@tomei/sso 0.44.0 → 0.44.2
Sign up to get free protection for your applications and to get access to all the features.
- package/.commitlintrc.json +22 -22
- package/.eslintrc +16 -16
- package/.eslintrc.js +35 -35
- package/.gitlab-ci.yml +16 -16
- package/.husky/commit-msg +15 -15
- package/.husky/pre-commit +7 -7
- package/.prettierrc +4 -4
- package/Jenkinsfile +57 -57
- package/README.md +23 -23
- package/__tests__/unit/components/group/group.spec.ts +79 -79
- package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
- package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
- package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
- package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
- package/__tests__/unit/components/login-user/l.spec.ts +746 -746
- package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
- package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
- package/__tests__/unit/components/system/system.spec.ts +254 -254
- package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
- package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
- package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
- package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
- package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
- package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
- package/__tests__/unit/session/session.service.spec.ts +47 -47
- package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
- package/coverage/clover.xml +1452 -1452
- package/coverage/coverage-final.json +47 -47
- package/coverage/lcov-report/base.css +224 -224
- package/coverage/lcov-report/block-navigation.js +87 -87
- package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group/group.ts.html +327 -327
- package/coverage/lcov-report/components/group/index.html +130 -130
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
- package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
- package/coverage/lcov-report/components/group-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
- package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
- package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
- package/coverage/lcov-report/components/group-system-access/index.html +130 -130
- package/coverage/lcov-report/components/login-history/index.html +115 -115
- package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
- package/coverage/lcov-report/components/login-user/index.html +130 -130
- package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
- package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/password-hash/index.html +115 -115
- package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
- package/coverage/lcov-report/components/system/index.html +130 -130
- package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
- package/coverage/lcov-report/components/system/system.ts.html +909 -909
- package/coverage/lcov-report/components/system-privilege/index.html +130 -130
- package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
- package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
- package/coverage/lcov-report/components/user-group/index.html +130 -130
- package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
- package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
- package/coverage/lcov-report/components/user-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
- package/coverage/lcov-report/components/user-system-access/index.html +130 -130
- package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
- package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
- package/coverage/lcov-report/enum/index.html +160 -160
- package/coverage/lcov-report/enum/index.ts.html +93 -93
- package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
- package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
- package/coverage/lcov-report/index.html +370 -370
- package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
- package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
- package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
- package/coverage/lcov-report/models/group.entity.ts.html +435 -435
- package/coverage/lcov-report/models/index.html +310 -310
- package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
- package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
- package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
- package/coverage/lcov-report/models/system.entity.ts.html +423 -423
- package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
- package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
- package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user.entity.ts.html +522 -522
- package/coverage/lcov-report/prettify.css +1 -1
- package/coverage/lcov-report/prettify.js +2 -2
- package/coverage/lcov-report/redis-client/index.html +115 -115
- package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
- package/coverage/lcov-report/session/index.html +115 -115
- package/coverage/lcov-report/session/session.service.ts.html +246 -246
- package/coverage/lcov-report/sorter.js +196 -196
- package/coverage/lcov.info +2490 -2490
- package/coverage/test-report.xml +128 -128
