Compare commits
5 Commits
4dc4022405
...
v2.4.8
| Author | SHA1 | Date | |
|---|---|---|---|
| 4b51c8e3c3 | |||
| 1312dcdb1e | |||
| ecc7b329d4 | |||
| f56e8813e5 | |||
| 461c7d5bb4 |
@@ -48,6 +48,54 @@ public class CsvExportServiceTests
|
|||||||
Assert.Contains("Object", csv);
|
Assert.Contains("Object", csv);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildCsv_WithResolvedTarget_IncludesTargetColumns()
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "Site",
|
||||||
|
Title: "HR",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
UserLogins: "Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
PermissionLevels: "Limited Access: Edit",
|
||||||
|
GrantedThrough: "SharePoint Group: Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Lists/Payroll",
|
||||||
|
TargetLabel: "Payroll");
|
||||||
|
|
||||||
|
var svc = new CsvExportService();
|
||||||
|
var csv = svc.BuildCsv(new[] { entry });
|
||||||
|
|
||||||
|
Assert.Contains("TargetLabel", csv);
|
||||||
|
Assert.Contains("TargetUrl", csv);
|
||||||
|
Assert.Contains("Payroll", csv);
|
||||||
|
Assert.Contains("https://contoso.sharepoint.com/sites/HR/Lists/Payroll", csv);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildCsv_WithSharingLink_IncludesLinkType()
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "Folder", Title: "Reports", Url: "https://contoso.sharepoint.com/sites/HR/Docs",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
UserLogins: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PermissionLevels: "Contribute",
|
||||||
|
GrantedThrough: "SharePoint Group: SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Docs/Q4.xlsx",
|
||||||
|
TargetLabel: "Q4.xlsx",
|
||||||
|
SharingLinkType: "OrganizationEdit");
|
||||||
|
|
||||||
|
var svc = new CsvExportService();
|
||||||
|
var csv = svc.BuildCsv(new[] { entry });
|
||||||
|
|
||||||
|
Assert.Contains("SharingLinkType", csv);
|
||||||
|
Assert.Contains("OrganizationEdit", csv);
|
||||||
|
Assert.Contains("Q4.xlsx", csv);
|
||||||
|
}
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void BuildCsv_WithDuplicateUserPermissionGrantedThrough_MergesLocations()
|
public void BuildCsv_WithDuplicateUserPermissionGrantedThrough_MergesLocations()
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -156,6 +156,146 @@ public class HtmlExportServiceTests
|
|||||||
Assert.Contains("getAttribute('data-group-target')", html);
|
Assert.Contains("getAttribute('data-group-target')", html);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ── System-group target rendering (Limited Access / SharingLinks) ────────
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildHtml_WithResolvedListTarget_RendersClickableLink()
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "Site",
|
||||||
|
Title: "Contoso HR",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
UserLogins: "Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
PermissionLevels: "Limited Access: Edit",
|
||||||
|
GrantedThrough: "SharePoint Group: Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Lists/Payroll",
|
||||||
|
TargetLabel: "Payroll");
|
||||||
|
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry });
|
||||||
|
|
||||||
|
Assert.Contains("https://contoso.sharepoint.com/sites/HR/Lists/Payroll", html);
|
||||||
|
Assert.Contains(">Payroll</a>", html);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildHtml_WithSharingLinkTarget_RendersLinkTypeBadgeAndTarget()
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "Folder",
|
||||||
|
Title: "Reports",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR/Shared%20Documents/Reports",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
UserLogins: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PermissionLevels: "Contribute",
|
||||||
|
GrantedThrough: "SharePoint Group: SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Shared%20Documents/Reports/Q4.xlsx",
|
||||||
|
TargetLabel: "Q4.xlsx",
|
||||||
|
SharingLinkType: "OrganizationEdit");
|
||||||
|
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry });
|
||||||
|
|
||||||
|
// Friendly label, raw code preserved as tooltip
|
||||||
|
Assert.Contains("Org link", html);
|
||||||
|
Assert.Contains("Edit", html);
|
||||||
|
Assert.Contains("title=\"OrganizationEdit\"", html);
|
||||||
|
Assert.Contains("Q4.xlsx", html);
|
||||||
|
Assert.Contains("https://contoso.sharepoint.com/sites/HR/Shared%20Documents/Reports/Q4.xlsx", html);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Theory]
|
||||||
|
[InlineData("OrganizationView", "Org link", "View")]
|
||||||
|
[InlineData("AnonymousEdit", "Anyone", "Edit")]
|
||||||
|
[InlineData("Direct", "Specific people", null)]
|
||||||
|
[InlineData("Flexible", "Custom link", null)]
|
||||||
|
public void BuildHtml_FriendlyLinkLabel_ReplacesRawType(string raw, string expectedPart, string? expectedSecond)
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "File", Title: "Doc.docx",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR/Docs/Doc.docx",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: $"SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.{raw}.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
UserLogins: $"SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.{raw}.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PermissionLevels: "Contribute",
|
||||||
|
GrantedThrough: $"SharePoint Group: SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.{raw}.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Docs/Doc.docx",
|
||||||
|
TargetLabel: "Doc.docx",
|
||||||
|
SharingLinkType: raw);
|
||||||
|
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry }, null, null, hideSystemGroupRaw: true);
|
||||||
|
|
||||||
|
Assert.Contains(expectedPart, html);
|
||||||
|
if (expectedSecond is not null)
|
||||||
|
Assert.Contains(expectedSecond, html);
|
||||||
|
Assert.Contains($"title=\"{raw}\"", html);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildHtml_WithSharingLinkAndHideRaw_OmitsRawGroupString()
|
||||||
|
{
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "File", Title: "Q4.xlsx",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR/Docs/Q4.xlsx",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
UserLogins: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PermissionLevels: "Contribute",
|
||||||
|
GrantedThrough: "SharePoint Group: SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
TargetUrl: "https://contoso.sharepoint.com/sites/HR/Docs/Q4.xlsx",
|
||||||
|
TargetLabel: "Q4.xlsx",
|
||||||
|
SharingLinkType: "OrganizationEdit");
|
||||||
|
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry }, null, null, hideSystemGroupRaw: true);
|
||||||
|
|
||||||
|
// Raw "SharingLinks.{guid}..." text suppressed when target resolved + flag on
|
||||||
|
Assert.DoesNotContain("SharingLinks.e686221e", html);
|
||||||
|
// Target link still rendered
|
||||||
|
Assert.Contains("Q4.xlsx", html);
|
||||||
|
Assert.Contains("OrganizationEdit", html);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildHtml_WithSharingLinkButNoTargetAndHideRaw_KeepsRawAsFallback()
|
||||||
|
{
|
||||||
|
// Target resolution failed (deleted item) — flag on, but no TargetUrl → keep raw text.
|
||||||
|
var entry = new PermissionEntry(
|
||||||
|
ObjectType: "File", Title: "Q4.xlsx",
|
||||||
|
Url: "https://contoso.sharepoint.com/sites/HR/Docs/Q4.xlsx",
|
||||||
|
HasUniquePermissions: true,
|
||||||
|
Users: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
UserLogins: "SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PermissionLevels: "Contribute",
|
||||||
|
GrantedThrough: "SharePoint Group: SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6",
|
||||||
|
PrincipalType: "SharePointGroup",
|
||||||
|
SharingLinkType: "OrganizationEdit");
|
||||||
|
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry }, null, null, hideSystemGroupRaw: true);
|
||||||
|
|
||||||
|
Assert.Contains("SharingLinks.e686221e", html);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void BuildHtml_WithoutTarget_RendersGrantedThroughTextOnly()
|
||||||
|
{
|
||||||
|
// Standard SP group with no resolved target — no extra link should appear.
|
||||||
|
var entry = MakeEntry("Owners", "ownersgroup", principalType: "SharePointGroup");
|
||||||
|
var svc = new HtmlExportService();
|
||||||
|
var html = svc.BuildHtml(new[] { entry });
|
||||||
|
|
||||||
|
Assert.DoesNotContain("→", html);
|
||||||
|
}
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void BuildHtml_Simplified_WithGroupMembers_RendersExpandablePill()
|
public void BuildHtml_Simplified_WithGroupMembers_RendersExpandablePill()
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -86,20 +86,15 @@ public class UserAccessCsvExportServiceTests
|
|||||||
var svc = new UserAccessCsvExportService();
|
var svc = new UserAccessCsvExportService();
|
||||||
var csv = svc.BuildCsv("Alice", "alice@contoso.com", new[] { DefaultEntry });
|
var csv = svc.BuildCsv("Alice", "alice@contoso.com", new[] { DefaultEntry });
|
||||||
|
|
||||||
// Find the header row and count its quoted comma-separated fields
|
// Header: Site, Object Type, Object, URL, Permission Level, Access Type,
|
||||||
// Header is: "Site","Object Type","Object","URL","Permission Level","Access Type","Granted Through"
|
// Granted Through, TargetLabel, TargetUrl, SharingLinkType → 10 fields.
|
||||||
// That is 7 fields.
|
|
||||||
var lines = csv.Split('\n', StringSplitOptions.RemoveEmptyEntries);
|
var lines = csv.Split('\n', StringSplitOptions.RemoveEmptyEntries);
|
||||||
|
|
||||||
// Find a data row (after the blank line separating summary from data)
|
|
||||||
// Data rows contain the entry content (not the header line itself)
|
|
||||||
// We want to count fields in the header row:
|
|
||||||
var headerLine = lines.FirstOrDefault(l => l.Contains("\"Site\",\"Object Type\""));
|
var headerLine = lines.FirstOrDefault(l => l.Contains("\"Site\",\"Object Type\""));
|
||||||
Assert.NotNull(headerLine);
|
Assert.NotNull(headerLine);
|
||||||
|
|
||||||
// Count comma-separated quoted fields: split by "," boundary
|
|
||||||
var fields = CountCsvFields(headerLine!);
|
var fields = CountCsvFields(headerLine!);
|
||||||
Assert.Equal(7, fields);
|
Assert.Equal(10, fields);
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── Test 5: WriteSingleFileAsync includes entries for all users ───────────
|
// ── Test 5: WriteSingleFileAsync includes entries for all users ───────────
|
||||||
@@ -190,8 +185,8 @@ public class UserAccessCsvExportServiceTests
|
|||||||
await svc.WriteSingleFileAsync(entries, tmpFile, CancellationToken.None, mergePermissions: true);
|
await svc.WriteSingleFileAsync(entries, tmpFile, CancellationToken.None, mergePermissions: true);
|
||||||
var content = await File.ReadAllTextAsync(tmpFile);
|
var content = await File.ReadAllTextAsync(tmpFile);
|
||||||
|
|
||||||
// Header must contain consolidated columns
|
// Header must contain consolidated columns (now includes Target* + SharingLinkType)
|
||||||
Assert.Contains("\"User\",\"User Login\",\"Permission Level\",\"Access Type\",\"Granted Through\",\"Locations\",\"Location Count\"", content);
|
Assert.Contains("\"User\",\"User Login\",\"Permission Level\",\"Access Type\",\"Granted Through\",\"TargetLabel\",\"TargetUrl\",\"SharingLinkType\",\"Locations\",\"Location Count\"", content);
|
||||||
|
|
||||||
// Alice's two entries merged — locations column contains both site titles
|
// Alice's two entries merged — locations column contains both site titles
|
||||||
Assert.Contains("Contoso", content);
|
Assert.Contains("Contoso", content);
|
||||||
|
|||||||
@@ -3,7 +3,8 @@ using SharepointToolbox.Core.Helpers;
|
|||||||
namespace SharepointToolbox.Tests.Services;
|
namespace SharepointToolbox.Tests.Services;
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Tests for PERM-03: external user detection and permission-level filtering.
|
/// Tests for PERM-03: external user detection, permission-level filtering,
|
||||||
|
/// and SharePoint system-group classification (Limited Access / SharingLinks).
|
||||||
/// Pure static logic — runs immediately without stubs.
|
/// Pure static logic — runs immediately without stubs.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public class PermissionEntryClassificationTests
|
public class PermissionEntryClassificationTests
|
||||||
@@ -13,7 +14,6 @@ public class PermissionEntryClassificationTests
|
|||||||
[Fact]
|
[Fact]
|
||||||
public void IsExternalUser_WithExtHashInLoginName_ReturnsTrue()
|
public void IsExternalUser_WithExtHashInLoginName_ReturnsTrue()
|
||||||
{
|
{
|
||||||
// B2B guest login names contain the literal "#EXT#" fragment
|
|
||||||
Assert.True(PermissionEntryHelper.IsExternalUser("ext_user_domain.com#EXT#@contoso.onmicrosoft.com"));
|
Assert.True(PermissionEntryHelper.IsExternalUser("ext_user_domain.com#EXT#@contoso.onmicrosoft.com"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -28,8 +28,6 @@ public class PermissionEntryClassificationTests
|
|||||||
[Fact]
|
[Fact]
|
||||||
public void PermissionEntry_FiltersOutLimitedAccess_WhenOnlyPermissionIsLimitedAccess()
|
public void PermissionEntry_FiltersOutLimitedAccess_WhenOnlyPermissionIsLimitedAccess()
|
||||||
{
|
{
|
||||||
// A principal whose sole permission level is "Limited Access" should produce
|
|
||||||
// an empty list after filtering — used to decide whether to include the entry.
|
|
||||||
var result = PermissionEntryHelper.FilterPermissionLevels(new[] { "Limited Access" });
|
var result = PermissionEntryHelper.FilterPermissionLevels(new[] { "Limited Access" });
|
||||||
Assert.Empty(result);
|
Assert.Empty(result);
|
||||||
}
|
}
|
||||||
@@ -41,23 +39,100 @@ public class PermissionEntryClassificationTests
|
|||||||
Assert.Equal(new[] { "Contribute" }, result);
|
Assert.Equal(new[] { "Contribute" }, result);
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── IsSharingLinksGroup ────────────────────────────────────────────────────
|
// ── IsBareLimitedAccessSystemGroup ─────────────────────────────────────────
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void IsSharingLinksGroup_WithSharingLinksPrefix_ReturnsTrue()
|
public void IsBareLimitedAccessSystemGroup_WithExactMatch_ReturnsTrue()
|
||||||
{
|
{
|
||||||
Assert.True(PermissionEntryHelper.IsSharingLinksGroup("SharingLinks.abc123.Edit"));
|
Assert.True(PermissionEntryHelper.IsBareLimitedAccessSystemGroup("Limited Access System Group"));
|
||||||
}
|
}
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void IsSharingLinksGroup_WithLimitedAccessSystemGroup_ReturnsTrue()
|
public void IsBareLimitedAccessSystemGroup_WithForWebVariant_ReturnsFalse()
|
||||||
{
|
{
|
||||||
Assert.True(PermissionEntryHelper.IsSharingLinksGroup("Limited Access System Group"));
|
// The "For Web {guid}" variant is enriched, not filtered.
|
||||||
|
Assert.False(PermissionEntryHelper.IsBareLimitedAccessSystemGroup(
|
||||||
|
"Limited Access System Group For Web e55a4f7a-b132-4baa-bd96-c63d8dc1fc80"));
|
||||||
}
|
}
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void IsSharingLinksGroup_WithNormalGroup_ReturnsFalse()
|
public void IsBareLimitedAccessSystemGroup_WithNormalGroup_ReturnsFalse()
|
||||||
{
|
{
|
||||||
Assert.False(PermissionEntryHelper.IsSharingLinksGroup("Owners"));
|
Assert.False(PermissionEntryHelper.IsBareLimitedAccessSystemGroup("Owners"));
|
||||||
|
}
|
||||||
|
|
||||||
|
// ── Classify ───────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithNormalGroupTitle_ReturnsNone()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify("Site Owners");
|
||||||
|
Assert.Equal(SystemGroupKind.None, c.Kind);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithBareLimitedAccess_ReturnsLimitedAccessBare()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify("Limited Access System Group");
|
||||||
|
Assert.Equal(SystemGroupKind.LimitedAccessBare, c.Kind);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithLimitedAccessForWeb_ExtractsWebId()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify(
|
||||||
|
"Limited Access System Group For Web e55a4f7a-b132-4baa-bd96-c63d8dc1fc80");
|
||||||
|
Assert.Equal(SystemGroupKind.LimitedAccessWeb, c.Kind);
|
||||||
|
Assert.Equal(Guid.Parse("e55a4f7a-b132-4baa-bd96-c63d8dc1fc80"), c.WebId);
|
||||||
|
Assert.Null(c.ListId);
|
||||||
|
Assert.Null(c.ItemUniqueId);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithLimitedAccessForList_ExtractsListId()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify(
|
||||||
|
"Limited Access System Group For List b20e3b22-2b09-4c99-9ba4-37b42f3a12dc");
|
||||||
|
Assert.Equal(SystemGroupKind.LimitedAccessList, c.Kind);
|
||||||
|
Assert.Equal(Guid.Parse("b20e3b22-2b09-4c99-9ba4-37b42f3a12dc"), c.ListId);
|
||||||
|
Assert.Null(c.WebId);
|
||||||
|
Assert.Null(c.ItemUniqueId);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithSharingLink_ExtractsItemAndShareId()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify(
|
||||||
|
"SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationEdit.64c27910-66ea-421d-b0f0-8f0f72dcfaf6");
|
||||||
|
Assert.Equal(SystemGroupKind.SharingLink, c.Kind);
|
||||||
|
Assert.Equal(Guid.Parse("e686221e-d1cb-43c5-8c68-04aa7f90f329"), c.ItemUniqueId);
|
||||||
|
Assert.Equal(Guid.Parse("64c27910-66ea-421d-b0f0-8f0f72dcfaf6"), c.ShareId);
|
||||||
|
Assert.Equal("OrganizationEdit", c.LinkType);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Theory]
|
||||||
|
[InlineData("SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.AnonymousView.64c27910-66ea-421d-b0f0-8f0f72dcfaf6", "AnonymousView")]
|
||||||
|
[InlineData("SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.Flexible.64c27910-66ea-421d-b0f0-8f0f72dcfaf6", "Flexible")]
|
||||||
|
[InlineData("SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.OrganizationView.64c27910-66ea-421d-b0f0-8f0f72dcfaf6", "OrganizationView")]
|
||||||
|
public void Classify_WithVariousSharingLinkTypes_PreservesLinkType(string title, string expected)
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify(title);
|
||||||
|
Assert.Equal(SystemGroupKind.SharingLink, c.Kind);
|
||||||
|
Assert.Equal(expected, c.LinkType);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithMalformedSharingLink_ReturnsNone()
|
||||||
|
{
|
||||||
|
// Missing share GUID at the end
|
||||||
|
var c = PermissionEntryHelper.Classify("SharingLinks.e686221e-d1cb-43c5-8c68-04aa7f90f329.Edit");
|
||||||
|
Assert.Equal(SystemGroupKind.None, c.Kind);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Fact]
|
||||||
|
public void Classify_WithEmptyString_ReturnsNone()
|
||||||
|
{
|
||||||
|
var c = PermissionEntryHelper.Classify("");
|
||||||
|
Assert.Equal(SystemGroupKind.None, c.Kind);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -149,6 +149,7 @@ public partial class App : Application
|
|||||||
services.AddTransient<VersionCleanupView>();
|
services.AddTransient<VersionCleanupView>();
|
||||||
|
|
||||||
// Phase 2: Permissions
|
// Phase 2: Permissions
|
||||||
|
services.AddTransient<ISystemGroupTargetResolver, SystemGroupTargetResolver>();
|
||||||
services.AddTransient<IPermissionsService, PermissionsService>();
|
services.AddTransient<IPermissionsService, PermissionsService>();
|
||||||
services.AddTransient<ISiteListService, SiteListService>();
|
services.AddTransient<ISiteListService, SiteListService>();
|
||||||
services.AddTransient<CsvExportService>();
|
services.AddTransient<CsvExportService>();
|
||||||
|
|||||||
@@ -50,7 +50,10 @@ public static class PermissionConsolidator
|
|||||||
first.GrantedThrough,
|
first.GrantedThrough,
|
||||||
first.IsHighPrivilege,
|
first.IsHighPrivilege,
|
||||||
first.IsExternalUser,
|
first.IsExternalUser,
|
||||||
locations);
|
locations,
|
||||||
|
first.TargetUrl,
|
||||||
|
first.TargetLabel,
|
||||||
|
first.SharingLinkType);
|
||||||
})
|
})
|
||||||
.OrderBy(c => c.UserLogin)
|
.OrderBy(c => c.UserLogin)
|
||||||
.ThenBy(c => c.PermissionLevel)
|
.ThenBy(c => c.PermissionLevel)
|
||||||
|
|||||||
@@ -1,10 +1,56 @@
|
|||||||
|
using System.Text.RegularExpressions;
|
||||||
|
|
||||||
namespace SharepointToolbox.Core.Helpers;
|
namespace SharepointToolbox.Core.Helpers;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Classifies a SharePoint group name into one of the known system-group shapes.
