swallowkit 1.0.0-beta.2 → 1.0.0-beta.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (191) hide show
  1. package/LICENSE +21 -21
  2. package/README.ja.md +312 -215
  3. package/README.md +369 -216
  4. package/dist/__tests__/fixtures.d.ts +22 -0
  5. package/dist/__tests__/fixtures.d.ts.map +1 -0
  6. package/dist/__tests__/fixtures.js +146 -0
  7. package/dist/__tests__/fixtures.js.map +1 -0
  8. package/dist/cli/commands/add-auth.d.ts +10 -0
  9. package/dist/cli/commands/add-auth.d.ts.map +1 -0
  10. package/dist/cli/commands/add-auth.js +444 -0
  11. package/dist/cli/commands/add-auth.js.map +1 -0
  12. package/dist/cli/commands/add-connector.d.ts +20 -0
  13. package/dist/cli/commands/add-connector.d.ts.map +1 -0
  14. package/dist/cli/commands/add-connector.js +163 -0
  15. package/dist/cli/commands/add-connector.js.map +1 -0
  16. package/dist/cli/commands/create-model.d.ts +1 -4
  17. package/dist/cli/commands/create-model.d.ts.map +1 -1
  18. package/dist/cli/commands/create-model.js +21 -82
  19. package/dist/cli/commands/create-model.js.map +1 -1
  20. package/dist/cli/commands/dev-seeds.d.ts +35 -0
  21. package/dist/cli/commands/dev-seeds.d.ts.map +1 -0
  22. package/dist/cli/commands/dev-seeds.js +292 -0
  23. package/dist/cli/commands/dev-seeds.js.map +1 -0
  24. package/dist/cli/commands/dev.d.ts +19 -0
  25. package/dist/cli/commands/dev.d.ts.map +1 -1
  26. package/dist/cli/commands/dev.js +476 -117
  27. package/dist/cli/commands/dev.js.map +1 -1
  28. package/dist/cli/commands/index.d.ts +1 -0
  29. package/dist/cli/commands/index.d.ts.map +1 -1
  30. package/dist/cli/commands/index.js +3 -1
  31. package/dist/cli/commands/index.js.map +1 -1
  32. package/dist/cli/commands/init.d.ts +13 -0
  33. package/dist/cli/commands/init.d.ts.map +1 -1
  34. package/dist/cli/commands/init.js +2627 -1708
  35. package/dist/cli/commands/init.js.map +1 -1
  36. package/dist/cli/commands/scaffold.d.ts +3 -0
  37. package/dist/cli/commands/scaffold.d.ts.map +1 -1
  38. package/dist/cli/commands/scaffold.js +617 -129
  39. package/dist/cli/commands/scaffold.js.map +1 -1
  40. package/dist/cli/index.d.ts +5 -1
  41. package/dist/cli/index.d.ts.map +1 -1
  42. package/dist/cli/index.js +164 -42
  43. package/dist/cli/index.js.map +1 -1
  44. package/dist/core/config.d.ts +8 -2
  45. package/dist/core/config.d.ts.map +1 -1
  46. package/dist/core/config.js +90 -4
  47. package/dist/core/config.js.map +1 -1
  48. package/dist/core/mock/connector-mock-server.d.ts +101 -0
  49. package/dist/core/mock/connector-mock-server.d.ts.map +1 -0
  50. package/dist/core/mock/connector-mock-server.js +480 -0
  51. package/dist/core/mock/connector-mock-server.js.map +1 -0
  52. package/dist/core/mock/zod-mock-generator.d.ts +14 -0
  53. package/dist/core/mock/zod-mock-generator.d.ts.map +1 -0
  54. package/dist/core/mock/zod-mock-generator.js +163 -0
  55. package/dist/core/mock/zod-mock-generator.js.map +1 -0
  56. package/dist/core/operations/create-model.d.ts +15 -0
  57. package/dist/core/operations/create-model.d.ts.map +1 -0
  58. package/dist/core/operations/create-model.js +171 -0
  59. package/dist/core/operations/create-model.js.map +1 -0
  60. package/dist/core/operations/runtime.d.ts +32 -0
  61. package/dist/core/operations/runtime.d.ts.map +1 -0
  62. package/dist/core/operations/runtime.js +225 -0
  63. package/dist/core/operations/runtime.js.map +1 -0
  64. package/dist/core/operations/scaffold-machine.d.ts +16 -0
  65. package/dist/core/operations/scaffold-machine.d.ts.map +1 -0
  66. package/dist/core/operations/scaffold-machine.js +63 -0
  67. package/dist/core/operations/scaffold-machine.js.map +1 -0
  68. package/dist/core/project/manifest.d.ts +92 -0
  69. package/dist/core/project/manifest.d.ts.map +1 -0
  70. package/dist/core/project/manifest.js +321 -0
  71. package/dist/core/project/manifest.js.map +1 -0
  72. package/dist/core/project/validation.d.ts +20 -0
  73. package/dist/core/project/validation.d.ts.map +1 -0
  74. package/dist/core/project/validation.js +204 -0
  75. package/dist/core/project/validation.js.map +1 -0
  76. package/dist/core/scaffold/auth-generator.d.ts +38 -0
  77. package/dist/core/scaffold/auth-generator.d.ts.map +1 -0
  78. package/dist/core/scaffold/auth-generator.js +1244 -0
  79. package/dist/core/scaffold/auth-generator.js.map +1 -0
  80. package/dist/core/scaffold/connector-functions-generator.d.ts +41 -0
  81. package/dist/core/scaffold/connector-functions-generator.d.ts.map +1 -0
  82. package/dist/core/scaffold/connector-functions-generator.js +1027 -0
  83. package/dist/core/scaffold/connector-functions-generator.js.map +1 -0
  84. package/dist/core/scaffold/functions-generator.d.ts +7 -1
  85. package/dist/core/scaffold/functions-generator.d.ts.map +1 -1
  86. package/dist/core/scaffold/functions-generator.js +920 -213
  87. package/dist/core/scaffold/functions-generator.js.map +1 -1
  88. package/dist/core/scaffold/model-parser.d.ts +20 -1
  89. package/dist/core/scaffold/model-parser.d.ts.map +1 -1
  90. package/dist/core/scaffold/model-parser.js +329 -135
  91. package/dist/core/scaffold/model-parser.js.map +1 -1
  92. package/dist/core/scaffold/nextjs-generator.d.ts +8 -0
  93. package/dist/core/scaffold/nextjs-generator.d.ts.map +1 -1
  94. package/dist/core/scaffold/nextjs-generator.js +314 -182
  95. package/dist/core/scaffold/nextjs-generator.js.map +1 -1
  96. package/dist/core/scaffold/openapi-generator.d.ts +3 -0
  97. package/dist/core/scaffold/openapi-generator.d.ts.map +1 -0
  98. package/dist/core/scaffold/openapi-generator.js +190 -0
  99. package/dist/core/scaffold/openapi-generator.js.map +1 -0
  100. package/dist/core/scaffold/ui-generator.d.ts +10 -4
  101. package/dist/core/scaffold/ui-generator.d.ts.map +1 -1
  102. package/dist/core/scaffold/ui-generator.js +768 -663
  103. package/dist/core/scaffold/ui-generator.js.map +1 -1
  104. package/dist/database/base-model.d.ts +3 -3
  105. package/dist/database/base-model.js +3 -3
  106. package/dist/index.d.ts +2 -2
  107. package/dist/index.d.ts.map +1 -1
  108. package/dist/index.js +2 -1
  109. package/dist/index.js.map +1 -1
  110. package/dist/machine/contracts.d.ts +16 -0
  111. package/dist/machine/contracts.d.ts.map +1 -0
  112. package/dist/machine/contracts.js +3 -0
  113. package/dist/machine/contracts.js.map +1 -0
  114. package/dist/machine/errors.d.ts +11 -0
  115. package/dist/machine/errors.d.ts.map +1 -0
  116. package/dist/machine/errors.js +34 -0
  117. package/dist/machine/errors.js.map +1 -0
  118. package/dist/machine/index.d.ts +3 -0
  119. package/dist/machine/index.d.ts.map +1 -0
  120. package/dist/machine/index.js +156 -0
  121. package/dist/machine/index.js.map +1 -0
  122. package/dist/mcp/index.d.ts +25 -0
