hazo_auth 0.3.0 → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/README.md +628 -1
  2. package/hazo_auth_config.example.ini +39 -0
  3. package/instrumentation.ts +1 -1
  4. package/next.config.mjs +1 -1
  5. package/package.json +3 -1
  6. package/src/app/api/{auth → hazo_auth/auth}/upload_profile_picture/route.ts +2 -2
  7. package/src/app/api/{auth → hazo_auth}/change_password/route.ts +23 -0
  8. package/src/app/api/hazo_auth/get_auth/route.ts +89 -0
  9. package/src/app/api/hazo_auth/invalidate_cache/route.ts +139 -0
  10. package/src/app/api/{auth → hazo_auth}/logout/route.ts +27 -0
  11. package/src/app/api/hazo_auth/upload_profile_picture/route.ts +268 -0
  12. package/src/app/api/hazo_auth/user_management/permissions/route.ts +367 -0
  13. package/src/app/api/hazo_auth/user_management/roles/route.ts +442 -0
  14. package/src/app/api/hazo_auth/user_management/users/roles/route.ts +367 -0
  15. package/src/app/api/hazo_auth/user_management/users/route.ts +239 -0
  16. package/src/app/api/{auth → hazo_auth}/validate_reset_token/route.ts +3 -0
  17. package/src/app/api/{auth → hazo_auth}/verify_email/route.ts +3 -0
  18. package/src/app/globals.css +1 -1
  19. package/src/app/hazo_auth/user_management/page.tsx +14 -0
  20. package/src/app/hazo_auth/user_management/user_management_page_client.tsx +16 -0
  21. package/src/app/hazo_connect/api/sqlite/data/route.ts +7 -1
  22. package/src/app/hazo_connect/api/sqlite/schema/route.ts +14 -4
  23. package/src/app/hazo_connect/api/sqlite/tables/route.ts +14 -4
  24. package/src/app/hazo_connect/sqlite_admin/sqlite-admin-client.tsx +40 -3
  25. package/src/app/layout.tsx +1 -1
  26. package/src/app/page.tsx +4 -4
  27. package/src/components/layouts/email_verification/hooks/use_email_verification.ts +4 -4
  28. package/src/components/layouts/email_verification/index.tsx +1 -1
  29. package/src/components/layouts/forgot_password/hooks/use_forgot_password_form.ts +1 -1
  30. package/src/components/layouts/login/hooks/use_login_form.ts +2 -2
  31. package/src/components/layouts/my_settings/components/profile_picture_dialog.tsx +1 -1
  32. package/src/components/layouts/my_settings/components/profile_picture_library_tab.tsx +2 -2
  33. package/src/components/layouts/my_settings/hooks/use_my_settings.ts +5 -5
  34. package/src/components/layouts/my_settings/index.tsx +1 -1
  35. package/src/components/layouts/register/hooks/use_register_form.ts +1 -1
  36. package/src/components/layouts/reset_password/hooks/use_reset_password_form.ts +3 -3
  37. package/src/components/layouts/reset_password/index.tsx +2 -2
  38. package/src/components/layouts/shared/components/logout_button.tsx +1 -1
  39. package/src/components/layouts/shared/components/profile_pic_menu.tsx +4 -4
  40. package/src/components/layouts/shared/components/sidebar_layout_wrapper.tsx +19 -7
  41. package/src/components/layouts/shared/components/unauthorized_guard.tsx +1 -1
  42. package/src/components/layouts/shared/hooks/use_auth_status.ts +1 -1
  43. package/src/components/layouts/shared/hooks/use_hazo_auth.ts +158 -0
  44. package/src/components/layouts/user_management/components/roles_matrix.tsx +607 -0
  45. package/src/components/layouts/user_management/index.tsx +1295 -0
  46. package/src/components/ui/alert-dialog.tsx +141 -0
  47. package/src/components/ui/checkbox.tsx +30 -0
  48. package/src/components/ui/table.tsx +120 -0
  49. package/src/lib/auth/auth_cache.ts +220 -0
  50. package/src/lib/auth/auth_rate_limiter.ts +121 -0
