mirror of
https://github.com/immich-app/immich.git
synced 2025-12-24 22:07:36 -05:00
308 lines
10 KiB
TypeScript
308 lines
10 KiB
TypeScript
import { BadRequestException, UnauthorizedException } from '@nestjs/common';
|
|
import { AuthSharedLink } from 'src/database';
|
|
import { AuthDto } from 'src/dtos/auth.dto';
|
|
import { AlbumUserRole, Permission } from 'src/enum';
|
|
import { AccessRepository } from 'src/repositories/access.repository';
|
|
import { setDifference, setIsEqual, setIsSuperset, setUnion } from 'src/utils/set';
|
|
|
|
export type GrantedRequest = {
|
|
requested: Permission[];
|
|
current: Permission[];
|
|
};
|
|
|
|
export const isGranted = ({ requested, current }: GrantedRequest) => {
|
|
if (current.includes(Permission.All)) {
|
|
return true;
|
|
}
|
|
|
|
return setIsSuperset(new Set(current), new Set(requested));
|
|
};
|
|
|
|
export type AccessRequest = {
|
|
auth: AuthDto;
|
|
permission: Permission;
|
|
ids: Set<string> | string[];
|
|
};
|
|
|
|
type SharedLinkAccessRequest = { sharedLink: AuthSharedLink; permission: Permission; ids: Set<string> };
|
|
type OtherAccessRequest = { auth: AuthDto; permission: Permission; ids: Set<string> };
|
|
|
|
export const requireUploadAccess = (auth: AuthDto | null): AuthDto => {
|
|
if (!auth || (auth.sharedLink && !auth.sharedLink.allowUpload)) {
|
|
throw new UnauthorizedException();
|
|
}
|
|
return auth;
|
|
};
|
|
|
|
export const requireAccess = async (access: AccessRepository, request: AccessRequest) => {
|
|
const allowedIds = await checkAccess(access, request);
|
|
if (!setIsEqual(new Set(request.ids), allowedIds)) {
|
|
throw new BadRequestException(`Not found or no ${request.permission} access`);
|
|
}
|
|
};
|
|
|
|
export const checkAccess = async (
|
|
access: AccessRepository,
|
|
{ ids, auth, permission }: AccessRequest,
|
|
): Promise<Set<string>> => {
|
|
const idSet = Array.isArray(ids) ? new Set(ids) : ids;
|
|
if (idSet.size === 0) {
|
|
return new Set<string>();
|
|
}
|
|
|
|
return auth.sharedLink
|
|
? checkSharedLinkAccess(access, { sharedLink: auth.sharedLink, permission, ids: idSet })
|
|
: checkOtherAccess(access, { auth, permission, ids: idSet });
|
|
};
|
|
|
|
const checkSharedLinkAccess = async (
|
|
access: AccessRepository,
|
|
request: SharedLinkAccessRequest,
|
|
): Promise<Set<string>> => {
|
|
const { sharedLink, permission, ids } = request;
|
|
const sharedLinkId = sharedLink.id;
|
|
|
|
switch (permission) {
|
|
case Permission.AssetRead: {
|
|
return await access.asset.checkSharedLinkAccess(sharedLinkId, ids);
|
|
}
|
|
|
|
case Permission.AssetView: {
|
|
return await access.asset.checkSharedLinkAccess(sharedLinkId, ids);
|
|
}
|
|
|
|
case Permission.AssetDownload: {
|
|
return sharedLink.allowDownload ? await access.asset.checkSharedLinkAccess(sharedLinkId, ids) : new Set();
|
|
}
|
|
|
|
case Permission.AssetUpload: {
|
|
return sharedLink.allowUpload ? ids : new Set();
|
|
}
|
|
|
|
case Permission.AssetShare: {
|
|
// TODO: fix this to not use sharedLink.userId for access control
|
|
return await access.asset.checkOwnerAccess(sharedLink.userId, ids, false);
|
|
}
|
|
|
|
case Permission.AlbumRead: {
|
|
return await access.album.checkSharedLinkAccess(sharedLinkId, ids);
|
|
}
|
|
|
|
case Permission.AlbumDownload: {
|
|
return sharedLink.allowDownload ? await access.album.checkSharedLinkAccess(sharedLinkId, ids) : new Set();
|
|
}
|
|
|
|
case Permission.AlbumAssetCreate: {
|
|
