mirror of
https://github.com/simstudioai/sim.git
synced 2026-04-06 03:00:16 -04:00
* feat(analytics): add PostHog product analytics * fix(posthog): fix workspace group via URL params, type errors, and clean up comments * fix(posthog): address PR review - fix pre-tx event, auth_method, paused executions, enterprise cancellation, settings double-fire * chore(posthog): remove unused identifyServerPerson * fix(posthog): isolate processQueuedResumes errors, simplify settings posthog deps * fix(posthog): correctly classify SSO auth_method, fix phantom empty-string workspace groups * fix(posthog): remove usePostHog from memo'd TemplateCard, fix copilot chat phantom workspace group * fix(posthog): eliminate all remaining phantom empty-string workspace groups * fix(posthog): fix cancel route phantom group, remove redundant workspaceId shadow in catch block * fix(posthog): use ids.length for block_removed guard to handle container blocks with descendants * chore(posthog): remove unused removedBlockTypes variable * fix(posthog): remove phantom $set person properties from subscription events * fix(posthog): add passedKnowledgeBaseName to knowledge_base_opened effect deps * fix(posthog): capture currentWorkflowId synchronously before async import to avoid stale closure * fix(posthog): add typed captureEvent wrapper for React components, deduplicate copilot_panel_opened * feat(posthog): add task_created and task_message_sent events, remove copilot_panel_opened * feat(posthog): track task_renamed, task_deleted, task_marked_read, task_marked_unread * feat(analytics): expand posthog event coverage with source tracking and lifecycle events * fix(analytics): flush posthog events on SIGTERM before ECS task termination * fix(analytics): fix posthog in useCallback deps and fire block events for bulk operations
645 lines
20 KiB
TypeScript
645 lines
20 KiB
TypeScript
import { db } from '@sim/db'
|
|
import { account, credential, credentialMember, workspace } from '@sim/db/schema'
|
|
import { createLogger } from '@sim/logger'
|
|
import { and, eq } from 'drizzle-orm'
|
|
import { type NextRequest, NextResponse } from 'next/server'
|
|
import { z } from 'zod'
|
|
import { getSession } from '@/lib/auth'
|
|
import { encryptSecret } from '@/lib/core/security/encryption'
|
|
import { generateRequestId } from '@/lib/core/utils/request'
|
|
import { getWorkspaceMemberUserIds } from '@/lib/credentials/environment'
|
|
import { syncWorkspaceOAuthCredentialsForUser } from '@/lib/credentials/oauth'
|
|
import { getServiceConfigByProviderId } from '@/lib/oauth'
|
|
import { captureServerEvent } from '@/lib/posthog/server'
|
|
import { checkWorkspaceAccess } from '@/lib/workspaces/permissions/utils'
|
|
import { isValidEnvVarName } from '@/executor/constants'
|
|
|
|
const logger = createLogger('CredentialsAPI')
|
|
|
|
const credentialTypeSchema = z.enum(['oauth', 'env_workspace', 'env_personal', 'service_account'])
|
|
|
|
function normalizeEnvKeyInput(raw: string): string {
|
|
const trimmed = raw.trim()
|
|
const wrappedMatch = /^\{\{\s*([A-Za-z0-9_]+)\s*\}\}$/.exec(trimmed)
|
|
return wrappedMatch ? wrappedMatch[1] : trimmed
|
|
}
|
|
|
|
const listCredentialsSchema = z.object({
|
|
workspaceId: z.string().uuid('Workspace ID must be a valid UUID'),
|
|
type: credentialTypeSchema.optional(),
|
|
providerId: z.string().optional(),
|
|
credentialId: z.string().optional(),
