Make user business logic reusable (#1114)

- Refactor user business logic from `user.service` into `user.domain`
  Make user business logic reusable by using `user.domain` from other services than `user.service`

- Add `jest-when` lib to make testing easier and use it in `userService`
  Using when helps from coupling tests to order of mock implementations execution

- Move all user business logic from user-repository to user.service

- Fix user.service tests not awaiting promises leaking state between tests

- Presentation logic for `getUserProfileImage` moved from UserService to UserController

- Fix `user.e2e` test logic. Pending fixing the configuration of the test itself
This commit is contained in:
Jaime Baez 2022-12-23 21:08:50 +01:00 committed by GitHub
parent bf921a41f9
commit 20c5578470
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
20 changed files with 577 additions and 972 deletions

View File

@ -17,6 +17,7 @@ describe('Album service', () => {
const authUser: AuthUserDto = Object.freeze({ const authUser: AuthUserDto = Object.freeze({
id: '1111', id: '1111',
email: 'auth@test.com', email: 'auth@test.com',
isAdmin: false,
}); });
const albumId = 'f19ab956-4761-41ea-a5d6-bae948308d58'; const albumId = 'f19ab956-4761-41ea-a5d6-bae948308d58';
const sharedAlbumOwnerId = '2222'; const sharedAlbumOwnerId = '2222';
@ -400,7 +401,7 @@ describe('Album service', () => {
albumRepositoryMock.get.mockImplementation(() => Promise.resolve<AlbumEntity>(albumEntity)); albumRepositoryMock.get.mockImplementation(() => Promise.resolve<AlbumEntity>(albumEntity));
albumRepositoryMock.addAssets.mockImplementation(() => Promise.resolve<AddAssetsResponseDto>(albumResponse)); albumRepositoryMock.addAssets.mockImplementation(() => Promise.resolve<AddAssetsResponseDto>(albumResponse));
expect( await expect(
sut.addAssetsToAlbum( sut.addAssetsToAlbum(
authUser, authUser,
{ {
@ -464,7 +465,7 @@ describe('Album service', () => {
albumRepositoryMock.get.mockImplementation(() => Promise.resolve<AlbumEntity>(albumEntity)); albumRepositoryMock.get.mockImplementation(() => Promise.resolve<AlbumEntity>(albumEntity));
albumRepositoryMock.addAssets.mockImplementation(() => Promise.resolve<AddAssetsResponseDto>(albumResponse)); albumRepositoryMock.addAssets.mockImplementation(() => Promise.resolve<AddAssetsResponseDto>(albumResponse));
expect( await expect(
sut.removeAssetsFromAlbum( sut.removeAssetsFromAlbum(
authUser, authUser,
{ {

View File

@ -27,6 +27,7 @@ describe('AssetService', () => {
const authUser: AuthUserDto = Object.freeze({ const authUser: AuthUserDto = Object.freeze({
id: 'user_id_1', id: 'user_id_1',
email: 'auth@test.com', email: 'auth@test.com',
isAdmin: false,
}); });
const _getCreateAssetDto = (): CreateAssetDto => { const _getCreateAssetDto = (): CreateAssetDto => {

View File

@ -19,17 +19,22 @@ import { AdminSignupResponseDto, mapAdminSignupResponse } from './response-dto/a
import { LoginResponseDto } from './response-dto/login-response.dto'; import { LoginResponseDto } from './response-dto/login-response.dto';
import { LogoutResponseDto } from './response-dto/logout-response.dto'; import { LogoutResponseDto } from './response-dto/logout-response.dto';
import { OAuthService } from '../oauth/oauth.service'; import { OAuthService } from '../oauth/oauth.service';
import { UserCore } from '../user/user.core';
@Injectable() @Injectable()
export class AuthService { export class AuthService {
private userCore: UserCore;
constructor( constructor(
private oauthService: OAuthService, private oauthService: OAuthService,
private immichJwtService: ImmichJwtService, private immichJwtService: ImmichJwtService,
@Inject(USER_REPOSITORY) private userRepository: IUserRepository, @Inject(USER_REPOSITORY) userRepository: IUserRepository,
) {} ) {
this.userCore = new UserCore(userRepository);
}
public async login(loginCredential: LoginCredentialDto, clientIp: string): Promise<LoginResponseDto> { public async login(loginCredential: LoginCredentialDto, clientIp: string): Promise<LoginResponseDto> {
let user = await this.userRepository.getByEmail(loginCredential.email, true); let user = await this.userCore.getByEmail(loginCredential.email, true);
if (user) { if (user) {
const isAuthenticated = await this.validatePassword(loginCredential.password, user); const isAuthenticated = await this.validatePassword(loginCredential.password, user);
@ -59,7 +64,7 @@ export class AuthService {
public async changePassword(authUser: AuthUserDto, dto: ChangePasswordDto) { public async changePassword(authUser: AuthUserDto, dto: ChangePasswordDto) {
const { password, newPassword } = dto; const { password, newPassword } = dto;
const user = await this.userRepository.getByEmail(authUser.email, true); const user = await this.userCore.getByEmail(authUser.email, true);
if (!user) { if (!user) {
throw new UnauthorizedException(); throw new UnauthorizedException();
} }
@ -71,18 +76,18 @@ export class AuthService {
user.password = newPassword; user.password = newPassword;
return this.userRepository.update(user.id, user); return this.userCore.updateUser(authUser, user, dto);
} }
public async adminSignUp(dto: SignUpDto): Promise<AdminSignupResponseDto> { public async adminSignUp(dto: SignUpDto): Promise<AdminSignupResponseDto> {
const adminUser = await this.userRepository.getAdmin(); const adminUser = await this.userCore.getAdmin();
if (adminUser) { if (adminUser) {
throw new BadRequestException('The server already has an admin'); throw new BadRequestException('The server already has an admin');
} }
try { try {
const admin = await this.userRepository.create({ const admin = await this.userCore.createUser({
isAdmin: true, isAdmin: true,
email: dto.email, email: dto.email,
firstName: dto.firstName, firstName: dto.firstName,

View File

@ -2,6 +2,7 @@ import { Body, Controller, Post, Res, ValidationPipe } from '@nestjs/common';
import { ApiTags } from '@nestjs/swagger'; import { ApiTags } from '@nestjs/swagger';
import { Response } from 'express'; import { Response } from 'express';
import { AuthType } from '../../constants/jwt.constant'; import { AuthType } from '../../constants/jwt.constant';
import { AuthUserDto, GetAuthUser } from '../../decorators/auth-user.decorator';
import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service'; import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service';
import { LoginResponseDto } from '../auth/response-dto/login-response.dto'; import { LoginResponseDto } from '../auth/response-dto/login-response.dto';
import { OAuthCallbackDto } from './dto/oauth-auth-code.dto'; import { OAuthCallbackDto } from './dto/oauth-auth-code.dto';
@ -21,10 +22,11 @@ export class OAuthController {
@Post('/callback') @Post('/callback')
public async callback( public async callback(
@GetAuthUser() authUser: AuthUserDto,
@Res({ passthrough: true }) response: Response, @Res({ passthrough: true }) response: Response,
@Body(ValidationPipe) dto: OAuthCallbackDto, @Body(ValidationPipe) dto: OAuthCallbackDto,
): Promise<LoginResponseDto> { ): Promise<LoginResponseDto> {
const loginResponse = await this.oauthService.callback(dto); const loginResponse = await this.oauthService.callback(authUser, dto);
response.setHeader('Set-Cookie', this.immichJwtService.getCookies(loginResponse, AuthType.OAUTH)); response.setHeader('Set-Cookie', this.immichJwtService.getCookies(loginResponse, AuthType.OAUTH));
return loginResponse; return loginResponse;
} }

