@tomei/sso 0.32.0 → 0.32.2
Sign up to get free protection for your applications and to get access to all the features.
- package/.commitlintrc.json +22 -22
- package/.eslintrc +16 -16
- package/.eslintrc.js +35 -35
- package/.gitlab-ci.yml +16 -16
- package/.husky/commit-msg +15 -15
- package/.husky/pre-commit +7 -7
- package/.prettierrc +4 -4
- package/Jenkinsfile +57 -57
- package/README.md +23 -23
- package/__tests__/unit/components/group/group.spec.ts +79 -79
- package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
- package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
- package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
- package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
- package/__tests__/unit/components/login-user/l.spec.ts +746 -746
- package/__tests__/unit/components/login-user/login.spec.ts +1064 -1064
- package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
- package/__tests__/unit/components/system/system.spec.ts +254 -254
- package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
- package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
- package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
- package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
- package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
- package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
- package/__tests__/unit/session/session.service.spec.ts +47 -47
- package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
- package/coverage/clover.xml +1452 -1452
- package/coverage/coverage-final.json +47 -47
- package/coverage/lcov-report/base.css +224 -224
- package/coverage/lcov-report/block-navigation.js +87 -87
- package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group/group.ts.html +327 -327
- package/coverage/lcov-report/components/group/index.html +130 -130
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
- package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
- package/coverage/lcov-report/components/group-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
- package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
- package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
- package/coverage/lcov-report/components/group-system-access/index.html +130 -130
- package/coverage/lcov-report/components/login-history/index.html +115 -115
- package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
- package/coverage/lcov-report/components/login-user/index.html +130 -130
- package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
- package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/password-hash/index.html +115 -115
- package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
- package/coverage/lcov-report/components/system/index.html +130 -130
- package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
- package/coverage/lcov-report/components/system/system.ts.html +909 -909
- package/coverage/lcov-report/components/system-privilege/index.html +130 -130
- package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
- package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
- package/coverage/lcov-report/components/user-group/index.html +130 -130
- package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
- package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
- package/coverage/lcov-report/components/user-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
- package/coverage/lcov-report/components/user-system-access/index.html +130 -130
- package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
- package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
- package/coverage/lcov-report/enum/index.html +160 -160
