@payez/next-mvp 4.0.0 → 4.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (81) hide show
  1. package/dist/api-handlers/account/change-password.js +110 -110
  2. package/dist/api-handlers/admin/analytics.d.ts +19 -19
  3. package/dist/api-handlers/admin/analytics.js +378 -378
  4. package/dist/api-handlers/admin/audit.d.ts +19 -19
  5. package/dist/api-handlers/admin/audit.js +213 -213
  6. package/dist/api-handlers/admin/index.d.ts +21 -21
  7. package/dist/api-handlers/admin/index.js +42 -42
  8. package/dist/api-handlers/admin/redis-sessions.d.ts +35 -35
  9. package/dist/api-handlers/admin/redis-sessions.js +203 -203
  10. package/dist/api-handlers/admin/sessions.d.ts +20 -20
  11. package/dist/api-handlers/admin/sessions.js +283 -283
  12. package/dist/api-handlers/admin/site-logs.d.ts +45 -45
  13. package/dist/api-handlers/admin/site-logs.js +317 -317
  14. package/dist/api-handlers/admin/stats.d.ts +20 -20
  15. package/dist/api-handlers/admin/stats.js +239 -239
  16. package/dist/api-handlers/admin/users.d.ts +19 -19
  17. package/dist/api-handlers/admin/users.js +221 -221
  18. package/dist/api-handlers/admin/vibe-data.d.ts +79 -79
  19. package/dist/api-handlers/admin/vibe-data.js +267 -267
  20. package/dist/api-handlers/auth/refresh.js +633 -633
  21. package/dist/api-handlers/auth/signout.js +186 -186
  22. package/dist/api-handlers/auth/verify-code.d.ts +43 -43
  23. package/dist/api-handlers/auth/verify-code.js +90 -90
  24. package/dist/api-handlers/session/viability.js +114 -114
  25. package/dist/api-handlers/test/force-expire.js +59 -59
  26. package/dist/auth/auth-decision.js +182 -182
  27. package/dist/auth/utils/token-utils.d.ts +83 -83
  28. package/dist/auth/utils/token-utils.js +218 -218
  29. package/dist/client/AuthContext.js +115 -115
  30. package/dist/client/better-auth-client.d.ts +1020 -1020
  31. package/dist/components/SessionSync.js +121 -121
  32. package/dist/components/account/MobileNavDrawer.js +64 -64
  33. package/dist/components/account/UserAvatarMenu.js +91 -91
  34. package/dist/components/admin/VibeAdminLayout.js +71 -71
  35. package/dist/hooks/useAuthSettings.js +93 -93
  36. package/dist/hooks/useAvailableProviders.d.ts +43 -43
  37. package/dist/hooks/useAvailableProviders.js +112 -112
  38. package/dist/lib/app-slug.d.ts +95 -95
  39. package/dist/lib/app-slug.js +172 -172
  40. package/dist/lib/test-aware-get-token.js +86 -86
  41. package/dist/lib/token-lifecycle.d.ts +78 -78
  42. package/dist/lib/token-lifecycle.js +360 -360
  43. package/dist/pages/admin-login/page.js +73 -73
  44. package/dist/pages/client-admin/ClientSiteAdminPage.js +179 -179
  45. package/dist/pages/login/page.js +202 -202
  46. package/dist/pages/showcase/ShowcasePage.js +142 -142
  47. package/dist/pages/test-env/EmergencyLogoutPage.js +99 -99
  48. package/dist/pages/test-env/JwtInspectPage.js +116 -116
  49. package/dist/pages/test-env/TestEnvPage.js +51 -51
  50. package/dist/pages/verify-code/page.js +412 -412
  51. package/dist/routes/auth/logout.d.ts +31 -31
  52. package/dist/routes/auth/logout.js +98 -98
  53. package/dist/routes/auth/session.js +157 -157
  54. package/dist/routes/auth/viability.js +190 -190
  55. package/package.json +6 -16
  56. package/dist/auth/auth-options.d.ts +0 -57
  57. package/dist/auth/auth-options.js +0 -213
  58. package/dist/auth/callbacks/index.d.ts +0 -6
  59. package/dist/auth/callbacks/index.js +0 -12
  60. package/dist/auth/callbacks/jwt.d.ts +0 -45
  61. package/dist/auth/callbacks/jwt.js +0 -305
  62. package/dist/auth/callbacks/session.d.ts +0 -60
  63. package/dist/auth/callbacks/session.js +0 -170
  64. package/dist/auth/callbacks/signin.d.ts +0 -23
