@hedhog/admin 0.11.1 → 0.12.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/{hedhog.yaml → bkp.hedhog.yaml} +1012 -814
- package/dist/auth/consts/body.js +23 -23
- package/package.json +43 -43
- package/src/admin.module.ts +37 -37
- package/src/auth/auth.controller.ts +72 -72
- package/src/auth/auth.module.ts +39 -39
- package/src/auth/auth.service.spec.ts +196 -196
- package/src/auth/auth.service.ts +234 -234
- package/src/auth/consts/body.ts +26 -26
- package/src/auth/consts/subject.ts +1 -1
- package/src/auth/dto/forget.dto.ts +6 -6
- package/src/auth/dto/login.dto.ts +15 -15
- package/src/auth/dto/otp.dto.ts +11 -11
- package/src/auth/dto/reset.dto.ts +14 -14
- package/src/auth/enums/multifactor-type.enum.ts +4 -4
- package/src/auth/guards/auth.guard.ts +50 -50
- package/src/auth/types/user.type.ts +8 -8
- package/src/dto/delete.dto.ts +8 -8
- package/src/dto/update-ids.dto.ts +9 -9
- package/src/index.ts +20 -20
- package/src/menu/dto/create.dto.ts +25 -25
- package/src/menu/dto/order.dto.ts +8 -8
- package/src/menu/dto/update.dto.ts +19 -19
- package/src/menu/menu.controller.ts +105 -105
- package/src/menu/menu.module.ts +18 -18
- package/src/menu/menu.service.spec.ts +247 -247
- package/src/menu/menu.service.ts +263 -263
- package/src/role/dto/create.dto.ts +7 -7
- package/src/role/dto/update.dto.ts +4 -4
- package/src/role/guards/role.guard.ts +123 -123
- package/src/role/role.controller.ts +126 -126
- package/src/role/role.module.ts +28 -28
- package/src/role/role.service.spec.ts +417 -417
- package/src/role/role.service.ts +289 -289
- package/src/route/dto/create.dto.ts +13 -13
- package/src/route/dto/update.dto.ts +15 -15
- package/src/route/route.controller.ts +91 -91
- package/src/route/route.module.ts +18 -18
- package/src/route/route.service.spec.ts +300 -300
- package/src/route/route.service.ts +164 -164
- package/src/screen/dto/create.dto.ts +11 -11
- package/src/screen/dto/update.dto.ts +19 -19
- package/src/screen/screen.controller.ts +93 -93
- package/src/screen/screen.module.ts +18 -18
- package/src/screen/screen.service.spec.ts +298 -298
- package/src/screen/screen.service.ts +179 -179
- package/src/types/http-method.ts +8 -8
- package/src/user/constants/user.constants.ts +1 -1
- package/src/user/dto/create.dto.ts +24 -24
- package/src/user/dto/update.dto.ts +41 -41
- package/src/user/user.controller.ts +75 -75
- package/src/user/user.module.ts +18 -18
- package/src/user/user.service.spec.ts +294 -294
- package/src/user/user.service.ts +129 -129
@@ -1,196 +1,196 @@
|
|
1
|
-
import { MailService } from '@hedhog/mail';
|
2
|
-
import { PrismaService } from '@hedhog/prisma';
|
3
|
-
import { NotFoundException } from '@nestjs/common';
|
4
|
-
import { JwtService } from '@nestjs/jwt';
|
5
|
-
import { Test, TestingModule } from '@nestjs/testing';
|
6
|
-
import { compare } from 'bcrypt';
|
7
|
-
import { AuthService } from './auth.service';
|
8
|
-
|
9
|
-
jest.mock('bcrypt');
|
10
|
-
|
11
|
-
describe('AuthService', () => {
|
12
|
-
let authService: AuthService;
|
13
|
-
let prismaService: PrismaService;
|
14
|
-
let jwtService: JwtService;
|
15
|
-
let mailService: MailService;
|
16
|
-
|
17
|
-
beforeEach(async () => {
|
18
|
-
