@payez/next-mvp 4.0.47 → 4.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,689 +1,689 @@
1
- /**
2
- * Session Store for `@payez/next-mvp` using ioredis
3
- *
4
- * This module provides a Redis-backed session store that is compatible with the
5
- * `ioredis` client. It handles the creation, retrieval, and deletion of
6
- * session data, which is the single source of truth for authentication.
7
- *
8
- * Includes advanced distributed refresh coordination with version control.
9
- */
10
-
11
- import redis from './redis';
12
- import { randomBytes } from 'crypto';
13
- import { SessionData } from '../models/SessionModel';
14
- import { getSessionPrefix, getRefreshLockPrefix } from './app-slug';
15
- import { extractKidFromToken } from '../auth/utils/token-utils';
16
-
17
- // Re-export SessionData for consumers
18
- export type { SessionData } from '../models/SessionModel';
19
-
20
- // Use app-slug prefixes for multi-app isolation
21
- const getSessionKey = (token: string) => `${getSessionPrefix()}${token}`;
22
- const getRefreshLockKey = (token: string) => `${getRefreshLockPrefix()}${token}`;
23
- const getSessionVersionKey = (token: string) => `${getSessionPrefix()}ver:${token}`;
24
-
25
- // Better Auth uses a different key format: ba:{appSlug}:{token}
26
- const getBetterAuthSessionKey = (token: string, appSlug?: string) => `ba:${appSlug || 'app'}:${token}`;
27
-
28
- const REFRESH_LOCK_TTL = 60; // 60 seconds
29
- const SESSION_TTL = 3 * 24 * 60 * 60; // 3 days in seconds (matches refresh token lifetime)
30
-
31
- export interface RefreshLockInfo {
32
- sessionToken: string;
33
- acquiredAt: number;
34
- acquiredBy: string; // request ID or process identifier
35
- lockVersion: number;
36
- }
37
-
38
- /**
39
- * Generates a new session token.
40
- * @returns A new session token string.
41
- */
42
- export function generateSessionToken(): string {
43
- return randomBytes(32).toString('hex');
44
- }
45
-
46
- /**
47
- * Creates a new session in Redis.
48
- *
49
- * @param data The session data to store.
50
- * @returns The generated session token (redisSessionId).
51
- */
52
- export async function createSession(data: SessionData): Promise<string> {
53
- const sessionToken = randomBytes(32).toString('hex');
54
- const key = getSessionKey(sessionToken);
55
- const versionKey = getSessionVersionKey(sessionToken);
56
-
57
- try {
58
- await redis.multi()
59
- .setex(key, SESSION_TTL, JSON.stringify(data))
60
- .setex(versionKey, SESSION_TTL, '1')
61
- .exec();
62
- } catch (error) {
63
- console.error('[SESSION-STORE] Failed to create session:', error);
64
- throw error;
65
- }
66
-
67
- return sessionToken;
68
- }
69
-
70
- /**
71
- * Retrieves a session from Redis.
72
- *
73
- * @param sessionToken The session token (redisSessionId) to look up.
74
- * @returns The session data, or null if not found.
75
- */
76
- export async function getSession(sessionToken: string): Promise<SessionData | null> {
77
- if (!sessionToken) {
78
- return null;
79
- }
80
- const key = getSessionKey(sessionToken);
81
- const json = await redis.get(key);
82
- if (!json) {
83
- return null;
84
- }
85
- try {
86
- return JSON.parse(json) as SessionData;
87
- } catch {
88
- console.error('[SESSION-STORE] Failed to parse session data');
89
- return null;
90
- }
91
- }
92
-
93
- /**
94
- * Retrieves a Better Auth session from Redis.
95
- * Better Auth uses key format: ba:{appSlug}:{token}
96
- *
97
- * @param sessionToken The session token to look up.
98
- * @param appSlug The app slug (defaults to 'idealvibe_online' or extracted from env).
99
- * @returns The session data, or null if not found.
100
- */
101
- export async function getBetterAuthSession(sessionToken: string, appSlug?: string): Promise<SessionData | null> {
102
- if (!sessionToken) {
103
- return null;
104
- }
105
- // Try to get appSlug from env if not provided
106
- const slug = appSlug || process.env.CLIENT_ID || 'idealvibe_online';
107
- const key = getBetterAuthSessionKey(sessionToken, slug);
108
- const json = await redis.get(key);
109
- if (!json) {
110
- return null;
111
- }
112
- try {
113
- const data = JSON.parse(json);
114
- // Better Auth stores the session differently - extract user data
115
- if (data.user) {
116
- return {
117
- userId: data.user.id || data.user.email,
118
- email: data.user.email,
119
- name: data.user.name,
120
- idpAccessToken: data.idpTokens?.idpAccessToken,
121
- idpRefreshToken: data.idpTokens?.idpRefreshToken,
122
- idpAccessTokenExpires: data.idpTokens?.idpAccessTokenExpires,
123
- mfaVerified: data.idpTokens?.mfaVerified ?? false,
124
- roles: data.idpTokens?.roles || [],
125
- } as SessionData;
126
- }
127
- return data as SessionData;
128
- } catch {
129
- console.error('[SESSION-STORE] Failed to parse Better Auth session data');
130
- return null;
131
- }
132
- }
133
-
134
- /**
135
- * Refresh session TTL without reading/writing data (sliding window expiry).
136
- */
137
- export async function touchSession(token: string): Promise<void> {
138
- const key = getSessionKey(token);
139
- await redis.expire(key, SESSION_TTL);
140
- }
141
-
142
- /**
143
- * Retrieves a session along with a version identifier for optimistic locking.
144
- * @param sessionToken The session token to look up.
145
- * @returns An object with session and version, or null if not found.
146
- */
147
- export async function getSessionWithVersion(sessionToken: string): Promise<{ session: SessionData; version: string } | null> {
148
- const session = await getSession(sessionToken);
149
- if (!session) {
150
- return null;
151
- }
152
-
153
- const versionKey = getSessionVersionKey(sessionToken);
154
- const version = await redis.get(versionKey);
155
-
156
- if (!version) {
157
- // Session exists but version key missing - use idpAccessTokenExpires as fallback
158
- const fallbackVersion = String(session.idpAccessTokenExpires || Date.now());
159
- return { session, version: fallbackVersion };
160
- }
161
-
162
- return { session, version };
163
- }
164
-
165
- /**
166
- * Checks if the access token in a session is still fresh (not expired).
167
- * @param sessionToken The session token to check.
168
- * @param currentAccessToken The current access token to compare.
169
- * @param currentVersion Optional version to check for changes.
170
- * @returns Object with freshness status and latest token info.
