import errs from "../lib/error.js"; import { castJsonIfNeed } from "../lib/helpers.js"; import auditLogModel from "../models/audit-log.js"; const internalAuditLog = { /** * All logs * * @param {Access} access * @param {Array} [expand] * @param {String} [searchQuery] * @returns {Promise} */ getAll: async (access, expand, searchQuery) => { await access.can("auditlog:list"); const query = auditLogModel .query() .orderBy("created_on", "DESC") .orderBy("id", "DESC") .limit(100) .allowGraph("[user]"); // Query is used for searching if (typeof searchQuery === "string" && searchQuery.length > 0) { query.where(function () { this.where(castJsonIfNeed("meta"), "like", `%${searchQuery}`); }); } if (typeof expand !== "undefined" && expand !== null) { query.withGraphFetched(`[${expand.join(", ")}]`); } return await query; }, /** * This method should not be publicly used, it doesn't check certain things. It will be assumed * that permission to add to audit log is already considered, however the access token is used for * default user id determination. * * @param {Access} access * @param {Object} data * @param {String} data.action * @param {Number} [data.user_id] * @param {Number} [data.object_id] * @param {Number} [data.object_type] * @param {Object} [data.meta] * @returns {Promise} */ add: async (access, data) => { if (typeof data.user_id === "undefined" || !data.user_id) { data.user_id = access.token.getUserId(1); } if (typeof data.action === "undefined" || !data.action) { throw new errs.InternalValidationError("Audit log entry must contain an Action"); } // Make sure at least 1 of the IDs are set and action return await auditLogModel.query().insert({ user_id: data.user_id, action: data.action, object_type: data.object_type || "", object_id: data.object_id || 0, meta: data.meta || {}, }); }, }; export default internalAuditLog;