hazo_auth 1.6.4 → 1.6.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +46 -1
- package/SETUP_CHECKLIST.md +70 -4
- package/dist/app/api/hazo_auth/user_management/permissions/route.d.ts +50 -0
- package/dist/app/api/hazo_auth/user_management/permissions/route.d.ts.map +1 -0
- package/dist/app/api/hazo_auth/user_management/permissions/route.js +257 -0
- package/dist/app/api/hazo_auth/user_management/roles/route.d.ts +40 -0
- package/dist/app/api/hazo_auth/user_management/roles/route.d.ts.map +1 -0
- package/dist/app/api/hazo_auth/user_management/roles/route.js +352 -0
- package/dist/app/api/hazo_auth/user_management/users/roles/route.d.ts +37 -0
- package/dist/app/api/hazo_auth/user_management/users/roles/route.d.ts.map +1 -0
- package/dist/app/api/hazo_auth/user_management/users/roles/route.js +276 -0
- package/dist/app/api/hazo_auth/user_management/users/route.d.ts +39 -0
- package/dist/app/api/hazo_auth/user_management/users/route.d.ts.map +1 -0
- package/dist/app/api/hazo_auth/user_management/users/route.js +170 -0
- package/dist/cli/generate.d.ts.map +1 -1
- package/dist/cli/generate.js +38 -5
- package/dist/cli/validate.d.ts.map +1 -1
- package/dist/cli/validate.js +14 -0
- package/dist/server/routes/index.d.ts +4 -0
- package/dist/server/routes/index.d.ts.map +1 -1
- package/dist/server/routes/index.js +5 -0
- package/dist/server/routes/user_management_permissions.d.ts +2 -0
- package/dist/server/routes/user_management_permissions.d.ts.map +1 -0
- package/dist/server/routes/user_management_permissions.js +2 -0
- package/dist/server/routes/user_management_roles.d.ts +2 -0
- package/dist/server/routes/user_management_roles.d.ts.map +1 -0
- package/dist/server/routes/user_management_roles.js +2 -0
- package/dist/server/routes/user_management_users.d.ts +2 -0
- package/dist/server/routes/user_management_users.d.ts.map +1 -0
- package/dist/server/routes/user_management_users.js +2 -0
- package/dist/server/routes/user_management_users_roles.d.ts +2 -0
- package/dist/server/routes/user_management_users_roles.d.ts.map +1 -0
- package/dist/server/routes/user_management_users_roles.js +2 -0
- package/hazo_auth_config.example.ini +1 -1
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -648,7 +648,52 @@ export default async function LoginPage() {
|
|
|
648
648
|
- `ResetPasswordLayout` - Set new password with token
|
|
649
649
|
- `EmailVerificationLayout` - Verify email address
|
|
650
650
|
- `MySettingsLayout` - User profile and settings
|
|
651
|
-
- `UserManagementLayout` - Admin user/role management
|
|
651
|
+
- `UserManagementLayout` - Admin user/role management (requires user_management API routes)
|
|
652
|
+
|
|
653
|
+
### User Management Component
|
|
654
|
+
|
|
655
|
+
The `UserManagementLayout` component provides a comprehensive admin interface for managing users, roles, and permissions. It requires the user_management API routes to be set up in your project.
