feat(launch): security and correctness fixes for 2026-05-01 launch
Day-of-launch deep-dive audit and remediation. 11 issues fixed across security, correctness, and reliability. Tests: 698 → 758 passing (+60), 0 failing, 2 skipped. CRITICAL (security) Fix #1 — HELCIM_API_TOKEN removed from runtimeConfig.public; dead useHelcim.js deleted. Production token MUST BE ROTATED post-deploy (was previously exposed in window.__NUXT__ payload). Fix #2 — /api/helcim/customer gated with origin check + per-IP/email rate limit + magic-link email verification (replaces unauthenticated setAuthCookie). Adds payment-bridge token for paid-tier signup so users can complete Helcim checkout before email verify. New utils: server/utils/{magicLink,rateLimit}.js. UX: signup success copy now prompts user to check email. Fix #3 — /api/events/[id]/payment deleted (dead code with unauth member-spoof bypass — processHelcimPayment was a permanent stub). Removes processHelcimPayment export and eventPaymentSchema. Fix #4 — /api/helcim/initialize-payment re-derives ticket amount server-side via calculateTicketPrice and calculateSeriesTicketPrice. Adds new series_ticket metadata type (was being shoved through event_ticket with seriesId in metadata.eventId). Fix #5 — /api/helcim/customer upgrades existing status:guest members in place rather than rejecting with 409. Lowercases email at lookup; preserves _id so prior event registrations stay linked. HIGH (correctness / reliability) Fix #6 — Daily reconciliation cron via Netlify scheduled function (@daily). New: netlify.toml, netlify/functions/reconcile-payments.mjs, server/api/internal/reconcile-payments.post.js. Shared-secret auth via NUXT_RECONCILE_TOKEN env var. Inline 3-retry exponential backoff on Helcim transactions API. Fix #7 — validateBeforeSave: false on event subdoc saves (waitlist endpoints) to dodge legacy location validators. Fix #8 — /api/series/[id]/tickets/purchase always upserts a guest Member when caller is unauthenticated, mirrors event-ticket flow byte-for-byte. SeriesPassPurchase.vue adds guest-account hint and client auth refresh on signedIn:true response. Fix #9 — /api/members/cancel-subscription leaves status active per ratified bylaws (was pending_payment). Adds lastCancelledAt audit field on Member model. Indirectly fixes false-positive detectStuckPendingPayment admin alert for cancelled members. Fix #10 — /api/auth/verify uses validateBody with strict() Zod schema (verifyMagicLinkSchema, max 2000 chars). Fix #11 — 8 vitest cases for cancel-subscription handler (was uncovered). Specs and audit at docs/superpowers/specs/2026-04-25-fix-*.md and docs/superpowers/plans/2026-04-25-launch-readiness-fixes.md. LAUNCH_READINESS.md updated with new test count, 3 deploy-time tasks (rotate Helcim token, set NUXT_RECONCILE_TOKEN, verify Netlify scheduled function), and Fixed-2026-04-25 fix log.
