@acorex/connectivity 20.2.0-next.4 → 20.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/fesm2022/acorex-connectivity-api.mjs +30 -30
- package/fesm2022/acorex-connectivity-api.mjs.map +1 -1
- package/fesm2022/acorex-connectivity-mock.mjs +4687 -2726
- package/fesm2022/acorex-connectivity-mock.mjs.map +1 -1
- package/fesm2022/acorex-connectivity-utils.mjs +8 -8
- package/fesm2022/acorex-connectivity-utils.mjs.map +1 -1
- package/mock/index.d.ts +117 -19
- package/package.json +5 -5
|
@@ -17,7 +17,7 @@ class AXCExternalAuthorizationService {
|
|
|
17
17
|
// Get application configuration for OIDC
|
|
18
18
|
const clientId = this.configs?.authConfig?.clientId || 'spa-client';
|
|
19
19
|
const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);
|
|
20
|
-
const authorizeUrl = `${this.configs?.
|
|
20
|
+
const authorizeUrl = `${this.configs?.baseUrl}/connect/authorize`;
|
|
21
21
|
// Centralized PKCE code verifier logic
|
|
22
22
|
const codeVerifier = PkceUtil.generateRandomString(128);
|
|
23
23
|
localStorage.setItem('pkce_code_verifier', codeVerifier);
|
|
@@ -36,19 +36,19 @@ class AXCExternalAuthorizationService {
|
|
|
36
36
|
// Use window.location.assign to redirect
|
|
37
37
|
window.location.assign(authUrl);
|
|
38
38
|
}
|
|
39
|
-
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.
|
|
40
|
-
static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: "12.0.0", version: "20.1.
|
|
39
|
+
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }
|
|
40
|
+
static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCExternalAuthorizationService }); }
|
|
41
41
|
}
|
|
42
|
-
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.
|
|
42
|
+
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{
|
|
43
43
|
type: Injectable
|
|
44
44
|
}] });
|
|
45
45
|
|
|
46
46
|
class AXCUtilsModule {
|
|
47
|
-
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.
|
|
48
|
-
static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: "14.0.0", version: "20.1.
|
|
49
|
-
static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: "12.0.0", version: "20.1.
|
|
47
|
+
static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }
|
|
48
|
+
static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: "14.0.0", version: "20.1.6", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }
|
|
49
|
+
static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }
|
|
50
50
|
}
|
|
51
|
-
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.
|
|
51
|
+
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "20.1.6", ngImport: i0, type: AXCUtilsModule, decorators: [{
|
|
52
52
|
type: NgModule,
|
|
53
53
|
args: [{
|
|
54
54
|
imports: [CommonModule],
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"acorex-connectivity-utils.mjs","sources":["../tmp-esm2022/utils/lib/external-authorization.service.js","../tmp-esm2022/utils/lib/utils.module.js","../tmp-esm2022/utils/acorex-connectivity-utils.js"],"sourcesContent":["import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';\nimport { PkceUtil } from '@acorex/platform/auth';\nimport { inject, Injectable } from '@angular/core';\nimport * as i0 from \"@angular/core\";\nexport class AXCExternalAuthorizationService {\n constructor() {\n this.configs = inject(AXM_AUTH_CONFIG_TOKEN);\n }\n async signin(providerName) {\n // Get provider configuration (optional, for validation)\n const providerConfig = this.configs?.externalProviders?.[providerName];\n if (!providerConfig) {\n throw new Error(`Provider '${providerName}' is not configured`);\n }\n // Get application configuration for OIDC\n const clientId = this.configs?.authConfig?.clientId || 'spa-client';\n const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);\n const authorizeUrl = `${this.configs?.authConfig?.issuer}/connect/authorize`;\n // Centralized PKCE code verifier logic\n const codeVerifier = PkceUtil.generateRandomString(128);\n localStorage.setItem('pkce_code_verifier', codeVerifier);\n const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);\n // Build the authorization URL according to the required format\n const authUrl = `${authorizeUrl}` +\n `?response_type=code` +\n `&client_id=${clientId}` +\n `&redirect_uri=${redirectUri}` +\n `&scope=openid profile email` +\n `&code_challenge=${codeChallenge}` +\n `&code_challenge_method=S256` +\n `&prompt=login` +\n `&acr_values=${providerName}`;\n console.log('Redirecting to:', authUrl);\n // Use window.location.assign to redirect\n window.location.assign(authUrl);\n }\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }\n static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{\n type: Injectable\n }] });\n//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZXh0ZXJuYWwtYXV0aG9yaXphdGlvbi5zZXJ2aWNlLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vLi4vLi4vbGlicy9jb25uZWN0aXZpdHkvdXRpbHMvc3JjL2xpYi9leHRlcm5hbC1hdXRob3JpemF0aW9uLnNlcnZpY2UudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFFLHFCQUFxQixFQUFrQixNQUFNLHNCQUFzQixDQUFDO0FBQzdFLE9BQU8sRUFBRSxRQUFRLEVBQUUsTUFBTSx1QkFBdUIsQ0FBQztBQUNqRCxPQUFPLEVBQUUsTUFBTSxFQUFFLFVBQVUsRUFBRSxNQUFNLGVBQWUsQ0FBQzs7QUFHbkQsTUFBTSxPQUFPLCtCQUErQjtJQUQ1QztRQUVVLFlBQU8sR0FBbUIsTUFBTSxDQUFpQixxQkFBcUIsQ0FBQyxDQUFDO0tBb0NqRjtJQWxDQyxLQUFLLENBQUMsTUFBTSxDQUFDLFlBQW9CO1FBQy9CLHdEQUF3RDtRQUN4RCxNQUFNLGNBQWMsR0FBRyxJQUFJLENBQUMsT0FBTyxFQUFFLGlCQUFpQixFQUFFLENBQUMsWUFBWSxDQUFDLENBQUM7UUFDdkUsSUFBSSxDQUFDLGNBQWMsRUFBRSxDQUFDO1lBQ3BCLE1BQU0sSUFBSSxLQUFLLENBQUMsYUFBYSxZQUFZLHFCQUFxQixDQUFDLENBQUM7UUFDbEUsQ0FBQztRQUVELHlDQUF5QztRQUN6QyxNQUFNLFFBQVEsR0FBRyxJQUFJLENBQUMsT0FBTyxFQUFFLFVBQVUsRUFBRSxRQUFRLElBQUksWUFBWSxDQUFDO1FBQ3BFLE1BQU0sV0FBVyxHQUFHLGtCQUFrQixDQUFDLEdBQUcsTUFBTSxDQUFDLFFBQVEsQ0FBQyxNQUFNLDBCQUEwQixDQUFDLENBQUM7UUFDNUYsTUFBTSxZQUFZLEdBQUcsR0FBRyxJQUFJLENBQUMsT0FBTyxFQUFFLFVBQVUsRUFBRSxNQUFNLG9CQUFvQixDQUFDO1FBRTdFLHVDQUF1QztRQUN2QyxNQUFNLFlBQVksR0FBRyxRQUFRLENBQUMsb0JBQW9CLENBQUMsR0FBRyxDQUFDLENBQUM7UUFDeEQsWUFBWSxDQUFDLE9BQU8sQ0FBQyxvQkFBb0IsRUFBRSxZQUFZLENBQUMsQ0FBQztRQUN6RCxNQUFNLGFBQWEsR0FBRyxNQUFNLFFBQVEsQ0FBQyxxQkFBcUIsQ0FBQyxZQUFZLENBQUMsQ0FBQztRQUV6RSwrREFBK0Q7UUFDL0QsTUFBTSxPQUFPLEdBQ1gsR0FBRyxZQUFZLEVBQUU7WUFDakIscUJBQXFCO1lBQ3JCLGNBQWMsUUFBUSxFQUFFO1lBQ3hCLGlCQUFpQixXQUFXLEVBQUU7WUFDOUIsNkJBQTZCO1lBQzdCLG1CQUFtQixhQUFhLEVBQUU7WUFDbEMsNkJBQTZCO1lBQzdCLGVBQWU7WUFDZixlQUFlLFlBQVksRUFBRSxDQUFDO1FBRWhDLE9BQU8sQ0FBQyxHQUFHLENBQUMsaUJBQWlCLEVBQUUsT0FBTyxDQUFDLENBQUM7UUFFeEMseUNBQXlDO1FBQ3pDLE1BQU0sQ0FBQyxRQUFRLENBQUMsTUFBTSxDQUFDLE9BQU8sQ0FBQyxDQUFDO0lBQ2xDLENBQUM7OEdBcENVLCtCQUErQjtrSEFBL0IsK0JBQStCOzsyRkFBL0IsK0JBQStCO2tCQUQzQyxVQUFVIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgQVhNX0FVVEhfQ09ORklHX1RPS0VOLCBBWE1BdXRoQ29uZmlncyB9IGZyb20gJ0BhY29yZXgvbW9kdWxlcy9hdXRoJztcbmltcG9ydCB7IFBrY2VVdGlsIH0gZnJvbSAnQGFjb3JleC9wbGF0Zm9ybS9hdXRoJztcbmltcG9ydCB7IGluamVjdCwgSW5qZWN0YWJsZSB9IGZyb20gJ0Bhbmd1bGFyL2NvcmUnO1xuXG5ASW5qZWN0YWJsZSgpXG5leHBvcnQgY2xhc3MgQVhDRXh0ZXJuYWxBdXRob3JpemF0aW9uU2VydmljZSB7XG4gIHByaXZhdGUgY29uZmlnczogQVhNQXV0aENvbmZpZ3MgPSBpbmplY3Q8QVhNQXV0aENvbmZpZ3M+KEFYTV9BVVRIX0NPTkZJR19UT0tFTik7XG5cbiAgYXN5bmMgc2lnbmluKHByb3ZpZGVyTmFtZTogc3RyaW5nKTogUHJvbWlzZTx2b2lkPiB7XG4gICAgLy8gR2V0IHByb3ZpZGVyIGNvbmZpZ3VyYXRpb24gKG9wdGlvbmFsLCBmb3IgdmFsaWRhdGlvbilcbiAgICBjb25zdCBwcm92aWRlckNvbmZpZyA9IHRoaXMuY29uZmlncz8uZXh0ZXJuYWxQcm92aWRlcnM/Lltwcm92aWRlck5hbWVdO1xuICAgIGlmICghcHJvdmlkZXJDb25maWcpIHtcbiAgICAgIHRocm93IG5ldyBFcnJvcihgUHJvdmlkZXIgJyR7cHJvdmlkZXJOYW1lfScgaXMgbm90IGNvbmZpZ3VyZWRgKTtcbiAgICB9XG5cbiAgICAvLyBHZXQgYXBwbGljYXRpb24gY29uZmlndXJhdGlvbiBmb3IgT0lEQ1xuICAgIGNvbnN0IGNsaWVudElkID0gdGhpcy5jb25maWdzPy5hdXRoQ29uZmlnPy5jbGllbnRJZCB8fCAnc3BhLWNsaWVudCc7XG4gICAgY29uc3QgcmVkaXJlY3RVcmkgPSBlbmNvZGVVUklDb21wb25lbnQoYCR7d2luZG93LmxvY2F0aW9uLm9yaWdpbn0vYXV0aC9heHAtb2F1dGgtY2FsbGJhY2tgKTtcbiAgICBjb25zdCBhdXRob3JpemVVcmwgPSBgJHt0aGlzLmNvbmZpZ3M/LmF1dGhDb25maWc/Lmlzc3Vlcn0vY29ubmVjdC9hdXRob3JpemVgO1xuXG4gICAgLy8gQ2VudHJhbGl6ZWQgUEtDRSBjb2RlIHZlcmlmaWVyIGxvZ2ljXG4gICAgY29uc3QgY29kZVZlcmlmaWVyID0gUGtjZVV0aWwuZ2VuZXJhdGVSYW5kb21TdHJpbmcoMTI4KTtcbiAgICBsb2NhbFN0b3JhZ2Uuc2V0SXRlbSgncGtjZV9jb2RlX3ZlcmlmaWVyJywgY29kZVZlcmlmaWVyKTtcbiAgICBjb25zdCBjb2RlQ2hhbGxlbmdlID0gYXdhaXQgUGtjZVV0aWwuZ2VuZXJhdGVDb2RlQ2hhbGxlbmdlKGNvZGVWZXJpZmllcik7XG5cbiAgICAvLyBCdWlsZCB0aGUgYXV0aG9yaXphdGlvbiBVUkwgYWNjb3JkaW5nIHRvIHRoZSByZXF1aXJlZCBmb3JtYXRcbiAgICBjb25zdCBhdXRoVXJsID1cbiAgICAgIGAke2F1dGhvcml6ZVVybH1gICtcbiAgICAgIGA/cmVzcG9uc2VfdHlwZT1jb2RlYCArXG4gICAgICBgJmNsaWVudF9pZD0ke2NsaWVudElkfWAgK1xuICAgICAgYCZyZWRpcmVjdF91cmk9JHtyZWRpcmVjdFVyaX1gICtcbiAgICAgIGAmc2NvcGU9b3BlbmlkIHByb2ZpbGUgZW1haWxgICtcbiAgICAgIGAmY29kZV9jaGFsbGVuZ2U9JHtjb2RlQ2hhbGxlbmdlfWAgK1xuICAgICAgYCZjb2RlX2NoYWxsZW5nZV9tZXRob2Q9UzI1NmAgK1xuICAgICAgYCZwcm9tcHQ9bG9naW5gICtcbiAgICAgIGAmYWNyX3ZhbHVlcz0ke3Byb3ZpZGVyTmFtZX1gO1xuXG4gICAgY29uc29sZS5sb2coJ1JlZGlyZWN0aW5nIHRvOicsIGF1dGhVcmwpO1xuXG4gICAgLy8gVXNlIHdpbmRvdy5sb2NhdGlvbi5hc3NpZ24gdG8gcmVkaXJlY3RcbiAgICB3aW5kb3cubG9jYXRpb24uYXNzaWduKGF1dGhVcmwpO1xuICB9XG59XG4iXX0=","import { CommonModule } from '@angular/common';\nimport { NgModule } from '@angular/core';\nimport { AXCExternalAuthorizationService } from './external-authorization.service';\nimport * as i0 from \"@angular/core\";\nexport class AXCUtilsModule {\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }\n static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: \"14.