create-mercato-app 0.5.1-develop.2652.0276e72e45 → 0.5.1-develop.2663.2c29774b5b

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -206,6 +206,103 @@ import {
206
206
  | `PortalNotificationBell` | `t` | Header bell icon with unread badge |
207
207
  | `PortalNotificationPanel` | — | Notification dropdown panel |
208
208
 
209
+ ### Portal Page Structure
210
+
211
+ Every portal page is two files under `frontend/[orgSlug]/portal/<path>/`:
212
+
213
+ ```
214
+ page.tsx # Client component ("use client")
215
+ page.meta.ts # PageMetadata — access control + sidebar nav
216
+ ```
217
+
218
+ Minimal page:
219
+
220
+ ```tsx
221
+ "use client"
222
+ import { usePortalContext } from '@open-mercato/ui/portal/PortalContext'
223
+ import { PortalPageHeader } from '@open-mercato/ui/portal/components'
224
+
225
+ export default function MyPortalPage({ params }: { params: { orgSlug: string } }) {
226
+ const { auth } = usePortalContext()
227
+ const { user, resolvedFeatures } = auth
228
+ return <PortalPageHeader title="Orders" />
229
+ }
230
+ ```
231
+
232
+ Prefer `usePortalContext()` inside pages wrapped by `PortalLayoutShell` — it reads server-hydrated auth and avoids client loading flashes. Reach for `useCustomerAuth(orgSlug)` only when the server wrapper is unavailable.
233
+
234
+ Minimal `page.meta.ts`:
235
+
236
+ ```ts
237
+ import type { PageMetadata } from '@open-mercato/shared/modules/registry'
238
+
239
+ export const metadata: PageMetadata = {
240
+ requireCustomerAuth: true,
241
+ requireCustomerFeatures: ['portal.orders.view'],
242
+ titleKey: 'portal.orders.title',
243
+ title: 'Orders',
244
+ nav: { label: 'Orders', labelKey: 'portal.nav.orders', group: 'main', order: 20 },
245
+ }
246
+
247
+ export default metadata
248
+ ```
249
+
250
+ - Public pages (login, signup, verify, forgot/reset-password): omit `requireCustomerAuth`; set `navHidden: true`.
251
+ - Authenticated pages without sidebar presence (detail/create/edit): set `requireCustomerAuth: true`, **omit** `nav`.
252
+ - Sidebar-visible pages: include a `nav` block. Feature-gated pages are automatically hidden when the user lacks grants.
253
+
254
+ Reference: `packages/core/src/modules/portal/frontend/[orgSlug]/portal/{dashboard,profile}/page.{tsx,meta.ts}`.
255
+
256
+ ### Portal Feature-Gating Contract
257
+
258
+ Single source of truth: `requireCustomerFeatures` in `page.meta.ts`. The same list is enforced in three layers:
259
+
260
+ | Layer | Where | Effect |
261
+ |---|---|---|
262
+ | Page access | `apps/mercato/src/app/(frontend)/[...slug]/page.tsx` | Server-side gate via `CustomerRbacService.userHasAllFeatures()` — missing feature blocks render |
263
+ | Sidebar entry | `/api/customer_accounts/portal/nav` → `buildPortalNav()` at `packages/ui/src/portal/utils/nav.ts` | Same check — missing feature omits the entry |
264
+ | Injection widgets | `usePortalInjectedMenuItems` / `usePortalDashboardWidgets` | `/api/customer_accounts/portal/feature-check` + `hasAllFeatures()` — missing feature filters the widget |
265
+
266
+ Granting a customer role a feature (e.g. `portal.orders.view`) is sufficient to (a) reach the page, (b) see the sidebar entry, (c) see widgets gated by that feature. No separate menu-injection widget is required for sidebar presence when the page is backed by `page.meta.ts` with a `nav` block.
267
+
268
+ **MUST** resolve features via `hasAllFeatures` / `matchFeature` from `@open-mercato/shared/security/features`. Raw `Array.includes()` or `Set.has()` on feature arrays misses wildcards (`portal.*`) and is a bug.
269
+
270
+ Declare features in `acl.ts`; ship defaults per role via `defaultCustomerRoleFeatures` in `setup.ts`. Never rely on client-side checks alone as the access gate.
271
+
272
+ ### Portal SPA CSRF Posture
273
+
274
+ Dual cookies set by login (`packages/core/src/modules/customer_accounts/api/login.ts`):
275
+
276
+ | Cookie | Contents | TTL | Flags |
277
+ |---|---|---|---|
278
+ | `customer_auth_token` | Short-lived JWT | 8h | `httpOnly`, `sameSite: 'lax'`, `secure` in prod, `path: '/'` |
279
+ | `customer_session_token` | Raw session token (hashed at rest) | 30d (env: `CUSTOMER_SESSION_TTL_DAYS`) | same as above |
280
+
281
+ Primary CSRF defense: `SameSite=lax` + same-origin deployment. No explicit CSRF token — the browser blocks cross-origin POSTs.
282
+
283
+ Rules:
284
+ - Use `apiCall` for every write — it uses `credentials: 'same-origin'` and sets JSON headers.
285
+ - Never expose either cookie to JS. `httpOnly` is load-bearing; do not add companion cookies that mirror session state.
286
+ - Never accept cross-origin POSTs on portal routes. Cross-origin use cases are explicit exceptions: per-tenant origin allowlist + CSRF token + re-auth.
287
+ - `sameSite: 'lax'` lets GET navigations carry cookies — keep all state-changing side effects behind POST/PUT/PATCH/DELETE.
288
+ - Logout (`api/portal/logout.ts`) clears both cookies with `maxAge: 0`. Mirror this shape for any new logout-style endpoints.
289
+
290
+ Concurrent sessions are capped at `MAX_CUSTOMER_SESSIONS_PER_USER` (default 5) in `customerSessionService.createSession()`. New sessions above the cap soft-delete the oldest active session.
291
+
292
+ ### Portal XSS Discipline (Injected Widgets)
293
+
294
+ Third-party widgets render inside the authenticated portal and inherit user cookies. Enforce stricter discipline than first-party code because widgets load from arbitrary modules.
295
+
296
+ - **Forbidden**: `dangerouslySetInnerHTML` anywhere in portal injection widgets. Render structured data, not raw HTML.
297
+ - **Labels and user-facing text**: always through `useT()`; render as text children, never as HTML.
298
+ - **Icons**: Lucide components (`lucide-react`). No inline `<svg>` composed from user-controlled strings.
299
+ - **Asset URLs** (`src`, `href`, `action`, `srcDoc`): must not be user-controlled unless validated server-side against an allowlist.
300
+ - **No `eval`, `new Function`, `setTimeout(string)`**, or similar dynamic code paths.
301
+ - **Event-handler payloads** from SSE: validate shape (`isPortalBroadcastEvent` guards dispatch; never trust `event.data` to be well-formed without schema validation).
302
+ - **Styles**: no user-controlled strings in `style` props, CSS variables, or `className` built from untrusted input.
303
+
304
+ Prefer components that accept structured props over ones accepting `children` / `innerHTML` — the host keeps control of escaping.
305
+
209
306
  ### PortalShell Usage
210
307
 
