web-agent-bridge 1.2.0 → 2.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -21
- package/README.ar.md +572 -446
- package/README.md +968 -933
- package/bin/agent-runner.js +465 -0
- package/bin/cli.js +138 -80
- package/bin/wab.js +80 -80
- package/examples/bidi-agent.js +119 -119
- package/examples/mcp-agent.js +94 -94
- package/examples/next-app-router/README.md +44 -0
- package/examples/puppeteer-agent.js +108 -108
- package/examples/saas-dashboard/README.md +55 -0
- package/examples/shopify-hydrogen/README.md +74 -0
- package/examples/vision-agent.js +171 -171
- package/examples/wordpress-elementor/README.md +77 -0
- package/package.json +71 -78
- package/public/.well-known/ai-assets.json +59 -0
- package/public/admin/login.html +84 -84
- package/public/ai.html +196 -0
- package/public/cookies.html +208 -208
- package/public/css/premium.css +317 -0
- package/public/css/styles.css +1235 -1235
- package/public/dashboard.html +704 -704
- package/public/demo.html +259 -0
- package/public/docs.html +585 -585
- package/public/feed.xml +89 -0
- package/public/index.html +581 -332
- package/public/js/auth-nav.js +31 -31
- package/public/js/auth-redirect.js +12 -12
- package/public/js/cookie-consent.js +56 -56
- package/public/js/wab-demo-page.js +721 -0
- package/public/js/ws-client.js +74 -74
- package/public/llms-full.txt +309 -0
- package/public/llms.txt +85 -0
- package/public/login.html +83 -83
- package/public/openapi.json +580 -0
- package/public/premium-dashboard.html +2487 -0
- package/public/premium.html +791 -0
- package/public/privacy.html +295 -295
- package/public/register.html +103 -103
- package/public/robots.txt +87 -0
- package/public/script/wab-consent.d.ts +36 -0
- package/public/script/wab-consent.js +104 -0
- package/public/script/wab-schema.js +131 -0
- package/public/script/wab.d.ts +108 -0
- package/public/script/wab.min.js +405 -0
- package/public/sitemap.xml +93 -0
- package/public/sovereign.html +660 -0
- package/public/terms.html +254 -254
- package/public/video/tutorial.mp4 +0 -0
- package/script/ai-agent-bridge.js +1558 -1513
- package/sdk/README.md +55 -55
- package/sdk/index.d.ts +118 -0
- package/sdk/index.js +257 -203
- package/sdk/package.json +14 -14
- package/sdk/schema-discovery.js +83 -0
- package/server/config/secrets.js +94 -92
- package/server/index.js +2 -9
- package/server/middleware/adminAuth.js +30 -30
- package/server/middleware/auth.js +41 -41
- package/server/middleware/rateLimits.js +24 -24
- package/server/migrations/001_add_analytics_indexes.sql +7 -7
- package/server/migrations/002_premium_features.sql +418 -0
- package/server/models/adapters/index.js +33 -33
- package/server/models/adapters/mysql.js +183 -183
- package/server/models/adapters/postgresql.js +172 -172
- package/server/models/adapters/sqlite.js +7 -7
- package/server/models/db.js +561 -561
- package/server/routes/admin-premium.js +671 -0
- package/server/routes/admin.js +247 -247
- package/server/routes/api.js +131 -138
- package/server/routes/auth.js +51 -51
- package/server/routes/billing.js +45 -45
- package/server/routes/discovery.js +406 -329
- package/server/routes/license.js +240 -240
- package/server/routes/noscript.js +543 -543
- package/server/routes/premium-v2.js +686 -0
- package/server/routes/premium.js +724 -0
- package/server/routes/sovereign.js +307 -0
- package/server/routes/wab-api.js +476 -476
- package/server/services/agent-memory.js +625 -0
- package/server/services/email.js +204 -204
- package/server/services/fairness.js +420 -420
- package/server/services/negotiation.js +439 -0
- package/server/services/plugins.js +747 -0
- package/server/services/premium.js +1883 -0
- package/server/services/reputation.js +465 -0
- package/server/services/self-healing.js +843 -0
- package/server/services/stripe.js +192 -192
- package/server/services/swarm.js +788 -0
- package/server/services/verification.js +481 -0
- package/server/services/vision.js +871 -0
- package/server/utils/cache.js +125 -125
- package/server/utils/migrate.js +81 -81
- package/server/utils/secureFields.js +50 -50
- package/server/ws.js +101 -101
- package/templates/artisan-marketplace.yaml +104 -0
- package/templates/book-price-scout.yaml +98 -0
- package/templates/electronics-price-tracker.yaml +108 -0
- package/templates/flight-deal-hunter.yaml +113 -0
- package/templates/freelancer-direct.yaml +116 -0
- package/templates/grocery-price-compare.yaml +93 -0
- package/templates/hotel-direct-booking.yaml +113 -0
- package/templates/local-services.yaml +98 -0
- package/templates/olive-oil-tunisia.yaml +88 -0
- package/templates/organic-farm-fresh.yaml +101 -0
- package/templates/restaurant-direct.yaml +97 -0
- package/docs/DEPLOY.md +0 -118
- package/docs/SPEC.md +0 -1540
- package/wab-mcp-adapter/README.md +0 -136
- package/wab-mcp-adapter/index.js +0 -555
- package/wab-mcp-adapter/package.json +0 -17
package/server/config/secrets.js
CHANGED
|
@@ -1,92 +1,94 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Central JWT and startup secret checks.