|
|
656
|
+
|
|
657
|
+
**Required Permissions:**
|
|
658
|
+
- `admin_user_management` - Access to Users tab
|
|
659
|
+
- `admin_role_management` - Access to Roles tab
|
|
660
|
+
- `admin_permission_management` - Access to Permissions tab
|
|
661
|
+
|
|
662
|
+
**Required API Routes:**
|
|
663
|
+
The `UserManagementLayout` component requires the following API routes to be created in your project:
|
|
664
|
+
|
|
665
|
+
```typescript
|
|
666
|
+
// app/api/hazo_auth/user_management/users/route.ts
|
|
667
|
+
export { GET, PATCH, POST } from "hazo_auth/server/routes";
|
|
668
|
+
|
|
669
|
+
// app/api/hazo_auth/user_management/permissions/route.ts
|
|
670
|
+
export { GET, POST, PUT, DELETE } from "hazo_auth/server/routes";
|
|
671
|
+
|
|
672
|
+
// app/api/hazo_auth/user_management/roles/route.ts
|
|
673
|
+
export { GET, POST, PUT } from "hazo_auth/server/routes";
|
|
674
|
+
|
|
675
|
+
// app/api/hazo_auth/user_management/users/roles/route.ts
|
|
676
|
+
export { GET, POST, PUT } from "hazo_auth/server/routes";
|
|
677
|
+
```
|
|
678
|
+
|
|
679
|
+
**Note:** These routes are automatically created when you run `npx hazo_auth generate-routes`. The routes handle:
|
|
680
|
+
- **Users:** List users, deactivate users, send password reset emails
|
|
681
|
+
- **Permissions:** List permissions (from DB and config), migrate config permissions to DB, create/update/delete permissions
|
|
682
|
+
- **Roles:** List roles with permissions, create roles, update role-permission assignments
|
|
683
|
+
- **User Roles:** Get user roles, assign roles to users, bulk update user role assignments
|
|
684
|
+
|
|
685
|
+
**Example Usage:**
|
|
686
|
+
|
|
687
|
+
```tsx
|
|
688
|
+
// app/hazo_auth/user_management/page.tsx
|
|
689
|
+
import { UserManagementLayout } from "hazo_auth/components/layouts/user_management";
|
|
690
|
+
|
|
691
|
+
export default function UserManagementPage() {
|
|
692
|
+
return <UserManagementLayout />;
|
|
693
|
+
}
|
|
694
|
+
```
|
|
695
|
+
|
|
696
|
+
The component automatically shows/hides tabs based on the user's permissions, so users will only see the tabs they have access to.
|
|
652
697
|
|
|
653
698
|
**Shared Components:**
|
|
654
699
|
- `ProfilePicMenu` / `ProfilePicMenuWrapper` - Navbar profile menu
|
package/SETUP_CHECKLIST.md
CHANGED
|
@@ -392,6 +392,41 @@ SELECT table_name FROM information_schema.tables WHERE table_name LIKE 'hazo_%';
|
|
|
392
392
|
|
|
393
393
|
---
|
|
394
394
|
|
|
395
|
+
## Phase 3.1: Configure Default Permissions (Optional)
|
|
396
|
+
|
|
397
|
+
The `hazo_auth_config.ini` file includes default permissions that will be available in the Permissions tab. These defaults are already configured when you run `npx hazo_auth init`.
|
|
398
|
+
|
|
399
|
+
**Default permissions included:**
|
|
400
|
+
- `admin_user_management`
|
|
401
|
+
- `admin_role_management`
|
|
402
|
+
- `admin_permission_management`
|
|
403
|
+
|
|
404
|
+
**To customize permissions:**
|
|
405
|
+
|
|
406
|
+
Edit `hazo_auth_config.ini`:
|
|
407
|
+
```ini
|
|
408
|
+
[hazo_auth__user_management]
|
|
409
|
+
application_permission_list_defaults = admin_user_management,admin_role_management,admin_permission_management
|
|
410
|
+
```
|
|
411
|
+
|
|
412
|
+
**To initialize permissions and create a super user:**
|
|
413
|
+
|
|
414
|
+
After setting up your database and configuring permissions, you can run:
|
|
415
|
+
```bash
|
|
416
|
+
npm run init-users
|
|
417
|
+
```
|
|
418
|
+
|
|
419
|
+
This script will:
|
|
420
|
+
1. Create all permissions from `application_permission_list_defaults`
|
|
421
|
+
2. Create a `default_super_user_role` role with all permissions
|
|
422
|
+
3. Assign the role to the user specified in `default_super_user_email` (configure in `[hazo_auth__initial_setup]` section)
|
|
423
|
+
|
|
424
|
+
**Checklist:**
|
|
425
|
+
- [ ] Default permissions configured in `hazo_auth_config.ini` (already set by default)
|
|
426
|
+
- [ ] `default_super_user_email` configured if you want to use `init-users` script
|
|
427
|
+
|
|
428
|
+
---
|
|
429
|
+
|
|
395
430
|
## Phase 4: API Routes
|
|
396
431
|
|
|
397
432
|
Create API route files in your project. Each file re-exports handlers from hazo_auth.