211
308
  ```tsx
package/dist/index.js CHANGED
@@ -850,6 +850,8 @@ function printTemplateNextSteps(appName) {
850
850
  console.log("Next steps:");
851
851
  console.log("");
852
852
  console.log(pc.cyan(` cd ${appName}`));
853
+ console.log(pc.dim(" # Make sure Yarn 4.1x is installed before running the setup command, and install all the deependencies with:"));
854
+ console.log(pc.cyan(" yarn"));
853
855
  console.log("");
854
856
  console.log(pc.green("Suggested quick start:"));
855
857
  console.log(pc.cyan(" yarn setup"));
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "create-mercato-app",
3
- "version": "0.5.1-develop.2652.0276e72e45",
3
+ "version": "0.5.1-develop.2663.2c29774b5b",
4
4
  "type": "module",
5
5
  "description": "Create a new Open Mercato application",
6
6
  "main": "./dist/index.js",
@@ -1,7 +1,9 @@
1
1
  import { notFound, redirect } from 'next/navigation'
2
2
  import Link from 'next/link'
3
- import { findRouteManifestMatch } from '@open-mercato/shared/modules/registry'
3
+ import { findRouteManifestMatch, registerFrontendRouteManifests } from '@open-mercato/shared/modules/registry'
4
4
  import { frontendRoutes } from '@/.mercato/generated/frontend-routes.generated'
5
+
6
+ registerFrontendRouteManifests(frontendRoutes)
5
7
  import { getAuthFromCookies } from '@open-mercato/shared/lib/auth/server'
6
8
  import { AccessDeniedMessage } from '@open-mercato/ui/backend/detail'
7
9
  import type { AuthContext } from '@open-mercato/shared/lib/auth/server'
@@ -1,14 +1,16 @@
1
1
  import { NextResponse, type NextRequest } from 'next/server'
2
- import { findApiRouteManifestMatch, registerBackendRouteManifests, type HttpMethod } from '@open-mercato/shared/modules/registry'
2
+ import { findApiRouteManifestMatch, registerBackendRouteManifests, registerFrontendRouteManifests, type HttpMethod } from '@open-mercato/shared/modules/registry'
3
3
  import { isCrudHttpError } from '@open-mercato/shared/lib/crud/errors'
4
4
  import { apiRoutes } from '@/.mercato/generated/api-routes.generated'
5
5
  import { backendRoutes } from '@/.mercato/generated/backend-routes.generated'
6
+ import { frontendRoutes } from '@/.mercato/generated/frontend-routes.generated'
6
7
  import { resolveAuthFromRequestDetailed } from '@open-mercato/shared/lib/auth/server'
7
8
  import { bootstrap } from '@/bootstrap'
8
9
 
9
10
  // Ensure all package registrations are initialized for API routes
10
11
  bootstrap()
11
12
  registerBackendRouteManifests(backendRoutes)
13
+ registerFrontendRouteManifests(frontendRoutes)
12
14
  import type { AuthContext } from '@open-mercato/shared/lib/auth/server'
13
15
  import { createRequestContainer } from '@open-mercato/shared/lib/di/container'
14
16
  import { RbacService } from '@open-mercato/core/modules/auth/services/rbacService'
@@ -134,7 +136,7 @@ async function checkAuthorization(
134
136
  req: NextRequest
135
137
  ): Promise<NextResponse | null> {
136
138
  const { t } = await resolveTranslations()
137
- const requiresAuthentication = methodMetadata !== null && methodMetadata?.requireAuth !== false
139
+ const requiresAuthentication = methodMetadata?.requireAuth !== false
138
140
  if (requiresAuthentication && !auth) {
139
141
  return NextResponse.json({ error: t('api.errors.unauthorized', 'Unauthorized') }, { status: 401 })
140
142
  }