|
||||||
|
/// </summary>
|
||||||
|
public enum SystemGroupKind
|
||||||
|
{
|
||||||
|
/// <summary>Not a system group — a normal SharePoint group, user, or external user.</summary>
|
||||||
|
None,
|
||||||
|
/// <summary>Bare "Limited Access System Group" pseudo-principal (no embedded target).</summary>
|
||||||
|
LimitedAccessBare,
|
||||||
|
/// <summary>"Limited Access System Group For Web {webId}".</summary>
|
||||||
|
LimitedAccessWeb,
|
||||||
|
/// <summary>"Limited Access System Group For List {listId}".</summary>
|
||||||
|
LimitedAccessList,
|
||||||
|
/// <summary>"SharingLinks.{itemUniqueId}.{linkType}.{shareId}".</summary>
|
||||||
|
SharingLink
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Result of classifying a SharePoint group name.
|
||||||
|
/// Carries the embedded GUIDs / link type so a resolver can look up the target.
|
||||||
|
/// </summary>
|
||||||
|
public readonly record struct SystemGroupClassification(
|
||||||
|
SystemGroupKind Kind,
|
||||||
|
Guid? WebId,
|
||||||
|
Guid? ListId,
|
||||||
|
Guid? ItemUniqueId,
|
||||||
|
string? LinkType,
|
||||||
|
Guid? ShareId);
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Pure static helpers for classifying SharePoint permission entries.
|
/// Pure static helpers for classifying SharePoint permission entries.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public static class PermissionEntryHelper
|
public static class PermissionEntryHelper
|
||||||
{
|
{
|
||||||
|
// "Limited Access System Group For Web {guid}"
|
||||||
|
private static readonly Regex LimitedAccessWebRegex = new(
|
||||||
|
@"^Limited Access System Group For Web\s+(?<id>[0-9a-fA-F-]{36})\s*$",
|
||||||
|
RegexOptions.Compiled | RegexOptions.IgnoreCase);
|
||||||
|
|
||||||
|
// "Limited Access System Group For List {guid}"
|
||||||
|
private static readonly Regex LimitedAccessListRegex = new(
|
||||||
|
@"^Limited Access System Group For List\s+(?<id>[0-9a-fA-F-]{36})\s*$",
|
||||||
|
RegexOptions.Compiled | RegexOptions.IgnoreCase);
|
||||||
|
|
||||||
|
// "SharingLinks.{itemUniqueId}.{linkType}.{shareId}"
|
||||||
|
private static readonly Regex SharingLinkRegex = new(
|
||||||
|
@"^SharingLinks\.(?<item>[0-9a-fA-F-]{36})\.(?<type>[^.]+)\.(?<share>[0-9a-fA-F-]{36})\s*$",
|
||||||
|
RegexOptions.Compiled | RegexOptions.IgnoreCase);
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Returns true when the login name is a B2B guest (contains #EXT#).
|
/// Returns true when the login name is a B2B guest (contains #EXT#).
|
||||||
/// </summary>
|
/// </summary>
|
||||||
@@ -21,10 +67,45 @@ public static class PermissionEntryHelper
|
|||||||
.ToList();
|
.ToList();
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Returns true when the login name represents an internal sharing-link group
|
/// Returns true when the supplied name/login is the bare "Limited Access System Group"
|
||||||
/// or the "Limited Access System Group" pseudo-principal.
|
/// pseudo-principal — the noise entry with no embedded GUID. The
|
||||||
|
/// per-Web/List and SharingLinks variants are NOT filtered: they are enriched.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public static bool IsSharingLinksGroup(string loginName) =>
|
public static bool IsBareLimitedAccessSystemGroup(string name) =>
|
||||||
loginName.StartsWith("SharingLinks.", StringComparison.OrdinalIgnoreCase)
|
name.Equals("Limited Access System Group", StringComparison.OrdinalIgnoreCase);
|
||||||
|| loginName.Equals("Limited Access System Group", StringComparison.OrdinalIgnoreCase);
|
|
||||||
|
/// <summary>
|
||||||
|
/// Classifies a SharePoint group title (the value used in Granted Through). When the
|
||||||
|
/// title matches a known system pattern, the embedded GUIDs / link type are parsed
|
||||||
|
/// out so a resolver can look up the actual targeted Web/List/Item.
|
||||||
|
/// </summary>
|
||||||
|
public static SystemGroupClassification Classify(string groupTitle)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrWhiteSpace(groupTitle))
|
||||||
|
return new SystemGroupClassification(SystemGroupKind.None, null, null, null, null, null);
|
||||||
|
|
||||||
|
var trimmed = groupTitle.Trim();
|
||||||
|
|
||||||
|
if (IsBareLimitedAccessSystemGroup(trimmed))
|
||||||
|
return new SystemGroupClassification(SystemGroupKind.LimitedAccessBare, null, null, null, null, null);
|
||||||
|
|
||||||
|
var mWeb = LimitedAccessWebRegex.Match(trimmed);
|
||||||
|
if (mWeb.Success && Guid.TryParse(mWeb.Groups["id"].Value, out var webId))
|
||||||
|
return new SystemGroupClassification(SystemGroupKind.LimitedAccessWeb, webId, null, null, null, null);
|
||||||
|
|
||||||
|
var mList = LimitedAccessListRegex.Match(trimmed);
|
||||||
|
if (mList.Success && Guid.TryParse(mList.Groups["id"].Value, out var listId))
|
||||||
|
return new SystemGroupClassification(SystemGroupKind.LimitedAccessList, null, listId, null, null, null);
|
||||||
|
|
||||||
|
var mShare = SharingLinkRegex.Match(trimmed);
|
||||||
|
if (mShare.Success
|
||||||
|
&& Guid.TryParse(mShare.Groups["item"].Value, out var itemId)
|
||||||
|
&& Guid.TryParse(mShare.Groups["share"].Value, out var shareId))
|
||||||
|
{
|
||||||
|
return new SystemGroupClassification(
|
||||||
|
SystemGroupKind.SharingLink, null, null, itemId, mShare.Groups["type"].Value, shareId);
|
||||||
|
}
|
||||||
|
|
||||||
|
return new SystemGroupClassification(SystemGroupKind.None, null, null, null, null, null);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,58 @@
|
|||||||
|
namespace SharepointToolbox.Core.Helpers;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Risk tier of a SharePoint sharing link, used to color-code the link-type badge
|
||||||
|
/// in HTML reports.
|
||||||
|
/// </summary>
|
||||||
|
public enum SharingLinkRisk
|
||||||
|
{
|
||||||
|
Low, // Read-only, scoped (Org view, Direct, Existing, Review)
|
||||||
|
Medium, // Org-wide edit
|
||||||
|
High, // Anonymous (anyone with link, no auth)
|
||||||
|
Unknown // Unrecognized type — neutral styling
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Maps the raw <c>linkType</c> segment of a <c>SharingLinks.{itemId}.{type}.{shareId}</c>
|
||||||
|
/// group name to a human-readable label and a risk tier. The raw codes are SharePoint
|
||||||
|
/// internals (OrganizationEdit / AnonymousView / Flexible / …); reports show the friendly
|
||||||
|
/// label and tint the badge by tier.
|
||||||
|
/// </summary>
|
||||||
|
public static class SharingLinkLabels
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// Returns the friendly label and risk tier for a sharing-link type code.
|
||||||
|
/// Unknown codes fall through with the raw value and <see cref="SharingLinkRisk.Unknown"/>.
|
||||||
|
/// </summary>
|
||||||
|
public static (string Label, SharingLinkRisk Risk) Describe(string? rawLinkType)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrWhiteSpace(rawLinkType))
|
||||||
|
return (string.Empty, SharingLinkRisk.Unknown);
|
||||||
|
|
||||||
|
return rawLinkType.Trim() switch
|
||||||
|
{
|
||||||
|
"OrganizationView" => ("Org link · View", SharingLinkRisk.Low),
|
||||||
|
"OrganizationEdit" => ("Org link · Edit", SharingLinkRisk.Medium),
|
||||||
|
"AnonymousView" => ("Anyone · View", SharingLinkRisk.High),
|
||||||
|
"AnonymousEdit" => ("Anyone · Edit", SharingLinkRisk.High),
|
||||||
|
"Flexible" => ("Custom link", SharingLinkRisk.Medium),
|
||||||
|
"Direct" => ("Specific people", SharingLinkRisk.Low),
|
||||||
|
"Existing" => ("Existing access", SharingLinkRisk.Low),
|
||||||
|
"Review" => ("Review only", SharingLinkRisk.Low),
|
||||||
|
"Embed" => ("Embedded link", SharingLinkRisk.Medium),
|
||||||
|
_ => (rawLinkType, SharingLinkRisk.Unknown)
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Returns inline-CSS colors (background, foreground) for a risk tier — matches the
|
||||||
|
/// risk-card palette used elsewhere in the HTML reports.
|
||||||
|
/// </summary>
|
||||||
|
public static (string Background, string Foreground) Colors(SharingLinkRisk risk) => risk switch
|
||||||
|
{
|
||||||
|
SharingLinkRisk.Low => ("#D1FAE5", "#065F46"),
|
||||||
|
SharingLinkRisk.Medium => ("#FEF3C7", "#92400E"),
|
||||||
|
SharingLinkRisk.High => ("#FEE2E2", "#991B1B"),
|
||||||
|
_ => ("#F3F4F6", "#374151"),
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -13,7 +13,10 @@ public record ConsolidatedPermissionEntry(
|
|||||||
string GrantedThrough,
|
string GrantedThrough,
|
||||||
bool IsHighPrivilege,
|
bool IsHighPrivilege,
|
||||||
bool IsExternalUser,
|
bool IsExternalUser,
|
||||||
IReadOnlyList<LocationInfo> Locations
|
IReadOnlyList<LocationInfo> Locations,
|
||||||
|
string? TargetUrl = null,
|
||||||
|
string? TargetLabel = null,
|
||||||
|
string? SharingLinkType = null
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
/// <summary>Convenience count — equals Locations.Count.</summary>
|
/// <summary>Convenience count — equals Locations.Count.</summary>
|
||||||
|
|||||||
@@ -14,5 +14,10 @@ public record PermissionEntry(
|
|||||||
string PermissionLevels, // Semicolon-joined role names (Limited Access already removed)
|
string PermissionLevels, // Semicolon-joined role names (Limited Access already removed)
|
||||||
string GrantedThrough, // "Direct Permissions" | "SharePoint Group: <name>"
|
string GrantedThrough, // "Direct Permissions" | "SharePoint Group: <name>"
|
||||||
string PrincipalType, // "SharePointGroup" | "User" | "External User"
|
string PrincipalType, // "SharePointGroup" | "User" | "External User"
|
||||||
bool WasAutoElevated = false // Set to true when site admin was auto-granted to access this entry
|
bool WasAutoElevated = false, // Set to true when site admin was auto-granted to access this entry
|
||||||
|
// Resolved target for Limited Access System Group For Web/List and SharingLinks
|
||||||
|
// groups — populated when GrantedThrough is one of those system groups, null otherwise.
|
||||||
|
string? TargetUrl = null,
|
||||||
|
string? TargetLabel = null,
|
||||||
|
string? SharingLinkType = null // OrganizationEdit | OrganizationView | AnonymousEdit | AnonymousView | etc.
|
||||||
);
|
);
|
||||||
|
|||||||
@@ -41,6 +41,9 @@ public class SimplifiedPermissionEntry
|
|||||||
public string PermissionLevels => Inner.PermissionLevels;
|
public string PermissionLevels => Inner.PermissionLevels;
|
||||||
public string GrantedThrough => Inner.GrantedThrough;
|
public string GrantedThrough => Inner.GrantedThrough;
|
||||||
public string PrincipalType => Inner.PrincipalType;
|
public string PrincipalType => Inner.PrincipalType;
|
||||||
|
public string? TargetUrl => Inner.TargetUrl;
|
||||||
|
public string? TargetLabel => Inner.TargetLabel;
|
||||||
|
public string? SharingLinkType => Inner.SharingLinkType;
|
||||||
|
|
||||||
public SimplifiedPermissionEntry(PermissionEntry entry)
|
public SimplifiedPermissionEntry(PermissionEntry entry)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -0,0 +1,15 @@
|
|||||||
|
using SharepointToolbox.Core.Helpers;
|
||||||
|
|
||||||
|
namespace SharepointToolbox.Core.Models;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Resolved target for a SharePoint system group (Limited Access For Web/List or SharingLinks).
|
||||||
|
/// Carries the human-readable label, the navigable URL, and (for sharing links) the link type
|
||||||
|
/// so the export layer can render a clickable link in the Granted Through cell.
|
||||||
|
/// </summary>
|
||||||
|
public record SystemGroupTarget(
|
||||||
|
SystemGroupKind Kind,
|
||||||
|
string Label, // e.g. "MyList" | "Shared Documents/Folder/File.docx" | "Site - HR"
|
||||||
|
string Url, // Navigable URL of the targeted resource
|
||||||
|
string? LinkType = null // For SharingLinks: "OrganizationEdit", "AnonymousView", etc.
|
||||||
|
);
|
||||||
@@ -29,5 +29,8 @@ public record UserAccessEntry(
|
|||||||
AccessType AccessType, // Direct | Group | Inherited
|
AccessType AccessType, // Direct | Group | Inherited
|
||||||
string GrantedThrough, // "Direct Permissions" | "SharePoint Group: Members" etc.
|
string GrantedThrough, // "Direct Permissions" | "SharePoint Group: Members" etc.
|
||||||
bool IsHighPrivilege, // True for Full Control, Site Collection Administrator
|
bool IsHighPrivilege, // True for Full Control, Site Collection Administrator
|
||||||
bool IsExternalUser // True if login contains #EXT#
|
bool IsExternalUser, // True if login contains #EXT#
|
||||||
|
string? TargetUrl = null, // Resolved URL when GrantedThrough is a Limited Access / SharingLinks system group
|
||||||
|
string? TargetLabel = null, // Resolved name (list title / file name / web title)
|
||||||
|
string? SharingLinkType = null // OrganizationEdit | OrganizationView | AnonymousEdit | ...
