@memberjunction/global 2.111.0 → 2.112.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/Core.d.ts +29 -0
- package/dist/Core.d.ts.map +1 -0
- package/dist/Core.js +58 -0
- package/dist/Core.js.map +1 -0
- package/dist/generic/QueryCache.d.ts +85 -0
- package/dist/generic/QueryCache.d.ts.map +1 -0
- package/dist/generic/QueryCache.js +198 -0
- package/dist/generic/QueryCache.js.map +1 -0
- package/dist/generic/QueryCacheConfig.d.ts +72 -0
- package/dist/generic/QueryCacheConfig.d.ts.map +1 -0
- package/dist/generic/QueryCacheConfig.js +3 -0
- package/dist/generic/QueryCacheConfig.js.map +1 -0
- package/dist/generic/applicationInfo.d.ts +138 -0
- package/dist/generic/applicationInfo.d.ts.map +1 -0
- package/dist/generic/applicationInfo.js +177 -0
- package/dist/generic/applicationInfo.js.map +1 -0
- package/dist/generic/authEvaluator.d.ts +25 -0
- package/dist/generic/authEvaluator.d.ts.map +1 -0
- package/dist/generic/authEvaluator.js +49 -0
- package/dist/generic/authEvaluator.js.map +1 -0
- package/dist/generic/authTypes.d.ts +193 -0
- package/dist/generic/authTypes.d.ts.map +1 -0
- package/dist/generic/authTypes.js +19 -0
- package/dist/generic/authTypes.js.map +1 -0
- package/dist/generic/baseEngine.d.ts +260 -0
- package/dist/generic/baseEngine.d.ts.map +1 -0
- package/dist/generic/baseEngine.js +510 -0
- package/dist/generic/baseEngine.js.map +1 -0
- package/dist/generic/baseEntity.d.ts +691 -0
- package/dist/generic/baseEntity.d.ts.map +1 -0
- package/dist/generic/baseEntity.js +1688 -0
- package/dist/generic/baseEntity.js.map +1 -0
- package/dist/generic/baseInfo.d.ts +24 -0
- package/dist/generic/baseInfo.d.ts.map +1 -0
- package/dist/generic/baseInfo.js +53 -0
- package/dist/generic/baseInfo.js.map +1 -0
- package/dist/generic/compositeKey.d.ts +206 -0
- package/dist/generic/compositeKey.d.ts.map +1 -0
- package/dist/generic/compositeKey.js +412 -0
- package/dist/generic/compositeKey.js.map +1 -0
- package/dist/generic/databaseProviderBase.d.ts +46 -0
- package/dist/generic/databaseProviderBase.d.ts.map +1 -0
- package/dist/generic/databaseProviderBase.js +14 -0
- package/dist/generic/databaseProviderBase.js.map +1 -0
- package/dist/generic/entityInfo.d.ts +983 -0
- package/dist/generic/entityInfo.d.ts.map +1 -0
- package/dist/generic/entityInfo.js +1401 -0
- package/dist/generic/entityInfo.js.map +1 -0
- package/dist/generic/explorerNavigationItem.d.ts +20 -0
- package/dist/generic/explorerNavigationItem.d.ts.map +1 -0
- package/dist/generic/explorerNavigationItem.js +29 -0
- package/dist/generic/explorerNavigationItem.js.map +1 -0
- package/dist/generic/interfaces.d.ts +610 -0
- package/dist/generic/interfaces.d.ts.map +1 -0
- package/dist/generic/interfaces.js +211 -0
- package/dist/generic/interfaces.js.map +1 -0
- package/dist/generic/libraryInfo.d.ts +40 -0
- package/dist/generic/libraryInfo.d.ts.map +1 -0
- package/dist/generic/libraryInfo.js +56 -0
- package/dist/generic/libraryInfo.js.map +1 -0
- package/dist/generic/logging.d.ts +179 -0
- package/dist/generic/logging.d.ts.map +1 -0
- package/dist/generic/logging.js +382 -0
- package/dist/generic/logging.js.map +1 -0
- package/dist/generic/metadata.d.ts +305 -0