View File

@ -3,6 +3,7 @@ import { UserEntity } from '@app/database/entities/user.entity';
import { ImmichConfigService } from '@app/immich-config'; import { ImmichConfigService } from '@app/immich-config';
import { BadRequestException } from '@nestjs/common'; import { BadRequestException } from '@nestjs/common';
import { generators, Issuer } from 'openid-client'; import { generators, Issuer } from 'openid-client';
import { AuthUserDto } from '../../decorators/auth-user.decorator';
import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service'; import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service';
import { LoginResponseDto } from '../auth/response-dto/login-response.dto'; import { LoginResponseDto } from '../auth/response-dto/login-response.dto';
import { OAuthService } from '../oauth/oauth.service'; import { OAuthService } from '../oauth/oauth.service';
@ -12,13 +13,19 @@ const email = 'user@immich.com';
const sub = 'my-auth-user-sub'; const sub = 'my-auth-user-sub';
const user = { const user = {
id: 'user', id: 'user_id',
email, email,
firstName: 'user', firstName: 'user',
lastName: 'imimch', lastName: 'imimch',
oauthId: '', oauthId: '',
} as UserEntity; } as UserEntity;
const authUser: AuthUserDto = {
id: 'user_id',
email,
isAdmin: true,
};
const loginResponse = { const loginResponse = {
accessToken: 'access-token', accessToken: 'access-token',
userId: 'user', userId: 'user',
@ -104,7 +111,7 @@ describe('OAuthService', () => {
describe('callback', () => { describe('callback', () => {
it('should throw an error if OAuth is not enabled', async () => { it('should throw an error if OAuth is not enabled', async () => {
await expect(sut.callback({ url: '' })).rejects.toBeInstanceOf(BadRequestException); await expect(sut.callback(authUser, { url: '' })).rejects.toBeInstanceOf(BadRequestException);
}); });
it('should not allow auto registering', async () => { it('should not allow auto registering', async () => {
@ -118,7 +125,7 @@ describe('OAuthService', () => {
jest.spyOn(sut['logger'], 'debug').mockImplementation(() => null); jest.spyOn(sut['logger'], 'debug').mockImplementation(() => null);
jest.spyOn(sut['logger'], 'warn').mockImplementation(() => null); jest.spyOn(sut['logger'], 'warn').mockImplementation(() => null);
userRepositoryMock.getByEmail.mockResolvedValue(null); userRepositoryMock.getByEmail.mockResolvedValue(null);
await expect(sut.callback({ url: 'http://immich/auth/login?code=abc123' })).rejects.toBeInstanceOf( await expect(sut.callback(authUser, { url: 'http://immich/auth/login?code=abc123' })).rejects.toBeInstanceOf(
BadRequestException, BadRequestException,
); );
expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(1); expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(1);
@ -138,7 +145,9 @@ describe('OAuthService', () => {
userRepositoryMock.update.mockResolvedValue(user); userRepositoryMock.update.mockResolvedValue(user);
immichJwtServiceMock.createLoginResponse.mockResolvedValue(loginResponse); immichJwtServiceMock.createLoginResponse.mockResolvedValue(loginResponse);
await expect(sut.callback({ url: 'http://immich/auth/login?code=abc123' })).resolves.toEqual(loginResponse); await expect(sut.callback(authUser, { url: 'http://immich/auth/login?code=abc123' })).resolves.toEqual(
loginResponse,
);
expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(1); expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(1);
expect(userRepositoryMock.update).toHaveBeenCalledWith(user.id, { oauthId: sub }); expect(userRepositoryMock.update).toHaveBeenCalledWith(user.id, { oauthId: sub });
@ -155,12 +164,15 @@ describe('OAuthService', () => {
jest.spyOn(sut['logger'], 'debug').mockImplementation(() => null); jest.spyOn(sut['logger'], 'debug').mockImplementation(() => null);
jest.spyOn(sut['logger'], 'log').mockImplementation(() => null); jest.spyOn(sut['logger'], 'log').mockImplementation(() => null);
userRepositoryMock.getByEmail.mockResolvedValue(null); userRepositoryMock.getByEmail.mockResolvedValue(null);
userRepositoryMock.getAdmin.mockResolvedValue(user);
userRepositoryMock.create.mockResolvedValue(user); userRepositoryMock.create.mockResolvedValue(user);
immichJwtServiceMock.createLoginResponse.mockResolvedValue(loginResponse); immichJwtServiceMock.createLoginResponse.mockResolvedValue(loginResponse);
await expect(sut.callback({ url: 'http://immich/auth/login?code=abc123' })).resolves.toEqual(loginResponse); await expect(sut.callback(authUser, { url: 'http://immich/auth/login?code=abc123' })).resolves.toEqual(
loginResponse,
);
expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(1); expect(userRepositoryMock.getByEmail).toHaveBeenCalledTimes(2); // second call is for domain check before create
expect(userRepositoryMock.create).toHaveBeenCalledTimes(1); expect(userRepositoryMock.create).toHaveBeenCalledTimes(1);
expect(immichJwtServiceMock.createLoginResponse).toHaveBeenCalledTimes(1); expect(immichJwtServiceMock.createLoginResponse).toHaveBeenCalledTimes(1);
}); });

