@acorex/connectivity 20.2.0-next.1 → 20.2.0-next.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api/index.d.ts +23 -13
- package/fesm2022/acorex-connectivity-api.mjs +694 -586
- package/fesm2022/acorex-connectivity-api.mjs.map +1 -1
- package/fesm2022/acorex-connectivity-mock.mjs +4959 -4647
- package/fesm2022/acorex-connectivity-mock.mjs.map +1 -1
- package/fesm2022/acorex-connectivity-utils.mjs +64 -0
- package/fesm2022/acorex-connectivity-utils.mjs.map +1 -0
- package/mock/index.d.ts +75 -12
- package/package.json +9 -5
- package/utils/README.md +3 -0
- package/utils/index.d.ts +17 -0
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';
|
|
2
|
+
import { PkceUtil } from '@acorex/platform/auth';
|
|
3
|
+
import * as i0 from '@angular/core';
|
|
4
|
+
import { inject, Injectable, NgModule } from '@angular/core';
|
|
5
|
+
import { CommonModule } from '@angular/common';
|
|
6
|
+
|
|
7
|
+
class AXCExternalAuthorizationService {
|
|
8
|
+
constructor() {
|
|
9
|
+
this.configs = inject(AXM_AUTH_CONFIG_TOKEN);
|
|
10
|
+
}
|
|
11
|
+
async signin(providerName) {
|
|
12
|
+
// Get provider configuration (optional, for validation)
|
|
13
|
+
const providerConfig = this.configs?.externalProviders?.[providerName];
|
|
14
|
+
if (!providerConfig) {
|
|
15
|
+
throw new Error(`Provider '${providerName}' is not configured`);
|
|
16
|
+
}
|
|
17
|
+
// Get application configuration for OIDC
|
|
18
|
+
const clientId = this.configs?.authConfig?.clientId || 'spa-client';
|
|
19
|
+
const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);
|
|
20
|
+
const authorizeUrl = `${this.configs?.authConfig?.issuer}/connect/authorize`;
|
|
21
|
+
// Centralized PKCE code verifier logic
|
|
22
|
+
const codeVerifier = PkceUtil.generateRandomString(128);
|
|
23
|
+
localStorage.setItem('pkce_code_verifier', codeVerifier);
|
|
24
|
+
const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);
|
|
25
|
+
// Build the authorization URL according to the required format
|
|
26
|
+
const authUrl = `${authorizeUrl}` +
|
|
27
|
+
`?response_type=code` +
|
|
28
|
+
`&client_id=${clientId}` +
|
|
29
|
+
`&redirect_uri=${redirectUri}` +
|
|
30
|
+
`&scope=openid profile email` +
|
|
31
|
+
`&code_challenge=${codeChallenge}` +
|
|
32
|
+
`&code_challenge_method=S256` +
|
|
33
|
+
`&prompt=login` +
|
|
34
|
+
`&acr_values=${providerName}`;
|
|
35
|
+
console.log('Redirecting to:', authUrl);
|
|
36
|
+
// Use window.location.assign to redirect
|
|
37
|
+
window.location.assign(authUrl);
|
|
38
|
+
}
|
|
39
|
+
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }
|
|
40
|
+
static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCExternalAuthorizationService }); }
|
|
41
|
+
}
|
|
42
|
+
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{
|
|
43
|
+
type: Injectable
|
|
44
|
+
}] });
|
|
45
|
+
|
|
46
|
+
class AXCUtilsModule {
|
|
47
|
+
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }
|
|
48
|
+
static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: "14.0.0", version: "20.1.3", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }
|
|
49
|
+
static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }
|
|
50
|
+
}
|
|
51
|
+
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.3", ngImport: i0, type: AXCUtilsModule, decorators: [{
|
|
52
|
+
type: NgModule,
|
|
53
|
+
args: [{
|
|
54
|
+
imports: [CommonModule],
|
|
55
|
+
providers: [AXCExternalAuthorizationService],
|
|
56
|
+
}]
|
|
57
|
+
}] });
|
|
58
|
+
|
|
59
|
+
/**
|
|
60
|
+
* Generated bundle index. Do not edit.
