@tomei/sso 0.33.6 → 0.33.8
Sign up to get free protection for your applications and to get access to all the features.
- package/.commitlintrc.json +22 -22
- package/.eslintrc +16 -16
- package/.eslintrc.js +35 -35
- package/.gitlab-ci.yml +16 -16
- package/.husky/commit-msg +15 -15
- package/.husky/pre-commit +7 -7
- package/.prettierrc +4 -4
- package/Jenkinsfile +57 -57
- package/README.md +23 -23
- package/__tests__/unit/components/group/group.spec.ts +79 -79
- package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
- package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
- package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
- package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
- package/__tests__/unit/components/login-user/l.spec.ts +746 -746
- package/__tests__/unit/components/login-user/login.spec.ts +1064 -1064
- package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
- package/__tests__/unit/components/system/system.spec.ts +254 -254
- package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
- package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
- package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
- package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
- package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
- package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
- package/__tests__/unit/session/session.service.spec.ts +47 -47
- package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
- package/coverage/clover.xml +1452 -1452
- package/coverage/coverage-final.json +47 -47
- package/coverage/lcov-report/base.css +224 -224
- package/coverage/lcov-report/block-navigation.js +87 -87
- package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group/group.ts.html +327 -327
- package/coverage/lcov-report/components/group/index.html +130 -130
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
- package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
- package/coverage/lcov-report/components/group-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
- package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
- package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
- package/coverage/lcov-report/components/group-system-access/index.html +130 -130
- package/coverage/lcov-report/components/login-history/index.html +115 -115
- package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
- package/coverage/lcov-report/components/login-user/index.html +130 -130
- package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
- package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/password-hash/index.html +115 -115
- package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
- package/coverage/lcov-report/components/system/index.html +130 -130
- package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
- package/coverage/lcov-report/components/system/system.ts.html +909 -909
- package/coverage/lcov-report/components/system-privilege/index.html +130 -130
- package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
- package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
- package/coverage/lcov-report/components/user-group/index.html +130 -130
- package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
- package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
- package/coverage/lcov-report/components/user-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
- package/coverage/lcov-report/components/user-system-access/index.html +130 -130
- package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
- package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
- package/coverage/lcov-report/enum/index.html +160 -160
- package/coverage/lcov-report/enum/index.ts.html +93 -93
- package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
- package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
- package/coverage/lcov-report/index.html +370 -370
- package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
- package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
- package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
- package/coverage/lcov-report/models/group.entity.ts.html +435 -435
- package/coverage/lcov-report/models/index.html +310 -310
- package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
- package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
- package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
- package/coverage/lcov-report/models/system.entity.ts.html +423 -423
- package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
- package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
- package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user.entity.ts.html +522 -522
- package/coverage/lcov-report/prettify.css +1 -1
- package/coverage/lcov-report/prettify.js +2 -2
- package/coverage/lcov-report/redis-client/index.html +115 -115
- package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