|
|
@@ -427,8 +462,14 @@ app/api/hazo_auth/
|
|
|
427
462
|
├── library_photos/route.ts
|
|
428
463
|
├── get_auth/route.ts
|
|
429
464
|
├── validate_reset_token/route.ts
|
|
430
|
-
|
|
431
|
-
|
|
465
|
+
├── profile_picture/
|
|
466
|
+
│ └── [filename]/route.ts
|
|
467
|
+
└── user_management/
|
|
468
|
+
├── users/route.ts
|
|
469
|
+
├── permissions/route.ts
|
|
470
|
+
├── roles/route.ts
|
|
471
|
+
└── users/
|
|
472
|
+
└── roles/route.ts
|
|
432
473
|
```
|
|
433
474
|
|
|
434
475
|
**Example route file content:**
|
|
@@ -513,9 +554,34 @@ export { POST } from "hazo_auth/server/routes/validate_reset_token";
|
|
|
513
554
|
export { GET } from "hazo_auth/server/routes/profile_picture_filename";
|
|
514
555
|
```
|
|
515
556
|
|
|
557
|
+
**User Management routes (optional - required if using UserManagementLayout):**
|
|
558
|
+
|
|
559
|
+
`app/api/hazo_auth/user_management/users/route.ts`:
|
|
560
|
+
```typescript
|
|
561
|
+
export { GET, PATCH, POST } from "hazo_auth/server/routes";
|
|
562
|
+
```
|
|
563
|
+
|
|
564
|
+
`app/api/hazo_auth/user_management/permissions/route.ts`:
|
|
565
|
+
```typescript
|
|
566
|
+
export { GET, POST, PUT, DELETE } from "hazo_auth/server/routes";
|
|
567
|
+
```
|
|
568
|
+
|
|
569
|
+
`app/api/hazo_auth/user_management/roles/route.ts`:
|
|
570
|
+
```typescript
|
|
571
|
+
export { GET, POST, PUT } from "hazo_auth/server/routes";
|
|
572
|
+
```
|
|
573
|
+
|
|
574
|
+
`app/api/hazo_auth/user_management/users/roles/route.ts`:
|
|
575
|
+
```typescript
|
|
576
|
+
export { GET, POST, PUT } from "hazo_auth/server/routes";
|
|
577
|
+
```
|
|
578
|
+
|
|
579
|
+
**Note:** The `generate-routes` command automatically creates all user_management routes. These routes are required if you plan to use the `UserManagementLayout` component for managing users, roles, and permissions.
|
|
580
|
+
|
|
516
581
|
**Checklist:**
|
|
517
|
-
- [ ] All 16 API route files created
|
|
518
|
-
- [ ]
|
|
582
|
+
- [ ] All 16 core API route files created
|
|
583
|
+
- [ ] User management routes created (if using UserManagementLayout)
|
|
584
|
+
- [ ] Each file exports the correct HTTP method (POST, GET, PATCH, DELETE, PUT)
|
|
519
585
|
|
|
520
586
|
---
|
|
521
587
|
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
import { NextRequest, NextResponse } from "next/server";
|
|
2
|
+
export declare const dynamic = "force-dynamic";
|
|
3
|
+
/**
|
|
4
|
+
* GET - Fetch all permissions from database and config
|
|
5
|
+
*/
|
|
6
|
+
export declare function GET(request: NextRequest): Promise<NextResponse<{
|
|
7
|
+
error: string;
|
|
8
|
+
}> | NextResponse<{
|
|
9
|
+
success: boolean;
|
|
10
|
+
db_permissions: {
|
|
11
|
+
id: unknown;
|
|
12
|
+
permission_name: unknown;
|
|
13
|
+
description: {};
|
|
14
|
+
}[];
|
|
15
|
+
config_permissions: string[];
|
|
16
|
+
}>>;
|
|
17
|
+
/**
|
|
18
|
+
* POST - Create new permission or migrate config permissions to database
|
|
19
|
+
*/
|
|
20
|
+
export declare function POST(request: NextRequest): Promise<NextResponse<{
|
|
21
|
+
success: boolean;
|
|
22
|
+
created: string[];
|
|
23
|
+
skipped: string[];
|
|
24
|
+
}> | NextResponse<{
|
|
25
|
+
error: string;
|
|
26
|
+
}> | NextResponse<{
|
|
27
|
+
success: boolean;
|
|
28
|
+
permission: {
|
|
29
|
+
id: number;
|
|
30
|
+
permission_name: string;
|
|
31
|
+
description: any;
|
|
32
|
+
};
|
|
33
|
+
}>>;
|
|
34
|
+
/**
|
|
35
|
+
* PUT - Update permission description
|
|
36
|
+
*/
|
|
37
|
+
export declare function PUT(request: NextRequest): Promise<NextResponse<{
|
|
38
|
+
error: string;
|
|
39
|
+
}> | NextResponse<{
|
|
40
|
+
success: boolean;
|
|
41
|
+
}>>;