- package/coverage/lcov-report/enum/index.ts.html +93 -93
- package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
- package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
- package/coverage/lcov-report/index.html +370 -370
- package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
- package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
- package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
- package/coverage/lcov-report/models/group.entity.ts.html +435 -435
- package/coverage/lcov-report/models/index.html +310 -310
- package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
- package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
- package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
- package/coverage/lcov-report/models/system.entity.ts.html +423 -423
- package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
- package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
- package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user.entity.ts.html +522 -522
- package/coverage/lcov-report/prettify.css +1 -1
- package/coverage/lcov-report/prettify.js +2 -2
- package/coverage/lcov-report/redis-client/index.html +115 -115
- package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
- package/coverage/lcov-report/session/index.html +115 -115
- package/coverage/lcov-report/session/session.service.ts.html +246 -246
- package/coverage/lcov-report/sorter.js +196 -196
- package/coverage/lcov.info +2490 -2490
- package/coverage/test-report.xml +128 -128
- package/create-sso-user.sql +39 -39
- package/dist/src/components/group/group.d.ts +2 -0
- package/dist/src/components/group/group.js +47 -0
- package/dist/src/components/group/group.js.map +1 -1
- package/dist/src/components/login-user/login-user.d.ts +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/jest.config.js +14 -14
- package/migrations/20240314080602-create-user-table.js +108 -108
- package/migrations/20240314080603-create-user-group-table.js +85 -85
- package/migrations/20240314080604-create-user-user-group-table.js +55 -55
- package/migrations/20240314080605-create-login-history-table.js +53 -53
- package/migrations/20240527064925-create-system-table.js +78 -78
- package/migrations/20240527064926-create-system-privilege-table.js +67 -67
- package/migrations/20240527065342-create-group-table.js +89 -89
- package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
- package/migrations/20240528011551-create-group-system-access-table.js +72 -72
- package/migrations/20240528023018-user-system-access-table.js +75 -75
- package/migrations/20240528032229-user-privilege-table.js +75 -75
- package/migrations/20240528063003-create-group-privilege-table.js +75 -75
- package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
- package/migrations/20240528063107-create-user-object-privilege-table.js +83 -83
- package/package.json +89 -89
- package/sampledotenv +7 -7
- package/sonar-project.properties +22 -22
- package/src/components/group/group.ts +73 -0
- package/tsconfig.build.json +5 -5
- package/tsconfig.json +22 -22
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
- package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
- package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
@@ -1,90 +1,90 @@
|
|
1
|
-
import { UserSystemAccess } from '../../../../src/components/user-system-access/user-system-access';
|
2
|
-
import { UserSystemAccessRepository } from '../../../../src/components/user-system-access/user-system-access.repository';
|
3
|
-
import { ClassError } from '@tomei/general';
|
4
|
-
|
5
|
-
describe('UserSystemAccess', () => {
|
6
|
-
let userSystemAccess: UserSystemAccess;
|
7
|
-
const userSystemAccessAttr = {
|
8
|
-
