lapeh 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,159 @@
1
+
2
+ model cache {
3
+ key String @id @db.VarChar(255)
4
+ value String
5
+ expiration Int
6
+ }
7
+
8
+ model cache_locks {
9
+ key String @id @db.VarChar(255)
10
+ owner String @db.VarChar(255)
11
+ expiration Int
12
+ }
13
+
14
+ model failed_jobs {
15
+ id BigInt @id @default(autoincrement())
16
+ uuid String @unique(map: "failed_jobs_uuid_unique") @db.VarChar(255)
17
+ connection String
18
+ queue String
19
+ payload String
20
+ exception String
21
+ failed_at DateTime @default(now()) @db.Timestamp(0)
22
+ }
23
+
24
+ model job_batches {
25
+ id String @id @db.VarChar(255)
26
+ name String @db.VarChar(255)
27
+ total_jobs Int
28
+ pending_jobs Int
29
+ failed_jobs Int
30
+ failed_job_ids String
31
+ options String?
32
+ cancelled_at Int?
33
+ created_at Int
34
+ finished_at Int?
35
+ }
36
+
37
+ model jobs {
38
+ id BigInt @id @default(autoincrement())
39
+ queue String @db.VarChar(255)
40
+ payload String
41
+ attempts Int @db.SmallInt
42
+ reserved_at Int?
43
+ available_at Int
44
+ created_at Int
45
+
46
+ @@index([queue], map: "jobs_queue_index")
47
+ }
48
+
49
+ model migrations {
50
+ id Int @id @default(autoincrement())
51
+ migration String @db.VarChar(255)
52
+ batch Int
53
+ }
54
+
55
+ model password_reset_tokens {
56
+ email String @id @db.VarChar(255)
57
+ token String @db.VarChar(255)
58
+ created_at DateTime? @db.Timestamp(0)
59
+ }
60
+
61
+ model personal_access_tokens {
62
+ id BigInt @id @default(autoincrement())
63
+ tokenable_type String @db.VarChar(255)
64
+ tokenable_id BigInt
65
+ name String
66
+ token String @unique(map: "personal_access_tokens_token_unique") @db.VarChar(64)
67
+ abilities String?
68
+ last_used_at DateTime? @db.Timestamp(0)
69
+ expires_at DateTime? @db.Timestamp(0)
70
+ created_at DateTime? @db.Timestamp(0)
71
+ updated_at DateTime? @db.Timestamp(0)
72
+
73
+ @@index([expires_at], map: "personal_access_tokens_expires_at_index")
74
+ @@index([tokenable_type, tokenable_id], map: "personal_access_tokens_tokenable_type_tokenable_id_index")
75
+ }
76
+
77
+ model sessions {
78
+ id String @id @db.VarChar(255)
79
+ user_id BigInt?
80
+ ip_address String? @db.VarChar(45)
81
+ user_agent String?
82
+ payload String
83
+ last_activity Int
84
+
85
+ @@index([last_activity], map: "sessions_last_activity_index")
86
+ @@index([user_id], map: "sessions_user_id_index")
87
+ }
88
+
89
+ /// This table contains check constraints and requires additional setup for migrations. Visit https://pris.ly/d/check-constraints for more info.
90
+ model users {
91
+ id BigInt @id @default(autoincrement())
92
+ uuid String @unique(map: "users_uuid_unique") @db.Uuid
93
+ name String @db.VarChar(255)
94
+ email String @unique(map: "users_email_unique") @db.VarChar(255)
95
+ avatar String? @db.VarChar(255)
96
+ avatar_url String? @db.VarChar(255)
97
+ email_verified_at DateTime? @db.Timestamp(0)
98
+ password String @db.VarChar(255)
99
+ remember_token String? @db.VarChar(100)
100
+ created_at DateTime? @db.Timestamp(0)
101
+ updated_at DateTime? @db.Timestamp(0)
102
+ user_roles user_roles[]
103
+ user_permissions user_permissions[]
104
+ }
105
+
106
+ model roles {
107
+ id BigInt @id @default(autoincrement())
108
+ name String @db.VarChar(255)
109
+ slug String @unique @db.VarChar(255)
110
+ description String?