|
|
})
|
|
|
|
const serviceAccountJsonSchema = z
|
|
.string()
|
|
.min(1, 'Service account JSON key is required')
|
|
.transform((val, ctx) => {
|
|
try {
|
|
const parsed = JSON.parse(val)
|
|
if (parsed.type !== 'service_account') {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'JSON key must have type "service_account"',
|
|
})
|
|
return z.NEVER
|
|
}
|
|
if (!parsed.client_email || typeof parsed.client_email !== 'string') {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'JSON key must contain a valid client_email',
|
|
})
|
|
return z.NEVER
|
|
}
|
|
if (!parsed.private_key || typeof parsed.private_key !== 'string') {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'JSON key must contain a valid private_key',
|
|
})
|
|
return z.NEVER
|
|
}
|
|
if (!parsed.project_id || typeof parsed.project_id !== 'string') {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'JSON key must contain a valid project_id',
|
|
})
|
|
return z.NEVER
|
|
}
|
|
return parsed as {
|
|
type: 'service_account'
|
|
client_email: string
|
|
private_key: string
|
|
project_id: string
|
|
[key: string]: unknown
|
|
}
|
|
} catch {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'Invalid JSON format',
|
|
})
|
|
return z.NEVER
|
|
}
|
|
})
|
|
|
|
const createCredentialSchema = z
|
|
.object({
|
|
workspaceId: z.string().uuid('Workspace ID must be a valid UUID'),
|
|
type: credentialTypeSchema,
|
|
displayName: z.string().trim().min(1).max(255).optional(),
|
|
description: z.string().trim().max(500).optional(),
|
|
providerId: z.string().trim().min(1).optional(),
|
|
accountId: z.string().trim().min(1).optional(),
|
|
envKey: z.string().trim().min(1).optional(),
|
|
envOwnerUserId: z.string().trim().min(1).optional(),
|
|
serviceAccountJson: z.string().optional(),
|
|
})
|
|
.superRefine((data, ctx) => {
|
|
if (data.type === 'oauth') {
|
|
if (!data.accountId) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'accountId is required for oauth credentials',
|
|
path: ['accountId'],
|
|
})
|
|
}
|
|
if (!data.providerId) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'providerId is required for oauth credentials',
|
|
path: ['providerId'],
|
|
})
|
|
}
|
|
if (!data.displayName) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'displayName is required for oauth credentials',
|
|
path: ['displayName'],
|
|
})
|
|
}
|
|
return
|
|
}
|
|
|
|
if (data.type === 'service_account') {
|
|
if (!data.serviceAccountJson) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'serviceAccountJson is required for service account credentials',
|
|
path: ['serviceAccountJson'],
|
|
})
|
|
}
|
|
return
|
|
}
|
|
|
|
const normalizedEnvKey = data.envKey ? normalizeEnvKeyInput(data.envKey) : ''
|
|
if (!normalizedEnvKey) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'envKey is required for env credentials',
|
|
path: ['envKey'],
|
|
})
|
|
return
|
|
}
|
|
|
|
if (!isValidEnvVarName(normalizedEnvKey)) {
|
|
ctx.addIssue({
|
|
code: z.ZodIssueCode.custom,
|
|
message: 'envKey must contain only letters, numbers, and underscores',
|
|
path: ['envKey'],
|
|
})
|
|
}
|
|
})
|
|
|
|
interface ExistingCredentialSourceParams {
|
|
workspaceId: string
|
|
type: 'oauth' | 'env_workspace' | 'env_personal' | 'service_account'
|
|
accountId?: string | null
|
|
envKey?: string | null
|
|
envOwnerUserId?: string | null
|
|
displayName?: string | null
|
|
