umami/lib/auth.ts

213 lines
4.7 KiB
TypeScript
Raw Normal View History

import { Report } from '@prisma/client';
2023-04-05 06:29:54 +00:00
import redis from '@umami/redis-client';
import debug from 'debug';
import { PERMISSIONS, ROLE_PERMISSIONS, SHARE_TOKEN_HEADER } from 'lib/constants';
2023-07-30 05:54:46 +00:00
import { secret } from 'lib/crypto';
import { createSecureToken, ensureArray, getRandomChars, parseToken } from 'next-basics';
2023-07-30 05:03:34 +00:00
import { getTeamUser, getTeamWebsite, findTeamWebsiteByUserId } from 'queries';
2023-07-26 06:59:08 +00:00
import { loadWebsite } from './load';
import { Auth } from './types';
2020-07-28 06:52:14 +00:00
2022-10-31 18:02:37 +00:00
const log = debug('umami:auth');
2023-04-05 06:29:54 +00:00
export async function setAuthKey(user, expire = 0) {
const authKey = `auth:${getRandomChars(32)}`;
await redis.set(authKey, user);
if (expire) {
await redis.expire(authKey, expire);
}
return createSecureToken({ authKey }, secret());
}
export function getAuthToken(req) {
2022-11-11 17:42:54 +00:00
try {
return req.headers.authorization.split(' ')[1];
} catch {
return null;
}
}
2022-10-31 18:02:37 +00:00
export function parseShareToken(req) {
2022-10-12 04:48:33 +00:00
try {
2022-10-25 02:48:10 +00:00
return parseToken(req.headers[SHARE_TOKEN_HEADER], secret());
2022-10-31 18:02:37 +00:00
} catch (e) {
log(e);
2022-10-12 04:48:33 +00:00
return null;
}
}
export async function canViewWebsite({ user, shareToken }: Auth, websiteId: string) {
if (user?.isAdmin) {
return true;
}
if (shareToken?.websiteId === websiteId) {
return true;
}
2023-04-02 00:38:35 +00:00
const website = await loadWebsite(websiteId);
2023-07-30 05:54:46 +00:00
if (user.id === website?.userId) {
2023-07-30 05:37:28 +00:00
return true;
2022-10-12 20:11:44 +00:00
}
2023-07-30 05:03:34 +00:00
return !!(await findTeamWebsiteByUserId(websiteId, user.id));
}
2022-11-20 08:48:13 +00:00
export async function canCreateWebsite({ user }: Auth) {
if (user.isAdmin) {
return true;
}
return hasPermission(user.role, PERMISSIONS.websiteCreate);
}
export async function canUpdateWebsite({ user }: Auth, websiteId: string) {
if (user.isAdmin) {
return true;
}
2023-04-02 00:38:35 +00:00
const website = await loadWebsite(websiteId);
2022-11-20 08:48:13 +00:00
2023-07-30 05:54:46 +00:00
return user.id === website?.userId;
2022-11-20 08:48:13 +00:00
}
export async function canDeleteWebsite({ user }: Auth, websiteId: string) {
if (user.isAdmin) {
return true;
}
2023-04-02 00:38:35 +00:00
const website = await loadWebsite(websiteId);
2023-07-30 05:54:46 +00:00
return user.id === website?.userId;
}
export async function canViewReport(auth: Auth, report: Report) {
2023-05-18 20:13:18 +00:00
if (auth.user.isAdmin) {
return true;
}
2023-07-30 05:03:34 +00:00
if (auth.user.id == report.userId) {
2023-05-18 20:13:18 +00:00
return true;
}
2023-07-30 05:03:34 +00:00
return !!(await canViewWebsite(auth, report.websiteId));
2023-05-18 20:13:18 +00:00
}
2023-07-30 05:54:46 +00:00
export async function canUpdateReport({ user }: Auth, report: Report) {
if (user.isAdmin) {
2023-05-18 20:13:18 +00:00
return true;
}
2023-07-30 05:54:46 +00:00
return user.id == report.userId;
2023-05-18 20:13:18 +00:00
}
2023-07-30 07:11:26 +00:00
export async function canDeleteReport(auth: Auth, report: Report) {
return canUpdateReport(auth, report);
}
export async function canCreateTeam({ user }: Auth) {
if (user.isAdmin) {
return true;
}
return !!user;
}
export async function canViewTeam({ user }: Auth, teamId: string) {
if (user.isAdmin) {
return true;
}
return getTeamUser(teamId, user.id);
}
export async function canUpdateTeam({ user }: Auth, teamId: string) {
if (user.isAdmin) {
return true;
}
2023-07-30 05:54:46 +00:00
const teamUser = await getTeamUser(teamId, user.id);
2023-07-30 05:54:46 +00:00
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamUpdate);
}
export async function canDeleteTeam({ user }: Auth, teamId: string) {
if (user.isAdmin) {
return true;
}
2023-07-30 05:54:46 +00:00
const teamUser = await getTeamUser(teamId, user.id);
2023-07-30 05:54:46 +00:00
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamDelete);
}
2023-04-08 05:45:46 +00:00
export async function canDeleteTeamUser({ user }: Auth, teamId: string, removeUserId: string) {
if (user.isAdmin) {
return true;
}
2023-07-30 05:54:46 +00:00
if (removeUserId === user.id) {
return true;
}
2023-07-30 05:54:46 +00:00
const teamUser = await getTeamUser(teamId, user.id);
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamUpdate);
}
2023-04-09 23:04:28 +00:00
export async function canDeleteTeamWebsite({ user }: Auth, teamId: string, websiteId: string) {
if (user.isAdmin) {
return true;
}
2023-07-30 05:54:46 +00:00
const teamWebsite = await getTeamWebsite(teamId, websiteId);
2023-07-30 05:54:46 +00:00
if (teamWebsite?.website?.userId === user.id) {
return true;
}
2023-07-30 05:54:46 +00:00
if (teamWebsite) {
const teamUser = await getTeamUser(teamWebsite.teamId, user.id);
2023-04-09 23:04:28 +00:00
return hasPermission(teamUser.role, PERMISSIONS.teamUpdate);
}
return false;
}
export async function canCreateUser({ user }: Auth) {
return user.isAdmin;
}
export async function canViewUser({ user }: Auth, viewedUserId: string) {
if (user.isAdmin) {
return true;
}
return user.id === viewedUserId;
}
export async function canViewUsers({ user }: Auth) {
return user.isAdmin;
}
export async function canUpdateUser({ user }: Auth, viewedUserId: string) {
if (user.isAdmin) {
return true;
}
return user.id === viewedUserId;
}
export async function canDeleteUser({ user }: Auth) {
return user.isAdmin;
}
2022-12-07 02:36:41 +00:00
export async function hasPermission(role: string, permission: string | string[]) {
return ensureArray(permission).some(e => ROLE_PERMISSIONS[role]?.includes(e));
}