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }\n static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.4\", ngImport: i0, type: AXCUtilsModule, decorators: [{\n type: NgModule,\n args: [{\n imports: [CommonModule],\n providers: [AXCExternalAuthorizationService],\n }]\n }] });\n//# sourceMappingURL=data:application/json;base64,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","/**\n * Generated bundle index. Do not edit.\n */\nexport * from './index';\n//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWNvcmV4LWNvbm5lY3Rpdml0eS11dGlscy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL2xpYnMvY29ubmVjdGl2aXR5L3V0aWxzL3NyYy9hY29yZXgtY29ubmVjdGl2aXR5LXV0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBRUgsY0FBYyxTQUFTLENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyIvKipcbiAqIEdlbmVyYXRlZCBidW5kbGUgaW5kZXguIERvIG5vdCBlZGl0LlxuICovXG5cbmV4cG9ydCAqIGZyb20gJy4vaW5kZXgnO1xuIl19"],"names":[],"mappings":";;;;;;AAIO,MAAM,+BAA+B,CAAC;AAC7C,IAAI,WAAW,GAAG;AAClB,QAAQ,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,qBAAqB,CAAC;AACpD;AACA,IAAI,MAAM,MAAM,CAAC,YAAY,EAAE;AAC/B;AACA,QAAQ,MAAM,cAAc,GAAG,IAAI,CAAC,OAAO,EAAE,iBAAiB,GAAG,YAAY,CAAC;AAC9E,QAAQ,IAAI,CAAC,cAAc,EAAE;AAC7B,YAAY,MAAM,IAAI,KAAK,CAAC,CAAC,UAAU,EAAE,YAAY,CAAC,mBAAmB,CAAC,CAAC;AAC3E;AACA;AACA,QAAQ,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,IAAI,YAAY;AAC3E,QAAQ,MAAM,WAAW,GAAG,kBAAkB,CAAC,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,wBAAwB,CAAC,CAAC;AACnG,QAAQ,MAAM,YAAY,GAAG,CAAC,EAAE,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,MAAM,CAAC,kBAAkB,CAAC;AACpF;AACA,QAAQ,MAAM,YAAY,GAAG,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC;AAC/D,QAAQ,YAAY,CAAC,OAAO,CAAC,oBAAoB,EAAE,YAAY,CAAC;AAChE,QAAQ,MAAM,aAAa,GAAG,MAAM,QAAQ,CAAC,qBAAqB,CAAC,YAAY,CAAC;AAChF;AACA,QAAQ,MAAM,OAAO,GAAG,CAAC,EAAE,YAAY,CAAC,CAAC;AACzC,YAAY,CAAC,mBAAmB,CAAC;AACjC,YAAY,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;AACpC,YAAY,CAAC,cAAc,EAAE,WAAW,CAAC,CAAC;AAC1C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC;AAC9C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,aAAa,CAAC;AAC3B,YAAY,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;AACzC,QAAQ,OAAO,CAAC,GAAG,CAAC,iBAAiB,EAAE,OAAO,CAAC;AAC/C;AACA,QAAQ,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC;AACvC;AACA,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC,CAAC;AAClM,IAAI,SAAS,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC,qBAAqB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,CAAC,CAAC;AACrJ;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,UAAU,EAAE,CAAC;AACzI,YAAY,IAAI,EAAE;AAClB,SAAS,CAAC,EAAE,CAAC;;ACrCN,MAAM,cAAc,CAAC;AAC5B,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC,CAAC;AAC/K,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AAC1J,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,SAAS,EAAE,CAAC,+BAA+B,CAAC,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AACxM;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,EAAE,CAAC;AACxH,YAAY,IAAI,EAAE,QAAQ;AAC1B,YAAY,IAAI,EAAE,CAAC;AACnB,oBAAoB,OAAO,EAAE,CAAC,YAAY,CAAC;AAC3C,oBAAoB,SAAS,EAAE,CAAC,+BAA+B,CAAC;AAChE,iBAAiB;AACjB,SAAS,CAAC,EAAE,CAAC;;ACfb;AACA;AACA;;;;"}
|
|
1
|
+
{"version":3,"file":"acorex-connectivity-utils.mjs","sources":["../tmp-esm2022/utils/lib/external-authorization.service.js","../tmp-esm2022/utils/lib/utils.module.js","../tmp-esm2022/utils/acorex-connectivity-utils.js"],"sourcesContent":["import { AXM_AUTH_CONFIG_TOKEN } from '@acorex/modules/auth';\nimport { PkceUtil } from '@acorex/platform/auth';\nimport { inject, Injectable } from '@angular/core';\nimport * as i0 from \"@angular/core\";\nexport class AXCExternalAuthorizationService {\n constructor() {\n this.configs = inject(AXM_AUTH_CONFIG_TOKEN);\n }\n async signin(providerName) {\n // Get provider configuration (optional, for validation)\n const providerConfig = this.configs?.externalProviders?.