- package/create-sso-user.sql +39 -39
- package/dist/src/components/api-key/api-key.d.ts +4 -0
- package/dist/src/components/api-key/api-key.js +9 -0
- package/dist/src/components/api-key/api-key.js.map +1 -1
- package/dist/src/components/group-reporting-user/group-reporting-user.d.ts +1 -1
- package/dist/src/components/group-reporting-user/group-reporting-user.js +11 -10
- package/dist/src/components/group-reporting-user/group-reporting-user.js.map +1 -1
- package/dist/src/interfaces/api-key-attr.interface.d.ts +1 -0
- package/dist/src/models/api-key-entity.d.ts +3 -0
- package/dist/src/models/api-key-entity.js +13 -0
- package/dist/src/models/api-key-entity.js.map +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/jest.config.js +14 -14
- package/migrations/20240314080602-create-user-table.js +124 -124
- package/migrations/20240314080603-create-user-group-table.js +85 -85
- package/migrations/20240314080604-create-user-user-group-table.js +55 -55
- package/migrations/20240314080605-create-login-history-table.js +53 -53
- package/migrations/20240527064925-create-system-table.js +78 -78
- package/migrations/20240527064926-create-system-privilege-table.js +71 -71
- package/migrations/20240527065342-create-group-table.js +93 -93
- package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
- package/migrations/20240528011551-create-group-system-access-table.js +72 -72
- package/migrations/20240528023018-user-system-access-table.js +75 -75
- package/migrations/20240528032229-user-privilege-table.js +75 -75
- package/migrations/20240528063003-create-group-privilege-table.js +85 -85
- package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
- package/migrations/20240528063107-create-user-object-privilege-table.js +83 -83
- package/migrations/20240528063108-create-api-key-table.js +85 -78
- package/package.json +89 -89
- package/sampledotenv +7 -7
- package/sonar-project.properties +22 -22
- package/src/components/api-key/api-key.ts +16 -0
- package/src/components/group-reporting-user/group-reporting-user.ts +14 -14
- package/src/interfaces/api-key-attr.interface.ts +1 -0
- package/src/models/api-key-entity.ts +11 -0
- package/tsconfig.build.json +5 -5
- package/tsconfig.json +22 -22
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
- package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
- package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
package/coverage/test-report.xml
CHANGED
@@ -1,129 +1,129 @@
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
-
<testExecutions version="1">
|
3
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
-
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
-
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
-
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
-
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
-
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
-
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
-
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
-
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
-
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
-
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
-
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
-
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
-
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
-
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
-
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
-
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
-
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
-
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
-
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
-
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
-
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
-
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
-
</file>
|
38
|
-
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
-
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
-
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
-
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
-
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
-
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
-
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
-
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
-
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
-
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
-
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
-
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
-
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
-
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
-
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
-
</file>
|
54
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
-
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
-
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
-
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
-
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
-
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
-
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
-
</file>
|
62
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
-
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