  65. package/dist/auth/callbacks/signin.js +0 -44
  66. package/dist/auth/events/index.d.ts +0 -4
  67. package/dist/auth/events/index.js +0 -8
  68. package/dist/auth/events/signout.d.ts +0 -17
  69. package/dist/auth/events/signout.js +0 -32
  70. package/dist/auth/providers/credentials.d.ts +0 -32
  71. package/dist/auth/providers/credentials.js +0 -223
  72. package/dist/auth/providers/index.d.ts +0 -5
  73. package/dist/auth/providers/index.js +0 -21
  74. package/dist/auth/providers/oauth.d.ts +0 -26
  75. package/dist/auth/providers/oauth.js +0 -105
  76. package/dist/lib/nextauth-secret.d.ts +0 -10
  77. package/dist/lib/nextauth-secret.js +0 -100
  78. package/dist/pages/profile/profile-patch.d.ts +0 -1
  79. package/dist/pages/profile/profile-patch.js +0 -281
  80. package/dist/pages/security/security-patch.d.ts +0 -1
  81. package/dist/pages/security/security-patch.js +0 -302
@@ -1,317 +1,317 @@
1
- "use strict";
2
- /**
3
- * Admin Site Logs API Handlers
4
- *
5
- * Provides admin-level access to site activity logs.
6
- * - GET /site-logs - Query logs from Vibe
7
- * - POST /site-logs - Create test log entries via Redis queue
8
- * - GET /site-logs/stats - Aggregated stats { total, unique_users, by_level, by_category }
9
- * - POST /site-logs/drain - Manual drain trigger
10
- * - GET /site-logs/queue - Redis queue status
11
- *
12
- * @version 1.0
13
- * @requires Admin role (vibe_app_admin or payez_admin)
14
- */
15
- Object.defineProperty(exports, "__esModule", { value: true });
16
- exports.createSiteLogsHandler = createSiteLogsHandler;
17
- exports.createSiteLogsStatsHandler = createSiteLogsStatsHandler;
18
- exports.createSiteLogsDrainHandler = createSiteLogsDrainHandler;
19
- exports.createSiteLogsQueueHandler = createSiteLogsQueueHandler;
20
- const server_1 = require("next/server");
21
- const auth_1 = require("../../server/auth");
22
- const redis_1 = require("../../lib/redis");
23
- const roles_1 = require("../../lib/roles");
24
- const REDIS_SITE_LOG_KEY = 'vibe:site-logs:pending';
25
- const REDIS_LOG_TTL = 7 * 24 * 60 * 60; // 1 week
26
- /**
27
- * Check if the current user has admin role
28
- */
29
- async function checkAdminRole(request) {
30
- const session = await (0, auth_1.getSession)(request);
31
- if (!session?.user) {
32
- return {
33
- isAdmin: false,
34
- error: server_1.NextResponse.json({ success: false, error: 'Please sign in' }, { status: 401 }),
35
- };
36
- }
37
- const userRoles = session.user?.roles || [];
38
- const hasAdminRole = roles_1.ADMIN_ROLES.some(role => userRoles.includes(role));
39
- if (!hasAdminRole) {
40
- return {
41
- isAdmin: false,
42
- error: server_1.NextResponse.json({ success: false, error: 'Admin access required' }, { status: 403 }),
43
- };
44
- }
45
- return {
46
- isAdmin: true,
47
- userId: session.user?.id,
48
- accessToken: session.accessToken,
49
- clientId: session.clientId,
50
- };
51
- }
52
- function getVibeApiUrl(config) {
53
- if (config.vibeApiUrl)
54
- return config.vibeApiUrl;
55
- const url = process.env.VIBE_API_URL;
56
- if (url)
57
- return url;
58
- if (process.env.NODE_ENV !== 'production')
59
- return 'http://localhost:37933';
60
- throw new Error('VIBE_API_URL is required in production');
61
- }
62
- /**
63
- * Create main site-logs handler (GET query, POST create test entries)
64
- */
65
- function createSiteLogsHandler(config) {
66
- return {
67
- async GET(request) {
68
- const adminCheck = await checkAdminRole(request);
69
- if (adminCheck.error)
70
- return adminCheck.error;
71
- const { searchParams } = new URL(request.url);
72
- const vibeUrl = getVibeApiUrl(config);
73
- // Forward query params
74
- const params = new URLSearchParams();
75