return sharedLink.allowUpload ? await access.album.checkSharedLinkAccess(sharedLinkId, ids) : new Set();
|
|
}
|
|
|
|
default: {
|
|
return new Set<string>();
|
|
}
|
|
}
|
|
};
|
|
|
|
const checkOtherAccess = async (access: AccessRepository, request: OtherAccessRequest): Promise<Set<string>> => {
|
|
const { auth, permission, ids } = request;
|
|
|
|
switch (permission) {
|
|
// uses album id
|
|
case Permission.ActivityCreate: {
|
|
return await access.activity.checkCreateAccess(auth.user.id, ids);
|
|
}
|
|
|
|
// uses activity id
|
|
case Permission.ActivityDelete: {
|
|
const isOwner = await access.activity.checkOwnerAccess(auth.user.id, ids);
|
|
const isAlbumOwner = await access.activity.checkAlbumOwnerAccess(auth.user.id, setDifference(ids, isOwner));
|
|
return setUnion(isOwner, isAlbumOwner);
|
|
}
|
|
|
|
case Permission.AssetRead: {
|
|
const isOwner = await access.asset.checkOwnerAccess(auth.user.id, ids, auth.session?.hasElevatedPermission);
|
|
const isAlbum = await access.asset.checkAlbumAccess(auth.user.id, setDifference(ids, isOwner));
|
|
const isPartner = await access.asset.checkPartnerAccess(auth.user.id, setDifference(ids, isOwner, isAlbum));
|
|
return setUnion(isOwner, isAlbum, isPartner);
|
|
}
|
|
|
|
case Permission.AssetShare: {
|
|
const isOwner = await access.asset.checkOwnerAccess(auth.user.id, ids, false);
|
|
const isPartner = await access.asset.checkPartnerAccess(auth.user.id, setDifference(ids, isOwner));
|
|
return setUnion(isOwner, isPartner);
|
|
}
|
|
|
|
case Permission.AssetView: {
|
|
const isOwner = await access.asset.checkOwnerAccess(auth.user.id, ids, auth.session?.hasElevatedPermission);
|
|
const isAlbum = await access.asset.checkAlbumAccess(auth.user.id, setDifference(ids, isOwner));
|
|
const isPartner = await access.asset.checkPartnerAccess(auth.user.id, setDifference(ids, isOwner, isAlbum));
|
|
return setUnion(isOwner, isAlbum, isPartner);
|
|
}
|
|
|
|
case Permission.AssetDownload: {
|
|
const isOwner = await access.asset.checkOwnerAccess(auth.user.id, ids, auth.session?.hasElevatedPermission);
|
|
const isAlbum = await access.asset.checkAlbumAccess(auth.user.id, setDifference(ids, isOwner));
|
|
const isPartner = await access.asset.checkPartnerAccess(auth.user.id, setDifference(ids, isOwner, isAlbum));
|
|
return setUnion(isOwner, isAlbum, isPartner);
|
|
}
|
|
|
|
case Permission.AssetUpdate: {
|
|
return await access.asset.checkOwnerAccess(auth.user.id, ids, auth.session?.hasElevatedPermission);
|
|
}
|
|
|
|
case Permission.AssetDelete: {
|
|
return await access.asset.checkOwnerAccess(auth.user.id, ids, auth.session?.hasElevatedPermission);
|
|
}
|
|
|
|
case Permission.AlbumRead: {
|
|
const isOwner = await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
const isShared = await access.album.checkSharedAlbumAccess(
|
|
auth.user.id,
|
|
setDifference(ids, isOwner),
|
|
AlbumUserRole.Viewer,
|
|
);
|
|
return setUnion(isOwner, isShared);
|
|
}
|
|
|
|
case Permission.AlbumAssetCreate: {
|
|
const isOwner = await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
const isShared = await access.album.checkSharedAlbumAccess(
|
|
auth.user.id,
|
|
setDifference(ids, isOwner),
|
|
AlbumUserRole.Editor,
|
|
);
|
|
return setUnion(isOwner, isShared);
|
|
}
|
|
|
|
case Permission.AlbumUpdate: {
|
|
return await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.AlbumDelete: {
|
|
return await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.AlbumShare: {
|
|