|
|
61
|
+
*/
|
|
62
|
+
|
|
63
|
+
export { AXCExternalAuthorizationService, AXCUtilsModule };
|
|
64
|
+
//# sourceMappingURL=acorex-connectivity-utils.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"acorex-connectivity-utils.mjs","sources":["../tmp-esm2022/utils/lib/external-authorization.service.js","../tmp-esm2022/utils/lib/utils.module.js","../tmp-esm2022/utils/acorex-connectivity-utils.js"],"sourcesContent":["import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';\nimport { PkceUtil } from '@acorex/platform/auth';\nimport { inject, Injectable } from '@angular/core';\nimport * as i0 from \"@angular/core\";\nexport class AXCExternalAuthorizationService {\n constructor() {\n this.configs = inject(AXM_AUTH_CONFIG_TOKEN);\n }\n async signin(providerName) {\n // Get provider configuration (optional, for validation)\n const providerConfig = this.configs?.externalProviders?.[providerName];\n if (!providerConfig) {\n throw new Error(`Provider '${providerName}' is not configured`);\n }\n // Get application configuration for OIDC\n const clientId = this.configs?.authConfig?.clientId || 'spa-client';\n const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);\n const authorizeUrl = `${this.configs?.authConfig?.issuer}/connect/authorize`;\n // Centralized PKCE code verifier logic\n const codeVerifier = PkceUtil.generateRandomString(128);\n localStorage.setItem('pkce_code_verifier', codeVerifier);\n const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);\n // Build the authorization URL according to the required format\n const authUrl = `${authorizeUrl}` +\n `?response_type=code` +\n `&client_id=${clientId}` +\n `&redirect_uri=${redirectUri}` +\n `&scope=openid profile email` +\n `&code_challenge=${codeChallenge}` +\n `&code_challenge_method=S256` +\n `&prompt=login` +\n `&acr_values=${providerName}`;\n console.log('Redirecting to:', authUrl);\n // Use window.location.assign to redirect\n window.location.assign(authUrl);\n }\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }\n static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCExternalAuthorizationService }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{\n type: Injectable\n }] });\n//# sourceMappingURL=data:application/json;base64,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","import { CommonModule } from '@angular/common';\nimport { NgModule } from '@angular/core';\nimport { AXCExternalAuthorizationService } from './external-authorization.service';\nimport * as i0 from \"@angular/core\";\nexport class AXCUtilsModule {\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }\n static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: \"14.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }\n static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.3\", ngImport: i0, type: AXCUtilsModule, decorators: [{\n type: NgModule,\n args: [{\n imports: [CommonModule],\n providers: [AXCExternalAuthorizationService],\n }]\n }] });\n//# sourceMappingURL=data:application/json;base64,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","/**\n * Generated bundle index. Do not edit.