const module: TestingModule = await Test.createTestingModule({
|
19
|
-
providers: [
|
20
|
-
AuthService,
|
21
|
-
{
|
22
|
-
provide: PrismaService,
|
23
|
-
useValue: {
|
24
|
-
user: {
|
25
|
-
findFirst: jest.fn(),
|
26
|
-
update: jest.fn(),
|
27
|
-
findUnique: jest.fn(),
|
28
|
-
},
|
29
|
-
},
|
30
|
-
},
|
31
|
-
{
|
32
|
-
provide: JwtService,
|
33
|
-
useValue: {
|
34
|
-
sign: jest.fn(),
|
35
|
-
verifyAsync: jest.fn(),
|
36
|
-
decode: jest.fn(),
|
37
|
-
},
|
38
|
-
},
|
39
|
-
{
|
40
|
-
provide: MailService,
|
41
|
-
useValue: {
|
42
|
-
send: jest.fn(),
|
43
|
-
},
|
44
|
-
},
|
45
|
-
],
|
46
|
-
}).compile();
|
47
|
-
|
48
|
-
authService = module.get<AuthService>(AuthService);
|
49
|
-
prismaService = module.get<PrismaService>(PrismaService);
|
50
|
-
jwtService = module.get<JwtService>(JwtService);
|
51
|
-
mailService = module.get<MailService>(MailService);
|
52
|
-
});
|
53
|
-
|
54
|
-
it('should be defined', () => {
|
55
|
-
expect(authService).toBeDefined();
|
56
|
-
});
|
57
|
-
|
58
|
-
describe('loginWithEmailAndPassword', () => {
|
59
|
-
it('should throw NotFoundException if user is not found', async () => {
|
60
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
61
|
-
|
62
|
-
await expect(
|
63
|
-
authService.loginWithEmailAndPassword('test@example.com', 'password'),
|
64
|
-
).rejects.toThrow(NotFoundException);
|
65
|
-
});
|
66
|
-
|
67
|
-
it('should throw NotFoundException if password is invalid', async () => {
|
68
|
-
const mockUser = {
|
69
|
-
id: 1,
|
70
|
-
name: 'Test User',
|
71
|
-
email: 'test@example.com',
|
72
|
-
password: 'hashedpassword',
|
73
|
-
multifactor_id: null,
|
74
|
-
code: null,
|
75
|
-
created_at: new Date(),
|
76
|
-
updated_at: new Date(),
|
77
|
-
};
|
78
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
79
|
-
(compare as jest.Mock).mockResolvedValue(false);
|
80
|
-
|
81
|
-
await expect(
|
82
|
-
authService.loginWithEmailAndPassword('test@example.com', 'password'),
|
83
|
-
).rejects.toThrow(NotFoundException);
|
84
|
-
});
|
85
|
-
|
86
|
-
it('should return a token if login is successful', async () => {
|
87
|
-
const mockUser = {
|
88
|
-
id: 1,
|
89
|
-
name: 'Test User',
|
90
|
-
email: 'test@example.com',
|
91
|
-
password: 'hashedpassword',
|
92
|
-
multifactor_id: null,
|
93
|
-
code: null,
|
94
|
-
created_at: new Date(),
|
95
|
-
updated_at: new Date(),
|
96
|
-
};
|
97
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
98
|
-
(compare as jest.Mock).mockResolvedValue(true);
|
99
|
-
jest.spyOn(jwtService, 'sign').mockReturnValue('token');
|
100
|
-
|
101
|
-
const result = await authService.loginWithEmailAndPassword(
|
102
|
-
'test@example.com',
|
103
|
-
'password',
|
104
|
-
);
|
105
|
-
|
106
|
-
expect(result).toEqual({ token: 'token' });
|
107
|
-
});
|
108
|
-
});
|
109
|
-
|
110
|
-
describe('forget', () => {
|
111
|
-
it('should throw NotFoundException if user is not found', async () => {
|
112
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
113
|
-
|
114
|
-
await expect(
|
115
|
-
authService.forget({ email: 'test@example.com' }),
|
116
|
-
).rejects.toThrow(NotFoundException);
|
117
|
-
});
|
118
|
-
|
119
|
-
