Initial commit: Port Nimara CRM (Layers 0-4)
Full CRM rebuild with Next.js 15, TypeScript, Tailwind, Drizzle ORM, PostgreSQL, Redis, BullMQ, MinIO, and Socket.io. Includes 461 source files covering clients, berths, interests/pipeline, documents/EOI, expenses/invoices, email, notifications, dashboard, admin, and client portal. CI/CD via Gitea Actions with Docker builds. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
45
src/lib/api/client.ts
Normal file
45
src/lib/api/client.ts
Normal file
@@ -0,0 +1,45 @@
|
||||
'use client';
|
||||
|
||||
import { useUIStore } from '@/stores/ui-store';
|
||||
|
||||
export interface ApiFetchOptions extends Omit<RequestInit, 'body'> {
|
||||
body?: unknown;
|
||||
}
|
||||
|
||||
/**
|
||||
* Client-side fetch wrapper that attaches the `X-Port-Id` header from the
|
||||
* UI store to every request. Used by all queryFn/mutationFn callbacks.
|
||||
*/
|
||||
export async function apiFetch<T = unknown>(
|
||||
url: string,
|
||||
opts: ApiFetchOptions = {},
|
||||
): Promise<T> {
|
||||
const portId = useUIStore.getState().currentPortId;
|
||||
|
||||
const headers = new Headers(opts.headers);
|
||||
if (portId) {
|
||||
headers.set('X-Port-Id', portId);
|
||||
}
|
||||
if (opts.body !== undefined && !headers.has('Content-Type')) {
|
||||
headers.set('Content-Type', 'application/json');
|
||||
}
|
||||
|
||||
const res = await fetch(url, {
|
||||
...opts,
|
||||
headers,
|
||||
credentials: 'include',
|
||||
body: opts.body !== undefined ? JSON.stringify(opts.body) : undefined,
|
||||
});
|
||||
|
||||
if (!res.ok) {
|
||||
const error = await res.json().catch(() => ({ error: res.statusText }));
|
||||
throw Object.assign(new Error(error.error ?? 'Request failed'), {
|
||||
status: res.status,
|
||||
code: error.code,
|
||||
details: error.details,
|
||||
});
|
||||
}
|
||||
|
||||
if (res.status === 204) return undefined as T;
|
||||
return res.json() as Promise<T>;
|
||||
}
|
||||
241
src/lib/api/helpers.ts
Normal file
241
src/lib/api/helpers.ts
Normal file
@@ -0,0 +1,241 @@
|
||||
import { and, eq } from 'drizzle-orm';
|
||||
import { NextRequest, NextResponse } from 'next/server';
|
||||
|
||||
import { auth } from '@/lib/auth';
|
||||
import { db } from '@/lib/db';
|
||||
import {
|
||||
portRoleOverrides,
|
||||
ports,
|
||||
userPortRoles,
|
||||
userProfiles,
|
||||
} from '@/lib/db/schema';
|
||||
import { type RolePermissions } from '@/lib/db/schema/users';
|
||||
import { createAuditLog } from '@/lib/audit';
|
||||
import { errorResponse } from '@/lib/errors';
|
||||
import { logger } from '@/lib/logger';
|
||||
|
||||
// ─── Types ────────────────────────────────────────────────────────────────────
|
||||
|
||||
/**
|
||||
* Authenticated request context resolved by `withAuth`.
|
||||
* Passed as the second argument to every wrapped route handler.
|
||||
*/
|
||||
export interface AuthContext {
|
||||
userId: string;
|
||||
portId: string;
|
||||
portSlug: string;
|
||||
/** true for super_admin users — bypasses all permission checks. */
|
||||
isSuperAdmin: boolean;
|
||||
/**
|
||||
* Effective permissions after role + port override deep-merge.
|
||||
* null when isSuperAdmin is true (super admins bypass permission checks).
|
||||
*/
|
||||
permissions: RolePermissions | null;
|
||||
user: {
|
||||
email: string;
|
||||
name: string;
|
||||
};
|
||||
/** Client IP extracted from X-Forwarded-For header. */
|
||||
ipAddress: string;
|
||||
userAgent: string;
|
||||
}
|
||||
|
||||
type RouteHandler<T = unknown> = (
|
||||
req: NextRequest,
|
||||
ctx: AuthContext,
|
||||
params: Record<string, string>,
|
||||
) => Promise<NextResponse<T>>;
|
||||
|
||||
// ─── deepMerge ───────────────────────────────────────────────────────────────
|
||||
|
||||
/**
|
||||
* Recursively merges `source` into `target`.
|
||||
* Used to apply port-level role permission overrides on top of the base role.