\n */\nexport * from './index';\n//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWNvcmV4LWNvbm5lY3Rpdml0eS11dGlscy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL2xpYnMvY29ubmVjdGl2aXR5L3V0aWxzL3NyYy9hY29yZXgtY29ubmVjdGl2aXR5LXV0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBRUgsY0FBYyxTQUFTLENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyIvKipcbiAqIEdlbmVyYXRlZCBidW5kbGUgaW5kZXguIERvIG5vdCBlZGl0LlxuICovXG5cbmV4cG9ydCAqIGZyb20gJy4vaW5kZXgnO1xuIl19"],"names":[],"mappings":";;;;;;AAIO,MAAM,+BAA+B,CAAC;AAC7C,IAAI,WAAW,GAAG;AAClB,QAAQ,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,qBAAqB,CAAC;AACpD;AACA,IAAI,MAAM,MAAM,CAAC,YAAY,EAAE;AAC/B;AACA,QAAQ,MAAM,cAAc,GAAG,IAAI,CAAC,OAAO,EAAE,iBAAiB,GAAG,YAAY,CAAC;AAC9E,QAAQ,IAAI,CAAC,cAAc,EAAE;AAC7B,YAAY,MAAM,IAAI,KAAK,CAAC,CAAC,UAAU,EAAE,YAAY,CAAC,mBAAmB,CAAC,CAAC;AAC3E;AACA;AACA,QAAQ,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,IAAI,YAAY;AAC3E,QAAQ,MAAM,WAAW,GAAG,kBAAkB,CAAC,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,wBAAwB,CAAC,CAAC;AACnG,QAAQ,MAAM,YAAY,GAAG,CAAC,EAAE,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,MAAM,CAAC,kBAAkB,CAAC;AACpF;AACA,QAAQ,MAAM,YAAY,GAAG,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC;AAC/D,QAAQ,YAAY,CAAC,OAAO,CAAC,oBAAoB,EAAE,YAAY,CAAC;AAChE,QAAQ,MAAM,aAAa,GAAG,MAAM,QAAQ,CAAC,qBAAqB,CAAC,YAAY,CAAC;AAChF;AACA,QAAQ,MAAM,OAAO,GAAG,CAAC,EAAE,YAAY,CAAC,CAAC;AACzC,YAAY,CAAC,mBAAmB,CAAC;AACjC,YAAY,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;AACpC,YAAY,CAAC,cAAc,EAAE,WAAW,CAAC,CAAC;AAC1C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC;AAC9C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,aAAa,CAAC;AAC3B,YAAY,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;AACzC,QAAQ,OAAO,CAAC,GAAG,CAAC,iBAAiB,EAAE,OAAO,CAAC;AAC/C;AACA,QAAQ,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC;AACvC;AACA,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC,CAAC;AAClM,IAAI,SAAS,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC,qBAAqB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,CAAC,CAAC;AACrJ;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,UAAU,EAAE,CAAC;AACzI,YAAY,IAAI,EAAE;AAClB,SAAS,CAAC,EAAE,CAAC;;ACrCN,MAAM,cAAc,CAAC;AAC5B,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC,CAAC;AAC/K,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AAC1J,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,SAAS,EAAE,CAAC,+BAA+B,CAAC,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AACxM;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,EAAE,CAAC;AACxH,YAAY,IAAI,EAAE,QAAQ;AAC1B,YAAY,IAAI,EAAE,CAAC;AACnB,oBAAoB,OAAO,EAAE,CAAC,YAAY,CAAC;AAC3C,oBAAoB,SAAS,EAAE,CAAC,+BAA+B,CAAC;AAChE,iBAAiB;AACjB,SAAS,CAAC,EAAE,CAAC;;ACfb;AACA;AACA;;;;"}
|
package/mock/index.d.ts
CHANGED
|
@@ -4,9 +4,11 @@ import { Injector } from '@angular/core';
|
|
|
4
4
|
import { AXPLockService, AXPLockRequest, AXPLockInfo, AXPUnLockRequest, AXPLockGetInfoRequest, AXPFileStorageService, AXPFileStorageCreateRequest, AXPFileStorageInfo, AXPFileStorageUpdateRequest, AXPFileStorageFindRequest, AXPReportCategory, AXPReportDefinition, AXPExecutionReportCommand, AXPLayoutExecutionContext, AXPExecutionReportCommandResult } from '@acorex/platform/common';
|
|
5
5
|
import { AXMCommonDashboardEntityModel } from '@acorex/modules/dashboard-management';
|
|
6
6
|
import Dexie from 'dexie';
|
|
7
|
-
import * as
|
|
8
|
-
import { AXPSessionService,
|
|
7
|
