Files
hipmi/src/middleware.tsx
bagasbanuna d43f3762a3 Fixed Bug Server
## Summary
This branch contains several bug fixes and performance improvements, primarily focusing on:
- Database connection management
- MQTT client stability
- Logging optimization
- API enhancements

## Detailed Changes

### Fixed Issues
1. **Database Connection Management**
   - Removed  from user-validate API route to prevent connection pool exhaustion
   - Added proper connection handling in global Prisma setup
   - Reduced logging verbosity in production environments

2. **MQTT Client Improvements**
   - Enhanced MQTT client initialization with proper error handling
   - Added reconnection logic with configurable intervals
   - Implemented cleanup functions to prevent memory leaks
   - Added separate initialization logic for server and client-side code

3. **Logging Optimization**
   - Removed excessive logging in middleware that was causing high CPU usage
   - Configured appropriate log levels for development and production

4. **Component Stability**
   - Added safety checks in text editor component to prevent MQTT operations on the server side
   - Improved MQTT publishing logic with client availability checks

### New Files
-  - Utility functions for safe database operations

### Modified Files
1.
   - Removed problematic  call

2.
   - Configured different logging levels for dev/prod
   - Removed process listeners that were causing disconnections
   - Exported prisma instance separately

3.
   - Removed excessive logging statements

4.
   - Enhanced initialization with error handling
   - Added reconnection and timeout configurations

5.
   - Added proper cleanup functions
   - Improved connection handling

6.
   - Added MQTT client availability checks
   - Prevented server-side MQTT operations

### Performance Improvements
- Reduced database connection overhead
- Optimized MQTT connection handling
- Eliminated unnecessary logging in production
- Better memory management with proper cleanup functions

