mirror of
https://github.com/simstudioai/sim.git
synced 2026-02-10 06:35:01 -05:00
* fix(logs): execution files should always use our internal route * correct degree of access control * fix tests * fix tag defs flag * fix type check * fix mcp tools * make webhooks consistent * fix ollama and vllm visibility * remove dup test
238 lines
8.1 KiB
TypeScript
238 lines
8.1 KiB
TypeScript
import { db } from '@sim/db'
|
|
import { account, user, workflow } from '@sim/db/schema'
|
|
import { createLogger } from '@sim/logger'
|
|
import { and, eq } from 'drizzle-orm'
|
|
import { jwtDecode } from 'jwt-decode'
|
|
import { type NextRequest, NextResponse } from 'next/server'
|
|
import { z } from 'zod'
|
|
import { checkSessionOrInternalAuth } from '@/lib/auth/hybrid'
|
|
import { generateRequestId } from '@/lib/core/utils/request'
|
|
import { evaluateScopeCoverage, type OAuthProvider, parseProvider } from '@/lib/oauth'
|
|
import { getUserEntityPermissions } from '@/lib/workspaces/permissions/utils'
|
|
|
|
export const dynamic = 'force-dynamic'
|
|
|
|
const logger = createLogger('OAuthCredentialsAPI')
|
|
|
|
const credentialsQuerySchema = z
|
|
.object({
|
|
provider: z.string().nullish(),
|
|
workflowId: z.string().uuid('Workflow ID must be a valid UUID').nullish(),
|
|
credentialId: z
|
|
.string()
|
|
.min(1, 'Credential ID must not be empty')
|
|
.max(255, 'Credential ID is too long')
|
|
.nullish(),
|
|
})
|
|
.refine((data) => data.provider || data.credentialId, {
|
|
message: 'Provider or credentialId is required',
|
|
path: ['provider'],
|
|
})
|
|
|
|
interface GoogleIdToken {
|
|
email?: string
|
|
sub?: string
|
|
name?: string
|
|
}
|
|
|
|
/**
|
|
* Get credentials for a specific provider
|
|
*/
|
|
export async function GET(request: NextRequest) {
|
|
const requestId = generateRequestId()
|
|
|
|
try {
|
|
const { searchParams } = new URL(request.url)
|
|
const rawQuery = {
|
|
provider: searchParams.get('provider'),
|
|
workflowId: searchParams.get('workflowId'),
|
|
credentialId: searchParams.get('credentialId'),
|
|
}
|
|
|
|
const parseResult = credentialsQuerySchema.safeParse(rawQuery)
|
|
|
|
if (!parseResult.success) {
|
|
const refinementError = parseResult.error.errors.find((err) => err.code === 'custom')
|
|
if (refinementError) {
|
|
logger.warn(`[${requestId}] Invalid query parameters: ${refinementError.message}`)
|
|
return NextResponse.json(
|
|
{
|
|
error: refinementError.message,
|
|
},
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
|
|
const firstError = parseResult.error.errors[0]
|
|
const errorMessage = firstError?.message || 'Validation failed'
|
|
|
|
logger.warn(`[${requestId}] Invalid query parameters`, {
|
|
errors: parseResult.error.errors,
|
|
})
|
|
|
|
return NextResponse.json(
|
|
{
|
|
error: errorMessage,
|
|
},
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
|
|
const { provider: providerParam, workflowId, credentialId } = parseResult.data
|
|
|
|
// Authenticate requester (supports session, API key, internal JWT)
|
|
const authResult = await checkSessionOrInternalAuth(request)
|
|
if (!authResult.success || !authResult.userId) {
|
|
logger.warn(`[${requestId}] Unauthenticated credentials request rejected`)
|
|
return NextResponse.json({ error: 'User not authenticated' }, { status: 401 })
|
|
}
|
|
const requesterUserId = authResult.userId
|
|
|
|
// Resolve effective user id: workflow owner if workflowId provided (with access check); else requester
|
|
let effectiveUserId: string
|
|
if (workflowId) {
|
|
// Load workflow owner and workspace for access control
|
|
const rows = await db
|
|
.select({ userId: workflow.userId, workspaceId: workflow.workspaceId })
|
|
.from(workflow)
|
|
.where(eq(workflow.id, workflowId))
|
|
.limit(1)
|
|
|
|
if (!rows.length) {
|
|
logger.warn(`[${requestId}] Workflow not found for credentials request`, { workflowId })
|
|
return NextResponse.json({ error: 'Workflow not found' }, { status: 404 })
|
|
}
|
|
|
|
const wf = rows[0]
|
|
|
|
if (requesterUserId !== wf.userId) {
|
|
if (!wf.workspaceId) {
|
|
logger.warn(
|
|
