@payez/next-mvp 4.0.0 → 4.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api-handlers/account/change-password.js +110 -110
- package/dist/api-handlers/admin/analytics.d.ts +19 -19
- package/dist/api-handlers/admin/analytics.js +378 -378
- package/dist/api-handlers/admin/audit.d.ts +19 -19
- package/dist/api-handlers/admin/audit.js +213 -213
- package/dist/api-handlers/admin/index.d.ts +21 -21
- package/dist/api-handlers/admin/index.js +42 -42
- package/dist/api-handlers/admin/redis-sessions.d.ts +35 -35
- package/dist/api-handlers/admin/redis-sessions.js +203 -203
- package/dist/api-handlers/admin/sessions.d.ts +20 -20
- package/dist/api-handlers/admin/sessions.js +283 -283
- package/dist/api-handlers/admin/site-logs.d.ts +45 -45
- package/dist/api-handlers/admin/site-logs.js +317 -317
- package/dist/api-handlers/admin/stats.d.ts +20 -20
- package/dist/api-handlers/admin/stats.js +239 -239
- package/dist/api-handlers/admin/users.d.ts +19 -19
- package/dist/api-handlers/admin/users.js +221 -221
- package/dist/api-handlers/admin/vibe-data.d.ts +79 -79
- package/dist/api-handlers/admin/vibe-data.js +267 -267
- package/dist/api-handlers/auth/refresh.js +633 -633
- package/dist/api-handlers/auth/signout.js +186 -186
- package/dist/api-handlers/auth/verify-code.d.ts +43 -43
- package/dist/api-handlers/auth/verify-code.js +90 -90
- package/dist/api-handlers/session/viability.js +114 -114
- package/dist/api-handlers/test/force-expire.js +59 -59
- package/dist/auth/auth-decision.js +182 -182
- package/dist/auth/utils/token-utils.d.ts +83 -83
- package/dist/auth/utils/token-utils.js +218 -218
- package/dist/client/AuthContext.js +115 -115
- package/dist/client/better-auth-client.d.ts +1020 -1020
- package/dist/components/SessionSync.js +121 -121
- package/dist/components/account/MobileNavDrawer.js +64 -64
- package/dist/components/account/UserAvatarMenu.js +91 -91
- package/dist/components/admin/VibeAdminLayout.js +71 -71
- package/dist/hooks/useAuthSettings.js +93 -93
- package/dist/hooks/useAvailableProviders.d.ts +43 -43
- package/dist/hooks/useAvailableProviders.js +112 -112
- package/dist/lib/app-slug.d.ts +95 -95
- package/dist/lib/app-slug.js +172 -172
- package/dist/lib/test-aware-get-token.js +86 -86
- package/dist/lib/token-lifecycle.d.ts +78 -78
- package/dist/lib/token-lifecycle.js +360 -360
- package/dist/pages/admin-login/page.js +73 -73
- package/dist/pages/client-admin/ClientSiteAdminPage.js +179 -179
- package/dist/pages/login/page.js +202 -202
- package/dist/pages/showcase/ShowcasePage.js +142 -142
- package/dist/pages/test-env/EmergencyLogoutPage.js +99 -99
- package/dist/pages/test-env/JwtInspectPage.js +116 -116
- package/dist/pages/test-env/TestEnvPage.js +51 -51
- package/dist/pages/verify-code/page.js +412 -412
- package/dist/routes/auth/logout.d.ts +31 -31
- package/dist/routes/auth/logout.js +98 -98
- package/dist/routes/auth/session.js +157 -157
- package/dist/routes/auth/viability.js +190 -190
- package/package.json +6 -16
- package/dist/auth/auth-options.d.ts +0 -57
- package/dist/auth/auth-options.js +0 -213
- package/dist/auth/callbacks/index.d.ts +0 -6
- package/dist/auth/callbacks/index.js +0 -12
- package/dist/auth/callbacks/jwt.d.ts +0 -45
- package/dist/auth/callbacks/jwt.js +0 -305
- package/dist/auth/callbacks/session.d.ts +0 -60
- package/dist/auth/callbacks/session.js +0 -170
- package/dist/auth/callbacks/signin.d.ts +0 -23
- package/dist/auth/callbacks/signin.js +0 -44
- package/dist/auth/events/index.d.ts +0 -4
- package/dist/auth/events/index.js +0 -8
- package/dist/auth/events/signout.d.ts +0 -17
- package/dist/auth/events/signout.js +0 -32
- package/dist/auth/providers/credentials.d.ts +0 -32
- package/dist/auth/providers/credentials.js +0 -223
- package/dist/auth/providers/index.d.ts +0 -5
- package/dist/auth/providers/index.js +0 -21
- package/dist/auth/providers/oauth.d.ts +0 -26
- package/dist/auth/providers/oauth.js +0 -105
- package/dist/lib/nextauth-secret.d.ts +0 -10
- package/dist/lib/nextauth-secret.js +0 -100
- package/dist/pages/profile/profile-patch.d.ts +0 -1
- package/dist/pages/profile/profile-patch.js +0 -281
- package/dist/pages/security/security-patch.d.ts +0 -1
- package/dist/pages/security/security-patch.js +0 -302
|
@@ -1,317 +1,317 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Admin Site Logs API Handlers
|
|
4
|
-
*
|
|
5
|
-
* Provides admin-level access to site activity logs.
