@payez/next-mvp 4.1.0 → 4.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,689 +1,692 @@
1
- /**
2
- * Session Store for `@payez/next-mvp` using ioredis
3
- *
4
- * This module provides a Redis-backed session store that is compatible with the
5
- * `ioredis` client. It handles the creation, retrieval, and deletion of
6
- * session data, which is the single source of truth for authentication.
7
- *
8
- * Includes advanced distributed refresh coordination with version control.
9
- */
10
-
11
- import redis from './redis';
12
- import { randomBytes } from 'crypto';
13
- import { SessionData } from '../models/SessionModel';
14
- import { getSessionPrefix, getRefreshLockPrefix } from './app-slug';
15
- import { extractKidFromToken } from '../auth/utils/token-utils';
16
-
17
- // Re-export SessionData for consumers
18
- export type { SessionData } from '../models/SessionModel';
19
-
20
- // Use app-slug prefixes for multi-app isolation
21
- const getSessionKey = (token: string) => `${getSessionPrefix()}${token}`;
22
- const getRefreshLockKey = (token: string) => `${getRefreshLockPrefix()}${token}`;
23
- const getSessionVersionKey = (token: string) => `${getSessionPrefix()}ver:${token}`;
24
-
25
- // Better Auth uses a different key format: ba:{appSlug}:{token}
26
- const getBetterAuthSessionKey = (token: string, appSlug?: string) => `ba:${appSlug || 'app'}:${token}`;
27
-
28
- const REFRESH_LOCK_TTL = 60; // 60 seconds
29
- const SESSION_TTL = 3 * 24 * 60 * 60; // 3 days in seconds (matches refresh token lifetime)
30
-
31
- export interface RefreshLockInfo {
32
- sessionToken: string;
33
- acquiredAt: number;
34
- acquiredBy: string; // request ID or process identifier
35
- lockVersion: number;
36
- }
37
-
38
- /**
39
- * Generates a new session token.
40
- * @returns A new session token string.
41
- */
42
- export function generateSessionToken(): string {
43
- return randomBytes(32).toString('hex');
44
- }
45
-
46
- /**
47
- * Creates a new session in Redis.
48
- *
49
- * @param data The session data to store.
50
- * @returns The generated session token (redisSessionId).
51
- */
52
- export async function createSession(data: SessionData): Promise<string> {
53
- const sessionToken = randomBytes(32).toString('hex');
54
- const key = getSessionKey(sessionToken);
55
- const versionKey = getSessionVersionKey(sessionToken);
56
-
57
- try {
58
- await redis.multi()
59
- .setex(key, SESSION_TTL, JSON.stringify(data))
60
- .setex(versionKey, SESSION_TTL, '1')
61
- .exec();
62
- } catch (error) {
63
- console.error('[SESSION-STORE] Failed to create session:', error);
64
- throw error;
65
- }
66
-
67
- return sessionToken;
68
- }
69
-
70
- /**
71
- * Retrieves a session from Redis.
72
- *
73
- * @param sessionToken The session token (redisSessionId) to look up.
74
- * @returns The session data, or null if not found.
75
- */
76
- export async function getSession(sessionToken: string): Promise<SessionData | null> {
77
- if (!sessionToken) {
78
- return null;
79
- }
80
- const key = getSessionKey(sessionToken);
81
- const json = await redis.get(key);
82
- if (!json) {
83
- return null;
84
- }
85
- try {
86
- return JSON.parse(json) as SessionData;
87
- } catch {
88
- console.error('[SESSION-STORE] Failed to parse session data');
89
- return null;
90
- }
91
- }
92
-
93
- /**
94
- * Retrieves a Better Auth session from Redis.
95
- * Better Auth uses key format: ba:{appSlug}:{token}
96
- *
97
- * @param sessionToken The session token to look up.
98
- * @param appSlug The app slug (defaults to 'idealvibe_online' or extracted from env).
99
- * @returns The session data, or null if not found.
100
- */
101
- export async function getBetterAuthSession(sessionToken: string, appSlug?: string): Promise<SessionData | null> {
102
- if (!sessionToken) {
103
- return null;
104
- }
105
- // Try to get appSlug from env if not provided
106
- const slug = appSlug || process.env.CLIENT_ID || 'idealvibe_online';
107
- const key = getBetterAuthSessionKey(sessionToken, slug);
108
- const json = await redis.get(key);
109
- if (!json) {
110
- return null;
111
- }
112
- try {
113
- const data = JSON.parse(json);
114
- // Better Auth stores the session differently - extract user data
115
- if (data.user) {
116
- return {
117
- userId: data.user.id || data.user.email,
118
- email: data.user.email,
119
- name: data.user.name,
120
- idpAccessToken: data.idpTokens?.idpAccessToken,
121
- idpRefreshToken: data.idpTokens?.idpRefreshToken,
122
- idpAccessTokenExpires: data.idpTokens?.idpAccessTokenExpires,
123
- mfaVerified: data.idpTokens?.mfaVerified ?? false,
124
- roles: data.idpTokens?.roles || [],
125
- } as SessionData;
126
- }
127
- return data as SessionData;
128
- } catch {
129
- console.error('[SESSION-STORE] Failed to parse Better Auth session data');
130
- return null;
131
- }
132
- }
133
-
134
- /**
135
- * Refresh session TTL without reading/writing data (sliding window expiry).
136
- */
137
- export async function touchSession(token: string): Promise<void> {
138
- const key = getSessionKey(token);
139
- await redis.expire(key, SESSION_TTL);
140
- }
141
-
142
- /**
143
- * Retrieves a session along with a version identifier for optimistic locking.
144
- * @param sessionToken The session token to look up.
145
- * @returns An object with session and version, or null if not found.
146
- */
147
- export async function getSessionWithVersion(sessionToken: string): Promise<{ session: SessionData; version: string } | null> {
148
- const session = await getSession(sessionToken);
149
- if (!session) {
150
- return null;
151
- }
152
-
153
- const versionKey = getSessionVersionKey(sessionToken);
154
- const version = await redis.get(versionKey);
155
-
156
- if (!version) {
157
- // Session exists but version key missing - use idpAccessTokenExpires as fallback
158
- const fallbackVersion = String(session.idpAccessTokenExpires || Date.now());
159
- return { session, version: fallbackVersion };
160
- }
161
-
162
- return { session, version };
163
- }
164
-
165
- /**
166
- * Checks if the access token in a session is still fresh (not expired).
167
- * @param sessionToken The session token to check.
168
- * @param currentAccessToken The current access token to compare.
169
- * @param currentVersion Optional version to check for changes.
170
- * @returns Object with freshness status and latest token info.
