remove console logs

This commit is contained in:
Maxime Lalo 2024-04-29 15:09:36 +02:00
parent bba73644f1
commit 4f59877fff
26 changed files with 124 additions and 165 deletions

View File

@ -169,7 +169,7 @@ export default class CustomersController extends ApiController {
//success
this.httpSuccess(response, customer);
} catch (error) {
console.log(error);
console.error(error);
this.httpValidationError(response, error);
return;
}

View File

@ -39,7 +39,7 @@ export default class AuthController extends ApiController {
totpCodeUid: res.totpCode.uid,
});
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
}
}
@ -64,7 +64,7 @@ export default class AuthController extends ApiController {
this.httpTooEarlyRequest(response, error.message);
return;
}
console.log(error);
console.error(error);
this.httpInternalError(response);
}
}
@ -112,7 +112,7 @@ export default class AuthController extends ApiController {
return;
}
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -168,7 +168,7 @@ export default class AuthController extends ApiController {
return;
}
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -203,7 +203,7 @@ export default class AuthController extends ApiController {
this.httpUnauthorized(response, error.message);
return;
}
console.log(error);
console.error(error);
this.httpInternalError(response);
}
}
@ -237,7 +237,7 @@ export default class AuthController extends ApiController {
this.httpUnauthorized(response, error.message);
return;
}
console.log(error);
console.error(error);
this.httpInternalError(response);
}
}

View File

@ -28,7 +28,7 @@ export default class DocumentsController extends ApiController {
let query: Prisma.DocumentsFindManyArgs = {};
if (req.query["q"]) {
query = JSON.parse(req.query["q"] as string);
if(query.where?.uid) {
if (query.where?.uid) {
this.httpBadRequest(response, "You can't filter by uid");
return;
}
@ -74,7 +74,6 @@ export default class DocumentsController extends ApiController {
if (req.query["q"]) {
query = JSON.parse(req.query["q"] as string);
if (query.folder) delete query.folder;
}
const documentEntity = await this.documentsService.getByUid(uid, query);
@ -90,7 +89,7 @@ export default class DocumentsController extends ApiController {
//success
this.httpSuccess(response, document);
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}

View File

@ -20,7 +20,7 @@ export default class CustomerController extends ApiController {
const enrollment = await this.id360Service.createFranceConnectEnrollment();
this.httpSuccess(response, { enrollment });
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -77,7 +77,7 @@ export default class CustomerController extends ApiController {
const refreshToken = this.authService.generateRefreshToken(payload);
this.httpSuccess(response, { accessToken, refreshToken });
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -89,7 +89,7 @@ export default class CustomerController extends ApiController {
const token = await this.id360Service.getId360Token();
this.httpSuccess(response, { token });
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -109,7 +109,7 @@ export default class CustomerController extends ApiController {
let accessToken;
this.authService.verifyRefreshToken(token, (err, userPayload) => {
if (err) {
console.log(err);
console.error(err);
this.httpUnauthorized(response);
return;
}
@ -123,7 +123,7 @@ export default class CustomerController extends ApiController {
//success
this.httpSuccess(response, { accessToken });
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}

View File

@ -18,11 +18,10 @@ export default class DocumentController extends ApiController {
*/
@Post("/api/v1/id360/enrollment-callback/")
protected async getDocumentVerificationFromId360(req: Request, response: Response) {
try {
this.httpSuccess(response);
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -30,11 +29,10 @@ export default class DocumentController extends ApiController {
@Post("/api/v1/id360/customer-callback/")
protected async getCustomerVerificationFromId360(req: Request, response: Response) {
try {
this.httpSuccess(response);
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -52,7 +50,7 @@ export default class DocumentController extends ApiController {
//success
this.httpSuccess(response);
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}

View File

@ -9,7 +9,7 @@ import authHandler from "@App/middlewares/AuthHandler";
@Controller()
@Service()
export default class UserController extends ApiController {
constructor (private idNotService: IdNotService) {
constructor(private idNotService: IdNotService) {
super();
}
@ -26,12 +26,9 @@ export default class UserController extends ApiController {
this.httpSuccess(response, officeMemberships);
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
}
}