UserSystemAccessId: 1,
|
9
|
-
UserId: 1,
|
10
|
-
SystemCode: 'system1',
|
11
|
-
Status: 'active',
|
12
|
-
CreatedById: 1,
|
13
|
-
CreatedAt: new Date(),
|
14
|
-
UpdatedById: 1,
|
15
|
-
UpdatedAt: new Date(),
|
16
|
-
};
|
17
|
-
|
18
|
-
beforeEach(() => {
|
19
|
-
userSystemAccess = new (UserSystemAccess as any)(userSystemAccessAttr);
|
20
|
-
});
|
21
|
-
|
22
|
-
afterEach(() => {
|
23
|
-
jest.clearAllMocks();
|
24
|
-
});
|
25
|
-
|
26
|
-
describe('constructor', () => {
|
27
|
-
it('should create a new UserSystemAccess instance', () => {
|
28
|
-
expect(userSystemAccess).toBeDefined();
|
29
|
-
expect(userSystemAccess).toBeInstanceOf(UserSystemAccess);
|
30
|
-
expect(userSystemAccess.UserSystemAccessId).toBe(
|
31
|
-
userSystemAccessAttr.UserSystemAccessId
|
32
|
-
);
|
33
|
-
expect(userSystemAccess.UserId).toBe(userSystemAccessAttr.UserId);
|
34
|
-
expect(userSystemAccess.SystemCode).toBe(userSystemAccessAttr.SystemCode);
|
35
|
-
expect(userSystemAccess.Status).toBe(userSystemAccessAttr.Status);
|
36
|
-
expect(userSystemAccess.CreatedById).toBe(
|
37
|
-
userSystemAccessAttr.CreatedById
|
38
|
-
);
|
39
|
-
expect(userSystemAccess.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
|
40
|
-
expect(userSystemAccess.UpdatedById).toBe(
|
41
|
-
userSystemAccessAttr.UpdatedById
|
42
|
-
);
|
43
|
-
expect(userSystemAccess.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
|
44
|
-
});
|
45
|
-
});
|
46
|
-
|
47
|
-
describe('init', () => {
|
48
|
-
it('should initialize UserSystemAccess with valid UserSystemAccessId', async () => {
|
49
|
-
const findOneMock = jest
|
50
|
-
.spyOn(UserSystemAccessRepository.prototype, 'findOne')
|
51
|
-
.mockResolvedValueOnce({
|
52
|
-
...userSystemAccessAttr,
|
53
|
-
get: () => userSystemAccessAttr,
|
54
|
-
} as any);
|
55
|
-
|
56
|
-
const result = await UserSystemAccess.init(null, 1);
|
57
|
-
|
58
|
-
expect(findOneMock).toHaveBeenCalledTimes(1);
|
59
|
-
expect(findOneMock).toHaveBeenCalledWith({
|
60
|
-
where: { UserSystemAccessId: 1 },
|
61
|
-
transaction: null,
|
62
|
-
});
|
63
|
-
expect(result).toBeInstanceOf(UserSystemAccess);
|
64
|
-
expect(result.UserSystemAccessId).toBe(
|
65
|
-
userSystemAccessAttr.UserSystemAccessId
|
66
|
-
);
|
67
|
-
expect(result.UserId).toBe(userSystemAccessAttr.UserId);
|
68
|
-
expect(result.SystemCode).toBe(userSystemAccessAttr.SystemCode);
|
69
|
-
expect(result.Status).toBe(userSystemAccessAttr.Status);
|
70
|
-
expect(result.CreatedById).toBe(userSystemAccessAttr.CreatedById);
|
71
|
-
expect(result.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
|
72
|
-
expect(result.UpdatedById).toBe(userSystemAccessAttr.UpdatedById);
|
73
|
-
expect(result.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
|
74
|
-
});
|
75
|
-
|
76
|
-
it('should throw ClassError when UserSystemAccessId is not found', async () => {
|
77
|
-
jest
|
78
|
-
.spyOn(UserSystemAccessRepository.prototype, 'findOne')
|
79
|
-
.mockResolvedValueOnce(null);
|
80
|
-
|
81
|
-
try {
|
82
|
-
await UserSystemAccess.init(null, 1)
|
83
|
-
expect(false).toBe(true);
|
84
|
-
} catch (error) {
|
85
|
-
expect(error).toBeInstanceOf(ClassError);
|
86
|
-
expect(error.message).toBe('UserSystemAccess not found');
|
87
|
-
}
|
88
|
-
});
|
89
|
-
});
|
1
|
+
import { UserSystemAccess } from '../../../../src/components/user-system-access/user-system-access';
|
2
|
+
import { UserSystemAccessRepository } from '../../../../src/components/user-system-access/user-system-access.repository';
|
3
|
+
import { ClassError } from '@tomei/general';
|
4
|
+
|
5
|
+
describe('UserSystemAccess', () => {
|
6
|
+
let userSystemAccess: UserSystemAccess;
|
7
|
+
const userSystemAccessAttr = {
|
8
|
+
