Skip to content

Commit 63c9412

Browse files
committed
Rename
1 parent 81a174f commit 63c9412

File tree

8 files changed

+31
-27
lines changed

8 files changed

+31
-27
lines changed

packages/twenty-server/src/engine/core-modules/admin-panel/admin-panel.service.ts

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -66,18 +66,18 @@ export class AdminPanelService {
6666
),
6767
);
6868

69-
const analytics = this.auditService.createContext({
69+
const auditService = this.auditService.createContext({
7070
workspaceId: user.userWorkspaces[0].workspace.id,
7171
userId: impersonatorUserId,
7272
});
7373

74-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
74+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
7575
eventName: 'server.impersonation.attempt',
7676
message: `Impersonation attempt: targetUserId=${userId}, workspaceId=${workspaceId}, impersonatorUserId=${impersonatorUserId}`,
7777
});
7878

7979
try {
80-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
80+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
8181
eventName: 'server.impersonation.login_token_attempt',
8282
message: `Impersonation token generation attempt for user ${userId}`,
8383
});
@@ -91,7 +91,7 @@ export class AdminPanelService {
9191
},
9292
);
9393

94-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
94+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
9595
eventName: 'server.impersonation.login_token_generated',
9696
message: `Impersonation token generated successfully for user ${userId}`,
9797
});
@@ -106,7 +106,7 @@ export class AdminPanelService {
106106
loginToken,
107107
};
108108
} catch {
109-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
109+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
110110
eventName: 'server.impersonation.login_token_failed',
111111
message: `Impersonation token generation failed for targetUserId=${userId}`,
112112
});

packages/twenty-server/src/engine/core-modules/audit/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,23 +23,23 @@ export class MyService {
2323

2424
async doSomething() {
2525
// Create an analytics context
26-
const analytics = this.auditService.createContext({
26+
const auditService = this.auditService.createContext({
2727
workspaceId: 'workspace-id',
2828
userId: 'user-id',
2929
});
3030

3131
// Track a workspace event
32-
analytics.insertWorkspaceEvent(CUSTOM_DOMAIN_ACTIVATED_EVENT, {});
32+
auditService.insertWorkspaceEvent(CUSTOM_DOMAIN_ACTIVATED_EVENT, {});
3333

3434
// Track an object event
35-
analytics.createObjectEvent(OBJECT_RECORD_CREATED_EVENT, {
35+
auditService.createObjectEvent(OBJECT_RECORD_CREATED_EVENT, {
3636
recordId: 'record-id',
3737
objectMetadataId: 'object-metadata-id',
3838
// other properties
3939
});
4040

4141
// Track a pageview
42-
analytics.createPageviewEvent('page-name', {
42+
auditService.createPageviewEvent('page-name', {
4343
href: '/path',
4444
locale: 'en-US',
4545
// other properties

packages/twenty-server/src/engine/core-modules/audit/jobs/create-audit-log-from-internal-event.ts

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,26 +26,26 @@ export class CreateAuditLogFromInternalEvent {
2626
}
2727
: eventData.properties;
2828

29-
const analytics = this.auditService.createContext({
29+
const auditService = this.auditService.createContext({
3030
workspaceId: workspaceEventBatch.workspaceId,
3131
userId: eventData.userId,
3232
});
3333

3434
// Since these are object record events, we use createObjectEvent
3535
if (workspaceEventBatch.name.endsWith('.updated')) {
36-
analytics.createObjectEvent(OBJECT_RECORD_UPDATED_EVENT, {
36+
auditService.createObjectEvent(OBJECT_RECORD_UPDATED_EVENT, {
3737
...eventProperties,
3838
recordId: eventData.recordId,
3939
objectMetadataId: eventData.objectMetadata.id,
4040
});
4141
} else if (workspaceEventBatch.name.endsWith('.created')) {
42-
analytics.createObjectEvent(OBJECT_RECORD_CREATED_EVENT, {
42+
auditService.createObjectEvent(OBJECT_RECORD_CREATED_EVENT, {
4343
...eventProperties,
4444
recordId: eventData.recordId,
4545
objectMetadataId: eventData.objectMetadata.id,
4646
});
4747
} else if (workspaceEventBatch.name.endsWith('.deleted')) {
48-
analytics.createObjectEvent(OBJECT_RECORD_DELETED_EVENT, {
48+
auditService.createObjectEvent(OBJECT_RECORD_DELETED_EVENT, {
4949
...eventProperties,
5050
recordId: eventData.recordId,
5151
objectMetadataId: eventData.objectMetadata.id,

packages/twenty-server/src/engine/core-modules/auth/auth.resolver.ts

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -641,12 +641,12 @@ export class AuthResolver {
641641
): Promise<void> {
642642
const { impersonatorUserId } = tokenPayload;
643643

644-
const analytics = this.auditService.createContext({
644+
const auditService = this.auditService.createContext({
645645
workspaceId: workspace.id,
646646
userId: impersonatorUserId,
647647
});
648648

