@hedhog/admin 0.46.39 → 0.46.40

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. package/README.md +960 -960
  2. package/dist/auth/auth.service.d.ts.map +1 -1
  3. package/dist/auth/auth.service.js +6 -4
  4. package/dist/auth/auth.service.js.map +1 -1
  5. package/dist/auth/consts/body.js +24 -24
  6. package/dist/emails/templates.d.ts.map +1 -1
  7. package/dist/emails/templates.js +48 -48
  8. package/dist/emails/templates.js.map +1 -1
  9. package/frontend/menu/components/create-panel.tsx.ejs +55 -55
  10. package/frontend/menu/components/update-panel.tsx.ejs +67 -67
  11. package/frontend/menu/locales/en/admin.menu.json +11 -11
  12. package/frontend/menu/locales/pt/admin.menu.json +11 -11
  13. package/frontend/menu/react-query/handlers.ts.ejs +28 -28
  14. package/frontend/menu/react-query/requests.ts.ejs +56 -56
  15. package/frontend/menu-locale/locales/en/admin.menu-locale.json +11 -11
  16. package/frontend/menu-locale/locales/pt/admin.menu-locale.json +11 -11
  17. package/frontend/menu-screen/locales/en/admin.menu-screen.json +11 -11
  18. package/frontend/menu-screen/locales/pt/admin.menu-screen.json +11 -11
  19. package/frontend/multifactor/components/create-panel.tsx.ejs +55 -55
  20. package/frontend/multifactor/components/update-panel.tsx.ejs +70 -70
  21. package/frontend/multifactor/locales/en/admin.multifactor.json +11 -11
  22. package/frontend/multifactor/locales/pt/admin.multifactor.json +11 -11
  23. package/frontend/multifactor/react-query/handlers.ts.ejs +28 -28
  24. package/frontend/multifactor/react-query/requests.ts.ejs +59 -59
  25. package/frontend/multifactor-locale/locales/en/admin.multifactor-locale.json +11 -11
  26. package/frontend/multifactor-locale/locales/pt/admin.multifactor-locale.json +11 -11
  27. package/frontend/screen/components/create-panel.tsx.ejs +55 -55
  28. package/frontend/screen/components/update-panel.tsx.ejs +67 -67
  29. package/frontend/screen/locales/en/admin.screen.json +11 -11
  30. package/frontend/screen/locales/pt/admin.screen.json +11 -11
  31. package/frontend/screen/react-query/handlers.ts.ejs +28 -28
  32. package/frontend/screen/react-query/requests.ts.ejs +56 -56
  33. package/frontend/screen-locale/locales/en/admin.screen-locale.json +11 -11
  34. package/frontend/screen-locale/locales/pt/admin.screen-locale.json +11 -11
  35. package/frontend/translation/components/create-panel.tsx.ejs +52 -52
  36. package/frontend/translation/components/update-panel.tsx.ejs +67 -67
  37. package/frontend/translation/locales/en/admin.translation.json +11 -11
  38. package/frontend/translation/locales/pt/admin.translation.json +11 -11
  39. package/frontend/translation/react-query/handlers.ts.ejs +28 -28
  40. package/frontend/translation/react-query/requests.ts.ejs +58 -58
  41. package/frontend/translation-namespace/components/create-panel.tsx.ejs +53 -53
  42. package/frontend/translation-namespace/components/update-panel.tsx.ejs +70 -70
  43. package/frontend/translation-namespace/locales/en/admin.translation-namespace.json +11 -11
  44. package/frontend/translation-namespace/locales/pt/admin.translation-namespace.json +11 -11
  45. package/frontend/translation-namespace/react-query/handlers.ts.ejs +28 -28
  46. package/frontend/translation-namespace/react-query/requests.ts.ejs +60 -60
  47. package/frontend/user/components/create-panel.tsx.ejs +52 -52
  48. package/frontend/user/components/update-panel.tsx.ejs +64 -64
  49. package/frontend/user/locales/en/admin.user.json +11 -11
  50. package/frontend/user/locales/pt/admin.user.json +11 -11
  51. package/frontend/user/react-query/handlers.ts.ejs +28 -28
  52. package/frontend/user/react-query/requests.ts.ejs +55 -55
  53. package/hedhog.yaml +783 -783
  54. package/package.json +45 -45
  55. package/src/admin.module.ts +39 -39
  56. package/src/auth/auth.controller.ts +88 -88
  57. package/src/auth/auth.module.ts +41 -41
