@temboplus/afloat 0.1.33 → 0.1.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -176,7 +176,7 @@ export class UserManagementRepository extends BaseRepository {
176
176
  */
177
177
  async getAllRoles() {
178
178
  const auth = this.getAuthForPermissionCheck();
179
- const requiredPerm = Permissions.UserManagement.ViewRoles;
179
+ const requiredPerm = Permissions.Role.ViewRoles;
180
180
  if (!auth.checkPermission(requiredPerm)) {
181
181
  throw new PermissionError({
182
182
  message: "You are not authorized to view system roles.",
@@ -206,7 +206,7 @@ export class UserManagementRepository extends BaseRepository {
206
206
  */
207
207
  async getRole(id) {
208
208
  const auth = this.getAuthForPermissionCheck();
209
- const requiredPerm = Permissions.UserManagement.ViewRoles;
209
+ const requiredPerm = Permissions.Role.ViewRoles;
210
210
  if (!auth.checkPermission(requiredPerm)) {
211
211
  throw new PermissionError({
212
212
  message: "You are not authorized to view role details.",
@@ -34,19 +34,21 @@ export declare const Permissions: {
34
34
  readonly ViewBalance: "wallet.getBalance";
35
35
  readonly ViewStatement: "wallet.getStatement";
36
36
  };
37
+ readonly Role: {
38
+ readonly ViewRoles: "role.findAll";
39
+ readonly ViewRole: "role.findById";
40
+ };
37
41
  readonly UserManagement: {
38
- readonly ViewRoles: "userManagement.getRoles";
39
- readonly ViewUsers: "userManagement.getUsers";
40
- readonly ViewUser: "userManagement.getUser";
41
- readonly CreateUser: "userManagement.createUser";
42
- readonly UpdateUser: "userManagement.updateUser";
43
- readonly ArchiveUser: "userManagement.archiveUser";
44
- readonly ResetPassword: "userManagement.resetPassword";
45
- readonly ViewRole: "userManagement.getRole";
42
+ readonly ViewUsers: "login.findAll";
43
+ readonly ViewUser: "login.findById";
44
+ readonly CreateUser: "login.create";
45
+ readonly UpdateUser: "login.update";
46
+ readonly ArchiveUser: "login.archive";
47
+ readonly ResetPassword: "login.resetPassword";
46
48
  };
47
49
  };
48
50
  /**
49
51
  * Permission Type
50
52
  */
51
- export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
53
+ export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Role[keyof typeof Permissions.Role] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
52
54
  //# sourceMappingURL=permission.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA2Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
1
+ {"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA6Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,IAAI,CAAC,MAAM,OAAO,WAAW,CAAC,IAAI,CAAC,GACtD,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
@@ -34,14 +34,16 @@ export const Permissions = {
34
34
  ViewBalance: "wallet.getBalance",
35
35
  ViewStatement: "wallet.getStatement",
36
36
  },
37
+ Role: {
38
+ ViewRoles: "role.findAll",
39
+ ViewRole: "role.findById",
40
+ },
37
41
  UserManagement: {
38
- ViewRoles: "userManagement.getRoles",
39
- ViewUsers: "userManagement.getUsers",
40
- ViewUser: "userManagement.getUser",
41
- CreateUser: "userManagement.createUser",
42
- UpdateUser: "userManagement.updateUser",
43
- ArchiveUser: "userManagement.archiveUser",
44
- ResetPassword: "userManagement.resetPassword",