|
||||||
);
|
);
|
||||||
|
|||||||
@@ -582,6 +582,7 @@ Cette action est irréversible.</value>
|
|||||||
<!-- Phase 16: Report Consolidation Toggle -->
|
<!-- Phase 16: Report Consolidation Toggle -->
|
||||||
<data name="audit.grp.export" xml:space="preserve"><value>Options d'exportation</value></data>
|
<data name="audit.grp.export" xml:space="preserve"><value>Options d'exportation</value></data>
|
||||||
<data name="chk.merge.permissions" xml:space="preserve"><value>Fusionner les permissions en double</value></data>
|
<data name="chk.merge.permissions" xml:space="preserve"><value>Fusionner les permissions en double</value></data>
|
||||||
|
<data name="chk.hide.system.group.raw" xml:space="preserve"><value>Masquer les noms bruts (SharingLinks, Limited Access)</value></data>
|
||||||
<!-- Phase 19: App Registration & Removal -->
|
<!-- Phase 19: App Registration & Removal -->
|
||||||
<data name="profile.register" xml:space="preserve"><value>Enregistrer l'app</value></data>
|
<data name="profile.register" xml:space="preserve"><value>Enregistrer l'app</value></data>
|
||||||
<data name="profile.remove" xml:space="preserve"><value>Supprimer l'app</value></data>
|
<data name="profile.remove" xml:space="preserve"><value>Supprimer l'app</value></data>
|
||||||
|
|||||||
@@ -582,6 +582,7 @@ This cannot be undone.</value>
|
|||||||
<!-- Phase 16: Report Consolidation Toggle -->
|
<!-- Phase 16: Report Consolidation Toggle -->
|
||||||
<data name="audit.grp.export" xml:space="preserve"><value>Export Options</value></data>
|
<data name="audit.grp.export" xml:space="preserve"><value>Export Options</value></data>
|
||||||
<data name="chk.merge.permissions" xml:space="preserve"><value>Merge duplicate permissions</value></data>
|
<data name="chk.merge.permissions" xml:space="preserve"><value>Merge duplicate permissions</value></data>
|
||||||
|
<data name="chk.hide.system.group.raw" xml:space="preserve"><value>Hide raw system group names (SharingLinks, Limited Access)</value></data>
|
||||||
<!-- Phase 19: App Registration & Removal -->
|
<!-- Phase 19: App Registration & Removal -->
|
||||||
<data name="profile.register" xml:space="preserve"><value>Register App</value></data>
|
<data name="profile.register" xml:space="preserve"><value>Register App</value></data>
|
||||||
<data name="profile.remove" xml:space="preserve"><value>Remove App</value></data>
|
<data name="profile.remove" xml:space="preserve"><value>Remove App</value></data>
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ public class CsvExportService
|
|||||||
private static string BuildHeader()
|
private static string BuildHeader()
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
return $"\"{T["report.col.object"]}\",\"{T["report.col.title"]}\",\"{T["report.col.url"]}\",\"HasUniquePermissions\",\"Users\",\"UserLogins\",\"Type\",\"Permissions\",\"GrantedThrough\"";
|
return $"\"{T["report.col.object"]}\",\"{T["report.col.title"]}\",\"{T["report.col.url"]}\",\"HasUniquePermissions\",\"Users\",\"UserLogins\",\"Type\",\"Permissions\",\"GrantedThrough\",\"TargetLabel\",\"TargetUrl\",\"SharingLinkType\"";
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -39,7 +39,10 @@ public class CsvExportService
|
|||||||
UserLogins = g.First().UserLogins,
|
UserLogins = g.First().UserLogins,
|
||||||
PrincipalType = g.First().PrincipalType,
|
PrincipalType = g.First().PrincipalType,
|
||||||
Permissions = g.Key.PermissionLevels,
|
Permissions = g.Key.PermissionLevels,
|
||||||
GrantedThrough = g.Key.GrantedThrough
|
GrantedThrough = g.Key.GrantedThrough,
|
||||||
|
TargetLabel = g.First().TargetLabel ?? string.Empty,
|
||||||
|
TargetUrl = g.First().TargetUrl ?? string.Empty,
|
||||||
|
SharingLinkType = g.First().SharingLinkType ?? string.Empty
|
||||||
});
|
});
|
||||||
|
|
||||||
foreach (var row in merged)
|
foreach (var row in merged)
|
||||||
@@ -47,7 +50,8 @@ public class CsvExportService
|
|||||||
{
|
{
|
||||||
Csv(row.ObjectType), Csv(row.Title), Csv(row.Url),
|
Csv(row.ObjectType), Csv(row.Title), Csv(row.Url),
|
||||||
Csv(row.HasUnique.ToString()), Csv(row.Users), Csv(row.UserLogins),
|
Csv(row.HasUnique.ToString()), Csv(row.Users), Csv(row.UserLogins),
|
||||||
Csv(row.PrincipalType), Csv(row.Permissions), Csv(row.GrantedThrough)
|
Csv(row.PrincipalType), Csv(row.Permissions), Csv(row.GrantedThrough),
|
||||||
|
Csv(row.TargetLabel), Csv(row.TargetUrl), Csv(row.SharingLinkType)
|
||||||
}));
|
}));
|
||||||
|
|
||||||
return sb.ToString();
|
return sb.ToString();
|
||||||
@@ -68,7 +72,7 @@ public class CsvExportService
|
|||||||
private static string BuildSimplifiedHeader()
|
private static string BuildSimplifiedHeader()
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
return $"\"{T["report.col.object"]}\",\"{T["report.col.title"]}\",\"{T["report.col.url"]}\",\"HasUniquePermissions\",\"Users\",\"UserLogins\",\"Type\",\"Permissions\",\"SimplifiedLabels\",\"RiskLevel\",\"GrantedThrough\"";
|
return $"\"{T["report.col.object"]}\",\"{T["report.col.title"]}\",\"{T["report.col.url"]}\",\"HasUniquePermissions\",\"Users\",\"UserLogins\",\"Type\",\"Permissions\",\"SimplifiedLabels\",\"RiskLevel\",\"GrantedThrough\",\"TargetLabel\",\"TargetUrl\",\"SharingLinkType\"";
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -95,7 +99,10 @@ public class CsvExportService
|
|||||||
Permissions = g.Key.PermissionLevels,
|
Permissions = g.Key.PermissionLevels,
|
||||||
SimplifiedLabels = g.First().SimplifiedLabels,
|
SimplifiedLabels = g.First().SimplifiedLabels,
|
||||||
RiskLevel = g.First().RiskLevel.ToString(),
|
RiskLevel = g.First().RiskLevel.ToString(),
|
||||||
GrantedThrough = g.Key.GrantedThrough
|
GrantedThrough = g.Key.GrantedThrough,
|
||||||
|
TargetLabel = g.First().TargetLabel ?? string.Empty,
|
||||||
|
TargetUrl = g.First().TargetUrl ?? string.Empty,
|
||||||
|
SharingLinkType = g.First().SharingLinkType ?? string.Empty
|
||||||
});
|
});
|
||||||
|
|
||||||
foreach (var row in merged)
|
foreach (var row in merged)
|
||||||
@@ -104,7 +111,8 @@ public class CsvExportService
|
|||||||
Csv(row.ObjectType), Csv(row.Title), Csv(row.Url),
|
Csv(row.ObjectType), Csv(row.Title), Csv(row.Url),
|
||||||
Csv(row.HasUnique.ToString()), Csv(row.Users), Csv(row.UserLogins),
|
Csv(row.HasUnique.ToString()), Csv(row.Users), Csv(row.UserLogins),
|
||||||
Csv(row.PrincipalType), Csv(row.Permissions), Csv(row.SimplifiedLabels),
|
Csv(row.PrincipalType), Csv(row.Permissions), Csv(row.SimplifiedLabels),
|
||||||
Csv(row.RiskLevel), Csv(row.GrantedThrough)
|
Csv(row.RiskLevel), Csv(row.GrantedThrough),
|
||||||
|
Csv(row.TargetLabel), Csv(row.TargetUrl), Csv(row.SharingLinkType)
|
||||||
}));
|
}));
|
||||||
|
|
||||||
return sb.ToString();
|
return sb.ToString();
|
||||||
|
|||||||
@@ -24,4 +24,41 @@ internal static class ExportFileWriter
|
|||||||
/// <summary>Writes <paramref name="html"/> to <paramref name="filePath"/> as UTF-8 without BOM.</summary>
|
/// <summary>Writes <paramref name="html"/> to <paramref name="filePath"/> as UTF-8 without BOM.</summary>
|
||||||
public static Task WriteHtmlAsync(string filePath, string html, CancellationToken ct)
|
public static Task WriteHtmlAsync(string filePath, string html, CancellationToken ct)
|
||||||
=> File.WriteAllTextAsync(filePath, html, Utf8NoBom, ct);
|
=> File.WriteAllTextAsync(filePath, html, Utf8NoBom, ct);
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Streams a <see cref="StringBuilder"/> directly to disk as UTF-8 with
|
||||||
|
/// BOM, chunk by chunk. Avoids the full-document <c>ToString()</c> copy
|
||||||
|
/// and the separate UTF-8 byte buffer that <see cref="File.WriteAllTextAsync(string, string, Encoding, CancellationToken)"/>
|
||||||
|
/// would otherwise allocate — meaningful for large CSV exports.
|
||||||
|
/// </summary>
|
||||||
|
public static Task WriteCsvChunksAsync(string filePath, StringBuilder builder, CancellationToken ct)
|
||||||
|
=> WriteChunksAsync(filePath, builder, Utf8WithBom, ct);
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Streams a <see cref="StringBuilder"/> directly to disk as UTF-8 without
|
||||||
|
/// BOM. Same rationale as <see cref="WriteCsvChunksAsync"/> — for large
|
||||||
|
/// HTML reports it halves peak memory by skipping the intermediate string.
|
||||||
|
/// </summary>
|
||||||
|
public static Task WriteHtmlChunksAsync(string filePath, StringBuilder builder, CancellationToken ct)
|
||||||
|
=> WriteChunksAsync(filePath, builder, Utf8NoBom, ct);
|
||||||
|
|
||||||
|
private static async Task WriteChunksAsync(string filePath, StringBuilder builder, Encoding encoding, CancellationToken ct)
|
||||||
|
{
|
||||||
|
// FileOptions.Asynchronous lets StreamWriter use true async I/O.
|
||||||
|
await using var fs = new FileStream(
|
||||||
|
filePath,
|
||||||
|
FileMode.Create,
|
||||||
|
FileAccess.Write,
|
||||||
|
FileShare.None,
|
||||||
|
bufferSize: 64 * 1024,
|
||||||
|
options: FileOptions.Asynchronous | FileOptions.SequentialScan);
|
||||||
|
await using var sw = new StreamWriter(fs, encoding, bufferSize: 64 * 1024);
|
||||||
|
|
||||||
|
foreach (var chunk in builder.GetChunks())
|
||||||
|
{
|
||||||
|
ct.ThrowIfCancellationRequested();
|
||||||
|
await sw.WriteAsync(chunk, ct);
|
||||||
|
}
|
||||||
|
await sw.FlushAsync(ct);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -27,7 +27,8 @@ public class HtmlExportService
|
|||||||
public string BuildHtml(
|
public string BuildHtml(
|
||||||
IReadOnlyList<PermissionEntry> entries,
|
IReadOnlyList<PermissionEntry> entries,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
var (totalEntries, uniquePermSets, distinctUsers) = ComputeStats(
|
var (totalEntries, uniquePermSets, distinctUsers) = ComputeStats(
|
||||||
@@ -57,7 +58,9 @@ public class HtmlExportService
|
|||||||
|
|
||||||
var (pills, subRows) = BuildUserPillsCell(
|
var (pills, subRows) = BuildUserPillsCell(
|
||||||
entry.UserLogins, entry.Users, entry.PrincipalType, groupMembers,
|
entry.UserLogins, entry.Users, entry.PrincipalType, groupMembers,
|
||||||
colSpan: 7, grpMemIdx: ref grpMemIdx);
|
colSpan: 7, grpMemIdx: ref grpMemIdx,
|
||||||
|
targetLabel: entry.TargetLabel, sharingLinkType: entry.SharingLinkType,
|
||||||
|
hideSystemGroupRaw: hideSystemGroupRaw);
|
||||||
|
|
||||||
sb.AppendLine("<tr>");
|
sb.AppendLine("<tr>");
|
||||||
sb.AppendLine($" <td><span class=\"{typeCss}\">{HtmlEncode(entry.ObjectType)}</span></td>");
|
sb.AppendLine($" <td><span class=\"{typeCss}\">{HtmlEncode(entry.ObjectType)}</span></td>");
|
||||||
@@ -66,7 +69,7 @@ public class HtmlExportService
|
|||||||
sb.AppendLine($" <td><span class=\"{uniqueCss}\">{uniqueLbl}</span></td>");
|
sb.AppendLine($" <td><span class=\"{uniqueCss}\">{uniqueLbl}</span></td>");
|
||||||
sb.AppendLine($" <td>{pills}</td>");
|
sb.AppendLine($" <td>{pills}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.PermissionLevels)}</td>");
|
sb.AppendLine($" <td>{HtmlEncode(entry.PermissionLevels)}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.GrantedThrough)}</td>");
|
sb.AppendLine($" <td>{BuildGrantedThroughCell(entry.GrantedThrough, entry.TargetUrl, entry.TargetLabel, entry.SharingLinkType, hideSystemGroupRaw)}</td>");
|
||||||
sb.AppendLine("</tr>");
|
sb.AppendLine("</tr>");
|
||||||
if (subRows.Length > 0) sb.Append(subRows);
|
if (subRows.Length > 0) sb.Append(subRows);
|
||||||
}
|
}
|
||||||
@@ -87,7 +90,8 @@ public class HtmlExportService
|
|||||||
public string BuildHtml(
|
public string BuildHtml(
|
||||||
IReadOnlyList<SimplifiedPermissionEntry> entries,
|
IReadOnlyList<SimplifiedPermissionEntry> entries,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
var summaries = PermissionSummaryBuilder.Build(entries);
|
var summaries = PermissionSummaryBuilder.Build(entries);
|
||||||
@@ -132,7 +136,9 @@ public class HtmlExportService
|
|||||||
|
|
||||||
var (pills, subRows) = BuildUserPillsCell(
|
var (pills, subRows) = BuildUserPillsCell(
|
||||||
entry.UserLogins, entry.Inner.Users, entry.Inner.PrincipalType, groupMembers,
|
entry.UserLogins, entry.Inner.Users, entry.Inner.PrincipalType, groupMembers,
|
||||||
colSpan: 9, grpMemIdx: ref grpMemIdx);
|
colSpan: 9, grpMemIdx: ref grpMemIdx,
|
||||||
|
targetLabel: entry.TargetLabel, sharingLinkType: entry.SharingLinkType,
|
||||||
|
hideSystemGroupRaw: hideSystemGroupRaw);
|
||||||
|
|
||||||
sb.AppendLine("<tr>");
|
sb.AppendLine("<tr>");
|
||||||
sb.AppendLine($" <td><span class=\"{typeCss}\">{HtmlEncode(entry.ObjectType)}</span></td>");
|
sb.AppendLine($" <td><span class=\"{typeCss}\">{HtmlEncode(entry.ObjectType)}</span></td>");
|
||||||
@@ -143,7 +149,7 @@ public class HtmlExportService
|
|||||||
sb.AppendLine($" <td>{HtmlEncode(entry.PermissionLevels)}</td>");
|
sb.AppendLine($" <td>{HtmlEncode(entry.PermissionLevels)}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.SimplifiedLabels)}</td>");
|
sb.AppendLine($" <td>{HtmlEncode(entry.SimplifiedLabels)}</td>");
|
||||||
sb.AppendLine($" <td><span class=\"risk-badge\" style=\"background:{riskBg};color:{riskText};border-color:{riskBorder}\">{HtmlEncode(entry.RiskLevel.ToString())}</span></td>");
|
sb.AppendLine($" <td><span class=\"risk-badge\" style=\"background:{riskBg};color:{riskText};border-color:{riskBorder}\">{HtmlEncode(entry.RiskLevel.ToString())}</span></td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.GrantedThrough)}</td>");
|
sb.AppendLine($" <td>{BuildGrantedThroughCell(entry.GrantedThrough, entry.TargetUrl, entry.TargetLabel, entry.SharingLinkType, hideSystemGroupRaw)}</td>");
|
||||||
sb.AppendLine("</tr>");
|
sb.AppendLine("</tr>");
|
||||||
if (subRows.Length > 0) sb.Append(subRows);
|
if (subRows.Length > 0) sb.Append(subRows);
|
||||||
}
|
}
|
||||||
@@ -161,9 +167,10 @@ public class HtmlExportService
|
|||||||
string filePath,
|
string filePath,
|
||||||
CancellationToken ct,
|
CancellationToken ct,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
var html = BuildHtml(entries, branding, groupMembers);
|
var html = BuildHtml(entries, branding, groupMembers, hideSystemGroupRaw);
|
||||||
await ExportFileWriter.WriteHtmlAsync(filePath, html, ct);
|
await ExportFileWriter.WriteHtmlAsync(filePath, html, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -173,9 +180,10 @@ public class HtmlExportService
|
|||||||
string filePath,
|
string filePath,
|
||||||
CancellationToken ct,
|
CancellationToken ct,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
var html = BuildHtml(entries, branding, groupMembers);
|
var html = BuildHtml(entries, branding, groupMembers, hideSystemGroupRaw);
|
||||||
await ExportFileWriter.WriteHtmlAsync(filePath, html, ct);
|
await ExportFileWriter.WriteHtmlAsync(filePath, html, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -191,11 +199,12 @@ public class HtmlExportService
|
|||||||
HtmlSplitLayout layout,
|
HtmlSplitLayout layout,
|
||||||
CancellationToken ct,
|
CancellationToken ct,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
if (splitMode != ReportSplitMode.BySite)
|
if (splitMode != ReportSplitMode.BySite)
|
||||||
{
|
{
|
||||||
await WriteAsync(entries, basePath, ct, branding, groupMembers);
|
await WriteAsync(entries, basePath, ct, branding, groupMembers, hideSystemGroupRaw);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -203,7 +212,7 @@ public class HtmlExportService
|
|||||||
if (layout == HtmlSplitLayout.SingleTabbed)
|
if (layout == HtmlSplitLayout.SingleTabbed)
|
||||||
{
|
{
|
||||||
var parts = partitions
|
var parts = partitions
|
||||||
.Select(p => (p.Label, Html: BuildHtml(p.Partition, branding, groupMembers)))
|
.Select(p => (p.Label, Html: BuildHtml(p.Partition, branding, groupMembers, hideSystemGroupRaw)))
|
||||||
.ToList();
|
.ToList();
|
||||||
var title = TranslationSource.Instance["report.title.permissions"];
|
var title = TranslationSource.Instance["report.title.permissions"];
|
||||||
var tabbed = ReportSplitHelper.BuildTabbedHtml(parts, title);
|
var tabbed = ReportSplitHelper.BuildTabbedHtml(parts, title);
|
||||||
@@ -215,11 +224,11 @@ public class HtmlExportService
|
|||||||
{
|
{
|
||||||
ct.ThrowIfCancellationRequested();
|
ct.ThrowIfCancellationRequested();
|
||||||
var path = ReportSplitHelper.BuildPartitionPath(basePath, label);
|
var path = ReportSplitHelper.BuildPartitionPath(basePath, label);
|
||||||
await WriteAsync(partEntries, path, ct, branding, groupMembers);
|
await WriteAsync(partEntries, path, ct, branding, groupMembers, hideSystemGroupRaw);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>Simplified-entry split variant of <see cref="WriteAsync(IReadOnlyList{PermissionEntry}, string, ReportSplitMode, HtmlSplitLayout, CancellationToken, ReportBranding?, IReadOnlyDictionary{string, IReadOnlyList{ResolvedMember}}?)"/>.</summary>
|
/// <summary>Simplified-entry split variant.</summary>
|
||||||
public async Task WriteAsync(
|
public async Task WriteAsync(
|
||||||
IReadOnlyList<SimplifiedPermissionEntry> entries,
|
IReadOnlyList<SimplifiedPermissionEntry> entries,
|
||||||
string basePath,
|
string basePath,
|
||||||
@@ -227,11 +236,12 @@ public class HtmlExportService
|
|||||||
HtmlSplitLayout layout,
|
HtmlSplitLayout layout,
|
||||||
CancellationToken ct,
|
CancellationToken ct,
|
||||||
ReportBranding? branding = null,
|
ReportBranding? branding = null,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null)
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
if (splitMode != ReportSplitMode.BySite)
|
if (splitMode != ReportSplitMode.BySite)
|
||||||
{
|
{
|
||||||
await WriteAsync(entries, basePath, ct, branding, groupMembers);
|
await WriteAsync(entries, basePath, ct, branding, groupMembers, hideSystemGroupRaw);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -239,7 +249,7 @@ public class HtmlExportService
|
|||||||
if (layout == HtmlSplitLayout.SingleTabbed)
|
if (layout == HtmlSplitLayout.SingleTabbed)
|
||||||
{
|
{
|
||||||
var parts = partitions
|
var parts = partitions
|
||||||
.Select(p => (p.Label, Html: BuildHtml(p.Partition, branding, groupMembers)))
|
.Select(p => (p.Label, Html: BuildHtml(p.Partition, branding, groupMembers, hideSystemGroupRaw)))
|
||||||
.ToList();
|
.ToList();
|
||||||
var title = TranslationSource.Instance["report.title.permissions_simplified"];
|
var title = TranslationSource.Instance["report.title.permissions_simplified"];
|
||||||
var tabbed = ReportSplitHelper.BuildTabbedHtml(parts, title);
|
var tabbed = ReportSplitHelper.BuildTabbedHtml(parts, title);
|
||||||
@@ -251,7 +261,7 @@ public class HtmlExportService
|
|||||||
{
|
{
|
||||||
ct.ThrowIfCancellationRequested();
|
ct.ThrowIfCancellationRequested();
|
||||||
var path = ReportSplitHelper.BuildPartitionPath(basePath, label);
|
var path = ReportSplitHelper.BuildPartitionPath(basePath, label);
|
||||||
await WriteAsync(partEntries, path, ct, branding, groupMembers);
|
await WriteAsync(partEntries, path, ct, branding, groupMembers, hideSystemGroupRaw);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
using System.Text;
|
using System.Text;
|
||||||
|
using SharepointToolbox.Core.Helpers;
|
||||||
using SharepointToolbox.Core.Models;
|
using SharepointToolbox.Core.Models;
|
||||||
using SharepointToolbox.Localization;
|
using SharepointToolbox.Localization;
|
||||||
|
|
||||||
@@ -137,7 +138,10 @@ document.addEventListener('click', function(ev) {
|
|||||||
string? principalType,
|
string? principalType,
|
||||||
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers,
|
IReadOnlyDictionary<string, IReadOnlyList<ResolvedMember>>? groupMembers,
|
||||||
int colSpan,
|
int colSpan,
|
||||||
ref int grpMemIdx)
|
ref int grpMemIdx,
|
||||||
|
string? targetLabel = null,
|
||||||
|
string? sharingLinkType = null,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
var logins = userLogins.Split(';', StringSplitOptions.RemoveEmptyEntries);
|
var logins = userLogins.Split(';', StringSplitOptions.RemoveEmptyEntries);
|
||||||
@@ -151,14 +155,40 @@ document.addEventListener('click', function(ev) {
|
|||||||
var name = i < names.Length ? names[i].Trim() : login;
|
var name = i < names.Length ? names[i].Trim() : login;
|
||||||
var isExt = login.Contains("#EXT#", StringComparison.OrdinalIgnoreCase);
|
var isExt = login.Contains("#EXT#", StringComparison.OrdinalIgnoreCase);
|
||||||
|
|
||||||
bool isExpandable = principalType == "SharePointGroup"
|
// When the principal is a resolved system group and the user wants the raw
|
||||||
|
// name hidden, replace the pill's visible text with the link-type badge
|
||||||
|
// (sharing links) and/or the target label. Falls back to the raw name when
|
||||||
|
// resolution failed (no targetLabel).