This commit is contained in:
parent
0f2f1d1cbf
commit
208638e374
37 changed files with 1980 additions and 340 deletions
|
|
@ -1,17 +1,11 @@
|
|||
// server/api/auth/verify.post.js
|
||||
import jwt from 'jsonwebtoken'
|
||||
import Member from '../../models/member.js'
|
||||
import { validateBody } from '../../utils/validateBody.js'
|
||||
import { verifyMagicLinkSchema } from '../../utils/schemas.js'
|
||||
|
||||
export default defineEventHandler(async (event) => {
|
||||
const body = await readBody(event)
|
||||
const token = body?.token
|
||||
|
||||
if (!token) {
|
||||
throw createError({
|
||||
statusCode: 400,
|
||||
statusMessage: 'Token is required',
|
||||
})
|
||||
}
|
||||
const { token } = await validateBody(event, verifyMagicLinkSchema)
|
||||
|
||||
const config = useRuntimeConfig(event)
|
||||
|
||||
|
|
|
|||
|
|
@ -1,128 +0,0 @@
|
|||
import Event from '../../../models/event.js'
|
||||
import Member from '../../../models/member.js'
|
||||
import { connectDB } from '../../../utils/mongoose.js'
|
||||
import { processHelcimPayment } from '../../../utils/helcim.js'
|
||||
import mongoose from 'mongoose'
|
||||
|
||||
export default defineEventHandler(async (event) => {
|
||||
try {
|
||||
await connectDB()
|
||||
const identifier = getRouterParam(event, 'id')
|
||||
const body = await validateBody(event, eventPaymentSchema)
|
||||
|
||||
if (!identifier) {
|
||||
throw createError({
|
||||
statusCode: 400,
|
||||
statusMessage: 'Event identifier is required'
|
||||
})
|
||||
}
|
||||
|
||||
// Fetch the event
|
||||
let eventData
|
||||
if (mongoose.Types.ObjectId.isValid(identifier)) {
|
||||
eventData = await Event.findById(identifier)
|
||||
}
|
||||
if (!eventData) {
|
||||
eventData = await Event.findOne({ slug: identifier })
|
||||
}
|
||||
|
||||
if (!eventData) {
|
||||
throw createError({
|
||||
statusCode: 404,
|
||||
statusMessage: 'Event not found'
|
||||
})
|
||||
}
|
||||
|
||||
// Check if event requires payment
|
||||
if (eventData.pricing.isFree || !eventData.pricing.paymentRequired) {
|
||||
throw createError({
|
||||
statusCode: 400,
|
||||
statusMessage: 'This event does not require payment'
|
||||
})
|
||||
}
|
||||
|
||||
// Check if user is already registered
|
||||
const existingRegistration = eventData.registrations.find(
|
||||
reg => reg.email.toLowerCase() === body.email.toLowerCase()
|
||||
)
|
||||
|
||||
if (existingRegistration) {
|
||||
throw createError({
|
||||
statusCode: 400,
|
||||
statusMessage: 'You are already registered for this event'
|
||||
})
|
||||
}
|
||||
|
||||
// Check if user is a member (members get free access)
|
||||
const member = await Member.findOne({ email: body.email.toLowerCase() })
|
||||
|
||||
if (member) {
|
||||
// Members get free access - register directly without payment
|
||||
eventData.registrations.push({
|
||||
name: body.name,
|
||||
email: body.email.toLowerCase(),
|
||||
membershipLevel: `${member.circle}-${member.contributionAmount}`,
|
||||
isMember: true,
|
||||
paymentStatus: 'not_required',
|
||||
amountPaid: 0
|
||||
})
|
||||
|
||||
await eventData.save()
|
||||
|
||||
return {
|
||||
success: true,
|
||||
message: 'Successfully registered as a member (no payment required)',
|
||||
registration: eventData.registrations[eventData.registrations.length - 1]
|
||||
}
|
||||
}
|
||||
|
||||
// Process payment for non-members
|
||||
const paymentResult = await processHelcimPayment({
|
||||
amount: eventData.pricing.publicPrice,
|
||||
paymentToken: body.paymentToken,
|
||||
customerData: {
|
||||
name: body.name,
|
||||
email: body.email
|
||||
}
|
||||
})
|
||||
|
||||
if (!paymentResult.success) {
|
||||
throw createError({
|
||||
statusCode: 400,
|
||||
statusMessage: paymentResult.message || 'Payment failed'
|
||||
})
|
||||
}
|
||||
|
||||
// Add registration with successful payment
|
||||
eventData.registrations.push({
|
||||
name: body.name,
|
||||
email: body.email.toLowerCase(),
|
||||
membershipLevel: 'non-member',
|
||||
isMember: false,
|
||||
paymentStatus: 'completed',
|
||||
paymentId: paymentResult.transactionId,
|
||||
amountPaid: eventData.pricing.publicPrice
|
||||
})
|
||||
|
||||
await eventData.save()
|
||||
|
||||
return {
|
||||
success: true,
|
||||
message: 'Payment successful and registered for event',
|
||||
paymentId: paymentResult.transactionId,
|
||||
registration: eventData.registrations[eventData.registrations.length - 1]
|
||||
}
|
||||
|
||||
} catch (error) {
|
||||
console.error('Error processing event payment:', error)
|
||||
|
||||
if (error.statusCode) {
|
||||
throw error
|
||||
}
|
||||
|
||||
throw createError({
|
||||
statusCode: 500,
|
||||
statusMessage: 'Failed to process payment and registration'
|
||||
})
|
||||
}
|
||||
})
|
||||
|
|
@ -32,7 +32,8 @@ export default defineEventHandler(async (event) => {
|
|||
}
|
||||
|
||||
eventData.tickets.waitlist.entries.splice(waitlistIndex, 1);
|
||||
await eventData.save();
|
||||
// Skip validators to avoid tripping on legacy location data unrelated to this write.
