From f95e1461c0103ba3ed73a56d4152b3e352639542 Mon Sep 17 00:00:00 2001 From: Alex Date: Wed, 26 Mar 2025 15:48:04 +0300 Subject: [PATCH] =?UTF-8?q?=D0=B2=D0=B0=D1=88=D0=B5=20=D1=81=D0=BE=D0=BE?= =?UTF-8?q?=D0=B1=D1=89=D0=B5=D0=BD=D0=B8=D0=B5=20=D0=BA=D0=BE=D0=BC=D0=BC?= =?UTF-8?q?=D0=B8=D1=82=D0=B0?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- backend/app.js | 18 +++++++++++++++++- backend/db/migrations/010_cleanup_roles.sql | 4 ++-- 2 files changed, 19 insertions(+), 3 deletions(-) diff --git a/backend/app.js b/backend/app.js index 26b67bd..2c7820f 100644 --- a/backend/app.js +++ b/backend/app.js @@ -128,7 +128,23 @@ app.use('/api/admin', adminRoutes); const nonceStore = new Map(); // или любая другая реализация хранилища nonce -console.log('SESSION_SECRET:', process.env.SESSION_SECRET); +// Значение для маскирования чувствительных данных +const redactedValue = '***********'; + +// Логируем переменные окружения для отладки +console.log('NODE_ENV:', process.env.NODE_ENV); +console.log('PORT:', process.env.PORT); +console.log('POSTGRES_HOST:', process.env.POSTGRES_HOST); +console.log('POSTGRES_PORT:', process.env.POSTGRES_PORT); +console.log('POSTGRES_DB:', process.env.POSTGRES_DB); +console.log('POSTGRES_USER:', redactedValue); +console.log('POSTGRES_PASSWORD:', redactedValue); +console.log('TELEGRAM_BOT_TOKEN:', redactedValue); +console.log('TELEGRAM_BOT_USERNAME:', process.env.TELEGRAM_BOT_USERNAME); +console.log('OPENAI_API_KEY:', redactedValue); +// console.log('SESSION_SECRET:', process.env.SESSION_SECRET); // Убираем вывод секретного ключа +console.log('EMAIL_USER:', process.env.EMAIL_USER); +console.log('EMAIL_PASSWORD:', redactedValue); // Добавляем обработчик ошибок последним app.use(errorHandler); diff --git a/backend/db/migrations/010_cleanup_roles.sql b/backend/db/migrations/010_cleanup_roles.sql index 5e6caac..65dd674 100644 --- a/backend/db/migrations/010_cleanup_roles.sql +++ b/backend/db/migrations/010_cleanup_roles.sql @@ -27,10 +27,10 @@ DROP TRIGGER IF EXISTS user_identity_role_check ON user_identities; DROP TRIGGER IF EXISTS check_admin_role_trigger ON user_identities; DROP FUNCTION IF EXISTS sync_identity_type() CASCADE; DROP FUNCTION IF EXISTS update_user_role() CASCADE; -DROP FUNCTION IF EXISTS check_admin_role(INTEGER) CASCADE; +DROP FUNCTION IF EXISTS check_admin_role() CASCADE; -- Создаем функцию проверки роли -CREATE FUNCTION check_admin_role() +CREATE OR REPLACE FUNCTION check_admin_role() RETURNS TRIGGER AS $$ DECLARE v_wallet_address VARCHAR;