2023-07-23 15:08:43 +00:00
|
|
|
import { ApolloServer } from '@apollo/server'
|
|
|
|
import { startServerAndCreateNextHandler } from '@as-integrations/next'
|
2024-03-20 00:37:31 +00:00
|
|
|
import resolvers from '@/api/resolvers'
|
|
|
|
import models from '@/api/models'
|
|
|
|
import lnd from '@/api/lnd'
|
|
|
|
import typeDefs from '@/api/typeDefs'
|
2023-07-29 19:38:20 +00:00
|
|
|
import { getServerSession } from 'next-auth/next'
|
|
|
|
import { getAuthOptions } from './auth/[...nextauth]'
|
2024-03-20 00:37:31 +00:00
|
|
|
import search from '@/api/search'
|
2023-11-21 22:46:03 +00:00
|
|
|
import {
|
|
|
|
ApolloServerPluginLandingPageLocalDefault,
|
|
|
|
ApolloServerPluginLandingPageProductionDefault
|
|
|
|
} from '@apollo/server/plugin/landingPage/default'
|
2021-03-25 19:29:24 +00:00
|
|
|
|
2022-04-27 22:06:42 +00:00
|
|
|
const apolloServer = new ApolloServer({
|
2021-03-25 19:29:24 +00:00
|
|
|
typeDefs,
|
|
|
|
resolvers,
|
2023-11-22 15:16:40 +00:00
|
|
|
introspection: true,
|
2022-04-28 18:11:05 +00:00
|
|
|
plugins: [{
|
|
|
|
requestDidStart (initialRequestContext) {
|
|
|
|
return {
|
2023-07-27 00:18:42 +00:00
|
|
|
executionDidStart () {
|
2022-04-28 18:11:05 +00:00
|
|
|
return {
|
|
|
|
willResolveField ({ source, args, context, info }) {
|
|
|
|
const start = process.hrtime.bigint()
|
|
|
|
return (error, result) => {
|
|
|
|
const end = process.hrtime.bigint()
|
|
|
|
const ms = (end - start) / 1000000n
|
2024-07-01 21:48:54 +00:00
|
|
|
if (process.env.GRAPHQL_SLOW_LOGS_MS && ms > process.env.GRAPHQL_SLOW_LOGS_MS) {
|
2022-04-28 18:11:05 +00:00
|
|
|
console.log(`Field ${info.parentType.name}.${info.fieldName} took ${ms}ms`)
|
|
|
|
}
|
|
|
|
if (error) {
|
2023-07-23 15:08:43 +00:00
|
|
|
console.log(`Field ${info.parentType.name}.${info.fieldName} failed with ${error}`)
|
2022-04-28 18:11:05 +00:00
|
|
|
}
|
|
|
|
}
|
2023-07-27 00:18:42 +00:00
|
|
|
},
|
|
|
|
async executionDidEnd (err) {
|
|
|
|
if (err) {
|
|
|
|
console.error('hey bud', err)
|
|
|
|
}
|
2022-04-28 18:11:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-11-21 22:46:03 +00:00
|
|
|
},
|
|
|
|
process.env.NODE_ENV === 'production'
|
|
|
|
? ApolloServerPluginLandingPageProductionDefault(
|
|
|
|
{ embed: { endpointIsEditable: false, persistExplorerState: true, displayOptions: { theme: 'dark' } }, footer: false })
|
|
|
|
: ApolloServerPluginLandingPageLocalDefault(
|
|
|
|
{ embed: { endpointIsEditable: false, persistExplorerState: true, displayOptions: { theme: 'dark' } }, footer: false })]
|
2023-07-23 15:08:43 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
export default startServerAndCreateNextHandler(apolloServer, {
|
2023-07-29 19:38:20 +00:00
|
|
|
context: async (req, res) => {
|
2024-03-14 20:32:34 +00:00
|
|
|
const apiKey = req.headers['x-api-key']
|
|
|
|
let session
|
|
|
|
if (apiKey) {
|
2024-03-26 18:26:09 +00:00
|
|
|
const [user] = await models.$queryRaw`
|
2024-05-04 23:06:15 +00:00
|
|
|
SELECT id, name, "apiKeyEnabled"
|
2024-03-26 18:26:09 +00:00
|
|
|
FROM users
|
|
|
|
WHERE "apiKeyHash" = encode(digest(${apiKey}, 'sha256'), 'hex')
|
|
|
|
LIMIT 1`
|
2024-03-14 20:32:34 +00:00
|
|
|
if (user?.apiKeyEnabled) {
|
|
|
|
const { apiKeyEnabled, ...sessionFields } = user
|
|
|
|
session = { user: { ...sessionFields, apiKey: true } }
|
|
|
|
}
|
|
|
|
} else {
|
2024-09-12 18:05:11 +00:00
|
|
|
req = multiAuthMiddleware(req)
|
2024-03-14 20:32:34 +00:00
|
|
|
session = await getServerSession(req, res, getAuthOptions(req))
|
|
|
|
}
|
2021-04-12 18:05:09 +00:00
|
|
|
return {
|
|
|
|
models,
|
2023-12-14 17:30:51 +00:00
|
|
|
headers: req.headers,
|
2021-04-29 21:58:43 +00:00
|
|
|
lnd,
|
2022-04-21 22:50:02 +00:00
|
|
|
me: session
|
2022-05-06 19:32:20 +00:00
|
|
|
? session.user
|
2022-04-21 22:50:02 +00:00
|
|
|
: null,
|
2023-08-17 00:48:45 +00:00
|
|
|
search
|
2021-04-12 18:05:09 +00:00
|
|
|
}
|
|
|
|
}
|
2021-03-25 19:29:24 +00:00
|
|
|
})
|
2024-09-12 18:05:11 +00:00
|
|
|
|
|
|
|
function multiAuthMiddleware (request) {
|
|
|
|
// switch next-auth session cookie with multi_auth cookie if cookie pointer present
|
|
|
|
|
|
|
|
// is there a cookie pointer?
|
|
|
|
const cookiePointerName = 'multi_auth.user-id'
|
|
|
|
const hasCookiePointer = !!request.cookies[cookiePointerName]
|
|
|
|
|
2024-09-13 18:00:16 +00:00
|
|
|
const secure = process.env.NODE_ENV === 'production'
|
2024-09-13 17:27:52 +00:00
|
|
|
|
2024-09-12 18:05:11 +00:00
|
|
|
// is there a session?
|
2024-09-13 17:27:52 +00:00
|
|
|
const sessionCookieName = secure ? '__Secure-next-auth.session-token' : 'next-auth.session-token'
|
2024-09-12 18:05:11 +00:00
|
|
|
const hasSession = !!request.cookies[sessionCookieName]
|
|
|
|
|
|
|
|
if (!hasCookiePointer || !hasSession) {
|
|
|
|
// no session or no cookie pointer. do nothing.
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
const userId = request.cookies[cookiePointerName]
|
|
|
|
if (userId === 'anonymous') {
|
|
|
|
// user switched to anon. only delete session cookie.
|
|
|
|
delete request.cookies[sessionCookieName]
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
const userJWT = request.cookies[`multi_auth.${userId}`]
|
|
|
|
if (!userJWT) {
|
|
|
|
// no JWT for account switching found
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
if (userJWT) {
|
|
|
|
// use JWT found in cookie pointed to by cookie pointer
|
|
|
|
request.cookies[sessionCookieName] = userJWT
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
return request
|
|
|
|
}
|