View File

@ -1,9 +1,11 @@
import { ImmichConfigService } from '@app/immich-config'; import { ImmichConfigService } from '@app/immich-config';
import { BadRequestException, Inject, Injectable, Logger } from '@nestjs/common'; import { BadRequestException, Inject, Injectable, Logger } from '@nestjs/common';
import { ClientMetadata, custom, generators, Issuer, UserinfoResponse } from 'openid-client'; import { ClientMetadata, custom, generators, Issuer, UserinfoResponse } from 'openid-client';
import { AuthUserDto } from '../../decorators/auth-user.decorator';
import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service'; import { ImmichJwtService } from '../../modules/immich-jwt/immich-jwt.service';
import { LoginResponseDto } from '../auth/response-dto/login-response.dto'; import { LoginResponseDto } from '../auth/response-dto/login-response.dto';
import { IUserRepository, USER_REPOSITORY } from '../user/user-repository'; import { IUserRepository, USER_REPOSITORY } from '../user/user-repository';
import { UserCore } from '../user/user.core';
import { OAuthCallbackDto } from './dto/oauth-auth-code.dto'; import { OAuthCallbackDto } from './dto/oauth-auth-code.dto';
import { OAuthConfigDto } from './dto/oauth-config.dto'; import { OAuthConfigDto } from './dto/oauth-config.dto';
import { OAuthConfigResponseDto } from './response-dto/oauth-config-response.dto'; import { OAuthConfigResponseDto } from './response-dto/oauth-config-response.dto';
@ -14,13 +16,16 @@ type OAuthProfile = UserinfoResponse & {
@Injectable() @Injectable()
export class OAuthService { export class OAuthService {
private readonly userCore: UserCore;
private readonly logger = new Logger(OAuthService.name); private readonly logger = new Logger(OAuthService.name);
constructor( constructor(
private immichJwtService: ImmichJwtService, private immichJwtService: ImmichJwtService,
private immichConfigService: ImmichConfigService, private immichConfigService: ImmichConfigService,
@Inject(USER_REPOSITORY) private userRepository: IUserRepository, @Inject(USER_REPOSITORY) userRepository: IUserRepository,
) { ) {
this.userCore = new UserCore(userRepository);
custom.setHttpOptionsDefaults({ custom.setHttpOptionsDefaults({
timeout: 30000, timeout: 30000,
}); });
@ -42,7 +47,7 @@ export class OAuthService {
return { enabled: true, buttonText, url }; return { enabled: true, buttonText, url };
} }
public async callback(dto: OAuthCallbackDto): Promise<LoginResponseDto> { public async callback(authUser: AuthUserDto, dto: OAuthCallbackDto): Promise<LoginResponseDto> {
const redirectUri = dto.url.split('?')[0]; const redirectUri = dto.url.split('?')[0];
const client = await this.getClient(); const client = await this.getClient();
const params = client.callbackParams(dto.url); const params = client.callbackParams(dto.url);
@ -50,13 +55,13 @@ export class OAuthService {
const profile = await client.userinfo<OAuthProfile>(tokens.access_token || ''); const profile = await client.userinfo<OAuthProfile>(tokens.access_token || '');
this.logger.debug(`Logging in with OAuth: ${JSON.stringify(profile)}`); this.logger.debug(`Logging in with OAuth: ${JSON.stringify(profile)}`);
let user = await this.userRepository.getByOAuthId(profile.sub); let user = await this.userCore.getByOAuthId(profile.sub);
// link existing user // link existing user
if (!user) { if (!user) {
const emailUser = await this.userRepository.getByEmail(profile.email); const emailUser = await this.userCore.getByEmail(profile.email);
if (emailUser) { if (emailUser) {
user = await this.userRepository.update(emailUser.id, { oauthId: profile.sub }); user = await this.userCore.updateUser(authUser, emailUser, { oauthId: profile.sub });
} }
} }
@ -72,7 +77,7 @@ export class OAuthService {
} }
this.logger.log(`Registering new user: ${profile.email}/${profile.sub}`); this.logger.log(`Registering new user: ${profile.email}/${profile.sub}`);
user = await this.userRepository.create({ user = await this.userCore.createUser({
firstName: profile.given_name || '', firstName: profile.given_name || '',
lastName: profile.family_name || '', lastName: profile.family_name || '',
email: profile.email, email: profile.email,

View File

@ -11,6 +11,7 @@ describe('TagService', () => {
const user1AuthUser: AuthUserDto = Object.freeze({ const user1AuthUser: AuthUserDto = Object.freeze({
id: '1111', id: '1111',
email: 'testuser@email.com', email: 'testuser@email.com',
isAdmin: false,
}); });
const user1: UserEntity = Object.freeze({ const user1: UserEntity = Object.freeze({

View File

@ -20,3 +20,34 @@ export class CreateUserDto {
@ApiProperty({ example: 'Doe' }) @ApiProperty({ example: 'Doe' })
lastName!: string; lastName!: string;
} }
export class CreateAdminDto {
@IsNotEmpty()
isAdmin!: true;
@IsEmail()
@Transform(({ value }) => value?.toLowerCase())
email!: string;
@IsNotEmpty()
password!: string;
@IsNotEmpty()
firstName!: string;
@IsNotEmpty()
lastName!: string;
}
export class CreateUserOAuthDto {
@IsEmail()
@Transform(({ value }) => value?.toLowerCase())
email!: string;
@IsNotEmpty()
oauthId!: string;
firstName?: string;
lastName?: string;
}

View File

@ -1,30 +0,0 @@
import { UserEntity } from '@app/database/entities/user.entity';
import { BadRequestException } from '@nestjs/common';
import { Repository } from 'typeorm';
import { UserRepository } from './user-repository';
describe('UserRepository', () => {
let sui: UserRepository;
let userRepositoryMock: jest.Mocked<Repository<UserEntity>>;
beforeAll(() => {
userRepositoryMock = {
findOne: jest.fn(),
save: jest.fn(),
} as unknown as jest.Mocked<Repository<UserEntity>>;
sui = new UserRepository(userRepositoryMock);
});
it('should be defined', () => {
expect(sui).toBeDefined();
});
describe('create', () => {
it('should not create a user if there is no local admin account', async () => {
userRepositoryMock.findOne.mockResolvedValue(null);
await expect(sui.create({ isAdmin: false })).rejects.toBeInstanceOf(BadRequestException);
expect(userRepositoryMock.findOne).toHaveBeenCalled();
});
});
});