- package/coverage/lcov-report/session/index.html +115 -115
- package/coverage/lcov-report/session/session.service.ts.html +246 -246
- package/coverage/lcov-report/sorter.js +196 -196
- package/coverage/lcov.info +2490 -2490
- package/coverage/test-report.xml +128 -128
- package/create-sso-user.sql +39 -39
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +1 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +71 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +1 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js +6 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +1 -0
- package/dist/src/components/group/group.d.ts +27 -0
- package/dist/src/components/group/group.js +432 -4
- package/dist/src/components/group/group.js.map +1 -1
- package/dist/src/components/group-object-privilege/group-object-privilege.d.ts +3 -0
- package/dist/src/components/group-object-privilege/group-object-privilege.js +106 -0
- package/dist/src/components/group-object-privilege/group-object-privilege.js.map +1 -1
- package/dist/src/components/group-object-privilege/group-object-privilege.repository.d.ts +1 -0
- package/dist/src/components/group-object-privilege/group-object-privilege.repository.js +22 -0
- package/dist/src/components/group-object-privilege/group-object-privilege.repository.js.map +1 -1
- package/dist/src/components/group-privilege/group-privilege.d.ts +2 -0
- package/dist/src/components/group-privilege/group-privilege.js +10 -0
- package/dist/src/components/group-privilege/group-privilege.js.map +1 -1
- package/dist/src/components/group-privilege/group-privilege.repository.d.ts +1 -0
- package/dist/src/components/group-privilege/group-privilege.repository.js +22 -0
- package/dist/src/components/group-privilege/group-privilege.repository.js.map +1 -1
- package/dist/src/components/login-user/login-user.d.ts +1 -1
- package/dist/src/components/system-privilege/system-privilege.d.ts +7 -0
- package/dist/src/components/system-privilege/system-privilege.js +54 -1
- package/dist/src/components/system-privilege/system-privilege.js.map +1 -1
- package/dist/src/components/user-object-privilege/user-object-privilege.js.map +1 -1
- package/dist/src/interfaces/group-object-privilege.interface.d.ts +1 -1
- package/dist/src/interfaces/group-privilege.interface.d.ts +1 -1
- package/dist/src/interfaces/system-privilege-search.interface.d.ts +5 -0
- package/dist/src/interfaces/system-privilege-search.interface.js +3 -0
- package/dist/src/interfaces/system-privilege-search.interface.js.map +1 -0
- package/dist/src/models/group-object-privilege.entity.js +1 -0
- package/dist/src/models/group-object-privilege.entity.js.map +1 -1
- package/dist/src/models/group-privilege.entity.js +1 -0
- package/dist/src/models/group-privilege.entity.js.map +1 -1
- package/dist/src/models/group-reporting-user.entity.js +1 -0
- package/dist/src/models/group-reporting-user.entity.js.map +1 -1
- package/dist/src/models/user-object-privilege.entity.js +1 -0
- package/dist/src/models/user-object-privilege.entity.js.map +1 -1
- package/dist/src/models/user-privilege.entity.js +1 -0
- package/dist/src/models/user-privilege.entity.js.map +1 -1
- package/dist/src/models/user-system-access.entity.js +1 -0
- package/dist/src/models/user-system-access.entity.js.map +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/jest.config.js +14 -14
- package/migrations/20240314080602-create-user-table.js +108 -108
- package/migrations/20240314080603-create-user-group-table.js +85 -85
- package/migrations/20240314080604-create-user-user-group-table.js +55 -55
- package/migrations/20240314080605-create-login-history-table.js +53 -53
- package/migrations/20240527064925-create-system-table.js +78 -78
- package/migrations/20240527064926-create-system-privilege-table.js +67 -67
- package/migrations/20240527065342-create-group-table.js +89 -89
- package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
- package/migrations/20240528011551-create-group-system-access-table.js +72 -72
- package/migrations/20240528023018-user-system-access-table.js +75 -75
- package/migrations/20240528032229-user-privilege-table.js +75 -75
- package/migrations/20240528063003-create-group-privilege-table.js +75 -75
- package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
- package/migrations/20240528063107-create-user-object-privilege-table.js +83 -83
- package/package.json +89 -89
- package/sampledotenv +7 -7
- package/sonar-project.properties +22 -22
- package/src/components/group/group.ts +1456 -747
- package/src/components/group-object-privilege/group-object-privilege.repository.ts +15 -2
- package/src/components/group-object-privilege/group-object-privilege.ts +183 -0
- package/src/components/group-privilege/group-privilege.repository.ts +12 -2
- package/src/components/group-privilege/group-privilege.ts +11 -0
- package/src/components/system-privilege/system-privilege.ts +86 -2
- package/src/components/user-object-privilege/user-object-privilege.ts +1 -0
