import { UserEntity } from '@app/infra/entities'; import { BadRequestException, ForbiddenException, InternalServerErrorException, Logger, NotFoundException, } from '@nestjs/common'; import { constants, createReadStream, ReadStream } from 'fs'; import fs from 'fs/promises'; import sanitize from 'sanitize-filename'; import { AuthUserDto } from '../auth'; import { ICryptoRepository } from '../crypto'; import { IUserRepository, UserListFilter } from './user.repository'; const SALT_ROUNDS = 10; export class UserCore { constructor(private userRepository: IUserRepository, private cryptoRepository: ICryptoRepository) {} async updateUser(authUser: AuthUserDto, id: string, dto: Partial): Promise { if (!authUser.isAdmin && authUser.id !== id) { throw new ForbiddenException('You are not allowed to update this user'); } if (!authUser.isAdmin) { // Users can never update the isAdmin property. delete dto.isAdmin; delete dto.storageLabel; delete dto.externalPath; } else if (dto.isAdmin && authUser.id !== id) { // Admin cannot create another admin. throw new BadRequestException('The server already has an admin'); } if (dto.email) { const duplicate = await this.userRepository.getByEmail(dto.email); if (duplicate && duplicate.id !== id) { throw new BadRequestException('Email already in use by another account'); } } if (dto.storageLabel) { const duplicate = await this.userRepository.getByStorageLabel(dto.storageLabel); if (duplicate && duplicate.id !== id) { throw new BadRequestException('Storage label already in use by another account'); } } try { if (dto.password) { dto.password = await this.cryptoRepository.hashBcrypt(dto.password, SALT_ROUNDS); } if (dto.storageLabel === '') { dto.storageLabel = null; } if (dto.externalPath === '') { dto.externalPath = null; } return this.userRepository.update(id, dto); } catch (e) { Logger.error(e, 'Failed to update user info'); throw new InternalServerErrorException('Failed to update user info'); } } async createUser(dto: Partial & { email: string }): Promise { const user = await this.userRepository.getByEmail(dto.email); if (user) { throw new BadRequestException('User exists'); } if (!dto.isAdmin) { const localAdmin = await this.userRepository.getAdmin(); if (!localAdmin) { throw new BadRequestException('The first registered account must the administrator.'); } } try { const payload: Partial = { ...dto }; if (payload.password) { payload.password = await this.cryptoRepository.hashBcrypt(payload.password, SALT_ROUNDS); } if (payload.storageLabel) { payload.storageLabel = sanitize(payload.storageLabel); } return this.userRepository.create(payload); } catch (e) { Logger.error(e, 'Create new user'); throw new InternalServerErrorException('Failed to register new user'); } } async get(userId: string, withDeleted?: boolean): Promise { return this.userRepository.get(userId, withDeleted); } async getAdmin(): Promise { return this.userRepository.getAdmin(); } async getByEmail(email: string, withPassword?: boolean): Promise { return this.userRepository.getByEmail(email, withPassword); } async getByOAuthId(oauthId: string): Promise { return this.userRepository.getByOAuthId(oauthId); } async getUserProfileImage(user: UserEntity): Promise { if (!user.profileImagePath) { throw new NotFoundException('User does not have a profile image'); } await fs.access(user.profileImagePath, constants.R_OK); return createReadStream(user.profileImagePath); } async getList(filter?: UserListFilter): Promise { return this.userRepository.getList(filter); } async createProfileImage(authUser: AuthUserDto, filePath: string): Promise { try { return this.userRepository.update(authUser.id, { profileImagePath: filePath }); } catch (e) { Logger.error(e, 'Create User Profile Image'); throw new InternalServerErrorException('Failed to create new user profile image'); } } async restoreUser(authUser: AuthUserDto, userToRestore: UserEntity): Promise { if (!authUser.isAdmin) { throw new ForbiddenException('Unauthorized'); } try { return this.userRepository.restore(userToRestore); } catch (e) { Logger.error(e, 'Failed to restore deleted user'); throw new InternalServerErrorException('Failed to restore deleted user'); } } async deleteUser(authUser: AuthUserDto, userToDelete: UserEntity): Promise { if (!authUser.isAdmin) { throw new ForbiddenException('Unauthorized'); } if (userToDelete.isAdmin) { throw new ForbiddenException('Cannot delete admin user'); } try { return this.userRepository.delete(userToDelete); } catch (e) { Logger.error(e, 'Failed to delete user'); throw new InternalServerErrorException('Failed to delete user'); } } }