@blazedpath/commons 0.0.5 → 0.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -30,76 +30,76 @@ describe('Permission Service', () => {
30
30
  expect('adminAccounts,adminMenu,adminView,adminActions,roleEdit,userAccounts,userMenu,userView,userActions,roleView,guestAccounts,guestMenu,guestView,guestActions').toStrictEqual(permissions)
31
31
  })
32
32
  test('authorized by Guest', () => {
33
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account', '*', ['Guest']))
34
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/21', '*', ['Guest']))
35
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/22', '*', ['Guest']))
33
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/account', '*', ['Guest']))
34
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/21', '*', ['Guest']))
35
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/22', '*', ['Guest']))
36
36
 
37
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/guest', '', ['Guest']))
38
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/user', '', ['Guest']))
39
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/admin', '', ['Guest']))
37
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/guest', '', ['Guest']))
38
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/menu-security/user', '', ['Guest']))
39
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/menu-security/admin', '', ['Guest']))
40
40
  })
41
41
  test('authorized by User', () => {
42
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account', '*', ['User']))
43
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/21', '*', ['User']))
44
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/22', '*', ['User']))
42
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account', '*', ['User']))
43
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/21', '*', ['User']))
44
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/22', '*', ['User']))
45
45
 
46
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/guest', '', ['User']))
47
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/user', '', ['User']))
48
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/admin', '', ['User']))
46
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/guest', '', ['User']))
47
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/user', '', ['User']))
48
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/menu-security/admin', '', ['User']))
49
49
  })
50
50
  test('authorized by Admin', () => {
51
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account', '*', ['Admin']))
52
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/21', '*', ['Admin']))
53
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/22', '*', ['Admin']))
51
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account', '*', ['Admin']))
52
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/21', '*', ['Admin']))
53
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/22', '*', ['Admin']))
54
54
 