|
|
42
|
+
/**
|
|
43
|
+
* DELETE - Delete permission from database
|
|
44
|
+
*/
|
|
45
|
+
export declare function DELETE(request: NextRequest): Promise<NextResponse<{
|
|
46
|
+
error: string;
|
|
47
|
+
}> | NextResponse<{
|
|
48
|
+
success: boolean;
|
|
49
|
+
}>>;
|
|
50
|
+
//# sourceMappingURL=route.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"route.d.ts","sourceRoot":"","sources":["../../../../../../src/app/api/hazo_auth/user_management/permissions/route.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAQxD,eAAO,MAAM,OAAO,kBAAkB,CAAC;AAGvC;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;IAgE7C;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;;;;IAyJ9C;AAED;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;IAkD7C;AAED;;GAEG;AACH,wBAAsB,MAAM,CAAC,OAAO,EAAE,WAAW;;;;IAmEhD"}
|
|
@@ -0,0 +1,257 @@
|
|
|
1
|
+
// file_description: API route for permissions management operations (list, migrate from config, update, delete)
|
|
2
|
+
// section: imports
|
|
3
|
+
import { NextResponse } from "next/server";
|
|
4
|
+
import { get_hazo_connect_instance } from "../../../../../lib/hazo_connect_instance.server";
|
|
5
|
+
import { createCrudService } from "hazo_connect/server";
|
|
6
|
+
import { create_app_logger } from "../../../../../lib/app_logger";
|
|
7
|
+
import { get_filename, get_line_number } from "../../../../../lib/utils/api_route_helpers";
|
|
8
|
+
import { get_user_management_config } from "../../../../../lib/user_management_config.server";
|
|
9
|
+
// section: route_config
|
|
10
|
+
export const dynamic = 'force-dynamic';
|
|
11
|
+
// section: api_handler
|
|
12
|
+
/**
|
|
13
|
+
* GET - Fetch all permissions from database and config
|
|
14
|
+
*/
|
|
15
|
+
export async function GET(request) {
|
|
16
|
+
const logger = create_app_logger();
|
|
17
|
+
try {
|
|
18
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
19
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
20
|
+
// Fetch all permissions from database (empty object means no filter - get all records)
|
|
21
|
+
const db_permissions = await permissions_service.findBy({});
|
|
22
|
+
if (!Array.isArray(db_permissions)) {
|
|
23
|
+
return NextResponse.json({ error: "Failed to fetch permissions" }, { status: 500 });
|
|
24
|
+
}
|
|
25
|
+
// Get config permissions
|
|
26
|
+
const config = get_user_management_config();
|
|
27
|
+
const config_permission_names = config.application_permission_list_defaults || [];
|
|
28
|
+
// Get DB permission names
|
|
29
|
+
const db_permission_names = db_permissions.map((p) => p.permission_name);
|
|
30
|
+
// Find config permissions not in DB
|
|
31
|
+
const config_only_permissions = config_permission_names.filter((name) => !db_permission_names.includes(name));
|
|
32
|
+
logger.info("user_management_permissions_fetched", {
|
|
33
|
+
filename: get_filename(),
|
|
34
|
+
line_number: get_line_number(),
|
|
35
|
+
db_count: db_permissions.length,
|
|
36
|
+
config_count: config_permission_names.length,
|
|
37
|
+
});
|
|
38
|
+
return NextResponse.json({
|
|
39
|
+
success: true,
|
|
40
|
+
db_permissions: db_permissions.map((p) => ({
|
|
41
|
+
id: p.id,
|
|
42
|
+
permission_name: p.permission_name,
|
|
43
|
+
description: p.description || "",
|
|
44
|
+
})),
|
|
45
|
+
config_permissions: config_only_permissions,
|
|
46
|
+
}, { status: 200 });
|
|
47
|
+
}
|
|
48
|
+
catch (error) {
|
|
49
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
50
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
51
|
+
logger.error("user_management_permissions_fetch_error", {
|
|
52
|
+
filename: get_filename(),
|
|
53
|
+
line_number: get_line_number(),
|
