@lightdash/common 0.2561.0 → 0.2563.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (169) hide show
  1. package/dist/cjs/.tsbuildinfo +1 -1
  2. package/dist/cjs/authorization/index.mock.d.ts +1 -1
  3. package/dist/cjs/authorization/index.mock.js +1 -1
  4. package/dist/cjs/authorization/index.mock.js.map +1 -1
  5. package/dist/cjs/authorization/index.test.js +12 -12
  6. package/dist/cjs/authorization/index.test.js.map +1 -1
  7. package/dist/cjs/authorization/jwtAbility.test.js +2 -2
  8. package/dist/cjs/authorization/jwtAbility.test.js.map +1 -1
  9. package/dist/cjs/authorization/organizationMemberAbility.d.ts.map +1 -1
  10. package/dist/cjs/authorization/organizationMemberAbility.js +20 -0
  11. package/dist/cjs/authorization/organizationMemberAbility.js.map +1 -1
  12. package/dist/cjs/authorization/organizationMemberAbility.test.js +88 -82
  13. package/dist/cjs/authorization/organizationMemberAbility.test.js.map +1 -1
  14. package/dist/cjs/authorization/projectMemberAbility.d.ts.map +1 -1
  15. package/dist/cjs/authorization/projectMemberAbility.js +20 -0
  16. package/dist/cjs/authorization/projectMemberAbility.js.map +1 -1
  17. package/dist/cjs/authorization/projectMemberAbility.test.js +124 -94
  18. package/dist/cjs/authorization/projectMemberAbility.test.js.map +1 -1
  19. package/dist/cjs/authorization/roleToScopeMapping.test.js +8 -8
  20. package/dist/cjs/authorization/roleToScopeMapping.test.js.map +1 -1
  21. package/dist/cjs/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
  22. package/dist/cjs/authorization/roleToScopeMapping.testUtils.js +4 -4
  23. package/dist/cjs/authorization/roleToScopeMapping.testUtils.js.map +1 -1
  24. package/dist/cjs/authorization/roleToScopeParity.test.js +10 -3
  25. package/dist/cjs/authorization/roleToScopeParity.test.js.map +1 -1
  26. package/dist/cjs/authorization/scopeAbilityBuilder.test.js +17 -17
  27. package/dist/cjs/authorization/scopeAbilityBuilder.test.js.map +1 -1
  28. package/dist/cjs/authorization/scopes.d.ts.map +1 -1
  29. package/dist/cjs/authorization/scopes.js +8 -0
  30. package/dist/cjs/authorization/scopes.js.map +1 -1
  31. package/dist/cjs/authorization/serviceAccountAbility.d.ts.map +1 -1
  32. package/dist/cjs/authorization/serviceAccountAbility.js +20 -0
  33. package/dist/cjs/authorization/serviceAccountAbility.js.map +1 -1
  34. package/dist/cjs/types/api.d.ts +2 -2
  35. package/dist/cjs/types/api.d.ts.map +1 -1
  36. package/dist/cjs/types/api.js.map +1 -1
  37. package/dist/cjs/types/dashboard.d.ts +2 -1
  38. package/dist/cjs/types/dashboard.d.ts.map +1 -1
  39. package/dist/cjs/types/dashboard.js.map +1 -1
  40. package/dist/cjs/types/metricQuery.d.ts +4 -0
  41. package/dist/cjs/types/metricQuery.d.ts.map +1 -1
  42. package/dist/cjs/types/metricQuery.js.map +1 -1
  43. package/dist/cjs/types/preAggregate.d.ts +27 -0
  44. package/dist/cjs/types/preAggregate.d.ts.map +1 -1
  45. package/dist/cjs/types/savedCharts.d.ts +3 -2
  46. package/dist/cjs/types/savedCharts.d.ts.map +1 -1
  47. package/dist/cjs/types/savedCharts.js.map +1 -1
  48. package/dist/cjs/types/space.d.ts +1 -0
  49. package/dist/cjs/types/space.d.ts.map +1 -1
  50. package/dist/cjs/types/space.js.map +1 -1
  51. package/dist/cjs/utils/tableCalculationFunctions.d.ts +55 -2
  52. package/dist/cjs/utils/tableCalculationFunctions.d.ts.map +1 -1
  53. package/dist/cjs/utils/tableCalculationFunctions.js +151 -1
  54. package/dist/cjs/utils/tableCalculationFunctions.js.map +1 -1
  55. package/dist/cjs/utils/tableCalculationFunctions.test.js +178 -0
  56. package/dist/cjs/utils/tableCalculationFunctions.test.js.map +1 -1
  57. package/dist/esm/.tsbuildinfo +1 -1
  58. package/dist/esm/authorization/index.mock.d.ts +1 -1
  59. package/dist/esm/authorization/index.mock.js +1 -1
  60. package/dist/esm/authorization/index.mock.js.map +1 -1
  61. package/dist/esm/authorization/index.test.js +12 -12
  62. package/dist/esm/authorization/index.test.js.map +1 -1
  63. package/dist/esm/authorization/jwtAbility.test.js +2 -2
  64. package/dist/esm/authorization/jwtAbility.test.js.map +1 -1
  65. package/dist/esm/authorization/organizationMemberAbility.d.ts.map +1 -1
  66. package/dist/esm/authorization/organizationMemberAbility.js +20 -0
  67. package/dist/esm/authorization/organizationMemberAbility.js.map +1 -1
  68. package/dist/esm/authorization/organizationMemberAbility.test.js +88 -82
  69. package/dist/esm/authorization/organizationMemberAbility.test.js.map +1 -1
  70. package/dist/esm/authorization/projectMemberAbility.d.ts.map +1 -1
  71. package/dist/esm/authorization/projectMemberAbility.js +20 -0
