@lightdash/common 0.2561.0 → 0.2563.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/.tsbuildinfo +1 -1
- package/dist/cjs/authorization/index.mock.d.ts +1 -1
- package/dist/cjs/authorization/index.mock.js +1 -1
- package/dist/cjs/authorization/index.mock.js.map +1 -1
- package/dist/cjs/authorization/index.test.js +12 -12
- package/dist/cjs/authorization/index.test.js.map +1 -1
- package/dist/cjs/authorization/jwtAbility.test.js +2 -2
- package/dist/cjs/authorization/jwtAbility.test.js.map +1 -1
- package/dist/cjs/authorization/organizationMemberAbility.d.ts.map +1 -1
- package/dist/cjs/authorization/organizationMemberAbility.js +20 -0
- package/dist/cjs/authorization/organizationMemberAbility.js.map +1 -1
- package/dist/cjs/authorization/organizationMemberAbility.test.js +88 -82
- package/dist/cjs/authorization/organizationMemberAbility.test.js.map +1 -1
- package/dist/cjs/authorization/projectMemberAbility.d.ts.map +1 -1
- package/dist/cjs/authorization/projectMemberAbility.js +20 -0
- package/dist/cjs/authorization/projectMemberAbility.js.map +1 -1
- package/dist/cjs/authorization/projectMemberAbility.test.js +124 -94
- package/dist/cjs/authorization/projectMemberAbility.test.js.map +1 -1
- package/dist/cjs/authorization/roleToScopeMapping.test.js +8 -8
- package/dist/cjs/authorization/roleToScopeMapping.test.js.map +1 -1
- package/dist/cjs/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
- package/dist/cjs/authorization/roleToScopeMapping.testUtils.js +4 -4
- package/dist/cjs/authorization/roleToScopeMapping.testUtils.js.map +1 -1
- package/dist/cjs/authorization/roleToScopeParity.test.js +10 -3
- package/dist/cjs/authorization/roleToScopeParity.test.js.map +1 -1
- package/dist/cjs/authorization/scopeAbilityBuilder.test.js +17 -17
- package/dist/cjs/authorization/scopeAbilityBuilder.test.js.map +1 -1
- package/dist/cjs/authorization/scopes.d.ts.map +1 -1
- package/dist/cjs/authorization/scopes.js +8 -0
- package/dist/cjs/authorization/scopes.js.map +1 -1
- package/dist/cjs/authorization/serviceAccountAbility.d.ts.map +1 -1
- package/dist/cjs/authorization/serviceAccountAbility.js +20 -0
- package/dist/cjs/authorization/serviceAccountAbility.js.map +1 -1
- package/dist/cjs/types/api.d.ts +2 -2
- package/dist/cjs/types/api.d.ts.map +1 -1
- package/dist/cjs/types/api.js.map +1 -1
- package/dist/cjs/types/dashboard.d.ts +2 -1
- package/dist/cjs/types/dashboard.d.ts.map +1 -1
- package/dist/cjs/types/dashboard.js.map +1 -1
- package/dist/cjs/types/metricQuery.d.ts +4 -0
- package/dist/cjs/types/metricQuery.d.ts.map +1 -1
- package/dist/cjs/types/metricQuery.js.map +1 -1
- package/dist/cjs/types/preAggregate.d.ts +27 -0
- package/dist/cjs/types/preAggregate.d.ts.map +1 -1
- package/dist/cjs/types/savedCharts.d.ts +3 -2
- package/dist/cjs/types/savedCharts.d.ts.map +1 -1
- package/dist/cjs/types/savedCharts.js.map +1 -1
- package/dist/cjs/types/space.d.ts +1 -0
- package/dist/cjs/types/space.d.ts.map +1 -1
- package/dist/cjs/types/space.js.map +1 -1
- package/dist/cjs/utils/tableCalculationFunctions.d.ts +55 -2
- package/dist/cjs/utils/tableCalculationFunctions.d.ts.map +1 -1
- package/dist/cjs/utils/tableCalculationFunctions.js +151 -1
- package/dist/cjs/utils/tableCalculationFunctions.js.map +1 -1
- package/dist/cjs/utils/tableCalculationFunctions.test.js +178 -0
- package/dist/cjs/utils/tableCalculationFunctions.test.js.map +1 -1
- package/dist/esm/.tsbuildinfo +1 -1
- package/dist/esm/authorization/index.mock.d.ts +1 -1
- package/dist/esm/authorization/index.mock.js +1 -1
- package/dist/esm/authorization/index.mock.js.map +1 -1
- package/dist/esm/authorization/index.test.js +12 -12
- package/dist/esm/authorization/index.test.js.map +1 -1
- package/dist/esm/authorization/jwtAbility.test.js +2 -2
- package/dist/esm/authorization/jwtAbility.test.js.map +1 -1
- package/dist/esm/authorization/organizationMemberAbility.d.ts.map +1 -1
- package/dist/esm/authorization/organizationMemberAbility.js +20 -0
- package/dist/esm/authorization/organizationMemberAbility.js.map +1 -1
- package/dist/esm/authorization/organizationMemberAbility.test.js +88 -82
- package/dist/esm/authorization/organizationMemberAbility.test.js.map +1 -1
- package/dist/esm/authorization/projectMemberAbility.d.ts.map +1 -1
- package/dist/esm/authorization/projectMemberAbility.js +20 -0
- package/dist/esm/authorization/projectMemberAbility.js.map +1 -1
- package/dist/esm/authorization/projectMemberAbility.test.js +124 -94
- package/dist/esm/authorization/projectMemberAbility.test.js.map +1 -1
- package/dist/esm/authorization/roleToScopeMapping.test.js +8 -8
