
+ });
+ }
+ }
+
+ /**
+ * Update a collaborator's role.
+ */
+ async updateCollaboratorRole(
+ userId: string,
+ role: "viewer" | "editor",
+ ): Promise<void> {
+ this.ensureCanManage();
+
+ const result = await this.ctx.db
+ .update(listCollaborators)
+ .set({ role })
+ .where(
+ and(
+ eq(listCollaborators.listId, this.list.id),
+ eq(listCollaborators.userId, userId),
+ ),
+ );
+
+ if (result.changes === 0) {
+ throw new TRPCError({
+ code: "NOT_FOUND",
+ message: "Collaborator not found",
+ });
+ }
+ }
+
+ /**
+ * Get all collaborators for this list.
+ */
+ async getCollaborators() {
+ this.ensureCanView();
+
+ const collaborators = await this.ctx.db.query.listCollaborators.findMany({
+ where: eq(listCollaborators.listId, this.list.id),
+ with: {
+ user: {
+ columns: {
+ id: true,
+ name: true,
+ email: true,
+ },
+ },
+ },
+ });
+
+ // Get the owner information
+ const owner = await this.ctx.db.query.users.findFirst({
+ where: eq(users.id, this.list.userId),
+ columns: {
+ id: true,
+ name: true,
+ email: true,
+ },
+ });
+
+ return {
+ collaborators: collaborators.map((c) => ({
+ id: c.id,
+ userId: c.userId,
+ role: c.role,
+ addedAt: c.addedAt,
+ user: c.user,
+ })),
+ owner: owner
+ ? {
+ id: owner.id,
+ name: owner.name,
+ email: owner.email,
+ }
+ : null,
+ };
+ }
+
+ /**
+ * Get all lists shared with the user (as a collaborator).
+ */
+ static async getSharedWithUser(
+ ctx: AuthedContext,
+ ): Promise<(ManualList | SmartList)[]> {
+ const collaborations = await ctx.db.query.listCollaborators.findMany({
+ where: eq(listCollaborators.userId, ctx.user.id),
+ with: {
+ list: {
+ columns: {
+ rssToken: false,
+ },
+ },
+ },
+ });
+
+ return collaborations.map((c) =>
+ this.fromData(
+ ctx,
+ {
+ ...c.list,
+ userRole: c.role,
+ hasCollaborators: true, // If you're a collaborator, the list has collaborators
+ },
+ {
+ membershipId: c.id,
+ },
+ ),
+ );
+ }
+
abstract get type(): "manual" | "smart";
abstract getBookmarkIds(ctx: AuthedContext): Promise<string[]>;
abstract getSize(ctx: AuthedContext): Promise<number>;
@@ -392,7 +903,11 @@ export class SmartList extends List {
}
export class ManualList extends List {
- constructor(ctx: AuthedContext, list: ZBookmarkList & { userId: string }) {
+ constructor(
+ ctx: AuthedContext,
+ list: ZBookmarkList & { userId: string },
+ private collaboratorEntry: ListCollaboratorEntry | null,
+ ) {
super(ctx, list);
}
@@ -418,10 +933,13 @@ export class ManualList extends List {
}
async addBookmark(bookmarkId: string): Promise<void> {
+ this.ensureCanEdit();
+
try {
await this.ctx.db.insert(bookmarksInLists).values({
listId: this.list.id,
bookmarkId,
+ listMembershipId: this.collaboratorEntry?.membershipId,
});
await triggerRuleEngineOnEvent(bookmarkId, [
{
@@ -444,6 +962,9 @@ export class ManualList extends List {
}
async removeBookmark(bookmarkId: string): Promise<void> {
+ // Check that the user can edit this list
+ this.ensureCanEdit();
+
const deleted = await this.ctx.db
.delete(bookmarksInLists)
.where(
@@ -480,6 +1001,8 @@ export class ManualList extends List {
targetList: List,
deleteSourceAfterMerge: boolean,
): Promise<void> {
+ this.ensureCanManage();
+ targetList.ensureCanManage();
if (targetList.type !== "manual") {
throw new TRPCError({
code: "BAD_REQUEST",
@@ -495,7 +1018,7 @@ export class ManualList extends List {
.values(
bookmarkIds.map((id) => ({
bookmarkId: id,
- listId: targetList.list.id,
+ listId: targetList.id,
})),
)
.onConflictDoNothing();