- package/src/interfaces/group-object-privilege.interface.ts +14 -14
- package/src/interfaces/group-privilege.interface.ts +1 -1
- package/src/interfaces/system-privilege-search.interface.ts +5 -0
- package/src/models/group-object-privilege.entity.ts +1 -0
- package/src/models/group-privilege.entity.ts +1 -0
- package/src/models/group-reporting-user.entity.ts +1 -0
- package/src/models/group-system-access.entity.ts +81 -81
- package/src/models/user-object-privilege.entity.ts +1 -0
- package/src/models/user-privilege.entity.ts +1 -0
- package/src/models/user-system-access.entity.ts +1 -0
- package/tsconfig.build.json +5 -5
- package/tsconfig.json +22 -22
@@ -1,84 +1,84 @@
|
|
1
|
-
import { SystemPrivilege } from '../../../../src/components/system-privilege/system-privilege';
|
2
|
-
import { SystemPrivilegeRepository } from '../../../../src/components/system-privilege/system-privilege.repository';
|
3
|
-
import { ClassError } from '@tomei/general';
|
4
|
-
|
5
|
-
describe('SystemPrivilege', () => {
|
6
|
-
let systemPrivilege: SystemPrivilege;
|
7
|
-
const systemPrivilegeAttr = {
|
8
|
-
PrivilegeCode: 'test',
|
9
|
-
SystemCode: 'test',
|
10
|
-
Name: 'test',
|
11
|
-
Description: 'test',
|
12
|
-
Status: 'test',
|
13
|
-
CreatedById: 1,
|
14
|
-
CreatedAt: new Date(),
|
15
|
-
UpdatedById: 1,
|
16
|
-
UpdatedAt: new Date(),
|
17
|
-
};
|
18
|
-
|
19
|
-
beforeEach(() => {
|
20
|
-
jest.resetAllMocks();
|
21
|
-
});
|
22
|
-
|
23
|
-
describe('constructor', () => {
|
24
|
-
it('should create a new SystemPrivilege instance', () => {
|
25
|
-
systemPrivilege = new (SystemPrivilege as any)(systemPrivilegeAttr);
|
26
|
-
|
27
|
-
expect(systemPrivilege).toBeDefined();
|
28
|
-
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
29
|
-
expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
|
30
|
-
expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
|
31
|
-
expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
|
32
|
-
expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
|
33
|
-
expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
|
34
|
-
expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
|
35
|
-
expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
|
36
|
-
expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
|
37
|
-
});
|
38
|
-
});
|
39
|
-
|
40
|
-
describe('init', () => {
|
41
|
-
it('should initialize SystemPrivilege without PrivilegeCode', async () => {
|
42
|
-
const systemPrivilege = await SystemPrivilege.init(null);
|
43
|
-
expect(systemPrivilege).toBeDefined();
|
44
|
-
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
45
|
-
expect(systemPrivilege.PrivilegeCode).toBeUndefined();
|
46
|
-
expect(systemPrivilege.SystemCode).toBeUndefined();
|
47
|
-
expect(systemPrivilege.Description).toBeUndefined();
|
48
|
-
expect(systemPrivilege.Status).toBeUndefined();
|
49
|
-
expect(systemPrivilege.CreatedById).toBeUndefined();
|
50
|
-
expect(systemPrivilege.CreatedAt).toBeUndefined();
|
51
|
-
expect(systemPrivilege.UpdatedById).toBeUndefined();
|
52
|
-
expect(systemPrivilege.UpdatedAt).toBeUndefined();
|
53
|
-
});
|
54
|
-
|
55
|
-
it('should initialize SystemPrivilege with PrivilegeCode', async () => {
|
56
|
-
const findByPkSpy = jest
|
57
|
-
.spyOn(SystemPrivilegeRepository.prototype, 'findByPk')
|
58
|
-
.mockResolvedValue(systemPrivilegeAttr as any);
|
59
|
-
|
60
|
-
const systemPrivilege = await SystemPrivilege.init(null, 'test');
|
61
|
-
expect(findByPkSpy).toHaveBeenCalledWith('test', {
|
62
|
-
transaction: null,
|
63
|
-
});
|
64
|
-
expect(systemPrivilege).toBeDefined();
|
65
|
-
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
66
|
-
expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
|
67
|
-
expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
|
68
|
-
expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
|
69
|
-
expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
|
70
|
-
expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
|
71
|
-
expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
|
72
|
-
expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
|
73
|
-
expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
|
74
|
-
});
|
75
|
-
|
76
|
-
it('should throw an error if PrivilegeCode is not found', async () => {
|
77
|
-
jest.spyOn(SystemPrivilegeRepository.prototype, 'findByPk').mockResolvedValue(null);
|
78
|
-
|
79
|
-
await expect(SystemPrivilege.init(null, 'test')).rejects.toThrow(
|
80
|
-
new ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg00', 'System Privilege Not Found'),
|
81
|
-
);
|
82
|
-
});
|
83
|
-
});
|
1
|
+
import { SystemPrivilege } from '../../../../src/components/system-privilege/system-privilege';
|
2
|
+
import { SystemPrivilegeRepository } from '../../../../src/components/system-privilege/system-privilege.repository';
|
3
|
+
import { ClassError } from '@tomei/general';
|
4
|
+
|
5
|
+
describe('SystemPrivilege', () => {
|
6
|
+
let systemPrivilege: SystemPrivilege;
