@things-factory/auth-base 8.0.0-beta.9 → 8.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/client/actions/auth.ts +24 -0
- package/client/auth.ts +272 -0
- package/client/bootstrap.ts +47 -0
- package/client/directive/privileged.ts +28 -0
- package/client/index.ts +3 -0
- package/client/profiled.ts +83 -0
- package/client/reducers/auth.ts +31 -0
- package/dist-client/index.d.ts +0 -1
- package/dist-client/index.js +0 -1
- package/dist-client/index.js.map +1 -1
- package/dist-client/tsconfig.tsbuildinfo +1 -1
- package/dist-server/constants/error-code.d.ts +0 -2
- package/dist-server/constants/error-code.js +1 -3
- package/dist-server/constants/error-code.js.map +1 -1
- package/dist-server/controllers/change-pwd.js +2 -2
- package/dist-server/controllers/change-pwd.js.map +1 -1
- package/dist-server/controllers/delete-user.js +12 -13
- package/dist-server/controllers/delete-user.js.map +1 -1
- package/dist-server/controllers/invitation.d.ts +1 -2
- package/dist-server/controllers/invitation.js +5 -30
- package/dist-server/controllers/invitation.js.map +1 -1
- package/dist-server/controllers/profile.d.ts +3 -4
- package/dist-server/controllers/profile.js +2 -20
- package/dist-server/controllers/profile.js.map +1 -1
- package/dist-server/controllers/signin.d.ts +1 -4
- package/dist-server/controllers/signin.js +1 -17
- package/dist-server/controllers/signin.js.map +1 -1
- package/dist-server/controllers/signup.js +4 -13
- package/dist-server/controllers/signup.js.map +1 -1
- package/dist-server/controllers/unlock-user.js +0 -1
- package/dist-server/controllers/unlock-user.js.map +1 -1
- package/dist-server/controllers/verification.js +0 -1
- package/dist-server/controllers/verification.js.map +1 -1
- package/dist-server/middlewares/signin-middleware.js +4 -9
- package/dist-server/middlewares/signin-middleware.js.map +1 -1
- package/dist-server/middlewares/webauthn-middleware.js.map +1 -1
- package/dist-server/migrations/1548206416130-SeedUser.js +1 -2
- package/dist-server/migrations/1548206416130-SeedUser.js.map +1 -1
- package/dist-server/router/auth-checkin-router.js +2 -8
- package/dist-server/router/auth-checkin-router.js.map +1 -1
- package/dist-server/router/auth-private-process-router.js +7 -12
- package/dist-server/router/auth-private-process-router.js.map +1 -1
- package/dist-server/router/auth-public-process-router.js +9 -20
- package/dist-server/router/auth-public-process-router.js.map +1 -1
- package/dist-server/router/auth-signin-router.js +3 -3
- package/dist-server/router/auth-signin-router.js.map +1 -1
- package/dist-server/router/webauthn-router.js +1 -51
- package/dist-server/router/webauthn-router.js.map +1 -1
- package/dist-server/service/invitation/invitation-mutation.d.ts +2 -3
- package/dist-server/service/invitation/invitation-mutation.js +8 -20
- package/dist-server/service/invitation/invitation-mutation.js.map +1 -1
- package/dist-server/service/user/user-mutation.d.ts +9 -10
- package/dist-server/service/user/user-mutation.js +54 -112
- package/dist-server/service/user/user-mutation.js.map +1 -1
- package/dist-server/service/user/user-types.d.ts +0 -1
- package/dist-server/service/user/user-types.js +0 -4
- package/dist-server/service/user/user-types.js.map +1 -1
- package/dist-server/service/user/user.d.ts +0 -1
- package/dist-server/service/user/user.js +14 -40
- package/dist-server/service/user/user.js.map +1 -1
