@novo-learning/service-lib 1.8.1 → 1.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +1 -0
- package/dist/index.js +1 -0
- package/dist/index.js.map +1 -1
- package/dist/modules/clients/auth-api/auth.service.d.ts +1 -0
- package/dist/modules/clients/auth-api/auth.service.js +5 -3
- package/dist/modules/clients/auth-api/auth.service.js.map +1 -1
- package/dist/modules/clients/auth-api/auth.service.spec.d.ts +1 -0
- package/dist/modules/clients/auth-api/auth.service.spec.js +121 -0
- package/dist/modules/clients/auth-api/auth.service.spec.js.map +1 -0
- package/dist/modules/clients/index.d.ts +0 -2
- package/dist/modules/clients/index.js +1 -5
- package/dist/modules/clients/index.js.map +1 -1
- package/dist/modules/clients/pronunciation-api/pronunciation.service.d.ts +1 -0
- package/dist/modules/clients/pronunciation-api/pronunciation.service.js +7 -8
- package/dist/modules/clients/pronunciation-api/pronunciation.service.js.map +1 -1
- package/dist/modules/clients/pronunciation-api/pronunciation.service.spec.d.ts +1 -0
- package/dist/modules/clients/pronunciation-api/pronunciation.service.spec.js +79 -0
- package/dist/modules/clients/pronunciation-api/pronunciation.service.spec.js.map +1 -0
- package/dist/modules/clients/publisher-api/publisher.service.spec.d.ts +1 -0
- package/dist/modules/clients/publisher-api/publisher.service.spec.js +136 -0
- package/dist/modules/clients/publisher-api/publisher.service.spec.js.map +1 -0
- package/dist/modules/nest/exceptions/index.d.ts +2 -0
- package/dist/modules/nest/exceptions/index.js +19 -0
- package/dist/modules/nest/exceptions/index.js.map +1 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.d.ts +4 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.js +33 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.js.map +1 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.spec.d.ts +1 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.spec.js +49 -0
- package/dist/modules/nest/exceptions/invalid-request.filter.spec.js.map +1 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.d.ts +4 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.js +26 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.js.map +1 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.spec.d.ts +1 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.spec.js +26 -0
- package/dist/modules/nest/exceptions/request-aborted.filter.spec.js.map +1 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.d.ts +4 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.js +31 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.js.map +1 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.spec.d.ts +1 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.spec.js +49 -0
- package/dist/modules/nest/exceptions/unsupported-encoding.filter.spec.js.map +1 -0
- package/dist/modules/nest/http/http.service.d.ts +1 -1
- package/dist/modules/nest/http/http.service.js +3 -3
- package/dist/modules/nest/http/http.service.js.map +1 -1
- package/dist/modules/nest/http/http.service.spec.d.ts +1 -0
- package/dist/modules/nest/http/http.service.spec.js +68 -0
- package/dist/modules/nest/http/http.service.spec.js.map +1 -0
- package/dist/modules/nest/jwt/guards/has-permission.guard.js.map +1 -1
- package/dist/modules/nest/jwt/guards/has-permission.guard.spec.d.ts +1 -0
- package/dist/modules/nest/jwt/guards/has-permission.guard.spec.js +55 -0
- package/dist/modules/nest/jwt/guards/has-permission.guard.spec.js.map +1 -0
- package/dist/modules/nest/jwt/guards/jwt-auth.guard.js +1 -1
- package/dist/modules/nest/jwt/guards/jwt-auth.guard.js.map +1 -1
- package/dist/modules/nest/jwt/guards/jwt-auth.guard.spec.d.ts +1 -0
- package/dist/modules/nest/jwt/guards/jwt-auth.guard.spec.js +68 -0
- package/dist/modules/nest/jwt/guards/jwt-auth.guard.spec.js.map +1 -0
- package/dist/modules/nest/jwt/strategies/jwt.strategy.spec.d.ts +1 -0
- package/dist/modules/nest/jwt/strategies/jwt.strategy.spec.js +48 -0
- package/dist/modules/nest/jwt/strategies/jwt.strategy.spec.js.map +1 -0
- package/dist/modules/nest/logger/iso-logger.js +1 -1
- package/dist/modules/nest/logger/iso-logger.js.map +1 -1
- package/dist/modules/nest/logger/iso-logger.spec.d.ts +1 -0
- package/dist/modules/nest/logger/iso-logger.spec.js +44 -0
- package/dist/modules/nest/logger/iso-logger.spec.js.map +1 -0
- package/dist/validators/exercise-type.validator.spec.js +8 -0
- package/dist/validators/exercise-type.validator.spec.js.map +1 -1
- package/dist/validators/language-code.validator.spec.js +8 -0
- package/dist/validators/language-code.validator.spec.js.map +1 -1
- package/dist/validators/phone-set.validator.spec.js +8 -0
- package/dist/validators/phone-set.validator.spec.js.map +1 -1
- package/package.json +4 -4
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const invalid_request_filter_1 = require("./invalid-request.filter");
|
|
4
|
+
describe('InvalidRequestFilter', () => {
|
|
5
|
+
const filter = new invalid_request_filter_1.InvalidRequestFilter();
|
|
6
|
+
function createMockHost() {
|
|
7
|
+
const json = jest.fn();
|
|
8
|
+
const status = jest.fn(() => ({ json }));
|
|
9
|
+
const getResponse = jest.fn(() => ({ status }));
|
|
10
|
+
const host = {
|
|
11
|
+
switchToHttp: (() => ({
|
|
12
|
+
getResponse,
|
|
13
|
+
})),
|
|
14
|
+
getArgs: (() => []),
|
|
15
|
+
getArgByIndex: (() => undefined),
|
|
16
|
+
switchToRpc: () => ({}),
|
|
17
|
+
switchToWs: () => ({}),
|
|
18
|
+
getType: (() => 'http'),
|
|
19
|
+
};
|
|
20
|
+
return { host, status, json };
|
|
21
|
+
}
|
|
22
|
+
it('should intercept the unsupported encoding error and return 400', () => {
|
|
23
|
+
const { host, status, json } = createMockHost();
|
|
24
|
+
const error = new Error('unsupported content encoding "chunked"');
|
|
25
|
+
filter.catch(error, host);
|
|
26
|
+
expect(status).toHaveBeenCalledWith(400);
|
|
27
|
+
expect(json).toHaveBeenCalledWith({
|
|
28
|
+
error: 'Invalid request',
|
|
29
|
+
message: 'The request could not be processed: unsupported content encoding "chunked"',
|