UserSystemAccessId: 1,
|
9
|
+
UserId: 1,
|
10
|
+
SystemCode: 'system1',
|
11
|
+
Status: 'active',
|
12
|
+
CreatedById: 1,
|
13
|
+
CreatedAt: new Date(),
|
14
|
+
UpdatedById: 1,
|
15
|
+
UpdatedAt: new Date(),
|
16
|
+
};
|
17
|
+
|
18
|
+
beforeEach(() => {
|
19
|
+
userSystemAccess = new (UserSystemAccess as any)(userSystemAccessAttr);
|
20
|
+
});
|
21
|
+
|
22
|
+
afterEach(() => {
|
23
|
+
jest.clearAllMocks();
|
24
|
+
});
|
25
|
+
|
26
|
+
describe('constructor', () => {
|
27
|
+
it('should create a new UserSystemAccess instance', () => {
|
28
|
+
expect(userSystemAccess).toBeDefined();
|
29
|
+
expect(userSystemAccess).toBeInstanceOf(UserSystemAccess);
|
30
|
+
expect(userSystemAccess.UserSystemAccessId).toBe(
|
31
|
+
userSystemAccessAttr.UserSystemAccessId
|
32
|
+
);
|
33
|
+
expect(userSystemAccess.UserId).toBe(userSystemAccessAttr.UserId);
|
34
|
+
expect(userSystemAccess.SystemCode).toBe(userSystemAccessAttr.SystemCode);
|
35
|
+
expect(userSystemAccess.Status).toBe(userSystemAccessAttr.Status);
|
36
|
+
expect(userSystemAccess.CreatedById).toBe(
|
37
|
+
userSystemAccessAttr.CreatedById
|
38
|
+
);
|
39
|
+
expect(userSystemAccess.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
|
40
|
+
expect(userSystemAccess.UpdatedById).toBe(
|
41
|
+
userSystemAccessAttr.UpdatedById
|
42
|
+
);
|
43
|
+
expect(userSystemAccess.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
|
44
|
+
});
|
45
|
+
});
|
46
|
+
|
47
|
+
describe('init', () => {
|
48
|
+
it('should initialize UserSystemAccess with valid UserSystemAccessId', async () => {
|
49
|
+
const findOneMock = jest
|
50
|
+
.spyOn(UserSystemAccessRepository.prototype, 'findOne')
|
51
|
+
.mockResolvedValueOnce({
|
52
|
+
...userSystemAccessAttr,
|
53
|
+
get: () => userSystemAccessAttr,
|
54
|
+
} as any);
|
55
|
+
|
56
|
+
const result = await UserSystemAccess.init(null, 1);
|
57
|
+
|
58
|
+
expect(findOneMock).toHaveBeenCalledTimes(1);
|
59
|
+
expect(findOneMock).toHaveBeenCalledWith({
|
60
|
+
where: { UserSystemAccessId: 1 },
|
61
|
+
transaction: null,
|
62
|
+
});
|
63
|
+
expect(result).toBeInstanceOf(UserSystemAccess);
|
64
|
+
expect(result.UserSystemAccessId).toBe(
|
65
|
+
userSystemAccessAttr.UserSystemAccessId
|
66
|
+
);
|
67
|
+
expect(result.UserId).toBe(userSystemAccessAttr.UserId);
|
68
|
+
expect(result.SystemCode).toBe(userSystemAccessAttr.SystemCode);
|
69
|
+
expect(result.Status).toBe(userSystemAccessAttr.Status);
|
70
|
+
expect(result.CreatedById).toBe(userSystemAccessAttr.CreatedById);
|
71
|
+
expect(result.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
|
72
|
+
expect(result.UpdatedById).toBe(userSystemAccessAttr.UpdatedById);
|
73
|
+
expect(result.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
|
74
|
+
});
|
75
|
+
|
76
|
+
it('should throw ClassError when UserSystemAccessId is not found', async () => {
|
77
|
+
jest
|
78
|
+
.spyOn(UserSystemAccessRepository.prototype, 'findOne')
|
79
|
+
.mockResolvedValueOnce(null);
|
80
|
+
|
81
|
+
try {
|
82
|
+
await UserSystemAccess.init(null, 1)
|
83
|
+
expect(false).toBe(true);
|
84
|
+
} catch (error) {
|
85
|
+
expect(error).toBeInstanceOf(ClassError);
|
86
|
+
expect(error.message).toBe('UserSystemAccess not found');
|
87
|
+
}
|
88
|
+
});
|
89
|
+
});
|
90
90
|
});
|
@@ -1,24 +1,24 @@
|
|
1
|
-
import { RedisService } from "../../../src/redis-client/redis.service";
|
2
|
-
require('dotenv').config()
|
3
|
-
// nneed to figure out how to mock redis
|
4
|
-
describe('redis.service', () => {
|
5
|
-
|
6
|
-
afterEach(() => {
|
7
|
-
jest.restoreAllMocks()
|
8
|
-
})
|
9
|
-
|
10
|
-
it('should return redis service when instansiated', async () => {
|
11
|
-
const redisService = await RedisService.init();
