trilium/routes/api/tree.js

76 lines
2.3 KiB
JavaScript
Raw Normal View History

2017-10-22 09:10:33 +08:00
"use strict";
const express = require('express');
const router = express.Router();
2017-10-16 07:47:05 +08:00
const sql = require('../../services/sql');
2017-11-03 08:48:02 +08:00
const options = require('../../services/options');
2017-10-16 07:47:05 +08:00
const utils = require('../../services/utils');
const auth = require('../../services/auth');
2017-11-06 09:37:25 +08:00
const log = require('../../services/log');
2017-11-11 11:55:19 +08:00
const protected_session = require('../../services/protected_session');
const data_encryption = require('../../services/data_encryption');
2017-11-15 13:04:26 +08:00
const notes = require('../../services/notes');
2017-10-16 04:32:49 +08:00
router.get('/', auth.checkApiAuth, async (req, res, next) => {
const notes = await sql.getResults("select "
+ "notes_tree.*, "
+ "notes.note_title, "
+ "notes.is_protected "
+ "from notes_tree "
+ "join notes on notes.note_id = notes_tree.note_id "
2017-10-25 10:58:59 +08:00
+ "where notes.is_deleted = 0 and notes_tree.is_deleted = 0 "
+ "order by note_pid, note_pos");
const root_notes = [];
const notes_map = {};
2017-11-11 11:55:19 +08:00
const dataKey = protected_session.getDataKey(req);
for (const note of notes) {
if (note.is_protected) {
note.note_title = data_encryption.decryptCbcString(dataKey, data_encryption.noteTitleIv(note.note_id), note.note_title);
2017-11-11 11:55:19 +08:00
}
2017-11-06 09:37:25 +08:00
note.children = [];
2017-11-06 09:37:25 +08:00
if (!note.note_pid) {
root_notes.push(note);
}
2017-11-06 09:37:25 +08:00
notes_map[note.note_id] = note;
}
for (const note of notes) {
2017-11-06 09:37:25 +08:00
if (note.note_pid !== "") {
const parent = notes_map[note.note_pid];
if (!parent) {
log.error("Parent " + note.note_pid + ' has not been found');
continue;
}
parent.children.push(note);
parent.folder = true;
}
}
res.send({
2017-11-06 09:37:25 +08:00
notes: root_notes,
start_note_id: await options.getOption('start_node'),
tree_load_time: utils.nowTimestamp()
});
});
2017-11-15 13:04:26 +08:00
router.put('/:noteId/protectSubTree/:isProtected', auth.checkApiAuth, async (req, res, next) => {
const noteId = req.params.noteId;
const isProtected = !!parseInt(req.params.isProtected);
const dataKey = protected_session.getDataKey(req);
await sql.doInTransaction(async () => {
await notes.protectNoteRecursively(noteId, dataKey, isProtected);
});
res.send({});
});
module.exports = router;