  123. package/dist/mcp/index.d.ts.map +1 -0
  124. package/dist/mcp/index.js +184 -0
  125. package/dist/mcp/index.js.map +1 -0
  126. package/dist/types/index.d.ts +65 -0
  127. package/dist/types/index.d.ts.map +1 -1
  128. package/dist/utils/package-manager.d.ts +109 -0
  129. package/dist/utils/package-manager.d.ts.map +1 -0
  130. package/dist/utils/package-manager.js +215 -0
  131. package/dist/utils/package-manager.js.map +1 -0
  132. package/package.json +85 -73
  133. package/src/__tests__/__snapshots__/functions-generator.test.ts.snap +1139 -0
  134. package/src/__tests__/__snapshots__/nextjs-generator.test.ts.snap +194 -0
  135. package/src/__tests__/__snapshots__/ui-generator.test.ts.snap +532 -0
  136. package/src/__tests__/auth.test.ts +654 -0
  137. package/src/__tests__/config.test.ts +263 -0
  138. package/src/__tests__/connector-functions-generator.test.ts +288 -0
  139. package/src/__tests__/connector-mock-server.test.ts +439 -0
  140. package/src/__tests__/connector-model-bff.test.ts +162 -0
  141. package/src/__tests__/dev-seeds.test.ts +112 -0
  142. package/src/__tests__/dev.test.ts +154 -0
  143. package/src/__tests__/fixtures.ts +144 -0
  144. package/src/__tests__/functions-generator.test.ts +237 -0
  145. package/src/__tests__/init.test.ts +80 -0
  146. package/src/__tests__/machine.test.ts +212 -0
  147. package/src/__tests__/mcp.test.ts +56 -0
  148. package/src/__tests__/model-parser.test.ts +72 -0
  149. package/src/__tests__/nextjs-generator.test.ts +97 -0
  150. package/src/__tests__/openapi-generator.test.ts +43 -0
  151. package/src/__tests__/package-manager.test.ts +189 -0
  152. package/src/__tests__/scaffold.test.ts +39 -0
  153. package/src/__tests__/string-utils.test.ts +75 -0
  154. package/src/__tests__/ui-generator.test.ts +144 -0
  155. package/src/__tests__/zod-mock-generator.test.ts +132 -0
  156. package/src/cli/commands/add-auth.ts +500 -0
  157. package/src/cli/commands/add-connector.ts +158 -0
  158. package/src/cli/commands/create-model.ts +62 -0
  159. package/src/cli/commands/dev-seeds.ts +358 -0
  160. package/src/cli/commands/dev.ts +962 -0
  161. package/src/cli/commands/index.ts +9 -0
  162. package/src/cli/commands/init.ts +3371 -0
  163. package/src/cli/commands/provision.ts +193 -0
  164. package/src/cli/commands/scaffold.ts +1211 -0
  165. package/src/cli/index.ts +193 -0
  166. package/src/core/config.ts +308 -0
  167. package/src/core/mock/connector-mock-server.ts +555 -0
  168. package/src/core/mock/zod-mock-generator.ts +205 -0
  169. package/src/core/operations/create-model.ts +174 -0
  170. package/src/core/operations/runtime.ts +235 -0
  171. package/src/core/operations/scaffold-machine.ts +91 -0
  172. package/src/core/project/manifest.ts +402 -0
  173. package/src/core/project/validation.ts +221 -0
  174. package/src/core/scaffold/auth-generator.ts +1284 -0
  175. package/src/core/scaffold/connector-functions-generator.ts +1128 -0
  176. package/src/core/scaffold/functions-generator.ts +970 -0
  177. package/src/core/scaffold/model-parser.ts +841 -0
  178. package/src/core/scaffold/nextjs-generator.ts +370 -0
  179. package/src/core/scaffold/openapi-generator.ts +212 -0
  180. package/src/core/scaffold/ui-generator.ts +1061 -0
  181. package/src/database/base-model.ts +184 -0
  182. package/src/database/client.ts +140 -0
  183. package/src/database/repository.ts +104 -0
  184. package/src/database/runtime-check.ts +25 -0
  185. package/src/index.ts +27 -0
  186. package/src/machine/contracts.ts +17 -0
  187. package/src/machine/errors.ts +34 -0
  188. package/src/machine/index.ts +173 -0
  189. package/src/mcp/index.ts +185 -0
  190. package/src/types/index.ts +134 -0
  191. package/src/utils/package-manager.ts +229 -0
@@ -0,0 +1,1284 @@
1
+ /**
2
+ * SwallowKit 認証・認可コード生成
3
+ * add-auth コマンドおよび scaffold ロールガード挿入で使用するテンプレート群
4
+ */
5
+
6
+ import { CustomJwtConfig, ModelAuthPolicy, RdbConnectorConfig } from "../../types";
7
+
8
+ type RdbProvider = RdbConnectorConfig["provider"]; // "mysql" | "postgres" | "sqlserver"
9
+
10
+ // ============================================================
11
+ // 1. shared/models/auth.ts(Zod スキーマ)
12
+ // ============================================================
13
+
14
+ export function generateAuthModels(): string {
15
+ return `import { z } from 'zod/v4';
16
+
17
+ // ログインリクエスト
18
+ export const LoginRequest = z.object({
19
+ loginId: z.string().min(1),
20
+ password: z.string().min(1),
21
+ });
22
+ export type LoginRequest = z.infer<typeof LoginRequest>;
23
+
24
+ // 認証済みユーザー情報(JWT claims 相当、機密情報なし)
25
+ export const AuthUser = z.object({
26
+ id: z.string(),
27
+ loginId: z.string(),
28
+ name: z.string(),
29
+ email: z.string().email(),
30
+ roles: z.array(z.string()),
31
+ });
32
+ export type AuthUser = z.infer<typeof AuthUser>;
33
+
34
+ // ログインレスポンス
35
+ export const LoginResponse = z.object({
36
+ user: AuthUser,
37
+ token: z.string(),
38
+ expiresAt: z.string(),
39
+ });
40
+ export type LoginResponse = z.infer<typeof LoginResponse>;
41
+
42
+ export const displayName = 'Auth';
43
+ `;
44
+ }
45
+
46
+ // ============================================================
47
+ // 2. TypeScript Functions テンプレート
48
+ // ============================================================
49
+
50
+ export function generateAuthFunctionsTS(
51
+ sharedPackageName: string,
52
+ config: CustomJwtConfig,
53
+ provider: RdbProvider,
54
+ ): string {
55
+ const envVar = `${config.userConnector.toUpperCase()}_CONNECTION_STRING`;
56
+
57
+ const driverImport = provider === "mysql"
58
+ ? `import mysql from 'mysql2/promise';`
59
+ : provider === "postgres"
60
+ ? `import pg from 'pg';`
61
+ : `import sql from 'mssql';`;
62
+
63
+ const getConnection = provider === "mysql"
64
+ ? `function getConnection() {
65
+ return mysql.createConnection(process.env.${envVar} || '');
66
+ }`
67
+ : provider === "postgres"
68
+ ? `async function getConnection() {
69
+ const client = new pg.Client(process.env.${envVar} || '');
70
+ await client.connect();
71
+ return client;
72
+ }`
73
+ : `async function getConnection() {
74
+ return sql.connect(process.env.${envVar} || '');
75
+ }`;
76
+
77
+ const connVar = provider === "mysql" ? "conn" : provider === "postgres" ? "client" : "pool";
78
+
79
+ const queryExec = provider === "mysql"
80
+ ? `const [rows] = await ${connVar}.query(
81
+ 'SELECT * FROM ${config.userTable} WHERE ${config.loginIdColumn} = ?',
82
+ [body.loginId]
83
+ );
84
+ const users = rows as any[];`
85
+ : provider === "postgres"
86
+ ? `const result = await ${connVar}.query(
87
+ 'SELECT * FROM ${config.userTable} WHERE ${config.loginIdColumn} = $1',
88
+ [body.loginId]
89
+ );
90
+ const users = result.rows;`
91
+ : `const result = await ${connVar}.request()
92