171
- */
172
- export async function isAccessTokenFresh(
173
- sessionToken: string,
174
- currentAccessToken: string,
175
- currentVersion?: string
176
- ): Promise<{
177
- isFresh: boolean;
178
- latestAccessToken?: string;
179
- latestVersion?: string;
180
- versionChanged: boolean;
181
- }> {
182
- const sessionWithVersion = await getSessionWithVersion(sessionToken);
183
-
184
- if (!sessionWithVersion) {
185
- return { isFresh: false, versionChanged: true };
186
- }
187
-
188
- const { session, version } = sessionWithVersion;
189
- const versionChanged = currentVersion ? version !== currentVersion : false;
190
-
191
- // If version changed, the token might be stale
192
- // Use normalized field name (idpAccessToken)
193
- const isFresh = !versionChanged && session.idpAccessToken === currentAccessToken;
194
-
195
- return {
196
- isFresh,
197
- latestAccessToken: session.idpAccessToken || undefined,
198
- latestVersion: version,
199
- versionChanged
200
- };
201
- }
202
-
203
- /**
204
- * Deletes a session from Redis.
205
- * @param sessionToken The session token to delete.
206
- */
207
- export async function deleteSession(sessionToken: string): Promise<void> {
208
- if (!sessionToken) {
209
- return;
210
- }
211
- const key = getSessionKey(sessionToken);
212
- const versionKey = getSessionVersionKey(sessionToken);
213
- await redis.del(key, versionKey);
214
- }
215
-
216
- /**
217
- * Sets a session directly (for testing or migrations).
218
- * @param sessionToken The session token.
219
- * @param data The session data.
220
- */
221
- export async function setSession(sessionToken: string, data: SessionData): Promise<void> {
222
- const key = getSessionKey(sessionToken);
223
- const versionKey = getSessionVersionKey(sessionToken);
224
- await redis.multi()
225
- .setex(key, SESSION_TTL, JSON.stringify(data))
226
- .incr(versionKey)
227
- .expire(versionKey, SESSION_TTL)
228
- .exec();
229
- }
230
-
231
- /**
232
- * Updates tokens within an existing session.
233
- * @param sessionToken The session token to update.
234
- * @param updates Partial session data to update.
235
- * @returns The updated session data, or null if the session was not found.
236
- */
237
- export async function updateSession(
238
- sessionToken: string,
239
- updates: Partial<SessionData>
240
- ): Promise<SessionData | null> {
241
- const key = getSessionKey(sessionToken);
242
- const versionKey = getSessionVersionKey(sessionToken);
243
-
244
- // Get current session to merge with updates
245
- const currentSession = await getSession(sessionToken);
246
- if (!currentSession) {
247
- return null;
248
- }
249
-
250
- // CRITICAL: Track any refresh token changes (check both old and new field names)
251
- const hadRefreshToken = !!(currentSession.idpRefreshToken || (currentSession as any).refreshToken);
252
- const willHaveRefreshToken = (updates as any).idpRefreshToken !== undefined
253
- ? !!(updates as any).idpRefreshToken
254
- : (updates as any).refreshToken !== undefined
255
- ? !!(updates as any).refreshToken
256
- : hadRefreshToken;
257
-
258
- if (hadRefreshToken && !willHaveRefreshToken) {
259
- console.error('[SESSION-STORE] ⚠️ REFRESH_TOKEN_BEING_CLEARED', {
260
- sessionToken: sessionToken.substring(0, 8) + '...',
261
- userId: currentSession.userId,
262
- updateKeys: Object.keys(updates),
263
- refreshTokenInUpdate: (updates as any).idpRefreshToken || (updates as any).refreshToken,
264
- refreshTokenClearedReason: (updates as any).refreshTokenClearedReason || 'UNKNOWN',
265
- stack: new Error().stack
266
- });
267
- }
268
-
269
- // Merge current session with updates
270
- const updatedSession = { ...currentSession, ...updates };
271
-
272
- // Write the entire updated session back to Redis with version increment
273
- await redis.multi()
274
- .setex(key, SESSION_TTL, JSON.stringify(updatedSession))
275
- .incr(versionKey)
276
- .expire(versionKey, SESSION_TTL)
277
- .exec();
278
-
279
- return updatedSession;
280
- }
281
-
282
- /**
283
- * Transitions a session to a MFA-completed state.
284
- * @param sessionToken The session token to update.
285
- * @param tokens The new tokens received after MFA completion.
286
- * @param mfaMethod The MFA method used (email, sms, totp) - required for token refresh.
287
- * @returns The updated session data.
288
- */
289
- export async function transitionTo2FASession(
290
- sessionToken: string,
291
- tokens: {
292
- accessToken?: string;
293
- refreshToken?: string;
294
- accessTokenExpires?: number;
295
- refreshTokenExpires?: number;
296
- // Support new field names
297
- idpAccessToken?: string;
298
- idpRefreshToken?: string;
299
- idpAccessTokenExpires?: number;
300
- idpRefreshTokenExpires?: number;
301
- },
302
- mfaMethod?: 'email' | 'sms' | 'totp'
303
- ): Promise<SessionData | null> {
304
- const newAccessToken = tokens.idpAccessToken || tokens.accessToken;
305
-
306
- console.log('[transitionTo2FASession] Called with:', {
307
- sessionToken: sessionToken?.substring(0, 8) + '...',
308
- mfaMethod,
309
- hasAccessToken: !!newAccessToken,
310
- hasRefreshToken: !!(tokens.idpRefreshToken || tokens.refreshToken),
311
- });
312
-
313
- // Extract bearerKeyId from the new access token (IDP may use different key after 2FA)
314
- let bearerKeyId: string | undefined;
315
- if (newAccessToken) {
316
- bearerKeyId = extractKidFromToken(newAccessToken);
317
- if (bearerKeyId) {
318
- console.log('[transitionTo2FASession] Extracted bearerKeyId (kid) from new JWT header:', bearerKeyId);
319
- }
320
- }
321
-
322
- // Support both old and new field names in input
323
- // CRITICAL: Set BOTH mfaVerified (new) AND twoFactorComplete (legacy) for compatibility
324
- // auth.ts session callback reads twoFactorComplete, so we must set it here
325
- const updates: Partial<SessionData> = {
326
- idpAccessToken: newAccessToken,
327
- idpRefreshToken: tokens.idpRefreshToken || tokens.refreshToken,
328
- idpAccessTokenExpires: tokens.idpAccessTokenExpires || tokens.accessTokenExpires,
329
- mfaVerified: true,
330
- twoFactorComplete: true, // Legacy field - required by auth.ts session callback
331
- mfaMethod: mfaMethod,
332
- // Update bearerKeyId if extracted from new token
333
- ...(bearerKeyId && { bearerKeyId }),
334
- };
335
-
336
- const refreshExpires = tokens.idpRefreshTokenExpires || tokens.refreshTokenExpires;
337
- if (refreshExpires !== undefined) {
338
- updates.idpRefreshTokenExpires = refreshExpires;
339
- }
340
-
341
- console.log('[transitionTo2FASession] Updates to apply:', {
342
- mfaVerified: updates.mfaVerified,
343
- twoFactorComplete: (updates as any).twoFactorComplete,
344
- mfaMethod: updates.mfaMethod,
345
- hasIdpAccessToken: !!updates.idpAccessToken,
346
- });
347
-
348
- const result = await updateSession(sessionToken, updates);
349
-
350
- console.log('[transitionTo2FASession] Result:', {
351
- success: !!result,
352
- resultMfaVerified: result?.mfaVerified,
353
- });
354
-
355
- return result;
356
- }
357
-
358
- /**
359
- * Updates IDP tokens and their expiries in an existing session.