[providerName];\n if (!providerConfig) {\n throw new Error(`Provider '${providerName}' is not configured`);\n }\n // Get application configuration for OIDC\n const clientId = this.configs?.authConfig?.clientId || 'spa-client';\n const redirectUri = encodeURIComponent(`${window.location.origin}/auth/axp-oauth-callback`);\n const authorizeUrl = `${this.configs?.baseUrl}/connect/authorize`;\n // Centralized PKCE code verifier logic\n const codeVerifier = PkceUtil.generateRandomString(128);\n localStorage.setItem('pkce_code_verifier', codeVerifier);\n const codeChallenge = await PkceUtil.generateCodeChallenge(codeVerifier);\n // Build the authorization URL according to the required format\n const authUrl = `${authorizeUrl}` +\n `?response_type=code` +\n `&client_id=${clientId}` +\n `&redirect_uri=${redirectUri}` +\n `&scope=openid profile email` +\n `&code_challenge=${codeChallenge}` +\n `&code_challenge_method=S256` +\n `&prompt=login` +\n `&acr_values=${providerName}`;\n console.log('Redirecting to:', authUrl);\n // Use window.location.assign to redirect\n window.location.assign(authUrl);\n }\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCExternalAuthorizationService, deps: [], target: i0.ɵɵFactoryTarget.Injectable }); }\n static { this.ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCExternalAuthorizationService }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCExternalAuthorizationService, decorators: [{\n type: Injectable\n }] });\n//# sourceMappingURL=data:application/json;base64,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","import { CommonModule } from '@angular/common';\nimport { NgModule } from '@angular/core';\nimport { AXCExternalAuthorizationService } from './external-authorization.service';\nimport * as i0 from \"@angular/core\";\nexport class AXCUtilsModule {\n static { this.ɵfac = i0.ɵɵngDeclareFactory({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCUtilsModule, deps: [], target: i0.ɵɵFactoryTarget.NgModule }); }\n static { this.ɵmod = i0.ɵɵngDeclareNgModule({ minVersion: \"14.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCUtilsModule, imports: [CommonModule] }); }\n static { this.ɵinj = i0.ɵɵngDeclareInjector({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCUtilsModule, providers: [AXCExternalAuthorizationService], imports: [CommonModule] }); }\n}\ni0.ɵɵngDeclareClassMetadata({ minVersion: \"12.0.0\", version: \"20.1.6\", ngImport: i0, type: AXCUtilsModule, decorators: [{\n type: NgModule,\n args: [{\n imports: [CommonModule],\n providers: [AXCExternalAuthorizationService],\n }]\n }] });\n//# sourceMappingURL=data:application/json;base64,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","/**\n * Generated bundle index. Do not edit.\n */\nexport * from './index';\n//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWNvcmV4LWNvbm5lY3Rpdml0eS11dGlscy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL2xpYnMvY29ubmVjdGl2aXR5L3V0aWxzL3NyYy9hY29yZXgtY29ubmVjdGl2aXR5LXV0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBRUgsY0FBYyxTQUFTLENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyIvKipcbiAqIEdlbmVyYXRlZCBidW5kbGUgaW5kZXguIERvIG5vdCBlZGl0LlxuICovXG5cbmV4cG9ydCAqIGZyb20gJy4vaW5kZXgnO1xuIl19"],"names":[],"mappings":";;;;;;AAIO,MAAM,+BAA+B,CAAC;AAC7C,IAAI,WAAW,GAAG;AAClB,QAAQ,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,qBAAqB,CAAC;AACpD;AACA,IAAI,MAAM,MAAM,CAAC,YAAY,EAAE;AAC/B;AACA,QAAQ,MAAM,cAAc,GAAG,IAAI,CAAC,OAAO,EAAE,iBAAiB,GAAG,YAAY,CAAC;AAC9E,QAAQ,IAAI,CAAC,cAAc,EAAE;AAC7B,YAAY,MAAM,IAAI,KAAK,CAAC,CAAC,UAAU,EAAE,YAAY,CAAC,mBAAmB,CAAC,CAAC;AAC3E;AACA;AACA,QAAQ,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,IAAI,YAAY;AAC3E,QAAQ,MAAM,WAAW,GAAG,kBAAkB,CAAC,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,wBAAwB,CAAC,CAAC;AACnG,QAAQ,MAAM,YAAY,GAAG,CAAC,EAAE,IAAI,CAAC,OAAO,EAAE,OAAO,CAAC,kBAAkB,CAAC;AACzE;AACA,QAAQ,MAAM,YAAY,GAAG,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC;AAC/D,QAAQ,YAAY,CAAC,OAAO,CAAC,oBAAoB,EAAE,YAAY,CAAC;AAChE,QAAQ,MAAM,aAAa,GAAG,MAAM,QAAQ,CAAC,qBAAqB,CAAC,YAAY,CAAC;AAChF;AACA,QAAQ,MAAM,OAAO,GAAG,CAAC,EAAE,YAAY,CAAC,CAAC;AACzC,YAAY,CAAC,mBAAmB,CAAC;AACjC,YAAY,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;AACpC,YAAY,CAAC,cAAc,EAAE,WAAW,CAAC,CAAC;AAC1C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC;AAC9C,YAAY,CAAC,2BAA2B,CAAC;AACzC,YAAY,CAAC,aAAa,CAAC;AAC3B,YAAY,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;AACzC,QAAQ,OAAO,CAAC,GAAG,CAAC,iBAAiB,EAAE,OAAO,CAAC;AAC/C;AACA,QAAQ,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC;AACvC;AACA,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC,CAAC;AAClM,IAAI,SAAS,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC,qBAAqB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,CAAC,CAAC;AACrJ;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,+BAA+B,EAAE,UAAU,EAAE,CAAC;AACzI,YAAY,IAAI,EAAE;AAClB,SAAS,CAAC,EAAE,CAAC;;ACrCN,MAAM,cAAc,CAAC;AAC5B,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,kBAAkB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC,CAAC;AAC/K,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AAC1J,IAAI,SAAS,IAAI,CAAC,IAAI,GAAG,EAAE,CAAC,mBAAmB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,SAAS,EAAE,CAAC,+BAA+B,CAAC,EAAE,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;AACxM;AACA,EAAE,CAAC,wBAAwB,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,EAAE,CAAC;AACxH,YAAY,IAAI,EAAE,QAAQ;AAC1B,YAAY,IAAI,EAAE,CAAC;AACnB,oBAAoB,OAAO,EAAE,CAAC,YAAY,CAAC;AAC3C,oBAAoB,SAAS,EAAE,CAAC,+BAA+B,CAAC;AAChE,iBAAiB;AACjB,SAAS,CAAC,EAAE,CAAC;;ACfb;AACA;AACA;;;;"}
|
package/mock/index.d.ts
CHANGED
|
@@ -1,17 +1,20 @@
|
|
|
1
1
|
import { AXPDataSeeder, AXPEntityStorageService, AXPEntityDefinitionRegistryService, AXPEntityStorageWithMiddlewareService } from '@acorex/platform/layout/entity';
|
|
2
2
|
import * as i0 from '@angular/core';
|
|
3
3
|
import { Injector } from '@angular/core';
|
|
4
|
-
import { AXPLockService, AXPLockRequest, AXPLockInfo, AXPUnLockRequest, AXPLockGetInfoRequest, AXPFileStorageService, AXPFileStorageCreateRequest, AXPFileStorageInfo, AXPFileStorageUpdateRequest, AXPFileStorageFindRequest
|
|
4
|
+
import { AXPLockService, AXPLockRequest, AXPLockInfo, AXPUnLockRequest, AXPLockGetInfoRequest, AXPFileStorageService, AXPFileStorageCreateRequest, AXPFileStorageInfo, AXPFileStorageUpdateRequest, AXPFileStorageFindRequest } from '@acorex/platform/common';
|
|
5
5
|
import { AXMCommonDashboardEntityModel } from '@acorex/modules/dashboard-management';
|
|
6
|
+
import { AXMMetaDataDefinitionCategoryServiceImpl, AXMMetaDataDefinitionService, AXMMetaDataDefinitionCategoryWithItemsEntityModel, AXMMetaDataDefinitionCategoryEntityModel } from '@acorex/modules/data-management';
|
|
6
7
|
import { AXPEntityEventDispatcherService, AXPQueryRequest, AXPPagedListResult, AXPAppStartUpService } from '@acorex/platform/core';
|
|
7
8
|
import * as dexie from 'dexie';
|
|
8
|
-
import dexie__default from 'dexie';
|
|
9
|
+
import dexie__default, { Table } from 'dexie';
|
|
9
10
|
import * as _acorex_platform_auth from '@acorex/platform/auth';
|
|
10
11
|
import { AXPSessionService, AXPAuthStrategy, AXPBaseCredentials, AXPSessionContext, AXPSignInResult } from '@acorex/platform/auth';
|
|
11
12
|
import { AXMAuthConfigs } from '@acorex/modules/auth';
|
|
12
13
|
import { Router } from '@angular/router';
|
|
13
14
|
import * as i1 from '@acorex/platform/runtime';
|
|
15
|
+
import { AXPReportCategory, AXPReportDefinition, AXPExecutionReportCommand, AXPLayoutExecutionContext, AXPExecutionReportCommandResult } from '@acorex/modules/report-management';
|
|
14
16
|
import { AXMTextTemplateManagementTemplateEntityModel } from '@acorex/modules/text-template-management';
|
|
17
|
+
import { AXPIdentifierRule, AXPClockProvider, AXPChecksumProvider, AXPPolicyProvider, AXPLookupProvider, AXPSequenceProvider, AXPIdentifierService, AXPIdentifierRequest, AXPIdentifierResult } from '@acorex/modules/identifier-management';
|
|
15
18
|
|
|
16
19
|
declare const APPLICATIONS: {
|
|
17
20
|
id: string;
|
|
@@ -225,6 +228,20 @@ declare class AXCDataManagementMockModule {
|
|
|
225
228
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCDataManagementMockModule>;
|
|
226
229
|
}
|
|
227
230
|
|
|
231
|
+
declare class AXCMetaDataDefinitionDataSeeder implements AXPDataSeeder {
|
|
232
|
+
private storageService;
|
|
233
|
+
seed(): Promise<void>;
|
|
234
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCMetaDataDefinitionDataSeeder, never>;
|
|
235
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXCMetaDataDefinitionDataSeeder>;
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
declare class AXCMetaDataDefinitionCategoryMockService extends AXMMetaDataDefinitionCategoryServiceImpl {
|
|
239
|
+
protected metaDataService: AXMMetaDataDefinitionService<any>;
|
|
240
|
+
getAllWithItems(): Promise<AXMMetaDataDefinitionCategoryWithItemsEntityModel<string>[]>;