- package/dist-server/templates/account-unlock-email.d.ts +1 -2
- package/dist-server/templates/account-unlock-email.js +1 -1
- package/dist-server/templates/account-unlock-email.js.map +1 -1
- package/dist-server/templates/invitation-email.d.ts +1 -2
- package/dist-server/templates/invitation-email.js +1 -1
- package/dist-server/templates/invitation-email.js.map +1 -1
- package/dist-server/templates/verification-email.d.ts +1 -2
- package/dist-server/templates/verification-email.js +1 -1
- package/dist-server/templates/verification-email.js.map +1 -1
- package/dist-server/tsconfig.tsbuildinfo +1 -1
- package/package.json +6 -6
- package/server/constants/error-code.ts +20 -0
- package/server/constants/error-message.ts +0 -0
- package/server/constants/max-age.ts +1 -0
- package/server/controllers/auth.ts +5 -0
- package/server/controllers/change-pwd.ts +99 -0
- package/server/controllers/checkin.ts +21 -0
- package/server/controllers/delete-user.ts +68 -0
- package/server/controllers/invitation.ts +132 -0
- package/server/controllers/profile.ts +28 -0
- package/server/controllers/reset-password.ts +126 -0
- package/server/controllers/signin.ts +79 -0
- package/server/controllers/signup.ts +60 -0
- package/server/controllers/unlock-user.ts +61 -0
- package/server/controllers/utils/make-invitation-token.ts +5 -0
- package/server/controllers/utils/make-verification-token.ts +4 -0
- package/server/controllers/utils/password-rule.ts +120 -0
- package/server/controllers/utils/save-invitation-token.ts +10 -0
- package/server/controllers/utils/save-verification-token.ts +12 -0
- package/server/controllers/verification.ts +83 -0
- package/server/errors/auth-error.ts +24 -0
- package/server/errors/index.ts +2 -0
- package/server/errors/user-domain-not-match-error.ts +29 -0
- package/server/index.ts +37 -0
- package/server/middlewares/authenticate-401-middleware.ts +114 -0
- package/server/middlewares/domain-authenticate-middleware.ts +78 -0
- package/server/middlewares/graphql-authenticate-middleware.ts +13 -0
- package/server/middlewares/index.ts +67 -0
- package/server/middlewares/jwt-authenticate-middleware.ts +84 -0
- package/server/middlewares/signin-middleware.ts +55 -0
- package/server/middlewares/webauthn-middleware.ts +127 -0
- package/server/migrations/1548206416130-SeedUser.ts +59 -0
- package/server/migrations/1566805283882-SeedPrivilege.ts +28 -0
- package/server/migrations/index.ts +9 -0
- package/server/router/auth-checkin-router.ts +107 -0
- package/server/router/auth-private-process-router.ts +107 -0
- package/server/router/auth-public-process-router.ts +302 -0
- package/server/router/auth-signin-router.ts +55 -0
- package/server/router/auth-signup-router.ts +95 -0
- package/server/router/index.ts +9 -0
- package/server/router/oauth2/index.ts +2 -0
- package/server/router/oauth2/oauth2-authorize-router.ts +81 -0
- package/server/router/oauth2/oauth2-router.ts +165 -0
- package/server/router/oauth2/oauth2-server.ts +262 -0
- package/server/router/oauth2/passport-oauth2-client-password.ts +87 -0
- package/server/router/oauth2/passport-refresh-token.ts +87 -0
- package/server/router/path-base-domain-router.ts +8 -0
- package/server/router/site-root-router.ts +48 -0
- package/server/router/webauthn-router.ts +87 -0
- package/server/routes.ts +80 -0
- package/server/service/app-binding/app-binding-mutation.ts +22 -0
- package/server/service/app-binding/app-binding-query.ts +92 -0