55
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/guest', '', ['Admin']))
56
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/user', '', ['Admin']))
57
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/menu-security/admin', '', ['Admin']))
55
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/guest', '', ['Admin']))
56
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/user', '', ['Admin']))
57
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/menu-security/admin', '', ['Admin']))
58
58
  })
59
59
  test('authorized by Guest and User', () => {
60
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account', '*', ['Guest', 'User']))
61
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/21', '*', ['Guest', 'User']))
62
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/22', '*', ['Guest', 'User']))
60
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account', '*', ['Guest', 'User']))
61
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/21', '*', ['Guest', 'User']))
62
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/22', '*', ['Guest', 'User']))
63
63
  })
64
64
  test('authorized by User and Admin', () => {
65
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account', '*', ['User', 'Admin']))
66
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/21', '*', ['User', 'Admin']))
67
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/account/22', '*', ['User', 'Admin']))
65
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account', '*', ['User', 'Admin']))
66
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/21', '*', ['User', 'Admin']))
67
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/account/22', '*', ['User', 'Admin']))
68
68
  })
69
69
  test('Role access to Guest', () => {
70
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', '', ['Guest']))
71
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'View', ['Guest']))
72
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Add', ['Guest']))
73
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Edit', ['Guest']))
74
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Remove', ['Guest']))
75
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles', 'GET', ['Guest']))
76
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles/merged', 'POST', ['Guest']))
77
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'GET', ['Guest']))
78
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'DELETE', ['Guest']))
79
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'PATCH', ['Guest']))
70
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', '', ['Guest']))
71
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'View', ['Guest']))
72
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Add', ['Guest']))
73
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Edit', ['Guest']))
74
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Remove', ['Guest']))
75
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles', 'GET', ['Guest']))
76
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles/merged', 'POST', ['Guest']))
77
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'GET', ['Guest']))
78
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'DELETE', ['Guest']))
79
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'PATCH', ['Guest']))
80
80
  })
81
81
  test('Role access to User', () => {
82
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', '', ['User']))
83
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'View', ['User']))
84
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Add', ['User']))
85
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Edit', ['User']))
86
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Remove', ['User']))
87
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles', 'GET', ['User']))
88
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles/merged', 'POST', ['User']))
89
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'GET', ['User']))
90
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'DELETE', ['User']))
91
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'PATCH', ['User']))
82
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', '', ['User']))
83
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', 'View', ['User']))
84
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Add', ['User']))
85
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Edit', ['User']))
86
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Remove', ['User']))
87
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles', 'GET', ['User']))
88
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles/merged', 'POST', ['User']))
89
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'GET', ['User']))
90
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'DELETE', ['User']))
91
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'PATCH', ['User']))
92
92
  })
93
93
  test('Role access to Admin', () => {
94
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', '', ['Admin']))
95
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'View', ['Admin']))
96
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Add', ['Admin']))
97
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Edit', ['Admin']))
98
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/roles', 'Remove', ['Admin']))
99
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles', 'GET', ['Admin']))
100
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/roles/merged', 'POST', ['Admin']))
101
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'GET', ['Admin']))
102
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'DELETE', ['Admin']))
103
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/service/role/1', 'PATCH', ['Admin']))
94
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', '', ['Admin']))
95
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', 'View', ['Admin']))
96
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Add', ['Admin']))
97
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Edit', ['Admin']))
98
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/roles', 'Remove', ['Admin']))
99
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles', 'GET', ['Admin']))
100
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/roles/merged', 'POST', ['Admin']))
101
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'GET', ['Admin']))
102
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'DELETE', ['Admin']))
103
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/service/role/1', 'PATCH', ['Admin']))
104
104
  })
105
105
  })
@@ -0,0 +1,42 @@
1
+ /* eslint-disable no-undef */
2
+ const { h3lp } = require('h3lp')
3
+ const Yaml = require('js-yaml')
4
+ const path = require('path')
5
+ const AuthorizationService = require('../authorizationService')
6
+ const _ = require('underscore')
7
+ const logger = require('pino')()
8
+
9
+ let authorizationService = null
10
+ let config = null
11
+
12
+ describe('Permission Service', () => {
13
+ beforeAll(async () => {
14
+ authorizationService = new AuthorizationService(_,logger)
15
+ const content = await h3lp.fs.read(path.join(__dirname, '/AuthorizationKpn.yaml'))
16
+ const list = await Yaml.loadAll(content)
17
+ config = authorizationService.importSecurityConfig(list[0])
18
+ })
19
+
20
+ test('Permissions by Configuration.Admin', () => {
21
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-credit/undefined', null, ['Configuration.Admin'], ['agent']))
22
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-credit/', null, ['Configuration.Admin'], ['agent']))
23
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-debit/undefined', null, ['Configuration.Admin'], ['agent']))
24
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-debit/', null, ['Configuration.Admin'], ['agent']))
25
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-credit/undefined', null, ['Configuration.Admin'], ['agent']))
26
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-credit/', null, ['Configuration.Admin'], ['agent']))
27
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-debit/undefined', null, ['Configuration.Admin'], ['agent']))
28
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-debit/', null, ['Configuration.Admin'], ['agent']))
29
+ })
30
+
31
+ test('Permissions by Collections.Admin, Collections.Finance, Configuration.Admin', () => {
32
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-credit/undefined', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
33
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-credit/', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
34
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-debit/undefined', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
35
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-manual-debit/', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
36
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-credit/undefined', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
37
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-credit/', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
38
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-debit/undefined', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
39
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/ep-out-manual-debit/', null, ['Collections.Admin','Collections.Finance','Configuration.Admin'], ['agent']))
40
+ })
41
+
42
+ })
@@ -17,10 +17,10 @@ describe('Permission Service', () => {
17
17
  })
18
18
 
19
19
  test('Paths with query parameters', () => {
20
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/ext-common-business/businessDomains', 'GET', ['OMUserMenu']))
21
- expect(false).toStrictEqual(authorizationService.defaultAuthorized('/api/ext-common-business/businessDomains?offset=0&limit=1', 'GET', ['OMUserMenu']))
20
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/ext-common-business/businessDomains', 'GET', ['OMUserMenu']))
21
+ expect(false).toStrictEqual(authorizationService.checkAuthorize('/api/ext-common-business/businessDomains?offset=0&limit=1', 'GET', ['OMUserMenu']))
22
22
 
23
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/ext-common-business/businessDomains', 'delete', ['OMUserMenu']))
24
- expect(true).toStrictEqual(authorizationService.defaultAuthorized('/api/ext-common-business/businessDomains?offset=0&limit=1', 'DELETE', ['OMUserMenu']))
23
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/ext-common-business/businessDomains', 'delete', ['OMUserMenu']))
24
+ expect(true).toStrictEqual(authorizationService.checkAuthorize('/api/ext-common-business/businessDomains?offset=0&limit=1', 'DELETE', ['OMUserMenu']))
25
25
  })
26
26
  })
@@ -168,22 +168,22 @@ module.exports = class AuthorizationService {
168
168
  return this.config.permissions.filter(p => p.visible || p.visible === null || p.visible === undefined ).map(p => p.name).sort()
169
169
  }
170
170
 
