mirror of
https://github.com/kjanat/livedash-node.git
synced 2026-01-16 11:32:13 +01:00
- Implemented API session retrieval in `lib/api-auth.ts` to manage user sessions. - Created authentication options in `lib/auth-options.ts` using NextAuth.js with credentials provider. - Added migration scripts to create necessary tables for authentication in `migrations/0002_create_auth_tables.sql` and `prisma/migrations/20250601033219_add_nextauth_tables/migration.sql`. - Configured ESLint with Next.js and TypeScript support in `eslint.config.mjs`. - Updated Next.js configuration in `next.config.ts` for Cloudflare compatibility. - Defined Cloudflare Worker configuration in `open-next.config.ts` and `wrangler.jsonc`. - Enhanced type definitions for authentication in `types/auth.d.ts`. - Created a Cloudflare Worker entry point in `src/index.ts.backup` to handle API requests and responses.
68 lines
2.1 KiB
TypeScript
68 lines
2.1 KiB
TypeScript
import { NextApiRequest, NextApiResponse } from "next";
|
|
import crypto from "crypto";
|
|
import { prisma } from "../../../lib/prisma";
|
|
import bcrypt from "bcryptjs";
|
|
import { getApiSession } from "../../../lib/api-auth";
|
|
// User type from prisma is used instead of the one in lib/types
|
|
|
|
interface UserBasicInfo {
|
|
id: string;
|
|
email: string;
|
|
role: string;
|
|
}
|
|
|
|
export default async function handler(
|
|
req: NextApiRequest,
|
|
res: NextApiResponse
|
|
) {
|
|
const session = await getApiSession(req, res);
|
|
console.log("Session in users API:", session);
|
|
|
|
if (!session?.user) {
|
|
console.log("No session or user found");
|
|
return res.status(401).json({ error: "Not logged in" });
|
|
}
|
|
|
|
if (session.user.role !== "admin") {
|
|
console.log("User is not admin:", session.user.role);
|
|
return res.status(403).json({ error: "Admin access required" });
|
|
}
|
|
|
|
const user = await prisma.user.findUnique({
|
|
where: { email: session.user.email as string },
|
|
});
|
|
|
|
if (!user) return res.status(401).json({ error: "No user" });
|
|
|
|
if (req.method === "GET") {
|
|
const users = await prisma.user.findMany({
|
|
where: { companyId: user.companyId },
|
|
});
|
|
|
|
const mappedUsers: UserBasicInfo[] = users.map((u) => ({
|
|
id: u.id,
|
|
email: u.email,
|
|
role: u.role,
|
|
}));
|
|
|
|
res.json({ users: mappedUsers });
|
|
} else if (req.method === "POST") {
|
|
const { email, role } = req.body;
|
|
if (!email || !role)
|
|
return res.status(400).json({ error: "Missing fields" });
|
|
const exists = await prisma.user.findUnique({ where: { email } });
|
|
if (exists) return res.status(409).json({ error: "Email exists" });
|
|
const tempPassword = crypto.randomBytes(12).toString("base64").slice(0, 12); // secure random initial password
|
|
await prisma.user.create({
|
|
data: {
|
|
email,
|
|
password: await bcrypt.hash(tempPassword, 10),
|
|
companyId: user.companyId,
|
|
role,
|
|
},
|
|
});
|
|
// TODO: Email user their temp password (stub, for demo) - Implement a robust and secure email sending mechanism. Consider using a transactional email service.
|
|
res.json({ ok: true, tempPassword });
|
|
} else res.status(405).end();
|
|
}
|