hazo_auth 0.1.2 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/hazo_auth_config.example.ini +75 -0
- package/instrumentation.ts +1 -1
- package/next.config.mjs +1 -1
- package/package.json +4 -1
- package/src/app/api/{auth → hazo_auth/auth}/upload_profile_picture/route.ts +2 -2
- package/src/app/api/{auth → hazo_auth}/change_password/route.ts +23 -0
- package/src/app/api/hazo_auth/get_auth/route.ts +89 -0
- package/src/app/api/hazo_auth/invalidate_cache/route.ts +139 -0
- package/src/app/api/{auth → hazo_auth}/library_photos/route.ts +3 -0
- package/src/app/api/{auth → hazo_auth}/logout/route.ts +27 -0
- package/src/app/api/hazo_auth/upload_profile_picture/route.ts +268 -0
- package/src/app/api/hazo_auth/user_management/permissions/route.ts +367 -0
- package/src/app/api/hazo_auth/user_management/roles/route.ts +442 -0
- package/src/app/api/hazo_auth/user_management/users/roles/route.ts +367 -0
- package/src/app/api/hazo_auth/user_management/users/route.ts +239 -0
- package/src/app/api/{auth → hazo_auth}/validate_reset_token/route.ts +3 -0
- package/src/app/api/{auth → hazo_auth}/verify_email/route.ts +3 -0
- package/src/app/globals.css +1 -1
- package/src/app/hazo_auth/user_management/page.tsx +14 -0
- package/src/app/hazo_auth/user_management/user_management_page_client.tsx +16 -0
- package/src/app/hazo_connect/api/sqlite/data/route.ts +7 -1
- package/src/app/hazo_connect/api/sqlite/schema/route.ts +14 -4
- package/src/app/hazo_connect/api/sqlite/tables/route.ts +14 -4
- package/src/app/hazo_connect/sqlite_admin/sqlite-admin-client.tsx +40 -3
- package/src/app/layout.tsx +1 -1
- package/src/app/page.tsx +4 -4
- package/src/components/layouts/email_verification/hooks/use_email_verification.ts +4 -4
- package/src/components/layouts/email_verification/index.tsx +1 -1
- package/src/components/layouts/forgot_password/hooks/use_forgot_password_form.ts +1 -1
- package/src/components/layouts/login/hooks/use_login_form.ts +2 -2
- package/src/components/layouts/my_settings/components/profile_picture_dialog.tsx +1 -1
- package/src/components/layouts/my_settings/components/profile_picture_library_tab.tsx +35 -6
- package/src/components/layouts/my_settings/hooks/use_my_settings.ts +5 -5
- package/src/components/layouts/my_settings/index.tsx +1 -1
- package/src/components/layouts/register/hooks/use_register_form.ts +1 -1
- package/src/components/layouts/reset_password/hooks/use_reset_password_form.ts +3 -3
- package/src/components/layouts/reset_password/index.tsx +2 -2
- package/src/components/layouts/shared/components/logout_button.tsx +1 -1
- package/src/components/layouts/shared/components/profile_pic_menu.tsx +321 -0
- package/src/components/layouts/shared/components/profile_pic_menu_wrapper.tsx +40 -0
- package/src/components/layouts/shared/components/sidebar_layout_wrapper.tsx +22 -72
- package/src/components/layouts/shared/components/unauthorized_guard.tsx +1 -1
- package/src/components/layouts/shared/hooks/use_auth_status.ts +1 -1
- package/src/components/layouts/shared/hooks/use_hazo_auth.ts +158 -0
- package/src/components/layouts/user_management/components/roles_matrix.tsx +607 -0
- package/src/components/layouts/user_management/index.tsx +1295 -0
- package/src/components/ui/alert-dialog.tsx +141 -0
- package/src/components/ui/checkbox.tsx +30 -0