- if (searchParams.get('level'))
76
- params.set('level', searchParams.get('level'));
77
- if (searchParams.get('category'))
78
- params.set('category', searchParams.get('category'));
79
- if (searchParams.get('search'))
80
- params.set('search', searchParams.get('search'));
81
- if (searchParams.get('from'))
82
- params.set('from', searchParams.get('from'));
83
- if (searchParams.get('to'))
84
- params.set('to', searchParams.get('to'));
85
- if (searchParams.get('user_id'))
86
- params.set('user_id', searchParams.get('user_id'));
87
- if (searchParams.get('limit'))
88
- params.set('limit', searchParams.get('limit'));
89
- if (searchParams.get('offset'))
90
- params.set('offset', searchParams.get('offset'));
91
- const headers = {
92
- 'Authorization': `Bearer ${adminCheck.accessToken}`,
93
- 'Content-Type': 'application/json',
94
- };
95
- if (adminCheck.clientId) {
96
- headers['X-Client-Id'] = adminCheck.clientId;
97
- }
98
- try {
99
- const response = await fetch(`${vibeUrl}/v1/admin/site-logs?${params}`, { headers });
100
- if (!response.ok) {
101
- const errorText = await response.text();
102
- console.error('[admin/site-logs] Vibe error:', response.status, errorText);
103
- return server_1.NextResponse.json({ error: 'Failed to fetch site logs', details: errorText }, { status: response.status });
104
- }
105
- const data = await response.json();
106
- return server_1.NextResponse.json(data);
107
- }
108
- catch (error) {
109
- console.error('[admin/site-logs] Error:', error);
110
- return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
111
- }
112
- },
113
- async POST(request) {
114
- const adminCheck = await checkAdminRole(request);
115
- if (adminCheck.error)
116
- return adminCheck.error;
117
- try {
118
- const body = await request.json();
119
- const redis = (0, redis_1.getRedis)();
120
- const userAgent = request.headers.get('user-agent') || null;
121
- const ipAddress = request.headers.get('x-forwarded-for')?.split(',')[0] || null;
122
- const baseRecord = {
123
- user_agent: userAgent,
124
- ip_address: ipAddress,
125
- created_at: new Date().toISOString(),
126
- app_slug: config.appSlug || process.env.APP_SLUG || process.env.CLIENT_ID || 'unknown',
127
- vibe_client_id: config.vibeClientId || process.env.VIBE_CLIENT_ID || '',
128
- };
129
- // If generateAll=true, create one of each event type
130
- if (body.generate_all) {
131
- const testEvents = [
132
- { log_level: 'debug', category: 'api', message: 'Test: API request traced', context: { endpoint: '/api/test', method: 'GET' }, url: '/api/test' },
133
- { log_level: 'info', category: 'auth', message: 'Test: User logged in', context: { method: 'password' }, user_id: 1, url: '/api/auth/callback' },
134
- { log_level: 'info', category: 'page_view', message: 'Test: Page viewed', context: { referrer: '/dashboard' }, user_id: 1, url: '/admin/activity' },
135
- { log_level: 'info', category: 'user_action', message: 'Test: Button clicked', context: { target: 'submit-btn' }, user_id: 1, url: '/admin/activity' },
136
- { log_level: 'warn', category: 'auth', message: 'Test: Login failed', context: { reason: 'invalid_password' }, url: '/api/auth/login' },
137
- { log_level: 'error', category: 'error', message: 'Test: Application error', context: { error: 'TestError', stack: 'at test()' }, url: '/api/test' },
138
- ];
139
- for (const event of testEvents) {
140
- const logRecord = JSON.stringify({ ...baseRecord, ...event, session_id: null });
141
- await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
142
- }
143
- await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
144
- const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
145
- return server_1.NextResponse.json({
146