|
|
6
|
-
* - GET /site-logs - Query logs from Vibe
|
|
7
|
-
* - POST /site-logs - Create test log entries via Redis queue
|
|
8
|
-
* - GET /site-logs/stats - Aggregated stats { total, unique_users, by_level, by_category }
|
|
9
|
-
* - POST /site-logs/drain - Manual drain trigger
|
|
10
|
-
* - GET /site-logs/queue - Redis queue status
|
|
11
|
-
*
|
|
12
|
-
* @version 1.0
|
|
13
|
-
* @requires Admin role (vibe_app_admin or payez_admin)
|
|
14
|
-
*/
|
|
15
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
-
exports.createSiteLogsHandler = createSiteLogsHandler;
|
|
17
|
-
exports.createSiteLogsStatsHandler = createSiteLogsStatsHandler;
|
|
18
|
-
exports.createSiteLogsDrainHandler = createSiteLogsDrainHandler;
|
|
19
|
-
exports.createSiteLogsQueueHandler = createSiteLogsQueueHandler;
|
|
20
|
-
const server_1 = require("next/server");
|
|
21
|
-
const auth_1 = require("../../server/auth");
|
|
22
|
-
const redis_1 = require("../../lib/redis");
|
|
23
|
-
const roles_1 = require("../../lib/roles");
|
|
24
|
-
const REDIS_SITE_LOG_KEY = 'vibe:site-logs:pending';
|
|
25
|
-
const REDIS_LOG_TTL = 7 * 24 * 60 * 60; // 1 week
|
|
26
|
-
/**
|
|
27
|
-
* Check if the current user has admin role
|
|
28
|
-
*/
|
|
29
|
-
async function checkAdminRole(request) {
|
|
30
|
-
const session = await (0, auth_1.getSession)(request);
|
|
31
|
-
if (!session?.user) {
|
|
32
|
-
return {
|
|
33
|
-
isAdmin: false,
|
|
34
|
-
error: server_1.NextResponse.json({ success: false, error: 'Please sign in' }, { status: 401 }),
|
|
35
|
-
};
|
|
36
|
-
}
|
|
37
|
-
const userRoles = session.user?.roles || [];
|
|
38
|
-
const hasAdminRole = roles_1.ADMIN_ROLES.some(role => userRoles.includes(role));
|
|
39
|
-
if (!hasAdminRole) {
|
|
40
|
-
return {
|
|
41
|
-
isAdmin: false,
|
|
42
|
-
error: server_1.NextResponse.json({ success: false, error: 'Admin access required' }, { status: 403 }),
|
|
43
|
-
};
|
|
44
|
-
}
|
|
45
|
-
return {
|
|
46
|
-
isAdmin: true,
|
|
47
|
-
userId: session.user?.id,
|
|
48
|
-
accessToken: session.accessToken,
|
|
49
|
-
clientId: session.clientId,
|
|
50
|
-
};
|
|
51
|
-
}
|
|
52
|
-
function getVibeApiUrl(config) {
|
|
53
|
-
if (config.vibeApiUrl)
|
|
54
|
-
return config.vibeApiUrl;
|
|
55
|
-
const url = process.env.VIBE_API_URL;
|
|
56
|
-
if (url)
|
|
57
|
-
return url;
|
|
58
|
-
if (process.env.NODE_ENV !== 'production')
|
|
59
|
-
return 'http://localhost:37933';
|
|
60
|
-
throw new Error('VIBE_API_URL is required in production');
|
|
61
|
-
}
|
|
62
|
-
/**
|
|
63
|
-
* Create main site-logs handler (GET query, POST create test entries)
|
|
64
|
-
*/
|
|
65
|
-
function createSiteLogsHandler(config) {
|
|
66
|
-
return {
|
|
67
|
-
async GET(request) {
|
|
68
|
-
const adminCheck = await checkAdminRole(request);
|
|
69
|
-
if (adminCheck.error)
|
|
70
|
-
return adminCheck.error;
|
|
71
|
-
const { searchParams } = new URL(request.url);
|
|
72
|
-
const vibeUrl = getVibeApiUrl(config);
|
|
73
|
-
// Forward query params
|
|
74
|
-
const params = new URLSearchParams();
|
|
75
|
-
if (searchParams.get('level'))
|
|
76
|
-
params.set('level', searchParams.get('level'));
|
|
77
|
-
if (searchParams.get('category'))
|
|
78
|
-
params.set('category', searchParams.get('category'));
|
|
79
|
-
if (searchParams.get('search'))
|
|
80
|
-
params.set('search', searchParams.get('search'));
|
|
81
|
-
if (searchParams.get('from'))
|
|
82
|
-
params.set('from', searchParams.get('from'));
|
|
83
|
-
if (searchParams.get('to'))
|
|
84
|
-
params.set('to', searchParams.get('to'));
|
|
85
|
-
if (searchParams.get('user_id'))
|
|
86
|
-
params.set('user_id', searchParams.get('user_id'));
|
|
87
|
-
if (searchParams.get('limit'))
|
|
88
|
-
params.set('limit', searchParams.get('limit'));
|
|
89
|
-
if (searchParams.get('offset'))
|
|
90
|
-
params.set('offset', searchParams.get('offset'));
|
|
91
|
-
const headers = {
|
|
92
|
-
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
93
|
-
'Content-Type': 'application/json',
|
|
94
|
-
};
|
|
95
|
-
if (adminCheck.clientId) {
|
|
96
|
-