- package/dist/generic/metadata.d.ts.map +1 -0
- package/dist/generic/metadata.js +454 -0
- package/dist/generic/metadata.js.map +1 -0
- package/dist/generic/metadataUtil.d.ts +8 -0
- package/dist/generic/metadataUtil.d.ts.map +1 -0
- package/dist/generic/metadataUtil.js +36 -0
- package/dist/generic/metadataUtil.js.map +1 -0
- package/dist/generic/providerBase.d.ts +546 -0
- package/dist/generic/providerBase.d.ts.map +1 -0
- package/dist/generic/providerBase.js +999 -0
- package/dist/generic/providerBase.js.map +1 -0
- package/dist/generic/queryInfo.d.ts +460 -0
- package/dist/generic/queryInfo.d.ts.map +1 -0
- package/dist/generic/queryInfo.js +633 -0
- package/dist/generic/queryInfo.js.map +1 -0
- package/dist/generic/querySQLFilters.d.ts +54 -0
- package/dist/generic/querySQLFilters.d.ts.map +1 -0
- package/dist/generic/querySQLFilters.js +84 -0
- package/dist/generic/querySQLFilters.js.map +1 -0
- package/dist/generic/runQuery.d.ts +96 -0
- package/dist/generic/runQuery.d.ts.map +1 -0
- package/dist/generic/runQuery.js +66 -0
- package/dist/generic/runQuery.js.map +1 -0
- package/dist/generic/runQuerySQLFilterImplementations.d.ts +51 -0
- package/dist/generic/runQuerySQLFilterImplementations.d.ts.map +1 -0
- package/dist/generic/runQuerySQLFilterImplementations.js +238 -0
- package/dist/generic/runQuerySQLFilterImplementations.js.map +1 -0
- package/dist/generic/runReport.d.ts +25 -0
- package/dist/generic/runReport.d.ts.map +1 -0
- package/dist/generic/runReport.js +42 -0
- package/dist/generic/runReport.js.map +1 -0
- package/dist/generic/securityInfo.d.ts +355 -0
- package/dist/generic/securityInfo.d.ts.map +1 -0
- package/dist/generic/securityInfo.js +425 -0
- package/dist/generic/securityInfo.js.map +1 -0
- package/dist/generic/transactionGroup.d.ts +184 -0
- package/dist/generic/transactionGroup.d.ts.map +1 -0
- package/dist/generic/transactionGroup.js +357 -0
- package/dist/generic/transactionGroup.js.map +1 -0
- package/dist/generic/util.d.ts +81 -0
- package/dist/generic/util.d.ts.map +1 -0
- package/dist/generic/util.js +301 -0
- package/dist/generic/util.js.map +1 -0
- package/dist/views/runView.d.ts +150 -0
- package/dist/views/runView.d.ts.map +1 -0
- package/dist/views/runView.js +100 -0
- package/dist/views/runView.js.map +1 -0
- package/dist/views/viewInfo.d.ts +121 -0
- package/dist/views/viewInfo.d.ts.map +1 -0
- package/dist/views/viewInfo.js +182 -0
- package/dist/views/viewInfo.js.map +1 -0
- package/package.json +1 -1
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.RunReport = void 0;
|
|
4
|
+
const Global_1 = require("../Global");
|
|
5
|
+
/**
|
|
6
|
+
* Class used to run a report and return the results.
|
|
7
|
+
*/
|
|
8
|
+
class RunReport {
|
|
9
|
+
/**
|
|
10
|
+
* Optionally, you can pass in a provider to use for running the report. If you dont pass in a provider, the static provider will be used.
|
|
11
|
+
* @param provider
|
|
12
|
+
*/
|
|
13
|
+
constructor(provider = null) {
|
|
14
|
+
this._provider = provider;
|
|
15
|
+
}
|
|
16
|
+
/**
|
|
17
|
+
* Returns the provider to be used for this instance, if one was passed in. Otherwise, it returns the static provider.