  51. package/src/lib/auth/auth_types.ts +65 -0
  52. package/src/lib/auth/hazo_get_auth.server.ts +333 -0
  53. package/src/lib/auth_utility_config.server.ts +136 -0
  54. package/src/lib/hazo_connect_setup.server.ts +2 -3
  55. package/src/lib/my_settings_config.server.ts +1 -1
  56. package/src/lib/profile_pic_menu_config.server.ts +4 -4
  57. package/src/lib/reset_password_config.server.ts +5 -5
  58. package/src/lib/services/email_service.ts +2 -2
  59. package/src/lib/services/profile_picture_remove_service.ts +1 -1
  60. package/src/lib/services/token_service.ts +2 -2
  61. package/src/lib/user_management_config.server.ts +40 -0
  62. package/src/lib/utils.ts +1 -1
  63. package/src/middleware.ts +15 -13
  64. package/src/server/types/express.d.ts +1 -0
  65. package/src/stories/project_overview.stories.tsx +1 -1
  66. package/tailwind.config.ts +1 -1
  67. /package/src/app/api/{auth → hazo_auth}/forgot_password/route.ts +0 -0
  68. /package/src/app/api/{auth → hazo_auth}/library_photos/route.ts +0 -0
  69. /package/src/app/api/{auth → hazo_auth}/login/route.ts +0 -0
  70. /package/src/app/api/{auth → hazo_auth}/me/route.ts +0 -0
  71. /package/src/app/api/{auth → hazo_auth}/profile_picture/[filename]/route.ts +0 -0
  72. /package/src/app/api/{auth → hazo_auth}/register/route.ts +0 -0
  73. /package/src/app/api/{auth → hazo_auth}/remove_profile_picture/route.ts +0 -0
  74. /package/src/app/api/{auth → hazo_auth}/resend_verification/route.ts +0 -0
  75. /package/src/app/api/{auth → hazo_auth}/reset_password/route.ts +0 -0
  76. /package/src/app/api/{auth → hazo_auth}/update_user/route.ts +0 -0
  77. /package/src/app/{forgot_password → hazo_auth/forgot_password}/forgot_password_page_client.tsx +0 -0
  78. /package/src/app/{forgot_password → hazo_auth/forgot_password}/page.tsx +0 -0
  79. /package/src/app/{login → hazo_auth/login}/login_page_client.tsx +0 -0
  80. /package/src/app/{login → hazo_auth/login}/page.tsx +0 -0
  81. /package/src/app/{my_settings → hazo_auth/my_settings}/my_settings_page_client.tsx +0 -0
  82. /package/src/app/{my_settings → hazo_auth/my_settings}/page.tsx +0 -0
  83. /package/src/app/{register → hazo_auth/register}/page.tsx +0 -0
  84. /package/src/app/{register → hazo_auth/register}/register_page_client.tsx +0 -0
  85. /package/src/app/{reset_password → hazo_auth/reset_password}/page.tsx +0 -0
  86. /package/src/app/{reset_password → hazo_auth/reset_password}/reset_password_page_client.tsx +0 -0
  87. /package/src/app/{verify_email → hazo_auth/verify_email}/page.tsx +0 -0
  88. /package/src/app/{verify_email → hazo_auth/verify_email}/verify_email_page_client.tsx +0 -0
@@ -0,0 +1,442 @@
1
+ // file_description: API route for roles management operations (list roles with permissions, create role, update role permissions)
2
+ // section: imports
3
+ import { NextRequest, NextResponse } from "next/server";
4
+ import { get_hazo_connect_instance } from "@/lib/hazo_connect_instance.server";
5
+ import { createCrudService, getSqliteAdminService } from "hazo_connect/server";
6
+ import { create_app_logger } from "@/lib/app_logger";
7
+ import { get_filename, get_line_number } from "@/lib/utils/api_route_helpers";
8
+ import { get_auth_cache } from "@/lib/auth/auth_cache";
9
+ import { get_auth_utility_config } from "@/lib/auth_utility_config.server";
10
+
11
+ // section: route_config
12
+ export const dynamic = 'force-dynamic';
13
+
14
+ // section: api_handler
15
+ /**
16
