@dropins/storefront-auth 2.2.0-alpha010 → 2.2.0-alpha012

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  /*! Copyright 2025 Adobe
2
2
  All Rights Reserved. */
3
- import{Initializer as m,Config as h}from"@dropins/tools/lib.js";import{a as l,v as g,C as p}from"./verifyToken.js";import{events as d}from"@dropins/tools/event-bus.js";import"@dropins/tools/recaptcha.js";import{f as _}from"./network-error.js";const c=new h(void 0),f=new m({init:async e=>{const s={...{authHeaderConfig:{header:"Authorization",tokenPrefix:"Bearer"}},...e};f.config.setConfig(s);const i=l(p.auth_dropin_user_token),[n]=await Promise.all([g(s.authHeaderConfig.header,s.authHeaderConfig.tokenPrefix),i?u():Promise.resolve()]);c.setConfig(n)},listeners:()=>[d.on("authenticated",e=>{const t=c.getConfig();t!==void 0&&e!==t&&(c.setConfig(e),u())})]}),k=f.config,C=`
3
+ import{Initializer as l,Config as _}from"@dropins/tools/lib.js";import{a as m,v as f,C as p}from"./verifyToken.js";import{events as u}from"@dropins/tools/event-bus.js";import"@dropins/tools/recaptcha.js";import{f as g}from"./network-error.js";const c=new _(void 0),h=new l({init:async e=>{const s={...{authHeaderConfig:{header:"Authorization",tokenPrefix:"Bearer"}},...e};h.config.setConfig(s);const n=m(p.auth_dropin_user_token),[t]=await Promise.all([f(s.authHeaderConfig.header,s.authHeaderConfig.tokenPrefix),n?d():Promise.resolve()]);c.setConfig(t)},listeners:()=>[u.on("authenticated",e=>{const r=c.getConfig();r!==void 0&&e!==r&&(c.setConfig(e),d())})]}),T=h.config,P=`
4
4
  query GET_CUSTOMER_ROLE_PERMISSIONS {
5
5
  customer {
6
6
  purchase_orders_enabled
@@ -34,5 +34,5 @@ import{Initializer as m,Config as h}from"@dropins/tools/lib.js";import{a as l,v
34
34
  }
35
35
  }
36
36
  }
37
- `;let a=null,r=null;const P=e=>{const t={},s=i=>{i.forEach(n=>{var o;t[n.id]=!0,(o=n.children)!=null&&o.length&&s(n.children)})};return s(e),t},E=e=>(e==null?void 0:e.id)==="MA=="&&Array.isArray(e.permissions)&&e.permissions.length===0,S=(e,t)=>{var i;if(E(e))return{admin:!0,purchase_orders_enabled:t};const s={all:!0,purchase_orders_enabled:t};if((i=e==null?void 0:e.permissions)!=null&&i.length){const n=P(e.permissions);return{...s,...n}}return s},v=async()=>{var e,t,s,i;try{const n=await _(C,{method:"GET"}),o=S((t=(e=n.data)==null?void 0:e.customer)==null?void 0:t.role,(i=(s=n.data)==null?void 0:s.customer)==null?void 0:i.purchase_orders_enabled);return a=o,r=null,o}catch(n){throw r=null,n}},u=()=>a?(d.emit("auth/permissions",a),Promise.resolve(a)):(r||(r=v().then(e=>(d.emit("auth/permissions",e),e))),r),A=()=>{a=null,r=null};export{A as _,k as c,u as g,f as i};
37
+ `;let a=null,o=null;const C=e=>{const r={},s=n=>{n.forEach(t=>{var i;r[t.id]=!0,(i=t.children)!=null&&i.length&&s(t.children)})};return s(e),r},O=["Magento_PurchaseOrder::all","Magento_PurchaseOrder::view_purchase_orders","Magento_PurchaseOrder::view_purchase_orders_for_subordinates","Magento_PurchaseOrder::view_purchase_orders_for_company","Magento_PurchaseOrder::autoapprove_purchase_order","Magento_PurchaseOrderRule::super_approve_purchase_order","Magento_PurchaseOrderRule::view_approval_rules","Magento_PurchaseOrderRule::manage_approval_rules"],v=e=>(e==null?void 0:e.id)==="MA=="&&Array.isArray(e.permissions)&&e.permissions.length===0,E=e=>{var r;return(r=e==null?void 0:e.permissions)!