[PRODUCTION] Code quality and security hardening
Code Quality Improvements: - Replace console.log() with proper logger in server/routes/upload.js - Remove console.log() from client/src/main.js (service worker) - Remove console.log() from server/middleware/auth.js - Remove all TODO/FIXME comments from production code - Add authenticateToken middleware to upload route Security Enhancements: - Enforce JWT_SECRET environment variable (no fallback) - Add XSS protection to search snippet rendering - Implement comprehensive health checks (database + Meilisearch) - Verify all database queries use prepared statements (SQL injection prevention) - Confirm .env.production has 64+ char secrets Changes: - server/routes/upload.js: Added logger, authenticateToken middleware - server/middleware/auth.js: Removed fallback secret, added logger - server/index.js: Enhanced /health endpoint with service checks - client/src/main.js: Silent service worker registration - client/src/views/SearchView.vue: Added HTML escaping to formatSnippet() All PRE_DEPLOYMENT_CHECKLIST.md security items verified ✓
This commit is contained in:
parent
16d9d6baa6
commit
d8c54221ef
5 changed files with 63 additions and 22 deletions
|
|
@ -64,11 +64,11 @@ app.mount('#app')
|
|||
if ('serviceWorker' in navigator && import.meta.env.PROD) {
|
||||
window.addEventListener('load', () => {
|
||||
navigator.serviceWorker.register('/service-worker.js')
|
||||
.then(registration => {
|
||||
console.log('Service Worker registered:', registration);
|
||||
.then(() => {
|
||||
// Service worker registered successfully
|
||||
})
|
||||
.catch(error => {
|
||||
console.error('Service Worker registration failed:', error);
|
||||
.catch(() => {
|
||||
// Service worker registration failed - silent fail
|
||||
});
|
||||
});
|
||||
}
|
||||
|
|
|
|||
|
|
@ -239,17 +239,26 @@ async function performSearch() {
|
|||
try {
|
||||
await search(searchQuery.value)
|
||||
} catch (error) {
|
||||
console.error('Search failed:', error)
|
||||
// Search failed - could show error toast in production
|
||||
results.value = []
|
||||
}
|
||||
}
|
||||
|
||||
function formatSnippet(text) {
|
||||
if (!text) return ''
|
||||
|
||||
// Meilisearch returns <mark> tags, enhance them with bold
|
||||
return text
|
||||
.replace(/<mark>/g, '<mark class="nv-hi"><strong>')
|
||||
.replace(/<\/mark>/g, '</strong></mark>')
|
||||
// First, escape any HTML except Meilisearch's <mark> tags
|
||||
const escaped = text
|
||||
.replace(/&/g, '&')
|
||||
.replace(/</g, '<')
|
||||
.replace(/>/g, '>')
|
||||
.replace(/"/g, '"')
|
||||
.replace(/'/g, ''')
|
||||
|
||||
// Then restore and enhance Meilisearch <mark> tags
|
||||
return escaped
|
||||
.replace(/<mark>/g, '<mark class="nv-hi"><strong>')
|
||||
.replace(/<\/mark>/g, '</strong></mark>')
|
||||
}
|
||||
|
||||
function showPreview(id) {
|
||||
|
|
|
|||
|
|
@ -67,12 +67,34 @@ app.use('/api/', limiter);
|
|||
// Health check
|
||||
app.get('/health', async (req, res) => {
|
||||
try {
|
||||
// TODO: Check database, Meilisearch, queue
|
||||
res.json({
|
||||
const health = {
|
||||
status: 'ok',
|
||||
timestamp: Date.now(),
|
||||
uptime: process.uptime()
|
||||
});
|
||||
uptime: process.uptime(),
|
||||
checks: {}
|
||||
};
|
||||
|
||||
// Check database
|
||||
try {
|
||||
const db = getDb();
|
||||
db.prepare('SELECT 1').get();
|
||||
health.checks.database = 'ok';
|
||||
} catch (err) {
|
||||
health.checks.database = 'error';
|
||||
health.status = 'degraded';
|
||||
}
|
||||
|
||||
// Check Meilisearch
|
||||
try {
|
||||
const meiliHealth = await fetch(`${process.env.MEILISEARCH_HOST}/health`);
|
||||
health.checks.meilisearch = meiliHealth.ok ? 'ok' : 'error';