### No Issue
2026-02-12 16:29:03 +08:00

417 lines
11 KiB
TypeScript

import { jwtVerify } from "jose";
import { NextRequest, NextResponse } from "next/server";
type MiddlewareConfig = {
apiPath: string;
loginPath: string;
userPath: string;
publicRoutes: string[];
encodedKey: string;
sessionKey: string;
validationApiRoute: string;
log: boolean;
};
const CONFIG: MiddlewareConfig = {
apiPath: "/api",
loginPath: "/login",
userPath: "/dev/home",
publicRoutes: [
"/",
"/.well-known/*",
"/terms-of-service.html",
"/privacy-policy.html",
"/api/helper/*",
"/api/not-user/*",
"/api/voting/*",
"/api/collaboration/*",
"/api/notifikasi/*",
"/api/logs/*",
"/api/auth/*",
"/api/admin/donasi/*",
"/api/admin/investasi/*",
"/api/admin/collaboration/*",
"/api/get-cookie",
"/api/user/activation",
"/api/user-validate",
"/api/version",
"/api/validation",
"/login",
"/register",
"/validasi",
"/splash",
"/support-center",
"/delete-account",
"/invalid-user",
"/job-vacancy/*",
"/preview-image",
"/auth/login",
"/auth/api/login",
"/waiting-room",
"/zCoba/*",
"/aset/global/main_background.png",
"/aset/logo/logo-hipmi.png",
"/aset/logo/hiconnect.png",
],
encodedKey: process.env.NEXT_PUBLIC_BASE_TOKEN_KEY!,
sessionKey: process.env.NEXT_PUBLIC_BASE_SESSION_KEY!,
validationApiRoute: "/api/validation",
log: false,
};
export const middleware = async (req: NextRequest) => {
const { apiPath, encodedKey, loginPath, publicRoutes, sessionKey, userPath } =
CONFIG;
const { pathname } = req.nextUrl;
const apiBaseUrl = new URL(req.url).origin || process.env.NEXT_PUBLIC_API_URL;
// Removed excessive logging that was causing high CPU usage
// const dbUrl = process.env.DATABASE_URL;
// console.log("DATABASE_URL >>", dbUrl);
// console.log("URL Access >>", req.url);
// Handle CORS preflight
const corsResponse = handleCors(req);
if (corsResponse) return corsResponse;
// Check if route is public
const isPublicRoute = isRoutePublic(pathname, publicRoutes, loginPath);
if (isPublicRoute && pathname !== loginPath) {
return setCorsHeaders(NextResponse.next());
}
// Get token from cookie or Authorization header
const token = getToken(req, sessionKey);
const user = await verifyToken({ token, encodedKey });
// Handle login page access
if (pathname === loginPath) {
if (user) {
const response = NextResponse.redirect(new URL(userPath, req.url));
if (token) setTokenCookie(response, sessionKey, token);
return setCorsHeaders(response);
}
return setCorsHeaders(NextResponse.next());
}
// Redirect to login if no valid user
if (!user) {
const response = NextResponse.redirect(new URL(loginPath, req.url));
deleteTokenCookie(response, sessionKey);
return setCorsHeaders(response);
}
// Handle API requests under /api
if (pathname.startsWith(apiPath)) {
if (!token) return setCorsHeaders(unauthorizedResponseTokenAPI());
try {
const validationResponse = await fetch(
`${apiBaseUrl}${CONFIG.validationApiRoute}`,
{
headers: { Authorization: `Bearer ${token}` },
}
);
if (!validationResponse.ok) {
return setCorsHeaders(unauthorizedResponseAPI());
}
const validationData = await validationResponse.json();
if (validationData.success === false) {
return setCorsHeaders(unauthorizedResponseDataUserNotFound(req));
}
} catch (error) {
console.error("Error validating API request:", error);
return setCorsHeaders(unauthorizedResponseValidationAPIRequest());
}
}
// Handle /dev routes - active user check
if (pathname.startsWith("/dev")) {
try {
const userValidateResponse = await fetch(
`${apiBaseUrl}/api/user-validate`,
{
headers: {
"Content-Type": "application/json",
Authorization: `Bearer ${token}`,
},
}
);
if (!userValidateResponse.ok) {
return setCorsHeaders(unauthorizedResponseAPIUserValidate(req));
}
const userValidateJson = await userValidateResponse.json();
if (userValidateJson.success === true && !userValidateJson.data) {
return setCorsHeaders(unauthorizedResponseDataUserNotFound(req));
}
if (!userValidateJson.data.active) {
return setCorsHeaders(unauthorizedResponseUserNotActive(req));
}
} catch (error) {
console.error("Error during user validation API:", error);
if (!token) return setCorsHeaders(unauthorizedResponseTokenPAGE());
return setCorsHeaders(
await unauthorizedResponseValidationUser({
loginPath,
sessionKey,
token,
req,
})
);
}
}
if (pathname.startsWith("/dev/admin")) {
try {
const userValidateResponse = await fetch(
`${apiBaseUrl}/api/user-validate`,
{
headers: {
"Content-Type": "application/json",
Authorization: `Bearer ${token}`,
},
}
);
if (!userValidateResponse.ok) {
return setCorsHeaders(unauthorizedResponseAPIUserValidate(req));
}
const userValidateJson = await userValidateResponse.json();
if (userValidateJson.success === true && !userValidateJson.data) {
return setCorsHeaders(unauthorizedResponseDataUserNotFound(req));
}
if (userValidateJson.data.masterUserRoleId === "1") {
return setCorsHeaders(unauthorizedResponseUserNotAdmin(req));
}
if (!userValidateJson.data.active) {
return setCorsHeaders(unauthorizedResponseUserNotActive(req));
}
} catch (error) {