|
|
18
|
+
*/
|
|
19
|
+
get ProviderToUse() {
|
|
20
|
+
return this._provider || RunReport.Provider;
|
|
21
|
+
}
|
|
22
|
+
async RunReport(params, contextUser) {
|
|
23
|
+
return this.ProviderToUse.RunReport(params, contextUser);
|
|
24
|
+
}
|
|
25
|
+
static get Provider() {
|
|
26
|
+
const g = Global_1.MJGlobal.Instance.GetGlobalObjectStore();
|
|
27
|
+
if (g)
|
|
28
|
+
return g[RunReport._globalProviderKey];
|
|
29
|
+
else
|
|
30
|
+
throw new Error('No global object store, so we cant get the static provider');
|
|
31
|
+
}
|
|
32
|
+
static set Provider(value) {
|
|
33
|
+
const g = Global_1.MJGlobal.Instance.GetGlobalObjectStore();
|
|
34
|
+
if (g)
|
|
35
|
+
g[RunReport._globalProviderKey] = value;
|
|
36
|
+
else
|
|
37
|
+
throw new Error('No global object store, so we cant set the static provider');
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
exports.RunReport = RunReport;
|
|
41
|
+
RunReport._globalProviderKey = 'MJ_RunReportProvider';
|
|
42
|
+
//# sourceMappingURL=runReport.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"runReport.js","sourceRoot":"","sources":["../../src/generic/runReport.ts"],"names":[],"mappings":";;;AAAA,sCAAqC;AAQrC;;GAEG;AACH,MAAa,SAAS;IAEpB;;;OAGG;IACH,YAAY,WAAsC,IAAI;QACpD,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAC;IAC5B,CAAC;IAED;;OAEG;IACH,IAAW,aAAa;QACtB,OAAO,IAAI,CAAC,SAAS,IAAI,SAAS,CAAC,QAAQ,CAAC;IAC9C,CAAC;IAEM,KAAK,CAAC,SAAS,CAAC,MAAuB,EAAE,WAAsB;QACpE,OAAO,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;IAC3D,CAAC;IAGM,MAAM,KAAK,QAAQ;QACxB,MAAM,CAAC,GAAG,iBAAQ,CAAC,QAAQ,CAAC,oBAAoB,EAAE,CAAC;QACnD,IAAI,CAAC;YAAE,OAAO,CAAC,CAAC,SAAS,CAAC,kBAAkB,CAAC,CAAC;;YACzC,MAAM,IAAI,KAAK,CAAC,4DAA4D,CAAC,CAAC;IACrF,CAAC;IACM,MAAM,KAAK,QAAQ,CAAC,KAAyB;QAClD,MAAM,CAAC,GAAG,iBAAQ,CAAC,QAAQ,CAAC,oBAAoB,EAAE,CAAC;QACnD,IAAI,CAAC;YAAE,CAAC,CAAC,SAAS,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC;;YAC1C,MAAM,IAAI,KAAK,CAAC,4DAA4D,CAAC,CAAC;IACrF,CAAC;;AA/BH,8BAgCC;AAXgB,4BAAkB,GAAW,sBAAsB,CAAC"}
|
|
@@ -0,0 +1,355 @@
|
|
|
1
|
+
import { BaseInfo } from "./baseInfo";
|
|
2
|
+
import { IMetadataProvider } from "./interfaces";
|
|
3
|
+
/**
|
|
4
|
+
* A list of all users who have or had access to the system.
|
|
5
|
+
* Contains user profile information, authentication details, and role assignments.
|
|
6
|
+
*/
|
|
7
|
+
export declare class UserInfo extends BaseInfo {
|
|
8
|
+
/**
|
|
9
|
+
* Unique identifier for the user
|
|
10
|
+
*/
|
|
11
|
+
ID: string;
|
|
12
|
+
/**
|
|
13
|
+
* Name of the user that is used in various places in UIs/etc, can be anything including FirstLast, Email, a Handle, etc
|
|
14
|
+
*/
|
|
15
|
+
Name: string;
|
|
16
|
+
/**
|
|
17
|
+
* User's first name or given name
|
|
18
|
+
*/
|
|
19
|
+
FirstName: string;
|
|
20
|
+
/**
|
|
21
|
+
* User's last name or surname
|
|
22
|
+
*/
|
|
23
|
+
LastName: string;
|
|
24
|
+
/**
|
|
25
|
+
* User's professional title or salutation
|
|
26
|
+
*/
|
|
27
|
+
Title: string;
|
|
28
|
+
/**
|
|
29
|
+
* Unique email address for the user. This field must be unique across all users in the system
|
|
30
|
+
*/
|
|
31
|
+
Email: string;
|
|
32
|
+
/**
|
|
33
|
+
* User account type (User, Owner)
|
|
34
|
+
*/
|
|
35
|
+
Type: string;
|
|
36
|
+
/**
|
|
37
|
+
* Whether this user account is currently active and can log in
|
|
38
|
+
*/
|
|
39
|
+
IsActive: boolean;
|
|
40
|
+
/**
|
|
41
|
+
* Type of record this user is linked to (None, Employee, Contact, etc.)