171
- */
172
- export async function isAccessTokenFresh(
173
- sessionToken: string,
174
- currentAccessToken: string,
175
- currentVersion?: string
176
- ): Promise<{
177
- isFresh: boolean;
178
- latestAccessToken?: string;
179
- latestVersion?: string;
180
- versionChanged: boolean;
181
- }> {
182
- const sessionWithVersion = await getSessionWithVersion(sessionToken);
183
-
184
- if (!sessionWithVersion) {
185
- return { isFresh: false, versionChanged: true };
186
- }
187
-
188
- const { session, version } = sessionWithVersion;
189
- const versionChanged = currentVersion ? version !== currentVersion : false;
190
-
191
- // If version changed, the token might be stale
192
- // Use normalized field name (idpAccessToken)
193
- const isFresh = !versionChanged && session.idpAccessToken === currentAccessToken;
194
-
195
- return {
196
- isFresh,
197
- latestAccessToken: session.idpAccessToken || undefined,
198
- latestVersion: version,
199
- versionChanged
200
- };
201
- }
202
-
203
- /**
204
- * Deletes a session from Redis.
205
- * @param sessionToken The session token to delete.
206
- */
207
- export async function deleteSession(sessionToken: string): Promise<void> {
208
- if (!sessionToken) {
209
- return;
210
- }
211
- const key = getSessionKey(sessionToken);
212
- const versionKey = getSessionVersionKey(sessionToken);
213
- await redis.del(key, versionKey);
214
- }
215
-
216
- /**
217
- * Sets a session directly (for testing or migrations).
218
- * @param sessionToken The session token.
219
- * @param data The session data.
220
- */
221
- export async function setSession(sessionToken: string, data: SessionData): Promise<void> {
222
- const key = getSessionKey(sessionToken);
223
- const versionKey = getSessionVersionKey(sessionToken);
224
- await redis.multi()
225
- .setex(key, SESSION_TTL, JSON.stringify(data))
226
- .incr(versionKey)
227
- .expire(versionKey, SESSION_TTL)
228
- .exec();
229
- }
230
-
231
- /**
232
- * Updates tokens within an existing session.
233
- * @param sessionToken The session token to update.
234
- * @param updates Partial session data to update.
235
- * @returns The updated session data, or null if the session was not found.
236
- */
237
- export async function updateSession(
238
- sessionToken: string,
239
- updates: Partial<SessionData>
240
- ): Promise<SessionData | null> {
241
- const key = getSessionKey(sessionToken);
242
- const versionKey = getSessionVersionKey(sessionToken);
243
-
244
- // Get current session to merge with updates
245
- const currentSession = await getSession(sessionToken);
246
- if (!currentSession) {
247
- return null;
248
- }
249
-
250
- // CRITICAL: Track any refresh token changes (check both old and new field names)
251
- const hadRefreshToken = !!(currentSession.idpRefreshToken || (currentSession as any).refreshToken);
252
- const willHaveRefreshToken = (updates as any).idpRefreshToken !== undefined
253
- ? !!(updates as any).idpRefreshToken
254
- : (updates as any).refreshToken !== undefined
255
- ? !!(updates as any).refreshToken
256
- : hadRefreshToken;
257
-
258
- if (hadRefreshToken && !willHaveRefreshToken) {
259
- console.error('[SESSION-STORE] ⚠️ REFRESH_TOKEN_BEING_CLEARED', {
260
- sessionToken: sessionToken.substring(0, 8) + '...',
261
- userId: currentSession.userId,
262
- updateKeys: Object.keys(updates),
263
- refreshTokenInUpdate: (updates as any).idpRefreshToken || (updates as any).refreshToken,
264
- refreshTokenClearedReason: (updates as any).refreshTokenClearedReason || 'UNKNOWN',
265
- stack: new Error().stack
266
- });
267
- }
268
-
269
- // Merge current session with updates
270
- const updatedSession = { ...currentSession, ...updates };
271
-
272
- // Write the entire updated session back to Redis with version increment
273
- await redis.multi()
274
- .setex(key, SESSION_TTL, JSON.stringify(updatedSession))
275
- .incr(versionKey)
276
- .expire(versionKey, SESSION_TTL)
277
- .exec();
278
-
279
- return updatedSession;
280
- }
281
-
282
- /**
283
- * Transitions a session to a MFA-completed state.
284
- * @param sessionToken The session token to update.
285
- * @param tokens The new tokens received after MFA completion.
286
- * @param mfaMethod The MFA method used (email, sms, totp) - required for token refresh.
287
- * @returns The updated session data.
288
- */
289
- export async function transitionTo2FASession(
290
- sessionToken: string,
291
- tokens: {
292
- accessToken?: string;
293
- refreshToken?: string;
294
- accessTokenExpires?: number;
295
- refreshTokenExpires?: number;
296
- // Support new field names
297
- idpAccessToken?: string;
298
- idpRefreshToken?: string;
299
- idpAccessTokenExpires?: number;
300
- idpRefreshTokenExpires?: number;
301
- },
302
- mfaMethod?: 'email' | 'sms' | 'totp'
303
- ): Promise<SessionData | null> {
304
- const newAccessToken = tokens.idpAccessToken || tokens.accessToken;
305
-
306
- console.log('[transitionTo2FASession] Called with:', {
307
- sessionToken: sessionToken?.substring(0, 8) + '...',
308
- mfaMethod,
309
- hasAccessToken: !!newAccessToken,
310
- hasRefreshToken: !!(tokens.idpRefreshToken || tokens.refreshToken),
311
- });
312
-
313
- // Extract bearerKeyId from the new access token (IDP may use different key after 2FA)
314
- let bearerKeyId: string | undefined;
315
- if (newAccessToken) {
316
- bearerKeyId = extractKidFromToken(newAccessToken);
317
- if (bearerKeyId) {
318
- console.log('[transitionTo2FASession] Extracted bearerKeyId (kid) from new JWT header:', bearerKeyId);
319
- }
320
- }
321
-
322
- // Support both old and new field names in input
323
- // CRITICAL: Set BOTH mfaVerified (new) AND twoFactorComplete (legacy) for compatibility
324
- // auth.ts session callback reads twoFactorComplete, so we must set it here
325
- const updates: Partial<SessionData> = {
326
- idpAccessToken: newAccessToken,
327
- idpRefreshToken: tokens.idpRefreshToken || tokens.refreshToken,
328
- idpAccessTokenExpires: tokens.idpAccessTokenExpires || tokens.accessTokenExpires,
329
- mfaVerified: true,
330
- twoFactorComplete: true, // Legacy field - required by auth.ts session callback
331
- mfaMethod: mfaMethod,
332
- // Update bearerKeyId if extracted from new token
333
- ...(bearerKeyId && { bearerKeyId }),
334
- };
335
-
336
- const refreshExpires = tokens.idpRefreshTokenExpires || tokens.refreshTokenExpires;
337
- if (refreshExpires !== undefined) {
338
- updates.idpRefreshTokenExpires = refreshExpires;
339
- }
340
-
341
- console.log('[transitionTo2FASession] Updates to apply:', {
342
- mfaVerified: updates.mfaVerified,
343
- twoFactorComplete: (updates as any).twoFactorComplete,
344
- mfaMethod: updates.mfaMethod,
345
- hasIdpAccessToken: !!updates.idpAccessToken,
346
- });
347
-
348
- const result = await updateSession(sessionToken, updates);
349
-
350
- console.log('[transitionTo2FASession] Result:', {
351
- success: !!result,
352
- resultMfaVerified: result?.mfaVerified,
353
- });
354
-
355
- return result;
356
- }
357
-
358
- /**
359
- * Updates IDP tokens and their expiries in an existing session.
