mirror of
https://github.com/umami-software/umami.git
synced 2026-02-04 04:37:11 +01:00
323 lines
7.4 KiB
TypeScript
323 lines
7.4 KiB
TypeScript
import bcrypt from 'bcryptjs';
|
|
import { Report } from '@prisma/client';
|
|
import { getClient, redisEnabled } from '@umami/redis-client';
|
|
import debug from 'debug';
|
|
import { PERMISSIONS, ROLE_PERMISSIONS, ROLES, SHARE_TOKEN_HEADER } from 'lib/constants';
|
|
import { secret, getRandomChars } from 'lib/crypto';
|
|
import { createSecureToken, parseSecureToken, parseToken } from 'lib/jwt';
|
|
import { ensureArray } from 'lib/utils';
|
|
import { getTeamUser, getUser, getWebsite } from 'queries';
|
|
import { Auth } from './types';
|
|
|
|
const log = debug('umami:auth');
|
|
const cloudMode = process.env.CLOUD_MODE;
|
|
const SALT_ROUNDS = 10;
|
|
|
|
export function hashPassword(password: string, rounds = SALT_ROUNDS) {
|
|
return bcrypt.hashSync(password, rounds);
|
|
}
|
|
|
|
export function checkPassword(password: string, passwordHash: string) {
|
|
return bcrypt.compareSync(password, passwordHash);
|
|
}
|
|
|
|
export async function checkAuth(request: Request) {
|
|
const token = request.headers.get('authorization')?.split(' ')?.[1];
|
|
const payload = parseSecureToken(token, secret());
|
|
const shareToken = await parseShareToken(request.headers);
|
|
|
|
let user = null;
|
|
const { userId, authKey, grant } = payload || {};
|
|
|
|
if (userId) {
|
|
user = await getUser(userId);
|
|
} else if (redisEnabled && authKey) {
|
|
const redis = getClient();
|
|
|
|
const key = await redis.get(authKey);
|
|
|
|
if (key?.userId) {
|
|
user = await getUser(key.userId);
|
|
}
|
|
}
|
|
|
|
if (process.env.NODE_ENV === 'development') {
|
|
log('checkAuth:', { token, shareToken, payload, user, grant });
|
|
}
|
|
|
|
if (!user?.id && !shareToken) {
|
|
log('checkAuth: User not authorized');
|
|
return null;
|
|
}
|
|
|
|
if (user) {
|
|
user.isAdmin = user.role === ROLES.admin;
|
|
}
|
|
|
|
return {
|
|
user,
|
|
grant,
|
|
token,
|
|
shareToken,
|
|
authKey,
|
|
};
|
|
}
|
|
|
|
export async function saveAuth(data: any, expire = 0) {
|
|
const authKey = `auth:${getRandomChars(32)}`;
|
|
|
|
const redis = getClient();
|
|
|
|
await redis.set(authKey, data);
|
|
|
|
if (expire) {
|
|
await redis.expire(authKey, expire);
|
|
}
|
|
|
|
return createSecureToken({ authKey }, secret());
|
|
}
|
|
|
|
export function parseShareToken(headers: Headers) {
|
|
try {
|
|
return parseToken(headers.get(SHARE_TOKEN_HEADER), secret());
|
|
} catch (e) {
|
|
log(e);
|
|
return null;
|
|
}
|
|
}
|
|
|
|
export async function canViewWebsite({ user, shareToken }: Auth, websiteId: string) {
|
|
if (user?.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
if (shareToken?.websiteId === websiteId) {
|
|
return true;
|
|
}
|
|
|
|
const website = await getWebsite(websiteId);
|
|
|
|
if (website.userId) {
|
|
return user.id === website.userId;
|
|
}
|
|
|
|
if (website.teamId) {
|
|
const teamUser = await getTeamUser(website.teamId, user.id);
|
|
|
|
return !!teamUser;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
export async function canViewAllWebsites({ user }: Auth) {
|
|
return user.isAdmin;
|
|
}
|
|
|
|
export async function canCreateWebsite({ user, grant }: Auth) {
|
|
if (cloudMode) {
|
|
return !!grant?.find(a => a === PERMISSIONS.websiteCreate);
|
|
}
|
|
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return hasPermission(user.role, PERMISSIONS.websiteCreate);
|
|
}
|
|
|
|
export async function canUpdateWebsite({ user }: Auth, websiteId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
const website = await getWebsite(websiteId);
|
|
|
|
if (website.userId) {
|
|
return user.id === website.userId;
|
|
}
|
|
|
|
if (website.teamId) {
|
|
const teamUser = await getTeamUser(website.teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.websiteUpdate);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
export async function canTransferWebsiteToUser({ user }: Auth, websiteId: string, userId: string) {
|
|
const website = await getWebsite(websiteId);
|
|
|
|
if (website.teamId && user.id === userId) {