|
|
42
|
+
*/
|
|
43
|
+
LinkedRecordType: 'None' | 'Employee' | 'Other';
|
|
44
|
+
/**
|
|
45
|
+
* Foreign key reference to the Employee entity
|
|
46
|
+
*/
|
|
47
|
+
EmployeeID: number;
|
|
48
|
+
/**
|
|
49
|
+
* Foreign key reference to the Entities table
|
|
50
|
+
*/
|
|
51
|
+
LinkedEntityID: number;
|
|
52
|
+
/**
|
|
53
|
+
* ID of the specific record this user is linked to
|
|
54
|
+
*/
|
|
55
|
+
LinkedEntityRecordID: number;
|
|
56
|
+
/**
|
|
57
|
+
* Timestamp when the user record was created
|
|
58
|
+
*/
|
|
59
|
+
__mj_CreatedAt: Date;
|
|
60
|
+
/**
|
|
61
|
+
* Timestamp when the user record was last updated
|
|
62
|
+
*/
|
|
63
|
+
__mj_UpdatedAt: Date;
|
|
64
|
+
/**
|
|
65
|
+
* Concatenated first and last name
|
|
66
|
+
*/
|
|
67
|
+
FirstLast: string;
|
|
68
|
+
/**
|
|
69
|
+
* Employee's concatenated first and last name
|
|
70
|
+
*/
|
|
71
|
+
EmployeeFirstLast: string;
|
|
72
|
+
/**
|
|
73
|
+
* Employee's email address
|
|
74
|
+
*/
|
|
75
|
+
EmployeeEmail: string;
|
|
76
|
+
/**
|
|
77
|
+
* Employee's job title
|
|
78
|
+
*/
|
|
79
|
+
EmployeeTitle: string;
|
|
80
|
+
/**
|
|
81
|
+
* Name of the employee's supervisor
|
|
82
|
+
*/
|
|
83
|
+
EmployeeSupervisor: string;
|
|
84
|
+
/**
|
|
85
|
+
* Email address of the employee's supervisor
|
|
86
|
+
*/
|
|
87
|
+
EmployeeSupervisorEmail: string;
|
|
88
|
+
private _UserRoles;
|
|
89
|
+
/**
|
|
90
|
+
* Gets the roles assigned to this user.
|
|
91
|
+
* @returns {UserRoleInfo[]} Array of user role assignments
|
|
92
|
+
*/
|
|
93
|
+
get UserRoles(): UserRoleInfo[];
|
|
94
|
+
/**
|
|
95
|
+
* Constructs a new instance of the UserInfo class, optionally initializing it with the provided metadata and initial data.
|
|
96
|
+
* If newGlobalRoles are provided, the user roles will be set up to validate against those roles instead of fetching them from the metadata provider.
|
|
97
|
+
* @param md
|
|
98
|
+
* @param initData
|
|
99
|
+
* @param newGlobalRoles
|
|
100
|
+
*/
|
|
101
|
+
constructor(md?: IMetadataProvider, initData?: any);
|
|
102
|
+
}
|
|
103
|
+
/**
|
|
104
|
+
* Associates users with roles in the system, managing role-based access control and permission inheritance.
|
|
105
|
+
*/
|
|
106
|
+
export declare class UserRoleInfo extends BaseInfo {
|
|
107
|
+
/**
|
|
108
|
+
* Foreign key reference to the Users table
|
|
109
|
+
*/
|
|
110
|
+
UserID: string;
|
|
111
|
+
/**
|
|
112
|
+
* Foreign key reference to the Roles table
|
|
113
|
+
*/
|
|
114
|
+
RoleID: string;
|
|
115
|
+
/**
|
|
116
|
+
* Timestamp when the user-role association was created
|
|
117
|
+
*/
|
|
118
|
+
__mj_CreatedAt: Date;
|
|
119
|
+
/**
|
|
120
|
+
* Timestamp when the user-role association was last updated
|
|
121
|
+
*/
|
|
122
|
+
__mj_UpdatedAt: Date;
|
|
123
|
+
/**
|
|
124
|
+
* Name of the user
|
|
125
|
+
*/
|
|
126
|
+
User: string;
|
|
127
|
+
/**
|
|
128
|
+
* Name of the role
|
|
129
|
+
*/
|
|
130
|
+
Role: string;
|
|
131
|
+
constructor(initData: any);
|
|
132
|
+
}
|
|
133
|
+
/**
|
|
134
|
+
* Roles are used for security administration and can have zero to many Users as members.
|
|
135
|
+
* Defines groups of permissions that can be assigned to multiple users.
