@acorex/connectivity 20.2.0-next.1 → 20.2.0-next.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,64 @@
1
+ import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';
2
+ import { PkceUtil } from '@acorex/platform/auth';
3
+ import * as i0 from '@angular/core';
4
+ import { inject, Injectable, NgModule } from '@angular/core';
5
+ import { CommonModule } from '@angular/common';
6
+
7
+ class AXCExternalAuthorizationService {
8
+ constructor() {
9
+ this.configs = inject(AXM_AUTH_CONFIG_TOKEN);
10
+ }
11
+ async signin(providerName) {
12
+ // Get provider configuration (optional, for validation)
13
+ const providerConfig = this.configs?.externalProviders?.[providerName];
14
+ if (!providerConfig) {
15
+ throw new Error(`Provider '${providerName}' is not configured`);
16
+ }
17
+ // Get application configuration for OIDC
18
+ const clientId = this.configs?.authConfig?.clientId || 'spa-client';
19
+ const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);
20
+ const authorizeUrl = `${this.configs?.authConfig?.issuer}/connect/authorize`;
21
+ // Centralized PKCE code verifier logic
22
+ const codeVerifier = PkceUtil.generateRandomString(128);
23
+ localStorage.setItem('pkce_code_verifier', codeVerifier);
24
+ const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);
25
+ // Build the authorization URL according to the required format
26
+ const authUrl = `${authorizeUrl}` +
27
+ `?response_type=code` +
28
+ `&client_id=${clientId}` +
29
+ `&redirect_uri=${redirectUri}` +
30
+ `&scope=openid profile email` +
31
+ `&code_challenge=${codeChallenge}` +
32
+ `&code_challenge_method=S256` +
33
+ `&prompt=login` +
34
+ `&acr_values=${providerName}`;
35
+ console.log('Redirecting to:', authUrl);
36
+ // Use window.location.assign to redirect
37
+ window.location.assign(authUrl);
38
+ }
39
+ static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }
40
+ static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCExternalAuthorizationService }); }
41
+ }
42
+ i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{
43
+ type: Injectable
44
+ }] });
45
+
46
+ class AXCUtilsModule {
47
+ static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }
48
+ static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: "14.0.0", version: "20.1.4", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }
49
+ static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }
50
+ }
51
+ i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.4", ngImport: i0, type: AXCUtilsModule, decorators: [{
52
+ type: NgModule,
53
+ args: [{
54
+ imports: [CommonModule],
55
+ providers: [AXCExternalAuthorizationService],
56
+ }]
57
+ }] });
58
+
59
+ /**
60
+ * Generated bundle index. Do not edit.
61
+ */
62
+
63
+ export { AXCExternalAuthorizationService, AXCUtilsModule };
64
+ //# sourceMappingURL=acorex-connectivity-utils.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"acorex-connectivity-utils.mjs","sources":["../tmp-esm2022/utils/lib/external-authorization.service.js","../tmp-esm2022/utils/lib/utils.module.js","../tmp-esm2022/utils/acorex-connectivity-utils.js"],"sourcesContent":["import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';\nimport { PkceUtil } from '@acorex/platform/auth';\nimport { inject, Injectable } from '@angular/core';\nimport * as i0 from \"@angular/core\";\nexport class AXCExternalAuthorizationService {\n constructor() {\n this.configs = inject(AXM_AUTH_CONFIG_TOKEN);\n }\n async signin(providerName) {\n // Get provider configuration (optional, for validation)\n const providerConfig = this.configs?.externalProviders?.