mirror of
https://github.com/ershisan99/flashcards-api.git
synced 2025-12-17 05:09:26 +00:00
create use cases for auth
This commit is contained in:
@@ -7,9 +7,11 @@ import { PrismaModule } from './prisma.module'
|
|||||||
import { MailerModule } from '@nestjs-modules/mailer'
|
import { MailerModule } from '@nestjs-modules/mailer'
|
||||||
import * as process from 'process'
|
import * as process from 'process'
|
||||||
import { JwtRefreshStrategy } from './modules/auth/strategies/jwt-refresh.strategy'
|
import { JwtRefreshStrategy } from './modules/auth/strategies/jwt-refresh.strategy'
|
||||||
|
import { CqrsModule } from '@nestjs/cqrs'
|
||||||
|
|
||||||
@Module({
|
@Module({
|
||||||
imports: [
|
imports: [
|
||||||
|
CqrsModule,
|
||||||
ConfigModule,
|
ConfigModule,
|
||||||
UsersModule,
|
UsersModule,
|
||||||
AuthModule,
|
AuthModule,
|
||||||
@@ -29,6 +31,6 @@ import { JwtRefreshStrategy } from './modules/auth/strategies/jwt-refresh.strate
|
|||||||
],
|
],
|
||||||
controllers: [],
|
controllers: [],
|
||||||
providers: [JwtStrategy, JwtRefreshStrategy],
|
providers: [JwtStrategy, JwtRefreshStrategy],
|
||||||
exports: [],
|
exports: [CqrsModule],
|
||||||
})
|
})
|
||||||
export class AppModule {}
|
export class AppModule {}
|
||||||
|
|||||||
@@ -10,18 +10,19 @@ export class HttpExceptionFilter implements ExceptionFilter {
|
|||||||
const status = exception.getStatus()
|
const status = exception.getStatus()
|
||||||
if (status === 400) {
|
if (status === 400) {
|
||||||
const errorsResponse = {
|
const errorsResponse = {
|
||||||
errorsMessages: [],
|
errorMessages: [],
|
||||||
}
|
}
|
||||||
const responseBody: any = exception.getResponse()
|
const responseBody: any = exception.getResponse()
|
||||||
if (typeof responseBody.message === 'object') {
|
if (typeof responseBody.message === 'object') {
|
||||||
responseBody.message.forEach(e => errorsResponse.errorsMessages.push(e))
|
responseBody.message.forEach(e => errorsResponse.errorMessages.push(e))
|
||||||
} else {
|
} else {
|
||||||
errorsResponse.errorsMessages.push(responseBody.message)
|
errorsResponse.errorMessages.push(responseBody.message)
|
||||||
}
|
}
|
||||||
response.status(status).json(errorsResponse)
|
response.status(status).json(errorsResponse)
|
||||||
} else {
|
} else {
|
||||||
response.status(status).json({
|
response.status(status).json({
|
||||||
statusCode: status,
|
statusCode: status,
|
||||||
|
message: exception.message,
|
||||||
timestamp: new Date().toISOString(),
|
timestamp: new Date().toISOString(),
|
||||||
path: request.url,
|
path: request.url,
|
||||||
})
|
})
|
||||||
|
|||||||
@@ -1,18 +0,0 @@
|
|||||||
import { BadRequestException, CanActivate, ExecutionContext } from '@nestjs/common'
|
|
||||||
import { UsersRepository } from '../../modules/users/infrastructure/users.repository'
|
|
||||||
|
|
||||||
export class LimitsControlGuard implements CanActivate {
|
|
||||||
constructor(private usersRepository: UsersRepository) {}
|
|
||||||
|
|
||||||
async canActivate(context: ExecutionContext): Promise<boolean> | null {
|
|
||||||
const request = context.switchToHttp().getRequest()
|
|
||||||
const email = request.body.email
|
|
||||||
const userWithExistingEmail = await this.usersRepository.findUserByEmail(email)
|
|
||||||
if (userWithExistingEmail)
|
|
||||||
throw new BadRequestException({
|
|
||||||
message: 'email already exist',
|
|
||||||
field: 'email',
|
|
||||||
})
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
import { NestFactory } from '@nestjs/core'
|
import { NestFactory } from '@nestjs/core'
|
||||||
import { AppModule } from './app.module'
|
import { AppModule } from './app.module'
|
||||||
import { BadRequestException, ValidationPipe } from '@nestjs/common'
|
import { BadRequestException, Logger, ValidationPipe } from '@nestjs/common'
|
||||||
import { HttpExceptionFilter } from './exception.filter'
|
import { HttpExceptionFilter } from './exception.filter'
|
||||||
import * as cookieParser from 'cookie-parser'
|
import * as cookieParser from 'cookie-parser'
|
||||||
import { SwaggerModule, DocumentBuilder } from '@nestjs/swagger'
|
import { SwaggerModule, DocumentBuilder } from '@nestjs/swagger'
|
||||||
@@ -30,6 +30,8 @@ async function bootstrap() {
|
|||||||
app.useGlobalFilters(new HttpExceptionFilter())
|
app.useGlobalFilters(new HttpExceptionFilter())
|
||||||
app.use(cookieParser())
|
app.use(cookieParser())
|
||||||
await app.listen(process.env.PORT || 3000)
|
await app.listen(process.env.PORT || 3000)
|
||||||
|
const logger = new Logger('NestApplication')
|
||||||
|
logger.log(`Application is running on: ${await app.getUrl()}`)