649-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
649+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
650650
eventName: 'server.impersonation.token_exchange_attempt',
651651
message: `Impersonation token exchange attempt for ${targetUserEmail} by ${impersonatorUserId}`,
652652
});
@@ -659,7 +659,7 @@ export class AuthResolver {
659659
}
660660

661661
if (!impersonatorUserId) {
662-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
662+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
663663
eventName: 'server.impersonation.token_exchange_failed',
664664
message: `Invalid impersonation token (missing impersonator user ID) for ${targetUserEmail}`,
665665
});
@@ -674,7 +674,7 @@ export class AuthResolver {
674674
});
675675

676676
if (!impersonatorUser) {
677-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
677+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
678678
eventName: 'server.impersonation.token_exchange_failed',
679679
message: `Impersonator user not found: ${impersonatorUserId} for ${targetUserEmail}`,
680680
});
@@ -685,7 +685,7 @@ export class AuthResolver {
685685
}
686686

687687
if (impersonatorUser.canImpersonate !== true) {
688-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
688+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
689689
eventName: 'server.impersonation.token_exchange_failed',
690690
message: `User not authorized to impersonate: ${impersonatorUserId} for ${targetUserEmail}`,
691691
});
@@ -702,12 +702,12 @@ export class AuthResolver {
702702
workspaceId: string,
703703
impersonatorUserId: string,
704704
): Promise<void> {
705-
const analytics = this.auditService.createContext({
705+
const auditService = this.auditService.createContext({
706706
workspaceId,
707707
userId: impersonatorUserId,
708708
});
709709

710-
await analytics.insertWorkspaceEvent(MONITORING_EVENT, {
710+
await auditService.insertWorkspaceEvent(MONITORING_EVENT, {
711711
eventName: 'server.impersonation.login_token_exchanged',
712712
message: 'Impersonation token exchanged',
713713
});

packages/twenty-server/src/engine/core-modules/auth/token/services/renew-token.service.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ export class RenewTokenService {
5959
targetedTokenTypeFromPayload ?? JwtTokenTypeEnum.ACCESS;
6060

6161
// Support legacy tokens where authProvider might be undefined
62+
// TODO: remove in November 2025
6263
const resolvedAuthProvider = authProvider ?? AuthProviderEnum.Password;
6364

6465
const accessToken =

packages/twenty-server/src/engine/core-modules/domain-manager/controllers/cloudflare.controller.ts

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ export class CloudflareController {
7171

7272
if (!workspace) return;
7373

74-
const analytics = this.auditService.createContext({
74+
const auditService = this.auditService.createContext({
7575
workspaceId: workspace.id,
7676
});
7777

@@ -100,7 +100,10 @@ export class CloudflareController {
100100
...workspaceUpdated,
101101
});
102102

103-
await analytics.insertWorkspaceEvent(CUSTOM_DOMAIN_ACTIVATED_EVENT, {});
103+
await auditService.insertWorkspaceEvent(
104+
CUSTOM_DOMAIN_ACTIVATED_EVENT,
105+
{},
106+
);
104107
}
105108

106109
return res.status(200).send();

packages/twenty-server/src/engine/core-modules/domain-manager/services/custom-domain.service.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -199,11 +199,11 @@ export class CustomDomainService {
199199

200200
await this.workspaceRepository.save(workspace);
201201

202-
const analytics = this.auditService.createContext({
202+
const auditService = this.auditService.createContext({
203203
workspaceId: workspace.id,
204204
});
205205

206-
analytics.insertWorkspaceEvent(
206+
auditService.insertWorkspaceEvent(
207207
workspace.isCustomDomainEnabled
208208
? CUSTOM_DOMAIN_ACTIVATED_EVENT
209209
: CUSTOM_DOMAIN_DEACTIVATED_EVENT,

packages/twenty-server/src/engine/core-modules/webhook/jobs/call-webhook.job.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ export class CallWebhookJob {
4848
webhookId: data.webhookId,
4949
eventName: data.eventName,
5050
};
51-
const analytics = this.auditService.createContext({
51+
const auditService = this.auditService.createContext({
5252
workspaceId: data.workspaceId,
5353
});
5454

@@ -79,13 +79,13 @@ export class CallWebhookJob {
7979

8080
const success = response.status >= 200 && response.status < 300;
8181

82-
analytics.insertWorkspaceEvent(WEBHOOK_RESPONSE_EVENT, {
82+
auditService.insertWorkspaceEvent(WEBHOOK_RESPONSE_EVENT, {
8383
status: response.status,
8484
success,
8585
...commonPayload,
8686
});
8787
} catch (err) {
88-
analytics.insertWorkspaceEvent(WEBHOOK_RESPONSE_EVENT, {
88+
auditService.insertWorkspaceEvent(WEBHOOK_RESPONSE_EVENT, {
8989
success: false,
9090
...commonPayload,
9191
...(err.response && { status: err.response.status }),

0 commit comments

Comments
 (0)