[providerName];\n if (!providerConfig) {\n throw new Error(`Provider '${providerName}' is not configured`);\n }\n // Get application configuration for OIDC\n const clientId = this.configs?.authConfig?.clientId || 'spa-client';\n const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);\n const authorizeUrl = `${this.configs?.authConfig?.issuer}/connect/authorize`;\n // Centralized PKCE code verifier logic\n const codeVerifier = PkceUtil.generateRandomString(128);\n localStorage.setItem('pkce_code_verifier', codeVerifier);\n const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);\n // Build the authorization URL according to the required format\n const authUrl = `${authorizeUrl}` +\n `?response_type=code` +\n `&client_id=${clientId}` +\n `&redirect_uri=${redirectUri}` +\n `&scope=openid profile email` +\n `&code_challenge=${codeChallenge}` +\n `&code_challenge_method=S256` +\n `&prompt=login` +\n `&acr_values=${providerName}`;\n console.log('Redirecting to:', authUrl);\n // Use window.location.assign to redirect\n window.location.assign(authUrl);\n }\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }\n static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{\n type: Injectable\n }] });\n//# sourceMappingURL=data:application/json;base64,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","import { CommonModule } from '@angular/common';\nimport { NgModule } from '@angular/core';\nimport { AXCExternalAuthorizationService } from './external-authorization.service';\nimport * as i0 from \"@angular/core\";\nexport class AXCUtilsModule {\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }\n static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: \"14.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }\n static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, decorators: [{\n type: NgModule,\n args: [{\n imports: [CommonModule],\n providers: [AXCExternalAuthorizationService],\n }]\n }] });\n//# sourceMappingURL=data:application/json;base64,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","/**\n * Generated bundle index. Do not edit.\n */\nexport * from './index';\n//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWNvcmV4LWNvbm5lY3Rpdml0eS11dGlscy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL2xpYnMvY29ubmVjdGl2aXR5L3V0aWxzL3NyYy9hY29yZXgtY29ubmVjdGl2aXR5LXV0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBRUgsY0FBYyxTQUFTLENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyIvKipcbiAqIEdlbmVyYXRlZCBidW5kbGUgaW5kZXguIERvIG5vdCBlZGl0LlxuICovXG5cbmV4cG9ydCAqIGZyb20gJy4vaW5kZXgnO1xuIl19"],"names":[],"mappings":";;;;;;AAIO,MAAM,+BAA+B,CAAC;AAC7C,IAAI,WAAW,GAAG;AAClB,QAAQ,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,qBAAqB,CAAC;AACpD;AACA,IAAI,MAAM,MAAM,CAAC,YAAY,EAAE;AAC/B;AACA,QAAQ,MAAM,cAAc,GAAG,IAAI,CAAC,OAAO,EAAE,iBAAiB,GAAG,YAAY,CAAC;AAC9E,QAAQ,IAAI,CAAC,cAAc,EAAE;AAC7B,YAAY,MAAM,IAAI,KAAK,CAAC,CAAC,UAAU,EAAE,YAAY,CAAC,mBAAmB,CAAC,CAAC;AAC3E;AACA;AACA,QAAQ,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,IAAI,YAAY;AAC3E,QAAQ,MAAM,WAAW,GAAG,kBAAkB,CAAC,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,wBAAwB,CAAC,CAAC;AACnG,QAAQ,MAAM,YAAY,GAAG,CAAC,EAAE,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,MAAM,CAAC,kBAAkB,CAAC;AACpF;AACA,QAAQ,MAAM,YAAY,GAAG,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC;AAC/D,QAAQ,YAAY,CAAC,OAAO,CAAC,oBAAoB,EAAE,YAAY,CAAC;AAChE,QAAQ,MAAM,aAAa,GAAG,MAAM,QAAQ,CAAC,qBAAqB,CAAC,YAAY,CAAC;AAChF;AACA,QAAQ,MAAM,OAAO,GAAG,CAAC,EAAE,YAAY,CAAC,CAAC;AACzC,YAAY,CAAC,mBAAmB,CAAC;AACjC,YAAY,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;AACpC,YAAY,CAAC,cAAc,EAAE,WAAW,CAAC,CAAC;AAC1C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC;AAC9C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,aAAa,CAAC;AAC3B,YAAY,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;AACzC,QAAQ,OAAO,CAAC,GAAG,CAAC,iBAAiB,EAAE,OAAO,CAAC;AAC/C;AACA,QAAQ,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC;AACvC;AACA,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC,CAAC;AAClM,IAAI,SAAS,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC,qBAAqB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,CAAC,CAAC;AACrJ;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,UAAU,EAAE,CAAC;AACzI,YAAY,IAAI,EAAE;AAClB,SAAS,CAAC,EAAE,CAAC;;ACrCN,MAAM,cAAc,CAAC;AAC5B,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC,CAAC;AAC/K,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AAC1J,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,SAAS,EAAE,CAAC,+BAA+B,CAAC,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AACxM;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,EAAE,CAAC;AACxH,YAAY,IAAI,EAAE,QAAQ;AAC1B,YAAY,IAAI,EAAE,CAAC;AACnB,oBAAoB,OAAO,EAAE,CAAC,YAAY,CAAC;AAC3C,oBAAoB,SAAS,EAAE,CAAC,+BAA+B,CAAC;AAChE,iBAAiB;AACjB,SAAS,CAAC,EAAE,CAAC;;ACfb;AACA;AACA;;;;"}
package/mock/index.d.ts CHANGED
@@ -1,12 +1,15 @@
1
- import { AXPDataSeeder, AXPEntityStorageService, AXPEntityDefinitionRegistryService } from '@acorex/platform/layout/entity';
1
+ import { AXPDataSeeder, AXPEntityStorageService, AXPEntityDefinitionRegistryService, AXPEntityStorageWithMiddlewareService } from '@acorex/platform/layout/entity';
2
2
  import * as i0 from '@angular/core';
3
3
  import { Injector } from '@angular/core';
4
4
  import { AXPLockService, AXPLockRequest, AXPLockInfo, AXPUnLockRequest, AXPLockGetInfoRequest, AXPFileStorageService, AXPFileStorageCreateRequest, AXPFileStorageInfo, AXPFileStorageUpdateRequest, AXPFileStorageFindRequest, AXPReportCategory, AXPReportDefinition, AXPExecutionReportCommand, AXPLayoutExecutionContext, AXPExecutionReportCommandResult } from '@acorex/platform/common';
5
5
  import { AXMCommonDashboardEntityModel } from '@acorex/modules/dashboard-management';
6
- import Dexie from 'dexie';
7
- import * as i1$1 from '@acorex/platform/auth';
8
- import { AXPSessionService, AXPBaseCredentials, AXPAuthStrategy, AXPSignInResult, AXPSessionContext, AXPRefreshTokenResult } from '@acorex/platform/auth';
9
- import { AXPQueryRequest, AXPPagedListResult, AXPAppStartUpService } from '@acorex/platform/core';
6
+ import { AXPEntityEventDispatcherService, AXPQueryRequest, AXPPagedListResult, AXPAppStartUpService } from '@acorex/platform/core';
7
+ import * as dexie from 'dexie';
8
+ import dexie__default from 'dexie';
9
+ import * as _acorex_platform_auth from '@acorex/platform/auth';
10
+ import { AXPSessionService, AXPAuthStrategy, AXPBaseCredentials, AXPSessionContext, AXPSignInResult } from '@acorex/platform/auth';
11
+ import { AXMAuthConfigs } from '@acorex/modules/auth';
12
+ import { Router } from '@angular/router';
10
13
  import * as i1 from '@acorex/platform/runtime';
11
14
  import { AXMTextTemplateManagementTemplateEntityModel } from '@acorex/modules/text-template-management';
12
15
 
@@ -174,7 +177,9 @@ declare class AXMAiResponderService {
174
177
  declare class AXPMessageDataSeeder implements AXPDataSeeder {
175
178
  private storageService;
176
179
  private chatService;
180
+ private chatRealtimeService;
177
181
  private commentService;
182
+ private commentRealtimeService;
178
183
  private aiResponderService;
179
184
  private usersService;
180
185
  private sessionService;
@@ -220,10 +225,11 @@ declare class AXCDataManagementMockModule {
220
225
  static ɵinj: i0.ɵɵInjectorDeclaration<AXCDataManagementMockModule>;
221
226
  }
222
227
 
223
- declare class AXPDexieEntityStorageService extends Dexie implements AXPEntityStorageService<string, any> {
228
+ declare class AXPDexieEntityStorageService extends dexie__default implements AXPEntityStorageService<string, any> {
224
229
  protected sessionService: AXPSessionService;
225
230
  protected entityRegistryService: AXPEntityDefinitionRegistryService;
226
231
  protected lockService: AXPLockService;
232
+ protected entityEventDispatcher: AXPEntityEventDispatcherService;
227
233
  constructor();
228
234
  get dbName(): string;
229
235
  private detectChanges;
@@ -278,6 +284,24 @@ declare class AXCLogManagementMockModule {
278
284
