W0 — security hardening (5 fixes verified live on disclosure.top)
- middleware: gate /api/admin/* same as /admin/* (F1)
- imgproxy: tighten LOCAL_FILESYSTEM_ROOT from / to /var/lib/storage (F2)
- studio: real basic-auth label (bcrypt hash, middleware reference) (F3)
- relations: ENABLE ROW LEVEL SECURITY + public SELECT policy (F4)
- migration 0003: fold is_searchable + hybrid_search update into canonical (TD#2)
W1 — observability + resilience + autocomplete
- studio: HOSTNAME=0.0.0.0 so Next.js binds on loopback for healthcheck
- compose: PG_POOL_MAX=20, CLAUDE_CODE_OAUTH_TOKEN gated by separate env
- claude-code.ts: subprocess timeout configurable (CLAUDE_CODE_TIMEOUT_MS)
- openrouter.ts: retry with exponential backoff + Retry-After + in-memory
circuit breaker (promotes FALLBACK after CB_THRESHOLD failures)
- lib/logger.ts: pino logger (NDJSON prod / pretty dev) + withRequest helper
- middleware: mints correlation_id, stamps x-correlation-id response header,
emits structured http_request log per /api/* call
- messages/route.ts: switch to structured logger
- 60_meili_index.py: push documents + chunks into Meilisearch
- /api/search/autocomplete: parallel meili search (docs + chunks), 5-8ms p50
- search-autocomplete.tsx: debounced dropdown wired into search-panel
W1.2 — Glitchtip + Forgejo self-hosted
- compose: glitchtip-redis + glitchtip-web + glitchtip-worker (v4.2)
- compose: forgejo + forgejo-runner (server v9, runner v6) with group_add=988
- @sentry/nextjs SDK wired (instrumentation.ts + sentry.{client,server}.config.ts)
- /api/admin/throw smoke endpoint (gated by W0-F1 middleware)
- Synthetic event ingestion verified at glitchtip.disclosure.top
- forgejo.disclosure.top up, repo discadmin/disclosure-bureau created,
runner registered (labels: ubuntu-latest, docker)
- .forgejo/workflows/ci.yml: typecheck + lint + build + npm audit + python
syntax + compose validation
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
84 lines
2.8 KiB
TypeScript
84 lines
2.8 KiB
TypeScript
/**
|
|
* Next.js middleware — refreshes the Supabase auth session on every request,
|
|
* so Server Components see the latest user state.
|
|
*
|
|
* Skipped on static assets and the static-file API to keep them fast.
|
|
*/
|
|
import { NextResponse, type NextRequest } from "next/server";
|
|
import { createServerClient, type CookieOptions } from "@supabase/ssr";
|
|
import { log, correlationId } from "@/lib/logger";
|
|
|
|
export async function middleware(request: NextRequest) {
|
|
const t0 = Date.now();
|
|
const url = process.env.NEXT_PUBLIC_SUPABASE_URL;
|
|
const key = process.env.NEXT_PUBLIC_SUPABASE_ANON_KEY;
|
|
const reqId = correlationId(request);
|
|
|
|
let response = NextResponse.next({ request });
|
|
// Stamp every response so downstream handlers and the client see the same id.
|
|
response.headers.set("x-correlation-id", reqId);
|
|
|
|
if (!url || !key) {
|
|
// Supabase not configured — skip auth refresh entirely
|
|
return response;
|
|
}
|
|
|
|
const supabase = createServerClient(url, key, {
|
|
cookies: {
|
|
getAll() {
|
|
return request.cookies.getAll();
|
|
},
|
|
setAll(toSet: Array<{ name: string; value: string; options?: CookieOptions }>) {
|
|
toSet.forEach(({ name, value }) => request.cookies.set(name, value));
|
|
response = NextResponse.next({ request });
|
|
toSet.forEach(({ name, value, options }) => response.cookies.set(name, value, options));
|
|
},
|
|
},
|
|
});
|
|
|
|
// Trigger refresh (silently if token still valid)
|
|
const { data: { user } } = await supabase.auth.getUser();
|
|
|
|
// Gate /admin/* AND /api/admin/* by role. Non-admin (including anonymous)
|
|
// gets a public 404, not a redirect — we don't want to leak the existence
|
|
// of the route. (Audit W0-F1 — fechado 2026-05-23.)
|
|
const pathname = request.nextUrl.pathname;
|
|
if (pathname.startsWith("/admin") || pathname.startsWith("/api/admin")) {
|
|
if (!user) {
|
|
return new NextResponse("Not Found", { status: 404 });
|
|
}
|
|
const { data: profile } = await supabase
|
|
.from("profiles")
|
|
.select("role")
|
|
.eq("id", user.id)
|
|
.maybeSingle();
|
|
if (profile?.role !== "admin") {
|
|
return new NextResponse("Not Found", { status: 404 });
|
|
}
|
|
}
|
|
|
|
// Log API requests with correlation id + timing. Skip noisy paths (assets,
|
|
// crops) and prefer one structured line per request so Glitchtip / log
|
|
// aggregators can correlate.
|
|
if (pathname.startsWith("/api/") && !pathname.startsWith("/api/static") && !pathname.startsWith("/api/crop")) {
|
|
log.info(
|
|
{
|
|
event: "http_request",
|
|
method: request.method,
|
|
path: pathname,
|
|
correlation_id: reqId,
|
|
duration_ms: Date.now() - t0,
|
|
},
|
|
`${request.method} ${pathname}`,
|
|
);
|
|
}
|
|
|
|
return response;
|
|
}
|
|
|
|
export const config = {
|
|
matcher: [
|
|
// Match everything EXCEPT static files + the static-file API
|
|
"/((?!_next/static|_next/image|favicon.ico|api/static).*)",
|
|
],
|
|
};
|