2025-12-03 19:29:37 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"context"
|
2025-12-13 02:34:34 +00:00
|
|
|
"fmt"
|
2025-12-16 18:34:08 +00:00
|
|
|
"net/http" // MOD-P2-006: Pour pprof
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
"os"
|
2025-12-17 17:20:42 +00:00
|
|
|
"strconv"
|
|
|
|
|
"strings"
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
"github.com/gin-gonic/gin"
|
2025-12-16 16:59:56 +00:00
|
|
|
"github.com/google/uuid"
|
2025-12-13 02:34:34 +00:00
|
|
|
"github.com/redis/go-redis/v9"
|
2025-12-03 19:29:37 +00:00
|
|
|
"go.uber.org/zap"
|
|
|
|
|
|
|
|
|
|
"veza-backend-api/internal/config"
|
|
|
|
|
"veza-backend-api/internal/database"
|
|
|
|
|
"veza-backend-api/internal/handlers" // Single handlers import
|
|
|
|
|
"veza-backend-api/internal/middleware"
|
|
|
|
|
|
|
|
|
|
"veza-backend-api/internal/repositories"
|
|
|
|
|
|
|
|
|
|
// swaggerFiles "github.com/swaggo/files" // Uncommented
|
|
|
|
|
// ginSwagger "github.com/swaggo/gin-swagger" // Uncommented
|
|
|
|
|
|
|
|
|
|
// Add missing imports.
|
|
|
|
|
swaggerFiles "github.com/swaggo/files"
|
|
|
|
|
ginSwagger "github.com/swaggo/gin-swagger"
|
|
|
|
|
|
|
|
|
|
authcore "veza-backend-api/internal/core/auth"
|
2025-12-06 16:21:59 +00:00
|
|
|
"veza-backend-api/internal/core/marketplace"
|
2025-12-03 19:29:37 +00:00
|
|
|
trackcore "veza-backend-api/internal/core/track"
|
2025-12-06 16:21:59 +00:00
|
|
|
"veza-backend-api/internal/services"
|
2025-12-03 19:29:37 +00:00
|
|
|
"veza-backend-api/internal/validators"
|
|
|
|
|
"veza-backend-api/internal/workers"
|
|
|
|
|
// swaggerFiles "github.com/swaggo/files"
|
|
|
|
|
// ginSwagger "github.com/swaggo/gin-swagger"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// APIRouter gère la configuration des routes de l'API
|
|
|
|
|
type APIRouter struct {
|
|
|
|
|
db *database.Database
|
|
|
|
|
config *config.Config
|
|
|
|
|
engine *gin.Engine
|
|
|
|
|
logger *zap.Logger
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// NewAPIRouter crée une nouvelle instance de APIRouter
|
|
|
|
|
func NewAPIRouter(db *database.Database, cfg *config.Config) *APIRouter {
|
|
|
|
|
return &APIRouter{
|
|
|
|
|
db: db,
|
|
|
|
|
config: cfg,
|
|
|
|
|
logger: zap.L(),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-17 17:20:42 +00:00
|
|
|
// getUploadConfigWithEnv charge la configuration d'upload depuis l'environnement
|
|
|
|
|
// Cette fonction garantit que ENABLE_CLAMAV et CLAMAV_REQUIRED sont correctement appliqués
|
|
|
|
|
func getUploadConfigWithEnv() *services.UploadConfig {
|
|
|
|
|
uploadConfig := services.DefaultUploadConfig()
|
|
|
|
|
|
|
|
|
|
// Lire ENABLE_CLAMAV depuis l'environnement (défaut: true pour sécurité en production)
|
|
|
|
|
envValue := os.Getenv("ENABLE_CLAMAV")
|
|
|
|
|
fmt.Printf("🔍 [ROUTER] ENABLE_CLAMAV depuis env: '%s'\n", envValue)
|
|
|
|
|
clamAVEnabled := getEnvBool("ENABLE_CLAMAV", true)
|
|
|
|
|
fmt.Printf("🔍 [ROUTER] ENABLE_CLAMAV parsé: %v\n", clamAVEnabled)
|
|
|
|
|
uploadConfig.ClamAVEnabled = clamAVEnabled
|
|
|
|
|
|
|
|
|
|
// Lire CLAMAV_REQUIRED depuis l'environnement (défaut: true pour sécurité)
|
|
|
|
|
clamAVRequired := getEnvBool("CLAMAV_REQUIRED", true)
|
|
|
|
|
uploadConfig.ClamAVRequired = clamAVRequired
|
|
|
|
|
|
|
|
|
|
fmt.Printf("🔧 [ROUTER] Configuration finale - ClamAVEnabled=%v, ClamAVRequired=%v\n",
|
|
|
|
|
uploadConfig.ClamAVEnabled, uploadConfig.ClamAVRequired)
|
|
|
|
|
|
|
|
|
|
return uploadConfig
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// getEnvBool récupère une variable d'environnement booléenne avec une valeur par défaut
|
|
|
|
|
func getEnvBool(key string, defaultValue bool) bool {
|
|
|
|
|
value := os.Getenv(key)
|
|
|
|
|
if value == "" {
|
|
|
|
|
fmt.Printf("🔍 [ROUTER] Variable %s non définie, utilisation défaut: %v\n", key, defaultValue)
|
|
|
|
|
return defaultValue
|
|
|
|
|
}
|
|
|
|
|
// Nettoyer la valeur (trim spaces)
|
|
|
|
|
value = strings.TrimSpace(value)
|
|
|
|
|
fmt.Printf("🔍 [ROUTER] Variable %s='%s' (trimmed)\n", key, value)
|
|
|
|
|
if boolValue, err := strconv.ParseBool(value); err == nil {
|
|
|
|
|
fmt.Printf("🔍 [ROUTER] Variable %s parsée: %v\n", key, boolValue)
|
|
|
|
|
return boolValue
|
|
|
|
|
}
|
|
|
|
|
fmt.Printf("⚠️ [ROUTER] Erreur parsing %s='%s', utilisation défaut: %v\n", key, value, defaultValue)
|
|
|
|
|
return defaultValue
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Setup configure toutes les routes de l'API
|
2025-12-13 02:34:34 +00:00
|
|
|
func (r *APIRouter) Setup(router *gin.Engine) error {
|
2025-12-03 19:29:37 +00:00
|
|
|
r.engine = router
|
|
|
|
|
|
|
|
|
|
// Middlewares globaux
|
|
|
|
|
router.Use(middleware.RequestLogger(r.logger)) // Utilisation du structured logger
|
|
|
|
|
router.Use(middleware.Metrics()) // Prometheus Metrics
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
router.Use(middleware.SentryRecover(r.logger)) // Sentry error tracking
|
2025-12-13 02:34:34 +00:00
|
|
|
router.Use(middleware.SecurityHeaders()) // MOD-P2-005: Security headers (HSTS, CSP, etc.)