  static ɵinj: i0.ɵɵInjectorDeclaration<AXCLogManagementMockModule>;
279
285
  }
280
286
 
287
+ declare class MOCKGoogleStrategy extends AXPAuthStrategy {
288
+ tenantLoader: _acorex_platform_auth.AXPTenantLoader;
289
+ protected configs: AXMAuthConfigs;
290
+ private externalAuthorizationService;
291
+ applicationLoader: _acorex_platform_auth.AXPApplicationLoader;
292
+ router: Router;
293
+ constructor();
294
+ get name(): string;
295
+ signin(credentials: AXPBaseCredentials): Promise<void>;
296
+ signout(): Promise<void>;
297
+ refreshToken(context: AXPSessionContext): Promise<AXPSignInResult>;
298
+ updateToken(params: {
299
+ [key: string]: any;
300
+ }): Promise<AXPSignInResult>;
301
+ static ɵfac: i0.ɵɵFactoryDeclaration<MOCKGoogleStrategy, never>;
302
+ static ɵprov: i0.ɵɵInjectableDeclaration<MOCKGoogleStrategy>;
303
+ }
304
+
281
305
  declare class AXCFOrganizationManagementMockModule {
282
306
  static ɵfac: i0.ɵɵFactoryDeclaration<AXCFOrganizationManagementMockModule, never>;
283
307
  static ɵmod: i0.ɵɵNgModuleDeclaration<AXCFOrganizationManagementMockModule, never, never, never>;
@@ -290,6 +314,18 @@ declare class AXCReportManagementMockModule {
290
314
  static ɵinj: i0.ɵɵInjectorDeclaration<AXCReportManagementMockModule>;
291
315
  }
292
316
 
317
+ declare class AXCLocationManagementMockModule {
318
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCLocationManagementMockModule, never>;
319
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCLocationManagementMockModule, never, never, never>;
320
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCLocationManagementMockModule>;
321
+ }
322
+
323
+ declare class AXCLocaleManagementMockModule {
324
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCLocaleManagementMockModule, never>;
325
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCLocaleManagementMockModule, never, never, never>;
326
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCLocaleManagementMockModule>;
327
+ }
328
+
293
329
  declare class AXCPlatformManagementMockModule {
294
330
  static ɵfac: i0.ɵɵFactoryDeclaration<AXCPlatformManagementMockModule, never>;
295
331
  static ɵmod: i0.ɵɵNgModuleDeclaration<AXCPlatformManagementMockModule, never, never, never>;
@@ -314,12 +350,6 @@ declare class AXCSchedulerJobManagementMockModule {
314
350
  static ɵinj: i0.ɵɵInjectorDeclaration<AXCSchedulerJobManagementMockModule>;
315
351
  }
316
352
 
317
- declare class AXCNotificationManagementMockModule {
318
- static ɵfac: i0.ɵɵFactoryDeclaration<AXCNotificationManagementMockModule, never>;
319
- static ɵmod: i0.ɵɵNgModuleDeclaration<AXCNotificationManagementMockModule, never, never, never>;
320
- static ɵinj: i0.ɵɵInjectorDeclaration<AXCNotificationManagementMockModule>;
321
- }
322
-
323
353
  declare class AXCTrainingManagementMockModule {
324
354
  static ɵfac: i0.ɵɵFactoryDeclaration<AXCTrainingManagementMockModule, never>;
325
355
  static ɵmod: i0.ɵɵNgModuleDeclaration<AXCTrainingManagementMockModule, never, never, never>;
@@ -338,10 +368,28 @@ declare class AXMCalendarManagementMockModule {
338
368
  static ɵinj: i0.ɵɵInjectorDeclaration<AXMCalendarManagementMockModule>;
339
369
  }
340
370
 
371
+ declare class AXCWorkflowManagementMockModule {
372
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCWorkflowManagementMockModule, never>;
373
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCWorkflowManagementMockModule, never, never, never>;
374
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCWorkflowManagementMockModule>;
375
+ }
376
+
377
+ declare class AXCNotificationManagementMockModule {
378
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCNotificationManagementMockModule, never>;
379
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCNotificationManagementMockModule, never, never, never>;
380
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCNotificationManagementMockModule>;
381
+ }
382
+
383
+ declare class AXCTaskManagementMockModule {
384
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCTaskManagementMockModule, never>;
385
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCTaskManagementMockModule, never, never, never>;
386
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCTaskManagementMockModule>;
387
+ }
388
+
341
389
  declare class AXCMockModule {
342
390
  constructor(appInitService: AXPAppStartUpService, injector: Injector);
343
391
  static ɵfac: i0.ɵɵFactoryDeclaration<AXCMockModule, never>;
344
- static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof i1$1.AXPAuthModule, typeof AXCCommonMockModule, typeof AXCFormTemplateManagementMockModule, typeof AXCFOrganizationManagementMockModule, typeof AXCReportManagementMockModule, typeof AXCContactManagementMockModule, typeof AXCDashboardManagementMockModule, typeof AXCConversationMockModule, typeof AXCAuthMockModule, typeof AXCPlatformManagementMockModule, typeof AXCTextTemplateManagementMockModule, typeof AXCSecurityManagementMockModule, typeof AXCSchedulerJobManagementMockModule, typeof AXCNotificationManagementMockModule, typeof AXCApplicationManagementMockModule, typeof AXCTrainingManagementMockModule, typeof AXCProjectManagementMockModule, typeof AXCDocumentManagementMockModule, typeof AXCIssueManagementMockModule, typeof AXCLogManagementMockModule, typeof AXMCalendarManagementMockModule, typeof AXCDataManagementMockModule], never>;
392
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof _acorex_platform_auth.AXPAuthModule, typeof AXCCommonMockModule, typeof AXCFormTemplateManagementMockModule, typeof AXCFOrganizationManagementMockModule, typeof AXCReportManagementMockModule, typeof AXCContactManagementMockModule, typeof AXCLocationManagementMockModule, typeof AXCLocaleManagementMockModule, typeof AXCDashboardManagementMockModule, typeof AXCConversationMockModule, typeof AXCAuthMockModule, typeof AXCPlatformManagementMockModule, typeof AXCTextTemplateManagementMockModule, typeof AXCSecurityManagementMockModule, typeof AXCSchedulerJobManagementMockModule, typeof AXCApplicationManagementMockModule, typeof AXCTrainingManagementMockModule, typeof AXCProjectManagementMockModule, typeof AXCDocumentManagementMockModule, typeof AXCIssueManagementMockModule, typeof AXCLogManagementMockModule, typeof AXMCalendarManagementMockModule, typeof AXCDataManagementMockModule, typeof AXCWorkflowManagementMockModule, typeof AXCNotificationManagementMockModule, typeof AXCTaskManagementMockModule], never>;
345
393
  static ɵinj: i0.ɵɵInjectorDeclaration<AXCMockModule>;
346
394
  }
347
395
 
@@ -349,17 +397,59 @@ interface MockUserPassCredentials extends AXPBaseCredentials {
349
397
  username: string;
350
398
  password: string;
351
399
  }
352
- declare class MOCKStrategy implements AXPAuthStrategy {
400
+ declare class MOCKStrategy extends AXPAuthStrategy {
401
+ tenantLoader: _acorex_platform_auth.AXPTenantLoader;
402
+ applicationLoader: _acorex_platform_auth.AXPApplicationLoader;
403
+ router: Router;
353
404
  constructor();
354
405
  private entityRegistery;
355
406
  get name(): string;
356
407
  signin(credentials: MockUserPassCredentials): Promise<AXPSignInResult>;
357
408
  signout(): Promise<void>;
358
- refreshToken(context: AXPSessionContext): Promise<AXPRefreshTokenResult>;
409
+ refreshToken(context: AXPSessionContext): Promise<AXPSignInResult>;
410
+ updateToken(params: {
411
+ [key: string]: any;
412
+ }): Promise<AXPSignInResult>;
359
413
  static ɵfac: i0.ɵɵFactoryDeclaration<MOCKStrategy, never>;
360
414
  static ɵprov: i0.ɵɵInjectableDeclaration<MOCKStrategy>;
361
415
  }
362
416
 
417
+ declare class AXCAppTermDataSeeder implements AXPDataSeeder {
418
+ private storageService;
419
+ seed(): Promise<void>;
420
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppTermDataSeeder, never>;
421
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppTermDataSeeder>;
422
+ }
423
+
424
+ declare class AXCAppVersionDataSeeder implements AXPDataSeeder {
425
+ private storageService;
426
+ seed(): Promise<void>;
427
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppVersionDataSeeder, never>;
428
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppVersionDataSeeder>;
429
+ }
430
+
431
+ declare class AXCGlobalVariablesDataSeeder implements AXPDataSeeder {
432
+ private storageService;
433
+ seed(): Promise<void>;
434
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCGlobalVariablesDataSeeder, never>;
435
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXCGlobalVariablesDataSeeder>;
436
+ }
437
+
438
+ declare const GLOBAL_VARIABLES: {
439
+ id: string;
440
+ name: string;
441
+ title: string;
442
+ dataType: string;
443
+ value: string;
444
+ }[];
445
+
446
+ declare class AXCMetaDataDefinitionDataSeeder implements AXPDataSeeder {
447
+ private storageService;
448
+ seed(): Promise<void>;
449
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCMetaDataDefinitionDataSeeder, never>;
450
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXCMetaDataDefinitionDataSeeder>;
451
+ }
452
+
363
453
  declare const REPORT_CATEGORIES: AXPReportCategory[];
364
454
  declare const REPORT_DEFINITIONS: AXPReportDefinition[];
365
455
  declare const CATEGORY_REPORT_MAPPING: Map<string, AXPReportDefinition[]>;
@@ -424,6 +514,79 @@ declare class AXPSecurityManagementUserDataSeeder implements AXPDataSeeder {
424
514
  static ɵprov: i0.ɵɵInjectableDeclaration<AXPSecurityManagementUserDataSeeder>;
425
515
  }
426
516
 
517
+ interface TaskType {
518
+ id: string;
519
+ name: string;
520
+ title: string;
521
+ description: string;
522
+ icon: string;
523
+ color: string;
524
+ isActive: boolean;
525
+ order: number;
526
+ features: string[];
527
+ workflowSteps: string[];
528
+ estimatedHours: number;
529
+ priority: string;
530
+ category: string;
531
+ }
532
+ declare const TASK_TYPES: TaskType[];
533
+ interface TaskStatus {
534
+ id: string;
535
+ taskTypeId: string;
536
+ name: string;
537
+ title: string;
538
+ description: string;
539
+ color: string;
540
+ icon: string;
541
+ isInitial: boolean;
542
+ isFinal: boolean;
543
+ order: number;
544
+ nextStatuses: string[];
545
+ isActive: boolean;
546
+ }
547
+ declare const TASK_STATUSES: TaskStatus[];
548
+ interface Task {
549
+ id: string;
550
+ title: string;
551
+ description: string;
552
+ taskTypeId: string;
553
+ taskStatusId: string;
554
+ priority: string;
555
+ estimatedHours: number;
556
+ actualHours: number;
557
+ startDate: Date;
558
+ dueDate: Date;
559
+ completedDate?: Date;
560
+ assignedToUserId: string;
561
+ createdByUserId: string;
562
+ tags: string[];
563
+ progress: number;
564
+ isActive: boolean;
565
+ }
566
+ declare const TASKS: Task[];
567
+ interface TaskTemplate {
568
+ id: string;
569
+ name: string;
570
+ title: string;
571
+ description: string;
572
+ taskTypeId: string;
573
+ templateData: {
574
+ title: string;
575
+ description: string;
576
+ estimatedHours: number;
577
+ priority: string;
578
+ tags: string[];
579
+ checklistItems: Array<{
580
+ title: string;
581
+ description?: string;
582
+ order: number;
583
+ }>;
584
+ };
585
+ isPublic: boolean;
586
+ createdBy: string;
587
+ }
588
+ declare const TASK_TEMPLATES: TaskTemplate[];
589
+
427
590
  declare class AXCTextTemplateCategoryDataSeeder implements AXPDataSeeder {
428
591
  private storageService;
429
592
  seed(): Promise<void>;
@@ -445,5 +608,90 @@ declare const TEXT_TEMPLATE_CATEGORY: {
445
608
  }[];
446
609
  declare const TEXT_TEMPLATES: AXMTextTemplateManagementTemplateEntityModel[];
447
610
 
448
- export { APPLICATIONS, APPLICATIONS_MODULES, AXCApplicationManagementMockModule, AXCApplicationTemplateDataSeeder, AXCAuthMockModule, AXCCommonMockModule, AXCContactManagementMockModule, AXCConversationMockModule, AXCDashboardManagementMockModule, AXCDataManagementMockModule, AXCDocumentManagementMockModule, AXCFOrganizationManagementMockModule, AXCFileStorageService, AXCFormTemplateManagementMockModule, AXCIssueManagementMockModule, AXCLockService, AXCLogManagementMockModule, AXCMockModule, AXCNotificationManagementMockModule, AXCProjectManagementMockModule, AXCReportManagementMockModule, AXCSchedulerJobDataSeeder, AXCSchedulerJobManagementMockModule, AXCSecurityManagementMockModule, AXCTextTemplateCategoryDataSeeder, AXCTextTemplateDataSeeder, AXCTextTemplateManagementMockModule, AXCTrainingManagementMockModule, AXMAiResponderService, AXMReportExecuteCommand, AXPDashboardDataSeeder, AXPDexieEntityStorageService, AXPMessageDataSeeder, AXPReportManagementDataSeeder, AXPRoomDataSeeder, AXPSecurityManagementRoleDataSeeder, AXPSecurityManagementUserDataSeeder, CATEGORY_REPORT_MAPPING, DASHBOARDS, EDITIONS, ENTITIES, FEATURES, MOCKStrategy, MODULES, PERMISSIONS, PROPERTIES, REPORT_CATEGORIES, REPORT_DEFINITIONS, TEXT_TEMPLATES, TEXT_TEMPLATE_CATEGORY, generateRandomDashboard };
449
- export type { MockUserPassCredentials };
611
+ /**
612
+ * Simplified Dexie Storage Service without built-in middleware logic
613
+ * This extends the original service but removes the middleware-related code
614
+ */
615
+ declare class AXPSimplifiedDexieStorageService extends AXPDexieEntityStorageService {
616
+ updateOne<T = any>(entityName: string, id: string, keyValue: {
617
+ [key: string]: any;
618
+ }): Promise<T>;
619
+ deleteOne(entityName: string, id: string): Promise<void>;
620
+ insertOne<T = any>(entityName: string, entity: T): Promise<string>;
621
+ private generateUuid;
622
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXPSimplifiedDexieStorageService, never>;
623
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXPSimplifiedDexieStorageService>;
624
+ }
625
+ /**
626
+ * Dexie Entity Storage Service with Middleware Support
627
+ *
628
+ * This service combines the simplified Dexie storage with a comprehensive middleware pipeline
629
+ * that handles locking, history logging, activity tracking, validation, and performance monitoring.
630
+ */
631
+ declare class AXPDexieWithMiddlewareService extends AXPEntityStorageWithMiddlewareService<string, any> {
632
+ private sessionService;
633
+ private lockService;
634
+ private entityRegistryService;
635
+ private eventService;
636
+ constructor();
637
+ private setupMiddlewares;
638
+ /**
639
+ * Get the underlying Dexie instance for direct access if needed
640
+ */
641
+ get dexieInstance(): AXPSimplifiedDexieStorageService;
642
+ /**
643
+ * Access to the Dexie table for advanced operations
644
+ */
645
+ table(name: string): dexie.Table<any, dexie.IndexableType>;
646
+ /**
647
+ * Get database information
648
+ */
649
+ getDatabaseInfo(): {
650
+ name: string;
651
+ isOpen: boolean;
652
+ version: number;
653
+ };
654
+ /**
655
+ * Clear all data for a specific entity (useful for testing)
656
+ */
657
+ clearEntity(entityName: string): Promise<void>;
658
+ /**
659
+ * Get entity count
660
+ */
661
+ getEntityCount(entityName: string): Promise<number>;
662
+ /**
663
+ * Bulk operations (bypassing some middleware for performance)
664
+ */
665
+ bulkInsert<T = any>(entityName: string, entities: T[]): Promise<string[]>;
666
+ /**
667
+ * Export entity data (useful for backup/migration)
668
+ */
669
+ exportEntity(entityName: string): Promise<any[]>;
670
+ /**
671
+ * Import entity data (useful for restore/migration)
672
+ */
673
+ importEntity(entityName: string, data: any[], options?: {
674
+ clearFirst?: boolean;
675
+ }): Promise<void>;
676
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXPDexieWithMiddlewareService, never>;
677
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXPDexieWithMiddlewareService>;
678
+ }
679
+ /**
680
+ * Factory function to create a configured Dexie service with standard middleware
681
+ */
682
+ declare function createDexieWithStandardMiddleware(): AXPDexieWithMiddlewareService;
683
+ /**
684
+ * Factory function to create a configured Dexie service with custom middleware
685
+ */
686
+ declare function createDexieWithCustomMiddleware(customMiddlewares?: {
687
+ global?: any[];
688
+ operations?: {
689
+ [operation: string]: any[];
690
+ };
691
+ entities?: {
692
+ [entityName: string]: any[];
693
+ };
694
+ }): AXPDexieWithMiddlewareService;
695
+
696
+ export { APPLICATIONS, APPLICATIONS_MODULES, AXCAppTermDataSeeder, AXCAppVersionDataSeeder, AXCApplicationManagementMockModule, AXCApplicationTemplateDataSeeder, AXCAuthMockModule, AXCCommonMockModule, AXCContactManagementMockModule, AXCConversationMockModule, AXCDashboardManagementMockModule, AXCDataManagementMockModule, AXCDocumentManagementMockModule, AXCFOrganizationManagementMockModule, AXCFileStorageService, AXCFormTemplateManagementMockModule, AXCGlobalVariablesDataSeeder, AXCIssueManagementMockModule, AXCLocaleManagementMockModule, AXCLocationManagementMockModule, AXCLockService, AXCLogManagementMockModule, AXCMetaDataDefinitionDataSeeder, AXCMockModule, AXCNotificationManagementMockModule, AXCPlatformManagementMockModule, AXCProjectManagementMockModule, AXCReportManagementMockModule, AXCSchedulerJobDataSeeder, AXCSchedulerJobManagementMockModule, AXCSecurityManagementMockModule, AXCTaskManagementMockModule, AXCTextTemplateCategoryDataSeeder, AXCTextTemplateDataSeeder, AXCTextTemplateManagementMockModule, AXCTrainingManagementMockModule, AXMAiResponderService, AXMReportExecuteCommand, AXPDashboardDataSeeder, AXPDexieEntityStorageService, AXPDexieWithMiddlewareService, AXPMessageDataSeeder, AXPReportManagementDataSeeder, AXPRoomDataSeeder, AXPSecurityManagementRoleDataSeeder, AXPSecurityManagementUserDataSeeder, AXPSimplifiedDexieStorageService, CATEGORY_REPORT_MAPPING, DASHBOARDS, EDITIONS, ENTITIES, FEATURES, GLOBAL_VARIABLES, MOCKGoogleStrategy, MOCKStrategy, MODULES, PERMISSIONS, PROPERTIES, REPORT_CATEGORIES, REPORT_DEFINITIONS, TASKS, TASK_STATUSES, TASK_TEMPLATES, TASK_TYPES, TEXT_TEMPLATES, TEXT_TEMPLATE_CATEGORY, createDexieWithCustomMiddleware, createDexieWithStandardMiddleware, generateRandomDashboard };
697
+ export type { MockUserPassCredentials, Task, TaskStatus, TaskTemplate, TaskType };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@acorex/connectivity",
3
- "version": "20.2.0-next.1",
3
+ "version": "20.2.0-next.3",
4
4
  "peerDependencies": {
5
5
  "@angular/common": "^19.0.0",
6
6
  "@angular/core": "^19.0.0"
@@ -23,6 +23,10 @@
23
23
  "./mock": {
24
24
  "types": "./mock/index.d.ts",
25
25
  "default": "./fesm2022/acorex-connectivity-mock.mjs"
26
+ },
27
+ "./utils": {
28
+ "types": "./utils/index.d.ts",
29
+ "default": "./fesm2022/acorex-connectivity-utils.mjs"
26
30
  }
27
31
  },
28
32
  "dependencies": {
@@ -0,0 +1,3 @@
1
+ # @acorex/connectivity/utils
2
+
3
+ Secondary entry point of `@acorex/connectivity`. It can be used by importing from `@acorex/connectivity/utils`.
@@ -0,0 +1,17 @@
1
+ import * as i0 from '@angular/core';
2
+ import * as i1 from '@angular/common';
3
+
4
+ declare class AXCExternalAuthorizationService {
5
+ private configs;
6
+ signin(providerName: string): Promise<void>;
7
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCExternalAuthorizationService, never>;
8
+ static ɵprov: i0.ɵɵInjectableDeclaration<AXCExternalAuthorizationService>;
9
+ }
10
+
11
+ declare class AXCUtilsModule {
12
+ static ɵfac: i0.ɵɵFactoryDeclaration<AXCUtilsModule, never>;
13
+ static ɵmod: i0.ɵɵNgModuleDeclaration<AXCUtilsModule, never, [typeof i1.CommonModule], never>;
14
+ static ɵinj: i0.ɵɵInjectorDeclaration<AXCUtilsModule>;
15
+ }
16
+
17
+ export { AXCExternalAuthorizationService, AXCUtilsModule };