console.error("Error during user validation API:", error);
if (!token) return setCorsHeaders(unauthorizedResponseTokenPAGE());
return setCorsHeaders(
await unauthorizedResponseValidationUser({
loginPath,
sessionKey,
token,
req,
})
);
}
}
// Default: proceed with request and add CORS headers
const response = NextResponse.next();
return setCorsHeaders(response);
};
// ========================== HELPERS ==========================
function isRoutePublic(
pathname: string,
publicRoutes: string[],
loginPath: string
): boolean {
return [...publicRoutes, loginPath].some((route) => {
const pattern = route.replace(/\*/g, ".*");
return new RegExp(`^${pattern}$`).test(pathname);
});
}
function getToken(req: NextRequest, sessionKey: string): string | undefined {
const tokenFromCookie = req.cookies.get(sessionKey)?.value;
if (tokenFromCookie) return tokenFromCookie;
const authHeader = req.headers.get("Authorization");
if (authHeader && authHeader.startsWith("Bearer ")) {
return authHeader.split(" ")[1];
}
return undefined;
}
function cookieOptions() {
return {
secure: process.env.NODE_ENV === "production",
sameSite: "lax" as const,
path: "/",
httpOnly: true,
};
}
function setTokenCookie(
response: NextResponse,
sessionKey: string,
token: string
) {
response.cookies.set(sessionKey, token, cookieOptions());
}
function deleteTokenCookie(response: NextResponse, sessionKey: string) {
response.cookies.delete(sessionKey);
}
function setCorsHeaders(res: NextResponse): NextResponse {
res.headers.set("Access-Control-Allow-Origin", "*");
res.headers.set(
"Access-Control-Allow-Methods",
"GET, POST, PUT, DELETE, OPTIONS"
);
res.headers.set(
"Access-Control-Allow-Headers",
"Content-Type, Authorization"
);
return res;
}
function handleCors(req: NextRequest): NextResponse | null {
if (req.method === "OPTIONS") {
return new NextResponse(null, {
status: 204,
headers: {
"Access-Control-Allow-Origin": "*",
"Access-Control-Allow-Methods": "GET, POST, PUT, DELETE, OPTIONS",
"Access-Control-Allow-Headers": "Content-Type, Authorization",
"Access-Control-Max-Age": "86400",
},
});
}
return null;
}
async function verifyToken({
token,
encodedKey,
}: {
token: string | undefined;
encodedKey: string;
}): Promise<Record<string, unknown> | null> {
if (!token) return null;
try {
const enc = new TextEncoder().encode(encodedKey);
const { payload } = await jwtVerify(token, enc, { algorithms: ["HS256"] });
return (payload.user as Record<string, unknown>) || null;
} catch (error) {
console.error("Token verification failed:", error);
return null;
}
}
function unauthorizedResponse() {
return new NextResponse(JSON.stringify({ error: "Unauthorized" }), {
status: 401,
headers: { "Content-Type": "application/json" },
});
}
function unauthorizedResponseTokenAPI() {
return new NextResponse(
JSON.stringify({ error: "Unauthorized token on API" }),
{
status: 401,
headers: { "Content-Type": "application/json" },
}
);
}
function unauthorizedResponseTokenPAGE() {
return new NextResponse(JSON.stringify({ error: "Unauthorized on page" }), {
status: 401,
headers: { "Content-Type": "application/json" },
});
}
function unauthorizedResponseAPI() {
return new NextResponse(
JSON.stringify({ error: "Unauthorized Response API" }),
{
status: 401,
headers: { "Content-Type": "application/json" },
}
);
}
function unauthorizedResponseValidationAPIRequest() {
return new NextResponse(
JSON.stringify({ error: "Unauthorized validation api request" }),
{
status: 401,
headers: { "Content-Type": "application/json" },
}
);
}
function unauthorizedResponseAPIUserValidate(req: NextRequest) {
return setCorsHeaders(
NextResponse.redirect(new URL("/waiting-room", req.url))
);
// return new NextResponse(
// JSON.stringify({ error: "Unauthorized api user validate" }),
// {
// status: 401,
// headers: { "Content-Type": "application/json" },
// }
// );
}
function unauthorizedResponseDataUserNotFound(req: NextRequest) {
return setCorsHeaders(
NextResponse.redirect(new URL("/invalid-user", req.url))
);
}
function unauthorizedResponseUserNotActive(req: NextRequest) {
return setCorsHeaders(
NextResponse.redirect(new URL("/waiting-room", req.url))
);
}
function unauthorizedResponseUserNotAdmin(req: NextRequest) {
return setCorsHeaders(NextResponse.redirect(new URL("/dev/home", req.url)));
}
async function unauthorizedResponseValidationUser({
loginPath,
sessionKey,
token,
req,
}: {
loginPath: string;
sessionKey: string;
token: string;
req: NextRequest;
}) {
const userLogout = await fetch(new URL("/api/auth/logout", req.url), {
headers: {
"Content-Type": "application/json",
Authorization: `Bearer ${token}`,
},
});
if (userLogout.ok) {
const response = NextResponse.redirect(new URL(loginPath, req.url));
deleteTokenCookie(response, sessionKey);
return setCorsHeaders(response);
}
console.error("Error logging out user:", await userLogout.json());
return setCorsHeaders(
NextResponse.redirect(new URL("/invalid-user", req.url))
);
}
export const config = {
matcher: ["/((?!_next|static|favicon.ico|manifest).*)"],
};