- package/server/service/app-binding/app-binding-types.ts +11 -0
- package/server/service/app-binding/app-binding.ts +17 -0
- package/server/service/app-binding/index.ts +4 -0
- package/server/service/appliance/appliance-mutation.ts +113 -0
- package/server/service/appliance/appliance-query.ts +76 -0
- package/server/service/appliance/appliance-types.ts +56 -0
- package/server/service/appliance/appliance.ts +133 -0
- package/server/service/appliance/index.ts +6 -0
- package/server/service/application/application-mutation.ts +104 -0
- package/server/service/application/application-query.ts +98 -0
- package/server/service/application/application-types.ts +76 -0
- package/server/service/application/application.ts +216 -0
- package/server/service/application/index.ts +6 -0
- package/server/service/auth-provider/auth-provider-mutation.ts +159 -0
- package/server/service/auth-provider/auth-provider-parameter-spec.ts +24 -0
- package/server/service/auth-provider/auth-provider-query.ts +88 -0
- package/server/service/auth-provider/auth-provider-type.ts +67 -0
- package/server/service/auth-provider/auth-provider.ts +155 -0
- package/server/service/auth-provider/index.ts +7 -0
- package/server/service/domain-generator/domain-generator-mutation.ts +117 -0
- package/server/service/domain-generator/domain-generator-types.ts +46 -0
- package/server/service/domain-generator/index.ts +3 -0
- package/server/service/granted-role/granted-role-mutation.ts +156 -0
- package/server/service/granted-role/granted-role-query.ts +60 -0
- package/server/service/granted-role/granted-role.ts +27 -0
- package/server/service/granted-role/index.ts +6 -0
- package/server/service/index.ts +90 -0
- package/server/service/invitation/index.ts +6 -0
- package/server/service/invitation/invitation-mutation.ts +63 -0
- package/server/service/invitation/invitation-query.ts +33 -0
- package/server/service/invitation/invitation-types.ts +11 -0
- package/server/service/invitation/invitation.ts +63 -0
- package/server/service/login-history/index.ts +5 -0
- package/server/service/login-history/login-history-query.ts +51 -0
- package/server/service/login-history/login-history-type.ts +12 -0
- package/server/service/login-history/login-history.ts +45 -0
- package/server/service/partner/index.ts +6 -0
- package/server/service/partner/partner-mutation.ts +61 -0
- package/server/service/partner/partner-query.ts +102 -0
- package/server/service/partner/partner-types.ts +11 -0
- package/server/service/partner/partner.ts +57 -0
- package/server/service/password-history/index.ts +3 -0
- package/server/service/password-history/password-history.ts +16 -0
- package/server/service/privilege/index.ts +6 -0
- package/server/service/privilege/privilege-directive.ts +77 -0
- package/server/service/privilege/privilege-mutation.ts +92 -0
- package/server/service/privilege/privilege-query.ts +94 -0
- package/server/service/privilege/privilege-types.ts +60 -0
- package/server/service/privilege/privilege.ts +102 -0
- package/server/service/role/index.ts +6 -0
- package/server/service/role/role-mutation.ts +109 -0
- package/server/service/role/role-query.ts +155 -0
- package/server/service/role/role-types.ts +81 -0
- package/server/service/role/role.ts +72 -0
- package/server/service/user/domain-query.ts +24 -0
- package/server/service/user/index.ts +7 -0
- package/server/service/user/user-mutation.ts +413 -0
- package/server/service/user/user-query.ts +145 -0