|
30
|
+
});
|
|
31
|
+
});
|
|
32
|
+
it('should rethrow other errors', () => {
|
|
33
|
+
const { host } = createMockHost();
|
|
34
|
+
const error = new Error('some other error');
|
|
35
|
+
expect(() => filter.catch(error, host)).toThrow(error);
|
|
36
|
+
});
|
|
37
|
+
it('should rethrow non-Error exceptions', () => {
|
|
38
|
+
const { host } = createMockHost();
|
|
39
|
+
const value = { foo: 'bar' };
|
|
40
|
+
try {
|
|
41
|
+
filter.catch(value, host);
|
|
42
|
+
fail('Expected exception to be thrown');
|
|
43
|
+
}
|
|
44
|
+
catch (err) {
|
|
45
|
+
expect(err).toBe(value);
|
|
46
|
+
}
|
|
47
|
+
});
|
|
48
|
+
});
|
|
49
|
+
//# sourceMappingURL=invalid-request.filter.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"invalid-request.filter.spec.js","sourceRoot":"","sources":["../../../../src/modules/nest/exceptions/invalid-request.filter.spec.ts"],"names":[],"mappings":";;AAEA,qEAAgE;AAEhE,QAAQ,CAAC,sBAAsB,EAAE,GAAG,EAAE;IACpC,MAAM,MAAM,GAAG,IAAI,6CAAoB,EAAE,CAAC;IAE1C,SAAS,cAAc;QACrB,MAAM,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAEhD,MAAM,IAAI,GAAkB;YAC1B,YAAY,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC;gBACpB,WAAW;aACZ,CAAC,CAA6C;YAC/C,OAAO,EAAE,CAAC,GAAG,EAAE,CAAC,EAAE,CAA6B;YAC/C,aAAa,EAAE,CAAC,GAAG,EAAE,CAAC,SAAS,CAAmC;YAClE,WAAW,EAAE,GAAG,EAAE,CAAC,CAAC,EAAuB,CAAA;YAC3C,UAAU,EAAE,GAAG,EAAE,CAAC,CAAC,EAAsB,CAAA;YACzC,OAAO,EAAE,CAAC,GAAG,EAAE,CAAC,MAAM,CAA6B;SACpD,CAAC;QAEF,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC;IAChC,CAAC;IAED,EAAE,CAAC,gEAAgE,EAAE,GAAG,EAAE;QACxE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAChD,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAClE,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAE1B,MAAM,CAAC,MAAM,CAAC,CAAC,oBAAoB,CAAC,GAAG,CAAC,CAAC;QACzC,MAAM,CAAC,IAAI,CAAC,CAAC,oBAAoB,CAAC;YAChC,KAAK,EAAE,iBAAiB;YACxB,OAAO,EAAE,4EAA4E;SACtF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,6BAA6B,EAAE,GAAG,EAAE;QACrC,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAClC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QAE5C,MAAM,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,qCAAqC,EAAE,GAAG,EAAE;QAC7C,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAClC,MAAM,KAAK,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAE7B,IAAI,CAAC;YACH,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAC1B,IAAI,CAAC,iCAAiC,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.RequestAbortedFilter = void 0;
|
|
10
|
+
const common_1 = require("@nestjs/common");
|
|
11
|
+
let RequestAbortedFilter = class RequestAbortedFilter {
|
|
12
|
+
catch(exception, _) {
|
|
13
|
+
if (exception instanceof Error) {
|
|
14
|
+
const message = exception.message.toLowerCase();
|
|
15
|
+
if (message.includes('request aborted')) {
|
|
16
|
+
return;
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
throw exception;
|
|
20
|
+
}
|
|
21
|
+
};
|
|
22
|
+
exports.RequestAbortedFilter = RequestAbortedFilter;
|
|
23
|
+
exports.RequestAbortedFilter = RequestAbortedFilter = __decorate([
|
|
24
|
+
(0, common_1.Catch)()
|
|
25
|
+
], RequestAbortedFilter);
|
|
26
|
+
//# sourceMappingURL=request-aborted.filter.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"request-aborted.filter.js","sourceRoot":"","sources":["../../../../src/modules/nest/exceptions/request-aborted.filter.ts"],"names":[],"mappings":";;;;;;;;;AAAA,2CAAuE;AAMhE,IAAM,oBAAoB,GAA1B,MAAM,oBAAoB;IAC/B,KAAK,CAAC,SAAkB,EAAE,CAAgB;QACxC,IAAI,SAAS,YAAY,KAAK,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,SAAS,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAChD,IAAI,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;gBACxC,OAAO;YACT,CAAC;QACH,CAAC;QACD,MAAM,SAAS,CAAC;IAClB,CAAC;CACF,CAAA;AAVY,oDAAoB;+BAApB,oBAAoB;IADhC,IAAA,cAAK,GAAE;GACK,oBAAoB,CAUhC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const request_aborted_filter_1 = require("./request-aborted.filter");
|
|
4
|
+
describe('RequestAbortedFilter', () => {
|
|
5
|
+
const filter = new request_aborted_filter_1.RequestAbortedFilter();
|
|
6
|
+
const host = {};
|
|
7
|
+
it('should intercept the request aborted error', () => {
|
|
8
|
+
const error = new Error('request aborted');
|
|
9
|
+
expect(() => filter.catch(error, host)).not.toThrow();
|
|
10
|
+
});
|
|
11
|
+
it('should rethrow other errors', () => {
|
|
12
|
+
const error = new Error('some other error');
|
|
13
|
+
expect(() => filter.catch(error, host)).toThrow(error);
|
|
14
|
+
});
|
|
15
|
+
it('should rethrow non-Error exceptions', () => {
|
|
16
|
+
const value = { foo: 'bar' };
|
|
17
|
+
try {
|
|
18
|
+
filter.catch(value, host);
|
|
19
|
+
fail('Expected exception to be thrown');
|
|
20
|
+
}
|
|
21
|
+
catch (err) {
|
|
22
|
+
expect(err).toBe(value);
|
|
23
|
+
}
|
|
24
|
+
});
|
|
25
|
+
});
|
|
26
|
+
//# sourceMappingURL=request-aborted.filter.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"request-aborted.filter.spec.js","sourceRoot":"","sources":["../../../../src/modules/nest/exceptions/request-aborted.filter.spec.ts"],"names":[],"mappings":";;AACA,qEAAgE;AAEhE,QAAQ,CAAC,sBAAsB,EAAE,GAAG,EAAE;IACpC,MAAM,MAAM,GAAG,IAAI,6CAAoB,EAAE,CAAC;IAC1C,MAAM,IAAI,GAAG,EAAmB,CAAC;IAEjC,EAAE,CAAC,4CAA4C,EAAE,GAAG,EAAE;QACpD,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,iBAAiB,CAAC,CAAC;QAC3C,MAAM,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;IACxD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,6BAA6B,EAAE,GAAG,EAAE;QACrC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QAC5C,MAAM,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,qCAAqC,EAAE,GAAG,EAAE;QAC7C,MAAM,KAAK,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC7B,IAAI,CAAC;YACH,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAC1B,IAAI,CAAC,iCAAiC,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.UnsupportedEncodingFilter = void 0;
|
|
10
|
+
const common_1 = require("@nestjs/common");
|
|
11
|
+
let UnsupportedEncodingFilter = class UnsupportedEncodingFilter {
|
|
12
|
+
catch(exception, host) {
|
|
13
|
+
if (exception instanceof Error) {
|
|
14
