hazo_auth 0.1.2 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/hazo_auth_config.example.ini +75 -0
- package/instrumentation.ts +1 -1
- package/next.config.mjs +1 -1
- package/package.json +4 -1
- package/src/app/api/{auth → hazo_auth/auth}/upload_profile_picture/route.ts +2 -2
- package/src/app/api/{auth → hazo_auth}/change_password/route.ts +23 -0
- package/src/app/api/hazo_auth/get_auth/route.ts +89 -0
- package/src/app/api/hazo_auth/invalidate_cache/route.ts +139 -0
- package/src/app/api/{auth → hazo_auth}/library_photos/route.ts +3 -0
- package/src/app/api/{auth → hazo_auth}/logout/route.ts +27 -0
- package/src/app/api/hazo_auth/upload_profile_picture/route.ts +268 -0
- package/src/app/api/hazo_auth/user_management/permissions/route.ts +367 -0
- package/src/app/api/hazo_auth/user_management/roles/route.ts +442 -0
- package/src/app/api/hazo_auth/user_management/users/roles/route.ts +367 -0
- package/src/app/api/hazo_auth/user_management/users/route.ts +239 -0
- package/src/app/api/{auth → hazo_auth}/validate_reset_token/route.ts +3 -0
- package/src/app/api/{auth → hazo_auth}/verify_email/route.ts +3 -0
- package/src/app/globals.css +1 -1
- package/src/app/hazo_auth/user_management/page.tsx +14 -0
- package/src/app/hazo_auth/user_management/user_management_page_client.tsx +16 -0
- package/src/app/hazo_connect/api/sqlite/data/route.ts +7 -1
- package/src/app/hazo_connect/api/sqlite/schema/route.ts +14 -4
- package/src/app/hazo_connect/api/sqlite/tables/route.ts +14 -4
- package/src/app/hazo_connect/sqlite_admin/sqlite-admin-client.tsx +40 -3
- package/src/app/layout.tsx +1 -1
- package/src/app/page.tsx +4 -4
- package/src/components/layouts/email_verification/hooks/use_email_verification.ts +4 -4
- package/src/components/layouts/email_verification/index.tsx +1 -1
- package/src/components/layouts/forgot_password/hooks/use_forgot_password_form.ts +1 -1
- package/src/components/layouts/login/hooks/use_login_form.ts +2 -2
- package/src/components/layouts/my_settings/components/profile_picture_dialog.tsx +1 -1
- package/src/components/layouts/my_settings/components/profile_picture_library_tab.tsx +35 -6
- package/src/components/layouts/my_settings/hooks/use_my_settings.ts +5 -5
- package/src/components/layouts/my_settings/index.tsx +1 -1
- package/src/components/layouts/register/hooks/use_register_form.ts +1 -1
- package/src/components/layouts/reset_password/hooks/use_reset_password_form.ts +3 -3
- package/src/components/layouts/reset_password/index.tsx +2 -2
- package/src/components/layouts/shared/components/logout_button.tsx +1 -1
- package/src/components/layouts/shared/components/profile_pic_menu.tsx +321 -0
- package/src/components/layouts/shared/components/profile_pic_menu_wrapper.tsx +40 -0
- package/src/components/layouts/shared/components/sidebar_layout_wrapper.tsx +22 -72
- package/src/components/layouts/shared/components/unauthorized_guard.tsx +1 -1
- package/src/components/layouts/shared/hooks/use_auth_status.ts +1 -1
- package/src/components/layouts/shared/hooks/use_hazo_auth.ts +158 -0
- package/src/components/layouts/user_management/components/roles_matrix.tsx +607 -0
- package/src/components/layouts/user_management/index.tsx +1295 -0
- package/src/components/ui/alert-dialog.tsx +141 -0
- package/src/components/ui/checkbox.tsx +30 -0
- package/src/components/ui/dropdown-menu.tsx +201 -0
- package/src/components/ui/table.tsx +120 -0
- package/src/lib/auth/auth_cache.ts +220 -0
- package/src/lib/auth/auth_rate_limiter.ts +121 -0
- package/src/lib/auth/auth_types.ts +65 -0
- package/src/lib/auth/hazo_get_auth.server.ts +333 -0
- package/src/lib/auth_utility_config.server.ts +136 -0
- package/src/lib/hazo_connect_setup.server.ts +2 -3