|
||||
*/
|
||||
export function deepMerge(
|
||||
target: Record<string, unknown>,
|
||||
source: Record<string, unknown>,
|
||||
): Record<string, unknown> {
|
||||
const result = { ...target };
|
||||
for (const key of Object.keys(source)) {
|
||||
const sourceVal = source[key];
|
||||
const targetVal = result[key];
|
||||
if (
|
||||
typeof sourceVal === 'object' &&
|
||||
sourceVal !== null &&
|
||||
!Array.isArray(sourceVal) &&
|
||||
typeof targetVal === 'object' &&
|
||||
targetVal !== null &&
|
||||
!Array.isArray(targetVal)
|
||||
) {
|
||||
result[key] = deepMerge(
|
||||
targetVal as Record<string, unknown>,
|
||||
sourceVal as Record<string, unknown>,
|
||||
);
|
||||
} else {
|
||||
result[key] = sourceVal;
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
// ─── withAuth ────────────────────────────────────────────────────────────────
|
||||
|
||||
/**
|
||||
* Validates the session, loads the user profile, resolves port context and
|
||||
* applies port-level role overrides before calling the inner handler.
|
||||
*
|
||||
* Usage:
|
||||
* ```ts
|
||||
* export const GET = withAuth(handler);
|
||||
* export const POST = withAuth(withPermission('clients', 'create', handler));
|
||||
* ```
|
||||
*/
|
||||
export function withAuth(
|
||||
handler: RouteHandler,
|
||||
): (
|
||||
req: NextRequest,
|
||||
routeContext: { params: Promise<Record<string, string>> },
|
||||
) => Promise<NextResponse> {
|
||||
return async (req, routeContext) => {
|
||||
try {
|
||||
// 1. Validate session via Better Auth.
|
||||
const session = await auth.api.getSession({ headers: req.headers });
|
||||
if (!session?.user) {
|
||||
return NextResponse.json({ error: 'Authentication required' }, { status: 401 });
|
||||
}
|
||||
|
||||
// 2. Load the CRM user profile (keyed on Better Auth user ID).
|
||||
const profile = await db.query.userProfiles.findFirst({
|
||||
where: eq(userProfiles.userId, session.user.id),
|
||||
});
|
||||
if (!profile || !profile.isActive) {
|
||||
return NextResponse.json({ error: 'Account disabled' }, { status: 403 });
|
||||
}
|
||||
|
||||
// 3. Resolve port context.
|
||||
// Port ID comes from the X-Port-Id header (set by the client after port
|
||||
// selection), falling back to the user's default port from preferences.
|
||||
// It NEVER comes from the request body — SECURITY-GUIDELINES.md §2.1.
|
||||
const portIdFromHeader = req.headers.get('X-Port-Id');
|
||||
const portId =
|
||||
portIdFromHeader ??
|
||||
(profile.preferences as { defaultPortId?: string } | null)?.defaultPortId ??
|
||||
null;
|
||||
|
||||
if (!portId && !profile.isSuperAdmin) {
|
||||
return NextResponse.json({ error: 'Port context required' }, { status: 400 });
|
||||
}
|
||||
|
||||
// 4. Resolve effective permissions.
|
||||
let permissions: RolePermissions | null = null;
|
||||
let portSlug = '';
|
||||
|
||||
if (!profile.isSuperAdmin && portId) {
|
||||
const portRole = await db.query.userPortRoles.findFirst({
|
||||
where: and(
|
||||
eq(userPortRoles.userId, profile.userId),
|
||||
eq(userPortRoles.portId, portId),
|
||||
),
|
||||
with: {
|
||||
role: true,
|
||||
port: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (!portRole) {
|
||||
return NextResponse.json({ error: 'No access to this port' }, { status: 403 });
|
||||
}
|
||||
|
||||
permissions = { ...(portRole.role.permissions as RolePermissions) };
|
||||
portSlug = (portRole.port as { slug: string } | null)?.slug ?? '';
|
||||
|
||||
// Apply port-specific role overrides (deep-merge on top of base role).
|
||||
const override = await db.query.portRoleOverrides.findFirst({
|
||||
where: and(
|
||||
eq(portRoleOverrides.portId, portId),
|
||||
eq(portRoleOverrides.roleId, portRole.roleId),
|
||||
),
|
||||
});
|
||||
|
||||
if (override?.permissionOverrides) {
|
||||
permissions = deepMerge(
|
||||
permissions as unknown as Record<string, unknown>,
|
||||
override.permissionOverrides as Record<string, unknown>,
|
||||
) as RolePermissions;
|
||||
}
|
||||
} else if (profile.isSuperAdmin && portId) {
|
||||
// Super admin still needs portSlug for response context.