|
54
|
+
error_message,
|
|
55
|
+
error_stack,
|
|
56
|
+
});
|
|
57
|
+
return NextResponse.json({ error: "Failed to fetch permissions" }, { status: 500 });
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
/**
|
|
61
|
+
* POST - Create new permission or migrate config permissions to database
|
|
62
|
+
*/
|
|
63
|
+
export async function POST(request) {
|
|
64
|
+
const logger = create_app_logger();
|
|
65
|
+
try {
|
|
66
|
+
const { searchParams } = new URL(request.url);
|
|
67
|
+
const action = searchParams.get("action");
|
|
68
|
+
// Handle migrate action
|
|
69
|
+
if (action === "migrate") {
|
|
70
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
71
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
72
|
+
// Get config permissions
|
|
73
|
+
const config = get_user_management_config();
|
|
74
|
+
const config_permission_names = config.application_permission_list_defaults || [];
|
|
75
|
+
if (config_permission_names.length === 0) {
|
|
76
|
+
return NextResponse.json({
|
|
77
|
+
success: true,
|
|
78
|
+
message: "No permissions to migrate",
|
|
79
|
+
created: [],
|
|
80
|
+
skipped: [],
|
|
81
|
+
}, { status: 200 });
|
|
82
|
+
}
|
|
83
|
+
// Get existing permissions from DB (empty object means no filter - get all records)
|
|
84
|
+
const db_permissions = await permissions_service.findBy({});
|
|
85
|
+
const db_permission_names = Array.isArray(db_permissions)
|
|
86
|
+
? db_permissions.map((p) => p.permission_name)
|
|
87
|
+
: [];
|
|
88
|
+
const now = new Date().toISOString();
|
|
89
|
+
const created = [];
|
|
90
|
+
const skipped = [];
|
|
91
|
+
// Migrate each config permission
|
|
92
|
+
for (const permission_name of config_permission_names) {
|
|
93
|
+
if (db_permission_names.includes(permission_name)) {
|
|
94
|
+
// Skip if already exists
|
|
95
|
+
skipped.push(permission_name);
|
|
96
|
+
continue;
|
|
97
|
+
}
|
|
98
|
+
// Create new permission
|
|
99
|
+
await permissions_service.insert({
|
|
100
|
+
permission_name: permission_name.trim(),
|
|
101
|
+
description: "",
|
|
102
|
+
created_at: now,
|
|
103
|
+
changed_at: now,
|
|
104
|
+
});
|
|
105
|
+
created.push(permission_name);
|
|
106
|
+
}
|
|
107
|
+
logger.info("user_management_permissions_migrated", {
|
|
108
|
+
filename: get_filename(),
|
|
109
|
+
line_number: get_line_number(),
|
|
110
|
+
created_count: created.length,
|
|
111
|
+
skipped_count: skipped.length,
|
|
112
|
+
});
|
|
113
|
+
return NextResponse.json({
|
|
114
|
+
success: true,
|
|
115
|
+
created,
|
|
116
|
+
skipped,
|
|
117
|
+
}, { status: 200 });
|
|
118
|
+
}
|
|
119
|
+
// Handle create new permission
|
|
120
|
+
const body = await request.json();
|
|
121
|
+
const { permission_name, description } = body;
|
|
122
|
+
if (!permission_name || typeof permission_name !== "string" || permission_name.trim().length === 0) {
|
|
123
|
+
return NextResponse.json({ error: "permission_name is required and must be a non-empty string" }, { status: 400 });
|
|
124
|
+
}
|
|
125
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
126
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
127
|
+
// Check if permission already exists
|
|
128
|
+
const existing_permissions = await permissions_service.findBy({
|
|
129
|
+
permission_name: permission_name.trim(),
|
|
130
|
+
});
|
|
131
|
+
if (Array.isArray(existing_permissions) && existing_permissions.length > 0) {
|
|
132
|
+
return NextResponse.json({ error: "Permission with this name already exists" }, { status: 409 });
|
|
133
|
+
}
|
|
134
|
+
// Create new permission
|
|
135
|
+
const now = new Date().toISOString();
|
|
136
|
+
const new_permission_result = await permissions_service.insert({