  58. package/src/auth/auth.service.spec.ts +196 -196
  59. package/src/auth/auth.service.ts +355 -349
  60. package/src/auth/consts/body.ts +27 -27
  61. package/src/auth/dto/change.dto.ts +19 -19
  62. package/src/auth/dto/email.dto.ts +15 -15
  63. package/src/auth/dto/forget.dto.ts +6 -6
  64. package/src/auth/dto/login.dto.ts +21 -21
  65. package/src/auth/dto/otp.dto.ts +11 -11
  66. package/src/auth/dto/reset.dto.ts +14 -14
  67. package/src/auth/enums/multifactor-type.enum.ts +4 -4
  68. package/src/auth/guards/auth.guard.ts +54 -54
  69. package/src/auth/types/user.type.ts +8 -8
  70. package/src/dto/delete.dto.ts +8 -8
  71. package/src/dto/update-ids.dto.ts +9 -9
  72. package/src/emails/index.ts +2 -2
  73. package/src/emails/lib.ts +40 -40
  74. package/src/emails/templates.ts +62 -60
  75. package/src/index.ts +20 -20
  76. package/src/menu/dto/create.dto.ts +25 -25
  77. package/src/menu/dto/order.dto.ts +8 -8
  78. package/src/menu/dto/update.dto.ts +19 -19
  79. package/src/menu/menu.controller.ts +105 -105
  80. package/src/menu/menu.module.ts +18 -18
  81. package/src/menu/menu.service.spec.ts +247 -247
  82. package/src/menu/menu.service.ts +263 -263
  83. package/src/role/dto/create.dto.ts +7 -7
  84. package/src/role/dto/update.dto.ts +4 -4
  85. package/src/role/guards/role.guard.ts +121 -121
  86. package/src/role/role.controller.ts +126 -126
  87. package/src/role/role.module.ts +28 -28
  88. package/src/role/role.service.spec.ts +417 -417
  89. package/src/role/role.service.ts +289 -289
  90. package/src/route/dto/create.dto.ts +13 -13
  91. package/src/route/dto/update.dto.ts +15 -15
  92. package/src/route/route.controller.ts +91 -91
  93. package/src/route/route.module.ts +18 -18
  94. package/src/route/route.service.spec.ts +300 -300
  95. package/src/route/route.service.ts +164 -164
  96. package/src/screen/dto/create.dto.ts +11 -11
  97. package/src/screen/dto/update.dto.ts +19 -19
  98. package/src/screen/screen.controller.ts +93 -93
  99. package/src/screen/screen.module.ts +18 -18
  100. package/src/screen/screen.service.spec.ts +298 -298
  101. package/src/screen/screen.service.ts +179 -179
  102. package/src/types/http-method.ts +8 -8
  103. package/src/user/constants/user.constants.ts +1 -1
  104. package/src/user/dto/create.dto.ts +24 -24
  105. package/src/user/dto/update.dto.ts +41 -41
  106. package/src/user/user.controller.ts +75 -75
  107. package/src/user/user.module.ts +18 -18
  108. package/src/user/user.service.spec.ts +294 -294
  109. package/src/user/user.service.ts +129 -129
  110. package/tsconfig.lib.json +9 -9
  111. package/tsconfig.production.json +20 -20
@@ -1,196 +1,196 @@
1
- // import { MailService } from '@hedhog/mail';
2
- // import { PrismaService } from '@hedhog/prisma';
3
- // import { NotFoundException } from '@nestjs/common';
4
- // import { JwtService } from '@nestjs/jwt';
5
- // import { Test, TestingModule } from '@nestjs/testing';
6
- // import { compare } from 'bcrypt';
7
- // import { AuthService } from './auth.service';
8
-
9
- // jest.mock('bcrypt');
10
-
11
- // describe('AuthService', () => {
12
- // let authService: AuthService;
13
- // let prismaService: PrismaService;
14
- // let jwtService: JwtService;
15
- // let mailService: MailService;
16
-
17
- // beforeEach(async () => {
18
- // const module: TestingModule = await Test.createTestingModule({
19
- // providers: [
20
- // AuthService,
21
- // {
22
- // provide: PrismaService,
23
- // useValue: {
24
- // user: {
25
- // findFirst: jest.fn(),
26
- // update: jest.fn(),
27
- // findUnique: jest.fn(),
28
- // },
29
- // },
30
- // },
31
- // {
32
- // provide: JwtService,
33
- // useValue: {
34
- // sign: jest.fn(),
35
- // verifyAsync: jest.fn(),
36
- // decode: jest.fn(),
37
- // },
38
- // },
39
- // {
40
- // provide: MailService,
41
- // useValue: {
42
- // send: jest.fn(),
43
- // },
44
- // },
45
- // ],
46
- // }).compile();
47
-