|
|
3
|
-
* User tokens and admin tokens use different secrets and audiences in production.
|
|
4
|
-
*/
|
|
5
|
-
|
|
6
|
-
const
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
const
|
|
10
|
-
const
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
const
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
function
|
|
20
|
-
|
|
21
|
-
}
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
}
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
{
|
|
60
|
-
|
|
61
|
-
}
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
{
|
|
68
|
-
|
|
69
|
-
}
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
1
|
+
/**
|
|
2
|
+
* Central JWT and startup secret checks.
|
|
3
|
+
* User tokens and admin tokens use different secrets and audiences in production.
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
const crypto = require('crypto');
|
|
7
|
+
const jwt = require('jsonwebtoken');
|
|
8
|
+
|
|
9
|
+
const JWT_ISSUER = 'wab';
|
|
10
|
+
const JWT_AUD_USER = 'wab:user';
|
|
11
|
+
const JWT_AUD_ADMIN = 'wab:admin';
|
|
12
|
+
|
|
13
|
+
const jwtVerifyUser = { issuer: JWT_ISSUER, audience: JWT_AUD_USER };
|
|
14
|
+
const jwtVerifyAdmin = { issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN };
|
|
15
|
+
|
|
16
|
+
let _autoUserSecret = null;
|
|
17
|
+
let _autoAdminSecret = null;
|
|
18
|
+
|
|
19
|
+
function generateAutoSecret(label) {
|
|
20
|
+
const secret = crypto.randomBytes(48).toString('base64url');
|
|
21
|
+
console.warn(`[WAB] WARNING: ${label} not set — generated ephemeral secret. Tokens will not survive restarts. Set ${label} env var for persistent sessions.`);
|
|
22
|
+
return secret;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
function isTest() {
|
|
26
|
+
return process.env.NODE_ENV === 'test';
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
function isProd() {
|
|
30
|
+
return process.env.NODE_ENV === 'production';
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
function assertSecretsAtStartup() {
|
|
34
|
+
if (isTest()) return;
|
|
35
|
+
if (isProd() && !process.env.JWT_SECRET) {
|
|
36
|
+
_autoUserSecret = generateAutoSecret('JWT_SECRET');
|
|
37
|
+
}
|
|
38
|
+
if (isProd() && !process.env.JWT_SECRET_ADMIN) {
|
|
39
|
+
_autoAdminSecret = generateAutoSecret('JWT_SECRET_ADMIN');
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
function getJwtUserSecret() {
|
|
44
|
+
if (isTest()) {
|
|
45
|
+
return process.env.JWT_SECRET || 'test-secret-key-for-testing';
|
|
46
|
+
}
|
|
47
|
+
return process.env.JWT_SECRET || _autoUserSecret || 'dev-user-secret-change-in-development';
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
function getJwtAdminSecret() {
|
|
51
|
+
if (isTest()) {
|
|
52
|
+
return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'test-secret-key-for-testing-admin';
|
|
53
|
+
}
|
|
54
|
+
return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || _autoAdminSecret || _autoUserSecret || 'dev-admin-secret-change-in-development';
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
function signUserToken(payload, options = {}) {
|
|
58
|
+
return jwt.sign(
|
|
59
|
+
{ ...payload },
|
|
60
|
+
getJwtUserSecret(),
|
|
61
|
+
{ expiresIn: options.expiresIn || '7d', issuer: JWT_ISSUER, audience: JWT_AUD_USER }
|
|
62
|
+
);
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
function signAdminToken(payload, options = {}) {
|
|
66
|
+
return jwt.sign(
|
|
67
|
+
{ ...payload },
|
|
68
|
+
