import { Request, Response, NextFunction } from "express"; import { db } from "@server/db"; import { userOrgs } from "@server/db"; import { and, eq, or } from "drizzle-orm"; import createHttpError from "http-errors"; import HttpCode from "@server/types/HttpCode"; import { checkOrgAccessPolicy } from "#dynamic/lib/checkOrgAccessPolicy"; export async function verifyUserAccess( req: Request, res: Response, next: NextFunction ) { const userId = req.user!.userId; const reqUserId = req.params.userId || req.body.userId || req.query.userId; if (!userId) { return next( createHttpError(HttpCode.UNAUTHORIZED, "User not authenticated") ); } if (!reqUserId) { return next(createHttpError(HttpCode.BAD_REQUEST, "Invalid user ID")); } try { if (!req.userOrg) { const res = await db .select() .from(userOrgs) .where( and( eq(userOrgs.userId, reqUserId), eq(userOrgs.orgId, req.userOrgId!) ) ) .limit(1); req.userOrg = res[0]; } if (!req.userOrg) { return next( createHttpError( HttpCode.FORBIDDEN, "User does not have access to this user" ) ); } if (req.orgPolicyAllowed === undefined && req.userOrg.orgId) { const policyCheck = await checkOrgAccessPolicy({ orgId: req.userOrg.orgId, userId, session: req.session }); req.orgPolicyAllowed = policyCheck.allowed; if (!policyCheck.allowed || policyCheck.error) { return next( createHttpError( HttpCode.FORBIDDEN, "Failed organization access policy check: " + (policyCheck.error || "Unknown error") ) ); } } return next(); } catch (error) { return next( createHttpError( HttpCode.INTERNAL_SERVER_ERROR, "Error checking if user has access to this user" ) ); } }