- success: true,
147
- message: `Created ${testEvents.length} test events`,
148
- queue_length: queueLen,
149
- events: testEvents.map(e => ({ level: e.log_level, category: e.category, message: e.message })),
150
- note: 'Events will appear after drain service processes them',
151
- }, { status: 201 });
152
- }
153
- // Single event creation
154
- const logRecord = JSON.stringify({
155
- ...baseRecord,
156
- log_level: body.level || 'info',
157
- category: body.category || 'user_action',
158
- message: body.message || 'Test log entry',
159
- context: body.context || { source: 'admin-test' },
160
- user_id: body.user_id || null,
161
- session_id: null,
162
- url: body.url || '/admin/activity',
163
- });
164
- await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
165
- await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
166
- const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
167
- return server_1.NextResponse.json({
168
- success: true,
169
- message: 'Test log created',
170
- queue_length: queueLen,
171
- note: 'Log will appear after drain service processes it (every 5 seconds)',
172
- }, { status: 201 });
173
- }
174
- catch (error) {
175
- console.error('[admin/site-logs] POST Error:', error);
176
- return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
177
- }
178
- },
179
- };
180
- }
181
- /**
182
- * Create site-logs stats handler
183
- * Returns: { total, unique_users, by_level, by_category }
184
- */
185
- function createSiteLogsStatsHandler(config) {
186
- return {
187
- async GET(request) {
188
- const adminCheck = await checkAdminRole(request);
189
- if (adminCheck.error)
190
- return adminCheck.error;
191
- const { searchParams } = new URL(request.url);
192
- const vibeUrl = getVibeApiUrl(config);
193
- const params = new URLSearchParams();
194
- if (searchParams.get('from'))
195
- params.set('from', searchParams.get('from'));
196
- if (searchParams.get('to'))
197
- params.set('to', searchParams.get('to'));
198
- const headers = {
199
- 'Authorization': `Bearer ${adminCheck.accessToken}`,
200
- 'Content-Type': 'application/json',
201
- };
202
- if (adminCheck.clientId) {
203
- headers['X-Client-Id'] = adminCheck.clientId;
204
- }
205
- try {
206
- const response = await fetch(`${vibeUrl}/v1/admin/site-logs/stats?${params}`, { headers });
207
- if (!response.ok) {
208
- const errorText = await response.text();
209
- console.error('[admin/site-logs/stats] Vibe error:', response.status, errorText);
210
- return server_1.NextResponse.json({ error: 'Failed to fetch stats', details: errorText }, { status: response.status });
211
- }
212
- const data = await response.json();
213
- // Ensure response matches expected format: { total, unique_users, by_level, by_category }
214
- return server_1.NextResponse.json(data);
215
- }
216
- catch (error) {
217
- console.error('[admin/site-logs/stats] Error:', error);
218
- return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
219
- }
220
- },
221
- };
222
- }
223
- /**
224
- * Create site-logs drain handler (manual trigger)
225
- */
226
- function createSiteLogsDrainHandler(config) {
227
- return {
228
- async POST(request) {
229
- const adminCheck = await checkAdminRole(request);
230
- if (adminCheck.error)
231
- return adminCheck.error;
232
- const { searchParams } = new URL(request.url);
233
- const maxEntries = searchParams.get('max_entries') || '100';
234
- const vibeUrl = getVibeApiUrl(config);
235
- const headers = {
236
- 'Authorization': `Bearer ${adminCheck.accessToken}`,
237
- 'Content-Type': 'application/json',
238
- };
239
- if (adminCheck.clientId) {
240
- headers['X-Client-Id'] = adminCheck.clientId;
241
- }
242
- try {
243