171
- authorized (path, action, roles) {
171
+ authorized (path, action, roles, domains) {
172
172
  if (this.config.defaultUserRole)
173
173
  roles.push(this.config.defaultUserRole);
174
174
  if (path.startsWith('/api')) {
175
- return this._checkApi(path, action, roles)
175
+ return this._checkApi(path, action, roles, domains)
176
176
  } else {
177
177
  if (!action || action.trim() === '') {
178
- return this._checkPath(path, roles)
178
+ return this._checkPath(path, roles, domains)
179
179
  } else {
180
- return this._checkWidget(path, action, roles)
180
+ return this._checkWidget(path, action, roles, domains)
181
181
  }
182
182
  }
183
183
  }
184
184
 
185
- defaultAuthorized (path, action, roles) {
186
- const result = this.authorized(path, action, roles)
185
+ checkAuthorize (path, action, roles, domains) {
186
+ const result = this.authorized(path, action, roles, domains)
187
187
  if (result === null || result === undefined) {
188
188
  return true
189
189
  }
@@ -217,16 +217,17 @@ module.exports = class AuthorizationService {
217
217
  continue
218
218
  }
219
219
  for (const rule of permission.rules) {
220
+ const domain = permission.domain || 'default'
220
221
  if (rule.path.startsWith('/api')) {
221
- const exists = role.rules.backend.find(p => p.path === rule.path && p.actions === rule.actions && p.enable === rule.enable)
222
+ const exists = role.rules.backend.find(p => p.path === rule.path && p.actions === rule.actions && p.enable === rule.enable && p.domain === domain)
222
223
  if (!exists) {
223
- rule.domain = permission.domain || 'default'
224
+ rule.domain = domain
224
225
  role.rules.backend.push(rule)
225
226
  }
226
227
  } else {
227
- const exists = role.rules.frontend.find(p => p.path === rule.path && p.actions === rule.actions && p.enable === rule.enable)
228
+ const exists = role.rules.frontend.find(p => p.path === rule.path && p.actions === rule.actions && p.enable === rule.enable && p.domain === domain)
228
229
  if (!exists) {
229
- rule.domain = permission.domain || 'default'
230
+ rule.domain = domain
230
231
  role.rules.frontend.push(rule)
231
232
  }
232
233
  }
@@ -285,7 +286,7 @@ module.exports = class AuthorizationService {
285
286
  _solveMergeRule (rules, rule) {
286
287
  let _rules = JSON.parse(JSON.stringify(rules))
287
288
  const previousRules = _rules.filter(p => p.path === rule.path)
288
- if (!previousRules.length === 0) {
289
+ if (previousRules.length == 0) {
289
290
  _rules.push(rule)
290
291
  } else {
291
292
  if (previousRules.some(p => p.actions.includes('*') && p.enable)) {
@@ -430,10 +431,10 @@ module.exports = class AuthorizationService {
430
431
  .filter((route) => route)
431
432
  }
432
433
 
433
- _checkApi (path, action, roles) {
434
+ _checkApi (path, action, roles, domains) {
434
435
  const cleanedPath = this._cleanPath(path)
435
436
  const _action = action.toUpperCase()
436
- const securityRules = this._getBackendSecurityRules(roles, _action)
437
+ const securityRules = this._getBackendSecurityRules(roles, _action, domains)
437
438
  const matchedRoutes = this._findMatchedRoutes(cleanedPath, securityRules)
438
439
  const list = this.utils
439
440
  .chain(matchedRoutes)
@@ -451,8 +452,8 @@ module.exports = class AuthorizationService {
451
452
  return null
452
453
  }
453
454
 
454
- _checkPath (path, roles) {
455
- const securityRules = this.getFrontendSecurityRules(roles)
455
+ _checkPath (path, roles, domains) {
456
+ const securityRules = this.getFrontendSecurityRules(roles, domains)
456
457
  const list = this.utils
457
458
  .chain(this._findMatchedRoutes(path, securityRules))
458
459
  .value()
@@ -467,9 +468,9 @@ module.exports = class AuthorizationService {
467
468
  return null
468
469
  }
469
470
 