+
import * as _acorex_platform_auth from '@acorex/platform/auth';
|
|
8
|
+
import { AXPSessionService, AXPAuthStrategy, AXPBaseCredentials, AXPSessionContext, AXPSignInResult } from '@acorex/platform/auth';
|
|
9
9
|
import { AXPQueryRequest, AXPPagedListResult, AXPAppStartUpService } from '@acorex/platform/core';
|
|
10
|
+
import { AXMAuthConfigs } from '@acorex/modules/auth';
|
|
11
|
+
import { Router } from '@angular/router';
|
|
10
12
|
import * as i1 from '@acorex/platform/runtime';
|
|
11
13
|
import { AXMTextTemplateManagementTemplateEntityModel } from '@acorex/modules/text-template-management';
|
|
12
14
|
|
|
@@ -175,6 +177,7 @@ declare class AXPMessageDataSeeder implements AXPDataSeeder {
|
|
|
175
177
|
private storageService;
|
|
176
178
|
private chatService;
|
|
177
179
|
private commentService;
|
|
180
|
+
private realtimeService;
|
|
178
181
|
private aiResponderService;
|
|
179
182
|
private usersService;
|
|
180
183
|
private sessionService;
|
|
@@ -278,6 +281,24 @@ declare class AXCLogManagementMockModule {
|
|
|
278
281
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCLogManagementMockModule>;
|
|
279
282
|
}
|
|
280
283
|
|
|
284
|
+
declare class MOCKGoogleStrategy extends AXPAuthStrategy {
|
|
285
|
+
tenantLoader: _acorex_platform_auth.AXPTenantLoader;
|
|
286
|
+
protected configs: AXMAuthConfigs;
|
|
287
|
+
private externalAuthorizationService;
|
|
288
|
+
applicationLoader: _acorex_platform_auth.AXPApplicationLoader;
|
|
289
|
+
router: Router;
|
|
290
|
+
constructor();
|
|
291
|
+
get name(): string;
|
|
292
|
+
signin(credentials: AXPBaseCredentials): Promise<void>;
|
|
293
|
+
signout(): Promise<void>;
|
|
294
|
+
refreshToken(context: AXPSessionContext): Promise<AXPSignInResult>;
|
|
295
|
+
updateToken(params: {
|
|
296
|
+
[key: string]: any;
|
|
297
|
+
}): Promise<AXPSignInResult>;
|
|
298
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<MOCKGoogleStrategy, never>;
|
|
299
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<MOCKGoogleStrategy>;
|
|
300
|
+
}
|
|
301
|
+
|
|
281
302
|
declare class AXCFOrganizationManagementMockModule {
|
|
282
303
|
static ɵfac: i0.ɵɵFactoryDeclaration<AXCFOrganizationManagementMockModule, never>;
|
|
283
304
|
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCFOrganizationManagementMockModule, never, never, never>;
|
|
@@ -314,12 +335,6 @@ declare class AXCSchedulerJobManagementMockModule {
|
|
|
314
335
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCSchedulerJobManagementMockModule>;
|
|
315
336
|
}
|
|
316
337
|
|
|
317
|
-
declare class AXCNotificationManagementMockModule {
|
|
318
|
-
static ɵfac: i0.ɵɵFactoryDeclaration<AXCNotificationManagementMockModule, never>;
|
|
319
|
-
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCNotificationManagementMockModule, never, never, never>;
|
|
320
|
-
static ɵinj: i0.ɵɵInjectorDeclaration<AXCNotificationManagementMockModule>;
|
|
321
|
-
}
|
|
322
|
-
|
|
323
338
|
declare class AXCTrainingManagementMockModule {
|
|
324
339
|
static ɵfac: i0.ɵɵFactoryDeclaration<AXCTrainingManagementMockModule, never>;
|
|
325
340
|
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCTrainingManagementMockModule, never, never, never>;
|
|
@@ -338,10 +353,16 @@ declare class AXMCalendarManagementMockModule {