|
|
136
|
+
*/
|
|
137
|
+
export declare class RoleInfo extends BaseInfo {
|
|
138
|
+
/**
|
|
139
|
+
* Unique identifier for the role
|
|
140
|
+
*/
|
|
141
|
+
ID: string;
|
|
142
|
+
/**
|
|
143
|
+
* Name of the role
|
|
144
|
+
*/
|
|
145
|
+
Name: string;
|
|
146
|
+
/**
|
|
147
|
+
* Description of the role
|
|
148
|
+
*/
|
|
149
|
+
Description: string;
|
|
150
|
+
/**
|
|
151
|
+
* The unique ID of the role in the directory being used for authentication, for example an ID in Azure
|
|
152
|
+
*/
|
|
153
|
+
DirectoryID: string;
|
|
154
|
+
/**
|
|
155
|
+
* The name of the role in the database, this is used for auto-generating permission statements by CodeGen
|
|
156
|
+
*/
|
|
157
|
+
SQLName: string;
|
|
158
|
+
/**
|
|
159
|
+
* Timestamp when the role was created
|
|
160
|
+
*/
|
|
161
|
+
__mj_CreatedAt: Date;
|
|
162
|
+
/**
|
|
163
|
+
* Timestamp when the role was last updated
|
|
164
|
+
*/
|
|
165
|
+
__mj_UpdatedAt: Date;
|
|
166
|
+
constructor(initData: any);
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* Defines data access rules that filter records based on user context, implementing fine-grained security at the row level.
|
|
170
|
+
*/
|
|
171
|
+
export declare class RowLevelSecurityFilterInfo extends BaseInfo {
|
|
172
|
+
/**
|
|
173
|
+
* Unique identifier for the row level security filter
|
|
174
|
+
*/
|
|
175
|
+
ID: string;
|
|
176
|
+
/**
|
|
177
|
+
* Name of the row level security filter
|
|
178
|
+
*/
|
|
179
|
+
Name: string;
|
|
180
|
+
/**
|
|
181
|
+
* Description of the row level security filter
|
|
182
|
+
*/
|
|
183
|
+
Description: string;
|
|
184
|
+
/**
|
|
185
|
+
* SQL WHERE clause template that filters records based on user context variables
|
|
186
|
+
*/
|
|
187
|
+
FilterText: string;
|
|
188
|
+
/**
|
|
189
|
+
* Timestamp when the filter was created
|
|
190
|
+
*/
|
|
191
|
+
__mj_CreatedAt: Date;
|
|
192
|
+
/**
|
|
193
|
+
* Timestamp when the filter was last updated
|
|
194
|
+
*/
|
|
195
|
+
__mj_UpdatedAt: Date;
|
|
196
|
+
constructor(initData: any);
|
|
197
|
+
/**
|
|
198
|
+
* Replaces user-specific tokens in the filter text with actual user values.
|
|
199
|
+
* Tokens are in the format {{UserFieldName}} where FieldName is any property of the UserInfo object.
|
|
200
|
+
* @param {UserInfo} user - The user whose properties will be substituted into the filter text
|
|
201
|
+
* @returns {string} The filter text with all user tokens replaced with actual values
|
|
202
|
+
*/
|
|
203
|
+
MarkupFilterText(user: UserInfo): string;
|
|
204
|
+
}
|
|
205
|
+
/**
|
|
206
|
+
* Stores the fundamental permissions and access rights that can be granted to users and roles throughout the system.
|
|
207
|
+
*/
|
|
208
|
+
export declare class AuthorizationInfo extends BaseInfo {
|
|
209
|
+
/**
|
|
210
|
+
* Unique identifier for the authorization
|
|
211
|
+
*/
|
|
212
|
+
ID: string;
|
|
213
|
+
/**
|
|
214
|
+
* The unique identifier for the parent authorization, if applicable
|
|
215
|
+
*/
|
|
216
|
+
ParentID: string;
|
|
217
|
+
/**
|
|
218
|
+
* Name of the authorization
|
|
219
|
+
*/
|
|
220
|
+
Name: string;
|
|
221
|
+
/**
|
|
222
|
+
* Indicates whether this authorization is currently active and can be granted to users or roles
|
|
223
|
+
*/
|
|
224
|
+
IsActive: boolean;
|
|
225
|
+
/**
|
|
226
|
+
* When set to 1, Audit Log records are created whenever this authorization is invoked for a user
|
|
227
|
+
*/
|
|
228
|
+
UseAuditLog: boolean;
|
|
229
|
+
/**
|
|
230
|
+
* Description of the authorization
|
|
231
|
+
*/
|
|
232
|
+
Description: string;
|
|
233
|
+
/**
|
|
234
|
+
* Timestamp when the authorization was created
|
|
235
|
+
*/
|
|
236
|
+
__mj_CreatedAt: Date;
|
|
237
|
+
/**
|
|
238
|
+
* Timestamp when the authorization was last updated
|
|
239
|
+
*/
|
|
240
|
+
__mj_UpdatedAt: Date;
|
|
241
|
+
/**
|
|
242
|
+
* Name of the parent authorization
|
|
243
|
+
*/
|
|
244
|
+
Parent: string;
|
|
245
|
+
private _AuthorizationRoles;
|
|
246
|
+
get Roles(): AuthorizationRoleInfo[];
|
|
247
|
+
constructor(md: IMetadataProvider, initData?: any);
|
|
248
|
+
/**
|
|
249
|
+
* Sets up the roles associated with this authorization using the provided metadata and initial data.