- const response = await fetch(`${vibeUrl}/v1/admin/site-logs/drain?maxEntries=${maxEntries}`, {
244
- method: 'POST',
245
- headers,
246
- });
247
- if (!response.ok) {
248
- const errorText = await response.text();
249
- console.error('[admin/site-logs/drain] Vibe error:', response.status, errorText);
250
- return server_1.NextResponse.json({ error: 'Failed to drain site logs', details: errorText }, { status: response.status });
251
- }
252
- const data = await response.json();
253
- return server_1.NextResponse.json(data);
254
- }
255
- catch (error) {
256
- console.error('[admin/site-logs/drain] Error:', error);
257
- return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
258
- }
259
- },
260
- };
261
- }
262
- /**
263
- * Create site-logs queue status handler
264
- */
265
- function createSiteLogsQueueHandler(config) {
266
- return {
267
- async GET(request) {
268
- const adminCheck = await checkAdminRole(request);
269
- if (adminCheck.error)
270
- return adminCheck.error;
271
- try {
272
- const redis = (0, redis_1.getRedis)();
273
- const queueLength = await redis.llen(REDIS_SITE_LOG_KEY);
274
- // Peek at the oldest and newest entries
275
- let oldest_entry = null;
276
- let newest_entry = null;
277
- if (queueLength > 0) {
278
- const oldest = await redis.lindex(REDIS_SITE_LOG_KEY, -1); // RPOP side (oldest)
279
- const newest = await redis.lindex(REDIS_SITE_LOG_KEY, 0); // LPUSH side (newest)
280
- if (oldest) {
281
- try {
282
- const parsed = JSON.parse(oldest);
283
- oldest_entry = {
284
- message: parsed.message,
285
- level: parsed.log_level,
286
- timestamp: parsed.created_at || parsed.queued_at,
287
- };
288
- }
289
- catch { }
290
- }
291
- if (newest) {
292
- try {
293
- const parsed = JSON.parse(newest);
294
- newest_entry = {
295
- message: parsed.message,
296
- level: parsed.log_level,
297
- timestamp: parsed.created_at || parsed.queued_at,
298
- };
299
- }
300
- catch { }
301
- }
302
- }
303
- return server_1.NextResponse.json({
304
- queue_length: queueLength,
305
- redis_key: REDIS_SITE_LOG_KEY,
306
- oldest_entry,
307
- newest_entry,
308
- status: queueLength === 0 ? 'empty' : 'pending',
309
- });
310
- }
311
- catch (error) {
312
- console.error('[admin/site-logs/queue] Error:', error);
313
- return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
314
- }
315
- },
316
- };
317
- }
1
+ "use strict";
2
+ /**
3
+ * Admin Site Logs API Handlers
4
+ *
5
+ * Provides admin-level access to site activity logs.
6
+ * - GET /site-logs - Query logs from Vibe
7
+ * - POST /site-logs - Create test log entries via Redis queue
8
+ * - GET /site-logs/stats - Aggregated stats { total, unique_users, by_level, by_category }
9
+ * - POST /site-logs/drain - Manual drain trigger
10
+ * - GET /site-logs/queue - Redis queue status
11
+ *
12
+ * @version 1.0
13
+ * @requires Admin role (vibe_app_admin or payez_admin)
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.createSiteLogsHandler = createSiteLogsHandler;
17
+ exports.createSiteLogsStatsHandler = createSiteLogsStatsHandler;
18
+ exports.createSiteLogsDrainHandler = createSiteLogsDrainHandler;
19
+ exports.createSiteLogsQueueHandler = createSiteLogsQueueHandler;
20
+ const server_1 = require("next/server");
21
+ const auth_1 = require("../../server/auth");
22
+ const redis_1 = require("../../lib/redis");
23
+ const roles_1 = require("../../lib/roles");
24
+ const REDIS_SITE_LOG_KEY = 'vibe:site-logs:pending';
25
+ const REDIS_LOG_TTL = 7 * 24 * 60 * 60; // 1 week
26
+ /**
27
+ * Check if the current user has admin role
28
+ */
29
+ async function checkAdminRole(request) {
30
+ const session = await (0, auth_1.getSession)(request);
31
+ if (!session?.user) {
32
+ return {
33
+ isAdmin: false,
34
