@drax/identity-back 0.11.3 → 0.11.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -44,9 +44,12 @@ class UserApiKeyController extends AbstractFastifyController {
44
44
  }
45
45
  async create(request, reply) {
46
46
  try {
47
- request.rbac.assertPermission(UserApiKeyPermissions.Create);
47
+ request.rbac.assertOrPermissions([UserApiKeyPermissions.Create, UserApiKeyPermissions.CreateMy]);
48
48
  const payload = request.body;
49
- payload.user = request.rbac.authUser.id;
49
+ if (!request.rbac.hasPermission(UserApiKeyPermissions.Create) || !payload.user) {
50
+ payload.user = request.rbac.authUser.id;
51
+ }
52
+ payload.createdBy = request.rbac.authUser.id;
50
53
  const userApiKeyService = UserApiKeyServiceFactory();
51
54
  let userApiKey = await userApiKeyService.create(payload);
52
55
  return userApiKey;
@@ -5,6 +5,7 @@ type UserApiKey {
5
5
  ipv4: [String]
6
6
  ipv6: [String]
7
7
  user: User
8
+ createdBy: User
8
9
  createdAt: Date
9
10
  updatedAt: Date
10
11
  }
@@ -32,6 +32,11 @@ const UserApiKeySchema = new mongoose.Schema({
32
32
  required: false,
33
33
  index: false,
34
34
  }],
35
+ createdBy: {
36
+ type: mongoose.Schema.Types.ObjectId,
37
+ ref: 'User',
38
+ required: true,
39
+ },
35
40
  }, { timestamps: true });
36
41
  UserApiKeySchema.set('toJSON', { getters: true });
37
42
  UserApiKeySchema.plugin(uniqueValidator, { message: 'validation.unique' });
@@ -1,10 +1,11 @@
1
1
  var UserApiKeyPermissions;
2
2
  (function (UserApiKeyPermissions) {
3
3
  UserApiKeyPermissions["Create"] = "userApiKey:create";
4
+ UserApiKeyPermissions["CreateMy"] = "userApiKey:createMy";
4
5
  UserApiKeyPermissions["Update"] = "userApiKey:update";
5
6
  UserApiKeyPermissions["Delete"] = "userApiKey:delete";
6
7
  UserApiKeyPermissions["View"] = "userApiKey:view";
7
- UserApiKeyPermissions["ViewMy"] = "userApiKey:myView";
8
+ UserApiKeyPermissions["ViewMy"] = "userApiKey:viewMy";
8
9
  UserApiKeyPermissions["Manage"] = "userApiKey:manage";
9
10
  })(UserApiKeyPermissions || (UserApiKeyPermissions = {}));
10
11
  export default UserApiKeyPermissions;
@@ -8,7 +8,10 @@ class UserApiKeyMongoRepository {
8
8
  try {
9
9
  const userApiKey = new UserApiKeyModel(data);
10
10
  await userApiKey.save();
11
- await userApiKey.populate({ path: 'user', populate: { path: 'tenant role' } });
11
+ await userApiKey.populate([
12
+ { path: 'user', populate: { path: 'tenant role' } },
13
+ { path: 'createdBy', populate: { path: 'tenant role' } },
14
+ ]);
12
15
  return userApiKey;
13
16
  }
14
17
  catch (e) {
@@ -58,7 +61,7 @@ class UserApiKeyMongoRepository {
58
61
  }
59
62
  MongooseQueryFilter.applyFilters(query, filters);
60
63
  const sort = MongooseSort.applySort(orderBy, order);
61
- const options = { populate: ['user', 'user.tenant', 'user.role'], page, limit, sort };
64
+ const options = { populate: ['user', 'user.tenant', 'user.role', 'createdBy'], page, limit, sort };
62
65
  const userApiKeyPaginated = await UserApiKeyModel.paginate(query, options);
63
66
  return {
64
67
  page: page,
@@ -8,6 +8,7 @@ const tableFields = [
8
8
  { name: "user", type: "TEXT", unique: false, primary: false },
9
9
  { name: "ipv4", type: "TEXT", unique: false, primary: false },
10
10
  { name: "ipv6", type: "TEXT", unique: false, primary: false },
11
+ { name: "createdBy", type: "TEXT", unique: false, primary: false },
11
12
  { name: "createdAt", type: "TEXT", unique: false, primary: false }
12
13
  ];
13
14
  class UserApiKeySqliteRepository {
@@ -123,6 +124,7 @@ class UserApiKeySqliteRepository {
123
124
  userApiKey.ipv4 = userApiKey.ipv4 != "" ? userApiKey.ipv4.split(',') : [];
124
125
  userApiKey.ipv6 = userApiKey.ipv6 != "" ? userApiKey.ipv6.split(',') : [];
125
126
  userApiKey.user = await this.findUserById(userApiKey.user);
127
+ userApiKey.createdBy = await this.findUserById(userApiKey.createdBy);
126
128
  }
127
129
  return {
128
130
  page: page,
package/package.json CHANGED
@@ -3,7 +3,7 @@
3
3
  "publishConfig": {
4
4
  "access": "public"
5
5
  },
6
- "version": "0.11.3",
6
+ "version": "0.11.5",
7
7
  "description": "Identity module for user management, authentication and authorization.",
8
8
  "main": "dist/index.js",
9
9
  "types": "types/index.d.ts",
@@ -29,10 +29,10 @@
29
29
  "license": "ISC",
30
30
  "dependencies": {
31
31
  "@drax/common-back": "^0.11.3",
32
- "@drax/crud-back": "^0.11.3",
33
- "@drax/crud-share": "^0.11.3",
32
+ "@drax/crud-back": "^0.11.5",
33
+ "@drax/crud-share": "^0.11.5",
34
34
  "@drax/email-back": "^0.11.3",
35
- "@drax/identity-share": "^0.11.3",
35
+ "@drax/identity-share": "^0.11.5",
36
36
  "bcryptjs": "^2.4.3",
37
37
  "express-jwt": "^8.4.1",
38
38
  "graphql": "^16.8.2",
@@ -63,5 +63,5 @@
63
63
  "debug": "0"
64
64
  }
65
65
  },
66
- "gitHead": "54216d94d68dac488969f9c95d3c6be780935f9d"
66
+ "gitHead": "e67f10f0af29468c9d30f16135cfdbdff166d916"
67
67
  }
@@ -58,9 +58,14 @@ class UserApiKeyController extends AbstractFastifyController<IUserApiKey, IUserA
58
58
 