|
|
137
|
+
permission_name: permission_name.trim(),
|
|
138
|
+
description: (description || "").trim(),
|
|
139
|
+
created_at: now,
|
|
140
|
+
changed_at: now,
|
|
141
|
+
});
|
|
142
|
+
// insert() returns an array, get the first element
|
|
143
|
+
if (!Array.isArray(new_permission_result) || new_permission_result.length === 0) {
|
|
144
|
+
return NextResponse.json({ error: "Failed to create permission - no record returned" }, { status: 500 });
|
|
145
|
+
}
|
|
146
|
+
const new_permission = new_permission_result[0];
|
|
147
|
+
logger.info("user_management_permission_created", {
|
|
148
|
+
filename: get_filename(),
|
|
149
|
+
line_number: get_line_number(),
|
|
150
|
+
permission_id: new_permission.id,
|
|
151
|
+
permission_name: permission_name.trim(),
|
|
152
|
+
});
|
|
153
|
+
return NextResponse.json({
|
|
154
|
+
success: true,
|
|
155
|
+
permission: {
|
|
156
|
+
id: new_permission.id,
|
|
157
|
+
permission_name: permission_name.trim(),
|
|
158
|
+
description: (description || "").trim(),
|
|
159
|
+
},
|
|
160
|
+
}, { status: 201 });
|
|
161
|
+
}
|
|
162
|
+
catch (error) {
|
|
163
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
164
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
165
|
+
logger.error("user_management_permissions_post_error", {
|
|
166
|
+
filename: get_filename(),
|
|
167
|
+
line_number: get_line_number(),
|
|
168
|
+
error_message,
|
|
169
|
+
error_stack,
|
|
170
|
+
});
|
|
171
|
+
return NextResponse.json({ error: "Failed to create permission" }, { status: 500 });
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
/**
|
|
175
|
+
* PUT - Update permission description
|
|
176
|
+
*/
|
|
177
|
+
export async function PUT(request) {
|
|
178
|
+
const logger = create_app_logger();
|
|
179
|
+
try {
|
|
180
|
+
const body = await request.json();
|
|
181
|
+
const { permission_id, description } = body;
|
|
182
|
+
if (!permission_id || typeof description !== "string") {
|
|
183
|
+
return NextResponse.json({ error: "permission_id and description are required" }, { status: 400 });
|
|
184
|
+
}
|
|
185
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
186
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
187
|
+
// Update permission with changed_at timestamp
|
|
188
|
+
const now = new Date().toISOString();
|
|
189
|
+
await permissions_service.updateById(permission_id, {
|
|
190
|
+
description: description.trim(),
|
|
191
|
+
changed_at: now,
|
|
192
|
+
});
|
|
193
|
+
logger.info("user_management_permission_updated", {
|
|
194
|
+
filename: get_filename(),
|
|
195
|
+
line_number: get_line_number(),
|
|
196
|
+
permission_id,
|
|
197
|
+
});
|
|
198
|
+
return NextResponse.json({ success: true }, { status: 200 });
|
|
199
|
+
}
|
|
200
|
+
catch (error) {
|
|
201
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
202
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
203
|
+
logger.error("user_management_permission_update_error", {
|
|
204
|
+
filename: get_filename(),
|
|
205
|
+
line_number: get_line_number(),
|
|
206
|
+
error_message,
|
|
207
|
+
error_stack,
|
|
208
|
+
});
|
|
209
|
+
return NextResponse.json({ error: "Failed to update permission" }, { status: 500 });
|
|
210
|
+
}
|
|
211
|
+
}
|
|
212
|
+
/**
|
|
213
|
+
* DELETE - Delete permission from database
|
|
214
|
+
*/
|
|
215
|
+
export async function DELETE(request) {
|
|
216
|
+
const logger = create_app_logger();
|
|
217
|
+
try {
|
|
218
|
+
const { searchParams } = new URL(request.url);
|
|
219
|
+
const permission_id = searchParams.get("permission_id");
|
|
220
|
+
if (!permission_id) {
|
|
221
|
+
