This commit is contained in:
Dobromir Popov
2024-12-14 04:29:21 +02:00
3 changed files with 35 additions and 21181 deletions

21157
package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@ -87,6 +87,7 @@
"nodemon": "^3.0.3",
"npm": "^10.5.1",
"open": "^10.0.3",
"prisma-json-schema-generator": "^5.1.1",
"quill": "^1.3.7",
"quill-image-resize": "^3.0.9",
"quill-image-resize-module": "^3.0.0",

View File

@ -3,14 +3,20 @@ import { Prisma } from "@prisma/client";
import { NextApiRequest, NextApiResponse } from "next";
import { getServerSession } from "next-auth/next";
import { authOptions } from "../auth/[...nextauth]";
// import { getToken } from "next-auth/jwt";
// import { getSession } from "next-auth/client";
import { JWT } from "next-auth/jwt";
const common = require("../../../src/helpers/common");
import jwt from 'jsonwebtoken';
import { decode } from 'next-auth/jwt';
const logger = require('../../../src/logger');
// import { getToken } from "next-auth/jwt";
interface SessionUser {
email?: string;
name?: string;
}
interface Session {
user?: SessionUser;
expires: string;
}
const handler = async (req: NextApiRequest, res: NextApiResponse) => {
const prismaClient = common.getPrismaClient();
@ -19,27 +25,35 @@ const handler = async (req: NextApiRequest, res: NextApiResponse) => {
adapter: new PrismaAdapter({ prismaClient }),
models: {
[Prisma.ModelName.CartEvent]: { name: "cartevents" },
[Prisma.ModelName.Publisher]: { name: "publishers" },
[Prisma.ModelName.Availability]: { name: "availabilities" },
[Prisma.ModelName.Location]: { name: "locations" },
[Prisma.ModelName.Shift]: { name: "shifts" },
[Prisma.ModelName.Assignment]: { name: "assignments" },
[Prisma.ModelName.Report]: { name: "reports" },
[Prisma.ModelName.Message]: { name: "messages" },
[Prisma.ModelName.Survey]: { name: "surveys" },
[Prisma.ModelName.EventLog]: { name: "eventlogs" },
},
});
//1: check session
const session = await getServerSession(req, res, authOptions);
//console.log("Session:", session); // Log the session
const session = (await getServerSession(req, res, authOptions)) as Session | null;
const authHeader = req.headers.authorization || '';
//console.log('authHeader', authHeader);
if (session) {
if (session && req.query.nextcrud) {
//get target table
const targetTable = req.query.nextcrud[0];
//get target action
if (req.method === 'DELETE') {
switch (targetTable) {
// case 'publishers':
// case 'availabilities':
default:
const targetId = req.query.nextcrud[1];
logger.info('[nextCrud] ' + targetTable + ': ' + targetId + ' DELETED by ' + session.user.email);
logger.info('[nextCrud] ' + targetTable + ': ' + targetId + ' DELETED by ' + session.user?.email);
break;
}
}
console.log('[nextCrud]: request for ' + targetTable + '. params:', req.query);
return nextCrudHandler(req, res);
}
else {
@ -49,21 +63,18 @@ const handler = async (req: NextApiRequest, res: NextApiResponse) => {
//2: check jwt
const secret = process.env.NEXTAUTH_SECRET;
const bearerHeader = req.headers['authorization'];
if (bearerHeader) {
if (bearerHeader && secret) {
const token = bearerHeader.split(' ')[1]; // Assuming "Bearer <token>"
try {
const decoded = await decode({
token: token,
secret: process.env.NEXTAUTH_SECRET,
});
//console.log('Decoded JWT:');
} catch (err) {
console.error('[nextCrud]: Error decoding token:', err);
}
// try {
// const decodedToken = await getToken({ req, secret });
// if (decodedToken) {
// return nextCrudHandler(req, res);
// }
// } catch (err) {
// console.error('[nextCrud]: Error decoding token:', err);
// }
try {
const verified = jwt.verify(token, secret);
//console.log('Verified JWT:');
return nextCrudHandler(req, res);
} catch (err) {
console.error('[nextCrud]: Invalid token:', err);
@ -76,7 +87,6 @@ const handler = async (req: NextApiRequest, res: NextApiResponse) => {
return nextCrudHandler(req, res);
}
return res.status(401).json({ message: '[nextCrud]: Unauthorized' });
};