- package/server/service/user/user-types.ts +97 -0
- package/server/service/user/user.ts +354 -0
- package/server/service/users-auth-providers/index.ts +5 -0
- package/server/service/users-auth-providers/users-auth-providers.ts +71 -0
- package/server/service/verification-token/index.ts +3 -0
- package/server/service/verification-token/verification-token.ts +60 -0
- package/server/service/web-auth-credential/index.ts +3 -0
- package/server/service/web-auth-credential/web-auth-credential.ts +67 -0
- package/server/templates/account-unlock-email.ts +65 -0
- package/server/templates/invitation-email.ts +66 -0
- package/server/templates/reset-password-email.ts +65 -0
- package/server/templates/verification-email.ts +66 -0
- package/server/types.ts +21 -0
- package/server/utils/accepts.ts +11 -0
- package/server/utils/access-token-cookie.ts +61 -0
- package/server/utils/check-permission.ts +52 -0
- package/server/utils/check-user-belongs-domain.ts +19 -0
- package/server/utils/check-user-has-role.ts +29 -0
- package/server/utils/encrypt-state.ts +22 -0
- package/server/utils/get-aes-256-key.ts +13 -0
- package/server/utils/get-domain-from-hostname.ts +7 -0
- package/server/utils/get-domain-users.ts +38 -0
- package/server/utils/get-secret.ts +13 -0
- package/server/utils/get-user-domains.ts +112 -0
- package/translations/en.json +1 -5
- package/translations/ja.json +1 -5
- package/translations/ko.json +3 -6
- package/translations/ms.json +1 -5
- package/translations/zh.json +1 -5
- package/dist-client/verify-webauthn.d.ts +0 -13
- package/dist-client/verify-webauthn.js +0 -72
- package/dist-client/verify-webauthn.js.map +0 -1
@@ -0,0 +1,109 @@
|
|
1
|
+
import { Arg, Ctx, Directive, Mutation, Resolver } from 'type-graphql'
|
2
|
+
|
3
|
+
import { getRepository } from '@things-factory/shell'
|
4
|
+
|
5
|
+
import { Privilege } from '../privilege/privilege'
|
6
|
+
import { User } from '../user/user'
|
7
|
+
import { Role } from './role'
|
8
|
+
import { NewRole, RolePatch } from './role-types'
|
9
|
+
|
10
|
+
@Resolver(Role)
|
11
|
+
export class RoleMutation {
|
12
|
+
@Directive('@privilege(category: "user", privilege: "mutation", domainOwnerGranted: true)')
|
13
|
+
@Mutation(returns => User, { description: 'To create new user' })
|
14
|
+
async createRole(@Arg('role') role: NewRole, @Ctx() context: ResolverContext): Promise<Role> {
|
15
|
+
const { domain, user } = context.state
|
16
|
+
const roleName = role.name.trim()
|
17
|
+
|
18
|
+
const existsRole: Role = await getRepository(Role).findOne({ where: { name: roleName, domain: { id: domain.id } } })
|
19
|
+
|
20
|
+
if (existsRole) {
|
21
|
+
throw new Error('role name is duplicated')
|
22
|
+
}
|
23
|
+
|
24
|
+
if (role.privileges && role.privileges.length) {
|
25
|
+
role.privileges = await getRepository(Privilege).findByIds(role.privileges.map(privilege => privilege.id))
|
26
|
+
}
|
27
|
+
|
28
|
+
if (role.users && role.users.length) {
|
29
|
+
role.users = await getRepository(User).findByIds(role.users.map(user => user.id))
|
30
|
+
}
|
31
|
+
|
32
|
+
return await getRepository(Role).save({
|
33
|
+
domain,
|
34
|
+
updater: user,
|
35
|
+
creator: user,
|
36
|
+
...role
|
37
|
+
})
|
38
|
+
}
|
39
|
+
|
40
|
+
@Directive('@privilege(category: "user", privilege: "mutation", domainOwnerGranted: true)')
|
41
|
+
@Mutation(returns => Role, { description: 'To modify role information' })