360
- * @param sessionToken The session token to update.
361
- * @param idpAccessToken The new IDP access token.
362
- * @param idpRefreshToken The new IDP refresh token.
363
- * @param idpAccessTokenExpires The access token expiry timestamp.
364
- * @param idpRefreshTokenExpires The refresh token expiry timestamp (optional).
365
- * @returns The updated session data.
366
- */
367
- export async function updateTokens(
368
- sessionToken: string,
369
- idpAccessToken: string,
370
- idpRefreshToken: string,
371
- idpAccessTokenExpires: number,
372
- idpRefreshTokenExpires?: number
373
- ): Promise<SessionData | null> {
374
- return updateSession(sessionToken, {
375
- idpAccessToken,
376
- idpRefreshToken,
377
- idpAccessTokenExpires,
378
- idpRefreshTokenExpires,
379
- } as Partial<SessionData>);
380
- }
381
-
382
- /**
383
- * Marks a session as having completed MFA.
384
- * @param sessionToken The session token to update.
385
- * @returns The updated session data.
386
- */
387
- export async function mark2FAComplete(sessionToken: string): Promise<SessionData | null> {
388
- return updateSession(sessionToken, {
389
- mfaVerified: true,
390
- });
391
- }
392
-
393
- /**
394
- * Checks if MFA is complete for a session.
395
- * @param sessionToken The session token.
396
- * @returns True if MFA is complete.
397
- */
398
- export async function is2FAComplete(sessionToken: string): Promise<boolean> {
399
- const session = await getSession(sessionToken);
400
- return session?.mfaVerified === true;
401
- }
402
-
403
- /**
404
- * Gets IDP tokens from a session.
405
- * @param sessionToken The session token.
406
- * @returns The tokens or null if session not found.
407
- */
408
- export async function getTokens(sessionToken: string): Promise<{
409
- accessToken: string;
410
- refreshToken: string;
411
- // Also expose new names for clarity
412
- idpAccessToken: string;
413
- idpRefreshToken: string;
414
- } | null> {
415
- const session = await getSession(sessionToken);
416
- if (!session || !session.idpAccessToken || !session.idpRefreshToken) {
417
- return null;
418
- }
419
- return {
420
- // Legacy names for backward compatibility
421
- accessToken: session.idpAccessToken,
422
- refreshToken: session.idpRefreshToken,
423
- // New normalized names
424
- idpAccessToken: session.idpAccessToken,
425
- idpRefreshToken: session.idpRefreshToken,
426
- };
427
- }
428
-
429
- /**
430
- * Refreshes a JWT session (placeholder for compatibility).
431
- * @param sessionToken The session token.
432
- * @returns The session data or null.
433
- */
434
- export async function refreshJWTSession(sessionToken: string): Promise<SessionData | null> {
435
- return getSession(sessionToken);
436
- }
437
-
438
- /**
439
- * Clears all sessions (for testing only).
440
- */
441
- export async function clearAllSessions(): Promise<void> {
442
- console.warn('[SESSION-STORE] clearAllSessions called - this should only be used in testing');
443
- }
444
-
445
- /**
446
- * Lists all sessions (for testing/debugging only).
447
- * @returns An empty array (placeholder).
448
- */
449
- export async function listAllSessions(): Promise<string[]> {
450
- console.warn('[SESSION-STORE] listAllSessions called - this should only be used in testing');
451
- return [];
452
- }
453
-
454
- // ===============================
455
- // DISTRIBUTED REFRESH COORDINATION
456
- // ===============================
457
-
458
- /**
459
- * Attempt to acquire a refresh lock for a session
460
- * Uses Redis SET with NX (Not eXists) for atomic lock acquisition
461
- */
462
- export async function acquireRefreshLock(
463
- sessionToken: string,
464
- requestId: string,
465
- maxWaitMs: number = 5000
466
- ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
467
- const lockKey = getRefreshLockKey(sessionToken);
468
- const acquiredAt = Date.now();
469
- const lockVersion = Math.floor(Math.random() * 1000000);
470
-
471
- const lockInfo: RefreshLockInfo = {
472
- sessionToken,
473
- acquiredAt,
474
- acquiredBy: requestId,
475
- lockVersion
476
- };
477
-
478
- try {
479
- // Try to acquire the lock atomically
480
- const result = await redis.set(lockKey, JSON.stringify(lockInfo), 'PX', REFRESH_LOCK_TTL * 1000, 'NX');
481
-
482
- if (result === 'OK') {
483
- console.debug('[SESSION-STORE] Refresh lock acquired', {
484
- sessionToken: sessionToken.substring(0, 8) + '...',
485
- requestId,
486
- lockVersion
487
- });
488
-
489
- return { acquired: true, lockInfo };
490
- } else {
491
- // Lock already exists, check if we should wait
492
- if (maxWaitMs > 0) {
493
- console.debug('[SESSION-STORE] Refresh lock already exists, waiting for release', {
494
- sessionToken: sessionToken.substring(0, 8) + '...',
495
- requestId,
496
- maxWaitMs
497
- });
498
-
499
- return await waitForRefreshLockRelease(sessionToken, requestId, maxWaitMs);
500
- }
501
-
502
- console.warn('[SESSION-STORE] Refresh lock already exists, not waiting', {
503
- sessionToken: sessionToken.substring(0, 8) + '...',
504
- requestId
505
- });
506
-
507
- return { acquired: false };
508
- }
509
- } catch (error) {
510
- console.error('[SESSION-STORE] Failed to acquire refresh lock', {
511
- sessionToken: sessionToken.substring(0, 8) + '...',
512
- requestId,
513
- error: error instanceof Error ? error.message : String(error)
514
- });
515
-
516
- return { acquired: false };
517
- }
518
- }
519
-
520
- /**
521
- * Wait for a refresh lock to be released
522
- */
523
- async function waitForRefreshLockRelease(
524