View File

@ -57,8 +57,7 @@ export default class UserController extends ApiController {
//Whitelist feature
//Get user with contact
const prismaUser = await this.userService.getByUid(user.uid, { contact: true, role: true, office_membership: true});
console.log(prismaUser);
const prismaUser = await this.userService.getByUid(user.uid, { contact: true, role: true, office_membership: true });
if (!prismaUser) {
this.httpNotFoundRequest(response, "user not found");
@ -67,7 +66,6 @@ export default class UserController extends ApiController {
//Hydrate user to be able to use his contact
const userHydrated = User.hydrate<User>(prismaUser, { strategy: "excludeAll" });
console.log(userHydrated);
if (!userHydrated.contact?.email || userHydrated.contact?.email === "") {
this.httpUnauthorized(response, "Email not found");
@ -76,17 +74,12 @@ export default class UserController extends ApiController {
let isSubscribed = false;
const subscriptions = await this.subscriptionsService.get({ where: { office_uid: userHydrated.office_membership?.uid } });
console.log(subscriptions);
if (!subscriptions || subscriptions.length === 0 || subscriptions[0]?.status === ESubscriptionStatus.INACTIVE) {
console.log("No subscription found");
isSubscribed = false;
}
else if (subscriptions[0]?.type === EType.Unlimited) {
console.log("Unlimited subscription found");
} else if (subscriptions[0]?.type === EType.Unlimited) {
isSubscribed = true;
} else {
console.log("Standard subscription found");
const hasSeat = await this.subscriptionsService.get({
where: { status: ESubscriptionStatus.ACTIVE, seats: { some: { user_uid: userHydrated.uid } } },
});
@ -123,25 +116,33 @@ export default class UserController extends ApiController {
await this.idNotService.updateOffice(user.office_uid);
const payload = await this.authService.getUserJwtPayload(user.idNot);
console.log(payload);
if(!payload) return;
if (!payload) return;
console.log(isSubscribed, userHydrated.role?.name);
if(!isSubscribed && userHydrated.role?.name === "admin"){
const manageSubscriptionRulesEntity = await this.rulesGroupsService.get({ where: { uid: "94343601-04c8-44ef-afb9-3047597528a9" }, include: { rules: true } });
if (!isSubscribed && userHydrated.role?.name === "admin") {
const manageSubscriptionRulesEntity = await this.rulesGroupsService.get({
where: { uid: "94343601-04c8-44ef-afb9-3047597528a9" },
include: { rules: true },
});
const manageSubscriptionRules = RulesGroup.hydrateArray<RulesGroup>(manageSubscriptionRulesEntity, { strategy: "excludeAll" });
if(!manageSubscriptionRules[0]) return;
const manageSubscriptionRules = RulesGroup.hydrateArray<RulesGroup>(manageSubscriptionRulesEntity, {
strategy: "excludeAll",
});
if (!manageSubscriptionRules[0]) return;
payload.rules = manageSubscriptionRules[0].rules!.map((rule) => rule.name) || [];
isSubscribed = true;
}
if(!isSubscribed && userHydrated.role?.name === "super-admin"){
const manageSubscriptionRulesEntity = await this.rulesGroupsService.get({ where: { uid: "94343601-04c8-44ef-afb9-3047597528a9" }, include: { rules: true } });
if (!isSubscribed && userHydrated.role?.name === "super-admin") {
const manageSubscriptionRulesEntity = await this.rulesGroupsService.get({
where: { uid: "94343601-04c8-44ef-afb9-3047597528a9" },
include: { rules: true },
});
const manageSubscriptionRules = RulesGroup.hydrateArray<RulesGroup>(manageSubscriptionRulesEntity, { strategy: "excludeAll" });
if(!manageSubscriptionRules[0]) return;
const manageSubscriptionRules = RulesGroup.hydrateArray<RulesGroup>(manageSubscriptionRulesEntity, {
strategy: "excludeAll",
});
if (!manageSubscriptionRules[0]) return;
payload.rules = manageSubscriptionRules[0].rules!.map((rule) => rule.name) || [];
@ -158,7 +159,7 @@ export default class UserController extends ApiController {
this.httpSuccess(response, { accessToken, refreshToken });
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}
@ -178,7 +179,7 @@ export default class UserController extends ApiController {
let accessToken;
this.authService.verifyRefreshToken(token, async (err, userPayload) => {
if (err) {
console.log(err);
console.error(err);
this.httpUnauthorized(response);
return;
}
@ -195,7 +196,7 @@ export default class UserController extends ApiController {
//success
} catch (error) {
console.log(error);
console.error(error);
this.httpInternalError(response);
return;
}

View File

@ -27,7 +27,7 @@ export default class CustomersController extends ApiController {
let query: Prisma.CustomersFindManyArgs = {};
if (req.query["q"]) {
query = JSON.parse(req.query["q"] as string);
if(query.where?.uid) {
if (query.where?.uid) {
this.httpBadRequest(response, "You can't filter by uid");
return;
}
@ -168,7 +168,7 @@ export default class CustomersController extends ApiController {
//success
this.httpSuccess(response, customer);
} catch (error) {
console.log(error);
console.error(error);
this.httpValidationError(response, error);
return;
}

View File

@ -170,7 +170,7 @@ export default class CustomersController extends ApiController {
//success
this.httpSuccess(response, customer);
} catch (error) {
console.log(error);
console.error(error);
this.httpValidationError(response, error);
return;
}