|
42
|
+
async updateRole(
|
43
|
+
@Arg('id') id: string,
|
44
|
+
@Arg('patch') patch: RolePatch,
|
45
|
+
@Ctx() context: ResolverContext
|
46
|
+
): Promise<Role> {
|
47
|
+
const { domain, user } = context.state
|
48
|
+
const { name, description, privileges } = patch
|
49
|
+
const roleRepository = getRepository(Role)
|
50
|
+
const role: Role = await roleRepository.findOne({
|
51
|
+
where: { domain: { id: domain.id }, id },
|
52
|
+
relations: ['privileges', 'creator', 'updater']
|
53
|
+
})
|
54
|
+
|
55
|
+
if (name && role.name !== name) {
|
56
|
+
const roleName = name.trim()
|
57
|
+
const existsRole: Role = await roleRepository.findOne({ where: { name: roleName, domain: { id: domain.id } } })
|
58
|
+
if (existsRole) {
|
59
|
+
throw new Error('role name is duplicated')
|
60
|
+
}
|
61
|
+
|
62
|
+
role.name = roleName
|
63
|
+
}
|
64
|
+
|
65
|
+
if (description) {
|
66
|
+
role.description = description
|
67
|
+
}
|
68
|
+
|
69
|
+
return await roleRepository.save({
|
70
|
+
...role,
|
71
|
+
...patch,
|
72
|
+
privileges: await getRepository(Privilege).findByIds(
|
73
|
+
patch.privileges.map((privilege: Privilege) => privilege.id)
|
74
|
+
),
|
75
|
+
updater: user
|
76
|
+
} as any)
|
77
|
+
}
|
78
|
+
|
79
|
+
@Directive('@privilege(category: "user", privilege: "mutation")')
|
80
|
+
@Directive('@transaction')
|
81
|
+
@Mutation(returns => Boolean, { description: 'To delete role' })
|
82
|
+
async deleteRole(@Arg('id') id: string, @Ctx() context: ResolverContext): Promise<Boolean> {
|
83
|
+
const { tx, domain } = context.state
|
84
|
+
let role: Role = await tx
|
85
|
+
.getRepository(Role)
|
86
|
+
.findOne({ where: { domain: { id: domain.id }, id }, relations: ['users', 'privileges'] })
|
87
|
+
|
88
|
+
try {
|
89
|
+
if (role.users.length) throw new Error('cannot delete role because it is currently in use')
|
90
|
+
|
91
|
+
role.privileges = []
|
92
|
+
|
93
|
+
role = await tx.getRepository(Role).save(role)
|
94
|
+
|
95
|
+
await tx.getRepository(Role).delete(role.id)
|
96
|
+
|
97
|
+
return true
|
98
|
+
} catch (e) {
|
99
|
+
context.throw(401, 'cannot delete role because it is currently in use')
|
100
|
+
}
|
101
|
+
}
|
102
|
+
|
103
|
+
@Directive('@privilege(category: "user", privilege: "mutation", domainOwnerGranted: true)')
|
104
|
+
@Mutation(returns => Boolean, { description: 'To delete multiple roles' })
|
105
|
+
async deleteRoles(@Arg('ids', type => [String]) ids: string[], @Ctx() _context: any) {
|
106
|
+
await getRepository(Role).delete(ids)
|
107
|
+
return true
|
108
|
+
}
|
109
|
+
}
|
@@ -0,0 +1,155 @@
|
|
1
|
+
import { In } from 'typeorm'
|
2
|
+
import { Arg, Args, Ctx, Directive, FieldResolver, Query, Resolver, Root } from 'type-graphql'
|
3
|
+
import { SelectQueryBuilder } from 'typeorm'
|
4
|
+
|
5
|
+
import { config } from '@things-factory/env'
|
6
|
+
import { Domain, getQueryBuilderFromListParams, getRepository, ListParam } from '@things-factory/shell'
|
7
|
+
|
8
|
+
import { Privilege } from '../privilege/privilege'
|
9
|
+
import { User } from '../user/user'
|
10
|
+
import { Role } from './role'
|
11
|
+
import { RoleList, RolePrivilege, UserRole } from './role-types'
|
12
|
+
|
13
|
+
@Resolver(Role)
|
14
|
+
export class RoleQuery {
|
15
|
+
@Directive('@privilege(category: "user", privilege: "query", domainOwnerGranted: true, superUserGranted: true)')
|
16
|
+
@Query(returns => Role, { description: 'To fetch role' })