111
+ created_at DateTime? @db.Timestamp(0)
112
+ updated_at DateTime? @db.Timestamp(0)
113
+ user_roles user_roles[]
114
+ role_permissions role_permissions[]
115
+ }
116
+
117
+ model permissions {
118
+ id BigInt @id @default(autoincrement())
119
+ name String @db.VarChar(255)
120
+ slug String @unique @db.VarChar(255)
121
+ description String?
122
+ created_at DateTime? @db.Timestamp(0)
123
+ updated_at DateTime? @db.Timestamp(0)
124
+ user_permissions user_permissions[]
125
+ role_permissions role_permissions[]
126
+ }
127
+
128
+ model user_roles {
129
+ id BigInt @id @default(autoincrement())
130
+ user_id BigInt
131
+ role_id BigInt
132
+ created_at DateTime? @db.Timestamp(0)
133
+ users users @relation(fields: [user_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
134
+ roles roles @relation(fields: [role_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
135
+
136
+ @@unique([user_id, role_id])
137
+ }
138
+
139
+ model role_permissions {
140
+ id BigInt @id @default(autoincrement())
141
+ role_id BigInt
142
+ permission_id BigInt
143
+ created_at DateTime? @db.Timestamp(0)
144
+ roles roles @relation(fields: [role_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
145
+ permissions permissions @relation(fields: [permission_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
146
+
147
+ @@unique([role_id, permission_id])
148
+ }
149
+
150
+ model user_permissions {
151
+ id BigInt @id @default(autoincrement())
152
+ user_id BigInt
153
+ permission_id BigInt
154
+ created_at DateTime? @db.Timestamp(0)
155
+ users users @relation(fields: [user_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
156
+ permissions permissions @relation(fields: [permission_id], references: [id], onDelete: Cascade, onUpdate: NoAction)
157
+
158
+ @@unique([user_id, permission_id])
159
+ }
package/src/prisma.ts ADDED
@@ -0,0 +1,32 @@
1
+ import { PrismaClient } from "../generated/prisma/client";
2
+ import { PrismaPg } from "@prisma/adapter-pg";
3
+ import { PrismaMariaDb } from "@prisma/adapter-mariadb";
4
+
5
+ const url = process.env.DATABASE_URL || "";
6
+ const provider = (process.env.DATABASE_PROVIDER || "").toLowerCase();
7
+
8
+ let prisma: PrismaClient;
9
+
10
+ if (provider === "postgresql" || url.startsWith("postgres")) {
11
+ const adapter = new PrismaPg({ connectionString: url });
12
+ prisma = new PrismaClient({ adapter });
13
+ } else if (
14
+ provider === "mysql" ||
15
+ provider === "mariadb" ||
16
+ url.startsWith("mysql") ||
17
+ url.startsWith("mariadb")
18
+ ) {
19
+ const adapter = new PrismaMariaDb({
20
+ host: process.env.DATABASE_HOST,
21
+ user: process.env.DATABASE_USER,
22
+ password: process.env.DATABASE_PASSWORD,
23
+ database: process.env.DATABASE_NAME,
24
+ } as any);
25
+ prisma = new PrismaClient({ adapter });
26
+ } else {
27
+ throw new Error(
28
+ 'Unsupported DATABASE_PROVIDER. Use "postgresql" or "mysql".'