360
- * @param sessionToken The session token to update.
361
- * @param idpAccessToken The new IDP access token.
362
- * @param idpRefreshToken The new IDP refresh token.
363
- * @param idpAccessTokenExpires The access token expiry timestamp.
364
- * @param idpRefreshTokenExpires The refresh token expiry timestamp (optional).
365
- * @returns The updated session data.
366
- */
367
- export async function updateTokens(
368
- sessionToken: string,
369
- idpAccessToken: string,
370
- idpRefreshToken: string,
371
- idpAccessTokenExpires: number,
372
- idpRefreshTokenExpires?: number
373
- ): Promise<SessionData | null> {
374
- return updateSession(sessionToken, {
375
- idpAccessToken,
376
- idpRefreshToken,
377
- idpAccessTokenExpires,
378
- idpRefreshTokenExpires,
379
- } as Partial<SessionData>);
380
- }
381
-
382
- /**
383
- * Marks a session as having completed MFA.
384
- * @param sessionToken The session token to update.
385
- * @returns The updated session data.
386
- */
387
- export async function mark2FAComplete(sessionToken: string): Promise<SessionData | null> {
388
- return updateSession(sessionToken, {
389
- mfaVerified: true,
390
- });
391
- }
392
-
393
- /**
394
- * Checks if MFA is complete for a session.
395
- * @param sessionToken The session token.
396
- * @returns True if MFA is complete.
397
- */
398
- export async function is2FAComplete(sessionToken: string): Promise<boolean> {
399
- const session = await getSession(sessionToken);
400
- return session?.mfaVerified === true;
401
- }
402
-
403
- /**
404
- * Gets IDP tokens from a session.
405
- * @param sessionToken The session token.
406
- * @returns The tokens or null if session not found.
407
- */
408
- export async function getTokens(sessionToken: string): Promise<{
409
- accessToken: string;
410
- refreshToken: string;
411
- // Also expose new names for clarity
412
- idpAccessToken: string;
413
- idpRefreshToken: string;
414
- } | null> {
415
- const session = await getSession(sessionToken);
416
- if (!session || !session.idpAccessToken || !session.idpRefreshToken) {
417
- return null;
418
- }
419
- return {
420
- // Legacy names for backward compatibility
421
- accessToken: session.idpAccessToken,
422
- refreshToken: session.idpRefreshToken,
423
- // New normalized names
424
- idpAccessToken: session.idpAccessToken,
425
- idpRefreshToken: session.idpRefreshToken,
426
- };
427
- }
428
-
429
- /**
430
- * Refreshes a JWT session (placeholder for compatibility).
431
- * @param sessionToken The session token.
432
- * @returns The session data or null.
433
- */
434
- export async function refreshJWTSession(sessionToken: string): Promise<SessionData | null> {
435
- return getSession(sessionToken);
436
- }
437
-
438
- /**
439
- * Clears all sessions (for testing only).
440
- */
441
- export async function clearAllSessions(): Promise<void> {
442
- console.warn('[SESSION-STORE] clearAllSessions called - this should only be used in testing');
443
- }
444
-
445
- /**
446
- * Lists all sessions (for testing/debugging only).
447
- * @returns An empty array (placeholder).
448
- */
449
- export async function listAllSessions(): Promise<string[]> {
450
- console.warn('[SESSION-STORE] listAllSessions called - this should only be used in testing');
451
- return [];
452
- }
453
-
454
- // ===============================
455
- // DISTRIBUTED REFRESH COORDINATION
456
- // ===============================
457
-
458
- /**
459
- * Attempt to acquire a refresh lock for a session
460
- * Uses Redis SET with NX (Not eXists) for atomic lock acquisition
461
- */
462
- export async function acquireRefreshLock(
463
- sessionToken: string,
464
- requestId: string,
465
- maxWaitMs: number = 5000
466
- ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
467
- const lockKey = getRefreshLockKey(sessionToken);
468
- const acquiredAt = Date.now();
469
- const lockVersion = Math.floor(Math.random() * 1000000);
470
-
471
- const lockInfo: RefreshLockInfo = {
472
- sessionToken,
473
- acquiredAt,
474
- acquiredBy: requestId,
475
- lockVersion
476
- };
477
-
478
- try {
479
- // Try to acquire the lock atomically
480
- const result = await redis.set(lockKey, JSON.stringify(lockInfo), 'PX', REFRESH_LOCK_TTL * 1000, 'NX');
481
-
482
- if (result === 'OK') {
483
- console.debug('[SESSION-STORE] Refresh lock acquired', {
484
- sessionToken: sessionToken.substring(0, 8) + '...',
485
- requestId,
486
- lockVersion
487
- });
488
-
489
- return { acquired: true, lockInfo };
490
- } else {
491
- // Lock already exists, check if we should wait
492
- if (maxWaitMs > 0) {
493
- console.debug('[SESSION-STORE] Refresh lock already exists, waiting for release', {
494
- sessionToken: sessionToken.substring(0, 8) + '...',
495
- requestId,
496
- maxWaitMs
497
- });
498
-
499
- return await waitForRefreshLockRelease(sessionToken, requestId, maxWaitMs);
500
- }
501
-
502
- console.warn('[SESSION-STORE] Refresh lock already exists, not waiting', {
503
- sessionToken: sessionToken.substring(0, 8) + '...',
504
- requestId
505
- });
506
-
507
- return { acquired: false };
508
- }
509
- } catch (error) {
510
- console.error('[SESSION-STORE] Failed to acquire refresh lock', {
511
- sessionToken: sessionToken.substring(0, 8) + '...',
512
- requestId,
513
- error: error instanceof Error ? error.message : String(error)
514
- });
515
-
516
- return { acquired: false };
517
- }
518
- }
519
-
520
- /**
521
- * Wait for a refresh lock to be released
522
- */
523
- async function waitForRefreshLockRelease(
524