|
||||
await eventData.save({ validateBeforeSave: false });
|
||||
|
||||
return {
|
||||
success: true,
|
||||
|
|
|
|||
|
|
@ -87,7 +87,8 @@ export default defineEventHandler(async (event) => {
|
|||
notified: false,
|
||||
});
|
||||
|
||||
await eventData.save();
|
||||
// Skip validators to avoid tripping on legacy location data unrelated to this write.
|
||||
await eventData.save({ validateBeforeSave: false });
|
||||
|
||||
// Get position in waitlist
|
||||
const position = eventData.tickets.waitlist.entries.length;
|
||||
|
|
|
|||
|
|
@ -1,49 +1,117 @@
|
|||
// Create a Helcim customer
|
||||
// Public signup endpoint. Creates a Helcim customer + Member record and
|
||||
// dispatches a magic link for email verification. The full session cookie
|
||||
// is set when the user clicks the magic link (see /api/auth/verify); paid-tier
|
||||
// signups also receive a short-lived payment-bridge cookie so they can complete
|
||||
// Helcim checkout in the same tab without verifying email first.
|
||||
import { getRequestHeader, getRequestIP } from 'h3'
|
||||
import Member from '../../models/member.js'
|
||||
import { connectDB } from '../../utils/mongoose.js'
|
||||
import { createHelcimCustomer } from '../../utils/helcim.js'
|
||||
import { sendMagicLink } from '../../utils/magicLink.js'
|
||||
import { setPaymentBridgeCookie } from '../../utils/auth.js'
|
||||
import { rateLimit } from '../../utils/rateLimit.js'
|
||||
|
||||
export default defineEventHandler(async (event) => {
|
||||
try {
|
||||
// --- Origin check (CSRF defense in depth on top of SameSite=Lax) ---
|
||||
const origin = getRequestHeader(event, 'origin')
|
||||
const allowed = process.env.BASE_URL
|
||||
if (!origin || (allowed && origin !== allowed)) {
|
||||
throw createError({ statusCode: 403, statusMessage: 'Invalid origin' })
|
||||
}
|
||||
|
||||
// --- Per-IP rate limit (5 / hour) ---
|
||||
const ip = getRequestIP(event, { xForwardedFor: true }) || 'unknown'
|
||||
if (!rateLimit(`signup:ip:${ip}`, { max: 5, windowMs: 3600_000 })) {
|
||||
throw createError({ statusCode: 429, statusMessage: 'Too many signup attempts' })
|
||||
}
|
||||
|
||||
await connectDB()
|
||||
const body = await validateBody(event, helcimCustomerSchema)
|
||||
|
||||
// Check if member already exists
|
||||
const existingMember = await Member.findOne({ email: body.email })
|
||||
if (existingMember) {
|
||||
// --- Per-email rate limit (3 / hour) ---
|
||||
if (!rateLimit(`signup:email:${body.email}`, { max: 3, windowMs: 3600_000 })) {
|
||||
throw createError({
|
||||
statusCode: 429,
|
||||
statusMessage: 'Too many signup attempts for this email'
|
||||
})
|
||||
}
|
||||
|
||||
// Check if member already exists. Lowercase the lookup so guest docs
|
||||
// created via the public ticket-purchase path (which lowercases on insert)
|
||||
// are actually found by mixed-case submissions.
|
||||
const normalizedEmail = body.email.toLowerCase()
|
||||
const existingMember = await Member.findOne({ email: normalizedEmail })
|
||||
if (existingMember && existingMember.status !== 'guest') {
|
||||
throw createError({
|
||||
statusCode: 409,
|
||||
statusMessage: 'A member with this email already exists'
|
||||
})
|
||||
}
|
||||
|
||||
// Create customer in Helcim
|
||||
// Create customer in Helcim (guest docs have no helcimCustomerId yet).