providerId?: string | null
|
|
}
|
|
|
|
async function findExistingCredentialBySource(params: ExistingCredentialSourceParams) {
|
|
const { workspaceId, type, accountId, envKey, envOwnerUserId, displayName, providerId } = params
|
|
|
|
if (type === 'oauth' && accountId) {
|
|
const [row] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(
|
|
and(
|
|
eq(credential.workspaceId, workspaceId),
|
|
eq(credential.type, 'oauth'),
|
|
eq(credential.accountId, accountId)
|
|
)
|
|
)
|
|
.limit(1)
|
|
return row ?? null
|
|
}
|
|
|
|
if (type === 'env_workspace' && envKey) {
|
|
const [row] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(
|
|
and(
|
|
eq(credential.workspaceId, workspaceId),
|
|
eq(credential.type, 'env_workspace'),
|
|
eq(credential.envKey, envKey)
|
|
)
|
|
)
|
|
.limit(1)
|
|
return row ?? null
|
|
}
|
|
|
|
if (type === 'env_personal' && envKey && envOwnerUserId) {
|
|
const [row] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(
|
|
and(
|
|
eq(credential.workspaceId, workspaceId),
|
|
eq(credential.type, 'env_personal'),
|
|
eq(credential.envKey, envKey),
|
|
eq(credential.envOwnerUserId, envOwnerUserId)
|
|
)
|
|
)
|
|
.limit(1)
|
|
return row ?? null
|
|
}
|
|
|
|
if (type === 'service_account' && displayName && providerId) {
|
|
const [row] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(
|
|
and(
|
|
eq(credential.workspaceId, workspaceId),
|
|
eq(credential.type, 'service_account'),
|
|
eq(credential.providerId, providerId),
|
|
eq(credential.displayName, displayName)
|
|
)
|
|
)
|
|
.limit(1)
|
|
return row ?? null
|
|
}
|
|
|
|
return null
|
|
}
|
|
|
|
export async function GET(request: NextRequest) {
|
|
const requestId = generateRequestId()
|
|
const session = await getSession()
|
|
|
|
if (!session?.user?.id) {
|
|
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
|
|
}
|
|
|
|
try {
|
|
const { searchParams } = new URL(request.url)
|
|
const rawWorkspaceId = searchParams.get('workspaceId')
|
|
const rawType = searchParams.get('type')
|
|
const rawProviderId = searchParams.get('providerId')
|
|
const rawCredentialId = searchParams.get('credentialId')
|
|
const parseResult = listCredentialsSchema.safeParse({
|
|
workspaceId: rawWorkspaceId?.trim(),
|
|
type: rawType?.trim() || undefined,
|
|
providerId: rawProviderId?.trim() || undefined,
|
|
credentialId: rawCredentialId?.trim() || undefined,
|
|
})
|
|
|
|
if (!parseResult.success) {
|
|
logger.warn(`[${requestId}] Invalid credential list request`, {
|
|
workspaceId: rawWorkspaceId,
|
|
type: rawType,
|
|
providerId: rawProviderId,
|
|
errors: parseResult.error.errors,
|
|
})
|
|
return NextResponse.json({ error: parseResult.error.errors[0]?.message }, { status: 400 })
|
|
}
|
|
|
|
const { workspaceId, type, providerId, credentialId: lookupCredentialId } = parseResult.data
|
|
const workspaceAccess = await checkWorkspaceAccess(workspaceId, session.user.id)
|
|
|
|
if (!workspaceAccess.hasAccess) {
|
|
return NextResponse.json({ error: 'Forbidden' }, { status: 403 })
|
|
}
|
|
|
|
if (lookupCredentialId) {
|
|
let [row] = await db
|
|
.select({
|
|
id: credential.id,
|
|
displayName: credential.displayName,
|
|
type: credential.type,
|
|
providerId: credential.providerId,
|
|
})
|
|
.from(credential)
|
|
.where(and(eq(credential.id, lookupCredentialId), eq(credential.workspaceId, workspaceId)))
|
|
.limit(1)
|
|
|
|
if (!row) {
|
|
;[row] = await db
|
|