|
12
|
-
expect(redisService).toBeDefined();
|
13
|
-
});
|
14
|
-
|
15
|
-
it('should able to write and read redis', async () => {
|
16
|
-
const data = {
|
17
|
-
test: 'test'
|
18
|
-
}
|
19
|
-
const redisService = await RedisService.init();
|
20
|
-
await redisService.set("test", data, 60 * 60 * 24 * 1)
|
21
|
-
const result = await redisService.get("test");
|
22
|
-
expect(result).toEqual(JSON.stringify(data));
|
23
|
-
});
|
1
|
+
import { RedisService } from "../../../src/redis-client/redis.service";
|
2
|
+
require('dotenv').config()
|
3
|
+
// nneed to figure out how to mock redis
|
4
|
+
describe('redis.service', () => {
|
5
|
+
|
6
|
+
afterEach(() => {
|
7
|
+
jest.restoreAllMocks()
|
8
|
+
})
|
9
|
+
|
10
|
+
it('should return redis service when instansiated', async () => {
|
11
|
+
const redisService = await RedisService.init();
|
12
|
+
expect(redisService).toBeDefined();
|
13
|
+
});
|
14
|
+
|
15
|
+
it('should able to write and read redis', async () => {
|
16
|
+
const data = {
|
17
|
+
test: 'test'
|
18
|
+
}
|
19
|
+
const redisService = await RedisService.init();
|
20
|
+
await redisService.set("test", data, 60 * 60 * 24 * 1)
|
21
|
+
const result = await redisService.get("test");
|
22
|
+
expect(result).toEqual(JSON.stringify(data));
|
23
|
+
});
|
24
24
|
});
|
@@ -1,47 +1,47 @@
|
|
1
|
-
import { IUserSession } from '../../../src/interfaces/user-session.interface';
|
2
|
-
import { SessionService } from '../../../src/session/session.service';
|
3
|
-
require('dotenv').config()
|
4
|
-
|
5
|
-
describe('session.service', () => {
|
6
|
-
it('should return session service when instansiated', async () => {
|
7
|
-
const sessionService = await SessionService.init();
|
8
|
-
expect(sessionService).toBeDefined();
|
9
|
-
});
|
10
|
-
|
11
|
-
it('should able to write session data', async () => {
|
12
|
-
const data: IUserSession = {
|
13
|
-
systemLogins: [
|
14
|
-
{
|
15
|
-
id: '1',
|
16
|
-
code: 'EZC',
|
17
|
-
sessionId: 'test1',
|
18
|
-
privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
|
19
|
-
},
|
20
|
-
],
|
21
|
-
};
|
22
|
-
const sessionService = await SessionService.init();
|
23
|
-
await sessionService.setUserSession("1", data)
|
24
|
-
const result = await sessionService.retrieveUserSession("1");
|
25
|
-
expect(result).toEqual(data);
|
26
|
-
});
|
27
|
-
|
28
|
-
it('should able to refresh session data', async () => {
|
29
|
-
const setUserSession = jest.spyOn(SessionService.prototype, 'setUserSession');
|
30
|
-
const retrieveUserSession = jest.spyOn(SessionService.prototype, 'retrieveUserSession');
|
31
|
-
const data: IUserSession = {
|
32
|
-
systemLogins: [
|
33
|
-
{
|
34
|
-
id: '1',
|
35
|
-
code: 'EZC',
|
36
|
-
sessionId: 'test1',
|
37
|
-
privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
|
38
|
-
},
|
39
|
-
],
|
40
|
-
};
|
41
|
-
const sessionService = await SessionService.init();
|
42
|
-
await sessionService.setUserSession("1", data)
|
43
|
-
await sessionService.refreshDuration("1");
|
44
|
-
expect(setUserSession).toBeCalledTimes(2);
|
45
|
-
expect(retrieveUserSession).toBeCalledTimes(1);
|
46
|
-
});
|
47
|
-
});
|
1
|
+
import { IUserSession } from '../../../src/interfaces/user-session.interface';
|
2
|
+
import { SessionService } from '../../../src/session/session.service';
|
3
|
+
require('dotenv').config()
|
4
|
+
|
5
|
+
describe('session.service', () => {
|
6
|
+
it('should return session service when instansiated', async () => {
|
7
|
+
const sessionService = await SessionService.init();
|
8
|
+
expect(sessionService).toBeDefined();
|
9
|
+
});
|
10
|
+
|
11
|
+
it('should able to write session data', async () => {
|
12
|
+
const data: IUserSession = {
|
13
|
+