- sessionToken: string,
525
- requestId: string,
526
- maxWaitMs: number
527
- ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
528
- const lockKey = getRefreshLockKey(sessionToken);
529
- const startTime = Date.now();
530
- const pollInterval = 100;
531
-
532
- while (Date.now() - startTime < maxWaitMs) {
533
- try {
534
- const lockExists = await redis.exists(lockKey);
535
-
536
- if (!lockExists) {
537
- // Lock released - do not reacquire here to avoid double refresh
538
- return { acquired: false };
539
- }
540
-
541
- // Wait before next check
542
- await new Promise(resolve => setTimeout(resolve, pollInterval));
543
- } catch (error) {
544
- console.error('[SESSION-STORE] Error while waiting for refresh lock release', {
545
- sessionToken: sessionToken.substring(0, 8) + '...',
546
- requestId,
547
- error: error instanceof Error ? error.message : String(error)
548
- });
549
- break;
550
- }
551
- }
552
-
553
- console.warn('[SESSION-STORE] Timeout waiting for refresh lock release', {
554
- sessionToken: sessionToken.substring(0, 8) + '...',
555
- requestId,
556
- waitedMs: Date.now() - startTime
557
- });
558
-
559
- return { acquired: false };
560
- }
561
-
562
- /**
563
- * Release a refresh lock
564
- * Uses Lua script to ensure atomic validation and release
565
- */
566
- export async function releaseRefreshLock(
567
- sessionToken: string,
568
- requestId: string,
569
- lockVersion?: number
570
- ): Promise<boolean> {
571
- const lockKey = getRefreshLockKey(sessionToken);
572
-
573
- try {
574
- // Lua script for atomic lock validation and release
575
- const luaScript = `
576
- local lockKey = KEYS[1]
577
- local expectedRequestId = ARGV[1]
578
- local expectedVersion = ARGV[2]
579
-
580
- local lockData = redis.call('GET', lockKey)
581
- if not lockData then
582
- return 0 -- Lock doesn't exist
583
- end
584
-
585
- local lockInfo = cjson.decode(lockData)
586
- if lockInfo.acquiredBy == expectedRequestId then
587
- if not expectedVersion or expectedVersion == '' or tostring(lockInfo.lockVersion) == expectedVersion then
588
- redis.call('DEL', lockKey)
589
- return 1 -- Successfully released
590
- else
591
- return -2 -- Version mismatch
592
- end
593
- else
594
- return -1 -- Wrong owner
595
- end
596
- `;
597
-
598
- const result = await redis.eval(
599
- luaScript,
600
- 1,
601
- lockKey,
602
- requestId,
603
- lockVersion ? lockVersion.toString() : ''
604
- ) as number;
605
-
606
- if (result === 1) {
607
- console.debug('[SESSION-STORE] Refresh lock released successfully', {
608
- sessionToken: sessionToken.substring(0, 8) + '...',
609
- requestId,
610
- lockVersion
611
- });
612
- return true;
613
- } else if (result === 0) {
614
- console.warn('[SESSION-STORE] Attempted to release non-existent refresh lock', {
615
- sessionToken: sessionToken.substring(0, 8) + '...',
616
- requestId
617
- });
618
- return false;
619
- } else if (result === -1) {
620
- console.error('[SESSION-STORE] Attempted to release refresh lock owned by another request', {
621
- sessionToken: sessionToken.substring(0, 8) + '...',
622
- requestId
623
- });
624
- return false;
625
- } else if (result === -2) {
626
- console.error('[SESSION-STORE] Lock version mismatch during release', {
627
- sessionToken: sessionToken.substring(0, 8) + '...',
628
- requestId,
629
- lockVersion
630
- });
631
- return false;
632
- } else {
633
- console.error('[SESSION-STORE] Unexpected result from lock release script', {
634
- sessionToken: sessionToken.substring(0, 8) + '...',
635
- requestId,
636
- result
637
- });
638
- return false;
639
- }
640
- } catch (error) {
641
- console.error('[SESSION-STORE] Failed to release refresh lock', {
642
- sessionToken: sessionToken.substring(0, 8) + '...',
643
- requestId,
644
- error: error instanceof Error ? error.message : String(error)
645
- });
646
-
647
- return false;
648
- }
649
- }
650
-
651
- /**
652
- * Check if a refresh lock exists for a session
653
- */
654
- export async function checkRefreshLock(sessionToken: string): Promise<RefreshLockInfo | null> {
655
- const lockKey = getRefreshLockKey(sessionToken);
656
-
657
- try {
658
- const lockData = await redis.get(lockKey);
659
-
660
- if (!lockData) {
661
- return null;
662
- }
663
-
664
- return JSON.parse(lockData) as RefreshLockInfo;
665
- } catch (error) {
666
- console.error('[SESSION-STORE] Failed to check refresh lock', {
667
- sessionToken: sessionToken.substring(0, 8) + '...',
668
- error: error instanceof Error ? error.message : String(error)
669
- });
670
-
671
- return null;
672
- }
673
- }
674
-
675
- /**
676
- * Simple check if a refresh is currently in progress for a session
677
- */
678
- export async function isRefreshInProgress(sessionToken: string): Promise<boolean> {
679
- const lock = await checkRefreshLock(sessionToken);
680
- return lock !== null;
681
- }
682
-
683
- /**
684
- * Force cleanup of expired or orphaned refresh locks
685
- */
686
- export async function cleanupRefreshLocks(): Promise<number> {
687
- console.warn('[SESSION-STORE] cleanupRefreshLocks called - scanning for expired locks');
688
- return 0;
689
- }
1
+ /**
2
+ * Session Store for `@payez/next-mvp` using ioredis
3
+ *
4
+ * This module provides a Redis-backed session store that is compatible with the
5
+ * `ioredis` client. It handles the creation, retrieval, and deletion of
6
+ * session data, which is the single source of truth for authentication.
7
+ *
8
+ * Includes advanced distributed refresh coordination with version control.
