Fix jwt-token

This commit is contained in:
2025-09-22 10:04:18 +02:00
parent 90f2c8fefb
commit c175173772

View File

@@ -464,19 +464,22 @@ class AlertService {
try {
switch (channel) {
case 'sms':
if (rule.alert_channels.includes('sms') && rule.sms_phone_number) {
// For critical threats, force SMS even if not in rule channels, otherwise check rule configuration
if ((threatAssessment.level === 'critical' || rule.alert_channels.includes('sms')) && rule.sms_phone_number) {
alertLog = await this.sendSMSAlert(rule.sms_phone_number, message, rule, detection, threatAssessment, alertEventId);
}
break;
case 'email':
if (rule.alert_channels.includes('email') && (rule.email || user.email)) {
// For critical threats, force email even if not in rule channels, otherwise check rule configuration
if ((threatAssessment.level === 'critical' || rule.alert_channels.includes('email')) && (rule.email || user.email)) {
alertLog = await this.sendEmailAlert(rule.email || user.email, message, rule, detection, threatAssessment, alertEventId);
}
break;
case 'webhook':
if (rule.alert_channels.includes('webhook') && rule.webhook_url) {
// For critical threats, force webhook even if not in rule channels, otherwise check rule configuration
if ((threatAssessment.level === 'critical' || rule.alert_channels.includes('webhook')) && rule.webhook_url) {
alertLog = await this.sendWebhookAlert(rule.webhook_url, detection, device, rule, threatAssessment, alertEventId);
}
break;