disclosure-bureau/web/middleware.ts
Luiz Gustavo 55cac8a395
Some checks failed
CI / Web — typecheck + lint + build (push) Failing after 1m30s
CI / Scripts — Python smoke (push) Failing after 32s
CI / Web — npm audit (push) Failing after 37s
W0+W1+W1.2: security hardening, observability, autocomplete, glitchtip, forgejo CI
W0 — security hardening (5 fixes verified live on disclosure.top)
- middleware: gate /api/admin/* same as /admin/* (F1)
- imgproxy: tighten LOCAL_FILESYSTEM_ROOT from / to /var/lib/storage (F2)
- studio: real basic-auth label (bcrypt hash, middleware reference) (F3)
- relations: ENABLE ROW LEVEL SECURITY + public SELECT policy (F4)
- migration 0003: fold is_searchable + hybrid_search update into canonical (TD#2)

W1 — observability + resilience + autocomplete
- studio: HOSTNAME=0.0.0.0 so Next.js binds on loopback for healthcheck
- compose: PG_POOL_MAX=20, CLAUDE_CODE_OAUTH_TOKEN gated by separate env
- claude-code.ts: subprocess timeout configurable (CLAUDE_CODE_TIMEOUT_MS)
- openrouter.ts: retry with exponential backoff + Retry-After + in-memory
  circuit breaker (promotes FALLBACK after CB_THRESHOLD failures)
- lib/logger.ts: pino logger (NDJSON prod / pretty dev) + withRequest helper
- middleware: mints correlation_id, stamps x-correlation-id response header,
  emits structured http_request log per /api/* call
- messages/route.ts: switch to structured logger
- 60_meili_index.py: push documents + chunks into Meilisearch
- /api/search/autocomplete: parallel meili search (docs + chunks), 5-8ms p50
- search-autocomplete.tsx: debounced dropdown wired into search-panel

W1.2 — Glitchtip + Forgejo self-hosted
- compose: glitchtip-redis + glitchtip-web + glitchtip-worker (v4.2)
- compose: forgejo + forgejo-runner (server v9, runner v6) with group_add=988
- @sentry/nextjs SDK wired (instrumentation.ts + sentry.{client,server}.config.ts)
- /api/admin/throw smoke endpoint (gated by W0-F1 middleware)
- Synthetic event ingestion verified at glitchtip.disclosure.top
- forgejo.disclosure.top up, repo discadmin/disclosure-bureau created,
  runner registered (labels: ubuntu-latest, docker)
- .forgejo/workflows/ci.yml: typecheck + lint + build + npm audit + python
  syntax + compose validation

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-23 18:18:42 -03:00

84 lines
2.8 KiB
TypeScript

/**
* Next.js middleware — refreshes the Supabase auth session on every request,
* so Server Components see the latest user state.
*
* Skipped on static assets and the static-file API to keep them fast.
*/
import { NextResponse, type NextRequest } from "next/server";
import { createServerClient, type CookieOptions } from "@supabase/ssr";
import { log, correlationId } from "@/lib/logger";
export async function middleware(request: NextRequest) {
const t0 = Date.now();
const url = process.env.NEXT_PUBLIC_SUPABASE_URL;
const key = process.env.NEXT_PUBLIC_SUPABASE_ANON_KEY;
const reqId = correlationId(request);
let response = NextResponse.next({ request });
// Stamp every response so downstream handlers and the client see the same id.
response.headers.set("x-correlation-id", reqId);
if (!url || !key) {
// Supabase not configured — skip auth refresh entirely
return response;
}
const supabase = createServerClient(url, key, {
cookies: {
getAll() {
return request.cookies.getAll();
},
setAll(toSet: Array<{ name: string; value: string; options?: CookieOptions }>) {
toSet.forEach(({ name, value }) => request.cookies.set(name, value));
response = NextResponse.next({ request });
toSet.forEach(({ name, value, options }) => response.cookies.set(name, value, options));
},
},
});
// Trigger refresh (silently if token still valid)
const { data: { user } } = await supabase.auth.getUser();
// Gate /admin/* AND /api/admin/* by role. Non-admin (including anonymous)
// gets a public 404, not a redirect — we don't want to leak the existence
// of the route. (Audit W0-F1 — fechado 2026-05-23.)
const pathname = request.nextUrl.pathname;
if (pathname.startsWith("/admin") || pathname.startsWith("/api/admin")) {
if (!user) {
return new NextResponse("Not Found", { status: 404 });
}
const { data: profile } = await supabase
.from("profiles")
.select("role")
.eq("id", user.id)
.maybeSingle();
if (profile?.role !== "admin") {
return new NextResponse("Not Found", { status: 404 });
}
}
// Log API requests with correlation id + timing. Skip noisy paths (assets,
// crops) and prefer one structured line per request so Glitchtip / log
// aggregators can correlate.
if (pathname.startsWith("/api/") && !pathname.startsWith("/api/static") && !pathname.startsWith("/api/crop")) {
log.info(
{
event: "http_request",
method: request.method,
path: pathname,
correlation_id: reqId,
duration_ms: Date.now() - t0,
},
`${request.method} ${pathname}`,
);
}
return response;
}
export const config = {
matcher: [
// Match everything EXCEPT static files + the static-file API
"/((?!_next/static|_next/image|favicon.ico|api/static).*)",
],
};