+ error: server_1.NextResponse.json({ success: false, error: 'Please sign in' }, { status: 401 }),
35
+ };
36
+ }
37
+ const userRoles = session.user?.roles || [];
38
+ const hasAdminRole = roles_1.ADMIN_ROLES.some(role => userRoles.includes(role));
39
+ if (!hasAdminRole) {
40
+ return {
41
+ isAdmin: false,
42
+ error: server_1.NextResponse.json({ success: false, error: 'Admin access required' }, { status: 403 }),
43
+ };
44
+ }
45
+ return {
46
+ isAdmin: true,
47
+ userId: session.user?.id,
48
+ accessToken: session.accessToken,
49
+ clientId: session.clientId,
50
+ };
51
+ }
52
+ function getVibeApiUrl(config) {
53
+ if (config.vibeApiUrl)
54
+ return config.vibeApiUrl;
55
+ const url = process.env.VIBE_API_URL;
56
+ if (url)
57
+ return url;
58
+ if (process.env.NODE_ENV !== 'production')
59
+ return 'http://localhost:37933';
60
+ throw new Error('VIBE_API_URL is required in production');
61
+ }
62
+ /**
63
+ * Create main site-logs handler (GET query, POST create test entries)
64
+ */
65
+ function createSiteLogsHandler(config) {
66
+ return {
67
+ async GET(request) {
68
+ const adminCheck = await checkAdminRole(request);
69
+ if (adminCheck.error)
70
+ return adminCheck.error;
71
+ const { searchParams } = new URL(request.url);
72
+ const vibeUrl = getVibeApiUrl(config);
73
+ // Forward query params
74
+ const params = new URLSearchParams();
75
+ if (searchParams.get('level'))
76
+ params.set('level', searchParams.get('level'));
77
+ if (searchParams.get('category'))
78
+ params.set('category', searchParams.get('category'));
79
+ if (searchParams.get('search'))
80
+ params.set('search', searchParams.get('search'));
81
+ if (searchParams.get('from'))
82
+ params.set('from', searchParams.get('from'));
83
+ if (searchParams.get('to'))
84
+ params.set('to', searchParams.get('to'));
85
+ if (searchParams.get('user_id'))
86
+ params.set('user_id', searchParams.get('user_id'));
87
+ if (searchParams.get('limit'))
88
+ params.set('limit', searchParams.get('limit'));
89
+ if (searchParams.get('offset'))
90
+ params.set('offset', searchParams.get('offset'));
91
+ const headers = {
92
+ 'Authorization': `Bearer ${adminCheck.accessToken}`,
93
+ 'Content-Type': 'application/json',
94
+ };
95
+ if (adminCheck.clientId) {
96
+ headers['X-Client-Id'] = adminCheck.clientId;
97
+ }
98
+ try {
99
+ const response = await fetch(`${vibeUrl}/v1/admin/site-logs?${params}`, { headers });
100
+ if (!response.ok) {
101
+ const errorText = await response.text();
102
+ console.error('[admin/site-logs] Vibe error:', response.status, errorText);
103
+ return server_1.NextResponse.json({ error: 'Failed to fetch site logs', details: errorText }, { status: response.status });
104
+ }
105
+ const data = await response.json();
106
+ return server_1.NextResponse.json(data);
107
+ }
108
+ catch (error) {
109
+ console.error('[admin/site-logs] Error:', error);
110
+ return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
111
+ }
112
+ },
113
+ async POST(request) {
114
+ const adminCheck = await checkAdminRole(request);
115
+ if (adminCheck.error)
116
+ return adminCheck.error;
117
+ try {
118
+ const body = await request.json();
119
+ const redis = (0, redis_1.getRedis)();
120
+ const userAgent = request.headers.get('user-agent') || null;
121
+ const ipAddress = request.headers.get('x-forwarded-for')?.split(',')[0] || null;
122
+ const baseRecord = {
123
+ user_agent: userAgent,
124
+ ip_address: ipAddress,
125
+ created_at: new Date().toISOString(),
126
+ app_slug: config.appSlug || process.env.APP_SLUG || process.env.CLIENT_ID || 'unknown',
127
+ vibe_client_id: config.vibeClientId || process.env.VIBE_CLIENT_ID || '',
128
+ };
129
+ // If generateAll=true, create one of each event type