|
17
|
+
async role(@Arg('name') name: string, @Ctx() context: ResolverContext): Promise<Role> {
|
18
|
+
const { domain } = context.state
|
19
|
+
return await getRepository(Role).findOneBy({
|
20
|
+
domain: { id: In([domain.id, domain.parentId].filter(Boolean)) },
|
21
|
+
name
|
22
|
+
})
|
23
|
+
}
|
24
|
+
|
25
|
+
@Directive('@privilege(category: "user", privilege: "query", domainOwnerGranted: true, superUserGranted: true)')
|
26
|
+
@Query(returns => RoleList, { description: 'To fetch multiple users' })
|
27
|
+
async roles(@Args(type => ListParam) params: ListParam, @Ctx() context: ResolverContext): Promise<RoleList> {
|
28
|
+
const { domain } = context.state
|
29
|
+
|
30
|
+
const [items, total] = await getQueryBuilderFromListParams({
|
31
|
+
repository: getRepository(Role),
|
32
|
+
params,
|
33
|
+
domain,
|
34
|
+
searchables: ['name', 'description']
|
35
|
+
}).getManyAndCount()
|
36
|
+
|
37
|
+
return { items, total }
|
38
|
+
}
|
39
|
+
|
40
|
+
@Directive('@privilege(category: "user", privilege: "query", domainOwnerGranted: true, superUserGranted: true)')
|
41
|
+
@Query(returns => [RolePrivilege], { description: 'To fetch privileges of a role' })
|
42
|
+
async rolePrivileges(@Arg('roleId') roleId: string, @Ctx() context: ResolverContext): Promise<RolePrivilege[]> {
|
43
|
+
const rolePrivileges = await getRepository(Privilege).query(
|
44
|
+
`
|
45
|
+
SELECT
|
46
|
+
id,
|
47
|
+
name,
|
48
|
+
category,
|
49
|
+
description,
|
50
|
+
CASE WHEN id IN (
|
51
|
+
SELECT
|
52
|
+
P.id
|
53
|
+
FROM
|
54
|
+
privileges P JOIN roles_privileges RP
|
55
|
+
ON
|
56
|
+
P.id = RP.privileges_id
|
57
|
+
WHERE
|
58
|
+
RP.roles_id = '${roleId}'
|
59
|
+
) THEN true
|
60
|
+
ELSE false
|
61
|
+
END AS assigned
|
62
|
+
FROM
|
63
|
+
privileges
|
64
|
+
`
|
65
|
+
)
|
66
|
+
|
67
|
+
return rolePrivileges
|
68
|
+
}
|
69
|
+
|
70
|
+
@Directive('@privilege(category: "user", privilege: "query", domainOwnerGranted: true, superUserGranted: true)')
|
71
|
+
@Query(returns => [UserRole], { description: 'To fetch roles of a user' })
|
72
|
+
async userRoles(@Arg('userId') userId: string, @Ctx() context: ResolverContext): Promise<UserRole[]> {
|
73
|
+
const userRoles = await getRepository(Role).query(
|
74
|
+
`
|
75
|
+
SELECT
|
76
|
+
id,
|
77
|
+
name,
|
78
|
+
description,
|
79
|
+
CASE WHEN id IN (
|
80
|
+
SELECT
|
81
|
+
R.id
|
82
|
+
FROM
|
83
|
+
roles R JOIN users_roles UR
|
84
|
+
ON
|
85
|
+
R.id = UR.roles_id
|
86
|
+
WHERE
|
87
|
+
UR.users_id = '${userId}'
|
88
|
+
) THEN true
|
89
|
+
ELSE false
|
90
|
+
END AS assigned
|
91
|
+
FROM
|
92
|
+
roles
|
93
|
+
`
|
94
|
+
)
|
95
|
+
|
96
|
+
return userRoles
|
97
|
+
}
|
98
|
+
|
99
|
+
@Query(returns => [Role], { description: 'To fetch roles of current user' })
|
100
|
+
async myRoles(@Ctx() context: ResolverContext): Promise<Role[]> {
|
101
|
+
const { user, domain } = context.state
|
102
|
+
|
103
|
+
const qb: SelectQueryBuilder<User> = await getRepository(User).createQueryBuilder('USER')
|
104
|
+
const { roles }: User = await qb
|
105
|
+
.leftJoinAndSelect('USER.roles', 'ROLE')
|
106
|
+
.leftJoin('ROLE.domain', 'ROLE_DOMAIN')
|
107
|
+
.where('USER.id = :userId', { userId: user.id })
|
108
|
+
.andWhere('ROLE_DOMAIN.id In(:...domainIds)', { domainIds: [domain.id, domain.parentId].filter(Boolean) })
|
109
|
+
.getOne()
|
110
|
+
|
111
|
+
return roles || []
|
112
|