+ .input('loginId', body.loginId)
93
+ .query('SELECT * FROM ${config.userTable} WHERE ${config.loginIdColumn} = @loginId');
94
+ const users = result.recordset;`;
95
+
96
+ const cleanup = provider === "mysql"
97
+ ? `await ${connVar}.end();`
98
+ : provider === "postgres"
99
+ ? `await ${connVar}.end();`
100
+ : `await ${connVar}.close();`;
101
+
102
+ return `import { app, HttpRequest, HttpResponseInit, InvocationContext } from '@azure/functions';
103
+ import { LoginRequest, LoginResponse, AuthUser } from '${sharedPackageName}';
104
+ import { requireAuth, generateToken, handleAuthError } from './auth/jwt-helper';
105
+ import bcrypt from 'bcryptjs';
106
+ ${driverImport}
107
+
108
+ ${getConnection}
109
+
110
+ // POST /api/auth/login - ログイン
111
+ app.http('auth-login', {
112
+ methods: ['POST'],
113
+ route: 'auth/login',
114
+ authLevel: 'anonymous',
115
+ handler: async (request: HttpRequest, context: InvocationContext): Promise<HttpResponseInit> => {
116
+ try {
117
+ const body = LoginRequest.parse(await request.json());
118
+
119
+ const ${connVar} = await getConnection();
120
+ try {
121
+ ${queryExec}
122
+
123
+ if (users.length === 0) {
124
+ return { status: 401, jsonBody: { error: 'Invalid credentials' } };
125
+ }
126
+
127
+ const user = users[0];
128
+ const valid = await bcrypt.compare(body.password, user.${config.passwordHashColumn});
129
+ if (!valid) {
130
+ return { status: 401, jsonBody: { error: 'Invalid credentials' } };
131
+ }
132
+
133
+ // ロール取得(JSON配列 or カンマ区切り)
134
+ let roles: string[] = [];
135
+ if (typeof user.${config.rolesColumn} === 'string') {
136
+ try {
137
+ roles = JSON.parse(user.${config.rolesColumn});
138
+ } catch {
139
+ roles = user.${config.rolesColumn}.split(',').map((r: string) => r.trim());
140
+ }
141
+ } else if (Array.isArray(user.${config.rolesColumn})) {
142
+ roles = user.${config.rolesColumn};
143
+ }
144
+
145
+ const authUser: AuthUser = {
146
+ id: String(user.id),
147
+ loginId: user.${config.loginIdColumn},
148
+ name: user.name || user.${config.loginIdColumn},
149
+ email: user.email || '',
150
+ roles,
151
+ };
152
+
153
+ const token = generateToken(authUser);
154
+ const expiresAt = new Date(Date.now() + 24 * 60 * 60 * 1000).toISOString();
155
+
156
+ const response: LoginResponse = { user: authUser, token, expiresAt };
157
+ return { status: 200, jsonBody: response };
158
+ } finally {
159
+ ${cleanup}
160
+ }
161
+ } catch (error: any) {
162
+ context.error('Login error:', error);
163
+ return { status: 500, jsonBody: { error: 'Login failed' } };
164
+ }
165
+ },
166
+ });
167
+
168
+ // GET /api/auth/me - 現在のユーザー情報取得
169
+ app.http('auth-me', {
170
+ methods: ['GET'],
171
+ route: 'auth/me',
172
+ authLevel: 'anonymous',
173
+ handler: async (request: HttpRequest, context: InvocationContext): Promise<HttpResponseInit> => {
174
+ try {
175
+ const user = requireAuth(request);
176
+ return { status: 200, jsonBody: user };
177
+ } catch (error) {
178
+ const authErr = handleAuthError(error);
179
+ if (authErr) return authErr;
180
+ context.error('Auth/me error:', error);
181
+ return { status: 500, jsonBody: { error: 'Internal server error' } };
182
+ }
183
+ },
184
+ });
185
+
186
+ // POST /api/auth/logout - ログアウト(ステートレスJWTのためサーバー側処理なし)
187
+ app.http('auth-logout', {
188
+ methods: ['POST'],
189
+ route: 'auth/logout',
190
+ authLevel: 'anonymous',
191
+ handler: async (request: HttpRequest): Promise<HttpResponseInit> => {
192
+ return { status: 200, jsonBody: { message: 'Logged out' } };
193
+ },
194
+ });
195
+ `;
196
+ }
197
+
198
+ // ============================================================
199
+ // 3. TypeScript JWT Helper
200
+ // ============================================================
201
+
202
+ export function generateJwtHelperTS(): string {
203
+ return `import jwt from 'jsonwebtoken';
204
+ import { HttpRequest, HttpResponseInit } from '@azure/functions';
205
+
206
+ export interface JwtPayload {
207
+ sub: string;
208
+ loginId: string;
209
+ name: string;
210
+ email: string;
211
+ roles: string[];
212
+ }
213
+
214
+ const JWT_SECRET = process.env.JWT_SECRET || '';
215
+
216
+ /**
217
+ * JWT 検証。無効な場合は AuthError をスロー。
218
+ */
219
+ export function requireAuth(request: HttpRequest): JwtPayload {
220
+ const authHeader = request.headers.get('authorization');
221
+ if (!authHeader?.startsWith('Bearer ')) {
222
+ throw new AuthError(401, 'Missing or invalid Authorization header');
223
+ }
224
+ const token = authHeader.slice(7);
225
+ try {
226
+ const payload = jwt.verify(token, JWT_SECRET) as JwtPayload;
227
+ return payload;
228
+ } catch {
229
+ throw new AuthError(401, 'Invalid or expired token');
230
+ }
231
+ }
232
+
233
+ /**
234
+ * ロール確認。必要なロールを持たない場合は AuthError をスロー。
235
+ */
236
+ export function requireRoles(user: JwtPayload, requiredRoles: string[]): void {
237
+ const hasRole = requiredRoles.some(role => user.roles.includes(role));
238
+ if (!hasRole) {
239
+ throw new AuthError(403, \`Requires one of roles: \${requiredRoles.join(', ')}\`);
240
+ }
241
+ }
242
+
243
+ /**
244
+ * JWT 生成
245
+ */
246
+ export function generateToken(payload: { id: string; loginId: string; name: string; email: string; roles: string[] }): string {
247
+ return jwt.sign(
248
+ { sub: payload.id, loginId: payload.loginId, name: payload.name, email: payload.email, roles: payload.roles },
249
+ JWT_SECRET,
250
+ { expiresIn: process.env.JWT_EXPIRY || '24h' } as jwt.SignOptions
251
+ );
252
+ }
253
+
254
+ /**
255
+ * 認証エラー
256
+ */
257
+ export class AuthError extends Error {
258
+ constructor(public statusCode: number, message: string) {
259
+ super(message);
260
+ this.name = 'AuthError';
261
+ }
262
+ }
263
+
264
+ /**
265
+ * AuthError を HTTP レスポンスに変換
266
+ */
267
+ export function handleAuthError(error: unknown): HttpResponseInit | null {
268
+ if (error instanceof AuthError) {
269
+ return { status: error.statusCode, jsonBody: { error: error.message } };
270
+ }
271
+ return null;
272
+ }
273
+ `;
274
+ }
275
+
276
+ // ============================================================
277
+ // 4. C# Auth Functions テンプレート
278
+ // ============================================================
279
+
280
+ export function generateAuthFunctionsCSharp(
281
+ config: CustomJwtConfig,
282
+ provider: RdbProvider,
283
+ ): string {
284
+ const usingStatement = provider === "mysql"
285
+ ? `using MySqlConnector;`
286
+ : provider === "postgres"
287
+ ? `using Npgsql;`
288
+ : `using Microsoft.Data.SqlClient;`;
289
+
290
+ const connType = provider === "mysql"
291
+ ? "MySqlConnection"
292
+ : provider === "postgres"
293
+ ? "NpgsqlConnection"
294
+ : "SqlConnection";
295
+
296
+ const cmdType = provider === "mysql"
297
+ ? "MySqlCommand"
298
+ : provider === "postgres"
299
+ ? "NpgsqlCommand"
300