130
+ if (body.generate_all) {
131
+ const testEvents = [
132
+ { log_level: 'debug', category: 'api', message: 'Test: API request traced', context: { endpoint: '/api/test', method: 'GET' }, url: '/api/test' },
133
+ { log_level: 'info', category: 'auth', message: 'Test: User logged in', context: { method: 'password' }, user_id: 1, url: '/api/auth/callback' },
134
+ { log_level: 'info', category: 'page_view', message: 'Test: Page viewed', context: { referrer: '/dashboard' }, user_id: 1, url: '/admin/activity' },
135
+ { log_level: 'info', category: 'user_action', message: 'Test: Button clicked', context: { target: 'submit-btn' }, user_id: 1, url: '/admin/activity' },
136
+ { log_level: 'warn', category: 'auth', message: 'Test: Login failed', context: { reason: 'invalid_password' }, url: '/api/auth/login' },
137
+ { log_level: 'error', category: 'error', message: 'Test: Application error', context: { error: 'TestError', stack: 'at test()' }, url: '/api/test' },
138
+ ];
139
+ for (const event of testEvents) {
140
+ const logRecord = JSON.stringify({ ...baseRecord, ...event, session_id: null });
141
+ await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
142
+ }
143
+ await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
144
+ const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
145
+ return server_1.NextResponse.json({
146
+ success: true,
147
+ message: `Created ${testEvents.length} test events`,
148
+ queue_length: queueLen,
149
+ events: testEvents.map(e => ({ level: e.log_level, category: e.category, message: e.message })),
150
+ note: 'Events will appear after drain service processes them',
151
+ }, { status: 201 });
152
+ }
153
+ // Single event creation
154
+ const logRecord = JSON.stringify({
155
+ ...baseRecord,
156
+ log_level: body.level || 'info',
157
+ category: body.category || 'user_action',
158
+ message: body.message || 'Test log entry',
159
+ context: body.context || { source: 'admin-test' },
160
+ user_id: body.user_id || null,
161
+ session_id: null,
162
+ url: body.url || '/admin/activity',
163
+ });
164
+ await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
165
+ await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
166
+ const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
167
+ return server_1.NextResponse.json({
168
+ success: true,
169
+ message: 'Test log created',
170
+ queue_length: queueLen,
171
+ note: 'Log will appear after drain service processes it (every 5 seconds)',
172
+ }, { status: 201 });
173
+ }
174
+ catch (error) {
175
+ console.error('[admin/site-logs] POST Error:', error);
176
+ return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
177
+ }
178
+ },
179
+ };
180
+ }
181
+ /**
182
+ * Create site-logs stats handler
183
+ * Returns: { total, unique_users, by_level, by_category }
184
+ */
185
+ function createSiteLogsStatsHandler(config) {
186
+ return {
187
+ async GET(request) {
188
+ const adminCheck = await checkAdminRole(request);
189
+ if (adminCheck.error)
190
+ return adminCheck.error;
191
+ const { searchParams } = new URL(request.url);
192
+ const vibeUrl = getVibeApiUrl(config);
193
+ const params = new URLSearchParams();
194
+ if (searchParams.get('from'))
195
+ params.set('from', searchParams.get('from'));
196
+ if (searchParams.get('to'))
197
+ params.set('to', searchParams.get('to'));
198
+ const headers = {
199
+ 'Authorization': `Bearer ${adminCheck.accessToken}`,
200
+ 'Content-Type': 'application/json',
201
+ };
202
+ if (adminCheck.clientId) {
203
+ headers['X-Client-Id'] = adminCheck.clientId;
204
+ }
205
+ try {
206
+ const response = await fetch(`${vibeUrl}/v1/admin/site-logs/stats?${params}`, { headers });
207