|
+
const message = exception?.message || '';
|
|
15
|
+
if (message.includes('unsupported content encoding')) {
|
|
16
|
+
const ctx = host.switchToHttp();
|
|
17
|
+
const response = ctx.getResponse();
|
|
18
|
+
return response.status(400).json({
|
|
19
|
+
error: 'Invalid content encoding',
|
|
20
|
+
message: 'The request used an unsupported content encoding.',
|
|
21
|
+
});
|
|
22
|
+
}
|
|
23
|
+
}
|
|
24
|
+
throw exception;
|
|
25
|
+
}
|
|
26
|
+
};
|
|
27
|
+
exports.UnsupportedEncodingFilter = UnsupportedEncodingFilter;
|
|
28
|
+
exports.UnsupportedEncodingFilter = UnsupportedEncodingFilter = __decorate([
|
|
29
|
+
(0, common_1.Catch)()
|
|
30
|
+
], UnsupportedEncodingFilter);
|
|
31
|
+
//# sourceMappingURL=unsupported-encoding.filter.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unsupported-encoding.filter.js","sourceRoot":"","sources":["../../../../src/modules/nest/exceptions/unsupported-encoding.filter.ts"],"names":[],"mappings":";;;;;;;;;AAAA,2CAAuE;AAMhE,IAAM,yBAAyB,GAA/B,MAAM,yBAAyB;IACpC,KAAK,CAAC,SAAkB,EAAE,IAAmB;QAC3C,IAAI,SAAS,YAAY,KAAK,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,SAAS,EAAE,OAAO,IAAI,EAAE,CAAC;YACzC,IAAI,OAAO,CAAC,QAAQ,CAAC,8BAA8B,CAAC,EAAE,CAAC;gBACrD,MAAM,GAAG,GAAG,IAAI,CAAC,YAAY,EAAE,CAAC;gBAChC,MAAM,QAAQ,GAAG,GAAG,CAAC,WAAW,EAAE,CAAC;gBACnC,OAAO,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;oBAC/B,KAAK,EAAE,0BAA0B;oBACjC,OAAO,EAAE,mDAAmD;iBAC7D,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QACD,MAAM,SAAS,CAAC;IAClB,CAAC;CACF,CAAA;AAfY,8DAAyB;oCAAzB,yBAAyB;IADrC,IAAA,cAAK,GAAE;GACK,yBAAyB,CAerC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const unsupported_encoding_filter_1 = require("./unsupported-encoding.filter");
|
|
4
|
+
describe('UnsupportedEncodingFilter', () => {
|
|
5
|
+
const filter = new unsupported_encoding_filter_1.UnsupportedEncodingFilter();
|
|
6
|
+
function createMockHost() {
|
|
7
|
+
const json = jest.fn();
|
|
8
|
+
const status = jest.fn(() => ({ json }));
|
|
9
|
+
const getResponse = jest.fn(() => ({ status }));
|
|
10
|
+
const host = {
|
|
11
|
+
switchToHttp: (() => ({
|
|
12
|
+
getResponse,
|
|
13
|
+
})),
|
|
14
|
+
getArgs: (() => []),
|
|
15
|
+
getArgByIndex: (() => undefined),
|
|
16
|
+
switchToRpc: () => ({}),
|
|
17
|
+
switchToWs: () => ({}),
|
|
18
|
+
getType: (() => 'http'),
|
|
19
|
+
};
|
|
20
|
+
return { host, status, json };
|
|
21
|
+
}
|
|
22
|
+
it('should intercept the unsupported encoding error and return 400', () => {
|
|
23
|
+
const { host, status, json } = createMockHost();
|
|
24
|
+
const error = new Error('unsupported content encoding "chunked"');
|
|
25
|
+
filter.catch(error, host);
|
|
26
|
+
expect(status).toHaveBeenCalledWith(400);
|
|
27
|
+
expect(json).toHaveBeenCalledWith({
|
|
28
|
+
error: 'Invalid content encoding',
|
|
29
|
+
message: 'The request used an unsupported content encoding.',
|
|
30
|
+
});
|
|
31
|
+
});
|
|
32
|
+
it('should rethrow other errors', () => {
|
|
33
|
+
const { host } = createMockHost();
|
|
34
|
+
const error = new Error('some other error');
|
|
35
|
+
expect(() => filter.catch(error, host)).toThrow(error);
|
|
36
|
+
});
|
|
37
|
+
it('should rethrow non-Error exceptions', () => {
|
|
38
|
+
const { host } = createMockHost();
|
|
39
|
+
const value = { foo: 'bar' };
|
|
40
|
+
try {
|
|
41
|
+
filter.catch(value, host);
|
|
42
|
+
fail('Expected exception to be thrown');
|
|
43
|
+
}
|
|
44
|
+
catch (err) {
|
|
45
|
+
expect(err).toBe(value);
|
|
46
|
+
}
|
|
47
|
+
});
|
|
48
|
+
});
|
|
49
|
+
//# sourceMappingURL=unsupported-encoding.filter.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unsupported-encoding.filter.spec.js","sourceRoot":"","sources":["../../../../src/modules/nest/exceptions/unsupported-encoding.filter.spec.ts"],"names":[],"mappings":";;AAEA,+EAA0E;AAE1E,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE;IACzC,MAAM,MAAM,GAAG,IAAI,uDAAyB,EAAE,CAAC;IAE/C,SAAS,cAAc;QACrB,MAAM,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAEhD,MAAM,IAAI,GAAkB;YAC1B,YAAY,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC;gBACpB,WAAW;aACZ,CAAC,CAA6C;YAC/C,OAAO,EAAE,CAAC,GAAG,EAAE,CAAC,EAAE,CAA6B;YAC/C,aAAa,EAAE,CAAC,GAAG,EAAE,CAAC,SAAS,CAAmC;YAClE,WAAW,EAAE,GAAG,EAAE,CAAC,CAAC,EAAuB,CAAA;YAC3C,UAAU,EAAE,GAAG,EAAE,CAAC,CAAC,EAAsB,CAAA;YACzC,OAAO,EAAE,CAAC,GAAG,EAAE,CAAC,MAAM,CAA6B;SACpD,CAAC;QAEF,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC;IAChC,CAAC;IAED,EAAE,CAAC,gEAAgE,EAAE,GAAG,EAAE;QACxE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAChD,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAClE,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAE1B,MAAM,CAAC,MAAM,CAAC,CAAC,oBAAoB,CAAC,GAAG,CAAC,CAAC;QACzC,MAAM,CAAC,IAAI,CAAC,CAAC,oBAAoB,CAAC;YAChC,KAAK,EAAE,0BAA0B;YACjC,OAAO,EAAE,mDAAmD;SAC7D,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,6BAA6B,EAAE,GAAG,EAAE;QACrC,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAClC,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QAE5C,MAAM,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,qCAAqC,EAAE,GAAG,EAAE;QAC7C,MAAM,EAAE,IAAI,EAAE,GAAG,cAAc,EAAE,CAAC;QAClC,MAAM,KAAK,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAE7B,IAAI,CAAC;YACH,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAC1B,IAAI,CAAC,iCAAiC,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -15,8 +15,8 @@ const axios_1 = require("@nestjs/axios");
|
|
|
15
15
|
const common_1 = require("@nestjs/common");
|
|
16
16
|
const axios_2 = require("axios");
|
|
17
17
|
let NovoHttpService = NovoHttpService_1 = class NovoHttpService extends axios_1.HttpService {
|
|
18
|
-
constructor() {
|
|
19
|
-
super();
|
|
18
|
+
constructor(axiosRef = axios_2.default.create()) {
|
|
19
|
+
super(axiosRef);
|
|
20
20
|
this.logger = new common_1.Logger(NovoHttpService_1.name);
|
|
21
21
|
super.axiosRef.interceptors.response.use(undefined, async (err) => {
|
|
22
22
|
const { config, message } = err;
|
|
@@ -42,6 +42,6 @@ let NovoHttpService = NovoHttpService_1 = class NovoHttpService extends axios_1.