it('should update user with reset code and send email', async () => {
|
120
|
-
const mockUser = {
|
121
|
-
id: 1,
|
122
|
-
name: 'Test User',
|
123
|
-
email: 'test@example.com',
|
124
|
-
password: 'hashedpassword',
|
125
|
-
multifactor_id: null,
|
126
|
-
code: null,
|
127
|
-
created_at: new Date(),
|
128
|
-
updated_at: new Date(),
|
129
|
-
};
|
130
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
131
|
-
jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
|
132
|
-
jest
|
133
|
-
.spyOn(authService, 'generateRandomString')
|
134
|
-
.mockReturnValue('resetCode');
|
135
|
-
|
136
|
-
const result = await authService.forget({ email: 'test@example.com' });
|
137
|
-
|
138
|
-
expect(prismaService.user.update).toHaveBeenCalledWith({
|
139
|
-
where: { id: 1 },
|
140
|
-
data: { code: 'resetCode' },
|
141
|
-
});
|
142
|
-
expect(mailService.send).toHaveBeenCalledWith({
|
143
|
-
to: 'test@example.com',
|
144
|
-
subject: 'Reset password',
|
145
|
-
body: `Reset your password by clicking <a href="${process.env.FRONTEND_URL}/reset-password/resetCode">here</a>`,
|
146
|
-
});
|
147
|
-
expect(result).toEqual(true);
|
148
|
-
});
|
149
|
-
});
|
150
|
-
|
151
|
-
describe('otp', () => {
|
152
|
-
it('should throw NotFoundException if user with code is not found', async () => {
|
153
|
-
jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
|
154
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
155
|
-
|
156
|
-
await expect(
|
157
|
-
authService.otp({ token: 'token', code: 123456 }),
|
158
|
-
).rejects.toThrow(NotFoundException);
|
159
|
-
});
|
160
|
-
|
161
|
-
it('should return a token if otp is valid', async () => {
|
162
|
-
const mockUser = {
|
163
|
-
id: 1,
|
164
|
-
name: 'Test User',
|
165
|
-
email: 'test@example.com',
|
166
|
-
password: 'hashedpassword',
|
167
|
-
multifactor_id: null,
|
168
|
-
code: null,
|
169
|
-
created_at: new Date(),
|
170
|
-
updated_at: new Date(),
|
171
|
-
};
|
172
|
-
jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
|
173
|
-
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
174
|
-
jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
|
175
|
-
jest.spyOn(jwtService, 'sign').mockReturnValue('newToken');
|
176
|
-
|
177
|
-
const result = await authService.otp({ token: 'token', code: 123456 });
|
178
|
-
|
179
|
-
expect(prismaService.user.update).toHaveBeenCalledWith({
|
180
|
-
where: { id: 1 },
|
181
|
-
data: { code: null },
|
182
|
-
});
|
183
|
-
expect(result).toEqual({ token: 'newToken' });
|
184
|
-
});
|
185
|
-
});
|
186
|
-
|
187
|
-
describe('verifyToken', () => {
|
188
|
-
it('should verify and return token data', async () => {
|
189
|
-
jest.spyOn(jwtService, 'verifyAsync').mockResolvedValue({ id: 1 });
|
190
|
-
|
191
|
-
const result = await authService.verifyToken('token');
|
192
|
-
|
193
|
-
expect(result).toEqual({ id: 1 });
|
194
|
-
});
|
195
|
-
});
|
196
|
-
});
|
1
|
+
import { MailService } from '@hedhog/mail';
|
2
|
+
import { PrismaService } from '@hedhog/prisma';
|
3
|
+
import { NotFoundException } from '@nestjs/common';
|
4
|
+
import { JwtService } from '@nestjs/jwt';
|
5
|
+
import { Test, TestingModule } from '@nestjs/testing';
|
6
|
+
import { compare } from 'bcrypt';
|
7
|
+