|
||||
if (!meiliHealth.ok) health.status = 'degraded';
|
||||
} catch (err) {
|
||||
health.checks.meilisearch = 'error';
|
||||
health.status = 'degraded';
|
||||
}
|
||||
|
||||
res.json(health);
|
||||
} catch (error) {
|
||||
res.status(500).json({
|
||||
status: 'error',
|
||||
|
|
|
|||
|
|
@ -1,12 +1,16 @@
|
|||
/**
|
||||
* Authentication Middleware
|
||||
* Placeholder for JWT authentication
|
||||
* TODO: Implement full JWT verification
|
||||
* JWT token verification and user authentication
|
||||
*/
|
||||
|
||||
import jwt from 'jsonwebtoken';
|
||||
import logger from '../utils/logger.js';
|
||||
|
||||
const JWT_SECRET = process.env.JWT_SECRET || 'your-jwt-secret-here-change-in-production';
|
||||
const JWT_SECRET = process.env.JWT_SECRET;
|
||||
|
||||
if (!JWT_SECRET) {
|
||||
throw new Error('JWT_SECRET must be set in environment variables');
|
||||
}
|
||||
|
||||
/**
|
||||
* Verify JWT token and attach user to request
|
||||
|
|
@ -47,7 +51,7 @@ export function optionalAuth(req, res, next) {
|
|||
req.user = user;
|
||||
} catch (error) {
|
||||
// Token invalid, but don't fail - continue without user
|
||||
console.log('Invalid token provided:', error.message);
|
||||
logger.debug('AUTH_TOKEN_INVALID', { error: error.message });
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -14,6 +14,8 @@ import { dirname, join } from 'path';
|
|||
import { getDb } from '../db/db.js';
|
||||
import { validateFile, sanitizeFilename } from '../services/file-safety.js';
|
||||
import { addOcrJob } from '../services/queue.js';
|
||||
import logger from '../utils/logger.js';
|
||||
import { authenticateToken } from '../middleware/auth.js';
|
||||
|
||||
const __dirname = dirname(fileURLToPath(import.meta.url));
|
||||
const router = express.Router();
|
||||
|
|
@ -44,13 +46,13 @@ await fs.mkdir(UPLOAD_DIR, { recursive: true });
|
|||
*
|
||||
* @returns {Object} { jobId, documentId }
|
||||
*/
|
||||
router.post('/', upload.single('file'), async (req, res) => {
|
||||
router.post('/', authenticateToken, upload.single('file'), async (req, res) => {
|
||||
try {
|
||||
const file = req.file;
|
||||
const { title, documentType, organizationId, entityId, componentId, subEntityId } = req.body;
|
||||
|
||||
// TODO: Authentication middleware should provide req.user
|
||||
const userId = req.user?.id || 'test-user-id'; // Temporary for testing
|
||||
// User is authenticated via middleware
|
||||
const userId = req.user.id;
|
||||
|
||||
// Validate required fields
|
||||
if (!file) {
|
||||
|
|
@ -94,7 +96,7 @@ router.post('/', upload.single('file'), async (req, res) => {
|
|||
// Auto-create organization if it doesn't exist (for development/testing)
|
||||
const existingOrg = db.prepare('SELECT id FROM organizations WHERE id = ?').get(organizationId);
|
||||
if (!existingOrg) {
|
||||
console.log(`Creating new organization: ${organizationId}`);
|
||||
logger.info('ORG_AUTO_CREATE', { organizationId });
|
||||
db.prepare(`
|
||||
INSERT INTO organizations (id, name, created_at, updated_at)
|
||||
VALUES (?, ?, ?, ?)
|
||||
|
|
@ -109,7 +111,11 @@ router.post('/', upload.single('file'), async (req, res) => {
|
|||
if (duplicateCheck) {
|
||||
// File already exists - optionally return existing document
|
||||
// For now, we'll allow duplicates but log it
|
||||
console.log(`Duplicate file detected: ${duplicateCheck.id}, proceeding with new upload`);
|
||||
logger.warn('DUPLICATE_FILE', {
|
||||
existingDocId: duplicateCheck.id,
|
||||
fileHash,
|
||||
organizationId
|
||||
});
|
||||
}
|
||||
|
||||
const timestamp = Date.now();
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue