@temboplus/afloat 0.1.33 → 0.1.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/esm/src/features/admin/repository.js +2 -2
- package/esm/src/models/permission.d.ts +11 -9
- package/esm/src/models/permission.d.ts.map +1 -1
- package/esm/src/models/permission.js +10 -8
- package/package.json +1 -1
- package/script/src/features/admin/repository.js +2 -2
- package/script/src/models/permission.d.ts +11 -9
- package/script/src/models/permission.d.ts.map +1 -1
- package/script/src/models/permission.js +10 -8
|
@@ -176,7 +176,7 @@ export class UserManagementRepository extends BaseRepository {
|
|
|
176
176
|
*/
|
|
177
177
|
async getAllRoles() {
|
|
178
178
|
const auth = this.getAuthForPermissionCheck();
|
|
179
|
-
const requiredPerm = Permissions.
|
|
179
|
+
const requiredPerm = Permissions.Role.ViewRoles;
|
|
180
180
|
if (!auth.checkPermission(requiredPerm)) {
|
|
181
181
|
throw new PermissionError({
|
|
182
182
|
message: "You are not authorized to view system roles.",
|
|
@@ -206,7 +206,7 @@ export class UserManagementRepository extends BaseRepository {
|
|
|
206
206
|
*/
|
|
207
207
|
async getRole(id) {
|
|
208
208
|
const auth = this.getAuthForPermissionCheck();
|
|
209
|
-
const requiredPerm = Permissions.
|
|
209
|
+
const requiredPerm = Permissions.Role.ViewRoles;
|
|
210
210
|
if (!auth.checkPermission(requiredPerm)) {
|
|
211
211
|
throw new PermissionError({
|
|
212
212
|
message: "You are not authorized to view role details.",
|
|
@@ -34,19 +34,21 @@ export declare const Permissions: {
|
|
|
34
34
|
readonly ViewBalance: "wallet.getBalance";
|
|
35
35
|
readonly ViewStatement: "wallet.getStatement";
|
|
36
36
|
};
|
|
37
|
+
readonly Role: {
|
|
38
|
+
readonly ViewRoles: "role.findAll";
|
|
39
|
+
readonly ViewRole: "role.findById";
|
|
40
|
+
};
|
|
37
41
|
readonly UserManagement: {
|
|
38
|
-
readonly
|
|
39
|
-
readonly
|
|
40
|
-
readonly
|
|
41
|
-
readonly
|
|
42
|
-
readonly
|
|
43
|
-
readonly
|
|
44
|
-
readonly ResetPassword: "userManagement.resetPassword";
|
|
45
|
-
readonly ViewRole: "userManagement.getRole";
|
|
42
|
+
readonly ViewUsers: "login.findAll";
|
|
43
|
+
readonly ViewUser: "login.findById";
|
|
44
|
+
readonly CreateUser: "login.create";
|
|
45
|
+
readonly UpdateUser: "login.update";
|
|
46
|
+
readonly ArchiveUser: "login.archive";
|
|
47
|
+
readonly ResetPassword: "login.resetPassword";
|
|
46
48
|
};
|
|
47
49
|
};
|
|
48
50
|
/**
|
|
49
51
|
* Permission Type
|
|
50
52
|
*/
|
|
51
|
-
export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
|
|
53
|
+
export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Role[keyof typeof Permissions.Role] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
|
|
52
54
|
//# sourceMappingURL=permission.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW
|
|
1
|
+
{"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA6Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,IAAI,CAAC,MAAM,OAAO,WAAW,CAAC,IAAI,CAAC,GACtD,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
|
|
@@ -34,14 +34,16 @@ export const Permissions = {
|
|
|
34
34
|
ViewBalance: "wallet.getBalance",
|
|
35
35
|
ViewStatement: "wallet.getStatement",
|
|
36
36
|
},
|
|
37
|
+
Role: {
|
|
38
|
+
ViewRoles: "role.findAll",
|
|
39
|
+
ViewRole: "role.findById",
|
|
40
|
+
},
|
|
37
41
|
UserManagement: {
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
ResetPassword: "userManagement.resetPassword",
|
|
45
|
-
ViewRole: "userManagement.getRole",
|
|
42
|
+
ViewUsers: "login.findAll",
|
|
43
|
+
ViewUser: "login.findById",
|
|
44
|
+
CreateUser: "login.create",
|
|
45
|
+
UpdateUser: "login.update",
|
|
46
|
+
ArchiveUser: "login.archive",
|
|
47
|
+
ResetPassword: "login.resetPassword",
|
|
46
48
|
},
|
|
47
49
|
}; // Make it deeply readonly
|
package/package.json
CHANGED
|
@@ -179,7 +179,7 @@ class UserManagementRepository extends base_repository_js_1.BaseRepository {
|
|
|
179
179
|
*/
|
|
180
180
|
async getAllRoles() {
|
|
181
181
|
const auth = this.getAuthForPermissionCheck();
|
|
182
|
-
const requiredPerm = index_js_1.Permissions.