headers['X-Client-Id'] = adminCheck.clientId;
|
|
97
|
-
}
|
|
98
|
-
try {
|
|
99
|
-
const response = await fetch(`${vibeUrl}/v1/admin/site-logs?${params}`, { headers });
|
|
100
|
-
if (!response.ok) {
|
|
101
|
-
const errorText = await response.text();
|
|
102
|
-
console.error('[admin/site-logs] Vibe error:', response.status, errorText);
|
|
103
|
-
return server_1.NextResponse.json({ error: 'Failed to fetch site logs', details: errorText }, { status: response.status });
|
|
104
|
-
}
|
|
105
|
-
const data = await response.json();
|
|
106
|
-
return server_1.NextResponse.json(data);
|
|
107
|
-
}
|
|
108
|
-
catch (error) {
|
|
109
|
-
console.error('[admin/site-logs] Error:', error);
|
|
110
|
-
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
111
|
-
}
|
|
112
|
-
},
|
|
113
|
-
async POST(request) {
|
|
114
|
-
const adminCheck = await checkAdminRole(request);
|
|
115
|
-
if (adminCheck.error)
|
|
116
|
-
return adminCheck.error;
|
|
117
|
-
try {
|
|
118
|
-
const body = await request.json();
|
|
119
|
-
const redis = (0, redis_1.getRedis)();
|
|
120
|
-
const userAgent = request.headers.get('user-agent') || null;
|
|
121
|
-
const ipAddress = request.headers.get('x-forwarded-for')?.split(',')[0] || null;
|
|
122
|
-
const baseRecord = {
|
|
123
|
-
user_agent: userAgent,
|
|
124
|
-
ip_address: ipAddress,
|
|
125
|
-
created_at: new Date().toISOString(),
|
|
126
|
-
app_slug: config.appSlug || process.env.APP_SLUG || process.env.CLIENT_ID || 'unknown',
|
|
127
|
-
vibe_client_id: config.vibeClientId || process.env.VIBE_CLIENT_ID || '',
|
|
128
|
-
};
|
|
129
|
-
// If generateAll=true, create one of each event type
|
|
130
|
-
if (body.generate_all) {
|
|
131
|
-
const testEvents = [
|
|
132
|
-
{ log_level: 'debug', category: 'api', message: 'Test: API request traced', context: { endpoint: '/api/test', method: 'GET' }, url: '/api/test' },
|
|
133
|
-
{ log_level: 'info', category: 'auth', message: 'Test: User logged in', context: { method: 'password' }, user_id: 1, url: '/api/auth/callback' },
|
|
134
|
-
{ log_level: 'info', category: 'page_view', message: 'Test: Page viewed', context: { referrer: '/dashboard' }, user_id: 1, url: '/admin/activity' },
|
|
135
|
-
{ log_level: 'info', category: 'user_action', message: 'Test: Button clicked', context: { target: 'submit-btn' }, user_id: 1, url: '/admin/activity' },
|
|
136
|
-
{ log_level: 'warn', category: 'auth', message: 'Test: Login failed', context: { reason: 'invalid_password' }, url: '/api/auth/login' },
|
|
137
|
-
{ log_level: 'error', category: 'error', message: 'Test: Application error', context: { error: 'TestError', stack: 'at test()' }, url: '/api/test' },
|
|
138
|
-
];
|
|
139
|
-
for (const event of testEvents) {
|
|
140
|
-
const logRecord = JSON.stringify({ ...baseRecord, ...event, session_id: null });
|
|
141
|
-
await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
|
|
142
|
-
}
|
|
143
|
-
await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
|
|
144
|
-
const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
145
|
-
return server_1.NextResponse.json({
|
|
146
|
-
success: true,
|
|
147
|
-
message: `Created ${testEvents.length} test events`,
|
|
148
|
-
queue_length: queueLen,
|
|
149
|
-
events: testEvents.map(e => ({ level: e.log_level, category: e.category, message: e.message })),
|
|
150
|
-
note: 'Events will appear after drain service processes them',
|
|
151
|
-
}, { status: 201 });
|
|
152
|
-
}
|
|
153
|
-
// Single event creation
|
|
154
|
-
const logRecord = JSON.stringify({
|
|
155
|
-
...baseRecord,
|
|
156
|
-
log_level: body.level || 'info',
|
|
157
|
-
category: body.category || 'user_action',
|
|
158
|
-
message: body.message || 'Test log entry',
|
|
159
|
-
context: body.context || { source: 'admin-test' },
|
|
160
|
-
user_id: body.user_id || null,
|
|
161
|
-
session_id: null,
|
|
162
|
-
url: body.url || '/admin/activity',
|
|
163
|
-
});
|
|
164
|
-
await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
|
|
165
|
-
await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
|
|
166
|
-