- package/src/lib/my_settings_config.server.ts +1 -1
- package/src/lib/profile_pic_menu_config.server.ts +138 -0
- package/src/lib/reset_password_config.server.ts +5 -5
- package/src/lib/services/email_service.ts +2 -2
- package/src/lib/services/profile_picture_remove_service.ts +1 -1
- package/src/lib/services/token_service.ts +2 -2
- package/src/lib/user_management_config.server.ts +40 -0
- package/src/lib/utils.ts +1 -1
- package/src/middleware.ts +15 -13
- package/src/server/types/express.d.ts +1 -0
- package/src/stories/project_overview.stories.tsx +1 -1
- package/tailwind.config.ts +1 -1
- /package/src/app/api/{auth → hazo_auth}/forgot_password/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/login/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/me/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/profile_picture/[filename]/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/register/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/remove_profile_picture/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/resend_verification/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/reset_password/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/update_user/route.ts +0 -0
- /package/src/app/{forgot_password → hazo_auth/forgot_password}/forgot_password_page_client.tsx +0 -0
- /package/src/app/{forgot_password → hazo_auth/forgot_password}/page.tsx +0 -0
- /package/src/app/{login → hazo_auth/login}/login_page_client.tsx +0 -0
- /package/src/app/{login → hazo_auth/login}/page.tsx +0 -0
- /package/src/app/{my_settings → hazo_auth/my_settings}/my_settings_page_client.tsx +0 -0
- /package/src/app/{my_settings → hazo_auth/my_settings}/page.tsx +0 -0
- /package/src/app/{register → hazo_auth/register}/page.tsx +0 -0
- /package/src/app/{register → hazo_auth/register}/register_page_client.tsx +0 -0
- /package/src/app/{reset_password → hazo_auth/reset_password}/page.tsx +0 -0
- /package/src/app/{reset_password → hazo_auth/reset_password}/reset_password_page_client.tsx +0 -0
- /package/src/app/{verify_email → hazo_auth/verify_email}/page.tsx +0 -0
- /package/src/app/{verify_email → hazo_auth/verify_email}/verify_email_page_client.tsx +0 -0
|
@@ -0,0 +1,268 @@
|
|
|
1
|
+
// file_description: API route for uploading profile pictures
|
|
2
|
+
// section: imports
|
|
3
|
+
import { NextRequest, NextResponse } from "next/server";
|
|
4
|
+
import { get_hazo_connect_instance } from "@/lib/hazo_connect_instance.server";
|
|
5
|
+
import { create_app_logger } from "@/lib/app_logger";
|
|
6
|
+
import { get_profile_picture_config } from "@/lib/profile_picture_config.server";
|
|
7
|
+
import { get_file_types_config } from "@/lib/file_types_config.server";
|
|
8
|
+
import { update_user_profile_picture } from "@/lib/services/profile_picture_service";
|
|
9
|
+
import { createCrudService } from "hazo_connect/server";
|
|
10
|
+
import { map_db_source_to_ui } from "@/lib/services/profile_picture_source_mapper";
|
|
11
|
+
import { get_filename, get_line_number } from "@/lib/utils/api_route_helpers";
|
|
12
|
+
import fs from "fs";
|
|
13
|
+
import path from "path";
|
|
14
|
+
|
|
15
|
+
// section: api_handler
|
|
16
|
+
export async function POST(request: NextRequest) {
|
|
17
|
+
const logger = create_app_logger();
|
|
18
|
+
|
|
19
|
+
try {
|
|
20
|
+
// Use centralized auth check
|
|
21
|
+
let user_id: string;
|
|
22
|
+
try {
|
|
23
|
+
const { require_auth } = await import("@/lib/auth/auth_utils.server");
|
|
24
|
+
const user = await require_auth(request);
|
|
25
|
+
user_id = user.user_id;
|
|
26
|
+
} catch (error) {
|
|
27
|
+
if (error instanceof Error && error.message === "Authentication required") {
|
|
28
|
+