|
7
|
+
const systemPrivilegeAttr = {
|
8
|
+
PrivilegeCode: 'test',
|
9
|
+
SystemCode: 'test',
|
10
|
+
Name: 'test',
|
11
|
+
Description: 'test',
|
12
|
+
Status: 'test',
|
13
|
+
CreatedById: 1,
|
14
|
+
CreatedAt: new Date(),
|
15
|
+
UpdatedById: 1,
|
16
|
+
UpdatedAt: new Date(),
|
17
|
+
};
|
18
|
+
|
19
|
+
beforeEach(() => {
|
20
|
+
jest.resetAllMocks();
|
21
|
+
});
|
22
|
+
|
23
|
+
describe('constructor', () => {
|
24
|
+
it('should create a new SystemPrivilege instance', () => {
|
25
|
+
systemPrivilege = new (SystemPrivilege as any)(systemPrivilegeAttr);
|
26
|
+
|
27
|
+
expect(systemPrivilege).toBeDefined();
|
28
|
+
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
29
|
+
expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
|
30
|
+
expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
|
31
|
+
expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
|
32
|
+
expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
|
33
|
+
expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
|
34
|
+
expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
|
35
|
+
expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
|
36
|
+
expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
|
37
|
+
});
|
38
|
+
});
|
39
|
+
|
40
|
+
describe('init', () => {
|
41
|
+
it('should initialize SystemPrivilege without PrivilegeCode', async () => {
|
42
|
+
const systemPrivilege = await SystemPrivilege.init(null);
|
43
|
+
expect(systemPrivilege).toBeDefined();
|
44
|
+
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
45
|
+
expect(systemPrivilege.PrivilegeCode).toBeUndefined();
|
46
|
+
expect(systemPrivilege.SystemCode).toBeUndefined();
|
47
|
+
expect(systemPrivilege.Description).toBeUndefined();
|
48
|
+
expect(systemPrivilege.Status).toBeUndefined();
|
49
|
+
expect(systemPrivilege.CreatedById).toBeUndefined();
|
50
|
+
expect(systemPrivilege.CreatedAt).toBeUndefined();
|
51
|
+
expect(systemPrivilege.UpdatedById).toBeUndefined();
|
52
|
+
expect(systemPrivilege.UpdatedAt).toBeUndefined();
|
53
|
+
});
|
54
|
+
|
55
|
+
it('should initialize SystemPrivilege with PrivilegeCode', async () => {
|
56
|
+
const findByPkSpy = jest
|
57
|
+
.spyOn(SystemPrivilegeRepository.prototype, 'findByPk')
|
58
|
+
.mockResolvedValue(systemPrivilegeAttr as any);
|
59
|
+
|
60
|
+
const systemPrivilege = await SystemPrivilege.init(null, 'test');
|
61
|
+
expect(findByPkSpy).toHaveBeenCalledWith('test', {
|
62
|
+
transaction: null,
|
63
|
+
});
|
64
|
+
expect(systemPrivilege).toBeDefined();
|
65
|
+
expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
|
66
|
+
expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
|
67
|
+
expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
|
68
|
+
expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
|
69
|
+
expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
|
70
|
+
expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
|
71
|
+
expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
|
72
|
+
expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
|
73
|
+
expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
|
74
|
+
});
|
75
|
+
|
76
|
+
it('should throw an error if PrivilegeCode is not found', async () => {
|
77
|
+
jest.spyOn(SystemPrivilegeRepository.prototype, 'findByPk').mockResolvedValue(null);
|
78
|
+
|
79
|
+
await expect(SystemPrivilege.init(null, 'test')).rejects.toThrow(
|
80
|
+
new ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg00', 'System Privilege Not Found'),
|
81
|
+
);
|
82
|
+
});
|
83
|
+
});
|
84
84
|
});
|
@@ -1,87 +1,87 @@
|
|
1
|
-
import { UserGroup } from '../../../../src/components/user-group/user-group';
|
2
|
-
import { UserGroupRepository } from '../../../../src/components/user-group/user-group.repository';
|
3
|
-
import { ClassError } from '@tomei/general';
|
4
|
-
|
5
|
-
describe('UserGroup', () => {
|
6
|
-
let userGroup: UserGroup;
|
7
|
-
const userGroupAttr = {
|
8
|
-
UserGroupId: 1,
|
9
|
-
UserId: 1,
|
10
|
-
GroupCode: 'group1',
|
11
|
-
Status: 'active',
|
12
|
-
InheritGroupPrivilegeYN: 'yes',
|
13
|
-
InheritGroupSystemAccessYN: 'yes',
|
14
|
-
CreatedById: 1,
|
15
|
-
CreatedAt: new Date(),
|
16
|
-
UpdatedById: 1,
|
17
|
-
UpdatedAt: new Date(),
|
18
|
-
};
|
19
|
-
|
20
|
-
beforeEach(() => {
|
21
|
-
userGroup = new (UserGroup as any)(userGroupAttr);
|
22
|
-
});
|
23
|
-
|
24
|
-
afterEach(() => {
|
25
|
-
jest.clearAllMocks();
|
26
|
-
});
|
27
|
-
|
28
|
-
describe('constructor', () => {
|
29
|
-
it('should create a new UserGroup instance', () => {
|
30
|
-
expect(userGroup).toBeDefined();
|
31
|
-
expect(userGroup).toBeInstanceOf(UserGroup);
|
32
|
-
expect(userGroup.UserGroupId).toBe(userGroupAttr.UserGroupId);
|
33
|
-
expect(userGroup.UserId).toBe(userGroupAttr.UserId);
|
34
|
-
expect(userGroup.GroupCode).toBe(userGroupAttr.GroupCode);
|
35
|
-
expect(userGroup.Status).toBe(userGroupAttr.Status);
|
36
|
-
expect(userGroup.InheritGroupPrivilegeYN).toBe(