View File

@ -1,7 +1,6 @@
import { UserEntity } from '@app/database/entities/user.entity'; import { UserEntity } from '@app/database/entities/user.entity';
import { BadRequestException } from '@nestjs/common'; import { InternalServerErrorException } from '@nestjs/common';
import { InjectRepository } from '@nestjs/typeorm'; import { InjectRepository } from '@nestjs/typeorm';
import * as bcrypt from 'bcrypt';
import { Not, Repository } from 'typeorm'; import { Not, Repository } from 'typeorm';
export interface IUserRepository { export interface IUserRepository {
@ -9,13 +8,17 @@ export interface IUserRepository {
getAdmin(): Promise<UserEntity | null>; getAdmin(): Promise<UserEntity | null>;
getByEmail(email: string, withPassword?: boolean): Promise<UserEntity | null>; getByEmail(email: string, withPassword?: boolean): Promise<UserEntity | null>;
getByOAuthId(oauthId: string): Promise<UserEntity | null>; getByOAuthId(oauthId: string): Promise<UserEntity | null>;
getList(filter?: { excludeId?: string }): Promise<UserEntity[]>; getList(filter?: UserListFilter): Promise<UserEntity[]>;
create(user: Partial<UserEntity>): Promise<UserEntity>; create(user: Partial<UserEntity>): Promise<UserEntity>;
update(id: string, user: Partial<UserEntity>): Promise<UserEntity>; update(id: string, user: Partial<UserEntity>): Promise<UserEntity>;
delete(user: UserEntity): Promise<UserEntity>; delete(user: UserEntity): Promise<UserEntity>;
restore(user: UserEntity): Promise<UserEntity>; restore(user: UserEntity): Promise<UserEntity>;
} }
export interface UserListFilter {
excludeId?: string;
}
export const USER_REPOSITORY = 'USER_REPOSITORY'; export const USER_REPOSITORY = 'USER_REPOSITORY';
export class UserRepository implements IUserRepository { export class UserRepository implements IUserRepository {
@ -24,15 +27,15 @@ export class UserRepository implements IUserRepository {
private userRepository: Repository<UserEntity>, private userRepository: Repository<UserEntity>,
) {} ) {}
public async get(userId: string, withDeleted?: boolean): Promise<UserEntity | null> { async get(userId: string, withDeleted?: boolean): Promise<UserEntity | null> {
return this.userRepository.findOne({ where: { id: userId }, withDeleted: withDeleted }); return this.userRepository.findOne({ where: { id: userId }, withDeleted: withDeleted });
} }
public async getAdmin(): Promise<UserEntity | null> { async getAdmin(): Promise<UserEntity | null> {
return this.userRepository.findOne({ where: { isAdmin: true } }); return this.userRepository.findOne({ where: { isAdmin: true } });
} }
public async getByEmail(email: string, withPassword?: boolean): Promise<UserEntity | null> { async getByEmail(email: string, withPassword?: boolean): Promise<UserEntity | null> {
let builder = this.userRepository.createQueryBuilder('user').where({ email }); let builder = this.userRepository.createQueryBuilder('user').where({ email });
if (withPassword) { if (withPassword) {
@ -42,11 +45,11 @@ export class UserRepository implements IUserRepository {
return builder.getOne(); return builder.getOne();
} }
public async getByOAuthId(oauthId: string): Promise<UserEntity | null> { async getByOAuthId(oauthId: string): Promise<UserEntity | null> {
return this.userRepository.findOne({ where: { oauthId } }); return this.userRepository.findOne({ where: { oauthId } });
} }
public async getList({ excludeId }: { excludeId?: string } = {}): Promise<UserEntity[]> { async getList({ excludeId }: UserListFilter = {}): Promise<UserEntity[]> {
if (!excludeId) { if (!excludeId) {
return this.userRepository.find(); // TODO: this should also be ordered the same as below return this.userRepository.find(); // TODO: this should also be ordered the same as below
} }
@ -59,55 +62,26 @@ export class UserRepository implements IUserRepository {
}); });
} }
public async create(user: Partial<UserEntity>): Promise<UserEntity> { async create(user: Partial<UserEntity>): Promise<UserEntity> {
const localAdmin = await this.getAdmin();
if (!localAdmin && !user.isAdmin) {
throw new BadRequestException('The first registered account must the administrator.');
}
if (user.password) {
user.salt = await bcrypt.genSalt();
user.password = await this.hashPassword(user.password, user.salt);
}
return this.userRepository.save(user); return this.userRepository.save(user);
} }
public async update(id: string, user: Partial<UserEntity>): Promise<UserEntity> { async update(id: string, user: Partial<UserEntity>): Promise<UserEntity> {
user.id = id; user.id = id;
// If payload includes password - Create new password for user await this.userRepository.save(user);
if (user.password) { const updatedUser = await this.get(id);
user.salt = await bcrypt.genSalt(); if (!updatedUser) {
user.password = await this.hashPassword(user.password, user.salt); throw new InternalServerErrorException('Cannot reload user after update');
} }
return updatedUser;
// TODO: can this happen? If so we can move it to the service, otherwise remove it (also from DTO)
if (user.isAdmin) {
const adminUser = await this.userRepository.findOne({ where: { isAdmin: true } });
if (adminUser && adminUser.id !== id) {
throw new BadRequestException('Admin user exists');
}
user.isAdmin = true;
}
return this.userRepository.save(user);
} }
public async delete(user: UserEntity): Promise<UserEntity> { async delete(user: UserEntity): Promise<UserEntity> {
if (user.isAdmin) {
throw new BadRequestException('Cannot delete admin user! stay sane!');
}
return this.userRepository.softRemove(user); return this.userRepository.softRemove(user);
} }
public async restore(user: UserEntity): Promise<UserEntity> { async restore(user: UserEntity): Promise<UserEntity> {
return this.userRepository.recover(user); return this.userRepository.recover(user);
} }
private async hashPassword(password: string, salt: string): Promise<string> {
return bcrypt.hash(password, salt);
}
} }

View File

@ -12,6 +12,7 @@ import {
UploadedFile, UploadedFile,
Response, Response,
ParseBoolPipe, ParseBoolPipe,
StreamableFile,
} from '@nestjs/common'; } from '@nestjs/common';
import { UserService } from './user.service'; import { UserService } from './user.service';
import { Authenticated } from '../../decorators/authenticated.decorator'; import { Authenticated } from '../../decorators/authenticated.decorator';
@ -111,6 +112,10 @@ export class UserController {
@Get('/profile-image/:userId') @Get('/profile-image/:userId')
async getProfileImage(@Param('userId') userId: string, @Response({ passthrough: true }) res: Res): Promise<any> { async getProfileImage(@Param('userId') userId: string, @Response({ passthrough: true }) res: Res): Promise<any> {
return this.userService.getUserProfileImage(userId, res); const readableStream = await this.userService.getUserProfileImage(userId);
res.set({
'Content-Type': 'image/jpeg',
});
return new StreamableFile(readableStream);
} }
} }