- package/dist/esm/authorization/roleToScopeMapping.test.js.map +1 -1
- package/dist/esm/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
- package/dist/esm/authorization/roleToScopeMapping.testUtils.js +4 -4
- package/dist/esm/authorization/roleToScopeMapping.testUtils.js.map +1 -1
- package/dist/esm/authorization/roleToScopeParity.test.js +10 -3
- package/dist/esm/authorization/roleToScopeParity.test.js.map +1 -1
- package/dist/esm/authorization/scopeAbilityBuilder.test.js +17 -17
- package/dist/esm/authorization/scopeAbilityBuilder.test.js.map +1 -1
- package/dist/esm/authorization/scopes.d.ts.map +1 -1
- package/dist/esm/authorization/scopes.js +8 -0
- package/dist/esm/authorization/scopes.js.map +1 -1
- package/dist/esm/authorization/serviceAccountAbility.d.ts.map +1 -1
- package/dist/esm/authorization/serviceAccountAbility.js +20 -0
- package/dist/esm/authorization/serviceAccountAbility.js.map +1 -1
- package/dist/esm/types/api.d.ts +2 -2
- package/dist/esm/types/api.d.ts.map +1 -1
- package/dist/esm/types/api.js.map +1 -1
- package/dist/esm/types/dashboard.d.ts +2 -1
- package/dist/esm/types/dashboard.d.ts.map +1 -1
- package/dist/esm/types/dashboard.js.map +1 -1
- package/dist/esm/types/metricQuery.d.ts +4 -0
- package/dist/esm/types/metricQuery.d.ts.map +1 -1
- package/dist/esm/types/metricQuery.js.map +1 -1
- package/dist/esm/types/preAggregate.d.ts +27 -0
- package/dist/esm/types/preAggregate.d.ts.map +1 -1
- package/dist/esm/types/savedCharts.d.ts +3 -2
- package/dist/esm/types/savedCharts.d.ts.map +1 -1
- package/dist/esm/types/savedCharts.js.map +1 -1
- package/dist/esm/types/space.d.ts +1 -0
- package/dist/esm/types/space.d.ts.map +1 -1
- package/dist/esm/types/space.js.map +1 -1
- package/dist/esm/utils/tableCalculationFunctions.d.ts +55 -2
- package/dist/esm/utils/tableCalculationFunctions.d.ts.map +1 -1
- package/dist/esm/utils/tableCalculationFunctions.js +146 -0
- package/dist/esm/utils/tableCalculationFunctions.js.map +1 -1
- package/dist/esm/utils/tableCalculationFunctions.test.js +179 -1
- package/dist/esm/utils/tableCalculationFunctions.test.js.map +1 -1
- package/dist/types/.tsbuildinfo +1 -1
- package/dist/types/authorization/index.mock.d.ts +1 -1
- package/dist/types/authorization/index.mock.js +1 -1
- package/dist/types/authorization/index.mock.js.map +1 -1
- package/dist/types/authorization/index.test.js +12 -12
- package/dist/types/authorization/index.test.js.map +1 -1
- package/dist/types/authorization/jwtAbility.test.js +2 -2
- package/dist/types/authorization/jwtAbility.test.js.map +1 -1
- package/dist/types/authorization/organizationMemberAbility.d.ts.map +1 -1
- package/dist/types/authorization/organizationMemberAbility.js +20 -0
- package/dist/types/authorization/organizationMemberAbility.js.map +1 -1
- package/dist/types/authorization/organizationMemberAbility.test.js +88 -82
- package/dist/types/authorization/organizationMemberAbility.test.js.map +1 -1
- package/dist/types/authorization/projectMemberAbility.d.ts.map +1 -1
- package/dist/types/authorization/projectMemberAbility.js +20 -0
- package/dist/types/authorization/projectMemberAbility.js.map +1 -1
- package/dist/types/authorization/projectMemberAbility.test.js +124 -94
- package/dist/types/authorization/projectMemberAbility.test.js.map +1 -1
- package/dist/types/authorization/roleToScopeMapping.test.js +8 -8
- package/dist/types/authorization/roleToScopeMapping.test.js.map +1 -1
- package/dist/types/authorization/roleToScopeMapping.testUtils.d.ts +119 -119
- package/dist/types/authorization/roleToScopeMapping.testUtils.js +4 -4
- package/dist/types/authorization/roleToScopeMapping.testUtils.js.map +1 -1
- package/dist/types/authorization/roleToScopeParity.test.js +10 -3
- package/dist/types/authorization/roleToScopeParity.test.js.map +1 -1
- package/dist/types/authorization/scopeAbilityBuilder.test.js +17 -17
- package/dist/types/authorization/scopeAbilityBuilder.test.js.map +1 -1
- package/dist/types/authorization/scopes.d.ts.map +1 -1
- package/dist/types/authorization/scopes.js +8 -0
- package/dist/types/authorization/scopes.js.map +1 -1
- package/dist/types/authorization/serviceAccountAbility.d.ts.map +1 -1
- package/dist/types/authorization/serviceAccountAbility.js +20 -0
- package/dist/types/authorization/serviceAccountAbility.js.map +1 -1
- package/dist/types/types/api.d.ts +2 -2
- package/dist/types/types/api.d.ts.map +1 -1
- package/dist/types/types/api.js.map +1 -1
- package/dist/types/types/dashboard.d.ts +2 -1
- package/dist/types/types/dashboard.d.ts.map +1 -1
- package/dist/types/types/dashboard.js.map +1 -1
- package/dist/types/types/metricQuery.d.ts +4 -0