.select({
|
|
id: credential.id,
|
|
displayName: credential.displayName,
|
|
type: credential.type,
|
|
providerId: credential.providerId,
|
|
})
|
|
.from(credential)
|
|
.where(
|
|
and(
|
|
eq(credential.accountId, lookupCredentialId),
|
|
eq(credential.workspaceId, workspaceId)
|
|
)
|
|
)
|
|
.limit(1)
|
|
}
|
|
|
|
return NextResponse.json({ credential: row ?? null })
|
|
}
|
|
|
|
if (!type || type === 'oauth') {
|
|
await syncWorkspaceOAuthCredentialsForUser({ workspaceId, userId: session.user.id })
|
|
}
|
|
|
|
const whereClauses = [eq(credential.workspaceId, workspaceId)]
|
|
|
|
if (type) {
|
|
whereClauses.push(eq(credential.type, type))
|
|
}
|
|
if (providerId) {
|
|
whereClauses.push(eq(credential.providerId, providerId))
|
|
}
|
|
|
|
const credentials = await db
|
|
.select({
|
|
id: credential.id,
|
|
workspaceId: credential.workspaceId,
|
|
type: credential.type,
|
|
displayName: credential.displayName,
|
|
description: credential.description,
|
|
providerId: credential.providerId,
|
|
accountId: credential.accountId,
|
|
envKey: credential.envKey,
|
|
envOwnerUserId: credential.envOwnerUserId,
|
|
createdBy: credential.createdBy,
|
|
createdAt: credential.createdAt,
|
|
updatedAt: credential.updatedAt,
|
|
role: credentialMember.role,
|
|
})
|
|
.from(credential)
|
|
.innerJoin(
|
|
credentialMember,
|
|
and(
|
|
eq(credentialMember.credentialId, credential.id),
|
|
eq(credentialMember.userId, session.user.id),
|
|
eq(credentialMember.status, 'active')
|
|
)
|
|
)
|
|
.where(and(...whereClauses))
|
|
|
|
return NextResponse.json({ credentials })
|
|
} catch (error) {
|
|
logger.error(`[${requestId}] Failed to list credentials`, error)
|
|
return NextResponse.json({ error: 'Internal server error' }, { status: 500 })
|
|
}
|
|
}
|
|
|
|
export async function POST(request: NextRequest) {
|
|
const requestId = generateRequestId()
|
|
const session = await getSession()
|
|
|
|
if (!session?.user?.id) {
|
|
return NextResponse.json({ error: 'Unauthorized' }, { status: 401 })
|
|
}
|
|
|
|
try {
|
|
const body = await request.json()
|
|
const parseResult = createCredentialSchema.safeParse(body)
|
|
|
|
if (!parseResult.success) {
|
|
return NextResponse.json({ error: parseResult.error.errors[0]?.message }, { status: 400 })
|
|
}
|
|
|
|
const {
|
|
workspaceId,
|
|
type,
|
|
displayName,
|
|
description,
|
|
providerId,
|
|
accountId,
|
|
envKey,
|
|
envOwnerUserId,
|
|
serviceAccountJson,
|
|
} = parseResult.data
|
|
|
|
const workspaceAccess = await checkWorkspaceAccess(workspaceId, session.user.id)
|
|
if (!workspaceAccess.canWrite) {
|
|
return NextResponse.json({ error: 'Write permission required' }, { status: 403 })
|
|
}
|
|
|
|
let resolvedDisplayName = displayName?.trim() ?? ''
|
|
const resolvedDescription = description?.trim() || null
|
|
let resolvedProviderId: string | null = providerId ?? null
|
|
let resolvedAccountId: string | null = accountId ?? null
|
|
const resolvedEnvKey: string | null = envKey ? normalizeEnvKeyInput(envKey) : null
|
|
let resolvedEnvOwnerUserId: string | null = null
|
|
let resolvedEncryptedServiceAccountKey: string | null = null
|
|
|
|
if (type === 'oauth') {
|
|
const [accountRow] = await db
|
|
.select({
|
|
id: account.id,
|
|
userId: account.userId,
|
|
providerId: account.providerId,
|
|
accountId: account.accountId,
|
|
})
|
|
.from(account)
|
|
.where(eq(account.id, accountId!))