=null&&r.length?C(e.permissions):{}},M=(e,r)=>{if(r===!0)return e;const s={...e};return O.forEach(n=>{s[n]=!1}),s},R=(e,r)=>{const s=v(e),n=E(e),t=M(n,r);return{...{all:!0,...s&&{admin:!0}},...t}},S=async()=>{var e,r,s,n;try{const t=await g(P,{method:"GET"}),i=R((r=(e=t.data)==null?void 0:e.customer)==null?void 0:r.role,(n=(s=t.data)==null?void 0:s.customer)==null?void 0:n.purchase_orders_enabled);return a=i,o=null,i}catch(t){throw o=null,t}},d=()=>a?(u.emit("auth/permissions",a),Promise.resolve(a)):(o||(o=S().then(e=>(u.emit("auth/permissions",e),e))),o),k=()=>{a=null,o=null};export{k as _,T as c,d as g,h as i};
38
38
  //# sourceMappingURL=getCustomerRolePermissions.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"getCustomerRolePermissions.js","sources":["/@dropins/storefront-auth/src/api/initialize/initialize.ts","/@dropins/storefront-auth/src/api/getCustomerRolePermissions/graphql/getCustomerRolePermissions.graphql.ts","/@dropins/storefront-auth/src/api/getCustomerRolePermissions/getCustomerRolePermissions.ts"],"sourcesContent":["/********************************************************************\n * ADOBE CONFIDENTIAL\n * __________________\n *\n * Copyright 2024 Adobe\n * All Rights Reserved.\n *\n * NOTICE: All information contained herein is, and remains\n * the property of Adobe and its suppliers, if any. The intellectual\n * and technical concepts contained herein are proprietary to Adobe\n * and its suppliers and are protected by all applicable intellectual\n * property laws, including trade secret and copyright laws.\n * Dissemination of this information or reproduction of this material\n * is strictly forbidden unless prior written permission is obtained\n * from Adobe.\n *******************************************************************/\n\nimport { Initializer, Model, Config } from '@adobe-commerce/elsie/lib';\nimport { Lang } from '@adobe-commerce/elsie/i18n';\nimport { getCookie } from '@/auth/lib/cookieUtils';\nimport { CustomerModel } from '@/auth/data/models';\nimport { verifyToken, getCustomerRolePermissions } from '@/auth/api';\nimport { events } from '@adobe-commerce/event-bus';\nimport { COOKIE_NAMES } from '@/auth/configs/cookieConfigs';\n\ntype ConfigProps = {\n langDefinitions?: Lang;\n authHeaderConfig: {\n header: string;\n tokenPrefix: string;\n };\n models?: {\n CustomerModel?: Model<CustomerModel>;\n };\n};\n\nconst _authenticated = new Config<boolean | undefined>(undefined);\n\nexport const initialize = new Initializer<ConfigProps>({\n init: async (config) => {\n const defaultConfig = {\n authHeaderConfig: {\n header: 'Authorization',\n tokenPrefix: 'Bearer',\n },\n };\n\n const mergedConfig = { ...defaultConfig, ...config };\n\n initialize.config.setConfig(mergedConfig);\n\n const token = getCookie(COOKIE_NAMES.auth_dropin_user_token);\n\n const [authenticated] = await Promise.all([\n verifyToken(\n mergedConfig.authHeaderConfig.header,\n mergedConfig.authHeaderConfig.tokenPrefix\n ),\n token ? getCustomerRolePermissions() : Promise.resolve(),\n ]) ;\n\n _authenticated.setConfig(authenticated);\n\n },\n\n listeners: () => [\n events.on('authenticated', (next) => {\n const prev = _authenticated.getConfig();\n\n if (prev !