+ : "SqlCommand";
301
+
302
+ return `using System;
303
+ using System.Text.Json;
304
+ using Microsoft.Azure.Functions.Worker;
305
+ using Microsoft.Azure.Functions.Worker.Http;
306
+ ${usingStatement}
307
+ using BCrypt.Net;
308
+
309
+ namespace Functions.Auth
310
+ {
311
+ public class AuthFunctions
312
+ {
313
+ [Function("auth-login")]
314
+ public async Task<HttpResponseData> Login(
315
+ [HttpTrigger(AuthorizationLevel.Anonymous, "post", Route = "auth/login")] HttpRequestData request)
316
+ {
317
+ var body = await JsonSerializer.DeserializeAsync<LoginRequest>(request.Body);
318
+ if (body == null || string.IsNullOrEmpty(body.LoginId) || string.IsNullOrEmpty(body.Password))
319
+ {
320
+ var badReq = request.CreateResponse(System.Net.HttpStatusCode.BadRequest);
321
+ await badReq.WriteAsJsonAsync(new { error = "loginId and password are required" });
322
+ return badReq;
323
+ }
324
+
325
+ await using var conn = new ${connType}(
326
+ Environment.GetEnvironmentVariable("${config.userConnector.toUpperCase()}_CONNECTION_STRING"));
327
+ await conn.OpenAsync();
328
+
329
+ await using var cmd = new ${cmdType}(
330
+ "SELECT * FROM ${config.userTable} WHERE ${config.loginIdColumn} = @loginId", conn);
331
+ cmd.Parameters.AddWithValue("@loginId", body.LoginId);
332
+
333
+ await using var reader = await cmd.ExecuteReaderAsync();
334
+ if (!await reader.ReadAsync())
335
+ {
336
+ var unauthorized = request.CreateResponse(System.Net.HttpStatusCode.Unauthorized);
337
+ await unauthorized.WriteAsJsonAsync(new { error = "Invalid credentials" });
338
+ return unauthorized;
339
+ }
340
+
341
+ var passwordHash = reader["${config.passwordHashColumn}"].ToString()!;
342
+ if (!BCrypt.Net.BCrypt.Verify(body.Password, passwordHash))
343
+ {
344
+ var unauthorized = request.CreateResponse(System.Net.HttpStatusCode.Unauthorized);
345
+ await unauthorized.WriteAsJsonAsync(new { error = "Invalid credentials" });
346
+ return unauthorized;
347
+ }
348
+
349
+ var rolesStr = reader["${config.rolesColumn}"].ToString() ?? "[]";
350
+ string[] roles;
351
+ try { roles = JsonSerializer.Deserialize<string[]>(rolesStr) ?? Array.Empty<string>(); }
352
+ catch { roles = rolesStr.Split(',', StringSplitOptions.RemoveEmptyEntries | StringSplitOptions.TrimEntries); }
353
+
354
+ var userId = reader["id"].ToString()!;
355
+ var loginId = reader["${config.loginIdColumn}"].ToString()!;
356
+ var name = reader["name"]?.ToString() ?? loginId;
357
+ var email = reader["email"]?.ToString() ?? "";
358
+
359
+ var token = JwtHelper.GenerateToken(userId, loginId, name, email, roles);
360
+ var expiresAt = DateTime.UtcNow.AddHours(24).ToString("o");
361
+
362
+ var response = request.CreateResponse(System.Net.HttpStatusCode.OK);
363
+ await response.WriteAsJsonAsync(new
364
+ {
365
+ user = new { id = userId, loginId, name, email, roles },
366
+ token,
367
+ expiresAt
368
+ });
369
+ return response;
370
+ }
371
+
372
+ [Function("auth-me")]
373
+ public async Task<HttpResponseData> Me(
374
+ [HttpTrigger(AuthorizationLevel.Anonymous, "get", Route = "auth/me")] HttpRequestData request)
375
+ {
376
+ var (principal, errorResponse) = await JwtHelper.Authorize(request);
377
+ if (errorResponse != null) return errorResponse;
378
+
379
+ var response = request.CreateResponse(System.Net.HttpStatusCode.OK);
380
+ await response.WriteAsJsonAsync(new
381
+ {
382
+ sub = principal!.Sub,
383
+ loginId = principal.LoginId,
384
+ name = principal.Name,
385
+ email = principal.Email,
386
+ roles = principal.Roles
387
+ });
388
+ return response;
389
+ }
390
+
391
+ [Function("auth-logout")]
392
+ public async Task<HttpResponseData> Logout(
393
+ [HttpTrigger(AuthorizationLevel.Anonymous, "post", Route = "auth/logout")] HttpRequestData request)
394
+ {
395
+ var response = request.CreateResponse(System.Net.HttpStatusCode.OK);
396
+ await response.WriteAsJsonAsync(new { message = "Logged out" });
397
+ return response;
398
+ }
399
+ }
400
+
401
+ public class LoginRequest
402
+ {
403
+ [System.Text.Json.Serialization.JsonPropertyName("loginId")]
404
+ public string LoginId { get; set; } = "";
405
+ [System.Text.Json.Serialization.JsonPropertyName("password")]
406
+ public string Password { get; set; } = "";
407
+ }
408
+ }
409
+ `;
410
+ }
411
+
412
+ // ============================================================
413
+ // 5. C# JWT Helper
414
+ // ============================================================
415
+
416
+ export function generateJwtHelperCSharp(): string {
417
+ return `using System;
418
+ using System.IdentityModel.Tokens.Jwt;
419
+ using System.Security.Claims;
420
+ using System.Text;
421
+ using System.Text.Json;
422
+ using System.Threading.Tasks;
423
+ using Microsoft.Azure.Functions.Worker.Http;
424
+ using Microsoft.IdentityModel.Tokens;
425
+
426
+ namespace Functions.Auth
427
+ {
428
+ public class JwtPayload
429
+ {
430
+ public string Sub { get; set; } = "";
431
+ public string LoginId { get; set; } = "";
432
+ public string Name { get; set; } = "";
433
+ public string Email { get; set; } = "";
434
+ public string[] Roles { get; set; } = Array.Empty<string>();
435
+ }
436
+
437
+ public static class JwtHelper
438
+ {
439
+ private static string JwtSecret => Environment.GetEnvironmentVariable("JWT_SECRET") ?? "";
440
+
441
+ public static string GenerateToken(string userId, string loginId, string name, string email, string[] roles)
442
+ {
443
+ var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(JwtSecret));
444
+ var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
445
+
446
+ var claims = new List<Claim>
447
+ {
448
+ new(JwtRegisteredClaimNames.Sub, userId),
449
+ new("loginId", loginId),
450
+ new("name", name),
451
+ new("email", email),
452
+ };
453
+ foreach (var role in roles)
454
+ {
455
+ claims.Add(new Claim("roles", role));
456
+ }
457
+
458
+ var token = new JwtSecurityToken(
459
+ expires: DateTime.UtcNow.AddHours(24),
460
+ claims: claims,
461
+ signingCredentials: creds
462
+ );
463
+
464
+ return new JwtSecurityTokenHandler().WriteToken(token);
465
+ }
466
+
467
+ public static JwtPayload? ValidateToken(HttpRequestData request)
468
+ {
469
+ var authHeader = request.Headers.TryGetValues("Authorization", out var values)
470
+ ? values.FirstOrDefault() : null;
471
+
472
+ if (string.IsNullOrEmpty(authHeader) || !authHeader.StartsWith("Bearer "))
473
+ return null;
474
+
475
+ var token = authHeader["Bearer ".Length..];
476
+ var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(JwtSecret));
477
+
478
+ try
479
+ {
480
+ var handler = new JwtSecurityTokenHandler();
481
+ var principal = handler.ValidateToken(token, new TokenValidationParameters
482
+ {
483
+ ValidateIssuer = false,
484
+ ValidateAudience = false,
485
+ ValidateLifetime = true,
486
+ IssuerSigningKey = key,