- package/src/components/ui/dropdown-menu.tsx +201 -0
- package/src/components/ui/table.tsx +120 -0
- package/src/lib/auth/auth_cache.ts +220 -0
- package/src/lib/auth/auth_rate_limiter.ts +121 -0
- package/src/lib/auth/auth_types.ts +65 -0
- package/src/lib/auth/hazo_get_auth.server.ts +333 -0
- package/src/lib/auth_utility_config.server.ts +136 -0
- package/src/lib/hazo_connect_setup.server.ts +2 -3
- package/src/lib/my_settings_config.server.ts +1 -1
- package/src/lib/profile_pic_menu_config.server.ts +138 -0
- package/src/lib/reset_password_config.server.ts +5 -5
- package/src/lib/services/email_service.ts +2 -2
- package/src/lib/services/profile_picture_remove_service.ts +1 -1
- package/src/lib/services/token_service.ts +2 -2
- package/src/lib/user_management_config.server.ts +40 -0
- package/src/lib/utils.ts +1 -1
- package/src/middleware.ts +15 -13
- package/src/server/types/express.d.ts +1 -0
- package/src/stories/project_overview.stories.tsx +1 -1
- package/tailwind.config.ts +1 -1
- /package/src/app/api/{auth → hazo_auth}/forgot_password/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/login/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/me/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/profile_picture/[filename]/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/register/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/remove_profile_picture/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/resend_verification/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/reset_password/route.ts +0 -0
- /package/src/app/api/{auth → hazo_auth}/update_user/route.ts +0 -0
- /package/src/app/{forgot_password → hazo_auth/forgot_password}/forgot_password_page_client.tsx +0 -0
- /package/src/app/{forgot_password → hazo_auth/forgot_password}/page.tsx +0 -0
- /package/src/app/{login → hazo_auth/login}/login_page_client.tsx +0 -0
- /package/src/app/{login → hazo_auth/login}/page.tsx +0 -0
- /package/src/app/{my_settings → hazo_auth/my_settings}/my_settings_page_client.tsx +0 -0
- /package/src/app/{my_settings → hazo_auth/my_settings}/page.tsx +0 -0
- /package/src/app/{register → hazo_auth/register}/page.tsx +0 -0
- /package/src/app/{register → hazo_auth/register}/register_page_client.tsx +0 -0
- /package/src/app/{reset_password → hazo_auth/reset_password}/page.tsx +0 -0
- /package/src/app/{reset_password → hazo_auth/reset_password}/reset_password_page_client.tsx +0 -0
- /package/src/app/{verify_email → hazo_auth/verify_email}/page.tsx +0 -0
- /package/src/app/{verify_email → hazo_auth/verify_email}/verify_email_page_client.tsx +0 -0
|
@@ -0,0 +1,442 @@
|
|
|
1
|
+
// file_description: API route for roles management operations (list roles with permissions, create role, update role permissions)
|
|
2
|
+
// section: imports
|
|
3
|
+
import { NextRequest, NextResponse } from "next/server";
|
|
4
|
+
import { get_hazo_connect_instance } from "@/lib/hazo_connect_instance.server";
|
|
5
|
+
import { createCrudService, getSqliteAdminService } from "hazo_connect/server";
|
|
6
|
+
import { create_app_logger } from "@/lib/app_logger";
|
|
7
|
+
import { get_filename, get_line_number } from "@/lib/utils/api_route_helpers";
|
|
8
|
+
import { get_auth_cache } from "@/lib/auth/auth_cache";
|
|
9
|
+
import { get_auth_utility_config } from "@/lib/auth_utility_config.server";
|
|