  72. package/dist/esm/authorization/projectMemberAbility.js.map +1 -1
  73. package/dist/esm/authorization/projectMemberAbility.test.js +124 -94
  74. package/dist/esm/authorization/projectMemberAbility.test.js.map +1 -1
  75. package/dist/esm/authorization/roleToScopeMapping.test.js +8 -8
  76. package/dist/esm/authorization/roleToScopeMapping.test.js.map +1 -1
  77. package/dist/esm/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
  78. package/dist/esm/authorization/roleToScopeMapping.testUtils.js +4 -4
  79. package/dist/esm/authorization/roleToScopeMapping.testUtils.js.map +1 -1
  80. package/dist/esm/authorization/roleToScopeParity.test.js +10 -3
  81. package/dist/esm/authorization/roleToScopeParity.test.js.map +1 -1
  82. package/dist/esm/authorization/scopeAbilityBuilder.test.js +17 -17
  83. package/dist/esm/authorization/scopeAbilityBuilder.test.js.map +1 -1
  84. package/dist/esm/authorization/scopes.d.ts.map +1 -1
  85. package/dist/esm/authorization/scopes.js +8 -0
  86. package/dist/esm/authorization/scopes.js.map +1 -1
  87. package/dist/esm/authorization/serviceAccountAbility.d.ts.map +1 -1
  88. package/dist/esm/authorization/serviceAccountAbility.js +20 -0
  89. package/dist/esm/authorization/serviceAccountAbility.js.map +1 -1
  90. package/dist/esm/types/api.d.ts +2 -2
  91. package/dist/esm/types/api.d.ts.map +1 -1
  92. package/dist/esm/types/api.js.map +1 -1
  93. package/dist/esm/types/dashboard.d.ts +2 -1
  94. package/dist/esm/types/dashboard.d.ts.map +1 -1
  95. package/dist/esm/types/dashboard.js.map +1 -1
  96. package/dist/esm/types/metricQuery.d.ts +4 -0
  97. package/dist/esm/types/metricQuery.d.ts.map +1 -1
  98. package/dist/esm/types/metricQuery.js.map +1 -1
  99. package/dist/esm/types/preAggregate.d.ts +27 -0
  100. package/dist/esm/types/preAggregate.d.ts.map +1 -1
  101. package/dist/esm/types/savedCharts.d.ts +3 -2
  102. package/dist/esm/types/savedCharts.d.ts.map +1 -1
  103. package/dist/esm/types/savedCharts.js.map +1 -1
  104. package/dist/esm/types/space.d.ts +1 -0
  105. package/dist/esm/types/space.d.ts.map +1 -1
  106. package/dist/esm/types/space.js.map +1 -1
  107. package/dist/esm/utils/tableCalculationFunctions.d.ts +55 -2
  108. package/dist/esm/utils/tableCalculationFunctions.d.ts.map +1 -1
  109. package/dist/esm/utils/tableCalculationFunctions.js +146 -0
  110. package/dist/esm/utils/tableCalculationFunctions.js.map +1 -1
  111. package/dist/esm/utils/tableCalculationFunctions.test.js +179 -1
  112. package/dist/esm/utils/tableCalculationFunctions.test.js.map +1 -1
  113. package/dist/types/.tsbuildinfo +1 -1
  114. package/dist/types/authorization/index.mock.d.ts +1 -1
  115. package/dist/types/authorization/index.mock.js +1 -1
  116. package/dist/types/authorization/index.mock.js.map +1 -1
  117. package/dist/types/authorization/index.test.js +12 -12
  118. package/dist/types/authorization/index.test.js.map +1 -1
  119. package/dist/types/authorization/jwtAbility.test.js +2 -2
  120. package/dist/types/authorization/jwtAbility.test.js.map +1 -1
  121. package/dist/types/authorization/organizationMemberAbility.d.ts.map +1 -1
  122. package/dist/types/authorization/organizationMemberAbility.js +20 -0
  123. package/dist/types/authorization/organizationMemberAbility.js.map +1 -1
  124. package/dist/types/authorization/organizationMemberAbility.test.js +88 -82
  125. package/dist/types/authorization/organizationMemberAbility.test.js.map +1 -1
  126. package/dist/types/authorization/projectMemberAbility.d.ts.map +1 -1
  127. package/dist/types/authorization/projectMemberAbility.js +20 -0
  128. package/dist/types/authorization/projectMemberAbility.js.map +1 -1
  129. package/dist/types/authorization/projectMemberAbility.test.js +124 -94
  130. package/dist/types/authorization/projectMemberAbility.test.js.map +1 -1
  131. package/dist/types/authorization/roleToScopeMapping.test.js +8 -8
  132. package/dist/types/authorization/roleToScopeMapping.test.js.map +1 -1
  133. package/dist/types/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
  134. package/dist/types/authorization/roleToScopeMapping.testUtils.js +4 -4
  135. package/dist/types/authorization/roleToScopeMapping.testUtils.js.map +1 -1
  136. package/dist/types/authorization/roleToScopeParity.test.js +10 -3
  137. package/dist/types/authorization/roleToScopeParity.test.js.map +1 -1
  138. package/dist/types/authorization/scopeAbilityBuilder.test.js +17 -17
  139. package/dist/types/authorization/scopeAbilityBuilder.test.js.map +1 -1
  140. package/dist/types/authorization/scopes.d.ts.map +1 -1