== undefined && next !== prev) {\n _authenticated.setConfig(next);\n getCustomerRolePermissions();\n }\n }),\n ],\n});\n\nexport const config = initialize.config;\n","export const GET_CUSTOMER_ROLE_PERMISSIONS = `\n query GET_CUSTOMER_ROLE_PERMISSIONS {\n customer {\n purchase_orders_enabled\n role {\n id\n name\n permissions {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n }\n }\n }\n }\n }\n }\n }\n }\n }\n`;\n","/********************************************************************\n * Copyright 2025 Adobe\n * All Rights Reserved.\n *\n * NOTICE: Adobe permits you to use, modify, and distribute this\n * file in accordance with the terms of the Adobe license agreement\n * accompanying it.\n *******************************************************************/\n\nimport { events } from '@adobe-commerce/event-bus';\nimport { fetchGraphQl } from '@/auth/api/fetch-graphql';\nimport { PermissionsModel } from '@/auth/data/models';\nimport { GET_CUSTOMER_ROLE_PERMISSIONS } from './graphql/getCustomerRolePermissions.graphql';\n\n// TypeScript interfaces\ninterface Permission {\n id: string;\n text: string;\n children?: Permission[];\n}\n\ninterface Role {\n id: string;\n name: string;\n permissions?: Permission[];\n}\n\ninterface GetCustomerRolePermissionsResponse {\n data?: {\n customer?: {\n purchase_orders_enabled?: boolean;\n role?: Role;\n };\n };\n errors?: {\n message: string;\n }[];\n}\n\n// Module-level cache\nlet permissionsCache: PermissionsModel | null = null;\nlet fetchPromise: Promise<PermissionsModel> | null = null;\n\n/**\n * Recursively flattens permission tree into a flat object\n */\nconst flattenPermissionTree = (\n permissions: Permission[]\n): Record<string, boolean> => {\n const flattened: Record<string, boolean> = {};\n\n const processPermissions = (perms: Permission[]): void => {\n perms.forEach((permission) => {\n flattened[permission.id] = true;\n if (permission.children?.length) {\n processPermissions(permission.children);\n }\n });\n };\n\n processPermissions(permissions);\n return flattened;\n};\n\n/**\n * Determines if user has admin privileges\n * Admin is only when user has role ID 'MA==' AND has an empty permissions array\n */\nconst isAdminUser = (role?: Role): boolean => {\n return (\n role?.id === 'MA==' &&\n Array.isArray(role.permissions) &&\n role.permissions.length === 0\n );\n};\n\n/**\n * Processes role data into flattened permissions\n */\nconst processUserPermissions = (\n role?: Role,\n purchaseOrdersEnabled?: boolean\n): PermissionsModel => {\n if (isAdminUser(role)) {\n return {\n admin: true,\n purchase_orders_enabled: purchaseOrdersEnabled,\n };\n }\n\n const basePermissions: PermissionsModel = {\n all: true,\n purchase_orders_enabled: purchaseOrdersEnabled,\n };\n\n if (role?.permissions?.length) {\n const flattenedPerms = flattenPermissionTree(role.permissions);\n