|
|
.limit(1)
|
|
|
|
if (!accountRow) {
|
|
return NextResponse.json({ error: 'OAuth account not found' }, { status: 404 })
|
|
}
|
|
|
|
if (accountRow.userId !== session.user.id) {
|
|
return NextResponse.json(
|
|
{ error: 'Only account owners can create oauth credentials for an account' },
|
|
{ status: 403 }
|
|
)
|
|
}
|
|
|
|
if (providerId !== accountRow.providerId) {
|
|
return NextResponse.json(
|
|
{ error: 'providerId does not match the selected OAuth account' },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
if (!resolvedDisplayName) {
|
|
resolvedDisplayName =
|
|
getServiceConfigByProviderId(accountRow.providerId)?.name || accountRow.providerId
|
|
}
|
|
} else if (type === 'service_account') {
|
|
if (!serviceAccountJson) {
|
|
return NextResponse.json(
|
|
{ error: 'serviceAccountJson is required for service account credentials' },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
|
|
const jsonParseResult = serviceAccountJsonSchema.safeParse(serviceAccountJson)
|
|
if (!jsonParseResult.success) {
|
|
return NextResponse.json(
|
|
{ error: jsonParseResult.error.errors[0]?.message || 'Invalid service account JSON' },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
|
|
const parsed = jsonParseResult.data
|
|
resolvedProviderId = 'google-service-account'
|
|
resolvedAccountId = null
|
|
resolvedEnvOwnerUserId = null
|
|
|
|
if (!resolvedDisplayName) {
|
|
resolvedDisplayName = parsed.client_email
|
|
}
|
|
|
|
const { encrypted } = await encryptSecret(serviceAccountJson)
|
|
resolvedEncryptedServiceAccountKey = encrypted
|
|
} else if (type === 'env_personal') {
|
|
resolvedEnvOwnerUserId = envOwnerUserId ?? session.user.id
|
|
if (resolvedEnvOwnerUserId !== session.user.id) {
|
|
return NextResponse.json(
|
|
{ error: 'Only the current user can create personal env credentials for themselves' },
|
|
{ status: 403 }
|
|
)
|
|
}
|
|
resolvedProviderId = null
|
|
resolvedAccountId = null
|
|
resolvedDisplayName = resolvedEnvKey || ''
|
|
} else {
|
|
resolvedProviderId = null
|
|
resolvedAccountId = null
|
|
resolvedEnvOwnerUserId = null
|
|
resolvedDisplayName = resolvedEnvKey || ''
|
|
}
|
|
|
|
if (!resolvedDisplayName) {
|
|
return NextResponse.json({ error: 'Display name is required' }, { status: 400 })
|
|
}
|
|
|
|
const existingCredential = await findExistingCredentialBySource({
|
|
workspaceId,
|
|
type,
|
|
accountId: resolvedAccountId,
|
|
envKey: resolvedEnvKey,
|
|
envOwnerUserId: resolvedEnvOwnerUserId,
|
|
displayName: resolvedDisplayName,
|
|
providerId: resolvedProviderId,
|
|
})
|
|
|
|
if (existingCredential) {
|
|
const [membership] = await db
|
|
.select({
|
|
id: credentialMember.id,
|
|
status: credentialMember.status,
|
|
role: credentialMember.role,
|
|
})
|
|
.from(credentialMember)
|
|
.where(
|
|
and(
|
|
eq(credentialMember.credentialId, existingCredential.id),
|
|
eq(credentialMember.userId, session.user.id)
|
|
)
|
|
)
|
|
.limit(1)
|
|
|
|
if (!membership || membership.status !== 'active') {
|
|
return NextResponse.json(
|
|
{ error: 'A credential with this source already exists in this workspace' },
|
|
{ status: 409 }
|
|
)
|
|
}
|
|
|
|
const canUpdateExistingCredential = membership.role === 'admin'
|
|
const shouldUpdateDisplayName =
|
|
type === 'oauth' &&
|
|
resolvedDisplayName &&
|
|
resolvedDisplayName !== existingCredential.displayName
|
|
const shouldUpdateDescription =
|
|
typeof description !== 'undefined' &&
|
|
(existingCredential.description ?? null) !== resolvedDescription
|
|
|
|
if (canUpdateExistingCredential && (shouldUpdateDisplayName || shouldUpdateDescription)) {
|
|
await db
|
|
.update(credential)
|
|
.set({
|
|