|
|
182
|
+
const requiredPerm = index_js_1.Permissions.Role.ViewRoles;
|
|
183
183
|
if (!auth.checkPermission(requiredPerm)) {
|
|
184
184
|
throw new index_js_2.PermissionError({
|
|
185
185
|
message: "You are not authorized to view system roles.",
|
|
@@ -209,7 +209,7 @@ class UserManagementRepository extends base_repository_js_1.BaseRepository {
|
|
|
209
209
|
*/
|
|
210
210
|
async getRole(id) {
|
|
211
211
|
const auth = this.getAuthForPermissionCheck();
|
|
212
|
-
const requiredPerm = index_js_1.Permissions.
|
|
212
|
+
const requiredPerm = index_js_1.Permissions.Role.ViewRoles;
|
|
213
213
|
if (!auth.checkPermission(requiredPerm)) {
|
|
214
214
|
throw new index_js_2.PermissionError({
|
|
215
215
|
message: "You are not authorized to view role details.",
|
|
@@ -34,19 +34,21 @@ export declare const Permissions: {
|
|
|
34
34
|
readonly ViewBalance: "wallet.getBalance";
|
|
35
35
|
readonly ViewStatement: "wallet.getStatement";
|
|
36
36
|
};
|
|
37
|
+
readonly Role: {
|
|
38
|
+
readonly ViewRoles: "role.findAll";
|
|
39
|
+
readonly ViewRole: "role.findById";
|
|
40
|
+
};
|
|
37
41
|
readonly UserManagement: {
|
|
38
|
-
readonly
|
|
39
|
-
readonly
|
|
40
|
-
readonly
|
|
41
|
-
readonly
|
|
42
|
-
readonly
|
|
43
|
-
readonly
|
|
44
|
-
readonly ResetPassword: "userManagement.resetPassword";
|
|
45
|
-
readonly ViewRole: "userManagement.getRole";
|
|
42
|
+
readonly ViewUsers: "login.findAll";
|
|
43
|
+
readonly ViewUser: "login.findById";
|
|
44
|
+
readonly CreateUser: "login.create";
|
|
45
|
+
readonly UpdateUser: "login.update";
|
|
46
|
+
readonly ArchiveUser: "login.archive";
|
|
47
|
+
readonly ResetPassword: "login.resetPassword";
|
|
46
48
|
};
|
|
47
49
|
};
|
|
48
50
|
/**
|
|
49
51
|
* Permission Type
|
|
50
52
|
*/
|
|
51
|
-
export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
|
|
53
|
+
export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Role[keyof typeof Permissions.Role] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
|
|
52
54
|
//# sourceMappingURL=permission.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW
|
|
1
|
+
{"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA6Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,IAAI,CAAC,MAAM,OAAO,WAAW,CAAC,IAAI,CAAC,GACtD,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
|
|
@@ -37,14 +37,16 @@ exports.Permissions = {
|
|
|
37
37
|
ViewBalance: "wallet.getBalance",
|
|
38
38
|
ViewStatement: "wallet.getStatement",
|
|
39
39
|
},
|
|
40
|
+
Role: {
|
|
41
|
+
ViewRoles: "role.findAll",
|
|
42
|
+
ViewRole: "role.findById",
|
|
43
|
+
},
|
|
40
44
|
UserManagement: {
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
ResetPassword: "userManagement.resetPassword",
|
|
48
|
-
ViewRole: "userManagement.getRole",
|
|
45
|
+
ViewUsers: "login.findAll",
|
|
46
|
+
ViewUser: "login.findById",
|
|
47
|
+
CreateUser: "login.create",
|
|
48
|
+
UpdateUser: "login.update",
|
|
49
|
+
ArchiveUser: "login.archive",
|
|
50
|
+
ResetPassword: "login.resetPassword",
|
|
49
51
|
},
|
|
50
52
|
}; // Make it deeply readonly
|