return { ...basePermissions, ...flattenedPerms };\n }\n\n return basePermissions;\n};\n\n/**\n * Fetches user role permissions from GraphQL API\n */\nconst fetchUserRolePermissions = async (): Promise<PermissionsModel> => {\n try {\n const response = (await fetchGraphQl(GET_CUSTOMER_ROLE_PERMISSIONS, {\n method: 'GET',\n })) as GetCustomerRolePermissionsResponse;\n\n const permissions = processUserPermissions(\n response.data?.customer?.role,\n response.data?.customer?.purchase_orders_enabled\n );\n\n // Update cache\n permissionsCache = permissions;\n fetchPromise = null;\n\n return permissions;\n } catch (error) {\n fetchPromise = null;\n throw error;\n }\n};\n\n/**\n * Gets user role permissions with caching\n */\nexport const getCustomerRolePermissions = (): Promise<PermissionsModel> => {\n // Return cached data as resolved promise if available\n if (permissionsCache) {\n events.emit('auth/permissions', permissionsCache);\n return Promise.resolve(permissionsCache);\n }\n\n // No cache available - create and return fetch promise if not already fetching\n if (!fetchPromise) {\n fetchPromise = fetchUserRolePermissions().then((permissions) => {\n events.emit('auth/permissions', permissions);\n return permissions;\n });\n }\n\n return fetchPromise;\n};\n\n/**\n * Resets the permissions cache\n * @internal\n */\nexport const _resetCache = (): void => {\n permissionsCache = null;\n fetchPromise = null;\n};\n"],"names":["_authenticated","Config","initialize","Initializer","config","mergedConfig","token","getCookie","COOKIE_NAMES","authenticated","verifyToken","getCustomerRolePermissions","events","next","prev","GET_CUSTOMER_ROLE_PERMISSIONS","permissionsCache","fetchPromise","flattenPermissionTree","permissions","flattened","processPermissions","perms","permission","_a","isAdminUser","role","processUserPermissions","purchaseOrdersEnabled","basePermissions","flattenedPerms","fetchUserRolePermissions","response","fetchGraphQl","_b","_d","_c","error","_resetCache"],"mappings":"mPAoCA,MAAMA,EAAiB,IAAIC,EAA4B,MAAS,EAEnDC,EAAa,IAAIC,EAAyB,CACrD,KAAM,MAAOC,GAAW,CAQtB,MAAMC,EAAe,CAAE,GAPD,CACpB,iBAAkB,CAChB,OAAQ,gBACR,YAAa,QAAA,CACf,EAGuC,GAAGD,CAAAA,EAE5CF,EAAW,OAAO,UAAUG,CAAY,EAExC,MAAMC,EAAQC,EAAUC,EAAa,sBAAsB,EAErD,CAACC,CAAa,EAAI,MAAM,QAAQ,IAAI,CACxCC,EACEL,EAAa,iBAAiB,OAC9BA,EAAa,iBAAiB,WAAA,EAEhCC,EAAQK,IAA+B,QAAQ,QAAA,CAAQ,CACxD,EAEDX,EAAe,UAAUS,CAAa,CAExC,EAEA,UAAW,IAAM,CACfG,EAAO,GAAG,gBAAkBC,GAAS,CACnC,MAAMC,EAAOd,EAAe,UAAA,EAExBc,IAAS,QAAaD,IAASC,IACjCd,EAAe,UAAUa,CAAI,EAC7BF,EAAA,EAEJ,CAAC,CAAA,CAEL,CAAC,EAEYP,EAASF,EAAW,OC7EpBa,EAAgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,ECwC7C,IAAIC,EAA4C,KAC5CC,EAAiD,KAKrD,MAAMC,EACJC,GAC4B,CAC5B,MAAMC,EAAqC,CAAA,EAErCC,EAAsBC,GAA8B,CACxDA,EAAM,QAASC,GAAe,OAC5BH,EAAUG,EAAW,EAAE,EAAI,IACvBC,EAAAD,EAAW,WAAX,MAAAC,EAAqB,QACvBH,EAAmBE,EAAW,QAAQ,CAE1C,CAAC,CACH,EAEA,OAAAF,EAAmBF,CAAW,EACvBC,CACT,EAMMK,EAAeC,IAEjBA,GAAA,YAAAA,EAAM,MAAO,QACb,MAAM,QAAQA,EAAK,WAAW,GAC9BA,EAAK,YAAY,SAAW,EAO1BC,EAAyB,CAC7BD,EACAE,IACqB,OACrB,GAAIH,EAAYC,CAAI,EAClB,MAAO,CACL,MAAO,GACP,wBAAyBE,CAAA,EAI7B,MAAMC,EAAoC,CACxC,IAAK,GACL,wBAAyBD,CAAA,EAG