487
+ }, out _);
488
+
489
+ return new JwtPayload
490
+ {
491
+ Sub = principal.FindFirst(JwtRegisteredClaimNames.Sub)?.Value ?? "",
492
+ LoginId = principal.FindFirst("loginId")?.Value ?? "",
493
+ Name = principal.FindFirst("name")?.Value ?? "",
494
+ Email = principal.FindFirst("email")?.Value ?? "",
495
+ Roles = principal.FindAll("roles").Select(c => c.Value).ToArray(),
496
+ };
497
+ }
498
+ catch
499
+ {
500
+ return null;
501
+ }
502
+ }
503
+
504
+ public static async Task<(JwtPayload?, HttpResponseData?)> Authorize(
505
+ HttpRequestData request, params string[] requiredRoles)
506
+ {
507
+ var payload = ValidateToken(request);
508
+ if (payload == null)
509
+ {
510
+ var unauthorized = request.CreateResponse(System.Net.HttpStatusCode.Unauthorized);
511
+ await unauthorized.WriteAsJsonAsync(new { error = "Unauthorized" });
512
+ return (null, unauthorized);
513
+ }
514
+
515
+ if (requiredRoles.Length > 0 && !requiredRoles.Any(r => payload.Roles.Contains(r)))
516
+ {
517
+ var forbidden = request.CreateResponse(System.Net.HttpStatusCode.Forbidden);
518
+ await forbidden.WriteAsJsonAsync(new { error = "Forbidden" });
519
+ return (null, forbidden);
520
+ }
521
+
522
+ return (payload, null);
523
+ }
524
+ }
525
+ }
526
+ `;
527
+ }
528
+
529
+ // ============================================================
530
+ // 6. Python Auth Functions テンプレート
531
+ // ============================================================
532
+
533
+ export function generateAuthFunctionsPython(
534
+ config: CustomJwtConfig,
535
+ provider: RdbProvider,
536
+ ): string {
537
+ const envPrefix = config.userConnector.toUpperCase();
538
+
539
+ const driverImport = provider === "mysql"
540
+ ? `import mysql.connector`
541
+ : provider === "postgres"
542
+ ? `import psycopg2\nimport psycopg2.extras`
543
+ : `import pymssql`;
544
+
545
+ const getConnection = provider === "mysql"
546
+ ? `def get_connection():
547
+ return mysql.connector.connect(
548
+ host=os.environ.get("${envPrefix}_HOST", "localhost"),
549
+ user=os.environ.get("${envPrefix}_USER", "root"),
550
+ password=os.environ.get("${envPrefix}_PASSWORD", ""),
551
+ database=os.environ.get("${envPrefix}_DATABASE", ""),
552
+ )`
553
+ : provider === "postgres"
554
+ ? `def get_connection():
555
+ return psycopg2.connect(os.environ.get("${envPrefix}_CONNECTION_STRING", ""))`
556
+ : `def get_connection():
557
+ return pymssql.connect(
558
+ server=os.environ.get("${envPrefix}_SERVER", "localhost"),
559
+ user=os.environ.get("${envPrefix}_USER", ""),
560
+ password=os.environ.get("${envPrefix}_PASSWORD", ""),
561
+ database=os.environ.get("${envPrefix}_DATABASE", ""),
562
+ )`;
563
+
564
+ const cursorCreate = provider === "mysql"
565
+ ? `cursor = conn.cursor(dictionary=True)`
566
+ : provider === "postgres"
567
+ ? `cursor = conn.cursor(cursor_factory=psycopg2.extras.RealDictCursor)`
568
+ : `cursor = conn.cursor(as_dict=True)`;
569
+
570
+ return `import json
571
+ import os
572
+ import logging
573
+ import azure.functions as func
574
+ import jwt
575
+ import bcrypt
576
+ ${driverImport}
577
+
578
+ auth_bp = func.Blueprint()
579
+
580
+ ${getConnection}
581
+
582
+
583
+ @auth_bp.route(route="auth/login", methods=["POST"], auth_level=func.AuthLevel.ANONYMOUS)
584
+ def auth_login(req: func.HttpRequest) -> func.HttpResponse:
585
+ try:
586
+ body = req.get_json()
587
+ login_id = body.get("loginId", "")
588
+ password = body.get("password", "")
589
+
590
+ if not login_id or not password:
591
+ return func.HttpResponse(
592
+ json.dumps({"error": "loginId and password are required"}),
593
+ status_code=400, mimetype="application/json"
594
+ )
595
+
596
+ conn = get_connection()
597
+ ${cursorCreate}
598
+ cursor.execute(
599
+ "SELECT * FROM ${config.userTable} WHERE ${config.loginIdColumn} = %s",
600
+ (login_id,)
601
+ )
602
+ user = cursor.fetchone()
603
+ cursor.close()
604
+ conn.close()
605
+
606
+ if not user:
607
+ return func.HttpResponse(
608
+ json.dumps({"error": "Invalid credentials"}),
609
+ status_code=401, mimetype="application/json"
610
+ )
611
+
612
+ if not bcrypt.checkpw(
613
+ password.encode("utf-8"),
614
+ user["${config.passwordHashColumn}"].encode("utf-8")
615
+ ):
616
+ return func.HttpResponse(
617
+ json.dumps({"error": "Invalid credentials"}),
618
+ status_code=401, mimetype="application/json"
619
+ )
620
+
621
+ roles_raw = user.get("${config.rolesColumn}", "[]")
622
+ try:
623
+ roles = json.loads(roles_raw) if isinstance(roles_raw, str) else list(roles_raw)
624
+ except (json.JSONDecodeError, TypeError):
625
+ roles = [r.strip() for r in str(roles_raw).split(",")]
626
+
627
+ from auth.jwt_helper import generate_token
628
+ import datetime
629
+
630
+ auth_user = {
631
+ "id": str(user["id"]),
632
+ "loginId": user["${config.loginIdColumn}"],
633
+ "name": user.get("name", user["${config.loginIdColumn}"]),
634
+ "email": user.get("email", ""),
635
+ "roles": roles,
636
+ }
637
+
638
+ token = generate_token(auth_user)
639
+ expires_at = (
640
+ datetime.datetime.utcnow() + datetime.timedelta(hours=24)
641
+ ).isoformat() + "Z"
642
+
643
+ return func.HttpResponse(
644
+ json.dumps({"user": auth_user, "token": token, "expiresAt": expires_at}),
645
+ status_code=200, mimetype="application/json"
646
+ )
647
+ except Exception as e:
648
+ logging.error(f"Login error: {e}")
649
+ return func.HttpResponse(
650
+ json.dumps({"error": "Login failed"}),
651
+ status_code=500, mimetype="application/json"
652
+ )
653
+
654
+
655
+ @auth_bp.route(route="auth/me", methods=["GET"], auth_level=func.AuthLevel.ANONYMOUS)
656
+ def auth_me(req: func.HttpRequest) -> func.HttpResponse:
657
+ from auth.jwt_helper import require_auth, handle_auth_error
658
+
659
+ try:
660
+ user = require_auth(req)
661
+ return func.HttpResponse(
662
+ json.dumps(user), status_code=200, mimetype="application/json"
663
+ )
664
+ except Exception as e:
665
+ err = handle_auth_error(e)
666
+ if err:
667
+ return err
668
+ return func.HttpResponse(
669
+ json.dumps({"error": "Internal server error"}),
670
+ status_code=500, mimetype="application/json"
671
+ )
672
+
673
+
674
+ @auth_bp.route(route="auth/logout", methods=["POST"], auth_level=func.AuthLevel.ANONYMOUS)
675
+ def auth_logout(req: func.HttpRequest) -> func.HttpResponse:
676
+ return func.HttpResponse(
677
+ json.dumps({"message": "Logged out"}),
678
+ status_code=200, mimetype="application/json"
679
+ )
680
+ `;
681
+ }
682
+
683
+ // ============================================================
684
+ // 7. Python JWT Helper
685
+ // ============================================================
686
+
687
+ export function generateJwtHelperPython(): string {
688
+ return `import os
689
+ import json
690
+ import jwt
691
+ import azure.functions as func
692