29
+ );
30
+ }
31
+
32
+ export { prisma };
@@ -0,0 +1,34 @@
1
+ import { Server } from "socket.io";
2
+ import jwt from "jsonwebtoken";
3
+
4
+ let io: Server | null = null;
5
+
6
+ export function initRealtime(server: import("http").Server) {
7
+ io = new Server(server, {
8
+ cors: { origin: "*", methods: ["GET", "POST", "PUT", "DELETE"] },
9
+ });
10
+ io.on("connection", (socket) => {
11
+ const token =
12
+ (socket.handshake.query?.token as string) ||
13
+ socket.handshake.headers["authorization"]
14
+ ?.toString()
15
+ ?.replace("Bearer ", "") ||
16
+ "";
17
+ const secret = process.env.JWT_SECRET;
18
+ if (secret && token) {
19
+ try {
20
+ const payload = jwt.verify(token, secret) as {
21
+ userId: string;
22
+ role: string;
23
+ };
24
+ const room = `user:${payload.userId}`;
25
+ socket.join(room);
26
+ } catch {}
27
+ }
28
+ });
29
+ }
30
+
31
+ export function notifyUser(userId: string, event: string, payload: any) {
32
+ if (!io) return;
33
+ io.to(`user:${userId}`).emit(event, payload);
34
+ }
package/src/redis.ts ADDED
@@ -0,0 +1,69 @@
1
+ import Redis from "ioredis";
2
+
3
+ export const useRedis = !!process.env.REDIS_URL;
4
+
5
+ let redis: Redis | null = null;
6
+ if (useRedis) {
7
+ redis = new Redis(process.env.REDIS_URL as string, {
8
+ lazyConnect: true,
9
+ maxRetriesPerRequest: 0,
10
+ enableOfflineQueue: false,
11
+ });
12
+ }
13
+
14
+ const memory = new Map<string, { value: any; expireAt: number }>();
15
+
16
+ export async function getCache(key: string) {
17
+ if (useRedis && redis) {
18
+ try {
19
+ const v = await redis.get(key);
20
+ return v ? JSON.parse(v) : null;
21
+ } catch {
22
+ // fall through
23
+ }
24
+ } else {
25
+ const entry = memory.get(key);
26
+ if (entry && entry.expireAt > Date.now()) return entry.value;
27
+ if (entry) memory.delete(key);
28
+ }
29
+ return null;
30
+ }
31
+
32
+ export async function setCache(key: string, value: any, ttlSeconds = 60) {
33
+ if (useRedis && redis) {
34
+ try {
35
+ await redis.set(key, JSON.stringify(value), "EX", ttlSeconds);
36
+ return;
37
+ } catch {
38
+ // fall through
39
+ }
40
+ } else {
41
+ memory.set(key, { value, expireAt: Date.now() + ttlSeconds * 1000 });
42
+ }
43
+ }
44
+
45
+ export async function delCache(key: string) {
46
+ if (useRedis && redis) {
47
+ try {
48
+ await redis.del(key);
49
+ return;
50
+ } catch {
51
+ // fall through
52
+ }
53
+ } else {
54
+ memory.delete(key);
55
+ }
56
+ }
57
+
58
+ export async function pingRedis(): Promise<boolean> {
59
+ if (!useRedis || !redis) return false;
60
+ try {
61
+ await redis.connect();
62
+ const res = await redis.ping();
63
+ return res === "PONG";
64
+ } catch {
65
+ return false;
66
+ }
67
+ }
68
+
69
+ export { redis };
@@ -0,0 +1,74 @@
1
+ import { Router } from "express";
2
+ import rateLimit from "express-rate-limit";
3
+ // eslint-disable-next-line @typescript-eslint/no-var-requires
4
+ const multer = require("multer");
5
+ import path from "path";
6
+ import fs from "fs";
7
+ import {
8
+ register,
9
+ login,
10
+ me,
11
+ logout,
12
+ refreshToken,
13
+ updatePassword,
14
+ updateProfile,
15
+ updateAvatar,
16
+ } from "../controllers/authController";
17
+ import { requireAuth } from "../middleware/auth";
18
+
19
+ const authLimiter = rateLimit({
20
+ windowMs: 15 * 60 * 1000,
21
+ max: 50,
22
+ standardHeaders: true,
23
+ legacyHeaders: false,
24
+ });
25
+
26
+ const avatarUploadDir = process.env.AVATAR_UPLOAD_DIR || "uploads/avatars";
27
+ if (!fs.existsSync(avatarUploadDir)) {
28
+ fs.mkdirSync(avatarUploadDir, { recursive: true });
29
+ }
30