|
37
|
-
userGroupAttr.InheritGroupPrivilegeYN
|
38
|
-
);
|
39
|
-
expect(userGroup.InheritGroupSystemAccessYN).toBe(
|
40
|
-
userGroupAttr.InheritGroupSystemAccessYN
|
41
|
-
);
|
42
|
-
expect(userGroup.CreatedById).toBe(userGroupAttr.CreatedById);
|
43
|
-
expect(userGroup.CreatedAt).toBe(userGroupAttr.CreatedAt);
|
44
|
-
expect(userGroup.UpdatedById).toBe(userGroupAttr.UpdatedById);
|
45
|
-
expect(userGroup.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
|
46
|
-
});
|
47
|
-
});
|
48
|
-
|
49
|
-
describe('init', () => {
|
50
|
-
it('should initialize UserGroup with valid UserGroupId', async () => {
|
51
|
-
const findOneMock = jest
|
52
|
-
.spyOn(UserGroupRepository.prototype, 'findOne')
|
53
|
-
.mockResolvedValueOnce(userGroupAttr as any);
|
54
|
-
|
55
|
-
const result = await UserGroup.init(null, 1);
|
56
|
-
|
57
|
-
expect(findOneMock).toHaveBeenCalledTimes(1);
|
58
|
-
expect(findOneMock).toHaveBeenCalledWith({
|
59
|
-
where: { UserGroupId: 1 },
|
60
|
-
transaction: null,
|
61
|
-
});
|
62
|
-
expect(result).toBeInstanceOf(UserGroup);
|
63
|
-
expect(result.UserGroupId).toBe(userGroupAttr.UserGroupId);
|
64
|
-
expect(result.UserId).toBe(userGroupAttr.UserId);
|
65
|
-
expect(result.GroupCode).toBe(userGroupAttr.GroupCode);
|
66
|
-
expect(result.Status).toBe(userGroupAttr.Status);
|
67
|
-
expect(result.InheritGroupPrivilegeYN).toBe(
|
68
|
-
userGroupAttr.InheritGroupPrivilegeYN
|
69
|
-
);
|
70
|
-
expect(result.InheritGroupSystemAccessYN).toBe(
|
71
|
-
userGroupAttr.InheritGroupSystemAccessYN
|
72
|
-
);
|
73
|
-
expect(result.CreatedById).toBe(userGroupAttr.CreatedById);
|
74
|
-
expect(result.CreatedAt).toBe(userGroupAttr.CreatedAt);
|
75
|
-
expect(result.UpdatedById).toBe(userGroupAttr.UpdatedById);
|
76
|
-
expect(result.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
|
77
|
-
});
|
78
|
-
|
79
|
-
it('should throw ClassError when UserGroupId is not found', async () => {
|
80
|
-
jest
|
81
|
-
.spyOn(UserGroupRepository.prototype, 'findOne')
|
82
|
-
.mockResolvedValueOnce(null);
|
83
|
-
|
84
|
-
await expect(UserGroup.init(null, 1)).rejects.toThrow(ClassError);
|
85
|
-
});
|
86
|
-
});
|
1
|
+
import { UserGroup } from '../../../../src/components/user-group/user-group';
|
2
|
+
import { UserGroupRepository } from '../../../../src/components/user-group/user-group.repository';
|
3
|
+
import { ClassError } from '@tomei/general';
|
4
|
+
|
5
|
+
describe('UserGroup', () => {
|
6
|
+
let userGroup: UserGroup;
|
7
|
+
const userGroupAttr = {
|
8
|
+
UserGroupId: 1,
|
9
|
+
UserId: 1,
|
10
|
+
GroupCode: 'group1',
|
11
|
+
Status: 'active',
|
12
|
+
InheritGroupPrivilegeYN: 'yes',
|
13
|
+
InheritGroupSystemAccessYN: 'yes',
|
14
|
+
CreatedById: 1,
|
15
|
+
CreatedAt: new Date(),
|
16
|
+
UpdatedById: 1,
|
17
|
+
UpdatedAt: new Date(),
|
18
|
+
};
|
19
|
+
|
20
|
+
beforeEach(() => {
|
21
|
+
userGroup = new (UserGroup as any)(userGroupAttr);
|
22
|
+
});
|
23
|
+
|
24
|
+
afterEach(() => {
|
25
|
+
jest.clearAllMocks();
|
26
|
+
});
|
27
|
+
|
28
|
+
describe('constructor', () => {
|
29
|
+
it('should create a new UserGroup instance', () => {
|
30
|
+
expect(userGroup).toBeDefined();
|
31
|
+
expect(userGroup).toBeInstanceOf(UserGroup);
|
32
|
+
expect(userGroup.UserGroupId).toBe(userGroupAttr.UserGroupId);
|
33
|
+
expect(userGroup.UserId).toBe(userGroupAttr.UserId);
|
34
|
+
expect(userGroup.GroupCode).toBe(userGroupAttr.GroupCode);
|
35
|
+
expect(userGroup.Status).toBe(userGroupAttr.Status);
|
36
|
+
expect(userGroup.InheritGroupPrivilegeYN).toBe(
|
37
|
+
userGroupAttr.InheritGroupPrivilegeYN
|
38
|
+
);
|
39
|
+
expect(userGroup.InheritGroupSystemAccessYN).toBe(
|
40
|
+
userGroupAttr.InheritGroupSystemAccessYN
|
41
|
+
);
|
42
|
+
expect(userGroup.CreatedById).toBe(userGroupAttr.CreatedById);
|
43
|
+
expect(userGroup.CreatedAt).toBe(userGroupAttr.CreatedAt);
|
44
|
+
expect(userGroup.UpdatedById).toBe(userGroupAttr.UpdatedById);
|
45
|
+
expect(userGroup.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
|
46
|
+
});
|
47
|
+
});
|
48
|
+
|
49
|
+
describe('init', () => {
|
50
|
+
it('should initialize UserGroup with valid UserGroupId', async () => {
|
51
|
+
const findOneMock = jest
|
52
|
+
.spyOn(UserGroupRepository.prototype, 'findOne')
|
53
|
+
.mockResolvedValueOnce(userGroupAttr as any);
|
54
|
+
|
55
|
+
const result = await UserGroup.init(null, 1);
|
56
|
+
|
57
|
+
expect(findOneMock).toHaveBeenCalledTimes(1);
|
58
|
+
expect(findOneMock).toHaveBeenCalledWith({
|
59
|
+
where: { UserGroupId: 1 },
|
60
|
+
transaction: null,
|
61
|
+
});
|
62
|
+
expect(result).toBeInstanceOf(UserGroup);
|
63
|
+
expect(result.UserGroupId).toBe(userGroupAttr.UserGroupId);
|
64
|
+
expect(result.UserId).toBe(userGroupAttr.UserId);
|
65
|
+
expect(result.GroupCode).toBe(userGroupAttr.GroupCode);
|
66
|
+
expect(result.Status).toBe(userGroupAttr.Status);
|
67
|
+
expect(result.InheritGroupPrivilegeYN).toBe(
|
68
|
+
userGroupAttr.InheritGroupPrivilegeYN