|
|
250
|
+
*
|
|
251
|
+
* @param {IMetadataProvider} md - The metadata provider to fetch role information.
|
|
252
|
+
* @param {AuthorizationRoleInfo[]} authorizationRoles - An array of `AuthorizationRoleInfo` instances or equivalent data to be associated with this authorization.
|
|
253
|
+
*/
|
|
254
|
+
SetupAuthorizationRoles(md: IMetadataProvider, authorizationRoles: AuthorizationRoleInfo[]): void;
|
|
255
|
+
/**
|
|
256
|
+
* Determines if a given user can execute actions under this authorization based on their roles.
|
|
257
|
+
*
|
|
258
|
+
* @param {UserInfo} user - The user to check for execution rights.
|
|
259
|
+
* @returns {boolean} True if the user can execute actions under this authorization, otherwise false.
|
|
260
|
+
*/
|
|
261
|
+
UserCanExecute(user: UserInfo): boolean;
|
|
262
|
+
/**
|
|
263
|
+
* Determines if a given role can execute actions under this authorization.
|
|
264
|
+
*
|
|
265
|
+
* @param {RoleInfo} role - The role to check for execution rights.
|
|
266
|
+
* @returns {boolean} True if the role can execute actions under this authorization, otherwise false.
|
|
267
|
+
*/
|
|
268
|
+
RoleCanExecute(role: RoleInfo): boolean;
|
|
269
|
+
}
|
|
270
|
+
export declare const AuthorizationRoleType: {
|
|
271
|
+
readonly Allow: "Allow";
|
|
272
|
+
readonly Deny: "Deny";
|
|
273
|
+
};
|
|
274
|
+
export type AuthorizationRoleType = typeof AuthorizationRoleType[keyof typeof AuthorizationRoleType];
|
|
275
|
+
/**
|
|
276
|
+
* Links authorizations to roles, defining which permissions are granted to users assigned to specific roles in the system.
|
|
277
|
+
*/
|
|
278
|
+
export declare class AuthorizationRoleInfo extends BaseInfo {
|
|
279
|
+
/**
|
|
280
|
+
* Unique identifier for the authorization-role mapping
|
|
281
|
+
*/
|
|
282
|
+
ID: string;
|
|
283
|
+
/**
|
|
284
|
+
* Foreign key reference to the Authorizations table
|
|
285
|
+
*/
|
|
286
|
+
AuthorizationID: string;
|
|
287
|
+
/**
|
|
288
|
+
* Foreign key reference to the Roles table
|
|
289
|
+
*/
|
|
290
|
+
RoleID: string;
|
|
291
|
+
/**
|
|
292
|
+
* Specifies whether this authorization is granted to ('Allow') or explicitly denied ('Deny') for the role. Deny overrides Allow from all other roles a user may be part of
|
|
293
|
+
*/
|
|
294
|
+
Type: string;
|
|
295
|
+
/**
|
|
296
|
+
* Timestamp when the authorization-role mapping was created
|
|
297
|
+
*/
|
|
298
|
+
__mj_CreatedAt: Date;
|
|
299
|
+
/**
|
|
300
|
+
* Timestamp when the authorization-role mapping was last updated
|
|
301
|
+
*/
|
|
302
|
+
__mj_UpdatedAt: Date;
|
|
303
|
+
/**
|
|
304
|
+
* Name of the authorization
|
|
305
|
+
*/
|
|
306
|
+
Authorization: string;
|
|
307
|
+
/**
|
|
308
|
+
* Name of the role
|
|
309
|
+
*/
|
|
310
|
+
Role: string;
|
|
311
|
+
private _RoleInfo;
|
|
312
|
+
get RoleInfo(): RoleInfo;
|
|
313
|
+
AuthorizationType(): AuthorizationRoleType;
|
|
314
|
+
_setRole(role: RoleInfo): void;
|
|
315
|
+
constructor(initData: any);
|
|
316
|
+
}
|
|
317
|
+
/**
|
|
318
|
+
* Defines the types of events that can be recorded in the audit log, enabling categorization and filtering of system activities.