9
+ */
10
+
11
+ import redis from './redis';
12
+ import { randomBytes } from 'crypto';
13
+ import { SessionData } from '../models/SessionModel';
14
+ import { getSessionPrefix, getRefreshLockPrefix } from './app-slug';
15
+ import { extractKidFromToken } from '../auth/utils/token-utils';
16
+
17
+ // Re-export SessionData for consumers
18
+ export type { SessionData } from '../models/SessionModel';
19
+
20
+ // Use app-slug prefixes for multi-app isolation
21
+ const getSessionKey = (token: string) => `${getSessionPrefix()}${token}`;
22
+ const getRefreshLockKey = (token: string) => `${getRefreshLockPrefix()}${token}`;
23
+ const getSessionVersionKey = (token: string) => `${getSessionPrefix()}ver:${token}`;
24
+
25
+ // Better Auth uses a different key format: ba:{appSlug}:{token}
26
+ const getBetterAuthSessionKey = (token: string, appSlug?: string) => `ba:${appSlug || 'app'}:${token}`;
27
+
28
+ const REFRESH_LOCK_TTL = 60; // 60 seconds
29
+ const SESSION_TTL = 3 * 24 * 60 * 60; // 3 days in seconds (matches refresh token lifetime)
30
+
31
+ export interface RefreshLockInfo {
32
+ sessionToken: string;
33
+ acquiredAt: number;
34
+ acquiredBy: string; // request ID or process identifier
35
+ lockVersion: number;
36
+ }
37
+
38
+ /**
39
+ * Generates a new session token.
40
+ * @returns A new session token string.
41
+ */
42
+ export function generateSessionToken(): string {
43
+ return randomBytes(32).toString('hex');
44
+ }
45
+
46
+ /**
47
+ * Creates a new session in Redis.
48
+ *
49
+ * @param data The session data to store.
50
+ * @returns The generated session token (redisSessionId).
51
+ */
52
+ export async function createSession(data: SessionData): Promise<string> {
53
+ const sessionToken = randomBytes(32).toString('hex');
54
+ const key = getSessionKey(sessionToken);
55
+ const versionKey = getSessionVersionKey(sessionToken);
56
+
57
+ try {
58
+ await redis.multi()
59
+ .setex(key, SESSION_TTL, JSON.stringify(data))
60
+ .setex(versionKey, SESSION_TTL, '1')
61
+ .exec();
62
+ } catch (error) {
63
+ console.error('[SESSION-STORE] Failed to create session:', error);
64
+ throw error;
65
+ }
66
+
67
+ return sessionToken;
68
+ }
69
+
70
+ /**
71
+ * Retrieves a session from Redis.
72
+ *
73
+ * @param sessionToken The session token (redisSessionId) to look up.
74
+ * @returns The session data, or null if not found.
75
+ */
76
+ export async function getSession(sessionToken: string): Promise<SessionData | null> {
77
+ if (!sessionToken) {
78
+ return null;
79
+ }
80
+ const key = getSessionKey(sessionToken);
81
+ const json = await redis.get(key);
82
+ if (!json) {
83
+ return null;
84
+ }
85
+ try {
86
+ return JSON.parse(json) as SessionData;
87
+ } catch {
88
+ console.error('[SESSION-STORE] Failed to parse session data');
89
+ return null;
90
+ }
91
+ }
92
+
93
+ /**
94
+ * Retrieves a Better Auth session from Redis.
95
+ * Better Auth uses key format: ba:{appSlug}:{token}
96
+ *
97
+ * @param sessionToken The session token to look up.
98
+ * @param appSlug The app slug (defaults to 'idealvibe_online' or extracted from env).
99
+ * @returns The session data, or null if not found.
100
+ */
101
+ export async function getBetterAuthSession(sessionToken: string, appSlug?: string): Promise<SessionData | null> {
102
+ if (!sessionToken) {
103
+ return null;
104
+ }
105
+ // Try to get appSlug from env if not provided
106
+ const slug = appSlug || process.env.CLIENT_ID || 'idealvibe_online';
107
+ const key = getBetterAuthSessionKey(sessionToken, slug);
108
+ const json = await redis.get(key);
109
+ if (!json) {
110
+ return null;
111
+ }
112
+ try {
113
+ const data = JSON.parse(json);
114
+ // Better Auth stores the session differently - extract user data
115
+ if (data.user) {
116
+ return {
117
+ userId: data.user.id || data.user.email,
118
+ email: data.user.email,
119
+ name: data.user.name,
120
+ idpAccessToken: data.idpTokens?.idpAccessToken,
121
+ idpRefreshToken: data.idpTokens?.idpRefreshToken,
122
+ idpAccessTokenExpires: data.idpTokens?.idpAccessTokenExpires,
123
+ mfaVerified: data.idpTokens?.mfaVerified ?? false,
124
+ roles: data.idpTokens?.roles || [],
125
+ } as SessionData;
126
+ }
127
+ return data as SessionData;
128
+ } catch {
129
+ console.error('[SESSION-STORE] Failed to parse Better Auth session data');
130
+ return null;
131
+ }
132
+ }
133
+
134
+ /**
135
+ * Refresh session TTL without reading/writing data (sliding window expiry).
136
+ */
137
+ export async function touchSession(token: string): Promise<void> {
138
+ const key = getSessionKey(token);
139
+ await redis.expire(key, SESSION_TTL);
140
+ }
141
+
142
+ /**
143
+ * Retrieves a session along with a version identifier for optimistic locking.
144
+ * @param sessionToken The session token to look up.
145
+ * @returns An object with session and version, or null if not found.
146
+ */
147
+ export async function getSessionWithVersion(sessionToken: string): Promise<{ session: SessionData; version: string } | null> {
148
+ const session = await getSession(sessionToken);
149
+ if (!session) {
150
+ return null;
151
+ }
152
+
153
+ const versionKey = getSessionVersionKey(sessionToken);
154
+ const version = await redis.get(versionKey);
155
+
156
+ if (!version) {
157
+ // Session exists but version key missing - use idpAccessTokenExpires as fallback
158
+ const fallbackVersion = String(session.idpAccessTokenExpires || Date.now());
159
+ return { session, version: fallbackVersion };
160
+ }
161
+
162
+ return { session, version };
163
+ }
164
+
165
+ /**
166
+ * Checks if the access token in a session is still fresh (not expired).
167
+ * @param sessionToken The session token to check.
168
+ * @param currentAccessToken The current access token to compare.
169
+ * @param currentVersion Optional version to check for changes.
170
+ * @returns Object with freshness status and latest token info.
