79536798

Date: 2025-03-26 17:31:29
Score: 4
Natty:
Report link

Well when you're using FormData to submit your receipt with images, the request.body is getting processed differently than with regular JSON payloads, causing your permission guard to not properly access the employee credentials.

The main problem is that when using FileFieldsInterceptor or any file upload interceptors, the form data fields are parsed differently. Your guard is trying to destructure employeeCode and employeePassword directly from request.body, but with multipart/form-data, these might be coming in as strings rather than as part of a JSON object.

import {
  CanActivate,
  ExecutionContext,
  ForbiddenException,
  Injectable,
  UnauthorizedException,
} from '@nestjs/common'
import { PrismaService } from '../prisma/prisma.service'
import { PermissionEnum } from '@prisma/client'
import { Reflector } from '@nestjs/core'
import { compare } from 'bcryptjs'

@Injectable()
export class PermissionGuard implements CanActivate {
  constructor(
    private prisma: PrismaService,
    private reflector: Reflector,
  ) {}

  async canActivate(context: ExecutionContext): Promise<boolean> {
    const requiredPermission = this.reflector.get<PermissionEnum>(
      'permission',
      context.getHandler(),
    )

    if (!requiredPermission) {
      return true
    }

    const request = context.switchToHttp().getRequest()
    const tokenId = request.user?.sub
    const isCompany = request.user?.pharmacy
    
    // Handle both JSON and FormData formats
    let employeeCode, employeePassword
    
    if (request.body) {
      // Handle FormData - values will be strings
      employeeCode = request.body.employeeCode || request.body.employee_code
      employeePassword = request.body.employeePassword || request.body.employee_password
    }

    if (!tokenId) {
      throw new UnauthorizedException('User not authenticated')
    }

    let permissions: PermissionEnum[] = []

    if (isCompany) {
      // If company login, we need employee validation
      if (!employeeCode || !employeePassword) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'Employee credentials required',
        })
      }

      const company = await this.prisma.company.findFirst({
        where: { id: tokenId },
        include: {
          employees: true,
        },
      })

      if (!company) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'Farmácia não encontrada',
        })
      }

      const employee = company.employees.find(
        (employee) => employee.code === employeeCode,
      )

      if (!employee) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'Funcionário não encontrado',
        })
      }

      const isPasswordValid = await compare(employeePassword, employee.password)

      if (!isPasswordValid) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'Credenciais incorretas',
        })
      }

      permissions = employee.permissions
    } else {
      const user = await this.prisma.user.findFirst({
        where: {
          id: tokenId,
        },
      })

      if (!user) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'User not found',
        })
      }

      const pharmacy = user?.pharmacies[0]?.pharmacy
      if (!pharmacy) {
        throw new UnauthorizedException({
          statusText: 'unauthorized',
          message: 'Company not encontrada',
        })
      }

      permissions = user.pharmaceutical.permissions
    }

    const hasPermission = permissions.some(
      (perm) => perm === requiredPermission,
    )

    if (!hasPermission) {
      throw new ForbiddenException(`Does not have the required permission: ${requiredPermission}`)
    }

    return true
  }
}

Key changes I made to fix your issue:

  1. More flexible field parsing: The updated guard now checks for different possible field names (employeeCode/employee_code) since form fields are sometimes sent with underscores.

  2. Null checking: Added validation to ensure the employee credentials are present when company login is detected.

  3. Better error handling: More descriptive error messages to help debug authentication issues.

  4. Safe property access: Added optional chaining in the user pharmacy access to avoid potential undefined errors.

If you're still having issues, you could also consider implementing a custom middleware specifically for handling employee authentication in FormData requests, which would run before your guard and populate request.body with the parsed credentials.

Reasons:
  • Blacklisted phrase (1): não
  • RegEx Blacklisted phrase (2): encontrada
  • RegEx Blacklisted phrase (2): encontrado
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Ayodeji Erinfolami