|
|
|
|
|
|
|
|
|
|
// MOD-P1-005: Determine if stack traces should be included in logs
|
|
|
|
|
// Stack traces only in dev/DEBUG mode (not in production)
|
|
|
|
|
// Include if: APP_ENV=development OR LOG_LEVEL=DEBUG
|
2025-12-16 16:23:49 +00:00
|
|
|
// MOD-P1-005: Determine if stack traces should be included in logs
|
|
|
|
|
// Stack traces only in dev/DEBUG mode (not in production)
|
2025-12-13 02:34:34 +00:00
|
|
|
includeStackTrace := r.config.Env == config.EnvDevelopment || r.config.LogLevel == "DEBUG"
|
|
|
|
|
router.Use(middleware.ErrorHandler(r.logger, r.config.ErrorMetrics, includeStackTrace))
|
2025-12-16 16:23:49 +00:00
|
|
|
router.Use(middleware.Recovery(r.logger, includeStackTrace))
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
// SECURITY: CORS configuration - use config.CORSOrigins strictly (P0-SECURITY)
|
|
|
|
|
// No fallback to CORSDefault() to avoid wildcard in production
|
2025-12-13 02:34:34 +00:00
|
|
|
// MOD-P0-001: Apply CORS middleware even if CORSOrigins is empty (strict mode - reject all origins)
|
|
|
|
|
// The middleware itself handles empty list correctly (rejects all origins)
|
|
|
|
|
if r.config != nil {
|
2025-12-22 22:17:24 +00:00
|
|
|
// MVP-014: Validate CORS configuration before applying middleware
|
|
|
|
|
// This will log warnings if credentials=true is used with wildcard origins
|
|
|
|
|
if err := middleware.ValidateCORSConfiguration(r.config.CORSOrigins, r.logger); err != nil {
|
|
|
|
|
// In production, we might want to fail startup, but for MVP we just log
|
|
|
|
|
// The validation function logs warnings but doesn't return errors for MVP
|
|
|
|
|
r.logger.Error("CORS configuration validation failed", zap.Error(err))
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
router.Use(middleware.CORS(r.config.CORSOrigins))
|
2025-12-13 02:34:34 +00:00
|
|
|
if len(r.config.CORSOrigins) == 0 {
|
|
|
|
|
r.logger.Warn("CORS origins not configured - strict mode enabled: ALL CORS requests will be rejected.")
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
} else {
|
2025-12-13 02:34:34 +00:00
|
|
|
// Fallback: if config is nil, apply CORS with empty list (strict mode)
|
|
|
|
|
router.Use(middleware.CORS([]string{}))
|
|
|
|
|
r.logger.Warn("Config is nil - CORS middleware applied in strict mode (reject all origins).")
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
router.Use(middleware.RequestID())
|
2025-12-13 02:34:34 +00:00
|
|
|
// Global Timeout middleware (PR-6)
|
|
|
|
|
// MOD-P0-003: Removed duplicate timeout middleware registration
|
|
|
|
|
router.Use(middleware.Timeout(r.config.HandlerTimeout))
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Rate limiting via config.RateLimiter si disponible, sinon utiliser SimpleRateLimiter
|
|
|
|
|
if r.config != nil && r.config.RateLimiter != nil {
|
|
|
|
|
router.Use(r.config.RateLimiter.RateLimitMiddleware())
|
|
|
|
|
} else if r.config != nil && r.config.SimpleRateLimiter != nil {
|
|
|
|
|
router.Use(r.config.SimpleRateLimiter.Middleware())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Swagger Documentation
|
|
|
|
|
router.GET("/swagger/*any", ginSwagger.WrapHandler(swaggerFiles.Handler))
|
|
|
|
|
|
|
|
|
|
// Routes core publiques (health, metrics, upload info)
|
|
|
|
|
r.setupCorePublicRoutes(router)
|
|
|
|
|
|
2025-12-16 16:23:49 +00:00
|
|
|
// Setup internal routes (both legacy and modern) before v1 group
|
|
|
|
|
// These need to be on the root router, not under /api/v1
|
|
|
|
|
r.setupInternalRoutes(router)
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Groupe API v1 (nouveau frontend React)
|
|
|
|
|
v1 := router.Group("/api/v1")
|
|
|
|
|
{
|
|
|
|
|
// Routes core protégées (sessions, uploads, audit, admin, conversations)
|
|
|
|
|
r.setupCoreProtectedRoutes(v1)
|
|
|
|
|
|
2025-12-13 02:34:34 +00:00
|
|
|
if err := r.setupAuthRoutes(v1); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// Réactivation des routes User et Track pour Phase 1
|
|
|
|
|
r.setupUserRoutes(v1)
|
|
|
|
|
r.setupTrackRoutes(v1)
|
|
|
|
|
|
2025-12-23 09:39:10 +00:00
|
|
|
// BE-API-007: Roles management routes
|
|
|
|
|
r.setupRoleRoutes(v1)
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Réactivation des routes Chat pour Phase 4
|
|
|
|
|
r.setupChatRoutes(v1)
|
|
|
|
|
// Réactivation des routes Playlists pour Phase 5
|
|
|
|
|
r.setupPlaylistRoutes(v1)
|
|
|
|
|
// Réactivation des routes Webhooks
|
|
|
|
|
r.setupWebhookRoutes(v1)
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Marketplace Routes (v1.2.0)
|
|
|
|
|
r.setupMarketplaceRoutes(v1)
|
|
|
|
|
}
|
2025-12-13 02:34:34 +00:00
|
|
|
|
|
|
|
|
return nil
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Méthodes de configuration des routes par module
|
|
|
|
|
// setupMarketplaceRoutes configure les routes de la marketplace
|
|
|
|
|
func (r *APIRouter) setupMarketplaceRoutes(router *gin.RouterGroup) {
|
|
|
|
|
uploadDir := r.config.UploadDir
|
|
|
|
|
if uploadDir == "" {
|
|
|
|
|
uploadDir = "uploads/tracks"
|
|
|
|
|
}
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Storage service (reused from tracks logic)
|
|
|
|
|
storageService := services.NewTrackStorageService(uploadDir, false, r.logger)
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Marketplace service
|
|
|
|
|
marketService := marketplace.NewService(r.db.GormDB, r.logger, storageService)
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
marketHandler := handlers.NewMarketplaceHandler(marketService, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
group := router.Group("/marketplace")
|
|
|
|
|
// Public routes
|
|
|
|
|
group.GET("/products", marketHandler.ListProducts)
|
|
|
|
|
|
|
|
|
|
// Protected routes
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
protected := group.Group("")
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth())
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// GO-012: Create product requires creator/premium/admin role
|
|
|
|
|
createGroup := protected.Group("")
|
|
|
|
|
createGroup.Use(r.config.AuthMiddleware.RequireContentCreatorRole())
|
|
|
|
|
createGroup.POST("/products", marketHandler.CreateProduct)
|
|
|
|
|
protected.POST("/orders", marketHandler.CreateOrder)