|
||||
const port = await db.query.ports.findFirst({
|
||||
where: eq(ports.id, portId),
|
||||
});
|
||||
portSlug = port?.slug ?? '';
|
||||
}
|
||||
|
||||
const ctx: AuthContext = {
|
||||
userId: profile.userId,
|
||||
portId: portId ?? '',
|
||||
portSlug,
|
||||
isSuperAdmin: profile.isSuperAdmin,
|
||||
permissions,
|
||||
user: {
|
||||
email: session.user.email,
|
||||
name: session.user.name,
|
||||
},
|
||||
ipAddress:
|
||||
req.headers.get('x-forwarded-for')?.split(',')[0]?.trim() ?? 'unknown',
|
||||
userAgent: req.headers.get('user-agent') ?? 'unknown',
|
||||
};
|
||||
|
||||
const params = await routeContext.params;
|
||||
return await handler(req, ctx, params);
|
||||
} catch (error) {
|
||||
return errorResponse(error);
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
// ─── withPermission ──────────────────────────────────────────────────────────
|
||||
|
||||
/**
|
||||
* Wraps a route handler with a permission gate.
|
||||
* Denied attempts are logged to the audit trail.
|
||||
*
|
||||
* Compose inside withAuth:
|
||||
* ```ts
|
||||
* export const DELETE = withAuth(withPermission('clients', 'delete', handler));
|
||||
* ```
|
||||
*/
|
||||
export function withPermission(
|
||||
resource: keyof RolePermissions,
|
||||
action: string,
|
||||
handler: RouteHandler,
|
||||
): RouteHandler {
|
||||
return async (req, ctx, params) => {
|
||||
if (!ctx.isSuperAdmin) {
|
||||
const resourcePerms = ctx.permissions?.[resource] as
|
||||
| Record<string, boolean>
|
||||
| undefined;
|
||||
|
||||
if (!resourcePerms || !resourcePerms[action]) {
|
||||
logger.warn({ userId: ctx.userId, resource, action }, 'Permission denied');
|
||||
|
||||
// Log the denied attempt — fire-and-forget; audit must never block response.
|
||||
void createAuditLog({
|
||||
userId: ctx.userId,
|
||||
portId: ctx.portId,
|
||||
action: 'permission_denied',
|
||||
entityType: resource,
|
||||
entityId: '',
|
||||
metadata: { attemptedAction: action },
|
||||
ipAddress: ctx.ipAddress,
|
||||
userAgent: ctx.userAgent,
|
||||
});
|
||||
|
||||
return NextResponse.json({ error: 'Insufficient permissions' }, { status: 403 });
|
||||
}
|
||||
}
|
||||
|
||||
return handler(req, ctx, params);
|
||||
};
|
||||
}
|
||||
43
src/lib/api/route-helpers.ts
Normal file
43
src/lib/api/route-helpers.ts
Normal file
@@ -0,0 +1,43 @@
|
||||
import { NextRequest } from 'next/server';
|
||||
import { z, ZodSchema } from 'zod';
|
||||
|
||||
/**
|
||||
* Base list query schema shared by all paginated list endpoints.
|
||||
*/
|
||||
export const baseListQuerySchema = z.object({
|
||||
page: z.coerce.number().int().min(1).default(1),
|
||||
limit: z.coerce.number().int().min(1).max(100).default(25),
|
||||
sort: z.string().optional(),
|
||||
order: z.enum(['asc', 'desc']).default('desc'),
|
||||
search: z.string().optional(),
|
||||
includeArchived: z
|
||||
.enum(['true', 'false'])
|
||||
.transform((v) => v === 'true')
|
||||
.default('false'),
|
||||
});
|
||||
|
||||
export type BaseListQuery = z.infer<typeof baseListQuerySchema>;
|
||||
|
||||
/**
|
||||
* Parses URL search params against a Zod schema.
|
||||
* Throws a ZodError on validation failure (caught by `errorResponse`).
|
||||
*/
|
||||
export function parseQuery<T extends ZodSchema>(
|
||||
req: NextRequest,
|
||||
schema: T,
|
||||
): z.infer<T> {
|
||||
const params = Object.fromEntries(req.nextUrl.searchParams.entries());
|
||||
return schema.parse(params);
|
||||
}
|
||||
|
||||
/**
|
||||
* Parses the JSON request body against a Zod schema.
|
||||
* Throws a ZodError on validation failure (caught by `errorResponse`).
|
||||
*/
|
||||
export async function parseBody<T extends ZodSchema>(
|
||||
req: NextRequest,
|
||||
schema: T,
|
||||
): Promise<z.infer<T>> {
|
||||
const body = await req.json();
|
||||
return schema.parse(body);
|
||||
}
|
||||
Reference in New Issue
Block a user