import { AuthService } from './auth.service';
|
8
|
+
|
9
|
+
jest.mock('bcrypt');
|
10
|
+
|
11
|
+
describe('AuthService', () => {
|
12
|
+
let authService: AuthService;
|
13
|
+
let prismaService: PrismaService;
|
14
|
+
let jwtService: JwtService;
|
15
|
+
let mailService: MailService;
|
16
|
+
|
17
|
+
beforeEach(async () => {
|
18
|
+
const module: TestingModule = await Test.createTestingModule({
|
19
|
+
providers: [
|
20
|
+
AuthService,
|
21
|
+
{
|
22
|
+
provide: PrismaService,
|
23
|
+
useValue: {
|
24
|
+
user: {
|
25
|
+
findFirst: jest.fn(),
|
26
|
+
update: jest.fn(),
|
27
|
+
findUnique: jest.fn(),
|
28
|
+
},
|
29
|
+
},
|
30
|
+
},
|
31
|
+
{
|
32
|
+
provide: JwtService,
|
33
|
+
useValue: {
|
34
|
+
sign: jest.fn(),
|
35
|
+
verifyAsync: jest.fn(),
|
36
|
+
decode: jest.fn(),
|
37
|
+
},
|
38
|
+
},
|
39
|
+
{
|
40
|
+
provide: MailService,
|
41
|
+
useValue: {
|
42
|
+
send: jest.fn(),
|
43
|
+
},
|
44
|
+
},
|
45
|
+
],
|
46
|
+
}).compile();
|
47
|
+
|
48
|
+
authService = module.get<AuthService>(AuthService);
|
49
|
+
prismaService = module.get<PrismaService>(PrismaService);
|
50
|
+
jwtService = module.get<JwtService>(JwtService);
|
51
|
+
mailService = module.get<MailService>(MailService);
|
52
|
+
});
|
53
|
+
|
54
|
+
it('should be defined', () => {
|
55
|
+
expect(authService).toBeDefined();
|
56
|
+
});
|
57
|
+
|
58
|
+
describe('loginWithEmailAndPassword', () => {
|
59
|
+
it('should throw NotFoundException if user is not found', async () => {
|
60
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
61
|
+
|
62
|
+
await expect(
|
63
|
+
authService.loginWithEmailAndPassword('test@example.com', 'password'),
|
64
|
+
).rejects.toThrow(NotFoundException);
|
65
|
+
});
|
66
|
+
|
67
|
+
it('should throw NotFoundException if password is invalid', async () => {
|
68
|
+
const mockUser = {
|
69
|
+
id: 1,
|
70
|
+
name: 'Test User',
|
71
|
+
email: 'test@example.com',
|
72
|
+
password: 'hashedpassword',
|
73
|
+
multifactor_id: null,
|
74
|
+
code: null,
|
75
|
+
created_at: new Date(),
|
76
|
+
updated_at: new Date(),
|
77
|
+
};
|
78
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
79
|
+
(compare as jest.Mock).mockResolvedValue(false);
|
80
|
+
|
81
|
+
await expect(
|
82
|
+
authService.loginWithEmailAndPassword('test@example.com', 'password'),
|
83
|
+
).rejects.toThrow(NotFoundException);
|
84
|
+
});
|
85
|
+
|
86
|
+
it('should return a token if login is successful', async () => {
|
87
|
+
const mockUser = {
|
88
|
+
id: 1,
|
89
|
+
name: 'Test User',
|
90
|
+
email: 'test@example.com',
|
91
|
+
password: 'hashedpassword',
|
92
|
+
multifactor_id: null,
|
93
|
+
code: null,
|
94
|
+
created_at: new Date(),
|
95
|
+
updated_at: new Date(),
|
96
|
+
};
|
97
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
98
|
+
(compare as jest.Mock).mockResolvedValue(true);
|
99
|
+
jest.spyOn(jwtService, 'sign').mockReturnValue('token');
|
100
|
+
|
101
|
+
const result = await authService.loginWithEmailAndPassword(
|
102
|
+
'test@example.com',
|
103
|
+
'password',
|
104
|
+
);
|
105
|
+
|
106
|
+
expect(result).toEqual({ token: 'token' });
|
107
|
+
});
|
108
|
+
});
|
109
|
+
|
110
|
+
describe('forget', () => {
|
111
|
+