|
|
241
|
+
private buildCategoryTree;
|
|
242
|
+
insertOne(request: Omit<AXMMetaDataDefinitionCategoryEntityModel<string>, 'id'>): Promise<string>;
|
|
243
|
+
}
|
|
244
|
+
|
|
228
245
|
declare class AXPDexieEntityStorageService extends dexie__default implements AXPEntityStorageService<string, any> {
|
|
229
246
|
protected sessionService: AXPSessionService;
|
|
230
247
|
protected entityRegistryService: AXPEntityDefinitionRegistryService;
|
|
@@ -386,10 +403,28 @@ declare class AXCTaskManagementMockModule {
|
|
|
386
403
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCTaskManagementMockModule>;
|
|
387
404
|
}
|
|
388
405
|
|
|
406
|
+
declare class AXMPartyManagementMockModule {
|
|
407
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXMPartyManagementMockModule, never>;
|
|
408
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXMPartyManagementMockModule, never, never, never>;
|
|
409
|
+
static ɵinj: i0.ɵɵInjectorDeclaration<AXMPartyManagementMockModule>;
|
|
410
|
+
}
|
|
411
|
+
|
|
412
|
+
declare class AXCContentManagementMockModule {
|
|
413
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCContentManagementMockModule, never>;
|
|
414
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCContentManagementMockModule, never, never, never>;
|
|
415
|
+
static ɵinj: i0.ɵɵInjectorDeclaration<AXCContentManagementMockModule>;
|
|
416
|
+
}
|
|
417
|
+
|
|
418
|
+
declare class AXCIdentifierManagementMockModule {
|
|
419
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXCIdentifierManagementMockModule, never>;
|
|
420
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCIdentifierManagementMockModule, never, never, never>;
|
|
421
|
+
static ɵinj: i0.ɵɵInjectorDeclaration<AXCIdentifierManagementMockModule>;
|
|
422
|
+
}
|
|
423
|
+
|
|
389
424
|
declare class AXCMockModule {
|
|
390
425
|
constructor(appInitService: AXPAppStartUpService, injector: Injector);
|
|
391
426
|
static ɵfac: i0.ɵɵFactoryDeclaration<AXCMockModule, never>;
|
|
392
|
-
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof _acorex_platform_auth.AXPAuthModule, typeof AXCCommonMockModule, typeof AXCFormTemplateManagementMockModule, typeof AXCFOrganizationManagementMockModule, typeof AXCReportManagementMockModule, typeof AXCContactManagementMockModule, typeof AXCLocationManagementMockModule, typeof AXCLocaleManagementMockModule, typeof AXCDashboardManagementMockModule, typeof AXCConversationMockModule, typeof AXCAuthMockModule, typeof AXCPlatformManagementMockModule, typeof AXCTextTemplateManagementMockModule, typeof AXCSecurityManagementMockModule, typeof AXCSchedulerJobManagementMockModule, typeof AXCApplicationManagementMockModule, typeof AXCTrainingManagementMockModule, typeof AXCProjectManagementMockModule, typeof AXCDocumentManagementMockModule, typeof AXCIssueManagementMockModule, typeof AXCLogManagementMockModule, typeof AXMCalendarManagementMockModule, typeof AXCDataManagementMockModule, typeof AXCWorkflowManagementMockModule, typeof AXCNotificationManagementMockModule, typeof AXCTaskManagementMockModule], never>;
|
|
427
|
+
static ɵmod: i0.ɵɵNgModuleDeclaration<AXCMockModule, never, [typeof _acorex_platform_auth.AXPAuthModule, typeof AXCCommonMockModule, typeof AXCFormTemplateManagementMockModule, typeof AXCFOrganizationManagementMockModule, typeof AXCReportManagementMockModule, typeof AXCContactManagementMockModule, typeof AXCLocationManagementMockModule, typeof AXCLocaleManagementMockModule, typeof AXCDashboardManagementMockModule, typeof AXCConversationMockModule, typeof AXCAuthMockModule, typeof AXCPlatformManagementMockModule, typeof AXCTextTemplateManagementMockModule, typeof AXCSecurityManagementMockModule, typeof AXCSchedulerJobManagementMockModule, typeof AXCApplicationManagementMockModule, typeof AXCTrainingManagementMockModule, typeof AXCProjectManagementMockModule, typeof AXCDocumentManagementMockModule, typeof AXCIssueManagementMockModule, typeof AXCLogManagementMockModule, typeof AXMCalendarManagementMockModule, typeof AXCDataManagementMockModule, typeof AXCWorkflowManagementMockModule, typeof AXCNotificationManagementMockModule, typeof AXCTaskManagementMockModule, typeof AXMPartyManagementMockModule, typeof AXCContentManagementMockModule, typeof AXCIdentifierManagementMockModule], never>;
|
|
393
428
|
static ɵinj: i0.ɵɵInjectorDeclaration<AXCMockModule>;
|
|
394
429
|
}
|
|
395
430
|
|
|
@@ -414,15 +449,9 @@ declare class MOCKStrategy extends AXPAuthStrategy {
|
|
|
414
449
|
static ɵprov: i0.ɵɵInjectableDeclaration<MOCKStrategy>;
|
|
415
450
|
}
|
|
416
451
|
|
|
417
|
-
declare class AXCAppTermDataSeeder implements AXPDataSeeder {
|
|
418
|
-
private storageService;
|
|
419
|
-
seed(): Promise<void>;
|
|
420
|
-
static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppTermDataSeeder, never>;
|
|
421
|
-
static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppTermDataSeeder>;
|
|
422
|
-
}
|
|
423
|
-
|
|
424
452
|
declare class AXCAppVersionDataSeeder implements AXPDataSeeder {
|
|
425
453
|
private storageService;
|
|
454
|
+
private appVersionService;
|
|
426
455
|
seed(): Promise<void>;
|
|
427
456
|
static ɵfac: i0.ɵɵFactoryDeclaration<AXCAppVersionDataSeeder, never>;
|
|
428
457
|
static ɵprov: i0.ɵɵInjectableDeclaration<AXCAppVersionDataSeeder>;
|
|
@@ -443,13 +472,6 @@ declare const GLOBAL_VARIABLES: {
|
|
|
443
472
|
value: string;
|
|
444
473
|
}[];
|
|
445
474
|
|
|
446
|
-
declare class AXCMetaDataDefinitionDataSeeder implements AXPDataSeeder {
|
|
447
|
-
private storageService;
|
|
448
|
-
seed(): Promise<void>;
|
|
449
|
-
static ɵfac: i0.ɵɵFactoryDeclaration<AXCMetaDataDefinitionDataSeeder, never>;
|
|
450
|
-
static ɵprov: i0.ɵɵInjectableDeclaration<AXCMetaDataDefinitionDataSeeder>;
|
|
451
|
-
}
|
|
452
|
-
|
|
453
475
|
declare const REPORT_CATEGORIES: AXPReportCategory[];
|
|
454
476
|
declare const REPORT_DEFINITIONS: AXPReportDefinition[];
|
|
455
477
|
declare const CATEGORY_REPORT_MAPPING: Map<string, AXPReportDefinition[]>;
|
|
@@ -466,6 +488,7 @@ declare class AXMReportExecuteCommand implements AXPExecutionReportCommand {
|
|
|
466
488
|
private readonly reportDataCache;
|
|
467
489
|
private readonly CACHE_TTL_MS;
|
|
468
490
|
private readonly DEFAULT_TOTAL_ITEMS;
|
|
491
|
+
private readonly reportDefinitionService;
|
|
469
492
|
constructor();
|
|
470
493
|
execute(context: AXPLayoutExecutionContext): Promise<AXPExecutionReportCommandResult>;
|
|
471
494
|
private generateLayoutData;
|
|
@@ -693,5 +716,80 @@ declare function createDexieWithCustomMiddleware(customMiddlewares?: {
|
|
|
693
716
|
};
|
|
694
717
|
}): AXPDexieWithMiddlewareService;
|
|
695
718
|
|
|
696
|
-
|
|
697
|
-
|
|
719
|
+
interface AXPRuleRow extends AXPIdentifierRule {
|
|
720
|
+
}
|
|
721
|
+
interface AXPSeqRow {
|
|
722
|
+
id: string;
|
|
723
|
+
ruleId: string;
|
|
724
|
+
scopeHash: string;
|
|
725
|
+
currentValue: number;
|
|
726
|
+
hi?: number;
|
|
727
|
+
next?: number;
|
|
728
|
+
lastResetKey?: string;
|
|
729
|
+
}
|
|
730
|
+
interface AXPLogRow {
|
|
731
|
+
id: string;
|
|
732
|
+
entity: string;
|
|
733
|
+
tenantId?: string;
|
|
734
|
+
code: string;
|
|
735
|
+
createdAt: string;
|
|
736
|
+
}
|
|
737
|
+
declare class AXPIdentifierDB extends dexie__default {
|
|
738
|
+
rules: Table<AXPRuleRow, string>;
|
|
739
|
+
sequences: Table<AXPSeqRow, string>;
|
|
740
|
+
logs: Table<AXPLogRow, string>;
|
|
741
|
+
constructor();
|
|
742
|
+
}
|
|
743
|
+
declare class AXPMockClockProvider implements AXPClockProvider {
|
|
744
|
+
now(): Date;
|
|
745
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockClockProvider, never>;
|
|
746
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockClockProvider>;
|
|
747
|
+
}
|
|
748
|
+
declare class AXPMockChecksumProvider implements AXPChecksumProvider {
|
|
749
|
+
compute(algo: 'luhn' | 'mod11', input: string): string;
|
|
750
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockChecksumProvider, never>;
|
|
751
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockChecksumProvider>;
|
|
752
|
+
}
|
|
753
|
+
declare class AXPMockPolicyProvider implements AXPPolicyProvider {
|
|
754
|
+
isAllowed(): boolean;
|
|
755
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockPolicyProvider, never>;
|
|
756
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockPolicyProvider>;
|
|
757
|
+
}
|
|
758
|
+
declare class AXPMockLookupProvider implements AXPLookupProvider {
|
|
759
|
+
private readonly map;
|
|
760
|
+
get(key: string): Promise<string | undefined>;
|
|
761
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockLookupProvider, never>;
|
|
762
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockLookupProvider>;
|
|
763
|
+
}
|
|
764
|
+
declare class AXPMockSequenceProvider implements AXPSequenceProvider {
|
|
765
|
+
private readonly db;
|
|
766
|