+
693
+
694
+ JWT_SECRET = os.environ.get("JWT_SECRET", "")
695
+
696
+
697
+ def require_auth(req: func.HttpRequest) -> dict:
698
+ """JWT 検証。無効な場合は AuthError を raise。"""
699
+ auth_header = req.headers.get("authorization", "")
700
+ if not auth_header.startswith("Bearer "):
701
+ raise AuthError(401, "Missing or invalid Authorization header")
702
+
703
+ token = auth_header[7:]
704
+ try:
705
+ payload = jwt.decode(token, JWT_SECRET, algorithms=["HS256"])
706
+ return {
707
+ "sub": payload.get("sub", ""),
708
+ "loginId": payload.get("loginId", ""),
709
+ "name": payload.get("name", ""),
710
+ "email": payload.get("email", ""),
711
+ "roles": payload.get("roles", []),
712
+ }
713
+ except jwt.ExpiredSignatureError:
714
+ raise AuthError(401, "Token expired")
715
+ except jwt.InvalidTokenError:
716
+ raise AuthError(401, "Invalid token")
717
+
718
+
719
+ def require_roles(user: dict, required_roles: list[str]) -> None:
720
+ """ロール確認。必要なロールを持たない場合は AuthError を raise。"""
721
+ user_roles = user.get("roles", [])
722
+ if not any(role in user_roles for role in required_roles):
723
+ raise AuthError(403, f"Requires one of roles: {', '.join(required_roles)}")
724
+
725
+
726
+ def generate_token(payload: dict) -> str:
727
+ """JWT 生成"""
728
+ import datetime
729
+
730
+ return jwt.encode(
731
+ {
732
+ "sub": payload["id"],
733
+ "loginId": payload["loginId"],
734
+ "name": payload["name"],
735
+ "email": payload["email"],
736
+ "roles": payload["roles"],
737
+ "exp": datetime.datetime.utcnow() + datetime.timedelta(hours=24),
738
+ },
739
+ JWT_SECRET,
740
+ algorithm="HS256",
741
+ )
742
+
743
+
744
+ class AuthError(Exception):
745
+ def __init__(self, status_code: int, message: str):
746
+ super().__init__(message)
747
+ self.status_code = status_code
748
+
749
+
750
+ def handle_auth_error(error: Exception) -> func.HttpResponse | None:
751
+ """AuthError を HTTP レスポンスに変換"""
752
+ if isinstance(error, AuthError):
753
+ return func.HttpResponse(
754
+ json.dumps({"error": str(error)}),
755
+ status_code=error.status_code,
756
+ mimetype="application/json",
757
+ )
758
+ return None
759
+ `;
760
+ }
761
+
762
+ // ============================================================
763
+ // 8. BFF Auth Routes(Next.js API Routes)
764
+ // ============================================================
765
+
766
+ export function generateBFFAuthLoginRoute(projectName: string, sharedPackageName: string): string {
767
+ const cookieName = projectName.replace(/^@[^/]+\//, '').replace(/[^a-z0-9-]/g, '-') + '-auth-token';
768
+ return `import { NextRequest, NextResponse } from 'next/server';
769
+ import { LoginRequest, LoginResponse } from '${sharedPackageName}';
770
+
771
+ export async function POST(request: NextRequest) {
772
+ const FUNCTIONS_BASE_URL = process.env.BACKEND_FUNCTIONS_BASE_URL || process.env.FUNCTIONS_BASE_URL || 'http://localhost:7071';
773
+ try {
774
+ const body = await request.json();
775
+ const validated = LoginRequest.parse(body);
776
+
777
+ const result = await fetch(\`\${FUNCTIONS_BASE_URL}/api/auth/login\`, {
778
+ method: 'POST',
779
+ headers: { 'Content-Type': 'application/json' },
780
+ body: JSON.stringify(validated),
781
+ });
782
+
783
+ if (!result.ok) {
784
+ const error = await result.json().catch(() => ({ error: 'Authentication failed' }));
785
+ return NextResponse.json(error, { status: result.status });
786
+ }
787
+
788
+ const data = LoginResponse.parse(await result.json());
789
+
790
+ const response = NextResponse.json({ user: data.user });
791
+ response.cookies.set('${cookieName}', data.token, {
792
+ httpOnly: true,
793
+ secure: process.env.NODE_ENV === 'production',
794
+ sameSite: 'lax',
795
+ path: '/',
796
+ maxAge: 86400,
797
+ });
798
+ return response;
799
+ } catch (error: any) {
800
+ console.error('[BFF] Login error:', error);
801
+ return NextResponse.json({ error: 'Login failed' }, { status: 500 });
802
+ }
803
+ }
804
+ `;
805
+ }
806
+
807
+ export function generateBFFAuthLogoutRoute(projectName: string): string {
808
+ const cookieName = projectName.replace(/^@[^/]+\//, '').replace(/[^a-z0-9-]/g, '-') + '-auth-token';
809
+ return `import { NextResponse } from 'next/server';
810
+
811
+ export async function POST() {
812
+ const response = NextResponse.json({ message: 'Logged out' });
813
+ response.cookies.delete('${cookieName}');
814
+ return response;
815
+ }
816
+ `;
817
+ }
818
+
819
+ export function generateBFFAuthMeRoute(_sharedPackageName?: string): string {
820
+ void _sharedPackageName;
821
+ return `import { NextResponse } from 'next/server';
822
+ import { headers } from 'next/headers';
823
+
824
+ export async function GET() {
825
+ const FUNCTIONS_BASE_URL = process.env.BACKEND_FUNCTIONS_BASE_URL || process.env.FUNCTIONS_BASE_URL || 'http://localhost:7071';
826
+ try {
827
+ const reqHeaders = await headers();
828
+ const authorization = reqHeaders.get('authorization');
829
+
830
+ if (!authorization) {
831
+ return NextResponse.json({ error: 'Unauthorized' }, { status: 401 });
832
+ }
833
+
834
+ const result = await fetch(\`\${FUNCTIONS_BASE_URL}/api/auth/me\`, {
835
+ headers: { Authorization: authorization },
836
+ });
837
+
838
+ if (!result.ok) {
839
+ return NextResponse.json({ error: 'Unauthorized' }, { status: result.status });
840
+ }
841
+
842
+ const data = await result.json();
843
+ return NextResponse.json(data);
844
+ } catch (error: any) {
845
+ console.error('[BFF] Auth/me error:', error);
846
+ return NextResponse.json({ error: 'Internal server error' }, { status: 500 });
847
+ }
848
+ }
849
+ `;
850
+ }
851
+
852
+ // ============================================================
853
+ // 9. Next.js Proxy (formerly Middleware)
854
+ // ============================================================
855
+
856
+ export function generateProxy(projectName: string): string {
857
+ const cookieName = projectName.replace(/^@[^/]+\//, '').replace(/[^a-z0-9-]/g, '-') + '-auth-token';
858
+ return `import { NextResponse } from 'next/server';
859
+ import type { NextRequest } from 'next/server';
860
+
861
+ const AUTH_COOKIE_NAME = '${cookieName}';
862
+ const PUBLIC_PATHS = ['/login', '/api/auth/login', '/api/auth/logout'];
863
+
864
+ export function proxy(request: NextRequest) {
865
+ const { pathname } = request.nextUrl;
866
+
867
+ // 公開パス・静的アセットはスキップ
868
+ if (PUBLIC_PATHS.some(p => pathname.startsWith(p))) return NextResponse.next();
869
+ if (pathname.startsWith('/_next') || pathname.match(/\\.(ico|png|jpg|svg|css|js)$/)) {
870
+ return NextResponse.next();
871
+ }
872
+
873
+ const token = request.cookies.get(AUTH_COOKIE_NAME)?.value;
874
+
875
+ if (!token) {
876
+ if (pathname.startsWith('/api/')) {
877
+ return NextResponse.json({ error: 'Unauthorized' }, { status: 401 });
878
+ }
879