return await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.AlbumDownload: {
|
|
const isOwner = await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
const isShared = await access.album.checkSharedAlbumAccess(
|
|
auth.user.id,
|
|
setDifference(ids, isOwner),
|
|
AlbumUserRole.Viewer,
|
|
);
|
|
return setUnion(isOwner, isShared);
|
|
}
|
|
|
|
case Permission.AlbumAssetDelete: {
|
|
const isOwner = await access.album.checkOwnerAccess(auth.user.id, ids);
|
|
const isShared = await access.album.checkSharedAlbumAccess(
|
|
auth.user.id,
|
|
setDifference(ids, isOwner),
|
|
AlbumUserRole.Editor,
|
|
);
|
|
return setUnion(isOwner, isShared);
|
|
}
|
|
|
|
case Permission.AssetUpload: {
|
|
return ids.has(auth.user.id) ? new Set([auth.user.id]) : new Set<string>();
|
|
}
|
|
|
|
case Permission.ArchiveRead: {
|
|
return ids.has(auth.user.id) ? new Set([auth.user.id]) : new Set();
|
|
}
|
|
|
|
case Permission.AuthDeviceDelete: {
|
|
return await access.authDevice.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.FaceDelete: {
|
|
return access.person.checkFaceOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.NotificationRead:
|
|
case Permission.NotificationUpdate:
|
|
case Permission.NotificationDelete: {
|
|
return access.notification.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.TagAsset:
|
|
case Permission.TagRead:
|
|
case Permission.TagUpdate:
|
|
case Permission.TagDelete: {
|
|
return await access.tag.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.TimelineRead: {
|
|
const isOwner = ids.has(auth.user.id) ? new Set([auth.user.id]) : new Set<string>();
|
|
const isPartner = await access.timeline.checkPartnerAccess(auth.user.id, setDifference(ids, isOwner));
|
|
return setUnion(isOwner, isPartner);
|
|
}
|
|
|
|
case Permission.TimelineDownload: {
|
|
return ids.has(auth.user.id) ? new Set([auth.user.id]) : new Set();
|
|
}
|
|
|
|
case Permission.MemoryRead: {
|
|
return access.memory.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.MemoryUpdate: {
|
|
return access.memory.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.MemoryDelete: {
|
|
return access.memory.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.PersonCreate: {
|
|
return access.person.checkFaceOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.PersonRead:
|
|
case Permission.PersonUpdate:
|
|
case Permission.PersonDelete:
|
|
case Permission.PersonMerge: {
|
|
return await access.person.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.PersonReassign: {
|
|
return access.person.checkFaceOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.PartnerUpdate: {
|
|
return await access.partner.checkUpdateAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.SessionRead:
|
|
case Permission.SessionUpdate:
|
|
case Permission.SessionDelete:
|
|
case Permission.SessionLock: {
|
|
return access.session.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.StackRead: {
|
|
return access.stack.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.StackUpdate: {
|
|
return access.stack.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
case Permission.StackDelete: {
|
|
return access.stack.checkOwnerAccess(auth.user.id, ids);
|
|
}
|
|
|
|
default: {
|
|
return new Set<string>();
|
|
}
|
|
}
|
|
};
|
|
|
|
export const requireElevatedPermission = (auth: AuthDto) => {
|
|
if (!auth.session?.hasElevatedPermission) {
|
|
throw new UnauthorizedException('Elevated permission is required');
|
|
}
|
|
};
|