1 line
7.2 KiB
JavaScript
1 line
7.2 KiB
JavaScript
(()=>{var e={};e.id=7435,e.ids=[7435],e.modules={3295:e=>{"use strict";e.exports=require("next/dist/server/app-render/after-task-async-storage.external.js")},10846:e=>{"use strict";e.exports=require("next/dist/compiled/next-server/app-page.runtime.prod.js")},11723:e=>{"use strict";e.exports=require("querystring")},12412:e=>{"use strict";e.exports=require("assert")},26690:(e,r,s)=>{"use strict";s.d(r,{N:()=>i});var t=s(1926),o=s(10591);function a(e){let r=process.env[e];if(!r)throw Error(`Missing required environment variable: ${e}`);return r}async function n(e){try{let r=await fetch(`${process.env.KEYCLOAK_ISSUER}/protocol/openid-connect/token`,{headers:{"Content-Type":"application/x-www-form-urlencoded"},body:new URLSearchParams({client_id:process.env.KEYCLOAK_CLIENT_ID,client_secret:process.env.KEYCLOAK_CLIENT_SECRET,grant_type:"refresh_token",refresh_token:e.refreshToken||""}),method:"POST"}),s=await r.json();if(!r.ok)throw s;return{...e,accessToken:s.access_token,refreshToken:s.refresh_token??e.refreshToken,accessTokenExpires:Date.now()+1e3*s.expires_in}}catch(r){return console.error("Error refreshing access token:",r),{...e,error:"RefreshAccessTokenError"}}}let i={providers:[(0,t.A)({clientId:a("KEYCLOAK_CLIENT_ID"),clientSecret:a("KEYCLOAK_CLIENT_SECRET"),issuer:a("KEYCLOAK_ISSUER"),authorization:{params:{scope:"openid profile email roles"}},profile(e){console.log("Keycloak profile callback:",{rawProfile:e,rawRoles:e.roles,realmAccess:e.realm_access,groups:e.groups});let r=e.realm_access?.roles||[];console.log("Profile callback raw roles:",r);let s=r.map(e=>e.replace(/^ROLE_/,"").toLowerCase());return console.log("Profile callback cleaned roles:",s),{id:e.sub,name:e.name??e.preferred_username,email:e.email,first_name:e.given_name??"",last_name:e.family_name??"",username:e.preferred_username??e.email?.split("@")[0]??"",role:s}}})],session:{strategy:"jwt",maxAge:2592e3},callbacks:{async jwt({token:e,account:r,profile:s}){if(r&&s){let t=(s.realm_access?.roles||[]).map(e=>e.replace(/^ROLE_/,"").toLowerCase());e.accessToken=r.access_token??"",e.refreshToken=r.refresh_token??"",e.accessTokenExpires=r.expires_at??0,e.sub=s.sub,e.role=t,e.username=s.preferred_username??"",e.first_name=s.given_name??"",e.last_name=s.family_name??""}else if(e.accessToken)try{let r=(0,o.s)(e.accessToken);r.realm_access?.roles&&(e.role=r.realm_access.roles.map(e=>e.replace(/^ROLE_/,"").toLowerCase()))}catch(e){console.error("Error decoding token:",e)}return Date.now()<1e3*e.accessTokenExpires?e:n(e)},async session({session:e,token:r}){if(r.error)throw Error(r.error);let s=Array.isArray(r.role)?r.role:[];return e.user={id:r.sub??"",email:r.email??null,name:r.name??null,image:null,username:r.username??"",first_name:r.first_name??"",last_name:r.last_name??"",role:s,nextcloudInitialized:!1},e.accessToken=r.accessToken,e}},pages:{signIn:"/signin",error:"/signin"},debug:!1}},28354:e=>{"use strict";e.exports=require("util")},29294:e=>{"use strict";e.exports=require("next/dist/server/app-render/work-async-storage.external.js")},44870:e=>{"use strict";e.exports=require("next/dist/compiled/next-server/app-route.runtime.prod.js")},55511:e=>{"use strict";e.exports=require("crypto")},55591:e=>{"use strict";e.exports=require("https")},56794:(e,r,s)=>{"use strict";s.r(r),s.d(r,{patchFetch:()=>w,routeModule:()=>_,serverHooks:()=>h,workAsyncStorage:()=>f,workUnitAsyncStorage:()=>g});var t={};s.r(t),s.d(t,{DELETE:()=>E,GET:()=>l,PATCH:()=>m,PUT:()=>d});var o=s(96559),a=s(48088),n=s(37719),i=s(35426),c=s(26690),u=s(32190);async function p(){let e=await fetch(`${process.env.KEYCLOAK_BASE_URL}/realms/${process.env.KEYCLOAK_REALM}/protocol/openid-connect/token`,{method:"POST",headers:{"Content-Type":"application/x-www-form-urlencoded"},body:new