|
|
319
|
+
*/
|
|
320
|
+
export declare class AuditLogTypeInfo extends BaseInfo {
|
|
321
|
+
/**
|
|
322
|
+
* Unique identifier for the audit log type
|
|
323
|
+
*/
|
|
324
|
+
ID: string;
|
|
325
|
+
/**
|
|
326
|
+
* Foreign key reference to the parent Audit Log Type
|
|
327
|
+
*/
|
|
328
|
+
ParentID: string;
|
|
329
|
+
/**
|
|
330
|
+
* Name of the audit log type
|
|
331
|
+
*/
|
|
332
|
+
Name: string;
|
|
333
|
+
/**
|
|
334
|
+
* Description of the audit log type
|
|
335
|
+
*/
|
|
336
|
+
Description: string;
|
|
337
|
+
/**
|
|
338
|
+
* Name of the associated authorization
|
|
339
|
+
*/
|
|
340
|
+
AuthorizationName: string;
|
|
341
|
+
/**
|
|
342
|
+
* Timestamp when the audit log type was created
|
|
343
|
+
*/
|
|
344
|
+
__mj_CreatedAt: Date;
|
|
345
|
+
/**
|
|
346
|
+
* Timestamp when the audit log type was last updated
|
|
347
|
+
*/
|
|
348
|
+
__mj_UpdatedAt: Date;
|
|
349
|
+
/**
|
|
350
|
+
* Name of the parent audit log type
|
|
351
|
+
*/
|
|
352
|
+
Parent: string;
|
|
353
|
+
constructor(initData: any);
|
|
354
|
+
}
|
|
355
|
+
//# sourceMappingURL=securityInfo.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"securityInfo.d.ts","sourceRoot":"","sources":["../../src/generic/securityInfo.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,YAAY,CAAC;AACtC,OAAO,EAAE,iBAAiB,EAAE,MAAM,cAAc,CAAC;AAEjD;;;GAGG;AACH,qBAAa,QAAS,SAAQ,QAAQ;IAClC;;OAEG;IACH,EAAE,EAAE,MAAM,CAAQ;IAElB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,SAAS,EAAE,MAAM,CAAO;IAExB;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAO;IAEvB;;OAEG;IACH,KAAK,EAAE,MAAM,CAAO;IAEpB;;OAEG;IACH,KAAK,EAAE,MAAM,CAAO;IAEpB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,QAAQ,EAAE,OAAO,CAAO;IAExB;;OAEG;IACH,gBAAgB,EAAE,MAAM,GAAG,UAAU,GAAG,OAAO,CAAO;IAEtD;;OAEG;IACH,UAAU,EAAE,MAAM,CAAO;IAEzB;;OAEG;IACH,cAAc,EAAE,MAAM,CAAO;IAE7B;;OAEG;IACH,oBAAoB,EAAE,MAAM,CAAO;IAEnC;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAG3B;;OAEG;IACH,SAAS,EAAE,MAAM,CAAO;IAExB;;OAEG;IACH,iBAAiB,EAAE,MAAM,CAAO;IAEhC;;OAEG;IACH,aAAa,EAAE,MAAM,CAAO;IAE5B;;OAEG;IACH,aAAa,EAAE,MAAM,CAAO;IAE5B;;OAEG;IACH,kBAAkB,EAAE,MAAM,CAAO;IAEjC;;OAEG;IACH,uBAAuB,EAAE,MAAM,CAAO;IAEtC,OAAO,CAAC,UAAU,CAAqB;IACvC;;;OAGG;IACH,IAAW,SAAS,IAAI,YAAY,EAAE,CAErC;IAED;;;;;;OAMG;gBACU,EAAE,GAAE,iBAAwB,EAAE,QAAQ,GAAE,GAAU;CAOlE;AAED;;GAEG;AACH,qBAAa,YAAa,SAAQ,QAAQ;IACtC;;OAEG;IACH,MAAM,EAAE,MAAM,CAAO;IAErB;;OAEG;IACH,MAAM,EAAE,MAAM,CAAO;IAErB;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAG3B;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;gBAEN,QAAQ,EAAE,GAAG;CAI7B;AAED;;;GAGG;AACH,qBAAa,QAAS,SAAQ,QAAQ;IAClC;;OAEG;IACH,EAAE,EAAE,MAAM,CAAO;IAEjB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,WAAW,EAAE,MAAM,CAAO;IAE1B;;OAEG;IACH,WAAW,EAAE,MAAM,CAAO;IAE1B;;OAEG;IACH,OAAO,EAAE,MAAM,CAAO;IAEtB;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;gBAEd,QAAQ,EAAE,GAAG;CAI7B;AAED;;GAEG;AACH,qBAAa,0BAA2B,SAAQ,QAAQ;IACpD;;OAEG;IACH,EAAE,EAAE,MAAM,CAAO;IAEjB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,WAAW,EAAE,MAAM,CAAO;IAE1B;;OAEG;IACH,UAAU,EAAE,MAAM,CAAO;IAEzB;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;gBAEd,QAAQ,EAAE,GAAG;IAK1B;;;;;OAKG;IACI,gBAAgB,CAAC,IAAI,EAAE,QAAQ,GAAG,MAAM;CAclD;AAED;;GAEG;AACH,qBAAa,iBAAkB,SAAQ,QAAQ;IAC3C;;OAEG;IACH,EAAE,EAAE,MAAM,CAAO;IAEjB;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAO;IAEvB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,QAAQ,EAAE,OAAO,CAAO;IAExB;;OAEG;IACH,WAAW,EAAE,OAAO,CAAO;IAE3B;;OAEG;IACH,WAAW,EAAE,MAAM,CAAO;IAE1B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAG3B;;OAEG;IACH,MAAM,EAAE,MAAM,CAAA;IAEd,OAAO,CAAC,mBAAmB,CAA8B;IACzD,IAAI,KAAK,IAAI,qBAAqB,EAAE,CAEnC;gBAEY,EAAE,EAAE,iBAAiB,EAAE,QAAQ,GAAE,GAAU;IAOxD;;;;;OAKG;IACI,uBAAuB,CAAC,EAAE,EAAE,iBAAiB,EAAE,kBAAkB,EAAE,qBAAqB,EAAE;IAgBjG;;;;;OAKG;IACI,cAAc,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO;IAW9C;;;;;OAKG;IACI,cAAc,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO;CAMjD;AAED,eAAO,MAAM,qBAAqB;;;CAGxB,CAAC;AAEX,MAAM,MAAM,qBAAqB,GAAG,OAAO,qBAAqB,CAAC,MAAM,OAAO,qBAAqB,CAAC,CAAC;AAGrG;;GAEG;AACH,qBAAa,qBAAsB,SAAQ,QAAQ;IAC/C;;OAEG;IACH,EAAE,EAAE,MAAM,CAAO;IAEjB;;OAEG;IACH,eAAe,EAAE,MAAM,CAAO;IAE9B;;OAEG;IACH,MAAM,EAAE,MAAM,CAAO;IAErB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAG3B;;OAEG;IACH,aAAa,EAAE,MAAM,CAAA;IAErB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAA;IAEZ,OAAO,CAAC,SAAS,CAAiB;IAClC,IAAW,QAAQ,IAAI,QAAQ,CAE9B;IAEM,iBAAiB,IAAI,qBAAqB;IAIjD,QAAQ,CAAC,IAAI,EAAE,QAAQ;gBAIV,QAAQ,EAAE,GAAG;CAI7B;AAGD;;GAEG;AACH,qBAAa,gBAAiB,SAAQ,QAAQ;IAC1C;;OAEG;IACH,EAAE,EAAE,MAAM,CAAO;IAEjB;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAO;IAEvB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAO;IAEnB;;OAEG;IACH,WAAW,EAAE,MAAM,CAAO;IAE1B;;OAEG;IACH,iBAAiB,EAAE,MAAM,CAAO;IAEhC;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAE3B;;OAEG;IACH,cAAc,EAAE,IAAI,CAAO;IAG3B;;OAEG;IACH,MAAM,EAAE,MAAM,CAAA;gBAED,QAAQ,EAAE,GAAG;CAI7B"}
|