  141. package/dist/types/authorization/scopes.js +8 -0
  142. package/dist/types/authorization/scopes.js.map +1 -1
  143. package/dist/types/authorization/serviceAccountAbility.d.ts.map +1 -1
  144. package/dist/types/authorization/serviceAccountAbility.js +20 -0
  145. package/dist/types/authorization/serviceAccountAbility.js.map +1 -1
  146. package/dist/types/types/api.d.ts +2 -2
  147. package/dist/types/types/api.d.ts.map +1 -1
  148. package/dist/types/types/api.js.map +1 -1
  149. package/dist/types/types/dashboard.d.ts +2 -1
  150. package/dist/types/types/dashboard.d.ts.map +1 -1
  151. package/dist/types/types/dashboard.js.map +1 -1
  152. package/dist/types/types/metricQuery.d.ts +4 -0
  153. package/dist/types/types/metricQuery.d.ts.map +1 -1
  154. package/dist/types/types/metricQuery.js.map +1 -1
  155. package/dist/types/types/preAggregate.d.ts +27 -0
  156. package/dist/types/types/preAggregate.d.ts.map +1 -1
  157. package/dist/types/types/savedCharts.d.ts +3 -2
  158. package/dist/types/types/savedCharts.d.ts.map +1 -1
  159. package/dist/types/types/savedCharts.js.map +1 -1
  160. package/dist/types/types/space.d.ts +1 -0
  161. package/dist/types/types/space.d.ts.map +1 -1
  162. package/dist/types/types/space.js.map +1 -1
  163. package/dist/types/utils/tableCalculationFunctions.d.ts +55 -2
  164. package/dist/types/utils/tableCalculationFunctions.d.ts.map +1 -1
  165. package/dist/types/utils/tableCalculationFunctions.js +146 -0
  166. package/dist/types/utils/tableCalculationFunctions.js.map +1 -1
  167. package/dist/types/utils/tableCalculationFunctions.test.js +179 -1
  168. package/dist/types/utils/tableCalculationFunctions.test.js.map +1 -1
  169. package/package.json +1 -1
@@ -57,25 +57,25 @@ describe('Organization member permissions', () => {
57
57
  it('can view and manage all kinds of dashboards', () => {
58
58
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
59
59
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
60
- isPrivate: false,
60
+ inheritsFromOrgOrProject: true,
61
61
  }))).toEqual(true);
62
62
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
63
63
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
64
- isPrivate: false,
64
+ inheritsFromOrgOrProject: true,
65
65
  }))).toEqual(true);
66
66
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
67
67
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
68
- isPrivate: true,
68
+ inheritsFromOrgOrProject: false,
69
69
  access: [],
70
70
  }))).toEqual(true);
71
71
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
72
72
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
73
- isPrivate: true,
73
+ inheritsFromOrgOrProject: false,
74
74
  access: [],
75
75
  }))).toEqual(true);
76
76
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
77
77
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
78
- isPrivate: true,
78
+ inheritsFromOrgOrProject: false,
79
79
  access: [
80
80
  {
81
81
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -85,7 +85,7 @@ describe('Organization member permissions', () => {
85
85
  }))).toEqual(true);
86
86
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
87
87
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
88
- isPrivate: true,
88
+ inheritsFromOrgOrProject: false,
89
89
  access: [
90
90
  {
91
91
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -95,7 +95,7 @@ describe('Organization member permissions', () => {
95
95
  }))).toEqual(true);
96
96
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
97
97
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
98
- isPrivate: true,
98
+ inheritsFromOrgOrProject: false,
99
99
  access: [
100
100
  {
101
101
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -105,7 +105,7 @@ describe('Organization member permissions', () => {
105
105
  }))).toEqual(true);
106
106
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
107
107
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
108
- isPrivate: true,
108
+ inheritsFromOrgOrProject: false,
109
109
  access: [
110
110
  {
111
111
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -117,25 +117,25 @@ describe('Organization member permissions', () => {
117
117
  it('can view and manage all kinds of saved charts', () => {
118
118
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
119
119
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
120
- isPrivate: false,
120
+ inheritsFromOrgOrProject: true,
121
121
  }))).toEqual(true);
122
122
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
123
123
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
124
- isPrivate: false,
124
+ inheritsFromOrgOrProject: true,
125
