2026-03-25 11:22:25 -07:00
|
|
|
import { logger, isValidObjectIdString } from '@librechat/data-schemas';
|
2026-03-24 23:54:32 -07:00
|
|
|
import { SystemRoles } from 'librechat-data-provider';
|
2026-03-24 23:40:12 -07:00
|
|
|
import type { IRole, IUser } from '@librechat/data-schemas';
|
2026-03-24 23:54:32 -07:00
|
|
|
import type { ServerRequest } from '~/types/http';
|
2026-03-24 23:40:12 -07:00
|
|
|
import type { FilterQuery } from 'mongoose';
|
|
|
|
|
import type { Response } from 'express';
|
|
|
|
|
|
|
|
|
|
interface RoleNameParams {
|
|
|
|
|
name: string;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
interface RoleMemberParams extends RoleNameParams {
|
|
|
|
|
userId: string;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
interface AdminMember {
|
|
|
|
|
userId: string;
|
|
|
|
|
name: string;
|
|
|
|
|
email: string;
|
|
|
|
|
avatarUrl?: string;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
export interface AdminRolesDeps {
|
|
|
|
|
listRoles: () => Promise<IRole[]>;
|
2026-03-24 23:54:32 -07:00
|
|
|
getRoleByName: (name: string, fields?: string | string[] | null) => Promise<IRole | null>;
|
2026-03-25 08:56:38 -07:00
|
|
|
createRoleByName: (roleData: Partial<IRole>) => Promise<IRole>;
|
2026-03-24 23:40:12 -07:00
|
|
|
updateRoleByName: (name: string, updates: Partial<IRole>) => Promise<IRole | null>;
|
|
|
|
|
updateAccessPermissions: (
|
|
|
|
|
name: string,
|
|
|
|
|
perms: Record<string, Record<string, boolean>>,
|
|
|
|
|
roleData?: IRole,
|
|
|
|
|
) => Promise<void>;
|
2026-03-25 08:56:38 -07:00
|
|
|
deleteRoleByName: (name: string) => Promise<IRole | null>;
|
2026-03-24 23:40:12 -07:00
|
|
|
findUser: (
|
|
|
|
|
criteria: FilterQuery<IUser>,
|
|
|
|
|
fields?: string | string[] | null,
|
|
|
|
|
) => Promise<IUser | null>;
|
|
|
|
|
updateUser: (userId: string, data: Partial<IUser>) => Promise<IUser | null>;
|
2026-03-24 23:54:32 -07:00
|
|
|
listUsersByRole: (roleName: string) => Promise<IUser[]>;
|
2026-03-24 23:40:12 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
export function createAdminRolesHandlers(deps: AdminRolesDeps) {
|
|
|
|
|
const {
|
|
|
|
|
listRoles,
|
|
|
|
|
getRoleByName,
|
2026-03-25 08:56:38 -07:00
|
|
|
createRoleByName,
|
2026-03-24 23:40:12 -07:00
|
|
|
updateRoleByName,
|
|
|
|
|
updateAccessPermissions,
|
2026-03-25 08:56:38 -07:00
|
|
|
deleteRoleByName,
|
2026-03-24 23:40:12 -07:00
|
|
|
findUser,
|
|
|
|
|
updateUser,
|
2026-03-24 23:54:32 -07:00
|
|
|
listUsersByRole,
|
2026-03-24 23:40:12 -07:00
|
|
|
} = deps;
|
|
|
|
|
|
|
|
|
|
async function listRolesHandler(_req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const roles = await listRoles();
|
|
|
|
|
return res.status(200).json({ roles });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] listRoles error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to list roles' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function getRoleHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
const role = await getRoleByName(name);
|
|
|
|
|
if (!role) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
return res.status(200).json({ role });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] getRole error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to get role' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function createRoleHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
2026-03-25 10:51:09 -07:00
|
|
|
const { name, description, permissions } = req.body as {
|
2026-03-24 23:54:32 -07:00
|
|
|
name?: string;
|
2026-03-25 10:51:09 -07:00
|
|
|
description?: string;
|
2026-03-24 23:54:32 -07:00
|
|
|
permissions?: IRole['permissions'];
|
|
|
|
|
};
|
2026-03-24 23:40:12 -07:00
|
|
|
if (!name || typeof name !== 'string' || !name.trim()) {
|
|
|
|
|
return res.status(400).json({ error: 'name is required' });
|
|
|
|
|
}
|
2026-03-25 08:56:38 -07:00
|
|
|
const role = await createRoleByName({
|
2026-03-24 23:40:12 -07:00
|
|
|
name: name.trim(),
|
2026-03-25 10:51:09 -07:00
|
|
|
description: description ?? '',
|
2026-03-24 23:40:12 -07:00
|
|
|
permissions: permissions || {},
|
|
|
|
|
});
|
|
|
|
|
return res.status(201).json({ role });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
const message = error instanceof Error ? error.message : 'Failed to create role';
|
|
|
|
|
logger.error('[adminRoles] createRole error:', error);
|
|
|
|
|
const status = message.includes('already exists') || message.includes('reserved') ? 409 : 500;
|
|
|
|
|
return res.status(status).json({ error: message });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function updateRoleHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
const body = req.body as Partial<IRole>;
|
|
|
|
|
|
2026-03-25 11:22:25 -07:00
|
|
|
if (
|
|
|
|
|
body.name !== undefined &&
|
|
|
|
|
(!body.name || typeof body.name !== 'string' || !body.name.trim())
|
|
|
|
|
) {
|
|
|
|
|
return res.status(400).json({ error: 'name must be a non-empty string' });
|
|
|
|
|
}
|
2026-03-25 14:49:04 -07:00
|
|
|
if (
|
|
|
|
|
body.name &&
|
|
|
|
|
body.name.trim() !== name &&
|
|
|
|
|
SystemRoles[body.name.trim() as keyof typeof SystemRoles]
|
|
|
|
|
) {
|
2026-03-25 11:22:25 -07:00
|
|
|
return res.status(409).json({ error: 'Cannot rename to a reserved system role name' });
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-24 23:40:12 -07:00
|
|
|
const existing = await getRoleByName(name);
|
|
|
|
|
if (!existing) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const updates: Partial<IRole> = {};
|
|
|
|
|
if (body.name !== undefined) {
|
|
|
|
|
updates.name = body.name;
|
|
|
|
|
}
|
2026-03-25 10:51:09 -07:00
|
|
|
if (body.description !== undefined) {
|
|
|
|
|
updates.description = body.description;
|
|
|
|
|
}
|
2026-03-24 23:40:12 -07:00
|
|
|
|
|
|
|
|
const role = await updateRoleByName(name, updates);
|
|
|
|
|
return res.status(200).json({ role });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] updateRole error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to update role' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function updateRolePermissionsHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
const { permissions } = req.body as {
|
|
|
|
|
permissions: Record<string, Record<string, boolean>>;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if (!permissions || typeof permissions !== 'object') {
|
|
|
|
|
return res.status(400).json({ error: 'permissions object is required' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const existing = await getRoleByName(name);
|
|
|
|
|
if (!existing) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
await updateAccessPermissions(name, permissions, existing);
|
|
|
|
|
const updated = await getRoleByName(name);
|
|
|
|
|
return res.status(200).json({ role: updated });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] updateRolePermissions error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to update role permissions' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function deleteRoleHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
if (SystemRoles[name as keyof typeof SystemRoles]) {
|
|
|
|
|
return res.status(403).json({ error: 'Cannot delete system role' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const existing = await getRoleByName(name);
|
|
|
|
|
if (!existing) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-25 08:56:38 -07:00
|
|
|
await deleteRoleByName(name);
|
2026-03-24 23:40:12 -07:00
|
|
|
return res.status(200).json({ success: true });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] deleteRole error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to delete role' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function getRoleMembersHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
const existing = await getRoleByName(name);
|
|
|
|
|
if (!existing) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-24 23:54:32 -07:00
|
|
|
const users = await listUsersByRole(name);
|
|
|
|
|
const members: AdminMember[] = users.map((u) => ({
|
|
|
|
|
userId: u._id?.toString() ?? '',
|
|
|
|
|
name: u.name ?? u._id?.toString() ?? '',
|
|
|
|
|
email: u.email ?? '',
|
|
|
|
|
avatarUrl: u.avatar,
|
|
|
|
|
}));
|
2026-03-24 23:40:12 -07:00
|
|
|
return res.status(200).json({ members });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] getRoleMembers error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to get role members' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function addRoleMemberHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name } = req.params as RoleNameParams;
|
|
|
|
|
const { userId } = req.body as { userId: string };
|
|
|
|
|
|
|
|
|
|
if (!userId || typeof userId !== 'string') {
|
|
|
|
|
return res.status(400).json({ error: 'userId is required' });
|
|
|
|
|
}
|
2026-03-25 11:22:25 -07:00
|
|
|
if (!isValidObjectIdString(userId)) {
|
|
|
|
|
return res.status(400).json({ error: 'Invalid user ID format' });
|
|
|
|
|
}
|
2026-03-24 23:40:12 -07:00
|
|
|
|
|
|
|
|
const existing = await getRoleByName(name);
|
|
|
|
|
if (!existing) {
|
|
|
|
|
return res.status(404).json({ error: 'Role not found' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const user = await findUser({ _id: userId });
|
|
|
|
|
if (!user) {
|
|
|
|
|
return res.status(404).json({ error: 'User not found' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
await updateUser(userId, { role: name });
|
|
|
|
|
return res.status(200).json({ success: true });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] addRoleMember error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to add role member' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async function removeRoleMemberHandler(req: ServerRequest, res: Response) {
|
|
|
|
|
try {
|
|
|
|
|
const { name, userId } = req.params as RoleMemberParams;
|
2026-03-25 11:22:25 -07:00
|
|
|
if (!isValidObjectIdString(userId)) {
|
|
|
|
|
return res.status(400).json({ error: 'Invalid user ID format' });
|
|
|
|
|
}
|
2026-03-24 23:40:12 -07:00
|
|
|
|
|
|
|
|
const user = await findUser({ _id: userId });
|
|
|
|
|
if (!user) {
|
|
|
|
|
return res.status(404).json({ error: 'User not found' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (user.role !== name) {
|
|
|
|
|
return res.status(400).json({ error: 'User is not a member of this role' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
await updateUser(userId, { role: SystemRoles.USER });
|
|
|
|
|
return res.status(200).json({ success: true });
|
|
|
|
|
} catch (error) {
|
|
|
|
|
logger.error('[adminRoles] removeRoleMember error:', error);
|
|
|
|
|
return res.status(500).json({ error: 'Failed to remove role member' });
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return {
|
|
|
|
|
listRoles: listRolesHandler,
|
|
|
|
|
getRole: getRoleHandler,
|
|
|
|
|
createRole: createRoleHandler,
|
|
|
|
|
updateRole: updateRoleHandler,
|
|
|
|
|
updateRolePermissions: updateRolePermissionsHandler,
|
|
|
|
|
deleteRole: deleteRoleHandler,
|
|
|
|
|
getRoleMembers: getRoleMembersHandler,
|
|
|
|
|
addRoleMember: addRoleMemberHandler,
|
|
|
|
|
removeRoleMember: removeRoleMemberHandler,
|
|
|
|
|
};
|
|
|
|
|
}
|