|
69
|
+
);
|
70
|
+
expect(result.InheritGroupSystemAccessYN).toBe(
|
71
|
+
userGroupAttr.InheritGroupSystemAccessYN
|
72
|
+
);
|
73
|
+
expect(result.CreatedById).toBe(userGroupAttr.CreatedById);
|
74
|
+
expect(result.CreatedAt).toBe(userGroupAttr.CreatedAt);
|
75
|
+
expect(result.UpdatedById).toBe(userGroupAttr.UpdatedById);
|
76
|
+
expect(result.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
|
77
|
+
});
|
78
|
+
|
79
|
+
it('should throw ClassError when UserGroupId is not found', async () => {
|
80
|
+
jest
|
81
|
+
.spyOn(UserGroupRepository.prototype, 'findOne')
|
82
|
+
.mockResolvedValueOnce(null);
|
83
|
+
|
84
|
+
await expect(UserGroup.init(null, 1)).rejects.toThrow(ClassError);
|
85
|
+
});
|
86
|
+
});
|
87
87
|
});
|
@@ -1,79 +1,79 @@
|
|
1
|
-
import { UserObjectPrivilege } from '../../../../src/components/user-object-privilege/user-object-privilege';
|
2
|
-
import { UserObjectPrivilegeRepository } from '../../../../src/components/user-object-privilege/user-object-privilege.repository';
|
3
|
-
import { ClassError } from '@tomei/general';
|
4
|
-
|
5
|
-
describe('UserObjectPrivilege', () => {
|
6
|
-
let userObjectPrivilege: UserObjectPrivilege;
|
7
|
-
const userObjectPrivilegeAttr = {
|
8
|
-
ObjectPrivilegeId: 1,
|
9
|
-
UserId: 1,
|
10
|
-
PrivilegeCode: 'code1',
|
11
|
-
ObjectId: 'object1',
|
12
|
-
ObjectType: 'type1',
|
13
|
-
CreatedAt: new Date(),
|
14
|
-
UpdatedAt: new Date(),
|
15
|
-
CreatedById: 1,
|
16
|
-
UpdatedById: 1,
|
17
|
-
};
|
18
|
-
|
19
|
-
beforeEach(() => {
|
20
|
-
userObjectPrivilege = new (UserObjectPrivilege as any)(userObjectPrivilegeAttr);
|
21
|
-
});
|
22
|
-
|
23
|
-
afterEach(() => {
|
24
|
-
jest.clearAllMocks();
|
25
|
-
});
|
26
|
-
|
27
|
-
describe('constructor', () => {
|
28
|
-
it('should create a new UserObjectPrivilege instance', () => {
|
29
|
-
expect(userObjectPrivilege).toBeDefined();
|
30
|
-
expect(userObjectPrivilege).toBeInstanceOf(UserObjectPrivilege);
|
31
|
-
expect(userObjectPrivilege.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
|
32
|
-
expect(userObjectPrivilege.UserId).toBe(userObjectPrivilegeAttr.UserId);
|
33
|
-
expect(userObjectPrivilege.PrivilegeCode).toBe(userObjectPrivilegeAttr.PrivilegeCode);
|
34
|
-
expect(userObjectPrivilege.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
|
35
|
-
expect(userObjectPrivilege.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
|
36
|
-
expect(userObjectPrivilege.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
|
37
|
-
expect(userObjectPrivilege.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
|
38
|
-
expect(userObjectPrivilege.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
|
39
|
-
expect(userObjectPrivilege.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
|
40
|
-
});
|
41
|
-
});
|
42
|
-
|
43
|
-
describe('init', () => {
|
44
|
-
it('should initialize UserObjectPrivilege with valid ObjectPrivilegeId', async () => {
|
45
|
-
const findOneMock = jest
|
46
|
-
.spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
|
47
|
-
.mockResolvedValueOnce({
|
48
|
-
...userObjectPrivilegeAttr,
|
49
|
-
get: () => userObjectPrivilegeAttr,
|
50
|
-
} as any);
|
51
|
-
|
52
|
-
const result = await UserObjectPrivilege.init(null, 1);
|
53
|
-
|
54
|
-
expect(findOneMock).toHaveBeenCalledTimes(1);
|
55
|
-
expect(findOneMock).toHaveBeenCalledWith({
|
56
|
-
where: { ObjectPrivilegeId: 1 },
|
57
|
-
transaction: null,
|
58
|
-
});
|
59
|
-
expect(result).toBeInstanceOf(UserObjectPrivilege);
|
60
|
-
expect(result.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
|
61
|
-
expect(result.UserId).toBe(userObjectPrivilegeAttr.UserId);
|
62
|
-
expect(result.PrivilegeCode).toBe(userObjectPrivilegeAttr.PrivilegeCode);
|
63
|
-
expect(result.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
|
64
|
-
expect(result.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
|
65
|
-
expect(result.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
|
66
|
-
expect(result.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
|
67
|
-
expect(result.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
|
68
|
-
expect(result.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
|
69
|
-
});
|
70
|
-
|
71
|
-
it('should throw ClassError when ObjectPrivilegeId is not found', async () => {
|
72
|
-
jest
|
73
|
-
.spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
|
74
|
-
.mockResolvedValueOnce(null);
|
75
|
-
|
76
|
-
await expect(UserObjectPrivilege.init(null, 1)).rejects.toThrow(ClassError);
|
77
|
-
});
|
78
|
-
});
|
1
|
+
import { UserObjectPrivilege } from '../../../../src/components/user-object-privilege/user-object-privilege';
|
2
|
+
import { UserObjectPrivilegeRepository } from '../../../../src/components/user-object-privilege/user-object-privilege.repository';
|
3
|
+
import { ClassError } from '@tomei/general';
|
4
|
+
|
5
|
+
describe('UserObjectPrivilege', () => {
|
6
|
+
let userObjectPrivilege: UserObjectPrivilege;