470
- _checkWidget (path, securityOption, roles) {
471
+ _checkWidget (path, securityOption, roles, domains) {
471
472
  const _securityOption = securityOption.toUpperCase()
472
- const securityRules = this.getFrontendSecurityRules(roles)
473
+ const securityRules = this.getFrontendSecurityRules(roles, domains)
473
474
  const rules = this.utils
474
475
  .chain(this._findMatchedRoutes(path, securityRules))
475
476
  .filter(({ path }) => path.includes(this.WIDGET_SEPARATOR))
@@ -0,0 +1,258 @@
1
+ [
2
+ {
3
+ "path": "/bkr/**|CC_BKRSENDMESSAGE",
4
+ "enable": true
5
+ },
6
+ {
7
+ "path": "/bkr/**|BC_BKRSENDMESSAGE",
8
+ "enable": true
9
+ },
10
+ {
11
+ "path": "/debtors/**|CC_SETTLEMENTDISCOUNTCARD",
12
+ "enable": true
13
+ },
14
+ {
15
+ "path": "/dunning/**|CC_DUNNINGSUSPENDACCOUNT",
16
+ "enable": true
17
+ },
18
+ {
19
+ "path": "/dunning/**|CC_DUNNINGUPDATEPERCENTAGE",
20
+ "enable": true
21
+ },
22
+ {
23
+ "path": "/dunning/**|CC_DUNNINGRESETAGING",
24
+ "enable": true
25
+ },
26
+ {
27
+ "path": "/dunning/**|CC_DUNNINGTERMINATIONOFSERVICES",
28
+ "enable": true
29
+ },
30
+ {
31
+ "path": "/dunning/**|CC_DUNNINGCHANGEPAYMENTRESPONSIBLE",
32
+ "enable": true
33
+ },
34
+ {
35
+ "path": "/dunning/**|CC_DUNNINGCAPTURECHARGEDISPUTE",
36
+ "enable": true
37
+ },
38
+ {
39
+ "path": "/dunning/**|CC_DUNNINGREVERSEWRITEOFF",
40
+ "enable": true
41
+ },
42
+ {
43
+ "path": "/dunning/**|CC_DUNNINGCHANGEPLACEMENTSTATUS",
44
+ "enable": true
45
+ },
46
+ {
47
+ "path": "/dunning/**|CC_DUNNINGASSIGNMENTPLACEMENT",
48
+ "enable": true
49
+ },
50
+ {
51
+ "path": "/debtors/**|BC_SETTLEMENTDISCOUNTCARD",
52
+ "enable": true
53
+ },
54
+ {
55
+ "path": "/dunning/**|BC_DUNNINGSUSPENDACCOUNT",
56
+ "enable": true
57
+ },
58
+ {
59
+ "path": "/dunning/**|BC_DUNNINGUPDATEPERCENTAGE",
60
+ "enable": true
61
+ },
62
+ {
63
+ "path": "/dunning/**|BC_DUNNINGRESETAGING",
64
+ "enable": true
65
+ },
66
+ {
67
+ "path": "/dunning/**|BC_DUNNINGTERMINATIONOFSERVICES",
68
+ "enable": true
69
+ },
70
+ {
71
+ "path": "/dunning/**|BC_DUNNINGCHANGEPAYMENTRESPONSIBLE",
72
+ "enable": true
73
+ },
74
+ {
75
+ "path": "/dunning/**|BC_DUNNINGCAPTURECHARGEDISPUTE",
76
+ "enable": true
77
+ },
78
+ {
79
+ "path": "/dunning/**|BC_DUNNINGREVERSEWRITEOFF",
80
+ "enable": true
81
+ },
82
+ {
83
+ "path": "/dunning/**|BC_DUNNINGCHANGEPLACEMENTSTATUS",
84
+ "enable": true
85
+ },
86
+ {
87
+ "path": "/dunning/**|BC_DUNNINGASSIGNMENTPLACEMENT",
88
+ "enable": true
89
+ },
90
+ {
91
+ "path": "/debtors/**|FILTERS_ALPHABETICORDERLIST",
92
+ "enable": false
93
+ },
94
+ {
95
+ "path": "/debtors/**|CC_DEPOSITACCOUNTCARD",
96
+ "enable": false
97
+ },
98
+ {
99
+ "path": "/debtors/**|CC_CREDITDISPUTECARD",
100
+ "enable": false
101
+ },
102
+ {
103
+ "path": "/dunning/**|CC_DUNNINGRESENDINVOICE",
104
+ "enable": false
105
+ },
106
+ {
107
+ "path": "/dunning/**|CC_DUNNINGSENDREMINDER",
108
+ "enable": false
109
+ },
110
+ {
111
+ "path": "/dunning/**|CC_DUNNINGCHANGEFPAYMENTRESPONSIBLE",
112
+ "enable": false
113
+ },
114
+ {
115
+ "path": "/dunning/**|CC_DUNNINGSECURITYDEPOSIT",