+
next(scopeHash: string, options?: {
|
|
767
|
+
pad?: number;
|
|
768
|
+
consume?: boolean;
|
|
769
|
+
}): Promise<number>;
|
|
770
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockSequenceProvider, never>;
|
|
771
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockSequenceProvider>;
|
|
772
|
+
}
|
|
773
|
+
|
|
774
|
+
declare class AXPMockIdentifierService extends AXPIdentifierService {
|
|
775
|
+
private readonly engine;
|
|
776
|
+
private readonly rulesFromProviders;
|
|
777
|
+
private readonly seq;
|
|
778
|
+
private readonly checksum;
|
|
779
|
+
private readonly lookup;
|
|
780
|
+
private readonly policy;
|
|
781
|
+
private readonly clock;
|
|
782
|
+
private readonly rules;
|
|
783
|
+
generate(req: AXPIdentifierRequest): Promise<AXPIdentifierResult>;
|
|
784
|
+
peek(req: AXPIdentifierRequest): Promise<AXPIdentifierResult>;
|
|
785
|
+
validate(_code: string, _entity: string, _tenantId?: string): Promise<boolean>;
|
|
786
|
+
private pickRule;
|
|
787
|
+
private createContext;
|
|
788
|
+
private createScopeHash;
|
|
789
|
+
private evaluateInternal;
|
|
790
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AXPMockIdentifierService, never>;
|
|
791
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AXPMockIdentifierService>;
|
|
792
|
+
}
|
|
793
|
+
|
|
794
|
+
export { APPLICATIONS, APPLICATIONS_MODULES, AXCAppVersionDataSeeder, AXCApplicationManagementMockModule, AXCApplicationTemplateDataSeeder, AXCAuthMockModule, AXCCommonMockModule, AXCContactManagementMockModule, AXCConversationMockModule, AXCDashboardManagementMockModule, AXCDataManagementMockModule, AXCDocumentManagementMockModule, AXCFOrganizationManagementMockModule, AXCFileStorageService, AXCFormTemplateManagementMockModule, AXCGlobalVariablesDataSeeder, AXCIdentifierManagementMockModule, AXCIssueManagementMockModule, AXCLocaleManagementMockModule, AXCLocationManagementMockModule, AXCLockService, AXCLogManagementMockModule, AXCMetaDataDefinitionCategoryMockService, AXCMetaDataDefinitionDataSeeder, AXCMockModule, AXCNotificationManagementMockModule, AXCPlatformManagementMockModule, AXCProjectManagementMockModule, AXCReportManagementMockModule, AXCSchedulerJobDataSeeder, AXCSchedulerJobManagementMockModule, AXCSecurityManagementMockModule, AXCTaskManagementMockModule, AXCTextTemplateCategoryDataSeeder, AXCTextTemplateDataSeeder, AXCTextTemplateManagementMockModule, AXCTrainingManagementMockModule, AXMAiResponderService, AXMReportExecuteCommand, AXPDashboardDataSeeder, AXPDexieEntityStorageService, AXPDexieWithMiddlewareService, AXPIdentifierDB, AXPMessageDataSeeder, AXPMockChecksumProvider, AXPMockClockProvider, AXPMockIdentifierService, AXPMockLookupProvider, AXPMockPolicyProvider, AXPMockSequenceProvider, AXPReportManagementDataSeeder, AXPRoomDataSeeder, AXPSecurityManagementRoleDataSeeder, AXPSecurityManagementUserDataSeeder, AXPSimplifiedDexieStorageService, CATEGORY_REPORT_MAPPING, DASHBOARDS, EDITIONS, ENTITIES, FEATURES, GLOBAL_VARIABLES, MOCKGoogleStrategy, MOCKStrategy, MODULES, PERMISSIONS, PROPERTIES, REPORT_CATEGORIES, REPORT_DEFINITIONS, TASKS, TASK_STATUSES, TASK_TEMPLATES, TASK_TYPES, TEXT_TEMPLATES, TEXT_TEMPLATE_CATEGORY, createDexieWithCustomMiddleware, createDexieWithStandardMiddleware, generateRandomDashboard };
|
|
795
|
+
export type { AXPLogRow, AXPRuleRow, AXPSeqRow, MockUserPassCredentials, Task, TaskStatus, TaskTemplate, TaskType };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@acorex/connectivity",
|
|
3
|
-
"version": "20.2.0
|
|
3
|
+
"version": "20.2.0",
|
|
4
4
|
"peerDependencies": {
|
|
5
5
|
"@angular/common": "^19.0.0",
|
|
6
6
|
"@angular/core": "^19.0.0"
|
|
@@ -16,6 +16,10 @@
|
|
|
16
16
|
"types": "./index.d.ts",
|
|
17
17
|
"default": "./fesm2022/acorex-connectivity.mjs"
|
|
18
18
|
},
|
|
19
|
+
"./api": {
|
|
20
|
+
"types": "./api/index.d.ts",
|
|
21
|
+
"default": "./fesm2022/acorex-connectivity-api.mjs"
|
|
22
|
+
},
|
|
19
23
|
"./mock": {
|
|
20
24
|
"types": "./mock/index.d.ts",
|
|
21
25
|
"default": "./fesm2022/acorex-connectivity-mock.mjs"
|
|
@@ -23,10 +27,6 @@
|
|
|
23
27
|
"./utils": {
|
|
24
28
|
"types": "./utils/index.d.ts",
|
|
25
29
|
"default": "./fesm2022/acorex-connectivity-utils.mjs"
|
|
26
|
-
},
|
|
27
|
-
"./api": {
|
|
28
|
-
"types": "./api/index.d.ts",
|
|
29
|
-
"default": "./fesm2022/acorex-connectivity-api.mjs"
|
|
30
30
|
}
|
|
31
31
|
},
|
|
32
32
|
"dependencies": {
|