-
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
-
</file>
|
68
|
-
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
-
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
-
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
-
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
-
</file>
|
73
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
-
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
-
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
-
</file>
|
79
|
-
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
-
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
-
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
-
</file>
|
85
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
-
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
-
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
-
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
-
</file>
|
90
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
-
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
-
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
-
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
-
</file>
|
95
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
-
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
-
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
-
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
-
</file>
|
100
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
-
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
-
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
-
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
-
</file>
|
105
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
-
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
-
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
-
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
-
</file>
|
110
|
-
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
-
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
-
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
-
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
-
</file>
|
115
|
-
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
-
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
-
</file>
|
118
|
-
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
-
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
-
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
-
</file>
|
122
|
-
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
-
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
-
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
-
</file>
|
126
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
-
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
-
</file>
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<testExecutions version="1">
|
3
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
+
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
+
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
+
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
+
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
+
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
+
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
+
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
+
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
+
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
+
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
+
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
+
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
+
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
+
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
+
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
+
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
+
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
+
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
+
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
+
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
+
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
+
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
+
</file>
|
38
|
+
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
+
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
+
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
+
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
+
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
+
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
+
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
+
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
+
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
+
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
+
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
+
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
+
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
+
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
+
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
+
</file>
|
54
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
+
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
+
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
+
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
