194 lines
7.8 KiB
JavaScript
194 lines
7.8 KiB
JavaScript
"use strict";
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.usersRouter = void 0;
|
|
const express_1 = require("express");
|
|
const zod_1 = require("zod");
|
|
const client_1 = require("@prisma/client");
|
|
const users_service_1 = require("./users.service");
|
|
const users_schemas_1 = require("./users.schemas");
|
|
const validate_1 = require("../../middleware/validate");
|
|
const auth_middleware_1 = require("../../middleware/auth.middleware");
|
|
const rbac_middleware_1 = require("../../middleware/rbac.middleware");
|
|
const roles_1 = require("../../utils/roles");
|
|
const database_1 = require("../../config/database");
|
|
const email_service_1 = require("../../services/email.service");
|
|
const env_1 = require("../../config/env");
|
|
const logger_1 = require("../../utils/logger");
|
|
const provisioning_service_1 = require("../../services/user-provisioning/provisioning.service");
|
|
/** Check if user can manage other users (SUPER_ADMIN or canManageUsers permission) */
|
|
function canManageUsers(user) {
|
|
const roles = (0, roles_1.getUserRoles)(user);
|
|
if (roles.includes(client_1.UserRole.SUPER_ADMIN))
|
|
return true;
|
|
return !!user.permissions?.canManageUsers;
|
|
}
|
|
/** Middleware: require user management permission */
|
|
function requireUserManagement(req, res, next) {
|
|
if (!req.user) {
|
|
res.status(401).json({ error: { message: 'Authentication required', code: 'AUTH_REQUIRED' } });
|
|
return;
|
|
}
|
|
if (!canManageUsers(req.user)) {
|
|
res.status(403).json({ error: { message: 'Insufficient permissions', code: 'FORBIDDEN' } });
|
|
return;
|
|
}
|
|
next();
|
|
}
|
|
const router = (0, express_1.Router)();
|
|
exports.usersRouter = router;
|
|
// All user routes require authentication
|
|
router.use(auth_middleware_1.authenticate);
|
|
// GET /api/users — list users (any admin)
|
|
router.get('/', (0, rbac_middleware_1.requireRole)(...roles_1.ADMIN_ROLES), (0, validate_1.validate)(users_schemas_1.listUsersSchema, 'query'), async (req, res, next) => {
|
|
try {
|
|
const result = await users_service_1.usersService.findAll(req.query);
|
|
res.json(result);
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// GET /api/users/:id — get user (admin or self)
|
|
router.get('/:id', async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
const isAdminUser = (0, roles_1.hasAnyRole)(req.user, roles_1.ADMIN_ROLES);
|
|
const isSelf = req.user.id === id;
|
|
if (!isAdminUser && !isSelf) {
|
|
res.status(403).json({ error: { message: 'Insufficient permissions', code: 'FORBIDDEN' } });
|
|
return;
|
|
}
|
|
const user = await users_service_1.usersService.findById(id);
|
|
res.json(user);
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// POST /api/users — create user (SUPER_ADMIN or canManageUsers)
|
|
router.post('/', requireUserManagement, (0, validate_1.validate)(users_schemas_1.createUserSchema), async (req, res, next) => {
|
|
try {
|
|
const user = await users_service_1.usersService.create(req.body);
|
|
res.status(201).json(user);
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// PUT /api/users/:id — update user (admin or self, role changes require user management perm)
|
|
router.put('/:id', async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
const isAdminUser = (0, roles_1.hasAnyRole)(req.user, roles_1.ADMIN_ROLES);
|
|
const isSelf = req.user.id === id;
|
|
const canManage = canManageUsers(req.user);
|
|
if (!isAdminUser && !isSelf) {
|
|
res.status(403).json({ error: { message: 'Insufficient permissions', code: 'FORBIDDEN' } });
|
|
return;
|
|
}
|
|
// Only users with management permission can change role, roles, or status
|
|
if (!canManage) {
|
|
delete req.body.role;
|
|
delete req.body.roles;