+
31
+ const storage = (multer as any).diskStorage({
32
+ destination(
33
+ req: any,
34
+ file: any,
35
+ cb: (error: Error | null, destination: string) => void
36
+ ) {
37
+ cb(null, avatarUploadDir);
38
+ },
39
+ filename(
40
+ req: any,
41
+ file: any,
42
+ cb: (error: Error | null, filename: string) => void
43
+ ) {
44
+ const ext = path.extname(file.originalname);
45
+ const base = path.basename(file.originalname, ext);
46
+ const unique = Date.now() + "-" + Math.round(Math.random() * 1e9);
47
+ cb(null, base + "-" + unique + ext);
48
+ },
49
+ });
50
+
51
+ const uploadAvatar = multer({ storage });
52
+
53
+ export const authRouter = Router();
54
+
55
+ authRouter.post("/register", authLimiter, register);
56
+
57
+ authRouter.post("/login", authLimiter, login);
58
+
59
+ authRouter.get("/me", requireAuth, me);
60
+
61
+ authRouter.post("/logout", requireAuth, logout);
62
+
63
+ authRouter.post("/refresh", authLimiter, refreshToken);
64
+
65
+ authRouter.put("/password", requireAuth, updatePassword);
66
+
67
+ authRouter.put("/profile", requireAuth, updateProfile);
68
+
69
+ authRouter.post(
70
+ "/avatar",
71
+ requireAuth,
72
+ uploadAvatar.single("avatar"),
73
+ updateAvatar
74
+ );
@@ -0,0 +1,55 @@
1
+ import { Router } from "express";
2
+ import { requireAdmin } from "../middleware/auth";
3
+ import {
4
+ createRole,
5
+ listRoles,
6
+ updateRole,
7
+ deleteRole,
8
+ createPermission,
9
+ listPermissions,
10
+ updatePermission,
11
+ deletePermission,
12
+ assignRoleToUser,
13
+ removeRoleFromUser,
14
+ assignPermissionToRole,
15
+ removePermissionFromRole,
16
+ assignPermissionToUser,
17
+ removePermissionFromUser,
18
+ } from "../controllers/rbacController";
19
+
20
+ export const rbacRouter = Router();
21
+
22
+ rbacRouter.post("/roles", requireAdmin, createRole);
23
+ rbacRouter.get("/roles", requireAdmin, listRoles);
24
+ rbacRouter.put("/roles/:id", requireAdmin, updateRole);
25
+ rbacRouter.delete("/roles/:id", requireAdmin, deleteRole);
26
+
27
+ rbacRouter.post("/permissions", requireAdmin, createPermission);
28
+ rbacRouter.get("/permissions", requireAdmin, listPermissions);
29
+ rbacRouter.put("/permissions/:id", requireAdmin, updatePermission);
30
+ rbacRouter.delete("/permissions/:id", requireAdmin, deletePermission);
31
+
32
+ rbacRouter.post("/users/assign-role", requireAdmin, assignRoleToUser);
33
+ rbacRouter.post("/users/remove-role", requireAdmin, removeRoleFromUser);
34
+
35
+ rbacRouter.post(
36
+ "/roles/assign-permission",
37
+ requireAdmin,
38
+ assignPermissionToRole
39
+ );
40
+ rbacRouter.post(
41
+ "/roles/remove-permission",
42
+ requireAdmin,
43
+ removePermissionFromRole
44
+ );
45
+
46
+ rbacRouter.post(
47
+ "/users/assign-permission",
48
+ requireAdmin,
49
+ assignPermissionToUser
50
+ );
51
+ rbacRouter.post(
52
+ "/users/remove-permission",
53
+ requireAdmin,
54
+ removePermissionFromUser
55
+ );
@@ -0,0 +1,62 @@
1
+ import z from "zod";
2
+
3
+ export const registerSchema = z
4
+ .object({
5
+ email: z
6
+ .string({ required_error: "Email wajib diisi" })
7
+ .email("Format email tidak valid"),
8
+ name: z
9
+ .string({ required_error: "Nama wajib diisi" })
10
+ .min(1, "Nama wajib diisi"),
11
+ password: z
12
+ .string({ required_error: "Password wajib diisi" })
13
+ .min(4, "Password minimal 4 karakter"),
14
+ confirmPassword: z
15
+ .string({ required_error: "Konfirmasi password wajib diisi" })
16
+ .min(4, "Konfirmasi password minimal 4 karakter"),
17
+ })
18
+ .refine((data) => data.password === data.confirmPassword, {
19
+ path: ["confirmPassword"],
20