systemLogins: [
|
14
|
+
{
|
15
|
+
id: '1',
|
16
|
+
code: 'EZC',
|
17
|
+
sessionId: 'test1',
|
18
|
+
privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
|
19
|
+
},
|
20
|
+
],
|
21
|
+
};
|
22
|
+
const sessionService = await SessionService.init();
|
23
|
+
await sessionService.setUserSession("1", data)
|
24
|
+
const result = await sessionService.retrieveUserSession("1");
|
25
|
+
expect(result).toEqual(data);
|
26
|
+
});
|
27
|
+
|
28
|
+
it('should able to refresh session data', async () => {
|
29
|
+
const setUserSession = jest.spyOn(SessionService.prototype, 'setUserSession');
|
30
|
+
const retrieveUserSession = jest.spyOn(SessionService.prototype, 'retrieveUserSession');
|
31
|
+
const data: IUserSession = {
|
32
|
+
systemLogins: [
|
33
|
+
{
|
34
|
+
id: '1',
|
35
|
+
code: 'EZC',
|
36
|
+
sessionId: 'test1',
|
37
|
+
privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
|
38
|
+
},
|
39
|
+
],
|
40
|
+
};
|
41
|
+
const sessionService = await SessionService.init();
|
42
|
+
await sessionService.setUserSession("1", data)
|
43
|
+
await sessionService.refreshDuration("1");
|
44
|
+
expect(setUserSession).toBeCalledTimes(2);
|
45
|
+
expect(retrieveUserSession).toBeCalledTimes(1);
|
46
|
+
});
|
47
|
+
});
|
@@ -1,91 +1,91 @@
|
|
1
|
-
// import { Privilege } from '../../../src/components/system-privilege/privilege';
|
2
|
-
// import { SystemPrivilegeRepository } from '../../../src/components/system-privilege/system-privilege.repository';
|
3
|
-
// import { SystemRepository } from '../../../src/components/system/system.repository';
|
4
|
-
// describe('SystemPrivilege', () => {
|
5
|
-
// afterEach(async () => {
|
6
|
-
// jest.restoreAllMocks();
|
7
|
-
// });
|
8
|
-
// it('should be able to load single package privileges', async () => {
|
9
|
-
// let privilegeCalled = 0;
|
10
|
-
// const findOrCreateMock = jest
|
11
|
-
// .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
|
12
|
-
// .mockResolvedValueOnce([{}, true] as any);
|
13
|
-
|
14
|
-
// const systemRepositoryMock = jest
|
15
|
-
// .spyOn(SystemRepository.prototype, 'findOne')
|
16
|
-
// .mockResolvedValueOnce({
|
17
|
-
// id: 175,
|
18
|
-
// } as any);
|
19
|
-
|
20
|
-
// jest.mock('@tomei/mailer/privileges.json', () => {
|
21
|
-
// privilegeCalled++;
|
22
|
-
// return {
|
23
|
-
// Privileges: [
|
24
|
-
// {
|
25
|
-
// Code: 'Privilege1',
|
26
|
-
// Description: 'This is Privilege1',
|
27
|
-
// },
|
28
|
-
// ],
|
29
|
-
// };
|
30
|
-
// });
|
31
|
-
|
32
|
-
// await Privilege.loadPrivileges('mailer', 'EZC');
|
33
|
-
// expect(findOrCreateMock).toBeCalledTimes(1);
|
34
|
-
// expect(systemRepositoryMock).toBeCalledTimes(1);
|
35
|
-
// expect(privilegeCalled).toEqual(1);
|
36
|
-
// });
|
37
|
-
|
38
|
-
// it('should be able to load multiple package privileges', async () => {
|
39
|
-
// let privilegeCalled = 0;
|
40
|
-
// const findOrCreateMock = jest
|
41
|
-
// .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
|
42
|
-
// .mockResolvedValueOnce([{}, true] as any);
|
43
|
-
|
44
|
-
// const systemRepositoryMock = jest
|
45
|
-
// .spyOn(SystemRepository.prototype, 'findOne')
|
46
|
-
// .mockResolvedValueOnce({
|
47
|
-
// id: 175,
|
48
|
-
// } as any);
|
49
|
-
|
50
|
-
// jest.mock(
|
51
|
-
// '@tomei/mailer/privileges.json',
|
52
|
-
// () => {
|
53
|
-
// privilegeCalled++;
|
54
|
-
// return {
|
55
|
-
// Privileges: [
|
56
|
-
// {
|
57
|
-
// Code: 'Privilege1',
|
58
|
-
// Description: 'This is Privilege1',
|
59
|
-
// },
|
60
|
-
// ],
|
61
|
-
// };
|
62
|
-
// },
|
63
|
-
// );
|
64
|
-
|
65
|
-
// jest.mock(
|
66
|
-
// '@tomei/config/privileges.json',
|
67
|
-
// () => {
|
68
|
-
// privilegeCalled++;
|
69
|
-