|
7
|
+
const userObjectPrivilegeAttr = {
|
8
|
+
ObjectPrivilegeId: 1,
|
9
|
+
UserId: 1,
|
10
|
+
PrivilegeCode: 'code1',
|
11
|
+
ObjectId: 'object1',
|
12
|
+
ObjectType: 'type1',
|
13
|
+
CreatedAt: new Date(),
|
14
|
+
UpdatedAt: new Date(),
|
15
|
+
CreatedById: 1,
|
16
|
+
UpdatedById: 1,
|
17
|
+
};
|
18
|
+
|
19
|
+
beforeEach(() => {
|
20
|
+
userObjectPrivilege = new (UserObjectPrivilege as any)(userObjectPrivilegeAttr);
|
21
|
+
});
|
22
|
+
|
23
|
+
afterEach(() => {
|
24
|
+
jest.clearAllMocks();
|
25
|
+
});
|
26
|
+
|
27
|
+
describe('constructor', () => {
|
28
|
+
it('should create a new UserObjectPrivilege instance', () => {
|
29
|
+
expect(userObjectPrivilege).toBeDefined();
|
30
|
+
expect(userObjectPrivilege).toBeInstanceOf(UserObjectPrivilege);
|
31
|
+
expect(userObjectPrivilege.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
|
32
|
+
expect(userObjectPrivilege.UserId).toBe(userObjectPrivilegeAttr.UserId);
|
33
|
+
expect(userObjectPrivilege.PrivilegeCode).toBe(userObjectPrivilegeAttr.PrivilegeCode);
|
34
|
+
expect(userObjectPrivilege.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
|
35
|
+
expect(userObjectPrivilege.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
|
36
|
+
expect(userObjectPrivilege.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
|
37
|
+
expect(userObjectPrivilege.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
|
38
|
+
expect(userObjectPrivilege.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
|
39
|
+
expect(userObjectPrivilege.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
|
40
|
+
});
|
41
|
+
});
|
42
|
+
|
43
|
+
describe('init', () => {
|
44
|
+
it('should initialize UserObjectPrivilege with valid ObjectPrivilegeId', async () => {
|
45
|
+
const findOneMock = jest
|
46
|
+
.spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
|
47
|
+
.mockResolvedValueOnce({
|
48
|
+
...userObjectPrivilegeAttr,
|
49
|
+
get: () => userObjectPrivilegeAttr,
|
50
|
+
} as any);
|
51
|
+
|
52
|
+
const result = await UserObjectPrivilege.init(null, 1);
|
53
|
+
|
54
|
+
expect(findOneMock).toHaveBeenCalledTimes(1);
|
55
|
+
expect(findOneMock).toHaveBeenCalledWith({
|
56
|
+
where: { ObjectPrivilegeId: 1 },
|
57
|
+
transaction: null,
|
58
|
+
});
|
59
|
+
expect(result).toBeInstanceOf(UserObjectPrivilege);
|
60
|
+
expect(result.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
|
61
|
+
expect(result.UserId).toBe(userObjectPrivilegeAttr.UserId);
|
62
|
+
expect(result.PrivilegeCode).toBe(userObjectPrivilegeAttr.PrivilegeCode);
|
63
|
+
expect(result.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
|
64
|
+
expect(result.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
|
65
|
+
expect(result.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
|
66
|
+
expect(result.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
|
67
|
+
expect(result.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
|
68
|
+
expect(result.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
|
69
|
+
});
|
70
|
+
|
71
|
+
it('should throw ClassError when ObjectPrivilegeId is not found', async () => {
|
72
|
+
jest
|
73
|
+
.spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
|
74
|
+
.mockResolvedValueOnce(null);
|
75
|
+
|
76
|
+
await expect(UserObjectPrivilege.init(null, 1)).rejects.toThrow(ClassError);
|
77
|
+
});
|
78
|
+
});
|
79
79
|
});
|
@@ -1,73 +1,73 @@
|
|
1
|
-
import { UserPrivilege } from '../../../../src/components/user-privilege/user-privilege';
|
2
|
-
import { UserPrivilegeRepository } from '../../../../src/components/user-privilege/user-privilege.repository';
|
3
|
-
import { ClassError } from '@tomei/general';
|
4
|
-
|
5
|
-
describe('UserPrivilege', () => {
|
6
|
-
let userPrivilege: UserPrivilege;
|
7
|
-
const userPrivilegeAttr = {
|
8
|
-
UserPrivilegeId: 1,
|
9
|
-
UserId: 1,
|
10
|
-
PrivilegeCode: 'privilege1',
|
11
|
-
Status: 'active',
|
12
|
-
CreatedById: 1,
|
13
|
-
CreatedAt: new Date(),
|
14
|
-
UpdatedById: 1,
|
15
|
-
UpdatedAt: new Date(),
|
16
|
-
};
|
17
|
-
|
18
|
-
beforeEach(() => {
|
19
|
-
userPrivilege = new (UserPrivilege as any)(userPrivilegeAttr);
|
20
|
-
});
|
21
|
-
|
22
|
-
afterEach(() => {
|
23
|
-
jest.clearAllMocks();
|
24
|
-
});
|
25
|
-
|
26
|
-
describe('constructor', () => {
|
27
|
-
it('should create a new UserPrivilege instance', () => {
|
28
|
-
expect(userPrivilege).toBeDefined();
|
29
|
-
expect(userPrivilege).toBeInstanceOf(UserPrivilege);
|
30
|
-
expect(userPrivilege.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
|
31
|
-
expect(userPrivilege.UserId).toBe(userPrivilegeAttr.UserId);
|
32
|
-
expect(userPrivilege.PrivilegeCode).toBe(userPrivilegeAttr.PrivilegeCode);
|
33
|
-
expect(userPrivilege.Status).toBe(userPrivilegeAttr.Status);
|
34
|
-
expect(userPrivilege.CreatedById).toBe(userPrivilegeAttr.CreatedById);
|
35
|
-
expect(userPrivilege.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
|
36
|
-