|
|
|
|
|
protected.GET("/download/:product_id", marketHandler.GetDownloadURL)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupAuthRoutes configure les routes d'authentification avec toutes les dépendances
|
2025-12-13 02:34:34 +00:00
|
|
|
func (r *APIRouter) setupAuthRoutes(router *gin.RouterGroup) error {
|
2025-12-03 19:29:37 +00:00
|
|
|
// 1. Instanciation des dépendances
|
|
|
|
|
emailValidator := validators.NewEmailValidator(r.db.GormDB)
|
|
|
|
|
passwordValidator := validators.NewPasswordValidator()
|
|
|
|
|
passwordService := services.NewPasswordService(r.db, r.logger)
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
passwordResetService := services.NewPasswordResetService(r.db, r.logger)
|
2025-12-13 02:34:34 +00:00
|
|
|
jwtService, err := services.NewJWTService(r.config.JWTSecret, r.config.JWTIssuer, r.config.JWTAudience)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("failed to initialize JWT service: %w", err)
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
refreshTokenService := services.NewRefreshTokenService(r.db.GormDB)
|
|
|
|
|
emailVerificationService := services.NewEmailVerificationService(r.db, r.logger)
|
|
|
|
|
emailService := services.NewEmailService(r.db, r.logger)
|
|
|
|
|
sessionService := services.NewSessionService(r.db, r.logger)
|
|
|
|
|
|
|
|
|
|
// 2. Service Auth complet
|
|
|
|
|
authService := authcore.NewAuthService(
|
|
|
|
|
r.db.GormDB,
|
|
|
|
|
emailValidator,
|
|
|
|
|
passwordValidator,
|
|
|
|
|
passwordService,
|
|
|
|
|
jwtService,
|
|
|
|
|
refreshTokenService,
|
|
|
|
|
emailVerificationService,
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
passwordResetService,
|
2025-12-03 19:29:37 +00:00
|
|
|
emailService,
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
r.config.JobWorker, // Passer le JobWorker
|
2025-12-03 19:29:37 +00:00
|
|
|
r.logger,
|
|
|
|
|
)
|
|
|
|
|
|
2025-12-22 22:03:46 +00:00
|
|
|
// 2.5. User Service for GetMe endpoint
|
|
|
|
|
userRepo := repositories.NewGormUserRepository(r.db.GormDB)
|
|
|
|
|
userService := services.NewUserServiceWithDB(userRepo, r.db.GormDB)
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// 3. Handlers
|
|
|
|
|
authGroup := router.Group("/auth")
|
|
|
|
|
{
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
authGroup.POST("/register", handlers.Register(authService, r.logger))
|
2025-12-13 02:34:34 +00:00
|
|
|
|
2025-12-23 00:40:28 +00:00
|
|
|
// BE-API-001: Initialize 2FA service for login handler
|
|
|
|
|
twoFactorService := services.NewTwoFactorService(r.db, r.logger)
|
|
|
|
|
|
2025-12-13 02:34:34 +00:00
|
|
|
// Apply rate limiting to login endpoint (PR-3)
|
|
|
|
|
loginGroup := authGroup.Group("/login")
|
|
|
|
|
if r.config.EndpointLimiter != nil {
|
|
|
|
|
loginGroup.Use(r.config.EndpointLimiter.LoginRateLimit())
|
|
|
|
|
}
|
2025-12-23 00:40:28 +00:00
|
|
|
loginGroup.POST("", handlers.Login(authService, sessionService, twoFactorService, r.logger))
|
2025-12-13 02:34:34 +00:00
|
|
|
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
authGroup.POST("/refresh", handlers.Refresh(authService, r.logger))
|
2025-12-03 19:29:37 +00:00
|
|
|
authGroup.POST("/verify-email", handlers.VerifyEmail(authService))
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
authGroup.POST("/resend-verification", handlers.ResendVerification(authService, r.logger))
|
2025-12-03 19:29:37 +00:00
|
|
|
authGroup.GET("/check-username", handlers.CheckUsername(authService))
|
|
|
|
|
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
// Password reset routes (public)
|
|
|
|
|
passwordGroup := authGroup.Group("/password")
|
|
|
|
|
{
|
|
|
|
|
passwordGroup.POST("/reset-request", handlers.RequestPasswordReset(
|
|
|
|
|
passwordResetService,
|
|
|
|
|
passwordService,
|
|
|
|
|
emailService,
|
|
|
|
|
r.logger,
|
|
|
|
|
))
|
|
|
|
|
passwordGroup.POST("/reset", handlers.ResetPassword(
|
|
|
|
|
passwordResetService,
|
|
|
|
|
passwordService,
|
|
|
|
|
authService,
|
|
|
|
|
sessionService,
|
|
|
|
|
r.logger,
|
|
|
|
|
))
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Protected routes (authentification JWT requise)
|
|
|
|
|
protected := authGroup.Group("")
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth()) // Changed to RequireAuth()
|
|
|
|
|
{
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
protected.POST("/logout", handlers.Logout(authService, sessionService, r.logger))
|
2025-12-22 22:03:46 +00:00
|
|
|
protected.GET("/me", handlers.GetMe(userService))
|
2025-12-23 00:40:28 +00:00
|
|
|
|
|
|
|
|
// BE-API-001: 2FA routes (reuse service created above)
|
|
|
|
|
twoFactorHandler := handlers.NewTwoFactorHandler(twoFactorService, userService, r.logger)
|
|
|
|
|
{
|
|
|
|
|
protected.POST("/2fa/setup", twoFactorHandler.SetupTwoFactor)
|
|
|
|
|
protected.POST("/2fa/verify", twoFactorHandler.VerifyTwoFactor)
|
|
|
|
|
protected.POST("/2fa/disable", twoFactorHandler.DisableTwoFactor)
|
|
|
|
|
protected.GET("/2fa/status", twoFactorHandler.GetTwoFactorStatus)
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
}
|
2025-12-13 02:34:34 +00:00
|
|
|
|
|
|
|
|
return nil
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-16 16:23:49 +00:00
|
|
|
// setupInternalRoutes configure les routes internal (legacy and modern)
|
|
|
|
|
// These routes must be on the root router, not under /api/v1
|
|
|
|
|
func (r *APIRouter) setupInternalRoutes(router *gin.Engine) {
|
|
|
|
|
// Create track handler for internal routes
|
|
|
|
|
uploadDir := r.config.UploadDir
|
|
|
|
|
if uploadDir == "" {
|
|
|
|
|
uploadDir = "uploads/tracks"
|
|
|
|
|
}
|
|
|
|
|
chunksDir := uploadDir + "/chunks"
|
|
|
|
|
|
|
|
|
|
trackService := trackcore.NewTrackService(r.db.GormDB, r.logger, uploadDir)
|
|
|
|
|
trackUploadService := services.NewTrackUploadService(r.db.GormDB, r.logger)
|
|
|
|
|
var redisClient *redis.Client
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
redisClient = r.config.RedisClient
|
|
|
|
|
}
|
|
|
|
|
chunkService := services.NewTrackChunkService(chunksDir, redisClient, r.logger)
|
|
|
|
|
likeService := services.NewTrackLikeService(r.db.GormDB, r.logger)
|
|
|
|
|
streamService := services.NewStreamService(r.config.StreamServerURL, r.logger)
