fosrl.pangolin/server/routers/auth/verifyUserAccess.ts

63 lines
1.6 KiB
TypeScript
Raw Normal View History

2024-11-03 17:28:12 -05:00
import { Request, Response, NextFunction } from "express";
import { db } from "@server/db";
import {
sites,
userOrgs,
userSites,
roleSites,
roles,
} from "@server/db/schema";
import { and, eq, or } from "drizzle-orm";
import createHttpError from "http-errors";
import HttpCode from "@server/types/HttpCode";
export async function verifyUserAccess(
req: Request,
res: Response,
next: NextFunction
) {
2024-10-13 17:13:47 -04:00
const userId = req.user!.userId; // Assuming you have user information in the request
2024-10-12 22:31:24 -04:00
const reqUserId = req.params.userId || req.body.userId || req.query.userId;
if (!userId) {
2024-11-03 17:28:12 -05:00
return next(
createHttpError(HttpCode.UNAUTHORIZED, "User not authenticated")
);
2024-10-12 22:31:24 -04:00
}
if (!reqUserId) {
2024-11-03 17:28:12 -05:00
return next(createHttpError(HttpCode.BAD_REQUEST, "Invalid user ID"));
2024-10-12 22:31:24 -04:00
}
try {
2024-11-03 17:28:12 -05:00
const userOrg = await db
.select()
2024-10-12 22:31:24 -04:00
.from(userOrgs)
2024-11-03 17:28:12 -05:00
.where(
and(
eq(userOrgs.userId, reqUserId),
eq(userOrgs.orgId, req.userOrgId!)
)
)
2024-10-12 22:31:24 -04:00
.limit(1);
if (userOrg.length === 0) {
2024-11-03 17:28:12 -05:00
return next(
createHttpError(
HttpCode.FORBIDDEN,
"User does not have access to this user"
)
);
2024-10-12 22:31:24 -04:00
}
2024-11-03 17:28:12 -05:00
return next();
2024-10-12 22:31:24 -04:00
} catch (error) {
2024-11-03 17:28:12 -05:00
return next(
createHttpError(
HttpCode.INTERNAL_SERVER_ERROR,
"Error checking if user has access to this user"
)
);
2024-10-12 22:31:24 -04:00
}
2024-10-13 17:13:47 -04:00
}