+ return NextResponse.redirect(new URL('/login', request.url));
880
+ }
881
+
882
+ // JWT 有効期限の簡易チェック(署名検証なし)
883
+ try {
884
+ const payload = JSON.parse(atob(token.split('.')[1]));
885
+ if (payload.exp && payload.exp * 1000 < Date.now()) {
886
+ const response = pathname.startsWith('/api/')
887
+ ? NextResponse.json({ error: 'Token expired' }, { status: 401 })
888
+ : NextResponse.redirect(new URL('/login', request.url));
889
+ response.cookies.delete(AUTH_COOKIE_NAME);
890
+ return response;
891
+ }
892
+ } catch {
893
+ const response = pathname.startsWith('/api/')
894
+ ? NextResponse.json({ error: 'Invalid token' }, { status: 401 })
895
+ : NextResponse.redirect(new URL('/login', request.url));
896
+ response.cookies.delete(AUTH_COOKIE_NAME);
897
+ return response;
898
+ }
899
+
900
+ // Authorization ヘッダーを注入(BFF callFunction が自動転送できるように)
901
+ const requestHeaders = new Headers(request.headers);
902
+ requestHeaders.set('Authorization', \`Bearer \${token}\`);
903
+ return NextResponse.next({
904
+ request: { headers: requestHeaders },
905
+ });
906
+ }
907
+ `;
908
+ }
909
+
910
+ // ============================================================
911
+ // 10. ログインページ
912
+ // ============================================================
913
+
914
+ export function generateLoginPage(): string {
915
+ return `'use client';
916
+
917
+ import { useState } from 'react';
918
+ import { useRouter } from 'next/navigation';
919
+
920
+ export default function LoginPage() {
921
+ const [loginId, setLoginId] = useState('');
922
+ const [password, setPassword] = useState('');
923
+ const [error, setError] = useState('');
924
+ const [loading, setLoading] = useState(false);
925
+ const router = useRouter();
926
+
927
+ const handleSubmit = async (e: React.FormEvent) => {
928
+ e.preventDefault();
929
+ setError('');
930
+ setLoading(true);
931
+
932
+ try {
933
+ const res = await fetch('/api/auth/login', {
934
+ method: 'POST',
935
+ headers: { 'Content-Type': 'application/json' },
936
+ body: JSON.stringify({ loginId, password }),
937
+ });
938
+
939
+ if (!res.ok) {
940
+ const data = await res.json().catch(() => ({}));
941
+ setError(data.error || 'ログインに失敗しました');
942
+ return;
943
+ }
944
+
945
+ router.push('/');
946
+ router.refresh();
947
+ } catch {
948
+ setError('通信エラーが発生しました');
949
+ } finally {
950
+ setLoading(false);
951
+ }
952
+ };
953
+
954
+ return (
955
+ <div className="min-h-screen flex items-center justify-center bg-gray-50">
956
+ <div className="w-full max-w-md p-8 bg-white rounded-lg shadow-md">
957
+ <h1 className="text-2xl font-bold text-center mb-6">ログイン</h1>
958
+ {error && (
959
+ <div className="mb-4 p-3 bg-red-50 border border-red-200 text-red-700 rounded text-sm">
960
+ {error}
961
+ </div>
962
+ )}
963
+ <form onSubmit={handleSubmit} className="space-y-4">
964
+ <div>
965
+ <label htmlFor="loginId" className="block text-sm font-medium text-gray-700 mb-1">
966
+ ログインID
967
+ </label>
968
+ <input
969
+ id="loginId"
970
+ type="text"
971
+ value={loginId}
972
+ onChange={(e) => setLoginId(e.target.value)}
973
+ className="w-full px-3 py-2 border border-gray-300 rounded-md focus:outline-none focus:ring-2 focus:ring-blue-500"
974
+ required
975
+ autoFocus
976
+ />
977
+ </div>
978
+ <div>
979
+ <label htmlFor="password" className="block text-sm font-medium text-gray-700 mb-1">
980
+ パスワード
981
+ </label>
982
+ <input
983
+ id="password"
984
+ type="password"
985
+ value={password}
986
+ onChange={(e) => setPassword(e.target.value)}
987
+ className="w-full px-3 py-2 border border-gray-300 rounded-md focus:outline-none focus:ring-2 focus:ring-blue-500"
988
+ required
989
+ />
990
+ </div>
991
+ <button
992
+ type="submit"
993
+ disabled={loading}
994
+ className="w-full py-2 px-4 bg-blue-600 text-white rounded-md hover:bg-blue-700 disabled:opacity-50 disabled:cursor-not-allowed transition-colors"
995
+ >
996
+ {loading ? 'ログイン中...' : 'ログイン'}
997
+ </button>
998
+ </form>
999
+ </div>
1000
+ </div>
1001
+ );
1002
+ }
1003
+ `;
1004
+ }
1005
+
1006
+ // ============================================================
1007
+ // 11. React Auth Context
1008
+ // ============================================================
1009
+
1010
+ export function generateAuthContext(): string {
1011
+ return `'use client';
1012
+
1013
+ import { createContext, useContext, useEffect, useState, useCallback, ReactNode } from 'react';
1014
+ import { useRouter } from 'next/navigation';
1015
+
1016
+ interface AuthUser {
1017
+ id: string;
1018
+ loginId: string;
1019
+ name: string;
1020
+ email: string;
1021
+ roles: string[];
1022
+ }
1023
+
1024
+ interface AuthContextType {
1025
+ user: AuthUser | null;
1026
+ loading: boolean;
1027
+ login: (loginId: string, password: string) => Promise<{ success: boolean; error?: string }>;
1028
+ logout: () => Promise<void>;
1029
+ hasRole: (role: string) => boolean;
1030
+ hasAnyRole: (roles: string[]) => boolean;
1031
+ }
1032
+
1033
+ const AuthContext = createContext<AuthContextType | undefined>(undefined);
1034
+
1035
+ export function AuthProvider({ children }: { children: ReactNode }) {
1036
+ const [user, setUser] = useState<AuthUser | null>(null);
1037
+ const [loading, setLoading] = useState(true);
1038
+ const router = useRouter();
1039
+
1040
+ const fetchUser = useCallback(async () => {
1041
+ try {
1042
+ const res = await fetch('/api/auth/me');
1043
+ if (res.ok) {
1044
+ const data = await res.json();
1045
+ setUser(data);
1046
+ } else {
1047
+ setUser(null);
1048
+ }
1049
+ } catch {
1050
+ setUser(null);
1051
+ } finally {
1052
+ setLoading(false);
1053
+ }
1054
+ }, []);
1055
+
1056
+ useEffect(() => {
1057
+ fetchUser();
1058
+ }, [fetchUser]);
1059
+
1060
+ const login = async (loginId: string, password: string) => {
1061
+ try {
1062
+ const res = await fetch('/api/auth/login', {
1063
+ method: 'POST',
1064
+ headers: { 'Content-Type': 'application/json' },
1065
+ body: JSON.stringify({ loginId, password }),
1066
+ });
1067
+
1068
+ if (!res.ok) {
1069
+ const data = await res.json().catch(() => ({}));
1070
+ return { success: false, error: data.error || 'Login failed' };
1071
+ }
1072
+
1073
+ const data = await res.json();
1074
+ setUser(data.user);
1075
+ return { success: true };
1076
+ } catch {
1077
+ return { success: false, error: 'Network error' };
1078
+ }
1079
+ };
1080
+
1081
+ const logout = async () => {
1082
+ await fetch('/api/auth/logout', { method: 'POST' });
1083
+ setUser(null);
1084
+ router.push('/login');
1085
+ };
1086
+
1087
+ const hasRole = (role: string) => user?.roles?.includes(role) ?? false;
1088
+ const hasAnyRole = (roles: string[]) => roles.some(r => hasRole(r));
1089
+
1090
+ return (
1091
+ <AuthContext.Provider value={{ user, loading, login, logout, hasRole, hasAnyRole }}>