`[${requestId}] Forbidden - workflow has no workspace and requester is not owner`,
|
|
{
|
|
requesterUserId,
|
|
}
|
|
)
|
|
return NextResponse.json({ error: 'Forbidden' }, { status: 403 })
|
|
}
|
|
|
|
const perm = await getUserEntityPermissions(requesterUserId, 'workspace', wf.workspaceId)
|
|
if (perm === null) {
|
|
logger.warn(`[${requestId}] Forbidden credentials request - no workspace access`, {
|
|
requesterUserId,
|
|
workspaceId: wf.workspaceId,
|
|
})
|
|
return NextResponse.json({ error: 'Forbidden' }, { status: 403 })
|
|
}
|
|
}
|
|
|
|
effectiveUserId = wf.userId
|
|
} else {
|
|
effectiveUserId = requesterUserId
|
|
}
|
|
|
|
// Parse the provider to get base provider and feature type (if provider is present)
|
|
const { baseProvider } = parseProvider((providerParam || 'google') as OAuthProvider)
|
|
|
|
let accountsData
|
|
|
|
if (credentialId) {
|
|
// Foreign-aware lookup for a specific credential by id
|
|
// If workflowId is provided and requester has access (checked above), allow fetching by id only
|
|
if (workflowId) {
|
|
accountsData = await db.select().from(account).where(eq(account.id, credentialId))
|
|
} else {
|
|
// Fallback: constrain to requester's own credentials when not in a workflow context
|
|
accountsData = await db
|
|
.select()
|
|
.from(account)
|
|
.where(and(eq(account.userId, effectiveUserId), eq(account.id, credentialId)))
|
|
}
|
|
} else {
|
|
// Fetch all credentials for provider and effective user
|
|
accountsData = await db
|
|
.select()
|
|
.from(account)
|
|
.where(and(eq(account.userId, effectiveUserId), eq(account.providerId, providerParam!)))
|
|
}
|
|
|
|
// Transform accounts into credentials
|
|
const credentials = await Promise.all(
|
|
accountsData.map(async (acc) => {
|
|
// Extract the feature type from providerId (e.g., 'google-default' -> 'default')
|
|
const [_, featureType = 'default'] = acc.providerId.split('-')
|
|
|
|
// Try multiple methods to get a user-friendly display name
|
|
let displayName = ''
|
|
|
|
// Method 1: Try to extract email from ID token (works for Google, etc.)
|
|
if (acc.idToken) {
|
|
try {
|
|
const decoded = jwtDecode<GoogleIdToken>(acc.idToken)
|
|
if (decoded.email) {
|
|
displayName = decoded.email
|
|
} else if (decoded.name) {
|
|
displayName = decoded.name
|
|
}
|
|
} catch (_error) {
|
|
logger.warn(`[${requestId}] Error decoding ID token`, {
|
|
accountId: acc.id,
|
|
})
|
|
}
|
|
}
|
|
|
|
// Method 2: For GitHub, the accountId might be the username
|
|
if (!displayName && baseProvider === 'github') {
|
|
displayName = `${acc.accountId} (GitHub)`
|
|
}
|
|
|
|
// Method 3: Try to get the user's email from our database
|
|
if (!displayName) {
|
|
try {
|
|
const userRecord = await db
|
|
.select({ email: user.email })
|
|
.from(user)
|
|
.where(eq(user.id, acc.userId))
|
|
.limit(1)
|
|
|
|
if (userRecord.length > 0) {
|
|
displayName = userRecord[0].email
|
|
}
|
|
} catch (_error) {
|
|
logger.warn(`[${requestId}] Error fetching user email`, {
|
|
userId: acc.userId,
|
|
})
|
|
}
|
|
}
|
|
|
|
// Fallback: Use accountId with provider type as context
|
|
if (!displayName) {
|
|
displayName = `${acc.accountId} (${baseProvider})`
|
|
}
|
|
|
|
const storedScope = acc.scope?.trim()
|
|
const grantedScopes = storedScope ? storedScope.split(/[\s,]+/).filter(Boolean) : []
|
|
const scopeEvaluation = evaluateScopeCoverage(acc.providerId, grantedScopes)
|
|
|
|
return {
|
|
id: acc.id,
|
|
name: displayName,
|
|
provider: acc.providerId,
|
|
lastUsed: acc.updatedAt.toISOString(),
|
|
isDefault: featureType === 'default',
|
|
scopes: scopeEvaluation.grantedScopes,
|
|
canonicalScopes: scopeEvaluation.canonicalScopes,
|
|
missingScopes: scopeEvaluation.missingScopes,
|
|
extraScopes: scopeEvaluation.extraScopes,
|
|
requiresReauthorization: scopeEvaluation.requiresReauthorization,
|
|
}
|
|
})
|
|
)
|
|
|
|
return NextResponse.json({ credentials }, { status: 200 })
|
|
} catch (error) {
|
|
logger.error(`[${requestId}] Error fetching OAuth credentials`, error)
|
|
return NextResponse.json({ error: 'Internal server error' }, { status: 500 })
|
|
}
|
|
}
|