125
  }))).toEqual(true);
126
126
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
127
127
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
128
- isPrivate: true,
128
+ inheritsFromOrgOrProject: false,
129
129
  access: [],
130
130
  }))).toEqual(true);
131
131
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
132
132
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
133
- isPrivate: true,
133
+ inheritsFromOrgOrProject: false,
134
134
  access: [],
135
135
  }))).toEqual(true);
136
136
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
137
137
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
138
- isPrivate: true,
138
+ inheritsFromOrgOrProject: false,
139
139
  access: [
140
140
  {
141
141
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -145,7 +145,7 @@ describe('Organization member permissions', () => {
145
145
  }))).toEqual(true);
146
146
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
147
147
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
148
- isPrivate: true,
148
+ inheritsFromOrgOrProject: false,
149
149
  access: [
150
150
  {
151
151
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -155,7 +155,7 @@ describe('Organization member permissions', () => {
155
155
  }))).toEqual(true);
156
156
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
157
157
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
158
- isPrivate: true,
158
+ inheritsFromOrgOrProject: false,
159
159
  access: [
160
160
  {
161
161
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -165,7 +165,7 @@ describe('Organization member permissions', () => {
165
165
  }))).toEqual(true);
166
166
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
167
167
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
168
- isPrivate: true,
168
+ inheritsFromOrgOrProject: false,
169
169
  access: [
170
170
  {
171
171
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -177,25 +177,25 @@ describe('Organization member permissions', () => {
177
177
  it('can view and manage all kinds of space', () => {
178
178
  expect(ability.can('view', (0, ability_1.subject)('Space', {
179
179
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
180
- isPrivate: false,
180
+ inheritsFromOrgOrProject: true,
181
181
  }))).toEqual(true);
182
182
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
183
183
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
184
- isPrivate: false,
184
+ inheritsFromOrgOrProject: true,
185
185
  }))).toEqual(true);
186
186
  expect(ability.can('view', (0, ability_1.subject)('Space', {
187
187
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
188
- isPrivate: true,
188
+ inheritsFromOrgOrProject: false,
189
189
  access: [],
190
190
  }))).toEqual(true);
191
191
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
192
192
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
193
- isPrivate: true,
193
+ inheritsFromOrgOrProject: false,
194
194
  access: [],
195
195
  }))).toEqual(true);
196
196
  expect(ability.can('view', (0, ability_1.subject)('Space', {
197
197
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
198
- isPrivate: true,
198
+ inheritsFromOrgOrProject: false,
199
199
  access: [
200
200
  {
201
201
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -205,7 +205,7 @@ describe('Organization member permissions', () => {
205
205
  }))).toEqual(true);
206
206
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
207
207
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
208
- isPrivate: true,
208
+ inheritsFromOrgOrProject: false,
209
209
  access: [
210
210
  {
211
211
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -215,7 +215,7 @@ describe('Organization member permissions', () => {
215
215
  }))).toEqual(true);
216
216
  expect(ability.can('view', (0, ability_1.subject)('Space', {
217
217
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
218
- isPrivate: true,
218
+ inheritsFromOrgOrProject: false,
219
219
  access: [
220
220
  {
221
221
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -225,7 +225,7 @@ describe('Organization member permissions', () => {
225
225
  }))).toEqual(true);
226
226
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
227
227
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
228
- isPrivate: true,
228
+ inheritsFromOrgOrProject: false,
229
229
  access: [
230
230
  {
231
231
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
@@ -317,25 +317,25 @@ describe('Organization member permissions', () => {
317
317
  it('can view and manage public & accessable dashboards', () => {
318
318
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
319
319