- package/dist/types/types/metricQuery.d.ts.map +1 -1
- package/dist/types/types/metricQuery.js.map +1 -1
- package/dist/types/types/preAggregate.d.ts +27 -0
- package/dist/types/types/preAggregate.d.ts.map +1 -1
- package/dist/types/types/savedCharts.d.ts +3 -2
- package/dist/types/types/savedCharts.d.ts.map +1 -1
- package/dist/types/types/savedCharts.js.map +1 -1
- package/dist/types/types/space.d.ts +1 -0
- package/dist/types/types/space.d.ts.map +1 -1
- package/dist/types/types/space.js.map +1 -1
- package/dist/types/utils/tableCalculationFunctions.d.ts +55 -2
- package/dist/types/utils/tableCalculationFunctions.d.ts.map +1 -1
- package/dist/types/utils/tableCalculationFunctions.js +146 -0
- package/dist/types/utils/tableCalculationFunctions.js.map +1 -1
- package/dist/types/utils/tableCalculationFunctions.test.js +179 -1
- package/dist/types/utils/tableCalculationFunctions.test.js.map +1 -1
- package/package.json +1 -1
|
@@ -57,25 +57,25 @@ describe('Organization member permissions', () => {
|
|
|
57
57
|
it('can view and manage all kinds of dashboards', () => {
|
|
58
58
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
59
59
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
60
|
-
|
|
60
|
+
inheritsFromOrgOrProject: true,
|
|
61
61
|
}))).toEqual(true);
|
|
62
62
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
63
63
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
64
|
-
|
|
64
|
+
inheritsFromOrgOrProject: true,
|
|
65
65
|
}))).toEqual(true);
|
|
66
66
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
67
67
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
68
|
-
|
|
68
|
+
inheritsFromOrgOrProject: false,
|
|
69
69
|
access: [],
|
|
70
70
|
}))).toEqual(true);
|
|
71
71
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
72
72
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
73
|
-
|
|
73
|
+
inheritsFromOrgOrProject: false,
|
|
74
74
|
access: [],
|
|
75
75
|
}))).toEqual(true);
|
|
76
76
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
77
77
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
78
|
-
|
|
78
|
+
inheritsFromOrgOrProject: false,
|
|
79
79
|
access: [
|
|
80
80
|
{
|
|
81
81
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -85,7 +85,7 @@ describe('Organization member permissions', () => {
|
|
|
85
85
|
}))).toEqual(true);
|
|
86
86
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
87
87
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
88
|
-
|
|
88
|
+
inheritsFromOrgOrProject: false,
|
|
89
89
|
access: [
|
|
90
90
|
{
|
|
91
91
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -95,7 +95,7 @@ describe('Organization member permissions', () => {
|
|
|
95
95
|
}))).toEqual(true);
|
|
96
96
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
97
97
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
98
|
-
|
|
98
|
+
inheritsFromOrgOrProject: false,
|
|
99
99
|
access: [
|
|
100
100
|
{
|
|
101
101
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -105,7 +105,7 @@ describe('Organization member permissions', () => {
|
|
|
105
105
|
}))).toEqual(true);
|
|
106
106
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
107
107
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
108
|
-
|
|
108
|
+
inheritsFromOrgOrProject: false,
|
|
109
109
|
access: [
|
|
110
110
|
{
|
|
111
111
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -117,25 +117,25 @@ describe('Organization member permissions', () => {
|
|
|
117
117
|
it('can view and manage all kinds of saved charts', () => {
|
|
118
118
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
119
119
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
120
|
-
|
|
120
|
+
inheritsFromOrgOrProject: true,
|
|
121
121
|
}))).toEqual(true);
|
|
122
122
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
123
123
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
124
|
-
|
|
124
|
+
inheritsFromOrgOrProject: true,
|
|
125
125
|
}))).toEqual(true);
|
|
126
126
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
127
127
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
128
|
-
|
|
128
|
+
inheritsFromOrgOrProject: false,
|
|
129
129
|
access: [],
|
|
130
130
|
}))).toEqual(true);
|
|
131
131
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
132
132
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
133
|
-
|
|
133
|
+
inheritsFromOrgOrProject: false,
|
|
134
134
|
access: [],
|
|
135
135
|
}))).toEqual(true);
|
|
136
136
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
137
137
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
138
|
-
|
|
138
|
+
inheritsFromOrgOrProject: false,
|
|