logger.warn("profile_picture_upload_authentication_failed", {
|
|
29
|
+
filename: get_filename(),
|
|
30
|
+
line_number: get_line_number(),
|
|
31
|
+
error: "User not authenticated",
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
return NextResponse.json(
|
|
35
|
+
{ error: "Authentication required" },
|
|
36
|
+
{ status: 401 }
|
|
37
|
+
);
|
|
38
|
+
}
|
|
39
|
+
throw error;
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
// Check if upload is enabled
|
|
43
|
+
const config = get_profile_picture_config();
|
|
44
|
+
if (!config.allow_photo_upload) {
|
|
45
|
+
logger.warn("profile_picture_upload_disabled", {
|
|
46
|
+
filename: get_filename(),
|
|
47
|
+
line_number: get_line_number(),
|
|
48
|
+
user_id,
|
|
49
|
+
});
|
|
50
|
+
|
|
51
|
+
return NextResponse.json(
|
|
52
|
+
{ error: "Photo upload is not enabled" },
|
|
53
|
+
{ status: 403 }
|
|
54
|
+
);
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
if (!config.upload_photo_path) {
|
|
58
|
+
logger.warn("profile_picture_upload_path_not_configured", {
|
|
59
|
+
filename: get_filename(),
|
|
60
|
+
line_number: get_line_number(),
|
|
61
|
+
user_id,
|
|
62
|
+
});
|
|
63
|
+
|
|
64
|
+
return NextResponse.json(
|
|
65
|
+
{ error: "Upload path is not configured" },
|
|
66
|
+
{ status: 500 }
|
|
67
|
+
);
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
// Get FormData
|
|
71
|
+
const formData = await request.formData();
|
|
72
|
+
const file = formData.get("file") as File | null;
|
|
73
|
+
|
|
74
|
+
if (!file) {
|
|
75
|
+
logger.warn("profile_picture_upload_no_file", {
|
|
76
|
+
filename: get_filename(),
|
|
77
|
+
line_number: get_line_number(),
|
|
78
|
+
user_id,
|
|
79
|
+
});
|
|
80
|
+
|
|
81
|
+
return NextResponse.json(
|
|
82
|
+
{ error: "No file provided" },
|
|
83
|
+
{ status: 400 }
|
|
84
|
+
);
|
|
85
|
+
}
|
|
86
|
+
|
|
87
|
+
// Validate file type
|
|
88
|
+
const fileTypes = get_file_types_config();
|
|
89
|
+
const fileType = file.type;
|
|
90
|
+
if (!fileTypes.allowed_image_mime_types.includes(fileType)) {
|
|
91
|
+
logger.warn("profile_picture_upload_invalid_type", {
|
|
92
|
+
filename: get_filename(),
|
|
93
|
+
line_number: get_line_number(),
|
|
94
|
+
user_id,
|
|
95
|
+
fileType,
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
return NextResponse.json(
|
|
99
|
+
{ error: "Invalid file type. Only JPG and PNG files are allowed." },
|
|
100
|
+
{ status: 400 }
|
|
101
|
+
);
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
// Validate file size (should already be compressed client-side, but check server-side too)
|
|
105
|
+
const fileSize = file.size;
|
|
106
|
+
if (fileSize > config.max_photo_size) {
|
|
107
|
+
logger.warn("profile_picture_upload_too_large", {
|
|
108
|
+
filename: get_filename(),
|
|
109
|
+
line_number: get_line_number(),
|
|
110
|
+
user_id,
|
|
111
|
+
fileSize,
|
|
112
|
+
maxSize: config.max_photo_size,
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
return NextResponse.json(
|
|
116
|
+
{ error: `File size exceeds maximum allowed size of ${config.max_photo_size} bytes` },
|
|
117
|
+
{ status: 400 }
|
|
118
|
+
);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
// Get current user profile picture info before updating
|
|
122
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
123
|
+
const users_service = createCrudService(hazoConnect, "hazo_users");
|
|
124
|
+
const current_users = await users_service.findBy({ id: user_id });
|
|
125
|
+
|
|
126
|
+
let oldProfilePictureUrl: string | null = null;
|
|
127
|
+
let oldProfileSource: string | null = null;
|
|
128
|
+
|
|
129
|
+
if (Array.isArray(current_users) && current_users.length > 0) {
|
|
130
|
+
const current_user = current_users[0];
|
|
131
|
+
oldProfilePictureUrl = (current_user.profile_picture_url as string) || null;
|
|
132
|
+
oldProfileSource = (current_user.profile_source as string) || null;
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
// Determine file extension from MIME type
|
|
136
|
+
const mimeToExt: Record<string, string> = {
|
|
137
|
+
"image/jpeg": "jpg",
|
|
138
|
+
"image/jpg": "jpg",
|
|
139
|
+
"image/png": "png",
|
|
140
|
+
};
|
|
141
|
+
const fileExtension = mimeToExt[fileType] || "jpg";
|
|
142
|
+
const fileName = `${user_id}.${fileExtension}`;
|
|
143
|
+
|
|
144
|
+
// Resolve upload path
|
|
145
|
+
const uploadPath = path.isAbsolute(config.upload_photo_path)
|
|
146
|
+
? config.upload_photo_path
|
|
147
|
+
: path.resolve(process.cwd(), config.upload_photo_path);
|
|
148
|
+
|
|
149
|
+
// Create upload directory if it doesn't exist
|
|
150
|
+
if (!fs.existsSync(uploadPath)) {
|
|
151
|
+
fs.mkdirSync(uploadPath, { recursive: true });
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
// Save file
|
|
155
|
+
const filePath = path.join(uploadPath, fileName);
|
|
156
|
+
const arrayBuffer = await file.arrayBuffer();
|
|
157
|
+
const buffer = Buffer.from(arrayBuffer);
|
|
158
|
+
fs.writeFileSync(filePath, buffer);
|
|
159
|
+
|
|
160
|
+
// Generate URL (relative to public or absolute)
|
|
161
|
+
// For Next.js, we'll serve from a public route or use absolute path
|
|
162
|
+
// For now, use a relative path that can be served via API or static file serving
|
|
163
|
+
const profilePictureUrl = `/api/hazo_auth/profile_picture/${fileName}`;
|
|
164
|
+
|
|
165
|
+
// Update user record
|
|
166
|
+
const updateResult = await update_user_profile_picture(
|
|
167
|
+
hazoConnect,
|
|
168
|
+
user_id,
|
|
169
|
+
profilePictureUrl,
|
|
170
|
+
"upload",
|
|
171
|
+
);
|
|
172
|
+
|
|
173
|
+
if (!updateResult.success) {
|
|
174
|
+
// Clean up uploaded file
|
|
175
|
+
try {
|
|
176
|
+
fs.unlinkSync(filePath);
|
|
177
|
+
} catch (error) {
|
|
178
|
+
// Ignore cleanup errors
|
|
179
|
+
}
|
|
180
|
+
|
|
181
|
+
logger.warn("profile_picture_upload_update_failed", {
|
|
182
|
+
filename: get_filename(),
|
|
183
|
+
line_number: get_line_number(),
|
|
184
|
+
user_id,
|
|
185
|
+
error: updateResult.error,
|
|
186
|
+
});
|
|
187
|
+
|
|
188
|
+
return NextResponse.json(
|
|
189
|
+
{ error: updateResult.error || "Failed to update profile picture" },
|
|
190
|
+
{ status: 500 }
|
|
191
|
+
);
|
|
192
|
+
}
|
|
193
|
+
|
|
194
|
+
// Delete old profile picture file if it exists and was an uploaded file
|
|
195
|
+
if (oldProfilePictureUrl && oldProfileSource) {
|
|
196
|
+
const oldSourceUI = map_db_source_to_ui(oldProfileSource);
|
|
197
|
+
|
|
198
|
+
// Only delete if the old profile picture was an uploaded file
|
|
199
|
+
if (oldSourceUI === "upload") {
|
|
200
|
+
try {
|
|
201
|
+
// Extract filename from URL (e.g., /api/hazo_auth/profile_picture/user_id.jpg)
|
|
202
|
+
const oldFileName = oldProfilePictureUrl.split("/").pop();
|
|
203
|
+
|
|
204
|
+
if (oldFileName) {
|
|
205
|
+
// Check if it's a user-specific file (starts with user_id)
|
|
206
|
+
if (oldFileName.startsWith(user_id)) {
|
|
207
|
+
const oldFilePath = path.join(uploadPath, oldFileName);
|
|
208
|
+
|
|
209
|
+
// Only delete if it's a different file (different extension)
|
|
210
|
+
if (oldFilePath !== filePath && fs.existsSync(oldFilePath)) {
|
|
211
|
+
fs.unlinkSync(oldFilePath);
|
|
212
|
+
|
|
213
|
+
logger.info("profile_picture_old_file_deleted", {
|
|
214
|
+
filename: get_filename(),
|
|
215
|
+
line_number: get_line_number(),
|
|
216
|
+
user_id,
|
|
217
|
+
oldFileName,
|
|
218
|
+
});
|
|
219
|
+
}
|
|
220
|
+
}
|
|
221
|
+
}
|
|
222
|
+
} catch (error) {
|
|
223
|
+
// Log error but don't fail the request
|
|
224
|
+
logger.warn("profile_picture_old_file_delete_failed", {
|
|
225
|
+
filename: get_filename(),
|
|
226
|
+
line_number: get_line_number(),
|
|
227
|
+
user_id,
|
|
228
|
+
oldProfilePictureUrl,
|
|
229
|
+
error: error instanceof Error ? error.message : "Unknown error",
|
|
230
|
+
});
|
|
231
|
+
}
|
|
232
|
+
}
|
|
233
|
+
}
|
|
234
|
+
|
|
235
|
+
logger.info("profile_picture_upload_successful", {
|
|
236
|
+
filename: get_filename(),
|
|
237
|
+
line_number: get_line_number(),
|
|
238
|
+
user_id,
|
|
239
|
+
fileName,
|
|
240
|
+
fileSize,
|
|
241
|
+
});
|
|
242
|
+
|
|
243
|
+
return NextResponse.json(
|
|
244
|
+
{
|
|
245
|
+
success: true,
|
|
246
|
+
profile_picture_url: profilePictureUrl,
|
|
247
|
+
message: "Profile picture uploaded successfully",
|
|
248
|
+
},
|
|
249
|
+
{ status: 200 }
|
|
250
|
+
);
|
|
251
|
+
} catch (error) {
|
|
252
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
253
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
254
|
+
|
|
255
|
+
logger.error("profile_picture_upload_error", {
|
|
256
|
+
filename: get_filename(),
|
|
257
|
+
line_number: get_line_number(),
|
|
258
|
+
error_message,
|
|
259
|
+
error_stack,
|
|
260
|
+
});
|
|
261
|
+
|
|
262
|
+
return NextResponse.json(
|
|
263
|
+
{ error: "Failed to upload profile picture. Please try again." },
|
|
264
|
+
{ status: 500 }
|
|
265
|
+
);
|
|
266
|
+
}
|
|
267
|
+
}
|
|
268
|
+
|
|
@@ -0,0 +1,367 @@
|
|
|
1
|
+
// file_description: API route for permissions management operations (list, migrate from config, update, delete)
|
|
2
|
+
// section: imports
|
|
3
|
+
import { NextRequest, NextResponse } from "next/server";
|
|
4
|
+
import { get_hazo_connect_instance } from "@/lib/hazo_connect_instance.server";
|
|
5
|
+
import { createCrudService } from "hazo_connect/server";
|
|
6
|
+
import { create_app_logger } from "@/lib/app_logger";
|
|
7
|
+
import { get_filename, get_line_number } from "@/lib/utils/api_route_helpers";
|
|
8
|
+
import { get_user_management_config } from "@/lib/user_management_config.server";
|
|
9
|
+
|
|
10
|
+
// section: route_config
|
|
11
|
+
export const dynamic = 'force-dynamic';
|
|
12
|
+
|
|
13
|
+
// section: api_handler
|
|
14
|
+
/**
|
|
15
|
+
* GET - Fetch all permissions from database and config
|
|
16
|
+
*/
|
|
17
|
+
export async function GET(request: NextRequest) {
|
|
18
|
+
const logger = create_app_logger();
|
|
19
|
+
|
|
20
|
+
try {
|
|
21
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
22
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
23
|
+
|
|
24
|
+
// Fetch all permissions from database (empty object means no filter - get all records)
|
|
25
|
+
const db_permissions = await permissions_service.findBy({});
|
|
26
|
+
|
|
27
|
+
if (!Array.isArray(db_permissions)) {
|
|
28
|
+
return NextResponse.json(
|
|
29
|
+
{ error: "Failed to fetch permissions" },
|
|
30
|
+
{ status: 500 }
|
|
31
|
+
);
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
// Get config permissions
|
|
35
|
+
const config = get_user_management_config();
|
|
36
|
+
const config_permission_names = config.application_permission_list_defaults || [];
|
|
37
|
+
|
|
38
|
+
// Get DB permission names
|
|
39
|
+
const db_permission_names = db_permissions.map((p) => p.permission_name as string);
|
|
40
|
+
|
|
41
|
+
// Find config permissions not in DB
|
|
42
|
+
const config_only_permissions = config_permission_names.filter(
|
|
43
|
+
(name) => !db_permission_names.includes(name)
|
|
44
|
+
);
|
|
45
|
+
|
|
46
|
+
logger.info("user_management_permissions_fetched", {
|
|
47
|
+
filename: get_filename(),
|
|
48
|
+
line_number: get_line_number(),
|
|
49
|
+
db_count: db_permissions.length,
|
|
50
|
+
config_count: config_permission_names.length,
|
|
51
|
+
});
|
|
52
|
+
|
|
53
|
+
return NextResponse.json(
|
|
54
|
+
{
|
|
55
|
+
success: true,
|
|
56
|
+
db_permissions: db_permissions.map((p) => ({
|
|
57
|
+
id: p.id,
|
|
58
|
+
permission_name: p.permission_name,
|
|
59
|
+
description: p.description || "",
|
|
60
|
+
})),
|
|
61
|
+
config_permissions: config_only_permissions,
|
|
62
|
+
},
|
|
63
|
+
{ status: 200 }
|
|
64
|
+
);
|
|
65
|
+
} catch (error) {
|
|
66
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
67
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
68
|
+
|
|
69
|
+
logger.error("user_management_permissions_fetch_error", {
|
|
70
|
+
filename: get_filename(),
|
|
71
|
+
line_number: get_line_number(),
|
|
72
|
+
error_message,
|
|
73
|
+
error_stack,
|
|
74
|
+
});
|
|
75
|
+
|
|
76
|
+
return NextResponse.json(
|
|
77
|
+
{ error: "Failed to fetch permissions" },
|
|
78
|
+
{ status: 500 }
|
|
79
|
+
);
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
|
|
83
|
+
/**
|
|
84
|
+
* POST - Create new permission or migrate config permissions to database
|
|
85
|
+
*/
|
|
86
|
+
export async function POST(request: NextRequest) {
|
|
87
|
+
const logger = create_app_logger();
|
|
88
|
+
|
|
89
|
+
try {
|
|
90
|
+
const { searchParams } = new URL(request.url);
|
|
91
|
+
const action = searchParams.get("action");
|
|
92
|
+
|
|
93
|
+
// Handle migrate action
|
|
94
|
+
if (action === "migrate") {
|
|
95
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
96
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
97
|
+
|
|
98
|
+
// Get config permissions
|
|
99
|
+
const config = get_user_management_config();
|
|
100
|
+
const config_permission_names = config.application_permission_list_defaults || [];
|
|
101
|
+
|
|
102
|
+
if (config_permission_names.length === 0) {
|
|
103
|
+
return NextResponse.json(
|
|
104
|
+
{
|
|
105
|
+
success: true,
|
|
106
|
+
message: "No permissions to migrate",
|
|
107
|
+
created: [],
|
|
108
|
+
skipped: [],
|
|
109
|
+
},
|
|
110
|
+
{ status: 200 }
|
|
111
|
+
);
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
// Get existing permissions from DB (empty object means no filter - get all records)
|
|
115
|
+
const db_permissions = await permissions_service.findBy({});
|
|
116
|
+
const db_permission_names = Array.isArray(db_permissions)
|
|
117
|
+
? db_permissions.map((p) => p.permission_name as string)
|
|
118
|
+
: [];
|
|
119
|
+
|
|
120
|
+
const now = new Date().toISOString();
|
|
121
|
+
const created: string[] = [];
|
|
122
|
+
const skipped: string[] = [];
|
|
123
|
+
|
|
124
|
+
// Migrate each config permission
|
|
125
|
+
for (const permission_name of config_permission_names) {
|
|
126
|
+
if (db_permission_names.includes(permission_name)) {
|
|
127
|
+
// Skip if already exists
|
|
128
|
+
skipped.push(permission_name);
|
|
129
|
+
continue;
|
|
130
|
+
}
|
|
131
|
+
|
|
132
|
+
// Create new permission
|
|
133
|
+
await permissions_service.insert({
|
|
134
|
+
permission_name: permission_name.trim(),
|
|
135
|
+
description: "",
|
|
136
|
+
created_at: now,
|
|
137
|
+
changed_at: now,
|
|
138
|
+
});
|
|
139
|
+
|
|
140
|
+
created.push(permission_name);
|
|
141
|
+
}
|
|
142
|
+
|
|
143
|
+
logger.info("user_management_permissions_migrated", {
|
|
144
|
+
filename: get_filename(),
|
|
145
|
+
line_number: get_line_number(),
|
|
146
|
+
created_count: created.length,
|
|
147
|
+
skipped_count: skipped.length,
|
|
148
|
+
});
|
|
149
|
+
|
|
150
|
+
return NextResponse.json(
|
|
151
|
+
{
|
|
152
|
+
success: true,
|
|
153
|
+
created,
|
|
154
|
+
skipped,
|
|
155
|
+
},
|
|
156
|
+
{ status: 200 }
|
|
157
|
+
);
|
|
158
|
+
}
|
|
159
|
+
|
|
160
|
+
// Handle create new permission
|
|
161
|
+
const body = await request.json();
|
|
162
|
+
const { permission_name, description } = body;
|
|
163
|
+
|
|
164
|
+
if (!permission_name || typeof permission_name !== "string" || permission_name.trim().length === 0) {
|
|
165
|
+
return NextResponse.json(
|
|
166
|
+
{ error: "permission_name is required and must be a non-empty string" },
|
|
167
|
+
{ status: 400 }
|
|
168
|
+
);
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
172
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
173
|
+
|
|
174
|
+
// Check if permission already exists
|
|
175
|
+
const existing_permissions = await permissions_service.findBy({
|
|
176
|
+
permission_name: permission_name.trim(),
|
|
177
|
+
});
|
|
178
|
+
|
|
179
|
+
if (Array.isArray(existing_permissions) && existing_permissions.length > 0) {
|
|
180
|
+
return NextResponse.json(
|
|
181
|
+
{ error: "Permission with this name already exists" },
|
|
182
|
+
{ status: 409 }
|
|
183
|
+
);
|
|
184
|
+
}
|
|
185
|
+
|
|
186
|
+
// Create new permission
|
|
187
|
+
const now = new Date().toISOString();
|
|
188
|
+
const new_permission_result = await permissions_service.insert({
|
|
189
|
+
permission_name: permission_name.trim(),
|
|
190
|
+
description: (description || "").trim(),
|
|
191
|
+
created_at: now,
|
|
192
|
+
changed_at: now,
|
|
193
|
+
});
|
|
194
|
+
|
|
195
|
+
// insert() returns an array, get the first element
|
|
196
|
+
if (!Array.isArray(new_permission_result) || new_permission_result.length === 0) {
|
|
197
|
+
return NextResponse.json(
|
|
198
|
+
{ error: "Failed to create permission - no record returned" },
|
|
199
|
+
{ status: 500 }
|
|
200
|
+
);
|
|
201
|
+
}
|
|
202
|
+
|
|
203
|
+
const new_permission = new_permission_result[0] as { id: number; permission_name: string; description: string };
|
|
204
|
+
|
|
205
|
+
logger.info("user_management_permission_created", {
|
|
206
|
+
filename: get_filename(),
|
|
207
|
+
line_number: get_line_number(),
|
|
208
|
+
permission_id: new_permission.id,
|
|
209
|
+
permission_name: permission_name.trim(),
|
|
210
|
+
});
|
|
211
|
+
|
|
212
|
+
return NextResponse.json(
|
|
213
|
+
{
|
|
214
|
+
success: true,
|
|
215
|
+
permission: {
|
|
216
|
+
id: new_permission.id,
|
|
217
|
+
permission_name: permission_name.trim(),
|
|
218
|
+
description: (description || "").trim(),
|
|
219
|
+
},
|
|
220
|
+
},
|
|
221
|
+
{ status: 201 }
|
|
222
|
+
);
|
|
223
|
+
} catch (error) {
|
|
224
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
225
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
226
|
+
|
|
227
|
+
logger.error("user_management_permissions_post_error", {
|
|
228
|
+
filename: get_filename(),
|
|
229
|
+
line_number: get_line_number(),
|
|
230
|
+
error_message,
|
|
231
|
+
error_stack,
|
|
232
|
+
});
|
|
233
|
+
|
|
234
|
+
return NextResponse.json(
|
|
235
|
+
{ error: "Failed to create permission" },
|
|
236
|
+
{ status: 500 }
|
|
237
|
+
);
|
|
238
|
+
}
|
|
239
|
+
}
|
|
240
|
+
|
|
241
|
+
/**
|
|
242
|
+
* PUT - Update permission description
|
|
243
|
+
*/
|
|
244
|
+
export async function PUT(request: NextRequest) {
|
|
245
|
+
const logger = create_app_logger();
|
|
246
|
+
|
|
247
|
+
try {
|
|
248
|
+
const body = await request.json();
|
|
249
|
+
const { permission_id, description } = body;
|
|
250
|
+
|
|
251
|
+
if (!permission_id || typeof description !== "string") {
|
|
252
|
+
return NextResponse.json(
|
|
253
|
+
{ error: "permission_id and description are required" },
|
|
254
|
+
{ status: 400 }
|
|
255
|
+
);
|
|
256
|
+
}
|
|
257
|
+
|
|
258
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
259