|
||||
const customerData = await createHelcimCustomer({
|
||||
customerType: 'PERSON',
|
||||
contactName: body.name,
|
||||
email: body.email
|
||||
})
|
||||
|
||||
// Create member in database
|
||||
const member = await Member.create({
|
||||
email: body.email,
|
||||
name: body.name,
|
||||
circle: body.circle,
|
||||
contributionAmount: body.contributionAmount,
|
||||
helcimCustomerId: customerData.id,
|
||||
status: 'pending_payment',
|
||||
agreement: { acceptedAt: new Date() }
|
||||
// If the lookup matched a guest doc, upgrade in place to preserve _id,
|
||||
// memberNumber (if any), emailHistory, and the event-registration
|
||||
// references that point at this _id. Use findByIdAndUpdate with
|
||||
// runValidators:false per the project's member-save-risks pattern.
|
||||
let member
|
||||
if (existingMember) {
|
||||
member = await Member.findByIdAndUpdate(
|
||||
existingMember._id,
|
||||
{
|
||||
$set: {
|
||||
name: body.name,
|
||||
circle: body.circle,
|
||||
contributionAmount: body.contributionAmount,
|
||||
helcimCustomerId: customerData.id,
|
||||
status: 'pending_payment',
|
||||
'agreement.acceptedAt': new Date()
|
||||
}
|
||||
},
|
||||
{ new: true, runValidators: false }
|
||||
)
|
||||
} else {
|
||||
member = await Member.create({
|
||||
email: normalizedEmail,
|
||||
name: body.name,
|
||||
circle: body.circle,
|
||||
contributionAmount: body.contributionAmount,
|
||||
helcimCustomerId: customerData.id,
|
||||
status: 'pending_payment',
|
||||
agreement: { acceptedAt: new Date() }
|
||||
})
|
||||
}
|
||||
|
||||
// Issue a magic link instead of an immediate session — the auth-token
|
||||
// cookie is set when the user clicks through, proving email ownership.
|
||||
// Use the normalized email so guest upgrades (which may not project
|
||||
// the email field back) still get a magic link.
|
||||
await sendMagicLink(normalizedEmail, {
|
||||
subject: 'Verify your Ghost Guild signup',
|
||||
intro: 'Verify your email to finish your Ghost Guild signup:'
|
||||
})
|
||||
|
||||
setAuthCookie(event, member)
|
||||
// Paid-tier signups need to complete Helcim checkout in the same tab
|
||||
// before the magic link can be clicked. Issue a short-lived, payment-only
|
||||
// bridge cookie so /api/helcim/initialize-payment accepts the request.
|
||||
if (body.contributionAmount > 0) {
|
||||
setPaymentBridgeCookie(event, member)
|
||||
}
|
||||
|
||||
return {
|
||||
success: true,
|
||||
customerId: customerData.id,
|
||||
customerCode: customerData.customerCode,
|
||||
verificationEmailSent: true,
|
||||
member: {
|
||||
id: member._id,
|
||||
email: member.email,
|
||||
email: normalizedEmail,
|
||||
name: member.name,
|
||||
circle: member.circle,
|
||||
contributionAmount: member.contributionAmount,
|
||||
|
|
|
|||
|
|
@ -1,23 +1,84 @@
|
|||
// Initialize HelcimPay.js session
|
||||
import { requireAuth } from '../../utils/auth.js'
|
||||
import Member from '../../models/member.js'
|
||||
import Series from '../../models/series.js'
|
||||
import { loadPublicEvent } from '../../utils/loadEvent.js'
|
||||
import { calculateTicketPrice, calculateSeriesTicketPrice, hasMemberAccess } from '../../utils/tickets.js'
|
||||
import { requireAuth, getOptionalMember, getPaymentBridgeMember } from '../../utils/auth.js'
|
||||
import { initializeHelcimPaySession } from '../../utils/helcim.js'
|
||||
|
||||
export default defineEventHandler(async (event) => {
|
||||
try {
|
||||
const body = await validateBody(event, helcimInitializePaymentSchema)
|
||||
const metaType = body.metadata?.type
|
||||
|
||||
// Event ticket purchases can be made without authentication
|
||||
const isEventTicket = body.metadata?.type === 'event_ticket'
|
||||
if (!isEventTicket) {
|
||||
await requireAuth(event)
|
||||
const isEventTicket = metaType === 'event_ticket'
|
||||
const isSeriesTicket = metaType === 'series_ticket'
|
||||
const isTicket = isEventTicket || isSeriesTicket
|
||||
// Membership signup uses a short-lived payment-bridge cookie (set by
|
||||
// /api/helcim/customer) so the user can complete checkout before clicking
|
||||
// their email-verification magic link.