+
}
|
113
|
+
|
114
|
+
@Query(returns => [Role], { description: 'To fetch the preset of role for new user' })
|
115
|
+
async checkRolePreset(@Ctx() context: ResolverContext): Promise<Role[]> {
|
116
|
+
const rolePreset = config.get('rolePreset') || []
|
117
|
+
|
118
|
+
return rolePreset
|
119
|
+
}
|
120
|
+
|
121
|
+
@FieldResolver(type => Domain)
|
122
|
+
async domain(@Root() role: Role) {
|
123
|
+
return await getRepository(Domain).findOneBy({ id: role.domainId })
|
124
|
+
}
|
125
|
+
|
126
|
+
@FieldResolver(type => [User])
|
127
|
+
async users(@Root() role: Role) {
|
128
|
+
return (
|
129
|
+
await getRepository(Role).findOne({
|
130
|
+
where: { id: role.id },
|
131
|
+
relations: ['users']
|
132
|
+
})
|
133
|
+
).users
|
134
|
+
}
|
135
|
+
|
136
|
+
@FieldResolver(type => [Privilege])
|
137
|
+
async privileges(@Root() role: Role) {
|
138
|
+
return (
|
139
|
+
await getRepository(Role).findOne({
|
140
|
+
where: { id: role.id },
|
141
|
+
relations: ['privileges']
|
142
|
+
})
|
143
|
+
).privileges
|
144
|
+
}
|
145
|
+
|
146
|
+
@FieldResolver(type => User)
|
147
|
+
async updater(@Root() role: Role): Promise<User> {
|
148
|
+
return await getRepository(User).findOneBy({ id: role.updaterId })
|
149
|
+
}
|
150
|
+
|
151
|
+
@FieldResolver(type => User)
|
152
|
+
async creator(@Root() role: Role): Promise<User> {
|
153
|
+
return await getRepository(User).findOneBy({ id: role.creatorId })
|
154
|
+
}
|
155
|
+
}
|
@@ -0,0 +1,81 @@
|
|
1
|
+
import { ObjectType, InputType, Field, Int } from 'type-graphql'
|
2
|
+
import { ObjectRef } from '@things-factory/shell'
|
3
|
+
import { Role } from './role'
|
4
|
+
|
5
|
+
@InputType()
|
6
|
+
export class NewRole {
|
7
|
+
@Field()
|
8
|
+
name: string
|
9
|
+
|
10
|
+
@Field({ nullable: true })
|
11
|
+
description?: string
|
12
|
+
|
13
|
+
@Field(type => [ObjectRef], { nullable: true })
|
14
|
+
users?: ObjectRef[]
|
15
|
+
|
16
|
+
@Field(type => [ObjectRef], { nullable: true })
|
17
|
+
privileges?: ObjectRef[]
|
18
|
+
}
|
19
|
+
|
20
|
+
@InputType()
|
21
|
+
export class RolePatch {
|
22
|
+
@Field({ nullable: true })
|
23
|
+
id?: string
|
24
|
+
|
25
|
+
@Field({ nullable: true })
|
26
|
+
name?: string
|
27
|
+
|
28
|
+
@Field({ nullable: true })
|
29
|
+
description?: string
|
30
|
+
|
31
|
+
@Field(type => [ObjectRef], { nullable: true })
|
32
|
+
users?: ObjectRef[]
|
33
|
+
|
34
|
+
@Field(type => [ObjectRef], { nullable: true })
|
35
|
+
privileges?: ObjectRef[]
|
36
|
+
|
37
|
+
@Field({ nullable: true })
|
38
|
+
cuFlag?: string
|
39
|
+
}
|
40
|
+
|
41
|
+
@ObjectType()
|
42
|
+
export class RoleList {
|
43
|
+
@Field(type => [Role], { nullable: true })
|
44
|
+
items?: Role[]
|
45
|
+
|
46
|
+
@Field(type => Int, { nullable: true })
|
47
|
+
total?: number
|
48
|
+
}
|
49
|
+
|
50
|
+
@ObjectType()
|
51
|
+
export class RolePrivilege {
|
52
|
+
@Field({ nullable: true })
|
53
|
+
id?: string
|
54
|
+
|
55
|
+
@Field({ nullable: true })
|
56
|
+
name?: string
|
57
|
+
|
58
|
+
@Field({ nullable: true })
|
59
|
+
category?: string
|
60
|
+
|
61
|
+
@Field({ nullable: true })
|
62
|
+
description?: string
|
63
|
+
|
64
|
+
@Field({ nullable: true })
|
65
|
+
assigned?: boolean
|
66
|
+
}
|
67
|
+
|
68
|
+
@ObjectType()
|
69
|
+
export class UserRole {
|
70
|
+
@Field({ nullable: true })
|
71
|
+
id?: string
|
72
|
+
|
73
|
+
@Field({ nullable: true })
|
74
|
+
name?: string
|
75
|
+
|