|
|
|
42
42
|
exports.NovoHttpService = NovoHttpService;
|
|
43
43
|
exports.NovoHttpService = NovoHttpService = NovoHttpService_1 = __decorate([
|
|
44
44
|
(0, common_1.Injectable)(),
|
|
45
|
-
__metadata("design:paramtypes", [])
|
|
45
|
+
__metadata("design:paramtypes", [Object])
|
|
46
46
|
], NovoHttpService);
|
|
47
47
|
//# sourceMappingURL=http.service.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"http.service.js","sourceRoot":"","sources":["../../../../src/modules/nest/http/http.service.ts"],"names":[],"mappings":";;;;;;;;;;;;;AAAA,yCAA4C;AAC5C,2CAAoD;AACpD,iCAA4C;AAGrC,IAAM,eAAe,uBAArB,MAAM,eAAgB,SAAQ,mBAAW;IAG9C;
|
|
1
|
+
{"version":3,"file":"http.service.js","sourceRoot":"","sources":["../../../../src/modules/nest/http/http.service.ts"],"names":[],"mappings":";;;;;;;;;;;;;AAAA,yCAA4C;AAC5C,2CAAoD;AACpD,iCAA4C;AAGrC,IAAM,eAAe,uBAArB,MAAM,eAAgB,SAAQ,mBAAW;IAG9C,YAAY,QAAQ,GAAG,eAAK,CAAC,MAAM,EAAE;QACnC,KAAK,CAAC,QAAQ,CAAC,CAAC;QAHD,WAAM,GAAW,IAAI,eAAM,CAAC,iBAAe,CAAC,IAAI,CAAC,CAAC;QAKjE,KAAK,CAAC,QAAQ,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,SAAS,EAAE,KAAK,EAAE,GAAG,EAAyB,EAAE;YACvF,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,GAAG,CAAC;YAChC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,CAAC;gBACnB,OAAO,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;YACxC,CAAC;YAGD,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,gBAAgB,CAAC,EAAE,CAAC;gBACxG,OAAO,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;YACxC,CAAC;YACD,MAAM,CAAC,KAAK,IAAI,CAAC,CAAC;YAClB,MAAM,iBAAiB,GAAG,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;gBACtD,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,CAAC,GAAG,CAAC,CAAC;oBAClD,OAAO,EAAE,CAAC;gBACZ,CAAC,EAAE,MAAM,CAAC,UAAU,IAAI,GAAG,CAAC,CAAC;YAC/B,CAAC,CAAC,CAAC;YACH,MAAM,iBAAiB,CAAC;YACxB,OAAO,IAAA,eAAK,EAAC,MAAM,CAAC,CAAC;QACvB,CAAC,CAAC,CAAC;QAGH,KAAK,CAAC,QAAQ,CAAC,YAAY,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC,EAAE,UAAU,EAAE,GAAG,EAAE,GAAG,MAAM,EAAE,CAAC,CAAC,CAAC;IAClG,CAAC;CACF,CAAA;AA9BY,0CAAe;0BAAf,eAAe;IAD3B,IAAA,mBAAU,GAAE;;GACA,eAAe,CA8B3B"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const common_1 = require("@nestjs/common");
|
|
4
|
+
const axios_1 = require("axios");
|
|
5
|
+
const http_service_1 = require("./http.service");
|
|
6
|
+
jest.mock('axios');
|
|
7
|
+
describe('NovoHttpService', () => {
|
|
8
|
+
let service;
|
|
9
|
+
let mockAxiosInstance = {
|
|
10
|
+
interceptors: {
|
|
11
|
+
request: { use: jest.fn() },
|
|
12
|
+
response: { use: jest.fn() },
|
|
13
|
+
},
|
|
14
|
+
};
|
|
15
|
+
beforeEach(() => {
|
|
16
|
+
jest.clearAllMocks();
|
|
17
|
+
jest.useFakeTimers();
|
|
18
|
+
mockAxiosInstance = {
|
|
19
|
+
interceptors: {
|
|
20
|
+
request: { use: jest.fn() },
|
|
21
|
+
response: { use: jest.fn() },
|
|
22
|
+
},
|
|
23
|
+
};
|
|
24
|
+
axios_1.default.create.mockReturnValue(mockAxiosInstance);
|
|
25
|
+
service = new http_service_1.NovoHttpService(mockAxiosInstance);
|
|
26
|
+
});
|
|
27
|
+
it('registers a request interceptor with default retry config', () => {
|
|
28
|
+
expect(mockAxiosInstance.interceptors.request.use).toHaveBeenCalledWith(expect.any(Function));
|
|
29
|
+
const interceptorFn = mockAxiosInstance.interceptors.request.use.mock.calls[0][0];
|
|
30
|
+
const config = { url: '/test' };
|
|
31
|
+
const result = interceptorFn(config);
|
|
32
|
+
expect(result.retry).toBe(2);
|
|
33
|
+
expect(result.retryDelay).toBe(100);
|
|
34
|
+
expect(result.url).toBe('/test');
|
|
35
|
+
});
|
|
36
|
+
it('registers a response interceptor', () => {
|
|
37
|
+
expect(mockAxiosInstance.interceptors.response.use).toHaveBeenCalledWith(undefined, expect.any(Function));
|
|
38
|
+
});
|
|
39
|
+
it('retries on 503 error and logs a warning', async () => {
|
|
40
|
+
const retryInterceptor = mockAxiosInstance.interceptors.response.use.mock.calls[0][1];
|
|
41
|
+
const warnSpy = jest.spyOn(common_1.Logger.prototype, 'warn').mockImplementation();
|
|
42
|
+
const mockedAxios = axios_1.default;
|
|
43
|
+
mockedAxios.mockResolvedValueOnce({ data: 'ok' });
|
|
44
|
+
const error = {
|
|
45
|
+
config: { url: '/retry', retry: 1, retryDelay: 50 },
|
|
46
|
+
message: 'Request failed with status code 503',
|
|
47
|
+
};
|
|
48
|
+
const retryPromise = retryInterceptor(error);
|
|
49
|
+
jest.advanceTimersByTime(50);
|
|
50
|
+
await retryPromise;
|
|
51
|
+
expect(warnSpy).toHaveBeenCalledWith('Retry the request', '/retry');
|
|
52
|
+
expect(mockedAxios).toHaveBeenCalledWith(expect.objectContaining({ url: '/retry' }));
|
|
53
|
+
});
|
|
54
|
+
it('fails immediately if retry config is missing', async () => {
|
|
55
|
+
const retryInterceptor = mockAxiosInstance.interceptors.response.use.mock.calls[0][1];
|
|
56
|
+
const error = { config: undefined, message: '503 Service Unavailable' };
|
|
57
|
+
await expect(retryInterceptor(error)).rejects.toThrow();
|
|
58
|
+
});
|
|
59
|
+
it('fails immediately on non-retriable error', async () => {
|
|
60
|
+
const retryInterceptor = mockAxiosInstance.interceptors.response.use.mock.calls[0][1];
|
|
61
|
+
const error = {
|
|
62
|
+
config: { url: '/fail', retry: 1 },
|
|
63
|
+
message: 'Unexpected error',
|
|
64
|
+
};
|
|
65
|
+
await expect(retryInterceptor(error)).rejects.toThrow();
|
|
66
|
+
});
|
|
67
|
+
});
|
|
68
|
+