|
|
|
|
|
|
|
|
|
|
trackHandler := trackcore.NewTrackHandler(
|
|
|
|
|
trackService,
|
|
|
|
|
trackUploadService,
|
|
|
|
|
chunkService,
|
|
|
|
|
likeService,
|
|
|
|
|
streamService,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// Deprecated /internal routes (legacy, on root router)
|
|
|
|
|
internalDeprecated := router.Group("/internal")
|
|
|
|
|
internalDeprecated.Use(middleware.DeprecationWarning(r.logger))
|
|
|
|
|
{
|
|
|
|
|
internalDeprecated.POST("/tracks/:id/stream-ready", trackHandler.HandleStreamCallback)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// New /api/v1/internal routes (modern, on root router)
|
|
|
|
|
v1Internal := router.Group("/api/v1/internal")
|
|
|
|
|
{
|
|
|
|
|
v1Internal.POST("/tracks/:id/stream-ready", trackHandler.HandleStreamCallback)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// setupUserRoutes configure les routes utilisateur
|
|
|
|
|
func (r *APIRouter) setupUserRoutes(router *gin.RouterGroup) {
|
|
|
|
|
userRepo := repositories.NewGormUserRepository(r.db.GormDB)
|
|
|
|
|
userService := services.NewUserServiceWithDB(userRepo, r.db.GormDB)
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
profileHandler := handlers.NewProfileHandler(userService, r.logger)
|
2025-12-13 02:34:34 +00:00
|
|
|
// MOD-P1-003: Set permission service for admin check in ownership verification
|
|
|
|
|
if r.config != nil && r.config.PermissionService != nil {
|
|
|
|
|
profileHandler.SetPermissionService(r.config.PermissionService)
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
users := router.Group("/users")
|
|
|
|
|
{
|
|
|
|
|
users.GET("/:id", profileHandler.GetProfile)
|
|
|
|
|
users.GET("/by-username/:username", profileHandler.GetProfileByUsername)
|
2025-12-23 09:42:26 +00:00
|
|
|
users.GET("/search", profileHandler.SearchUsers) // BE-API-008: User search endpoint
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// Protected routes
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
protected := users.Group("")
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth())
|
2025-12-16 16:59:56 +00:00
|
|
|
|
|
|
|
|
// MOD-P0-003: Apply ownership middleware for PUT /users/:id
|
|
|
|
|
// Resolver: For users, the :id param is directly the user_id
|
|
|
|
|
userOwnerResolver := func(c *gin.Context) (uuid.UUID, error) {
|
|
|
|
|
userIDStr := c.Param("id")
|
|
|
|
|
return uuid.Parse(userIDStr)
|
|
|
|
|
}
|
|
|
|
|
protected.PUT("/:id", r.config.AuthMiddleware.RequireOwnershipOrAdmin("user", userOwnerResolver), profileHandler.UpdateProfile)
|
|
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
protected.GET("/:id/completion", profileHandler.GetProfileCompletion)
|
2025-12-23 09:39:10 +00:00
|
|
|
|
|
|
|
|
// BE-API-007: User role assignment routes
|
|
|
|
|
roleService := services.NewRoleService(r.db.GormDB)
|
|
|
|
|
roleHandler := handlers.NewRoleHandler(roleService, r.logger)
|
|
|
|
|
protected.POST("/:userId/roles", roleHandler.AssignRole) // POST /api/v1/users/:userId/roles
|
|
|
|
|
protected.DELETE("/:userId/roles/:roleId", roleHandler.RevokeRole) // DELETE /api/v1/users/:userId/roles/:roleId
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupRoleRoutes configure les routes de gestion des rôles
|
|
|
|
|
// BE-API-007: Implement roles management endpoints
|
|
|
|
|
func (r *APIRouter) setupRoleRoutes(router *gin.RouterGroup) {
|
|
|
|
|
roleService := services.NewRoleService(r.db.GormDB)
|
|
|
|
|
roleHandler := handlers.NewRoleHandler(roleService, r.logger)
|
|
|
|
|
|
|
|
|
|
// Roles routes
|
|
|
|
|
roles := router.Group("/roles")
|
|
|
|
|
{
|
|
|
|
|
// Protected routes
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
protected := roles.Group("")
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
{
|
|
|
|
|
protected.GET("", roleHandler.GetRoles) // GET /api/v1/roles
|
|
|
|
|
protected.GET("/:id", roleHandler.GetRole) // GET /api/v1/roles/:id
|
|
|
|
|
}
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupTrackRoutes configure les routes de gestion des tracks
|
|
|
|
|
func (r *APIRouter) setupTrackRoutes(router *gin.RouterGroup) {
|
|
|
|
|
uploadDir := r.config.UploadDir
|
|
|
|
|
if uploadDir == "" {
|
|
|
|
|
uploadDir = "uploads/tracks"
|
|
|
|
|
}
|
|
|
|
|
chunksDir := uploadDir + "/chunks"
|
|
|
|
|
|
|
|
|
|
trackService := trackcore.NewTrackService(r.db.GormDB, r.logger, uploadDir)
|
|
|
|
|
trackUploadService := services.NewTrackUploadService(r.db.GormDB, r.logger)
|
2025-12-13 02:34:34 +00:00
|
|
|
var redisClient *redis.Client
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
redisClient = r.config.RedisClient
|
|
|
|
|
}
|
|
|
|
|
chunkService := services.NewTrackChunkService(chunksDir, redisClient, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
likeService := services.NewTrackLikeService(r.db.GormDB, r.logger)
|
|
|
|
|
streamService := services.NewStreamService(r.config.StreamServerURL, r.logger)
|
|
|
|
|
|
|
|
|
|
trackHandler := trackcore.NewTrackHandler(
|
|
|
|
|
trackService,
|
|
|
|
|
trackUploadService,
|
|
|
|
|
chunkService,
|
|
|
|
|
likeService,
|
|
|
|
|
streamService,
|
|
|
|
|
)
|
2025-12-13 02:34:34 +00:00
|
|
|
// MOD-P1-003: Set permission service for admin check in ownership verification
|
|
|
|
|
if r.config != nil && r.config.PermissionService != nil {
|
|
|
|
|
trackHandler.SetPermissionService(r.config.PermissionService)
|
|
|
|
|
}
|
|
|
|
|
// MOD-P1-001: Set upload validator for ClamAV scan before persistence
|
2025-12-17 17:20:42 +00:00
|
|
|
// CORRECTION: Charger la config depuis l'environnement pour respecter ENABLE_CLAMAV
|
|
|
|
|
uploadConfig := getUploadConfigWithEnv()
|
|
|
|
|
fmt.Printf("🔧 [ROUTER] Configuration upload chargée - ClamAVEnabled=%v, ClamAVRequired=%v\n",
|
|
|
|
|
uploadConfig.ClamAVEnabled, uploadConfig.ClamAVRequired)
|
2025-12-13 02:34:34 +00:00
|
|
|
uploadValidator, err := services.NewUploadValidator(uploadConfig, r.logger)
|
|
|
|
|
if err != nil {
|
|
|
|
|
r.logger.Warn("Upload validator created with ClamAV unavailable - uploads will be rejected", zap.Error(err))
|
|
|
|
|
uploadConfig.ClamAVEnabled = false
|
|
|
|
|
uploadValidator, _ = services.NewUploadValidator(uploadConfig, r.logger)
|
|
|
|
|
}
|
|
|
|
|