- sessionToken: string,
525
- requestId: string,
526
- maxWaitMs: number
527
- ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
528
- const lockKey = getRefreshLockKey(sessionToken);
529
- const startTime = Date.now();
530
- const pollInterval = 100;
531
-
532
- while (Date.now() - startTime < maxWaitMs) {
533
- try {
534
- const lockExists = await redis.exists(lockKey);
535
-
536
- if (!lockExists) {
537
- // Lock released - do not reacquire here to avoid double refresh
538
- return { acquired: false };
539
- }
540
-
541
- // Wait before next check
542
- await new Promise(resolve => setTimeout(resolve, pollInterval));
543
- } catch (error) {
544
- console.error('[SESSION-STORE] Error while waiting for refresh lock release', {
545
- sessionToken: sessionToken.substring(0, 8) + '...',
546
- requestId,
547
- error: error instanceof Error ? error.message : String(error)
548
- });
549
- break;
550
- }
551
- }
552
-
553
- console.warn('[SESSION-STORE] Timeout waiting for refresh lock release', {
554
- sessionToken: sessionToken.substring(0, 8) + '...',
555
- requestId,
556
- waitedMs: Date.now() - startTime
557
- });
558
-
559
- return { acquired: false };
560
- }
561
-
562
- /**
563
- * Release a refresh lock
564
- * Uses Lua script to ensure atomic validation and release
565
- */
566
- export async function releaseRefreshLock(
567
- sessionToken: string,
568
- requestId: string,
569
- lockVersion?: number
570
- ): Promise<boolean> {
571
- const lockKey = getRefreshLockKey(sessionToken);
572
-
573
- try {
574
- // Lua script for atomic lock validation and release
575
- const luaScript = `
576
- local lockKey = KEYS[1]
577
- local expectedRequestId = ARGV[1]
578
- local expectedVersion = ARGV[2]
579
-
580
- local lockData = redis.call('GET', lockKey)
581
- if not lockData then
582
- return 0 -- Lock doesn't exist
583
- end
584
-
585
- local lockInfo = cjson.decode(lockData)
586
- if lockInfo.acquiredBy == expectedRequestId then
587
- if not expectedVersion or expectedVersion == '' or tostring(lockInfo.lockVersion) == expectedVersion then
588
- redis.call('DEL', lockKey)
589
- return 1 -- Successfully released
590
- else
591
- return -2 -- Version mismatch
592
- end
593
- else
594
- return -1 -- Wrong owner
595
- end
596
- `;
597
-
598
- const result = await redis.eval(
599
- luaScript,
600
- 1,
601
- lockKey,
602
- requestId,
603
- lockVersion ? lockVersion.toString() : ''
604
- ) as number;
605
-
606
- if (result === 1) {
607
- console.debug('[SESSION-STORE] Refresh lock released successfully', {
608
- sessionToken: sessionToken.substring(0, 8) + '...',
609
- requestId,
610
- lockVersion
611
- });
612
- return true;
613
- } else if (result === 0) {
614
- console.warn('[SESSION-STORE] Attempted to release non-existent refresh lock', {
615
- sessionToken: sessionToken.substring(0, 8) + '...',
616
- requestId
617
- });
618
- return false;
619
- } else if (result === -1) {
620
- console.error('[SESSION-STORE] Attempted to release refresh lock owned by another request', {
621
- sessionToken: sessionToken.substring(0, 8) + '...',
622
- requestId
623
- });
624
- return false;
625
- } else if (result === -2) {
626
- console.error('[SESSION-STORE] Lock version mismatch during release', {
627
- sessionToken: sessionToken.substring(0, 8) + '...',
628
- requestId,
629
- lockVersion
630
- });
631
- return false;
632
- } else {
633
- console.error('[SESSION-STORE] Unexpected result from lock release script', {
634
- sessionToken: sessionToken.substring(0, 8) + '...',
635
- requestId,
636
- result
637
- });
638
- return false;
639
- }
640
- } catch (error) {
641
- console.error('[SESSION-STORE] Failed to release refresh lock', {
642
- sessionToken: sessionToken.substring(0, 8) + '...',
643
- requestId,
644
- error: error instanceof Error ? error.message : String(error)
645
- });
646
-
647
- return false;
648
- }
649
- }
650
-
651
- /**
652
- * Check if a refresh lock exists for a session
653
- */
654
- export async function checkRefreshLock(sessionToken: string): Promise<RefreshLockInfo | null> {
655
- const lockKey = getRefreshLockKey(sessionToken);
656
-
657
- try {
658
- const lockData = await redis.get(lockKey);
659
-
660
- if (!lockData) {
661
- return null;
662
- }
663
-
664
- return JSON.parse(lockData) as RefreshLockInfo;
665
- } catch (error) {
666
- console.error('[SESSION-STORE] Failed to check refresh lock', {
667
- sessionToken: sessionToken.substring(0, 8) + '...',
668
- error: error instanceof Error ? error.message : String(error)
669
- });
670
-
671
- return null;
672
- }
673
- }
674
-
675
- /**
676
- * Simple check if a refresh is currently in progress for a session
677
- */
678
- export async function isRefreshInProgress(sessionToken: string): Promise<boolean> {
679
- const lock = await checkRefreshLock(sessionToken);
680
- return lock !== null;
681
- }
682
-
683
- /**
684
- * Force cleanup of expired or orphaned refresh locks
685
- */
686
- export async function cleanupRefreshLocks(): Promise<number> {
687
- console.warn('[SESSION-STORE] cleanupRefreshLocks called - scanning for expired locks');
688
- return 0;
689
- }
1
+ /**
2
+ * Session Store for `@payez/next-mvp` using ioredis
3
+ *
4
+ * This module provides a Redis-backed session store that is compatible with the
5
+ * `ioredis` client. It handles the creation, retrieval, and deletion of
6
+ * session data, which is the single source of truth for authentication.
7
+ *
8
+ * Includes advanced distributed refresh coordination with version control.