URLSearchParams({grant_type:"client_credentials",client_id:process.env.KEYCLOAK_CLIENT_ID,client_secret:process.env.KEYCLOAK_CLIENT_SECRET})}),r=await e.json();if(!e.ok)throw Error(r.error_description||"Failed to get admin token");return r.access_token}async function l(e,r){let s=await r.params;try{if(!await (0,i.getServerSession)(c.N))return u.NextResponse.json({error:"Non autoris\xe9"},{status:401});let e=await p(),r=await fetch(`${process.env.KEYCLOAK_BASE_URL}/admin/realms/${process.env.KEYCLOAK_REALM}/groups/${s.groupId}`,{headers:{Authorization:`Bearer ${e}`}});if(!r.ok)throw Error("Failed to fetch group");let t=await r.json();return u.NextResponse.json(t)}catch(e){return console.error("Get Group Error:",e),u.NextResponse.json({error:"Erreur lors de la r\xe9cup\xe9ration du groupe"},{status:500})}}async function d(e,r){let s=await r.params;try{if(!await (0,i.getServerSession)(c.N))return u.NextResponse.json({error:"Non autoris\xe9"},{status:401});let r=await p(),t=await e.json();if(!(await fetch(`${process.env.KEYCLOAK_BASE_URL}/admin/realms/${process.env.KEYCLOAK_REALM}/groups/${s.groupId}`,{method:"PUT",headers:{Authorization:`Bearer ${r}`,"Content-Type":"application/json"},body:JSON.stringify(t)})).ok)throw Error("Failed to update group");return u.NextResponse.json({success:!0})}catch(e){return console.error("Update Group Error:",e),u.NextResponse.json({error:"Erreur lors de la mise \xe0 jour du groupe"},{status:500})}}async function m(e,r){let s=await r.params;try{if(!await (0,i.getServerSession)(c.N))return u.NextResponse.json({error:"Non autoris\xe9"},{status:401});let r=await p(),t=await e.json();if(!(await fetch(`${process.env.KEYCLOAK_BASE_URL}/admin/realms/${process.env.KEYCLOAK_REALM}/groups/${s.groupId}`,{method:"PUT",headers:{Authorization:`Bearer ${r}`,"Content-Type":"application/json"},body:JSON.stringify(t)})).ok)throw Error("Failed to update group");return u.NextResponse.json({success:!0})}catch(e){return console.error("Update Group Error:",e),u.NextResponse.json({error:"Erreur lors de la mise \xe0 jour du groupe"},{status:500})}}async function E(e,r){let s=await r.params;try{if(!await (0,i.getServerSession)(c.N))return u.NextResponse.json({error:"Non autoris\xe9"},{status:401});let e=await p();if(!(await fetch(`${process.env.KEYCLOAK_BASE_URL}/admin/realms/${process.env.KEYCLOAK_REALM}/groups/${s.groupId}`,{method:"DELETE",headers:{Authorization:`Bearer ${e}`}})).ok)throw Error("Failed to delete group");return u.NextResponse.json({success:!0})}catch(e){return console.error("Delete Group Error:",e),u.NextResponse.json({error:"Erreur lors de la suppression du groupe"},{status:500})}}let _=new o.AppRouteRouteModule({definition:{kind:a.RouteKind.APP_ROUTE,page:"/api/groups/[groupId]/route",pathname:"/api/groups/[groupId]",filename:"route",bundlePath:"app/api/groups/[groupId]/route"},resolvedPagePath:"/Users/alma/Documents/NeahNew/app/api/groups/[groupId]/route.ts",nextConfigOutput:"",userland:t}),{workAsyncStorage:f,workUnitAsyncStorage:g,serverHooks:h}=_;function w(){return(0,n.patchFetch)({workAsyncStorage:f,workUnitAsyncStorage:g})}},63033:e=>{"use strict";e.exports=require("next/dist/server/app-render/work-unit-async-storage.external.js")},74075:e=>{"use strict";e.exports=require("zlib")},78335:()=>{},79428:e=>{"use strict";e.exports=require("buffer")},79551:e=>{"use strict";e.exports=require("url")},81630:e=>{"use strict";e.exports=require("http")},94735:e=>{"use strict";e.exports=require("events")},96487:()=>{}};var r=require("../../../../webpack-runtime.js");r.C(e);var s=e=>r(r.s=e),t=r.X(0,[4243,5419,580],()=>s(56794));module.exports=t})(); |