|
||||||
|
var classification = principalType == "SharePointGroup"
|
||||||
|
? PermissionEntryHelper.Classify(name)
|
||||||
|
: new SystemGroupClassification(SystemGroupKind.None, null, null, null, null, null);
|
||||||
|
bool isResolvedSystemGroup = hideSystemGroupRaw
|
||||||
|
&& classification.Kind != SystemGroupKind.None
|
||||||
|
&& classification.Kind != SystemGroupKind.LimitedAccessBare
|
||||||
|
&& !string.IsNullOrEmpty(targetLabel);
|
||||||
|
|
||||||
|
bool hasResolvedMembers = principalType == "SharePointGroup"
|
||||||
&& groupMembers != null
|
&& groupMembers != null
|
||||||
&& groupMembers.TryGetValue(name, out _);
|
&& groupMembers.TryGetValue(name, out _);
|
||||||
|
|
||||||
if (isExpandable && groupMembers != null && groupMembers.TryGetValue(name, out var resolved))
|
if (hasResolvedMembers && groupMembers!.TryGetValue(name, out var resolved))
|
||||||
{
|
{
|
||||||
var grpId = $"grpmem{grpMemIdx}";
|
var grpId = $"grpmem{grpMemIdx}";
|
||||||
pills.Append($"<span class=\"user-pill group-expandable\" data-group-target=\"{HtmlEncode(grpId)}\" data-email=\"{HtmlEncode(login)}\">{HtmlEncode(name)} ▼</span>");
|
pills.Append("<span class=\"user-pill group-expandable\"");
|
||||||
|
if (isResolvedSystemGroup)
|
||||||
|
pills.Append(" data-system-group=\"1\"");
|
||||||
|
pills.Append($" data-group-target=\"{HtmlEncode(grpId)}\" data-email=\"{HtmlEncode(login)}\">");
|
||||||
|
if (isResolvedSystemGroup)
|
||||||
|
{
|
||||||
|
if (!string.IsNullOrEmpty(sharingLinkType))
|
||||||
|
pills.Append(BuildSharingLinkBadge(sharingLinkType!));
|
||||||
|
pills.Append(HtmlEncode(targetLabel!));
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
pills.Append(HtmlEncode(name));
|
||||||
|
}
|
||||||
|
pills.Append(" ▼</span>");
|
||||||
|
|
||||||
string memberContent;
|
string memberContent;
|
||||||
if (resolved.Count > 0)
|
if (resolved.Count > 0)
|
||||||
@@ -173,6 +203,14 @@ document.addEventListener('click', function(ev) {
|
|||||||
subRows.AppendLine($"<tr data-group=\"{HtmlEncode(grpId)}\" style=\"display:none\"><td colspan=\"{colSpan}\" style=\"padding-left:2em;font-size:.8rem;color:#555\">{memberContent}</td></tr>");
|
subRows.AppendLine($"<tr data-group=\"{HtmlEncode(grpId)}\" style=\"display:none\"><td colspan=\"{colSpan}\" style=\"padding-left:2em;font-size:.8rem;color:#555\">{memberContent}</td></tr>");
|
||||||
grpMemIdx++;
|
grpMemIdx++;
|
||||||
}
|
}
|
||||||
|
else if (isResolvedSystemGroup)
|
||||||
|
{
|
||||||
|
pills.Append("<span class=\"user-pill\" data-system-group=\"1\">");
|
||||||
|
if (!string.IsNullOrEmpty(sharingLinkType))
|
||||||
|
pills.Append(BuildSharingLinkBadge(sharingLinkType!));
|
||||||
|
pills.Append(HtmlEncode(targetLabel!));
|
||||||
|
pills.Append("</span>");
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
var cls = isExt ? "user-pill external-user" : "user-pill";
|
var cls = isExt ? "user-pill external-user" : "user-pill";
|
||||||
@@ -183,6 +221,80 @@ document.addEventListener('click', function(ev) {
|
|||||||
return (pills.ToString(), subRows.ToString());
|
return (pills.ToString(), subRows.ToString());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Renders the Granted Through cell. When the entry carries a resolved system-group
|
||||||
|
/// target (Limited Access For Web/List or SharingLinks), a clickable link to the
|
||||||
|
/// targeted resource is appended on a second line. For sharing links the link type
|
||||||
|
/// (OrganizationEdit / AnonymousView / …) is surfaced alongside the target.
|
||||||
|
///
|
||||||
|
/// When <paramref name="hideSystemGroupRaw"/> is true and a target was resolved, the
|
||||||
|
/// raw "SharePoint Group: SharingLinks.{guid}…" / "Limited Access System Group For
|
||||||
|
/// Web|List {guid}" prefix is suppressed and only the link-type badge + clickable
|
||||||
|
/// target are shown — keeps the report readable without losing information.
|
||||||
|
/// </summary>
|
||||||
|
internal static string BuildGrantedThroughCell(
|
||||||
|
string grantedThrough,
|
||||||
|
string? targetUrl,
|
||||||
|
string? targetLabel,
|
||||||
|
string? sharingLinkType,
|
||||||
|
bool hideSystemGroupRaw = false)
|
||||||
|
{
|
||||||
|
var hasTarget = !string.IsNullOrEmpty(targetUrl) && !string.IsNullOrEmpty(targetLabel);
|
||||||
|
var hasLinkType = !string.IsNullOrEmpty(sharingLinkType);
|
||||||
|
var suppressRaw = hideSystemGroupRaw && hasTarget;
|
||||||
|
|
||||||
|
var sb = new StringBuilder();
|
||||||
|
if (!suppressRaw)
|
||||||
|
sb.Append(HtmlEncode(grantedThrough));
|
||||||
|
|
||||||
|
if (!hasTarget && !hasLinkType)
|
||||||
|
return sb.ToString();
|
||||||
|
|
||||||
|
if (suppressRaw)
|
||||||
|
{
|
||||||
|
// Inline layout — no leading raw text to wrap under.
|
||||||
|
if (hasLinkType)
|
||||||
|
sb.Append(BuildSharingLinkBadge(sharingLinkType!));
|
||||||
|
if (hasTarget)
|
||||||
|
{
|
||||||
|
sb.Append("<a href=\"");
|
||||||
|
sb.Append(HtmlEncode(targetUrl!));
|
||||||
|
sb.Append("\" target=\"_blank\">");
|
||||||
|
sb.Append(HtmlEncode(targetLabel!));
|
||||||
|
sb.Append("</a>");
|
||||||
|
}
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
|
sb.Append("<div style=\"margin-top:4px;font-size:.75rem;color:#555\">");
|
||||||
|
if (hasLinkType)
|
||||||
|
sb.Append(BuildSharingLinkBadge(sharingLinkType!));
|
||||||
|
if (hasTarget)
|
||||||
|
{
|
||||||
|
sb.Append("→ <a href=\"");
|
||||||
|
sb.Append(HtmlEncode(targetUrl!));
|
||||||
|
sb.Append("\" target=\"_blank\">");
|
||||||
|
sb.Append(HtmlEncode(targetLabel!));
|
||||||
|
sb.Append("</a>");
|
||||||
|
}
|
||||||
|
sb.Append("</div>");
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Builds the colored badge for a SharePoint sharing-link type. Translates the
|
||||||
|
/// raw <c>linkType</c> code (e.g. <c>OrganizationEdit</c>) into a human label
|
||||||
|
/// (e.g. <c>Org link · Edit</c>) and tints by risk tier; raw code surfaces as a
|
||||||
|
/// <c>title</c> tooltip so operators can still trace it back to the source.
|
||||||
|
/// </summary>
|
||||||
|
internal static string BuildSharingLinkBadge(string rawLinkType)
|
||||||
|
{
|
||||||
|
var (label, risk) = SharingLinkLabels.Describe(rawLinkType);
|
||||||
|
var (bg, fg) = SharingLinkLabels.Colors(risk);
|
||||||
|
return $"<span class=\"badge\" style=\"background:{bg};color:{fg};margin-right:6px\" " +
|
||||||
|
$"title=\"{HtmlEncode(rawLinkType)}\">{HtmlEncode(label)}</span>";
|
||||||
|
}
|
||||||
|
|
||||||
/// <summary>Returns the CSS class for the object-type badge.</summary>
|
/// <summary>Returns the CSS class for the object-type badge.</summary>
|
||||||
internal static string ObjectTypeCss(string t) => t switch
|
internal static string ObjectTypeCss(string t) => t switch
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
using SharepointToolbox.Core.Models;
|
using SharepointToolbox.Core.Models;
|
||||||
using SharepointToolbox.Localization;
|
using SharepointToolbox.Localization;
|
||||||
|
using System.Globalization;
|
||||||
using System.IO;
|
using System.IO;
|
||||||
using System.Text;
|
using System.Text;
|
||||||
|
|
||||||
@@ -18,34 +19,58 @@ public class StorageCsvExportService
|
|||||||
/// </summary>
|
/// </summary>
|
||||||
public string BuildCsv(IReadOnlyList<StorageNode> nodes)
|
public string BuildCsv(IReadOnlyList<StorageNode> nodes)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
// Pre-size: ~110 chars/row + header avoids most StringBuilder growth.
|
||||||
var sb = new StringBuilder();
|
var sb = new StringBuilder(128 + nodes.Count * 110);
|
||||||
|
WriteCsv(sb, nodes);
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
// Header
|
private static void WriteCsv(StringBuilder sb, IReadOnlyList<StorageNode> nodes)
|
||||||
sb.AppendLine($"{T["report.col.library"]},{T["stor.col.kind"]},{T["report.col.site"]},{T["report.stat.files"]},{T["report.col.total_size_mb"]},{T["report.col.version_size_mb"]},{T["report.col.last_modified"]}");
|
{
|
||||||
|
var T = TranslationSource.Instance;
|
||||||
|
// Hoist resource lookups out of the row loop: ResourceManager.GetString
|
||||||
|
// is a culture-aware dictionary probe — caching once per export saves
|
||||||
|
// O(rows × columns) lookups on large tenants.
|
||||||
|
string colLibrary = T["report.col.library"];
|
||||||
|
string colKind = T["stor.col.kind"];
|
||||||
|
string colSite = T["report.col.site"];
|
||||||
|
string colFiles = T["report.stat.files"];
|
||||||
|
string colTotalMb = T["report.col.total_size_mb"];
|
||||||
|
string colVerMb = T["report.col.version_size_mb"];
|
||||||
|
string colLastMod = T["report.col.last_modified"];
|
||||||
|
|
||||||
|
sb.Append(colLibrary).Append(',')
|
||||||
|
.Append(colKind).Append(',')
|
||||||
|
.Append(colSite).Append(',')
|
||||||
|
.Append(colFiles).Append(',')
|
||||||
|
.Append(colTotalMb).Append(',')
|
||||||
|
.Append(colVerMb).Append(',')
|
||||||
|
.AppendLine(colLastMod);
|
||||||
|
|
||||||
|
var kindLabels = BuildKindLabelCache();
|
||||||
|
|
||||||
foreach (var node in nodes)
|
foreach (var node in nodes)
|
||||||
{
|
{
|
||||||
sb.AppendLine(string.Join(",",
|
AppendCsvField(sb, node.Name).Append(',');
|
||||||
Csv(node.Name),
|
AppendCsvField(sb, kindLabels[(int)node.Kind]).Append(',');
|
||||||
Csv(KindLabel(node.Kind)),
|
AppendCsvField(sb, node.SiteTitle).Append(',');
|
||||||
Csv(node.SiteTitle),
|
sb.Append(node.TotalFileCount).Append(',');
|
||||||
node.TotalFileCount.ToString(),
|
AppendMb(sb, node.TotalSizeBytes).Append(',');
|
||||||
FormatMb(node.TotalSizeBytes),
|
AppendMb(sb, node.VersionSizeBytes).Append(',');
|
||||||
FormatMb(node.VersionSizeBytes),
|
if (node.LastModified.HasValue)
|
||||||
node.LastModified.HasValue
|
AppendCsvField(sb, node.LastModified.Value.ToString("yyyy-MM-dd", CultureInfo.InvariantCulture));
|
||||||
? Csv(node.LastModified.Value.ToString("yyyy-MM-dd"))
|
sb.AppendLine();
|
||||||
: string.Empty));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return sb.ToString();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>Writes the library-level CSV to <paramref name="filePath"/> with UTF-8 BOM.</summary>
|
/// <summary>Writes the library-level CSV to <paramref name="filePath"/> with UTF-8 BOM.</summary>
|
||||||
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, string filePath, CancellationToken ct)
|
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, string filePath, CancellationToken ct)
|
||||||
{
|
{
|
||||||
var csv = BuildCsv(nodes);
|
// Stream straight to disk: skip the StringBuilder→string copy and the
|
||||||
await ExportFileWriter.WriteCsvAsync(filePath, csv, ct);
|
// separate UTF-8 buffer that File.WriteAllTextAsync materializes.
|
||||||
|
var sb = new StringBuilder(128 + nodes.Count * 110);
|
||||||
|
WriteCsv(sb, nodes);
|
||||||
|
await ExportFileWriter.WriteCsvChunksAsync(filePath, sb, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -53,44 +78,68 @@ public class StorageCsvExportService
|
|||||||
/// </summary>
|
/// </summary>
|
||||||
public string BuildCsv(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics)
|
public string BuildCsv(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var sb = new StringBuilder(192 + nodes.Count * 100 + fileTypeMetrics.Count * 40);
|
||||||
var sb = new StringBuilder();
|
WriteCsv(sb, nodes, fileTypeMetrics);
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void WriteCsv(StringBuilder sb, IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics)
|
||||||
|
{
|
||||||
|
var T = TranslationSource.Instance;
|
||||||
|
string colLibrary = T["report.col.library"];
|
||||||
|
string colSite = T["report.col.site"];
|
||||||
|
string colFiles = T["report.stat.files"];
|
||||||
|
string colTotalMb = T["report.col.total_size_mb"];
|
||||||
|
string colVerMb = T["report.col.version_size_mb"];
|
||||||
|
string colLastMod = T["report.col.last_modified"];
|
||||||
|
|
||||||
|
sb.Append(colLibrary).Append(',')
|
||||||
|
.Append(colSite).Append(',')
|
||||||
|
.Append(colFiles).Append(',')
|
||||||
|
.Append(colTotalMb).Append(',')
|
||||||
|
.Append(colVerMb).Append(',')
|
||||||
|
.AppendLine(colLastMod);
|
||||||
|
|
||||||
// Library details
|
|
||||||
sb.AppendLine($"{T["report.col.library"]},{T["report.col.site"]},{T["report.stat.files"]},{T["report.col.total_size_mb"]},{T["report.col.version_size_mb"]},{T["report.col.last_modified"]}");
|
|
||||||
foreach (var node in nodes)
|
foreach (var node in nodes)
|
||||||
{
|
{
|
||||||
sb.AppendLine(string.Join(",",
|
AppendCsvField(sb, node.Name).Append(',');
|
||||||
Csv(node.Name),
|
AppendCsvField(sb, node.SiteTitle).Append(',');
|
||||||
Csv(node.SiteTitle),
|
sb.Append(node.TotalFileCount).Append(',');
|
||||||
node.TotalFileCount.ToString(),
|
AppendMb(sb, node.TotalSizeBytes).Append(',');
|
||||||
FormatMb(node.TotalSizeBytes),
|
AppendMb(sb, node.VersionSizeBytes).Append(',');
|
||||||
FormatMb(node.VersionSizeBytes),
|
if (node.LastModified.HasValue)
|
||||||
node.LastModified.HasValue
|
AppendCsvField(sb, node.LastModified.Value.ToString("yyyy-MM-dd", CultureInfo.InvariantCulture));
|
||||||
? Csv(node.LastModified.Value.ToString("yyyy-MM-dd"))
|
sb.AppendLine();
|
||||||
: string.Empty));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// File type breakdown
|
|
||||||
if (fileTypeMetrics.Count > 0)
|
if (fileTypeMetrics.Count > 0)
|
||||||
{
|
{
|
||||||
|
string colFileType = T["report.col.file_type"];
|
||||||
|
string colSizeMb = T["report.col.size_mb"];
|
||||||
|
string colFileCnt = T["report.col.file_count"];
|
||||||
|
string noExtLabel = T["report.text.no_extension"];
|
||||||
|
|
||||||
sb.AppendLine();
|
sb.AppendLine();
|
||||||
sb.AppendLine($"{T["report.col.file_type"]},{T["report.col.size_mb"]},{T["report.col.file_count"]}");
|
sb.Append(colFileType).Append(',')
|
||||||
|
.Append(colSizeMb).Append(',')
|
||||||
|
.AppendLine(colFileCnt);
|
||||||
|
|
||||||
foreach (var m in fileTypeMetrics)
|
foreach (var m in fileTypeMetrics)
|
||||||
{
|
{
|
||||||
string label = string.IsNullOrEmpty(m.Extension) ? T["report.text.no_extension"] : m.Extension;
|
string label = string.IsNullOrEmpty(m.Extension) ? noExtLabel : m.Extension;
|
||||||
sb.AppendLine(string.Join(",", Csv(label), FormatMb(m.TotalSizeBytes), m.FileCount.ToString()));
|
AppendCsvField(sb, label).Append(',');
|
||||||
|
AppendMb(sb, m.TotalSizeBytes).Append(',');
|
||||||
|
sb.Append(m.FileCount).AppendLine();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return sb.ToString();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>Writes the two-section CSV (libraries + file-type breakdown) with UTF-8 BOM.</summary>
|
/// <summary>Writes the two-section CSV (libraries + file-type breakdown) with UTF-8 BOM.</summary>
|
||||||
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, string filePath, CancellationToken ct)
|
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, string filePath, CancellationToken ct)
|
||||||
{
|
{
|
||||||
var csv = BuildCsv(nodes, fileTypeMetrics);
|
var sb = new StringBuilder(192 + nodes.Count * 100 + fileTypeMetrics.Count * 40);
|
||||||
await ExportFileWriter.WriteCsvAsync(filePath, csv, ct);
|
WriteCsv(sb, nodes, fileTypeMetrics);
|
||||||
|
await ExportFileWriter.WriteCsvChunksAsync(filePath, sb, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -139,11 +188,27 @@ public class StorageCsvExportService
|
|||||||
|
|
||||||
// ── Helpers ───────────────────────────────────────────────────────────────
|
// ── Helpers ───────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
private static string FormatMb(long bytes)
|
private static StringBuilder AppendMb(StringBuilder sb, long bytes)
|
||||||
=> (bytes / (1024.0 * 1024.0)).ToString("F2");
|
=> sb.Append((bytes / (1024.0 * 1024.0)).ToString("F2", CultureInfo.InvariantCulture));
|
||||||
|
|
||||||
/// <summary>RFC 4180 CSV field quoting with formula-injection guard.</summary>
|
private static StringBuilder AppendCsvField(StringBuilder sb, string value)
|
||||||
private static string Csv(string value) => CsvSanitizer.EscapeMinimal(value);
|
=> sb.Append(CsvSanitizer.EscapeMinimal(value));
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Pre-resolves localized labels for every <see cref="StorageNodeKind"/>
|
||||||
|
/// once per export, indexed by the enum's int value. Avoids a
|
||||||
|
/// <c>ResourceManager.GetString</c> call per row in hot CSV loops.