|
||||
const isMembershipSignup = metaType === 'membership_signup'
|
||||
|
||||
if (!isTicket) {
|
||||
if (isMembershipSignup) {
|
||||
const bridgeMember = await getPaymentBridgeMember(event)
|
||||
if (!bridgeMember) {
|
||||
await requireAuth(event)
|
||||
}
|
||||
} else {
|
||||
await requireAuth(event)
|
||||
}
|
||||
}
|
||||
|
||||
const amount = body.amount || 0
|
||||
let amount = 0
|
||||
let description = body.metadata?.eventTitle
|
||||
|
||||
// For event tickets with amount > 0, we do a purchase
|
||||
// For subscriptions or card verification, we do verify
|
||||
const paymentType = isEventTicket && amount > 0 ? 'purchase' : 'verify'
|
||||
if (isTicket) {
|
||||
// Re-derive price server-side; never trust body.amount for ticket flows.
|
||||
const caller = await getOptionalMember(event).catch(() => null)
|
||||
const lookupEmail = body.metadata?.email?.toLowerCase()
|
||||
const member = caller || (lookupEmail
|
||||
? await Member.findOne({ email: lookupEmail })
|
||||
: null)
|
||||
const accessMember = hasMemberAccess(member) ? member : null
|
||||
|
||||
if (isEventTicket) {
|
||||
const eventId = body.metadata?.eventId
|
||||
if (!eventId) {
|
||||
throw createError({ statusCode: 400, statusMessage: 'metadata.eventId is required for event_ticket' })
|
||||
}
|
||||
const eventDoc = await loadPublicEvent(event, eventId)
|
||||
const ticketInfo = calculateTicketPrice(eventDoc, accessMember)
|
||||
if (!ticketInfo) {
|
||||
throw createError({ statusCode: 403, statusMessage: 'No tickets available for your membership status' })
|
||||
}
|
||||
amount = ticketInfo.price
|
||||
description = description || eventDoc.title
|
||||
} else {
|
||||
const seriesId = body.metadata?.seriesId
|
||||
if (!seriesId) {
|
||||
throw createError({ statusCode: 400, statusMessage: 'metadata.seriesId is required for series_ticket' })
|
||||
}
|
||||
const isObjectId = /^[0-9a-fA-F]{24}$/.test(seriesId)
|
||||
const seriesQuery = isObjectId
|
||||
? { $or: [{ _id: seriesId }, { id: seriesId }, { slug: seriesId }] }
|
||||
: { $or: [{ id: seriesId }, { slug: seriesId }] }
|
||||
const series = await Series.findOne(seriesQuery)
|
||||
if (!series) {
|
||||
throw createError({ statusCode: 404, statusMessage: 'Series not found' })
|
||||
}
|
||||
const ticketInfo = calculateSeriesTicketPrice(series, accessMember)
|
||||
if (!ticketInfo) {
|
||||
throw createError({ statusCode: 403, statusMessage: 'No series passes available for your membership status' })
|
||||
}
|
||||
amount = ticketInfo.price
|
||||
description = description || series.title
|
||||
}
|
||||
} else {
|
||||
amount = body.amount || 0
|
||||
}
|
||||
|
||||
const paymentType = isTicket && amount > 0 ? 'purchase' : 'verify'
|
||||
const requestBody = {
|
||||
paymentType,
|
||||
amount: paymentType === 'purchase' ? amount : 0,
|
||||
|
|
@ -25,20 +86,15 @@ export default defineEventHandler(async (event) => {
|
|||
paymentMethod: 'cc'
|
||||
}
|
||||
|
||||
// For subscription setup (verify mode), include customer code if provided
|
||||
// For one-time purchases (event tickets), don't include customer code
|
||||
// as the customer may not exist in Helcim yet
|
||||
if (body.customerCode && paymentType === 'verify') {
|
||||
requestBody.customerCode = body.customerCode
|
||||
}
|
||||
|
||||