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
|||||||
@@ -1,46 +1,41 @@
|
|||||||
import {
|
import {
|
||||||
|
Body,
|
||||||
Controller,
|
Controller,
|
||||||
Get,
|
Get,
|
||||||
Post,
|
|
||||||
Body,
|
|
||||||
UseGuards,
|
|
||||||
Request,
|
|
||||||
Response,
|
|
||||||
NotFoundException,
|
|
||||||
UnauthorizedException,
|
|
||||||
BadRequestException,
|
|
||||||
Res,
|
|
||||||
HttpCode,
|
HttpCode,
|
||||||
HttpStatus,
|
HttpStatus,
|
||||||
|
Post,
|
||||||
|
Request,
|
||||||
|
Res,
|
||||||
|
Response,
|
||||||
|
UnauthorizedException,
|
||||||
|
UseGuards,
|
||||||
} from '@nestjs/common'
|
} from '@nestjs/common'
|
||||||
import { AuthService } from './auth.service'
|
|
||||||
import { RegistrationDto } from './dto/registration.dto'
|
import { RegistrationDto } from './dto/registration.dto'
|
||||||
import { LocalAuthGuard } from './guards/local-auth.guard'
|
import { LocalAuthGuard } from './guards/local-auth.guard'
|
||||||
import { UsersService } from '../users/services/users.service'
|
|
||||||
import { JwtAuthGuard } from './guards/jwt-auth.guard'
|
import { JwtAuthGuard } from './guards/jwt-auth.guard'
|
||||||
import { Response as ExpressResponse } from 'express'
|
import { Response as ExpressResponse } from 'express'
|
||||||
import { JwtRefreshGuard } from './guards/jwt-refresh.guard'
|
import { JwtRefreshGuard } from './guards/jwt-refresh.guard'
|
||||||
import { Cookies } from '../../infrastructure/decorators/cookie.decorator'
|
import { Cookies } from '../../infrastructure/decorators/cookie.decorator'
|
||||||
|
import { CommandBus } from '@nestjs/cqrs'
|
||||||
|
import {
|
||||||
|
CreateUserCommand,
|
||||||
|
GetCurrentUserDataCommand,
|
||||||
|
LogoutCommand,
|
||||||
|
RefreshTokenCommand,
|
||||||
|
ResendVerificationEmailCommand,
|
||||||
|
VerifyEmailCommand,
|
||||||
|
} from './use-cases'
|
||||||
|
|
||||||
@Controller('auth')
|
@Controller('auth')
|
||||||
export class AuthController {
|
export class AuthController {
|
||||||
constructor(
|
constructor(private commandBus: CommandBus) {}
|
||||||
private readonly authService: AuthService,
|
|
||||||
private readonly usersService: UsersService
|
|
||||||
) {}
|
|
||||||
|
|
||||||
@UseGuards(JwtAuthGuard)
|
@UseGuards(JwtAuthGuard)
|
||||||
@Get('me')
|
@Get('me')
|
||||||
async getUserData(@Request() req) {
|
async getUserData(@Request() req) {
|
||||||
const userId = req.user.id
|
const userId = req.user.id
|
||||||
const user = await this.usersService.getUserById(userId)
|
return await this.commandBus.execute(new GetCurrentUserDataCommand(userId))
|
||||||
|
|
||||||
if (!user) throw new UnauthorizedException()
|
|
||||||
|
|
||||||
return {
|
|
||||||
email: user.email,
|
|
||||||
name: user.name,
|
|
||||||
id: user.id,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@HttpCode(200)
|
@HttpCode(200)
|
||||||
@@ -59,32 +54,18 @@ export class AuthController {
|
|||||||
@HttpCode(201)
|
@HttpCode(201)
|
||||||
@Post('sign-up')
|
@Post('sign-up')
|
||||||
async registration(@Body() registrationData: RegistrationDto) {
|
async registration(@Body() registrationData: RegistrationDto) {
|
||||||
return await this.usersService.createUser(
|
return await this.commandBus.execute(new CreateUserCommand(registrationData))
|
||||||
registrationData.name,
|
|
||||||
registrationData.password,
|
|
||||||
registrationData.email
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@HttpCode(HttpStatus.OK)
|
@HttpCode(HttpStatus.OK)
|
||||||
@Post('verify-email')
|
@Post('verify-email')
|
||||||
async confirmRegistration(@Body('code') confirmationCode) {
|
async confirmRegistration(@Body('code') confirmationCode) {
|
||||||
const result = await this.authService.confirmEmail(confirmationCode)
|
return await this.commandBus.execute(new VerifyEmailCommand(confirmationCode))
|
||||||
if (!result) {
|
|
||||||
throw new NotFoundException()
|
|
||||||
}
|
|
||||||
return null
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('resend-verification-email')
|
@Post('resend-verification-email')
|
||||||
async resendRegistrationEmail(@Body('userId') userId: string) {
|
async resendVerificationEmail(@Body('userId') userId: string) {
|
||||||
const isResent = await this.authService.resendCode(userId)
|
return await this.commandBus.execute(new ResendVerificationEmailCommand(userId))
|
||||||
if (!isResent)
|
|
||||||
throw new BadRequestException({
|
|
||||||
message: 'Email already confirmed or such email was not found',
|
|
||||||
field: 'email',
|
|
||||||
})
|
|
||||||
return null
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@UseGuards(JwtAuthGuard)
|
@UseGuards(JwtAuthGuard)
|
||||||