|
||||||
|
/// </summary>
|
||||||
|
private static string[] BuildKindLabelCache()
|
||||||
|
{
|
||||||
|
var values = (StorageNodeKind[])Enum.GetValues(typeof(StorageNodeKind));
|
||||||
|
int max = 0;
|
||||||
|
foreach (var v in values) { int i = (int)v; if (i > max) max = i; }
|
||||||
|
var cache = new string[max + 1];
|
||||||
|
for (int i = 0; i < cache.Length; i++) cache[i] = ((StorageNodeKind)i).ToString();
|
||||||
|
foreach (var v in values) cache[(int)v] = KindLabel(v);
|
||||||
|
return cache;
|
||||||
|
}
|
||||||
|
|
||||||
private static string KindLabel(StorageNodeKind kind)
|
private static string KindLabel(StorageNodeKind kind)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -13,6 +13,8 @@ namespace SharepointToolbox.Services.Export;
|
|||||||
public class StorageHtmlExportService
|
public class StorageHtmlExportService
|
||||||
{
|
{
|
||||||
private int _togIdx;
|
private int _togIdx;
|
||||||
|
private string[] _kindLabels = Array.Empty<string>();
|
||||||
|
private string[] _kindLabelsHtml = Array.Empty<string>();
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Builds a self-contained HTML report with one collapsible row per
|
/// Builds a self-contained HTML report with one collapsible row per
|
||||||
@@ -21,10 +23,18 @@ public class StorageHtmlExportService
|
|||||||
/// breakdown section is desired.
|
/// breakdown section is desired.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public string BuildHtml(IReadOnlyList<StorageNode> nodes, ReportBranding? branding = null)
|
public string BuildHtml(IReadOnlyList<StorageNode> nodes, ReportBranding? branding = null)
|
||||||
|
{
|
||||||
|
var sb = new StringBuilder(3072 + nodes.Count * 340);
|
||||||
|
BuildHtmlCore(sb, nodes, branding);
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void BuildHtmlCore(StringBuilder sb, IReadOnlyList<StorageNode> nodes, ReportBranding? branding)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
_togIdx = 0;
|
_togIdx = 0;
|
||||||
var sb = new StringBuilder();
|
_kindLabels = BuildKindLabelCache();
|
||||||
|
_kindLabelsHtml = BuildHtmlEncodedCache(_kindLabels);
|
||||||
|
|
||||||
sb.AppendLine("<!DOCTYPE html>");
|
sb.AppendLine("<!DOCTYPE html>");
|
||||||
sb.AppendLine("<html lang=\"en\">");
|
sb.AppendLine("<html lang=\"en\">");
|
||||||
@@ -60,11 +70,18 @@ public class StorageHtmlExportService
|
|||||||
sb.Append(BrandingHtmlHelper.BuildBrandingHeader(branding));
|
sb.Append(BrandingHtmlHelper.BuildBrandingHeader(branding));
|
||||||
sb.AppendLine($"<h1>{T["report.title.storage"]}</h1>");
|
sb.AppendLine($"<h1>{T["report.title.storage"]}</h1>");
|
||||||
|
|
||||||
// Summary cards
|
// Single-pass root aggregation: replaces 4 separate enumerations
|
||||||
var rootNodes0 = nodes.Where(n => n.IndentLevel == 0).ToList();
|
// (.Where().ToList() + 3× .Sum() + a final .Where() during render).
|
||||||
long siteTotal0 = rootNodes0.Sum(n => n.TotalSizeBytes);
|
var rootNodes0 = new List<StorageNode>(Math.Min(nodes.Count, 64));
|
||||||
long versionTotal0 = rootNodes0.Sum(n => n.VersionSizeBytes);
|
long siteTotal0 = 0, versionTotal0 = 0, fileTotal0 = 0;
|
||||||
long fileTotal0 = rootNodes0.Sum(n => n.TotalFileCount);
|
foreach (var n in nodes)
|
||||||
|
{
|
||||||
|
if (n.IndentLevel != 0) continue;
|
||||||
|
rootNodes0.Add(n);
|
||||||
|
siteTotal0 += n.TotalSizeBytes;
|
||||||
|
versionTotal0 += n.VersionSizeBytes;
|
||||||
|
fileTotal0 += n.TotalFileCount;
|
||||||
|
}
|
||||||
|
|
||||||
sb.AppendLine($"""
|
sb.AppendLine($"""
|
||||||
<div style="display:flex;gap:16px;margin:16px 0;flex-wrap:wrap">
|
<div style="display:flex;gap:16px;margin:16px 0;flex-wrap:wrap">
|
||||||
@@ -90,7 +107,10 @@ public class StorageHtmlExportService
|
|||||||
<tbody>
|
<tbody>
|
||||||
""");
|
""");
|
||||||
|
|
||||||
foreach (var node in nodes)
|
// Render only the pre-materialized root list — recursing into
|
||||||
|
// Children handles descendants. Iterating the flat list would render
|
||||||
|
// every descendant a second time as a top-level row.
|
||||||
|
foreach (var node in rootNodes0)
|
||||||
{
|
{
|
||||||
RenderNode(sb, node);
|
RenderNode(sb, node);
|
||||||
}
|
}
|
||||||
@@ -102,18 +122,24 @@ public class StorageHtmlExportService
|
|||||||
|
|
||||||
sb.AppendLine($"<p class=\"generated\">{T["report.text.generated_colon"]} {DateTime.Now:yyyy-MM-dd HH:mm}</p>");
|
sb.AppendLine($"<p class=\"generated\">{T["report.text.generated_colon"]} {DateTime.Now:yyyy-MM-dd HH:mm}</p>");
|
||||||
sb.AppendLine("</body></html>");
|
sb.AppendLine("</body></html>");
|
||||||
|
|
||||||
return sb.ToString();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Builds an HTML report including a file-type breakdown chart section.
|
/// Builds an HTML report including a file-type breakdown chart section.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public string BuildHtml(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, ReportBranding? branding = null)
|
public string BuildHtml(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, ReportBranding? branding = null)
|
||||||
|
{
|
||||||
|
var sb = new StringBuilder(4096 + nodes.Count * 340 + fileTypeMetrics.Count * 220);
|
||||||
|
BuildHtmlCore(sb, nodes, fileTypeMetrics, branding);
|
||||||
|
return sb.ToString();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void BuildHtmlCore(StringBuilder sb, IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, ReportBranding? branding)
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
_togIdx = 0;
|
_togIdx = 0;
|
||||||
var sb = new StringBuilder();
|
_kindLabels = BuildKindLabelCache();
|
||||||
|
_kindLabelsHtml = BuildHtmlEncodedCache(_kindLabels);
|
||||||
|
|
||||||
sb.AppendLine("<!DOCTYPE html>");
|
sb.AppendLine("<!DOCTYPE html>");
|
||||||
sb.AppendLine("<html lang=\"en\">");
|
sb.AppendLine("<html lang=\"en\">");
|
||||||
@@ -160,11 +186,17 @@ public class StorageHtmlExportService
|
|||||||
sb.Append(BrandingHtmlHelper.BuildBrandingHeader(branding));
|
sb.Append(BrandingHtmlHelper.BuildBrandingHeader(branding));
|
||||||
sb.AppendLine($"<h1>{T["report.title.storage"]}</h1>");
|
sb.AppendLine($"<h1>{T["report.title.storage"]}</h1>");
|
||||||
|
|
||||||
// ── Summary cards ──
|
// ── Summary cards (single-pass aggregation) ──
|
||||||
var rootNodes = nodes.Where(n => n.IndentLevel == 0).ToList();
|
var rootNodes = new List<StorageNode>(Math.Min(nodes.Count, 64));
|
||||||
long siteTotal = rootNodes.Sum(n => n.TotalSizeBytes);
|
long siteTotal = 0, versionTotal = 0, fileTotal = 0;
|
||||||
long versionTotal = rootNodes.Sum(n => n.VersionSizeBytes);
|
foreach (var n in nodes)
|
||||||
long fileTotal = rootNodes.Sum(n => n.TotalFileCount);
|
{
|
||||||
|
if (n.IndentLevel != 0) continue;
|
||||||
|
rootNodes.Add(n);
|
||||||
|
siteTotal += n.TotalSizeBytes;
|
||||||
|
versionTotal += n.VersionSizeBytes;
|
||||||
|
fileTotal += n.TotalFileCount;
|
||||||
|
}
|
||||||
|
|
||||||
sb.AppendLine("<div class=\"stats\">");
|
sb.AppendLine("<div class=\"stats\">");
|
||||||
sb.AppendLine($" <div class=\"stat-card\"><div class=\"value\">{FormatSize(siteTotal)}</div><div class=\"label\">{T["report.stat.total_size"]}</div></div>");
|
sb.AppendLine($" <div class=\"stat-card\"><div class=\"value\">{FormatSize(siteTotal)}</div><div class=\"label\">{T["report.stat.total_size"]}</div></div>");
|
||||||
@@ -224,7 +256,10 @@ public class StorageHtmlExportService
|
|||||||
<tbody>
|
<tbody>
|
||||||
""");
|
""");
|
||||||
|
|
||||||
foreach (var node in nodes)
|
// Render only the pre-materialized root list — recursing into
|
||||||
|
// Children handles descendants. Iterating the flat list would render
|
||||||
|
// every descendant a second time as a top-level row.
|
||||||
|
foreach (var node in rootNodes)
|
||||||
{
|
{
|
||||||
RenderNode(sb, node);
|
RenderNode(sb, node);
|
||||||
}
|
}
|
||||||
@@ -236,22 +271,24 @@ public class StorageHtmlExportService
|
|||||||
|
|
||||||
sb.AppendLine($"<p class=\"generated\">{T["report.text.generated_colon"]} {DateTime.Now:yyyy-MM-dd HH:mm}</p>");
|
sb.AppendLine($"<p class=\"generated\">{T["report.text.generated_colon"]} {DateTime.Now:yyyy-MM-dd HH:mm}</p>");
|
||||||
sb.AppendLine("</body></html>");
|
sb.AppendLine("</body></html>");
|
||||||
|
|
||||||
return sb.ToString();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>Writes the library-only HTML report to <paramref name="filePath"/>.</summary>
|
/// <summary>Writes the library-only HTML report to <paramref name="filePath"/>.</summary>
|
||||||
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, string filePath, CancellationToken ct, ReportBranding? branding = null)
|
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, string filePath, CancellationToken ct, ReportBranding? branding = null)
|
||||||
{
|
{
|
||||||
var html = BuildHtml(nodes, branding);
|
// Build into StringBuilder, stream chunks straight to disk —
|
||||||
await File.WriteAllTextAsync(filePath, html, Encoding.UTF8, ct);
|
// skips a full-document char-array copy from sb.ToString().
|
||||||
|
var sb = new StringBuilder(3072 + nodes.Count * 340);
|
||||||
|
BuildHtmlCore(sb, nodes, branding);
|
||||||
|
await ExportFileWriter.WriteHtmlChunksAsync(filePath, sb, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>Writes the HTML report including the file-type breakdown chart.</summary>
|
/// <summary>Writes the HTML report including the file-type breakdown chart.</summary>
|
||||||
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, string filePath, CancellationToken ct, ReportBranding? branding = null)
|
public async Task WriteAsync(IReadOnlyList<StorageNode> nodes, IReadOnlyList<FileTypeMetric> fileTypeMetrics, string filePath, CancellationToken ct, ReportBranding? branding = null)
|
||||||
{
|
{
|
||||||
var html = BuildHtml(nodes, fileTypeMetrics, branding);
|
var sb = new StringBuilder(4096 + nodes.Count * 340 + fileTypeMetrics.Count * 220);
|
||||||
await File.WriteAllTextAsync(filePath, html, Encoding.UTF8, ct);
|
BuildHtmlCore(sb, nodes, fileTypeMetrics, branding);
|
||||||
|
await ExportFileWriter.WriteHtmlChunksAsync(filePath, sb, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -307,21 +344,7 @@ public class StorageHtmlExportService
|
|||||||
? $"<button class=\"toggle-btn\" onclick=\"toggle({myIdx})\">▶</button>{HtmlEncode(node.Name)}"
|
? $"<button class=\"toggle-btn\" onclick=\"toggle({myIdx})\">▶</button>{HtmlEncode(node.Name)}"
|
||||||
: $"<span style=\"margin-left:{node.IndentLevel * 16}px\">{HtmlEncode(node.Name)}</span>";
|
: $"<span style=\"margin-left:{node.IndentLevel * 16}px\">{HtmlEncode(node.Name)}</span>";
|
||||||
|
|
||||||
string lastMod = node.LastModified.HasValue
|
AppendRow(sb, node, nameCell);
|
||||||
? node.LastModified.Value.ToString("yyyy-MM-dd")
|
|
||||||
: string.Empty;
|
|
||||||
|
|
||||||
sb.AppendLine($"""
|
|
||||||
<tr>
|
|
||||||
<td>{nameCell}</td>
|
|
||||||
<td>{HtmlEncode(KindLabel(node.Kind))}</td>
|
|
||||||
<td>{HtmlEncode(node.SiteTitle)}</td>
|
|
||||||
<td class="num">{node.TotalFileCount:N0}</td>
|
|
||||||
<td class="num">{FormatSize(node.TotalSizeBytes)}</td>
|
|
||||||
<td class="num">{FormatSize(node.VersionSizeBytes)}</td>
|
|
||||||
<td>{lastMod}</td>
|
|
||||||
</tr>
|
|
||||||
""");
|
|
||||||
|
|
||||||
if (hasChildren)
|
if (hasChildren)
|
||||||
{
|
{
|
||||||
@@ -346,21 +369,7 @@ public class StorageHtmlExportService
|
|||||||
? $"<span style=\"{indent}\"><button class=\"toggle-btn\" onclick=\"toggle({myIdx})\">▶</button>{HtmlEncode(node.Name)}</span>"
|
? $"<span style=\"{indent}\"><button class=\"toggle-btn\" onclick=\"toggle({myIdx})\">▶</button>{HtmlEncode(node.Name)}</span>"
|
||||||
: $"<span style=\"{indent}\">{HtmlEncode(node.Name)}</span>";
|
: $"<span style=\"{indent}\">{HtmlEncode(node.Name)}</span>";
|
||||||
|
|
||||||
string lastMod = node.LastModified.HasValue
|
AppendRow(sb, node, nameCell);
|
||||||
? node.LastModified.Value.ToString("yyyy-MM-dd")
|
|
||||||
: string.Empty;
|
|
||||||
|
|
||||||
sb.AppendLine($"""
|
|
||||||
<tr>
|
|
||||||
<td>{nameCell}</td>
|
|
||||||
<td>{HtmlEncode(KindLabel(node.Kind))}</td>
|
|
||||||
<td>{HtmlEncode(node.SiteTitle)}</td>
|
|
||||||
<td class="num">{node.TotalFileCount:N0}</td>
|
|
||||||
<td class="num">{FormatSize(node.TotalSizeBytes)}</td>
|
|
||||||
<td class="num">{FormatSize(node.VersionSizeBytes)}</td>
|
|
||||||
<td>{lastMod}</td>
|
|
||||||
</tr>
|
|
||||||
""");
|
|
||||||
|
|
||||||
if (hasChildren)
|
if (hasChildren)
|
||||||
{
|
{
|
||||||
@@ -375,6 +384,35 @@ public class StorageHtmlExportService
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Appends one data row given the pre-rendered name cell. Hot path:
|
||||||
|
/// pulls localized kind labels from <see cref="_kindLabelsHtml"/> instead
|
||||||
|
/// of going through <c>ResourceManager.GetString</c> + <c>HtmlEncode</c>
|
||||||
|
/// per row.
|
||||||
|
/// </summary>
|
||||||
|
private void AppendRow(StringBuilder sb, StorageNode node, string nameCell)
|
||||||
|
{
|
||||||
|
int kindIdx = (int)node.Kind;
|
||||||
|
string kindLabel = (uint)kindIdx < (uint)_kindLabelsHtml.Length
|
||||||
|
? _kindLabelsHtml[kindIdx]
|
||||||
|
: HtmlEncode(node.Kind.ToString());
|
||||||
|
string lastMod = node.LastModified.HasValue
|
||||||
|
? node.LastModified.Value.ToString("yyyy-MM-dd")
|
||||||
|
: string.Empty;
|
||||||
|
|
||||||
|
sb.AppendLine($"""
|
||||||
|
<tr>
|
||||||
|
<td>{nameCell}</td>
|
||||||
|
<td>{kindLabel}</td>
|
||||||
|
<td>{HtmlEncode(node.SiteTitle)}</td>
|
||||||
|
<td class="num">{node.TotalFileCount:N0}</td>
|
||||||
|
<td class="num">{FormatSize(node.TotalSizeBytes)}</td>
|
||||||
|
<td class="num">{FormatSize(node.VersionSizeBytes)}</td>
|
||||||
|
<td>{lastMod}</td>
|
||||||
|
</tr>
|
||||||
|
""");
|
||||||
|
}
|
||||||
|
|
||||||
private static string FormatSize(long bytes)
|
private static string FormatSize(long bytes)
|
||||||
{
|
{
|
||||||
if (bytes >= 1_073_741_824L) return $"{bytes / 1_073_741_824.0:F2} GB";
|
if (bytes >= 1_073_741_824L) return $"{bytes / 1_073_741_824.0:F2} GB";
|
||||||
@@ -400,4 +438,28 @@ public class StorageHtmlExportService
|
|||||||
_ => kind.ToString()
|
_ => kind.ToString()
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Pre-resolves localized labels for every <see cref="StorageNodeKind"/>
|
||||||
|
/// once per export. Cached array index lookup avoids
|
||||||
|
/// <c>ResourceManager.GetString</c> per row in hot rendering loops.