9
+ */
10
+
11
+ import redis from './redis';
12
+ import { randomBytes } from 'crypto';
13
+ import { SessionData } from '../models/SessionModel';
14
+ import { getSessionPrefix, getRefreshLockPrefix } from './app-slug';
15
+ import { extractKidFromToken } from '../auth/utils/token-utils';
16
+
17
+ // Re-export SessionData for consumers
18
+ export type { SessionData } from '../models/SessionModel';
19
+
20
+ // Use app-slug prefixes for multi-app isolation
21
+ const getSessionKey = (token: string) => `${getSessionPrefix()}${token}`;
22
+ const getRefreshLockKey = (token: string) => `${getRefreshLockPrefix()}${token}`;
23
+ const getSessionVersionKey = (token: string) => `${getSessionPrefix()}ver:${token}`;
24
+
25
+ // Better Auth uses a different key format: ba:{appSlug}:{token}
26
+ const getBetterAuthSessionKey = (token: string, appSlug?: string) => `ba:${appSlug || 'app'}:${token}`;
27
+
28
+ const REFRESH_LOCK_TTL = 60; // 60 seconds
29
+ const SESSION_TTL = 3 * 24 * 60 * 60; // 3 days in seconds (matches refresh token lifetime)
30
+
31
+ export interface RefreshLockInfo {
32
+ sessionToken: string;
33
+ acquiredAt: number;
34
+ acquiredBy: string; // request ID or process identifier
35
+ lockVersion: number;
36
+ }
37
+
38
+ /**
39
+ * Generates a new session token.
40
+ * @returns A new session token string.
41
+ */
42
+ export function generateSessionToken(): string {
43
+ return randomBytes(32).toString('hex');
44
+ }
45
+
46
+ /**
47
+ * Creates a new session in Redis.
48
+ *
49
+ * @param data The session data to store.
50
+ * @returns The generated session token (redisSessionId).
51
+ */
52
+ export async function createSession(data: SessionData): Promise<string> {
53
+ const sessionToken = randomBytes(32).toString('hex');
54
+ const key = getSessionKey(sessionToken);
55
+ const versionKey = getSessionVersionKey(sessionToken);
56
+
57
+ try {
58
+ await redis.multi()
59
+ .setex(key, SESSION_TTL, JSON.stringify(data))
60
+ .setex(versionKey, SESSION_TTL, '1')
61
+ .exec();
62
+ } catch (error) {
63
+ console.error('[SESSION-STORE] Failed to create session:', error);
64
+ throw error;
65
+ }
66
+
67
+ return sessionToken;
68
+ }
69
+
70
+ /**
71
+ * Retrieves a session from Redis.
72
+ *
73
+ * @param sessionToken The session token (redisSessionId) to look up.
74
+ * @returns The session data, or null if not found.
75
+ */
76
+ export async function getSession(sessionToken: string): Promise<SessionData | null> {
77
+ if (!sessionToken) {
78
+ return null;
79
+ }
80
+ const key = getSessionKey(sessionToken);
81
+ const json = await redis.get(key);
82
+ if (!json) {
83
+ return null;
84
+ }
85
+ try {
86
+ return JSON.parse(json) as SessionData;
87
+ } catch {
88
+ console.error('[SESSION-STORE] Failed to parse session data');
89
+ return null;
90
+ }
91
+ }
92
+
93
+ /**
94
+ * Retrieves a Better Auth session from Redis.
95
+ * Better Auth uses key format: ba:{appSlug}:{token}
96
+ *
97
+ * @param sessionToken The session token to look up.
98
+ * @param appSlug The app slug (defaults to 'idealvibe_online' or extracted from env).
99
+ * @returns The session data, or null if not found.
100
+ */
101
+ export async function getBetterAuthSession(sessionToken: string, appSlug?: string): Promise<SessionData | null> {
102
+ if (!sessionToken) {
103
+ return null;
104
+ }
105
+ // Try to get appSlug from env if not provided
106
+ const slug = appSlug || process.env.CLIENT_ID || 'idealvibe_online';
107
+ const key = getBetterAuthSessionKey(sessionToken, slug);
108
+ const json = await redis.get(key);
109
+ if (!json) {
110
+ return null;
111
+ }
112
+ try {
113
+ const data = JSON.parse(json);
114
+ // Better Auth stores the session differently - extract user data
115
+ if (data.user) {
116
+ return {
117
+ userId: data.user.id || data.user.email,
118
+ email: data.user.email,
119
+ name: data.user.name,
120
+ image: data.user.image,
121
+ idpAccessToken: data.idpTokens?.idpAccessToken,
122
+ idpRefreshToken: data.idpTokens?.idpRefreshToken,
123
+ idpAccessTokenExpires: data.idpTokens?.idpAccessTokenExpires,
124
+ mfaVerified: data.idpTokens?.mfaVerified ?? false,
125
+ roles: data.idpTokens?.roles || [],
126
+ idpClientId: data.idpTokens?.idpClientId ?? data.idpTokens?.clientId ?? data.idpClientId,
127
+ merchantId: data.idpTokens?.merchantId ?? data.merchantId,
128
+ } as SessionData;
129
+ }
130
+ return data as SessionData;
131
+ } catch {
132
+ console.error('[SESSION-STORE] Failed to parse Better Auth session data');
133
+ return null;
134
+ }
135
+ }
136
+
137
+ /**
138
+ * Refresh session TTL without reading/writing data (sliding window expiry).
139
+ */
140
+ export async function touchSession(token: string): Promise<void> {
141
+ const key = getSessionKey(token);
142
+ await redis.expire(key, SESSION_TTL);
143
+ }
144
+
145
+ /**
146
+ * Retrieves a session along with a version identifier for optimistic locking.
147
+ * @param sessionToken The session token to look up.
148
+ * @returns An object with session and version, or null if not found.
149
+ */
150
+ export async function getSessionWithVersion(sessionToken: string): Promise<{ session: SessionData; version: string } | null> {
151
+ const session = await getSession(sessionToken);
152
+ if (!session) {
153
+ return null;
154
+ }
155
+
156
+ const versionKey = getSessionVersionKey(sessionToken);
157
+ const version = await redis.get(versionKey);
158
+
159
+ if (!version) {
160
+ // Session exists but version key missing - use idpAccessTokenExpires as fallback
161
+ const fallbackVersion = String(session.idpAccessTokenExpires || Date.now());
162
+ return { session, version: fallbackVersion };
163
+ }
164
+
165
+ return { session, version };
166
+ }
167
+
168
+ /**
169
+ * Checks if the access token in a session is still fresh (not expired).
170
+ * @param sessionToken The session token to check.
171
+ * @param currentAccessToken The current access token to compare.
172
+ * @param currentVersion Optional version to check for changes.
173
+ * @returns Object with freshness status and latest token info.