//# sourceMappingURL=http.service.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"http.service.spec.js","sourceRoot":"","sources":["../../../../src/modules/nest/http/http.service.spec.ts"],"names":[],"mappings":";;AAAA,2CAAwC;AACxC,iCAA6C;AAC7C,iDAAiD;AAEjD,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;AAEnB,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;IAE/B,IAAI,OAAwB,CAAC;IAC7B,IAAI,iBAAiB,GAAG;QACtB,YAAY,EAAE;YACZ,OAAO,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;YAC3B,QAAQ,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;SAC7B;KACF,CAAC;IAEF,UAAU,CAAC,GAAG,EAAE;QACd,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,IAAI,CAAC,aAAa,EAAE,CAAC;QAGrB,iBAAiB,GAAG;YAClB,YAAY,EAAE;gBACZ,OAAO,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;gBAC3B,QAAQ,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;aAC7B;SACF,CAAC;QAGD,eAAK,CAAC,MAAoB,CAAC,eAAe,CAAC,iBAAiB,CAAC,CAAC;QAC/D,OAAO,GAAG,IAAI,8BAAe,CAAC,iBAA6C,CAAC,CAAC;IAC/E,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,2DAA2D,EAAE,GAAG,EAAE;QAEnE,MAAM,CAAC,iBAAiB,CAAC,YAAY,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC;QAE9F,MAAM,aAAa,GAAG,iBAAiB,CAAC,YAAY,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAClF,MAAM,MAAM,GAAG,EAAE,GAAG,EAAE,OAAO,EAAE,CAAC;QAChC,MAAM,MAAM,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QAErC,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC7B,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACpC,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IACnC,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,kCAAkC,EAAE,GAAG,EAAE;QAE1C,MAAM,CAAC,iBAAiB,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,oBAAoB,CAAC,SAAS,EAAE,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC5G,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;QAEvD,MAAM,gBAAgB,GAAG,iBAAiB,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACtF,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,eAAM,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC,kBAAkB,EAAE,CAAC;QAC1E,MAAM,WAAW,GAAG,eAA0C,CAAC;QAC/D,WAAW,CAAC,qBAAqB,CAAC,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC;QAElD,MAAM,KAAK,GAAG;YACZ,MAAM,EAAE,EAAE,GAAG,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC,EAAE,UAAU,EAAE,EAAE,EAAE;YACnD,OAAO,EAAE,qCAAqC;SAC/C,CAAC;QAEF,MAAM,YAAY,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAC7C,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC,CAAC;QAC7B,MAAM,YAAY,CAAC;QAEnB,MAAM,CAAC,OAAO,CAAC,CAAC,oBAAoB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,QAAQ,EAAE,CAAC,CAAC,CAAC;IACvF,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;QAE5D,MAAM,gBAAgB,GAAG,iBAAiB,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACtF,MAAM,KAAK,GAAG,EAAE,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,yBAAyB,EAAE,CAAC;QAExE,MAAM,MAAM,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;IAC1D,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,0CAA0C,EAAE,KAAK,IAAI,EAAE;QAExD,MAAM,gBAAgB,GAAG,iBAAiB,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACtF,MAAM,KAAK,GAAG;YACZ,MAAM,EAAE,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,EAAE;YAClC,OAAO,EAAE,kBAAkB;SAC5B,CAAC;QAEF,MAAM,MAAM,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;IAC1D,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"has-permission.guard.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/has-permission.guard.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,2CAA8D;AAC9D,uCAAyC;AACzC,+CAA6C;AAI7C,6EAAoE;AAG7D,IAAM,kBAAkB,GAAxB,MAAM,kBAAmB,SAAQ,IAAA,oBAAS,EAAC,gBAAgB,CAAC;IAGjE;QACE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;IACnC,CAAC;IAED,WAAW,CAAC,OAAyB;QACnC,MAAM,mBAAmB,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAmB,qCAAc,EAAE,OAAO,CAAC,UAAU,EAAE,CAAC,CAAC;QACvG,IAAI,CAAC,mBAAmB,EAAE,CAAC;YACzB,OAAO,IAAI,CAAC;QACd,CAAC;QACD,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,YAAY,EAAE,CAAC,UAAU,
|
|
1
|
+
{"version":3,"file":"has-permission.guard.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/has-permission.guard.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,2CAA8D;AAC9D,uCAAyC;AACzC,+CAA6C;AAI7C,6EAAoE;AAG7D,IAAM,kBAAkB,GAAxB,MAAM,kBAAmB,SAAQ,IAAA,oBAAS,EAAC,gBAAgB,CAAC;IAGjE;QACE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;IACnC,CAAC;IAED,WAAW,CAAC,OAAyB;QACnC,MAAM,mBAAmB,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAmB,qCAAc,EAAE,OAAO,CAAC,UAAU,EAAE,CAAC,CAAC;QACvG,IAAI,CAAC,mBAAmB,EAAE,CAAC;YACzB,OAAO,IAAI,CAAC;QACd,CAAC;QACD,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,YAAY,EAAE,CAAC,UAAU,EAAwB,CAAC;QAC3E,MAAM,eAAe,GAAG,IAAI,EAAE,WAAW,CAAC;QAC1C,IAAI,eAAe,IAAI,IAAI,EAAE,CAAC;YAC5B,OAAO,KAAK,CAAC;QACf,CAAC;QACD,OAAO,mBAAmB,CAAC,IAAI,CAAC,CAAC,UAAU,EAAE,EAAE,CAAC,eAAe,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,CAAC;IACxF,CAAC;CACF,CAAA;AApBY,gDAAkB;6BAAlB,kBAAkB;IAD9B,IAAA,mBAAU,GAAE;;GACA,kBAAkB,CAoB9B"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,55 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const core_1 = require("@nestjs/core");
|
|
4
|
+
const novo_sdk_1 = require("@novo-learning/novo-sdk");
|
|
5
|
+
const permission_decorator_1 = require("../decorators/permission.decorator");
|
|
6
|
+
const has_permission_guard_1 = require("./has-permission.guard");
|
|
7
|
+
describe('HasPermissionGuard', () => {
|
|
8
|
+
let guard;
|
|
9
|
+
let reflector;
|
|
10
|
+
const handler = () => {
|
|
11
|
+
};
|
|
12
|
+
beforeEach(() => {
|
|
13
|
+
guard = new has_permission_guard_1.HasPermissionGuard();
|
|
14
|
+
reflector = guard.reflector;
|
|
15
|
+
});
|
|
16
|
+
function mockContext(handler, user) {
|
|
17
|
+
return {
|
|
18
|
+
switchToHttp: () => ({
|
|
19
|
+
getRequest: () => ({ user }),
|
|
20
|
+
}),
|
|
21
|
+
getHandler: () => handler,
|
|
22
|
+
};
|
|
23
|
+
}
|
|
24
|
+
it('returns true if no required permissions are set', () => {
|
|
25
|
+
jest.spyOn(reflector, 'get').mockReturnValue(undefined);
|
|
26
|
+
const context = mockContext(handler);
|
|
27
|
+
expect(guard.canActivate(context)).toBe(true);
|
|
28
|
+
});
|
|
29
|
+
it('returns false if user has no permissions', () => {
|
|
30
|
+
jest.spyOn(reflector, 'get').mockReturnValue([novo_sdk_1.PermissionType.attempt_read_audio]);
|
|
31
|
+
const context = mockContext(handler, { permissions: undefined });
|
|
32
|
+
expect(guard.canActivate(context)).toBe(false);
|
|
33
|
+
});
|
|
34
|
+
it('returns true if user has required permission', () => {
|
|
35
|
+
jest.spyOn(reflector, 'get').mockReturnValue([novo_sdk_1.PermissionType.attempt_read_audio]);
|
|
36
|
+
const context = mockContext(handler, { permissions: [novo_sdk_1.PermissionType.attempt_read_audio] });
|
|
37
|
+
expect(guard.canActivate(context)).toBe(true);
|
|
38
|
+
});
|
|
39
|
+
it('returns false if user lacks required permission', () => {
|
|
40
|
+
jest.spyOn(reflector, 'get').mockReturnValue([novo_sdk_1.PermissionType.attempt_read_result]);
|
|
41
|
+
const context = mockContext(handler, { permissions: [novo_sdk_1.PermissionType.attempt_read_audio] });