139
139
|
access: [
|
|
140
140
|
{
|
|
141
141
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -145,7 +145,7 @@ describe('Organization member permissions', () => {
|
|
|
145
145
|
}))).toEqual(true);
|
|
146
146
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
147
147
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
148
|
-
|
|
148
|
+
inheritsFromOrgOrProject: false,
|
|
149
149
|
access: [
|
|
150
150
|
{
|
|
151
151
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -155,7 +155,7 @@ describe('Organization member permissions', () => {
|
|
|
155
155
|
}))).toEqual(true);
|
|
156
156
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
157
157
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
158
|
-
|
|
158
|
+
inheritsFromOrgOrProject: false,
|
|
159
159
|
access: [
|
|
160
160
|
{
|
|
161
161
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -165,7 +165,7 @@ describe('Organization member permissions', () => {
|
|
|
165
165
|
}))).toEqual(true);
|
|
166
166
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
167
167
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
168
|
-
|
|
168
|
+
inheritsFromOrgOrProject: false,
|
|
169
169
|
access: [
|
|
170
170
|
{
|
|
171
171
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -177,25 +177,25 @@ describe('Organization member permissions', () => {
|
|
|
177
177
|
it('can view and manage all kinds of space', () => {
|
|
178
178
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
179
179
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
180
|
-
|
|
180
|
+
inheritsFromOrgOrProject: true,
|
|
181
181
|
}))).toEqual(true);
|
|
182
182
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
183
183
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
184
|
-
|
|
184
|
+
inheritsFromOrgOrProject: true,
|
|
185
185
|
}))).toEqual(true);
|
|
186
186
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
187
187
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
188
|
-
|
|
188
|
+
inheritsFromOrgOrProject: false,
|
|
189
189
|
access: [],
|
|
190
190
|
}))).toEqual(true);
|
|
191
191
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
192
192
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
193
|
-
|
|
193
|
+
inheritsFromOrgOrProject: false,
|
|
194
194
|
access: [],
|
|
195
195
|
}))).toEqual(true);
|
|
196
196
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
197
197
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
198
|
-
|
|
198
|
+
inheritsFromOrgOrProject: false,
|
|
199
199
|
access: [
|
|
200
200
|
{
|
|
201
201
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -205,7 +205,7 @@ describe('Organization member permissions', () => {
|
|
|
205
205
|
}))).toEqual(true);
|
|
206
206
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
207
207
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
208
|
-
|
|
208
|
+
inheritsFromOrgOrProject: false,
|
|
209
209
|
access: [
|
|
210
210
|
{
|
|
211
211
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -215,7 +215,7 @@ describe('Organization member permissions', () => {
|
|
|
215
215
|
}))).toEqual(true);
|
|
216
216
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
217
217
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
218
|
-
|
|
218
|
+
inheritsFromOrgOrProject: false,
|
|
219
219
|
access: [
|
|
220
220
|
{
|
|
221
221
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -225,7 +225,7 @@ describe('Organization member permissions', () => {
|
|
|
225
225
|
}))).toEqual(true);
|
|
226
226
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
227
227
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.organizationUuid,
|
|
228
|
-
|
|
228
|
+
inheritsFromOrgOrProject: false,
|
|
229
229
|
access: [
|
|
230
230
|
{
|
|
231
231
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_ADMIN.userUuid,
|
|
@@ -317,25 +317,25 @@ describe('Organization member permissions', () => {
|
|
|
317
317
|
it('can view and manage public & accessable dashboards', () => {
|
|
318
318
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
319
319
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
320
|
-
|
|
320
|
+
inheritsFromOrgOrProject: true,
|
|
321
321
|
}))).toEqual(true);
|
|
322
322
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
323
323
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
324
|
-
|
|
324
|
+
inheritsFromOrgOrProject: true,
|
|
325
325
|
}))).toEqual(false);
|
|
326
326
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
327
327
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
328
|
-
|
|
328
|
+
inheritsFromOrgOrProject: false,
|
|
329
329
|
access: [],
|
|
330
330