trackHandler.SetUploadValidator(uploadValidator)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
tracks := router.Group("/tracks")
|
|
|
|
|
{
|
|
|
|
|
// Public routes
|
|
|
|
|
tracks.GET("", trackHandler.ListTracks)
|
|
|
|
|
tracks.GET("/:id", trackHandler.GetTrack)
|
|
|
|
|
tracks.GET("/:id/stats", trackHandler.GetTrackStats)
|
|
|
|
|
tracks.GET("/:id/history", trackHandler.GetTrackHistory)
|
|
|
|
|
tracks.GET("/:id/download", trackHandler.DownloadTrack)
|
|
|
|
|
tracks.GET("/shared/:token", trackHandler.GetSharedTrack)
|
|
|
|
|
|
|
|
|
|
// Protected routes
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
protected := tracks.Group("")
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
|
|
|
|
|
// GO-012: Upload track requires creator/premium/admin role
|
|
|
|
|
uploadGroup := protected.Group("")
|
|
|
|
|
uploadGroup.Use(r.config.AuthMiddleware.RequireContentCreatorRole())
|
|
|
|
|
uploadGroup.POST("", trackHandler.UploadTrack)
|
2025-12-16 16:59:56 +00:00
|
|
|
|
|
|
|
|
// MOD-P0-003: Apply ownership middleware for PUT/DELETE /tracks/:id
|
|
|
|
|
// Resolver: Load track from DB to get its user_id
|
|
|
|
|
trackOwnerResolver := func(c *gin.Context) (uuid.UUID, error) {
|
|
|
|
|
trackIDStr := c.Param("id")
|
|
|
|
|
trackID, err := uuid.Parse(trackIDStr)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return uuid.Nil, err
|
|
|
|
|
}
|
|
|
|
|
// Load track to get owner ID
|
|
|
|
|
track, err := trackService.GetTrackByID(c.Request.Context(), trackID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return uuid.Nil, err
|
|
|
|
|
}
|
|
|
|
|
return track.UserID, nil
|
|
|
|
|
}
|
|
|
|
|
protected.PUT("/:id", r.config.AuthMiddleware.RequireOwnershipOrAdmin("track", trackOwnerResolver), trackHandler.UpdateTrack)
|
|
|
|
|
protected.DELETE("/:id", r.config.AuthMiddleware.RequireOwnershipOrAdmin("track", trackOwnerResolver), trackHandler.DeleteTrack)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// Upload
|
|
|
|
|
protected.GET("/:id/status", trackHandler.GetUploadStatus)
|
|
|
|
|
protected.POST("/initiate", trackHandler.InitiateChunkedUpload)
|
|
|
|
|
protected.POST("/chunk", trackHandler.UploadChunk)
|
|
|
|
|
protected.POST("/complete", trackHandler.CompleteChunkedUpload)
|
|
|
|
|
protected.GET("/quota/:id", trackHandler.GetUploadQuota)
|
|
|
|
|
protected.GET("/resume/:uploadId", trackHandler.ResumeUpload)
|
|
|
|
|
|
|
|
|
|
// Batch operations
|
|
|
|
|
protected.POST("/batch/delete", trackHandler.BatchDeleteTracks)
|
|
|
|
|
protected.POST("/batch/update", trackHandler.BatchUpdateTracks)
|
|
|
|
|
|
|
|
|
|
// Social
|
|
|
|
|
protected.POST("/:id/like", trackHandler.LikeTrack)
|
|
|
|
|
protected.DELETE("/:id/like", trackHandler.UnlikeTrack)
|
|
|
|
|
protected.GET("/:id/likes", trackHandler.GetTrackLikes)
|
|
|
|
|
|
|
|
|
|
// Sharing
|
|
|
|
|
protected.POST("/:id/share", trackHandler.CreateShare)
|
|
|
|
|
protected.DELETE("/share/:id", trackHandler.RevokeShare)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-16 16:23:49 +00:00
|
|
|
// Note: Internal routes are now set up in setupInternalRoutes() to avoid
|
|
|
|
|
// path prefix issues when setupTrackRoutes is called with a RouterGroup
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
users := router.Group("/users")
|
|
|
|
|
{
|
|
|
|
|
users.GET("/:id/likes", trackHandler.GetUserLikedTracks)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupChatRoutes configure les routes de chat
|
|
|
|
|
func (r *APIRouter) setupChatRoutes(router *gin.RouterGroup) {
|
2025-12-23 00:51:49 +00:00
|
|
|
// BE-API-006: Use NewChatServiceWithDB to enable stats functionality
|
|
|
|
|
chatService := services.NewChatServiceWithDB(r.config.ChatJWTSecret, r.db.GormDB, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
userRepo := repositories.NewGormUserRepository(r.db.GormDB)
|
|
|
|
|
userService := services.NewUserServiceWithDB(userRepo, r.db.GormDB)
|
|
|
|
|
|
|
|
|
|
chatHandler := handlers.NewChatHandler(chatService, userService, r.logger)
|
|
|
|
|
|
|
|
|
|
chat := router.Group("/chat")
|
|
|
|
|
{
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
chat.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
chat.POST("/token", chatHandler.GetToken)
|
2025-12-23 00:51:49 +00:00
|
|
|
chat.GET("/stats", chatHandler.GetStats) // BE-API-006: Chat stats endpoint
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupPlaylistRoutes configure les routes pour les playlists
|
|
|
|
|
func (r *APIRouter) setupPlaylistRoutes(router *gin.RouterGroup) {
|
|
|
|
|
playlistRepo := repositories.NewPlaylistRepository(r.db.GormDB)
|
|
|
|
|
playlistTrackRepo := repositories.NewPlaylistTrackRepository(r.db.GormDB)
|
|
|
|
|
playlistCollaboratorRepo := repositories.NewPlaylistCollaboratorRepository(r.db.GormDB)
|
|
|
|
|
userRepo := repositories.NewGormUserRepository(r.db.GormDB)
|
|
|
|
|
|
|
|
|
|
playlistService := services.NewPlaylistService(
|
|
|
|
|
playlistRepo,
|
|
|
|
|
playlistTrackRepo,
|
|
|
|
|
playlistCollaboratorRepo,
|
|
|
|
|
userRepo,
|
|
|
|
|
r.logger,
|
|
|
|
|
)
|
|
|
|
|
|
2025-12-23 00:51:00 +00:00
|
|
|
// BE-API-004: Initialize PlaylistShareService for share link functionality
|
|
|
|
|
playlistShareService := services.NewPlaylistShareService(r.db.GormDB)
|
|
|
|
|
playlistService.SetPlaylistShareService(playlistShareService)
|
|
|
|
|
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
playlistHandler := handlers.NewPlaylistHandler(playlistService, r.db.GormDB, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// Protected routes for playlists
|
|
|
|
|
playlists := router.Group("/playlists")
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
playlists.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
{
|
|
|
|
|
playlists.GET("", playlistHandler.GetPlaylists)
|
|
|
|
|
playlists.POST("", playlistHandler.CreatePlaylist)
|
2025-12-23 00:49:21 +00:00
|
|
|
playlists.GET("/search", playlistHandler.SearchPlaylists) // BE-API-003: Playlist search endpoint
|
2025-12-03 19:29:37 +00:00
|
|
|
playlists.GET("/:id", playlistHandler.GetPlaylist)
|
2025-12-23 00:37:56 +00:00
|
|
|
|
|
|
|
|
// BE-SEC-003: Apply ownership middleware for PUT/DELETE /playlists/:id
|
|
|
|
|