it('should throw NotFoundException if user is not found', async () => {
|
112
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
113
|
+
|
114
|
+
await expect(
|
115
|
+
authService.forget({ email: 'test@example.com' }),
|
116
|
+
).rejects.toThrow(NotFoundException);
|
117
|
+
});
|
118
|
+
|
119
|
+
it('should update user with reset code and send email', async () => {
|
120
|
+
const mockUser = {
|
121
|
+
id: 1,
|
122
|
+
name: 'Test User',
|
123
|
+
email: 'test@example.com',
|
124
|
+
password: 'hashedpassword',
|
125
|
+
multifactor_id: null,
|
126
|
+
code: null,
|
127
|
+
created_at: new Date(),
|
128
|
+
updated_at: new Date(),
|
129
|
+
};
|
130
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
131
|
+
jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
|
132
|
+
jest
|
133
|
+
.spyOn(authService, 'generateRandomString')
|
134
|
+
.mockReturnValue('resetCode');
|
135
|
+
|
136
|
+
const result = await authService.forget({ email: 'test@example.com' });
|
137
|
+
|
138
|
+
expect(prismaService.user.update).toHaveBeenCalledWith({
|
139
|
+
where: { id: 1 },
|
140
|
+
data: { code: 'resetCode' },
|
141
|
+
});
|
142
|
+
expect(mailService.send).toHaveBeenCalledWith({
|
143
|
+
to: 'test@example.com',
|
144
|
+
subject: 'Reset password',
|
145
|
+
body: `Reset your password by clicking <a href="${process.env.FRONTEND_URL}/reset-password/resetCode">here</a>`,
|
146
|
+
});
|
147
|
+
expect(result).toEqual(true);
|
148
|
+
});
|
149
|
+
});
|
150
|
+
|
151
|
+
describe('otp', () => {
|
152
|
+
it('should throw NotFoundException if user with code is not found', async () => {
|
153
|
+
jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
|
154
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
|
155
|
+
|
156
|
+
await expect(
|
157
|
+
authService.otp({ token: 'token', code: 123456 }),
|
158
|
+
).rejects.toThrow(NotFoundException);
|
159
|
+
});
|
160
|
+
|
161
|
+
it('should return a token if otp is valid', async () => {
|
162
|
+
const mockUser = {
|
163
|
+
id: 1,
|
164
|
+
name: 'Test User',
|
165
|
+
email: 'test@example.com',
|
166
|
+
password: 'hashedpassword',
|
167
|
+
multifactor_id: null,
|
168
|
+
code: null,
|
169
|
+
created_at: new Date(),
|
170
|
+
updated_at: new Date(),
|
171
|
+
};
|
172
|
+
jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
|
173
|
+
jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
|
174
|
+
jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
|
175
|
+
jest.spyOn(jwtService, 'sign').mockReturnValue('newToken');
|
176
|
+
|
177
|
+
const result = await authService.otp({ token: 'token', code: 123456 });
|
178
|
+
|
179
|
+
expect(prismaService.user.update).toHaveBeenCalledWith({
|
180
|
+
where: { id: 1 },
|
181
|
+
data: { code: null },
|
182
|
+
});
|
183
|
+
expect(result).toEqual({ token: 'newToken' });
|
184
|
+
});
|
185
|
+
});
|
186
|
+
|
187
|
+
describe('verifyToken', () => {
|
188
|
+
it('should verify and return token data', async () => {
|
189
|
+
jest.spyOn(jwtService, 'verifyAsync').mockResolvedValue({ id: 1 });
|
190
|
+
|
191
|
+
const result = await authService.verifyToken('token');
|
192
|
+
|
193
|
+
expect(result).toEqual({ id: 1 });
|
194
|
+
});
|
195
|
+
});
|
196
|
+
});
|