import { User } from "@prisma/client"; import CredentialsProvider from "next-auth/providers/credentials"; import { getSession } from "next-auth/react"; import { z } from "zod"; import prisma from "@calcom/prisma"; const teamIdschema = z.object({ teamId: z.number(), }); const auditAndReturnNextUser = async ( impersonatedUser: Pick, impersonatedByUID: number ) => { // Log impersonations for audit purposes await prisma.impersonations.create({ data: { impersonatedBy: { connect: { id: impersonatedByUID, }, }, impersonatedUser: { connect: { id: impersonatedUser.id, }, }, }, }); const obj = { id: impersonatedUser.id, username: impersonatedUser.username, email: impersonatedUser.email, name: impersonatedUser.name, role: impersonatedUser.role, impersonatedByUID, }; return obj; }; const ImpersonationProvider = CredentialsProvider({ id: "impersonation-auth", name: "Impersonation", type: "credentials", credentials: { username: { type: "text" }, teamId: { type: "text" }, }, async authorize(creds, req) { // eslint-disable-next-line @typescript-eslint/ban-ts-comment // @ts-ignore need to figure out how to correctly type this const session = await getSession({ req }); // If teamId is present -> parse the teamId and throw error itn ot number. If not present teamId is set to undefined const teamId = creds?.teamId ? teamIdschema.parse(creds).teamId : undefined; if (session?.user.username === creds?.username) { throw new Error("You cannot impersonate yourself."); } if (!creds?.username) throw new Error("Username must be present"); // If you are an ADMIN we return way before team impersonation logic is executed, so NEXT_PUBLIC_TEAM_IMPERSONATION certainly true if (session?.user.role !== "ADMIN" && process.env.NEXT_PUBLIC_TEAM_IMPERSONATION === "false") { throw new Error("You do not have permission to do this."); } // Get user who is being impersonated const impersonatedUser = await prisma.user.findUnique({ where: { username: creds?.username, }, select: { id: true, username: true, role: true, name: true, email: true, disableImpersonation: true, teams: { where: { disableImpersonation: false, // Ensure they have impersonation enabled accepted: true, // Ensure they are apart of the team and not just invited. team: { id: teamId, // Bring back only the right team }, }, select: { teamId: true, disableImpersonation: true, }, }, }, }); // Check if impersonating is allowed for this user if (!impersonatedUser) { throw new Error("This user does not exist"); } if (session?.user.role === "ADMIN") { if (impersonatedUser.disableImpersonation) { throw new Error("This user has disabled Impersonation."); } return auditAndReturnNextUser(impersonatedUser, session?.user.id as number); } if (!teamId) throw new Error("You do not have permission to do this."); // Check session const sessionUserFromDb = await prisma.user.findUnique({ where: { id: session?.user.id, }, include: { teams: { where: { AND: [ { role: { in: ["ADMIN", "OWNER"], }, }, { team: { id: teamId, }, }, ], }, }, }, }); if (sessionUserFromDb?.teams.length === 0 || impersonatedUser.teams.length === 0) { throw new Error("You do not have permission to do this."); } return auditAndReturnNextUser(impersonatedUser, session?.user.id as number); }, }); export default ImpersonationProvider;