48
- // authService = module.get<AuthService>(AuthService);
49
- // prismaService = module.get<PrismaService>(PrismaService);
50
- // jwtService = module.get<JwtService>(JwtService);
51
- // mailService = module.get<MailService>(MailService);
52
- // });
53
-
54
- // it('should be defined', () => {
55
- // expect(authService).toBeDefined();
56
- // });
57
-
58
- // describe('loginWithEmailAndPassword', () => {
59
- // it('should throw NotFoundException if user is not found', async () => {
60
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
61
-
62
- // await expect(
63
- // authService.loginWithEmailAndPassword('test@example.com', 'password'),
64
- // ).rejects.toThrow(NotFoundException);
65
- // });
66
-
67
- // it('should throw NotFoundException if password is invalid', async () => {
68
- // const mockUser = {
69
- // id: 1,
70
- // name: 'Test User',
71
- // email: 'test@example.com',
72
- // password: 'hashedpassword',
73
- // multifactor_id: null,
74
- // code: null,
75
- // created_at: new Date(),
76
- // updated_at: new Date(),
77
- // };
78
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
79
- // (compare as jest.Mock).mockResolvedValue(false);
80
-
81
- // await expect(
82
- // authService.loginWithEmailAndPassword('test@example.com', 'password'),
83
- // ).rejects.toThrow(NotFoundException);
84
- // });
85
-
86
- // it('should return a token if login is successful', async () => {
87
- // const mockUser = {
88
- // id: 1,
89
- // name: 'Test User',
90
- // email: 'test@example.com',
91
- // password: 'hashedpassword',
92
- // multifactor_id: null,
93
- // code: null,
94
- // created_at: new Date(),
95
- // updated_at: new Date(),
96
- // };
97
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
98
- // (compare as jest.Mock).mockResolvedValue(true);
99
- // jest.spyOn(jwtService, 'sign').mockReturnValue('token');
100
-
101
- // const result = await authService.loginWithEmailAndPassword(
102
- // 'test@example.com',
103
- // 'password',
104
- // );
105
-
106
- // expect(result).toEqual({ token: 'token' });
107
- // });
108
- // });
109
-
110
- // describe('forget', () => {
111
- // it('should throw NotFoundException if user is not found', async () => {
112
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
113
-
114
- // await expect(
115
- // authService.forget({ email: 'test@example.com' }),
116
- // ).rejects.toThrow(NotFoundException);
117
- // });
118
-
119
- // it('should update user with reset code and send email', async () => {
120
- // const mockUser = {
121
- // id: 1,
122
- // name: 'Test User',
123
- // email: 'test@example.com',
124
- // password: 'hashedpassword',
125
- // multifactor_id: null,
126
- // code: null,
127
- // created_at: new Date(),
128
- // updated_at: new Date(),
129
- // };
130
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
131
- // jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
132
- // jest
133
- // .spyOn(authService, 'generateRandomString')
134
- // .mockReturnValue('resetCode');
135
-
136
- // const result = await authService.forget({ email: 'test@example.com' });
137
-
138
- // expect(prismaService.user.update).toHaveBeenCalledWith({
139
- // where: { id: 1 },
140
- // data: { code: 'resetCode' },
141
- // });
142
- // expect(mailService.send).toHaveBeenCalledWith({
143
- // to: 'test@example.com',
144
- // subject: 'Reset password',
145
- // body: `Reset your password by clicking <a href="${process.env.FRONTEND_URL}/reset-password/resetCode">here</a>`,
146
- // });
147
- // expect(result).toEqual(true);
148
- // });
149
- // });
150
-
151
- // describe('otp', () => {
152
- // it('should throw NotFoundException if user with code is not found', async () => {
153
- // jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
154
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
155
-
156
- // await expect(
157
- // authService.otp({ token: 'token', code: 123456 }),
158