@@ -94,7 +75,7 @@ export class AuthController {
|
|||||||
@Res({ passthrough: true }) res: ExpressResponse
|
@Res({ passthrough: true }) res: ExpressResponse
|
||||||
) {
|
) {
|
||||||
if (!refreshToken) throw new UnauthorizedException()
|
if (!refreshToken) throw new UnauthorizedException()
|
||||||
await this.usersService.addRevokedToken(refreshToken)
|
await this.commandBus.execute(new LogoutCommand(refreshToken))
|
||||||
res.clearCookie('refreshToken')
|
res.clearCookie('refreshToken')
|
||||||
return null
|
return null
|
||||||
}
|
}
|
||||||
@@ -105,7 +86,7 @@ export class AuthController {
|
|||||||
async refreshToken(@Request() req, @Response({ passthrough: true }) res: ExpressResponse) {
|
async refreshToken(@Request() req, @Response({ passthrough: true }) res: ExpressResponse) {
|
||||||
if (!req.cookies?.refreshToken) throw new UnauthorizedException()
|
if (!req.cookies?.refreshToken) throw new UnauthorizedException()
|
||||||
const userId = req.user.id
|
const userId = req.user.id
|
||||||
const newTokens = await this.authService.createJwtTokensPair(userId)
|
const newTokens = await this.commandBus.execute(new RefreshTokenCommand(userId))
|
||||||
res.cookie('refreshToken', newTokens.refreshToken, {
|
res.cookie('refreshToken', newTokens.refreshToken, {
|
||||||
httpOnly: true,
|
httpOnly: true,
|
||||||
// secure: true,
|
// secure: true,
|
||||||
|
|||||||
@@ -3,11 +3,30 @@ import { AuthService } from './auth.service'
|
|||||||
import { AuthController } from './auth.controller'
|
import { AuthController } from './auth.controller'
|
||||||
import { UsersModule } from '../users/users.module'
|
import { UsersModule } from '../users/users.module'
|
||||||
import { LocalStrategy } from './strategies/local.strategy'
|
import { LocalStrategy } from './strategies/local.strategy'
|
||||||
|
import { CqrsModule } from '@nestjs/cqrs'
|
||||||
|
import {
|
||||||
|
CreateUserHandler,
|
||||||
|
GetCurrentUserDataHandler,
|
||||||
|
LogoutHandler,
|
||||||
|
RefreshTokenHandler,
|
||||||
|
ResendVerificationEmailHandler,
|
||||||
|
VerifyEmailHandler,
|
||||||
|
} from './use-cases'
|
||||||
|
import { AuthRepository } from './infrastructure/auth.repository'
|
||||||
|
|
||||||
|
const commandHandlers = [
|
||||||
|
CreateUserHandler,
|
||||||
|
GetCurrentUserDataHandler,
|
||||||
|
LogoutHandler,
|
||||||
|
RefreshTokenHandler,
|
||||||
|
ResendVerificationEmailHandler,
|
||||||
|
VerifyEmailHandler,
|
||||||
|
]
|
||||||
|
|
||||||
@Module({
|
@Module({
|
||||||
imports: [UsersModule],
|
imports: [UsersModule, CqrsModule],
|
||||||
controllers: [AuthController],
|
controllers: [AuthController],
|
||||||
providers: [AuthService, LocalStrategy],
|
providers: [AuthService, LocalStrategy, AuthRepository, ...commandHandlers],
|
||||||
exports: [AuthService],
|
exports: [AuthService, CqrsModule],
|
||||||
})
|
})
|
||||||
export class AuthModule {}
|
export class AuthModule {}
|
||||||
|
|||||||
@@ -10,31 +10,6 @@ import { PrismaService } from '../../prisma.service'
|
|||||||
export class AuthService {
|
export class AuthService {
|
||||||
constructor(private usersRepository: UsersRepository, private prisma: PrismaService) {}
|
constructor(private usersRepository: UsersRepository, private prisma: PrismaService) {}
|
||||||
|
|
||||||
async revokeToken(token: string, userId: string): Promise<void> {
|
|
||||||
await this.prisma.revokedToken.create({
|
|
||||||
data: {
|
|
||||||
userId,
|
|
||||||
token,
|
|
||||||
},
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
async isTokenRevoked(token: string): Promise<boolean> {
|
|
||||||
const revokedToken = await this.prisma.revokedToken.findUnique({
|
|
||||||
where: { token },
|
|
||||||
})
|
|
||||||
return !!revokedToken
|
|
||||||
}
|
|
||||||
|
|
||||||
// Periodically remove old revoked tokens
|
|
||||||
async removeExpiredTokens(): Promise<void> {
|
|
||||||
const hourAgo = new Date()
|
|
||||||
hourAgo.setHours(hourAgo.getHours() - 1)
|
|
||||||
await this.prisma.revokedToken.deleteMany({
|
|
||||||
where: { revokedAt: { lt: hourAgo } },
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
async createJwtTokensPair(userId: string) {
|
async createJwtTokensPair(userId: string) {
|
||||||
const accessSecretKey = process.env.ACCESS_JWT_SECRET_KEY
|
const accessSecretKey = process.env.ACCESS_JWT_SECRET_KEY
|
||||||
const refreshSecretKey = process.env.REFRESH_JWT_SECRET_KEY
|
const refreshSecretKey = process.env.REFRESH_JWT_SECRET_KEY
|
||||||
@@ -62,42 +37,6 @@ export class AuthService {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
async checkToken(accessToken: string, refreshToken: string) {
|
|
||||||
try {
|
|
