
Product
Introducing Webhook Events for Alert Changes
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.
@notadd/module-user
Advanced tools
Most of the interfaces of the user module define permissions. When initializing, a super administrator user will be generated. The account number is: sadmin, and the password is: sadmin. After logging in, use accessToken to call updateCurrentUserInfo. (Update the current login user information) and change the password.
Import UserModule in the application root module, and configure the i18n option
@Resource is a general term for users to perform business operations on an entity resource.
Set annotations for defining resources on the Resolver or Controller class to define the current resource, such as:
@Resource({ name: 'article management', identify: 'artical:manage' })
name: The name of the resource, which is used to define the parent name of the permission. The naming method is: resource+behavior, such as: `related article management related api => 'article management'
identity: The unique identifier of the resource, such as: 'article management' => 'artical:manage'
@Permission is a definition of a specific operation performed by the user on the current entity resource.
Set annotations for defining operations on the Resolver and Controller methods. The user defines the operation permissions on the current resource, such as:
@Permission({ name: 'Add article', identify: 'artical:create', action: 'create' })
name: The name of the permission, used to define the specific permission name, named: operation + resource, such as: `Add article in the article resource => 'Add article'
identify: The unique identifier of the permission, named: resource: method, such as: 'Add article' => 'artical:createArtical'
action: permission operation type, can only be one of create, delete, update, find
The definition of permissions is inseparable from the definition of resources. The two are coexisting states. When using the permission function, the resources are defined on the class first, and then the permissions are defined on the methods that require permission control.
Once the resources and permissions are defined, the launcher, resources, and permissions are automatically loaded and stored in the database.
The following is an example of the authorization and authentication function logic for the apollo-server-express 2.x version.
UserModuleapp.module.ts
import { Module } from '@nestjs/common';
import { GraphQLModule } from '@nestjs/graphql';
import { TypeOrmModule } from '@nestjs/typeorm';
import { UserModule } from '@notadd/module-user';
@Module({
imports: [
GraphQLModule.forRootAsync({
useClass: GraphQLConfigService
}),
TypeOrmModule.forRoot(),
UserModule.forRoot({ i18n: 'en-US' })
],
controllers: [],
providers: [],
exports: []
})
export class AppModule { }
validateUser method of the AuthService class in the graphql context, and passing the authenticated user to the contextGraphQLJSON is used to handle the JSON scalar type in graphql, you need to install graphql-type-json additionally, and then configure it into the resolvers option.
graphql-config.service.ts
import { Inject, Injectable } from '@nestjs/common';
import { GqlModuleOptions, GqlOptionsFactory } from '@nestjs/graphql';
import * as GraphQLJSON from 'graphql-type-json';
import { AuthService } from '@notadd/module-user';
@Injectable()
export class GraphQLConfigService implements GqlOptionsFactory {
constructor(
@Inject(AuthService) private readonly authService: AuthService
) {}
createGqlOptions(): GqlModuleOptions {
return {
typePaths: ['./**/*.types.graphql'],
resolvers: { JSON: GraphQLJSON },
context: async ({ req }) => {
const user = await this.authService.validateUser(req);
return { user };
}
};
}
}
FAQs
The user module for Notadd application.
We found that @notadd/module-user demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Add real-time Socket webhook events to your workflows to automatically receive software supply chain alert changes in real time.

Security News
ENISA has become a CVE Program Root, giving the EU a central authority for coordinating vulnerability reporting, disclosure, and cross-border response.

Product
Socket now scans OpenVSX extensions, giving teams early detection of risky behaviors, hidden capabilities, and supply chain threats in developer tools.