45
- ViewRole: "userManagement.getRole",
42
+ ViewUsers: "login.findAll",
43
+ ViewUser: "login.findById",
44
+ CreateUser: "login.create",
45
+ UpdateUser: "login.update",
46
+ ArchiveUser: "login.archive",
47
+ ResetPassword: "login.resetPassword",
46
48
  },
47
49
  }; // Make it deeply readonly
@@ -1 +1 @@
1
- {"version":3,"file":"authenticated-user.d.ts","sourceRoot":"","sources":["../../../../src/src/models/user/authenticated-user.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC;AAEvC;;;;;GAKG;AACH,qBAAa,IAAI;IACf;;OAEG;IACI,IAAI,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACI,QAAQ,EAAE,MAAM,CAAC;IAExB;;OAEG;IACI,OAAO,EAAE,OAAO,CAAC;IAExB;;;OAGG;IACI,KAAK,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACI,aAAa,EAAE,OAAO,CAAC;IAE9B;;;OAGG;IACH,OAAO,CAAC,cAAc,CAA0B;IAEhD;;;;;OAKG;IACH,OAAO;IA6BP;;;;;OAKG;IACI,GAAG,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO;IAIvC;;;;;;;;OAQG;IACI,MAAM,IAAI,MAAM;IAavB;;;;;OAKG;WACW,QAAQ,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI,GAAG,SAAS;IAS5D;;;;;OAKG;WACW,IAAI,CAAC,IAAI,EAAE,GAAG,GAAG,IAAI,GAAG,SAAS;CA4FhD"}
1
+ {"version":3,"file":"authenticated-user.d.ts","sourceRoot":"","sources":["../../../../src/src/models/user/authenticated-user.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC;AAEvC;;;;;GAKG;AACH,qBAAa,IAAI;IACf;;OAEG;IACI,IAAI,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACI,QAAQ,EAAE,MAAM,CAAC;IAExB;;OAEG;IACI,OAAO,EAAE,OAAO,CAAC;IAExB;;;OAGG;IACI,KAAK,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACI,aAAa,EAAE,OAAO,CAAC;IAE9B;;;OAGG;IACH,OAAO,CAAC,cAAc,CAA0B;IAEhD;;;;;OAKG;IACH,OAAO;IAwBP;;;;;OAKG;IACI,GAAG,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO;IAIvC;;;;;;;;OAQG;IACI,MAAM,IAAI,MAAM;IAavB;;;;;OAKG;WACW,QAAQ,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI,GAAG,SAAS;IAS5D;;;;;OAKG;WACW,IAAI,CAAC,IAAI,EAAE,GAAG,GAAG,IAAI,GAAG,SAAS;CA4FhD"}
@@ -80,16 +80,10 @@ export class User {
80
80
  this.resetPassword = resetPassword;
81
81
  this.name = name;
82
82
  this.identity = identity;
83
- // Initialize the permissions map
84
83
  this.permissionsMap = {};
85
- for (const permission of Object.values(Permissions)) {
86
- if (typeof permission === "object") {
87
- Object.values(permission).forEach((perm) => {
88
- this.permissionsMap[perm] = access.includes(perm);
89
- });
90
- }
91
- else {
92
- this.permissionsMap[permission] = access.includes(permission);
84
+ for (const group of Object.values(Permissions)) {
85
+ for (const perm of Object.values(group)) {
86
+ this.permissionsMap[perm] = access.includes(perm);
93
87
  }
94
88
  }
95
89
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@temboplus/afloat",
3
- "version": "0.1.33",
3
+ "version": "0.1.35",
4
4
  "description": "A JavaScript/TypeScript package providing common utilities and logic shared across all Temboplus-Afloat Projects",
5
5
  "repository": {
6
6
  "type": "git",
@@ -179,7 +179,7 @@ class UserManagementRepository extends base_repository_js_1.BaseRepository {
179
179
  */
180
180
  async getAllRoles() {
181
181
  const auth = this.getAuthForPermissionCheck();
182
- const requiredPerm = index_js_1.Permissions.UserManagement.ViewRoles;
182