10
|
+
|
|
11
|
+
// section: route_config
|
|
12
|
+
export const dynamic = 'force-dynamic';
|
|
13
|
+
|
|
14
|
+
// section: api_handler
|
|
15
|
+
/**
|
|
16
|
+
* GET - Fetch all roles with their permissions
|
|
17
|
+
*/
|
|
18
|
+
export async function GET(request: NextRequest) {
|
|
19
|
+
const logger = create_app_logger();
|
|
20
|
+
|
|
21
|
+
try {
|
|
22
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
23
|
+
const roles_service = createCrudService(hazoConnect, "hazo_roles");
|
|
24
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
25
|
+
const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
|
|
26
|
+
|
|
27
|
+
// Fetch all roles (empty object means no filter - get all records)
|
|
28
|
+
const roles = await roles_service.findBy({});
|
|
29
|
+
const permissions = await permissions_service.findBy({});
|
|
30
|
+
const role_permissions = await role_permissions_service.findBy({});
|
|
31
|
+
|
|
32
|
+
if (!Array.isArray(roles) || !Array.isArray(permissions) || !Array.isArray(role_permissions)) {
|
|
33
|
+
return NextResponse.json(
|
|
34
|
+
{ error: "Failed to fetch roles data" },
|
|
35
|
+
{ status: 500 }
|
|
36
|
+
);
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
// Build role-permission mapping
|
|
40
|
+
const role_permission_map: Record<number, number[]> = {};
|
|
41
|
+
role_permissions.forEach((rp) => {
|
|
42
|
+
const role_id = rp.role_id as number;
|
|
43
|
+
const permission_id = rp.permission_id as number;
|
|
44
|
+
if (!role_permission_map[role_id]) {
|
|
45
|
+
role_permission_map[role_id] = [];
|
|
46
|
+
}
|
|
47
|
+
role_permission_map[role_id].push(permission_id);
|
|
48
|
+
});
|
|
49
|
+
|
|
50
|
+
// Build permission name map
|
|
51
|
+
const permission_name_map: Record<number, string> = {};
|
|
52
|
+
permissions.forEach((perm) => {
|
|
53
|
+
permission_name_map[perm.id as number] = perm.permission_name as string;
|
|
54
|
+
});
|
|
55
|
+
|
|
56
|
+
// Format response
|
|
57
|
+
const roles_with_permissions = roles.map((role) => {
|
|
58
|
+
const role_id = role.id as number;
|
|
59
|
+
const permission_ids = role_permission_map[role_id] || [];
|
|
60
|
+
const permission_names = permission_ids.map((pid) => permission_name_map[pid]).filter(Boolean);
|
|
61
|
+
|
|
62
|
+
return {
|
|
63
|
+
role_id: role.id,
|
|
64
|
+
role_name: role.role_name,
|
|
65
|
+
permissions: permission_names,
|
|
66
|
+
};
|
|
67
|
+
});
|
|
68
|
+
|
|
69
|
+
logger.info("user_management_roles_fetched", {
|
|
70
|
+
filename: get_filename(),
|
|
71
|
+
line_number: get_line_number(),
|
|
72
|
+
role_count: roles.length,
|
|
73
|
+
permission_count: permissions.length,
|
|
74
|
+
});
|
|
75
|
+
|
|
76
|
+
return NextResponse.json(
|
|
77
|
+
{
|
|
78
|
+
success: true,
|
|
79
|
+
roles: roles_with_permissions,
|
|
80
|
+
permissions: permissions.map((p) => ({
|
|
81
|
+
id: p.id,
|
|
82
|
+
permission_name: p.permission_name,
|
|
83
|
+
})),
|
|
84
|
+
},
|
|
85
|
+
{ status: 200 }
|
|
86
|
+
);
|
|
87
|
+
} catch (error) {
|
|
88
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
89
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
90
|
+
|
|
91
|
+
logger.error("user_management_roles_fetch_error", {
|
|
92
|
+
filename: get_filename(),
|
|
93
|
+
line_number: get_line_number(),
|
|
94
|
+
error_message,
|
|
95
|
+
error_stack,