||||||
await jwt.verify(accessToken, process.env.ACCESS_JWT_SECRET_KEY)
|
|
||||||
return true
|
|
||||||
} catch (err) {
|
|
||||||
if (err instanceof jwt.TokenExpiredError) {
|
|
||||||
const dbRefreshToken = await this.prisma.refreshToken.findUnique({
|
|
||||||
where: { token: refreshToken },
|
|
||||||
})
|
|
||||||
const isTokenRevoked = await this.isTokenRevoked(accessToken)
|
|
||||||
if (isTokenRevoked) {
|
|
||||||
throw new UnauthorizedException()
|
|
||||||
}
|
|
||||||
if (dbRefreshToken && !dbRefreshToken.isRevoked && dbRefreshToken.expiresAt > new Date()) {
|
|
||||||
const newTokens = await this.createJwtTokensPair(dbRefreshToken.userId)
|
|
||||||
await this.prisma.refreshToken.update({
|
|
||||||
where: { id: dbRefreshToken.id },
|
|
||||||
data: { isRevoked: true },
|
|
||||||
})
|
|
||||||
return newTokens
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async logout(accessToken: string, refreshToken: string) {
|
|
||||||
// Revoke the access token
|
|
||||||
const decoded = jwt.verify(accessToken, process.env.ACCESS_JWT_SECRET_KEY)
|
|
||||||
await this.revokeToken(accessToken, decoded.userId)
|
|
||||||
await this.prisma.refreshToken.update({
|
|
||||||
where: { token: refreshToken },
|
|
||||||
data: { isRevoked: true },
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
async checkCredentials(email: string, password: string) {
|
async checkCredentials(email: string, password: string) {
|
||||||
const user = await this.usersRepository.findUserByEmail(email)
|
const user = await this.usersRepository.findUserByEmail(email)
|
||||||
if (!user /*|| !user.emailConfirmation.isConfirmed*/)
|
if (!user /*|| !user.emailConfirmation.isConfirmed*/)
|
||||||
@@ -130,27 +69,4 @@ export class AuthService {
|
|||||||
private async isPasswordCorrect(password: string, hash: string) {
|
private async isPasswordCorrect(password: string, hash: string) {
|
||||||
return bcrypt.compare(password, hash)
|
return bcrypt.compare(password, hash)
|
||||||
}
|
}
|
||||||
|
|
||||||
async confirmEmail(token: string): Promise<boolean> {
|
|
||||||
const verificationWithUser = await this.usersRepository.findUserByVerificationToken(token)
|
|
||||||
console.log(verificationWithUser)
|
|
||||||
if (!verificationWithUser || verificationWithUser.isEmailVerified) return false
|
|
||||||
const dbToken = verificationWithUser.verificationToken
|
|
||||||
const isTokenExpired = isBefore(verificationWithUser.verificationTokenExpiry, new Date())
|
|
||||||
console.log({ isTokenExpired })
|
|
||||||
if (dbToken !== token || isTokenExpired) {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
return await this.usersRepository.updateConfirmation(verificationWithUser.userId)
|
|
||||||
}
|
|
||||||
|
|
||||||
async resendCode(userId: string) {
|
|
||||||
const user = await this.usersRepository.findUserById(userId)
|
|
||||||
if (!user || user?.verification.isEmailVerified) return null
|
|
||||||
const updatedUser = await this.usersRepository.updateVerificationToken(user.id)
|
|
||||||
if (!updatedUser) return null
|
|
||||||
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
18
src/modules/auth/infrastructure/auth.repository.ts
Normal file
18
src/modules/auth/infrastructure/auth.repository.ts
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
import { Injectable } from '@nestjs/common'
|
||||||
|
import { PrismaService } from '../../../prisma.service'
|
||||||
|
|
||||||
|
@Injectable()
|
||||||
|
export class AuthRepository {
|
||||||
|
constructor(private prisma: PrismaService) {}
|
||||||
|
|
||||||
|
async createRefreshToken(userId: string, token: string, expiresAt: Date) {
|
||||||
|
return await this.prisma.refreshToken.create({
|
||||||
|
data: {
|
||||||
|
userId,
|
||||||
|
token,
|
||||||
|
expiresAt,
|
||||||
|
isRevoked: false,
|
||||||
|
},
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
46
src/modules/auth/use-cases/create-user-use-case.ts
Normal file
46
src/modules/auth/use-cases/create-user-use-case.ts
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { UsersRepository } from '../../users/infrastructure/users.repository'
|
||||||
|
import { CreateUserInput, UserViewType } from '../../../types/types'
|
||||||
|
import { addHours } from 'date-fns'
|
||||||
|
import { v4 as uuidv4 } from 'uuid'
|
||||||
|
import { UsersService } from '../../users/services/users.service'
|
||||||
|
|
||||||
|
export class CreateUserCommand {
|
||||||
|
constructor(public readonly user: { name: string; password: string; email: string }) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(CreateUserCommand)
|
||||||
|
export class CreateUserHandler implements ICommandHandler<CreateUserCommand> {