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
320
- isPrivate: false,
320
+ inheritsFromOrgOrProject: true,
321
321
  }))).toEqual(true);
322
322
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
323
323
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
324
- isPrivate: false,
324
+ inheritsFromOrgOrProject: true,
325
325
  }))).toEqual(false);
326
326
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
327
327
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
328
- isPrivate: true,
328
+ inheritsFromOrgOrProject: false,
329
329
  access: [],
330
330
  }))).toEqual(false);
331
331
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
332
332
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
333
- isPrivate: true,
333
+ inheritsFromOrgOrProject: false,
334
334
  access: [],
335
335
  }))).toEqual(false);
336
336
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
337
337
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
338
- isPrivate: true,
338
+ inheritsFromOrgOrProject: false,
339
339
  access: [
340
340
  {
341
341
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -345,7 +345,7 @@ describe('Organization member permissions', () => {
345
345
  }))).toEqual(true);
346
346
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
347
347
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
348
- isPrivate: true,
348
+ inheritsFromOrgOrProject: false,
349
349
  access: [
350
350
  {
351
351
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -355,7 +355,7 @@ describe('Organization member permissions', () => {
355
355
  }))).toEqual(false);
356
356
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
357
357
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
358
- isPrivate: true,
358
+ inheritsFromOrgOrProject: false,
359
359
  access: [
360
360
  {
361
361
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -365,7 +365,7 @@ describe('Organization member permissions', () => {
365
365
  }))).toEqual(true);
366
366
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
367
367
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
368
- isPrivate: true,
368
+ inheritsFromOrgOrProject: false,
369
369
  access: [
370
370
  {
371
371
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -377,25 +377,25 @@ describe('Organization member permissions', () => {
377
377
  it('can view and manage public & accessable saved charts', () => {
378
378
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
379
379
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
380
- isPrivate: false,
380
+ inheritsFromOrgOrProject: true,
381
381
  }))).toEqual(true);
382
382
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
383
383
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
384
- isPrivate: false,
384
+ inheritsFromOrgOrProject: true,
385
385
  }))).toEqual(false);
386
386
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
387
387
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
388
- isPrivate: true,
388
+ inheritsFromOrgOrProject: false,
389
389
  access: [],
390
390
  }))).toEqual(false);
391
391
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
392
392
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
393
- isPrivate: true,
393
+ inheritsFromOrgOrProject: false,
394
394
  access: [],
395
395
  }))).toEqual(false);
396
396
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
397
397
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
398
- isPrivate: true,
398
+ inheritsFromOrgOrProject: false,
399
399
  access: [
400
400
  {
401
401
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -405,7 +405,7 @@ describe('Organization member permissions', () => {
405
405
  }))).toEqual(true);
406
406
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
407
407
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
408
- isPrivate: true,
408
+ inheritsFromOrgOrProject: false,
409
409
  access: [
410
410
  {
411
411
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -415,7 +415,7 @@ describe('Organization member permissions', () => {
415
415
  }))).toEqual(false);
416
416
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
417
417
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
418
- isPrivate: true,
418
+ inheritsFromOrgOrProject: false,
419
419
  access: [
420
420
  {
421
421
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -425,7 +425,7 @@ describe('Organization member permissions', () => {
425
425
  }))).toEqual(true);
426
426
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
427
427
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
428
- isPrivate: true,
428
+ inheritsFromOrgOrProject: false,
429
429