174
+ */
175
+ export async function isAccessTokenFresh(
176
+ sessionToken: string,
177
+ currentAccessToken: string,
178
+ currentVersion?: string
179
+ ): Promise<{
180
+ isFresh: boolean;
181
+ latestAccessToken?: string;
182
+ latestVersion?: string;
183
+ versionChanged: boolean;
184
+ }> {
185
+ const sessionWithVersion = await getSessionWithVersion(sessionToken);
186
+
187
+ if (!sessionWithVersion) {
188
+ return { isFresh: false, versionChanged: true };
189
+ }
190
+
191
+ const { session, version } = sessionWithVersion;
192
+ const versionChanged = currentVersion ? version !== currentVersion : false;
193
+
194
+ // If version changed, the token might be stale
195
+ // Use normalized field name (idpAccessToken)
196
+ const isFresh = !versionChanged && session.idpAccessToken === currentAccessToken;
197
+
198
+ return {
199
+ isFresh,
200
+ latestAccessToken: session.idpAccessToken || undefined,
201
+ latestVersion: version,
202
+ versionChanged
203
+ };
204
+ }
205
+
206
+ /**
207
+ * Deletes a session from Redis.
208
+ * @param sessionToken The session token to delete.
209
+ */
210
+ export async function deleteSession(sessionToken: string): Promise<void> {
211
+ if (!sessionToken) {
212
+ return;
213
+ }
214
+ const key = getSessionKey(sessionToken);
215
+ const versionKey = getSessionVersionKey(sessionToken);
216
+ await redis.del(key, versionKey);
217
+ }
218
+
219
+ /**
220
+ * Sets a session directly (for testing or migrations).
221
+ * @param sessionToken The session token.
222
+ * @param data The session data.
223
+ */
224
+ export async function setSession(sessionToken: string, data: SessionData): Promise<void> {
225
+ const key = getSessionKey(sessionToken);
226
+ const versionKey = getSessionVersionKey(sessionToken);
227
+ await redis.multi()
228
+ .setex(key, SESSION_TTL, JSON.stringify(data))
229
+ .incr(versionKey)
230
+ .expire(versionKey, SESSION_TTL)
231
+ .exec();
232
+ }
233
+
234
+ /**
235
+ * Updates tokens within an existing session.
236
+ * @param sessionToken The session token to update.
237
+ * @param updates Partial session data to update.
238
+ * @returns The updated session data, or null if the session was not found.
239
+ */
240
+ export async function updateSession(
241
+ sessionToken: string,
242
+ updates: Partial<SessionData>
243
+ ): Promise<SessionData | null> {
244
+ const key = getSessionKey(sessionToken);
245
+ const versionKey = getSessionVersionKey(sessionToken);
246
+
247
+ // Get current session to merge with updates
248
+ const currentSession = await getSession(sessionToken);
249
+ if (!currentSession) {
250
+ return null;
251
+ }
252
+
253
+ // CRITICAL: Track any refresh token changes (check both old and new field names)
254
+ const hadRefreshToken = !!(currentSession.idpRefreshToken || (currentSession as any).refreshToken);
255
+ const willHaveRefreshToken = (updates as any).idpRefreshToken !== undefined
256
+ ? !!(updates as any).idpRefreshToken
257
+ : (updates as any).refreshToken !== undefined
258
+ ? !!(updates as any).refreshToken
259
+ : hadRefreshToken;
260
+
261
+ if (hadRefreshToken && !willHaveRefreshToken) {
262
+ console.error('[SESSION-STORE] ⚠️ REFRESH_TOKEN_BEING_CLEARED', {
263
+ sessionToken: sessionToken.substring(0, 8) + '...',
264
+ userId: currentSession.userId,
265
+ updateKeys: Object.keys(updates),
266
+ refreshTokenInUpdate: (updates as any).idpRefreshToken || (updates as any).refreshToken,
267
+ refreshTokenClearedReason: (updates as any).refreshTokenClearedReason || 'UNKNOWN',
268
+ stack: new Error().stack
269
+ });
270
+ }
271
+
272
+ // Merge current session with updates
273
+ const updatedSession = { ...currentSession, ...updates };
274
+
275
+ // Write the entire updated session back to Redis with version increment
276
+ await redis.multi()
277
+ .setex(key, SESSION_TTL, JSON.stringify(updatedSession))
278
+ .incr(versionKey)
279
+ .expire(versionKey, SESSION_TTL)
280
+ .exec();
281
+
282
+ return updatedSession;
283
+ }
284
+
285
+ /**
286
+ * Transitions a session to a MFA-completed state.
287
+ * @param sessionToken The session token to update.
288
+ * @param tokens The new tokens received after MFA completion.
289
+ * @param mfaMethod The MFA method used (email, sms, totp) - required for token refresh.
290
+ * @returns The updated session data.
291
+ */
292
+ export async function transitionTo2FASession(
293
+ sessionToken: string,
294
+ tokens: {
295
+ accessToken?: string;
296
+ refreshToken?: string;
297
+ accessTokenExpires?: number;
298
+ refreshTokenExpires?: number;
299
+ // Support new field names
300
+ idpAccessToken?: string;
301
+ idpRefreshToken?: string;
302
+ idpAccessTokenExpires?: number;
303
+ idpRefreshTokenExpires?: number;
304
+ },
305
+ mfaMethod?: 'email' | 'sms' | 'totp'
306
+ ): Promise<SessionData | null> {
307
+ const newAccessToken = tokens.idpAccessToken || tokens.accessToken;
308
+
309
+ console.log('[transitionTo2FASession] Called with:', {
310
+ sessionToken: sessionToken?.substring(0, 8) + '...',
311
+ mfaMethod,
312
+ hasAccessToken: !!newAccessToken,
313
+ hasRefreshToken: !!(tokens.idpRefreshToken || tokens.refreshToken),
314
+ });
315
+
316
+ // Extract bearerKeyId from the new access token (IDP may use different key after 2FA)
317
+ let bearerKeyId: string | undefined;
318
+ if (newAccessToken) {
319
+ bearerKeyId = extractKidFromToken(newAccessToken);
320
+ if (bearerKeyId) {
321
+ console.log('[transitionTo2FASession] Extracted bearerKeyId (kid) from new JWT header:', bearerKeyId);
322
+ }
323
+ }
324
+
325
+ // Support both old and new field names in input
326
+ // CRITICAL: Set BOTH mfaVerified (new) AND twoFactorComplete (legacy) for compatibility
327
+ // auth.ts session callback reads twoFactorComplete, so we must set it here
328
+ const updates: Partial<SessionData> = {
329
+ idpAccessToken: newAccessToken,
330
+ idpRefreshToken: tokens.idpRefreshToken || tokens.refreshToken,
331
+ idpAccessTokenExpires: tokens.idpAccessTokenExpires || tokens.accessTokenExpires,
332
+ mfaVerified: true,
333
+ twoFactorComplete: true, // Legacy field - required by auth.ts session callback
334
+ mfaMethod: mfaMethod,
335
+ // Update bearerKeyId if extracted from new token
336
+ ...(bearerKeyId && { bearerKeyId }),
337
+ };
338
+
339
+ const refreshExpires = tokens.idpRefreshTokenExpires || tokens.refreshTokenExpires;
340
+ if (refreshExpires !== undefined) {
341
+ updates.idpRefreshTokenExpires = refreshExpires;
342
+ }
343
+
344
+ console.log('[transitionTo2FASession] Updates to apply:', {
345
+ mfaVerified: updates.mfaVerified,
346
+ twoFactorComplete: (updates as any).twoFactorComplete,
347
+ mfaMethod: updates.mfaMethod,
348
+ hasIdpAccessToken: !!updates.idpAccessToken,
349
+ });
350
+
351
+ const result = await updateSession(sessionToken, updates);
352
+
353
+ console.log('[transitionTo2FASession] Result:', {
354
+ success: !!result,
355
+ resultMfaVerified: result?.mfaVerified,
356
+ });
357
+
358
+ return result;
359
+ }
360
+
361
+ /**
362
+ * Updates IDP tokens and their expiries in an existing session.