- // ).rejects.toThrow(NotFoundException);
159
- // });
160
-
161
- // it('should return a token if otp is valid', async () => {
162
- // const mockUser = {
163
- // id: 1,
164
- // name: 'Test User',
165
- // email: 'test@example.com',
166
- // password: 'hashedpassword',
167
- // multifactor_id: null,
168
- // code: null,
169
- // created_at: new Date(),
170
- // updated_at: new Date(),
171
- // };
172
- // jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
173
- // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
174
- // jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
175
- // jest.spyOn(jwtService, 'sign').mockReturnValue('newToken');
176
-
177
- // const result = await authService.otp({ token: 'token', code: 123456 });
178
-
179
- // expect(prismaService.user.update).toHaveBeenCalledWith({
180
- // where: { id: 1 },
181
- // data: { code: null },
182
- // });
183
- // expect(result).toEqual({ token: 'newToken' });
184
- // });
185
- // });
186
-
187
- // describe('verifyToken', () => {
188
- // it('should verify and return token data', async () => {
189
- // jest.spyOn(jwtService, 'verifyAsync').mockResolvedValue({ id: 1 });
190
-
191
- // const result = await authService.verifyToken('token');
192
-
193
- // expect(result).toEqual({ id: 1 });
194
- // });
195
- // });
196
- // });
1
+ // import { MailService } from '@hedhog/mail';
2
+ // import { PrismaService } from '@hedhog/prisma';
3
+ // import { NotFoundException } from '@nestjs/common';
4
+ // import { JwtService } from '@nestjs/jwt';
5
+ // import { Test, TestingModule } from '@nestjs/testing';
6
+ // import { compare } from 'bcrypt';
7
+ // import { AuthService } from './auth.service';
8
+
9
+ // jest.mock('bcrypt');
10
+
11
+ // describe('AuthService', () => {
12
+ // let authService: AuthService;
13
+ // let prismaService: PrismaService;
14
+ // let jwtService: JwtService;
15
+ // let mailService: MailService;
16
+
17
+ // beforeEach(async () => {
18
+ // const module: TestingModule = await Test.createTestingModule({
19
+ // providers: [
20
+ // AuthService,
21
+ // {
22
+ // provide: PrismaService,
23
+ // useValue: {
24
+ // user: {
25
+ // findFirst: jest.fn(),
26
+ // update: jest.fn(),
27
+ // findUnique: jest.fn(),
28
+ // },
29
+ // },
30
+ // },
31
+ // {
32
+ // provide: JwtService,
33
+ // useValue: {
34
+ // sign: jest.fn(),
35
+ // verifyAsync: jest.fn(),
36
+ // decode: jest.fn(),
37
+ // },
38
+ // },
39
+ // {
40
+ // provide: MailService,
41
+ // useValue: {
42
+ // send: jest.fn(),
43
+ // },
44
+ // },
45
+ // ],
46
+ // }).compile();
47
+
48
+ // authService = module.get<AuthService>(AuthService);
49
+ // prismaService = module.get<PrismaService>(PrismaService);
50
+ // jwtService = module.get<JwtService>(JwtService);
51
+ // mailService = module.get<MailService>(MailService);
52
+ // });
53
+
54
+ // it('should be defined', () => {
55
+ // expect(authService).toBeDefined();
56
+ // });
57
+
58
+ // describe('loginWithEmailAndPassword', () => {
59
+ // it('should throw NotFoundException if user is not found', async () => {
60
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
61
+
62
+ // await expect(
63
+ // authService.loginWithEmailAndPassword('test@example.com', 'password'),
64
+ // ).rejects.toThrow(NotFoundException);
65
+ // });
66
+
67
+ // it('should throw NotFoundException if password is invalid', async () => {
68
+ // const mockUser = {
69
+ // id: 1,
70
+ // name: 'Test User',
71
+ // email: 'test@example.com',
72
+ // password: 'hashedpassword',
73
+ // multifactor_id: null,
74
+ // code: null,
75
+ // created_at: new Date(),
76
+ // updated_at: new Date(),
77
+ // };
78
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
79
+ // (compare as jest.Mock).mockResolvedValue(false);
80
+
81
+ // await expect(
82
+ // authService.loginWithEmailAndPassword('test@example.com', 'password'),
83
+ // ).rejects.toThrow(NotFoundException);
84
+ // });
85
+
86