|
|
|
338
353
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXMCalendarManagementMockModule>;
|
|
339
354
|
}
|
|
340
355
|
|
|
356
|
+
declare class AXCNotificationManagementMockModule {
|
|
357
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCNotificationManagementMockModule, never>;
|
|
358
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCNotificationManagementMockModule, never, never, never>;
|
|
359
|
+
static ɵinj: i0.ɵɵInjectorDeclaration<AXCNotificationManagementMockModule>;
|
|
360
|
+
}
|
|
361
|
+
|
|
341
362
|
declare class AXCMockModule {
|
|
342
363
|
constructor(appInitService: AXPAppStartUpService, injector: Injector);
|
|
343
364
|
static ɵfac: i0.ɵɵFactoryDeclaration<AXCMockModule, never>;
|
|
344
|
-
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof
|
|
365
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof _acorex_platform_auth.AXPAuthModule, typeof AXCCommonMockModule, typeof AXCFormTemplateManagementMockModule, typeof AXCFOrganizationManagementMockModule, typeof AXCReportManagementMockModule, typeof AXCContactManagementMockModule, typeof AXCDashboardManagementMockModule, typeof AXCConversationMockModule, typeof AXCAuthMockModule, typeof AXCPlatformManagementMockModule, typeof AXCTextTemplateManagementMockModule, typeof AXCSecurityManagementMockModule, typeof AXCSchedulerJobManagementMockModule, typeof AXCApplicationManagementMockModule, typeof AXCTrainingManagementMockModule, typeof AXCProjectManagementMockModule, typeof AXCDocumentManagementMockModule, typeof AXCIssueManagementMockModule, typeof AXCLogManagementMockModule, typeof AXMCalendarManagementMockModule, typeof AXCDataManagementMockModule, typeof AXCNotificationManagementMockModule], never>;
|
|
345
366
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCMockModule>;
|
|
346
367
|
}
|
|
347
368
|
|
|
@@ -349,17 +370,59 @@ interface MockUserPassCredentials extends AXPBaseCredentials {
|
|
|
349
370
|
username: string;
|
|
350
371
|
password: string;
|
|
351
372
|
}
|
|
352
|
-
declare class MOCKStrategy
|
|
373
|
+
declare class MOCKStrategy extends AXPAuthStrategy {
|
|
374
|
+
tenantLoader: _acorex_platform_auth.AXPTenantLoader;
|
|
375
|
+
applicationLoader: _acorex_platform_auth.AXPApplicationLoader;
|
|
376
|
+
router: Router;
|
|
353
377
|
constructor();
|
|
354
378
|
private entityRegistery;
|
|
355
379
|
get name(): string;
|
|
356
380
|
signin(credentials: MockUserPassCredentials): Promise<AXPSignInResult>;
|
|
357
381
|
signout(): Promise<void>;
|
|
358
|
-
refreshToken(context: AXPSessionContext): Promise<
|
|
382
|
+
refreshToken(context: AXPSessionContext): Promise<AXPSignInResult>;
|
|
383
|
+
updateToken(params: {
|
|
384
|
+
[key: string]: any;
|
|
385
|
+
}): Promise<AXPSignInResult>;
|
|
359
386
|
static ɵfac: i0.ɵɵFactoryDeclaration<MOCKStrategy, never>;
|
|
360
387
|
static ɵprov: i0.ɵɵInjectableDeclaration<MOCKStrategy>;
|
|
361
388
|
}
|
|
362
389
|
|
|
390
|
+
declare class AXCAppTermDataSeeder implements AXPDataSeeder {
|
|
391
|
+
private storageService;
|
|
392
|
+
seed(): Promise<void>;
|
|
393
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppTermDataSeeder, never>;
|
|
394
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppTermDataSeeder>;
|
|
395
|
+
}
|
|