View File

@ -0,0 +1,163 @@
import { UserEntity } from '@app/database/entities/user.entity';
import {
BadRequestException,
ForbiddenException,
InternalServerErrorException,
Logger,
NotFoundException,
UnauthorizedException,
} from '@nestjs/common';
import { genSalt, hash } from 'bcrypt';
import { createReadStream, constants, ReadStream } from 'fs';
import fs from 'fs/promises';
import { AuthUserDto } from '../../decorators/auth-user.decorator';
import { CreateAdminDto, CreateUserDto, CreateUserOAuthDto } from './dto/create-user.dto';
import { IUserRepository, UserListFilter } from './user-repository';
export class UserCore {
constructor(private userRepository: IUserRepository) {}
private async generateSalt(): Promise<string> {
return genSalt();
}
private async hashPassword(password: string, salt: string): Promise<string> {
return hash(password, salt);
}
async updateUser(authUser: AuthUserDto, userToUpdate: UserEntity, data: Partial<UserEntity>): Promise<UserEntity> {
if (!authUser.isAdmin && (authUser.id !== userToUpdate.id || userToUpdate.id != data.id)) {
throw new ForbiddenException('You are not allowed to update this user');
}
// TODO: can this happen? If so we should implement a test case, otherwise remove it (also from DTO)
if (userToUpdate.isAdmin) {
const adminUser = await this.userRepository.getAdmin();
if (adminUser && adminUser.id !== userToUpdate.id) {
throw new BadRequestException('Admin user exists');
}
}
try {
const payload: Partial<UserEntity> = { ...data };
if (payload.password) {
const salt = await this.generateSalt();
payload.salt = salt;
payload.password = await this.hashPassword(payload.password, salt);
}
return this.userRepository.update(userToUpdate.id, payload);
} catch (e) {
Logger.error(e, 'Failed to update user info');
throw new InternalServerErrorException('Failed to update user info');
}
}
async createUser(createUserDto: CreateUserDto | CreateAdminDto | CreateUserOAuthDto): Promise<UserEntity> {
const user = await this.userRepository.getByEmail(createUserDto.email);
if (user) {
throw new BadRequestException('User exists');
}
if (!(createUserDto as CreateAdminDto).isAdmin) {
const localAdmin = await this.userRepository.getAdmin();
if (!localAdmin) {
throw new BadRequestException('The first registered account must the administrator.');
}
}
try {
const payload: Partial<UserEntity> = { ...createUserDto };
if (payload.password) {
const salt = await this.generateSalt();
payload.salt = salt;
payload.password = await this.hashPassword(payload.password, salt);
}
return this.userRepository.create(payload);
} catch (e) {
Logger.error(e, 'Create new user');
throw new InternalServerErrorException('Failed to register new user');
}
}
async get(userId: string, withDeleted?: boolean): Promise<UserEntity | null> {
return this.userRepository.get(userId, withDeleted);
}
async getAdmin(): Promise<UserEntity | null> {
return this.userRepository.getAdmin();
}
async getByEmail(email: string, withPassword?: boolean): Promise<UserEntity | null> {
return this.userRepository.getByEmail(email, withPassword);
}
async getByOAuthId(oauthId: string): Promise<UserEntity | null> {
return this.userRepository.getByOAuthId(oauthId);
}
async getUserProfileImage(user: UserEntity): Promise<ReadStream> {
if (!user.profileImagePath) {
throw new NotFoundException('User does not have a profile image');
}
await fs.access(user.profileImagePath, constants.R_OK | constants.W_OK);
return createReadStream(user.profileImagePath);
}
async getList(filter?: UserListFilter): Promise<UserEntity[]> {
return this.userRepository.getList(filter);
}
async createProfileImage(authUser: AuthUserDto, filePath: string): Promise<UserEntity> {
// TODO: do we need to do this? Maybe we can trust the authUser
const user = await this.userRepository.get(authUser.id);
if (!user) {
throw new NotFoundException('User not found');
}
try {
return this.userRepository.update(user.id, { profileImagePath: filePath });
} catch (e) {
Logger.error(e, 'Create User Profile Image');
throw new InternalServerErrorException('Failed to create new user profile image');
}
}
async restoreUser(authUser: AuthUserDto, userToRestore: UserEntity): Promise<UserEntity> {
// TODO: do we need to do this? Maybe we can trust the authUser
const requestor = await this.userRepository.get(authUser.id);
if (!requestor) {
throw new UnauthorizedException('Requestor not found');
}
if (!requestor.isAdmin) {
throw new ForbiddenException('Unauthorized');
}
try {
return this.userRepository.restore(userToRestore);
} catch (e) {
Logger.error(e, 'Failed to restore deleted user');
throw new InternalServerErrorException('Failed to restore deleted user');
}
}
async deleteUser(authUser: AuthUserDto, userToDelete: UserEntity): Promise<UserEntity> {
// TODO: do we need to do this? Maybe we can trust the authUser
const requestor = await this.userRepository.get(authUser.id);
if (!requestor) {
throw new UnauthorizedException('Requestor not found');
}
if (!requestor.isAdmin) {
throw new ForbiddenException('Unauthorized');
}
if (userToDelete.isAdmin) {
throw new ForbiddenException('Cannot delete admin user');
}
try {
return this.userRepository.delete(userToDelete);
} catch (e) {
Logger.error(e, 'Failed to delete user');
throw new InternalServerErrorException('Failed to delete user');
}
}
}