|
}))).toEqual(false);
|
|
331
331
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
332
332
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
333
|
-
|
|
333
|
+
inheritsFromOrgOrProject: false,
|
|
334
334
|
access: [],
|
|
335
335
|
}))).toEqual(false);
|
|
336
336
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
337
337
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
338
|
-
|
|
338
|
+
inheritsFromOrgOrProject: false,
|
|
339
339
|
access: [
|
|
340
340
|
{
|
|
341
341
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -345,7 +345,7 @@ describe('Organization member permissions', () => {
|
|
|
345
345
|
}))).toEqual(true);
|
|
346
346
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
347
347
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
348
|
-
|
|
348
|
+
inheritsFromOrgOrProject: false,
|
|
349
349
|
access: [
|
|
350
350
|
{
|
|
351
351
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -355,7 +355,7 @@ describe('Organization member permissions', () => {
|
|
|
355
355
|
}))).toEqual(false);
|
|
356
356
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
357
357
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
358
|
-
|
|
358
|
+
inheritsFromOrgOrProject: false,
|
|
359
359
|
access: [
|
|
360
360
|
{
|
|
361
361
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -365,7 +365,7 @@ describe('Organization member permissions', () => {
|
|
|
365
365
|
}))).toEqual(true);
|
|
366
366
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
367
367
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
368
|
-
|
|
368
|
+
inheritsFromOrgOrProject: false,
|
|
369
369
|
access: [
|
|
370
370
|
{
|
|
371
371
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -377,25 +377,25 @@ describe('Organization member permissions', () => {
|
|
|
377
377
|
it('can view and manage public & accessable saved charts', () => {
|
|
378
378
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
379
379
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
380
|
-
|
|
380
|
+
inheritsFromOrgOrProject: true,
|
|
381
381
|
}))).toEqual(true);
|
|
382
382
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
383
383
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
384
|
-
|
|
384
|
+
inheritsFromOrgOrProject: true,
|
|
385
385
|
}))).toEqual(false);
|
|
386
386
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
387
387
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
388
|
-
|
|
388
|
+
inheritsFromOrgOrProject: false,
|
|
389
389
|
access: [],
|
|
390
390
|
}))).toEqual(false);
|
|
391
391
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
392
392
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
393
|
-
|
|
393
|
+
inheritsFromOrgOrProject: false,
|
|
394
394
|
access: [],
|
|
395
395
|
}))).toEqual(false);
|
|
396
396
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
397
397
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
398
|
-
|
|
398
|
+
inheritsFromOrgOrProject: false,
|
|
399
399
|
access: [
|
|
400
400
|
{
|
|
401
401
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -405,7 +405,7 @@ describe('Organization member permissions', () => {
|
|
|
405
405
|
}))).toEqual(true);
|
|
406
406
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
407
407
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
408
|
-
|
|
408
|
+
inheritsFromOrgOrProject: false,
|
|
409
409
|
access: [
|
|
410
410
|
{
|
|
411
411
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -415,7 +415,7 @@ describe('Organization member permissions', () => {
|
|
|
415
415
|
}))).toEqual(false);
|
|
416
416
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
417
417
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
418
|
-
|
|
418
|
+
inheritsFromOrgOrProject: false,
|
|
419
419
|
access: [
|
|
420
420
|
{
|
|
421
421
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -425,7 +425,7 @@ describe('Organization member permissions', () => {
|
|
|
425
425
|
}))).toEqual(true);
|
|
426
426
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
427
427
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
428
|
-
|
|
428
|
+
inheritsFromOrgOrProject: false,
|
|
429
429
|
access: [
|
|
430
430
|
{
|
|
431
431
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -442,25 +442,25 @@ describe('Organization member permissions', () => {
|
|
|
442
442
|
it('can view and manage public & accessable space', () => {
|
|
443
443
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
444
444
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
445
|
-
|
|
445
|
+
inheritsFromOrgOrProject: true,
|
|
446
446
|
}))).toEqual(true);
|
|
447
447