59
59
  async create(request, reply) {
60
60
  try {
61
- request.rbac.assertPermission(UserApiKeyPermissions.Create)
61
+ request.rbac.assertOrPermissions([UserApiKeyPermissions.Create, UserApiKeyPermissions.CreateMy])
62
62
  const payload = request.body
63
- payload.user = request.rbac.authUser.id
63
+
64
+ if(!request.rbac.hasPermission(UserApiKeyPermissions.Create) || !payload.user){
65
+ payload.user = request.rbac.authUser.id
66
+ }
67
+
68
+ payload.createdBy = request.rbac.authUser.id
64
69
 
65
70
  const userApiKeyService = UserApiKeyServiceFactory()
66
71
 
@@ -5,6 +5,7 @@ type UserApiKey {
5
5
  ipv4: [String]
6
6
  ipv6: [String]
7
7
  user: User
8
+ createdBy: User
8
9
  createdAt: Date
9
10
  updatedAt: Date
10
11
  }
@@ -35,6 +35,11 @@ const UserApiKeySchema = new mongoose.Schema<IUserApiKey>({
35
35
  required: false,
36
36
  index: false,
37
37
  }],
38
+ createdBy: {
39
+ type: mongoose.Schema.Types.ObjectId,
40
+ ref: 'User',
41
+ required: true,
42
+ },
38
43
  }, {timestamps: true});
39
44
 
40
45
  UserApiKeySchema.set('toJSON', {getters: true});
@@ -1,9 +1,10 @@
1
1
  enum UserApiKeyPermissions {
2
2
  Create = "userApiKey:create",
3
+ CreateMy = "userApiKey:createMy",
3
4
  Update = "userApiKey:update",
4
5
  Delete = "userApiKey:delete",
5
6
  View = "userApiKey:view",
6
- ViewMy = "userApiKey:myView",
7
+ ViewMy = "userApiKey:viewMy",
7
8
  Manage = "userApiKey:manage",
8
9
 
9
10
  }
@@ -22,7 +22,10 @@ class UserApiKeyMongoRepository implements IUserApiKeyRepository {
22
22
 
23
23
  const userApiKey: mongoose.HydratedDocument<IUserApiKey> = new UserApiKeyModel(data)
24
24
  await userApiKey.save()
25
- await userApiKey.populate({path: 'user', populate: {path: 'tenant role'} })
25
+ await userApiKey.populate([
26
+ {path: 'user', populate: {path: 'tenant role'} },
27
+ {path: 'createdBy', populate: {path: 'tenant role'} },
28
+ ])
26
29
  return userApiKey
27
30
  } catch (e) {
28
31
  if (e instanceof mongoose.Error.ValidationError) {
@@ -88,7 +91,7 @@ class UserApiKeyMongoRepository implements IUserApiKeyRepository {
88
91
 
89
92
  const sort = MongooseSort.applySort(orderBy, order)
90
93
 
91
- const options = {populate: ['user', 'user.tenant', 'user.role'], page, limit, sort}
94
+ const options = {populate: ['user', 'user.tenant', 'user.role', 'createdBy'], page, limit, sort}
92
95
 
93
96
  const userApiKeyPaginated: PaginateResult<IUserApiKey> = await UserApiKeyModel.paginate(query, options)
94
97
  return {
@@ -15,6 +15,7 @@ const tableFields: SqliteTableField[] = [
15
15
  {name: "user", type: "TEXT", unique: false, primary: false},
16
16
  {name: "ipv4", type: "TEXT", unique: false, primary: false},
17
17
  {name: "ipv6", type: "TEXT", unique: false, primary: false},
18
+ {name: "createdBy", type: "TEXT", unique: false, primary: false},
18
19
  {name: "createdAt", type: "TEXT", unique: false, primary: false}
19
20
  ]
20
21
 
@@ -170,6 +171,7 @@ class UserApiKeySqliteRepository implements IUserApiKeyRepository {
170
171
  userApiKey.ipv4 = userApiKey.ipv4 != "" ? userApiKey.ipv4.split(',') : []
171
172
  userApiKey.ipv6 = userApiKey.ipv6 != "" ? userApiKey.ipv6.split(',') : []
172
173
  userApiKey.user = await this.findUserById(userApiKey.user)
174
+ userApiKey.createdBy = await this.findUserById(userApiKey.createdBy)
173
175
  }
174
176
 
175
177
  return {