|
|
42
|
+
expect(guard.canActivate(context)).toBe(false);
|
|
43
|
+
});
|
|
44
|
+
});
|
|
45
|
+
describe('HasPermission decorator', () => {
|
|
46
|
+
it('sets metadata on a function', () => {
|
|
47
|
+
const testFn = () => {
|
|
48
|
+
};
|
|
49
|
+
(0, permission_decorator_1.HasPermission)(novo_sdk_1.PermissionType.attempt_read_result, novo_sdk_1.PermissionType.attempt_read_audio)(testFn);
|
|
50
|
+
const reflector = new core_1.Reflector();
|
|
51
|
+
const metadata = reflector.get(permission_decorator_1.HAS_PERMISSION, testFn);
|
|
52
|
+
expect(metadata).toEqual([novo_sdk_1.PermissionType.attempt_read_result, novo_sdk_1.PermissionType.attempt_read_audio]);
|
|
53
|
+
});
|
|
54
|
+
});
|
|
55
|
+
//# sourceMappingURL=has-permission.guard.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"has-permission.guard.spec.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/has-permission.guard.spec.ts"],"names":[],"mappings":";;AACA,uCAAyC;AACzC,sDAAyD;AACzD,6EAAmF;AACnF,iEAA4D;AAE5D,QAAQ,CAAC,oBAAoB,EAAE,GAAG,EAAE;IAClC,IAAI,KAAyB,CAAC;IAC9B,IAAI,SAAoB,CAAC;IAEzB,MAAM,OAAO,GAAG,GAAS,EAAE;IAE3B,CAAC,CAAC;IAEF,UAAU,CAAC,GAAG,EAAE;QACd,KAAK,GAAG,IAAI,yCAAkB,EAAE,CAAC;QACjC,SAAS,GAAI,KAAa,CAAC,SAAS,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,SAAS,WAAW,CAAC,OAAmB,EAAE,IAAyC;QACjF,OAAO;YACL,YAAY,EAAE,GAAG,EAAE,CAAC,CAAC;gBACnB,UAAU,EAAE,GAAG,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC;aAC7B,CAAC;YACF,UAAU,EAAE,GAAG,EAAE,CAAC,OAAO;SACK,CAAC;IACnC,CAAC;IAED,EAAE,CAAC,iDAAiD,EAAE,GAAG,EAAE;QACzD,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,eAAe,CAAC,SAAS,CAAC,CAAC;QAExD,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,CAAC,CAAC;QACrC,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAChD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,0CAA0C,EAAE,GAAG,EAAE;QAClD,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,eAAe,CAAC,CAAC,yBAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC;QAElF,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC,CAAC;QACjE,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACjD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,8CAA8C,EAAE,GAAG,EAAE;QACtD,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,eAAe,CAAC,CAAC,yBAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC;QAElF,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,CAAC,yBAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;QAC3F,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAChD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,iDAAiD,EAAE,GAAG,EAAE;QACzD,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,eAAe,CAAC,CAAC,yBAAc,CAAC,mBAAmB,CAAC,CAAC,CAAC;QAEnF,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,CAAC,yBAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;QAC3F,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACjD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;IACvC,EAAE,CAAC,6BAA6B,EAAE,GAAG,EAAE;QACrC,MAAM,MAAM,GAAG,GAAS,EAAE;QAE1B,CAAC,CAAC;QACF,IAAA,oCAAa,EAAC,yBAAc,CAAC,mBAAmB,EAAE,yBAAc,CAAC,kBAAkB,CAAC,CAAC,MAAM,CAAC,CAAC;QAE7F,MAAM,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;QAClC,MAAM,QAAQ,GAAG,SAAS,CAAC,GAAG,CAAmB,qCAAc,EAAE,MAAM,CAAC,CAAC;QAEzE,MAAM,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,yBAAc,CAAC,mBAAmB,EAAE,yBAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC;IACpG,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"jwt-auth.guard.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/jwt-auth.guard.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,2CAA8D;AAC9D,uCAAyC;AACzC,+CAA6C;AAC7C,+BAAwC;AACxC,qEAA+D;AAGxD,IAAM,YAAY,GAAlB,MAAM,YAAa,SAAQ,IAAA,oBAAS,EAAC,KAAK,CAAC;IAGhD;QACE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;IACnC,CAAC;IAED,KAAK,CAAC,WAAW,CAAC,OAAyB;QACzC,MAAM,QAAQ,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAU,gCAAa,EAAE;YACxE,OAAO,CAAC,UAAU,EAAE;YACpB,OAAO,CAAC,QAAQ,EAAE;SACnB,CAAC,CAAC;QACH,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;YACjD,IAAI,aAAa,YAAY,iBAAU,EAAE,CAAC;gBACxC,OAAO,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;oBACnC,aAAa,CAAC,IAAI,CAAC,IAAA,WAAI,EAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,IAAI,QAAQ,CAAC,CAAC,CAAC;gBAC/E,CAAC,CAAC,CAAC;YACL,CAAC;YACD,OAAO,CAAC,MAAM,aAAa,CAAC,IAAI,QAAQ,CAAC;QAC3C,CAAC;QAAC,
|
|
1
|
+
{"version":3,"file":"jwt-auth.guard.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/jwt-auth.guard.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,2CAA8D;AAC9D,uCAAyC;AACzC,+CAA6C;AAC7C,+BAAwC;AACxC,qEAA+D;AAGxD,IAAM,YAAY,GAAlB,MAAM,YAAa,SAAQ,IAAA,oBAAS,EAAC,KAAK,CAAC;IAGhD;QACE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;IACnC,CAAC;IAED,KAAK,CAAC,WAAW,CAAC,OAAyB;QACzC,MAAM,QAAQ,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAU,gCAAa,EAAE;YACxE,OAAO,CAAC,UAAU,EAAE;YACpB,OAAO,CAAC,QAAQ,EAAE;SACnB,CAAC,CAAC;QACH,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;YACjD,IAAI,aAAa,YAAY,iBAAU,EAAE,CAAC;gBACxC,OAAO,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;oBACnC,aAAa,CAAC,IAAI,CAAC,IAAA,WAAI,EAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,IAAI,QAAQ,CAAC,CAAC,CAAC;gBAC/E,CAAC,CAAC,CAAC;YACL,CAAC;YACD,OAAO,CAAC,MAAM,aAAa,CAAC,IAAI,QAAQ,CAAC;QAC3C,CAAC;QAAC,MAAM,CAAC;YACP,OAAO,QAAQ,CAAC;QAClB,CAAC;IACH,CAAC;CACF,CAAA;AAzBY,oCAAY;uBAAZ,YAAY;IADxB,IAAA,mBAAU,GAAE;;GACA,YAAY,CAyBxB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const core_1 = require("@nestjs/core");
|
|
4
|
+
const rxjs_1 = require("rxjs");
|
|
5
|
+
const public_decorator_1 = require("../decorators/public.decorator");
|
|
6
|
+
const jwt_auth_guard_1 = require("./jwt-auth.guard");
|
|
7
|
+
describe('JwtAuthGuard', () => {
|
|
8
|
+
let guard;
|
|
9
|
+
let reflector;
|
|
10
|
+
const noop = () => {
|
|
11
|
+
};
|
|
12
|
+
beforeEach(() => {
|
|
13
|
+
guard = new jwt_auth_guard_1.JwtAuthGuard();
|
|
14
|
+
reflector = guard.reflector;
|
|
15
|
+
});
|
|
16
|
+
function mockContext(handler = noop, clazz = noop, user) {
|
|
17
|
+
return {
|
|
18
|
+
switchToHttp: () => ({
|
|
19
|
+
getRequest: () => ({ user }),
|
|
20
|
+
}),
|
|
21
|
+
getHandler: () => handler,