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
448
448
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
449
|
-
|
|
449
|
+
inheritsFromOrgOrProject: true,
|
|
450
450
|
}))).toEqual(true);
|
|
451
451
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
452
452
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
453
|
-
|
|
453
|
+
inheritsFromOrgOrProject: false,
|
|
454
454
|
access: [],
|
|
455
455
|
}))).toEqual(false);
|
|
456
456
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
457
457
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
458
|
-
|
|
458
|
+
inheritsFromOrgOrProject: false,
|
|
459
459
|
access: [],
|
|
460
460
|
}))).toEqual(false);
|
|
461
461
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
462
462
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
463
|
-
|
|
463
|
+
inheritsFromOrgOrProject: false,
|
|
464
464
|
access: [
|
|
465
465
|
{
|
|
466
466
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -470,7 +470,7 @@ describe('Organization member permissions', () => {
|
|
|
470
470
|
}))).toEqual(true);
|
|
471
471
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
472
472
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
473
|
-
|
|
473
|
+
inheritsFromOrgOrProject: false,
|
|
474
474
|
access: [
|
|
475
475
|
{
|
|
476
476
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -480,7 +480,7 @@ describe('Organization member permissions', () => {
|
|
|
480
480
|
}))).toEqual(false);
|
|
481
481
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
482
482
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
483
|
-
|
|
483
|
+
inheritsFromOrgOrProject: false,
|
|
484
484
|
access: [
|
|
485
485
|
{
|
|
486
486
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -490,7 +490,7 @@ describe('Organization member permissions', () => {
|
|
|
490
490
|
}))).toEqual(true);
|
|
491
491
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
492
492
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
493
|
-
|
|
493
|
+
inheritsFromOrgOrProject: false,
|
|
494
494
|
access: [
|
|
495
495
|
{
|
|
496
496
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -500,7 +500,7 @@ describe('Organization member permissions', () => {
|
|
|
500
500
|
}))).toEqual(false);
|
|
501
501
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
502
502
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.organizationUuid,
|
|
503
|
-
|
|
503
|
+
inheritsFromOrgOrProject: false,
|
|
504
504
|
access: [
|
|
505
505
|
{
|
|
506
506
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_EDITOR.userUuid,
|
|
@@ -512,14 +512,14 @@ describe('Organization member permissions', () => {
|
|
|
512
512
|
it('can manage public dashboards from their own organization', () => {
|
|
513
513
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
514
514
|
organizationUuid: '456',
|
|
515
|
-
|
|
515
|
+
inheritsFromOrgOrProject: true,
|
|
516
516
|
access: [],
|
|
517
517
|
}))).toEqual(false);
|
|
518
518
|
});
|
|
519
519
|
it('cannot manage public dashboards from another organization', () => {
|
|
520
520
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
521
521
|
organizationUuid: '789',
|
|
522
|
-
|
|
522
|
+
inheritsFromOrgOrProject: true,
|
|
523
523
|
access: [],
|
|
524
524
|
}))).toEqual(false);
|
|
525
525
|
});
|
|
@@ -698,25 +698,25 @@ describe('Organization member permissions', () => {
|
|
|
698
698
|
it('can only view public & accessable dashboards', () => {
|
|
699
699
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
700
700
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
701
|
-
|
|
701
|
+
inheritsFromOrgOrProject: true,
|
|
702
702
|
}))).toEqual(true);
|
|
703
703
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
704
704
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
705
|
-
|
|
705
|
+
inheritsFromOrgOrProject: true,
|
|
706
706
|
}))).toEqual(false);
|
|
707
707
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
708
708
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
709
|
-
|
|
709
|
+
inheritsFromOrgOrProject: false,
|
|
710
710
|
access: [],
|
|
711
711
|
}))).toEqual(false);
|
|
712
712
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
713
713
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
714
|
-
|
|
714
|
+
inheritsFromOrgOrProject: false,
|
|
715
715
|
access: [],
|
|
716
716
|
}))).toEqual(false);
|
|
717
717
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
718
718
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
719
|
-
|
|
719
|
+
inheritsFromOrgOrProject: false,
|
|
720
720
|
access: [
|
|
721
721
|
{
|
|
722
722