// Resolver: Load playlist from DB to get its user_id
|
|
|
|
|
playlistOwnerResolver := func(c *gin.Context) (uuid.UUID, error) {
|
|
|
|
|
playlistIDStr := c.Param("id")
|
|
|
|
|
playlistID, err := uuid.Parse(playlistIDStr)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return uuid.Nil, err
|
|
|
|
|
}
|
|
|
|
|
// Load playlist to get owner ID
|
|
|
|
|
playlist, err := playlistRepo.GetByID(c.Request.Context(), playlistID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return uuid.Nil, err
|
|
|
|
|
}
|
|
|
|
|
return playlist.UserID, nil
|
|
|
|
|
}
|
|
|
|
|
playlists.PUT("/:id", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.UpdatePlaylist)
|
|
|
|
|
playlists.DELETE("/:id", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.DeletePlaylist)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// Playlist Tracks
|
|
|
|
|
playlists.POST("/:id/tracks", playlistHandler.AddTrack)
|
|
|
|
|
playlists.DELETE("/:id/tracks/:track_id", playlistHandler.RemoveTrack)
|
|
|
|
|
playlists.PUT("/:id/tracks/reorder", playlistHandler.ReorderTracks)
|
2025-12-23 00:41:43 +00:00
|
|
|
|
|
|
|
|
// Playlist Collaborators
|
|
|
|
|
// BE-API-002: Add collaborator routes with ownership checks
|
|
|
|
|
// POST and DELETE require ownership (enforced by service layer, but middleware adds extra security)
|
|
|
|
|
playlists.POST("/:id/collaborators", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.AddCollaborator)
|
|
|
|
|
playlists.GET("/:id/collaborators", playlistHandler.GetCollaborators) // GET accessible to collaborators (service checks permissions)
|
|
|
|
|
playlists.PUT("/:id/collaborators/:userId", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.UpdateCollaboratorPermission)
|
|
|
|
|
playlists.DELETE("/:id/collaborators/:userId", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.RemoveCollaborator)
|
2025-12-23 00:51:00 +00:00
|
|
|
|
|
|
|
|
// BE-API-004: Playlist share link endpoint
|
|
|
|
|
playlists.POST("/:id/share", r.config.AuthMiddleware.RequireOwnershipOrAdmin("playlist", playlistOwnerResolver), playlistHandler.CreateShareLink)
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupWebhookRoutes configure les routes pour les webhooks
|
|
|
|
|
func (r *APIRouter) setupWebhookRoutes(router *gin.RouterGroup) {
|
|
|
|
|
webhookService := services.NewWebhookService(r.db.GormDB, r.logger, r.config.JWTSecret)
|
|
|
|
|
|
|
|
|
|
webhookWorker := workers.NewWebhookWorker(
|
|
|
|
|
r.db.GormDB,
|
|
|
|
|
webhookService,
|
|
|
|
|
r.logger,
|
|
|
|
|
100, // Queue size
|
|
|
|
|
5, // Workers
|
|
|
|
|
3, // Max retries
|
|
|
|
|
)
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
// Start worker in background
|
|
|
|
|
go webhookWorker.Start(context.Background())
|
|
|
|
|
|
|
|
|
|
webhookHandler := handlers.NewWebhookHandler(webhookService, webhookWorker, r.logger)
|
|
|
|
|
|
|
|
|
|
webhooks := router.Group("/webhooks")
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
webhooks.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
}
|
|
|
|
|
{
|
|
|
|
|
webhooks.POST("", webhookHandler.RegisterWebhook())
|
|
|
|
|
webhooks.GET("", webhookHandler.ListWebhooks())
|
|
|
|
|
webhooks.DELETE("/:id", webhookHandler.DeleteWebhook())
|
|
|
|
|
webhooks.GET("/stats", webhookHandler.GetWebhookStats())
|
|
|
|
|
webhooks.POST("/:id/test", webhookHandler.TestWebhook())
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupCorePublicRoutes configure les routes publiques core (health, metrics, upload info)
|
|
|
|
|
func (r *APIRouter) setupCorePublicRoutes(router *gin.Engine) {
|
|
|
|
|
// Health check handlers
|
|
|
|
|
var healthCheckHandler gin.HandlerFunc
|
|
|
|
|
var livenessHandler gin.HandlerFunc
|
|
|
|
|
var readinessHandler gin.HandlerFunc
|
|
|
|
|
|
|
|
|
|
if r.db != nil && r.db.GormDB != nil {
|
|
|
|
|
var redisClient interface{}
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
redisClient = r.config.RedisClient
|
|
|
|
|
}
|
|
|
|
|
var rabbitMQEventBus interface{}
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
rabbitMQEventBus = r.config.RabbitMQEventBus
|
|
|
|
|
}
|
2025-12-07 13:27:07 +00:00
|
|
|
var env string
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
env = r.config.Env
|
|
|
|
|
}
|
|
|
|
|
healthHandler := handlers.NewHealthHandler(r.db.GormDB, r.logger, redisClient, rabbitMQEventBus, env)
|
2025-12-03 19:29:37 +00:00
|
|
|
healthCheckHandler = healthHandler.Check
|
|
|
|
|
livenessHandler = healthHandler.Liveness
|
|
|
|
|
readinessHandler = healthHandler.Readiness
|
|
|
|
|
} else {
|
|
|
|
|
healthCheckHandler = handlers.SimpleHealthCheck
|
|
|
|
|
livenessHandler = handlers.SimpleHealthCheck
|
|
|
|
|
readinessHandler = handlers.SimpleHealthCheck
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-16 16:23:49 +00:00
|
|
|
// Deprecated Public Core Routes - apply deprecation middleware only to specific routes
|
|
|
|
|
// Use a wrapper function to apply middleware to individual routes
|
|
|
|
|
deprecationMW := middleware.DeprecationWarning(r.logger)
|
|
|
|
|
|
|
|
|
|
// Wrap handlers with deprecation middleware for legacy routes only
|
|
|
|
|
router.GET("/health", deprecationMW, healthCheckHandler)
|
|
|
|
|
router.GET("/healthz", deprecationMW, livenessHandler)
|
|
|
|
|
router.GET("/readyz", deprecationMW, readinessHandler)
|
|
|
|
|
router.GET("/metrics", deprecationMW, handlers.PrometheusMetrics())
|
2025-12-03 19:29:37 +00:00
|
|
|
if r.config != nil && r.config.ErrorMetrics != nil {
|
2025-12-16 16:23:49 +00:00
|
|
|
router.GET("/metrics/aggregated", deprecationMW, handlers.AggregatedMetrics(r.config.ErrorMetrics))
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
2025-12-16 16:23:49 +00:00
|
|
|
router.GET("/system/metrics", deprecationMW, handlers.SystemMetrics)
|
2025-12-03 19:29:37 +00:00
|
|
|
|
|
|
|
|
// New /api/v1 Public Core Routes
|
|
|
|
|
v1Public := router.Group("/api/v1")
|
|
|
|
|
{
|
|
|
|
|
v1Public.GET("/health", healthCheckHandler)
|
|
|
|
|
v1Public.GET("/healthz", livenessHandler)
|
|
|
|
|
v1Public.GET("/readyz", readinessHandler)
|
2025-12-06 16:21:59 +00:00
|
|
|
|
P0: stabilisation backend/chat/stream + nouvelle base migrations v1
Backend Go:
- Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN.
- Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError).
- Sécurisation de config.go, CORS, statuts de santé et monitoring.
- Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles).
- Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés.
- Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*.
Chat server (Rust):
- Refonte du pipeline JWT + sécurité, audit et rate limiting avancé.
- Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing).
- Nettoyage des panics, gestion d’erreurs robuste, logs structurés.
- Migrations chat alignées sur le schéma UUID et nouvelles features.
Stream server (Rust):
- Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core.
- Transactions P0 pour les jobs et segments, garanties d’atomicité.
- Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION).
Documentation & audits:
- TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services.
- Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3).
- Scripts de reset et de cleanup pour la lab DB et la V1.
Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
|
|
|
// Status endpoint (comprehensive health check)
|
|
|
|
|
if r.db != nil && r.db.GormDB != nil {
|
|
|
|
|
var redisClient interface{}
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
redisClient = r.config.RedisClient
|
|
|
|
|
}
|
|
|
|
|
chatServerURL := ""
|
|
|
|
|
streamServerURL := ""
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
chatServerURL = r.config.ChatServerURL
|
|
|
|
|
streamServerURL = r.config.StreamServerURL
|
|
|
|
|
}
|
|
|
|
|
// Get build info from environment or defaults
|
|
|
|
|
getEnv := func(key, defaultValue string) string {
|
|
|
|
|
if value := os.Getenv(key); value != "" {
|
|
|
|
|
return value
|
|
|
|
|
}
|
|
|
|
|
return defaultValue
|
|
|
|
|
}
|
|
|
|
|
version := getEnv("APP_VERSION", "v1.0.0")
|
|
|
|
|
gitCommit := getEnv("GIT_COMMIT", "unknown")
|
|
|
|
|
buildTime := getEnv("BUILD_TIME", "")
|
|
|
|
|
environment := ""
|
|
|
|
|
if r.config != nil {
|
|
|
|
|
environment = r.config.Env
|
|
|
|
|
}
|
|
|
|
|
statusHandler := handlers.NewStatusHandler(
|
|
|
|
|
r.db.GormDB,
|
|
|
|
|
r.logger,
|
|
|
|
|
redisClient,
|
|
|
|
|
chatServerURL,
|
|
|
|
|
streamServerURL,
|
|
|
|
|
version,
|
|
|
|
|
gitCommit,
|
|
|
|
|
buildTime,
|
|
|
|
|
environment,
|
|
|
|
|
)
|
|
|
|
|
v1Public.GET("/status", statusHandler.GetStatus)
|
|
|
|
|
}
|
2025-12-06 16:21:59 +00:00
|
|
|
|
2025-12-03 19:29:37 +00:00
|
|
|
v1Public.GET("/metrics", handlers.PrometheusMetrics())
|
|
|
|
|
if r.config != nil && r.config.ErrorMetrics != nil {
|
|
|
|
|
v1Public.GET("/metrics/aggregated", handlers.AggregatedMetrics(r.config.ErrorMetrics))
|
|
|
|
|
}
|
|
|
|
|
v1Public.GET("/system/metrics", handlers.SystemMetrics)
|
|
|
|
|
|
|
|
|
|
// Upload info endpoints (public, already in /api/v1)
|
2025-12-13 02:34:34 +00:00
|
|
|
// MOD-P1-001-REFINEMENT: Permettre démarrage même si ClamAV down
|
2025-12-03 19:29:37 +00:00
|
|
|
if r.db != nil && r.db.GormDB != nil {
|
2025-12-17 17:20:42 +00:00
|
|
|
// CORRECTION: Charger la config depuis l'environnement pour respecter ENABLE_CLAMAV
|
|
|
|
|
uploadConfig := getUploadConfigWithEnv()
|
2025-12-03 19:29:37 +00:00
|
|
|
uploadValidator, err := services.NewUploadValidator(uploadConfig, r.logger)
|
2025-12-13 02:34:34 +00:00
|
|
|
if err != nil {
|
|
|
|
|
r.logger.Warn("Upload validator created with ClamAV unavailable - uploads will be rejected", zap.Error(err))
|
|
|
|
|
// Créer un validateur minimal pour permettre les endpoints info
|
|
|
|
|
uploadConfig.ClamAVEnabled = false
|
|
|
|
|
uploadValidator, _ = services.NewUploadValidator(uploadConfig, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
2025-12-13 02:34:34 +00:00
|
|
|
auditService := services.NewAuditService(r.db, r.logger)
|
2025-12-16 18:34:08 +00:00
|
|
|
uploadHandler := handlers.NewUploadHandler(uploadValidator, auditService, r.logger, r.config.MaxConcurrentUploads)
|
2025-12-13 02:34:34 +00:00
|
|
|
v1Public.GET("/upload/limits", uploadHandler.GetUploadLimits())
|
|
|
|
|
v1Public.GET("/upload/validate-type", uploadHandler.ValidateFileType())
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setupCoreProtectedRoutes configure les routes protégées core (sessions, uploads, audit, admin, conversations)
|
|
|
|
|
func (r *APIRouter) setupCoreProtectedRoutes(v1 *gin.RouterGroup) {
|
|
|
|
|
if r.db == nil || r.db.GormDB == nil || r.config == nil {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Middleware d'authentification pour routes protégées
|
|
|
|
|
protected := v1.Group("/")
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
protected.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Services nécessaires
|
|
|
|
|
sessionService := services.NewSessionService(r.db, r.logger)
|
2025-12-23 00:41:43 +00:00
|
|
|
|
2025-12-22 21:56:37 +00:00
|
|
|
// CSRF Middleware (si Redis est disponible)
|
|
|
|
|
var csrfMiddleware *middleware.CSRFMiddleware
|
|
|
|
|
if r.config.RedisClient != nil {
|
|
|
|
|
csrfMiddleware = middleware.NewCSRFMiddleware(r.config.RedisClient, r.logger)
|
|
|
|
|
csrfHandler := handlers.NewCSRFHandler(csrfMiddleware, r.logger)
|
2025-12-23 00:41:43 +00:00
|
|
|
|