+
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
+
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
+
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
+
</file>
|
62
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
+
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
+
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
+
</file>
|
68
|
+
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
+
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
+
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
+
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
+
</file>
|
73
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
+
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
+
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
+
</file>
|
79
|
+
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
+
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
+
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
+
</file>
|
85
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
+
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
+
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
+
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
+
</file>
|
90
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
+
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
+
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
+
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
+
</file>
|
95
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
+
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
+
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
+
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
+
</file>
|
100
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
+
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
+
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
+
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
+
</file>
|
105
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
+
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
+
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
+
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
+
</file>
|
110
|
+
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
+
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
+
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
+
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
+
</file>
|
115
|
+
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
+
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
+
</file>
|
118
|
+
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
+
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
+
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
+
</file>
|
122
|
+
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
+
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
+
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
+
</file>
|
126
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
+
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
+
</file>
|
129
129
|
</testExecutions>
|
package/create-sso-user.sql
CHANGED
@@ -1,40 +1,40 @@
|
|
1
|
-
|
2
|
-
-- example to create sso-user
|
3
|
-
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
-
|
5
|
-
-- example to grant neccesary access to run migration
|
6
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
-
|
38
|
-
|
39
|
-
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
1
|
+
|
2
|
+
-- example to create sso-user
|
3
|
+
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
+
|
5
|
+
-- example to grant neccesary access to run migration
|
6
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
+
|
38
|
+
|
39
|
+
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
40
40
|
GRANT CREATE, ALTER, DROP, REFERENCES ON shadow_database.* TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
@@ -10,6 +10,7 @@ export declare class APIKey extends ObjectBase {
|
|
10
10
|
TableName: 'sso_APIKey';
|
11
11
|
ApiKey: string;
|
12
12
|
Name: string;
|
13
|
+
SystemCode: string;
|
13
14
|
Description: string;
|
14
15
|
Status: APIKeyStatusEnum;
|
15
16
|
ExpirationDate: Date;
|
@@ -32,6 +33,7 @@ export declare class APIKey extends ObjectBase {
|
|
32
33
|
Name: string;
|
33
34
|
Status: APIKeyStatusEnum;
|
34
35
|
Description: string;
|
36
|
+
SystemCode: string;
|
35
37
|
ExpirationDate: Date;
|
36
38
|
CreatedAt: Date;
|
37
39
|
CreatedById: number;
|
@@ -43,6 +45,7 @@ export declare class APIKey extends ObjectBase {
|
|
43
45
|
page: number;
|
44
46
|
limit: number;
|
45
47
|
}, loginUser: LoginUser, dbTransaction: any, whereOptions: {
|
48
|
+
SystemCode?: string;
|
46
49
|
Status?: APIKeyStatusEnum;
|
47
50
|
ExpirationDate?: {
|
48
51
|
FromDate: Date;
|
@@ -58,6 +61,7 @@ export declare class APIKey extends ObjectBase {
|
|
58
61
|
ApiKeyId: number;
|
59
62
|
ApiKey: string;
|
60
63
|
Name: string;
|
64
|
+
SystemCode: string;
|
61
65
|
Description: string;
|
62
66
|
Status: APIKeyStatusEnum;
|
63
67
|
ExpirationDate: Date;
|
@@ -17,6 +17,7 @@ const config_1 = require("@tomei/config");
|
|
17
17
|
const crypto_1 = require("crypto");
|
18
18
|
const activity_history_1 = require("@tomei/activity-history");
|
19
19
|
const sequelize_1 = require("sequelize");
