mirror of
https://github.com/Mintplex-Labs/anything-llm.git
synced 2024-11-19 20:50:09 +01:00
fa29003a46
* added manager role to options * block default role from editing workspace settings on workspace and text input box * block default user from accessing settings at all * create manager route * let pass through if in single user mode * fix permissions for manager and admin roles in settings * fix settings button for single user and remove unneeded console.logs * rename routes and paths for clarity * admin, manager, default roles complete * remove unneeded comments * consistency changes * manage permissions for mum modes * update sidebar for single-user mode * update comment on middleware Modify permission setting for admins * update render conditional * Add role usage hint to each role --------- Co-authored-by: timothycarambat <rambat1010@gmail.com>
91 lines
2.0 KiB
JavaScript
91 lines
2.0 KiB
JavaScript
const { SystemSettings } = require("../../models/systemSettings");
|
|
const { User } = require("../../models/user");
|
|
const { decodeJWT } = require("../http");
|
|
|
|
async function validatedRequest(request, response, next) {
|
|
const multiUserMode = await SystemSettings.isMultiUserMode();
|
|
response.locals.multiUserMode = multiUserMode;
|
|
if (multiUserMode)
|
|
return await validateMultiUserRequest(request, response, next);
|
|
|
|
// When in development passthrough auth token for ease of development.
|
|
// Or if the user simply did not set an Auth token or JWT Secret
|
|
if (
|
|
process.env.NODE_ENV === "development" ||
|
|
!process.env.AUTH_TOKEN ||
|
|
!process.env.JWT_SECRET
|
|
) {
|
|
next();
|
|
return;
|
|
}
|
|
|
|
if (!process.env.AUTH_TOKEN) {
|
|
response.status(401).json({
|
|
error: "You need to set an AUTH_TOKEN environment variable.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(401).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const { p } = decodeJWT(token);
|
|
if (p !== process.env.AUTH_TOKEN) {
|
|
response.status(401).json({
|
|
error: "Invalid auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
next();
|
|
}
|
|
|
|
async function validateMultiUserRequest(request, response, next) {
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(401).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const valid = decodeJWT(token);
|
|
if (!valid || !valid.id) {
|
|
response.status(401).json({
|
|
error: "Invalid auth token.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const user = await User.get({ id: valid.id });
|
|
if (!user) {
|
|
response.status(401).json({
|
|
error: "Invalid auth for user.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
if (user.suspended) {
|
|
response.status(401).json({
|
|
error: "User is suspended from system",
|
|
});
|
|
return;
|
|
}
|
|
|
|
response.locals.user = user;
|
|
next();
|
|
}
|
|
|
|
module.exports = {
|
|
validatedRequest,
|
|
};
|