|
||||||
|
constructor(
|
||||||
|
private readonly usersRepository: UsersRepository,
|
||||||
|
private readonly usersService: UsersService
|
||||||
|
) {}
|
||||||
|
|
||||||
|
async execute(command: CreateUserCommand): Promise<UserViewType | null> {
|
||||||
|
const { name, password, email } = command.user
|
||||||
|
const passwordHash = await this.usersService.generateHash(password)
|
||||||
|
const verificationToken = uuidv4()
|
||||||
|
const newUser: CreateUserInput = {
|
||||||
|
name: name || email.split('@')[0],
|
||||||
|
email: email,
|
||||||
|
password: passwordHash,
|
||||||
|
verificationToken,
|
||||||
|
verificationTokenExpiry: addHours(new Date(), 24),
|
||||||
|
isEmailVerified: false,
|
||||||
|
}
|
||||||
|
const createdUser = await this.usersRepository.createUser(newUser)
|
||||||
|
if (!createdUser) {
|
||||||
|
return null
|
||||||
|
}
|
||||||
|
await this.usersService.sendConfirmationEmail({
|
||||||
|
email: createdUser.email,
|
||||||
|
name: createdUser.name,
|
||||||
|
verificationToken: verificationToken,
|
||||||
|
})
|
||||||
|
return {
|
||||||
|
id: createdUser.id,
|
||||||
|
name: createdUser.name,
|
||||||
|
email: createdUser.email,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
22
src/modules/auth/use-cases/get-current-user-data-use-case.ts
Normal file
22
src/modules/auth/use-cases/get-current-user-data-use-case.ts
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { UserViewType } from '../../../types/types'
|
||||||
|
import { UnauthorizedException } from '@nestjs/common'
|
||||||
|
import { pick } from 'remeda'
|
||||||
|
import { UsersRepository } from '../../users/infrastructure/users.repository'
|
||||||
|
|
||||||
|
export class GetCurrentUserDataCommand {
|
||||||
|
constructor(public readonly userId: string) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(GetCurrentUserDataCommand)
|
||||||
|
export class GetCurrentUserDataHandler implements ICommandHandler<GetCurrentUserDataCommand> {
|
||||||
|
constructor(private readonly usersRepository: UsersRepository) {}
|
||||||
|
|
||||||
|
async execute(command: GetCurrentUserDataCommand): Promise<UserViewType | null> {
|
||||||
|
const user = await this.usersRepository.findUserById(command.userId)
|
||||||
|
|
||||||
|
if (!user) throw new UnauthorizedException()
|
||||||
|
|
||||||
|
return pick(user, ['email', 'name', 'id', 'isEmailVerified'])
|
||||||
|
}
|
||||||
|
}
|
||||||
6
src/modules/auth/use-cases/index.ts
Normal file
6
src/modules/auth/use-cases/index.ts
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
export * from './create-user-use-case'
|
||||||
|
export * from './get-current-user-data-use-case'
|
||||||
|
export * from './logout-use-case'
|
||||||
|
export * from './resend-verification-email-use-case'
|
||||||
|
export * from './refresh-token-use-case'
|
||||||
|
export * from './verify-email-use-case'
|
||||||
30
src/modules/auth/use-cases/logout-use-case.ts
Normal file
30
src/modules/auth/use-cases/logout-use-case.ts
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { Logger } from '@nestjs/common'
|
||||||
|
import { UsersRepository } from '../../users/infrastructure/users.repository'
|
||||||
|
import jwt from 'jsonwebtoken'
|
||||||
|
|
||||||
|
export class LogoutCommand {
|
||||||
|
constructor(public readonly refreshToken: string) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(LogoutCommand)
|
||||||
|
export class LogoutHandler implements ICommandHandler<LogoutCommand> {
|
||||||
|
constructor(private readonly usersRepository: UsersRepository) {}
|
||||||
|
|
||||||
|
private readonly logger = new Logger(LogoutHandler.name)
|
||||||
|
|
||||||
|
async execute(command: LogoutCommand) {
|
||||||
|
const token = command.refreshToken
|
||||||
|
|
||||||
|
const secretKey = process.env.JWT_SECRET_KEY
|
||||||
|
if (!secretKey) throw new Error('JWT_SECRET_KEY is not defined')
|
||||||
|
|
||||||
|
try {
|
||||||
|
const decoded: any = jwt.verify(token, secretKey)
|
||||||
|
return this.usersRepository.revokeToken(decoded.userId, token)
|
||||||
|
} catch (e) {
|
||||||
|
this.logger.log(`Decoding error: ${e}`)
|
||||||
|
return null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
35
src/modules/auth/use-cases/refresh-token-use-case.ts
Normal file
35
src/modules/auth/use-cases/refresh-token-use-case.ts
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { AuthRepository } from '../infrastructure/auth.repository'
|
||||||
|
import jwt from 'jsonwebtoken'
|
||||||
|
import { addDays } from 'date-fns'
|
||||||
|
|
||||||
|
export class RefreshTokenCommand {
|
||||||
|