3B,IAAIJ,EAAAE,GAAA,YAAAA,EAAM,cAAN,MAAAF,EAAmB,OAAQ,CAC7B,MAAMM,EAAiBZ,EAAsBQ,EAAK,WAAW,EAC7D,MAAO,CAAE,GAAGG,EAAiB,GAAGC,CAAA,CAClC,CAEA,OAAOD,CACT,EAKME,EAA2B,SAAuC,aACtE,GAAI,CACF,MAAMC,EAAY,MAAMC,EAAalB,EAA+B,CAClE,OAAQ,KAAA,CACT,EAEKI,EAAcQ,GAClBO,GAAAV,EAAAQ,EAAS,OAAT,YAAAR,EAAe,WAAf,YAAAU,EAAyB,MACzBC,GAAAC,EAAAJ,EAAS,OAAT,YAAAI,EAAe,WAAf,YAAAD,EAAyB,uBAAA,EAI3B,OAAAnB,EAAmBG,EACnBF,EAAe,KAERE,CACT,OAASkB,EAAO,CACd,MAAApB,EAAe,KACToB,CACR,CACF,EAKa1B,EAA6B,IAEpCK,GACFJ,EAAO,KAAK,mBAAoBI,CAAgB,EACzC,QAAQ,QAAQA,CAAgB,IAIpCC,IACHA,EAAec,EAAA,EAA2B,KAAMZ,IAC9CP,EAAO,KAAK,mBAAoBO,CAAW,EACpCA,EACR,GAGIF,GAOIqB,EAAc,IAAY,CACrCtB,EAAmB,KACnBC,EAAe,IACjB"}
1
+ {"version":3,"file":"getCustomerRolePermissions.js","sources":["/@dropins/storefront-auth/src/api/initialize/initialize.ts","/@dropins/storefront-auth/src/api/getCustomerRolePermissions/graphql/getCustomerRolePermissions.graphql.ts","/@dropins/storefront-auth/src/api/getCustomerRolePermissions/getCustomerRolePermissions.ts"],"sourcesContent":["/********************************************************************\n * ADOBE CONFIDENTIAL\n * __________________\n *\n * Copyright 2024 Adobe\n * All Rights Reserved.\n *\n * NOTICE: All information contained herein is, and remains\n * the property of Adobe and its suppliers, if any. The intellectual\n * and technical concepts contained herein are proprietary to Adobe\n * and its suppliers and are protected by all applicable intellectual\n * property laws, including trade secret and copyright laws.\n * Dissemination of this information or reproduction of this material\n * is strictly forbidden unless prior written permission is obtained\n * from Adobe.\n *******************************************************************/\n\nimport { Initializer, Model, Config } from '@adobe-commerce/elsie/lib';\nimport { Lang } from '@adobe-commerce/elsie/i18n';\nimport { getCookie } from '@/auth/lib/cookieUtils';\nimport { CustomerModel } from '@/auth/data/models';\nimport { verifyToken, getCustomerRolePermissions } from '@/auth/api';\nimport { events } from '@adobe-commerce/event-bus';\nimport { COOKIE_NAMES } from '@/auth/configs/cookieConfigs';\n\ntype ConfigProps = {\n langDefinitions?: Lang;\n authHeaderConfig: {\n header: string;\n tokenPrefix: string;\n };\n models?: {\n CustomerModel?: Model<CustomerModel>;\n };\n};\n\nconst _authenticated = new Config<boolean | undefined>(undefined);\n\nexport const initialize = new Initializer<ConfigProps>({\n init: async (config) => {\n const defaultConfig = {\n authHeaderConfig: {\n header: 'Authorization',\n tokenPrefix: 'Bearer',\n },\n };\n\n const mergedConfig = { ...defaultConfig, ...config };\n\n initialize.config.setConfig(mergedConfig);\n\n const token = getCookie(COOKIE_NAMES.auth_dropin_user_token);\n\n const [authenticated] = await Promise.all([\n verifyToken(\n mergedConfig.authHeaderConfig.header,\n mergedConfig.authHeaderConfig.tokenPrefix\n ),\n token ? getCustomerRolePermissions() : Promise.resolve(),\n ]) ;\n\n _authenticated.setConfig(authenticated);\n\n },\n\n listeners: () => [\n events.on('authenticated', (next) => {\n const prev = _authenticated.getConfig();\n\n if (prev !