// Add product/event information for better display in Helcim modal
|
||||
if (body.metadata?.eventTitle) {
|
||||
// Some Helcim accounts don't support invoice numbers in initialization
|
||||
// Try multiple fields that might display in the modal
|
||||
requestBody.description = body.metadata.eventTitle
|
||||
requestBody.notes = body.metadata.eventTitle
|
||||
requestBody.orderNumber = `${body.metadata.eventId}`
|
||||
if (description) {
|
||||
requestBody.description = description
|
||||
requestBody.notes = description
|
||||
const orderId = body.metadata?.eventId || body.metadata?.seriesId
|
||||
if (orderId) requestBody.orderNumber = `${orderId}`
|
||||
}
|
||||
|
||||
const paymentData = await initializeHelcimPaySession(requestBody)
|
||||
|
|
@ -46,7 +102,9 @@ export default defineEventHandler(async (event) => {
|
|||
return {
|
||||
success: true,
|
||||
checkoutToken: paymentData.checkoutToken,
|
||||
secretToken: paymentData.secretToken
|
||||
secretToken: paymentData.secretToken,
|
||||
// Echo derived amount so the client can sanity-check before opening modal.
|
||||
amount
|
||||
}
|
||||
} catch (error) {
|
||||
if (error.statusCode) throw error
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@ import { getHelcimPlanId, requiresPayment } from '../../config/contributions.js'
|
|||
import Member from '../../models/member.js'
|
||||
import { connectDB } from '../../utils/mongoose.js'
|
||||
import { getSlackService } from '../../utils/slack.ts'
|
||||
import { requireAuth } from '../../utils/auth.js'
|
||||
import { requireAuth, getPaymentBridgeMember } from '../../utils/auth.js'
|
||||
import { createHelcimSubscription, generateIdempotencyKey, listHelcimCustomerTransactions } from '../../utils/helcim.js'
|
||||
import { sendWelcomeEmail } from '../../utils/resend.js'
|
||||
import { upsertPaymentFromHelcim } from '../../utils/payments.js'
|
||||
|
|
@ -81,7 +81,12 @@ async function inviteToSlack(member) {
|
|||
|
||||
export default defineEventHandler(async (event) => {
|
||||
try {
|
||||
await requireAuth(event)
|
||||
// Membership signup completes subscription before email verify; allow the
|
||||
// payment-bridge cookie set by /api/helcim/customer to satisfy auth here.
|
||||
const bridgeMember = await getPaymentBridgeMember(event)
|
||||
if (!bridgeMember) {
|
||||
await requireAuth(event)
|
||||
}
|
||||
await connectDB()
|
||||
const body = await validateBody(event, helcimSubscriptionSchema)
|
||||
|
||||
|
|
|
|||
116
server/api/internal/reconcile-payments.post.js
Normal file
116
server/api/internal/reconcile-payments.post.js
Normal file
|
|
@ -0,0 +1,116 @@
|
|||
/**
|
||||
* Reconciliation cron route — invoked by `netlify/functions/reconcile-payments.mjs`
|
||||
* on a daily schedule. Mirrors the loop in `scripts/reconcile-helcim-payments.mjs`
|
||||
* but lives inside Nitro so it can use auto-imported utils + the runtime config.
|
||||
*
|
||||
* Auth: shared-secret header `X-Reconcile-Token` matched against
|
||||
* `runtimeConfig.reconcileToken` (env: NUXT_RECONCILE_TOKEN). Machine-to-machine
|
||||
* only — no user session involved.
|
||||
*
|
||||
* Behavior:
|
||||
* - For every Member with a helcimCustomerId, list Helcim transactions and
|
||||
* upsert Payment docs (idempotent via `helcimTransactionId` unique index).