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
return NextResponse.json(
|
|
99
|
+
{ error: "Failed to fetch roles" },
|
|
100
|
+
{ status: 500 }
|
|
101
|
+
);
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
/**
|
|
106
|
+
* POST - Create new role
|
|
107
|
+
*/
|
|
108
|
+
export async function POST(request: NextRequest) {
|
|
109
|
+
const logger = create_app_logger();
|
|
110
|
+
|
|
111
|
+
try {
|
|
112
|
+
const body = await request.json();
|
|
113
|
+
const { role_name } = body;
|
|
114
|
+
|
|
115
|
+
if (!role_name || typeof role_name !== "string" || role_name.trim().length === 0) {
|
|
116
|
+
return NextResponse.json(
|
|
117
|
+
{ error: "role_name is required and must be a non-empty string" },
|
|
118
|
+
{ status: 400 }
|
|
119
|
+
);
|
|
120
|
+
}
|
|
121
|
+
|
|
122
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
123
|
+
const roles_service = createCrudService(hazoConnect, "hazo_roles");
|
|
124
|
+
|
|
125
|
+
// Check if role already exists
|
|
126
|
+
const existing_roles = await roles_service.findBy({
|
|
127
|
+
role_name: role_name.trim(),
|
|
128
|
+
});
|
|
129
|
+
|
|
130
|
+
if (Array.isArray(existing_roles) && existing_roles.length > 0) {
|
|
131
|
+
return NextResponse.json(
|
|
132
|
+
{ error: "Role with this name already exists" },
|
|
133
|
+
{ status: 409 }
|
|
134
|
+
);
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
// Create new role
|
|
138
|
+
const now = new Date().toISOString();
|
|
139
|
+
const new_role_result = await roles_service.insert({
|
|
140
|
+
role_name: role_name.trim(),
|
|
141
|
+
created_at: now,
|
|
142
|
+
changed_at: now,
|
|
143
|
+
});
|
|
144
|
+
|
|
145
|
+
// insert() returns an array, get the first element
|
|
146
|
+
if (!Array.isArray(new_role_result) || new_role_result.length === 0) {
|
|
147
|
+
return NextResponse.json(
|
|
148
|
+
{ error: "Failed to create role - no record returned" },
|
|
149
|
+
{ status: 500 }
|
|
150
|
+
);
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
const new_role = new_role_result[0] as { id: number; role_name: string };
|
|
154
|
+
|
|
155
|
+
logger.info("user_management_role_created", {
|
|
156
|
+
filename: get_filename(),
|
|
157
|
+
line_number: get_line_number(),
|
|
158
|
+
role_id: new_role.id,
|
|
159
|
+
role_name: role_name.trim(),
|
|
160
|
+
});
|
|
161
|
+
|
|
162
|
+
return NextResponse.json(
|
|
163
|
+
{
|
|
164
|
+
success: true,
|
|
165
|
+
role: {
|
|
166
|
+
role_id: new_role.id,
|
|
167
|
+
role_name: role_name.trim(),
|
|
168
|
+
},
|
|
169
|
+
},
|
|
170
|
+
{ status: 201 }
|
|
171
|
+
);
|
|
172
|
+
} catch (error) {
|
|
173
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
174
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
175
|
+
|
|
176
|
+
logger.error("user_management_role_create_error", {
|
|
177
|
+
filename: get_filename(),
|
|
178
|
+
line_number: get_line_number(),
|
|
179
|
+
error_message,
|
|
180
|
+
error_stack,
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
return NextResponse.json(
|
|
184
|
+
{ error: "Failed to create role" },
|
|
185
|
+
{ status: 500 }
|
|
186
|
+
);
|
|
187
|
+
}
|
|
188
|
+
}
|
|
189
|
+
|
|
190
|
+
/**
|
|
191
|
+
* PUT - Update role permissions (save role-permission matrix)
|
|
192
|
+
*/
|
|
193
|
+
export async function PUT(request: NextRequest) {
|
|