...(shouldUpdateDisplayName ? { displayName: resolvedDisplayName } : {}),
|
|
...(shouldUpdateDescription ? { description: resolvedDescription } : {}),
|
|
updatedAt: new Date(),
|
|
})
|
|
.where(eq(credential.id, existingCredential.id))
|
|
|
|
const [updatedCredential] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(eq(credential.id, existingCredential.id))
|
|
.limit(1)
|
|
|
|
return NextResponse.json(
|
|
{ credential: updatedCredential ?? existingCredential },
|
|
{ status: 200 }
|
|
)
|
|
}
|
|
|
|
return NextResponse.json({ credential: existingCredential }, { status: 200 })
|
|
}
|
|
|
|
const now = new Date()
|
|
const credentialId = crypto.randomUUID()
|
|
const [workspaceRow] = await db
|
|
.select({ ownerId: workspace.ownerId })
|
|
.from(workspace)
|
|
.where(eq(workspace.id, workspaceId))
|
|
.limit(1)
|
|
|
|
await db.transaction(async (tx) => {
|
|
await tx.insert(credential).values({
|
|
id: credentialId,
|
|
workspaceId,
|
|
type,
|
|
displayName: resolvedDisplayName,
|
|
description: resolvedDescription,
|
|
providerId: resolvedProviderId,
|
|
accountId: resolvedAccountId,
|
|
envKey: resolvedEnvKey,
|
|
envOwnerUserId: resolvedEnvOwnerUserId,
|
|
encryptedServiceAccountKey: resolvedEncryptedServiceAccountKey,
|
|
createdBy: session.user.id,
|
|
createdAt: now,
|
|
updatedAt: now,
|
|
})
|
|
|
|
if ((type === 'env_workspace' || type === 'service_account') && workspaceRow?.ownerId) {
|
|
const workspaceUserIds = await getWorkspaceMemberUserIds(workspaceId)
|
|
if (workspaceUserIds.length > 0) {
|
|
for (const memberUserId of workspaceUserIds) {
|
|
await tx.insert(credentialMember).values({
|
|
id: crypto.randomUUID(),
|
|
credentialId,
|
|
userId: memberUserId,
|
|
role:
|
|
memberUserId === workspaceRow.ownerId || memberUserId === session.user.id
|
|
? 'admin'
|
|
: 'member',
|
|
status: 'active',
|
|
joinedAt: now,
|
|
invitedBy: session.user.id,
|
|
createdAt: now,
|
|
updatedAt: now,
|
|
})
|
|
}
|
|
}
|
|
} else {
|
|
await tx.insert(credentialMember).values({
|
|
id: crypto.randomUUID(),
|
|
credentialId,
|
|
userId: session.user.id,
|
|
role: 'admin',
|
|
status: 'active',
|
|
joinedAt: now,
|
|
invitedBy: session.user.id,
|
|
createdAt: now,
|
|
updatedAt: now,
|
|
})
|
|
}
|
|
})
|
|
|
|
const [created] = await db
|
|
.select()
|
|
.from(credential)
|
|
.where(eq(credential.id, credentialId))
|
|
.limit(1)
|
|
|
|
captureServerEvent(
|
|
session.user.id,
|
|
'credential_connected',
|
|
{ credential_type: type, provider_id: resolvedProviderId ?? type, workspace_id: workspaceId },
|
|
{
|
|
groups: { workspace: workspaceId },
|
|
setOnce: { first_credential_connected_at: new Date().toISOString() },
|
|
}
|
|
)
|
|
|
|
return NextResponse.json({ credential: created }, { status: 201 })
|
|
} catch (error: any) {
|
|
if (error?.code === '23505') {
|
|
return NextResponse.json(
|
|
{ error: 'A credential with this source already exists' },
|
|
{ status: 409 }
|
|
)
|
|
}
|
|
if (error?.code === '23503') {
|
|
return NextResponse.json(
|
|
{ error: 'Invalid credential reference or membership target' },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
if (error?.code === '23514') {
|
|
return NextResponse.json(
|
|
{ error: 'Credential source data failed validation checks' },
|
|
{ status: 400 }
|
|
)
|
|
}
|
|
logger.error(`[${requestId}] Credential create failure details`, {
|
|
code: error?.code,
|
|
detail: error?.detail,
|
|
constraint: error?.constraint,
|
|
table: error?.table,
|
|
message: error?.message,
|
|
})
|
|
logger.error(`[${requestId}] Failed to create credential`, error)
|
|
return NextResponse.json({ error: 'Internal server error' }, { status: 500 })
|
|
}
|
|
}
|