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -726,7 +726,7 @@ describe('Organization member permissions', () => {
|
|
|
726
726
|
}))).toEqual(true);
|
|
727
727
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
728
728
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
729
|
-
|
|
729
|
+
inheritsFromOrgOrProject: false,
|
|
730
730
|
access: [
|
|
731
731
|
{
|
|
732
732
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -736,7 +736,7 @@ describe('Organization member permissions', () => {
|
|
|
736
736
|
}))).toEqual(false);
|
|
737
737
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
738
738
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
739
|
-
|
|
739
|
+
inheritsFromOrgOrProject: false,
|
|
740
740
|
access: [
|
|
741
741
|
{
|
|
742
742
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -746,7 +746,7 @@ describe('Organization member permissions', () => {
|
|
|
746
746
|
}))).toEqual(true);
|
|
747
747
|
expect(ability.can('manage', (0, ability_1.subject)('Dashboard', {
|
|
748
748
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
749
|
-
|
|
749
|
+
inheritsFromOrgOrProject: false,
|
|
750
750
|
access: [
|
|
751
751
|
{
|
|
752
752
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -758,25 +758,25 @@ describe('Organization member permissions', () => {
|
|
|
758
758
|
it('can view and manage public & accessable saved charts', () => {
|
|
759
759
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
760
760
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
761
|
-
|
|
761
|
+
inheritsFromOrgOrProject: true,
|
|
762
762
|
}))).toEqual(true);
|
|
763
763
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
764
764
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
765
|
-
|
|
765
|
+
inheritsFromOrgOrProject: true,
|
|
766
766
|
}))).toEqual(false);
|
|
767
767
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
768
768
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
769
|
-
|
|
769
|
+
inheritsFromOrgOrProject: false,
|
|
770
770
|
access: [],
|
|
771
771
|
}))).toEqual(false);
|
|
772
772
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
773
773
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
774
|
-
|
|
774
|
+
inheritsFromOrgOrProject: false,
|
|
775
775
|
access: [],
|
|
776
776
|
}))).toEqual(false);
|
|
777
777
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
778
778
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
779
|
-
|
|
779
|
+
inheritsFromOrgOrProject: false,
|
|
780
780
|
access: [
|
|
781
781
|
{
|
|
782
782
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -786,7 +786,7 @@ describe('Organization member permissions', () => {
|
|
|
786
786
|
}))).toEqual(true);
|
|
787
787
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
788
788
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
789
|
-
|
|
789
|
+
inheritsFromOrgOrProject: false,
|
|
790
790
|
access: [
|
|
791
791
|
{
|
|
792
792
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -796,7 +796,7 @@ describe('Organization member permissions', () => {
|
|
|
796
796
|
}))).toEqual(false);
|
|
797
797
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
798
798
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
799
|
-
|
|
799
|
+
inheritsFromOrgOrProject: false,
|
|
800
800
|
access: [
|
|
801
801
|
{
|
|
802
802
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -806,7 +806,7 @@ describe('Organization member permissions', () => {
|
|
|
806
806
|
}))).toEqual(true);
|
|
807
807
|
expect(ability.can('manage', (0, ability_1.subject)('SavedChart', {
|
|
808
808
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
809
|
-
|
|
809
|
+
inheritsFromOrgOrProject: false,
|
|
810
810
|
access: [
|
|
811
811
|
{
|
|
812
812
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -818,25 +818,25 @@ describe('Organization member permissions', () => {
|
|
|
818
818
|
it('can view and manage public & accessable space', () => {
|
|
819
819
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
820
820
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
821
|
-
|
|
821
|
+
inheritsFromOrgOrProject: true,
|
|
822
822
|
}))).toEqual(true);
|
|
823
823
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
824
824
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
825
|
-
|
|
825
|
+
inheritsFromOrgOrProject: true,
|
|
826
826
|
}))).toEqual(false);
|
|
827
827
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
828
828
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
829
|
-
|
|
829
|
+
inheritsFromOrgOrProject: false,
|
|
830
830
|
access: [],
|
|
831
831
|
}))).toEqual(false);
|
|
832
832
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