+ // it('should return a token if login is successful', async () => {
87
+ // const mockUser = {
88
+ // id: 1,
89
+ // name: 'Test User',
90
+ // email: 'test@example.com',
91
+ // password: 'hashedpassword',
92
+ // multifactor_id: null,
93
+ // code: null,
94
+ // created_at: new Date(),
95
+ // updated_at: new Date(),
96
+ // };
97
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
98
+ // (compare as jest.Mock).mockResolvedValue(true);
99
+ // jest.spyOn(jwtService, 'sign').mockReturnValue('token');
100
+
101
+ // const result = await authService.loginWithEmailAndPassword(
102
+ // 'test@example.com',
103
+ // 'password',
104
+ // );
105
+
106
+ // expect(result).toEqual({ token: 'token' });
107
+ // });
108
+ // });
109
+
110
+ // describe('forget', () => {
111
+ // it('should throw NotFoundException if user is not found', async () => {
112
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
113
+
114
+ // await expect(
115
+ // authService.forget({ email: 'test@example.com' }),
116
+ // ).rejects.toThrow(NotFoundException);
117
+ // });
118
+
119
+ // it('should update user with reset code and send email', async () => {
120
+ // const mockUser = {
121
+ // id: 1,
122
+ // name: 'Test User',
123
+ // email: 'test@example.com',
124
+ // password: 'hashedpassword',
125
+ // multifactor_id: null,
126
+ // code: null,
127
+ // created_at: new Date(),
128
+ // updated_at: new Date(),
129
+ // };
130
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
131
+ // jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
132
+ // jest
133
+ // .spyOn(authService, 'generateRandomString')
134
+ // .mockReturnValue('resetCode');
135
+
136
+ // const result = await authService.forget({ email: 'test@example.com' });
137
+
138
+ // expect(prismaService.user.update).toHaveBeenCalledWith({
139
+ // where: { id: 1 },
140
+ // data: { code: 'resetCode' },
141
+ // });
142
+ // expect(mailService.send).toHaveBeenCalledWith({
143
+ // to: 'test@example.com',
144
+ // subject: 'Reset password',
145
+ // body: `Reset your password by clicking <a href="${process.env.FRONTEND_URL}/reset-password/resetCode">here</a>`,
146
+ // });
147
+ // expect(result).toEqual(true);
148
+ // });
149
+ // });
150
+
151
+ // describe('otp', () => {
152
+ // it('should throw NotFoundException if user with code is not found', async () => {
153
+ // jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
154
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(null);
155
+
156
+ // await expect(
157
+ // authService.otp({ token: 'token', code: 123456 }),
158
+ // ).rejects.toThrow(NotFoundException);
159
+ // });
160
+
161
+ // it('should return a token if otp is valid', async () => {
162
+ // const mockUser = {
163
+ // id: 1,
164
+ // name: 'Test User',
165
+ // email: 'test@example.com',
166
+ // password: 'hashedpassword',
167
+ // multifactor_id: null,
168
+ // code: null,
169
+ // created_at: new Date(),
170
+ // updated_at: new Date(),
171
+ // };
172
+ // jest.spyOn(jwtService, 'decode').mockReturnValue({ id: 1 });
173
+ // jest.spyOn(prismaService.user, 'findFirst').mockResolvedValue(mockUser);
174
+ // jest.spyOn(prismaService.user, 'update').mockResolvedValue(mockUser);
175
+ // jest.spyOn(jwtService, 'sign').mockReturnValue('newToken');
176
+
177
+ // const result = await authService.otp({ token: 'token', code: 123456 });
178
+
179
+ // expect(prismaService.user.update).toHaveBeenCalledWith({
180
+ // where: { id: 1 },
181
+ // data: { code: null },
182
+ // });
183
+ // expect(result).toEqual({ token: 'newToken' });
184
+ // });
185
+ // });
186
+
187
+ // describe('verifyToken', () => {
188
+ // it('should verify and return token data', async () => {
189
+ // jest.spyOn(jwtService, 'verifyAsync').mockResolvedValue({ id: 1 });
190
+
191
+ // const result = await authService.verifyToken('token');
192
+
193
+ // expect(result).toEqual({ id: 1 });
194
+ // });
195
+ // });
196
+ // });