View File

@ -22,9 +22,8 @@ export default function authHandler(req: Request, response: Response, next: Next
req.body.user = userPayload;
next();
});
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -24,7 +24,7 @@ export default async function documentHandler(req: Request, response: Response,
if (document?.depositor_uid != customerId) {
const customerService = Container.get(CustomersService);
const customers = await customerService.get({where: {contact: { email: customerEmail}}});
const customers = await customerService.get({ where: { contact: { email: customerEmail } } });
if (customers && !customers.find((customer) => customer.uid === document?.depositor_uid)) {
response.status(HttpCodes.UNAUTHORIZED).send("Not authorized with this depositor");
return;
@ -66,7 +66,7 @@ export default async function documentHandler(req: Request, response: Response,
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -10,7 +10,9 @@ export default async function customerHandler(req: Request, response: Response,
if (uid) {
const customerService = Container.get(CustomersService);
const customer = await customerService.get({where:{AND: [{uid: uid}, {office_folders: {some: {office_uid: officeId}}}]}});
const customer = await customerService.get({
where: { AND: [{ uid: uid }, { office_folders: { some: { office_uid: officeId } } }] },
});
if (!customer[0]) {
response.status(HttpCodes.NOT_FOUND).send("Customer not found");
@ -19,9 +21,8 @@ export default async function customerHandler(req: Request, response: Response,
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -42,9 +42,8 @@ export default async function deedHandler(req: Request, response: Response, next
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -61,7 +61,7 @@ export default async function deedTypeHandler(req: Request, response: Response,
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -57,16 +57,15 @@ export default async function documentHandler(req: Request, response: Response,
return;
}
if(!folder?.stakeholders.find(stakeholder => stakeholder.uid === req.body.user.userId)) {
if (!folder?.stakeholders.find((stakeholder) => stakeholder.uid === req.body.user.userId)) {
response.sendStatus(HttpCodes.UNAUTHORIZED).send("Unauthorized with this user");
return;
}
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -21,7 +21,9 @@ export default async function documentTypeHandler(req: Request, response: Respon
where: { AND: [{ name: { equals: name, mode: "insensitive" } }, { office: { uid: officeId } }] },
});
if (documentType[0] && (!uid || documentType[0].uid != uid)) {
response.status(HttpCodes.VALIDATION_ERROR).send([{ property: "name", constraints: { name: "Nom de document déjà utilisé" } }]);
response
.status(HttpCodes.VALIDATION_ERROR)
.send([{ property: "name", constraints: { name: "Nom de document déjà utilisé" } }]);
return;
}
}
@ -42,9 +44,8 @@ export default async function documentTypeHandler(req: Request, response: Respon
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -41,7 +41,7 @@ export default async function fileHandler(req: Request, response: Response, next
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -19,20 +19,22 @@ export default async function folderHandler(req: Request, response: Response, ne
return;
}
if(folderNumber) {
if (folderNumber) {
const officeFolderService = Container.get(OfficeFoldersService);
const sameFolderNumber = await officeFolderService.get({
where: { AND: [{ folder_number: folderNumber }, { office_uid: officeId }] },
});
if(sameFolderNumber[0] && (!uid || uid != sameFolderNumber[0]?.uid)) {
const error = [{property: "folder_number", constraints: { folder_number: "Numéro de dossier déjà utilisé" } }];
if (sameFolderNumber[0] && (!uid || uid != sameFolderNumber[0]?.uid)) {
const error = [{ property: "folder_number", constraints: { folder_number: "Numéro de dossier déjà utilisé" } }];
response.status(HttpCodes.VALIDATION_ERROR).send(error);
return;
}
}
if(stakeHolders && stakeHolders.length === 0) {
response.status(HttpCodes.VALIDATION_ERROR).send([{ property: "stakeholders", constraints: { stakeholders: "Au moins un collaborateur est requis" } }]);
if (stakeHolders && stakeHolders.length === 0) {
response
.status(HttpCodes.VALIDATION_ERROR)
.send([{ property: "stakeholders", constraints: { stakeholders: "Au moins un collaborateur est requis" } }]);
return;
}
@ -43,7 +45,7 @@ export default async function folderHandler(req: Request, response: Response, ne
response.status(HttpCodes.NOT_FOUND).send("Deed type not found");
return;
}
if(deedTypeWithOffice.archived_at) {
if (deedTypeWithOffice.archived_at) {
response.status(HttpCodes.FORBIDDEN).send("Deed type is archived");
return;
}
@ -54,7 +56,7 @@ export default async function folderHandler(req: Request, response: Response, ne
}
if (uid) {
if(uid === "download") {
if (uid === "download") {
uid = req.path && req.path.split("/")[6];
}
const officeFolderService = Container.get(OfficeFoldersService);
@ -71,7 +73,7 @@ export default async function folderHandler(req: Request, response: Response, ne
return;
}
if(!officeFolder.stakeholders.find(stakeholder => stakeholder.uid === userId)) {
if (!officeFolder.stakeholders.find((stakeholder) => stakeholder.uid === userId)) {
response.status(HttpCodes.UNAUTHORIZED).send("Unauthorized with this user");
return;
}
@ -79,7 +81,7 @@ export default async function folderHandler(req: Request, response: Response, ne
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -30,9 +30,8 @@ export default async function officeRoleHandler(req: Request, response: Response
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -31,7 +31,7 @@ export default async function userHandler(req: Request, response: Response, next
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -3,11 +3,10 @@ import { NextFunction, Request, Response } from "express";
export default async function roleHandler(req: Request, response: Response, next: NextFunction) {
try {
const namespace = req.path && req.path.split("/")[3];
const role = req.body.user.role;
if(!role) {
if (!role) {
response.status(HttpCodes.UNAUTHORIZED).send("Unauthorized without role");
return;
}
@ -18,9 +17,8 @@ export default async function roleHandler(req: Request, response: Response, next
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -17,9 +17,8 @@ export default async function ruleHandler(req: Request, response: Response, next
}
next();
} catch (error) {
console.log(error);
console.error(error);
response.status(HttpCodes.INTERNAL_ERROR).send("Internal server error");
return;
}