expect(userPrivilege.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
|
37
|
-
expect(userPrivilege.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
|
38
|
-
});
|
39
|
-
});
|
40
|
-
|
41
|
-
describe('init', () => {
|
42
|
-
it('should initialize UserPrivilege with valid UserPrivilegeId', async () => {
|
43
|
-
const findOneMock = jest
|
44
|
-
.spyOn(UserPrivilegeRepository.prototype, 'findOne')
|
45
|
-
.mockResolvedValueOnce(userPrivilegeAttr as any);
|
46
|
-
|
47
|
-
const result = await UserPrivilege.init(null, 1);
|
48
|
-
|
49
|
-
expect(findOneMock).toHaveBeenCalledTimes(1);
|
50
|
-
expect(findOneMock).toHaveBeenCalledWith({
|
51
|
-
where: { UserPrivilegeId: 1 },
|
52
|
-
transaction: null,
|
53
|
-
});
|
54
|
-
expect(result).toBeInstanceOf(UserPrivilege);
|
55
|
-
expect(result.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
|
56
|
-
expect(result.UserId).toBe(userPrivilegeAttr.UserId);
|
57
|
-
expect(result.PrivilegeCode).toBe(userPrivilegeAttr.PrivilegeCode);
|
58
|
-
expect(result.Status).toBe(userPrivilegeAttr.Status);
|
59
|
-
expect(result.CreatedById).toBe(userPrivilegeAttr.CreatedById);
|
60
|
-
expect(result.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
|
61
|
-
expect(result.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
|
62
|
-
expect(result.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
|
63
|
-
});
|
64
|
-
|
65
|
-
it('should throw ClassError when UserPrivilegeId is not found', async () => {
|
66
|
-
jest
|
67
|
-
.spyOn(UserPrivilegeRepository.prototype, 'findOne')
|
68
|
-
.mockResolvedValueOnce(null);
|
69
|
-
|
70
|
-
await expect(UserPrivilege.init(null, 1)).rejects.toThrow(ClassError);
|
71
|
-
});
|
72
|
-
});
|
1
|
+
import { UserPrivilege } from '../../../../src/components/user-privilege/user-privilege';
|
2
|
+
import { UserPrivilegeRepository } from '../../../../src/components/user-privilege/user-privilege.repository';
|
3
|
+
import { ClassError } from '@tomei/general';
|
4
|
+
|
5
|
+
describe('UserPrivilege', () => {
|
6
|
+
let userPrivilege: UserPrivilege;
|
7
|
+
const userPrivilegeAttr = {
|
8
|
+
UserPrivilegeId: 1,
|
9
|
+
UserId: 1,
|
10
|
+
PrivilegeCode: 'privilege1',
|
11
|
+
Status: 'active',
|
12
|
+
CreatedById: 1,
|
13
|
+
CreatedAt: new Date(),
|
14
|
+
UpdatedById: 1,
|
15
|
+
UpdatedAt: new Date(),
|
16
|
+
};
|
17
|
+
|
18
|
+
beforeEach(() => {
|
19
|
+
userPrivilege = new (UserPrivilege as any)(userPrivilegeAttr);
|
20
|
+
});
|
21
|
+
|
22
|
+
afterEach(() => {
|
23
|
+
jest.clearAllMocks();
|
24
|
+
});
|
25
|
+
|
26
|
+
describe('constructor', () => {
|
27
|
+
it('should create a new UserPrivilege instance', () => {
|
28
|
+
expect(userPrivilege).toBeDefined();
|
29
|
+
expect(userPrivilege).toBeInstanceOf(UserPrivilege);
|
30
|
+
expect(userPrivilege.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
|
31
|
+
expect(userPrivilege.UserId).toBe(userPrivilegeAttr.UserId);
|
32
|
+
expect(userPrivilege.PrivilegeCode).toBe(userPrivilegeAttr.PrivilegeCode);
|
33
|
+
expect(userPrivilege.Status).toBe(userPrivilegeAttr.Status);
|
34
|
+
expect(userPrivilege.CreatedById).toBe(userPrivilegeAttr.CreatedById);
|
35
|
+
expect(userPrivilege.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
|
36
|
+
expect(userPrivilege.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
|
37
|
+
expect(userPrivilege.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
|
38
|
+
});
|
39
|
+
});
|
40
|
+
|
41
|
+
describe('init', () => {
|
42
|
+
it('should initialize UserPrivilege with valid UserPrivilegeId', async () => {
|
43
|
+
const findOneMock = jest
|
44
|
+
.spyOn(UserPrivilegeRepository.prototype, 'findOne')
|
45
|
+
.mockResolvedValueOnce(userPrivilegeAttr as any);
|
46
|
+
|
47
|
+
const result = await UserPrivilege.init(null, 1);
|
48
|
+
|
49
|
+
expect(findOneMock).toHaveBeenCalledTimes(1);
|
50
|
+
expect(findOneMock).toHaveBeenCalledWith({
|
51
|
+
where: { UserPrivilegeId: 1 },
|
52
|
+
transaction: null,
|
53
|
+
});
|
54
|
+
expect(result).toBeInstanceOf(UserPrivilege);
|
55
|
+
expect(result.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
|
56
|
+
expect(result.UserId).toBe(userPrivilegeAttr.UserId);
|
57
|
+
expect(result.PrivilegeCode).toBe(userPrivilegeAttr.PrivilegeCode);
|
58
|
+
expect(result.Status).toBe(userPrivilegeAttr.Status);
|
59
|
+
expect(result.CreatedById).toBe(userPrivilegeAttr.CreatedById);
|
60
|
+
expect(result.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
|
61
|
+
expect(result.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
|
62
|
+
expect(result.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
|
63
|
+
});
|
64
|
+
|
65
|
+
it('should throw ClassError when UserPrivilegeId is not found', async () => {
|
66
|
+
jest
|
67
|
+
.spyOn(UserPrivilegeRepository.prototype, 'findOne')
|
68
|
+
.mockResolvedValueOnce(null);
|
69
|
+
|
70
|
+
await expect(UserPrivilege.init(null, 1)).rejects.toThrow(ClassError);
|
71
|
+
});
|
72
|
+
});
|
73
73
|
});
|