return NextResponse.json({ error: "permission_id is required" }, { status: 400 });
|
|
222
|
+
}
|
|
223
|
+
const permission_id_num = parseInt(permission_id, 10);
|
|
224
|
+
if (isNaN(permission_id_num)) {
|
|
225
|
+
return NextResponse.json({ error: "permission_id must be a number" }, { status: 400 });
|
|
226
|
+
}
|
|
227
|
+
const hazoConnect = get_hazo_connect_instance();
|
|
228
|
+
const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
|
|
229
|
+
const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
|
|
230
|
+
// Check if permission is used in any role
|
|
231
|
+
const role_permissions = await role_permissions_service.findBy({
|
|
232
|
+
permission_id: permission_id_num,
|
|
233
|
+
});
|
|
234
|
+
if (Array.isArray(role_permissions) && role_permissions.length > 0) {
|
|
235
|
+
return NextResponse.json({ error: "Cannot delete permission that is assigned to roles" }, { status: 409 });
|
|
236
|
+
}
|
|
237
|
+
// Delete permission
|
|
238
|
+
await permissions_service.deleteById(permission_id_num);
|
|
239
|
+
logger.info("user_management_permission_deleted", {
|
|
240
|
+
filename: get_filename(),
|
|
241
|
+
line_number: get_line_number(),
|
|
242
|
+
permission_id: permission_id_num,
|
|
243
|
+
});
|
|
244
|
+
return NextResponse.json({ success: true }, { status: 200 });
|
|
245
|
+
}
|
|
246
|
+
catch (error) {
|
|
247
|
+
const error_message = error instanceof Error ? error.message : "Unknown error";
|
|
248
|
+
const error_stack = error instanceof Error ? error.stack : undefined;
|
|
249
|
+
logger.error("user_management_permission_delete_error", {
|
|
250
|
+
filename: get_filename(),
|
|
251
|
+
line_number: get_line_number(),
|
|
252
|
+
error_message,
|
|
253
|
+
error_stack,
|
|
254
|
+
});
|
|
255
|
+
return NextResponse.json({ error: "Failed to delete permission" }, { status: 500 });
|
|
256
|
+
}
|
|
257
|
+
}
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
import { NextRequest, NextResponse } from "next/server";
|
|
2
|
+
export declare const dynamic = "force-dynamic";
|
|
3
|
+
/**
|
|
4
|
+
* GET - Fetch all roles with their permissions
|
|
5
|
+
*/
|
|
6
|
+
export declare function GET(request: NextRequest): Promise<NextResponse<{
|
|
7
|
+
error: string;
|
|
8
|
+
}> | NextResponse<{
|
|
9
|
+
success: boolean;
|
|
10
|
+
roles: {
|
|
11
|
+
role_id: unknown;
|
|
12
|
+
role_name: unknown;
|
|
13
|
+
permissions: string[];
|
|
14
|
+
}[];
|
|
15
|
+
permissions: {
|
|
16
|
+
id: unknown;
|
|
17
|
+
permission_name: unknown;
|
|
18
|
+
}[];
|
|
19
|
+
}>>;
|
|
20
|
+
/**
|
|
21
|
+
* POST - Create new role
|
|
22
|
+
*/
|
|
23
|
+
export declare function POST(request: NextRequest): Promise<NextResponse<{
|
|
24
|
+
error: string;
|
|
25
|
+
}> | NextResponse<{
|
|
26
|
+
success: boolean;
|
|
27
|
+
role: {
|
|
28
|
+
role_id: number;
|
|
29
|
+
role_name: string;
|
|
30
|
+
};
|
|
31
|
+
}>>;
|
|
32
|
+
/**
|
|
33
|
+
* PUT - Update role permissions (save role-permission matrix)
|
|
34
|
+
*/
|
|
35
|
+
export declare function PUT(request: NextRequest): Promise<NextResponse<{
|
|
36
|
+
error: string;
|
|
37
|
+
}> | NextResponse<{
|
|
38
|
+
success: boolean;
|
|
39
|
+
}>>;
|
|
40
|
+
//# sourceMappingURL=route.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"route.d.ts","sourceRoot":"","sources":["../../../../../../src/app/api/hazo_auth/user_management/roles/route.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AASxD,eAAO,MAAM,OAAO,kBAAkB,CAAC;AAGvC;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;;;;IAqF7C;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,OAAO,EAAE,WAAW;;;;;;;;IAgF9C;AAED;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;IAwP7C"}
|