194
|
+
const logger = create_app_logger();
|
|
195
|
+
|
|
196
|
+
try {
|
|
197
|
+
const body = await request.json();
|
|
198
|
+
const { roles } = body;
|
|
199
|
+
|
|
200
|
+
if (!Array.isArray(roles)) {
|
|
201
|
+
return NextResponse.json(
|
|
202
|
+
{ error: "roles array is required" },
|
|
203
|
+
{ status: 400 }
|
|
204
|
+
);
|
|
205
|
+
}
|
|
206
|
+
|
|
207
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
208
|
+
const roles_service = createCrudService(hazoConnect, "hazo_roles");
|
|
209
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
210
|
+
const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
|
|
211
|
+
|
|
212
|
+
// Get all permissions to build name-to-id map (empty object means no filter - get all records)
|
|
213
|
+
const all_permissions = await permissions_service.findBy({});
|
|
214
|
+
if (!Array.isArray(all_permissions)) {
|
|
215
|
+
return NextResponse.json(
|
|
216
|
+
{ error: "Failed to fetch permissions" },
|
|
217
|
+
{ status: 500 }
|
|
218
|
+
);
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
const permission_name_to_id: Record<string, number> = {};
|
|
222
|
+
all_permissions.forEach((perm) => {
|
|
223
|
+
permission_name_to_id[perm.permission_name as string] = perm.id as number;
|
|
224
|
+
});
|
|
225
|
+
|
|
226
|
+
const now = new Date().toISOString();
|
|
227
|
+
const modified_role_ids: number[] = []; // Track all role IDs that were modified
|
|
228
|
+
|
|
229
|
+
// Process each role
|
|
230
|
+
for (const role_data of roles) {
|
|
231
|
+
const { role_id, role_name, permissions } = role_data;
|
|
232
|
+
|
|
233
|
+
if (!role_name || !Array.isArray(permissions)) {
|
|
234
|
+
continue; // Skip invalid entries
|
|
235
|
+
}
|
|
236
|
+
|
|
237
|
+
let current_role_id: number | undefined;
|
|
238
|
+
|
|
239
|
+
if (role_id) {
|
|
240
|
+
// Update existing role
|
|
241
|
+
current_role_id = role_id;
|
|
242
|
+
await roles_service.updateById(role_id, {
|
|
243
|
+
role_name: role_name.trim(),
|
|
244
|
+
changed_at: now,
|
|
245
|
+
});
|
|
246
|
+
} else {
|
|
247
|
+
// Create new role
|
|
248
|
+
const existing_roles = await roles_service.findBy({
|
|
249
|
+
role_name: role_name.trim(),
|
|
250
|
+
});
|
|
251
|
+
|
|
252
|
+
if (Array.isArray(existing_roles) && existing_roles.length > 0) {
|
|
253
|
+
current_role_id = existing_roles[0].id as number;
|
|
254
|
+
} else {
|
|
255
|
+
const new_role = await roles_service.insert({
|
|
256
|
+
role_name: role_name.trim(),
|
|
257
|
+
created_at: now,
|
|
258
|
+
changed_at: now,
|
|
259
|
+
});
|
|
260
|
+
|
|
261
|
+
// Handle both single object and array responses from insert
|
|
262
|
+
if (Array.isArray(new_role) && new_role.length > 0) {
|
|
263
|
+
current_role_id = (new_role[0] as { id: number }).id;
|
|
264
|
+
} else if (!Array.isArray(new_role) && (new_role as { id?: number }).id !== undefined) {
|
|
265
|
+
current_role_id = (new_role as { id: number }).id;
|
|
266
|
+
} else {
|
|
267
|
+
// If insert didn't return an id, try to find the role by name
|
|
268
|
+
const inserted_roles = await roles_service.findBy({
|
|
269
|
+
role_name: role_name.trim(),
|
|
270
|
+
});
|
|
271
|
+
if (Array.isArray(inserted_roles) && inserted_roles.length > 0) {
|
|
272
|
+
current_role_id = inserted_roles[0].id as number;
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