171
+ */
172
+ export async function isAccessTokenFresh(
173
+ sessionToken: string,
174
+ currentAccessToken: string,
175
+ currentVersion?: string
176
+ ): Promise<{
177
+ isFresh: boolean;
178
+ latestAccessToken?: string;
179
+ latestVersion?: string;
180
+ versionChanged: boolean;
181
+ }> {
182
+ const sessionWithVersion = await getSessionWithVersion(sessionToken);
183
+
184
+ if (!sessionWithVersion) {
185
+ return { isFresh: false, versionChanged: true };
186
+ }
187
+
188
+ const { session, version } = sessionWithVersion;
189
+ const versionChanged = currentVersion ? version !== currentVersion : false;
190
+
191
+ // If version changed, the token might be stale
192
+ // Use normalized field name (idpAccessToken)
193
+ const isFresh = !versionChanged && session.idpAccessToken === currentAccessToken;
194
+
195
+ return {
196
+ isFresh,
197
+ latestAccessToken: session.idpAccessToken || undefined,
198
+ latestVersion: version,
199
+ versionChanged
200
+ };
201
+ }
202
+
203
+ /**
204
+ * Deletes a session from Redis.
205
+ * @param sessionToken The session token to delete.
206
+ */
207
+ export async function deleteSession(sessionToken: string): Promise<void> {
208
+ if (!sessionToken) {
209
+ return;
210
+ }
211
+ const key = getSessionKey(sessionToken);
212
+ const versionKey = getSessionVersionKey(sessionToken);
213
+ await redis.del(key, versionKey);
214
+ }
215
+
216
+ /**
217
+ * Sets a session directly (for testing or migrations).
218
+ * @param sessionToken The session token.
219
+ * @param data The session data.
220
+ */
221
+ export async function setSession(sessionToken: string, data: SessionData): Promise<void> {
222
+ const key = getSessionKey(sessionToken);
223
+ const versionKey = getSessionVersionKey(sessionToken);
224
+ await redis.multi()
225
+ .setex(key, SESSION_TTL, JSON.stringify(data))
226
+ .incr(versionKey)
227
+ .expire(versionKey, SESSION_TTL)
228
+ .exec();
229
+ }
230
+
231
+ /**
232
+ * Updates tokens within an existing session.
233
+ * @param sessionToken The session token to update.
234
+ * @param updates Partial session data to update.
235
+ * @returns The updated session data, or null if the session was not found.
236
+ */
237
+ export async function updateSession(
238
+ sessionToken: string,
239
+ updates: Partial<SessionData>
240
+ ): Promise<SessionData | null> {
241
+ const key = getSessionKey(sessionToken);
242
+ const versionKey = getSessionVersionKey(sessionToken);
243
+
244
+ // Get current session to merge with updates
245
+ const currentSession = await getSession(sessionToken);
246
+ if (!currentSession) {
247
+ return null;
248
+ }
249
+
250
+ // CRITICAL: Track any refresh token changes (check both old and new field names)
251
+ const hadRefreshToken = !!(currentSession.idpRefreshToken || (currentSession as any).refreshToken);
252
+ const willHaveRefreshToken = (updates as any).idpRefreshToken !== undefined
253
+ ? !!(updates as any).idpRefreshToken
254
+ : (updates as any).refreshToken !== undefined
255
+ ? !!(updates as any).refreshToken
256
+ : hadRefreshToken;
257
+
258
+ if (hadRefreshToken && !willHaveRefreshToken) {
259
+ console.error('[SESSION-STORE] ⚠️ REFRESH_TOKEN_BEING_CLEARED', {
260
+ sessionToken: sessionToken.substring(0, 8) + '...',
261
+ userId: currentSession.userId,
262
+ updateKeys: Object.keys(updates),
263
+ refreshTokenInUpdate: (updates as any).idpRefreshToken || (updates as any).refreshToken,
264
+ refreshTokenClearedReason: (updates as any).refreshTokenClearedReason || 'UNKNOWN',
265
+ stack: new Error().stack
266
+ });
267
+ }
268
+
269
+ // Merge current session with updates
270
+ const updatedSession = { ...currentSession, ...updates };
271
+
272
+ // Write the entire updated session back to Redis with version increment
273
+ await redis.multi()
274
+ .setex(key, SESSION_TTL, JSON.stringify(updatedSession))
275
+ .incr(versionKey)
276
+ .expire(versionKey, SESSION_TTL)
277
+ .exec();
278
+
279
+ return updatedSession;
280
+ }
281
+
282
+ /**
283
+ * Transitions a session to a MFA-completed state.
284
+ * @param sessionToken The session token to update.
285
+ * @param tokens The new tokens received after MFA completion.
286
+ * @param mfaMethod The MFA method used (email, sms, totp) - required for token refresh.
287
+ * @returns The updated session data.
288
+ */
289
+ export async function transitionTo2FASession(
290
+ sessionToken: string,
291
+ tokens: {
292
+ accessToken?: string;
293
+ refreshToken?: string;
294
+ accessTokenExpires?: number;
295
+ refreshTokenExpires?: number;
296
+ // Support new field names
297
+ idpAccessToken?: string;
298
+ idpRefreshToken?: string;
299
+ idpAccessTokenExpires?: number;
300
+ idpRefreshTokenExpires?: number;
301
+ },
302
+ mfaMethod?: 'email' | 'sms' | 'totp'
303
+ ): Promise<SessionData | null> {
304
+ const newAccessToken = tokens.idpAccessToken || tokens.accessToken;
305
+
306
+ console.log('[transitionTo2FASession] Called with:', {
307
+ sessionToken: sessionToken?.substring(0, 8) + '...',
308
+ mfaMethod,
309
+ hasAccessToken: !!newAccessToken,
310
+ hasRefreshToken: !!(tokens.idpRefreshToken || tokens.refreshToken),
311
+ });
312
+
313
+ // Extract bearerKeyId from the new access token (IDP may use different key after 2FA)
314
+ let bearerKeyId: string | undefined;
315
+ if (newAccessToken) {
316
+ bearerKeyId = extractKidFromToken(newAccessToken);
317
+ if (bearerKeyId) {
318
+ console.log('[transitionTo2FASession] Extracted bearerKeyId (kid) from new JWT header:', bearerKeyId);
319
+ }
320
+ }
321
+
322
+ // Support both old and new field names in input
323
+ // CRITICAL: Set BOTH mfaVerified (new) AND twoFactorComplete (legacy) for compatibility
324
+ // auth.ts session callback reads twoFactorComplete, so we must set it here
325
+ const updates: Partial<SessionData> = {
326
+ idpAccessToken: newAccessToken,
327
+ idpRefreshToken: tokens.idpRefreshToken || tokens.refreshToken,
328
+ idpAccessTokenExpires: tokens.idpAccessTokenExpires || tokens.accessTokenExpires,
329
+ mfaVerified: true,
330
+ twoFactorComplete: true, // Legacy field - required by auth.ts session callback
331
+ mfaMethod: mfaMethod,
332
+ // Update bearerKeyId if extracted from new token
333
+ ...(bearerKeyId && { bearerKeyId }),
334
+ };
335
+
336
+ const refreshExpires = tokens.idpRefreshTokenExpires || tokens.refreshTokenExpires;
337
+ if (refreshExpires !== undefined) {
338
+ updates.idpRefreshTokenExpires = refreshExpires;
339
+ }
340
+
341
+ console.log('[transitionTo2FASession] Updates to apply:', {
342
+ mfaVerified: updates.mfaVerified,
343
+ twoFactorComplete: (updates as any).twoFactorComplete,
344
+ mfaMethod: updates.mfaMethod,
345
+ hasIdpAccessToken: !!updates.idpAccessToken,
346
+ });
347
+
348
+ const result = await updateSession(sessionToken, updates);
349
+
350
+ console.log('[transitionTo2FASession] Result:', {
351
+ success: !!result,
352
+ resultMfaVerified: result?.mfaVerified,
353
+ });
354
+
355
+ return result;
356
+ }
357
+
358
+ /**
359
+ * Updates IDP tokens and their expiries in an existing session.