+ * GET - Fetch all roles with their permissions
17
+ */
18
+ export async function GET(request: NextRequest) {
19
+ const logger = create_app_logger();
20
+
21
+ try {
22
+ const hazoConnect = get_hazo_connect_instance();
23
+ const roles_service = createCrudService(hazoConnect, "hazo_roles");
24
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
25
+ const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
26
+
27
+ // Fetch all roles (empty object means no filter - get all records)
28
+ const roles = await roles_service.findBy({});
29
+ const permissions = await permissions_service.findBy({});
30
+ const role_permissions = await role_permissions_service.findBy({});
31
+
32
+ if (!Array.isArray(roles) || !Array.isArray(permissions) || !Array.isArray(role_permissions)) {
33
+ return NextResponse.json(
34
+ { error: "Failed to fetch roles data" },
35
+ { status: 500 }
36
+ );
37
+ }
38
+
39
+ // Build role-permission mapping
40
+ const role_permission_map: Record<number, number[]> = {};
41
+ role_permissions.forEach((rp) => {
42
+ const role_id = rp.role_id as number;
43
+ const permission_id = rp.permission_id as number;
44
+ if (!role_permission_map[role_id]) {
45
+ role_permission_map[role_id] = [];
46
+ }
47
+ role_permission_map[role_id].push(permission_id);
48
+ });
49
+
50
+ // Build permission name map
51
+ const permission_name_map: Record<number, string> = {};
52
+ permissions.forEach((perm) => {
53
+ permission_name_map[perm.id as number] = perm.permission_name as string;
54
+ });
55
+
56
+ // Format response
57
+ const roles_with_permissions = roles.map((role) => {
58
+ const role_id = role.id as number;
59
+ const permission_ids = role_permission_map[role_id] || [];
60
+ const permission_names = permission_ids.map((pid) => permission_name_map[pid]).filter(Boolean);
61
+
62
+ return {
63
+ role_id: role.id,
64
+ role_name: role.role_name,
65
+ permissions: permission_names,
66
+ };
67
+ });
68
+
69
+ logger.info("user_management_roles_fetched", {
70
+ filename: get_filename(),
71
+ line_number: get_line_number(),
72
+ role_count: roles.length,
73
+ permission_count: permissions.length,
74
+ });
75
+
76
+ return NextResponse.json(
77
+ {
78
+ success: true,
79
+ roles: roles_with_permissions,
80
+ permissions: permissions.map((p) => ({
81
+ id: p.id,
82
+ permission_name: p.permission_name,
83
+ })),
84
+ },
85
+ { status: 200 }
86
+ );
87
+ } catch (error) {
88
+ const error_message = error instanceof Error ? error.message : "Unknown error";
89
+ const error_stack = error instanceof Error ? error.stack : undefined;
90
+
91
+ logger.error("user_management_roles_fetch_error", {
92
+ filename: get_filename(),
93
+ line_number: get_line_number(),
94
+ error_message,
95
+ error_stack,
96
+ });
97
+
98
+ return NextResponse.json(
99
+ { error: "Failed to fetch roles" },
100
+ { status: 500 }
101
+ );
102
+ }
103
+ }
104
+
105
+ /**
106
+ * POST - Create new role
107
+ */
108
+ export async function POST(request: NextRequest) {
109
+ const logger = create_app_logger();
110
+
111
+ try {
112
+ const body = await request.json();
113
+ const { role_name } = body;
114
+
115
+ if (!role_name || typeof role_name !== "string" || role_name.trim().length === 0) {
116
+ return NextResponse.json(
117
+ { error: "role_name is required and must be a non-empty string" },
118
+ { status: 400 }
119
+ );
120
+ }
121
+
122
+ const hazoConnect = get_hazo_connect_instance();
123
+ const roles_service = createCrudService(hazoConnect, "hazo_roles");
124
+
125