363
+ * @param sessionToken The session token to update.
364
+ * @param idpAccessToken The new IDP access token.
365
+ * @param idpRefreshToken The new IDP refresh token.
366
+ * @param idpAccessTokenExpires The access token expiry timestamp.
367
+ * @param idpRefreshTokenExpires The refresh token expiry timestamp (optional).
368
+ * @returns The updated session data.
369
+ */
370
+ export async function updateTokens(
371
+ sessionToken: string,
372
+ idpAccessToken: string,
373
+ idpRefreshToken: string,
374
+ idpAccessTokenExpires: number,
375
+ idpRefreshTokenExpires?: number
376
+ ): Promise<SessionData | null> {
377
+ return updateSession(sessionToken, {
378
+ idpAccessToken,
379
+ idpRefreshToken,
380
+ idpAccessTokenExpires,
381
+ idpRefreshTokenExpires,
382
+ } as Partial<SessionData>);
383
+ }
384
+
385
+ /**
386
+ * Marks a session as having completed MFA.
387
+ * @param sessionToken The session token to update.
388
+ * @returns The updated session data.
389
+ */
390
+ export async function mark2FAComplete(sessionToken: string): Promise<SessionData | null> {
391
+ return updateSession(sessionToken, {
392
+ mfaVerified: true,
393
+ });
394
+ }
395
+
396
+ /**
397
+ * Checks if MFA is complete for a session.
398
+ * @param sessionToken The session token.
399
+ * @returns True if MFA is complete.
400
+ */
401
+ export async function is2FAComplete(sessionToken: string): Promise<boolean> {
402
+ const session = await getSession(sessionToken);
403
+ return session?.mfaVerified === true;
404
+ }
405
+
406
+ /**
407
+ * Gets IDP tokens from a session.
408
+ * @param sessionToken The session token.
409
+ * @returns The tokens or null if session not found.
410
+ */
411
+ export async function getTokens(sessionToken: string): Promise<{
412
+ accessToken: string;
413
+ refreshToken: string;
414
+ // Also expose new names for clarity
415
+ idpAccessToken: string;
416
+ idpRefreshToken: string;
417
+ } | null> {
418
+ const session = await getSession(sessionToken);
419
+ if (!session || !session.idpAccessToken || !session.idpRefreshToken) {
420
+ return null;
421
+ }
422
+ return {
423
+ // Legacy names for backward compatibility
424
+ accessToken: session.idpAccessToken,
425
+ refreshToken: session.idpRefreshToken,
426
+ // New normalized names
427
+ idpAccessToken: session.idpAccessToken,
428
+ idpRefreshToken: session.idpRefreshToken,
429
+ };
430
+ }
431
+
432
+ /**
433
+ * Refreshes a JWT session (placeholder for compatibility).
434
+ * @param sessionToken The session token.
435
+ * @returns The session data or null.
436
+ */
437
+ export async function refreshJWTSession(sessionToken: string): Promise<SessionData | null> {
438
+ return getSession(sessionToken);
439
+ }
440
+
441
+ /**
442
+ * Clears all sessions (for testing only).
443
+ */
444
+ export async function clearAllSessions(): Promise<void> {
445
+ console.warn('[SESSION-STORE] clearAllSessions called - this should only be used in testing');
446
+ }
447
+
448
+ /**
449
+ * Lists all sessions (for testing/debugging only).
450
+ * @returns An empty array (placeholder).
451
+ */
452
+ export async function listAllSessions(): Promise<string[]> {
453
+ console.warn('[SESSION-STORE] listAllSessions called - this should only be used in testing');
454
+ return [];
455
+ }
456
+
457
+ // ===============================
458
+ // DISTRIBUTED REFRESH COORDINATION
459
+ // ===============================
460
+
461
+ /**
462
+ * Attempt to acquire a refresh lock for a session
463
+ * Uses Redis SET with NX (Not eXists) for atomic lock acquisition
464
+ */
465
+ export async function acquireRefreshLock(
466
+ sessionToken: string,
467
+ requestId: string,
468
+ maxWaitMs: number = 5000
469
+ ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
470
+ const lockKey = getRefreshLockKey(sessionToken);
471
+ const acquiredAt = Date.now();
472
+ const lockVersion = Math.floor(Math.random() * 1000000);
473
+
474
+ const lockInfo: RefreshLockInfo = {
475
+ sessionToken,
476
+ acquiredAt,
477
+ acquiredBy: requestId,
478
+ lockVersion
479
+ };
480
+
481
+ try {
482
+ // Try to acquire the lock atomically
483
+ const result = await redis.set(lockKey, JSON.stringify(lockInfo), 'PX', REFRESH_LOCK_TTL * 1000, 'NX');
484
+
485
+ if (result === 'OK') {
486
+ console.debug('[SESSION-STORE] Refresh lock acquired', {
487
+ sessionToken: sessionToken.substring(0, 8) + '...',
488
+ requestId,
489
+ lockVersion
490
+ });
491
+
492
+ return { acquired: true, lockInfo };
493
+ } else {
494
+ // Lock already exists, check if we should wait
495
+ if (maxWaitMs > 0) {
496
+ console.debug('[SESSION-STORE] Refresh lock already exists, waiting for release', {
497
+ sessionToken: sessionToken.substring(0, 8) + '...',
498
+ requestId,
499
+ maxWaitMs
500
+ });
501
+
502
+ return await waitForRefreshLockRelease(sessionToken, requestId, maxWaitMs);
503
+ }
504
+
505
+ console.warn('[SESSION-STORE] Refresh lock already exists, not waiting', {
506
+ sessionToken: sessionToken.substring(0, 8) + '...',
507
+ requestId
508
+ });
509
+
510
+ return { acquired: false };
511
+ }
512
+ } catch (error) {
513
+ console.error('[SESSION-STORE] Failed to acquire refresh lock', {
514
+ sessionToken: sessionToken.substring(0, 8) + '...',
515
+ requestId,
516
+ error: error instanceof Error ? error.message : String(error)
