@tiledesk/tiledesk-server 2.10.5 → 2.10.7

Sign up to get free protection for your applications and to get access to all the features.
package/CHANGELOG.md CHANGED
@@ -5,6 +5,13 @@
5
5
  🚀 IN PRODUCTION 🚀
6
6
  (https://www.npmjs.com/package/@tiledesk/tiledesk-server/v/2.3.77)
7
7
 
8
+ # 2.10.7
9
+ - Update: removed regex in signup and changepsw (temp)
10
+ - Update: fire request.close event even if the request is already closed
11
+
12
+ # 2.10.6
13
+ - Update: return more chatbot info with restricted_mode
14
+
8
15
  # 2.10.5
9
16
  - Fix bug on access chatbot route rules
10
17
  - Fix bug update chatbot avatar
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@tiledesk/tiledesk-server",
3
3
  "description": "The Tiledesk server module",
4
- "version": "2.10.5",
4
+ "version": "2.10.7",
5
5
  "scripts": {
6
6
  "start": "node ./bin/www",
7
7
  "pretest": "mongodb-runner start",
package/routes/auth.js CHANGED
@@ -80,10 +80,10 @@ router.post('/signup',
80
80
 
81
81
  // TODO: move the regex control inside signup method of UserService.
82
82
  // Warning: the pwd used in every test must be changed!
83
- const regex = new RegExp(/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[!@#$%^&*])[A-Za-z\d!@#$%^&*]{8,}$/);
84
- if (!regex.test(req.body.password)) {
85
- return res.status(403).send({ success: false, message: "The password does not meet the minimum vulnerability requirements"})
86
- }
83
+ // const regex = new RegExp(/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[!@#$%^&*])[A-Za-z\d!@#$%^&*]{8,}$/);
84
+ // if (!regex.test(req.body.password)) {
85
+ // return res.status(403).send({ success: false, message: "The password does not meet the minimum vulnerability requirements"})
86
+ // }
87
87
 
88
88
  return userService.signup(req.body.email, req.body.password, req.body.firstname, req.body.lastname, false)
89
89
  .then( async function (savedUser) {
package/routes/faq_kb.js CHANGED
@@ -566,7 +566,7 @@ router.get('/', roleChecker.hasRoleOrTypes('agent', ['bot','subscription']), fun
566
566
 
567
567
  if (restricted_mode === true) {
568
568
  // Returns only: _id, name, id_project, language
569
- faq_kbs = faq_kbs.map(({ webhook_enabled, type, public, certified, intentsEngine, tags, score, url, attributes, trained, certifiedTags, trashed, createdBy, createdAt, updatedAt, __v, ...keepAttrs }) => keepAttrs)
569
+ faq_kbs = faq_kbs.map(({ webhook_enabled, intentsEngine, score, url, attributes, trained, certifiedTags, createdBy, createdAt, updatedAt, __v, ...keepAttrs }) => keepAttrs)
570
570
  }
571
571
 
572
572
  res.json(faq_kbs)
package/routes/users.js CHANGED
@@ -137,10 +137,10 @@ router.put('/changepsw', function (req, res) {
137
137
  return res.status(403).send({ success: false, message: "The new password must be different from the previous one."})
138
138
  }
139
139
 
140
- const regex = new RegExp(/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[!@#$%^&*])[A-Za-z\d!@#$%^&*]{8,}$/);
141
- if (!regex.test(req.body.newpsw)) {
142
- return res.status(403).send({ success: false, message: "The password does not meet the minimum vulnerability requirements"})
143
- }
140
+ // const regex = new RegExp(/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[!@#$%^&*])[A-Za-z\d!@#$%^&*]{8,}$/);
141
+ // if (!regex.test(req.body.newpsw)) {
142
+ // return res.status(403).send({ success: false, message: "The password does not meet the minimum vulnerability requirements"})
143
+ // }
144
144
 
145
145
  user.password = req.body.newpsw
146
146
 
@@ -1749,6 +1749,7 @@ class RequestService {
1749
1749
  if (force == false && request.status == RequestConstants.CLOSED) {
1750
1750
  // qui1000
1751
1751
  // if (request.statusObj.closed) {
1752
+ requestEvent.emit('request.close', request);
1752
1753
  winston.debug("Request already closed for request_id " + request_id + " and id_project " + id_project);
1753
1754
  return resolve(request);
1754
1755
  }