116
+ "enable": false
117
+ },
118
+ {
119
+ "path": "/dunning/**|CC_DUNNINGCHANGEPAYMENTMETHOD",
120
+ "enable": false
121
+ },
122
+ {
123
+ "path": "/dunning/**|CC_DUNNINGCAPTURECREDITDISPUTE",
124
+ "enable": false
125
+ },
126
+ {
127
+ "path": "/dunning/**|CC_DUNNINGRESENDPAYMENTEMAIL",
128
+ "enable": false
129
+ },
130
+ {
131
+ "path": "/ledger/accounts/**|CC_BILLINGACOUNTSTATEMANTDOWNLOAD",
132
+ "enable": false
133
+ },
134
+ {
135
+ "path": "/ledger/accounts/**|CC_BILLINGACOUNTSTATEMANTRESEND",
136
+ "enable": false
137
+ },
138
+ {
139
+ "path": "/dunning/**|CC_DUNNINGDISABLED",
140
+ "enable": false
141
+ },
142
+ {
143
+ "path": "/debtors/**|BC_DEPOSITACCOUNTCARD",
144
+ "enable": false
145
+ },
146
+ {
147
+ "path": "/debtors/**|BC_CREDITDISPUTECARD",
148
+ "enable": false
149
+ },
150
+ {
151
+ "path": "/dunning/**|BC_DUNNINGRESENDINVOICE",
152
+ "enable": false
153
+ },
154
+ {
155
+ "path": "/dunning/**|BC_DUNNINGSENDREMINDER",
156
+ "enable": false
157
+ },
158
+ {
159
+ "path": "/dunning/**|BC_DUNNINGCHANGEFPAYMENTRESPONSIBLE",
160
+ "enable": false
161
+ },
162
+ {
163
+ "path": "/dunning/**|BC_DUNNINGSECURITYDEPOSIT",
164
+ "enable": false
165
+ },
166
+ {
167
+ "path": "/dunning/**|BC_DUNNINGCHANGEPAYMENTMETHOD",
168
+ "enable": false
169
+ },
170
+ {
171
+ "path": "/dunning/**|BC_DUNNINGCAPTURECREDITDISPUTE",
172
+ "enable": false
173
+ },
174
+ {
175
+ "path": "/dunning/**|BC_DUNNINGRESENDPAYMENTEMAIL",
176
+ "enable": false
177
+ },
178
+ {
179
+ "path": "/ledger/accounts/**|BC_BILLINGACOUNTSTATEMANTDOWNLOAD",
180
+ "enable": false
181
+ },
182
+ {
183
+ "path": "/ledger/accounts/**|BC_BILLINGACOUNTSTATEMANTRESEND",
184
+ "enable": false
185
+ },
186
+ {
187
+ "path": "consumer-debtor",
188
+ "enable": true
189
+ },
190
+ {
191
+ "path": "/debtors",
192
+ "enable": true
193
+ },
194
+ {
195
+ "path": "/debtor/**",
196
+ "enable": true
197
+ },
198
+ {
199
+ "path": "organization-debtor",
200
+ "enable": true
201
+ },
202
+ {
203
+ "path": "/taskManagement/**",
204
+ "enable": true
205
+ },
206
+ {
207
+ "path": "/taskManagement",
208
+ "enable": true
209
+ },
210
+ {
211
+ "path": "/payment-responsibles",
212
+ "enable": true
213
+ },
214
+ {
215
+ "path": "/ep-manual-credit/**",
216
+ "enable": true
217
+ },
218
+ {
219
+ "path": "/ep-out-manual-credit/**",
220
+ "enable": true
221
+ },
222
+ {
223
+ "path": "/ep-manua-historicall-credit/**",
224
+ "enable": true
225
+ },
226
+ {
227
+ "path": "/ep-manual-debit/**",
228
+ "enable": true
229
+ },
230
+ {
231
+ "path": "/ep-out-manual-debit/**",
232
+ "enable": true
233
+ },
234
+ {
235
+ "path": "/ep-manua-historicall-debit/**",
236
+ "enable": true
237
+ },
238
+ {
239
+ "path": "/collection-home",
240
+ "enable": true
241
+ },
242
+ {
243
+ "path": "/ep-out-manual-credit",
244
+ "enable": false
245
+ },
246
+ {
247
+ "path": "/ep-manua-historicall-credit",
248
+ "enable": false
249
+ },
250
+ {
251
+ "path": "/ep-out-manual-debit",
252
+ "enable": false
253
+ },
254
+ {
255
+ "path": "/ep-manua-historicall-debit",
256
+ "enable": false
257
+ }
258
+ ]