|
||||
* - Transient Helcim API errors are retried up to 3 times with exponential
|
||||
* backoff (250ms / 500ms / 1000ms). On final failure the member is counted
|
||||
* as `memberErrors` and the loop continues.
|
||||
* - Never passes `sendConfirmation: true` — the cron back-fills history and
|
||||
* must not re-send confirmation emails.
|
||||
* - `?apply=false` switches to dry-run: counts what WOULD be created via
|
||||
* Payment.findOne, no writes.
|
||||
*
|
||||
* Returns a JSON summary; logs `[reconcile] done <summary>` to stdout.
|
||||
*/
|
||||
import Member from '../../models/member.js'
|
||||
import Payment from '../../models/payment.js'
|
||||
import { listHelcimCustomerTransactions } from '../../utils/helcim.js'
|
||||
import { upsertPaymentFromHelcim } from '../../utils/payments.js'
|
||||
|
||||
const RETRY_ATTEMPTS = 3
|
||||
const BASE_DELAY_MS = 250
|
||||
|
||||
function sleep(ms) {
|
||||
return new Promise((resolve) => setTimeout(resolve, ms))
|
||||
}
|
||||
|
||||
async function listTransactionsWithRetry(customerCode) {
|
||||
let lastErr
|
||||
for (let attempt = 1; attempt <= RETRY_ATTEMPTS; attempt++) {
|
||||
try {
|
||||
return await listHelcimCustomerTransactions(customerCode)
|
||||
} catch (err) {
|
||||
lastErr = err
|
||||
if (attempt < RETRY_ATTEMPTS) {
|
||||
await sleep(BASE_DELAY_MS * 2 ** (attempt - 1))
|
||||
}
|
||||
}
|
||||
}
|
||||
throw lastErr
|
||||
}
|
||||
|
||||
export default defineEventHandler(async (event) => {
|
||||
const config = useRuntimeConfig()
|
||||
const expected = config.reconcileToken
|
||||
const provided = getHeader(event, 'x-reconcile-token')
|
||||
if (!expected || provided !== expected) {
|
||||
throw createError({ statusCode: 401, statusMessage: 'Unauthorized' })
|
||||
}
|
||||
|
||||
const apply = getQuery(event).apply !== 'false'
|
||||
|
||||
const members = await Member.find(
|
||||
{ helcimCustomerId: { $exists: true, $ne: null } },
|
||||
{ _id: 1, email: 1, name: 1, helcimCustomerId: 1, helcimSubscriptionId: 1, billingCadence: 1 }
|
||||
).lean()
|
||||
|
||||
let txExamined = 0
|
||||
let created = 0
|
||||
let existed = 0
|
||||
let skipped = 0
|
||||
let memberErrors = 0
|
||||
|
||||
for (const member of members) {
|
||||
let txs
|
||||
try {
|
||||
txs = await listTransactionsWithRetry(member.helcimCustomerId)
|
||||
} catch (err) {
|
||||
memberErrors++
|
||||
console.error(`[reconcile] member=${member._id}: ${err?.message || err}`)
|
||||
continue
|
||||
}
|
||||
|
||||
for (const tx of txs) {
|
||||
txExamined++
|
||||
if (tx.status === 'other') {
|
||||
skipped++
|
||||
continue
|
||||
}
|
||||
|
||||
if (!apply) {
|
||||
const existing = await Payment.findOne({ helcimTransactionId: tx.id })
|
||||
if (existing) existed++
|
||||
else created++
|
||||
continue
|
||||
}
|
||||
|
||||
// Note: deliberately NOT passing sendConfirmation — cron back-fills must
|
||||
// not re-send confirmation emails for transactions the member has already
|
||||
// been notified about (or that pre-date Mongo Payment tracking entirely).