constructor(public readonly userId: string) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(RefreshTokenCommand)
|
||||||
|
export class RefreshTokenHandler implements ICommandHandler<RefreshTokenCommand> {
|
||||||
|
constructor(private readonly authRepository: AuthRepository) {}
|
||||||
|
|
||||||
|
async execute(command: RefreshTokenCommand) {
|
||||||
|
const { userId } = command
|
||||||
|
|
||||||
|
const accessSecretKey = process.env.ACCESS_JWT_SECRET_KEY
|
||||||
|
const refreshSecretKey = process.env.REFRESH_JWT_SECRET_KEY
|
||||||
|
|
||||||
|
const payload: { userId: string; date: Date } = {
|
||||||
|
userId,
|
||||||
|
date: new Date(),
|
||||||
|
}
|
||||||
|
const accessToken = jwt.sign(payload, accessSecretKey, { expiresIn: '10m' })
|
||||||
|
const refreshToken = jwt.sign(payload, refreshSecretKey, {
|
||||||
|
expiresIn: '30d',
|
||||||
|
})
|
||||||
|
const expiresIn = addDays(new Date(), 30)
|
||||||
|
await this.authRepository.createRefreshToken(userId, refreshToken, expiresIn)
|
||||||
|
return {
|
||||||
|
accessToken,
|
||||||
|
refreshToken,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,41 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { BadRequestException, NotFoundException } from '@nestjs/common'
|
||||||
|
import { UsersRepository } from '../../users/infrastructure/users.repository'
|
||||||
|
import { UsersService } from '../../users/services/users.service'
|
||||||
|
|
||||||
|
export class ResendVerificationEmailCommand {
|
||||||
|
constructor(public readonly userId: string) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(ResendVerificationEmailCommand)
|
||||||
|
export class ResendVerificationEmailHandler
|
||||||
|
implements ICommandHandler<ResendVerificationEmailCommand>
|
||||||
|
{
|
||||||
|
constructor(
|
||||||
|
private readonly usersRepository: UsersRepository,
|
||||||
|
private readonly usersService: UsersService
|
||||||
|
) {}
|
||||||
|
|
||||||
|
async execute(command: ResendVerificationEmailCommand) {
|
||||||
|
const user = await this.usersRepository.findUserById(command.userId)
|
||||||
|
console.log(user)
|
||||||
|
if (!user) {
|
||||||
|
throw new NotFoundException('User not found')
|
||||||
|
}
|
||||||
|
if (user.isEmailVerified) {
|
||||||
|
throw new BadRequestException('Email has already been verified')
|
||||||
|
}
|
||||||
|
|
||||||
|
const updatedUser = await this.usersRepository.updateVerificationToken(user.id)
|
||||||
|
await this.usersService.sendConfirmationEmail({
|
||||||
|
email: updatedUser.user.email,
|
||||||
|
name: updatedUser.user.name,
|
||||||
|
verificationToken: updatedUser.verificationToken,
|
||||||
|
})
|
||||||
|
if (!updatedUser) {
|
||||||
|
throw new NotFoundException('User not found')
|
||||||
|
}
|
||||||
|
|
||||||
|
return null
|
||||||
|
}
|
||||||
|
}
|
||||||
35
src/modules/auth/use-cases/verify-email-use-case.ts
Normal file
35
src/modules/auth/use-cases/verify-email-use-case.ts
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
import { CommandHandler, ICommandHandler } from '@nestjs/cqrs'
|
||||||
|
import { BadRequestException, NotFoundException } from '@nestjs/common'
|
||||||
|
import { isBefore } from 'date-fns'
|
||||||
|
import { UsersRepository } from '../../users/infrastructure/users.repository'
|
||||||
|
|
||||||
|
export class VerifyEmailCommand {
|
||||||
|
constructor(public readonly token: string) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
@CommandHandler(VerifyEmailCommand)
|
||||||
|
export class VerifyEmailHandler implements ICommandHandler<VerifyEmailCommand> {
|
||||||
|
constructor(private readonly usersRepository: UsersRepository) {}
|
||||||
|
|
||||||
|
async execute(command: VerifyEmailCommand) {
|
||||||
|
const token = command.token
|
||||||
|
|
||||||
|
const verificationWithUser = await this.usersRepository.findUserByVerificationToken(token)
|
||||||
|
if (!verificationWithUser) throw new NotFoundException('User not found')
|
||||||
|
|
||||||
|
if (verificationWithUser.isEmailVerified)
|
||||||
|
throw new BadRequestException('Email has already been verified')
|
||||||
|
|
||||||
|
const dbToken = verificationWithUser.verificationToken
|
||||||
|
const isTokenExpired = isBefore(verificationWithUser.verificationTokenExpiry, new Date())
|
||||||
|
if (dbToken !== token || isTokenExpired) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
const result = await this.usersRepository.updateEmailVerification(verificationWithUser.userId)
|
||||||
|
if (!result) {
|
||||||
|
throw new NotFoundException('User not found')
|
||||||
|
}
|
||||||
|
return null
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -13,10 +13,12 @@ import { UsersService } from '../services/users.service'