|
|
22
|
+
getClass: () => clazz,
|
|
23
|
+
};
|
|
24
|
+
}
|
|
25
|
+
it('returns true when super.canActivate resolves true', async () => {
|
|
26
|
+
jest.spyOn(reflector, 'getAllAndOverride').mockReturnValue(false);
|
|
27
|
+
guard.__proto__.__proto__.canActivate = jest.fn().mockResolvedValue(Promise.resolve(true));
|
|
28
|
+
const context = mockContext(noop);
|
|
29
|
+
expect(await guard.canActivate(context)).toBe(true);
|
|
30
|
+
});
|
|
31
|
+
it('returns false when super.canActivate resolves false and not public', async () => {
|
|
32
|
+
jest.spyOn(reflector, 'getAllAndOverride').mockReturnValue(false);
|
|
33
|
+
guard.__proto__.__proto__.canActivate = jest.fn().mockResolvedValue(false);
|
|
34
|
+
const context = mockContext(noop);
|
|
35
|
+
expect(await guard.canActivate(context)).toBe(false);
|
|
36
|
+
});
|
|
37
|
+
it('returns true when route is public even if super.canActivate fails', async () => {
|
|
38
|
+
jest.spyOn(reflector, 'getAllAndOverride').mockReturnValue(true);
|
|
39
|
+
guard.__proto__.__proto__.canActivate = jest.fn().mockImplementation(() => {
|
|
40
|
+
throw new Error('Auth failed');
|
|
41
|
+
});
|
|
42
|
+
const context = mockContext(noop);
|
|
43
|
+
expect(await guard.canActivate(context)).toBe(true);
|
|
44
|
+
});
|
|
45
|
+
it('handles Observable from super.canActivate', async () => {
|
|
46
|
+
jest.spyOn(reflector, 'getAllAndOverride').mockReturnValue(false);
|
|
47
|
+
guard.__proto__.__proto__.canActivate = jest.fn().mockReturnValue((0, rxjs_1.of)(true));
|
|
48
|
+
const context = mockContext(noop);
|
|
49
|
+
expect(await guard.canActivate(context)).toBe(true);
|
|
50
|
+
});
|
|
51
|
+
it('returns true if Observable resolves false but route is public', async () => {
|
|
52
|
+
jest.spyOn(reflector, 'getAllAndOverride').mockReturnValue(true);
|
|
53
|
+
guard.__proto__.__proto__.canActivate = jest.fn().mockReturnValue((0, rxjs_1.of)(false));
|
|
54
|
+
const context = mockContext(noop);
|
|
55
|
+
expect(await guard.canActivate(context)).toBe(true);
|
|
56
|
+
});
|
|
57
|
+
});
|
|
58
|
+
describe('Public decorator', () => {
|
|
59
|
+
it('sets metadata on a function', () => {
|
|
60
|
+
const testFn = () => {
|
|
61
|
+
};
|
|
62
|
+
(0, public_decorator_1.Public)()(testFn);
|
|
63
|
+
const reflector = new core_1.Reflector();
|
|
64
|
+
const metadata = reflector.get(public_decorator_1.IS_PUBLIC_KEY, testFn);
|
|
65
|
+
expect(metadata).toBe(true);
|
|
66
|
+
});
|
|
67
|
+
});
|
|
68
|
+
//# sourceMappingURL=jwt-auth.guard.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jwt-auth.guard.spec.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/guards/jwt-auth.guard.spec.ts"],"names":[],"mappings":";;AAEA,uCAAyC;AACzC,+BAA0B;AAC1B,qEAAuE;AACvE,qDAAgD;AAEhD,QAAQ,CAAC,cAAc,EAAE,GAAG,EAAE;IAC5B,IAAI,KAAmB,CAAC;IACxB,IAAI,SAAoB,CAAC;IAEzB,MAAM,IAAI,GAAG,GAAS,EAAE;IAExB,CAAC,CAAC;IAEF,UAAU,CAAC,GAAG,EAAE;QACd,KAAK,GAAG,IAAI,6BAAY,EAAE,CAAC;QAC3B,SAAS,GAAI,KAAa,CAAC,SAAS,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,SAAS,WAAW,CAAC,UAAsB,IAAI,EAAE,QAAoB,IAAI,EAAE,IAAc;QACvF,OAAO;YACL,YAAY,EAAE,GAAG,EAAE,CAAC,CAAC;gBACnB,UAAU,EAAE,GAAG,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC;aAC7B,CAAC;YACF,UAAU,EAAE,GAAG,EAAE,CAAC,OAAO;YACzB,QAAQ,EAAE,GAAG,EAAE,CAAC,KAAK;SACS,CAAC;IACnC,CAAC;IAED,EAAE,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;QACjE,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;QACjE,KAAa,CAAC,SAAS,CAAC,SAAS,CAAC,WAAW,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAEpG,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC;QAClC,MAAM,CAAC,MAAM,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;QACjE,KAAa,CAAC,SAAS,CAAC,SAAS,CAAC,WAAW,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAEpF,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC;QAClC,MAAM,CAAC,MAAM,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACvD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,mEAAmE,EAAE,KAAK,IAAI,EAAE;QACjF,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;QAChE,KAAa,CAAC,SAAS,CAAC,SAAS,CAAC,WAAW,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,kBAAkB,CAAC,GAAG,EAAE;YACjF,MAAM,IAAI,KAAK,CAAC,aAAa,CAAC,CAAC;QACjC,CAAC,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC;QAClC,MAAM,CAAC,MAAM,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;QACzD,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;QACjE,KAAa,CAAC,SAAS,CAAC,SAAS,CAAC,WAAW,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,IAAA,SAAE,EAAC,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC;QAClC,MAAM,CAAC,MAAM,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,+DAA+D,EAAE,KAAK,IAAI,EAAE;QAC7E,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;QAChE,KAAa,CAAC,SAAS,CAAC,SAAS,CAAC,WAAW,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,IAAA,SAAE,EAAC,KAAK,CAAC,CAAC,CAAC;QAEtF,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC;QAClC,MAAM,CAAC,MAAM,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,QAAQ,CAAC,kBAAkB,EAAE,GAAG,EAAE;IAChC,EAAE,CAAC,6BAA6B,EAAE,GAAG,EAAE;QACrC,MAAM,MAAM,GAAG,GAAS,EAAE;QAE1B,CAAC,CAAC;QACF,IAAA,yBAAM,GAAE,CAAC,MAAM,CAAC,CAAC;QAEjB,MAAM,SAAS,GAAG,IAAI,gBAAS,EAAE,CAAC;QAClC,MAAM,QAAQ,GAAG,SAAS,CAAC,GAAG,CAAU,gCAAa,EAAE,MAAM,CAAC,CAAC;QAE/D,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const jwt = require("jsonwebtoken");
|
|
4
|
+
const jwt_strategy_1 = require("./jwt.strategy");
|
|
5
|
+
describe('JwtStrategy', () => {
|
|
6
|
+
const secret = 'test-secret';
|
|
7
|
+
it('should be defined', () => {
|
|
8
|
+
const strategy = new jwt_strategy_1.JwtStrategy(secret);
|
|
9
|
+
expect(strategy).toBeDefined();
|
|
10
|
+
});
|
|
11
|
+
it('should validate a JWT using the configured extractor and secret', (done) => {
|
|
12
|
+
const strategy = new jwt_strategy_1.JwtStrategy(secret);
|
|
13
|
+
const payload = { userId: 123 };
|
|
14
|
+
const token = jwt.sign(payload, secret);
|
|
15
|
+
const req = {
|
|
16
|
+
headers: {
|
|
17
|
+
authorization: `Bearer ${token}`,
|
|
18
|
+
},
|
|
19
|
+
};
|
|
20
|
+
const passportStrategy = strategy;
|
|
21
|
+
passportStrategy.success = (user) => {
|
|
22
|
+