396
|
+
|
|
397
|
+
declare class AXCAppVersionDataSeeder implements AXPDataSeeder {
|
|
398
|
+
private storageService;
|
|
399
|
+
seed(): Promise<void>;
|
|
400
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppVersionDataSeeder, never>;
|
|
401
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppVersionDataSeeder>;
|
|
402
|
+
}
|
|
403
|
+
|
|
404
|
+
declare class AXCGlobalVariablesDataSeeder implements AXPDataSeeder {
|
|
405
|
+
private storageService;
|
|
406
|
+
seed(): Promise<void>;
|
|
407
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCGlobalVariablesDataSeeder, never>;
|
|
408
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCGlobalVariablesDataSeeder>;
|
|
409
|
+
}
|
|
410
|
+
|
|
411
|
+
declare const GLOBAL_VARIABLES: {
|
|
412
|
+
id: string;
|
|
413
|
+
name: string;
|
|
414
|
+
title: string;
|
|
415
|
+
dataType: string;
|
|
416
|
+
value: string;
|
|
417
|
+
}[];
|
|
418
|
+
|
|
419
|
+
declare class AXCMetaDataDefinitionDataSeeder implements AXPDataSeeder {
|
|
420
|
+
private storageService;
|
|
421
|
+
seed(): Promise<void>;
|
|
422
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCMetaDataDefinitionDataSeeder, never>;
|
|
423
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCMetaDataDefinitionDataSeeder>;
|
|
424
|
+
}
|
|
425
|
+
|
|
363
426
|
declare const REPORT_CATEGORIES: AXPReportCategory[];
|
|
364
427
|
declare const REPORT_DEFINITIONS: AXPReportDefinition[];
|
|
365
428
|
declare const CATEGORY_REPORT_MAPPING: Map<string, AXPReportDefinition[]>;
|
|
@@ -445,5 +508,5 @@ declare const TEXT_TEMPLATE_CATEGORY: {
|
|
|
445
508
|
}[];
|
|
446
509
|
declare const TEXT_TEMPLATES: AXMTextTemplateManagementTemplateEntityModel[];
|
|
447
510
|
|
|
448
|
-
export { APPLICATIONS, APPLICATIONS_MODULES, AXCApplicationManagementMockModule, AXCApplicationTemplateDataSeeder, AXCAuthMockModule, AXCCommonMockModule, AXCContactManagementMockModule, AXCConversationMockModule, AXCDashboardManagementMockModule, AXCDataManagementMockModule, AXCDocumentManagementMockModule, AXCFOrganizationManagementMockModule, AXCFileStorageService, AXCFormTemplateManagementMockModule, AXCIssueManagementMockModule, AXCLockService, AXCLogManagementMockModule, AXCMockModule, AXCNotificationManagementMockModule, AXCProjectManagementMockModule, AXCReportManagementMockModule, AXCSchedulerJobDataSeeder, AXCSchedulerJobManagementMockModule, AXCSecurityManagementMockModule, AXCTextTemplateCategoryDataSeeder, AXCTextTemplateDataSeeder, AXCTextTemplateManagementMockModule, AXCTrainingManagementMockModule, AXMAiResponderService, AXMReportExecuteCommand, AXPDashboardDataSeeder, AXPDexieEntityStorageService, AXPMessageDataSeeder, AXPReportManagementDataSeeder, AXPRoomDataSeeder, AXPSecurityManagementRoleDataSeeder, AXPSecurityManagementUserDataSeeder, CATEGORY_REPORT_MAPPING, DASHBOARDS, EDITIONS, ENTITIES, FEATURES, MOCKStrategy, MODULES, PERMISSIONS, PROPERTIES, REPORT_CATEGORIES, REPORT_DEFINITIONS, TEXT_TEMPLATES, TEXT_TEMPLATE_CATEGORY, generateRandomDashboard };
|
|
511
|
+