+ // Check if role already exists
126
+ const existing_roles = await roles_service.findBy({
127
+ role_name: role_name.trim(),
128
+ });
129
+
130
+ if (Array.isArray(existing_roles) && existing_roles.length > 0) {
131
+ return NextResponse.json(
132
+ { error: "Role with this name already exists" },
133
+ { status: 409 }
134
+ );
135
+ }
136
+
137
+ // Create new role
138
+ const now = new Date().toISOString();
139
+ const new_role_result = await roles_service.insert({
140
+ role_name: role_name.trim(),
141
+ created_at: now,
142
+ changed_at: now,
143
+ });
144
+
145
+ // insert() returns an array, get the first element
146
+ if (!Array.isArray(new_role_result) || new_role_result.length === 0) {
147
+ return NextResponse.json(
148
+ { error: "Failed to create role - no record returned" },
149
+ { status: 500 }
150
+ );
151
+ }
152
+
153
+ const new_role = new_role_result[0] as { id: number; role_name: string };
154
+
155
+ logger.info("user_management_role_created", {
156
+ filename: get_filename(),
157
+ line_number: get_line_number(),
158
+ role_id: new_role.id,
159
+ role_name: role_name.trim(),
160
+ });
161
+
162
+ return NextResponse.json(
163
+ {
164
+ success: true,
165
+ role: {
166
+ role_id: new_role.id,
167
+ role_name: role_name.trim(),
168
+ },
169
+ },
170
+ { status: 201 }
171
+ );
172
+ } catch (error) {
173
+ const error_message = error instanceof Error ? error.message : "Unknown error";
174
+ const error_stack = error instanceof Error ? error.stack : undefined;
175
+
176
+ logger.error("user_management_role_create_error", {
177
+ filename: get_filename(),
178
+ line_number: get_line_number(),
179
+ error_message,
180
+ error_stack,
181
+ });
182
+
183
+ return NextResponse.json(
184
+ { error: "Failed to create role" },
185
+ { status: 500 }
186
+ );
187
+ }
188
+ }
189
+
190
+ /**
191
+ * PUT - Update role permissions (save role-permission matrix)
192
+ */
193
+ export async function PUT(request: NextRequest) {
194
+ const logger = create_app_logger();
195
+
196
+ try {
197
+ const body = await request.json();
198
+ const { roles } = body;
199
+
200
+ if (!Array.isArray(roles)) {
201
+ return NextResponse.json(
202
+ { error: "roles array is required" },
203
+ { status: 400 }
204
+ );
205
+ }
206
+
207
+ const hazoConnect = get_hazo_connect_instance();
208
+ const roles_service = createCrudService(hazoConnect, "hazo_roles");
209
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
210
+ const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
211
+
212
+ // Get all permissions to build name-to-id map (empty object means no filter - get all records)
213
+ const all_permissions = await permissions_service.findBy({});
214
+ if (!Array.isArray(all_permissions)) {
215
+ return NextResponse.json(
216
+ { error: "Failed to fetch permissions" },
217
+ { status: 500 }
218
+ );
219
+ }
220
+
221
+ const permission_name_to_id: Record<string, number> = {};
222
+ all_permissions.forEach((perm) => {
223
+ permission_name_to_id[perm.permission_name as string] = perm.id as number;
224
+ });
225
+
226
+ const now = new Date().toISOString();
227
+ const modified_role_ids: number[] = []; // Track all role IDs that were modified
228
+
229
+ // Process each role
230
+ for (const role_data of roles) {
231
+ const { role_id, role_name, permissions } = role_data;
232
+
233
+ if (!role_name || !Array.isArray(permissions)) {
234
+ continue; // Skip invalid entries
235
+ }
236
+
237
+ let current_role_id: number | undefined;
238
+
239