360
+ * @param sessionToken The session token to update.
361
+ * @param idpAccessToken The new IDP access token.
362
+ * @param idpRefreshToken The new IDP refresh token.
363
+ * @param idpAccessTokenExpires The access token expiry timestamp.
364
+ * @param idpRefreshTokenExpires The refresh token expiry timestamp (optional).
365
+ * @returns The updated session data.
366
+ */
367
+ export async function updateTokens(
368
+ sessionToken: string,
369
+ idpAccessToken: string,
370
+ idpRefreshToken: string,
371
+ idpAccessTokenExpires: number,
372
+ idpRefreshTokenExpires?: number
373
+ ): Promise<SessionData | null> {
374
+ return updateSession(sessionToken, {
375
+ idpAccessToken,
376
+ idpRefreshToken,
377
+ idpAccessTokenExpires,
378
+ idpRefreshTokenExpires,
379
+ } as Partial<SessionData>);
380
+ }
381
+
382
+ /**
383
+ * Marks a session as having completed MFA.
384
+ * @param sessionToken The session token to update.
385
+ * @returns The updated session data.
386
+ */
387
+ export async function mark2FAComplete(sessionToken: string): Promise<SessionData | null> {
388
+ return updateSession(sessionToken, {
389
+ mfaVerified: true,
390
+ });
391
+ }
392
+
393
+ /**
394
+ * Checks if MFA is complete for a session.
395
+ * @param sessionToken The session token.
396
+ * @returns True if MFA is complete.
397
+ */
398
+ export async function is2FAComplete(sessionToken: string): Promise<boolean> {
399
+ const session = await getSession(sessionToken);
400
+ return session?.mfaVerified === true;
401
+ }
402
+
403
+ /**
404
+ * Gets IDP tokens from a session.
405
+ * @param sessionToken The session token.
406
+ * @returns The tokens or null if session not found.
407
+ */
408
+ export async function getTokens(sessionToken: string): Promise<{
409
+ accessToken: string;
410
+ refreshToken: string;
411
+ // Also expose new names for clarity
412
+ idpAccessToken: string;
413
+ idpRefreshToken: string;
414
+ } | null> {
415
+ const session = await getSession(sessionToken);
416
+ if (!session || !session.idpAccessToken || !session.idpRefreshToken) {
417
+ return null;
418
+ }
419
+ return {
420
+ // Legacy names for backward compatibility
421
+ accessToken: session.idpAccessToken,
422
+ refreshToken: session.idpRefreshToken,
423
+ // New normalized names
424
+ idpAccessToken: session.idpAccessToken,
425
+ idpRefreshToken: session.idpRefreshToken,
426
+ };
427
+ }
428
+
429
+ /**
430
+ * Refreshes a JWT session (placeholder for compatibility).
431
+ * @param sessionToken The session token.
432
+ * @returns The session data or null.
433
+ */
434
+ export async function refreshJWTSession(sessionToken: string): Promise<SessionData | null> {
435
+ return getSession(sessionToken);
436
+ }
437
+
438
+ /**
439
+ * Clears all sessions (for testing only).
440
+ */
441
+ export async function clearAllSessions(): Promise<void> {
442
+ console.warn('[SESSION-STORE] clearAllSessions called - this should only be used in testing');
443
+ }
444
+
445
+ /**
446
+ * Lists all sessions (for testing/debugging only).
447
+ * @returns An empty array (placeholder).
448
+ */
449
+ export async function listAllSessions(): Promise<string[]> {
450
+ console.warn('[SESSION-STORE] listAllSessions called - this should only be used in testing');
451
+ return [];
452
+ }
453
+
454
+ // ===============================
455
+ // DISTRIBUTED REFRESH COORDINATION
456
+ // ===============================
457
+
458
+ /**
459
+ * Attempt to acquire a refresh lock for a session
460
+ * Uses Redis SET with NX (Not eXists) for atomic lock acquisition
461
+ */
462
+ export async function acquireRefreshLock(
463
+ sessionToken: string,
464
+ requestId: string,
465
+ maxWaitMs: number = 5000
466
+ ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
467
+ const lockKey = getRefreshLockKey(sessionToken);
468
+ const acquiredAt = Date.now();
469
+ const lockVersion = Math.floor(Math.random() * 1000000);
470
+
471
+ const lockInfo: RefreshLockInfo = {
472
+ sessionToken,
473
+ acquiredAt,
474
+ acquiredBy: requestId,
475
+ lockVersion
476
+ };
477
+
478
+ try {
479
+ // Try to acquire the lock atomically
480
+ const result = await redis.set(lockKey, JSON.stringify(lockInfo), 'PX', REFRESH_LOCK_TTL * 1000, 'NX');
481
+
482
+ if (result === 'OK') {
483
+ console.debug('[SESSION-STORE] Refresh lock acquired', {
484
+ sessionToken: sessionToken.substring(0, 8) + '...',
485
+ requestId,
486
+ lockVersion
487
+ });
488
+
489
+ return { acquired: true, lockInfo };
490
+ } else {
491
+ // Lock already exists, check if we should wait
492
+ if (maxWaitMs > 0) {
493
+ console.debug('[SESSION-STORE] Refresh lock already exists, waiting for release', {
494
+ sessionToken: sessionToken.substring(0, 8) + '...',
495
+ requestId,
496
+ maxWaitMs
497
+ });
498
+
499
+ return await waitForRefreshLockRelease(sessionToken, requestId, maxWaitMs);
500
+ }
501
+
502
+ console.warn('[SESSION-STORE] Refresh lock already exists, not waiting', {
503
+ sessionToken: sessionToken.substring(0, 8) + '...',
504
+ requestId
505
+ });
506
+
507
+ return { acquired: false };
508
+ }
509
+ } catch (error) {
510
+ console.error('[SESSION-STORE] Failed to acquire refresh lock', {
511
+ sessionToken: sessionToken.substring(0, 8) + '...',
512
+ requestId,
513
+ error: error instanceof Error ? error.message : String(error)
