Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_GET_PERMISSIONS } from '../../../../utils/constants';
import { maybe, optional, checkType, restrictToSchema} from 'rulr';
import { isValidSortObject } from '../../../../utils/validate';
const validateGetPermissions = maybe(
restrictToSchema({
limit: optional(checkType(String)),
offset: optional(checkType(String)),
sort: optional(isValidSortObject())
}),
);
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({ permissions, permissionName: CAN_GET_PERMISSIONS});
validateGetPermissions(req.query,['roles']);
const {limit, offset, sort} = req.query;
const fetchedPermissions = await config.service.getPermissions({limit, offset, order: sort});
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { CREATED } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_CREATE_POST, VARCHAR_FIELD_LENGTH, TEXT_FIELD_LENGTH } from '../../../../utils/constants';
import { maxLength } from '../../../../utils/validate';
import { maybe, required, checkType, composeRules, restrictToSchema } from 'rulr';
const validateCreatePost = maybe(composeRules([
restrictToSchema({
user_id: required(checkType(String)),
title: required(maxLength(VARCHAR_FIELD_LENGTH)),
body: required(maxLength(TEXT_FIELD_LENGTH)),
})
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_CREATE_POST});
validateCreatePost(req.body, ['post']);
const createdPost = await config.service.createPost(req.body);
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { isEmail } from '../../../../utils/validate';
import { maybe, required, restrictToSchema, checkType } from 'rulr';
import { OK } from 'http-status-codes';
const validateLogin = maybe(
restrictToSchema({
email: required(isEmail),
password: required(checkType(String))
})
);
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
validateLogin(req.body, ['user']);
const {email, password} = req.body;
const {user, token} = await config.service.login({
email, password
});
res.status(OK).json({user, token});
});
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import { minLength, validateMatchingPasswords } from '../../../../utils/validate';
import { maybe, required, checkType, composeRules, first, restrictToSchema } from 'rulr';
const validateResetPassword = maybe(composeRules([
restrictToSchema({
token: required(checkType(String)),
password: required(minLength(6)),
password_confirmation: required(checkType(String)),
}),
first(checkType(Object), validateMatchingPasswords)
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
validateResetPassword(req.body, ['user']);
const {token, password } = req.body;
await config.service.resetPassword({token, password});
const message = config.translator.passwordChangedSuccessfully();
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_CREATE_USER } from '../../../../utils/constants';
import { minLength, isEmail, validateMatchingPasswords } from '../../../../utils/validate';
import { maybe, required, optional, checkType, composeRules, first, restrictToSchema } from 'rulr';
import * as R from 'ramda';
const validateCreateUser = maybe(composeRules([
restrictToSchema({
firstname: optional(checkType(String)),
lastname: optional(checkType(String)),
bio: optional(checkType(String)),
email: required(isEmail),
password: required(minLength(6)),
password_confirmation: required(checkType(String)),
}),
first(checkType(Object), optional(validateMatchingPasswords))
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_CREATE_USER});
validateCreateUser(req.body, ['user']);
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_CREATE_USER } from '../../../../utils/constants';
import { minLength, isEmail, validateMatchingPasswords } from '../../../../utils/validate';
import { maybe, required, optional, checkType, composeRules, first, restrictToSchema } from 'rulr';
import * as R from 'ramda';
const validateCreateUser = maybe(composeRules([
restrictToSchema({
firstname: optional(checkType(String)),
lastname: optional(checkType(String)),
bio: optional(checkType(String)),
email: required(isEmail),
password: required(minLength(6)),
password_confirmation: required(checkType(String)),
}),
first(checkType(Object), optional(validateMatchingPasswords))
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_CREATE_USER});
validateCreateUser(req.body, ['user']);
const fillable = [
'firstname', 'lastname', 'bio', 'email', 'password'
];
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_UPDATE_POST, VARCHAR_FIELD_LENGTH, TEXT_FIELD_LENGTH } from '../../../../utils/constants';
import { maxLength } from '../../../../utils/validate';
import { maybe, optional, checkType,composeRules, restrictToSchema }from 'rulr';
const validateUpdatePost = maybe(composeRules([
restrictToSchema({
user_id: optional(checkType(Number)),
title: optional(maxLength(VARCHAR_FIELD_LENGTH)),
body: optional(maxLength(TEXT_FIELD_LENGTH)),
})
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_UPDATE_POST});
validateUpdatePost(req.body, ['post']);
const {post_id} = req.params;
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_ASSIGN_PERMISSION } from '../../../../utils/constants';
import { maybe, required, checkType, composeRules, restrictToSchema } from 'rulr';
const validateAssignRolePermission = maybe( composeRules([
restrictToSchema({
permission_id: required(checkType(String))
})
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_ASSIGN_PERMISSION});
validateAssignRolePermission(req.body, ['role']);
const {role_id} = req.params;
const {permission_id} = req.body;
await config.service.assignRolePermission({
import Config from '../../Config';
import catchErrors from '../../utils/catchErrors';
import { OK } from 'http-status-codes';
import getAuthUserAndPermissions from '../../../../utils/jwt/getAuthUserAndPermissions';
import hasPermission from '../../../../utils/jwt/hasPermission';
import { CAN_REVOKE_PERMISSION, VARCHAR_FIELD_LENGTH, TEXT_FIELD_LENGTH } from '../../../../utils/constants';
import { maybe, required, checkType,composeRules, restrictToSchema } from 'rulr';
const validateRevokeRolePermission = maybe(composeRules([
restrictToSchema({
permission_id: required(checkType(String)),
role_id: required(checkType(String))
})
]));
export default (config: Config) => {
return catchErrors(config, async (req, res) => {
const { permissions } = await getAuthUserAndPermissions({req, service: config.service});
hasPermission({permissions, permissionName: CAN_REVOKE_PERMISSION});
validateRevokeRolePermission(req.params, ['role']);
await config.service.revokeRolePermission(req.params);
res.status(OK).json({success: true});