|
||||
const result = await upsertPaymentFromHelcim(member, tx)
|
||||
if (result.created) created++
|
||||
else if (result.payment) existed++
|
||||
else skipped++
|
||||
}
|
||||
}
|
||||
|
||||
const summary = {
|
||||
membersScanned: members.length,
|
||||
txExamined,
|
||||
created,
|
||||
existed,
|
||||
skipped,
|
||||
memberErrors,
|
||||
apply
|
||||
}
|
||||
console.log('[reconcile] done', summary)
|
||||
return summary
|
||||
})
|
||||
|
|
@ -23,16 +23,17 @@ export default defineEventHandler(async (event) => {
|
|||
// Continue anyway - we'll update the member record
|
||||
}
|
||||
|
||||
// Update member status — pending_payment (not cancelled) so member can re-subscribe
|
||||
// Update member: drop to free tier (status stays 'active' — they're still a member)
|
||||
await Member.findByIdAndUpdate(
|
||||
member._id,
|
||||
{
|
||||
$set: {
|
||||
status: 'pending_payment',
|
||||
status: 'active',
|
||||
contributionAmount: 0,
|
||||
helcimSubscriptionId: null,
|
||||
paymentMethod: 'none',
|
||||
subscriptionEndDate: new Date(),
|
||||
lastCancelledAt: new Date(),
|
||||
},
|
||||
$unset: { nextBillingDate: 1 },
|
||||
},
|
||||
|
|
@ -46,7 +47,7 @@ export default defineEventHandler(async (event) => {
|
|||
return {
|
||||
success: true,
|
||||
message: "Subscription cancelled successfully",
|
||||
status: 'pending_payment',
|
||||
status: 'active',
|
||||
contributionAmount: 0,
|
||||
};
|
||||
} catch (error) {
|
||||
|
|
|
|||
|
|
@ -38,6 +38,7 @@ export default defineEventHandler(async (event) => {
|
|||
// Only members with access (active or pending_payment) get member-tier
|
||||
// pricing; guest, suspended, and cancelled are treated as non-members.
|
||||
let member = null;
|
||||
let accountCreated = false;
|
||||
try {
|
||||
member = await requireAuth(event);
|
||||
} catch {
|
||||
|
|
@ -83,6 +84,29 @@ export default defineEventHandler(async (event) => {
|
|||
});
|
||||
}
|
||||
|
||||
// If no Member yet, atomically create a guest Member. Series passes grant
|
||||
// access to a bundle of events over time — a buyer without an account
|
||||
// can't view their registrations or be recognized by per-event pages,
|
||||
// so we always create the guest (unlike single-event tickets which are
|
||||
// opt-in). findOneAndUpdate with $setOnInsert handles concurrent
|
||||
// registrations on the same email (email has a unique index).
|
||||
if (!member) {
|
||||
member = await Member.findOneAndUpdate(
|
||||
{ email: canonicalEmail },
|
||||
{
|
||||
$setOnInsert: {
|
||||
email: canonicalEmail,
|
||||
name,
|
||||
circle: "community",
|
||||
contributionAmount: 0,
|
||||
status: "guest",
|
||||
},
|
||||
},
|
||||
{ upsert: true, new: true, setDefaultsOnInsert: true }
|
||||
);
|
||||
accountCreated = true;
|
||||
}
|
||||
|
||||
// Create series registration
|
||||
const registration = {
|
||||
memberId: member?._id,
|
||||
|
|
@ -102,6 +126,17 @@ export default defineEventHandler(async (event) => {
|
|||
series.registrations.push(registration);
|
||||
await completeSeriesTicketPurchase(series, ticketInfo.ticketType);
|
||||
|
||||
// Decide on auto-login: safe for new accounts and existing guests, not for
|
||||
// real members (stranger could hijack by typing email into a public form).
|
||||
let signedIn = false;
|
||||
let requiresSignIn = false;
|
||||
if (member && (accountCreated || member.status === "guest")) {
|
||||
setAuthCookie(event, member);
|
||||
signedIn = true;
|
||||
} else if (member) {
|
||||
requiresSignIn = true;
|
||||
}
|
||||
|
||||
// Get the newly created registration
|
||||
const newRegistration =
|
||||
series.registrations[series.registrations.length - 1];
|
||||
|
|
@ -172,6 +207,9 @@ export default defineEventHandler(async (event) => {
|
|||
success: r.success,
|
||||
reason: r.reason,
|
||||
})),
|
||||
accountCreated,
|
||||
signedIn,
|
||||
requiresSignIn,
|
||||
};
|
||||
} catch (error) {
|
||||
console.error("Error purchasing series pass:", error);
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue