auth.ts 2.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. import { NextRequest } from "next/server";
  2. import { getServerSideConfig } from "../config/server";
  3. import md5 from "spark-md5";
  4. import { ACCESS_CODE_PREFIX, ModelProvider } from "../constant";
  5. function getIP(req: NextRequest) {
  6. let ip = req.ip ?? req.headers.get("x-real-ip");
  7. const forwardedFor = req.headers.get("x-forwarded-for");
  8. if (!ip && forwardedFor) {
  9. ip = forwardedFor.split(",").at(0) ?? "";
  10. }
  11. return ip;
  12. }
  13. function parseApiKey(bearToken: string) {
  14. const token = bearToken.trim().replaceAll("Bearer ", "").trim();
  15. const isApiKey = !token.startsWith(ACCESS_CODE_PREFIX);
  16. return {
  17. accessCode: isApiKey ? "" : token.slice(ACCESS_CODE_PREFIX.length),
  18. apiKey: isApiKey ? token : "",
  19. };
  20. }
  21. export function auth(req: NextRequest, modelProvider: ModelProvider) {
  22. const authToken = req.headers.get("Authorization") ?? "";
  23. // check if it is openai api key or user token
  24. const { accessCode, apiKey } = parseApiKey(authToken);
  25. const hashedCode = md5.hash(accessCode ?? "").trim();
  26. const serverConfig = getServerSideConfig();
  27. console.log("[Auth] allowed hashed codes: ", [...serverConfig.codes]);
  28. console.log("[Auth] got access code:", accessCode);
  29. console.log("[Auth] hashed access code:", hashedCode);
  30. console.log("[User IP] ", getIP(req));
  31. console.log("[Time] ", new Date().toLocaleString());
  32. if (serverConfig.needCode && !serverConfig.codes.has(hashedCode) && !apiKey) {
  33. return {
  34. error: true,
  35. msg: !accessCode ? "empty access code" : "wrong access code",
  36. };
  37. }
  38. if (serverConfig.hideUserApiKey && !!apiKey) {
  39. return {
  40. error: true,
  41. msg: "you are not allowed to access with your own api key",
  42. };
  43. }
  44. // if user does not provide an api key, inject system api key
  45. if (!apiKey) {
  46. const serverConfig = getServerSideConfig();
  47. // const systemApiKey =
  48. // modelProvider === ModelProvider.GeminiPro
  49. // ? serverConfig.googleApiKey
  50. // : serverConfig.isAzure
  51. // ? serverConfig.azureApiKey
  52. // : serverConfig.apiKey;
  53. let systemApiKey: string | undefined;
  54. switch (modelProvider) {
  55. case ModelProvider.GeminiPro:
  56. systemApiKey = serverConfig.googleApiKey;
  57. break;
  58. case ModelProvider.Claude:
  59. systemApiKey = serverConfig.anthropicApiKey;
  60. break;
  61. case ModelProvider.GPT:
  62. default:
  63. if (serverConfig.isAzure) {
  64. systemApiKey = serverConfig.azureApiKey;
  65. } else {
  66. systemApiKey = serverConfig.apiKey;
  67. }
  68. }
  69. if (systemApiKey) {
  70. console.log("[Auth] use system api key");
  71. req.headers.set("Authorization", `Bearer ${systemApiKey}`);
  72. } else {
  73. console.log("[Auth] admin did not provide an api key");
  74. }
  75. } else {
  76. console.log("[Auth] use user api key");
  77. }
  78. return {
  79. error: false,
  80. };
  81. }