+ if (!response.ok) {
208
+ const errorText = await response.text();
209
+ console.error('[admin/site-logs/stats] Vibe error:', response.status, errorText);
210
+ return server_1.NextResponse.json({ error: 'Failed to fetch stats', details: errorText }, { status: response.status });
211
+ }
212
+ const data = await response.json();
213
+ // Ensure response matches expected format: { total, unique_users, by_level, by_category }
214
+ return server_1.NextResponse.json(data);
215
+ }
216
+ catch (error) {
217
+ console.error('[admin/site-logs/stats] Error:', error);
218
+ return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
219
+ }
220
+ },
221
+ };
222
+ }
223
+ /**
224
+ * Create site-logs drain handler (manual trigger)
225
+ */
226
+ function createSiteLogsDrainHandler(config) {
227
+ return {
228
+ async POST(request) {
229
+ const adminCheck = await checkAdminRole(request);
230
+ if (adminCheck.error)
231
+ return adminCheck.error;
232
+ const { searchParams } = new URL(request.url);
233
+ const maxEntries = searchParams.get('max_entries') || '100';
234
+ const vibeUrl = getVibeApiUrl(config);
235
+ const headers = {
236
+ 'Authorization': `Bearer ${adminCheck.accessToken}`,
237
+ 'Content-Type': 'application/json',
238
+ };
239
+ if (adminCheck.clientId) {
240
+ headers['X-Client-Id'] = adminCheck.clientId;
241
+ }
242
+ try {
243
+ const response = await fetch(`${vibeUrl}/v1/admin/site-logs/drain?maxEntries=${maxEntries}`, {
244
+ method: 'POST',
245
+ headers,
246
+ });
247
+ if (!response.ok) {
248
+ const errorText = await response.text();
249
+ console.error('[admin/site-logs/drain] Vibe error:', response.status, errorText);
250
+ return server_1.NextResponse.json({ error: 'Failed to drain site logs', details: errorText }, { status: response.status });
251
+ }
252
+ const data = await response.json();
253
+ return server_1.NextResponse.json(data);
254
+ }
255
+ catch (error) {
256
+ console.error('[admin/site-logs/drain] Error:', error);
257
+ return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
258
+ }
259
+ },
260
+ };
261
+ }
262
+ /**
263
+ * Create site-logs queue status handler
264
+ */
265
+ function createSiteLogsQueueHandler(config) {
266
+ return {
267
+ async GET(request) {
268
+ const adminCheck = await checkAdminRole(request);
269
+ if (adminCheck.error)
270
+ return adminCheck.error;
271
+ try {
272
+ const redis = (0, redis_1.getRedis)();
273
+ const queueLength = await redis.llen(REDIS_SITE_LOG_KEY);
274
+ // Peek at the oldest and newest entries
275
+ let oldest_entry = null;
276
+ let newest_entry = null;
277
+ if (queueLength > 0) {
278
+ const oldest = await redis.lindex(REDIS_SITE_LOG_KEY, -1); // RPOP side (oldest)
279
+ const newest = await redis.lindex(REDIS_SITE_LOG_KEY, 0); // LPUSH side (newest)
280
+ if (oldest) {
281
+ try {
282
+ const parsed = JSON.parse(oldest);
283
+ oldest_entry = {
284
+ message: parsed.message,
285
+ level: parsed.log_level,
286
+ timestamp: parsed.created_at || parsed.queued_at,
287
+ };
288
+ }
289
+ catch { }
290
+ }
291
+ if (newest) {
292
+ try {
293
+ const parsed = JSON.parse(newest);
294
+ newest_entry = {
295
+ message: parsed.message,
296
+ level: parsed.log_level,
297
+ timestamp: parsed.created_at || parsed.queued_at,
298
+ };
299
+ }
300
+ catch { }
301
+ }
302
+ }
303
+ return server_1.NextResponse.json({
304
+ queue_length: queueLength,
305
+ redis_key: REDIS_SITE_LOG_KEY,
306
+ oldest_entry,
307
+ newest_entry,
308
+ status: queueLength === 0 ? 'empty' : 'pending',
309
+ });
310
+ }
311
+ catch (error) {
312
+ console.error('[admin/site-logs/queue] Error:', error);
313
+ return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
314
+ }
315
+ },
316
+ };
317
+ }