// return {
|
70
|
-
// Privileges: [
|
71
|
-
// {
|
72
|
-
// Code: 'Privilege2',
|
73
|
-
// Description: 'This is Privilege2',
|
74
|
-
// },
|
75
|
-
// ],
|
76
|
-
// };
|
77
|
-
// },
|
78
|
-
// );
|
79
|
-
|
80
|
-
// await Privilege.loadPrivileges(['mailer', 'config'], 'EZC');
|
81
|
-
// expect(findOrCreateMock).toBeCalledTimes(2);
|
82
|
-
// expect(systemRepositoryMock).toBeCalledTimes(1);
|
83
|
-
// expect(privilegeCalled).toEqual(2);
|
84
|
-
// });
|
85
|
-
// });
|
86
|
-
|
87
|
-
describe('SystemPrivilege', () => {
|
88
|
-
it('should be true', () => {
|
89
|
-
expect(true).toBe(true);
|
90
|
-
});
|
91
|
-
});
|
1
|
+
// import { Privilege } from '../../../src/components/system-privilege/privilege';
|
2
|
+
// import { SystemPrivilegeRepository } from '../../../src/components/system-privilege/system-privilege.repository';
|
3
|
+
// import { SystemRepository } from '../../../src/components/system/system.repository';
|
4
|
+
// describe('SystemPrivilege', () => {
|
5
|
+
// afterEach(async () => {
|
6
|
+
// jest.restoreAllMocks();
|
7
|
+
// });
|
8
|
+
// it('should be able to load single package privileges', async () => {
|
9
|
+
// let privilegeCalled = 0;
|
10
|
+
// const findOrCreateMock = jest
|
11
|
+
// .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
|
12
|
+
// .mockResolvedValueOnce([{}, true] as any);
|
13
|
+
|
14
|
+
// const systemRepositoryMock = jest
|
15
|
+
// .spyOn(SystemRepository.prototype, 'findOne')
|
16
|
+
// .mockResolvedValueOnce({
|
17
|
+
// id: 175,
|
18
|
+
// } as any);
|
19
|
+
|
20
|
+
// jest.mock('@tomei/mailer/privileges.json', () => {
|
21
|
+
// privilegeCalled++;
|
22
|
+
// return {
|
23
|
+
// Privileges: [
|
24
|
+
// {
|
25
|
+
// Code: 'Privilege1',
|
26
|
+
// Description: 'This is Privilege1',
|
27
|
+
// },
|
28
|
+
// ],
|
29
|
+
// };
|
30
|
+
// });
|
31
|
+
|
32
|
+
// await Privilege.loadPrivileges('mailer', 'EZC');
|
33
|
+
// expect(findOrCreateMock).toBeCalledTimes(1);
|
34
|
+
// expect(systemRepositoryMock).toBeCalledTimes(1);
|
35
|
+
// expect(privilegeCalled).toEqual(1);
|
36
|
+
// });
|
37
|
+
|
38
|
+
// it('should be able to load multiple package privileges', async () => {
|
39
|
+
// let privilegeCalled = 0;
|
40
|
+
// const findOrCreateMock = jest
|
41
|
+
// .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
|
42
|
+
// .mockResolvedValueOnce([{}, true] as any);
|
43
|
+
|
44
|
+
// const systemRepositoryMock = jest
|
45
|
+
// .spyOn(SystemRepository.prototype, 'findOne')
|
46
|
+
// .mockResolvedValueOnce({
|
47
|
+
// id: 175,
|
48
|
+
// } as any);
|
49
|
+
|
50
|
+
// jest.mock(
|
51
|
+
// '@tomei/mailer/privileges.json',
|
52
|
+
// () => {
|
53
|
+
// privilegeCalled++;
|
54
|
+
// return {
|
55
|
+
// Privileges: [
|
56
|
+
// {
|
57
|
+
// Code: 'Privilege1',
|
58
|
+
// Description: 'This is Privilege1',
|
59
|
+
// },
|
60
|
+
// ],
|
61
|
+
// };
|
62
|
+
// },
|
63
|
+
// );
|
64
|
+
|
65
|
+
// jest.mock(
|
66
|
+
// '@tomei/config/privileges.json',
|
67
|
+
// () => {
|
68
|
+
// privilegeCalled++;
|
69
|
+
// return {
|
70
|
+
// Privileges: [
|
71
|
+
// {
|
72
|
+
// Code: 'Privilege2',
|
73
|
+
// Description: 'This is Privilege2',
|
74
|
+
// },
|
75
|
+
// ],
|
76
|
+
// };
|
77
|
+
// },
|
78
|
+
// );
|
79
|
+
|
80
|
+
// await Privilege.loadPrivileges(['mailer', 'config'], 'EZC');
|
81
|
+
// expect(findOrCreateMock).toBeCalledTimes(2);
|
82
|
+
// expect(systemRepositoryMock).toBeCalledTimes(1);
|
83
|
+
// expect(privilegeCalled).toEqual(2);
|
84
|
+
// });
|
85
|
+
// });
|
86
|
+
|
87
|
+
describe('SystemPrivilege', () => {
|
88
|
+
it('should be true', () => {
|
89
|
+
expect(true).toBe(true);
|
90
|
+
});
|
91
|
+
});
|