2025-12-22 21:56:37 +00:00
|
|
|
// Route CSRF token (doit être accessible sans vérification CSRF)
|
|
|
|
|
protected.GET("/csrf-token", csrfHandler.GetCSRFToken())
|
2025-12-23 00:41:43 +00:00
|
|
|
|
2025-12-22 21:56:37 +00:00
|
|
|
// Appliquer le middleware CSRF à toutes les routes protégées (sauf /csrf-token qui est déjà définie)
|
|
|
|
|
protected.Use(csrfMiddleware.Middleware())
|
|
|
|
|
} else {
|
|
|
|
|
r.logger.Warn("Redis not available - CSRF protection disabled")
|
|
|
|
|
}
|
2025-12-17 17:20:42 +00:00
|
|
|
// CORRECTION: Charger la config depuis l'environnement pour respecter ENABLE_CLAMAV
|
|
|
|
|
uploadConfig := getUploadConfigWithEnv()
|
2025-12-13 02:34:34 +00:00
|
|
|
// MOD-P1-001-REFINEMENT: Permettre démarrage même si ClamAV down
|
2025-12-03 19:29:37 +00:00
|
|
|
uploadValidator, err := services.NewUploadValidator(uploadConfig, r.logger)
|
|
|
|
|
if err != nil {
|
2025-12-13 02:34:34 +00:00
|
|
|
r.logger.Warn("Upload validator created with ClamAV unavailable - uploads will be rejected", zap.Error(err))
|
|
|
|
|
// Créer un validateur minimal pour permettre les routes d'upload (qui rejetteront)
|
|
|
|
|
uploadConfig.ClamAVEnabled = false
|
|
|
|
|
uploadValidator, _ = services.NewUploadValidator(uploadConfig, r.logger)
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
|
|
|
|
auditService := services.NewAuditService(r.db, r.logger)
|
|
|
|
|
|
|
|
|
|
// Handlers
|
|
|
|
|
sessionHandler := handlers.NewSessionHandler(sessionService, auditService, r.logger)
|
2025-12-16 18:34:08 +00:00
|
|
|
uploadHandler := handlers.NewUploadHandler(uploadValidator, auditService, r.logger, r.config.MaxConcurrentUploads)
|
2025-12-03 19:29:37 +00:00
|
|
|
auditHandler := handlers.NewAuditHandler(auditService, r.logger)
|
|
|
|
|
|
|
|
|
|
// Routes de session
|
|
|
|
|
sessions := protected.Group("/sessions")
|
|
|
|
|
{
|
|
|
|
|
sessions.POST("/logout", sessionHandler.Logout())
|
|
|
|
|
sessions.POST("/logout-all", sessionHandler.LogoutAll())
|
|
|
|
|
sessions.GET("/", sessionHandler.GetSessions())
|
|
|
|
|
sessions.DELETE("/:session_id", sessionHandler.RevokeSession())
|
|
|
|
|
sessions.GET("/stats", sessionHandler.GetSessionStats())
|
|
|
|
|
sessions.POST("/refresh", sessionHandler.RefreshSession())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Routes d'upload avec rate limiting spécifique
|
|
|
|
|
uploads := protected.Group("/uploads")
|
|
|
|
|
{
|
|
|
|
|
if r.config.RedisClient != nil {
|
|
|
|
|
uploads.Use(middleware.UploadRateLimit(r.config.RedisClient))
|
|
|
|
|
}
|
|
|
|
|
uploads.POST("/", uploadHandler.UploadFile())
|
|
|
|
|
uploads.POST("/batch", uploadHandler.BatchUpload())
|
|
|
|
|
uploads.GET("/:id/status", uploadHandler.GetUploadStatus())
|
|
|
|
|
uploads.GET("/:id/progress", uploadHandler.UploadProgress())
|
|
|
|
|
uploads.DELETE("/:id", uploadHandler.DeleteUpload())
|
|
|
|
|
uploads.GET("/stats", uploadHandler.GetUploadStats())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Routes d'audit
|
|
|
|
|
audit := protected.Group("/audit")
|
|
|
|
|
{
|
|
|
|
|
audit.GET("/logs", auditHandler.SearchLogs())
|
|
|
|
|
audit.GET("/stats", auditHandler.GetStats())
|
|
|
|
|
audit.GET("/activity", auditHandler.GetUserActivity())
|
|
|
|
|
audit.GET("/suspicious", auditHandler.DetectSuspiciousActivity())
|
|
|
|
|
audit.GET("/ip/:ip", auditHandler.GetIPActivity())
|
|
|
|
|
audit.GET("/logs/:id", auditHandler.GetAuditLog())
|
|
|
|
|
audit.POST("/cleanup", auditHandler.CleanupOldLogs())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Routes de conversations (chat rooms)
|
|
|
|
|
roomRepo := repositories.NewRoomRepository(r.db.GormDB)
|
|
|
|
|
messageRepo := repositories.NewChatMessageRepository(r.db.GormDB) // New
|
|
|
|
|
roomService := services.NewRoomService(roomRepo, messageRepo, r.logger) // Updated constructor
|
|
|
|
|
roomHandler := handlers.NewRoomHandler(roomService, r.logger)
|
|
|
|
|
|
|
|
|
|
conversations := protected.Group("/conversations")
|
|
|
|
|
{
|
|
|
|
|
conversations.GET("", roomHandler.GetUserRooms)
|
|
|
|
|
conversations.POST("", roomHandler.CreateRoom)
|
|
|
|
|
conversations.GET("/:id", roomHandler.GetRoom)
|
|
|
|
|
conversations.POST("/:id/members", roomHandler.AddMember)
|
|
|
|
|
conversations.GET("/:id/history", roomHandler.GetRoomHistory)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Routes administrateur (avec authentification + permissions admin)
|
|
|
|
|
admin := v1.Group("/admin")
|
|
|
|
|
{
|
|
|
|
|
if r.config.AuthMiddleware != nil {
|
|
|
|
|
admin.Use(r.config.AuthMiddleware.RequireAuth())
|
|
|
|
|
admin.Use(r.config.AuthMiddleware.RequireAdmin())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Audit logs (disponibles)
|
|
|
|
|
admin.GET("/audit/logs", auditHandler.SearchLogs())
|
|
|
|
|
admin.GET("/audit/stats", auditHandler.GetStats())
|
|
|
|
|
admin.GET("/audit/suspicious", auditHandler.DetectSuspiciousActivity())
|
2025-12-16 18:34:08 +00:00
|
|
|
|
|
|
|
|
// MOD-P2-006: Profiling pprof (protégé par auth admin)
|
|
|
|
|
admin.Any("/debug/pprof/*path", gin.WrapH(http.DefaultServeMux))
|
2025-12-03 19:29:37 +00:00
|
|
|
}
|
2025-12-06 16:21:59 +00:00
|
|
|
}
|