getJwtAdminSecret(),
|
|
69
|
+
{ expiresIn: options.expiresIn || '12h', issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN }
|
|
70
|
+
);
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
function verifyUserToken(token) {
|
|
74
|
+
return jwt.verify(token, getJwtUserSecret(), jwtVerifyUser);
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
function verifyAdminToken(token) {
|
|
78
|
+
return jwt.verify(token, getJwtAdminSecret(), jwtVerifyAdmin);
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
module.exports = {
|
|
82
|
+
assertSecretsAtStartup,
|
|
83
|
+
getJwtUserSecret,
|
|
84
|
+
getJwtAdminSecret,
|
|
85
|
+
signUserToken,
|
|
86
|
+
signAdminToken,
|
|
87
|
+
verifyUserToken,
|
|
88
|
+
verifyAdminToken,
|
|
89
|
+
JWT_ISSUER,
|
|
90
|
+
JWT_AUD_USER,
|
|
91
|
+
JWT_AUD_ADMIN,
|
|
92
|
+
jwtVerifyUser,
|
|
93
|
+
jwtVerifyAdmin
|
|
94
|
+
};
|
package/server/index.js
CHANGED
|
@@ -18,9 +18,7 @@ const apiRoutes = require('./routes/api');
|
|
|
18
18
|
const licenseRoutes = require('./routes/license');
|
|
19
19
|
const adminRoutes = require('./routes/admin');
|
|
20
20
|
const billingRoutes = require('./routes/billing');
|
|
21
|
-
const
|
|
22
|
-
const discoveryRoutes = require('./routes/discovery');
|
|
23
|
-
const wabApiRoutes = require('./routes/wab-api');
|
|
21
|
+
const sovereignRoutes = require('./routes/sovereign');
|
|
24
22
|
const { handleWebhookRequest } = require('./services/stripe');
|
|
25
23
|
|
|
26
24
|
const app = express();
|
|
@@ -114,9 +112,7 @@ app.use('/api', apiLimiter, apiRoutes);
|
|
|
114
112
|
app.use('/api/license', licenseLimiter, licenseRoutes);
|
|
115
113
|
app.use('/api/admin', apiLimiter, adminRoutes);
|
|
116
114
|
app.use('/api/billing', apiLimiter, billingRoutes);
|
|
117
|
-
app.use('/api/
|
|
118
|
-
app.use('/api/wab', wabApiRoutes);
|
|
119
|
-
app.use('/', discoveryRoutes);
|
|
115
|
+
app.use('/api/sovereign', apiLimiter, sovereignRoutes);
|
|
120
116
|
|
|
121
117
|
app.get('/dashboard', (req, res) => {
|
|
122
118
|
res.sendFile(path.join(__dirname, '..', 'public', 'dashboard.html'));
|
|
@@ -136,9 +132,6 @@ app.get('/admin/login', (req, res) => {
|
|
|
136
132
|
app.get('/admin', (req, res) => {
|
|
137
133
|
res.sendFile(path.join(__dirname, '..', 'public', 'admin', 'dashboard.html'));
|
|
138
134
|
});
|
|
139
|
-
app.get('/premium', (req, res) => {
|
|
140
|
-
res.sendFile(path.join(__dirname, '..', 'public', 'premium.html'));
|
|
141
|
-
});
|
|
142
135
|
app.get('/privacy', (req, res) => {
|
|
143
136
|
res.sendFile(path.join(__dirname, '..', 'public', 'privacy.html'));
|
|
144
137
|
});
|
|
@@ -1,30 +1,30 @@
|
|
|
1
|
-
const { signAdminToken, verifyAdminToken } = require('../config/secrets');
|
|
2
|
-
|
|
3
|
-
function generateAdminToken(admin) {
|
|
4
|
-
return signAdminToken(
|
|
5
|
-
{ id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
|
|
6
|
-
{ expiresIn: '12h' }
|
|
7
|
-
);
|
|
8
|
-
}
|
|
9
|
-
|
|
10
|
-
function authenticateAdmin(req, res, next) {
|
|
11
|
-
const authHeader = req.headers['authorization'];
|
|
12
|
-
const token = authHeader && authHeader.split(' ')[1];
|
|
13
|
-
|
|
14
|
-
if (!token) {
|
|
15
|
-
return res.status(401).json({ error: 'Admin access token required' });
|
|
16
|
-
}
|
|
17
|
-
|
|
18
|
-
try {
|
|
19
|
-
const decoded = verifyAdminToken(token);
|
|
20
|
-
if (!decoded.isAdmin) {
|
|
21
|
-
return res.status(403).json({ error: 'Admin privileges required' });
|
|