const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
167
|
-
return server_1.NextResponse.json({
|
|
168
|
-
success: true,
|
|
169
|
-
message: 'Test log created',
|
|
170
|
-
queue_length: queueLen,
|
|
171
|
-
note: 'Log will appear after drain service processes it (every 5 seconds)',
|
|
172
|
-
}, { status: 201 });
|
|
173
|
-
}
|
|
174
|
-
catch (error) {
|
|
175
|
-
console.error('[admin/site-logs] POST Error:', error);
|
|
176
|
-
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
177
|
-
}
|
|
178
|
-
},
|
|
179
|
-
};
|
|
180
|
-
}
|
|
181
|
-
/**
|
|
182
|
-
* Create site-logs stats handler
|
|
183
|
-
* Returns: { total, unique_users, by_level, by_category }
|
|
184
|
-
*/
|
|
185
|
-
function createSiteLogsStatsHandler(config) {
|
|
186
|
-
return {
|
|
187
|
-
async GET(request) {
|
|
188
|
-
const adminCheck = await checkAdminRole(request);
|
|
189
|
-
if (adminCheck.error)
|
|
190
|
-
return adminCheck.error;
|
|
191
|
-
const { searchParams } = new URL(request.url);
|
|
192
|
-
const vibeUrl = getVibeApiUrl(config);
|
|
193
|
-
const params = new URLSearchParams();
|
|
194
|
-
if (searchParams.get('from'))
|
|
195
|
-
params.set('from', searchParams.get('from'));
|
|
196
|
-
if (searchParams.get('to'))
|
|
197
|
-
params.set('to', searchParams.get('to'));
|
|
198
|
-
const headers = {
|
|
199
|
-
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
200
|
-
'Content-Type': 'application/json',
|
|
201
|
-
};
|
|
202
|
-
if (adminCheck.clientId) {
|
|
203
|
-
headers['X-Client-Id'] = adminCheck.clientId;
|
|
204
|
-
}
|
|
205
|
-
try {
|
|
206
|
-
const response = await fetch(`${vibeUrl}/v1/admin/site-logs/stats?${params}`, { headers });
|
|
207
|
-
if (!response.ok) {
|
|
208
|
-
const errorText = await response.text();
|
|
209
|
-
console.error('[admin/site-logs/stats] Vibe error:', response.status, errorText);
|
|
210
|
-
return server_1.NextResponse.json({ error: 'Failed to fetch stats', details: errorText }, { status: response.status });
|
|
211
|
-
}
|
|
212
|
-
const data = await response.json();
|
|
213
|
-
// Ensure response matches expected format: { total, unique_users, by_level, by_category }
|
|
214
|
-
return server_1.NextResponse.json(data);
|
|
215
|
-
}
|
|
216
|
-
catch (error) {
|
|
217
|
-
console.error('[admin/site-logs/stats] Error:', error);
|
|
218
|
-
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
219
|
-
}
|
|
220
|
-
},
|
|
221
|
-
};
|
|
222
|
-
}
|
|
223
|
-
/**
|
|
224
|
-
* Create site-logs drain handler (manual trigger)
|
|
225
|
-
*/
|
|
226
|
-
function createSiteLogsDrainHandler(config) {
|
|
227
|
-
return {
|
|
228
|
-
async POST(request) {
|
|
229
|
-
const adminCheck = await checkAdminRole(request);
|
|
230
|
-
if (adminCheck.error)
|
|
231
|
-
return adminCheck.error;
|
|
232
|
-
const { searchParams } = new URL(request.url);
|
|
233
|
-
const maxEntries = searchParams.get('max_entries') || '100';
|
|
234
|
-
const vibeUrl = getVibeApiUrl(config);
|
|
235
|
-
const headers = {
|
|
236
|
-
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
237
|
-
'Content-Type': 'application/json',
|
|
238
|
-
};
|
|
239
|
-
if (adminCheck.clientId) {
|
|
240
|
-
headers['X-Client-Id'] = adminCheck.clientId;
|
|
241
|
-
}
|
|
242
|
-
try {
|
|
243
|
-
const response = await fetch(`${vibeUrl}/v1/admin/site-logs/drain?maxEntries=${maxEntries}`, {
|
|
244
|
-
method: 'POST',
|
|
245
|
-
headers,
|
|
246
|
-
});
|
|
247
|
-
if (!response.ok) {
|
|
248
|
-
const errorText = await response.text();
|
|
249
|
-
console.error('[admin/site-logs/drain] Vibe error:', response.status, errorText);
|
|
250
|
-
return server_1.NextResponse.json({ error: 'Failed to drain site logs', details: errorText }, { status: response.status });
|
|
251
|
-
}
|
|
252
|
-
const data = await response.json();
|
|
253
|
-
return server_1.NextResponse.json(data);
|
|
254
|
-
}
|
|
255
|
-
catch (error) {
|
|
256
|
-
console.error('[admin/site-logs/drain] Error:', error);
|
|
257
|
-
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
258
|
-
}
|
|
259
|
-
},
|
|
260
|
-
};
|
|
261
|
-
}
|
|
262
|
-
/**