|
20
|
+
const system_1 = require("../system/system");
|
20
21
|
class APIKey extends general_1.ObjectBase {
|
21
22
|
get APIKeyId() {
|
22
23
|
return parseInt(this.ObjectId);
|
@@ -42,6 +43,7 @@ class APIKey extends general_1.ObjectBase {
|
|
42
43
|
this.APIKeyId = apiKeyAttr.APIKeyId;
|
43
44
|
this.ApiKey = apiKeyAttr.ApiKey;
|
44
45
|
this.Name = apiKeyAttr.Name;
|
46
|
+
this.SystemCode = apiKeyAttr.SystemCode;
|
45
47
|
this.Description = apiKeyAttr.Description;
|
46
48
|
this.Status = apiKeyAttr.Status;
|
47
49
|
this.ExpirationDate = apiKeyAttr.ExpirationDate;
|
@@ -78,12 +80,14 @@ class APIKey extends general_1.ObjectBase {
|
|
78
80
|
if (!isPrivileged) {
|
79
81
|
throw new general_1.ClassError('APIKey', 'APIKeyErrMsgO2', 'User does not have privilege to generate API key.', 'generate');
|
80
82
|
}
|
83
|
+
yield system_1.System.init(dbTransaction, this.SystemCode);
|
81
84
|
this._CreatedById = loginUser.UserId;
|
82
85
|
this._CreatedAt = new Date();
|
83
86
|
this.ApiKey = (0, crypto_1.randomBytes)(64).toString('hex');
|
84
87
|
const EntityValueAfter = {
|
85
88
|
ApiKey: this.ApiKey,
|
86
89
|
Name: this.Name,
|
90
|
+
SystemCode: this.SystemCode,
|
87
91
|
Status: this.Status,
|
88
92
|
Description: this.Description,
|
89
93
|
ExpirationDate: this.ExpirationDate,
|
@@ -113,6 +117,7 @@ class APIKey extends general_1.ObjectBase {
|
|
113
117
|
Name: this.Name,
|
114
118
|
Status: this.Status,
|
115
119
|
Description: this.Description,
|
120
|
+
SystemCode: this.SystemCode,
|
116
121
|
ExpirationDate: this.ExpirationDate,
|
117
122
|
CreatedAt: this.CreatedAt,
|
118
123
|
CreatedById: this.CreatedById,
|
@@ -136,6 +141,9 @@ class APIKey extends general_1.ObjectBase {
|
|
136
141
|
}
|
137
142
|
const where = {};
|
138
143
|
if (whereOptions) {
|
144
|
+
if (whereOptions.SystemCode) {
|
145
|
+
where['SystemCode'] = whereOptions.SystemCode;
|
146
|
+
}
|
139
147
|
if (whereOptions.Status) {
|
140
148
|
where['Status'] = whereOptions.Status;
|
141
149
|
}
|
@@ -178,6 +186,7 @@ class APIKey extends general_1.ObjectBase {
|
|
178
186
|
ApiKeyId: row.APIKeyId,
|
179
187
|
ApiKey: row.ApiKey,
|
180
188
|
Name: row.Name,
|
189
|
+
SystemCode: row.SystemCode,
|
181
190
|
Description: row.Description,
|
182
191
|
Status: row.Status,
|
183
192
|
ExpirationDate: row.ExpirationDate,
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"api-key.js","sourceRoot":"","sources":["../../../../src/components/api-key/api-key.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,0DAA2D;AAC3D,6DAAwD;AAGxD,0CAAkD;AAClD,mCAAqC;AACrC,8DAA+D;AAC/D,yCAA+B;
|
1
|
+
{"version":3,"file":"api-key.js","sourceRoot":"","sources":["../../../../src/components/api-key/api-key.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,0DAA2D;AAC3D,6DAAwD;AAGxD,0CAAkD;AAClD,mCAAqC;AACrC,8DAA+D;AAC/D,yCAA+B;AAC/B,6CAA0C;AAE1C,MAAa,MAAO,SAAQ,oBAAU;IAkBpC,IAAI,QAAQ;QACV,OAAO,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IACjC,CAAC;IAED,IAAI,QAAQ,CAAC,KAAa;QACxB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,QAAQ,EAAE,CAAC;IACnC,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAID,YAAsB,UAAwB;QAC5C,KAAK,EAAE,CAAC;QACR,IAAI,UAAU,EAAE;YACd,IAAI,CAAC,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC;YACpC,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC;YAChC,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,IAAI,CAAC;YAC5B,IAAI,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;YACxC,IAAI,CAAC,WAAW,GAAG,UAAU,CAAC,WAAW,CAAC;YAC1C,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC;YAChC,IAAI,CAAC,cAAc,GAAG,UAAU,CAAC,cAAc,CAAC;YAChD,IAAI,CAAC,YAAY,GAAG,UAAU,CAAC,WAAW,CAAC;YAC3C,IAAI,CAAC,UAAU,GAAG,UAAU,CAAC,SAAS,CAAC;YACvC,IAAI,CAAC,UAAU,GAAG,UAAU,CAAC,SAAS,CAAC;YACvC,IAAI,CAAC,YAAY,GAAG,UAAU,CAAC,WAAW,CAAC;SAC5C;IACH,CAAC;IAEM,MAAM,CAAO,IAAI,CAAC,QAAiB,EAAE,aAAmB;;YAC7D,IAAI;gBACF,IAAI,QAAQ,EAAE;oBACZ,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,QAAQ,CAC1C,QAAQ,CAAC,QAAQ,EAAE,EACnB,aAAa,CACd,CAAC;oBACF,IAAI,UAAU,EAAE;wBACd,OAAO,IAAI,MAAM,CAAC,UAAU,CAAC,CAAC;qBAC/B;yBAAM;wBACL,MAAM,IAAI,oBAAU,CAClB,QAAQ,EACR,gBAAgB,EAChB,kBAAkB,EAClB,MAAM,CACP,CAAC;qBACH;iBACF;gBACD,OAAO,IAAI,MAAM,EAAE,CAAC;aACrB;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEK,QAAQ,CAAC,SAAoB,EAAE,aAAmB;;YAEtD,IAAI;gBAKF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,gBAAgB,CACjB,CAAC;gBAEF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,QAAQ,EACR,gBAAgB,EAChB,mDAAmD,EACnD,UAAU,CACX,CAAC;iBACH;gBAMD,MAAM,eAAM,CAAC,IAAI,CAAC,aAAa,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;gBAKlD,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBAErC,IAAI,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAI7B,IAAI,CAAC,MAAM,GAAG,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBAO9C,MAAM,gBAAgB,GAAQ;oBAC5B,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,UAAU,EAAE,IAAI,CAAC,UAAU;oBAC3B,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,cAAc,EAAE,IAAI,CAAC,cAAc;oBACnC,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,aAAa,EAAE,IAAI,CAAC,aAAa;iBAClC,CAAC;gBAEF,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,EAAE;oBACvD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBACH,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;gBAC9B,gBAAgB,CAAC,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;gBAI1C,MAAM,iBAAiB,GAAG,EAAE,CAAC;gBAG7B,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAO1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,mBAAmB,CAAC;gBAC3C,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC;gBAC/B,QAAQ,CAAC,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;gBAClC,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAI7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAYzD,OAAO;oBACL,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;oBAC3B,cAAc,EAAE,IAAI,CAAC,cAAc;oBACnC,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,aAAa,EAAE,IAAI,CAAC,aAAa;iBAClC,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,OAAO,CACzB,UAA2C,EAC3C,SAAoB,EACpB,aAAkB,EAClB,YAQC,EACD,WAGC;;YAED,IAAI;gBAMF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,cAAc,CACf,CAAC;gBAEF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,QAAQ,EACR,gBAAgB,EAChB,mDAAmD,EACnD,UAAU,CACX,CAAC;iBACH;gBAOD,MAAM,KAAK,GAAG,EAAE,CAAC;gBACjB,IAAI,YAAY,EAAE;oBAChB,IAAI,YAAY,CAAC,UAAU,EAAE;wBAC3B,KAAK,CAAC,YAAY,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC;qBAC/C;oBACD,IAAI,YAAY,CAAC,MAAM,EAAE;wBACvB,KAAK,CAAC,QAAQ,CAAC,GAAG,YAAY,CAAC,MAAM,CAAC;qBACvC;oBACD,IAAI,YAAY,CAAC,cAAc,EAAE;wBAC/B,KAAK,CAAC,gBAAgB,CAAC,GAAG;4BACxB,CAAC,cAAE,CAAC,OAAO,CAAC,EAAE;gCACZ,YAAY,CAAC,cAAc,CAAC,QAAQ;gCACpC,YAAY,CAAC,cAAc,CAAC,MAAM;6BACnC;yBACF,CAAC;qBACH;oBACD,IAAI,YAAY,CAAC,WAAW,EAAE;wBAC5B,KAAK,CAAC,aAAa,CAAC,GAAG,YAAY,CAAC,WAAW,CAAC;qBACjD;iBACF;gBAED,MAAM,KAAK,GAAG,EAAE,CAAC;gBACjB,IAAI,WAAW,EAAE;oBAGf,IAAI,WAAW,CAAC,MAAM,EAAE;wBACtB,KAAK,CAAC,IAAI,CAAC,CAAC,WAAW,CAAC,MAAM,EAAE,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC;qBACzD;iBACF;qBAAM;oBACL,KAAK,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC,CAAC;iBACnC;gBAED,IAAI,MAAM,GAAG,CAAC,CAAC;gBACf,IAAI,UAAU,EAAE;oBACd,MAAM,GAAG,CAAC,UAAU,CAAC,IAAI,GAAG,CAAC,CAAC,GAAG,UAAU,CAAC,KAAK,CAAC;iBACnD;gBAID,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAAC;oBACpD,KAAK;oBACL,KAAK;oBACL,MAAM;oBACN,KAAK,EAAE,UAAU,CAAC,KAAK;oBACvB,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAkBH,OAAO;oBACL,KAAK,EAAE,IAAI,CAAC,KAAK;oBACjB,OAAO,EAAE,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;wBAC7B,OAAO;4BACL,QAAQ,EAAE,GAAG,CAAC,QAAQ;4BACtB,MAAM,EAAE,GAAG,CAAC,MAAM;4BAClB,IAAI,EAAE,GAAG,CAAC,IAAI;4BACd,UAAU,EAAE,GAAG,CAAC,UAAU;4BAC1B,WAAW,EAAE,GAAG,CAAC,WAAW;4BAC5B,MAAM,EAAE,GAAG,CAAC,MAAM;4BAClB,cAAc,EAAE,GAAG,CAAC,cAAc;4BAClC,SAAS,EAAE,GAAG,CAAC,SAAS;4BACxB,WAAW,EAAE,GAAG,CAAC,WAAW;4BAC5B,SAAS,EAAE,GAAG,CAAC,SAAS;4BACxB,WAAW,EAAE,GAAG,CAAC,WAAW;4BAC5B,aAAa,EAAE,GAAG,CAAC,aAAa;yBACjC,CAAC;oBACJ,CAAC,CAAC;oBACF,IAAI,EAAE,UAAU,CAAC,IAAI;oBACrB,KAAK,EAAE,UAAU,CAAC,KAAK;iBACxB,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEY,MAAM,CACjB,MAAc,EACd,SAAoB,EACpB,aAAkB,EAClB,MAAe;;YAEf,IAAI;gBAIF,MAAM,YAAY,GAAG,MAAM,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC;oBAC9C,KAAK,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE;oBACzB,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBACH,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,QAAQ,EACR,gBAAgB,EAChB,oBAAoB,EACpB,QAAQ,CACT,CAAC;iBACH;gBACD,MAAM,iBAAiB,qBAClB,YAAY,CAAC,GAAG,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CACrC,CAAC;gBAKF,YAAY,CAAC,MAAM,GAAG,+BAAgB,CAAC,OAAO,CAAC;gBAE/C,YAAY,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;gBAEpC,YAAY,CAAC,WAAW,GAAG,SAAS,CAAC,MAAM,CAAC;gBAG5C,IAAI,MAAM,EAAE;oBACV,YAAY,CAAC,aAAa,GAAG,MAAM,CAAC;iBACrC;gBAMD,MAAM,MAAM,CAAC,KAAK,CAAC,MAAM,mBAElB,YAAY,CAAC,GAAG,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,GAEtC;oBACE,KAAK,EAAE,EAAE,QAAQ,EAAE,YAAY,CAAC,QAAQ,EAAE;oBAC1C,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAKF,MAAM,gBAAgB,qBACjB,YAAY,CAAC,GAAG,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CACrC,CAAC;gBAQF,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,iBAAiB,CAAC;gBACzC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC;gBAC/B,QAAQ,CAAC,QAAQ,GAAG,YAAY,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBACrD,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAI7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAUzD,OAAO;oBACL,MAAM,EAAE,YAAY,CAAC,MAAM;oBAC3B,MAAM,EAAE,YAAY,CAAC,MAAM;oBAC3B,SAAS,EAAE,YAAY,CAAC,SAAS;oBACjC,WAAW,EAAE,YAAY,CAAC,WAAW;oBACrC,aAAa,EAAE,YAAY,CAAC,aAAa;iBAC1C,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;;AAlbH,wBAmbC;AAzYkB,YAAK,GAAG,IAAI,qCAAgB,EAAE,CAAC"}
|
@@ -23,6 +23,6 @@ export declare class GroupReportingUser extends ObjectBase {
|
|
23
23
|
private constructor();
|
24
24
|
static init(dbTransaction: any, GroupReportingUserId?: string): Promise<GroupReportingUser>;
|
25
25
|
createGroupReportingUser(loginUser: User, dbTransaction: any, groupCode: string, userId: number, rank: number, status: 'Active' | 'Inactive'): Promise<GroupReportingUser>;
|
26
|
-
static findAllGroupReportingUsers(loginUser: User, dbTransaction: any, groupCode?: string): Promise<
|
26
|
+
static findAllGroupReportingUsers(loginUser: User, dbTransaction: any, groupCode?: string): Promise<import("../../models/group-reporting-user.entity").default[]>;
|
27