View File

@ -1,26 +1,30 @@
import { UserEntity } from '@app/database/entities/user.entity'; import { UserEntity } from '@app/database/entities/user.entity';
import { BadRequestException, NotFoundException } from '@nestjs/common'; import { BadRequestException, ForbiddenException, NotFoundException } from '@nestjs/common';
import { newUserRepositoryMock } from '../../../test/test-utils'; import { newUserRepositoryMock } from '../../../test/test-utils';
import { AuthUserDto } from '../../decorators/auth-user.decorator'; import { AuthUserDto } from '../../decorators/auth-user.decorator';
import { IUserRepository } from './user-repository'; import { IUserRepository } from './user-repository';
import { when } from 'jest-when';
import { UserService } from './user.service'; import { UserService } from './user.service';
import { UpdateUserDto } from './dto/update-user.dto';
describe('UserService', () => { describe('UserService', () => {
let sui: UserService; let sut: UserService;
let userRepositoryMock: jest.Mocked<IUserRepository>; let userRepositoryMock: jest.Mocked<IUserRepository>;
const adminAuthUser: AuthUserDto = Object.freeze({ const adminUserAuth: AuthUserDto = Object.freeze({
id: 'admin_id', id: 'admin_id',
email: 'admin@test.com', email: 'admin@test.com',
isAdmin: true,
}); });
const immichAuthUser: AuthUserDto = Object.freeze({ const immichUserAuth: AuthUserDto = Object.freeze({
id: 'immich_id', id: 'immich_id',
email: 'immich@test.com', email: 'immich@test.com',
isAdmin: false,
}); });
const adminUser: UserEntity = { const adminUser: UserEntity = Object.freeze({
id: 'admin_id', id: adminUserAuth.id,
email: 'admin@test.com', email: 'admin@test.com',
password: 'admin_password', password: 'admin_password',
salt: 'admin_salt', salt: 'admin_salt',
@ -32,10 +36,10 @@ describe('UserService', () => {
profileImagePath: '', profileImagePath: '',
createdAt: '2021-01-01', createdAt: '2021-01-01',
tags: [], tags: [],
}; });
const immichUser: UserEntity = { const immichUser: UserEntity = Object.freeze({
id: 'immich_id', id: immichUserAuth.id,
email: 'immich@test.com', email: 'immich@test.com',
password: 'immich_password', password: 'immich_password',
salt: 'immich_salt', salt: 'immich_salt',
@ -47,10 +51,10 @@ describe('UserService', () => {
profileImagePath: '', profileImagePath: '',
createdAt: '2021-01-01', createdAt: '2021-01-01',
tags: [], tags: [],
}; });
const updatedImmichUser: UserEntity = { const updatedImmichUser: UserEntity = Object.freeze({
id: 'immich_id', id: immichUserAuth.id,
email: 'immich@test.com', email: 'immich@test.com',
password: 'immich_password', password: 'immich_password',
salt: 'immich_salt', salt: 'immich_salt',
@ -62,87 +66,92 @@ describe('UserService', () => {
profileImagePath: '', profileImagePath: '',
createdAt: '2021-01-01', createdAt: '2021-01-01',
tags: [], tags: [],
};
beforeAll(() => {
userRepositoryMock = newUserRepositoryMock();
sui = new UserService(userRepositoryMock);
}); });
it('should be defined', () => { beforeEach(() => {
expect(sui).toBeDefined(); userRepositoryMock = newUserRepositoryMock();
when(userRepositoryMock.get).calledWith(adminUser.id).mockResolvedValue(adminUser);
when(userRepositoryMock.get).calledWith(adminUser.id, undefined).mockResolvedValue(adminUser);
when(userRepositoryMock.get).calledWith(immichUser.id, undefined).mockResolvedValue(immichUser);
sut = new UserService(userRepositoryMock);
}); });
describe('Update user', () => { describe('Update user', () => {
it('should update user', async () => { it('should update user', async () => {
const requestor = immichAuthUser; const update: UpdateUserDto = {
const userToUpdate = immichUser; id: immichUser.id,
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(immichUser));
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(userToUpdate));
userRepositoryMock.update.mockImplementationOnce(() => Promise.resolve(updatedImmichUser));
const result = await sui.updateUser(requestor, {
id: userToUpdate.id,
shouldChangePassword: true, shouldChangePassword: true,
}); };
expect(result.shouldChangePassword).toEqual(true);
when(userRepositoryMock.update).calledWith(update.id, update).mockResolvedValueOnce(updatedImmichUser);
const updatedUser = await sut.updateUser(immichUserAuth, update);
expect(updatedUser.shouldChangePassword).toEqual(true);
}); });
it('user can only update its information', () => { it('user can only update its information', async () => {
const requestor = immichAuthUser; when(userRepositoryMock.get)
.calledWith('not_immich_auth_user_id', undefined)
.mockResolvedValueOnce({
...immichUser,
id: 'not_immich_auth_user_id',
});
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(immichUser)); const result = sut.updateUser(immichUserAuth, {
const result = sui.updateUser(requestor, {
id: 'not_immich_auth_user_id', id: 'not_immich_auth_user_id',
password: 'I take over your account now', password: 'I take over your account now',
}); });
expect(result).rejects.toBeInstanceOf(BadRequestException); await expect(result).rejects.toBeInstanceOf(ForbiddenException);
}); });
it('admin can update any user information', async () => { it('admin can update any user information', async () => {
const requestor = adminAuthUser; const update: UpdateUserDto = {
const userToUpdate = immichUser; id: immichUser.id,
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(adminUser));
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(userToUpdate));
userRepositoryMock.update.mockImplementationOnce(() => Promise.resolve(updatedImmichUser));
const result = await sui.updateUser(requestor, {
id: userToUpdate.id,
shouldChangePassword: true, shouldChangePassword: true,
}); };
when(userRepositoryMock.update).calledWith(immichUser.id, update).mockResolvedValueOnce(updatedImmichUser);
const result = await sut.updateUser(adminUserAuth, update);
expect(result).toBeDefined(); expect(result).toBeDefined();
expect(result.id).toEqual(updatedImmichUser.id); expect(result.id).toEqual(updatedImmichUser.id);
expect(result.shouldChangePassword).toEqual(updatedImmichUser.shouldChangePassword); expect(result.shouldChangePassword).toEqual(updatedImmichUser.shouldChangePassword);
}); });
it('update user information should throw error if user not found', () => { it('update user information should throw error if user not found', async () => {
const requestor = adminAuthUser; when(userRepositoryMock.get).calledWith(immichUser.id, undefined).mockResolvedValueOnce(null);
const userToUpdate = immichUser;
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(adminUser)); const result = sut.updateUser(adminUser, {
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(null)); id: immichUser.id,
const result = sui.updateUser(requestor, {
id: userToUpdate.id,
shouldChangePassword: true, shouldChangePassword: true,
}); });
expect(result).rejects.toBeInstanceOf(NotFoundException);
await expect(result).rejects.toBeInstanceOf(NotFoundException);
}); });
});
it('cannot delete admin user', () => { describe('Delete user', () => {
const requestor = adminAuthUser; it('cannot delete admin user', async () => {
const result = sut.deleteUser(adminUserAuth, adminUserAuth.id);
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(adminUser)); await expect(result).rejects.toBeInstanceOf(ForbiddenException);
userRepositoryMock.get.mockImplementationOnce(() => Promise.resolve(adminUser)); });
});
const result = sui.deleteUser(requestor, adminAuthUser.id); describe('Create user', () => {
it('should not create a user if there is no local admin account', async () => {
when(userRepositoryMock.getAdmin).calledWith().mockResolvedValueOnce(null);
expect(result).rejects.toBeInstanceOf(BadRequestException); await expect(
sut.createUser({
email: 'john_smith@email.com',
firstName: 'John',
lastName: 'Smith',
password: 'password',
}),
).rejects.toBeInstanceOf(BadRequestException);
}); });
}); });
}); });