|
|
263
|
-
* Create site-logs queue status handler
|
|
264
|
-
*/
|
|
265
|
-
function createSiteLogsQueueHandler(config) {
|
|
266
|
-
return {
|
|
267
|
-
async GET(request) {
|
|
268
|
-
const adminCheck = await checkAdminRole(request);
|
|
269
|
-
if (adminCheck.error)
|
|
270
|
-
return adminCheck.error;
|
|
271
|
-
try {
|
|
272
|
-
const redis = (0, redis_1.getRedis)();
|
|
273
|
-
const queueLength = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
274
|
-
// Peek at the oldest and newest entries
|
|
275
|
-
let oldest_entry = null;
|
|
276
|
-
let newest_entry = null;
|
|
277
|
-
if (queueLength > 0) {
|
|
278
|
-
const oldest = await redis.lindex(REDIS_SITE_LOG_KEY, -1); // RPOP side (oldest)
|
|
279
|
-
const newest = await redis.lindex(REDIS_SITE_LOG_KEY, 0); // LPUSH side (newest)
|
|
280
|
-
if (oldest) {
|
|
281
|
-
try {
|
|
282
|
-
const parsed = JSON.parse(oldest);
|
|
283
|
-
oldest_entry = {
|
|
284
|
-
message: parsed.message,
|
|
285
|
-
level: parsed.log_level,
|
|
286
|
-
timestamp: parsed.created_at || parsed.queued_at,
|
|
287
|
-
};
|
|
288
|
-
}
|
|
289
|
-
catch { }
|
|
290
|
-
}
|
|
291
|
-
if (newest) {
|
|
292
|
-
try {
|
|
293
|
-
const parsed = JSON.parse(newest);
|
|
294
|
-
newest_entry = {
|
|
295
|
-
message: parsed.message,
|
|
296
|
-
level: parsed.log_level,
|
|
297
|
-
timestamp: parsed.created_at || parsed.queued_at,
|
|
298
|
-
};
|
|
299
|
-
}
|
|
300
|
-
catch { }
|
|
301
|
-
}
|
|
302
|
-
}
|
|
303
|
-
return server_1.NextResponse.json({
|
|
304
|
-
queue_length: queueLength,
|
|
305
|
-
redis_key: REDIS_SITE_LOG_KEY,
|
|
306
|
-
oldest_entry,
|
|
307
|
-
newest_entry,
|
|
308
|
-
status: queueLength === 0 ? 'empty' : 'pending',
|
|
309
|
-
});
|
|
310
|
-
}
|
|
311
|
-
catch (error) {
|
|
312
|
-
console.error('[admin/site-logs/queue] Error:', error);
|
|
313
|
-
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
314
|
-
}
|
|
315
|
-
},
|
|
316
|
-
};
|
|
317
|
-
}
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Admin Site Logs API Handlers
|
|
4
|
+
*
|
|
5
|
+
* Provides admin-level access to site activity logs.
|
|
6
|
+
* - GET /site-logs - Query logs from Vibe
|
|
7
|
+
* - POST /site-logs - Create test log entries via Redis queue
|
|
8
|
+
* - GET /site-logs/stats - Aggregated stats { total, unique_users, by_level, by_category }
|
|
9
|
+
* - POST /site-logs/drain - Manual drain trigger
|
|
10
|
+
* - GET /site-logs/queue - Redis queue status
|
|
11
|
+
*
|
|
12
|
+
* @version 1.0
|
|
13
|
+
* @requires Admin role (vibe_app_admin or payez_admin)
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.createSiteLogsHandler = createSiteLogsHandler;
|
|
17
|
+
exports.createSiteLogsStatsHandler = createSiteLogsStatsHandler;
|
|
18
|
+
exports.createSiteLogsDrainHandler = createSiteLogsDrainHandler;
|
|
19
|
+
exports.createSiteLogsQueueHandler = createSiteLogsQueueHandler;
|
|
20
|
+
const server_1 = require("next/server");
|
|
21
|
+
const auth_1 = require("../../server/auth");
|
|
22
|
+
const redis_1 = require("../../lib/redis");
|
|
23
|
+
const roles_1 = require("../../lib/roles");
|
|
24
|
+
const REDIS_SITE_LOG_KEY = 'vibe:site-logs:pending';
|
|
25
|
+
const REDIS_LOG_TTL = 7 * 24 * 60 * 60; // 1 week
|
|
26
|
+
/**
|
|
27
|
+
* Check if the current user has admin role
|
|
28
|
+
*/
|
|
29
|
+
async function checkAdminRole(request) {
|
|
30
|
+
const session = await (0, auth_1.getSession)(request);
|
|
31
|
+
if (!session?.user) {
|
|
32
|
+
return {
|
|
33
|
+
isAdmin: false,
|
|
34
|
+
error: server_1.NextResponse.json({ success: false, error: 'Please sign in' }, { status: 401 }),
|
|
35
|
+
};
|
|
36
|
+
}
|
|
37
|
+
const userRoles = session.user?.roles || [];
|
|
38
|
+
const hasAdminRole = roles_1.ADMIN_ROLES.some(role => userRoles.includes(role));
|
|
39
|
+
if (!hasAdminRole) {
|
|
40
|
+
return {
|
|
41
|
+
isAdmin: false,
|
|
42
|
+
error: server_1.NextResponse.json({ success: false, error: 'Admin access required' }, { status: 403 }),
|
|
43
|
+
};
|
|
44
|
+
}
|
|
45
|
+
return {
|
|
46
|
+
isAdmin: true,
|
|
47
|
+
userId: session.user?.id,