== undefined && next !== prev) {\n _authenticated.setConfig(next);\n getCustomerRolePermissions();\n }\n }),\n ],\n});\n\nexport const config = initialize.config;\n","export const GET_CUSTOMER_ROLE_PERMISSIONS = `\n query GET_CUSTOMER_ROLE_PERMISSIONS {\n customer {\n purchase_orders_enabled\n role {\n id\n name\n permissions {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n children {\n id\n text\n }\n }\n }\n }\n }\n }\n }\n }\n }\n`;\n","/********************************************************************\n * Copyright 2025 Adobe\n * All Rights Reserved.\n *\n * NOTICE: Adobe permits you to use, modify, and distribute this\n * file in accordance with the terms of the Adobe license agreement\n * accompanying it.\n *******************************************************************/\n\nimport { events } from '@adobe-commerce/event-bus';\nimport { fetchGraphQl } from '@/auth/api/fetch-graphql';\nimport { PermissionsModel } from '@/auth/data/models';\nimport { GET_CUSTOMER_ROLE_PERMISSIONS } from './graphql/getCustomerRolePermissions.graphql';\n\n// TypeScript interfaces\ninterface Permission {\n id: string;\n text: string;\n children?: Permission[];\n}\n\ninterface Role {\n id: string;\n name: string;\n permissions?: Permission[];\n}\n\ninterface GetCustomerRolePermissionsResponse {\n data?: {\n customer?: {\n purchase_orders_enabled?: boolean;\n role?: Role;\n };\n };\n errors?: {\n message: string;\n }[];\n}\n\n// Module-level cache\nlet permissionsCache: PermissionsModel | null = null;\nlet fetchPromise: Promise<PermissionsModel> | null = null;\n\n/**\n * Recursively flattens permission tree into a flat object\n */\nconst flattenPermissionTree = (\n permissions: Permission[]\n): Record<string, boolean> => {\n const flattened: Record<string, boolean> = {};\n\n const processPermissions = (perms: Permission[]): void => {\n perms.forEach((permission) => {\n flattened[permission.id] = true;\n if (permission.children?.length) {\n processPermissions(permission.children);\n }\n });\n };\n\n processPermissions(permissions);\n return flattened;\n};\n\n/**\n * Purchase Order related permissions that should be set to false\n * when purchase orders are disabled\n */\nconst PURCHASE_ORDER_PERMISSIONS = [\n 'Magento_PurchaseOrder::all',\n 'Magento_PurchaseOrder::view_purchase_orders',\n 'Magento_PurchaseOrder::view_purchase_orders_for_subordinates',\n 'Magento_PurchaseOrder::view_purchase_orders_for_company',\n 'Magento_PurchaseOrder::autoapprove_purchase_order',\n 'Magento_PurchaseOrderRule::super_approve_purchase_order',\n 'Magento_PurchaseOrderRule::view_approval_rules',\n 'Magento_PurchaseOrderRule::manage_approval_rules',\n];\n\n/**\n * Determines if user has admin privileges\n * Admin is only when user has role ID 'MA==' AND has an empty permissions array\n */\nconst isAdminUser = (role?: Role): boolean => {\n return (\n role?.id === 'MA==' &&\n Array.isArray(role.permissions) &&\n role.permissions.length === 0\n );\n};\n\n/**\n * Gets all available permissions from the GraphQL response\n * Returns an empty object if no permissions (e.g., admin users have empty array)\n */\nconst getAllPermissions = (role?: Role): Record<string, boolean> => {\n if (role?.permissions?.length) {\n return flattenPermissionTree(role.permissions);\n }\n return {};\n};\n\n/**\n * Handles purchase order permissions based on PO enabled status\n * When PO is disabled, explicitly sets all PO permissions to false\n * This ensures consumers can distinguish between \"no data\" and \"explicitly disabled\"\n */\nconst overridePurchaseOrderPermissions = (\n permissions: Record<string, boolean>,\n purchaseOrdersEnabled?: boolean\n): Record<string, boolean> => {\n // If PO is enabled, return permissions as-is from backend\n if (purchaseOrdersEnabled === true) {\n return permissions;\n }\n\n // When PO is disabled, explicitly set all PO permissions to false\n const result = { ...permissions };\n PURCHASE_ORDER_PERMISSIONS.forEach((permission) => {\n result[permission] = false;\n });\n\n return result;\n};\n\n/**\n * Processes role data into flattened permissions\n */\nconst processUserPermissions = (\n role?: Role,\n purchaseOrdersEnabled?: boolean\n): PermissionsModel => {\n const isAdmin = isAdminUser(role);\n\n // Get all permissions (for both admin and non-admin users)\n const allPermissions = getAllPermissions(role);\n\n // Override PO permissions to false if PO is disabled\n const processedPermissions = overridePurchaseOrderPermissions(\n allPermissions,\n purchaseOrdersEnabled\n );\n\n const basePermissions: PermissionsModel = {\n all: true,\n ...(isAdmin && { admin: true }),\n };\n\n return { ...basePermissions, ...processedPermissions };\n};\n\n/**\n * Fetches user role permissions from GraphQL API\n */\nconst fetchUserRolePermissions = async (): Promise<PermissionsModel> => {\n try {\n const response = (await fetchGraphQl(GET_CUSTOMER_ROLE_PERMISSIONS, {\n method: 'GET',\n })) as GetCustomerRolePermissionsResponse;\n\n const permissions = processUserPermissions(\n response.data?.customer?.role,\n response.data?.customer?.purchase_orders_enabled\n );\n\n // Update cache\n permissionsCache = permissions;\n fetchPromise = null;\n\n return permissions;\n } catch (error) {\n fetchPromise = null;\n throw error;\n }\n};\n\n/**\n * Gets user role permissions with caching\n */\nexport const getCustomerRolePermissions = (): Promise<PermissionsModel> => {\n // Return cached data as resolved promise if available\n if (permissionsCache) {\n events.emit('auth/permissions', permissionsCache);\n return Promise.resolve(permissionsCache);\n }\n\n // No cache available - create and return fetch promise if not already fetching\n if (!fetchPromise) {\n fetchPromise = fetchUserRolePermissions().then((permissions) => {\n events.emit('auth/permissions', permissions);\n return permissions;\n });\n }\n\n return fetchPromise;\n};\n\n/**\n * Resets the permissions cache\n * @internal\n */\nexport const _resetCache = (): void => {\n permissionsCache = null;\n fetchPromise = null;\n};\n"],"names":["_authenticated","Config","initialize","Initializer","config","mergedConfig","token","getCookie","COOKIE_NAMES","authenticated","verifyToken","getCustomerRolePermissions","events","next","prev","GET_CUSTOMER_ROLE_PERMISSIONS","permissionsCache","fetchPromise","flattenPermissionTree","permissions","flattened","processPermissions","perms","permission","_a","PURCHASE_ORDER_PERMISSIONS","isAdminUser","role","getAllPermissions","overridePurchaseOrderPermissions","purchaseOrdersEnabled","result","processUserPermissions","isAdmin","allPermissions","processedPermissions","fetchUserRolePermissions","response","fetchGraphQl","_b","_d","_c","error","_resetCache"],"mappings":"mPAoCA,MAAMA,EAAiB,IAAIC,EAA4B,MAAS,EAEnDC,EAAa,IAAIC,EAAyB,CACrD,KAAM,MAAOC,GAAW,CAQtB,MAAMC,EAAe,CAAE,GAPD,CACpB,iBAAkB,CAChB,OAAQ,gBACR,YAAa,QAAA,CACf,EAGuC,GAAGD,CAAAA,EAE5CF,EAAW,OAAO,UAAUG,CAAY,EAExC,MAAMC,EAAQC,EAAUC,EAAa,sBAAsB,EAErD,CAACC,CAAa,EAAI,MAAM,QAAQ,IAAI,CACxCC,EACEL,EAAa,iBAAiB,OAC9BA,EAAa,iBAAiB,WAAA,EAEhCC,EAAQK,IAA+B,QAAQ,QAAA,CAAQ,CACxD,EAEDX,EAAe,UAAUS,CAAa,CAExC,EAEA,UAAW,IAAM,CACfG,EAAO,GAAG,gBAAkBC,GAAS,CACnC,MAAMC,EAAOd,EAAe,UAAA,EAExBc,IAAS,QAAaD,IAASC,IACjCd,EAAe,UAAUa,CAAI,EAC7BF,EAAA,EAEJ,CAAC,CAAA,CAEL,CAAC,EAEYP,EAASF,EAAW,OC7EpBa,EAAgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,ECwC7C,IAAIC,EAA4C,KAC5CC,EAAiD,KAKrD,MAAMC,EACJC,GAC4B,CAC5B,MAAMC,EAAqC,CAAA,EAErCC,EAAsBC,GAA8B,CACxDA,EAAM,QAASC,GAAe,OAC5BH,EAAUG,EAAW,EAAE,EAAI,IACvBC,EAAAD,EAAW,WAAX,MAAAC,EAAqB,QACvBH,EAAmBE,EAAW,QAAQ,CAE1C,CAAC,CACH,EAEA,OAAAF,EAAmBF,CAAW,EACvBC,CACT,EAMMK,EAA6B,CACjC,6BACA,8CACA,+DACA,0DACA,oDACA,0DACA,iDACA,kDACF,EAMMC,EAAeC,IAEjBA,GAAA,YAAAA,EAAM,MAAO,QACb,MAAM,QAAQA,EAAK,WAAW,GAC9BA,EAAK,YAAY,SAAW,EAQ1BC,EAAqBD,GAAyC,OAClE,OAAIH,EAAAG,GAAA,YAAAA,EAAM,cAAN,MAAAH,EAAmB,OACdN,EAAsBS,EAAK,WAAW,EAExC,CAAA,CACT,EAOME,EAAmC,CACvCV,EACAW,IAC4B,CAE5B,GAAIA,IAA0B,GAC5B,OAAOX,EAIT,MAAMY,EAAS,CAAE,GAAGZ,CAAA,EACpB,OAAAM,EAA2B,QAASF,GAAe,CACjDQ,EAAOR,CAAU,EAAI,EACvB,CAAC,EAEMQ,CACT,EAKMC,EAAyB,CAC7BL,EACAG,IACqB,CACrB,MAAMG,EAAUP,EAAYC,CAAI,EAG1BO,EAAiBN,EAAkBD,CAAI,EAGvCQ,EAAuBN,EAC3BK,EACAJ,CAAA,EAQF,MAAO,CAAE,GALiC,CACxC,IAAK,GACL,GAAIG,GAAW,CAAE,MAAO,EAAA,CAAK,EAGF,GAAGE,CAAA,CAClC,EAKMC,EAA2B,SAAuC,aACtE,GAAI,CACF,MAAMC,EAAY,MAAMC,EAAavB,EAA+B,CAClE,OAAQ,KAAA,CACT,EAEKI,EAAca,GAClBO,GAAAf,EAAAa,EAAS,OAAT,YAAAb,EAAe,WAAf,YAAAe,EAAyB,MACzBC,GAAAC,EAAAJ,EAAS,OAAT,YAAAI,EAAe,WAAf,YAAAD,EAAyB,uBAAA,EAI3B,OAAAxB,EAAmBG,EACnBF,EAAe,KAERE,CACT,OAASuB,EAAO,CACd,MAAAzB,EAAe,KACTyB,CACR,CACF,EAKa/B,EAA6B,IAEpCK,GACFJ,EAAO,KAAK,mBAAoBI,CAAgB,EACzC,QAAQ,QAAQA,CAAgB,IAIpCC,IACHA,EAAemB,EAAA,EAA2B,KAAMjB,IAC9CP,EAAO,KAAK,mBAAoBO,CAAW,EACpCA,EACR,GAGIF,GAOI0B,EAAc,IAAY,CACrC3B,EAAmB,KACnBC,EAAe,IACjB"}
@@ -1,7 +1,6 @@
1
1
  export interface PermissionsModel {
2
2
  all?: boolean;
3
3
  admin?: boolean;
4
- purchase_orders_enabled?: boolean;
5
- [key: string]: boolean | undefined;
4
+ [key: string]: boolean;
6
5
  }
7
6
  //# sourceMappingURL=permissions.d.ts.map
package/package.json CHANGED
@@ -1 +1 @@
1
- {"name": "@dropins/storefront-auth", "version": "2.2.0-alpha010", "@dropins/tools": "1.5.0-beta4", "license": "SEE LICENSE IN LICENSE.md"}
1
+ {"name": "@dropins/storefront-auth", "version": "2.2.0-alpha012", "@dropins/tools": "1.5.0-beta4", "license": "SEE LICENSE IN LICENSE.md"}