  access: [
430
430
  {
431
431
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -442,25 +442,25 @@ describe('Organization member permissions', () => {
442
442
  it('can view and manage public & accessable space', () => {
443
443
  expect(ability.can('view', (0, ability_1.subject)('Space', {
444
444
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
445
- isPrivate: false,
445
+ inheritsFromOrgOrProject: true,
446
446
  }))).toEqual(true);
447
447
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
448
448
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
449
- isPrivate: false,
449
+ inheritsFromOrgOrProject: true,
450
450
  }))).toEqual(true);
451
451
  expect(ability.can('view', (0, ability_1.subject)('Space', {
452
452
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
453
- isPrivate: true,
453
+ inheritsFromOrgOrProject: false,
454
454
  access: [],
455
455
  }))).toEqual(false);
456
456
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
457
457
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
458
- isPrivate: true,
458
+ inheritsFromOrgOrProject: false,
459
459
  access: [],
460
460
  }))).toEqual(false);
461
461
  expect(ability.can('view', (0, ability_1.subject)('Space', {
462
462
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
463
- isPrivate: true,
463
+ inheritsFromOrgOrProject: false,
464
464
  access: [
465
465
  {
466
466
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -470,7 +470,7 @@ describe('Organization member permissions', () => {
470
470
  }))).toEqual(true);
471
471
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
472
472
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
473
- isPrivate: true,
473
+ inheritsFromOrgOrProject: false,
474
474
  access: [
475
475
  {
476
476
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -480,7 +480,7 @@ describe('Organization member permissions', () => {
480
480
  }))).toEqual(false);
481
481
  expect(ability.can('view', (0, ability_1.subject)('Space', {
482
482
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
483
- isPrivate: true,
483
+ inheritsFromOrgOrProject: false,
484
484
  access: [
485
485
  {
486
486
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -490,7 +490,7 @@ describe('Organization member permissions', () => {
490
490
  }))).toEqual(true);
491
491
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
492
492
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
493
- isPrivate: true,
493
+ inheritsFromOrgOrProject: false,
494
494
  access: [
495
495
  {
496
496
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -500,7 +500,7 @@ describe('Organization member permissions', () => {
500
500
  }))).toEqual(false);
501
501
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
502
502
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
503
- isPrivate: true,
503
+ inheritsFromOrgOrProject: false,
504
504
  access: [
505
505
  {
506
506
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
@@ -512,14 +512,14 @@ describe('Organization member permissions', () => {
512
512
  it('can manage public dashboards from their own organization', () => {
513
513
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
514
514
  organizationUuid: '456',
515
- isPrivate: false,
515
+ inheritsFromOrgOrProject: true,
516
516
  access: [],
517
517
  }))).toEqual(false);
518
518
  });
519
519
  it('cannot manage public dashboards from another organization', () => {
520
520
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
521
521
  organizationUuid: '789',
522
- isPrivate: false,
522
+ inheritsFromOrgOrProject: true,
523
523
  access: [],
524
524
  }))).toEqual(false);
525
525
  });
@@ -698,25 +698,25 @@ describe('Organization member permissions', () => {
698
698
  it('can only view public & accessable dashboards', () => {
699
699
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
700
700
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
701
- isPrivate: false,
701
+ inheritsFromOrgOrProject: true,
702
702
  }))).toEqual(true);
703
703
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
704
704
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
705
- isPrivate: false,
705
+ inheritsFromOrgOrProject: true,
706
706
  }))).toEqual(false);
707
707
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
708
708
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
709
- isPrivate: true,
709
+ inheritsFromOrgOrProject: false,
710
710
  access: [],
711
711
  }))).toEqual(false);
712
712
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
713
713
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
714
- isPrivate: true,
714
+ inheritsFromOrgOrProject: false,