517
+ });
518
+
519
+ return { acquired: false };
520
+ }
521
+ }
522
+
523
+ /**
524
+ * Wait for a refresh lock to be released
525
+ */
526
+ async function waitForRefreshLockRelease(
527
+ sessionToken: string,
528
+ requestId: string,
529
+ maxWaitMs: number
530
+ ): Promise<{ acquired: boolean; lockInfo?: RefreshLockInfo }> {
531
+ const lockKey = getRefreshLockKey(sessionToken);
532
+ const startTime = Date.now();
533
+ const pollInterval = 100;
534
+
535
+ while (Date.now() - startTime < maxWaitMs) {
536
+ try {
537
+ const lockExists = await redis.exists(lockKey);
538
+
539
+ if (!lockExists) {
540
+ // Lock released - do not reacquire here to avoid double refresh
541
+ return { acquired: false };
542
+ }
543
+
544
+ // Wait before next check
545
+ await new Promise(resolve => setTimeout(resolve, pollInterval));
546
+ } catch (error) {
547
+ console.error('[SESSION-STORE] Error while waiting for refresh lock release', {
548
+ sessionToken: sessionToken.substring(0, 8) + '...',
549
+ requestId,
550
+ error: error instanceof Error ? error.message : String(error)
551
+ });
552
+ break;
553
+ }
554
+ }
555
+
556
+ console.warn('[SESSION-STORE] Timeout waiting for refresh lock release', {
557
+ sessionToken: sessionToken.substring(0, 8) + '...',
558
+ requestId,
559
+ waitedMs: Date.now() - startTime
560
+ });
561
+
562
+ return { acquired: false };
563
+ }
564
+
565
+ /**
566
+ * Release a refresh lock
567
+ * Uses Lua script to ensure atomic validation and release
568
+ */
569
+ export async function releaseRefreshLock(
570
+ sessionToken: string,
571
+ requestId: string,
572
+ lockVersion?: number
573
+ ): Promise<boolean> {
574
+ const lockKey = getRefreshLockKey(sessionToken);
575
+
576
+ try {
577
+ // Lua script for atomic lock validation and release
578
+ const luaScript = `
579
+ local lockKey = KEYS[1]
580
+ local expectedRequestId = ARGV[1]
581
+ local expectedVersion = ARGV[2]
582
+
583
+ local lockData = redis.call('GET', lockKey)
584
+ if not lockData then
585
+ return 0 -- Lock doesn't exist
586
+ end
587
+
588
+ local lockInfo = cjson.decode(lockData)
589
+ if lockInfo.acquiredBy == expectedRequestId then
590
+ if not expectedVersion or expectedVersion == '' or tostring(lockInfo.lockVersion) == expectedVersion then
591
+ redis.call('DEL', lockKey)
592
+ return 1 -- Successfully released
593
+ else
594
+ return -2 -- Version mismatch
595
+ end
596
+ else
597
+ return -1 -- Wrong owner
598
+ end
599
+ `;
600
+
601
+ const result = await redis.eval(
602
+ luaScript,
603
+ 1,
604
+ lockKey,
605
+ requestId,
606
+ lockVersion ? lockVersion.toString() : ''
607
+ ) as number;
608
+
609
+ if (result === 1) {
610
+ console.debug('[SESSION-STORE] Refresh lock released successfully', {
611
+ sessionToken: sessionToken.substring(0, 8) + '...',
612
+ requestId,
613
+ lockVersion
614
+ });
615
+ return true;
616
+ } else if (result === 0) {
617
+ console.warn('[SESSION-STORE] Attempted to release non-existent refresh lock', {
618
+ sessionToken: sessionToken.substring(0, 8) + '...',
619
+ requestId
620
+ });
621
+ return false;
622
+ } else if (result === -1) {
623
+ console.error('[SESSION-STORE] Attempted to release refresh lock owned by another request', {
624
+ sessionToken: sessionToken.substring(0, 8) + '...',
625
+ requestId
626
+ });
627
+ return false;
628
+ } else if (result === -2) {
629
+ console.error('[SESSION-STORE] Lock version mismatch during release', {
630
+ sessionToken: sessionToken.substring(0, 8) + '...',
631
+ requestId,
632
+ lockVersion
633
+ });
634
+ return false;
635
+ } else {
636
+ console.error('[SESSION-STORE] Unexpected result from lock release script', {
637
+ sessionToken: sessionToken.substring(0, 8) + '...',
638
+ requestId,
639
+ result
640
+ });
641
+ return false;
642
+ }
643
+ } catch (error) {
644
+ console.error('[SESSION-STORE] Failed to release refresh lock', {
645
+ sessionToken: sessionToken.substring(0, 8) + '...',
646
+ requestId,
647
+ error: error instanceof Error ? error.message : String(error)
648
+ });
649
+
650
+ return false;
651
+ }
652
+ }
653
+
654
+ /**
655
+ * Check if a refresh lock exists for a session
656
+ */
657
+ export async function checkRefreshLock(sessionToken: string): Promise<RefreshLockInfo | null> {
658
+ const lockKey = getRefreshLockKey(sessionToken);
659
+
660
+ try {
661
+ const lockData = await redis.get(lockKey);
662
+
663
+ if (!lockData) {
664
+ return null;
665
+ }
666
+
667
+ return JSON.parse(lockData) as RefreshLockInfo;
668
+ } catch (error) {
669
+ console.error('[SESSION-STORE] Failed to check refresh lock', {
670
+ sessionToken: sessionToken.substring(0, 8) + '...',
671
+ error: error instanceof Error ? error.message : String(error)
672
+ });
673
+
674
+ return null;
675
+ }
676
+ }
677
+
678
+ /**
679
+ * Simple check if a refresh is currently in progress for a session
680
+ */
681
+ export async function isRefreshInProgress(sessionToken: string): Promise<boolean> {
682
+ const lock = await checkRefreshLock(sessionToken);
683
+ return lock !== null;
684
+ }
685
+
686
+ /**
687
+ * Force cleanup of expired or orphaned refresh locks
688
+ */
689
+ export async function cleanupRefreshLocks(): Promise<number> {
690
+ console.warn('[SESSION-STORE] cleanupRefreshLocks called - scanning for expired locks');
691
+ return 0;
692
+ }