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
260
|
+
|
|
261
|
+
// Update permission with changed_at timestamp
|
|
262
|
+
const now = new Date().toISOString();
|
|
263
|
+
await permissions_service.updateById(permission_id, {
|
|
264
|
+
description: description.trim(),
|
|
265
|
+
changed_at: now,
|
|
266
|
+
});
|
|
267
|
+
|
|
268
|
+
logger.info("user_management_permission_updated", {
|
|
269
|
+
filename: get_filename(),
|
|
270
|
+
line_number: get_line_number(),
|
|
271
|
+
permission_id,
|
|
272
|
+
});
|
|
273
|
+
|
|
274
|
+
return NextResponse.json(
|
|
275
|
+
{ success: true },
|
|
276
|
+
{ status: 200 }
|
|
277
|
+
);
|
|
278
|
+
} catch (error) {
|
|
279
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
280
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
281
|
+
|
|
282
|
+
logger.error("user_management_permission_update_error", {
|
|
283
|
+
filename: get_filename(),
|
|
284
|
+
line_number: get_line_number(),
|
|
285
|
+
error_message,
|
|
286
|
+
error_stack,
|
|
287
|
+
});
|
|
288
|
+
|
|
289
|
+
return NextResponse.json(
|
|
290
|
+
{ error: "Failed to update permission" },
|
|
291
|
+
{ status: 500 }
|
|
292
|
+
);
|
|
293
|
+
}
|
|
294
|
+
}
|
|
295
|
+
|
|
296
|
+
/**
|
|
297
|
+
* DELETE - Delete permission from database
|
|
298
|
+
*/
|
|
299
|
+
export async function DELETE(request: NextRequest) {
|
|
300
|
+
const logger = create_app_logger();
|
|
301
|
+
|
|
302
|
+
try {
|
|
303
|
+
const { searchParams } = new URL(request.url);
|
|
304
|
+
const permission_id = searchParams.get("permission_id");
|
|
305
|
+
|
|
306
|
+
if (!permission_id) {
|
|
307
|
+
return NextResponse.json(
|
|
308
|
+
{ error: "permission_id is required" },
|
|
309
|
+
{ status: 400 }
|
|
310
|
+
);
|
|
311
|
+
}
|
|
312
|
+
|
|
313
|
+
const permission_id_num = parseInt(permission_id, 10);
|
|
314
|
+
if (isNaN(permission_id_num)) {
|
|
315
|
+
return NextResponse.json(
|
|
316
|
+
{ error: "permission_id must be a number" },
|
|
317
|
+
{ status: 400 }
|
|
318
|
+
);
|
|
319
|
+
}
|
|
320
|
+
|
|
321
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
322
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
323
|
+
const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
|
|
324
|
+
|
|
325
|
+
// Check if permission is used in any role
|
|
326
|
+
const role_permissions = await role_permissions_service.findBy({
|
|
327
|
+
permission_id: permission_id_num,
|
|
328
|
+
});
|
|
329
|
+
|
|
330
|
+
if (Array.isArray(role_permissions) && role_permissions.length > 0) {
|
|
331
|
+
return NextResponse.json(
|
|
332
|
+
{ error: "Cannot delete permission that is assigned to roles" },
|
|
333
|
+
{ status: 409 }
|
|
334
|
+
);
|
|
335
|
+
}
|
|
336
|
+
|
|
337
|
+
// Delete permission
|
|
338
|
+
await permissions_service.deleteById(permission_id_num);
|
|
339
|
+
|
|
340
|
+
logger.info("user_management_permission_deleted", {
|
|
341
|
+
filename: get_filename(),
|
|
342
|
+
line_number: get_line_number(),
|
|
343
|
+
permission_id: permission_id_num,
|
|
344
|
+
});
|
|
345
|
+
|
|
346
|
+
return NextResponse.json(
|
|
347
|
+
{ success: true },
|
|
348
|
+
{ status: 200 }
|
|
349
|
+
);
|
|
350
|
+
} catch (error) {
|
|
351
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
352
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
353
|
+
|
|
354
|
+
logger.error("user_management_permission_delete_error", {
|
|
355
|
+
filename: get_filename(),
|
|
356
|
+
line_number: get_line_number(),
|
|
357
|
+
error_message,
|
|
358
|
+
error_stack,
|
|
359
|
+
});
|
|
360
|
+
|
|
361
|
+
return NextResponse.json(
|
|
362
|
+
{ error: "Failed to delete permission" },
|
|
363
|
+
{ status: 500 }
|
|
364
|
+
);
|
|
365
|
+
}
|
|
366
|
+
}
|
|
367
|
+
|