+ if (role_id) {
240
+ // Update existing role
241
+ current_role_id = role_id;
242
+ await roles_service.updateById(role_id, {
243
+ role_name: role_name.trim(),
244
+ changed_at: now,
245
+ });
246
+ } else {
247
+ // Create new role
248
+ const existing_roles = await roles_service.findBy({
249
+ role_name: role_name.trim(),
250
+ });
251
+
252
+ if (Array.isArray(existing_roles) && existing_roles.length > 0) {
253
+ current_role_id = existing_roles[0].id as number;
254
+ } else {
255
+ const new_role = await roles_service.insert({
256
+ role_name: role_name.trim(),
257
+ created_at: now,
258
+ changed_at: now,
259
+ });
260
+
261
+ // Handle both single object and array responses from insert
262
+ if (Array.isArray(new_role) && new_role.length > 0) {
263
+ current_role_id = (new_role[0] as { id: number }).id;
264
+ } else if (!Array.isArray(new_role) && (new_role as { id?: number }).id !== undefined) {
265
+ current_role_id = (new_role as { id: number }).id;
266
+ } else {
267
+ // If insert didn't return an id, try to find the role by name
268
+ const inserted_roles = await roles_service.findBy({
269
+ role_name: role_name.trim(),
270
+ });
271
+ if (Array.isArray(inserted_roles) && inserted_roles.length > 0) {
272
+ current_role_id = inserted_roles[0].id as number;
273
+ }
274
+ }
275
+ }
276
+ }
277
+
278
+ // Skip if we couldn't determine the role ID
279
+ if (!current_role_id) {
280
+ logger.warn("user_management_role_id_not_found", {
281
+ filename: get_filename(),
282
+ line_number: get_line_number(),
283
+ role_name: role_name.trim(),
284
+ role_id,
285
+ });
286
+ continue;
287
+ }
288
+
289
+ // Track this role ID for cache invalidation
290
+ modified_role_ids.push(current_role_id);
291
+
292
+ // Get current role-permission mappings
293
+ const current_mappings = await role_permissions_service.findBy({
294
+ role_id: current_role_id,
295
+ });
296
+
297
+ const current_permission_ids = Array.isArray(current_mappings)
298
+ ? current_mappings.map((m) => m.permission_id as number)
299
+ : [];
300
+
301
+ // Get target permission IDs
302
+ const target_permission_ids = permissions
303
+ .map((perm_name: string) => permission_name_to_id[perm_name])
304
+ .filter((id: number | undefined) => id !== undefined);
305
+
306
+ // Delete removed permissions
307
+ // Note: hazo_role_permissions is a junction table without an id column
308
+ // We need to use SQLite admin service to delete by composite key (role_id, permission_id)
309
+ const to_delete = current_permission_ids.filter(
310
+ (id) => !target_permission_ids.includes(id)
311
+ );
312
+
313
+ if (to_delete.length > 0) {
314
+ try {
315
+ const admin_service = getSqliteAdminService();
316
+
317
+ for (const perm_id of to_delete) {
318
+ // Delete using SQLite admin service with criteria (role_id and permission_id)
319
+ await admin_service.deleteRows("hazo_role_permissions", {
320
+ role_id: current_role_id,
321
+ permission_id: perm_id,
322
+ });
323
+ }
324
+ } catch (adminError) {
325
+ // Fallback: try using createCrudService deleteById if rowid exists
326
+ // SQLite tables have a hidden rowid column that can be used
327
+ const error_message = adminError instanceof Error ? adminError.message : "Unknown error";
328
+ logger.warn("user_management_role_permission_delete_admin_failed", {
329
+ filename: get_filename(),
330
+ line_number: get_line_number(),
331
+ error: error_message,
332
+ note: "Trying fallback method",
333
+ });
334
+
335
+ // Fallback: try to find and delete using rowid if available