View File

@ -1,16 +1,5 @@
import { import { BadRequestException, Inject, Injectable, NotFoundException } from '@nestjs/common';
BadRequestException, import { ReadStream } from 'fs';
ForbiddenException,
Inject,
Injectable,
InternalServerErrorException,
Logger,
NotFoundException,
StreamableFile,
UnauthorizedException,
} from '@nestjs/common';
import { Response as Res } from 'express';
import { constants, createReadStream } from 'fs';
import { AuthUserDto } from '../../decorators/auth-user.decorator'; import { AuthUserDto } from '../../decorators/auth-user.decorator';
import { CreateUserDto } from './dto/create-user.dto'; import { CreateUserDto } from './dto/create-user.dto';
import { UpdateUserDto } from './dto/update-user.dto'; import { UpdateUserDto } from './dto/update-user.dto';
@ -22,28 +11,30 @@ import {
import { mapUserCountResponse, UserCountResponseDto } from './response-dto/user-count-response.dto'; import { mapUserCountResponse, UserCountResponseDto } from './response-dto/user-count-response.dto';
import { mapUser, UserResponseDto } from './response-dto/user-response.dto'; import { mapUser, UserResponseDto } from './response-dto/user-response.dto';
import { IUserRepository, USER_REPOSITORY } from './user-repository'; import { IUserRepository, USER_REPOSITORY } from './user-repository';
import fs from 'fs/promises'; import { UserCore } from './user.core';
@Injectable() @Injectable()
export class UserService { export class UserService {
private userCore: UserCore;
constructor( constructor(
@Inject(USER_REPOSITORY) @Inject(USER_REPOSITORY)
private userRepository: IUserRepository, userRepository: IUserRepository,
) {} ) {
this.userCore = new UserCore(userRepository);
}
async getAllUsers(authUser: AuthUserDto, isAll: boolean): Promise<UserResponseDto[]> { async getAllUsers(authUser: AuthUserDto, isAll: boolean): Promise<UserResponseDto[]> {
if (isAll) { if (isAll) {
const allUsers = await this.userRepository.getList(); const allUsers = await this.userCore.getList();
return allUsers.map(mapUser); return allUsers.map(mapUser);
} }
const allUserExceptRequestedUser = await this.userRepository.getList({ excludeId: authUser.id }); const allUserExceptRequestedUser = await this.userCore.getList({ excludeId: authUser.id });
return allUserExceptRequestedUser.map(mapUser); return allUserExceptRequestedUser.map(mapUser);
} }
async getUserById(userId: string, withDeleted = false): Promise<UserResponseDto> { async getUserById(userId: string, withDeleted = false): Promise<UserResponseDto> {
const user = await this.userRepository.get(userId, withDeleted); const user = await this.userCore.get(userId, withDeleted);
if (!user) { if (!user) {
throw new NotFoundException('User not found'); throw new NotFoundException('User not found');
} }
@ -52,7 +43,7 @@ export class UserService {
} }
async getUserInfo(authUser: AuthUserDto): Promise<UserResponseDto> { async getUserInfo(authUser: AuthUserDto): Promise<UserResponseDto> {
const user = await this.userRepository.get(authUser.id); const user = await this.userCore.get(authUser.id);
if (!user) { if (!user) {
throw new BadRequestException('User not found'); throw new BadRequestException('User not found');
} }
@ -60,7 +51,7 @@ export class UserService {
} }
async getUserCount(dto: UserCountDto): Promise<UserCountResponseDto> { async getUserCount(dto: UserCountDto): Promise<UserCountResponseDto> {
let users = await this.userRepository.getList(); let users = await this.userCore.getList();
if (dto.admin) { if (dto.admin) {
users = users.filter((user) => user.isAdmin); users = users.filter((user) => user.isAdmin);
@ -70,142 +61,50 @@ export class UserService {
} }
async createUser(createUserDto: CreateUserDto): Promise<UserResponseDto> { async createUser(createUserDto: CreateUserDto): Promise<UserResponseDto> {
const user = await this.userRepository.getByEmail(createUserDto.email); const createdUser = await this.userCore.createUser(createUserDto);
return mapUser(createdUser);
if (user) {
throw new BadRequestException('User exists');
}
try {
const savedUser = await this.userRepository.create(createUserDto);
return mapUser(savedUser);
} catch (e) {
Logger.error(e, 'Create new user');
throw new InternalServerErrorException('Failed to register new user');
}
} }
async updateUser(authUser: AuthUserDto, updateUserDto: UpdateUserDto): Promise<UserResponseDto> { async updateUser(authUser: AuthUserDto, updateUserDto: UpdateUserDto): Promise<UserResponseDto> {
const requestor = await this.userRepository.get(authUser.id); const user = await this.userCore.get(updateUserDto.id);
if (!requestor) {
throw new NotFoundException('Requestor not found');
}
if (!requestor.isAdmin) {
if (requestor.id !== updateUserDto.id) {
throw new BadRequestException('Unauthorized');
}
}
const user = await this.userRepository.get(updateUserDto.id);
if (!user) { if (!user) {
throw new NotFoundException('User not found'); throw new NotFoundException('User not found');
} }
try { const updatedUser = await this.userCore.updateUser(authUser, user, updateUserDto);
user.password = updateUserDto.password ?? user.password; return mapUser(updatedUser);
user.firstName = updateUserDto.firstName ?? user.firstName;
user.lastName = updateUserDto.lastName ?? user.lastName;
user.isAdmin = updateUserDto.isAdmin ?? user.isAdmin;
user.shouldChangePassword = updateUserDto.shouldChangePassword ?? user.shouldChangePassword;
user.profileImagePath = updateUserDto.profileImagePath ?? user.profileImagePath;
const updatedUser = await this.userRepository.update(user.id, user);
return mapUser(updatedUser);
} catch (e) {
Logger.error(e, 'Failed to update user info');
throw new InternalServerErrorException('Failed to update user info');
}
} }
async deleteUser(authUser: AuthUserDto, userId: string): Promise<UserResponseDto> { async deleteUser(authUser: AuthUserDto, userId: string): Promise<UserResponseDto> {
const requestor = await this.userRepository.get(authUser.id); const user = await this.userCore.get(userId);
if (!requestor) {
throw new UnauthorizedException('Requestor not found');
}
if (!requestor.isAdmin) {
throw new ForbiddenException('Unauthorized');
}
const user = await this.userRepository.get(userId);
if (!user) { if (!user) {
throw new BadRequestException('User not found'); throw new BadRequestException('User not found');
} }
const deletedUser = await this.userCore.deleteUser(authUser, user);
if (user.isAdmin) { return mapUser(deletedUser);
throw new BadRequestException('Cannot delete admin user');
}
try {
const deletedUser = await this.userRepository.delete(user);
return mapUser(deletedUser);
} catch (e) {
Logger.error(e, 'Failed to delete user');
throw new InternalServerErrorException('Failed to delete user');
}
} }
async restoreUser(authUser: AuthUserDto, userId: string): Promise<UserResponseDto> { async restoreUser(authUser: AuthUserDto, userId: string): Promise<UserResponseDto> {
const requestor = await this.userRepository.get(authUser.id); const user = await this.userCore.get(userId, true);
if (!requestor) {
throw new UnauthorizedException('Requestor not found');
}
if (!requestor.isAdmin) {
throw new ForbiddenException('Unauthorized');
}
const user = await this.userRepository.get(userId, true);
if (!user) { if (!user) {
throw new BadRequestException('User not found'); throw new BadRequestException('User not found');
} }
try { const updatedUser = await this.userCore.restoreUser(authUser, user);
const restoredUser = await this.userRepository.restore(user); return mapUser(updatedUser);
return mapUser(restoredUser);
} catch (e) {
Logger.error(e, 'Failed to restore deleted user');
throw new InternalServerErrorException('Failed to restore deleted user');
}
} }
async createProfileImage( async createProfileImage(
authUser: AuthUserDto, authUser: AuthUserDto,
fileInfo: Express.Multer.File, fileInfo: Express.Multer.File,
): Promise<CreateProfileImageResponseDto> { ): Promise<CreateProfileImageResponseDto> {
const user = await this.userRepository.get(authUser.id); const updatedUser = await this.userCore.createProfileImage(authUser, fileInfo.path);
return mapCreateProfileImageResponse(updatedUser.id, updatedUser.profileImagePath);
}
async getUserProfileImage(userId: string): Promise<ReadStream> {
const user = await this.userCore.get(userId);
if (!user) { if (!user) {
throw new NotFoundException('User not found'); throw new NotFoundException('User not found');
} }
return this.userCore.getUserProfileImage(user);
try {
await this.userRepository.update(user.id, { profileImagePath: fileInfo.path });
return mapCreateProfileImageResponse(authUser.id, fileInfo.path);
} catch (e) {
Logger.error(e, 'Create User Profile Image');
throw new InternalServerErrorException('Failed to create new user profile image');
}
}
async getUserProfileImage(userId: string, res: Res) {
try {
const user = await this.userRepository.get(userId);
if (!user) {
throw new NotFoundException('User not found');
}
if (!user.profileImagePath) {
throw new NotFoundException('User does not have a profile image');
}
await fs.access(user.profileImagePath, constants.R_OK | constants.W_OK);
res.set({
'Content-Type': 'image/jpeg',
});
const fileStream = createReadStream(user.profileImagePath);
return new StreamableFile(fileStream);
} catch (e) {
throw new NotFoundException('User does not have a profile image');
}
} }
} }