|
|
delete req.body.status;
|
|
delete req.body.permissions;
|
|
}
|
|
const parsed = users_schemas_1.updateUserSchema.parse(req.body);
|
|
const user = await users_service_1.usersService.update(id, parsed);
|
|
res.json(user);
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// POST /api/users/:id/approve — approve pending user (SUPER_ADMIN or canManageUsers)
|
|
router.post('/:id/approve', requireUserManagement, async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
const user = await database_1.prisma.user.findUnique({ where: { id } });
|
|
if (!user) {
|
|
res.status(404).json({ error: { message: 'User not found', code: 'USER_NOT_FOUND' } });
|
|
return;
|
|
}
|
|
if (user.status !== client_1.UserStatus.PENDING_APPROVAL) {
|
|
res.status(400).json({ error: { message: 'User is not pending approval', code: 'INVALID_STATUS' } });
|
|
return;
|
|
}
|
|
await database_1.prisma.user.update({
|
|
where: { id },
|
|
data: { status: client_1.UserStatus.ACTIVE },
|
|
});
|
|
// Send approval notification email
|
|
const adminUrl = env_1.env.ADMIN_URL || 'http://localhost:3000';
|
|
await email_service_1.emailService.sendAccountApprovedEmail({
|
|
recipientEmail: user.email,
|
|
recipientName: user.name || 'there',
|
|
loginUrl: `${adminUrl}/login`,
|
|
}).catch(err => logger_1.logger.error('Failed to send approval email:', err));
|
|
// Fire-and-forget: provision approved user to eager services
|
|
provisioning_service_1.userProvisioningService.onUserCreated({
|
|
id: user.id, email: user.email, name: user.name, role: user.role,
|
|
roles: user.roles, status: 'ACTIVE', permissions: user.permissions,
|
|
}).catch(err => logger_1.logger.warn('User provisioning hook (approve) failed:', err));
|
|
res.json({ message: 'User approved', userId: id });
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// POST /api/users/:id/reject — reject pending user (SUPER_ADMIN or canManageUsers)
|
|
const rejectSchema = zod_1.z.object({
|
|
reason: zod_1.z.string().max(500).optional(),
|
|
});
|
|
router.post('/:id/reject', requireUserManagement, (0, validate_1.validate)(rejectSchema), async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
const user = await database_1.prisma.user.findUnique({ where: { id } });
|
|
if (!user) {
|
|
res.status(404).json({ error: { message: 'User not found', code: 'USER_NOT_FOUND' } });
|
|
return;
|
|
}
|
|
if (user.status !== client_1.UserStatus.PENDING_APPROVAL) {
|
|
res.status(400).json({ error: { message: 'User is not pending approval', code: 'INVALID_STATUS' } });
|
|
return;
|
|
}
|
|
await database_1.prisma.user.update({
|
|
where: { id },
|
|
data: { status: client_1.UserStatus.INACTIVE },
|
|
});
|
|
res.json({ message: 'User rejected', userId: id });
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// GET /api/users/:id/contact — get linked Contact for a user (any admin)
|
|
router.get('/:id/contact', (0, rbac_middleware_1.requireRole)(...roles_1.ADMIN_ROLES), async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
const contact = await database_1.prisma.contact.findFirst({
|
|
where: { userId: id, mergedIntoId: null },
|
|
select: {
|
|
id: true, displayName: true, email: true, phone: true,
|
|
tags: true, supportLevel: true, primarySource: true,
|
|
profileToken: true, coverPhotoPath: true,
|
|
},
|
|
});
|
|
res.json({ contact: contact || null });
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
// DELETE /api/users/:id — delete user (SUPER_ADMIN or canManageUsers)
|
|
router.delete('/:id', requireUserManagement, async (req, res, next) => {
|
|
try {
|
|
const id = req.params.id;
|
|
await users_service_1.usersService.delete(id);
|
|
res.status(204).send();
|
|
}
|
|
catch (err) {
|
|
next(err);
|
|
}
|
|
});
|
|
//# sourceMappingURL=users.routes.js.map
|