auth.ts 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. import { NextRequest } from "next/server";
  2. import { getServerSideConfig } from "../config/server";
  3. import md5 from "spark-md5";
  4. import { ACCESS_CODE_PREFIX, ModelProvider } from "../constant";
  5. function getIP(req: NextRequest) {
  6. let ip = req.ip ?? req.headers.get("x-real-ip");
  7. const forwardedFor = req.headers.get("x-forwarded-for");
  8. if (!ip && forwardedFor) {
  9. ip = forwardedFor.split(",").at(0) ?? "";
  10. }
  11. return ip;
  12. }
  13. function parseApiKey(bearToken: string) {
  14. const token = bearToken.trim().replaceAll("Bearer ", "").trim();
  15. const isApiKey = !token.startsWith(ACCESS_CODE_PREFIX);
  16. return {
  17. accessCode: isApiKey ? "" : token.slice(ACCESS_CODE_PREFIX.length),
  18. apiKey: isApiKey ? token : "",
  19. };
  20. }
  21. export function auth(req: NextRequest, modelProvider: ModelProvider) {
  22. const authToken = req.headers.get("Authorization") ?? "";
  23. // check if it is openai api key or user token
  24. const { accessCode, apiKey } = parseApiKey(authToken);
  25. const hashedCode = md5.hash(accessCode ?? "").trim();
  26. const serverConfig = getServerSideConfig();
  27. console.log("[Auth] allowed hashed codes: ", [...serverConfig.codes]);
  28. console.log("[Auth] got access code:", accessCode);
  29. console.log("[Auth] hashed access code:", hashedCode);
  30. console.log("[User IP] ", getIP(req));
  31. console.log("[Time] ", new Date().toLocaleString());
  32. console.log("[ModelProvider] ", modelProvider);
  33. if (serverConfig.needCode && !serverConfig.codes.has(hashedCode) && !apiKey) {
  34. return {
  35. error: true,
  36. msg: !accessCode ? "empty access code" : "wrong access code",
  37. };
  38. }
  39. if (serverConfig.hideUserApiKey && !!apiKey) {
  40. return {
  41. error: true,
  42. msg: "you are not allowed to access with your own api key",
  43. };
  44. }
  45. // if user does not provide an api key, inject system api key
  46. if (!apiKey) {
  47. const serverConfig = getServerSideConfig();
  48. // const systemApiKey =
  49. // modelProvider === ModelProvider.GeminiPro
  50. // ? serverConfig.googleApiKey
  51. // : serverConfig.isAzure
  52. // ? serverConfig.azureApiKey
  53. // : serverConfig.apiKey;
  54. let systemApiKey: string | undefined;
  55. switch (modelProvider) {
  56. case ModelProvider.Stability:
  57. systemApiKey = serverConfig.stabilityApiKey;
  58. break;
  59. case ModelProvider.GeminiPro:
  60. systemApiKey = serverConfig.googleApiKey;
  61. break;
  62. case ModelProvider.Claude:
  63. systemApiKey = serverConfig.anthropicApiKey;
  64. break;
  65. case ModelProvider.Doubao:
  66. systemApiKey = serverConfig.bytedanceApiKey;
  67. break;
  68. case ModelProvider.Ernie:
  69. systemApiKey = serverConfig.baiduApiKey;
  70. break;
  71. case ModelProvider.Qwen:
  72. systemApiKey = serverConfig.alibabaApiKey;
  73. break;
  74. case ModelProvider.Moonshot:
  75. systemApiKey = serverConfig.moonshotApiKey;
  76. break;
  77. case ModelProvider.Iflytek:
  78. systemApiKey =
  79. serverConfig.iflytekApiKey + ":" + serverConfig.iflytekApiSecret;
  80. break;
  81. case ModelProvider.GPT:
  82. default:
  83. if (req.nextUrl.pathname.includes("azure/deployments")) {
  84. systemApiKey = serverConfig.azureApiKey;
  85. } else {
  86. systemApiKey = serverConfig.apiKey;
  87. }
  88. }
  89. if (systemApiKey) {
  90. console.log("[Auth] use system api key");
  91. req.headers.set("Authorization", `Bearer ${systemApiKey}`);
  92. } else {
  93. console.log("[Auth] admin did not provide an api key");
  94. }
  95. } else {
  96. console.log("[Auth] use user api key");
  97. }
  98. return {
  99. error: false,
  100. };
  101. }