View File

@ -5,16 +5,18 @@ import { UserEntity } from '@app/database/entities/user.entity';
export class AuthUserDto { export class AuthUserDto {
id!: string; id!: string;
email!: string; email!: string;
isAdmin!: boolean;
} }
export const GetAuthUser = createParamDecorator((data, ctx: ExecutionContext): AuthUserDto => { export const GetAuthUser = createParamDecorator((data, ctx: ExecutionContext): AuthUserDto => {
const req = ctx.switchToHttp().getRequest<{ user: UserEntity }>(); const req = ctx.switchToHttp().getRequest<{ user: UserEntity }>();
const { id, email } = req.user; const { id, email, isAdmin } = req.user;
const authUser: AuthUserDto = { const authUser: AuthUserDto = {
id: id.toString(), id: id.toString(),
email, email,
isAdmin,
}; };
return authUser; return authUser;

View File

@ -7,8 +7,15 @@
"^.+\\.(t|j)s$": "ts-jest" "^.+\\.(t|j)s$": "ts-jest"
}, },
"moduleNameMapper": { "moduleNameMapper": {
"@app/common/(.*)": "<rootDir>../../../libs/common/src/$1", "^@app/database(|/.*)$": "<rootDir>../../../libs/database/src/$1",
"@app/database/config": "<rootDir>../../../libs/database/src/config",
"@app/database/config/(.*)": "<rootDir>../../../libs/database/src/config/$1", "@app/database/config/(.*)": "<rootDir>../../../libs/database/src/config/$1",
"@app/database/entities/(.*)": "<rootDir>../../../libs/database/src/entities/$1" "@app/database/entities/(.*)": "<rootDir>../../../libs/database/src/entities/$1",
"@app/common": "<rootDir>../../../libs/common/src",
"@app/common/(.*)": "<rootDir>../../../libs/common/src/$1",
"^@app/job(|/.*)$": "<rootDir>../../../libs/job/src/$1",
"@app/job": "<rootDir>../../../libs/job/src",
"^@app/immich-config(|/.*)$": "<rootDir>../../../libs/immich-config/src/$1",
"^@app/storage(|/.*)$": "<rootDir>../../../libs/storage/src/$1"
} }
} }

View File

@ -33,6 +33,7 @@ export function getAuthUser(): AuthUserDto {
return { return {
id: '3108ac14-8afb-4b7e-87fd-39ebb6b79750', id: '3108ac14-8afb-4b7e-87fd-39ebb6b79750',
email: 'test@email.com', email: 'test@email.com',
isAdmin: false,
}; };
} }

View File

@ -7,11 +7,11 @@ import { databaseConfig } from '@app/database/config/database.config';
import { UserModule } from '../src/api-v1/user/user.module'; import { UserModule } from '../src/api-v1/user/user.module';
import { ImmichJwtModule } from '../src/modules/immich-jwt/immich-jwt.module'; import { ImmichJwtModule } from '../src/modules/immich-jwt/immich-jwt.module';
import { UserService } from '../src/api-v1/user/user.service'; import { UserService } from '../src/api-v1/user/user.service';
import { CreateUserDto } from '../src/api-v1/user/dto/create-user.dto'; import { CreateAdminDto, CreateUserDto } from '../src/api-v1/user/dto/create-user.dto';
import { UserResponseDto } from '../src/api-v1/user/response-dto/user-response.dto'; import { UserResponseDto } from '../src/api-v1/user/response-dto/user-response.dto';
import { DataSource } from 'typeorm'; import { DataSource } from 'typeorm';
function _createUser(userService: UserService, data: CreateUserDto) { function _createUser(userService: UserService, data: CreateUserDto | CreateAdminDto) {
return userService.createUser(data); return userService.createUser(data);
} }
@ -67,13 +67,15 @@ describe('User', () => {
const userTwoEmail = 'two@test.com'; const userTwoEmail = 'two@test.com';
beforeAll(async () => { beforeAll(async () => {
// first user must be admin
authUser = await _createUser(userService, {
firstName: 'auth-user',
lastName: 'test',
email: authUserEmail,
password: '1234',
isAdmin: true,
});
await Promise.allSettled([ await Promise.allSettled([
_createUser(userService, {
firstName: 'auth-user',
lastName: 'test',
email: authUserEmail,
password: '1234',
}).then((user) => (authUser = user)),
_createUser(userService, { _createUser(userService, {
firstName: 'one', firstName: 'one',
lastName: 'test', lastName: 'test',

848
server/package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@ -61,6 +61,7 @@
"geo-tz": "^7.0.2", "geo-tz": "^7.0.2",
"handlebars": "^4.7.7", "handlebars": "^4.7.7",
"i18n-iso-countries": "^7.5.0", "i18n-iso-countries": "^7.5.0",
"jest-when": "^3.5.2",
"joi": "^17.5.0", "joi": "^17.5.0",
"local-reverse-geocoder": "^0.12.5", "local-reverse-geocoder": "^0.12.5",
"lodash": "^4.17.21", "lodash": "^4.17.21",
@ -96,6 +97,7 @@
"@types/fluent-ffmpeg": "^2.1.20", "@types/fluent-ffmpeg": "^2.1.20",
"@types/imagemin": "^8.0.0", "@types/imagemin": "^8.0.0",
"@types/jest": "27.0.2", "@types/jest": "27.0.2",
"@types/jest-when": "^3.5.2",
"@types/lodash": "^4.14.178", "@types/lodash": "^4.14.178",
"@types/multer": "^1.4.7", "@types/multer": "^1.4.7",
"@types/mv": "^2.1.2", "@types/mv": "^2.1.2",
@ -145,6 +147,7 @@
"@app/database/config": "<rootDir>/libs/database/src/config", "@app/database/config": "<rootDir>/libs/database/src/config",
"@app/common": "<rootDir>/libs/common/src", "@app/common": "<rootDir>/libs/common/src",
"^@app/job(|/.*)$": "<rootDir>/libs/job/src/$1", "^@app/job(|/.*)$": "<rootDir>/libs/job/src/$1",
"@app/job": "<rootDir>/libs/job/src",
"^@app/immich-config(|/.*)$": "<rootDir>/libs/immich-config/src/$1", "^@app/immich-config(|/.*)$": "<rootDir>/libs/immich-config/src/$1",
"^@app/storage(|/.*)$": "<rootDir>/libs/storage/src/$1" "^@app/storage(|/.*)$": "<rootDir>/libs/storage/src/$1"
} }