336
+ for (const perm_id of to_delete) {
337
+ const mappings_to_delete = await role_permissions_service.findBy({
338
+ role_id: current_role_id,
339
+ permission_id: perm_id,
340
+ });
341
+
342
+ if (Array.isArray(mappings_to_delete) && mappings_to_delete.length > 0) {
343
+ for (const mapping of mappings_to_delete) {
344
+ // Try deleteById with rowid (SQLite has hidden rowid)
345
+ try {
346
+ // Check if mapping has an id field (could be rowid)
347
+ if ((mapping as { id?: number; rowid?: number }).id !== undefined) {
348
+ await role_permissions_service.deleteById((mapping as { id: number }).id);
349
+ } else if ((mapping as { rowid?: number }).rowid !== undefined) {
350
+ await role_permissions_service.deleteById((mapping as { rowid: number }).rowid);
351
+ } else {
352
+ // Last resort: log error
353
+ logger.error("user_management_role_permission_delete_no_id", {
354
+ filename: get_filename(),
355
+ line_number: get_line_number(),
356
+ role_id: current_role_id,
357
+ permission_id: perm_id,
358
+ mapping,
359
+ });
360
+ }
361
+ } catch (deleteError) {
362
+ const delete_error_message = deleteError instanceof Error ? deleteError.message : "Unknown error";
363
+ logger.error("user_management_role_permission_delete_failed", {
364
+ filename: get_filename(),
365
+ line_number: get_line_number(),
366
+ role_id: current_role_id,
367
+ permission_id: perm_id,
368
+ error: delete_error_message,
369
+ });
370
+ }
371
+ }
372
+ }
373
+ }
374
+ }
375
+ }
376
+
377
+ // Add new permissions
378
+ const to_add = target_permission_ids.filter(
379
+ (id) => !current_permission_ids.includes(id)
380
+ );
381
+ for (const perm_id of to_add) {
382
+ await role_permissions_service.insert({
383
+ role_id: current_role_id,
384
+ permission_id: perm_id,
385
+ created_at: now,
386
+ changed_at: now,
387
+ });
388
+ }
389
+ }
390
+
391
+ // Invalidate cache for all affected roles
392
+ try {
393
+ const config = get_auth_utility_config();
394
+ const cache = get_auth_cache(
395
+ config.cache_max_users,
396
+ config.cache_ttl_minutes,
397
+ config.cache_max_age_minutes,
398
+ );
399
+
400
+ // Invalidate by all role IDs that were modified (including newly created ones)
401
+ if (modified_role_ids.length > 0) {
402
+ cache.invalidate_by_roles(modified_role_ids);
403
+ }
404
+ } catch (cache_error) {
405
+ // Log but don't fail role update if cache invalidation fails
406
+ const cache_error_message =
407
+ cache_error instanceof Error ? cache_error.message : "Unknown error";
408
+ logger.warn("user_management_roles_cache_invalidation_failed", {
409
+ filename: get_filename(),
410
+ line_number: get_line_number(),
411
+ error: cache_error_message,
412
+ });
413
+ }
414
+
415
+ logger.info("user_management_roles_updated", {
416
+ filename: get_filename(),
417
+ line_number: get_line_number(),
418
+ role_count: roles.length,
419
+ });
420
+
421
+ return NextResponse.json(
422
+ { success: true },
423
+ { status: 200 }
424
+ );
425
+ } catch (error) {
426
+ const error_message = error instanceof Error ? error.message : "Unknown error";
427
+ const error_stack = error instanceof Error ? error.stack : undefined;
428
+
429
+ logger.error("user_management_roles_update_error", {
430
+ filename: get_filename(),
431
+ line_number: get_line_number(),
432
+ error_message,
433
+ error_stack,
434
+ });
435
+
436
+ return NextResponse.json(
437
+ { error: "Failed to update roles" },
438
+ { status: 500 }
439
+ );
440
+ }
441
+ }
442
+