715
715
  access: [],
716
716
  }))).toEqual(false);
717
717
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
718
718
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
719
- isPrivate: true,
719
+ inheritsFromOrgOrProject: false,
720
720
  access: [
721
721
  {
722
722
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -726,7 +726,7 @@ describe('Organization member permissions', () => {
726
726
  }))).toEqual(true);
727
727
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
728
728
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
729
- isPrivate: true,
729
+ inheritsFromOrgOrProject: false,
730
730
  access: [
731
731
  {
732
732
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -736,7 +736,7 @@ describe('Organization member permissions', () => {
736
736
  }))).toEqual(false);
737
737
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
738
738
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
739
- isPrivate: true,
739
+ inheritsFromOrgOrProject: false,
740
740
  access: [
741
741
  {
742
742
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -746,7 +746,7 @@ describe('Organization member permissions', () => {
746
746
  }))).toEqual(true);
747
747
  expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
748
748
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
749
- isPrivate: true,
749
+ inheritsFromOrgOrProject: false,
750
750
  access: [
751
751
  {
752
752
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -758,25 +758,25 @@ describe('Organization member permissions', () => {
758
758
  it('can view and manage public & accessable saved charts', () => {
759
759
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
760
760
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
761
- isPrivate: false,
761
+ inheritsFromOrgOrProject: true,
762
762
  }))).toEqual(true);
763
763
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
764
764
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
765
- isPrivate: false,
765
+ inheritsFromOrgOrProject: true,
766
766
  }))).toEqual(false);
767
767
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
768
768
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
769
- isPrivate: true,
769
+ inheritsFromOrgOrProject: false,
770
770
  access: [],
771
771
  }))).toEqual(false);
772
772
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
773
773
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
774
- isPrivate: true,
774
+ inheritsFromOrgOrProject: false,
775
775
  access: [],
776
776
  }))).toEqual(false);
777
777
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
778
778
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
779
- isPrivate: true,
779
+ inheritsFromOrgOrProject: false,
780
780
  access: [
781
781
  {
782
782
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -786,7 +786,7 @@ describe('Organization member permissions', () => {
786
786
  }))).toEqual(true);
787
787
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
788
788
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
789
- isPrivate: true,
789
+ inheritsFromOrgOrProject: false,
790
790
  access: [
791
791
  {
792
792
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -796,7 +796,7 @@ describe('Organization member permissions', () => {
796
796
  }))).toEqual(false);
797
797
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
798
798
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
799
- isPrivate: true,
799
+ inheritsFromOrgOrProject: false,
800
800
  access: [
801
801
  {
802
802
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -806,7 +806,7 @@ describe('Organization member permissions', () => {
806
806
  }))).toEqual(true);
807
807
  expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
808
808
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
809
- isPrivate: true,
809
+ inheritsFromOrgOrProject: false,
810
810
  access: [
811
811
  {
812
812
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -818,25 +818,25 @@ describe('Organization member permissions', () => {
818
818
  it('can view and manage public & accessable space', () => {
819
819
  expect(ability.can('view', (0, ability_1.subject)('Space', {
820
820
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
821
- isPrivate: false,
821
+ inheritsFromOrgOrProject: true,
822
822
  }))).toEqual(true);
823
823
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
824
824
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
825
- isPrivate: false,
825
+ inheritsFromOrgOrProject: true,
826
826
  }))).toEqual(false);
827
827
  expect(ability.can('view', (0, ability_1.subject)('Space', {
828
828
