mirror of
https://github.com/kjanat/livedash-node.git
synced 2026-01-16 14:12:10 +01:00
- Implement repository pattern for data access layer - Add comprehensive service layer for business logic - Create scheduler management system with health monitoring - Add bounded buffer utility for memory management - Enhance security audit logging with retention policies
245 lines
6.3 KiB
TypeScript
245 lines
6.3 KiB
TypeScript
import type { Prisma } from "@prisma/client";
|
|
import { type NextRequest, NextResponse } from "next/server";
|
|
import { getServerSession } from "next-auth/next";
|
|
import { authOptions } from "../../../../lib/auth";
|
|
import { prisma } from "../../../../lib/prisma";
|
|
import { extractClientIP } from "../../../../lib/rateLimiter";
|
|
import {
|
|
AuditOutcome,
|
|
type AuditSeverity,
|
|
createAuditMetadata,
|
|
type SecurityEventType,
|
|
securityAuditLogger,
|
|
} from "../../../../lib/securityAuditLogger";
|
|
|
|
/**
|
|
* Validates user authorization for audit logs access
|
|
*/
|
|
async function validateAuditLogAccess(
|
|
session: { user?: { id?: string; companyId?: string; role?: string } } | null,
|
|
ip: string,
|
|
userAgent?: string
|
|
) {
|
|
if (!session?.user) {
|
|
await securityAuditLogger.logAuthorization(
|
|
"audit_logs_unauthorized_access",
|
|
AuditOutcome.BLOCKED,
|
|
{
|
|
ipAddress: ip,
|
|
userAgent,
|
|
metadata: createAuditMetadata({
|
|
error: "no_session",
|
|
}),
|
|
},
|
|
"Unauthorized attempt to access audit logs"
|
|
);
|
|
return { valid: false, status: 401, error: "Unauthorized" };
|
|
}
|
|
|
|
if (session?.user?.role !== "ADMIN") {
|
|
await securityAuditLogger.logAuthorization(
|
|
"audit_logs_insufficient_permissions",
|
|
AuditOutcome.BLOCKED,
|
|
{
|
|
userId: session?.user?.id,
|
|
companyId: session?.user?.companyId,
|
|
ipAddress: ip,
|
|
userAgent,
|
|
metadata: createAuditMetadata({
|
|
userRole: session?.user?.role,
|
|
requiredRole: "ADMIN",
|
|
}),
|
|
},
|
|
"Insufficient permissions to access audit logs"
|
|
);
|
|
return { valid: false, status: 403, error: "Insufficient permissions" };
|
|
}
|
|
|
|
return { valid: true };
|
|
}
|
|
|
|
/**
|
|
* Parses query parameters for audit log filtering
|
|
*/
|
|
function parseAuditLogFilters(url: URL) {
|
|
const page = Number.parseInt(url.searchParams.get("page") || "1");
|
|
const limit = Math.min(
|
|
Number.parseInt(url.searchParams.get("limit") || "50"),
|
|
100
|
|
);
|
|
const eventType = url.searchParams.get("eventType");
|
|
const outcome = url.searchParams.get("outcome");
|
|
const severity = url.searchParams.get("severity");
|
|
const userId = url.searchParams.get("userId");
|
|
const startDate = url.searchParams.get("startDate");
|
|
const endDate = url.searchParams.get("endDate");
|
|
|
|
return {
|
|
page,
|
|
limit,
|
|
eventType,
|
|
outcome,
|
|
severity,
|
|
userId,
|
|
startDate,
|
|
endDate,
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Builds where clause for audit log filtering
|
|
*/
|
|
function buildAuditLogWhereClause(
|
|
companyId: string,
|
|
filters: ReturnType<typeof parseAuditLogFilters>
|
|
): Prisma.SecurityAuditLogWhereInput {
|
|
const { eventType, outcome, severity, userId, startDate, endDate } = filters;
|
|
|
|
const where: Prisma.SecurityAuditLogWhereInput = {
|
|
companyId, // Only show logs for user's company