|
||||||
|
/// </summary>
|
||||||
|
private static string[] BuildKindLabelCache()
|
||||||
|
{
|
||||||
|
var values = (StorageNodeKind[])Enum.GetValues(typeof(StorageNodeKind));
|
||||||
|
int max = 0;
|
||||||
|
foreach (var v in values) { int i = (int)v; if (i > max) max = i; }
|
||||||
|
var cache = new string[max + 1];
|
||||||
|
for (int i = 0; i < cache.Length; i++) cache[i] = ((StorageNodeKind)i).ToString();
|
||||||
|
foreach (var v in values) cache[(int)v] = KindLabel(v);
|
||||||
|
return cache;
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>HTML-encodes each entry of <paramref name="raw"/> once.</summary>
|
||||||
|
private static string[] BuildHtmlEncodedCache(string[] raw)
|
||||||
|
{
|
||||||
|
var encoded = new string[raw.Length];
|
||||||
|
for (int i = 0; i < raw.Length; i++) encoded[i] = HtmlEncode(raw[i]);
|
||||||
|
return encoded;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,7 +15,7 @@ public class UserAccessCsvExportService
|
|||||||
private static string BuildDataHeader()
|
private static string BuildDataHeader()
|
||||||
{
|
{
|
||||||
var T = TranslationSource.Instance;
|
var T = TranslationSource.Instance;
|
||||||
return $"\"{T["report.col.site"]}\",\"{T["report.col.object_type"]}\",\"{T["report.col.object"]}\",\"{T["report.col.url"]}\",\"{T["report.col.permission_level"]}\",\"{T["report.col.access_type"]}\",\"{T["report.col.granted_through"]}\"";
|
return $"\"{T["report.col.site"]}\",\"{T["report.col.object_type"]}\",\"{T["report.col.object"]}\",\"{T["report.col.url"]}\",\"{T["report.col.permission_level"]}\",\"{T["report.col.access_type"]}\",\"{T["report.col.granted_through"]}\",\"TargetLabel\",\"TargetUrl\",\"SharingLinkType\"";
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
@@ -51,7 +51,10 @@ public class UserAccessCsvExportService
|
|||||||
Csv(entry.ObjectUrl),
|
Csv(entry.ObjectUrl),
|
||||||
Csv(entry.PermissionLevel),
|
Csv(entry.PermissionLevel),
|
||||||
Csv(entry.AccessType.ToString()),
|
Csv(entry.AccessType.ToString()),
|
||||||
Csv(entry.GrantedThrough)
|
Csv(entry.GrantedThrough),
|
||||||
|
Csv(entry.TargetLabel ?? string.Empty),
|
||||||
|
Csv(entry.TargetUrl ?? string.Empty),
|
||||||
|
Csv(entry.SharingLinkType ?? string.Empty)
|
||||||
}));
|
}));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -179,7 +182,7 @@ public class UserAccessCsvExportService
|
|||||||
sb.AppendLine();
|
sb.AppendLine();
|
||||||
|
|
||||||
// Header
|
// Header
|
||||||
sb.AppendLine($"\"{T["report.col.user"]}\",\"User Login\",\"{T["report.col.permission_level"]}\",\"{T["report.col.access_type"]}\",\"{T["report.col.granted_through"]}\",\"Locations\",\"Location Count\"");
|
sb.AppendLine($"\"{T["report.col.user"]}\",\"User Login\",\"{T["report.col.permission_level"]}\",\"{T["report.col.access_type"]}\",\"{T["report.col.granted_through"]}\",\"TargetLabel\",\"TargetUrl\",\"SharingLinkType\",\"Locations\",\"Location Count\"");
|
||||||
|
|
||||||
// Data rows
|
// Data rows
|
||||||
foreach (var entry in consolidated)
|
foreach (var entry in consolidated)
|
||||||
@@ -187,13 +190,16 @@ public class UserAccessCsvExportService
|
|||||||
var locations = string.Join("; ", entry.Locations.Select(l => l.SiteTitle));
|
var locations = string.Join("; ", entry.Locations.Select(l => l.SiteTitle));
|
||||||
sb.AppendLine(string.Join(",", new[]
|
sb.AppendLine(string.Join(",", new[]
|
||||||
{
|
{
|
||||||
$"\"{entry.UserDisplayName}\"",
|
Csv(entry.UserDisplayName),
|
||||||
$"\"{entry.UserLogin}\"",
|
Csv(entry.UserLogin),
|
||||||
$"\"{entry.PermissionLevel}\"",
|
Csv(entry.PermissionLevel),
|
||||||
$"\"{entry.AccessType}\"",
|
Csv(entry.AccessType.ToString()),
|
||||||
$"\"{entry.GrantedThrough}\"",
|
Csv(entry.GrantedThrough),
|
||||||
$"\"{locations}\"",
|
Csv(entry.TargetLabel ?? string.Empty),
|
||||||
$"\"{entry.LocationCount}\""
|
Csv(entry.TargetUrl ?? string.Empty),
|
||||||
|
Csv(entry.SharingLinkType ?? string.Empty),
|
||||||
|
Csv(locations),
|
||||||
|
Csv(entry.LocationCount.ToString())
|
||||||
}));
|
}));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -226,7 +232,10 @@ public class UserAccessCsvExportService
|
|||||||
Csv(entry.ObjectUrl),
|
Csv(entry.ObjectUrl),
|
||||||
Csv(entry.PermissionLevel),
|
Csv(entry.PermissionLevel),
|
||||||
Csv(entry.AccessType.ToString()),
|
Csv(entry.AccessType.ToString()),
|
||||||
Csv(entry.GrantedThrough)
|
Csv(entry.GrantedThrough),
|
||||||
|
Csv(entry.TargetLabel ?? string.Empty),
|
||||||
|
Csv(entry.TargetUrl ?? string.Empty),
|
||||||
|
Csv(entry.SharingLinkType ?? string.Empty)
|
||||||
}));
|
}));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -250,7 +250,7 @@ a:hover { text-decoration: underline; }
|
|||||||
sb.AppendLine($" <td>{objectCell}</td>");
|
sb.AppendLine($" <td>{objectCell}</td>");
|
||||||
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
||||||
sb.AppendLine($" <td>{accessBadge}</td>");
|
sb.AppendLine($" <td>{accessBadge}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.GrantedThrough)}</td>");
|
sb.AppendLine($" <td>{PermissionHtmlFragments.BuildGrantedThroughCell(entry.GrantedThrough, entry.TargetUrl, entry.TargetLabel, entry.SharingLinkType)}</td>");
|
||||||
sb.AppendLine("</tr>");
|
sb.AppendLine("</tr>");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -301,7 +301,7 @@ a:hover { text-decoration: underline; }
|
|||||||
sb.AppendLine($" <td>{objectCell}</td>");
|
sb.AppendLine($" <td>{objectCell}</td>");
|
||||||
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
||||||
sb.AppendLine($" <td>{accessBadge}</td>");
|
sb.AppendLine($" <td>{accessBadge}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.GrantedThrough)}</td>");
|
sb.AppendLine($" <td>{PermissionHtmlFragments.BuildGrantedThroughCell(entry.GrantedThrough, entry.TargetUrl, entry.TargetLabel, entry.SharingLinkType)}</td>");
|
||||||
sb.AppendLine("</tr>");
|
sb.AppendLine("</tr>");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -579,7 +579,7 @@ a:hover { text-decoration: underline; }
|
|||||||
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.UserDisplayName)}{guestBadge}</td>");
|
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.UserDisplayName)}{guestBadge}</td>");
|
||||||
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
sb.AppendLine($" <td{rowClass}>{HtmlEncode(entry.PermissionLevel)}{highIcon}</td>");
|
||||||
sb.AppendLine($" <td>{accessBadge}</td>");
|
sb.AppendLine($" <td>{accessBadge}</td>");
|
||||||
sb.AppendLine($" <td>{HtmlEncode(entry.GrantedThrough)}</td>");
|
sb.AppendLine($" <td>{PermissionHtmlFragments.BuildGrantedThroughCell(entry.GrantedThrough, entry.TargetUrl, entry.TargetLabel, entry.SharingLinkType)}</td>");
|
||||||
|
|
||||||
if (entry.LocationCount == 1)
|
if (entry.LocationCount == 1)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -0,0 +1,23 @@
|
|||||||
|
using Microsoft.SharePoint.Client;
|
||||||
|
using SharepointToolbox.Core.Helpers;
|
||||||
|
using SharepointToolbox.Core.Models;
|
||||||
|
|
||||||
|
namespace SharepointToolbox.Services;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Resolves the targeted resource (List, Web, File, Folder) for a SharePoint system
|
||||||
|
/// group whose name encodes a GUID — Limited Access System Group For Web/List and
|
||||||
|
/// SharingLinks.{itemId}.{type}.{shareId}. Returns null when the target is missing
|
||||||
|
/// or unreachable (deleted item, access denied, etc.) — callers fall back to the
|
||||||
|
/// raw group name.
|
||||||
|
/// </summary>
|
||||||
|
public interface ISystemGroupTargetResolver
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// Resolves the target for a classified system group. Cached per (ctx site, guid).
|
||||||
|
/// </summary>
|
||||||
|
Task<SystemGroupTarget?> ResolveAsync(
|
||||||
|
ClientContext ctx,
|
||||||
|
SystemGroupClassification classification,
|
||||||
|
CancellationToken ct);
|
||||||
|
}
|
||||||
@@ -11,6 +11,16 @@ namespace SharepointToolbox.Services;
|
|||||||
/// </summary>
|
/// </summary>
|
||||||
public class PermissionsService : IPermissionsService
|
public class PermissionsService : IPermissionsService
|
||||||
{
|
{
|
||||||
|
private readonly ISystemGroupTargetResolver? _systemGroupResolver;
|
||||||
|
|
||||||
|
public PermissionsService() : this(null) { }
|
||||||
|
|
||||||
|
public PermissionsService(ISystemGroupTargetResolver? systemGroupResolver)
|
||||||
|
{
|
||||||
|
_systemGroupResolver = systemGroupResolver;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Detects the SharePoint server error raised when a RoleAssignment member
|
/// Detects the SharePoint server error raised when a RoleAssignment member
|
||||||
/// refers to a user that no longer resolves (orphaned Azure AD account).
|
/// refers to a user that no longer resolves (orphaned Azure AD account).
|
||||||
@@ -336,9 +346,18 @@ public class PermissionsService : IPermissionsService
|
|||||||
|
|
||||||
var member = ra.Member;
|
var member = ra.Member;
|
||||||
var loginName = member.LoginName ?? string.Empty;
|
var loginName = member.LoginName ?? string.Empty;
|
||||||
|
var memberTitle = member.Title ?? string.Empty;
|
||||||
|
|
||||||
// Skip sharing links groups and limited access system groups
|
// Classify the member name. The bare "Limited Access System Group" is
|
||||||
if (PermissionEntryHelper.IsSharingLinksGroup(loginName))
|
// pure noise; drop it. The For-Web/For-List and SharingLinks variants
|
||||||
|
// are kept and enriched below with a resolved target URL.
|
||||||
|
var classification = PermissionEntryHelper.Classify(memberTitle);
|
||||||
|
if (classification.Kind == SystemGroupKind.None
|
||||||
|
&& PermissionEntryHelper.IsBareLimitedAccessSystemGroup(loginName))
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (classification.Kind == SystemGroupKind.LimitedAccessBare)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
// Collect and filter permission levels
|
// Collect and filter permission levels
|
||||||
@@ -362,19 +381,42 @@ public class PermissionsService : IPermissionsService
|
|||||||
|
|
||||||
// Determine how the permission was granted
|
// Determine how the permission was granted
|
||||||
string grantedThrough = principalType == "SharePointGroup"
|
string grantedThrough = principalType == "SharePointGroup"
|
||||||
? $"SharePoint Group: {member.Title}"
|
? $"SharePoint Group: {memberTitle}"
|
||||||
: "Direct Permissions";
|
: "Direct Permissions";
|
||||||
|
|
||||||
|
// Resolve system-group target (Limited Access For Web/List, SharingLinks)
|
||||||
|
string? targetUrl = null;
|
||||||
|
string? targetLabel = null;
|
||||||
|
string? sharingLinkType = null;
|
||||||
|
if (_systemGroupResolver is not null && classification.Kind != SystemGroupKind.None)
|
||||||
|
{
|
||||||
|
var target = await _systemGroupResolver.ResolveAsync(ctx, classification, ct);
|
||||||
|
if (target is not null)
|
||||||
|
{
|
||||||
|
targetUrl = target.Url;
|
||||||
|
targetLabel = target.Label;
|
||||||
|
sharingLinkType = target.LinkType;
|
||||||
|
}
|
||||||
|
else if (classification.Kind == SystemGroupKind.SharingLink)
|
||||||
|
{
|
||||||
|
// Target lookup failed (deleted item / no access) — still surface link type.
|
||||||
|
sharingLinkType = classification.LinkType;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
entries.Add(new PermissionEntry(
|
entries.Add(new PermissionEntry(
|
||||||
ObjectType: objectType,
|
ObjectType: objectType,
|
||||||
Title: title,
|
Title: title,
|
||||||
Url: url,
|
Url: url,
|
||||||
HasUniquePermissions: obj.HasUniqueRoleAssignments,
|
HasUniquePermissions: obj.HasUniqueRoleAssignments,
|
||||||
Users: member.Title ?? string.Empty,
|
Users: memberTitle,
|
||||||
UserLogins: loginName,
|
UserLogins: loginName,
|
||||||
PermissionLevels: permLevels,
|
PermissionLevels: permLevels,
|
||||||
GrantedThrough: grantedThrough,
|
GrantedThrough: grantedThrough,
|
||||||
PrincipalType: principalType));
|
PrincipalType: principalType,
|
||||||
|
TargetUrl: targetUrl,
|
||||||
|
TargetLabel: targetLabel,
|
||||||
|
SharingLinkType: sharingLinkType));
|
||||||
}
|
}
|
||||||
|
|
||||||
return entries;
|
return entries;
|
||||||
|
|||||||
@@ -58,7 +58,11 @@ public class StorageService : IStorageService
|
|||||||
var lists = web.Lists.ToList();
|
var lists = web.Lists.ToList();
|
||||||
|
|
||||||
// ── Document libraries (incl. hidden + Preservation Hold) ───────────
|
// ── Document libraries (incl. hidden + Preservation Hold) ───────────
|
||||||
|
// Track each library's RootFolder server-relative URL so bin items can
|
||||||
|
// be attributed back to their source library (matches storman.aspx,
|
||||||
|
// which folds bin contents into the owning library's Total Size).
|
||||||
var docLibs = lists.Where(l => l.BaseType == BaseType.DocumentLibrary).ToList();
|
var docLibs = lists.Where(l => l.BaseType == BaseType.DocumentLibrary).ToList();
|
||||||
|
var libsByRoot = new Dictionary<string, StorageNode>(StringComparer.OrdinalIgnoreCase);
|
||||||
int idx = 0;
|
int idx = 0;
|
||||||
foreach (var lib in docLibs)
|
foreach (var lib in docLibs)
|
||||||
{
|
{
|
||||||
@@ -84,7 +88,17 @@ public class StorageService : IStorageService
|
|||||||
siteTitle, lib.Title, kind, progress, ct);
|
siteTitle, lib.Title, kind, progress, ct);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CSOM Folder.StorageMetrics is unreliable across the board for
|
||||||
|
// larger libraries — sometimes returns the storman value, sometimes
|
||||||
|
// returns a fraction of it, sometimes zero. Subfolder StorageMetrics
|
||||||
|
// are equally inconsistent. The only CSOM path that matches storman
|
||||||
|
// is per-file File.Length + File.Versions[*].Size enumeration, so
|
||||||
|
// run it unconditionally, replacing the CSOM totals.
|
||||||
|
ResetNodeCounts(libNode);
|
||||||
|
await BackfillLibFromFilesAsync(ctx, lib, libNode, progress, ct);
|
||||||
|
|
||||||
result.Add(libNode);
|
result.Add(libNode);
|
||||||
|
libsByRoot[NormalizeServerRelative(lib.RootFolder.ServerRelativeUrl)] = libNode;
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── List attachments (non-document-library lists) ───────────────────
|
// ── List attachments (non-document-library lists) ───────────────────
|
||||||
@@ -114,7 +128,33 @@ public class StorageService : IStorageService
|
|||||||
progress.Report(OperationProgress.Indeterminate(
|
progress.Report(OperationProgress.Indeterminate(
|
||||||
$"Scanning recycle bin: {siteTitle}..."));
|
$"Scanning recycle bin: {siteTitle}..."));
|
||||||
|
|
||||||
var rbNodes = await LoadRecycleBinNodesAsync(ctx, siteTitle, progress, ct);
|
var (rbNodes, perDir) = await LoadRecycleBinNodesAsync(ctx, web, siteTitle, progress, ct);
|
||||||
|
|
||||||
|
// Attribute bin items to owning library (longest-prefix match on DirName)
|
||||||
|
// so library Total Size matches storman.aspx, which counts an item's
|
||||||
|
// bytes against its source library even after deletion.
|
||||||
|
if (perDir.Count > 0 && libsByRoot.Count > 0)
|
||||||
|
{
|
||||||
|
var libRootsByLength = libsByRoot
|
||||||
|
.OrderByDescending(kv => kv.Key.Length)
|
||||||
|
.ToList();
|
||||||
|
|
||||||
|
foreach (var kv in perDir)
|
||||||
|
{
|
||||||
|
string dirNorm = NormalizeServerRelative(kv.Key);
|
||||||
|
foreach (var lib in libRootsByLength)
|
||||||
|
{
|
||||||
|
if (dirNorm.Equals(lib.Key, StringComparison.OrdinalIgnoreCase) ||
|
||||||
|
dirNorm.StartsWith(lib.Key + "/", StringComparison.OrdinalIgnoreCase))
|
||||||
|
{
|
||||||
|
lib.Value.TotalSizeBytes += kv.Value.Size;
|
||||||
|
lib.Value.TotalFileCount += kv.Value.Count;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
result.AddRange(rbNodes);
|
result.AddRange(rbNodes);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -131,6 +171,9 @@ public class StorageService : IStorageService
|
|||||||
await CollectForWebAsync(ctx, sub, options, subResult, progress, ct);
|
await CollectForWebAsync(ctx, sub, options, subResult, progress, ct);
|
||||||
if (subResult.Count == 0) continue;
|
if (subResult.Count == 0) continue;
|
||||||
|
|
||||||
|
// Bin contents already rolled up into each library's TotalSizeBytes
|
||||||
|
// (storman behavior); summing root RecycleBin children too would
|
||||||
|
// double-count. Filter them out here.
|
||||||
var subRoot = new StorageNode
|
var subRoot = new StorageNode
|
||||||
{
|
{
|
||||||
Name = sub.Title,
|
Name = sub.Title,
|
||||||
@@ -140,9 +183,9 @@ public class StorageService : IStorageService
|
|||||||
Kind = StorageNodeKind.Subsite,
|
Kind = StorageNodeKind.Subsite,
|
||||||
IndentLevel = 0,
|
IndentLevel = 0,
|
||||||
Children = subResult,
|
Children = subResult,
|
||||||
TotalSizeBytes = subResult.Sum(n => n.TotalSizeBytes),
|
TotalSizeBytes = subResult.Where(n => n.Kind != StorageNodeKind.RecycleBin).Sum(n => n.TotalSizeBytes),
|
||||||
FileStreamSizeBytes = subResult.Sum(n => n.FileStreamSizeBytes),
|
FileStreamSizeBytes = subResult.Where(n => n.Kind != StorageNodeKind.RecycleBin).Sum(n => n.FileStreamSizeBytes),
|
||||||
TotalFileCount = subResult.Sum(n => n.TotalFileCount)
|
TotalFileCount = subResult.Where(n => n.Kind != StorageNodeKind.RecycleBin).Sum(n => n.TotalFileCount)
|
||||||
};
|
};
|
||||||
result.Add(subRoot);
|
result.Add(subRoot);
|
||||||
}
|
}
|
||||||
@@ -210,23 +253,34 @@ public class StorageService : IStorageService
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static async Task<List<StorageNode>> LoadRecycleBinNodesAsync(
|
private static async Task<(List<StorageNode> Nodes, Dictionary<string, (long Size, int Count)> PerDir)> LoadRecycleBinNodesAsync(
|
||||||
ClientContext ctx,
|
ClientContext ctx,
|
||||||
|
Web web,
|
||||||
string siteTitle,
|
string siteTitle,
|
||||||
IProgress<OperationProgress> progress,
|
IProgress<OperationProgress> progress,
|
||||||
CancellationToken ct)
|
CancellationToken ct)
|
||||||
{
|
{
|
||||||
var nodes = new List<StorageNode>();
|
var nodes = new List<StorageNode>();
|
||||||
|
var perDir = new Dictionary<string, (long Size, int Count)>(StringComparer.OrdinalIgnoreCase);
|
||||||
|
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
var bin = ctx.Site.RecycleBin;
|
// Web-scoped: ctx.Site.RecycleBin would return the entire site-collection
|
||||||
|
// bin and inflate totals by (1 + N_subsites) when IncludeSubsites is on.
|
||||||
|
var bin = web.RecycleBin;
|
||||||
ctx.Load(bin, b => b.Include(
|
ctx.Load(bin, b => b.Include(
|
||||||
i => i.Size,
|
i => i.Size,
|
||||||
i => i.ItemState,
|
i => i.ItemState,
|
||||||
i => i.DeletedDate));
|
i => i.DeletedDate,
|
||||||
|
i => i.DirName));
|
||||||
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
||||||
|
|
||||||
|
// RecycleBinItem.DirName is web-relative on SharePoint Online
|
||||||
|
// (e.g. "Documents/SubFolder" without leading slash or web URL).
|
||||||
|
// Prepend the web's ServerRelativeUrl so the result matches
|
||||||
|
// List.RootFolder.ServerRelativeUrl form used by libsByRoot.