514
+ });
515
+
516
+ return { acquired: false };
517
+ }
518
+ }
519
+
520
+ /**
521
+ * Wait for a refresh lock to be released
522
+ */
523
+ async function waitForRefreshLockRelease(
524
+ sessionToken: string,
525
+ requestId: string,
526
+ maxWaitMs: number
527
+ ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
528
+ const lockKey = getRefreshLockKey(sessionToken);
529
+ const startTime = Date.now();
530
+ const pollInterval = 100;
531
+
532
+ while (Date.now() - startTime < maxWaitMs) {
533
+ try {
534
+ const lockExists = await redis.exists(lockKey);
535
+
536
+ if (!lockExists) {
537
+ // Lock released - do not reacquire here to avoid double refresh
538
+ return { acquired: false };
539
+ }
540
+
541
+ // Wait before next check
542
+ await new Promise(resolve => setTimeout(resolve, pollInterval));
543
+ } catch (error) {
544
+ console.error('[SESSION-STORE] Error while waiting for refresh lock release', {
545
+ sessionToken: sessionToken.substring(0, 8) + '...',
546
+ requestId,
547
+ error: error instanceof Error ? error.message : String(error)
548
+ });
549
+ break;
550
+ }
551
+ }
552
+
553
+ console.warn('[SESSION-STORE] Timeout waiting for refresh lock release', {
554
+ sessionToken: sessionToken.substring(0, 8) + '...',
555
+ requestId,
556
+ waitedMs: Date.now() - startTime
557
+ });
558
+
559
+ return { acquired: false };
560
+ }
561
+
562
+ /**
563
+ * Release a refresh lock
564
+ * Uses Lua script to ensure atomic validation and release
565
+ */
566
+ export async function releaseRefreshLock(
567
+ sessionToken: string,
568
+ requestId: string,
569
+ lockVersion?: number
570
+ ): Promise<boolean> {
571
+ const lockKey = getRefreshLockKey(sessionToken);
572
+
573
+ try {
574
+ // Lua script for atomic lock validation and release
575
+ const luaScript = `
576
+ local lockKey = KEYS[1]
577
+ local expectedRequestId = ARGV[1]
578
+ local expectedVersion = ARGV[2]
579
+
580
+ local lockData = redis.call('GET', lockKey)
581
+ if not lockData then
582
+ return 0 -- Lock doesn't exist
583
+ end
584
+
585
+ local lockInfo = cjson.decode(lockData)
586
+ if lockInfo.acquiredBy == expectedRequestId then
587
+ if not expectedVersion or expectedVersion == '' or tostring(lockInfo.lockVersion) == expectedVersion then
588
+ redis.call('DEL', lockKey)
589
+ return 1 -- Successfully released
590
+ else
591
+ return -2 -- Version mismatch
592
+ end
593
+ else
594
+ return -1 -- Wrong owner
595
+ end
596
+ `;
597
+
598
+ const result = await redis.eval(
599
+ luaScript,
600
+ 1,
601
+ lockKey,
602
+ requestId,
603
+ lockVersion ? lockVersion.toString() : ''
604
+ ) as number;
605
+
606
+ if (result === 1) {
607
+ console.debug('[SESSION-STORE] Refresh lock released successfully', {
608
+ sessionToken: sessionToken.substring(0, 8) + '...',
609
+ requestId,
610
+ lockVersion
611
+ });
612
+ return true;
613
+ } else if (result === 0) {
614
+ console.warn('[SESSION-STORE] Attempted to release non-existent refresh lock', {
615
+ sessionToken: sessionToken.substring(0, 8) + '...',
616
+ requestId
617
+ });
618
+ return false;
619
+ } else if (result === -1) {
620
+ console.error('[SESSION-STORE] Attempted to release refresh lock owned by another request', {
621
+ sessionToken: sessionToken.substring(0, 8) + '...',
622
+ requestId
623
+ });
624
+ return false;
625
+ } else if (result === -2) {
626
+ console.error('[SESSION-STORE] Lock version mismatch during release', {
627
+ sessionToken: sessionToken.substring(0, 8) + '...',
628
+ requestId,
629
+ lockVersion
630
+ });
631
+ return false;
632
+ } else {
633
+ console.error('[SESSION-STORE] Unexpected result from lock release script', {
634
+ sessionToken: sessionToken.substring(0, 8) + '...',
635
+ requestId,
636
+ result
637
+ });
638
+ return false;
639
+ }
640
+ } catch (error) {
641
+ console.error('[SESSION-STORE] Failed to release refresh lock', {
642
+ sessionToken: sessionToken.substring(0, 8) + '...',
643
+ requestId,
644
+ error: error instanceof Error ? error.message : String(error)
645
+ });
646
+
647
+ return false;
648
+ }
649
+ }
650
+
651
+ /**
652
+ * Check if a refresh lock exists for a session
653
+ */
654
+ export async function checkRefreshLock(sessionToken: string): Promise<RefreshLockInfo | null> {
655
+ const lockKey = getRefreshLockKey(sessionToken);
656
+
657
+ try {
658
+ const lockData = await redis.get(lockKey);
659
+
660
+ if (!lockData) {
661
+ return null;
662
+ }
663
+
664
+ return JSON.parse(lockData) as RefreshLockInfo;
665
+ } catch (error) {
666
+ console.error('[SESSION-STORE] Failed to check refresh lock', {
667
+ sessionToken: sessionToken.substring(0, 8) + '...',
668
+ error: error instanceof Error ? error.message : String(error)
669
+ });
670
+
671
+ return null;
672
+ }
673
+ }
674
+
675
+ /**
676
+ * Simple check if a refresh is currently in progress for a session
677
+ */
678
+ export async function isRefreshInProgress(sessionToken: string): Promise<boolean> {
679
+ const lock = await checkRefreshLock(sessionToken);
680
+ return lock !== null;
681
+ }
682
+
683
+ /**
684
+ * Force cleanup of expired or orphaned refresh locks
685
+ */
686
+ export async function cleanupRefreshLocks(): Promise<number> {
687
+ console.warn('[SESSION-STORE] cleanupRefreshLocks called - scanning for expired locks');
688
+ return 0;
689
+ }