|
|
};
|
|
|
|
if (eventType) where.eventType = eventType as SecurityEventType;
|
|
if (outcome) where.outcome = outcome as AuditOutcome;
|
|
if (severity) where.severity = severity as AuditSeverity;
|
|
if (userId) where.userId = userId;
|
|
|
|
if (startDate || endDate) {
|
|
where.timestamp = {};
|
|
if (startDate) where.timestamp.gte = new Date(startDate);
|
|
if (endDate) where.timestamp.lte = new Date(endDate);
|
|
}
|
|
|
|
return where;
|
|
}
|
|
|
|
export async function GET(request: NextRequest) {
|
|
const session = await getServerSession(authOptions);
|
|
|
|
try {
|
|
const ip = extractClientIP(request);
|
|
const userAgent = request.headers.get("user-agent") || undefined;
|
|
|
|
// Validate access authorization
|
|
const authResult = await validateAuditLogAccess(session, ip, userAgent);
|
|
if (!authResult.valid) {
|
|
return NextResponse.json(
|
|
{ success: false, error: authResult.error },
|
|
{ status: authResult.status }
|
|
);
|
|
}
|
|
|
|
const url = new URL(request.url);
|
|
const filters = parseAuditLogFilters(url);
|
|
const {
|
|
page,
|
|
limit,
|
|
eventType,
|
|
outcome,
|
|
severity,
|
|
userId,
|
|
startDate,
|
|
endDate,
|
|
} = filters;
|
|
const skip = (page - 1) * limit;
|
|
|
|
// Build filter conditions
|
|
const where = buildAuditLogWhereClause(
|
|
session?.user?.companyId || "",
|
|
filters
|
|
);
|
|
|
|
// Get audit logs with pagination
|
|
const [auditLogs, totalCount] = await Promise.all([
|
|
prisma.securityAuditLog.findMany({
|
|
where,
|
|
skip,
|
|
take: limit,
|
|
orderBy: { timestamp: "desc" },
|
|
include: {
|
|
user: {
|
|
select: {
|
|
id: true,
|
|
email: true,
|
|
name: true,
|
|
role: true,
|
|
},
|
|
},
|
|
platformUser: {
|
|
select: {
|
|
id: true,
|
|
email: true,
|
|
name: true,
|
|
role: true,
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
prisma.securityAuditLog.count({ where }),
|
|
]);
|
|
|
|
// Log successful audit log access
|
|
await securityAuditLogger.logDataPrivacy(
|
|
"audit_logs_accessed",
|
|
AuditOutcome.SUCCESS,
|
|
{
|
|
userId: session?.user?.id,
|
|
companyId: session?.user?.companyId,
|
|
ipAddress: ip,
|
|
userAgent,
|
|
metadata: createAuditMetadata({
|
|
page,
|
|
limit,
|
|
filters: {
|
|
eventType,
|
|
outcome,
|
|
severity,
|
|
userId,
|
|
startDate,
|
|
endDate,
|
|
},
|
|
recordsReturned: auditLogs.length,
|
|
}),
|
|
},
|
|
"Audit logs accessed by admin user"
|
|
);
|
|
|
|
return NextResponse.json({
|
|
success: true,
|
|
data: {
|
|
auditLogs,
|
|
pagination: {
|
|
page,
|
|
limit,
|
|
totalCount,
|
|
totalPages: Math.ceil(totalCount / limit),
|
|
hasNext: skip + limit < totalCount,
|
|
hasPrev: page > 1,
|
|
},
|
|
},
|
|
});
|
|
} catch (error) {
|
|
console.error("Error fetching audit logs:", error);
|
|
|
|
await securityAuditLogger.logDataPrivacy(
|
|
"audit_logs_server_error",
|
|
AuditOutcome.FAILURE,
|
|
{
|
|
userId: session?.user?.id,
|
|
companyId: session?.user?.companyId,
|
|
ipAddress: extractClientIP(request),
|
|
userAgent: request.headers.get("user-agent") || undefined,
|
|
metadata: createAuditMetadata({
|
|
error: "server_error",
|
|
}),
|
|
},
|
|
`Server error while fetching audit logs: ${error}`
|
|
);
|
|
|
|
return NextResponse.json(
|
|
{ success: false, error: "Internal server error" },
|
|
{ status: 500 }
|
|
);
|
|
}
|
|
}
|