|
|
const teamUser = await getTeamUser(website.teamId, userId);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.websiteTransferToUser);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
export async function canTransferWebsiteToTeam({ user }: Auth, websiteId: string, teamId: string) {
|
|
const website = await getWebsite(websiteId);
|
|
|
|
if (website.userId && website.userId === user.id) {
|
|
const teamUser = await getTeamUser(teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.websiteTransferToTeam);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
export async function canDeleteWebsite({ user }: Auth, websiteId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
const website = await getWebsite(websiteId);
|
|
|
|
if (website.userId) {
|
|
return user.id === website.userId;
|
|
}
|
|
|
|
if (website.teamId) {
|
|
const teamUser = await getTeamUser(website.teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.websiteDelete);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
export async function canViewReport(auth: Auth, report: Report) {
|
|
if (auth.user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
if (auth.user.id == report.userId) {
|
|
return true;
|
|
}
|
|
|
|
return !!(await canViewWebsite(auth, report.websiteId));
|
|
}
|
|
|
|
export async function canUpdateReport({ user }: Auth, report: Report) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return user.id == report.userId;
|
|
}
|
|
|
|
export async function canDeleteReport(auth: Auth, report: Report) {
|
|
return canUpdateReport(auth, report);
|
|
}
|
|
|
|
export async function canCreateTeam({ user, grant }: Auth) {
|
|
if (cloudMode) {
|
|
return !!grant?.find(a => a === PERMISSIONS.teamCreate);
|
|
}
|
|
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return !!user;
|
|
}
|
|
|
|
export async function canViewTeam({ user }: Auth, teamId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return getTeamUser(teamId, user.id);
|
|
}
|
|
|
|
export async function canUpdateTeam({ user, grant }: Auth, teamId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
if (cloudMode) {
|
|
return !!grant?.find(a => a === PERMISSIONS.teamUpdate);
|
|
}
|
|
|
|
const teamUser = await getTeamUser(teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamUpdate);
|
|
}
|
|
|
|
export async function canAddUserToTeam({ user, grant }: Auth) {
|
|
if (cloudMode) {
|
|
return !!grant?.find(a => a === PERMISSIONS.teamUpdate);
|
|
}
|
|
|
|
return user.isAdmin;
|
|
}
|
|
|
|
export async function canDeleteTeam({ user }: Auth, teamId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
const teamUser = await getTeamUser(teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamDelete);
|
|
}
|
|
|
|
export async function canDeleteTeamUser({ user }: Auth, teamId: string, removeUserId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
if (removeUserId === user.id) {
|
|
return true;
|
|
}
|
|
|
|
const teamUser = await getTeamUser(teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.teamUpdate);
|
|
}
|
|
|
|
export async function canCreateTeamWebsite({ user }: Auth, teamId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
const teamUser = await getTeamUser(teamId, user.id);
|
|
|
|
return teamUser && hasPermission(teamUser.role, PERMISSIONS.websiteCreate);
|
|
}
|
|
|
|
export async function canCreateUser({ user }: Auth) {
|
|
return user.isAdmin;
|
|
}
|
|
|
|
export async function canViewUser({ user }: Auth, viewedUserId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return user.id === viewedUserId;
|
|
}
|
|
|
|
export async function canViewUsers({ user }: Auth) {
|
|
return user.isAdmin;
|
|
}
|
|
|
|
export async function canUpdateUser({ user }: Auth, viewedUserId: string) {
|
|
if (user.isAdmin) {
|
|
return true;
|
|
}
|
|
|
|
return user.id === viewedUserId;
|
|
}
|
|
|
|
export async function canDeleteUser({ user }: Auth) {
|
|
return user.isAdmin;
|
|
}
|
|
|
|
export async function hasPermission(role: string, permission: string | string[]) {
|
|
return ensureArray(permission).some(e => ROLE_PERMISSIONS[role]?.includes(e));
|
|
}
|