|
|||||||
import { CreateUserDto } from '../dto/create-user.dto'
|
import { CreateUserDto } from '../dto/create-user.dto'
|
||||||
import { Pagination } from '../../../infrastructure/common/pagination.service'
|
import { Pagination } from '../../../infrastructure/common/pagination.service'
|
||||||
import { BaseAuthGuard } from '../../auth/guards/base-auth.guard'
|
import { BaseAuthGuard } from '../../auth/guards/base-auth.guard'
|
||||||
|
import { CommandBus } from '@nestjs/cqrs'
|
||||||
|
import { CreateUserCommand } from '../../auth/use-cases'
|
||||||
|
|
||||||
@Controller('users')
|
@Controller('users')
|
||||||
export class UsersController {
|
export class UsersController {
|
||||||
constructor(private usersService: UsersService) {}
|
constructor(private usersService: UsersService, private commandBus: CommandBus) {}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
async findAll(@Query() query) {
|
async findAll(@Query() query) {
|
||||||
@@ -29,10 +31,12 @@ export class UsersController {
|
|||||||
//@UseGuards(BaseAuthGuard)
|
//@UseGuards(BaseAuthGuard)
|
||||||
@Post()
|
@Post()
|
||||||
async create(@Body() createUserDto: CreateUserDto) {
|
async create(@Body() createUserDto: CreateUserDto) {
|
||||||
return await this.usersService.createUser(
|
return await this.commandBus.execute(
|
||||||
createUserDto.login,
|
new CreateUserCommand({
|
||||||
createUserDto.password,
|
name: createUserDto.name,
|
||||||
createUserDto.email
|
email: createUserDto.email,
|
||||||
|
password: createUserDto.password,
|
||||||
|
})
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -2,7 +2,7 @@ import { Length, Matches } from 'class-validator'
|
|||||||
|
|
||||||
export class CreateUserDto {
|
export class CreateUserDto {
|
||||||
@Length(3, 10)
|
@Length(3, 10)
|
||||||
login: string
|
name: string
|
||||||
@Length(6, 20)
|
@Length(6, 20)
|
||||||
password: string
|
password: string
|
||||||
@Matches(/^[\w-.]+@([\w-]+\.)+[\w-]{2,4}$/)
|
@Matches(/^[\w-.]+@([\w-]+\.)+[\w-]{2,4}$/)
|
||||||
|
|||||||
@@ -7,13 +7,13 @@ import {
|
|||||||
} from '../../../types/types'
|
} from '../../../types/types'
|
||||||
import { Injectable } from '@nestjs/common'
|
import { Injectable } from '@nestjs/common'
|
||||||
import { addHours } from 'date-fns'
|
import { addHours } from 'date-fns'
|
||||||
import { IUsersRepository } from '../services/users.service'
|
|
||||||
import { v4 as uuidv4 } from 'uuid'
|
import { v4 as uuidv4 } from 'uuid'
|
||||||
import { PrismaService } from '../../../prisma.service'
|
import { PrismaService } from '../../../prisma.service'
|
||||||
import { pick } from 'remeda'
|
import { pick } from 'remeda'
|
||||||
import { Prisma } from '@prisma/client'
|
import { Prisma } from '@prisma/client'
|
||||||
|
|
||||||
@Injectable()
|
@Injectable()
|
||||||
export class UsersRepository implements IUsersRepository {
|
export class UsersRepository {
|
||||||
constructor(private prisma: PrismaService) {}
|
constructor(private prisma: PrismaService) {}
|
||||||
|
|
||||||
async getUsers(
|
async getUsers(
|
||||||
@@ -123,13 +123,18 @@ export class UsersRepository implements IUsersRepository {
|
|||||||
return verification
|
return verification
|
||||||
}
|
}
|
||||||
|
|
||||||
async updateConfirmation(id: string) {
|
async updateEmailVerification(id: string) {
|
||||||
const result = await this.prisma.verification.update({
|
const result = await this.prisma.verification.update({
|
||||||
where: {
|
where: {
|
||||||
userId: id,
|
userId: id,
|
||||||
},
|
},
|
||||||
data: {
|
data: {
|
||||||
isEmailVerified: true,
|
isEmailVerified: true,
|
||||||
|
user: {
|
||||||
|
update: {
|
||||||
|
isEmailVerified: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
return result.isEmailVerified
|
return result.isEmailVerified
|
||||||
|
|||||||
@@ -1,6 +1,4 @@
|
|||||||
import { v4 as uuidv4 } from 'uuid'
|
|
||||||
import { CreateUserInput, EntityWithPaginationType, User, UserViewType } from '../../../types/types'
|
import { CreateUserInput, EntityWithPaginationType, User, UserViewType } from '../../../types/types'
|
||||||
import { addHours } from 'date-fns'
|
|
||||||
import { Injectable } from '@nestjs/common'
|
import { Injectable } from '@nestjs/common'
|
||||||
import jwt from 'jsonwebtoken'
|
import jwt from 'jsonwebtoken'
|
||||||
import { UsersRepository } from '../infrastructure/users.repository'
|
import { UsersRepository } from '../infrastructure/users.repository'
|
||||||
@@ -19,47 +17,6 @@ export class UsersService {
|
|||||||
return await this.usersRepository.findUserById(id)
|
return await this.usersRepository.findUserById(id)
|
||||||