}
|
|
276
|
+
}
|
|
277
|
+
|
|
278
|
+
// Skip if we couldn't determine the role ID
|
|
279
|
+
if (!current_role_id) {
|
|
280
|
+
logger.warn("user_management_role_id_not_found", {
|
|
281
|
+
filename: get_filename(),
|
|
282
|
+
line_number: get_line_number(),
|
|
283
|
+
role_name: role_name.trim(),
|
|
284
|
+
role_id,
|
|
285
|
+
});
|
|
286
|
+
continue;
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
// Track this role ID for cache invalidation
|
|
290
|
+
modified_role_ids.push(current_role_id);
|
|
291
|
+
|
|
292
|
+
// Get current role-permission mappings
|
|
293
|
+
const current_mappings = await role_permissions_service.findBy({
|
|
294
|
+
role_id: current_role_id,
|
|
295
|
+
});
|
|
296
|
+
|
|
297
|
+
const current_permission_ids = Array.isArray(current_mappings)
|
|
298
|
+
? current_mappings.map((m) => m.permission_id as number)
|
|
299
|
+
: [];
|
|
300
|
+
|
|
301
|
+
// Get target permission IDs
|
|
302
|
+
const target_permission_ids = permissions
|
|
303
|
+
.map((perm_name: string) => permission_name_to_id[perm_name])
|
|
304
|
+
.filter((id: number | undefined) => id !== undefined);
|
|
305
|
+
|
|
306
|
+
// Delete removed permissions
|
|
307
|
+
// Note: hazo_role_permissions is a junction table without an id column
|
|
308
|
+
// We need to use SQLite admin service to delete by composite key (role_id, permission_id)
|
|
309
|
+
const to_delete = current_permission_ids.filter(
|
|
310
|
+
(id) => !target_permission_ids.includes(id)
|
|
311
|
+
);
|
|
312
|
+
|
|
313
|
+
if (to_delete.length > 0) {
|
|
314
|
+
try {
|
|
315
|
+
const admin_service = getSqliteAdminService();
|
|
316
|
+
|
|
317
|
+
for (const perm_id of to_delete) {
|
|
318
|
+
// Delete using SQLite admin service with criteria (role_id and permission_id)
|
|
319
|
+
await admin_service.deleteRows("hazo_role_permissions", {
|
|
320
|
+
role_id: current_role_id,
|
|
321
|
+
permission_id: perm_id,
|
|
322
|
+
});
|
|
323
|
+
}
|
|
324
|
+
} catch (adminError) {
|
|
325
|
+
// Fallback: try using createCrudService deleteById if rowid exists
|
|
326
|
+
// SQLite tables have a hidden rowid column that can be used
|
|
327
|
+
const error_message = adminError instanceof Error ? adminError.message : "Unknown error";
|
|
328
|
+
logger.warn("user_management_role_permission_delete_admin_failed", {
|
|
329
|
+
filename: get_filename(),
|
|
330
|
+
line_number: get_line_number(),
|
|
331
|
+
error: error_message,
|
|
332
|
+
note: "Trying fallback method",
|
|
333
|
+
});
|
|
334
|
+
|
|
335
|
+
// Fallback: try to find and delete using rowid if available
|
|
336
|
+
for (const perm_id of to_delete) {
|
|
337
|
+
const mappings_to_delete = await role_permissions_service.findBy({
|
|
338
|
+
role_id: current_role_id,
|
|
339
|
+
permission_id: perm_id,
|
|
340
|
+
});
|
|
341
|
+
|
|
342
|
+
if (Array.isArray(mappings_to_delete) && mappings_to_delete.length > 0) {
|
|
343
|
+
for (const mapping of mappings_to_delete) {
|
|
344
|
+
// Try deleteById with rowid (SQLite has hidden rowid)
|
|
345
|
+
try {
|
|
346
|
+
// Check if mapping has an id field (could be rowid)
|
|
347
|
+
if ((mapping as { id?: number; rowid?: number }).id !== undefined) {
|
|
348
|
+
await role_permissions_service.deleteById((mapping as { id: number }).id);
|
|
349
|
+