76
|
+
@Field({ nullable: true })
|
77
|
+
description?: string
|
78
|
+
|
79
|
+
@Field({ nullable: true })
|
80
|
+
assigned?: boolean
|
81
|
+
}
|
@@ -0,0 +1,72 @@
|
|
1
|
+
import { Domain } from '@things-factory/shell'
|
2
|
+
import {
|
3
|
+
Column,
|
4
|
+
CreateDateColumn,
|
5
|
+
Entity,
|
6
|
+
Index,
|
7
|
+
JoinTable,
|
8
|
+
ManyToMany,
|
9
|
+
ManyToOne,
|
10
|
+
RelationId,
|
11
|
+
PrimaryGeneratedColumn,
|
12
|
+
UpdateDateColumn
|
13
|
+
} from 'typeorm'
|
14
|
+
import { ObjectType, Field, ID } from 'type-graphql'
|
15
|
+
import { Privilege } from '../privilege/privilege'
|
16
|
+
import { User } from '../user/user'
|
17
|
+
|
18
|
+
@Entity()
|
19
|
+
@Index('ix_role_0', (role: Role) => [role.name, role.domain], { unique: true })
|
20
|
+
@ObjectType()
|
21
|
+
export class Role {
|
22
|
+
@PrimaryGeneratedColumn('uuid')
|
23
|
+
@Field(type => ID)
|
24
|
+
readonly id: string
|
25
|
+
|
26
|
+
@ManyToOne(type => Domain)
|
27
|
+
@Field(type => Domain)
|
28
|
+
domain?: Domain
|
29
|
+
|
30
|
+
@RelationId((role: Role) => role.domain)
|
31
|
+
domainId: string
|
32
|
+
|
33
|
+
@Column()
|
34
|
+
@Field({ nullable: true })
|
35
|
+
name: string
|
36
|
+
|
37
|
+
@ManyToMany(type => User, user => user.roles)
|
38
|
+
@Field(type => [User], { nullable: true })
|
39
|
+
users: User[]
|
40
|
+
|
41
|
+
@ManyToMany(type => Privilege, privilege => privilege.roles)
|
42
|
+
@Field(type => [Privilege], { nullable: true })
|
43
|
+
privileges: Privilege[]
|
44
|
+
|
45
|
+
@Column({
|
46
|
+
nullable: true
|
47
|
+
})
|
48
|
+
@Field({ nullable: true })
|
49
|
+
description: string
|
50
|
+
|
51
|
+
@ManyToOne(type => User, { nullable: true })
|
52
|
+
@Field(type => User, { nullable: true })
|
53
|
+
creator: User
|
54
|
+
|
55
|
+
@RelationId((role: Role) => role.creator)
|
56
|
+
creatorId: string
|
57
|
+
|
58
|
+
@ManyToOne(type => User, { nullable: true })
|
59
|
+
@Field(type => User, { nullable: true })
|
60
|
+
updater: User
|
61
|
+
|
62
|
+
@RelationId((role: Role) => role.updater)
|
63
|
+
updaterId: string
|
64
|
+
|
65
|
+
@CreateDateColumn()
|
66
|
+
@Field({ nullable: true })
|
67
|
+
createdAt: Date
|
68
|
+
|
69
|
+
@UpdateDateColumn()
|
70
|
+
@Field({ nullable: true })
|
71
|
+
updatedAt: Date
|
72
|
+
}
|
@@ -0,0 +1,24 @@
|
|
1
|
+
import { FieldResolver, Resolver, Root } from 'type-graphql'
|
2
|
+
|
3
|
+
import { Domain, getRepository } from '@things-factory/shell'
|
4
|
+
import { User } from './user'
|
5
|
+
|
6
|
+
@Resolver(Domain)
|
7
|
+
export class DomainQuery {
|
8
|
+
@FieldResolver(type => User, { nullable: true })
|
9
|
+
async ownerUser(@Root() domain: Domain): Promise<User | null> {
|
10
|
+
if (!domain.owner) {
|
11
|
+
return
|
12
|
+
}
|
13
|
+
|
14
|
+
const owner = await getRepository(User).findOne({
|
15
|
+
where: { id: domain.owner }
|
16
|
+
})
|
17
|
+
|
18
|
+
if (owner && owner.userType !== 'user' && owner.userType !== 'admin') {
|
19
|
+
throw 'the type of the given user is not suitable for a owner of a domain'
|
20
|
+
}
|
21
|
+
|
22
|
+
return owner
|
23
|
+
}
|
24
|
+
}
|
@@ -0,0 +1,7 @@
|
|
1
|
+
import { User } from './user'
|
2
|
+
import { UserQuery } from './user-query'
|
3
|
+
import { UserMutation } from './user-mutation'
|
4
|
+
import { DomainQuery } from './domain-query'
|
5
|
+
|
6
|
+
export const entities = [User]
|
7
|
+
export const resolvers = [UserQuery, UserMutation, DomainQuery]
|