|
|
48
|
+
accessToken: session.accessToken,
|
|
49
|
+
clientId: session.clientId,
|
|
50
|
+
};
|
|
51
|
+
}
|
|
52
|
+
function getVibeApiUrl(config) {
|
|
53
|
+
if (config.vibeApiUrl)
|
|
54
|
+
return config.vibeApiUrl;
|
|
55
|
+
const url = process.env.VIBE_API_URL;
|
|
56
|
+
if (url)
|
|
57
|
+
return url;
|
|
58
|
+
if (process.env.NODE_ENV !== 'production')
|
|
59
|
+
return 'http://localhost:37933';
|
|
60
|
+
throw new Error('VIBE_API_URL is required in production');
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Create main site-logs handler (GET query, POST create test entries)
|
|
64
|
+
*/
|
|
65
|
+
function createSiteLogsHandler(config) {
|
|
66
|
+
return {
|
|
67
|
+
async GET(request) {
|
|
68
|
+
const adminCheck = await checkAdminRole(request);
|
|
69
|
+
if (adminCheck.error)
|
|
70
|
+
return adminCheck.error;
|
|
71
|
+
const { searchParams } = new URL(request.url);
|
|
72
|
+
const vibeUrl = getVibeApiUrl(config);
|
|
73
|
+
// Forward query params
|
|
74
|
+
const params = new URLSearchParams();
|
|
75
|
+
if (searchParams.get('level'))
|
|
76
|
+
params.set('level', searchParams.get('level'));
|
|
77
|
+
if (searchParams.get('category'))
|
|
78
|
+
params.set('category', searchParams.get('category'));
|
|
79
|
+
if (searchParams.get('search'))
|
|
80
|
+
params.set('search', searchParams.get('search'));
|
|
81
|
+
if (searchParams.get('from'))
|
|
82
|
+
params.set('from', searchParams.get('from'));
|
|
83
|
+
if (searchParams.get('to'))
|
|
84
|
+
params.set('to', searchParams.get('to'));
|
|
85
|
+
if (searchParams.get('user_id'))
|
|
86
|
+
params.set('user_id', searchParams.get('user_id'));
|
|
87
|
+
if (searchParams.get('limit'))
|
|
88
|
+
params.set('limit', searchParams.get('limit'));
|
|
89
|
+
if (searchParams.get('offset'))
|
|
90
|
+
params.set('offset', searchParams.get('offset'));
|
|
91
|
+
const headers = {
|
|
92
|
+
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
93
|
+
'Content-Type': 'application/json',
|
|
94
|
+
};
|
|
95
|
+
if (adminCheck.clientId) {
|
|
96
|
+
headers['X-Client-Id'] = adminCheck.clientId;
|
|
97
|
+
}
|
|
98
|
+
try {
|
|
99
|
+
const response = await fetch(`${vibeUrl}/v1/admin/site-logs?${params}`, { headers });
|
|
100
|
+
if (!response.ok) {
|
|
101
|
+
const errorText = await response.text();
|
|
102
|
+
console.error('[admin/site-logs] Vibe error:', response.status, errorText);
|
|
103
|
+
return server_1.NextResponse.json({ error: 'Failed to fetch site logs', details: errorText }, { status: response.status });
|
|
104
|
+
}
|
|
105
|
+
const data = await response.json();
|
|
106
|
+
return server_1.NextResponse.json(data);
|
|
107
|
+
}
|
|
108
|
+
catch (error) {
|
|
109
|
+
console.error('[admin/site-logs] Error:', error);
|
|
110
|
+
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
111
|
+
}
|
|
112
|
+
},
|
|
113
|
+
async POST(request) {
|
|
114
|
+
const adminCheck = await checkAdminRole(request);
|
|
115
|
+
if (adminCheck.error)
|
|
116
|
+
return adminCheck.error;
|
|
117
|
+
try {
|
|
118
|
+
const body = await request.json();
|
|
119
|
+
const redis = (0, redis_1.getRedis)();
|
|
120
|
+
const userAgent = request.headers.get('user-agent') || null;
|
|
121
|
+
const ipAddress = request.headers.get('x-forwarded-for')?.split(',')[0] || null;
|
|
122
|
+
const baseRecord = {
|
|
123
|
+
user_agent: userAgent,
|
|
124
|
+
ip_address: ipAddress,
|
|
125
|
+
created_at: new Date().toISOString(),
|
|
126
|
+
app_slug: config.appSlug || process.env.APP_SLUG || process.env.CLIENT_ID || 'unknown',
|
|
127
|
+
vibe_client_id: config.vibeClientId || process.env.VIBE_CLIENT_ID || '',
|
|
128
|
+
};
|
|
129
|
+
// If generateAll=true, create one of each event type
|
|
130
|
+
if (body.generate_all) {
|
|
131
|
+
const testEvents = [
|
|
132
|
+
{ log_level: 'debug', category: 'api', message: 'Test: API request traced', context: { endpoint: '/api/test', method: 'GET' }, url: '/api/test' },
|
|
133
|
+
{ log_level: 'info', category: 'auth', message: 'Test: User logged in', context: { method: 'password' }, user_id: 1, url: '/api/auth/callback' },