} else if ((mapping as { rowid?: number }).rowid !== undefined) {
|
|
350
|
+
await role_permissions_service.deleteById((mapping as { rowid: number }).rowid);
|
|
351
|
+
} else {
|
|
352
|
+
// Last resort: log error
|
|
353
|
+
logger.error("user_management_role_permission_delete_no_id", {
|
|
354
|
+
filename: get_filename(),
|
|
355
|
+
line_number: get_line_number(),
|
|
356
|
+
role_id: current_role_id,
|
|
357
|
+
permission_id: perm_id,
|
|
358
|
+
mapping,
|
|
359
|
+
});
|
|
360
|
+
}
|
|
361
|
+
} catch (deleteError) {
|
|
362
|
+
const delete_error_message = deleteError instanceof Error ? deleteError.message : "Unknown error";
|
|
363
|
+
logger.error("user_management_role_permission_delete_failed", {
|
|
364
|
+
filename: get_filename(),
|
|
365
|
+
line_number: get_line_number(),
|
|
366
|
+
role_id: current_role_id,
|
|
367
|
+
permission_id: perm_id,
|
|
368
|
+
error: delete_error_message,
|
|
369
|
+
});
|
|
370
|
+
}
|
|
371
|
+
}
|
|
372
|
+
}
|
|
373
|
+
}
|
|
374
|
+
}
|
|
375
|
+
}
|
|
376
|
+
|
|
377
|
+
// Add new permissions
|
|
378
|
+
const to_add = target_permission_ids.filter(
|
|
379
|
+
(id) => !current_permission_ids.includes(id)
|
|
380
|
+
);
|
|
381
|
+
for (const perm_id of to_add) {
|
|
382
|
+
await role_permissions_service.insert({
|
|
383
|
+
role_id: current_role_id,
|
|
384
|
+
permission_id: perm_id,
|
|
385
|
+
created_at: now,
|
|
386
|
+
changed_at: now,
|
|
387
|
+
});
|
|
388
|
+
}
|
|
389
|
+
}
|
|
390
|
+
|
|
391
|
+
// Invalidate cache for all affected roles
|
|
392
|
+
try {
|
|
393
|
+
const config = get_auth_utility_config();
|
|
394
|
+
const cache = get_auth_cache(
|
|
395
|
+
config.cache_max_users,
|
|
396
|
+
config.cache_ttl_minutes,
|
|
397
|
+
config.cache_max_age_minutes,
|
|
398
|
+
);
|
|
399
|
+
|
|
400
|
+
// Invalidate by all role IDs that were modified (including newly created ones)
|
|
401
|
+
if (modified_role_ids.length > 0) {
|
|
402
|
+
cache.invalidate_by_roles(modified_role_ids);
|
|
403
|
+
}
|
|
404
|
+
} catch (cache_error) {
|
|
405
|
+
// Log but don't fail role update if cache invalidation fails
|
|
406
|
+
const cache_error_message =
|
|
407
|
+
cache_error instanceof Error ? cache_error.message : "Unknown error";
|
|
408
|
+
logger.warn("user_management_roles_cache_invalidation_failed", {
|
|
409
|
+
filename: get_filename(),
|
|
410
|
+
line_number: get_line_number(),
|
|
411
|
+
error: cache_error_message,
|
|
412
|
+
});
|
|
413
|
+
}
|
|
414
|
+
|
|
415
|
+
logger.info("user_management_roles_updated", {
|
|
416
|
+
filename: get_filename(),
|
|
417
|
+
line_number: get_line_number(),
|
|
418
|
+
role_count: roles.length,
|
|
419
|
+
});
|
|
420
|
+
|
|
421
|
+
return NextResponse.json(
|
|
422
|
+
{ success: true },
|
|
423
|
+
{ status: 200 }
|
|
424
|
+
);
|
|
425
|
+
} catch (error) {
|
|
426
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
427
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
428
|
+
|
|
429
|
+
logger.error("user_management_roles_update_error", {
|
|
430
|
+
filename: get_filename(),
|
|
431
|
+
line_number: get_line_number(),
|
|
432
|
+
error_message,
|
|
433
|
+
error_stack,
|
|
434
|
+
});
|
|
435
|
+
|
|
436
|
+
return NextResponse.json(
|
|
437
|
+
{ error: "Failed to update roles" },
|
|
438
|
+
{ status: 500 }
|
|
439
|
+
);
|
|
440
|
+
}
|
|
441
|
+
}
|
|
442
|
+
|