}
|
}
|
||||||
|
|
||||||
async createUser(name: string, password: string, email: string): Promise<UserViewType | null> {
|
|
||||||
const passwordHash = await this._generateHash(password)
|
|
||||||
const verificationToken = uuidv4()
|
|
||||||
const newUser: CreateUserInput = {
|
|
||||||
name: name || email.split('@')[0],
|
|
||||||
email: email,
|
|
||||||
password: passwordHash,
|
|
||||||
verificationToken,
|
|
||||||
verificationTokenExpiry: addHours(new Date(), 24),
|
|
||||||
isEmailVerified: false,
|
|
||||||
}
|
|
||||||
const createdUser = await this.usersRepository.createUser(newUser)
|
|
||||||
if (!createdUser) {
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
await this.sendConfirmationEmail({
|
|
||||||
email: createdUser.email,
|
|
||||||
name: createdUser.name,
|
|
||||||
verificationToken: verificationToken,
|
|
||||||
})
|
|
||||||
return {
|
|
||||||
id: createdUser.id,
|
|
||||||
name: createdUser.name,
|
|
||||||
email: createdUser.email,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
async resendConfirmationEmail(userId: string) {
|
|
||||||
const user = await this.usersRepository.findUserById(userId, { verification: true })
|
|
||||||
if (!user) {
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
if (user.isEmailVerified) {
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
await this.sendConfirmationEmail({
|
|
||||||
email: user.email,
|
|
||||||
name: user.name,
|
|
||||||
verificationToken: user.verification.verificationToken,
|
|
||||||
})
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
async deleteUserById(id: string): Promise<boolean> {
|
async deleteUserById(id: string): Promise<boolean> {
|
||||||
return await this.usersRepository.deleteUserById(id)
|
return await this.usersRepository.deleteUserById(id)
|
||||||
}
|
}
|
||||||
@@ -68,19 +25,7 @@ export class UsersService {
|
|||||||
return await this.usersRepository.deleteAllUsers()
|
return await this.usersRepository.deleteAllUsers()
|
||||||
}
|
}
|
||||||
|
|
||||||
async addRevokedToken(token: string) {
|
public async sendConfirmationEmail({
|
||||||
const secretKey = process.env.JWT_SECRET_KEY
|
|
||||||
if (!secretKey) throw new Error('JWT_SECRET_KEY is not defined')
|
|
||||||
|
|
||||||
try {
|
|
||||||
const decoded: any = jwt.verify(token, secretKey)
|
|
||||||
return this.usersRepository.revokeToken(decoded.userId, token)
|
|
||||||
} catch (e) {
|
|
||||||
console.log(`Decoding error: ${e}`)
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
}
|
|
||||||
private async sendConfirmationEmail({
|
|
||||||
email,
|
email,
|
||||||
name,
|
name,
|
||||||
verificationToken,
|
verificationToken,
|
||||||
@@ -101,24 +46,8 @@ export class UsersService {
|
|||||||
console.log(e)
|
console.log(e)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
private async _generateHash(password: string) {
|
|
||||||
|
public async generateHash(password: string) {
|
||||||
return await bcrypt.hash(password, 10)
|
return await bcrypt.hash(password, 10)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
export interface IUsersRepository {
|
|
||||||
getUsers(
|
|
||||||
page: number,
|
|
||||||
pageSize: number,
|
|
||||||
searchNameTerm: string,
|
|
||||||
searchEmailTerm: string
|
|
||||||
): Promise<EntityWithPaginationType<UserViewType>>
|
|
||||||
|
|
||||||
createUser(newUser: CreateUserInput): Promise<User | null>
|
|
||||||
|
|
||||||
deleteUserById(id: string): Promise<boolean>
|
|
||||||
|
|
||||||
// findUserById(id: string): Promise<User | null>
|
|
||||||
|
|
||||||
revokeToken(id: string, token: string): Promise<User | null>
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -2,10 +2,12 @@ import { Module } from '@nestjs/common'
|
|||||||
import { UsersService } from './services/users.service'
|
import { UsersService } from './services/users.service'
|
||||||
import { UsersController } from './api/users.controller'
|
import { UsersController } from './api/users.controller'
|
||||||
import { UsersRepository } from './infrastructure/users.repository'
|
import { UsersRepository } from './infrastructure/users.repository'
|
||||||
|
import { CqrsModule } from '@nestjs/cqrs'
|
||||||
|
|
||||||
@Module({
|
@Module({
|
||||||
|
imports: [CqrsModule],
|
||||||
controllers: [UsersController],
|
controllers: [UsersController],
|
||||||
providers: [UsersService, UsersRepository],
|
providers: [UsersService, UsersRepository],
|
||||||
exports: [UsersRepository, UsersService],
|
exports: [UsersRepository, UsersService, CqrsModule],
|
||||||
})
|
})
|
||||||
export class UsersModule {}
|
export class UsersModule {}
|
||||||
|
|||||||
Reference in New Issue
Block a user