+ message: "Konfirmasi password tidak sama",
21
+ });
22
+
23
+ export const loginSchema = z.object({
24
+ email: z
25
+ .string({ required_error: "Email wajib diisi" })
26
+ .email("Format email tidak valid"),
27
+ password: z
28
+ .string({ required_error: "Password wajib diisi" })
29
+ .min(4, "Password minimal 4 karakter"),
30
+ });
31
+
32
+ export const refreshSchema = z.object({
33
+ refreshToken: z
34
+ .string({ required_error: "Refresh token wajib diisi" })
35
+ .min(1, "Refresh token wajib diisi"),
36
+ });
37
+
38
+ export const updatePasswordSchema = z
39
+ .object({
40
+ currentPassword: z
41
+ .string({ required_error: "Password saat ini wajib diisi" })
42
+ .min(4, "Password saat ini minimal 4 karakter"),
43
+ newPassword: z
44
+ .string({ required_error: "Password baru wajib diisi" })
45
+ .min(4, "Password baru minimal 4 karakter"),
46
+ confirmPassword: z
47
+ .string({ required_error: "Konfirmasi password wajib diisi" })
48
+ .min(4, "Konfirmasi password minimal 4 karakter"),
49
+ })
50
+ .refine((data) => data.newPassword === data.confirmPassword, {
51
+ path: ["confirmPassword"],
52
+ message: "Konfirmasi password tidak sama",
53
+ });
54
+
55
+ export const updateProfileSchema = z.object({
56
+ name: z
57
+ .string({ required_error: "Nama wajib diisi" })
58
+ .min(1, "Nama wajib diisi"),
59
+ email: z
60
+ .string({ required_error: "Email wajib diisi" })
61
+ .email("Format email tidak valid"),
62
+ });
@@ -0,0 +1,57 @@
1
+ import z from "zod";
2
+
3
+ export const createUserSchema = z
4
+ .object({
5
+ email: z
6
+ .string({ required_error: "Email wajib diisi" })
7
+ .email("Format email tidak valid"),
8
+ name: z
9
+ .string({ required_error: "Nama wajib diisi" })
10
+ .min(1, "Nama wajib diisi"),
11
+ password: z
12
+ .string({ required_error: "Password wajib diisi" })
13
+ .min(6, "Password minimal 6 karakter"),
14
+ confirmPassword: z
15
+ .string({ required_error: "Konfirmasi password wajib diisi" })
16
+ .min(4, "Konfirmasi password minimal 4 karakter"),
17
+ roleId: z.string().optional(),
18
+ permissionIds: z.array(z.string()).optional(),
19
+ })
20
+ .refine((data) => data.password === data.confirmPassword, {
21
+ path: ["confirmPassword"],
22
+ message: "Konfirmasi password tidak sama",
23
+ });
24
+
25
+ export const updateUserSchema = z
26
+ .object({
27
+ email: z
28
+ .string({ required_error: "Email wajib diisi" })
29
+ .email("Format email tidak valid")
30
+ .optional(),
31
+ name: z
32
+ .string({ required_error: "Nama wajib diisi" })
33
+ .min(1, "Nama wajib diisi")
34
+ .optional(),
35
+ password: z
36
+ .string({ required_error: "Password wajib diisi" })
37
+ .min(6, "Password minimal 6 karakter")
38
+ .optional(),
39
+ confirmPassword: z
40
+ .string({ required_error: "Konfirmasi password wajib diisi" })
41
+ .min(4, "Konfirmasi password minimal 4 karakter")
42
+ .optional(),
43
+ roleId: z.string().optional(),
44
+ permissionIds: z.array(z.string()).optional(),
45
+ })
46
+ .refine(
47
+ (data) => {
48
+ if (!data.password) {
49
+ return true;
50
+ }
51
+ return data.password === data.confirmPassword;
52
+ },
53
+ {
54
+ path: ["confirmPassword"],
55
+ message: "Konfirmasi password tidak sama",
56
+ }
57
+ );
package/src/server.ts ADDED
@@ -0,0 +1,32 @@
1
+ import express from "express";
2
+ import cors from "cors";
3
+ import helmet from "helmet";
4
+ import { authRouter } from "./routes/auth";
5
+ import { rbacRouter } from "./routes/rbac";
6
+ import { visitorCounter } from "./middleware/visitor";
7
+ import { errorHandler } from "./middleware/error";
8
+
9