22
|
-
}
|
|
23
|
-
req.admin = decoded;
|
|
24
|
-
next();
|
|
25
|
-
} catch (err) {
|
|
26
|
-
return res.status(403).json({ error: 'Invalid or expired admin token' });
|
|
27
|
-
}
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
module.exports = { generateAdminToken, authenticateAdmin };
|
|
1
|
+
const { signAdminToken, verifyAdminToken } = require('../config/secrets');
|
|
2
|
+
|
|
3
|
+
function generateAdminToken(admin) {
|
|
4
|
+
return signAdminToken(
|
|
5
|
+
{ id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
|
|
6
|
+
{ expiresIn: '12h' }
|
|
7
|
+
);
|
|
8
|
+
}
|
|
9
|
+
|
|
10
|
+
function authenticateAdmin(req, res, next) {
|
|
11
|
+
const authHeader = req.headers['authorization'];
|
|
12
|
+
const token = authHeader && authHeader.split(' ')[1];
|
|
13
|
+
|
|
14
|
+
if (!token) {
|
|
15
|
+
return res.status(401).json({ error: 'Admin access token required' });
|
|
16
|
+
}
|
|
17
|
+
|
|
18
|
+
try {
|
|
19
|
+
const decoded = verifyAdminToken(token);
|
|
20
|
+
if (!decoded.isAdmin) {
|
|
21
|
+
return res.status(403).json({ error: 'Admin privileges required' });
|
|
22
|
+
}
|
|
23
|
+
req.admin = decoded;
|
|
24
|
+
next();
|
|
25
|
+
} catch (err) {
|
|
26
|
+
return res.status(403).json({ error: 'Invalid or expired admin token' });
|
|
27
|
+
}
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
module.exports = { generateAdminToken, authenticateAdmin };
|
|
@@ -1,41 +1,41 @@
|
|
|
1
|
-
const { signUserToken, verifyUserToken } = require('../config/secrets');
|
|
2
|
-
|
|
3
|
-
function generateToken(user) {
|
|
4
|
-
return signUserToken(
|
|
5
|
-
{ id: user.id, email: user.email, name: user.name },
|
|
6
|
-
{ expiresIn: '7d' }
|
|
7
|
-
);
|
|
8
|
-
}
|
|
9
|
-
|
|
10
|
-
function authenticateToken(req, res, next) {
|
|
11
|
-
const authHeader = req.headers['authorization'];
|
|
12
|
-
const token = authHeader && authHeader.split(' ')[1];
|
|
13
|
-
|
|
14
|
-
if (!token) {
|
|
15
|
-
return res.status(401).json({ error: 'Access token required' });
|
|
16
|
-
}
|
|
17
|
-
|
|
18
|
-
try {
|
|
19
|
-
const decoded = verifyUserToken(token);
|
|
20
|
-
req.user = decoded;
|
|
21
|
-
next();
|
|
22
|
-
} catch (err) {
|
|
23
|
-
return res.status(403).json({ error: 'Invalid or expired token' });
|
|
24
|
-
}
|
|
25
|
-
}
|
|
26
|
-
|
|
27
|
-
function optionalAuth(req, res, next) {
|
|
28
|
-
const authHeader = req.headers['authorization'];
|
|
29
|
-
const token = authHeader && authHeader.split(' ')[1];
|
|
30
|
-
|
|
31
|
-
if (token) {
|
|
32
|
-
try {
|
|
33
|
-
req.user = verifyUserToken(token);
|
|
34
|
-
} catch (e) {
|
|
35
|
-
// ignore invalid tokens for optional auth
|
|
36
|
-
}
|
|
37
|
-
}
|
|
38
|
-
next();
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
module.exports = { generateToken, authenticateToken, optionalAuth };
|
|
1
|
+
const { signUserToken, verifyUserToken } = require('../config/secrets');
|
|
2
|
+
|
|
3
|
+
function generateToken(user) {
|
|
4
|
+
return signUserToken(
|
|
5
|
+
{ id: user.id, email: user.email, name: user.name },
|
|
6
|
+
{ expiresIn: '7d' }
|
|
7
|
+
);
|
|
8
|
+
}
|
|
9
|
+
|
|
10
|
+
function authenticateToken(req, res, next) {
|
|
11
|
+
const authHeader = req.headers['authorization'];
|
|
12
|
+
const token = authHeader && authHeader.split(' ')[1];
|
|
13
|
+
|
|
14
|
+
if (!token) {
|
|
15
|
+
return res.status(401).json({ error: 'Access token required' });
|
|
16
|
+
}
|
|
17
|
+
|
|
18
|
+
