mirror of
https://github.com/kjanat/livedash-node.git
synced 2026-01-16 07:52:10 +01:00
- Fix 36+ biome linting issues reducing errors/warnings from 227 to 191 - Replace explicit 'any' types with proper TypeScript interfaces - Fix React hooks dependencies and useCallback patterns - Resolve unused variables and parameter assignment issues - Improve accessibility with proper label associations - Add comprehensive API documentation for admin and security features - Update README.md with accurate PostgreSQL setup and current tech stack - Create complete documentation for audit logging, CSP monitoring, and batch processing - Fix outdated project information and missing developer workflows
94 lines
2.5 KiB
TypeScript
94 lines
2.5 KiB
TypeScript
import crypto from "node:crypto";
|
|
import bcrypt from "bcryptjs";
|
|
import { type NextRequest, NextResponse } from "next/server";
|
|
import { getServerSession } from "next-auth";
|
|
import { authOptions } from "../../../../lib/auth";
|
|
import { prisma } from "../../../../lib/prisma";
|
|
|
|
interface UserBasicInfo {
|
|
id: string;
|
|
email: string;
|
|
role: string;
|
|
}
|
|
|
|
export async function GET() {
|
|
const session = await getServerSession(authOptions);
|
|
if (!session?.user || session.user.role !== "ADMIN") {
|
|
return NextResponse.json({ error: "Forbidden" }, { status: 403 });
|
|
}
|
|
|
|
const user = await prisma.user.findUnique({
|
|
where: { email: session.user.email as string },
|
|
});
|
|
|
|
if (!user) {
|
|
return NextResponse.json({ error: "No user" }, { status: 401 });
|
|
}
|
|
|
|
const users = await prisma.user.findMany({
|
|
where: { companyId: user.companyId },
|
|
take: 1000, // Limit to prevent unbounded queries
|
|
orderBy: { createdAt: "desc" },
|
|
});
|
|
|
|
const mappedUsers: UserBasicInfo[] = users.map((u) => ({
|
|
id: u.id,
|
|
email: u.email,
|
|
role: u.role,
|
|
}));
|
|
|
|
return NextResponse.json({ users: mappedUsers });
|
|
}
|
|
|
|
export async function POST(request: NextRequest) {
|
|
const session = await getServerSession(authOptions);
|
|
if (!session?.user || session.user.role !== "ADMIN") {
|
|
return NextResponse.json({ error: "Forbidden" }, { status: 403 });
|
|
}
|
|
|
|
const user = await prisma.user.findUnique({
|
|
where: { email: session.user.email as string },
|
|
});
|
|
|
|
if (!user) {
|
|
return NextResponse.json({ error: "No user" }, { status: 401 });
|
|
}
|
|
|
|
const body = await request.json();
|
|
const { email, role } = body;
|
|
|
|
if (!email || !role) {
|
|
return NextResponse.json({ error: "Missing fields" }, { status: 400 });
|
|
}
|
|
|
|
const exists = await prisma.user.findUnique({ where: { email } });
|
|
if (exists) {
|
|
return NextResponse.json({ error: "Email exists" }, { status: 409 });
|
|
}
|
|
|
|
const tempPassword = crypto.randomBytes(12).toString("base64").slice(0, 12); // secure random initial password
|
|
|
|
await prisma.user.create({
|
|
data: {
|
|
email,
|
|
password: await bcrypt.hash(tempPassword, 10),
|
|
companyId: user.companyId,
|
|
role,
|
|
},
|
|
});
|
|
|
|
const { sendPasswordResetEmail } = await import("../../../../lib/sendEmail");
|
|
const emailResult = await sendPasswordResetEmail(email, tempPassword);
|
|
|
|
if (!emailResult.success) {
|
|
console.warn("Failed to send password email:", emailResult.error);
|
|
}
|
|
|
|
return NextResponse.json({
|
|
ok: true,
|
|
tempPassword,
|
|
emailSent: emailResult.success,
|
|
emailError: emailResult.error,
|
|
});
|
|
}
|