|
|
134
|
+
{ log_level: 'info', category: 'page_view', message: 'Test: Page viewed', context: { referrer: '/dashboard' }, user_id: 1, url: '/admin/activity' },
|
|
135
|
+
{ log_level: 'info', category: 'user_action', message: 'Test: Button clicked', context: { target: 'submit-btn' }, user_id: 1, url: '/admin/activity' },
|
|
136
|
+
{ log_level: 'warn', category: 'auth', message: 'Test: Login failed', context: { reason: 'invalid_password' }, url: '/api/auth/login' },
|
|
137
|
+
{ log_level: 'error', category: 'error', message: 'Test: Application error', context: { error: 'TestError', stack: 'at test()' }, url: '/api/test' },
|
|
138
|
+
];
|
|
139
|
+
for (const event of testEvents) {
|
|
140
|
+
const logRecord = JSON.stringify({ ...baseRecord, ...event, session_id: null });
|
|
141
|
+
await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
|
|
142
|
+
}
|
|
143
|
+
await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
|
|
144
|
+
const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
145
|
+
return server_1.NextResponse.json({
|
|
146
|
+
success: true,
|
|
147
|
+
message: `Created ${testEvents.length} test events`,
|
|
148
|
+
queue_length: queueLen,
|
|
149
|
+
events: testEvents.map(e => ({ level: e.log_level, category: e.category, message: e.message })),
|
|
150
|
+
note: 'Events will appear after drain service processes them',
|
|
151
|
+
}, { status: 201 });
|
|
152
|
+
}
|
|
153
|
+
// Single event creation
|
|
154
|
+
const logRecord = JSON.stringify({
|
|
155
|
+
...baseRecord,
|
|
156
|
+
log_level: body.level || 'info',
|
|
157
|
+
category: body.category || 'user_action',
|
|
158
|
+
message: body.message || 'Test log entry',
|
|
159
|
+
context: body.context || { source: 'admin-test' },
|
|
160
|
+
user_id: body.user_id || null,
|
|
161
|
+
session_id: null,
|
|
162
|
+
url: body.url || '/admin/activity',
|
|
163
|
+
});
|
|
164
|
+
await redis.lpush(REDIS_SITE_LOG_KEY, logRecord);
|
|
165
|
+
await redis.expire(REDIS_SITE_LOG_KEY, REDIS_LOG_TTL);
|
|
166
|
+
const queueLen = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
167
|
+
return server_1.NextResponse.json({
|
|
168
|
+
success: true,
|
|
169
|
+
message: 'Test log created',
|
|
170
|
+
queue_length: queueLen,
|
|
171
|
+
note: 'Log will appear after drain service processes it (every 5 seconds)',
|
|
172
|
+
}, { status: 201 });
|
|
173
|
+
}
|
|
174
|
+
catch (error) {
|
|
175
|
+
console.error('[admin/site-logs] POST Error:', error);
|
|
176
|
+
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
177
|
+
}
|
|
178
|
+
},
|
|
179
|
+
};
|
|
180
|
+
}
|
|
181
|
+
/**
|
|
182
|
+
* Create site-logs stats handler
|
|
183
|
+
* Returns: { total, unique_users, by_level, by_category }
|
|
184
|
+
*/
|
|
185
|
+
function createSiteLogsStatsHandler(config) {
|
|
186
|
+
return {
|
|
187
|
+
async GET(request) {
|
|
188
|
+
const adminCheck = await checkAdminRole(request);
|
|
189
|
+
if (adminCheck.error)
|
|
190
|
+
return adminCheck.error;
|
|
191
|
+
const { searchParams } = new URL(request.url);
|
|
192
|
+
const vibeUrl = getVibeApiUrl(config);
|
|
193
|
+
const params = new URLSearchParams();
|
|
194
|
+
if (searchParams.get('from'))
|
|
195
|
+
params.set('from', searchParams.get('from'));
|
|
196
|
+
if (searchParams.get('to'))
|
|
197
|
+
params.set('to', searchParams.get('to'));
|
|
198
|
+
const headers = {
|
|
199
|
+
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
200
|
+
'Content-Type': 'application/json',
|
|
201
|
+
};
|
|
202
|
+
if (adminCheck.clientId) {
|
|
203
|
+
headers['X-Client-Id'] = adminCheck.clientId;
|
|
204
|
+
}
|
|
205
|
+
try {
|
|
206
|
+
const response = await fetch(`${vibeUrl}/v1/admin/site-logs/stats?${params}`, { headers });
|
|
207
|
+
if (!response.ok) {
|
|
208
|
+
const errorText = await response.text();
|
|
209
|
+
console.error('[admin/site-logs/stats] Vibe error:', response.status, errorText);
|
|
210
|
+
return server_1.NextResponse.json({ error: 'Failed to fetch stats', details: errorText }, { status: response.status });
|
|
211
|
+