try {
|
|
19
|
+
const decoded = verifyUserToken(token);
|
|
20
|
+
req.user = decoded;
|
|
21
|
+
next();
|
|
22
|
+
} catch (err) {
|
|
23
|
+
return res.status(403).json({ error: 'Invalid or expired token' });
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
function optionalAuth(req, res, next) {
|
|
28
|
+
const authHeader = req.headers['authorization'];
|
|
29
|
+
const token = authHeader && authHeader.split(' ')[1];
|
|
30
|
+
|
|
31
|
+
if (token) {
|
|
32
|
+
try {
|
|
33
|
+
req.user = verifyUserToken(token);
|
|
34
|
+
} catch (e) {
|
|
35
|
+
// ignore invalid tokens for optional auth
|
|
36
|
+
}
|
|
37
|
+
}
|
|
38
|
+
next();
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
module.exports = { generateToken, authenticateToken, optionalAuth };
|
|
@@ -1,24 +1,24 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Stricter rate limits for license token / track endpoints (used inside license router).
|
|
3
|
-
*/
|
|
4
|
-
|
|
5
|
-
const rateLimit = require('express-rate-limit');
|
|
6
|
-
|
|
7
|
-
const licenseTokenLimiter = rateLimit({
|
|
8
|
-
windowMs: 15 * 60 * 1000,
|
|
9
|
-
max: 30,
|
|
10
|
-
standardHeaders: true,
|
|
11
|
-
legacyHeaders: false,
|
|
12
|
-
message: { error: 'Too many token requests, please try again later' }
|
|
13
|
-
});
|
|
14
|
-
|
|
15
|
-
const licenseTrackLimiter = rateLimit({
|
|
16
|
-
windowMs: 60 * 1000,
|
|
17
|
-
max: 300,
|
|
18
|
-
standardHeaders: true,
|
|
19
|
-
legacyHeaders: false,
|
|
20
|
-
keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
|
|
21
|
-
message: { error: 'Too many track requests, please try again later' }
|
|
22
|
-
});
|
|
23
|
-
|
|
24
|
-
module.exports = { licenseTokenLimiter, licenseTrackLimiter };
|
|
1
|
+
/**
|
|
2
|
+
* Stricter rate limits for license token / track endpoints (used inside license router).
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
const rateLimit = require('express-rate-limit');
|
|
6
|
+
|
|
7
|
+
const licenseTokenLimiter = rateLimit({
|
|
8
|
+
windowMs: 15 * 60 * 1000,
|
|
9
|
+
max: 30,
|
|
10
|
+
standardHeaders: true,
|
|
11
|
+
legacyHeaders: false,
|
|
12
|
+
message: { error: 'Too many token requests, please try again later' }
|
|
13
|
+
});
|
|
14
|
+
|
|
15
|
+
const licenseTrackLimiter = rateLimit({
|
|
16
|
+
windowMs: 60 * 1000,
|
|
17
|
+
max: 300,
|
|
18
|
+
standardHeaders: true,
|
|
19
|
+
legacyHeaders: false,
|
|
20
|
+
keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
|
|
21
|
+
message: { error: 'Too many track requests, please try again later' }
|
|
22
|
+
});
|
|
23
|
+
|
|
24
|
+
module.exports = { licenseTokenLimiter, licenseTrackLimiter };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
-- Migration 001: Add composite indexes for analytics performance
|
|
2
|
-
-- Created: 2024-12-01
|
|
3
|
-
|
|
4
|
-
CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
|
|
5
|
-
CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
|
|
6
|
-
CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
|
|
7
|
-
CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);
|
|
1
|
+
-- Migration 001: Add composite indexes for analytics performance
|
|
2
|
+
-- Created: 2024-12-01
|
|
3
|
+
|
|
4
|
+
CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
|
|
5
|
+
CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
|
|
6
|
+
CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
|
|
7
|
+
CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);
|