Skip to content
Snippets Groups Projects
Select Git revision
  • b4ccd9fb010d433e67978683a3d1c920a8ba0f92
  • dev default protected
  • 718-evenement-filtre-commune
  • test-sonar-jdk17
  • 168-pro-connect
  • renovate/major-jest-monorepo
  • renovate/bitnami-mongodb-8.x
  • renovate/ghcr.io-browserless-chromium-2.x
  • renovate/major-nest-monorepo
  • renovate/luxon-3.x
  • renovate/gouvfr-anct-timetable-to-osm-opening-hours-2.x
  • renovate/major-typescript-eslint-monorepo
  • renovate/npm-11.x
  • renovate/mysql-9.x
  • renovate/mongo-express-1.x
  • renovate/tsconfig-paths-4.x
  • renovate/jest-junit-16.x
  • renovate/express-5.x
  • renovate/elastic-elasticsearch-8.x
  • renovate/ghost-5.x
  • renovate/elasticsearch-7.x
  • v4.0.3
  • v4.0.1
  • v4.0.0
  • v3.4.3
  • v3.4.2
  • v3.4.1
  • v3.4.0
  • v3.3.1
  • v3.3.0
  • v3.2.0
  • v3.1.0
  • v3.0.1
  • v3.0.0
  • v2.5.0
  • v2.4.2
  • v2.4.1
  • v2.4.0
  • v2.3.2
  • v2.3.1
  • v2.3.0
41 results

auth.service.spec.ts

Blame
  • admin.controller.ts 6.05 KiB
    import { Body, Delete, Param } from '@nestjs/common';
    import { Controller, Get, Post, UseGuards } from '@nestjs/common';
    import { ApiOperation, ApiParam } from '@nestjs/swagger';
    import { JwtAuthGuard } from '../auth/guards/jwt-auth.guard';
    import { NewsletterService } from '../newsletter/newsletter.service';
    import { StructuresService } from '../structures/services/structures.service';
    import { Roles } from '../users/decorators/roles.decorator';
    import { RolesGuard } from '../users/guards/roles.guard';
    import { UsersService } from '../users/users.service';
    import { PendingStructureDto } from './dto/pending-structure.dto';
    import { UnclaimedStructureDto } from './dto/unclaimed-structure-dto';
    
    @Controller('admin')
    export class AdminController {
      constructor(
        private usersService: UsersService,
        private structuresService: StructuresService,
        private newsletterService: NewsletterService
      ) {}
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Get('pendingStructures')
      @ApiOperation({ description: 'Get pending structre for validation' })
      public async getPendingAttachments(): Promise<PendingStructureDto[]> {
        const pendingStructure = await this.usersService.getPendingStructures();
        return await Promise.all(
          pendingStructure.map(async (structure) => {
            structure.structureName = (await this.structuresService.findOne(structure.structureId)).structureName;
            return structure;
          })
        );
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Get('unclaimedStructures')
      @ApiOperation({ description: 'Get pending structre for validation' })
      public async getUnclaimedStructures(): Promise<UnclaimedStructureDto[]> {
        return await this.structuresService.findAllUnclaimed();
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Get('adminStructuresList')
      @ApiOperation({ description: 'Get pending structre for validation' })
      public async getAdminStructuresList(): Promise<any> {
        const structuresList = { claimed: [], inClaim: [], toClaim: [] };
        structuresList.inClaim = await this.getPendingAttachments();
        structuresList.toClaim = (await this.structuresService.findAllUnclaimed()).filter(
          (demand) => !structuresList.inClaim.find((elem) => elem.structureId == demand.structureId)
        );
        structuresList.claimed = (await this.structuresService.findAll()).filter(
          (demand) =>
            !structuresList.inClaim.find((elem) => elem.structureId == demand.id) &&
            !structuresList.toClaim.find((elem) => elem.structureId == demand.id)
        );
        return structuresList;
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Post('validatePendingStructure')
      @ApiOperation({ description: 'Validate structure ownership' })
      public async validatePendingStructure(@Body() pendingStructureDto: PendingStructureDto) {
        const structure = await this.structuresService.findOne(pendingStructureDto.structureId);
        await this.usersService.validatePendingStructure(
          pendingStructureDto.userEmail,
          pendingStructureDto.structureId,
          structure.structureName,
          true
        );
        const pendingStructure = await this.usersService.getPendingStructures();
        return await Promise.all(
          pendingStructure.map(async (pendingStructureData) => {
            pendingStructureData.structureName = (
              await this.structuresService.findOne(pendingStructureData.structureId)
            ).structureName;
            return pendingStructureData;
          })
        );
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Post('rejectPendingStructure')
      @ApiOperation({ description: 'Refuse structure ownership' })
      public async refusePendingStructure(@Body() pendingStructureDto: PendingStructureDto) {
        const structure = await this.structuresService.findOne(pendingStructureDto.structureId);
        await this.usersService.validatePendingStructure(
          pendingStructureDto.userEmail,
          pendingStructureDto.structureId,
          structure.structureName,
          false
        );
        const pendingStructure = await this.usersService.getPendingStructures();
        return await Promise.all(
          pendingStructure.map(async (pendingStructureData) => {
            pendingStructureData.structureName = (
              await this.structuresService.findOne(pendingStructureData.structureId)
            ).structureName;
            return pendingStructureData;
          })
        );
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Delete('user/:id')
      @ApiParam({ name: 'id', type: String, required: true })
      public async deleteUser(@Param() params) {
        const user = await this.usersService.deleteOneId(params.id);
        user.structuresLink.forEach((structureId) => {
          this.usersService.isStructureClaimed(structureId.toString()).then((userFound) => {
            if (!userFound) {
              this.structuresService.deleteOne(structureId.toString());
            }
          });
        });
        return user;
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Post('searchUsers')
      public async searchUsers(@Body() searchString: { searchString: string }) {
        if (searchString && searchString.searchString.length > 0)
          return this.usersService.searchUsers(searchString.searchString);
        else return this.usersService.findAll();
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Post('searchNewsletterSubscriptions')
      public async getNewsletterSubscriptions(@Body() searchString: { searchString: string }) {
        if (searchString && searchString.searchString.length > 0)
          return this.newsletterService.searchNewsletterSubscription(searchString.searchString);
        else return this.newsletterService.findAll();
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Get('countNewsletterSubscriptions')
      public async countNewsletterSubscriptions(): Promise<number> {
        return this.newsletterService.countNewsletterSubscriptions();
      }
    
      @UseGuards(JwtAuthGuard, RolesGuard)
      @Roles('admin')
      @Delete('newsletterSubscription/:email')
      @ApiParam({ name: 'email', type: String, required: true })
      public async unsubscribeUserFromNewsletter(@Param() params) {
        return await this.newsletterService.deleteOneEmail(params.email);
      }
    }