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
829
- isPrivate: true,
829
+ inheritsFromOrgOrProject: false,
830
830
  access: [],
831
831
  }))).toEqual(false);
832
832
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
833
833
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
834
- isPrivate: true,
834
+ inheritsFromOrgOrProject: false,
835
835
  access: [],
836
836
  }))).toEqual(false);
837
837
  expect(ability.can('view', (0, ability_1.subject)('Space', {
838
838
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
839
- isPrivate: true,
839
+ inheritsFromOrgOrProject: false,
840
840
  access: [
841
841
  {
842
842
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -846,7 +846,7 @@ describe('Organization member permissions', () => {
846
846
  }))).toEqual(true);
847
847
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
848
848
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
849
- isPrivate: true,
849
+ inheritsFromOrgOrProject: false,
850
850
  access: [
851
851
  {
852
852
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -856,7 +856,7 @@ describe('Organization member permissions', () => {
856
856
  }))).toEqual(false);
857
857
  expect(ability.can('view', (0, ability_1.subject)('Space', {
858
858
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
859
- isPrivate: true,
859
+ inheritsFromOrgOrProject: false,
860
860
  access: [
861
861
  {
862
862
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -866,7 +866,7 @@ describe('Organization member permissions', () => {
866
866
  }))).toEqual(true);
867
867
  expect(ability.can('manage', (0, ability_1.subject)('Space', {
868
868
  organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
869
- isPrivate: true,
869
+ inheritsFromOrgOrProject: false,
870
870
  access: [
871
871
  {
872
872
  userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
@@ -955,7 +955,10 @@ describe('Organization member permissions', () => {
955
955
  expect(ability.can('view', (0, ability_1.subject)('Organization', org))).toEqual(false);
956
956
  });
957
957
  it('can view dashboards from their own organization', () => {
958
- const org = { organizationUuid: '456', isPrivate: false };
958
+ const org = {
959
+ organizationUuid: '456',
960
+ inheritsFromOrgOrProject: true,
961
+ };
959
962
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', org))).toEqual(true);
960
963
  });
961
964
  it('cannot view dashboards from another organization', () => {
@@ -964,13 +967,13 @@ describe('Organization member permissions', () => {
964
967
  it('can view savedCharts from their own organization', () => {
965
968
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
966
969
  organizationUuid: '456',
967
- isPrivate: false,
970
+ inheritsFromOrgOrProject: true,
968
971
  }))).toEqual(true);
969
972
  });
970
973
  it('cannot view savedCharts from another organization', () => {
971
974
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
972
975
  organizationUuid: '789',
973
- isPrivate: false,
976
+ inheritsFromOrgOrProject: true,
974
977
  }))).toEqual(false);
975
978
  });
976
979
  it('can view projects from their own organization', () => {
@@ -1130,25 +1133,28 @@ describe('Organization member permissions', () => {
1130
1133
  expect(ability.can('view', (0, ability_1.subject)('Organization', org))).toEqual(false);
1131
1134
  });
1132
1135
  it('can view dashboards from their own organization', () => {
1133
- const org = { organizationUuid: '456', isPrivate: false };
1136
+ const org = {
1137
+ organizationUuid: '456',
1138
+ inheritsFromOrgOrProject: true,
1139
+ };
1134
1140
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', org))).toEqual(true);
1135
1141
  });
1136
1142
  it('cannot view dashboards from another organization', () => {
1137
1143
  expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
1138
1144
  organizationUuid: '789',
1139
- isPrivate: false,
1145
+ inheritsFromOrgOrProject: true,
1140
1146
  }))).toEqual(false);
1141
1147
  });
1142
1148
  it('can view savedCharts from their own organization', () => {
1143
1149
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
1144
1150
  organizationUuid: '456',
1145
- isPrivate: false,
1151
+ inheritsFromOrgOrProject: true,
1146
1152
  }))).toEqual(true);
1147
1153
  });
1148
1154
  it('cannot view savedCharts from another organization', () => {
1149
1155
  expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
1150
1156
  organizationUuid: '789',
1151
- isPrivate: false,
1157
+ inheritsFromOrgOrProject: true,
1152
1158
  }))).toEqual(false);
1153
1159
  });
1154
1160
  it('can view projects from their own organization', () => {