View File

@ -1,14 +1,5 @@
import { EOfficeStatus, Prisma, PrismaClient } from "@prisma/client";
import {
Address,
Deed,
DeedType,
DocumentType,
Office,
OfficeRole,
Role,
Rule,
} from "le-coffre-resources/dist/SuperAdmin";
import { Address, Deed, DeedType, DocumentType, Office, OfficeRole, Role, Rule } from "le-coffre-resources/dist/SuperAdmin";
import "module-alias/register";
@ -1280,7 +1271,7 @@ export default async function main() {
const createArgs: Prisma.DeedTypesCreateArgs = {
data: {
name: deedType.name,
description: deedType.description || "" ,
description: deedType.description || "",
office: {
connect: {
uid: deedType.office!.uid,
@ -1329,7 +1320,7 @@ export default async function main() {
console.log(">MOCK DATA - Seeding completed!");
} catch (error) {
console.log(error);
console.error(error);
console.log("Data already seeded, skiping");
}
}

View File

@ -870,31 +870,20 @@ export default async function main() {
"POST document-types",
"POST deed-types",
"PUT document-types",
]
],
},
{
name: "Gestion de l'abonnement",
uid: "94343601-04c8-44ef-afb9-3047597528a9",
created_at: new Date(),
updated_at: new Date(),
rules : [
"GET subscriptions",
"POST subscriptions",
"PUT subscriptions",
"GET stripe",
"POST stripe",
]
rules: ["GET subscriptions", "POST subscriptions", "PUT subscriptions", "GET stripe", "POST stripe"],
},
{
name: "Intégration du RIB",
created_at: new Date(),
updated_at: new Date(),
rules : [
"PUT rib",
"GET rib",
"POST rib",
"DELETE rib",
]
rules: ["PUT rib", "GET rib", "POST rib", "DELETE rib"],
},
];
@ -2190,7 +2179,7 @@ export default async function main() {
console.log(">MOCK DATA - Seeding completed!");
} catch (error) {
console.log(error);
console.error(error);
console.log("Data already seeded, skiping");
}
}

View File

@ -870,30 +870,19 @@ export default async function main() {
"POST document-types",
"POST deed-types",
"PUT document-types",
]
],
},
{
name: "Gestion de l'abonnement",
created_at: new Date(),
updated_at: new Date(),
rules : [
"GET subscriptions",
"POST subscriptions",
"PUT subscriptions",
"GET stripe",
"POST stripe",
]
rules: ["GET subscriptions", "POST subscriptions", "PUT subscriptions", "GET stripe", "POST stripe"],
},
{
name: "Intégration du RIB",
created_at: new Date(),
updated_at: new Date(),
rules : [
"PUT rib",
"GET rib",
"POST rib",
"DELETE rib",
]
rules: ["PUT rib", "GET rib", "POST rib", "DELETE rib"],
},
];
@ -2187,7 +2176,7 @@ export default async function main() {
console.log(">MOCK DATA - Seeding completed!");
} catch (error) {
console.log(error);
console.error(error);
console.log("Data already seeded, skiping");
}
}

View File

@ -90,6 +90,4 @@ export default class UsersService extends BaseService {
public getUsersToBeChecked() {
return this.userRepository.findManyToCheck();
}
}