27
|
static removeGroupReportingUser(loginUser: User, dbTransaction: Transaction, groupReportingUserId: number): Promise<void>;
|
28
28
|
}
|
@@ -13,6 +13,7 @@ exports.GroupReportingUser = void 0;
|
|
13
13
|
const general_1 = require("@tomei/general");
|
14
14
|
const group_reporting_user_repository_1 = require("./group-reporting-user.repository");
|
15
15
|
const user_1 = require("../login-user/user");
|
16
|
+
const user_entity_1 = require("../../models/user.entity");
|
16
17
|
const group_1 = require("../group/group");
|
17
18
|
const config_1 = require("@tomei/config");
|
18
19
|
const activity_history_1 = require("@tomei/activity-history");
|
@@ -56,13 +57,13 @@ class GroupReportingUser extends general_1.ObjectBase {
|
|
56
57
|
return new GroupReportingUser(groupReportingUser);
|
57
58
|
}
|
58
59
|
else {
|
59
|
-
throw new general_1.ClassError('GroupReportingUser', 'GroupReportingUserErrMsg00', 'GroupReportingUser Not Found');
|
60
|
+
throw new general_1.ClassError('GroupReportingUser', 'GroupReportingUserErrMsg00', 'GroupReportingUser Not Found', 'init', 404);
|
60
61
|
}
|
61
62
|
}
|
62
63
|
return new GroupReportingUser();
|
63
64
|
}
|
64
65
|
catch (error) {
|
65
|
-
throw
|
66
|
+
throw error;
|
66
67
|
}
|
67
68
|
});
|
68
69
|
}
|
@@ -148,18 +149,18 @@ class GroupReportingUser extends general_1.ObjectBase {
|
|
148
149
|
where: {
|
149
150
|
GroupCode: groupCode,
|
150
151
|
},
|
152
|
+
include: [
|
153
|
+
{
|
154
|
+
model: user_entity_1.default,
|
155
|
+
as: 'User',
|
156
|
+
},
|
157
|
+
],
|
151
158
|
order: [
|
152
159
|
['Rank', 'ASC'],
|
153
160
|
],
|
154
161
|
transaction: dbTransaction,
|
155
162
|
});
|
156
|
-
|
157
|
-
if (result.length > 0) {
|
158
|
-
for (let i = 0; i < result.length; i++) {
|
159
|
-
reportingUser.push(new GroupReportingUser(result[i].get({ plain: true })));
|
160
|
-
}
|
161
|
-
}
|
162
|
-
return reportingUser;
|
163
|
+
return result;
|
163
164
|
}
|
164
165
|
catch (error) {
|
165
166
|
throw error;
|
@@ -172,7 +173,7 @@ class GroupReportingUser extends general_1.ObjectBase {
|
|
172
173
|
const systemCode = config_1.ApplicationConfig.getComponentConfigValue('system-code');
|
173
174
|
const isPrivileged = yield loginUser.checkPrivileges(systemCode, 'GROUP_REPORTING_USER_REMOVE');
|
174
175
|
if (!isPrivileged) {
|
175
|
-
throw new general_1.ClassError('GroupReportingUser', 'GroupReportingUserErrMsg06', 'Insufficient privileges to remove a user from the group');
|
176
|
+
throw new general_1.ClassError('GroupReportingUser', 'GroupReportingUserErrMsg06', 'Insufficient privileges to remove a user from the group', 'removeGroupReportingUser', 403);
|
176
177
|
}
|
177
178
|
const groupReportingUser = yield GroupReportingUser.init(dbTransaction, groupReportingUserId.toString());
|
178
179
|
yield GroupReportingUser._Repo.destroy(groupReportingUserId, dbTransaction);
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"group-reporting-user.js","sourceRoot":"","sources":["../../../../src/components/group-reporting-user/group-reporting-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,uFAAiF;AAEjF,6CAA0C;AAC1C,0CAAuC;AACvC,0CAAkD;AAClD,8DAA+D;AAG/D,MAAa,kBAAmB,SAAQ,oBAAU;IAiBhD,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,YAAoB,sBAAgD;QAClE,KAAK,EAAE,CAAC;QA/BV,cAAS,GAAG,wBAAwB,CAAC;QACrC,eAAU,GAAG,oBAAoB,CAAC;QA+BhC,IAAI,sBAAsB,EAAE;YAC1B,IAAI,CAAC,oBAAoB,GAAG,sBAAsB,CAAC,oBAAoB,CAAC;YACxE,IAAI,CAAC,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC;YAClD,IAAI,CAAC,MAAM,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,MAAM,CAAC;YAC7C,IAAI,CAAC,IAAI,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,IAAI,CAAC;YACzC,IAAI,CAAC,MAAM,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,MAAM,CAAC;YAC7C,IAAI,CAAC,YAAY,GAAG,sBAAsB,CAAC,WAAW,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,sBAAsB,CAAC,SAAS,CAAC;YACnD,IAAI,CAAC,YAAY,GAAG,sBAAsB,CAAC,WAAW,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,sBAAsB,CAAC,SAAS,CAAC;SACpD;IACH,CAAC;IAEM,MAAM,CAAO,IAAI,CAAC,aAAkB,EAAE,oBAA6B;;YACxE,IAAI;gBACF,IAAI,oBAAoB,EAAE;oBACxB,MAAM,kBAAkB,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,QAAQ,CAChE,oBAAoB,EACpB;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;oBACF,IAAI,kBAAkB,EAAE;wBACtB,OAAO,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;qBACnD;yBAAM;wBACL,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,8BAA8B,
|
1
|
+
{"version":3,"file":"group-reporting-user.js","sourceRoot":"","sources":["../../../../src/components/group-reporting-user/group-reporting-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,uFAAiF;AAEjF,6CAA0C;AAC1C,0DAAiD;AACjD,0CAAuC;AACvC,0CAAkD;AAClD,8DAA+D;AAG/D,MAAa,kBAAmB,SAAQ,oBAAU;IAiBhD,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,YAAoB,sBAAgD;QAClE,KAAK,EAAE,CAAC;QA/BV,cAAS,GAAG,wBAAwB,CAAC;QACrC,eAAU,GAAG,oBAAoB,CAAC;QA+BhC,IAAI,sBAAsB,EAAE;YAC1B,IAAI,CAAC,oBAAoB,GAAG,sBAAsB,CAAC,oBAAoB,CAAC;YACxE,IAAI,CAAC,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC;YAClD,IAAI,CAAC,MAAM,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,MAAM,CAAC;YAC7C,IAAI,CAAC,IAAI,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,IAAI,CAAC;YACzC,IAAI,CAAC,MAAM,GAAG,sBAAsB,aAAtB,sBAAsB,uBAAtB,sBAAsB,CAAE,MAAM,CAAC;YAC7C,IAAI,CAAC,YAAY,GAAG,sBAAsB,CAAC,WAAW,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,sBAAsB,CAAC,SAAS,CAAC;YACnD,IAAI,CAAC,YAAY,GAAG,sBAAsB,CAAC,WAAW,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,sBAAsB,CAAC,SAAS,CAAC;SACpD;IACH,CAAC;IAEM,MAAM,CAAO,IAAI,CAAC,aAAkB,EAAE,oBAA6B;;YACxE,IAAI;gBACF,IAAI,oBAAoB,EAAE;oBACxB,MAAM,kBAAkB,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,QAAQ,CAChE,oBAAoB,EACpB;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;oBACF,IAAI,kBAAkB,EAAE;wBACtB,OAAO,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;qBACnD;yBAAM;wBACL,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,8BAA8B,EAC9B,MAAM,EACN,GAAG,CACJ,CAAC;qBACH;iBACF;gBACD,OAAO,IAAI,kBAAkB,EAAE,CAAC;aACjC;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEK,wBAAwB,CAC5B,SAAe,EACf,aAAkB,EAClB,SAAiB,EACjB,MAAc,EACd,IAAY,EACZ,MAA6B;;YAG7B,IAAI;gBAKF,MAAM,KAAK,GAAG,MAAM,aAAK,CAAC,IAAI,CAAC,aAAa,EAAE,SAAS,CAAC,CAAC;gBAEzD,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,IAAI,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;gBAMpD,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,6BAA6B,CAC9B,CAAC;gBACF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,oDAAoD,CACrD,CAAC;iBACH;gBAID,MAAM,kBAAkB,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChE,KAAK,EAAE;wBACL,SAAS,EAAE,SAAS;wBACpB,MAAM,EAAE,MAAM;qBACf;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAEH,IAAI,kBAAkB,EAAE;oBACtB,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,kCAAkC,EAClC,0BAA0B,CAC3B,CAAC;iBACH;gBAGD,MAAM,sBAAsB,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,OAAO,CAAC;oBACpE,KAAK,EAAE;wBACL,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,IAAI;qBACX;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBACH,IAAI,sBAAsB,EAAE;oBAC1B,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,kCAAkC,EAClC,0BAA0B,CAC3B,CAAC;iBACH;gBAID,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;gBAC3B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;gBACrB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;gBACjB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;gBACrB,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBACrC,IAAI,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAC7B,IAAI,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAC7B,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBAErC,MAAM,gBAAgB,GAAQ;oBAC5B,SAAS,EAAE,SAAS;oBACpB,MAAM,EAAE,MAAM;oBACd,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,MAAM;oBACd,WAAW,EAAE,SAAS,CAAC,MAAM;oBAC7B,SAAS,EAAE,IAAI,CAAC,UAAU;oBAC1B,WAAW,EAAE,SAAS,CAAC,MAAM;oBAC7B,SAAS,EAAE,IAAI,CAAC,UAAU;iBAC3B,CAAC;gBAEF,MAAM,qBAAqB,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,MAAM,CACjE,gBAAgB,EAChB;oBACE,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAEF,gBAAgB,CAAC,oBAAoB;oBACnC,qBAAqB,CAAC,oBAAoB,CAAC;gBAW7C,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,6BAA6B,CAAC;gBACrD,QAAQ,CAAC,UAAU,GAAG,oBAAoB,CAAC;gBAC3C,QAAQ,CAAC,QAAQ,GAAG,qBAAqB,CAAC,oBAAoB,CAAC,QAAQ,EAAE,CAAC;gBAC1E,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAChD,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAI7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAGzD,OAAO,IAAI,CAAC;aACb;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,0BAA0B,CAC5C,SAAe,EACf,aAAkB,EAClB,SAAkB;;YAIlB,IAAI;gBAMF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,2BAA2B,CAC5B,CAAC;gBAEF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,OAAO,EACP,4BAA4B,EAC5B,4DAA4D,CAC7D,CAAC;iBACH;gBAKD,MAAM,aAAK,CAAC,IAAI,CAAC,aAAa,EAAE,SAAS,CAAC,CAAC;gBAM3C,MAAM,MAAM,GAAG,MAAM,kBAAkB,CAAC,KAAK,CAAC,OAAO,CAAC;oBACpD,KAAK,EAAE;wBACL,SAAS,EAAE,SAAS;qBACrB;oBACD,OAAO,EAAE;wBACP;4BACE,KAAK,EAAE,qBAAS;4BAChB,EAAE,EAAE,MAAM;yBACX;qBACF;oBACD,KAAK,EAAE;wBACL,CAAC,MAAM,EAAE,KAAK,CAAC;qBAChB;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAKH,OAAO,MAAM,CAAC;aACf;YAAC,OAAO,KAAK,EAAE;gBAGd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,wBAAwB,CAC1C,SAAe,EACf,aAA0B,EAC1B,oBAA4B;;YAG5B,IAAI;gBAKF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,6BAA6B,CAC9B,CAAC;gBACF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,oBAAoB,EACpB,4BAA4B,EAC5B,yDAAyD,EACzD,0BAA0B,EAC1B,GAAG,CACJ,CAAC;iBACH;gBAID,MAAM,kBAAkB,GAAG,MAAM,kBAAkB,CAAC,IAAI,CACtD,aAAa,EACb,oBAAoB,CAAC,QAAQ,EAAE,CAChC,CAAC;gBAIF,MAAM,kBAAkB,CAAC,KAAK,CAAC,OAAO,CACpC,oBAAoB,EACpB,aAAa,CACd,CAAC;gBAIF,MAAM,iBAAiB,GAAG;oBACxB,oBAAoB,EAAE,kBAAkB,CAAC,oBAAoB;oBAC7D,SAAS,EAAE,kBAAkB,CAAC,SAAS;oBACvC,MAAM,EAAE,kBAAkB,CAAC,MAAM;oBACjC,IAAI,EAAE,kBAAkB,CAAC,IAAI;oBAC7B,MAAM,EAAE,kBAAkB,CAAC,MAAM;oBACjC,WAAW,EAAE,kBAAkB,CAAC,WAAW;oBAC3C,SAAS,EAAE,kBAAkB,CAAC,SAAS;oBACvC,WAAW,EAAE,kBAAkB,CAAC,WAAW;oBAC3C,SAAS,EAAE,kBAAkB,CAAC,SAAS;iBACxC,CAAC;gBAEF,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAQhC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,6BAA6B,CAAC;gBACrD,QAAQ,CAAC,UAAU,GAAG,oBAAoB,CAAC;gBAC3C,QAAQ,CAAC,QAAQ,GAAG,oBAAoB,CAAC,QAAQ,EAAE,CAAC;gBACpD,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAI/C,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;aAC1D;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;;AA7VH,gDA8VC;AA/UgB,wBAAK,GAAG,IAAI,8DAA4B,EAAE,CAAC"}
|