+ export const app = express();
10
+
11
+ app.disable("x-powered-by");
12
+ app.use(
13
+ helmet({
14
+ contentSecurityPolicy: false,
15
+ })
16
+ );
17
+
18
+ const corsOrigin = process.env.CORS_ORIGIN || "*";
19
+ app.use(
20
+ cors({
21
+ origin: corsOrigin,
22
+ credentials: true,
23
+ exposedHeaders: ["x-access-token", "x-access-expires-at"],
24
+ })
25
+ );
26
+ app.use(express.json({ limit: "1mb" }));
27
+ app.use(visitorCounter);
28
+
29
+ app.use("/api/auth", authRouter);
30
+ app.use("/api/rbac", rbacRouter);
31
+
32
+ app.use(errorHandler);
@@ -0,0 +1,56 @@
1
+ export type PaginationQuery = {
2
+ page?: string | string[] | number;
3
+ per_page?: string | string[] | number;
4
+ };
5
+
6
+ export type PaginationParams = {
7
+ page: number;
8
+ perPage: number;
9
+ skip: number;
10
+ take: number;
11
+ };
12
+
13
+ export type PaginationMeta = {
14
+ page: number;
15
+ perPage: number;
16
+ total: number;
17
+ lastPage: number;
18
+ };
19
+
20
+ function toNumber(value: string | string[] | number | undefined) {
21
+ if (Array.isArray(value)) {
22
+ if (value.length === 0) return undefined;
23
+ return toNumber(value[0]);
24
+ }
25
+ if (typeof value === "number") {
26
+ return value;
27
+ }
28
+ if (typeof value === "string") {
29
+ const n = parseInt(value, 10);
30
+ if (!Number.isNaN(n)) {
31
+ return n;
32
+ }
33
+ }
34
+ return undefined;
35
+ }
36
+
37
+ export function getPagination(query: PaginationQuery): PaginationParams {
38
+ const pageRaw = toNumber(query.page);
39
+ const perPageRaw = toNumber(query.per_page);
40
+ const page = pageRaw && pageRaw > 0 ? pageRaw : 1;
41
+ const perPage =
42
+ perPageRaw && perPageRaw > 0 && perPageRaw <= 100 ? perPageRaw : 10;
43
+ const skip = (page - 1) * perPage;
44
+ const take = perPage;
45
+ return { page, perPage, skip, take };
46
+ }
47
+
48
+ export function buildPaginationMeta(
49
+ page: number,
50
+ perPage: number,
51
+ total: number
52
+ ): PaginationMeta {
53
+ const lastPage = total === 0 ? 1 : Math.ceil(total / perPage);
54
+ return { page, perPage, total, lastPage };
55
+ }
56
+
@@ -0,0 +1,59 @@
1
+ import { Response } from "express";
2
+
3
+ type SuccessStatus = "success";
4
+ type ErrorStatus = "error";
5
+
6
+ type SuccessBody<T> = {
7
+ status: SuccessStatus;
8
+ message: string;
9
+ data: T;
10
+ };
11
+
12
+ type ErrorBody<T = unknown> = {
13
+ status: ErrorStatus;
14
+ message: string;
15
+ errors?: T;
16
+ };
17
+
18
+ function toJsonSafe(value: unknown): unknown {
19
+ if (value instanceof Date) {
20
+ return value.toISOString();
21
+ }
22
+ if (typeof value === "bigint") {
23
+ return value.toString();
24
+ }
25
+ if (Array.isArray(value)) {
26
+ return value.map((item) => toJsonSafe(item));
27
+ }
28
+ if (value && typeof value === "object") {
29
+ const result: Record<string, unknown> = {};
30
+ for (const [key, val] of Object.entries(value)) {
31
+ result[key] = toJsonSafe(val);
32
+ }
33
+ return result;
34
+ }
35
+ return value;
36
+ }
37
+
38
+ export function sendSuccess<T>(
39
+ res: Response,
40
+ statusCode: number,
41
+ message: string,
42
+ data: T
43
+ ) {
44
+ const body: SuccessBody<T> = { status: "success", message, data };
45
+ return res.status(statusCode).json(toJsonSafe(body));
46
+ }
47
+
48
+ export function sendError<T = unknown>(
49
+ res: Response,
50
+ statusCode: number,
51
+ message: string,
52
+ errors?: T
53
+ ) {
54
+ const body: ErrorBody<T> = { status: "error", message };
55
+ if (errors !== undefined) {
56
+ body.errors = errors;
57
+ }
58
+ return res.status(statusCode).json(toJsonSafe(body));
59
+ }