+ const requiredPerm = index_js_1.Permissions.Role.ViewRoles;
183
183
  if (!auth.checkPermission(requiredPerm)) {
184
184
  throw new index_js_2.PermissionError({
185
185
  message: "You are not authorized to view system roles.",
@@ -209,7 +209,7 @@ class UserManagementRepository extends base_repository_js_1.BaseRepository {
209
209
  */
210
210
  async getRole(id) {
211
211
  const auth = this.getAuthForPermissionCheck();
212
- const requiredPerm = index_js_1.Permissions.UserManagement.ViewRoles;
212
+ const requiredPerm = index_js_1.Permissions.Role.ViewRoles;
213
213
  if (!auth.checkPermission(requiredPerm)) {
214
214
  throw new index_js_2.PermissionError({
215
215
  message: "You are not authorized to view role details.",
@@ -34,19 +34,21 @@ export declare const Permissions: {
34
34
  readonly ViewBalance: "wallet.getBalance";
35
35
  readonly ViewStatement: "wallet.getStatement";
36
36
  };
37
+ readonly Role: {
38
+ readonly ViewRoles: "role.findAll";
39
+ readonly ViewRole: "role.findById";
40
+ };
37
41
  readonly UserManagement: {
38
- readonly ViewRoles: "userManagement.getRoles";
39
- readonly ViewUsers: "userManagement.getUsers";
40
- readonly ViewUser: "userManagement.getUser";
41
- readonly CreateUser: "userManagement.createUser";
42
- readonly UpdateUser: "userManagement.updateUser";
43
- readonly ArchiveUser: "userManagement.archiveUser";
44
- readonly ResetPassword: "userManagement.resetPassword";
45
- readonly ViewRole: "userManagement.getRole";
42
+ readonly ViewUsers: "login.findAll";
43
+ readonly ViewUser: "login.findById";
44
+ readonly CreateUser: "login.create";
45
+ readonly UpdateUser: "login.update";
46
+ readonly ArchiveUser: "login.archive";
47
+ readonly ResetPassword: "login.resetPassword";
46
48
  };
47
49
  };
48
50
  /**
49
51
  * Permission Type
50
52
  */
51
- export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
53
+ export type Permission = typeof Permissions.Profile[keyof typeof Permissions.Profile] | typeof Permissions.Contact[keyof typeof Permissions.Contact] | typeof Permissions.Payment[keyof typeof Permissions.Payment] | typeof Permissions.Payout[keyof typeof Permissions.Payout] | typeof Permissions.Transfer[keyof typeof Permissions.Transfer] | typeof Permissions.UserManagement[keyof typeof Permissions.UserManagement] | typeof Permissions.Role[keyof typeof Permissions.Role] | typeof Permissions.Wallet[keyof typeof Permissions.Wallet];
52
54
  //# sourceMappingURL=permission.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA2Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
1
+ {"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../../src/src/models/permission.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,WAAW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA6Cd,CAAC;AAEX;;GAEG;AACH,MAAM,MAAM,UAAU,GAClB,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,OAAO,CAAC,MAAM,OAAO,WAAW,CAAC,OAAO,CAAC,GAC5D,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,GAC1D,OAAO,WAAW,CAAC,QAAQ,CAAC,MAAM,OAAO,WAAW,CAAC,QAAQ,CAAC,GAC9D,OAAO,WAAW,CAAC,cAAc,CAAC,MAAM,OAAO,WAAW,CAAC,cAAc,CAAC,GAC1E,OAAO,WAAW,CAAC,IAAI,CAAC,MAAM,OAAO,WAAW,CAAC,IAAI,CAAC,GACtD,OAAO,WAAW,CAAC,MAAM,CAAC,MAAM,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC"}
@@ -37,14 +37,16 @@ exports.Permissions = {
37
37
  ViewBalance: "wallet.getBalance",
38
38
  ViewStatement: "wallet.getStatement",
39
39
  },
40
+ Role: {
41
+ ViewRoles: "role.findAll",
42
+ ViewRole: "role.findById",
43
+ },
40
44
  UserManagement: {
41
- ViewRoles: "userManagement.getRoles",
42
- ViewUsers: "userManagement.getUsers",
43
- ViewUser: "userManagement.getUser",
44
- CreateUser: "userManagement.createUser",
45
- UpdateUser: "userManagement.updateUser",
46
- ArchiveUser: "userManagement.archiveUser",
47
- ResetPassword: "userManagement.resetPassword",
48
- ViewRole: "userManagement.getRole",
45
+ ViewUsers: "login.findAll",
46
+ ViewUser: "login.findById",
47
+ CreateUser: "login.create",
48
+ UpdateUser: "login.update",
49
+ ArchiveUser: "login.archive",
50
+ ResetPassword: "login.resetPassword",
49
51
  },
50
52
  }; // Make it deeply readonly
@@ -1 +1 @@
1
- {"version":3,"file":"authenticated-user.d.ts","sourceRoot":"","sources":["../../../../src/src/models/user/authenticated-user.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC;AAEvC;;;;;GAKG;AACH,qBAAa,IAAI;IACf;;OAEG;IACI,IAAI,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACI,QAAQ,EAAE,MAAM,CAAC;IAExB;;OAEG;IACI,OAAO,EAAE,OAAO,CAAC;IAExB;;;OAGG;IACI,KAAK,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACI,aAAa,EAAE,OAAO,CAAC;IAE9B;;;OAGG;IACH,OAAO,CAAC,cAAc,CAA0B;IAEhD;;;;;OAKG;IACH,OAAO;IA6BP;;;;;OAKG;IACI,GAAG,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO;IAIvC;;;;;;;;OAQG;IACI,MAAM,IAAI,MAAM;IAavB;;;;;OAKG;WACW,QAAQ,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI,GAAG,SAAS;IAS5D;;;;;OAKG;WACW,IAAI,CAAC,IAAI,EAAE,GAAG,GAAG,IAAI,GAAG,SAAS;CA4FhD"}
1
+ {"version":3,"file":"authenticated-user.d.ts","sourceRoot":"","sources":["../../../../src/src/models/user/authenticated-user.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC;AAEvC;;;;;GAKG;AACH,qBAAa,IAAI;IACf;;OAEG;IACI,IAAI,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACI,QAAQ,EAAE,MAAM,CAAC;IAExB;;OAEG;IACI,OAAO,EAAE,OAAO,CAAC;IAExB;;;OAGG;IACI,KAAK,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACI,aAAa,EAAE,OAAO,CAAC;IAE9B;;;OAGG;IACH,OAAO,CAAC,cAAc,CAA0B;IAEhD;;;;;OAKG;IACH,OAAO;IAwBP;;;;;OAKG;IACI,GAAG,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO;IAIvC;;;;;;;;OAQG;IACI,MAAM,IAAI,MAAM;IAavB;;;;;OAKG;WACW,QAAQ,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI,GAAG,SAAS;IAS5D;;;;;OAKG;WACW,IAAI,CAAC,IAAI,EAAE,GAAG,GAAG,IAAI,GAAG,SAAS;CA4FhD"}
@@ -83,16 +83,10 @@ class User {
83
83
  this.resetPassword = resetPassword;
84
84
  this.name = name;
85
85
  this.identity = identity;
86
- // Initialize the permissions map
87
86
  this.permissionsMap = {};
88
- for (const permission of Object.values(permission_js_1.Permissions)) {
89
- if (typeof permission === "object") {
90
- Object.values(permission).forEach((perm) => {
91
- this.permissionsMap[perm] = access.includes(perm);
92
- });
93
- }
94
- else {
95
- this.permissionsMap[permission] = access.includes(permission);
87
+ for (const group of Object.values(permission_js_1.Permissions)) {
88
+ for (const perm of Object.values(group)) {
89
+ this.permissionsMap[perm] = access.includes(perm);
96
90
  }
97
91
  }
98
92
  }