export { APPLICATIONS, APPLICATIONS_MODULES, AXCAppTermDataSeeder, AXCAppVersionDataSeeder, AXCApplicationManagementMockModule, AXCApplicationTemplateDataSeeder, AXCAuthMockModule, AXCCommonMockModule, AXCContactManagementMockModule, AXCConversationMockModule, AXCDashboardManagementMockModule, AXCDataManagementMockModule, AXCDocumentManagementMockModule, AXCFOrganizationManagementMockModule, AXCFileStorageService, AXCFormTemplateManagementMockModule, AXCGlobalVariablesDataSeeder, AXCIssueManagementMockModule, AXCLockService, AXCLogManagementMockModule, AXCMetaDataDefinitionDataSeeder, AXCMockModule, AXCNotificationManagementMockModule, AXCPlatformManagementMockModule, AXCProjectManagementMockModule, AXCReportManagementMockModule, AXCSchedulerJobDataSeeder, AXCSchedulerJobManagementMockModule, AXCSecurityManagementMockModule, AXCTextTemplateCategoryDataSeeder, AXCTextTemplateDataSeeder, AXCTextTemplateManagementMockModule, AXCTrainingManagementMockModule, AXMAiResponderService, AXMReportExecuteCommand, AXPDashboardDataSeeder, AXPDexieEntityStorageService, AXPMessageDataSeeder, AXPReportManagementDataSeeder, AXPRoomDataSeeder, AXPSecurityManagementRoleDataSeeder, AXPSecurityManagementUserDataSeeder, CATEGORY_REPORT_MAPPING, DASHBOARDS, EDITIONS, ENTITIES, FEATURES, GLOBAL_VARIABLES, MOCKGoogleStrategy, MOCKStrategy, MODULES, PERMISSIONS, PROPERTIES, REPORT_CATEGORIES, REPORT_DEFINITIONS, TEXT_TEMPLATES, TEXT_TEMPLATE_CATEGORY, generateRandomDashboard };
|
|
449
512
|
export type { MockUserPassCredentials };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@acorex/connectivity",
|
|
3
|
-
"version": "20.2.0-next.
|
|
3
|
+
"version": "20.2.0-next.2",
|
|
4
4
|
"peerDependencies": {
|
|
5
5
|
"@angular/common": "^19.0.0",
|
|
6
6
|
"@angular/core": "^19.0.0"
|
|
@@ -16,13 +16,17 @@
|
|
|
16
16
|
"types": "./index.d.ts",
|
|
17
17
|
"default": "./fesm2022/acorex-connectivity.mjs"
|
|
18
18
|
},
|
|
19
|
-
"./api": {
|
|
20
|
-
"types": "./api/index.d.ts",
|
|
21
|
-
"default": "./fesm2022/acorex-connectivity-api.mjs"
|
|
22
|
-
},
|
|
23
19
|
"./mock": {
|
|
24
20
|
"types": "./mock/index.d.ts",
|
|
25
21
|
"default": "./fesm2022/acorex-connectivity-mock.mjs"
|
|
22
|
+
},
|
|
23
|
+
"./utils": {
|
|
24
|
+
"types": "./utils/index.d.ts",
|
|
25
|
+
"default": "./fesm2022/acorex-connectivity-utils.mjs"
|
|
26
|
+
},
|
|
27
|
+
"./api": {
|
|
28
|
+
"types": "./api/index.d.ts",
|
|
29
|
+
"default": "./fesm2022/acorex-connectivity-api.mjs"
|
|
26
30
|
}
|
|
27
31
|
},
|
|
28
32
|
"dependencies": {
|
package/utils/README.md
ADDED
package/utils/index.d.ts
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import * as i0 from '@angular/core';
|
|
2
|
+
import * as i1 from '@angular/common';
|
|
3
|
+
|
|
4
|
+
declare class AXCExternalAuthorizationService {
|
|
5
|
+
private configs;
|
|
6
|
+
signin(providerName: string): Promise<void>;
|
|
7
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCExternalAuthorizationService, never>;
|
|
8
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCExternalAuthorizationService>;
|
|
9
|
+
}
|
|
10
|
+
|
|
11
|
+
declare class AXCUtilsModule {
|
|
12
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCUtilsModule, never>;
|
|
13
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCUtilsModule, never, [typeof i1.CommonModule], never>;
|
|
14
|
+
static ɵinj: i0.ɵɵInjectorDeclaration<AXCUtilsModule>;
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
export { AXCExternalAuthorizationService, AXCUtilsModule };
|