|
||||||
|
string webSrl = NormalizeServerRelative(web.ServerRelativeUrl);
|
||||||
|
|
||||||
long stage1Size = 0, stage2Size = 0;
|
long stage1Size = 0, stage2Size = 0;
|
||||||
int stage1Count = 0, stage2Count = 0;
|
int stage1Count = 0, stage2Count = 0;
|
||||||
DateTime? stage1Last = null, stage2Last = null;
|
DateTime? stage1Last = null, stage2Last = null;
|
||||||
@@ -245,6 +299,20 @@ public class StorageService : IStorageService
|
|||||||
stage1Count++;
|
stage1Count++;
|
||||||
if (stage1Last is null || item.DeletedDate > stage1Last) stage1Last = item.DeletedDate;
|
if (stage1Last is null || item.DeletedDate > stage1Last) stage1Last = item.DeletedDate;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
string raw = item.DirName ?? string.Empty;
|
||||||
|
string dirSrl;
|
||||||
|
if (raw.StartsWith('/'))
|
||||||
|
dirSrl = NormalizeServerRelative(raw);
|
||||||
|
else if (string.IsNullOrEmpty(raw))
|
||||||
|
dirSrl = webSrl;
|
||||||
|
else
|
||||||
|
dirSrl = NormalizeServerRelative(webSrl + "/" + raw);
|
||||||
|
|
||||||
|
if (perDir.TryGetValue(dirSrl, out var tally))
|
||||||
|
perDir[dirSrl] = (tally.Size + item.Size, tally.Count + 1);
|
||||||
|
else
|
||||||
|
perDir[dirSrl] = (item.Size, 1);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (stage1Count > 0)
|
if (stage1Count > 0)
|
||||||
@@ -282,7 +350,21 @@ public class StorageService : IStorageService
|
|||||||
// Insufficient permission to read recycle bin or feature unavailable.
|
// Insufficient permission to read recycle bin or feature unavailable.
|
||||||
}
|
}
|
||||||
|
|
||||||
return nodes;
|
return (nodes, perDir);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Normalizes a server-relative path for consistent prefix matching:
|
||||||
|
/// trims trailing slash, ensures single leading slash. SharePoint
|
||||||
|
/// inconsistently returns DirName with or without leading slash across
|
||||||
|
/// API surfaces, so the caller cannot rely on a canonical form.
|
||||||
|
/// </summary>
|
||||||
|
private static string NormalizeServerRelative(string? path)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrEmpty(path)) return string.Empty;
|
||||||
|
string trimmed = path.Trim().TrimEnd('/');
|
||||||
|
if (trimmed.Length == 0) return string.Empty;
|
||||||
|
return trimmed.StartsWith('/') ? trimmed : "/" + trimmed;
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task<IReadOnlyList<FileTypeMetric>> CollectFileTypeMetricsAsync(
|
public async Task<IReadOnlyList<FileTypeMetric>> CollectFileTypeMetricsAsync(
|
||||||
@@ -314,6 +396,10 @@ public class StorageService : IStorageService
|
|||||||
progress.Report(new OperationProgress(libIdx, libs.Count,
|
progress.Report(new OperationProgress(libIdx, libs.Count,
|
||||||
$"Scanning files by type: {lib.Title} ({libIdx}/{libs.Count})"));
|
$"Scanning files by type: {lib.Title} ({libIdx}/{libs.Count})"));
|
||||||
|
|
||||||
|
// No <Where> clause: filtering on FSObjType (non-indexed) on a list
|
||||||
|
// beyond 5000 items breaches the list view threshold. Page lightly,
|
||||||
|
// then second-pass load File.Length + Versions[*].Size so per-type
|
||||||
|
// totals include version bytes (matches per-library totals).
|
||||||
var query = new CamlQuery
|
var query = new CamlQuery
|
||||||
{
|
{
|
||||||
ViewXml = @"<View Scope='RecursiveAll'>
|
ViewXml = @"<View Scope='RecursiveAll'>
|
||||||
@@ -321,9 +407,8 @@ public class StorageService : IStorageService
|
|||||||
<ViewFields>
|
<ViewFields>
|
||||||
<FieldRef Name='FSObjType' />
|
<FieldRef Name='FSObjType' />
|
||||||
<FieldRef Name='FileLeafRef' />
|
<FieldRef Name='FileLeafRef' />
|
||||||
<FieldRef Name='File_x0020_Size' />
|
|
||||||
</ViewFields>
|
</ViewFields>
|
||||||
<RowLimit Paged='TRUE'>5000</RowLimit>
|
<RowLimit Paged='TRUE'>500</RowLimit>
|
||||||
</View>"
|
</View>"
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -335,21 +420,40 @@ public class StorageService : IStorageService
|
|||||||
ctx.Load(items, ic => ic.ListItemCollectionPosition,
|
ctx.Load(items, ic => ic.ListItemCollectionPosition,
|
||||||
ic => ic.Include(
|
ic => ic.Include(
|
||||||
i => i["FSObjType"],
|
i => i["FSObjType"],
|
||||||
i => i["FileLeafRef"],
|
i => i["FileLeafRef"]));
|
||||||
i => i["File_x0020_Size"]));
|
|
||||||
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
||||||
|
|
||||||
|
var fileRows = new List<(ListItem Item, string Name)>();
|
||||||
foreach (var item in items)
|
foreach (var item in items)
|
||||||
{
|
{
|
||||||
if (item["FSObjType"]?.ToString() != "0") continue;
|
if (item["FSObjType"]?.ToString() != "0") continue;
|
||||||
|
|
||||||
string fileName = item["FileLeafRef"]?.ToString() ?? string.Empty;
|
string fileName = item["FileLeafRef"]?.ToString() ?? string.Empty;
|
||||||
string sizeStr = item["File_x0020_Size"]?.ToString() ?? "0";
|
fileRows.Add((item, fileName));
|
||||||
|
ctx.Load(item.File, f => f.Length);
|
||||||
|
ctx.Load(item.File.Versions, vc => vc.Include(v => v.Size));
|
||||||
|
}
|
||||||
|
|
||||||
if (!long.TryParse(sizeStr, out long fileSize))
|
if (fileRows.Count > 0)
|
||||||
fileSize = 0;
|
{
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
||||||
|
}
|
||||||
|
|
||||||
string ext = Path.GetExtension(fileName).ToLowerInvariant();
|
foreach (var row in fileRows)
|
||||||
|
{
|
||||||
|
long current;
|
||||||
|
try { current = row.Item.File.Length; }
|
||||||
|
catch { continue; }
|
||||||
|
|
||||||
|
long versions = 0;
|
||||||
|
try
|
||||||
|
{
|
||||||
|
foreach (var v in row.Item.File.Versions)
|
||||||
|
versions += v.Size;
|
||||||
|
}
|
||||||
|
catch { /* no version history */ }
|
||||||
|
|
||||||
|
long fileSize = current + versions;
|
||||||
|
string ext = Path.GetExtension(row.Name).ToLowerInvariant();
|
||||||
|
|
||||||
if (extensionMap.TryGetValue(ext, out var existing))
|
if (extensionMap.TryGetValue(ext, out var existing))
|
||||||
extensionMap[ext] = (existing.totalSize + fileSize, existing.count + 1);
|
extensionMap[ext] = (existing.totalSize + fileSize, existing.count + 1);
|
||||||
@@ -368,54 +472,33 @@ public class StorageService : IStorageService
|
|||||||
.ToList();
|
.ToList();
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task BackfillZeroNodesAsync(
|
/// <summary>
|
||||||
|
/// Per-library backfill executed inline by CollectForWebAsync when CSOM's
|
||||||
|
/// Folder.StorageMetrics returns zero counts. Enumerates every file via
|
||||||
|
/// CamlQuery and explicitly loads File.Length + File.Versions.Size so
|
||||||
|
/// version bytes are summed accurately — matches what storman.aspx reports.
|
||||||
|
/// </summary>
|
||||||
|
private static async Task BackfillLibFromFilesAsync(
|
||||||
ClientContext ctx,
|
ClientContext ctx,
|
||||||
IReadOnlyList<StorageNode> nodes,
|
List lib,
|
||||||
|
StorageNode libNode,
|
||||||
IProgress<OperationProgress> progress,
|
IProgress<OperationProgress> progress,
|
||||||
CancellationToken ct)
|
CancellationToken ct)
|
||||||
{
|
{
|
||||||
// Only backfill nodes scanned through CSOM document-library StorageMetrics —
|
progress.Report(OperationProgress.Indeterminate(
|
||||||
// synthetic categories (recycle bin, list attachments, subsite headers)
|
$"Counting files: {libNode.Name}..."));
|
||||||
// cannot be re-derived from File_x0020_Size.
|
|
||||||
var libNodes = nodes.Where(n => n.IndentLevel == 0 &&
|
|
||||||
(n.Kind == StorageNodeKind.Library ||
|
|
||||||
n.Kind == StorageNodeKind.HiddenLibrary ||
|
|
||||||
n.Kind == StorageNodeKind.PreservationHold)).ToList();
|
|
||||||
var needsBackfill = libNodes.Where(lib =>
|
|
||||||
lib.TotalFileCount == 0 || HasZeroChild(lib)).ToList();
|
|
||||||
if (needsBackfill.Count == 0) return;
|
|
||||||
|
|
||||||
ctx.Load(ctx.Web, w => w.ServerRelativeUrl,
|
string libRootSrl = NormalizeServerRelative(lib.RootFolder.ServerRelativeUrl);
|
||||||
w => w.Lists.Include(
|
|
||||||
l => l.Title, l => l.Hidden, l => l.BaseType,
|
|
||||||
l => l.RootFolder.ServerRelativeUrl));
|
|
||||||
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
|
||||||
|
|
||||||
var libs = ctx.Web.Lists
|
|
||||||
.Where(l => l.BaseType == BaseType.DocumentLibrary)
|
|
||||||
.ToDictionary(l => l.Title, StringComparer.OrdinalIgnoreCase);
|
|
||||||
|
|
||||||
int idx = 0;
|
|
||||||
foreach (var libNode in needsBackfill)
|
|
||||||
{
|
|
||||||
ct.ThrowIfCancellationRequested();
|
|
||||||
idx++;
|
|
||||||
|
|
||||||
if (!libs.TryGetValue(libNode.Library, out var lib)) continue;
|
|
||||||
|
|
||||||
progress.Report(new OperationProgress(idx, needsBackfill.Count,
|
|
||||||
$"Counting files: {libNode.Name} ({idx}/{needsBackfill.Count})"));
|
|
||||||
|
|
||||||
string libRootSrl = lib.RootFolder.ServerRelativeUrl.TrimEnd('/');
|
|
||||||
|
|
||||||
var folderLookup = new Dictionary<string, StorageNode>(StringComparer.OrdinalIgnoreCase);
|
var folderLookup = new Dictionary<string, StorageNode>(StringComparer.OrdinalIgnoreCase);
|
||||||
BuildFolderLookup(libNode, libRootSrl, folderLookup);
|
BuildFolderLookup(libNode, libRootSrl, folderLookup);
|
||||||
|
|
||||||
var originalTotals = new Dictionary<StorageNode, long>();
|
// No <Where> clause: filtering on FSObjType (non-indexed) on a list
|
||||||
CaptureTotals(libNode, originalTotals);
|
// beyond the 5000-item view threshold throws "The attempted operation
|
||||||
|
// is prohibited because it exceeds the list view threshold". Paged
|
||||||
ResetNodeCounts(libNode);
|
// retrieval without Where is unaffected by the threshold; we filter
|
||||||
|
// out folders client-side and skip File.Length access for them.
|
||||||
|
// Smaller page size because each row carries the full Versions collection.
|
||||||
var query = new CamlQuery
|
var query = new CamlQuery
|
||||||
{
|
{
|
||||||
ViewXml = @"<View Scope='RecursiveAll'>
|
ViewXml = @"<View Scope='RecursiveAll'>
|
||||||
@@ -423,11 +506,8 @@ public class StorageService : IStorageService
|
|||||||
<ViewFields>
|
<ViewFields>
|
||||||
<FieldRef Name='FSObjType' />
|
<FieldRef Name='FSObjType' />
|
||||||
<FieldRef Name='FileDirRef' />
|
<FieldRef Name='FileDirRef' />
|
||||||
<FieldRef Name='File_x0020_Size' />
|
|
||||||
<FieldRef Name='SMTotalSize' />
|
|
||||||
<FieldRef Name='SMTotalFileStreamSize' />
|
|
||||||
</ViewFields>
|
</ViewFields>
|
||||||
<RowLimit Paged='TRUE'>5000</RowLimit>
|
<RowLimit Paged='TRUE'>500</RowLimit>
|
||||||
</View>"
|
</View>"
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -439,50 +519,98 @@ public class StorageService : IStorageService
|
|||||||
ctx.Load(items, ic => ic.ListItemCollectionPosition,
|
ctx.Load(items, ic => ic.ListItemCollectionPosition,
|
||||||
ic => ic.Include(
|
ic => ic.Include(
|
||||||
i => i["FSObjType"],
|
i => i["FSObjType"],
|
||||||
i => i["FileDirRef"],
|
i => i["FileDirRef"]));
|
||||||
i => i["File_x0020_Size"],
|
|
||||||
i => i["SMTotalSize"],
|
|
||||||
i => i["SMTotalFileStreamSize"]));
|
|
||||||
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
||||||
|
|
||||||
|
// Second pass: queue File.Length + File.Versions[*].Size only for
|
||||||
|
// file rows. Including these in the page 1 query throws a
|
||||||
|
// ServerObjectNullReferenceException on folder rows (item.File is
|
||||||
|
// null for folders). Filtering FSObjType client-side here keeps
|
||||||
|
// per-page round-trips at two regardless of file count.
|
||||||
|
var fileRows = new List<(ListItem Item, string DirRef)>();
|
||||||
foreach (var item in items)
|
foreach (var item in items)
|
||||||
{
|
{
|
||||||
if (item["FSObjType"]?.ToString() != "0") continue;
|
if (item["FSObjType"]?.ToString() != "0") continue;
|
||||||
|
var dirRef = item["FileDirRef"]?.ToString() ?? string.Empty;
|
||||||
long streamSize = ParseLong(item["File_x0020_Size"]);
|
fileRows.Add((item, dirRef));
|
||||||
long smStream = ParseLong(SafeGet(item, "SMTotalFileStreamSize"));
|
ctx.Load(item.File, f => f.Length);
|
||||||
long smTotal = ParseLong(SafeGet(item, "SMTotalSize"));
|
ctx.Load(item.File.Versions, vc => vc.Include(v => v.Size));
|
||||||
|
|
||||||
if (smStream > 0) streamSize = smStream;
|
|
||||||
long totalSize = smTotal > 0 ? smTotal : streamSize;
|
|
||||||
|
|
||||||
string fileDirRef = item["FileDirRef"]?.ToString() ?? "";
|
|
||||||
|
|
||||||
libNode.TotalSizeBytes += totalSize;
|
|
||||||
libNode.FileStreamSizeBytes += streamSize;
|
|
||||||
libNode.TotalFileCount++;
|
|
||||||
|
|
||||||
var matchedFolder = FindDeepestFolder(fileDirRef, folderLookup);
|
|
||||||
if (matchedFolder != null && matchedFolder != libNode)
|
|
||||||
{
|
|
||||||
matchedFolder.TotalSizeBytes += totalSize;
|
|
||||||
matchedFolder.FileStreamSizeBytes += streamSize;
|
|
||||||
matchedFolder.TotalFileCount++;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (fileRows.Count > 0)
|
||||||
|
{
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, progress, ct);
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach (var row in fileRows)
|
||||||
|
{
|
||||||
|
long current;
|
||||||
|
try { current = row.Item.File.Length; }
|
||||||
|
catch { continue; }
|
||||||
|
|
||||||
|
long versions = 0;
|
||||||
|
try
|
||||||
|
{
|
||||||
|
foreach (var v in row.Item.File.Versions)
|
||||||
|
versions += v.Size;
|
||||||
|
}
|
||||||
|
catch
|
||||||
|
{
|
||||||
|
// Versioning disabled / no version history — leave at 0.
|
||||||
|
}
|
||||||
|
|
||||||
|
long totalSize = current + versions;
|
||||||
|
|
||||||
|
// Attribute each file to its deepest matching folder only.
|
||||||
|
// Parent rollup happens once after all pages are processed,
|
||||||
|
// adding direct + descendants — matches storman's per-folder
|
||||||
|
// total. Fall back to libNode for files at lib root or in
|
||||||
|
// folders excluded from the tree (Forms, _-prefixed system
|
||||||
|
// folders, depth-limited subfolders).
|
||||||
|
var target = FindDeepestFolder(row.DirRef, folderLookup) ?? libNode;
|
||||||
|
target.TotalSizeBytes += totalSize;
|
||||||
|
target.FileStreamSizeBytes += current;
|
||||||
|
target.TotalFileCount++;
|
||||||
}
|
}
|
||||||
|
|
||||||
query.ListItemCollectionPosition = items.ListItemCollectionPosition;
|
query.ListItemCollectionPosition = items.ListItemCollectionPosition;
|
||||||
}
|
}
|
||||||
while (items.ListItemCollectionPosition != null);
|
while (items.ListItemCollectionPosition != null);
|
||||||
|
|
||||||
foreach (var kv in originalTotals)
|
// Post-pass rollup: each folder's totals become own-direct + sum of
|
||||||
|
// descendants. libNode ends up as total of every file in the tree.
|
||||||
|
RollupFolderTotals(libNode);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Recursively rolls up direct-file totals into ancestor folders so each
|
||||||
|
/// node's reported size includes everything beneath it. Pre-condition: each
|
||||||
|
/// node holds only its directly-attributed files (no descendant amounts).
|
||||||
|
/// </summary>
|
||||||
|
private static void RollupFolderTotals(StorageNode node)
|
||||||
{
|
{
|
||||||
if (kv.Value > kv.Key.TotalSizeBytes)
|
foreach (var child in node.Children)
|
||||||
kv.Key.TotalSizeBytes = kv.Value;
|
{
|
||||||
}
|
RollupFolderTotals(child);
|
||||||
|
node.TotalSizeBytes += child.TotalSizeBytes;
|
||||||
|
node.FileStreamSizeBytes += child.FileStreamSizeBytes;
|
||||||
|
node.TotalFileCount += child.TotalFileCount;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// No-op retained for interface compatibility. Backfill now runs inline
|
||||||
|
/// inside <see cref="CollectStorageAsync"/> via BackfillLibFromFilesAsync,
|
||||||
|
/// which has access to the CSOM library reference and runs before bin
|
||||||
|
/// distribution so the count==0 trigger is not polluted by bin items.