}
|
|
212
|
+
const data = await response.json();
|
|
213
|
+
// Ensure response matches expected format: { total, unique_users, by_level, by_category }
|
|
214
|
+
return server_1.NextResponse.json(data);
|
|
215
|
+
}
|
|
216
|
+
catch (error) {
|
|
217
|
+
console.error('[admin/site-logs/stats] Error:', error);
|
|
218
|
+
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
219
|
+
}
|
|
220
|
+
},
|
|
221
|
+
};
|
|
222
|
+
}
|
|
223
|
+
/**
|
|
224
|
+
* Create site-logs drain handler (manual trigger)
|
|
225
|
+
*/
|
|
226
|
+
function createSiteLogsDrainHandler(config) {
|
|
227
|
+
return {
|
|
228
|
+
async POST(request) {
|
|
229
|
+
const adminCheck = await checkAdminRole(request);
|
|
230
|
+
if (adminCheck.error)
|
|
231
|
+
return adminCheck.error;
|
|
232
|
+
const { searchParams } = new URL(request.url);
|
|
233
|
+
const maxEntries = searchParams.get('max_entries') || '100';
|
|
234
|
+
const vibeUrl = getVibeApiUrl(config);
|
|
235
|
+
const headers = {
|
|
236
|
+
'Authorization': `Bearer ${adminCheck.accessToken}`,
|
|
237
|
+
'Content-Type': 'application/json',
|
|
238
|
+
};
|
|
239
|
+
if (adminCheck.clientId) {
|
|
240
|
+
headers['X-Client-Id'] = adminCheck.clientId;
|
|
241
|
+
}
|
|
242
|
+
try {
|
|
243
|
+
const response = await fetch(`${vibeUrl}/v1/admin/site-logs/drain?maxEntries=${maxEntries}`, {
|
|
244
|
+
method: 'POST',
|
|
245
|
+
headers,
|
|
246
|
+
});
|
|
247
|
+
if (!response.ok) {
|
|
248
|
+
const errorText = await response.text();
|
|
249
|
+
console.error('[admin/site-logs/drain] Vibe error:', response.status, errorText);
|
|
250
|
+
return server_1.NextResponse.json({ error: 'Failed to drain site logs', details: errorText }, { status: response.status });
|
|
251
|
+
}
|
|
252
|
+
const data = await response.json();
|
|
253
|
+
return server_1.NextResponse.json(data);
|
|
254
|
+
}
|
|
255
|
+
catch (error) {
|
|
256
|
+
console.error('[admin/site-logs/drain] Error:', error);
|
|
257
|
+
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
258
|
+
}
|
|
259
|
+
},
|
|
260
|
+
};
|
|
261
|
+
}
|
|
262
|
+
/**
|
|
263
|
+
* Create site-logs queue status handler
|
|
264
|
+
*/
|
|
265
|
+
function createSiteLogsQueueHandler(config) {
|
|
266
|
+
return {
|
|
267
|
+
async GET(request) {
|
|
268
|
+
const adminCheck = await checkAdminRole(request);
|
|
269
|
+
if (adminCheck.error)
|
|
270
|
+
return adminCheck.error;
|
|
271
|
+
try {
|
|
272
|
+
const redis = (0, redis_1.getRedis)();
|
|
273
|
+
const queueLength = await redis.llen(REDIS_SITE_LOG_KEY);
|
|
274
|
+
// Peek at the oldest and newest entries
|
|
275
|
+
let oldest_entry = null;
|
|
276
|
+
let newest_entry = null;
|
|
277
|
+
if (queueLength > 0) {
|
|
278
|
+
const oldest = await redis.lindex(REDIS_SITE_LOG_KEY, -1); // RPOP side (oldest)
|
|
279
|
+
const newest = await redis.lindex(REDIS_SITE_LOG_KEY, 0); // LPUSH side (newest)
|
|
280
|
+
if (oldest) {
|
|
281
|
+
try {
|
|
282
|
+
const parsed = JSON.parse(oldest);
|
|
283
|
+
oldest_entry = {
|
|
284
|
+
message: parsed.message,
|
|
285
|
+
level: parsed.log_level,
|
|
286
|
+
timestamp: parsed.created_at || parsed.queued_at,
|
|
287
|
+
};
|
|
288
|
+
}
|
|
289
|
+
catch { }
|
|
290
|
+
}
|
|
291
|
+
if (newest) {
|
|
292
|
+
try {
|
|
293
|
+
const parsed = JSON.parse(newest);
|
|
294
|
+
newest_entry = {
|
|
295
|
+
message: parsed.message,
|
|
296
|
+
level: parsed.log_level,
|
|
297
|
+
timestamp: parsed.created_at || parsed.queued_at,
|
|
298
|
+
};
|
|
299
|
+
}
|
|
300
|
+
catch { }
|
|
301
|
+
}
|
|
302
|
+
}
|
|
303
|
+
return server_1.NextResponse.json({
|
|
304
|
+
queue_length: queueLength,
|
|
305
|
+
redis_key: REDIS_SITE_LOG_KEY,
|
|
306
|
+
oldest_entry,
|
|
307
|
+
newest_entry,
|
|
308
|
+
status: queueLength === 0 ? 'empty' : 'pending',
|
|
309
|
+
});
|
|
310
|
+
}
|
|
311
|
+
catch (error) {
|
|
312
|
+
console.error('[admin/site-logs/queue] Error:', error);
|
|
313
|
+
return server_1.NextResponse.json({ error: error.message || 'Internal error' }, { status: 500 });
|
|
314
|
+
}
|
|
315
|
+
},
|
|
316
|
+
};
|
|
317
|
+
}
|