expect(user.userId).toEqual(payload.userId);
|
|
23
|
+
done();
|
|
24
|
+
};
|
|
25
|
+
passportStrategy.fail = (err) => {
|
|
26
|
+
done(err || new Error('Strategy failed unexpectedly'));
|
|
27
|
+
};
|
|
28
|
+
passportStrategy.error = (err) => {
|
|
29
|
+
done(err);
|
|
30
|
+
};
|
|
31
|
+
passportStrategy.authenticate(req);
|
|
32
|
+
});
|
|
33
|
+
it('should validate a real JWT using the provided secret', async () => {
|
|
34
|
+
const strategy = new jwt_strategy_1.JwtStrategy(secret);
|
|
35
|
+
const payload = { userId: '42', publisherId: 'zwijsen' };
|
|
36
|
+
const token = jwt.sign(payload, secret);
|
|
37
|
+
const decoded = jwt.verify(token, secret);
|
|
38
|
+
const validated = await strategy.validate(decoded);
|
|
39
|
+
expect(validated.userId).toEqual(payload.userId);
|
|
40
|
+
expect(validated.publisherId).toEqual(payload.publisherId);
|
|
41
|
+
});
|
|
42
|
+
it('validate() should return the payload unchanged', async () => {
|
|
43
|
+
const strategy = new jwt_strategy_1.JwtStrategy(secret);
|
|
44
|
+
const payload = { userId: '123', publisherId: 'zwijsen' };
|
|
45
|
+
await expect(strategy.validate(payload)).resolves.toEqual(payload);
|
|
46
|
+
});
|
|
47
|
+
});
|
|
48
|
+
//# sourceMappingURL=jwt.strategy.spec.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jwt.strategy.spec.js","sourceRoot":"","sources":["../../../../../src/modules/nest/jwt/strategies/jwt.strategy.spec.ts"],"names":[],"mappings":";;AACA,oCAAoC;AAEpC,iDAA6C;AAE7C,QAAQ,CAAC,aAAa,EAAE,GAAG,EAAE;IAC3B,MAAM,MAAM,GAAG,aAAa,CAAC;IAE7B,EAAE,CAAC,mBAAmB,EAAE,GAAG,EAAE;QAC3B,MAAM,QAAQ,GAAG,IAAI,0BAAW,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,CAAC,QAAQ,CAAC,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,iEAAiE,EAAE,CAAC,IAAI,EAAE,EAAE;QAC7E,MAAM,QAAQ,GAAG,IAAI,0BAAW,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,OAAO,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC;QAChC,MAAM,KAAK,GAAG,GAAG,CAAC,IAAI,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAGxC,MAAM,GAAG,GAAG;YACV,OAAO,EAAE;gBACP,aAAa,EAAE,UAAU,KAAK,EAAE;aACjC;SACF,CAAC;QAGF,MAAM,gBAAgB,GAAG,QAA+B,CAAC;QACzD,gBAAgB,CAAC,OAAO,GAAG,CAAC,IAAoB,EAAQ,EAAE;YACxD,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;YAC5C,IAAI,EAAE,CAAC;QACT,CAAC,CAAC;QACF,gBAAgB,CAAC,IAAI,GAAG,CAAC,GAAG,EAAQ,EAAE;YACpC,IAAI,CAAC,GAAG,IAAI,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC,CAAC;QACzD,CAAC,CAAC;QACF,gBAAgB,CAAC,KAAK,GAAG,CAAC,GAAG,EAAQ,EAAE;YACrC,IAAI,CAAC,GAAG,CAAC,CAAC;QACZ,CAAC,CAAC;QAEF,gBAAgB,CAAC,YAAY,CAAC,GAAU,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;QACpE,MAAM,QAAQ,GAAG,IAAI,0BAAW,CAAC,MAAM,CAAC,CAAC;QAEzC,MAAM,OAAO,GAAa,EAAE,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC;QACnE,MAAM,KAAK,GAAG,GAAG,CAAC,IAAI,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAExC,MAAM,OAAO,GAAG,GAAG,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC1C,MAAM,SAAS,GAAG,MAAM,QAAQ,CAAC,QAAQ,CAAC,OAAc,CAAC,CAAC;QAE1D,MAAM,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QACjD,MAAM,CAAC,SAAS,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IAC7D,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAC9D,MAAM,QAAQ,GAAG,IAAI,0BAAW,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,OAAO,GAAa,EAAE,MAAM,EAAE,KAAK,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC;QAEpE,MAAM,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;IACrE,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -28,7 +28,7 @@ let IsoLogger = IsoLogger_1 = class IsoLogger extends common_1.ConsoleLogger {
|
|
|
28
28
|
setLogLevel(logLevel) {
|
|
29
29
|
const logLevelIndex = logLevels.indexOf(logLevel);
|
|
30
30
|
if (logLevelIndex < 0) {
|
|
31
|
-
this.setLogLevels(logLevels.slice(0, logLevels.indexOf(defaultLevel)));
|
|
31
|
+
this.setLogLevels(logLevels.slice(0, logLevels.indexOf(defaultLevel) + 1));
|
|
32
32
|
this.warn(`Invalid log level '${logLevel}', using '${defaultLevel}'. Valid log levels are ${JSON.stringify(logLevels)}`, IsoLogger_1.name);
|
|
33
33
|
}
|
|
34
34
|
else {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"iso-logger.js","sourceRoot":"","sources":["../../../../src/modules/nest/logger/iso-logger.ts"],"names":[],"mappings":";;;;;;;;;;;;;AAAA,2CAAqE;AACrE,2CAA+C;AAG/C,MAAM,SAAS,GAAe,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC;AAC3E,MAAM,YAAY,GAAa,MAAM,CAAC;AAG/B,IAAM,SAAS,iBAAf,MAAM,SAAU,SAAQ,sBAAa;IAC1C,YAA6B,aAA4B;QACvD,KAAK,EAAE,CAAC;QADmB,kBAAa,GAAb,aAAa,CAAe;QAGvD,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAS,WAAW,EAAE,YAAY,CAAC,CAAC,WAAW,EAAc,CAAC;QACrG,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;IAC7B,CAAC;IAED,YAAY;QACV,OAAO,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;IAClC,CAAC;IAED,WAAW,CAAC,QAAkB;QAC5B,MAAM,aAAa,GAAG,SAAS,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;QAClD,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"iso-logger.js","sourceRoot":"","sources":["../../../../src/modules/nest/logger/iso-logger.ts"],"names":[],"mappings":";;;;;;;;;;;;;AAAA,2CAAqE;AACrE,2CAA+C;AAG/C,MAAM,SAAS,GAAe,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC;AAC3E,MAAM,YAAY,GAAa,MAAM,CAAC;AAG/B,IAAM,SAAS,iBAAf,MAAM,SAAU,SAAQ,sBAAa;IAC1C,YAA6B,aAA4B;QACvD,KAAK,EAAE,CAAC;QADmB,kBAAa,GAAb,aAAa,CAAe;QAGvD,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAS,WAAW,EAAE,YAAY,CAAC,CAAC,WAAW,EAAc,CAAC;QACrG,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;IAC7B,CAAC;IAED,YAAY;QACV,OAAO,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;IAClC,CAAC;IAED,WAAW,CAAC,QAAkB;QAC5B,MAAM,aAAa,GAAG,SAAS,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;QAClD,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,OAAO,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YAC3E,IAAI,CAAC,IAAI,CACP,sBAAsB,QAAQ,aAAa,YAAY,2BAA2B,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,EAC7G,WAAS,CAAC,IAAI,CACf,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,YAAY,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,aAAa,GAAG,CAAC,CAAC,CAAC,CAAC;QAC3D,CAAC;IACH,CAAC;CACF,CAAA;AAxBY,8BAAS;oBAAT,SAAS;IADrB,IAAA,mBAAU,GAAE;qCAEiC,sBAAa;GAD9C,SAAS,CAwBrB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|