1092
+ {children}
1093
+ </AuthContext.Provider>
1094
+ );
1095
+ }
1096
+
1097
+ export function useAuth() {
1098
+ const context = useContext(AuthContext);
1099
+ if (!context) {
1100
+ throw new Error('useAuth must be used within an AuthProvider');
1101
+ }
1102
+ return context;
1103
+ }
1104
+ `;
1105
+ }
1106
+
1107
+ // ============================================================
1108
+ // 12. callFunction 認証対応版
1109
+ // ============================================================
1110
+
1111
+ export function generateBFFCallFunctionWithAuth(): string {
1112
+ return `import { NextRequest, NextResponse } from 'next/server';
1113
+ import { headers } from 'next/headers';
1114
+ import { z } from 'zod/v4';
1115
+
1116
+ /**
1117
+ * SwallowKit BFF Call Function Helper (Auth-enabled)
1118
+ * Azure Functions を呼び出す汎用ヘルパー(Authorization ヘッダー自動転送対応)
1119
+ */
1120
+
1121
+ function getFunctionsBaseUrl(): string {
1122
+ return process.env.BACKEND_FUNCTIONS_BASE_URL || process.env.FUNCTIONS_BASE_URL || 'http://localhost:7071';
1123
+ }
1124
+
1125
+ interface CallFunctionConfig<TInput = any, TOutput = any> {
1126
+ /** HTTP メソッド */
1127
+ method: 'GET' | 'POST' | 'PUT' | 'DELETE';
1128
+ /** Azure Functions のパス (例: '/api/todo', '/api/todo/123') */
1129
+ path: string;
1130
+ /** リクエストボディ (POST/PUT 用) */
1131
+ body?: any;
1132
+ /** 入力バリデーション用 Zod スキーマ (省略時はバリデーションなし) */
1133
+ inputSchema?: z.ZodSchema<TInput>;
1134
+ /** 出力バリデーション用 Zod スキーマ (省略時はそのまま返す) */
1135
+ responseSchema?: z.ZodSchema<TOutput>;
1136
+ /** 成功時の HTTP ステータスコード (デフォルト: 200) */
1137
+ successStatus?: number;
1138
+ }
1139
+
1140
+ export async function callFunction<TInput = any, TOutput = any>(
1141
+ config: CallFunctionConfig<TInput, TOutput>
1142
+ ): Promise<NextResponse> {
1143
+ const { method, path, body, inputSchema, responseSchema, successStatus = 200 } = config;
1144
+
1145
+ try {
1146
+ // 入力バリデーション
1147
+ let validatedBody = body;
1148
+ if (inputSchema && body !== undefined) {
1149
+ const result = inputSchema.safeParse(body);
1150
+ if (!result.success) {
1151
+ console.error('[BFF] Validation failed:', result.error.issues);
1152
+ return NextResponse.json(
1153
+ { error: 'Validation failed', details: result.error.issues },
1154
+ { status: 400 }
1155
+ );
1156
+ }
1157
+ validatedBody = result.data;
1158
+ }
1159
+
1160
+ // Azure Functions を呼び出し
1161
+ const functionsBaseUrl = getFunctionsBaseUrl();
1162
+ const url = functionsBaseUrl + path;
1163
+ console.log(\`[BFF] \${method} \${url}\`);
1164
+
1165
+ // Authorization ヘッダーの転送(Proxy が cookie → Authorization に変換済み)
1166
+ const fetchHeaders: Record<string, string> = {
1167
+ 'Content-Type': 'application/json',
1168
+ };
1169
+ try {
1170
+ const reqHeaders = await headers();
1171
+ const authorization = reqHeaders.get('authorization');
1172
+ if (authorization) {
1173
+ fetchHeaders['Authorization'] = authorization;
1174
+ }
1175
+ } catch {
1176
+ // headers() が使えないコンテキスト(ISR 等)では無視
1177
+ }
1178
+
1179
+ const response = await fetch(url, {
1180
+ method,
1181
+ headers: fetchHeaders,
1182
+ body: validatedBody !== undefined ? JSON.stringify(validatedBody) : undefined,
1183
+ });
1184
+
1185
+ console.log('[BFF] Functions response status:', response.status);
1186
+
1187
+ // エラーレスポンスの転送
1188
+ if (!response.ok) {
1189
+ const text = await response.text();
1190
+ console.error('[BFF] Functions error:', { status: response.status, body: text });
1191
+
1192
+ let errorMessage = 'Request failed';
1193
+ try {
1194
+ const error = JSON.parse(text);
1195
+ errorMessage = error.error || errorMessage;
1196
+ } catch {
1197
+ errorMessage = text || errorMessage;
1198
+ }
1199
+ return NextResponse.json({ error: errorMessage }, { status: response.status });
1200
+ }
1201
+
1202
+ // DELETE 204 の場合はボディなし
1203
+ if (response.status === 204 || method === 'DELETE') {
1204
+ return new NextResponse(null, { status: 204 });
1205
+ }
1206
+
1207
+ // レスポンスの取得と出力バリデーション
1208
+ const data = await response.json();
1209
+
1210
+ if (responseSchema) {
1211
+ const validated = responseSchema.parse(data);
1212
+ return NextResponse.json(validated, { status: successStatus });
1213
+ }
1214
+
1215
+ return NextResponse.json(data, { status: successStatus });
1216
+ } catch (error: any) {
1217
+ console.error(\`[BFF] Error:\`, error);
1218
+ return NextResponse.json(
1219
+ { error: error.message || 'Internal server error' },
1220
+ { status: 500 }
1221
+ );
1222
+ }
1223
+ }
1224
+ `;
1225
+ }
1226
+
1227
+ // ============================================================
1228
+ // 13. scaffold 用ロールガード挿入ヘルパー
1229
+ // ============================================================
1230
+
1231
+ /**
1232
+ * TypeScript Functions のハンドラーにロールガードを挿入するためのインポート文を生成
1233
+ */
1234
+ export function generateAuthImportTS(): string {
1235
+ return `import { requireAuth, requireRoles, handleAuthError } from './auth/jwt-helper';`;
1236
+ }
1237
+
1238
+ /**
1239
+ * TypeScript Functions のハンドラー先頭に挿入する認証チェックコードを生成
1240
+ */
1241
+ export function generateAuthGuardTS(policy: ModelAuthPolicy, operation: 'read' | 'write'): string {
1242
+ const roles = operation === 'read'
1243
+ ? (policy.read || policy.roles || [])
1244
+ : (policy.write || policy.roles || []);
1245
+
1246
+ if (roles.length > 0) {
1247
+ return ` const authUser = requireAuth(request);
1248
+ requireRoles(authUser, ${JSON.stringify(roles)});`;
1249
+ }
1250
+ return ` const authUser = requireAuth(request);`;
1251
+ }
1252
+
1253
+ /**
1254
+ * C# Functions のハンドラーに挿入するロールガードコードを生成
1255
+ */
1256
+ export function generateAuthGuardCSharp(policy: ModelAuthPolicy, operation: 'read' | 'write'): string {
1257
+ const roles = operation === 'read'
1258
+ ? (policy.read || policy.roles || [])
1259
+ : (policy.write || policy.roles || []);
1260
+
1261
+ if (roles.length > 0) {
1262
+ const rolesStr = roles.map(r => `"${r}"`).join(', ');
1263
+ return ` var (principal, errorResponse) = await JwtHelper.Authorize(request, ${rolesStr});
1264
+ if (errorResponse != null) return errorResponse;`;
1265
+ }
1266
+ return ` var (principal, errorResponse) = await JwtHelper.Authorize(request);
1267
+ if (errorResponse != null) return errorResponse;`;
1268
+ }
1269
+
1270
+ /**
1271
+ * Python Functions のハンドラーに挿入するロールガードコードを生成
1272
+ */
1273
+ export function generateAuthGuardPython(policy: ModelAuthPolicy, operation: 'read' | 'write'): string {
1274
+ const roles = operation === 'read'
1275
+ ? (policy.read || policy.roles || [])
1276
+ : (policy.write || policy.roles || []);
1277
+
1278
+ if (roles.length > 0) {
1279
+ const rolesStr = roles.map(r => `"${r}"`).join(', ');
1280
+ return ` user = require_auth(req)
1281
+ require_roles(user, [${rolesStr}])`;
1282
+ }
1283
+ return ` user = require_auth(req)`;
1284
+ }