833
833
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
834
|
-
|
|
834
|
+
inheritsFromOrgOrProject: false,
|
|
835
835
|
access: [],
|
|
836
836
|
}))).toEqual(false);
|
|
837
837
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
838
838
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
839
|
-
|
|
839
|
+
inheritsFromOrgOrProject: false,
|
|
840
840
|
access: [
|
|
841
841
|
{
|
|
842
842
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -846,7 +846,7 @@ describe('Organization member permissions', () => {
|
|
|
846
846
|
}))).toEqual(true);
|
|
847
847
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
848
848
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
849
|
-
|
|
849
|
+
inheritsFromOrgOrProject: false,
|
|
850
850
|
access: [
|
|
851
851
|
{
|
|
852
852
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -856,7 +856,7 @@ describe('Organization member permissions', () => {
|
|
|
856
856
|
}))).toEqual(false);
|
|
857
857
|
expect(ability.can('view', (0, ability_1.subject)('Space', {
|
|
858
858
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
859
|
-
|
|
859
|
+
inheritsFromOrgOrProject: false,
|
|
860
860
|
access: [
|
|
861
861
|
{
|
|
862
862
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -866,7 +866,7 @@ describe('Organization member permissions', () => {
|
|
|
866
866
|
}))).toEqual(true);
|
|
867
867
|
expect(ability.can('manage', (0, ability_1.subject)('Space', {
|
|
868
868
|
organizationUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.organizationUuid,
|
|
869
|
-
|
|
869
|
+
inheritsFromOrgOrProject: false,
|
|
870
870
|
access: [
|
|
871
871
|
{
|
|
872
872
|
userUuid: organizationMemberAbility_mock_1.ORGANIZATION_VIEWER.userUuid,
|
|
@@ -955,7 +955,10 @@ describe('Organization member permissions', () => {
|
|
|
955
955
|
expect(ability.can('view', (0, ability_1.subject)('Organization', org))).toEqual(false);
|
|
956
956
|
});
|
|
957
957
|
it('can view dashboards from their own organization', () => {
|
|
958
|
-
const org = {
|
|
958
|
+
const org = {
|
|
959
|
+
organizationUuid: '456',
|
|
960
|
+
inheritsFromOrgOrProject: true,
|
|
961
|
+
};
|
|
959
962
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', org))).toEqual(true);
|
|
960
963
|
});
|
|
961
964
|
it('cannot view dashboards from another organization', () => {
|
|
@@ -964,13 +967,13 @@ describe('Organization member permissions', () => {
|
|
|
964
967
|
it('can view savedCharts from their own organization', () => {
|
|
965
968
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
966
969
|
organizationUuid: '456',
|
|
967
|
-
|
|
970
|
+
inheritsFromOrgOrProject: true,
|
|
968
971
|
}))).toEqual(true);
|
|
969
972
|
});
|
|
970
973
|
it('cannot view savedCharts from another organization', () => {
|
|
971
974
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
972
975
|
organizationUuid: '789',
|
|
973
|
-
|
|
976
|
+
inheritsFromOrgOrProject: true,
|
|
974
977
|
}))).toEqual(false);
|
|
975
978
|
});
|
|
976
979
|
it('can view projects from their own organization', () => {
|
|
@@ -1130,25 +1133,28 @@ describe('Organization member permissions', () => {
|
|
|
1130
1133
|
expect(ability.can('view', (0, ability_1.subject)('Organization', org))).toEqual(false);
|
|
1131
1134
|
});
|
|
1132
1135
|
it('can view dashboards from their own organization', () => {
|
|
1133
|
-
const org = {
|
|
1136
|
+
const org = {
|
|
1137
|
+
organizationUuid: '456',
|
|
1138
|
+
inheritsFromOrgOrProject: true,
|
|
1139
|
+
};
|
|
1134
1140
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', org))).toEqual(true);
|
|
1135
1141
|
});
|
|
1136
1142
|
it('cannot view dashboards from another organization', () => {
|
|
1137
1143
|
expect(ability.can('view', (0, ability_1.subject)('Dashboard', {
|
|
1138
1144
|
organizationUuid: '789',
|
|
1139
|
-
|
|
1145
|
+
inheritsFromOrgOrProject: true,
|
|
1140
1146
|
}))).toEqual(false);
|
|
1141
1147
|
});
|
|
1142
1148
|
it('can view savedCharts from their own organization', () => {
|
|
1143
1149
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
1144
1150
|
organizationUuid: '456',
|
|
1145
|
-
|
|
1151
|
+
inheritsFromOrgOrProject: true,
|
|
1146
1152
|
}))).toEqual(true);
|
|
1147
1153
|
});
|
|
1148
1154
|
it('cannot view savedCharts from another organization', () => {
|
|
1149
1155
|
expect(ability.can('view', (0, ability_1.subject)('SavedChart', {
|
|
1150
1156
|
organizationUuid: '789',
|
|
1151
|
-
|
|
1157
|
+
inheritsFromOrgOrProject: true,
|
|
1152
1158
|
}))).toEqual(false);
|
|
1153
1159
|
});
|
|
1154
1160
|
it('can view projects from their own organization', () => {
|