|
||||||
|
/// </summary>
|
||||||
|
public Task BackfillZeroNodesAsync(
|
||||||
|
ClientContext ctx,
|
||||||
|
IReadOnlyList<StorageNode> nodes,
|
||||||
|
IProgress<OperationProgress> progress,
|
||||||
|
CancellationToken ct)
|
||||||
|
=> Task.CompletedTask;
|
||||||
|
|
||||||
public async Task<long> GetSiteUsageStorageBytesAsync(
|
public async Task<long> GetSiteUsageStorageBytesAsync(
|
||||||
ClientContext ctx,
|
ClientContext ctx,
|
||||||
IProgress<OperationProgress> progress,
|
IProgress<OperationProgress> progress,
|
||||||
@@ -500,35 +628,6 @@ public class StorageService : IStorageService
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static long ParseLong(object? value)
|
|
||||||
{
|
|
||||||
if (value == null) return 0;
|
|
||||||
return long.TryParse(value.ToString(), out long n) ? n : 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static object? SafeGet(ListItem item, string fieldName)
|
|
||||||
{
|
|
||||||
try { return item[fieldName]; }
|
|
||||||
catch { return null; }
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void CaptureTotals(StorageNode node, Dictionary<StorageNode, long> map)
|
|
||||||
{
|
|
||||||
map[node] = node.TotalSizeBytes;
|
|
||||||
foreach (var child in node.Children)
|
|
||||||
CaptureTotals(child, map);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static bool HasZeroChild(StorageNode node)
|
|
||||||
{
|
|
||||||
foreach (var child in node.Children)
|
|
||||||
{
|
|
||||||
if (child.TotalFileCount == 0) return true;
|
|
||||||
if (HasZeroChild(child)) return true;
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void ResetNodeCounts(StorageNode node)
|
private static void ResetNodeCounts(StorageNode node)
|
||||||
{
|
{
|
||||||
node.TotalSizeBytes = 0;
|
node.TotalSizeBytes = 0;
|
||||||
|
|||||||
@@ -0,0 +1,205 @@
|
|||||||
|
using Microsoft.SharePoint.Client;
|
||||||
|
using Microsoft.SharePoint.Client.Search.Query;
|
||||||
|
using Serilog;
|
||||||
|
using SharepointToolbox.Core.Helpers;
|
||||||
|
using SharepointToolbox.Core.Models;
|
||||||
|
|
||||||
|
namespace SharepointToolbox.Services;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// CSOM-backed resolver that converts the GUID/identifier embedded in a SharePoint
|
||||||
|
/// system group name into a clickable target. Results are cached per
|
||||||
|
/// (site URL, guid) to avoid repeated round-trips when the same Limited Access
|
||||||
|
/// system group recurs on many objects.
|
||||||
|
///
|
||||||
|
/// Never throws — on any failure (not found, access denied, claims error), returns
|
||||||
|
/// <c>null</c> and the caller renders the raw group name.
|
||||||
|
/// </summary>
|
||||||
|
public class SystemGroupTargetResolver : ISystemGroupTargetResolver
|
||||||
|
{
|
||||||
|
private readonly Dictionary<string, SystemGroupTarget?> _cache =
|
||||||
|
new(StringComparer.OrdinalIgnoreCase);
|
||||||
|
|
||||||
|
public async Task<SystemGroupTarget?> ResolveAsync(
|
||||||
|
ClientContext ctx,
|
||||||
|
SystemGroupClassification classification,
|
||||||
|
CancellationToken ct)
|
||||||
|
{
|
||||||
|
ct.ThrowIfCancellationRequested();
|
||||||
|
|
||||||
|
var key = BuildCacheKey(ctx.Url, classification);
|
||||||
|
if (key is not null && _cache.TryGetValue(key, out var cached))
|
||||||
|
return cached;
|
||||||
|
|
||||||
|
SystemGroupTarget? result = null;
|
||||||
|
try
|
||||||
|
{
|
||||||
|
result = classification.Kind switch
|
||||||
|
{
|
||||||
|
SystemGroupKind.LimitedAccessWeb => await ResolveWebAsync(ctx, classification.WebId!.Value, ct),
|
||||||
|
SystemGroupKind.LimitedAccessList => await ResolveListAsync(ctx, classification.ListId!.Value, ct),
|
||||||
|
SystemGroupKind.SharingLink => await ResolveItemAsync(ctx, classification.ItemUniqueId!.Value, classification.LinkType, ct),
|
||||||
|
_ => null
|
||||||
|
};
|
||||||
|
}
|
||||||
|
catch (Exception ex)
|
||||||
|
{
|
||||||
|
Log.Debug("System group target resolution failed for {Kind} on {Site}: {Error}",
|
||||||
|
classification.Kind, ctx.Url, ex.Message);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (key is not null)
|
||||||
|
_cache[key] = result;
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static string? BuildCacheKey(string siteUrl, SystemGroupClassification c) => c.Kind switch
|
||||||
|
{
|
||||||
|
SystemGroupKind.LimitedAccessWeb => $"{siteUrl}|web|{c.WebId}",
|
||||||
|
SystemGroupKind.LimitedAccessList => $"{siteUrl}|list|{c.ListId}",
|
||||||
|
SystemGroupKind.SharingLink => $"{siteUrl}|item|{c.ItemUniqueId}",
|
||||||
|
_ => null
|
||||||
|
};
|
||||||
|
|
||||||
|
private static async Task<SystemGroupTarget?> ResolveWebAsync(
|
||||||
|
ClientContext ctx, Guid webId, CancellationToken ct)
|
||||||
|
{
|
||||||
|
var web = ctx.Site.OpenWebById(webId);
|
||||||
|
ctx.Load(web, w => w.Title, w => w.Url);
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, null, ct);
|
||||||
|
return new SystemGroupTarget(SystemGroupKind.LimitedAccessWeb, web.Title, web.Url);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static async Task<SystemGroupTarget?> ResolveListAsync(
|
||||||
|
ClientContext ctx, Guid listId, CancellationToken ct)
|
||||||
|
{
|
||||||
|
var list = ctx.Web.Lists.GetById(listId);
|
||||||
|
ctx.Load(list, l => l.Title, l => l.DefaultViewUrl);
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, null, ct);
|
||||||
|
|
||||||
|
var url = BuildAbsoluteUrl(ctx.Url, list.DefaultViewUrl);
|
||||||
|
return new SystemGroupTarget(SystemGroupKind.LimitedAccessList, list.Title, url);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static async Task<SystemGroupTarget?> ResolveItemAsync(
|
||||||
|
ClientContext ctx, Guid itemUniqueId, string? linkType, CancellationToken ct)
|
||||||
|
{
|
||||||
|
// 1. Try as file on current web (most sharing links target files).
|
||||||
|
try
|
||||||
|
{
|
||||||
|
var file = ctx.Web.GetFileById(itemUniqueId);
|
||||||
|
ctx.Load(file, f => f.Name, f => f.ServerRelativeUrl, f => f.Exists);
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, null, ct);
|
||||||
|
|
||||||
|
if (file.Exists)
|
||||||
|
{
|
||||||
|
var url = BuildAbsoluteUrl(ctx.Url, file.ServerRelativeUrl);
|
||||||
|
return new SystemGroupTarget(SystemGroupKind.SharingLink, file.Name, url, linkType);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
catch (ServerException) { /* fall through */ }
|
||||||
|
|
||||||
|
// 2. Try as folder on current web.
|
||||||
|
try
|
||||||
|
{
|
||||||
|
var folder = ctx.Web.GetFolderById(itemUniqueId);
|
||||||
|
ctx.Load(folder, f => f.Name, f => f.ServerRelativeUrl);
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, null, ct);
|
||||||
|
|
||||||
|
var url = BuildAbsoluteUrl(ctx.Url, folder.ServerRelativeUrl);
|
||||||
|
return new SystemGroupTarget(SystemGroupKind.SharingLink, folder.Name, url, linkType);
|
||||||
|
}
|
||||||
|
catch (ServerException) { /* fall through */ }
|
||||||
|
|
||||||
|
// 3. Search-index fallback — covers items moved to a different subsite or
|
||||||
|
// deleted recently (the index may lag the deletion by minutes/hours).
|
||||||
|
// Search is permission-trimmed, so this only returns hits the caller
|
||||||
|
// can still see; results carry a "(via index)" hint in the label.
|
||||||
|
return await TryResolveViaSearchAsync(ctx, itemUniqueId, linkType, ct);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Queries the SharePoint search index for an item by its UniqueId. Returns
|
||||||
|
/// a target with the last-indexed path and a label prefix flagging that the
|
||||||
|
/// hit came from the index (so admins know the live lookup failed).
|
||||||
|
/// </summary>
|
||||||
|
private static async Task<SystemGroupTarget?> TryResolveViaSearchAsync(
|
||||||
|
ClientContext ctx, Guid itemUniqueId, string? linkType, CancellationToken ct)
|
||||||
|
{
|
||||||
|
ct.ThrowIfCancellationRequested();
|
||||||
|
try
|
||||||
|
{
|
||||||
|
// KQL: UniqueId managed property. Braces around the GUID are how the
|
||||||
|
// SP search engine matches the canonical form for content unique ids.
|
||||||
|
var kq = new KeywordQuery(ctx)
|
||||||
|
{
|
||||||
|
QueryText = $"UniqueId:{{{itemUniqueId}}}",
|
||||||
|
RowLimit = 1,
|
||||||
|
TrimDuplicates = false
|
||||||
|
};
|
||||||
|
kq.SelectProperties.Add("Path");
|
||||||
|
kq.SelectProperties.Add("Title");
|
||||||
|
kq.SelectProperties.Add("FileExtension");
|
||||||
|
|
||||||
|
var executor = new SearchExecutor(ctx);
|
||||||
|
var result = executor.ExecuteQuery(kq);
|
||||||
|
await ExecuteQueryRetryHelper.ExecuteQueryRetryAsync(ctx, null, ct);
|
||||||
|
|
||||||
|
var table = result.Value
|
||||||
|
.FirstOrDefault(t => t.TableType == KnownTableTypes.RelevantResults);
|
||||||
|
if (table is null || table.RowCount == 0)
|
||||||
|
return null;
|
||||||
|
|
||||||
|
var row = ToDict(table.ResultRows.First());
|
||||||
|
var path = row.TryGetValue("Path", out var p) ? p?.ToString() : null;
|
||||||
|
var title = row.TryGetValue("Title", out var t) ? t?.ToString() : null;
|
||||||
|
|
||||||
|
if (string.IsNullOrEmpty(path))
|
||||||
|
return null;
|
||||||
|
|
||||||
|
// Derive a leaf name if Title is empty (folders often have no Title).
|
||||||
|
var leaf = !string.IsNullOrWhiteSpace(title)
|
||||||
|
? title!
|
||||||
|
: Uri.UnescapeDataString(path.TrimEnd('/').Split('/').Last());
|
||||||
|
|
||||||
|
return new SystemGroupTarget(
|
||||||
|
SystemGroupKind.SharingLink,
|
||||||
|
$"{leaf} (via index)",
|
||||||
|
path,
|
||||||
|
linkType);
|
||||||
|
}
|
||||||
|
catch (Exception ex)
|
||||||
|
{
|
||||||
|
Log.Debug("UniqueId search fallback failed for {Item} on {Site}: {Error}",
|
||||||
|
itemUniqueId, ctx.Url, ex.Message);
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// CSOM SearchExecutor returns ResultRows as either generic Dictionary or legacy
|
||||||
|
/// IDictionary depending on CSOM version — normalise to a single shape.
|
||||||
|
/// </summary>
|
||||||
|
private static IDictionary<string, object> ToDict(object rawRow)
|
||||||
|
{
|
||||||
|
if (rawRow is IDictionary<string, object> generic)
|
||||||
|
return generic;
|
||||||
|
var dict = new Dictionary<string, object>();
|
||||||
|
if (rawRow is System.Collections.IDictionary legacy)
|
||||||
|
{
|
||||||
|
foreach (System.Collections.DictionaryEntry e in legacy)
|
||||||
|
dict[e.Key.ToString()!] = e.Value ?? string.Empty;
|
||||||
|
}
|
||||||
|
return dict;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static string BuildAbsoluteUrl(string contextUrl, string? serverRelative)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrEmpty(serverRelative))
|
||||||
|
return contextUrl;
|
||||||
|
if (Uri.TryCreate(serverRelative, UriKind.Absolute, out _))
|
||||||
|
return serverRelative;
|
||||||
|
var uri = new Uri(contextUrl);
|
||||||
|
return $"{uri.Scheme}://{uri.Host}{serverRelative}";
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -136,7 +136,10 @@ public class UserAccessAuditService : IUserAccessAuditService
|
|||||||
AccessType: accessType,
|
AccessType: accessType,
|
||||||
GrantedThrough: entry.GrantedThrough,
|
GrantedThrough: entry.GrantedThrough,
|
||||||
IsHighPrivilege: HighPrivilegeLevels.Contains(trimmedLevel),
|
IsHighPrivilege: HighPrivilegeLevels.Contains(trimmedLevel),
|
||||||
IsExternalUser: PermissionEntryHelper.IsExternalUser(login));
|
IsExternalUser: PermissionEntryHelper.IsExternalUser(login),
|
||||||
|
TargetUrl: entry.TargetUrl,
|
||||||
|
TargetLabel: entry.TargetLabel,
|
||||||
|
SharingLinkType: entry.SharingLinkType);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -54,6 +54,14 @@
|
|||||||
<PackageReference Include="LiveChartsCore.SkiaSharpView.WPF" Version="2.0.0-rc5.4" />
|
<PackageReference Include="LiveChartsCore.SkiaSharpView.WPF" Version="2.0.0-rc5.4" />
|
||||||
<PackageReference Include="Microsoft.Extensions.Hosting" Version="10.0.0" />
|
<PackageReference Include="Microsoft.Extensions.Hosting" Version="10.0.0" />
|
||||||
<PackageReference Include="Microsoft.Graph" Version="5.74.0" />
|
<PackageReference Include="Microsoft.Graph" Version="5.74.0" />
|
||||||
|
<!-- Override Kiota transitive deps to patch GHSA-7j59-v9qr-6fq9 (NU1903 in <1.20.0) -->
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Abstractions" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Authentication.Azure" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Http.HttpClientLibrary" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Serialization.Form" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Serialization.Json" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Serialization.Multipart" Version="1.22.2" />
|
||||||
|
<PackageReference Include="Microsoft.Kiota.Serialization.Text" Version="1.22.2" />
|
||||||
<PackageReference Include="Microsoft.Identity.Client" Version="4.83.3" />
|
<PackageReference Include="Microsoft.Identity.Client" Version="4.83.3" />
|
||||||
<PackageReference Include="Microsoft.Identity.Client.Broker" Version="4.82.1" />
|
<PackageReference Include="Microsoft.Identity.Client.Broker" Version="4.82.1" />
|
||||||
<PackageReference Include="Microsoft.Identity.Client.Extensions.Msal" Version="4.83.3" />
|
<PackageReference Include="Microsoft.Identity.Client.Extensions.Msal" Version="4.83.3" />
|
||||||
|
|||||||
@@ -45,6 +45,15 @@ public partial class PermissionsViewModel : FeatureViewModelBase
|
|||||||
[ObservableProperty]
|
[ObservableProperty]
|
||||||
private bool _mergePermissions;
|
private bool _mergePermissions;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// When true, the HTML report hides the raw "SharePoint Group: SharingLinks.{guid}…"
|
||||||
|
/// / "Limited Access System Group For Web|List {guid}" text for rows where the
|
||||||
|
/// system-group target was resolved — only the link-type badge and target link are shown.
|
||||||
|
/// Rows whose target could not be resolved still display the raw name as a fallback.
|
||||||
|
/// </summary>
|
||||||
|
[ObservableProperty]
|
||||||
|
private bool _hideSystemGroupRaw = true;
|
||||||
|
|
||||||
[ObservableProperty]
|
[ObservableProperty]
|
||||||
private bool _includeSubsites;
|
private bool _includeSubsites;
|
||||||
|
|
||||||
@@ -498,9 +507,9 @@ public partial class PermissionsViewModel : FeatureViewModelBase
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (IsSimplifiedMode && SimplifiedResults.Count > 0)
|
if (IsSimplifiedMode && SimplifiedResults.Count > 0)
|
||||||
await _htmlExportService.WriteAsync(SimplifiedResults.ToList(), dialog.FileName, CurrentSplit, CurrentLayout, CancellationToken.None, branding, groupMembers);
|
await _htmlExportService.WriteAsync(SimplifiedResults.ToList(), dialog.FileName, CurrentSplit, CurrentLayout, CancellationToken.None, branding, groupMembers, HideSystemGroupRaw);
|
||||||
else
|
else
|
||||||
await _htmlExportService.WriteAsync((IReadOnlyList<PermissionEntry>)Results, dialog.FileName, CurrentSplit, CurrentLayout, CancellationToken.None, branding, groupMembers);
|
await _htmlExportService.WriteAsync((IReadOnlyList<PermissionEntry>)Results, dialog.FileName, CurrentSplit, CurrentLayout, CancellationToken.None, branding, groupMembers, HideSystemGroupRaw);
|
||||||
OpenFile(dialog.FileName);
|
OpenFile(dialog.FileName);
|
||||||
}
|
}
|
||||||
catch (Exception ex)
|
catch (Exception ex)
|
||||||
|
|||||||
@@ -163,15 +163,27 @@ public partial class StorageViewModel : FeatureViewModelBase
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ── Summary properties (computed from root-level library nodes) ─────────
|
// ── Summary properties (computed from root-level library nodes) ─────────
|
||||||
|
//
|
||||||
|
// Recycle-bin contents are rolled into each library's TotalSizeBytes by the
|
||||||
|
// StorageService (matches storman.aspx). Including the synthetic root-level
|
||||||
|
// RecycleBin nodes here would double-count those bytes — filter them out.
|
||||||
|
// SummaryRecycleBinSize below still reads from _allNodes so the bin metric
|
||||||
|
// remains visible to the user.
|
||||||
|
|
||||||
/// <summary>Sum of TotalSizeBytes across root-level library nodes.</summary>
|
/// <summary>Sum of TotalSizeBytes across root-level non-bin nodes.</summary>
|
||||||
public long SummaryTotalSize => Results.Where(n => n.IndentLevel == 0).Sum(n => n.TotalSizeBytes);
|
public long SummaryTotalSize => Results
|
||||||
|
.Where(n => n.IndentLevel == 0 && n.Kind != StorageNodeKind.RecycleBin)
|
||||||
|
.Sum(n => n.TotalSizeBytes);
|
||||||
|
|
||||||
/// <summary>Sum of VersionSizeBytes across root-level library nodes.</summary>
|
/// <summary>Sum of VersionSizeBytes across root-level non-bin nodes.</summary>
|
||||||
public long SummaryVersionSize => Results.Where(n => n.IndentLevel == 0).Sum(n => n.VersionSizeBytes);
|
public long SummaryVersionSize => Results
|
||||||
|
.Where(n => n.IndentLevel == 0 && n.Kind != StorageNodeKind.RecycleBin)
|
||||||
|
.Sum(n => n.VersionSizeBytes);
|
||||||
|
|
||||||
/// <summary>Sum of TotalFileCount across root-level library nodes.</summary>
|
/// <summary>Sum of TotalFileCount across root-level non-bin nodes.</summary>
|
||||||
public long SummaryFileCount => Results.Where(n => n.IndentLevel == 0).Sum(n => n.TotalFileCount);
|
public long SummaryFileCount => Results
|
||||||
|
.Where(n => n.IndentLevel == 0 && n.Kind != StorageNodeKind.RecycleBin)
|
||||||
|
.Sum(n => n.TotalFileCount);
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Aggregate recycle-bin size (stage 1 + stage 2 across all sites). Reads
|
/// Aggregate recycle-bin size (stage 1 + stage 2 across all sites). Reads
|
||||||
|
|||||||
@@ -91,7 +91,9 @@
|
|||||||
DockPanel.Dock="Top" Margin="0,0,0,8" Padding="8">
|
DockPanel.Dock="Top" Margin="0,0,0,8" Padding="8">
|
||||||
<StackPanel>
|
<StackPanel>
|
||||||
<CheckBox Content="{Binding Source={x:Static loc:TranslationSource.Instance}, Path=[chk.merge.permissions]}"
|
<CheckBox Content="{Binding Source={x:Static loc:TranslationSource.Instance}, Path=[chk.merge.permissions]}"
|
||||||
IsChecked="{Binding MergePermissions}" />
|
IsChecked="{Binding MergePermissions}" Margin="0,0,0,4" />
|
||||||
|
<CheckBox Content="{Binding Source={x:Static loc:TranslationSource.Instance}, Path=[chk.hide.system.group.raw]}"
|
||||||
|
IsChecked="{Binding HideSystemGroupRaw}" />
|
||||||
</StackPanel>
|
</StackPanel>
|
||||||
</GroupBox>
|
</GroupBox>
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user